SecWiki周刊(第235期)
2018/08/27-2018/09/02
安全资讯
packagist.org存在远程执行代码,数十万PHP包可能受影响
https://nosec.org/home/detail/1767.html
https://nosec.org/home/detail/1767.html
安全技术
黑客学习资源汇总-渗透测试项目学习资料
http://www.ddosi.com/2018/09/01/00/
http://www.ddosi.com/2018/09/01/00/
Microsoft Windows Zero-Day Found in Task Scheduler (local privilege escalation)
https://threatpost.com/microsoft-windows-zero-day-found-in-task-scheduler/136977/
https://threatpost.com/microsoft-windows-zero-day-found-in-task-scheduler/136977/
VULNSPY实验-ECShop <= 2.7.x 全系列版本远程代码执行高危漏洞利用
http://www.vulnspy.com/cn-ecshop-2.7.x-rce-exploit/ecshop_%3C=_2.7.x_%E5%85%A8%E7%B3%BB%E5%88%97%E7%89%88%E6%9C%AC%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E9%AB%98%E5%8D%B1%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8/
http://www.vulnspy.com/cn-ecshop-2.7.x-rce-exploit/ecshop_%3C=_2.7.x_%E5%85%A8%E7%B3%BB%E5%88%97%E7%89%88%E6%9C%AC%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E9%AB%98%E5%8D%B1%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8/
RIPS 2017 PHP代码安全审计挑战在线测试环境/WRITEUP
http://www.vulnspy.com/cn-ripstech-presents-php-security-calendar-2017/rips_2017_php%E4%BB%A3%E7%A0%81%E5%AE%89%E5%85%A8%E5%AE%A1%E8%AE%A1%E6%8C%91%E6%88%98%E5%9C%A8%E7%BA%BF%E6%B5%8B%E8%AF%95%E7%8E%AF%E5%A2%83/writeup
http://www.vulnspy.com/cn-ripstech-presents-php-security-calendar-2017/rips_2017_php%E4%BB%A3%E7%A0%81%E5%AE%89%E5%85%A8%E5%AE%A1%E8%AE%A1%E6%8C%91%E6%88%98%E5%9C%A8%E7%BA%BF%E6%B5%8B%E8%AF%95%E7%8E%AF%E5%A2%83/writeup
2018 网络安全分析与情报大会PPT
https://threatbook.cn/event/2018#agenda
https://threatbook.cn/event/2018#agenda
w11scan 分布式指纹识别平台
https://github.com/boy-hack/w11scan
https://github.com/boy-hack/w11scan
使用XSSI攻击获取敏感信息
https://mp.weixin.qq.com/s/bP2pRgrTsQtJfIh5fhlpRA
https://mp.weixin.qq.com/s/bP2pRgrTsQtJfIh5fhlpRA
CVE-2017-8295: WORDPRESS 2.3-4.8.3 任意密码重置/HOST头注入漏洞利用
http://www.vulnspy.com/cn-cve-2017-8295-unauthorized-password-reset-vulnerability/cve-2017-8295:_wordpress_2.3-4.8.3_%E4%BB%BB%E6%84%8F%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE/host%E5%A4%B4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8
http://www.vulnspy.com/cn-cve-2017-8295-unauthorized-password-reset-vulnerability/cve-2017-8295:_wordpress_2.3-4.8.3_%E4%BB%BB%E6%84%8F%E5%AF%86%E7%A0%81%E9%87%8D%E7%BD%AE/host%E5%A4%B4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8
华芸科技ASUSTOR ADM操作系统最新高危漏洞分析
https://nosec.org/home/detail/1768.html
https://nosec.org/home/detail/1768.html
CVE-2018-6389: WORDPRESS <= 4.9.X 拒绝服务(DOS)漏洞利用
http://www.vulnspy.com/cn-cve-2018-6389-wordpress-denial-of-service-dos-vulnerability/cve-2018-6389:_wordpress_%3C=_4.9.x_%E6%8B%92%E7%BB%9D%E6%9C%8D%E5%8A%A1(dos)%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8
http://www.vulnspy.com/cn-cve-2018-6389-wordpress-denial-of-service-dos-vulnerability/cve-2018-6389:_wordpress_%3C=_4.9.x_%E6%8B%92%E7%BB%9D%E6%9C%8D%E5%8A%A1(dos)%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8
利用GIXY发现错误的Nginx配置
https://xz.aliyun.com/t/2692
