SecWiki周刊(第202期)
2018/01/08-2018/01/14
安全资讯
近期大量光猫感染新型IOT蠕虫威胁
http://blog.nsfocus.net/iot-worm/
http://blog.nsfocus.net/iot-worm/
2017年安全数据科学领域的4个趋势:机器人、威胁情报、对抗机器学习以及深度学习
https://www.oreilly.com.cn/ideas/?p=860
https://www.oreilly.com.cn/ideas/?p=860
美国《主动网络防御确定法案》(全译文)
https://mp.weixin.qq.com/s/32EyXTDWJXflKGDSim1KtQ
https://mp.weixin.qq.com/s/32EyXTDWJXflKGDSim1KtQ
Western Digital My Cloud drives have a built-in backdoor
https://www.techspot.com/news/72612-western-digital-cloud-drives-have-built-backdoor.html
https://www.techspot.com/news/72612-western-digital-cloud-drives-have-built-backdoor.html
人工智能在网络安全领域的应用和发展新趋势
https://mp.weixin.qq.com/s/18cF-dC-LDbrB99lTpaLTA
https://mp.weixin.qq.com/s/18cF-dC-LDbrB99lTpaLTA
中国国家网络安全产业园区“亮相”
http://news.xinhuanet.com/fortune/2017-12/12/c_129764014.htm
http://news.xinhuanet.com/fortune/2017-12/12/c_129764014.htm
关于Android平台WebView控件存在跨域高危漏洞的安全公告
http://www.cnvd.org.cn/webinfo/show/4365?
http://www.cnvd.org.cn/webinfo/show/4365?
阿里安全资深专家杭特辣评国内安全圈6大“怪现状”
https://mp.weixin.qq.com/s/eayCCAnfBW8LNEhDn5A0nw
https://mp.weixin.qq.com/s/eayCCAnfBW8LNEhDn5A0nw
至今为止GDPR《通用数据保护规范》解释的最清楚的文章
https://mp.weixin.qq.com/s/-XzsGAsCl89xo9gb80M3Vw
https://mp.weixin.qq.com/s/-XzsGAsCl89xo9gb80M3Vw
2017 年度中国国家科学技术奖公布
http://www.solidot.org/story?sid=55142
http://www.solidot.org/story?sid=55142
2017年美国军力变化和2018年美国军力展望
https://mp.weixin.qq.com/s/QfMWN8EsHni98tELFRtS8Q
https://mp.weixin.qq.com/s/QfMWN8EsHni98tELFRtS8Q
安全技术
在深度学习时代用HowNet搞事情
https://zhuanlan.zhihu.com/p/32688983
https://zhuanlan.zhihu.com/p/32688983
LuLu: free open-source macOS firewall
https://github.com/objective-see/LuLu
https://github.com/objective-see/LuLu
黄金鼠组织(APT-C-27)叙利亚地区的定向攻击活动
https://www.anquanke.com/post/id/94072
https://www.anquanke.com/post/id/94072
MiniProject_PHP_Code_audit Writeup
https://secvul.com/topics/981.html
https://secvul.com/topics/981.html
PhrackCTF-Platform-Team: 功能最全的CTF平台
https://github.com/zjlywjh001/PhrackCTF-Platform-Team
https://github.com/zjlywjh001/PhrackCTF-Platform-Team
病毒分析实战篇--远控病毒分析
https://bbs.ichunqiu.com/thread-32134-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-32134-1-1.html?from=sec
渗透中利用postgresql getshell
http://www.jianfensec.com/postgresql_getshell.html
http://www.jianfensec.com/postgresql_getshell.html
spectre meldown attack demo
https://github.com/Pl4gue/spectre-attack-demo
https://github.com/Pl4gue/spectre-attack-demo
ACSAC2017 会议录用论文及日程回顾
https://www.acsac.org/2017/openconf/modules/request.php?module=oc_program&action=program.php
https://www.acsac.org/2017/openconf/modules/request.php?module=oc_program&action=program.php
CVE-2018-5318:D-Link soap.cgi Stack Buffer Overflow
https://mp.weixin.qq.com/s/8C3jbfMy3sKCSdul4Y8Pcg
https://mp.weixin.qq.com/s/8C3jbfMy3sKCSdul4Y8Pcg
Jackson反序列化远程代码执行漏洞
http://pirogue.org/2018/01/12/jackson-databind-rce/
http://pirogue.org/2018/01/12/jackson-databind-rce/
'幽灵' CPU 漏洞在线检测工具
http://xlab.tencent.com/special/spectre/spectre_check.html
http://xlab.tencent.com/special/spectre/spectre_check.html
如何通过EW做Socks5代理进行内网渗透
https://zhuanlan.zhihu.com/p/32822159
https://zhuanlan.zhihu.com/p/32822159
一小时建立数据分析平台
https://zhuanlan.zhihu.com/p/28485468
https://zhuanlan.zhihu.com/p/28485468
开源安全情报引擎Critical Stack使用入门
