SecWiki周刊(第213期)
2018/03/26-2018/04/01
安全资讯
从抄书到开源之巅:章亦春的程序人生
https://mp.weixin.qq.com/s/moyoJd1EnNziRPQgHbNXRw
https://mp.weixin.qq.com/s/moyoJd1EnNziRPQgHbNXRw
2018 RSA 相关信息梳理
https://mp.weixin.qq.com/s/cH6_AWMXRNOoAm_lruF7SQ
https://mp.weixin.qq.com/s/cH6_AWMXRNOoAm_lruF7SQ
WebRTC bug 泄漏 VPN 用户的真实 IP
https://www.solidot.org/story?sid=55977&from=timeline
https://www.solidot.org/story?sid=55977&from=timeline
NSF3000万美元推动计算和信息科学领域前沿变革研究
https://mp.weixin.qq.com/s/WQ1JKpiYhe9-jb0RPsScIA
https://mp.weixin.qq.com/s/WQ1JKpiYhe9-jb0RPsScIA
安全技术
MSSQL Error-Based SQL Injection Order by clause
https://github.com/incredibleindishell/exploit-code-by-me/blob/master/MSSQL%20Error-Based%20SQL%20Injection%20Order%20by%20clause/Error%20based%20SQL%20Injection%20in%20%E2%80%9COrder%20By%E2%80%9D%20clause%20(MSSQL).pdf
https://github.com/incredibleindishell/exploit-code-by-me/blob/master/MSSQL%20Error-Based%20SQL%20Injection%20Order%20by%20clause/Error%20based%20SQL%20Injection%20in%20%E2%80%9COrder%20By%E2%80%9D%20clause%20(MSSQL).pdf
利用最新Apache解析漏洞(CVE-2017-15715)绕过上传黑名单
https://www.leavesongs.com/PENETRATION/apache-cve-2017-15715-vulnerability.html
https://www.leavesongs.com/PENETRATION/apache-cve-2017-15715-vulnerability.html
SpringBoot应用监控Actuator使用的安全隐患
https://xz.aliyun.com/t/2233
https://xz.aliyun.com/t/2233
Black Hat Asia 2018 slides
https://www.blackhat.com/asia-18/briefings.html
https://www.blackhat.com/asia-18/briefings.html
Exploiting Browser Extensions & Context Menus
https://harleo.me/blog/exploiting-browser-extensions-context-menus
https://harleo.me/blog/exploiting-browser-extensions-context-menus
Cowrie Honeypot Analysis
https://hackertarget.com/cowrie-honeypot-analysis-24hrs/
https://hackertarget.com/cowrie-honeypot-analysis-24hrs/
Adhrit:open source Android APK reversing and analysis tool
https://github.com/abhi-r3v0/Adhrit/
https://github.com/abhi-r3v0/Adhrit/
强网杯出题思路-solid_core-HijackPrctl
https://bbs.pediy.com/thread-225488.htm
https://bbs.pediy.com/thread-225488.htm
摩诃草APT组织针对我国敏感机构最新的网络攻击活动分析
https://mp.weixin.qq.com/s/hJvDqIuBZgd2_xua4suy0w
https://mp.weixin.qq.com/s/hJvDqIuBZgd2_xua4suy0w
Android Studio 3.0.1 编写 Xposed 插件入门记录
https://zhuanlan.zhihu.com/p/35003478
https://zhuanlan.zhihu.com/p/35003478
Powershell+dnscat2实现DNS隐蔽隧道反弹Shell,和检测方法
https://mp.weixin.qq.com/s/5mDhzuGC2WEc8bdIjRg94w
https://mp.weixin.qq.com/s/5mDhzuGC2WEc8bdIjRg94w
DBScanner: 自动扫描内网常数据库脚本未授权访问及常规弱口令检测
https://github.com/se55i0n/DBScanner
https://github.com/se55i0n/DBScanner
通俗、有逻辑的写一篇说下Xgboost的原理
https://blog.csdn.net/github_38414650/article/details/76061893
https://blog.csdn.net/github_38414650/article/details/76061893
GitStack <= 2.3.10 远程命令执行漏洞分析-CVE-2018-5955
https://xz.aliyun.com/t/2235
https://xz.aliyun.com/t/2235
强网杯“彩蛋”—Shiro 1.2.4(SHIRO-550)漏洞之发散性思考
https://blog.zsxsoft.com/post/35
https://blog.zsxsoft.com/post/35
The phenomenon of smart contract honeypots
https://medium.com/@gerhard.wagner/the-phenomena-of-smart-contract-honeypots-755c1f943f7b
https://medium.com/@gerhard.wagner/the-phenomena-of-smart-contract-honeypots-755c1f943f7b
基于概念知识图谱的短文本理解
https://mp.weixin.qq.com/s/avf72hYVq4WBJ63G6wlORA
https://mp.weixin.qq.com/s/avf72hYVq4WBJ63G6wlORA
第二届强网杯Web Writeup
https://www.anquanke.com/post/id/103213
https://www.anquanke.com/post/id/103213
Exploiting Jolokia Agent with Java EE Servers
https://mp.weixin.qq.com/s/blpFK0oigTGtI_eVJxEL0w
https://mp.weixin.qq.com/s/blpFK0oigTGtI_eVJxEL0w
MIPCMS V3.1.0 远程写入配置文件Getshell过程分析(附批量getshell脚本)