https://xz.aliyun.com/t/2692
ThinkPHP 3.X/5.X order by注入漏洞
https://mp.weixin.qq.com/s/jDvOif0OByWkUNLv0CAs7w
https://mp.weixin.qq.com/s/jDvOif0OByWkUNLv0CAs7w
关于WordPressSecurity的几点注意事项
https://xz.aliyun.com/t/2643
https://xz.aliyun.com/t/2643
ysoserial JRMP相关模块分析(二)- payloads/JRMPClient & exploit/JRMPListener
https://xz.aliyun.com/t/2650
https://xz.aliyun.com/t/2650
KCon 2018 议题解读:智能家居安全——身份劫持
https://paper.seebug.org/690/
https://paper.seebug.org/690/
KCon 2018 议题解读:Python 动态代码审计
https://paper.seebug.org/689/
https://paper.seebug.org/689/
web安全Wargame—Natas解题思路(1-26)
https://bbs.ichunqiu.com/thread-45064-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-45064-1-1.html?from=sec
MetInfo任意文件读取漏洞的修复与绕过
http://www.freebuf.com/vuls/181698.html
http://www.freebuf.com/vuls/181698.html
AntSword2 安装指南
https://mp.weixin.qq.com/s/IezN9aYCn51t1ZQ7wX3X3Q
https://mp.weixin.qq.com/s/IezN9aYCn51t1ZQ7wX3X3Q
巅峰极客线上第二场-writeup
https://blog.csdn.net/like98k/article/details/82084149
https://blog.csdn.net/like98k/article/details/82084149
Two Birds, One STONE PANDA
https://www.crowdstrike.com/blog/two-birds-one-stone-panda/
https://www.crowdstrike.com/blog/two-birds-one-stone-panda/
Web Application Firewall or API Gateway(应用防火墙/API网关)
https://github.com/chengdedeng/waf
https://github.com/chengdedeng/waf
(slide)-OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
https://www.slideshare.net/fransrosen/attacking-modern-web-technologies
https://www.slideshare.net/fransrosen/attacking-modern-web-technologies
网鼎杯第四场Some Web Writeup
https://www.cnblogs.com/iamstudy/articles/wangding_4th_game_web_writeup.html
https://www.cnblogs.com/iamstudy/articles/wangding_4th_game_web_writeup.html
Linux pwn入门教程(10)——针对函数重定位流程的几种攻击
https://bbs.ichunqiu.com/thread-44816-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-44816-1-1.html?from=sec
JAVA代码审计 | 因酷网校在线教育系统
https://xz.aliyun.com/t/2646
https://xz.aliyun.com/t/2646
符号执行——从入门到上高速
https://www.anquanke.com/post/id/157928
https://www.anquanke.com/post/id/157928
ysoserial JRMP相关模块分析(三)- exploit/JRMPClient
https://xz.aliyun.com/t/2651
https://xz.aliyun.com/t/2651
互联网公司移动安全领域的探索与实践
https://mp.weixin.qq.com/s/5whLNkfSUpW6zQNxQf7HqQ
https://mp.weixin.qq.com/s/5whLNkfSUpW6zQNxQf7HqQ
极客巅峰第二场wp
https://xz.aliyun.com/t/2655
https://xz.aliyun.com/t/2655
软件供应链安全大赛·PE二进制赛季启示录:上篇
https://xz.aliyun.com/t/2677
https://xz.aliyun.com/t/2677
Vulnhub-Lampião: 1 通关指南
https://xz.aliyun.com/t/2647
https://xz.aliyun.com/t/2647
从编译器优化到代码执行:深入剖析VirtualBox VM 逃逸漏洞(CVE-2018-2844)
https://xz.aliyun.com/t/2658
https://xz.aliyun.com/t/2658
2018年 KCon 议题解读 | 智能家居安全——身份劫持
https://xz.aliyun.com/t/2664
https://xz.aliyun.com/t/2664
Android逆向之静态分析
https://bbs.ichunqiu.com/thread-44996-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-44996-1-1.html?from=sec
动态调试|Maccms SQL 注入分析(附注入盲注脚本)
https://bbs.ichunqiu.com/thread-44907-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-44907-1-1.html?from=sec
EDR软件如何使用机器学习的方法检测恶意软件
http://www.4hou.com/technology/13283.html
