SecWiki周刊(第200期)
2017/12/25-2017/12/31
安全资讯
2017年我国DDoS攻击资源分析报告
http://www.freebuf.com/articles/paper/158270.html
http://www.freebuf.com/articles/paper/158270.html
2017我国移动端传销诈骗类威胁态势分析报告
https://mp.weixin.qq.com/s/ICdVtPA2MxnFoXk4kXyvEQ
https://mp.weixin.qq.com/s/ICdVtPA2MxnFoXk4kXyvEQ
杜晓梦:我的大数据“读心术”
https://mp.weixin.qq.com/s/vwB75T0XOqWJn-ohKJe_Pw
https://mp.weixin.qq.com/s/vwB75T0XOqWJn-ohKJe_Pw
人工智能缘何成安全领域最受追捧技术
https://mp.weixin.qq.com/s/s0pe4lkw5ygT71V9SIYwfg
https://mp.weixin.qq.com/s/s0pe4lkw5ygT71V9SIYwfg
2017年网络安全大事记
http://www.aqniu.com/industry/30413.html
http://www.aqniu.com/industry/30413.html
起底网购黑灰产:集体给差评成生财之道
http://m.mp.oeeee.com/a/BAAFRD00002017122362303.html
http://m.mp.oeeee.com/a/BAAFRD00002017122362303.html
全球网络安全年收入超10亿美元以上的15家公司
https://mp.weixin.qq.com/s/YRyMf_AVYlR-Yx5wGKxcxg
https://mp.weixin.qq.com/s/YRyMf_AVYlR-Yx5wGKxcxg
工业控制系统信息安全行动计划(2018-2020年)
http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057656/n4699766/c5995061/content.html
http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057656/n4699766/c5995061/content.html
安全技术
Redis未授权访问致远程植入挖矿脚本(攻击篇)
http://mp.weixin.qq.com/s/j-QHPUEVpnSM2hvdnupsuA
http://mp.weixin.qq.com/s/j-QHPUEVpnSM2hvdnupsuA
苹果平台2017年漏洞情况统计报告
https://www.anquanke.com/post/id/92781
https://www.anquanke.com/post/id/92781
我所了解的内网渗透——内网渗透知识大总结
https://www.anquanke.com/post/id/92646
https://www.anquanke.com/post/id/92646
代码审计工具 Cobra 源码分析(一)
https://zhuanlan.zhihu.com/p/32363880
https://zhuanlan.zhihu.com/p/32363880
Rotten Potato提权
https://decoder.cloud/2017/12/23/the-lonely-potato/
https://decoder.cloud/2017/12/23/the-lonely-potato/
34C3 CTF 部分pwn writeup
http://repwn.com/archives/32/
http://repwn.com/archives/32/
Android 加固厂商特征
https://bbs.pediy.com/thread-223248.htm
https://bbs.pediy.com/thread-223248.htm
FlashGuard: 利用固态存储的硬件特性对抗勒索软件
https://mp.weixin.qq.com/s/qt2d1WQpTk2IYm_D3ufBGg
https://mp.weixin.qq.com/s/qt2d1WQpTk2IYm_D3ufBGg
Cobalt Strike实战技巧持久性权限控制姿势
http://www.freebuf.com/sectool/157952.html
http://www.freebuf.com/sectool/157952.html
pydata-notebook: 利用Python进行数据分析 第二版 (2017) 中文翻译笔记
https://github.com/BrambleXu/pydata-notebook
https://github.com/BrambleXu/pydata-notebook
PassGAN: A Deep Learning Approach for Password Guessing
https://github.com/brannondorsey/PassGAN
https://github.com/brannondorsey/PassGAN
某数字公司VMP脱壳简记
https://bbs.pediy.com/thread-223528.htm
https://bbs.pediy.com/thread-223528.htm
Yahoo! RCE via Spring Engine SSTI
https://hawkinsecurity.com/2017/12/13/rce-via-spring-engine-ssti/
https://hawkinsecurity.com/2017/12/13/rce-via-spring-engine-ssti/
FoolNLTK: 最准的开源中文分词
https://github.com/rockyzhengwu/FoolNLTK
https://github.com/rockyzhengwu/FoolNLTK
The 101 of ELF Binaries on Linux: Understanding and Analysis
https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/
https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/
常见的远程执行命令方式整理
http://mp.weixin.qq.com/s/cJ2vTncor94lHqJq72Rfxg
http://mp.weixin.qq.com/s/cJ2vTncor94lHqJq72Rfxg
Web狗要懂的内网端口转发
https://xianzhi.aliyun.com/forum/topic/1862/
https://xianzhi.aliyun.com/forum/topic/1862/
urbanadventurer:渗透中的用户名生成工具
https://github.com/urbanadventurer/username-anarchy
https://github.com/urbanadventurer/username-anarchy
BypassAV With ReflectivePEInjection
