SecWiki周刊(第215期)
2018/04/09-2018/04/15
安全资讯
Mirai-like Scanning Activity Detected From China, With Targets in Brazil
https://blog.trendmicro.com/trendlabs-security-intelligence/mirai-like-scanning-activity-detected-from-china-targets-in-brazil/
https://blog.trendmicro.com/trendlabs-security-intelligence/mirai-like-scanning-activity-detected-from-china-targets-in-brazil/
Google 布局的三家安全情报公司近况汇总
https://mp.weixin.qq.com/s/oRpI7DwWZLfUprxwS0nOew
https://mp.weixin.qq.com/s/oRpI7DwWZLfUprxwS0nOew
重大体育赛事网络安全威胁评估
https://mp.weixin.qq.com/s/AfYOmFw9IXrunTcDtn4Avg
https://mp.weixin.qq.com/s/AfYOmFw9IXrunTcDtn4Avg
美国国家网络空间靶场(NCR)建设概况
https://mp.weixin.qq.com/s/GhuEu5-vQfKs25JFi2kDjw
https://mp.weixin.qq.com/s/GhuEu5-vQfKs25JFi2kDjw
一文读懂各种拟态防御网络设备
https://mp.weixin.qq.com/s/FHyE0fbEzEEIQoxbX1vSVA
https://mp.weixin.qq.com/s/FHyE0fbEzEEIQoxbX1vSVA
教育部关于加强大中小学国家安全教育的实施意见
http://www.moe.edu.cn/srcsite/A12/s7060/201804/t20180412_332965.html
http://www.moe.edu.cn/srcsite/A12/s7060/201804/t20180412_332965.html
安全技术
spring-messaging Remote Code Execution 分析-CVE-2018-1270
https://xz.aliyun.com/t/2252
https://xz.aliyun.com/t/2252
Spring Data Commons Remote Code Execution 分析-CVE-2018-1273
https://xz.aliyun.com/t/2269
https://xz.aliyun.com/t/2269
JXWAF(锦衣盾):基于openresty(nginx+lua)开发的下一代web应用防火墙
https://github.com/jx-sec/jxwaf
https://github.com/jx-sec/jxwaf
模拟企业流量入侵溯源分析
https://zhuanlan.zhihu.com/p/35623547
https://zhuanlan.zhihu.com/p/35623547
Gh0st/大灰狼RAT家族通讯协议分析
https://www.anquanke.com/post/id/103831
https://www.anquanke.com/post/id/103831
RSA 2018 PPT
https://share.weiyun.com/5gvNsTU
https://share.weiyun.com/5gvNsTU
Exim Off-by-One RCE漏洞(CVE-2018-6789)利用分析(附EXP)
http://www.freebuf.com/vuls/166519.html
http://www.freebuf.com/vuls/166519.html
树莓派的安全开发之旅(一)
http://mp.weixin.qq.com/s/xEdI49opyD86Ywkbu2QNsA
http://mp.weixin.qq.com/s/xEdI49opyD86Ywkbu2QNsA
如何在CTF中少走弯路(基础篇)
http://www.freebuf.com/articles/rookie/166925.html
http://www.freebuf.com/articles/rookie/166925.html
创新沙盒初探 (1) - RSAC2018之一
https://mp.weixin.qq.com/s/aiVCRboVeWXwope4zcho5A
https://mp.weixin.qq.com/s/aiVCRboVeWXwope4zcho5A
Invoke-DOSfuscation
https://conference.hitb.org/hitbsecconf2018ams/materials/D1T2%20-%20Daniel%20Bohannon%20-%20Invoke-DOSfuscation.pdf
https://conference.hitb.org/hitbsecconf2018ams/materials/D1T2%20-%20Daniel%20Bohannon%20-%20Invoke-DOSfuscation.pdf
Catfish(鲶鱼) CMS V 4.7.21 存储型XSS漏洞
https://xz.aliyun.com/t/2253
https://xz.aliyun.com/t/2253
TCTF/0CTF2018 h4xors.club2 Writeup
https://lorexxar.cn/2018/04/10/0ctf2018-club2/
https://lorexxar.cn/2018/04/10/0ctf2018-club2/
CVE-2018-1273: RCE with Spring Data Commons 分析和利用
https://mp.weixin.qq.com/s/bIY0PHvQEbNT2inhS5dZwg
https://mp.weixin.qq.com/s/bIY0PHvQEbNT2inhS5dZwg
CVE-2018-7600 Drupal core Remote Code Execution分析
https://research.checkpoint.com/uncovering-drupalgeddon-2/
https://research.checkpoint.com/uncovering-drupalgeddon-2/
代码审计之CSRF漏洞实例
https://mp.weixin.qq.com/s/PkqHYj_wPMMRwSq82QqL7A
https://mp.weixin.qq.com/s/PkqHYj_wPMMRwSq82QqL7A
某php框架 5.0.x sql注入漏洞分析
https://xz.aliyun.com/t/2257
https://xz.aliyun.com/t/2257
Rapid7 Labs Open Data
https://opendata.rapid7.com/
https://opendata.rapid7.com/
科威盒子导航系统代码审计过程总结
https://blog.csdn.net/vspiders/article/details/79947816
https://blog.csdn.net/vspiders/article/details/79947816
一名代码审计新手的实战经历与感悟
http://www.freebuf.com/articles/web/166602.html
http://www.freebuf.com/articles/web/166602.html
Drupal CVE-2018-7600 分析及 PoC 构造
https://paper.seebug.org/567/
https://paper.seebug.org/567/
情报 3.0 时代情报的特征、任务与工具
https://mp.weixin.qq.com/s/_9VgIcg_m_reYJH-wRjOMA
https://mp.weixin.qq.com/s/_9VgIcg_m_reYJH-wRjOMA
RFD Checker - security CLI tool to test Reflected File Download issues
https://github.com/dsopas/rfd-checker
https://github.com/dsopas/rfd-checker
2017金融科技安全分析报告
https://mp.weixin.qq.com/s/RpYilQpXXuJXEfMhlSJ3lA
https://mp.weixin.qq.com/s/RpYilQpXXuJXEfMhlSJ3lA
云态势感知产品-沙箱高级威胁检测
http://www.4hou.com/technology/11010.html
