SecWiki周刊(第206期)
2018/02/05-2018/02/11
安全资讯
记与某牛的一次饭局交流
https://thief.one/2018/02/05/1/
https://thief.one/2018/02/05/1/
顺丰刘新凯:三年磨一剑,安全有初心
https://mp.weixin.qq.com/s/Q2s1olNAD4Mtufe32NQw6w
https://mp.weixin.qq.com/s/Q2s1olNAD4Mtufe32NQw6w
工业控制系统信息安全发展趋势大解析
https://mp.weixin.qq.com/s/XmQ8v-vaBLz1mfBAIpMdYQ
https://mp.weixin.qq.com/s/XmQ8v-vaBLz1mfBAIpMdYQ
2018年DARPA最新宣传片:我们的使命(中文字幕)
https://mp.weixin.qq.com/s/gtQPEZ-oWwazqBnUHZxZug
https://mp.weixin.qq.com/s/gtQPEZ-oWwazqBnUHZxZug
专访民间黑客7kbstorm:黑客和安全的初心与始终
http://www.freebuf.com/column/162425.html
http://www.freebuf.com/column/162425.html
美国:“自动化指标共享计划”(AIS)
https://mp.weixin.qq.com/s/TZj7SFHEkL4q13GFngS0tw
https://mp.weixin.qq.com/s/TZj7SFHEkL4q13GFngS0tw
门罗币所有者或成下一追踪目标
http://hackernews.cc/archives/20675
http://hackernews.cc/archives/20675
美退役军人网络安全培训排名
https://mp.weixin.qq.com/s/dR53Oa_WQ_A9_pvsbQ4JrQ
https://mp.weixin.qq.com/s/dR53Oa_WQ_A9_pvsbQ4JrQ
借壳攻击:僵尸网络利用Chrome扩展程序传播
http://www.4hou.com/info/news/10231.html
http://www.4hou.com/info/news/10231.html
安全技术
Microsoft BuleHat 2018 Videos and Slides
https://www.youtube.com/watch?v=jxve5hrtwnI&feature=youtu.be
https://www.youtube.com/watch?v=jxve5hrtwnI&feature=youtu.be
Google Project Zero 成员教你如何入门搞安全
https://zhuanlan.zhihu.com/p/33678187
https://zhuanlan.zhihu.com/p/33678187
渗透测试 -- VulnHub –CTF FristiLeaks v1.3
http://mp.weixin.qq.com/s/vroN1CKPjf2x033E0e43vg
http://mp.weixin.qq.com/s/vroN1CKPjf2x033E0e43vg
SpiderKeeper: scrapy爬虫框架的管理界面
https://github.com/DormyMo/SpiderKeeper
https://github.com/DormyMo/SpiderKeeper
2017年Android“间谍软件”年度总结报告
http://www.freebuf.com/articles/terminal/161839.html
http://www.freebuf.com/articles/terminal/161839.html
挖掘分布式系统——Hadoop的漏洞
https://zhuanlan.zhihu.com/p/28901633
https://zhuanlan.zhihu.com/p/28901633
Discuz!因Memcached未授权访问导致的RCE
https://xianzhi.aliyun.com/forum/topic/2018
https://xianzhi.aliyun.com/forum/topic/2018
FreeFloat FTP1.0 溢出漏洞分析
http://mp.weixin.qq.com/s/MSaEbeNN0zbrNY50_30FRQ
http://mp.weixin.qq.com/s/MSaEbeNN0zbrNY50_30FRQ
malware-analysis-threat-intelligence (slide)
https://bartblaze.blogspot.com/2018/02/malware-analysis-threat-intelligence.html
https://bartblaze.blogspot.com/2018/02/malware-analysis-threat-intelligence.html
Django的Secret Key泄漏导致的命令执行实践
http://www.polaris-lab.com/index.php/archives/426/
http://www.polaris-lab.com/index.php/archives/426/
Practical Machine Learning with Python
https://pan.baidu.com/s/1sl3HrOh#list/path=%2F
https://pan.baidu.com/s/1sl3HrOh#list/path=%2F
kiwi:一款源代码安全审计工具
https://github.com/alpha1e0/kiwi
https://github.com/alpha1e0/kiwi
Windows(x86与x64) Shellcode技术研究
