SecWiki周刊(第185期)
2017/09/11-2017/09/17
安全资讯
美国在网络战场上与ISIS展开全面对抗
https://www.easyaq.com/news/1014953255.shtml
https://www.easyaq.com/news/1014953255.shtml
The CTO Journey at a Small Startup
https://zapier.com/engineering/startup-cto/?utm_source=wanqu.co&utm_campaign=Wanqu+Daily&utm_medium=website
https://zapier.com/engineering/startup-cto/?utm_source=wanqu.co&utm_campaign=Wanqu+Daily&utm_medium=website
墨西哥退税网站MoneyBack泄露400GB客户敏感数据
https://www.easyaq.com/news/678569852.shtml
https://www.easyaq.com/news/678569852.shtml
53亿台蓝牙功能设备受“BlueBorne”攻击影响【视频】
https://www.easyaq.com/news/1543340364.shtml
https://www.easyaq.com/news/1543340364.shtml
2017国家网络安全宣传周参展企业盘点
https://mp.weixin.qq.com/s/fNH-gfKMK7hjfUq7J6Y1-Q
https://mp.weixin.qq.com/s/fNH-gfKMK7hjfUq7J6Y1-Q
Ten Malicious Libraries Found on PyPI
https://www.bleepingcomputer.com/news/security/ten-malicious-libraries-found-on-pypi-python-package-index/
https://www.bleepingcomputer.com/news/security/ten-malicious-libraries-found-on-pypi-python-package-index/
FireEye:朝鲜为什么对加密货币兴趣浓厚?
https://www.easyaq.com/news/694315619.shtml
https://www.easyaq.com/news/694315619.shtml
Equifax数据开价600比特币,有黑客号召众筹模式进行购买
https://nosec.org/my/threats/1562#
https://nosec.org/my/threats/1562#
公共互联网网络安全威胁监测与处置办法
http://www.gov.cn/xinwen/2017-09/13/5224866/files/398ec5602a254ef39e3523e2ac90c4bd.doc
http://www.gov.cn/xinwen/2017-09/13/5224866/files/398ec5602a254ef39e3523e2ac90c4bd.doc
全球165万台设备被感染,电脑变僵尸挖矿军!
https://www.easyaq.com/news/1309421880.shtml
https://www.easyaq.com/news/1309421880.shtml
黑客小说 杀手 第十八章 X计划
http://www.jianshu.com/p/7fdc32b207e6
http://www.jianshu.com/p/7fdc32b207e6
研究人员发现利用Excel宏可发起跳板攻击
https://www.easyaq.com/news/2133633215.shtml
https://www.easyaq.com/news/2133633215.shtml
美国私营军事承包商9402份招聘文件是如何泄露的?
https://www.easyaq.com/news/189596332.shtml
https://www.easyaq.com/news/189596332.shtml
Critical Bluetooth Flaws Put Over 5 Billion Devices At Risk Of Hacking
https://www.forbes.com/sites/lconstantin/2017/09/12/critical-bluetooth-flaws-put-over-5-billion-devices-at-risk-of-hacking/#381c46bd68b1
https://www.forbes.com/sites/lconstantin/2017/09/12/critical-bluetooth-flaws-put-over-5-billion-devices-at-risk-of-hacking/#381c46bd68b1
How to Deter Russian Cyber Attacks
http://nationalinterest.org/blog/the-buzz/how-deter-russian-cyber-attacks-21514
http://nationalinterest.org/blog/the-buzz/how-deter-russian-cyber-attacks-21514
蓝牙协议爆严重安全漏洞,可在旧版本设备上构建勒索僵尸网络
http://www.4hou.com/info/news/7627.html
http://www.4hou.com/info/news/7627.html
Mongodb提升安全能力,以应对全球最新一波的勒索
https://nosec.org/my/threats/1557
https://nosec.org/my/threats/1557
黑客获得美国电网的控制访问权限
https://nosec.org/my/threats/1556
https://nosec.org/my/threats/1556
Apache Struts vulnerability likely behind Equifax breach, Congress launches prob
https://www.scmagazine.com/apache-struts-vulnerability-likely-behind-equifax-breach-congress-launches-probes/article/687955/
https://www.scmagazine.com/apache-struts-vulnerability-likely-behind-equifax-breach-congress-launches-probes/article/687955/
公安机关信息安全等级保护检查工作规范(试行)
http://www.djbh.net/webdev/web/PolicyStandardsAction.do?p=getGlgf&id=8a8182565deefd0d015e6f9f0d640088&from=timeline&isappinstalled=0
http://www.djbh.net/webdev/web/PolicyStandardsAction.do?p=getGlgf&id=8a8182565deefd0d015e6f9f0d640088&from=timeline&isappinstalled=0
