SecWiki周刊(第234期)
2018/08/20-2018/08/26
安全资讯
Chinese Cyberespionage Originating From Tsinghua University Infrastructure
https://www.recordedfuture.com/chinese-cyberespionage-operations/
https://www.recordedfuture.com/chinese-cyberespionage-operations/
第四届GoSSIP安全暑期学校小记
https://zhuanlan.zhihu.com/p/42121989
https://zhuanlan.zhihu.com/p/42121989
千名西澳大利亚公务员用 password123 作为密码
https://www.solidot.org/story?sid=57701
https://www.solidot.org/story?sid=57701
最全面的大数据安全领域标准法规
https://mp.weixin.qq.com/s/Lpr8BJ-tUsjfJ0xuYOL_gw
https://mp.weixin.qq.com/s/Lpr8BJ-tUsjfJ0xuYOL_gw
2018年上半年短视频行业黑灰产研究报告
https://www.aqniu.com/tools-tech/37590.html
https://www.aqniu.com/tools-tech/37590.html
安恒张百川:藏剑入怀的网路游侠
https://mp.weixin.qq.com/s/yNwRk7W30refX234DKmI6Q
https://mp.weixin.qq.com/s/yNwRk7W30refX234DKmI6Q
阿里成立数据安全研究院 对抗黑灰产
https://tech.sina.com.cn/i/2018-08-21/doc-ihhzsnea2555066.shtml
https://tech.sina.com.cn/i/2018-08-21/doc-ihhzsnea2555066.shtml
安全技术
Struts2最新RCE漏洞S2-057(CVE-2018-11776)
https://nosec.org/home/detail/1755.html
https://nosec.org/home/detail/1755.html
ueGetshell.py: ueditor .net getshell漏洞检测工具
https://github.com/theLSA/ueditor-getshell
https://github.com/theLSA/ueditor-getshell
OpenSSH用户枚举漏洞:一探究竟
https://xz.aliyun.com/t/2623
https://xz.aliyun.com/t/2623
Pocsuite与Osprey(鱼鹰)框架解析
https://x.hacking8.com/?post=265
https://x.hacking8.com/?post=265
UEditor编辑器两个版本任意文件上传漏洞分析
http://www.freebuf.com/vuls/181814.html
http://www.freebuf.com/vuls/181814.html
burpsuite 2.0 beta 发布
https://portswigger.net/blog/burp-suite-2-0-beta-now-available
https://portswigger.net/blog/burp-suite-2-0-beta-now-available
漏洞聚焦:CVE-2016-5072
https://xz.aliyun.com/t/2638
https://xz.aliyun.com/t/2638
2018 网鼎杯 教育组 Pwn Babyheap 题解
https://xz.aliyun.com/t/2609
https://xz.aliyun.com/t/2609
沙箱逃逸 - Microsoft Office在MacOS上的应用
https://xz.aliyun.com/t/2600
https://xz.aliyun.com/t/2600
看我如何在30分钟内获得homebrew仓库的访问权限
https://xz.aliyun.com/t/2628
https://xz.aliyun.com/t/2628
ColdFusion再爆远程代码执行漏洞 CVE-2018-4939
https://xz.aliyun.com/t/2604
https://xz.aliyun.com/t/2604
2018网鼎杯-第二场-writeup
https://xz.aliyun.com/t/2614
https://xz.aliyun.com/t/2614
T-Pot 蜜罐的介绍及使用
https://imlonghao.com/53.html
https://imlonghao.com/53.html
通过Unquoted service Path进行Windows提权
https://xz.aliyun.com/t/2606
https://xz.aliyun.com/t/2606
Remote Code Execution Vulnerability in Apache Struts (CVE-2018-11776)
https://semmle.com/news/apache-struts-CVE-2018-11776
https://semmle.com/news/apache-struts-CVE-2018-11776
Web选手的AWD后渗透指南
http://momomoxiaoxi.com/ctf/2018/08/21/AWDbackdoor/
http://momomoxiaoxi.com/ctf/2018/08/21/AWDbackdoor/
董祎铖:建立企业安全应急响应“急救箱”
http://www.freebuf.com/articles/es/181260.html
http://www.freebuf.com/articles/es/181260.html
Every iOS security guide
https://github.com/0xmachos/iOS-Security-Guides
https://github.com/0xmachos/iOS-Security-Guides
Struts 2漏洞(CVE-2018-11776/S2-057)及可能攻击向量
https://www.anquanke.com/post/id/157397
https://www.anquanke.com/post/id/157397
Web CTF CheatSheet
https://github.com/w181496/Web-CTF-Cheatsheet
https://github.com/w181496/Web-CTF-Cheatsheet
Cobaltstrike和Armitage联动
http://www.freebuf.com/sectool/180395.html
http://www.freebuf.com/sectool/180395.html
Metinfo新版本6.1.0存在多个漏洞
https://nosec.org/home/detail/1740.html
https://nosec.org/home/detail/1740.html
机器学习在Windows RDP版本和后门检测上的应用
https://www.anquanke.com/post/id/157175
https://www.anquanke.com/post/id/157175
wam: Web App Monitor 应用更新细节监控
https://github.com/knownsec/wam?from=timeline
https://github.com/knownsec/wam?from=timeline
GraphQL安全指北
https://www.anquanke.com/post/id/156930