https://www.anquanke.com/post/id/97601
https://www.anquanke.com/post/id/97601
SRCHunter一款基于python的开源扫描器
http://www.cnnetarmy.com/srchunter%E4%B8%80%E6%AC%BE%E5%9F%BA%E4%BA%8Epython%E7%9A%84%E5%BC%80%E6%BA%90%E6%89%AB%E6%8F%8F%E5%99%A8/
http://www.cnnetarmy.com/srchunter%E4%B8%80%E6%AC%BE%E5%9F%BA%E4%BA%8Epython%E7%9A%84%E5%BC%80%E6%BA%90%E6%89%AB%E6%8F%8F%E5%99%A8/
x-patrol: github泄露扫描系统
https://github.com/MiSecurity/x-patrol
https://github.com/MiSecurity/x-patrol
JSONP与CORS漏洞挖掘
https://www.anquanke.com/post/id/97671
https://www.anquanke.com/post/id/97671
cve-2018-4878-an-analysis-of-the-flash-player-hack
https://blog.morphisec.com/cve-2018-4878-an-analysis-of-the-flash-player-hack
https://blog.morphisec.com/cve-2018-4878-an-analysis-of-the-flash-player-hack
HELK: A Hunting ELK with advanced 威胁情报分析平台
https://github.com/Cyb3rWard0g/HELK
https://github.com/Cyb3rWard0g/HELK
基于机器学习的 Webshell 发现技术探索
https://mp.weixin.qq.com/s/5wJbvuG0IUOX4jdFtYNnkg
https://mp.weixin.qq.com/s/5wJbvuG0IUOX4jdFtYNnkg
Java反序列化漏洞-玄铁重剑之CommonsCollection(上)
https://xianzhi.aliyun.com/forum/topic/2028
https://xianzhi.aliyun.com/forum/topic/2028
Red-Team-Infrastructure-Wiki
https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki
https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki
archerysec: 开源的漏洞扫描和管理平台
https://github.com/archerysec/archerysec
https://github.com/archerysec/archerysec
AceBear Security Contest-Tet Shopping-Writeup
https://xianzhi.aliyun.com/forum/topic/2013
https://xianzhi.aliyun.com/forum/topic/2013
Malware Sample Sources for Researchers
https://zeltser.com/malware-sample-sources/
https://zeltser.com/malware-sample-sources/
Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection
https://www.notsosecure.com/analyzing-cve-2018-6376/
https://www.notsosecure.com/analyzing-cve-2018-6376/
StaCoAn 移动端代码审计工具
https://github.com/vincentcox/StaCoAn
https://github.com/vincentcox/StaCoAn
Jackson dbcp gadget以及CVE-2018-5968
http://blog.csdn.net/u011721501/article/details/79257709
http://blog.csdn.net/u011721501/article/details/79257709
登录抓包逆向分析学习笔记
https://bbs.pediy.com/thread-224559.htm
https://bbs.pediy.com/thread-224559.htm
企业安全项目-Github信息泄露专项
https://mp.weixin.qq.com/s/5cUJ_jxY-0eMdpY-aXlI2g
https://mp.weixin.qq.com/s/5cUJ_jxY-0eMdpY-aXlI2g
从补丁到漏洞分析 --记一次joomla漏洞应急
https://lorexxar.cn/2018/02/07/joomla3-8-4/
https://lorexxar.cn/2018/02/07/joomla3-8-4/
CVE-2018-4878 Flash 0day漏洞攻击样本解析
https://mp.weixin.qq.com/s/zJm-mr5-U5sBHdc3Qlx_3Q
https://mp.weixin.qq.com/s/zJm-mr5-U5sBHdc3Qlx_3Q
ADB.Miner:恶意代码正在利用开放了ADB 接口的安卓设备挖矿