https://bbs.ichunqiu.com/thread-36511-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-36511-1-1.html?from=sec
following the trace of WMI Backdoors & other nastiness
https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
QWB-2018 Web partial solutions
https://mp.weixin.qq.com/s/xEBr7JxbSTt11oiBsgc3uw
https://mp.weixin.qq.com/s/xEBr7JxbSTt11oiBsgc3uw
Threat Landscape for Industrial Automation Systems in H2 2017
https://ics-cert.kaspersky.com/reports/2018/03/26/threat-landscape-for-industrial-automation-systems-in-h2-2017/
https://ics-cert.kaspersky.com/reports/2018/03/26/threat-landscape-for-industrial-automation-systems-in-h2-2017/
第二届强网杯中应用的一种反作弊新思路
http://www.freebuf.com/column/166714.html
http://www.freebuf.com/column/166714.html
饿了么在ELasticsearch自动化运维平台和监控平台的应用实践
https://elasticsearch.cn/slides/109?
https://elasticsearch.cn/slides/109?
逆向分析以太坊智能合约
https://www.anquanke.com/post/id/101979
https://www.anquanke.com/post/id/101979
密码破解全能工具:Hashcat密码破解攻略
http://www.freebuf.com/sectool/164507.html
http://www.freebuf.com/sectool/164507.html
PS4 4.55 BPF Race Condition Kernel Exploit Writeup
https://github.com/Cryptogenic/Exploit-Writeups/blob/master/FreeBSD/PS4%204.55%20BPF%20Race%20Condition%20Kernel%20Exploit%20Writeup.md
https://github.com/Cryptogenic/Exploit-Writeups/blob/master/FreeBSD/PS4%204.55%20BPF%20Race%20Condition%20Kernel%20Exploit%20Writeup.md
Breaking the unbreakable voting machine! Bluefrost Ekoparty Stack Overflow Chall
https://medium.com/@alex91ar/breaking-the-unbreakable-voting-machine-bluefrost-ekoparty-stack-overflow-challenge-1d6f4a255efe
https://medium.com/@alex91ar/breaking-the-unbreakable-voting-machine-bluefrost-ekoparty-stack-overflow-challenge-1d6f4a255efe
#BugBounty — Rewarded by securing vulnerabilities in Bookmyshow (India’s largest
https://medium.com/@logicbomb_1/bugbounty-rewarded-by-securing-vulnerabilities-in-bookmyshow-indias-largest-online-movie-bb81dba9b82
https://medium.com/@logicbomb_1/bugbounty-rewarded-by-securing-vulnerabilities-in-bookmyshow-indias-largest-online-movie-bb81dba9b82
Python is the best language-Writeup
https://xianzhi.aliyun.com/forum/topic/2219
https://xianzhi.aliyun.com/forum/topic/2219
Exploit kits: Winter 2018 review
https://blog.malwarebytes.com/threat-analysis/2018/03/exploit-kits-winter-2018-review/
https://blog.malwarebytes.com/threat-analysis/2018/03/exploit-kits-winter-2018-review/
Exploring the opportunities and limitations of Threat Intelligence Platforms
https://www.enisa.europa.eu/publications/exploring-the-opportunities-and-limitations-of-current-threat-intelligence-platforms
https://www.enisa.europa.eu/publications/exploring-the-opportunities-and-limitations-of-current-threat-intelligence-platforms
Amazon's AWS Misconfiguration: Arbitrary Files Upload in Amazon Go
https://rhinosecuritylabs.com/aws/amazon-aws-misconfiguration-amazon-go/
https://rhinosecuritylabs.com/aws/amazon-aws-misconfiguration-amazon-go/
basics-of-tracking-wmi-activity
https://www.darkoperator.com/blog/2017/10/14/basics-of-tracking-wmi-activity
https://www.darkoperator.com/blog/2017/10/14/basics-of-tracking-wmi-activity
Prevent bypassing of SSL certificate pinning in iOS applications
https://www.guardsquare.com/en/blog/iOS-SSL-certificate-pinning-bypassing
https://www.guardsquare.com/en/blog/iOS-SSL-certificate-pinning-bypassing
Jolokia JNDI Injection&XXE Vulnerability分析复现
http://www.polaris-lab.com/index.php/archives/493/
http://www.polaris-lab.com/index.php/archives/493/
你必须了解的漏洞利用缓解及对抗技术
https://zhuanlan.zhihu.com/p/24489276
https://zhuanlan.zhihu.com/p/24489276