http://www.4hou.com/technology/13283.html
让Docker更强大的9个安全开源工具
https://mp.weixin.qq.com/s/e51KpBltxRd8Qk-VRj6EhQ
https://mp.weixin.qq.com/s/e51KpBltxRd8Qk-VRj6EhQ
SecWiki周刊(第234期)
https://www.sec-wiki.com/weekly/234
https://www.sec-wiki.com/weekly/234
用Docker制作一个高交互ssh蜜罐
https://www.xsec.io/2018/8/28/Diy-A-High-Interactivity-SSH-HoneyPot-With-Docker.html
https://www.xsec.io/2018/8/28/Diy-A-High-Interactivity-SSH-HoneyPot-With-Docker.html
2018年 KCon 议题解读 | python动态代码审计
https://xz.aliyun.com/t/2669
https://xz.aliyun.com/t/2669
GandCrabV4.3详细分析报告
https://xz.aliyun.com/t/2685
https://xz.aliyun.com/t/2685
2018 不容错过的威胁情报汇总
https://mp.weixin.qq.com/s/b6Wv4RPvF4ULNP3plM3EVg
https://mp.weixin.qq.com/s/b6Wv4RPvF4ULNP3plM3EVg
技术报告:绕过工作流保护机制 - SharePoint远程代码执行
https://xz.aliyun.com/t/2690
https://xz.aliyun.com/t/2690
AntSword2 安装指南
https://mp.weixin.qq.com/mp/profile_ext?action=home&__biz=MzI0MDI5MTQ3OQ==&scene=124#wechat_redirect
https://mp.weixin.qq.com/mp/profile_ext?action=home&__biz=MzI0MDI5MTQ3OQ==&scene=124#wechat_redirect
h1-212 CTF Writeup
https://www.skeletonscribe.net/2017/11/h1-212-ctf-writeup.html
https://www.skeletonscribe.net/2017/11/h1-212-ctf-writeup.html
Free threat intelligence feeds
https://threatfeeds.io/
https://threatfeeds.io/
Grep Extractor a Burp Extender
https://cornerpirate.com/2018/07/24/grep-extractor-a-burp-extender/amp/
https://cornerpirate.com/2018/07/24/grep-extractor-a-burp-extender/amp/
ysoserial JRMP相关模块分析(一)- payloads/JRMPListener
https://xz.aliyun.com/t/2649
https://xz.aliyun.com/t/2649
VulScan: 漏洞扫描:st2、tomcat、未授权访问等
https://github.com/SkewwG/VulScan
https://github.com/SkewwG/VulScan
upload-labs之pass 16详细分析
https://xz.aliyun.com/t/2657
https://xz.aliyun.com/t/2657
JoomScan:一款开源的OWASP Joomla漏洞扫描器
http://www.freebuf.com/sectool/181440.html
http://www.freebuf.com/sectool/181440.html
Analyzing and Exploiting an Elevation of Privilege Vulnerability in Docker
https://srcincite.io/blog/2018/08/31/you-cant-contain-me-analyzing-and-exploiting-an-elevation-of-privilege-in-docker-for-windows.html
https://srcincite.io/blog/2018/08/31/you-cant-contain-me-analyzing-and-exploiting-an-elevation-of-privilege-in-docker-for-windows.html
组合拳出击-Self型XSS变废为宝
https://bbs.ichunqiu.com/thread-45019-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-45019-1-1.html?from=sec
Subdomain Takeover: Going beyond CNAME
https://0xpatrik.com/subdomain-takeover-ns/
https://0xpatrik.com/subdomain-takeover-ns/
软件供应链安全大赛·PE二进制赛季启示录:下篇
https://xz.aliyun.com/t/2679
https://xz.aliyun.com/t/2679
Empowering red and blue teams with osint c0c0n 2017
https://www.slideshare.net/reconvillage/empowering-red-and-blue-teams-with-osint-c0c0n-2017
https://www.slideshare.net/reconvillage/empowering-red-and-blue-teams-with-osint-c0c0n-2017
cyberprobe: Capturing, analysing and responding to cyber attacks
https://github.com/cybermaggedon/cyberprobe
https://github.com/cybermaggedon/cyberprobe
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第235期)
