SecWiki周刊(第230期)
2018/07/23-2018/07/29
安全资讯
猪八戒网安全负责人陈继安—理想的安全是人和技术的融合
https://mp.weixin.qq.com/s/AHkevK0uizizWG8fIcXWMQ
https://mp.weixin.qq.com/s/AHkevK0uizizWG8fIcXWMQ
追踪“数据堂”:特大侵犯个人信息专案
https://news.caijingmobile.com/article/detail/368419
https://news.caijingmobile.com/article/detail/368419
一个新的蓝牙高危漏洞被发现,或影响数百万台设备
http://www.4hou.com/vulnerable/12763.html
http://www.4hou.com/vulnerable/12763.html
安全技术
Jenkins 任意文件读取漏洞复现与分析-CVE-2018-1999002
https://xz.aliyun.com/t/2486
https://xz.aliyun.com/t/2486
首个Spark REST API未授权漏洞利用分析
https://xz.aliyun.com/t/2490
https://xz.aliyun.com/t/2490
U2C:Unicode转中文的Burp Suite插件
http://www.polaris-lab.com/index.php/archives/556/
http://www.polaris-lab.com/index.php/archives/556/
摄像头漏洞挖掘入门教程(固件篇)
https://paper.seebug.org/649/
https://paper.seebug.org/649/
WebShell下的交互式Shell
http://blog.evalbug.com/2018/07/25/antsword_prompt_shell/
http://blog.evalbug.com/2018/07/25/antsword_prompt_shell/
gosec: Golang security checker
https://github.com/securego/gosec?from=timeline
https://github.com/securego/gosec?from=timeline
OneThink1.0文件缓存漏洞分析及题目复现
https://www.anquanke.com/post/id/152584
https://www.anquanke.com/post/id/152584
Android Native Hook工具实践
https://mp.weixin.qq.com/s/iAEN9dDvdWwxc7-aYgmMVQ
https://mp.weixin.qq.com/s/iAEN9dDvdWwxc7-aYgmMVQ
Oracle Privilege Escalation via Deserialization
http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html
http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html
代码审计Day3 - 实例化任意对象漏洞
https://xz.aliyun.com/t/2459
https://xz.aliyun.com/t/2459
利用DOCX文档远程模板注入执行宏
https://xz.aliyun.com/t/2496
https://xz.aliyun.com/t/2496
nday漏洞还原分析之dedecms后台getshell
https://xz.aliyun.com/t/2470
https://xz.aliyun.com/t/2470
py2neo使用指南
http://foreversong.cn/archives/1271
http://foreversong.cn/archives/1271
Gartner 2018年大中华区CIO峰会PPT资料汇总
https://pan.baidu.com/s/1kCD-K2sh4VWOu8fLqBuRRA
https://pan.baidu.com/s/1kCD-K2sh4VWOu8fLqBuRRA
2018年上半年国内公有云云上资产合规现状报告
https://www.sohu.com/a/243849172_100109628
https://www.sohu.com/a/243849172_100109628
Apache Shiro 1.2.4反序列化漏洞分析
http://www.freebuf.com/vuls/178014.html
http://www.freebuf.com/vuls/178014.html
代码审计Day4 - strpos使用不当引发漏洞
https://xz.aliyun.com/t/2467
https://xz.aliyun.com/t/2467
聚合和记录各种SQL注入方法的WIKI
http://sqlwiki.radare.cn/#/
http://sqlwiki.radare.cn/#/
x86_64逆向工程简介
https://xz.aliyun.com/t/2487
https://xz.aliyun.com/t/2487
Windows Forensics: Event Trace Logs
https://www.sans.org/summit-archives/file/summit-archive-1528388048.pdf
https://www.sans.org/summit-archives/file/summit-archive-1528388048.pdf
VulDeePecker:基于深度学习的漏洞检测系统
http://www.arkteam.net/?p=3928
http://www.arkteam.net/?p=3928
2018自然语言处理研究报告
