SecWiki周刊(第194期)
2017/11/13-2017/11/19
安全资讯
荷兰央行将建“善意”黑客小组攻击本国银行 以提升防御能力
https://www.dnb.nl/nieuws/nieuwsoverzicht-en-archief/nieuws-2017/dnb365801.jsp
https://www.dnb.nl/nieuws/nieuwsoverzicht-en-archief/nieuws-2017/dnb365801.jsp
iPhone X绝对安全?看我如何挫败 iPhone X 的 Face ID
http://www.4hou.com/info/news/8408.html
http://www.4hou.com/info/news/8408.html
Anonymous成员被美国追捕 寻求墨西哥政府的庇护
http://www.aqniu.com/hack-geek/29375.html
http://www.aqniu.com/hack-geek/29375.html
一加手机再被爆存在安全后门,可影响所有使用高通芯片的设备
http://www.4hou.com/info/news/8478.html
http://www.4hou.com/info/news/8478.html
美国出台VEP政策—漏洞使用开始标准化
https://mp.weixin.qq.com/s/Epnaar3DEsByoAj8r5uHKA
https://mp.weixin.qq.com/s/Epnaar3DEsByoAj8r5uHKA
谷歌将发布Chrome安全新功能,屏蔽重定向和恶意广告
http://www.4hou.com/info/news/8406.html
http://www.4hou.com/info/news/8406.html
2016-2017年度全球网络空间安全综述
https://mp.weixin.qq.com/s/TU-kpCP72rM0c-6vs2ntxw
https://mp.weixin.qq.com/s/TU-kpCP72rM0c-6vs2ntxw
安全技术
HCTF2017-官方Writeup
https://xianzhi.aliyun.com/forum/topic/1589/
https://xianzhi.aliyun.com/forum/topic/1589/
opsweb: 百合网运维综合管理平台(Python+Flask框架+cmdb+scheduler+salt)
https://github.com/wylok/opsweb
https://github.com/wylok/opsweb
MySQL Error Based SQL Injection (报错注入)总结
http://uknowsec.cn/posts/notes/MySQL%20Error%20Based%20SQL%20Injection%20%EF%BC%88%E6%8A%A5%E9%94%99%E6%B3%A8%E5%85%A5%EF%BC%89%E6%80%BB%E7%BB%93.html
http://uknowsec.cn/posts/notes/MySQL%20Error%20Based%20SQL%20Injection%20%EF%BC%88%E6%8A%A5%E9%94%99%E6%B3%A8%E5%85%A5%EF%BC%89%E6%80%BB%E7%BB%93.html
再次代码审计之Semcms(bypass sqli)
http://foreversong.cn/archives/827
http://foreversong.cn/archives/827
大型互联网企业入侵检测实战总结
http://webcache.googleusercontent.com/search?q=cache:Sgaez1XOIPMJ:https://zhuanlan.zhihu.com/p/31154756&num=1&hl=zh-CN&strip=1&vws
http://webcache.googleusercontent.com/search?q=cache:Sgaez1XOIPMJ:https://zhuanlan.zhihu.com/p/31154756&num=1&hl=zh-CN&strip=1&vws
Malware Report: Google Drive Remote Access Trojan
http://cyber.verint.com/wp-content/uploads/2016/05/GDRAT-Malware-Report-2-1.pdf
http://cyber.verint.com/wp-content/uploads/2016/05/GDRAT-Malware-Report-2-1.pdf
[XDCTF-2017-Final] 线下赛经验总结
http://www.jianshu.com/p/35af80b97ee6
http://www.jianshu.com/p/35af80b97ee6
一个人的企业安全建设实践
https://xianzhi.aliyun.com/forum/topic/1568/
https://xianzhi.aliyun.com/forum/topic/1568/
HCTF2017题目开源列表
https://github.com/vidar-team/HCTF2017
https://github.com/vidar-team/HCTF2017
洛克希德·马丁定义的“杀伤链”
http://www.aqniu.com/news-views/29381.html
http://www.aqniu.com/news-views/29381.html
2017 看雪安全开发者峰会盘点
https://mp.weixin.qq.com/s/4ZHY2JmJtMY7EMUMHliClw
https://mp.weixin.qq.com/s/4ZHY2JmJtMY7EMUMHliClw
Masscan及Nmap实现对阿里云ECS的外网端口监控
http://www.freebuf.com/sectool/153156.html
http://www.freebuf.com/sectool/153156.html
OSCP(Offensive Security Certified Professional) 经验分享
https://xianzhi.aliyun.com/forum/topic/1587/
https://xianzhi.aliyun.com/forum/topic/1587/
2017 先知创新大会现场盘点
https://mp.weixin.qq.com/s/Kptnq2muTMHduH_kDk4e_g
https://mp.weixin.qq.com/s/Kptnq2muTMHduH_kDk4e_g
Grey-Noise-Intelligence: GreyNoise威胁情报接口使用说明
https://github.com/Grey-Noise-Intelligence/api.greynoise.io
https://github.com/Grey-Noise-Intelligence/api.greynoise.io
CouchDB漏洞(CVE–2017–12635, CVE–2017–12636)分析
https://cert.360.cn/warning/detail?id=0bc3f86b333bf27fe26fe6fdc8bda5f8
https://cert.360.cn/warning/detail?id=0bc3f86b333bf27fe26fe6fdc8bda5f8
CIA Hive测试指南——源代码获取与简要分析
https://3gstudent.github.io/3gstudent.github.io/CIA-Hive%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97-%E6%BA%90%E4%BB%A3%E7%A0%81%E8%8E%B7%E5%8F%96%E4%B8%8E%E7%AE%80%E8%A6%81%E5%88%86%E6%9E%90/
