SecWiki周刊(第252期)
2018/12/24-2018/12/30
安全资讯
网络空间测绘系列——2018年摄像头安全报告
https://nosec.org/home/detail/2113.html
https://nosec.org/home/detail/2113.html
美国“网络风暴”系列演习相关情况概览及分析
https://mp.weixin.qq.com/s/3LRykJe6OGEdMYIT-lswug
https://mp.weixin.qq.com/s/3LRykJe6OGEdMYIT-lswug
一文看尽2018全年AI技术大突破
https://mp.weixin.qq.com/s/gFGm_OcjpW8Z2LkzbX44Dg
https://mp.weixin.qq.com/s/gFGm_OcjpW8Z2LkzbX44Dg
以色列神秘8200“军工厂”和它孵化的37家安全公司(上篇)
https://mp.weixin.qq.com/s/F6kmHw1x9GELXN7bgTOIHw
https://mp.weixin.qq.com/s/F6kmHw1x9GELXN7bgTOIHw
安全技术
推荐今年C3黑客大会上的几个议题
https://mp.weixin.qq.com/s/qFh47YY-JJIMUrJXUKfNAQ
https://mp.weixin.qq.com/s/qFh47YY-JJIMUrJXUKfNAQ
深入理解JNDI注入与Java反序列化漏洞利用
https://kingx.me/Exploit-Java-Deserialization-with-RMI.html
https://kingx.me/Exploit-Java-Deserialization-with-RMI.html
社工模拟——利用BadUSB穿透3层内网
https://mp.weixin.qq.com/s/LxIgWu8pmNArFU1gOUMWJw
https://mp.weixin.qq.com/s/LxIgWu8pmNArFU1gOUMWJw
Hacking-With-Golang: Golang安全资源合集
https://github.com/re4lity/Hacking-With-Golang
https://github.com/re4lity/Hacking-With-Golang
PrestaShop 后台远程代码执行漏洞分析 (CVE-2018-19126)
https://kylingit.com/blog/prestashop%E5%90%8E%E5%8F%B0%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90cve-2018-19126/
https://kylingit.com/blog/prestashop%E5%90%8E%E5%8F%B0%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90cve-2018-19126/
IoT安全wiki
https://iotsecuritywiki.com/
https://iotsecuritywiki.com/
渗透体系的本质是知识点的串联
https://mp.weixin.qq.com/s/pvApvjn6gwTiQFyRjaKCaA
https://mp.weixin.qq.com/s/pvApvjn6gwTiQFyRjaKCaA
用机器学习进行恶意软件检测—以阿里云恶意软件检测比赛为例
https://xz.aliyun.com/t/3704
https://xz.aliyun.com/t/3704
如何使用 KittyFuzzer 结合 ISF 中的工控协议组件对工控协议进行 Fuzz
https://paper.seebug.org/772/
https://paper.seebug.org/772/
NAUTILUS: Fishing for Deep Bugs with Grammars
https://www.syssec.ruhr-uni-bochum.de/media/emma/veroeffentlichungen/2018/12/17/NDSS19-Nautilus.pdf
https://www.syssec.ruhr-uni-bochum.de/media/emma/veroeffentlichungen/2018/12/17/NDSS19-Nautilus.pdf
AgentSmith HIDS:一套轻量级的HIDS系统
https://mp.weixin.qq.com/s/4saEV6fWimqfII2_7PUQ8Q
https://mp.weixin.qq.com/s/4saEV6fWimqfII2_7PUQ8Q
复杂网络在风控领域中的应用
https://zhuanlan.zhihu.com/p/51987280
https://zhuanlan.zhihu.com/p/51987280
应急响应的整体思路和基本流程
https://mp.weixin.qq.com/s/s0Rvlzrwx6uW_Po5AcusnQ
https://mp.weixin.qq.com/s/s0Rvlzrwx6uW_Po5AcusnQ
深入Exchange Server在网络渗透下的利用方法
https://www.freebuf.com/articles/web/193132.html
https://www.freebuf.com/articles/web/193132.html
APT相关活动思路和技术提炼
https://mp.weixin.qq.com/s/Ni3dscLJBrVsW5jR5OySdA
https://mp.weixin.qq.com/s/Ni3dscLJBrVsW5jR5OySdA
开源堡垒机jumpserver
https://bloodzer0.github.io/ossa/infrastructure-security/host-security/fortress-machine/jumpserver/
https://bloodzer0.github.io/ossa/infrastructure-security/host-security/fortress-machine/jumpserver/