#BugBounty — API keys leakage, Source code disclosure in India’s largest e-comme
https://medium.com/bugbountywriteup/bugbounty-api-keys-leakage-source-code-disclosure-in-indias-largest-e-commerce-health-care-c75967392c7e
https://medium.com/bugbountywriteup/bugbounty-api-keys-leakage-source-code-disclosure-in-indias-largest-e-commerce-health-care-c75967392c7e
ezXSS:一款功能强大的XSS盲测工具
http://www.freebuf.com/sectool/165289.html
http://www.freebuf.com/sectool/165289.html
IoTInfographic
https://github.com/Xipiter/IoTInfographic
https://github.com/Xipiter/IoTInfographic
攻防组网之----MikroTik软路由的配置和FUZZ
https://bbs.ichunqiu.com/thread-36817-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-36817-1-1.html?from=sec
BLE安全入门及实战
https://sec.xiaomi.com/article?id=14
https://sec.xiaomi.com/article?id=14
Attack seam framework
https://xz.aliyun.com/t/2230
https://xz.aliyun.com/t/2230
SecWiki周刊(第212期)
https://www.sec-wiki.com/weekly/212
https://www.sec-wiki.com/weekly/212
Android 4.4 - Android 7.1 APP Vulnerability Benchmarks
https://bitbucket.org/secure-it-i/android-app-vulnerability-benchmarks/src/master/
https://bitbucket.org/secure-it-i/android-app-vulnerability-benchmarks/src/master/
Cisco2018年度网络安全报告(ACR)R11
http://branden.biz/wp-content/uploads/2018/03/11.-Cisco-2018-Annual-Cybersecurity-Report.pdf
http://branden.biz/wp-content/uploads/2018/03/11.-Cisco-2018-Annual-Cybersecurity-Report.pdf
初探下一代SIEM核心技术发展趋势
https://www.sec-un.org/%e5%88%9d%e6%8e%a2%e4%b8%8b%e4%b8%80%e4%bb%a3siem%e6%a0%b8%e5%bf%83%e6%8a%80%e6%9c%af%e5%8f%91%e5%b1%95%e8%b6%8b%e5%8a%bf/
https://www.sec-un.org/%e5%88%9d%e6%8e%a2%e4%b8%8b%e4%b8%80%e4%bb%a3siem%e6%a0%b8%e5%bf%83%e6%8a%80%e6%9c%af%e5%8f%91%e5%b1%95%e8%b6%8b%e5%8a%bf/
Quickpost: Using Suricata on Windows
https://blog.didierstevens.com/2018/03/27/quickpost-using-suricata-on-windows/
https://blog.didierstevens.com/2018/03/27/quickpost-using-suricata-on-windows/
YARA Rules for Finding and Analyzing in InfoSec
https://www.alienvault.com/blogs/security-essentials/yara-rules-for-finding-and-analyzing-in-infosec
https://www.alienvault.com/blogs/security-essentials/yara-rules-for-finding-and-analyzing-in-infosec
Tools to gather subdomains from Bug Bounty programs
https://github.com/bonkc/BugBountySubdomains
https://github.com/bonkc/BugBountySubdomains
代码审计之QYKCMS后台任意文件上传、任意文件读取漏洞
https://mp.weixin.qq.com/s?__biz=MzA3NzE2MjgwMg==&mid=2448903645&idx=1&sn=bd058d8d8b35bcbe228590b287a668ca&chksm=8b55dd80bc22549695d5b1853835c608f2b7c8803dd1af5f39369adea6075d947225e1ffa38a&mpshare=1&scene=23&srcid=0331OXFL35OcYMseHFsBVUKQ#rd
https://mp.weixin.qq.com/s?__biz=MzA3NzE2MjgwMg==&mid=2448903645&idx=1&sn=bd058d8d8b35bcbe228590b287a668ca&chksm=8b55dd80bc22549695d5b1853835c608f2b7c8803dd1af5f39369adea6075d947225e1ffa38a&mpshare=1&scene=23&srcid=0331OXFL35OcYMseHFsBVUKQ#rd
CryptoPot:Simple cryptocurrency mining honeypot
https://github.com/omergunal/CryptoPot
https://github.com/omergunal/CryptoPot
老司机带你过常规WAF
https://www.anquanke.com/post/id/102852
https://www.anquanke.com/post/id/102852
Awesome XSS stuff
https://github.com/UltimateHackers/AwesomeXSS
https://github.com/UltimateHackers/AwesomeXSS
浅谈Linux系统MongoDB安全配置
https://mp.weixin.qq.com/s/j5NFI8oX-BC5waxLOl58aQ
https://mp.weixin.qq.com/s/j5NFI8oX-BC5waxLOl58aQ
ScrapedIn:A tool to scrape LinkedIn without API restrictions for data reconnaiss
https://github.com/dchrastil/ScrapedIn
https://github.com/dchrastil/ScrapedIn
Joomla内核SQL注入漏洞(CVE-2018-8045)分析
http://blog.nsfocus.net/cve-2018-804-analysis/
http://blog.nsfocus.net/cve-2018-804-analysis/
Who and What Is Coinhive?