http://www.4hou.com/technology/11010.html
蜜罐捕捉恶意软件样本溯源分析
http://www.4hou.com/technology/11012.html
http://www.4hou.com/technology/11012.html
undersanding-and-evading-get-injectedthread
https://blog.xpnsec.com/undersanding-and-evading-get-injectedthread/
https://blog.xpnsec.com/undersanding-and-evading-get-injectedthread/
近年来APT组织使用的10大(类)安全漏洞
https://mp.weixin.qq.com/s/9vmyFql871eJlYzezZjEsg
https://mp.weixin.qq.com/s/9vmyFql871eJlYzezZjEsg
SecWiki周刊(第214期)
https://www.sec-wiki.com/weekly/214
https://www.sec-wiki.com/weekly/214
基于余弦相似性的404页面识别
https://thief.one/2018/04/12/1/
https://thief.one/2018/04/12/1/
Hunting Newly Registered Domains
https://github.com/gfek/Hunting-New-Registered-Domains
https://github.com/gfek/Hunting-New-Registered-Domains
攻击基础设施记录Part 1:服务器设置
https://www.anquanke.com/post/id/103345
https://www.anquanke.com/post/id/103345
ESI(Edge Side Include )注入技术
https://www.anquanke.com/post/id/103641
https://www.anquanke.com/post/id/103641
Automatically Stealing Password Hashes with Microsoft Outlook and OLE
https://insights.sei.cmu.edu/cert/2018/04/automatically-stealing-password-hashes-with-microsoft-outlook-and-ole.html
https://insights.sei.cmu.edu/cert/2018/04/automatically-stealing-password-hashes-with-microsoft-outlook-and-ole.html
Cobalt Strike上手学习
http://rcoil.me/2018/04/Cobalt%20Strike%E5%AD%A6%E4%B9%A0/
http://rcoil.me/2018/04/Cobalt%20Strike%E5%AD%A6%E4%B9%A0/
代码审计之后台Getshell的两种常规姿势
https://mp.weixin.qq.com/s/jc1mYH8o2YyteY8hEyTbnw
https://mp.weixin.qq.com/s/jc1mYH8o2YyteY8hEyTbnw
Threat Hunting & Adversary Emulation: The HELK vs APTSimulator - Part 1
https://isc.sans.edu/forums/diary/Threat+Hunting+Adversary+Emulation+The+HELK+vs+APTSimulator+Part+1/23525/
https://isc.sans.edu/forums/diary/Threat+Hunting+Adversary+Emulation+The+HELK+vs+APTSimulator+Part+1/23525/
日志源有效性监控UseCase-ArcSight实战系列之五
https://mp.weixin.qq.com/s/a1JSiPRkuHvSxxzmvQh_HA
https://mp.weixin.qq.com/s/a1JSiPRkuHvSxxzmvQh_HA
利用Angr分析恶意软件的通信协议
https://xz.aliyun.com/t/2262
https://xz.aliyun.com/t/2262
OWASP:IoT Attack Surface Areas Project
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project?from=timeline#tab=IoT_Attack_Surface_Areas
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project?from=timeline#tab=IoT_Attack_Surface_Areas
Threat Hunting & Adversary Emulation: The HELK vs APTSimulator - Part 2
https://isc.sans.edu/forums/diary/Threat+Hunting+Adversary+Emulation+The+HELK+vs+APTSimulator+Part+2/23529/
https://isc.sans.edu/forums/diary/Threat+Hunting+Adversary+Emulation+The+HELK+vs+APTSimulator+Part+2/23529/
A python script that finds endpoints in JavaScript files
https://github.com/GerbenJavado/LinkFinder
https://github.com/GerbenJavado/LinkFinder
A tool for identifying misconfigured CloudFront domains
https://github.com/MindPointGroup/cloudfrunt
https://github.com/MindPointGroup/cloudfrunt
CNY Challenge 2018 Write-Up
https://github.com/cure53/XSSChallengeWiki/wiki/CNY-Challenge-2018
https://github.com/cure53/XSSChallengeWiki/wiki/CNY-Challenge-2018
Stealing HttpOnly Cookie via XSS
https://xz.aliyun.com/t/2266
https://xz.aliyun.com/t/2266
四两拨千斤 —Ubuntu kernel eBPF 0day分析
https://security.tencent.com/index.php/blog/msg/124
https://security.tencent.com/index.php/blog/msg/124
Golden Ticket
https://pentestlab.blog/2018/04/09/golden-ticket/
https://pentestlab.blog/2018/04/09/golden-ticket/
由Three Hit聊聊二次注入
http://www.freebuf.com/articles/web/167089.html
http://www.freebuf.com/articles/web/167089.html
ARM shellcode and exploit development
https://github.com/invictus1306/Workshop-BSidesMunich2018/blob/master/workshop_slides.pdf
https://github.com/invictus1306/Workshop-BSidesMunich2018/blob/master/workshop_slides.pdf
Malware monitor - leveraging PyREBox for malware analysis
https://blog.talosintelligence.com/2018/04/malware-monitor-pyrebox-for-analysis.html#more%22
https://blog.talosintelligence.com/2018/04/malware-monitor-pyrebox-for-analysis.html#more%22
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第215期)