4000余台ElasticSearch服务器遭PoS恶意软件感染
https://www.easyaq.com/news/574579272.shtml
https://www.easyaq.com/news/574579272.shtml
安全技术
最近挖src一些小套路总结
http://www.cuijianxiong.top/?p=148
http://www.cuijianxiong.top/?p=148
.NET框架0Day漏洞CVE-2017-8759复现过程
https://xianzhi.aliyun.com/forum/read/2116.html
https://xianzhi.aliyun.com/forum/read/2116.html
比敌人更了解敌人 [ 取证入门 web篇 ]
http://www.freebuf.com/column/147929.html
http://www.freebuf.com/column/147929.html
Android O 内核加固与缓解机制
http://ne2der.com/2017/Hardening-the-Kernel-in-Android-Oreo/
http://ne2der.com/2017/Hardening-the-Kernel-in-Android-Oreo/
自己总结的常规入侵流程脑图
https://klionsec.github.io/2017/09/08/pentestaction/
https://klionsec.github.io/2017/09/08/pentestaction/
Powershell-based Windows Security Auditing Toolbox
https://github.com/A-mIn3/WINspect
https://github.com/A-mIn3/WINspect
JavaScript Dangerous Functions (Part 1) - HTML Manipulation
http://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html
http://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html
快禁用“语音助手”!黑客可利用超声波劫持所有主流语音识别平台
https://www.easyaq.com/news/223816956.shtml
https://www.easyaq.com/news/223816956.shtml
ASPX编译dll隐藏shell&Docker Remote API利用姿势
http://blackwolfsec.cc/2017/09/11/Dll-aspx&docker/
http://blackwolfsec.cc/2017/09/11/Dll-aspx&docker/
项目实战:如何构建知识图谱
https://mp.weixin.qq.com/s/cL1aKdu8ig8-ocOPirXk2w
https://mp.weixin.qq.com/s/cL1aKdu8ig8-ocOPirXk2w
Ichidan:最强暗网搜索引擎,暗网版的shodan
https://mp.weixin.qq.com/s/BiB_pIb9VdoPhjr1e3TeYA
https://mp.weixin.qq.com/s/BiB_pIb9VdoPhjr1e3TeYA
Onethink 全版本SSRF漏洞[0day]
https://nosec.org/my/threats/1555
https://nosec.org/my/threats/1555
windows server 2012上的MS17-010漏洞复现
https://bbs.ichunqiu.com/thread-26998-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-26998-1-1.html?from=sec
后渗透测试神器Empire的详解
https://xianzhi.aliyun.com/forum/read/2091.html
https://xianzhi.aliyun.com/forum/read/2091.html
利用基于控制流图(CFG)的模糊 Hash 实现恶意软件的分类
https://github.com/radareorg/r2con-2017/blob/master/talks/cfg-fuzzy-hash/Machoke-cfg-based-fuzzy-hash.pdf
https://github.com/radareorg/r2con-2017/blob/master/talks/cfg-fuzzy-hash/Machoke-cfg-based-fuzzy-hash.pdf
Nicky Bloor - BaRMIe - Poking Java's Back Door - 44CON 2017
https://www.slideshare.net/NickBloor3/nicky-bloor-barmie-poking-javas-back-door-44con-2017
https://www.slideshare.net/NickBloor3/nicky-bloor-barmie-poking-javas-back-door-44con-2017
工控蜜罐Conpot部署和入门指南
http://www.freebuf.com/column/147545.html
http://www.freebuf.com/column/147545.html
FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY
https://www.fireeye.com/blog/threat-research/2017/09/zero-day-used-to-distribute-finspy.html
https://www.fireeye.com/blog/threat-research/2017/09/zero-day-used-to-distribute-finspy.html
Kali linux2.0系统安装DVWA渗透测试平台
https://bbs.ichunqiu.com/thread-27087-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-27087-1-1.html?from=sec
浅谈企业内部安全漏洞的运营(一)——规范化
https://mp.weixin.qq.com/s/eHB9zA0dZ-4Fv6ZpKzkHYA
https://mp.weixin.qq.com/s/eHB9zA0dZ-4Fv6ZpKzkHYA
软件供应链来源攻击分析报告
http://bobao.360.cn/learning/detail/4395.html
http://bobao.360.cn/learning/detail/4395.html
工控蜜罐 Conpot 的进阶玩法
http://www.freebuf.com/column/147560.html
http://www.freebuf.com/column/147560.html
D-link 10个0Day漏洞分析(附细节)
http://www.freebuf.com/vuls/147445.html
http://www.freebuf.com/vuls/147445.html
如何制作基础认证钓鱼页面?