https://krebsonsecurity.com/2018/03/who-and-what-is-coinhive/
https://krebsonsecurity.com/2018/03/who-and-what-is-coinhive/
腾讯2017年度传销态势感知白皮书
https://slab.qq.com/news/authority/1745.html
https://slab.qq.com/news/authority/1745.html
利用插件对Chrome进行UXSS
https://mp.weixin.qq.com/s/2uYgr1hNbP_lUBYVREM6vg
https://mp.weixin.qq.com/s/2uYgr1hNbP_lUBYVREM6vg
客户端 session 导致的安全问题
https://www.leavesongs.com/PENETRATION/client-session-security.html
https://www.leavesongs.com/PENETRATION/client-session-security.html
Open XML标签解析类漏洞分析思路
https://www.anquanke.com/post/id/103080
https://www.anquanke.com/post/id/103080
Signature Based Detection of User Events for PostMortem Forensic Analysis
https://arxiv.org/ftp/arxiv/papers/1302/1302.2395.pdf
https://arxiv.org/ftp/arxiv/papers/1302/1302.2395.pdf
JBoss引起的内网渗透-3
http://rcoil.me/2018/03/JBoss%E5%BC%95%E8%B5%B7%E7%9A%84%E5%86%85%E7%BD%91%E6%B8%97%E9%80%8F-3/
http://rcoil.me/2018/03/JBoss%E5%BC%95%E8%B5%B7%E7%9A%84%E5%86%85%E7%BD%91%E6%B8%97%E9%80%8F-3/
Exploiting Facebook data for stealing your friends’ digital identities
https://medium.com/bugbountywriteup/exploiting-facebook-data-for-stealing-your-friends-digital-identities-68511ec2d21d
https://medium.com/bugbountywriteup/exploiting-facebook-data-for-stealing-your-friends-digital-identities-68511ec2d21d
Multi-stage Powershell script (Brownies)
https://dissectmalware.wordpress.com/2018/03/28/multi-stage-powershell-script/
https://dissectmalware.wordpress.com/2018/03/28/multi-stage-powershell-script/
Zeppelin Augur Core Audit v1.0.0
https://docs.google.com/document/d/1saSVpT2Ixd58q-DZlTtzfkNizuTTE4yVoGuWz_AatZM/edit
https://docs.google.com/document/d/1saSVpT2Ixd58q-DZlTtzfkNizuTTE4yVoGuWz_AatZM/edit
Go-deliver is a payload delivery tool coded in Go.
https://github.com/0x09AL/go-deliver
https://github.com/0x09AL/go-deliver
How BloodHound's Session Collection Works
https://www.youtube.com/watch?v=q86VgM2Tafc
https://www.youtube.com/watch?v=q86VgM2Tafc
利用恶意页面攻击本地Xdebug
https://xlab.tencent.com/cn/2018/03/30/pwn-local-xdebug/
https://xlab.tencent.com/cn/2018/03/30/pwn-local-xdebug/
Exploring Cobalt Strike's ExternalC2 framework
https://blog.xpnsec.com/exploring-cobalt-strikes-externalc2-framework/
https://blog.xpnsec.com/exploring-cobalt-strikes-externalc2-framework/
安全专题
APP安全在线检测系统
https://www.sec-wiki.com/topic/82
https://www.sec-wiki.com/topic/82
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第213期)
