SecWiki周刊(第228期)
2018/07/09-2018/07/15
安全资讯
CNCERT网络安全引擎比赛报名通知
https://mp.weixin.qq.com/s/WzPT_y9Bqgj67bLz8cIYgQ
https://mp.weixin.qq.com/s/WzPT_y9Bqgj67bLz8cIYgQ
第一批“网络空间国际治理研究基地”
http://news.fudan.edu.cn/2018/0710/46194.html
http://news.fudan.edu.cn/2018/0710/46194.html
安全技术
AWD型CTF比赛小技巧总结
https://c0d3p1ut0s.github.io/AWD%E5%9E%8BCTF%E6%AF%94%E8%B5%9B%E5%B0%8F%E6%8A%80%E5%B7%A7%E6%80%BB%E7%BB%93/
https://c0d3p1ut0s.github.io/AWD%E5%9E%8BCTF%E6%AF%94%E8%B5%9B%E5%B0%8F%E6%8A%80%E5%B7%A7%E6%80%BB%E7%BB%93/
USENIX Security 2018 论文录用列表
https://mp.weixin.qq.com/s/DWxuEe3FO1DHvYNtisfTdQ
https://mp.weixin.qq.com/s/DWxuEe3FO1DHvYNtisfTdQ
FastJson反序列化漏洞利用的三个细节
http://kingx.me/Details-in-FastJson-RCE.html
http://kingx.me/Details-in-FastJson-RCE.html
cutter: A Qt and C++ GUI for radare2 reverse engineering framework
https://github.com/radareorg/cutter
https://github.com/radareorg/cutter
知乎反作弊系统「悟空」架构演进
https://zhuanlan.zhihu.com/p/39482667
https://zhuanlan.zhihu.com/p/39482667
Linux pwn入门教程(3)——ROP技术
https://bbs.ichunqiu.com/thread-42530-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-42530-1-1.html?from=sec
绝境渗透之你们想看的从0到100的渗透过程
https://bbs.ichunqiu.com/thread-42556-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-42556-1-1.html?from=sec
Upload-labs通关手册
https://xz.aliyun.com/t/2435
https://xz.aliyun.com/t/2435
BlackTech APT Steals D-Link Cert for Cyber-Espionage Campaign
https://www.bleepingcomputer.com/news/security/blacktech-apt-steals-d-link-cert-for-cyber-espionage-campaign/
https://www.bleepingcomputer.com/news/security/blacktech-apt-steals-d-link-cert-for-cyber-espionage-campaign/
一款用于可视化分析恶意登录Windows系统的安全日志取证工具
https://mp.weixin.qq.com/s/-NxWRMbCV_wLNssBwFkb4A
https://mp.weixin.qq.com/s/-NxWRMbCV_wLNssBwFkb4A
A_Scan_Framework: 互联网漏洞管理、资产管理、任务扫描系统
https://github.com/RASSec/A_Scan_Framework
https://github.com/RASSec/A_Scan_Framework
wctf2018 cyber mimic defence Writeup
https://lorexxar.cn/2018/07/13/wctf2018-mimic/
https://lorexxar.cn/2018/07/13/wctf2018-mimic/
利用通配符实现Linux本地提权
https://www.secpulse.com/archives/72965.html
https://www.secpulse.com/archives/72965.html
甲方安全中心建设:代码审计系统
http://www.freebuf.com/sectool/176414.html
http://www.freebuf.com/sectool/176414.html
Python大法之告别脚本小子系列—信息资产收集类脚本编写(上)
https://bbs.ichunqiu.com/thread-38703-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-38703-1-1.html?from=sec
用机器学习检测恶意PowerShell:FireEye实践
https://xz.aliyun.com/t/2437
https://xz.aliyun.com/t/2437
一文读懂生成式对抗网络模型
https://mp.weixin.qq.com/s/dceWr4zSSsX9hzSR-Hfwzw
https://mp.weixin.qq.com/s/dceWr4zSSsX9hzSR-Hfwzw
代码审计--Cscms任意文件删除漏洞
https://mp.weixin.qq.com/s/DxcnldeS8UDyEJvsf0s11Q
https://mp.weixin.qq.com/s/DxcnldeS8UDyEJvsf0s11Q
Advanced Mobile Malware Campaign in India uses Malicious MDM
https://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM.html
https://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM.html
一种工控系统主动防御技术
http://plcscan.org/blog/2018/07/active-defense-technology-for-industrial-control-system/
http://plcscan.org/blog/2018/07/active-defense-technology-for-industrial-control-system/
从攻击视角构建弹性信息安全防御体系
https://mp.weixin.qq.com/s/8RtSjpRlC_AdM354XeluLw