https://pan.baidu.com/s/1TP5eYop2Iz4M7PDfEhKC_A
https://pan.baidu.com/s/1TP5eYop2Iz4M7PDfEhKC_A
自然语言处理顶会 ACL 2018 参会见闻
https://mp.weixin.qq.com/s/7IJDHvSLtNBxFRE8t9suyQ
https://mp.weixin.qq.com/s/7IJDHvSLtNBxFRE8t9suyQ
SharkApktool 源码攻略
https://bbs.ichunqiu.com/thread-43219-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-43219-1-1.html?from=sec
PHP-Audit-Labs题解之Day1-4
https://xz.aliyun.com/t/2491
https://xz.aliyun.com/t/2491
2018网络技术通识公开课合集&夺命作业题
https://mp.weixin.qq.com/s/nFdq45k344JdEvy1T1tvgg
https://mp.weixin.qq.com/s/nFdq45k344JdEvy1T1tvgg
APT-C-35组织(肚脑虫)的最新攻击活动分析
https://ti.360.net/blog/articles/latest-activity-of-apt-c-35/
https://ti.360.net/blog/articles/latest-activity-of-apt-c-35/
cisco-hostscan-bypass
https://gilks.github.io/post/cisco-hostscan-bypass/
https://gilks.github.io/post/cisco-hostscan-bypass/
渗透测试工具备忘录
https://xz.aliyun.com/t/2482
https://xz.aliyun.com/t/2482
一文读懂复杂网络(应用、模型和研究历史)
https://mp.weixin.qq.com/s/M21P3uC__yg7iVVIxsDEVw
https://mp.weixin.qq.com/s/M21P3uC__yg7iVVIxsDEVw
Hack 虚拟内存系列(二):Python 字节对象
https://xz.aliyun.com/t/2495
https://xz.aliyun.com/t/2495
StartupInfo: Autoruns served up on a plate
https://medium.com/dfir-dudes/startupinfo-autoruns-served-up-on-a-plate-ba2da0c753c5
https://medium.com/dfir-dudes/startupinfo-autoruns-served-up-on-a-plate-ba2da0c753c5
从Chrome源码看JavaScript的执行(上)
https://xz.aliyun.com/t/2480
https://xz.aliyun.com/t/2480
蓝宝菇(APT-C-12)最新攻击样本及C&C机制分析
https://ti.360.net/blog/articles/latest-sample-and-c2-mechanism-of-apt-c-12/
https://ti.360.net/blog/articles/latest-sample-and-c2-mechanism-of-apt-c-12/
多个疑似“摩诃草”团伙来源定向攻击的关联分析
https://ti.360.net/blog/articles/analysis-of-targeted-attacks-suspected-of-patchover/
https://ti.360.net/blog/articles/analysis-of-targeted-attacks-suspected-of-patchover/
从几道CTF题看SOAP安全问题
https://www.anquanke.com/post/id/153065
https://www.anquanke.com/post/id/153065
某连锁医疗机构SQL Server服务器遭黑客入侵事件分析
https://weibo.com/ttarticle/p/show?id=2309404264914922394994#_0
https://weibo.com/ttarticle/p/show?id=2309404264914922394994#_0
Android逆向工具:非通常方法
https://xz.aliyun.com/t/2481
https://xz.aliyun.com/t/2481
GeekPwn数据追踪挑战赛
https://dt.geekpwn.org/
https://dt.geekpwn.org/
Window应急响应(一):FTP暴力破解
https://mp.weixin.qq.com/s/ZUJ87wWbzccw_zSRADfCVg
https://mp.weixin.qq.com/s/ZUJ87wWbzccw_zSRADfCVg
北京某手游公司官网配置不当被黑溯源
https://weibo.com/ttarticle/p/show?id=2309404265677614648992#_0
https://weibo.com/ttarticle/p/show?id=2309404265677614648992#_0
Open source tools for AWS security: defensive, offensive, auditing, DFIR
https://github.com/toniblyx/my-arsenal-of-aws-security-tools
https://github.com/toniblyx/my-arsenal-of-aws-security-tools
安全资产管理中容易被忽视的几点
https://mp.weixin.qq.com/s/klsIz9bOMIIsMjCqQixxKw
