SecWiki周刊(第217期)
2018/04/23-2018/04/29
安全资讯
公安部关于印发《网络安全等级保护测评机构管理办法》的通知
https://mp.weixin.qq.com/s/HVPSSB_QtWle7GjJhJT_Ww
https://mp.weixin.qq.com/s/HVPSSB_QtWle7GjJhJT_Ww
恶意软件分析之—勒索即服务(Raas)
http://www.4hou.com/typ/11186.html
http://www.4hou.com/typ/11186.html
ThaiCERT Seizes Hidden Cobra Server Linked to GhostSecret, Sony Attacks
https://threatpost.com/thaicert-seizes-hidden-cobra-server-linked-to-ghostsecret-sony-attacks/131498/
https://threatpost.com/thaicert-seizes-hidden-cobra-server-linked-to-ghostsecret-sony-attacks/131498/
XKungfoo 2018精彩回顾-Day1
http://www.4hou.com/xactivity/11228.html
http://www.4hou.com/xactivity/11228.html
XKungfoo 2018精彩回顾-Day2
http://www.4hou.com/xactivity/11242.html
http://www.4hou.com/xactivity/11242.html
黑客组织 Orangeworm 针对全球医疗保健行业发起间谍活动
https://mp.weixin.qq.com/s/DhQAdkeXRW-22UPgB5iR6A
https://mp.weixin.qq.com/s/DhQAdkeXRW-22UPgB5iR6A
安全技术
记Discuz!的一个绕过技巧
https://secvul.com/topics/1165.html
https://secvul.com/topics/1165.html
Fireline: 360发布的一款免费静态代码分析工具
http://magic.360.cn/zh/article_zh.html
http://magic.360.cn/zh/article_zh.html
记某司Linux服务器入侵事件
https://secvul.com/topics/1142.html
https://secvul.com/topics/1142.html
一次特殊场景下的鸡肋XSS
https://secvul.com/topics/1159.html
https://secvul.com/topics/1159.html
Infer:Facebook开源的一个静态分析工具
https://infer.liaohuqiu.net/
https://infer.liaohuqiu.net/
金融企业网络安全应急响应之基础篇
https://mp.weixin.qq.com/s/Ug2vImj8wB1_kbXLGUmouQ
https://mp.weixin.qq.com/s/Ug2vImj8wB1_kbXLGUmouQ
Gitmails: An information gathering tool to colect git commit emails
https://github.com/giovanifss/Gitmails
https://github.com/giovanifss/Gitmails
从 CVE-2016-0165 说起:分析、利用和检测(上)
https://xiaodaozhi.com/exploit/32.html
https://xiaodaozhi.com/exploit/32.html
2018首席安全官(CSO)国际高峰论坛(干货PPT下载)
https://www.anquanke.com/post/id/106707
https://www.anquanke.com/post/id/106707
Jira-Scan: CVE-2017-9506 POC
https://github.com/random-robbie/Jira-Scan
https://github.com/random-robbie/Jira-Scan
Frida-Python-Binding:Easy to use Frida python binding script
https://github.com/Mind0xP/Frida-Python-Binding
https://github.com/Mind0xP/Frida-Python-Binding
Windows security audit events
https://www.microsoft.com/en-us/download/details.aspx?id=50034
https://www.microsoft.com/en-us/download/details.aspx?id=50034
picojs:A face detection library in 200 lines of JavaScript
https://github.com/tehnokv/picojs
https://github.com/tehnokv/picojs
Loading Kernel Shellcode
https://www.fireeye.com/blog/threat-research/2018/04/loading-kernel-shellcode.html
https://www.fireeye.com/blog/threat-research/2018/04/loading-kernel-shellcode.html
格式化字符串hijack retaddr及三个白帽-pwnme_k0 writeup
https://www.anquanke.com/post/id/105989
https://www.anquanke.com/post/id/105989
渗透测试实战-BlackMarket靶机入侵
https://www.anquanke.com/post/id/106855
https://www.anquanke.com/post/id/106855
First glance on OS VRP by Huawei
https://embedi.com/blog/first-glance-on-os-vrp-by-huawei/
https://embedi.com/blog/first-glance-on-os-vrp-by-huawei/
TPLINK TLWR740N ROUTER REMOTE CODE EXECUTION
https://www.fidusinfosec.com/a-curious-case-of-code-reuse-tplink-cve-2017-13772-v2
https://www.fidusinfosec.com/a-curious-case-of-code-reuse-tplink-cve-2017-13772-v2
Go语言任意代码执行漏洞 CVE-2018-6574
http://blog.nsfocus.net/cve-2018-6574/
http://blog.nsfocus.net/cve-2018-6574/
谈escapeshellarg绕过与参数注入漏洞
https://www.leavesongs.com/PENETRATION/escapeshellarg-and-parameter-injection.html
https://www.leavesongs.com/PENETRATION/escapeshellarg-and-parameter-injection.html
DB_BaseLine: 数据库基线检查工具
https://github.com/wstart/DB_BaseLine
https://github.com/wstart/DB_BaseLine
Android Applications Reversing 101
https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/
https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/