http://www.freebuf.com/sectool/159648.html
http://www.freebuf.com/sectool/159648.html
2017全球僵尸网络DDoS攻击威胁态势报告
https://mp.weixin.qq.com/s/EU89Ko1DVjsB4GSiq3Focw
https://mp.weixin.qq.com/s/EU89Ko1DVjsB4GSiq3Focw
“黑凤梨”(BlackTech)最新APT攻击活动分析
http://www.freebuf.com/column/159865.html
http://www.freebuf.com/column/159865.html
webdirdig: Web敏感目录、信息泄漏批量扫描脚本
https://github.com/blackye/webdirdig
https://github.com/blackye/webdirdig
黑客修仙之道之pentest wiki 中
https://bbs.ichunqiu.com/thread-32263-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-32263-1-1.html?from=sec
服务器端包含注入SSI分析总结
https://www.secpulse.com/archives/66934.html
https://www.secpulse.com/archives/66934.html
各种开源CMS版本的漏洞以及EXP
https://github.com/Mr5m1th/0day
https://github.com/Mr5m1th/0day
《CS259D:数据挖掘与网络安全》笔记说明
http://paperpo.ml/?p=257
http://paperpo.ml/?p=257
代码审计工具 Cobra 源码分析(二)
https://zhuanlan.zhihu.com/p/32751099
https://zhuanlan.zhihu.com/p/32751099
域攻击之精准定位特权用户
https://www.anquanke.com/post/id/94461
https://www.anquanke.com/post/id/94461
黑客修仙之道之Pentest-WiKi--上
https://bbs.ichunqiu.com/thread-32261-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-32261-1-1.html?from=sec
基于代理IP的挖掘与分析
http://www.freebuf.com/articles/web/159172.html
http://www.freebuf.com/articles/web/159172.html
挖洞技巧:支付漏洞之总结
https://www.anquanke.com/post/id/94184
https://www.anquanke.com/post/id/94184
基于DPDK的网络流实时分析系统实现
https://mp.weixin.qq.com/s/RlX8WZ3QLORfz2n52uoIlA
https://mp.weixin.qq.com/s/RlX8WZ3QLORfz2n52uoIlA
回看2017 | 威胁情报看威胁「续」
https://mp.weixin.qq.com/s/WM8PANDBPD1FV3tQtBVUXQ
https://mp.weixin.qq.com/s/WM8PANDBPD1FV3tQtBVUXQ
红蓝对抗:怎样组织有效模拟演习
http://www.aqniu.com/learn/27190.html
http://www.aqniu.com/learn/27190.html
New Mobile Malware Uses Layered Obfuscation and Targets Russian Banks
http://blog.trendmicro.com/trendlabs-security-intelligence/new-mobile-malware-uses-layered-obfuscation-targets-russian-banks/?from=timeline
http://blog.trendmicro.com/trendlabs-security-intelligence/new-mobile-malware-uses-layered-obfuscation-targets-russian-banks/?from=timeline
老牌工具 PsExec 一个琐碎的细节
https://paper.seebug.org/503/
https://paper.seebug.org/503/
2017 SANS Holiday Hack Challenge Writeup – 0xd13a – A rookie in a world of pwns
https://0xd13a.github.io//2017-SANS-Holiday-Hack-Challenge-Writeup/
https://0xd13a.github.io//2017-SANS-Holiday-Hack-Challenge-Writeup/
以D-Link为例教你如何挖掘漏洞
https://www.anquanke.com/post/id/94196
https://www.anquanke.com/post/id/94196
处理器Meltdown与Spectre漏洞修复简要指南
https://cert.360.cn/warning/detail?id=42c2159731a55070e07abdff606dd928
https://cert.360.cn/warning/detail?id=42c2159731a55070e07abdff606dd928
中国网络安全市场回顾 2017Q4
https://mp.weixin.qq.com/s/b6iAwy_JxHwKBwrA-PsP5w
https://mp.weixin.qq.com/s/b6iAwy_JxHwKBwrA-PsP5w
聊聊物理多节点OpenStack部署
http://phantom0301.cc/2018/01/09/openstack-deploy/
http://phantom0301.cc/2018/01/09/openstack-deploy/
你能控制什么?漏洞利用高级技巧
http://blog.sina.com.cn/s/blog_85e506df0102xgtl.html
http://blog.sina.com.cn/s/blog_85e506df0102xgtl.html
渗透测试实战:利用列目录漏洞重置密码
http://www.4hou.com/penetration/9801.html
http://www.4hou.com/penetration/9801.html
The Number of IoT Botnet C&C Servers Doubled in 2017
https://www.bleepingcomputer.com/news/security/the-number-of-iot-botnet-candc-servers-doubled-in-2017/#.WlTwZeIAgnk.twitter