Nuxeo 认证绕过和RCE漏洞(CVE-2018-16341)分析
https://mp.weixin.qq.com/s/3luD0uRGYINm3f56df9UYQ
https://mp.weixin.qq.com/s/3luD0uRGYINm3f56df9UYQ
web-log-parser: web日志分析工具
https://github.com/JeffXue/web-log-parser
https://github.com/JeffXue/web-log-parser
黄金鼠APT-C-27 移动攻击活动披露
https://cert.360.cn/report/detail?id=c93160906938b601c2abdbeaf22c2204
https://cert.360.cn/report/detail?id=c93160906938b601c2abdbeaf22c2204
某 cms v4.2.126-通杀SQL注入
https://xz.aliyun.com/t/3714
https://xz.aliyun.com/t/3714
安全学术圈2018年度总结
https://mp.weixin.qq.com/s/eQ5os0Fdb498BoQLKUDmrA
https://mp.weixin.qq.com/s/eQ5os0Fdb498BoQLKUDmrA
针对 Windows 事件跟踪日志篡改的攻防研究
https://www.anquanke.com/post/id/168733
https://www.anquanke.com/post/id/168733
基于Linux开源身份认证体系FreeIPA
https://bloodzer0.github.io/ossa/other-security-branch/identity-and-access-security/freeipa/
https://bloodzer0.github.io/ossa/other-security-branch/identity-and-access-security/freeipa/
homemade-machine-learning: 机器学习入门资料
https://github.com/trekhleb/homemade-machine-learning
https://github.com/trekhleb/homemade-machine-learning
LinuxCheck: linux信息搜集脚本
https://github.com/al0ne/LinuxCheck?from=timeline
https://github.com/al0ne/LinuxCheck?from=timeline
Detecting Use of SandboxEscaper’s “MsiAdvertiseProduct” 0-day PoC
https://www.i-secure.co.th/2018/12/detecting-use-sandboxescapers-msiadvertiseproduct-0-day-poc/
https://www.i-secure.co.th/2018/12/detecting-use-sandboxescapers-msiadvertiseproduct-0-day-poc/
代码审计之如何找到phpcms的代码执行漏洞
https://nosec.org/home/detail/2120.html
https://nosec.org/home/detail/2120.html
渗透测试实战-ROP靶机PWN+SolidState靶机入侵
https://www.anquanke.com/post/id/168739
https://www.anquanke.com/post/id/168739
使用RouterSploit控制路由器
https://xz.aliyun.com/t/3664
https://xz.aliyun.com/t/3664
针对韩国长达5年的跨境网络电信诈骗
https://www.anquanke.com/post/id/168621
https://www.anquanke.com/post/id/168621
“美国华盛顿哥伦比亚特区诉Facebook“起诉书全文翻译
https://pan.baidu.com/s/1q15TlWuaCE68gnJ3kHmqog
https://pan.baidu.com/s/1q15TlWuaCE68gnJ3kHmqog
rwctf2018-magic-tunnel
https://zaratec.github.io/2018/12/20/rwctf2018-magic-tunnel/
https://zaratec.github.io/2018/12/20/rwctf2018-magic-tunnel/
便携式路由器的安全性研究
https://xz.aliyun.com/t/3732
https://xz.aliyun.com/t/3732
osquery 操作系统检测与分析
https://bloodzer0.github.io/ossa/infrastructure-security/host-security/ids-ips/osquery/
https://bloodzer0.github.io/ossa/infrastructure-security/host-security/ids-ips/osquery/
利用Web应用中隐藏的文件夹和文件获取敏感信息
https://xz.aliyun.com/t/3677
https://xz.aliyun.com/t/3677
如何绕过代码过滤和WAF规则远程执行PHP代码
https://nosec.org/home/detail/2108.html
https://nosec.org/home/detail/2108.html
Übersicht的远程命令执行漏洞和能接管Spotify的漏洞--关于本地web服务的安全
https://xz.aliyun.com/t/3707
https://xz.aliyun.com/t/3707
最近比较重要的GAN进展论文
https://kexue.fm/archives/6240
https://kexue.fm/archives/6240