https://3gstudent.github.io/3gstudent.github.io/CIA-Hive%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97-%E6%BA%90%E4%BB%A3%E7%A0%81%E8%8E%B7%E5%8F%96%E4%B8%8E%E7%AE%80%E8%A6%81%E5%88%86%E6%9E%90/
Hctf2017-JS逆向-writeup
http://phantom0301.cc/2017/11/13/hctf2017/
http://phantom0301.cc/2017/11/13/hctf2017/
蜜罐与内网安全从0到1(四)
https://sosly.me/index.php/2017/11/15/jymiguan4/
https://sosly.me/index.php/2017/11/15/jymiguan4/
Palantir教你如何部署和配置 osquery 框架
https://medium.com/@palantir/osquery-across-the-enterprise-3c3c9d13ec55
https://medium.com/@palantir/osquery-across-the-enterprise-3c3c9d13ec55
blackhat-arsenal-tools: Official Black Hat Arsenal Security Tools Repository
https://github.com/toolswatch/blackhat-arsenal-tools
https://github.com/toolswatch/blackhat-arsenal-tools
WikiLeaks公开资料解读系列- CIA Hive项目
https://mp.weixin.qq.com/s/lHpbFoEsuoN32t2rsUvXGw
https://mp.weixin.qq.com/s/lHpbFoEsuoN32t2rsUvXGw
xssee: A js encode/decode simple tool for XSS
https://github.com/Monyer/xssee
https://github.com/Monyer/xssee
企业安全建设日记-0xA2 应急响应、防御模型与SDL
https://zhuanlan.zhihu.com/p/26542790
https://zhuanlan.zhihu.com/p/26542790
加密勒索软件:Double click for ransomware分析和预防
http://www.4hou.com/typ/8445.html
http://www.4hou.com/typ/8445.html
反序列化漏洞的末日?JEP290机制研究
http://blog.csdn.net/u011721501/article/details/78555246
http://blog.csdn.net/u011721501/article/details/78555246
创建简单、免费的恶意软件分析环境
https://paper.seebug.org/455/
https://paper.seebug.org/455/
在线挑战详细攻略-《渗透测试笔记》
https://bbs.ichunqiu.com/thread-29259-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-29259-1-1.html?from=sec
ZEROScan: 借鉴了msf的漏洞利用框架
https://github.com/zer0yu/ZEROScan
https://github.com/zer0yu/ZEROScan
goscan: 用Go开发可以内网活跃主机嗅探器
https://github.com/timest/goscan
https://github.com/timest/goscan
企业安全建设日记-0xB3 再谈应急响应Pt.1 ——*nix主机应急响应
https://zhuanlan.zhihu.com/p/29958172
https://zhuanlan.zhihu.com/p/29958172
企业安全建设日记-0xA3 安全域划分和系统基本加固
https://zhuanlan.zhihu.com/p/26603906
https://zhuanlan.zhihu.com/p/26603906
从安全运维到智慧安全的技术创新
http://blog.nsfocus.net/idc-2017-yexiaohu-ppt/
http://blog.nsfocus.net/idc-2017-yexiaohu-ppt/
菜鸟了解“xss蠕虫”(危害)
https://bbs.ichunqiu.com/thread-29149-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-29149-1-1.html?from=sec
Berkeley观点:人工智能系统研究的挑战
http://blog.sciencenet.cn/blog-3370725-1085270.html
http://blog.sciencenet.cn/blog-3370725-1085270.html
telnet-iot-honeypot: Python telnet honeypot for catching botnet binaries
https://github.com/Phype/telnet-iot-honeypot
https://github.com/Phype/telnet-iot-honeypot
企业安全建设日记-0xA1: 新官上任三把火
https://zhuanlan.zhihu.com/p/26485293
https://zhuanlan.zhihu.com/p/26485293
基于OPC协议的工控网络系统防护浅析
https://mp.weixin.qq.com/s/G4p5vUh9LZiFvDmvltJ7RA
https://mp.weixin.qq.com/s/G4p5vUh9LZiFvDmvltJ7RA
企业安全建设日记-0xB2 事件应急——企业内网安全监控概览
https://zhuanlan.zhihu.com/p/29816766
https://zhuanlan.zhihu.com/p/29816766
CVE-2017-5123 漏洞利用全攻略
https://paper.seebug.org/451/
https://paper.seebug.org/451/
“PDCA”在工控安全运维管理中的应用(下)
https://mp.weixin.qq.com/s/kUCb9g7j33vz0OjUiCUr7g
https://mp.weixin.qq.com/s/kUCb9g7j33vz0OjUiCUr7g
Ethereum Scam Database 国外诈骗数据库及查询
https://etherscamdb.info/
https://etherscamdb.info/
使用恶意软件将隐藏代码注入已知进程的攻击研究
https://bbs.ichunqiu.com/thread-29104-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-29104-1-1.html?from=sec
渗透技巧——Windows系统远程桌面的多用户登录
https://3gstudent.github.io/3gstudent.github.io/%E6%B8%97%E9%80%8F%E6%8A%80%E5%B7%A7-Windows%E7%B3%BB%E7%BB%9F%E8%BF%9C%E7%A8%8B%E6%A1%8C%E9%9D%A2%E7%9A%84%E5%A4%9A%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95/
