SecWiki周刊(第214期)
2018/04/02-2018/04/08
安全资讯
Gartner报告:全球网络安全产业规模发展情况及趋势预测
https://mp.weixin.qq.com/s/_jOALqJB4aVpaM25rjN5Yg
https://mp.weixin.qq.com/s/_jOALqJB4aVpaM25rjN5Yg
公安机关互联网安全监督检查规定(征求意见稿)
https://mp.weixin.qq.com/s/Ytp3J2ZRRZTGB8QMu4EiIA
https://mp.weixin.qq.com/s/Ytp3J2ZRRZTGB8QMu4EiIA
诸葛建伟 段海新:网络泥淖的“蓝莲花”
http://v.iqilu.com/sdws/wzshsdr/201803/31/4523580.html?from=timeline&isappinstalled=0
http://v.iqilu.com/sdws/wzshsdr/201803/31/4523580.html?from=timeline&isappinstalled=0
美国MITRE评估APT侦测产品,假想敌是中国
https://mp.weixin.qq.com/s/ImXILnFVgmYgQPf009TYeA
https://mp.weixin.qq.com/s/ImXILnFVgmYgQPf009TYeA
安全技术
Bitcoin and Cryptocurrency Tracking with the ELK Stack
https://logz.io/blog/cryptocurrency-tracking-elk-stack/?from=timeline&isappinstalled=0
https://logz.io/blog/cryptocurrency-tracking-elk-stack/?from=timeline&isappinstalled=0
由MetInfo 深入理解PHP变量覆盖漏洞
https://mp.weixin.qq.com/s/I7tEDv12e65KI93TCXN8Ug
https://mp.weixin.qq.com/s/I7tEDv12e65KI93TCXN8Ug
CanSecWest 2018 Files
https://cansecwest.com/csw18archive.html
https://cansecwest.com/csw18archive.html
Some trick in ssrf and trick in unserialize()
https://mp.weixin.qq.com/s/MSYZOBRzvYdmdZR_wqBP7g
https://mp.weixin.qq.com/s/MSYZOBRzvYdmdZR_wqBP7g
Fake AV Investigation Unearths KevDroid, New Android Malware
http://blog.talosintelligence.com/2018/04/fake-av-investigation-unearths-kevdroid.html
http://blog.talosintelligence.com/2018/04/fake-av-investigation-unearths-kevdroid.html
Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrom
https://github.com/theori-io/zer0con2018_bpak
https://github.com/theori-io/zer0con2018_bpak
BACKDOORING PLUGINS
https://www.gironsec.com/blog/2018/03/backdooring-plugins/
https://www.gironsec.com/blog/2018/03/backdooring-plugins/
PHP代码审计菜鸟笔记(一)
https://sosly.me/index.php/2018/04/02/php_daimashenji1/
https://sosly.me/index.php/2018/04/02/php_daimashenji1/
Python工具分析风险数据
http://mp.weixin.qq.com/s/46f1WM_1xDgxzwxqGmFJNQ
http://mp.weixin.qq.com/s/46f1WM_1xDgxzwxqGmFJNQ
HowTo: ExploitDev Fuzzing
https://hansesecure.de/howto-exploitdev-fuzzing/
https://hansesecure.de/howto-exploitdev-fuzzing/
Scriptable network authentication cracker
https://github.com/kpcyrd/badtouch
https://github.com/kpcyrd/badtouch
从sql注入到xslt再到xxe的一道ctf题目
https://mp.weixin.qq.com/s/OVf3eUxjSq9N5wGzfg8F-Q
https://mp.weixin.qq.com/s/OVf3eUxjSq9N5wGzfg8F-Q
Exim Off-by-one(CVE-2018-6789)漏洞复现分析
http://0x48.pw/2018/03/30/0x42/
http://0x48.pw/2018/03/30/0x42/
Extract enpoints from apk files.