http://blog.netlab.360.com/early-warning-adb-miner-a-mining-botnet-utilizing-android-adb-is-now-rapidly-spreading/
http://blog.netlab.360.com/early-warning-adb-miner-a-mining-botnet-utilizing-android-adb-is-now-rapidly-spreading/
AppProtect: 整理一些app常见的加固方法
https://github.com/guanchao/AppProtect
https://github.com/guanchao/AppProtect
metasploit-cn-wiki: 一些metasploit的中文文档
https://github.com/blue-bird1/metasploit-cn-wiki
https://github.com/blue-bird1/metasploit-cn-wiki
2017年钓鱼网站分布趋势报告
https://mp.weixin.qq.com/s/aDVIG7_QTaMCHAwgrqnHDA
https://mp.weixin.qq.com/s/aDVIG7_QTaMCHAwgrqnHDA
MLCheckWebshell:机器学习检测Webshell
https://github.com/hi-WenR0/MLCheckWebshell
https://github.com/hi-WenR0/MLCheckWebshell
ZZCMS v8.2 最新版SQL注入漏洞
http://www.freebuf.com/vuls/161888.html
http://www.freebuf.com/vuls/161888.html
2017年“信息安全”项目公开招标TOP榜
https://mp.weixin.qq.com/s/ajDCSfVmw94GjPkuVSq_fw
https://mp.weixin.qq.com/s/ajDCSfVmw94GjPkuVSq_fw
Python http.server和web.py的URL跳转漏洞实践
http://www.polaris-lab.com/index.php/archives/435/
http://www.polaris-lab.com/index.php/archives/435/
SSH Hijacking for lateral movement
https://xorl.wordpress.com/2018/02/04/ssh-hijacking-for-lateral-movement/
https://xorl.wordpress.com/2018/02/04/ssh-hijacking-for-lateral-movement/
新型勒索病毒Mindlost
https://mp.weixin.qq.com/s/dEpW-pV51Z6fSdXu9pmEvQ
https://mp.weixin.qq.com/s/dEpW-pV51Z6fSdXu9pmEvQ
通过Metasploit+Ngrok穿透内网长期维持访问外网Android设备
http://www.freebuf.com/sectool/162046.html
http://www.freebuf.com/sectool/162046.html
SecWiki周刊(第205期)
https://www.sec-wiki.com/weekly/205
https://www.sec-wiki.com/weekly/205
Stealing CSRF tokens with CSS injection (without iFrames)
https://github.com/dxa4481/cssInjection
https://github.com/dxa4481/cssInjection
UEBA在企业安全领域应用的现状和挑战
https://mp.weixin.qq.com/s/0fxt_ZYJM3LYnUoMWcYG_Q
https://mp.weixin.qq.com/s/0fxt_ZYJM3LYnUoMWcYG_Q
通过DNS rebinding绕过同源策略攻击Transmission分析
https://www.anquanke.com/post/id/97366
https://www.anquanke.com/post/id/97366
渗透基础——获得当前系统已安装的程序列表
http://www.4hou.com/technology/10206.html
http://www.4hou.com/technology/10206.html
中国信息安全从业人员现状调研报告(2017年度)
http://www.itsec.gov.cn/zxxw/201802/t20180205_23641.html
http://www.itsec.gov.cn/zxxw/201802/t20180205_23641.html
企业安全项目-测试环境内网化
http://mp.weixin.qq.com/s/lkfA7-Ii3KJtodWdcZUfog
http://mp.weixin.qq.com/s/lkfA7-Ii3KJtodWdcZUfog
企业安全项目-Github信息泄露专项
http://mp.weixin.qq.com/s/5cUJ_jxY-0eMdpY-aXlI2g
http://mp.weixin.qq.com/s/5cUJ_jxY-0eMdpY-aXlI2g
SecWiki的官网、周报、公众号的正确使用姿势
https://mp.weixin.qq.com/s/bUFHm4dQKz3Vc6dhfo2bdw
https://mp.weixin.qq.com/s/bUFHm4dQKz3Vc6dhfo2bdw
基于机器学习发起网络攻击的六种方式