https://evi1cg.me/archives/BypassAV_With_ReflectivePEInjection.html
https://evi1cg.me/archives/BypassAV_With_ReflectivePEInjection.html
利用域委派获取域管理权限
https://www.anquanke.com/post/id/92484
https://www.anquanke.com/post/id/92484
Wireless-Router-Vulnerability: 无线路由漏洞及利用代码
https://github.com/coincoin7/Wireless-Router-Vulnerability
https://github.com/coincoin7/Wireless-Router-Vulnerability
信安之路上2017 年度文章汇总
http://mp.weixin.qq.com/s/hRgPZ5h2QAXbmE6jamrTyA
http://mp.weixin.qq.com/s/hRgPZ5h2QAXbmE6jamrTyA
Ecshop(前台sql注入)
http://www.91ri.org/17384.html
http://www.91ri.org/17384.html
Luna: 开源的轻量级被动式扫描框架
https://github.com/toyakula/luna
https://github.com/toyakula/luna
AI安全如何入门(上)
http://www.freebuf.com/column/158250.html
http://www.freebuf.com/column/158250.html
x-crack: 常见服务的弱口令扫描器
https://github.com/netxfly/x-crack
https://github.com/netxfly/x-crack
黑产大数据:流量欺诈灰产的现状
https://zhuanlan.zhihu.com/p/32328491
https://zhuanlan.zhihu.com/p/32328491
FireEye 对来自俄罗斯的网络威胁组织 HAMMERTOSS 的分析
https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf
https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf
AI安全初探:利用深度学习检测DNS隐蔽通道
http://www.freebuf.com/articles/network/158163.html
http://www.freebuf.com/articles/network/158163.html
WebGlobe: 基于HTML5原生WebGL实现的轻量级Google Earth三维地图引擎
https://github.com/iSpring/WebGlobe
https://github.com/iSpring/WebGlobe
Alerting and Detection Strategy Framework – Palantir
https://medium.com/@palantir/alerting-and-detection-strategy-framework-52dc33722df2
https://medium.com/@palantir/alerting-and-detection-strategy-framework-52dc33722df2
花式玩转HackerTarget的SSRF
http://www.4hou.com/vulnerable/9496.html
http://www.4hou.com/vulnerable/9496.html
2017 ExploitKit Landscape Map
http://executemalware.com/?page_id=320
http://executemalware.com/?page_id=320
IIS中.NET应用程序的 XXE漏洞利用
http://www.4hou.com/technology/9241.html
http://www.4hou.com/technology/9241.html
Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection
https://media.ccc.de/v/34c3-8735-spy_vs_spy_a_modern_study_of_microphone_bugs_operation_and_detection
https://media.ccc.de/v/34c3-8735-spy_vs_spy_a_modern_study_of_microphone_bugs_operation_and_detection
开源DAWN,Spark和Mesos后Stanford的又一力作
https://mp.weixin.qq.com/s/r951Iasr4dke6MPHsUO0TA
https://mp.weixin.qq.com/s/r951Iasr4dke6MPHsUO0TA
Huawei HG532 系列路由器远程命令执行漏洞分析
https://paper.seebug.org/490/
https://paper.seebug.org/490/
Kaggle机器学习实战总结
https://mp.weixin.qq.com/s/vfR_3RmhbFvtSpK-7RIZqw
https://mp.weixin.qq.com/s/vfR_3RmhbFvtSpK-7RIZqw
如何利用Web漏洞窃取NTLM哈希
http://www.4hou.com/system/9383.html
http://www.4hou.com/system/9383.html
whitewidow: SQL Vulnerability Scanner
https://github.com/WhitewidowScanner/whitewidow
https://github.com/WhitewidowScanner/whitewidow
基于Openresty+的Web安全防护系统架构
http://www.freebuf.com/column/158707.html
http://www.freebuf.com/column/158707.html
Browser-Based Cryptocurrency Mining Makes Unexpected Return from the Dead
https://www.symantec.com/blogs/threat-intelligence/browser-mining-cryptocurrency
https://www.symantec.com/blogs/threat-intelligence/browser-mining-cryptocurrency
Trend Micro:2017 数据泄漏大事件回顾
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/year-in-review-notable-data-breaches-for-2017
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/year-in-review-notable-data-breaches-for-2017