https://github.com/UltimateHackers/Diggy
https://github.com/UltimateHackers/Diggy
0CTF 2018 Quals Bl0g writeup
https://blog.cal1.cn/post/0CTF%202018%20Quals%20Bl0g%20writeup
https://blog.cal1.cn/post/0CTF%202018%20Quals%20Bl0g%20writeup
PHP代码审计菜鸟笔记(二)
https://sosly.me/index.php/2018/04/03/php_daimashenji2/
https://sosly.me/index.php/2018/04/03/php_daimashenji2/
Linux无文件渗透执行ELF
https://mp.weixin.qq.com/s/SdR6ce9xjbS5UQbh14kfgg
https://mp.weixin.qq.com/s/SdR6ce9xjbS5UQbh14kfgg
APP漏洞之WebView File域同源策略绕过漏洞
https://bbs.ichunqiu.com/thread-37204-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-37204-1-1.html?from=sec
从长亭的wiki上获取我想要的数据
https://mp.weixin.qq.com/s/xpClaDBOtIERwTUv3sbPvg
https://mp.weixin.qq.com/s/xpClaDBOtIERwTUv3sbPvg
打造一款自动扫描全网漏洞的扫描器
http://mp.weixin.qq.com/s/OFD821QhL0sjmXerqgPyCQ
http://mp.weixin.qq.com/s/OFD821QhL0sjmXerqgPyCQ
0CTF 2018 EZDOOR(WEB) Writeup
https://www.cdxy.me/?p=790
https://www.cdxy.me/?p=790
POC-Collect: 各种开源CMS的漏洞及EXP
https://github.com/Mr5m1th/POC-Collect
https://github.com/Mr5m1th/POC-Collect
深入探索Cobalt Strike的ExternalC2框架
https://xz.aliyun.com/t/2239
https://xz.aliyun.com/t/2239
Cracking Passwords up to 256 Characters with Hashcat
https://cyberarms.wordpress.com/2018/04/03/cracking-passwords-up-to-256-characters-with-hashcat/
https://cyberarms.wordpress.com/2018/04/03/cracking-passwords-up-to-256-characters-with-hashcat/
Apache Log View 5.37破解笔记
https://bbs.ichunqiu.com/thread-37208-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-37208-1-1.html?from=sec
基于SYLK文件传播Orcus远控木马样本分析
http://www.freebuf.com/articles/system/167141.html
http://www.freebuf.com/articles/system/167141.html
代码审计之CLTPHP_v5.5.3前台XML外部实体注入漏洞
https://mp.weixin.qq.com/s/UBBeo4PeCunF6XxdvlbF0Q
https://mp.weixin.qq.com/s/UBBeo4PeCunF6XxdvlbF0Q
CloudFront Hijacking
https://www.mindpointgroup.com/blog/pen-test/cloudfront-hijacking/
https://www.mindpointgroup.com/blog/pen-test/cloudfront-hijacking/
新手指南:Bwapp之XSS –stored
http://mp.weixin.qq.com/s/KJKAqBOm6zRokHioPG8c5g
http://mp.weixin.qq.com/s/KJKAqBOm6zRokHioPG8c5g
Free IP address to ASN database
https://iptoasn.com/
https://iptoasn.com/
细节决定成败-WIFI新玩法
http://mp.weixin.qq.com/s/_4x2MXe2Q-oOd_qZv0bafQ
http://mp.weixin.qq.com/s/_4x2MXe2Q-oOd_qZv0bafQ
代码审计之SQL二次编码注入漏洞实例(附tamper脚本)
https://mp.weixin.qq.com/s/5lzvyD1V7ligf_JsKrglMA
https://mp.weixin.qq.com/s/5lzvyD1V7ligf_JsKrglMA
用150行python代码来做代码审计笔记
http://mp.weixin.qq.com/s/ymyhrUxQIj0q9pDoZ2-x3A
http://mp.weixin.qq.com/s/ymyhrUxQIj0q9pDoZ2-x3A
路由器漏洞分析第五弹:CVE-2018-5767路由器远程代码执行
http://www.freebuf.com/articles/wireless/166869.html
http://www.freebuf.com/articles/wireless/166869.html
Exim Off-by-one(CVE-2018-6789)漏洞复现分析
https://paper.seebug.org/557/
https://paper.seebug.org/557/
HUNT:HUNT Proxy Burp Suite Extension
https://github.com/bugcrowd/HUNT
https://github.com/bugcrowd/HUNT
Attacking an FTP Client: MGETting more than you bargained for
https://snyk.io/blog/attacking-an-ftp-client/
https://snyk.io/blog/attacking-an-ftp-client/
使用Django编写简易测试报告生成器
http://www.freebuf.com/sectool/166605.html
http://www.freebuf.com/sectool/166605.html
Automated Security Testing For REST API's
https://github.com/flipkart-incubator/astra