https://mp.weixin.qq.com/s/klsIz9bOMIIsMjCqQixxKw
Links for the OSINT Team
https://github.com/IVMachiavelli/OSINT_Team_Links
https://github.com/IVMachiavelli/OSINT_Team_Links
基于Golang打造开源的WAF网关
http://www.freebuf.com/articles/web/178308.html
http://www.freebuf.com/articles/web/178308.html
以百度贴吧为典型的社交网络隐私主动泄露分析
http://www.freebuf.com/articles/neopoints/178013.html
http://www.freebuf.com/articles/neopoints/178013.html
Reverse-Engineering-Malware-Part-4-Windows-Internals
https://www.hackers-arise.com/single-post/2017/07/04/Reverse-Engineering-Malware-Part-4-Windows-Internals
https://www.hackers-arise.com/single-post/2017/07/04/Reverse-Engineering-Malware-Part-4-Windows-Internals
解析深度学习在NLP中的发展和应用
https://mp.weixin.qq.com/s/IA0kPncWRVx0JBQXvJLY6w
https://mp.weixin.qq.com/s/IA0kPncWRVx0JBQXvJLY6w
SecWiki周刊(第229期)
https://www.sec-wiki.com/weekly/229
https://www.sec-wiki.com/weekly/229
卡巴斯基:2018 Q2 DDoS攻击报告
https://mp.weixin.qq.com/s/F-S0bVHxNzanNt35PQhcAw
https://mp.weixin.qq.com/s/F-S0bVHxNzanNt35PQhcAw
如何迅速成长成为一名数据分析师
https://www.zhihu.com/question/22750704
https://www.zhihu.com/question/22750704
读书笔记:事件响应和IOC
https://mp.weixin.qq.com/s/QwrZCPhhrikhqJOS84HkIw
https://mp.weixin.qq.com/s/QwrZCPhhrikhqJOS84HkIw
Microsoft Office Vulnerabilities Used to Distribute FELIXROOT Backdoor in Recent
https://www.fireeye.com/blog/threat-research/2018/07/microsoft-office-vulnerabilities-used-to-distribute-felixroot-backdoor.html
https://www.fireeye.com/blog/threat-research/2018/07/microsoft-office-vulnerabilities-used-to-distribute-felixroot-backdoor.html
首个区块链 token 的自动化薅羊毛攻击分析
https://paper.seebug.org/646/
https://paper.seebug.org/646/
ThreatHunter-Playbook
https://github.com/Cyb3rWard0g/ThreatHunter-Playbook
https://github.com/Cyb3rWard0g/ThreatHunter-Playbook
Decrypting the LockCrypt Ransomware
https://researchcenter.paloaltonetworks.com/2018/07/unit42-decrypting-lockcrypt-ransomware/
https://researchcenter.paloaltonetworks.com/2018/07/unit42-decrypting-lockcrypt-ransomware/
从Chrome源码看JavaScript的执行(下)
https://xz.aliyun.com/t/2488
https://xz.aliyun.com/t/2488
Dynamic Binary Instrumentation Primer
http://deniable.org/reversing/binary-instrumentation
http://deniable.org/reversing/binary-instrumentation
用户认证模块安全设计
https://xz.aliyun.com/t/2464
https://xz.aliyun.com/t/2464
beyond-good-ol-run-key-part-82
http://www.hexacorn.com/blog/2018/07/29/beyond-good-ol-run-key-part-82/
http://www.hexacorn.com/blog/2018/07/29/beyond-good-ol-run-key-part-82/
安全开发之 token 那些事
https://mp.weixin.qq.com/s/iOn0SvVlF1Qj_4Jo9nknDw
https://mp.weixin.qq.com/s/iOn0SvVlF1Qj_4Jo9nknDw
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第230期)