https://www.anquanke.com/post/id/156930
CVE-2018-11776: How to find 5 RCEs in Apache Struts with Semmle QL
https://lgtm.com/blog/apache_struts_CVE-2018-11776
https://lgtm.com/blog/apache_struts_CVE-2018-11776
GodGame漏洞原理以及黑客攻击手法分析
https://nosec.org/home/detail/1759.html
https://nosec.org/home/detail/1759.html
UEditor .net版本 getshell
https://www.jianshu.com/p/6dae608b617c
https://www.jianshu.com/p/6dae608b617c
近年APT组织常用的攻击漏洞
http://www.freebuf.com/vuls/175280.html
http://www.freebuf.com/vuls/175280.html
2018网络安全生态峰会区块链安全分论坛PPT
https://bcsec.org/index/detail/id/251/tag/2
https://bcsec.org/index/detail/id/251/tag/2
EvilOSX:一款功能强大的macOS远程管理工具(RAT)
http://www.freebuf.com/sectool/180668.html
http://www.freebuf.com/sectool/180668.html
反序列化工具链的自动发掘
http://www.arkteam.net/?p=4031
http://www.arkteam.net/?p=4031
深入了解Json Web Token之实战篇
http://www.freebuf.com/articles/web/181261.html
http://www.freebuf.com/articles/web/181261.html
于bugku中游荡意外得到关于CBC翻转攻击思路
https://bbs.ichunqiu.com/thread-44579-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-44579-1-1.html?from=sec
{黑掉这个盒子} \\ FluxCapacitor Write-Up
https://bbs.ichunqiu.com/thread-44534-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-44534-1-1.html?from=sec
Windows下反反调试技术汇总
http://www.freebuf.com/articles/others-articles/181085.html
http://www.freebuf.com/articles/others-articles/181085.html
2018WhiteHat-web-复盘
https://xz.aliyun.com/t/2599
https://xz.aliyun.com/t/2599
DOM XSS的三种常见案例介绍
http://www.4hou.com/technology/13217.html
http://www.4hou.com/technology/13217.html
匿名网络概述(Darknet)
https://www.findhao.net/easycoding/1803
https://www.findhao.net/easycoding/1803
威胁情报闭环—如何得到有用的情报然后追踪攻击者
https://zhuanlan.zhihu.com/p/42903832
https://zhuanlan.zhihu.com/p/42903832
SecWiki周刊(第233期)
https://www.sec-wiki.com/weekly/233
https://www.sec-wiki.com/weekly/233
[SecTrans-2]Stored XSS on Facebook
https://mp.weixin.qq.com/s/XHPnys5Iyyi9tm02fVrOTQ
https://mp.weixin.qq.com/s/XHPnys5Iyyi9tm02fVrOTQ
13万Mikrotik设备被植入CoinHive挖矿代码
https://nosec.org/home/detail/1748.html
https://nosec.org/home/detail/1748.html
Remote Code Execution on a Facebook server
https://blog.scrt.ch/2018/08/24/remote-code-execution-on-a-facebook-server/
https://blog.scrt.ch/2018/08/24/remote-code-execution-on-a-facebook-server/
利用ML&AI判定未知恶意程序
http://www.4hou.com/technology/13181.html
http://www.4hou.com/technology/13181.html
企业数据安全建设的经历与实践
https://mp.weixin.qq.com/s/ItvWWhC0iYOpG6nQ3WPfvg
https://mp.weixin.qq.com/s/ItvWWhC0iYOpG6nQ3WPfvg
arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe
https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe-3d9294bc5efb
https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe-3d9294bc5efb
LimeSDR 上手指南
https://future-sec.com/Limesdr-introduce.html
https://future-sec.com/Limesdr-introduce.html
InForSec区块链安全研讨会成功召开
https://mp.weixin.qq.com/s/t_HjrMeiVpfGS4m49HOllQ
https://mp.weixin.qq.com/s/t_HjrMeiVpfGS4m49HOllQ
rapid7 threat report 2018-q2
https://www.rapid7.com/globalassets/_pdfs/research/rapid7-threat-report-2018-q2.pdf
https://www.rapid7.com/globalassets/_pdfs/research/rapid7-threat-report-2018-q2.pdf
浅析xml之xinclude & xslt
https://www.anquanke.com/post/id/156227
https://www.anquanke.com/post/id/156227
reversing-and-patching-net-binaries-with-embedded-references
https://insinuator.net/2018/04/reversing-and-patching-net-binaries-with-embedded-references/
https://insinuator.net/2018/04/reversing-and-patching-net-binaries-with-embedded-references/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第234期)