https://github.com/flipkart-incubator/astra
sqlmap time-based inject 分析
http://blog.wils0n.cn/archives/178/
http://blog.wils0n.cn/archives/178/
渗透测试神器Cobalt Strike使用宝典
http://www.freebuf.com/company-information/167460.html
http://www.freebuf.com/company-information/167460.html
Linux Kernel Defence Map
https://github.com/a13xp0p0v/linux-kernel-defence-map
https://github.com/a13xp0p0v/linux-kernel-defence-map
Vulnerability Modeling with Binary Ninja
https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/
https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/
IT and Information Security Cheat Sheets
https://zeltser.com/cheat-sheets/
https://zeltser.com/cheat-sheets/
挖洞技巧-那个简单的威胁情报
https://mp.weixin.qq.com/s/Fs6j-ufxxEMjyHnOJEnuGA
https://mp.weixin.qq.com/s/Fs6j-ufxxEMjyHnOJEnuGA
CVE-2018-1270 Remote Code Execution with spring-messaging
http://www.polaris-lab.com/index.php/archives/501/
http://www.polaris-lab.com/index.php/archives/501/
Hacked Website Trend Report – 2017
https://sucuri.net/reports/Sucuri-Hacked-Report-2017.pdf
https://sucuri.net/reports/Sucuri-Hacked-Report-2017.pdf
Exploiting Bluetooth Low Energy using Gattacker for IoT
https://blog.attify.com/hacking-bluetooth-low-energy/
https://blog.attify.com/hacking-bluetooth-low-energy/
路由器漏洞 EXP 开发实践
http://mp.weixin.qq.com/s/PcuX4ZpxlRRlmwvA9v42mA
http://mp.weixin.qq.com/s/PcuX4ZpxlRRlmwvA9v42mA
利用ELK搭建Docker容器化应用日志中心
https://www.jianshu.com/p/a40c36beee63
https://www.jianshu.com/p/a40c36beee63
Stealing Credit Cards from FUZE via Bluetooth
https://blog.ice9.us/2018/04/stealing-credit-cards-from-fuze-bluetooth.html
https://blog.ice9.us/2018/04/stealing-credit-cards-from-fuze-bluetooth.html
枚举kerberos域用户的字典
https://github.com/re4lity/kerberos_enum_dict
https://github.com/re4lity/kerberos_enum_dict
解读NSA对APT组织的透视
https://mp.weixin.qq.com/s/DfvAIZYuDTtNMkijJNledQ
https://mp.weixin.qq.com/s/DfvAIZYuDTtNMkijJNledQ
如何在插件中植入后门
https://www.anquanke.com/post/id/103569
https://www.anquanke.com/post/id/103569
IAT 三连之什么是 IAT?
http://mp.weixin.qq.com/s/NYL-9lOBoOXEJF1x3Lp4NA
http://mp.weixin.qq.com/s/NYL-9lOBoOXEJF1x3Lp4NA
看我如何让 360 把 helloword 干掉
http://mp.weixin.qq.com/s/Fk6FWaCAYUq99DDJjDqukA
http://mp.weixin.qq.com/s/Fk6FWaCAYUq99DDJjDqukA
ring3层恶意代码实例汇总
http://mp.weixin.qq.com/s/wY3KnCewAw6WS5bNYlm-2Q
http://mp.weixin.qq.com/s/wY3KnCewAw6WS5bNYlm-2Q
Beyond XSS: Edge Side Include Injection
https://gosecure.net/2018/04/03/beyond-xss-edge-side-include-injection/
https://gosecure.net/2018/04/03/beyond-xss-edge-side-include-injection/
SecWiki周刊(第213期)
https://www.sec-wiki.com/weekly/213
https://www.sec-wiki.com/weekly/213
通过POC来学习漏洞的原理
http://mp.weixin.qq.com/s/ogFLjUpd2HU60raUxGNWhg
http://mp.weixin.qq.com/s/ogFLjUpd2HU60raUxGNWhg
揭露某些所谓"大佬"不为人知的另一面
http://mp.weixin.qq.com/s/cRSJhhALlDX54stKj_kwoQ
http://mp.weixin.qq.com/s/cRSJhhALlDX54stKj_kwoQ
低成本打造一个高性能的外网Metasploit
http://www.freebuf.com/articles/network/166702.html
http://www.freebuf.com/articles/network/166702.html
SSL_TLS 攻击原理解析
https://mp.weixin.qq.com/s/W620Pdu6qvoqjacSRPRVyg
https://mp.weixin.qq.com/s/W620Pdu6qvoqjacSRPRVyg
区块链的网络安全: 威胁与对策
http://jcs.iie.ac.cn/ch/reader/create_pdf.aspx?file_no=20180207&flag=1&year_id=2018&quarter_id=2