Awesome Source Code Analysis Via Machine Learning Techniques
https://github.com/tthtlc/awesome-source-analysis
https://github.com/tthtlc/awesome-source-analysis
关键信息基础设施安全态势感知技术发展研究报告
https://mp.weixin.qq.com/s/aSEPR-VEs2684yaPOzVZ0g
https://mp.weixin.qq.com/s/aSEPR-VEs2684yaPOzVZ0g
#DFIR: "UserNotPresent", When does Windows understand that the user is not prese
https://unminioncurioso.blogspot.com/2018/12/dfir-usernotpresent-when-does-windows.html
https://unminioncurioso.blogspot.com/2018/12/dfir-usernotpresent-when-does-windows.html
安全工具 WAF绕过技术系列文章(一)
https://nosec.org/home/detail/2112.html
https://nosec.org/home/detail/2112.html
新手向—IO_file全流程浅析
https://www.anquanke.com/post/id/168802
https://www.anquanke.com/post/id/168802
三种解密 HTTPS 流量的方法介绍
https://imququ.com/post/how-to-decrypt-https.html
https://imququ.com/post/how-to-decrypt-https.html
2018 海南省大学生网络安全攻防竞赛部分 WriteUp
https://www.anquanke.com/post/id/168480
https://www.anquanke.com/post/id/168480
XIAO CMS审计
https://xz.aliyun.com/t/3690
https://xz.aliyun.com/t/3690
empirecms最新版(v7.5)后台多处getshell分析
https://xz.aliyun.com/t/3667
https://xz.aliyun.com/t/3667
浅谈BeyondCorp(二)-标准化是办公网安全的基石
https://mp.weixin.qq.com/s/IJoJCERxSEj7ImXt97F_uA
https://mp.weixin.qq.com/s/IJoJCERxSEj7ImXt97F_uA
数据驱动安全方法论浅谈
https://xz.aliyun.com/t/3695
https://xz.aliyun.com/t/3695
iOS URL Schemes与漏洞的碰撞组合
https://www.secpulse.com/archives/93784.html
https://www.secpulse.com/archives/93784.html
SCI-HUB客户端-文献神器下载
http://www.9312.net/download.html
http://www.9312.net/download.html
unpacking-grey-energy-malware
https://dexters-lab.net/2018/12/17/unpacking-grey-energy-malware/
https://dexters-lab.net/2018/12/17/unpacking-grey-energy-malware/
References for CTI-EU 2018
https://github.com/sfakiana/CTI-EU-2018
https://github.com/sfakiana/CTI-EU-2018
军备竞赛:DDoS攻击防护体系构建
https://security.tencent.com/index.php/blog/msg/128
https://security.tencent.com/index.php/blog/msg/128
如何使用刻录软件进行持久化攻击
https://nosec.org/home/detail/2114.html
https://nosec.org/home/detail/2114.html
区块链亡灵军团(Undead Armies of Blockchain)议题
https://mp.weixin.qq.com/s/P3RRdkT0X6bR--JWb0yWzA
https://mp.weixin.qq.com/s/P3RRdkT0X6bR--JWb0yWzA
FIT 2019 企业安全俱乐部全议题
https://www.freebuf.com/fevents/192855.html
https://www.freebuf.com/fevents/192855.html
简单实现MySQL数据库的日志审计
https://www.freebuf.com/articles/es/192062.html
https://www.freebuf.com/articles/es/192062.html
macro-malware-again
https://www.cyberfox.blog/macro-malware-again/
https://www.cyberfox.blog/macro-malware-again/
现代隐私权:“社交网络与机器学习模式”案例研究
https://www.inforsec.org/talk_thu.pdf
https://www.inforsec.org/talk_thu.pdf
S&P 2019 (三) 其余议题速览
https://mp.weixin.qq.com/s/-qfhDDrH5kDSjHl-73xDJA
https://mp.weixin.qq.com/s/-qfhDDrH5kDSjHl-73xDJA
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第252期)