https://www.bleepingcomputer.com/news/security/the-number-of-iot-botnet-candc-servers-doubled-in-2017/#.WlTwZeIAgnk.twitter
(Keras)Kaggle不良评论分类实战
https://medium.com/@srjoglekar246/first-time-with-kaggle-a-convnet-to-classify-toxic-comments-with-keras-ef84b6d18328
https://medium.com/@srjoglekar246/first-time-with-kaggle-a-convnet-to-classify-toxic-comments-with-keras-ef84b6d18328
域信任机制的攻击技术指南Part.1
http://www.4hou.com/technology/9796.html
http://www.4hou.com/technology/9796.html
Escaping the edge sandbox
http://sandboxescaper.blogspot.jp/2018/01/escaping-edge-sandbox.html
http://sandboxescaper.blogspot.jp/2018/01/escaping-edge-sandbox.html
记录自己对《代码审计》的理解和总结
https://github.com/jiangsir404/Audit-Learning
https://github.com/jiangsir404/Audit-Learning
office-exploit-case-study Office 漏洞利用与分析练手数据集
https://github.com/houjingyi233/office-exploit-case-study
https://github.com/houjingyi233/office-exploit-case-study
34c3 Web部分Writeup
https://lorexxar.cn/2018/01/02/34c3-writeup/
https://lorexxar.cn/2018/01/02/34c3-writeup/
SecDev (IEEE Secure Development Conference) 2017 会议录取论文
https://secdev.ieee.org/2017/agenda/
https://secdev.ieee.org/2017/agenda/
frp:可用于内网穿透的高性能的反向代理应用
https://github.com/fatedier/frp/blob/master/README_zh.md
https://github.com/fatedier/frp/blob/master/README_zh.md
Gartner:以数据为中心的审计和保护市场指南(节选)
https://mp.weixin.qq.com/s/PYQlfptjkj3sIebiieljNA
https://mp.weixin.qq.com/s/PYQlfptjkj3sIebiieljNA
《金融安全态势感知系统构建》研究报告
https://mp.weixin.qq.com/s/FSoYqbOpoFBni1C8Di7J0A
https://mp.weixin.qq.com/s/FSoYqbOpoFBni1C8Di7J0A
Chaining Bugs to Steal Yahoo Contacts!
http://www.sxcurity.pro/2018/01/11/chaining-yahoo-bugs/
http://www.sxcurity.pro/2018/01/11/chaining-yahoo-bugs/
单枪匹马搞企业安全建设
https://xianzhi.aliyun.com/forum/topic/1916/
https://xianzhi.aliyun.com/forum/topic/1916/
Industrial Control Threat Intelligence [PDF]
https://dragos.com/media/Industrial-Control-Threat-Intelligence-Whitepaper.pdf
https://dragos.com/media/Industrial-Control-Threat-Intelligence-Whitepaper.pdf
云存储服务的数字取证(上)
http://www.4hou.com/data/9807.html
http://www.4hou.com/data/9807.html
安全客2017季刊—第4期
https://www.anquanke.com/post/id/93020
https://www.anquanke.com/post/id/93020
Red Canary ATT&CKs (Part 1): Why We’re Using ATT&CK Across Red Canary
https://www.redcanary.com/blog/red-canary-and-mitre-attack/
https://www.redcanary.com/blog/red-canary-and-mitre-attack/
667 Apple phishing in JSON
https://pastebin.com/34CS2Dj1
https://pastebin.com/34CS2Dj1
Red Canary ATT&CKs (Part 2): Designing ATT&CK Interfaces in Red Canary
https://www.redcanary.com/blog/red-canary-product-integrating-attack-tactics/
https://www.redcanary.com/blog/red-canary-product-integrating-attack-tactics/
malware-research: Samples, research and documents
https://github.com/CHEF-KOCH/malware-research
https://github.com/CHEF-KOCH/malware-research
SecWiki周刊(第201期)
https://www.sec-wiki.com/weekly/201
https://www.sec-wiki.com/weekly/201
vBulletin5.x版本通杀远程代码执行漏洞分析
http://www.freebuf.com/column/159573.html
http://www.freebuf.com/column/159573.html
silentsignal/av-breaking: Bare Knuckled AV Breaking
https://github.com/silentsignal/av-breaking
https://github.com/silentsignal/av-breaking
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第202期)