http://jcs.iie.ac.cn/ch/reader/create_pdf.aspx?file_no=20180207&flag=1&year_id=2018&quarter_id=2
Threat Hunting via Windows Event Logs
https://www.dropbox.com/s/50623g2yahys6bz/Threat%20Hunting%20via%20Windows%20Event%20Logs.pdf?dl=0
https://www.dropbox.com/s/50623g2yahys6bz/Threat%20Hunting%20via%20Windows%20Event%20Logs.pdf?dl=0
记一次审计 xiaocms 的过程
http://mp.weixin.qq.com/s/1G6q7Mk5aQL_9yZ6t58_nA
http://mp.weixin.qq.com/s/1G6q7Mk5aQL_9yZ6t58_nA
犯罪情报分析师知识和能力清单(初稿)
https://mp.weixin.qq.com/s/i5iL6R6m_UtmXYGfrRa31w
https://mp.weixin.qq.com/s/i5iL6R6m_UtmXYGfrRa31w
DetectMaliciousURL: Applying text model to Detection Task
https://github.com/cwellszhang/DetectMaliciousURL
https://github.com/cwellszhang/DetectMaliciousURL
BountyDash is a tool to combine your rewards from all platforms, giving you insi
https://github.com/avlidienbrunn/bountydash
https://github.com/avlidienbrunn/bountydash
Cobalt strike3.8 中文支持
https://evi1cg.me/archives/CS3_8_chinese_support.html
https://evi1cg.me/archives/CS3_8_chinese_support.html
优秀的 WIFI 渗透工具汇总
https://mp.weixin.qq.com/s/Why61qJGeT0y6w2iHEBhiA
https://mp.weixin.qq.com/s/Why61qJGeT0y6w2iHEBhiA
A malicious DNS server for executing DNS Rebinding attacks on the fly
https://github.com/brannondorsey/whonow
https://github.com/brannondorsey/whonow
Summary of PHP code audit experience
https://xz.aliyun.com/t/2246
https://xz.aliyun.com/t/2246
PHP安全开发中常见的Dos风险
http://mp.weixin.qq.com/s/zKmz6eamYCuWFGKmPWFqFA
http://mp.weixin.qq.com/s/zKmz6eamYCuWFGKmPWFqFA
Powershell绕过执行及脚本混淆
http://mp.weixin.qq.com/s/cJwekK4rQUmEyZTAXX_PVQ
http://mp.weixin.qq.com/s/cJwekK4rQUmEyZTAXX_PVQ
从 Ajax 聊一聊 Jsonp 点击劫持
http://mp.weixin.qq.com/s/0rTTpt0GtBDgdjVl0dDl8Q
http://mp.weixin.qq.com/s/0rTTpt0GtBDgdjVl0dDl8Q
A Study on Threat Intelligence Platforms (TIPs)
https://threatintel.eu/2018/04/04/a-study-on-threat-intelligence-platforms/
https://threatintel.eu/2018/04/04/a-study-on-threat-intelligence-platforms/
PE 病毒与 msf 奇遇记
http://mp.weixin.qq.com/s/kRMuGMFOxUCW0whh8TtlTQ
http://mp.weixin.qq.com/s/kRMuGMFOxUCW0whh8TtlTQ
审计某开源商城中的漏洞大礼包
http://mp.weixin.qq.com/s/iPOIUGOc9t-DjlFzOSqieg
http://mp.weixin.qq.com/s/iPOIUGOc9t-DjlFzOSqieg
pentestdb 架构详解
http://mp.weixin.qq.com/s/b4cpUQf5K9oz2b3ka6dNgQ
http://mp.weixin.qq.com/s/b4cpUQf5K9oz2b3ka6dNgQ
打造属于自己的渗透神器 第二篇
http://mp.weixin.qq.com/s/n6nfj9JovlhAw9D1aULzMA
http://mp.weixin.qq.com/s/n6nfj9JovlhAw9D1aULzMA
DTD 实体 XXE 浅析
http://mp.weixin.qq.com/s/vkCdz6YCoiiJPI30KePD6g
http://mp.weixin.qq.com/s/vkCdz6YCoiiJPI30KePD6g
VulnHub 中 LazySysAdmin 题目详解
http://mp.weixin.qq.com/s/Auhpkoe1NRoHmZ4REYjZ-A
http://mp.weixin.qq.com/s/Auhpkoe1NRoHmZ4REYjZ-A
RedTiger 通关学习总结
http://mp.weixin.qq.com/s/nqfI10K423fO_KculsE8UQ
http://mp.weixin.qq.com/s/nqfI10K423fO_KculsE8UQ
轻松理解什么是 webshell
http://mp.weixin.qq.com/s/x2Tw3ukaTFDJvZ0YCuZBog
http://mp.weixin.qq.com/s/x2Tw3ukaTFDJvZ0YCuZBog
Java代码审计-铁人下载系统
https://mp.weixin.qq.com/s/8mmj-mixScgOKq7cL2_YcQ
https://mp.weixin.qq.com/s/8mmj-mixScgOKq7cL2_YcQ
审计 tinyshop 中风险
http://mp.weixin.qq.com/s/tdyTY_x2AUYQAygHN15olA
http://mp.weixin.qq.com/s/tdyTY_x2AUYQAygHN15olA
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第214期)