Uncovering Unknown Threats With Human-Readable Machine Learning
https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-unknown-threats-with-human-readable-machine-learning/
https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-unknown-threats-with-human-readable-machine-learning/
cheetah-gui:基于字典的webshell密码爆破工具
https://github.com/sunnyelf/cheetah-gui/blob/master/README_zh.md
https://github.com/sunnyelf/cheetah-gui/blob/master/README_zh.md
TrunPortForward: Web管理的、多节点、多端口、高度自定义定向转发工具
https://github.com/cytvictor/TrunPortForward
https://github.com/cytvictor/TrunPortForward
听说你内网渗透遇到困难?—MSF的NAT映射技巧
https://bbs.ichunqiu.com/thread-39238-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-39238-1-1.html?from=sec
从 CVE-2016-0165 说起:分析、利用和检测(中)
https://xiaodaozhi.com/exploit/42.html
https://xiaodaozhi.com/exploit/42.html
TDL:Driver loader for bypassing Windows x64 Driver Signature Enforcement
https://github.com/hfiref0x/TDL
https://github.com/hfiref0x/TDL
读取型CSRF-需要交互的内容劫持
https://bbs.ichunqiu.com/thread-36314-1-1.html
https://bbs.ichunqiu.com/thread-36314-1-1.html
从 CVE-2016-0165 说起:分析、利用和检测(下)
https://xiaodaozhi.com/exploit/56.html
https://xiaodaozhi.com/exploit/56.html
Drupal CVE-2018-7600 漏洞利用和攻击
https://xz.aliyun.com/t/2312
https://xz.aliyun.com/t/2312
Hash Finder 在线查询工具(支持多种类型)
http://finder.insidepro.team/
http://finder.insidepro.team/
第二届阿里云安全算法挑战赛 MJ_3DSUN 队解题方法
https://github.com/frank6696/tianchi-aliyun-security-competition
https://github.com/frank6696/tianchi-aliyun-security-competition
STIX 2.0 示例剖析
https://mp.weixin.qq.com/s/B88yOz9UWRm5WhWY6zAyUA
https://mp.weixin.qq.com/s/B88yOz9UWRm5WhWY6zAyUA
代码审计之任意文件读取漏洞实例
https://mp.weixin.qq.com/s/JG1PuHXvtt9sXM1r26uQ9g
https://mp.weixin.qq.com/s/JG1PuHXvtt9sXM1r26uQ9g
windows10_ntfs_crash_dos:PoC for a NTFS crash that I discovered, in various Wind
https://github.com/mtivadar/windows10_ntfs_crash_dos
https://github.com/mtivadar/windows10_ntfs_crash_dos
利用文件包含漏洞和图片一句话getshell
https://xz.aliyun.com/t/2311
https://xz.aliyun.com/t/2311
A bunch of Red Pills: VMware Escapes
https://keenlab.tencent.com/en/2018/04/23/A-bunch-of-Red-Pills-VMware-Escapes/
https://keenlab.tencent.com/en/2018/04/23/A-bunch-of-Red-Pills-VMware-Escapes/
用Apache mod_rewrite来保护你的Empire C2
https://www.anquanke.com/post/id/104784
https://www.anquanke.com/post/id/104784
金融企业网络安全应急响应之技术篇
https://mp.weixin.qq.com/s/W3_klh02SsMrRyH3UcYGNw
https://mp.weixin.qq.com/s/W3_klh02SsMrRyH3UcYGNw
HooToo TripMate Routers are Cute But Insecure
http://blog.ioactive.com/2018/04/hootoo-tripmate-routers-are-cute-but.html
http://blog.ioactive.com/2018/04/hootoo-tripmate-routers-are-cute-but.html
Google Inbox spoofing vulnerability
https://eligrey.com/blog/google-inbox-spoofing-vulnerability/
https://eligrey.com/blog/google-inbox-spoofing-vulnerability/
GravityRAT - The Two-Year Evolution Of An APT Targeting India
https://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html
https://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html
ShofEL2, a Tegra X1 and Nintendo Switch exploit
https://fail0verflow.com/blog/2018/shofel2/
https://fail0verflow.com/blog/2018/shofel2/
APT团伙(APT-C-01)新利用漏洞样本分析及关联挖掘
https://mp.weixin.qq.com/s/Rj0diLq9w6qiyQSA-CJHGQ
https://mp.weixin.qq.com/s/Rj0diLq9w6qiyQSA-CJHGQ
Electron远程命令执行漏洞(CVE-2018-1000006)
http://www.zerokeeper.com/vul-analysis/electron-remote-command-execution-vulnerability-cve20181000006.html
http://www.zerokeeper.com/vul-analysis/electron-remote-command-execution-vulnerability-cve20181000006.html
PentesterLab新手教程(二):XML注入
http://www.freebuf.com/sectool/169122.html
http://www.freebuf.com/sectool/169122.html
HackBox is the combination of awesome techniques.