https://zhuanlan.zhihu.com/p/33699617
https://zhuanlan.zhihu.com/p/33699617
Joy:一款用于捕获和分析网络内部流量数据的工具
http://www.freebuf.com/sectool/161431.html
http://www.freebuf.com/sectool/161431.html
Weaponization Of Nessus Plugins
https://depthsecurity.com/blog/weaponization-of-nessus-plugins
https://depthsecurity.com/blog/weaponization-of-nessus-plugins
安信证券聂君:矩阵式监控理论与实操
https://mp.weixin.qq.com/s/9W4mnzeN1-uZwy3RhPnRrA
https://mp.weixin.qq.com/s/9W4mnzeN1-uZwy3RhPnRrA
in-through-the-out-door-backdooring-cars-with-the-bicho
https://conference.hitb.org/hitbsecconf2018ams/sessions/in-through-the-out-door-backdooring-cars-with-the-bicho/
https://conference.hitb.org/hitbsecconf2018ams/sessions/in-through-the-out-door-backdooring-cars-with-the-bicho/
2018SANS网络威胁情报峰会初探
https://www.sec-un.org/2018sans%e7%bd%91%e7%bb%9c%e5%a8%81%e8%83%81%e6%83%85%e6%8a%a5%e5%b3%b0%e4%bc%9a%e5%88%9d%e6%8e%a2/
https://www.sec-un.org/2018sans%e7%bd%91%e7%bb%9c%e5%a8%81%e8%83%81%e6%83%85%e6%8a%a5%e5%b3%b0%e4%bc%9a%e5%88%9d%e6%8e%a2/
PHP弱类型在实战中导致的漏洞总结
https://blog.formsec.cn/2018/02/05/php-weak-type/
https://blog.formsec.cn/2018/02/05/php-weak-type/
介绍一些与 NTLM-Relay 有关的知识
https://mp.weixin.qq.com/s/1LpgGx3-YA5aR0Mx9iryCQ
https://mp.weixin.qq.com/s/1LpgGx3-YA5aR0Mx9iryCQ
微信海量数据监控的设计与实践
https://mp.weixin.qq.com/s/EAPHplKe9meI0-EHeF_BcQ
https://mp.weixin.qq.com/s/EAPHplKe9meI0-EHeF_BcQ
Grammarly For Chrome扩展任意用户劫持漏洞分析及利用
https://blog.formsec.cn/2018/02/08/grammarly-for-chrome/
https://blog.formsec.cn/2018/02/08/grammarly-for-chrome/
Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability
https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure
https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure
机器学习检测WebShell(附脚本下载链接)
https://mp.weixin.qq.com/s/XWIIniSgq75lMK6Vi_BKaA
https://mp.weixin.qq.com/s/XWIIniSgq75lMK6Vi_BKaA
PHP弱类型在实战中导致的漏洞总结
https://mp.weixin.qq.com/s/B-1qDb7y-7xuHDJVWA7fSQ
https://mp.weixin.qq.com/s/B-1qDb7y-7xuHDJVWA7fSQ
Automating the detection of Mimikatz with ELK
https://jordanpotti.com/2018/01/03/automating-the-detection-of-mimikatz-with-elk/
https://jordanpotti.com/2018/01/03/automating-the-detection-of-mimikatz-with-elk/
yxcms从伪XSS到Getshell
https://xianzhi.aliyun.com/forum/topic/2025
https://xianzhi.aliyun.com/forum/topic/2025
Bounty Monitor
https://github.com/nashcontrol/bounty-monitor
https://github.com/nashcontrol/bounty-monitor
EternalRomance / EternalChampion aux+exploit modules
https://github.com/rapid7/metasploit-framework/pull/9473
https://github.com/rapid7/metasploit-framework/pull/9473
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第206期)