https://mp.weixin.qq.com/s/8RtSjpRlC_AdM354XeluLw
以太坊网络架构解析
https://paper.seebug.org/642/
https://paper.seebug.org/642/
Vub_ENV: 跟踪真实漏洞相关靶场环境搭建
https://github.com/yaofeifly/Vub_ENV
https://github.com/yaofeifly/Vub_ENV
域密码哈希导出的那些事儿
https://www.anquanke.com/post/id/151241
https://www.anquanke.com/post/id/151241
APT攻击演练之捕鱼人的构想
http://www.freebuf.com/sectool/176504.html
http://www.freebuf.com/sectool/176504.html
AMR智能合约漏洞分析
http://www.freebuf.com/vuls/176917.html
http://www.freebuf.com/vuls/176917.html
如何搭建自己的蜜罐系统收集恶意软件样本
https://xz.aliyun.com/t/2439
https://xz.aliyun.com/t/2439
Shutting down the BGP Hijack Factory
https://dyn.com/blog/shutting-down-the-bgp-hijack-factory/?from=timeline
https://dyn.com/blog/shutting-down-the-bgp-hijack-factory/?from=timeline
WebShell检测-ArcSight实战系列之七
https://mp.weixin.qq.com/s/ckYpQqelIp9L9uk4vpYMZg
https://mp.weixin.qq.com/s/ckYpQqelIp9L9uk4vpYMZg
Categorising and Enriching Security Events in an ELK with Sysmon and ATT&CK
https://cyberwardog.blogspot.com/2018/07/categorizing-and-enriching-security.html
https://cyberwardog.blogspot.com/2018/07/categorizing-and-enriching-security.html
信息安全从运维向运营的进化
https://mp.weixin.qq.com/s/vgvy7qTh11H7fzMUtYA4xA
https://mp.weixin.qq.com/s/vgvy7qTh11H7fzMUtYA4xA
Microsoft Azure 以太坊节点自动化部署方案漏洞分析
https://paper.seebug.org/638/
https://paper.seebug.org/638/
物联网设备的固件模拟环境搭建
https://www.anquanke.com/post/id/151277
https://www.anquanke.com/post/id/151277
基于Chorme headless的xss检测实践
https://mp.weixin.qq.com/s/FDb1bXblxUVD38FwjwABbQ
https://mp.weixin.qq.com/s/FDb1bXblxUVD38FwjwABbQ
SecWiki周刊(第227期)
https://www.sec-wiki.com/weekly/227
https://www.sec-wiki.com/weekly/227
软件供应链安全大赛•C源代码赛季官方赛题精选
https://www.anquanke.com/post/id/151054
https://www.anquanke.com/post/id/151054
WAF Bypass Techniques
https://www.slideshare.net/SoroushDalili/waf-bypass-techniques-using-http-standard-and-web-servers-behaviour
https://www.slideshare.net/SoroushDalili/waf-bypass-techniques-using-http-standard-and-web-servers-behaviour
Exfiltrating credentials via PAM backdoors & DNS requests
https://x-c3ll.github.io/posts/PAM-backdoor-DNS/
https://x-c3ll.github.io/posts/PAM-backdoor-DNS/
PHP索引数组+unset使用不当导致的问题
https://xz.aliyun.com/t/2443
https://xz.aliyun.com/t/2443
2345内核拒绝服务漏洞(3)- WORD的锅
https://mp.weixin.qq.com/s?__biz=MzI1NTUzMjUzMQ==&mid=2247483808&idx=1&sn=5a18e557b4f52f43b4bb8794d9e8aa67&chksm=ea35cd3cdd42442ab
https://mp.weixin.qq.com/s?__biz=MzI1NTUzMjUzMQ==&mid=2247483808&idx=1&sn=5a18e557b4f52f43b4bb8794d9e8aa67&chksm=ea35cd3cdd42442ab
CMSeeK: CMS Detection and Exploitation suite
https://github.com/Tuhinshubhra/CMSeeK
https://github.com/Tuhinshubhra/CMSeeK
DPO社群对数据堂事件的精彩点评
https://mp.weixin.qq.com/s/1addFBb2ye3iumsXNh9fxg
https://mp.weixin.qq.com/s/1addFBb2ye3iumsXNh9fxg
浏览器攻击框架BeEF Part 2:初始化控制
http://www.freebuf.com/articles/web/176139.html
http://www.freebuf.com/articles/web/176139.html
Phishing tales: Microsoft Access Macro (.MAM) shortcuts
https://posts.specterops.io/phishing-tales-microsoft-access-macro-mam-shortcuts-c0bc3f90ed62
https://posts.specterops.io/phishing-tales-microsoft-access-macro-mam-shortcuts-c0bc3f90ed62
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第228期)