https://github.com/samhaxr/hackbox
https://github.com/samhaxr/hackbox
关于Powershell对抗安全软件
https://micropoor.blogspot.jp/2018/04/powershell.html
https://micropoor.blogspot.jp/2018/04/powershell.html
establishing-a-baseline-for-remote-desktop-protocol
https://www.fireeye.com/blog/threat-research/2018/04/establishing-a-baseline-for-remote-desktop-protocol.html
https://www.fireeye.com/blog/threat-research/2018/04/establishing-a-baseline-for-remote-desktop-protocol.html
DOM Based Cross-Site Scripting in Google VRView library
http://blog.mindedsecurity.com/2018/04/dom-based-cross-site-scripting-in.html
http://blog.mindedsecurity.com/2018/04/dom-based-cross-site-scripting-in.html
Exploiting misconfigured CORS Null Origin
https://www.soffensive.com/2018/04/exploiting-misconfigured-cors-null.html
https://www.soffensive.com/2018/04/exploiting-misconfigured-cors-null.html
429线下赛write-up
http://momomoxiaoxi.com/2018/04/27/4292018/
http://momomoxiaoxi.com/2018/04/27/4292018/
Bypassing Android Anti-Emulation, Part (I)
http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-I/
http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-I/
Debugging Windows Services For Malware Analysis / Reverse Engineering
https://secrary.com/Random/WindowsServiceDebugging/
https://secrary.com/Random/WindowsServiceDebugging/
Stored XSS in Yahoo!
https://steemit.com/bugbounty/@theshahzada/stored-xss-in-yahoo
https://steemit.com/bugbounty/@theshahzada/stored-xss-in-yahoo
Summary of APT33 MD5
https://pastebin.com/uGUF4SHJ
https://pastebin.com/uGUF4SHJ
Subdomain enumeration
http://10degres.net/subdomain-enumeration/
http://10degres.net/subdomain-enumeration/
Bypassing Android Anti-Emulation, Part (III)
http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-III/
http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-III/
Linkedin Autofill Vulnerability
https://amisafe.secops.in/linkedin-autofill-vulnerability/
https://amisafe.secops.in/linkedin-autofill-vulnerability/
Energetic Bear/Crouching Yeti: attacks on servers
https://securelist.com/energetic-bear-crouching-yeti/85345/
https://securelist.com/energetic-bear-crouching-yeti/85345/
Bypassing Android Anti-Emulation, Part (II)
http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-II/
http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-II/
一行代码蒸发了¥6,447,277,680 人民币!