突破封闭 Web 系统的技巧之正面冲锋
http://mp.weixin.qq.com/s/m7ZvIuIZj21M9n2I8HS5bw
http://mp.weixin.qq.com/s/m7ZvIuIZj21M9n2I8HS5bw
[译] 2018 PHP 应用程序安全设计指北
https://laravel-china.org/articles/7235/2018-php-application-security-design
https://laravel-china.org/articles/7235/2018-php-application-security-design
Reverse Engineering Using Radare2 — Part 1
https://medium.com/@jacob16682/reverse-engineering-using-radare2-588775ea38d5
https://medium.com/@jacob16682/reverse-engineering-using-radare2-588775ea38d5
Detection Lab(终端安全以及日志工具)简介与使用指南
http://www.freebuf.com/sectool/157288.html
http://www.freebuf.com/sectool/157288.html
UAF 实例-RHme3 CTF 的一道题
http://mp.weixin.qq.com/s/lCK6na2CG_iweUsRmPdkqg
http://mp.weixin.qq.com/s/lCK6na2CG_iweUsRmPdkqg
攻击者情报那些不得不说的事儿
https://mp.weixin.qq.com/s/sJvi6vUD-b7TNC6Ef7Kgdw
https://mp.weixin.qq.com/s/sJvi6vUD-b7TNC6Ef7Kgdw
Converting Metasploit Module to Stand Alone
https://netsec.ws/?p=262&from=timeline
https://netsec.ws/?p=262&from=timeline
CVE 2017-0199漏洞利用的新姿势
http://www.freebuf.com/vuls/158142.html?from=timeline#10006-weixin-1-52626-6b3bffd01fdde4900130bc5a2751b6d1
http://www.freebuf.com/vuls/158142.html?from=timeline#10006-weixin-1-52626-6b3bffd01fdde4900130bc5a2751b6d1
SecWiki周刊(第199期)
https://www.sec-wiki.com/weekly/199
https://www.sec-wiki.com/weekly/199
Reverse Engineering With Radare2 — Part 2
https://medium.com/@jacob16682/reverse-engineering-with-radare2-part-2-83b71df7ffe4
https://medium.com/@jacob16682/reverse-engineering-with-radare2-part-2-83b71df7ffe4
Hex-Men深度分析,“中国制造”的数据库攻击活动
http://www.4hou.com/technology/9441.html
http://www.4hou.com/technology/9441.html
Academic Research: A Survey of Email Attacks 邮件攻击调研
https://f5.com/labs/articles/threat-intelligence/cyber-security/academic-research-a-survey-of-email-attacks
https://f5.com/labs/articles/threat-intelligence/cyber-security/academic-research-a-survey-of-email-attacks
Botconf 2017 talks 部分 pdf
https://www.botconf.eu/botconf-2017/programme/botconf-2017-talks/
https://www.botconf.eu/botconf-2017/programme/botconf-2017-talks/
Hacking Wildfly
http://www.polaris-lab.com/index.php/archives/407/
http://www.polaris-lab.com/index.php/archives/407/
Another normal day in cybercrime: from a random Loki sample to 550 C&C
https://benkowlab.blogspot.jp/2017/12/another-normal-day-in-cybercrime-from.html
https://benkowlab.blogspot.jp/2017/12/another-normal-day-in-cybercrime-from.html
Cobalt Strike 初体验
http://mp.weixin.qq.com/s/8RZ__qO8vwxjd7JWdxYCfA
http://mp.weixin.qq.com/s/8RZ__qO8vwxjd7JWdxYCfA
2017年度安全报告––Office
https://cert.360.cn/static/files/2017%E5%B9%B4%E5%BA%A6%E5%AE%89%E5%85%A8%E6%8A%A5%E5%91%8A--Office.pdf
https://cert.360.cn/static/files/2017%E5%B9%B4%E5%BA%A6%E5%AE%89%E5%85%A8%E6%8A%A5%E5%91%8A--Office.pdf
DFIR and Threat Hunting: Hunting with ELK
http://findingbad.blogspot.jp/2017/12/hunting-with-elk.html
http://findingbad.blogspot.jp/2017/12/hunting-with-elk.html
Code Signing Certificate Cloning Attacks and Defenses
https://posts.specterops.io/code-signing-certificate-cloning-attacks-and-defenses-6f98657fc6ec
https://posts.specterops.io/code-signing-certificate-cloning-attacks-and-defenses-6f98657fc6ec
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第200期)