http://www.4hou.com/technology/7600.html
http://www.4hou.com/technology/7600.html
ARM exploitation for IoT – Episode 2
https://quequero.org/2017/09/arm-exploitation-iot-episode-2/
https://quequero.org/2017/09/arm-exploitation-iot-episode-2/
CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.
https://github.com/vysec/CVE-2017-8759
https://github.com/vysec/CVE-2017-8759
Detecting Mimikatz & other Suspicious LSASS Access - Part 1
https://www.eideon.com/2017-09-09-THL01-Mimikatz/
https://www.eideon.com/2017-09-09-THL01-Mimikatz/
从一个补了三次的漏洞看WCF的安全编程
http://xlab.tencent.com/cn/2017/09/11/safe-coding-of-wcf-viewed-from-a-longlive-vulnerability/
http://xlab.tencent.com/cn/2017/09/11/safe-coding-of-wcf-viewed-from-a-longlive-vulnerability/
P4wnP1 – The Pi Zero based USB attack Platform
https://dantheiotman.com/2017/09/15/p4wnp1-the-pi-zero-based-usb-attack-platform/
https://dantheiotman.com/2017/09/15/p4wnp1-the-pi-zero-based-usb-attack-platform/
揭秘地下色情诱导网站
https://zhuanlan.zhihu.com/p/29184710
https://zhuanlan.zhihu.com/p/29184710
HandyCollaborator: Burp Suite plugin created for using Collaborator tool
https://github.com/federicodotta/HandyCollaborator
https://github.com/federicodotta/HandyCollaborator
Spaghetti v0.1.1 - Web Application Security Scanner
https://github.com/m4ll0k/Spaghetti
https://github.com/m4ll0k/Spaghetti
How to perform SSH Log Poisoning through LFI to exploit a web server?
https://infosecaddicts.com/ssh-log-poisoning-performed-lfi-exploit-web-server/
https://infosecaddicts.com/ssh-log-poisoning-performed-lfi-exploit-web-server/
CVE-2016-5195(Dirtycow)检测脚本及Ubuntu升级内核方法
http://pirogue.org/2017/09/12/dirtycow/
http://pirogue.org/2017/09/12/dirtycow/
asatools: Main repository to pull all NCC Group Cisco ASA-related tool projects.
https://github.com/nccgroup/asatools
https://github.com/nccgroup/asatools
新态势感知系列(1):从态势感知到全方位态势感知
http://yepeng.blog.51cto.com/3101105/1966070?from=timeline&isappinstalled=0
http://yepeng.blog.51cto.com/3101105/1966070?from=timeline&isappinstalled=0
SheepSec: 7 Reflected Cross-site Scripting (XSS) Examples
http://sheepsec.com/blog/7-reflected-xss.html
http://sheepsec.com/blog/7-reflected-xss.html
一些有趣的代码审计“小”题目
https://github.com/CHYbeta/Code-Audit-Challenges
https://github.com/CHYbeta/Code-Audit-Challenges
sqli-labs lession 5 之盲注型SQL入门
https://bbs.ichunqiu.com/thread-27052-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-27052-1-1.html?from=sec
SSD Advisory – WiseGiga NAS Multiple Vulnerabilities
https://blogs.securiteam.com/index.php/archives/3402
https://blogs.securiteam.com/index.php/archives/3402
jsql-injection Java sql注入工具
https://bbs.ichunqiu.com/thread-26917-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-26917-1-1.html?from=sec
攻击SQL Server的CLR库
https://xianzhi.aliyun.com/forum/read/2110.html
https://xianzhi.aliyun.com/forum/read/2110.html
Advanced Flash vulnerabilities in Youtube – Part 4
https://opnsec.com/2017/09/advanced-flash-vulnerabilities-in-youtube-part-4/
https://opnsec.com/2017/09/advanced-flash-vulnerabilities-in-youtube-part-4/
攻撃者視点で見るService Worker / PWA Study SW // Speaker Deck
https://speakerdeck.com/masatokinugawa/pwa-study-sw
https://speakerdeck.com/masatokinugawa/pwa-study-sw
在一款D-Link消费级路由器上,我发现了10个严重漏洞
http://www.4hou.com/technology/7638.html
http://www.4hou.com/technology/7638.html
通过DNS响应欺骗来绕过域控制验证
http://www.4hou.com/technology/7657.html
http://www.4hou.com/technology/7657.html
利用威胁情报数据平台拓展APT攻击线索一例