https://3gstudent.github.io/3gstudent.github.io/%E6%B8%97%E9%80%8F%E6%8A%80%E5%B7%A7-Windows%E7%B3%BB%E7%BB%9F%E8%BF%9C%E7%A8%8B%E6%A1%8C%E9%9D%A2%E7%9A%84%E5%A4%9A%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95/
Investigation Report for the September 2014 Equation malware detection incident in the US
https://securelist.com/investigation-report-for-the-september-2014-equation-malware-detection-incident-in-the-us/83210/
https://securelist.com/investigation-report-for-the-september-2014-equation-malware-detection-incident-in-the-us/83210/
Webshell-Sniper: Manage your website via terminal
https://github.com/WangYihang/Webshell-Sniper
https://github.com/WangYihang/Webshell-Sniper
美团外卖自动化业务运维系统建设
https://tech.meituan.com/digger_share.html
https://tech.meituan.com/digger_share.html
你们尽管绕dogByPass,绕不过算我输!
https://bbs.ichunqiu.com/thread-29196-1-1.html
https://bbs.ichunqiu.com/thread-29196-1-1.html
SecWiki周刊(第193期)
https://www.sec-wiki.com/weekly/193
https://www.sec-wiki.com/weekly/193
企业安全建设日记-0xB1 微观安全——一台服务器做安全
https://zhuanlan.zhihu.com/p/27363168
https://zhuanlan.zhihu.com/p/27363168
Exploit Kit Tracker, Detecting ZBot, and New Phishing Techniques
https://umbrella.cisco.com/blog/2017/11/13/weather-report-exploit-kit-tracker-detecting-zbot-new-phishing-techniques/
https://umbrella.cisco.com/blog/2017/11/13/weather-report-exploit-kit-tracker-detecting-zbot-new-phishing-techniques/
KNN算法检测异常操作行为
https://mp.weixin.qq.com/s/__ArObtt5yhYciPkzI6-cA
https://mp.weixin.qq.com/s/__ArObtt5yhYciPkzI6-cA
对 MuddyWater 团伙攻击中东地区的调查报告
https://researchcenter.paloaltonetworks.com/2017/11/unit42-muddying-the-water-targeted-attacks-in-the-middle-east/
https://researchcenter.paloaltonetworks.com/2017/11/unit42-muddying-the-water-targeted-attacks-in-the-middle-east/
Multiple vulnerabilities found in Wireless IP Camera
https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html
https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html
Code for Deep Android Malware Detection paper
https://github.com/niallmcl/Deep-Android-Malware-Detection
https://github.com/niallmcl/Deep-Android-Malware-Detection
APT Trends report Q3 2017
https://securelist.com/apt-trends-report-q3-2017/83162/
https://securelist.com/apt-trends-report-q3-2017/83162/
美国壳牌(shell)安全解决方案(四)
https://mp.weixin.qq.com/s/5pLpMRpmJNZ231vJmfsSKQ
https://mp.weixin.qq.com/s/5pLpMRpmJNZ231vJmfsSKQ
Passive Fingerprinting of HTTP/2 Clients
https://www.akamai.com/uk/en/multimedia/documents/white-paper/passive-fingerprinting-of-http2-clients-white-paper.pdf
https://www.akamai.com/uk/en/multimedia/documents/white-paper/passive-fingerprinting-of-http2-clients-white-paper.pdf
“PDCA”在工控安全运维管理中的应用(上)
https://mp.weixin.qq.com/s/CF8ryNerKG_aPu9n8iZoNA
https://mp.weixin.qq.com/s/CF8ryNerKG_aPu9n8iZoNA
ics-checklist: Industrial Security Checklist
https://github.com/alexvanmaele/ics-checklist
https://github.com/alexvanmaele/ics-checklist
Exploit Kit Tracker 在线工具
http://ektracker.com/#
http://ektracker.com/#
使用LSTM检测DGA域名
http://www.freebuf.com/articles/network/153345.html
http://www.freebuf.com/articles/network/153345.html
Securing your Empire C2 with Apache mod_rewrite
https://thevivi.net/2017/11/03/securing-your-empire-c2-with-apache-mod_rewrite/
https://thevivi.net/2017/11/03/securing-your-empire-c2-with-apache-mod_rewrite/
2017年Office漏洞及漏洞攻击研究报告
http://www.freebuf.com/articles/paper/154040.html
http://www.freebuf.com/articles/paper/154040.html
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第194期)