https://zhuanlan.zhihu.com/p/35989258
https://zhuanlan.zhihu.com/p/35989258
Endpoint Isolation with the Windows Firewall
https://medium.com/@cryps1s/endpoint-isolation-with-the-windows-firewall-462a795f4cfb
https://medium.com/@cryps1s/endpoint-isolation-with-the-windows-firewall-462a795f4cfb
基于Service Worker 的XSS攻击面拓展
https://lorexxar.cn/2018/04/20/SW-xss/
https://lorexxar.cn/2018/04/20/SW-xss/
Interactive bindshell over HTTP
http://blog.secu.dk/blog/Tunnels_in_a_hard_filtered_network/
http://blog.secu.dk/blog/Tunnels_in_a_hard_filtered_network/
为何 shadowsocks 要弃用一次性验证 (OTA)
https://blessing.studio/why-do-shadowsocks-deprecate-ota/
https://blessing.studio/why-do-shadowsocks-deprecate-ota/
360:基于 AI 的网络运维
https://mp.weixin.qq.com/s/1toUOKq_80pyM8AmCNb8Ww
https://mp.weixin.qq.com/s/1toUOKq_80pyM8AmCNb8Ww
Red-Teaming-Toolkit: A collection of open source and commercial tools
https://github.com/infosecn1nja/Red-Teaming-Toolkit
https://github.com/infosecn1nja/Red-Teaming-Toolkit
PentesterLab新手教程(一):代码注入
http://www.freebuf.com/sectool/168653.html
http://www.freebuf.com/sectool/168653.html
构建高质量攻击指标的几条建议
https://mp.weixin.qq.com/s/ZRiSi3bb-SkMc_54mWPgmw
https://mp.weixin.qq.com/s/ZRiSi3bb-SkMc_54mWPgmw
毕业设计之php RASP(二) 威胁判断
http://www.cnblogs.com/iamstudy/articles/php_code_rasp_2.html
http://www.cnblogs.com/iamstudy/articles/php_code_rasp_2.html
CVE-2017–11882 RTF
https://medium.com/@__fastcall/cve-2017-11882-rtf-44d671dc0fce
https://medium.com/@__fastcall/cve-2017-11882-rtf-44d671dc0fce
巡风风险扫描系统的一些演变
http://www.freebuf.com/sectool/168977.html
http://www.freebuf.com/sectool/168977.html
毕业设计之php RASP(三) 收尾
http://www.cnblogs.com/iamstudy/articles/php_code_rasp_3.html
http://www.cnblogs.com/iamstudy/articles/php_code_rasp_3.html
揭秘第三方跟踪器是如何利用Facebook登录页面跟踪用户的
http://www.4hou.com/technology/11208.html
http://www.4hou.com/technology/11208.html
Small mistakes lead to big problems
http://k3research.outerhaven.de/posts/small-mistakes-lead-to-big-problems.html
http://k3research.outerhaven.de/posts/small-mistakes-lead-to-big-problems.html
使用Apache mod_rewrite实现http流量分发
https://mp.weixin.qq.com/s/SIFrdP-w3kvIhQGaAjhV-Q
https://mp.weixin.qq.com/s/SIFrdP-w3kvIhQGaAjhV-Q
SecWiki周刊(第216期)
https://www.sec-wiki.com/weekly/216
https://www.sec-wiki.com/weekly/216
JWT common pitfalls, attacks, and mitigations
https://auth0.com/blog/a-look-at-the-latest-draft-for-jwt-bcp/
https://auth0.com/blog/a-look-at-the-latest-draft-for-jwt-bcp/
欧洲最严合规GDPR影响众多企业
https://mp.weixin.qq.com/s/nEMHu33qfO8GvDqStpVVuQ
https://mp.weixin.qq.com/s/nEMHu33qfO8GvDqStpVVuQ
DDCTF 2018 逆向 baby_mips Writeup
https://blog.formsec.cn/2018/04/29/DDCTF-2018-%e9%80%86%e5%90%91-baby-mips-Writeup/
https://blog.formsec.cn/2018/04/29/DDCTF-2018-%e9%80%86%e5%90%91-baby-mips-Writeup/
Integrating PRE-ATT&CK Techniques Into ATT&CK
https://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/integrating-pre-attck-techniques-into-attck
https://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/integrating-pre-attck-techniques-into-attck
DomLink:一款自动化的域发现工具
http://www.freebuf.com/sectool/169734.html
http://www.freebuf.com/sectool/169734.html
Reverse Engineering challenges
about:blank
about:blank
金融企业IT内控合规管理建设与实践
https://mp.weixin.qq.com/s/vxvZAfXRqYDVmdqEXJfUUA
https://mp.weixin.qq.com/s/vxvZAfXRqYDVmdqEXJfUUA
YY直播洗号产业链如何运作?戳进来看看!
https://bbs.ichunqiu.com/thread-39419-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-39419-1-1.html?from=sec
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第217期)