https://mp.weixin.qq.com/s/FYTcRT2kHYOq_rxkY3pilg
https://mp.weixin.qq.com/s/FYTcRT2kHYOq_rxkY3pilg
Empire中的Invoke-WScriptBypassUAC利用分析
http://www.4hou.com/technology/7636.html
http://www.4hou.com/technology/7636.html
代码审计之Catfish CMS v4.5.7后台作者权限越权两枚+存储型XSS一枚#
https://bbs.ichunqiu.com/thread-26914-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-26914-1-1.html?from=sec
Hacking with Netcat part 1: The Basics
http://www.hackingtutorials.org/networking/hacking-with-netcat-part-1-the-basics/
http://www.hackingtutorials.org/networking/hacking-with-netcat-part-1-the-basics/
socksmon: Monitor arbitrary TCP traffic using your HTTP proxy
https://github.com/mrschyte/socksmon
https://github.com/mrschyte/socksmon
Anatomy of a Hack: SQLi to Enterprise Admin
https://www.notsosecure.com/anatomy-of-a-hack-sqli-to-enterprise-admin/
https://www.notsosecure.com/anatomy-of-a-hack-sqli-to-enterprise-admin/
awesome-osint: A curated list of amazingly awesome OSINT
https://github.com/jivoi/awesome-osint
https://github.com/jivoi/awesome-osint
Catfish—缓存漏洞&&配合CSRF到Getshell
https://xianzhi.aliyun.com/forum/read/2103.html
https://xianzhi.aliyun.com/forum/read/2103.html
A beginners guide to bug bounties
https://ret2libc.wordpress.com/2016/03/22/a-beginners-guide-to-bug-bounties/
https://ret2libc.wordpress.com/2016/03/22/a-beginners-guide-to-bug-bounties/
Use DNS Rebinding to Bypass SSRF in JAVA
https://joychou.org/web/use-dnsrebinding-to-bypass-ssrf-in-java.html
https://joychou.org/web/use-dnsrebinding-to-bypass-ssrf-in-java.html
Debugging malicious windows scriptlets with Google chrome
https://medium.com/@0xamit/debugging-malicious-windows-scriptlets-with-google-chrome-c31ba409975c
https://medium.com/@0xamit/debugging-malicious-windows-scriptlets-with-google-chrome-c31ba409975c
Hacking with Netcat part 3: Advanced Techniques
http://www.hackingtutorials.org/networking/hacking-with-netcat-part-3-advanced-techniques/
http://www.hackingtutorials.org/networking/hacking-with-netcat-part-3-advanced-techniques/
从PHP源码与扩展开发谈PHP任意代码执行与防御
https://blog.zsxsoft.com/post/30?hmsr=toutiao.io&utm_medium=toutiao.io&utm_source=toutiao.io
https://blog.zsxsoft.com/post/30?hmsr=toutiao.io&utm_medium=toutiao.io&utm_source=toutiao.io
蜻蜓二代“Dragonfly2.0”恶意组件分析报告(上篇)
https://paper.seebug.org/388/
https://paper.seebug.org/388/
SecWiki周刊(第184期)
https://www.sec-wiki.com/weekly/184
https://www.sec-wiki.com/weekly/184
Hacking with Netcat part 2: Bind and reverse shells
http://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/
http://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/
Bypass_safedog_Sql注入
https://bbs.ichunqiu.com/thread-26843-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-26843-1-1.html?from=sec
A Walk in the Workplace – These aren't the access_tokens you're looking for
http://philippeharewood.com/a-walk-in-the-workplace/
http://philippeharewood.com/a-walk-in-the-workplace/
crlf-injector: Auto CRLF Injector
https://github.com/rudSarkar/crlf-injector
https://github.com/rudSarkar/crlf-injector
Chrome Unsafe-inline CSP Bypass
https://www.math1as.com/index.php/archives/507/
https://www.math1as.com/index.php/archives/507/
Command and Control – WebDAV
https://pentestlab.blog/2017/09/12/command-and-control-webdav/
https://pentestlab.blog/2017/09/12/command-and-control-webdav/
Joomla Templates Under Hacking Attack
https://nosec.org/my/threats/1553
https://nosec.org/my/threats/1553
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第185期)
