SecWiki周刊(第255期)
2019/01/14-2019/01/20
安全资讯
龙国东:从攻城狮到CEO的逆袭之路
https://mp.weixin.qq.com/s/Cbdqfsnh3TJ1RrkbN1RTjA
https://mp.weixin.qq.com/s/Cbdqfsnh3TJ1RrkbN1RTjA
壹进制:从系统还原到数据连续性保护
https://www.aqniu.com/news-views/42812.html
https://www.aqniu.com/news-views/42812.html
网络安全行业全景图(2019年1月)
https://mp.weixin.qq.com/s/gksuSM7S-MLZ5LFz6-kjdw
https://mp.weixin.qq.com/s/gksuSM7S-MLZ5LFz6-kjdw
2018年国内外信息泄露案例汇编
https://mp.weixin.qq.com/s/rJP5U8JvcadwGw6lT5zoCw
https://mp.weixin.qq.com/s/rJP5U8JvcadwGw6lT5zoCw
美海军成立新的网络战预备役部队
https://mp.weixin.qq.com/s/nGfZYv9iDkPdTZR3Nzktjg
https://mp.weixin.qq.com/s/nGfZYv9iDkPdTZR3Nzktjg
安全技术
利用JA3和JA3S实现TLS指纹识别
https://xz.aliyun.com/t/3889
https://xz.aliyun.com/t/3889
利用EXCEL文件进行XXE攻击的漏洞分析
https://mp.weixin.qq.com/s/pthuQFY9sQjxJOOQf91Weg
https://mp.weixin.qq.com/s/pthuQFY9sQjxJOOQf91Weg
利用分块传输吊打所有WAF
https://www.anquanke.com/post/id/169738
https://www.anquanke.com/post/id/169738
Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edi
https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa
https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa
banking-trojan-delivered-by-lolbins-ramnit-trojan
https://www.cybereason.com/blog/banking-trojan-delivered-by-lolbins-ramnit-trojan
https://www.cybereason.com/blog/banking-trojan-delivered-by-lolbins-ramnit-trojan
开源软件源代码安全缺陷分析报告—物联网软件专题
https://mp.weixin.qq.com/s/HFeOolCoyKz91sK1QdMg4w
https://mp.weixin.qq.com/s/HFeOolCoyKz91sK1QdMg4w
ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries
https://securitygossip.com/blog/2019/01/15/icsref-a-framework-for-automated-reverse-engineering-of-industrial-control-systems-binaries/
https://securitygossip.com/blog/2019/01/15/icsref-a-framework-for-automated-reverse-engineering-of-industrial-control-systems-binaries/
[下篇]从补丁diff到EXP--CVE-2018-8453漏洞分析与利用
https://mp.weixin.qq.com/s/dcbUeegM0BqErtDufOXfoQ
https://mp.weixin.qq.com/s/dcbUeegM0BqErtDufOXfoQ
CVE-2018-13024复现及一次简单的内网渗透
https://www.freebuf.com/news/193748.html
https://www.freebuf.com/news/193748.html
Golang二进制文件混淆保护
https://mp.weixin.qq.com/s/YbaM-_vs_D2BS1lV6Z-u4g
https://mp.weixin.qq.com/s/YbaM-_vs_D2BS1lV6Z-u4g
态势感知之Malware Callback
https://mp.weixin.qq.com/s/SUeWmscVVChulDqBacgyaQ
https://mp.weixin.qq.com/s/SUeWmscVVChulDqBacgyaQ
宜信分布式安全服务编排实践
https://mp.weixin.qq.com/s/6CT1WX3q3WzT1ewxiFQnnA
https://mp.weixin.qq.com/s/6CT1WX3q3WzT1ewxiFQnnA
ThinkPHP 5.0.0~5.0.23 RCE 漏洞分析
https://xz.aliyun.com/t/3845
https://xz.aliyun.com/t/3845
安全人员发展方向杂谈
https://zhuanlan.zhihu.com/p/54936058
https://zhuanlan.zhihu.com/p/54936058
Microsoft Malware Prediction Top 5%
https://xz.aliyun.com/t/3872
https://xz.aliyun.com/t/3872
小议 APT 攻击中的C2架构
https://zhuanlan.zhihu.com/p/54810155
https://zhuanlan.zhihu.com/p/54810155
美国DARPA“配置安全”项目分析
https://mp.weixin.qq.com/s/kkQqBZ-KV59Jg14V4P3zew
https://mp.weixin.qq.com/s/kkQqBZ-KV59Jg14V4P3zew
Hacking Jenkins Part 1 - Play with Dynamic Routing
https://devco.re/blog/2019/01/16/hacking-Jenkins-part1-play-with-dynamic-routing/
https://devco.re/blog/2019/01/16/hacking-Jenkins-part1-play-with-dynamic-routing/
2005-2017年国内科研单位在国际安全顶级会议中发表文章量统计
https://mp.weixin.qq.com/s/kd4S6hCE_GPpPGbp1aD5Jw
https://mp.weixin.qq.com/s/kd4S6hCE_GPpPGbp1aD5Jw
浅析OGNL的攻防史
https://www.anquanke.com/post/id/169735
https://www.anquanke.com/post/id/169735
关于MSF5一些你不得不知道的东西
https://xz.aliyun.com/t/3883
https://xz.aliyun.com/t/3883
APT调研掌握APT攻击活动动态
https://mp.weixin.qq.com/s/cG19BtE7V62CsoJsGbv72g
https://mp.weixin.qq.com/s/cG19BtE7V62CsoJsGbv72g
工业控制系统ICS联网情况及其变化趋势分析
https://zhuanlan.zhihu.com/p/54918427
https://zhuanlan.zhihu.com/p/54918427
2018年Windows服务器挖矿木马总结报告
https://mp.weixin.qq.com/s/tMp6fEKz24VansXlhH7v1g
https://mp.weixin.qq.com/s/tMp6fEKz24VansXlhH7v1g
SSRF-服务器端请求伪造(类型和利用方法)第1部分
https://xz.aliyun.com/t/3823
https://xz.aliyun.com/t/3823
污水(MuddyWater)APT组织定向攻击活动分析
https://mp.weixin.qq.com/s/qzTGQMvV-IaAlP_IwCHnLg
https://mp.weixin.qq.com/s/qzTGQMvV-IaAlP_IwCHnLg
using-memes-to-spread-malware-commands
https://www.undeadsec.com/2019/01/using-memes-to-spread-malware-commands.html
https://www.undeadsec.com/2019/01/using-memes-to-spread-malware-commands.html
个人隐私保护大时代:至暗时刻将逝,一丝曙光在即
https://mp.weixin.qq.com/s/Gzz7AtZgH0JuNa7U_9yb4w
https://mp.weixin.qq.com/s/Gzz7AtZgH0JuNa7U_9yb4w
基于CNN和序列标注的对联机器人
https://kexue.fm/archives/6270
https://kexue.fm/archives/6270
移动平台新型诈骗解析
https://www.anquanke.com/post/id/169654
https://www.anquanke.com/post/id/169654
我是如何从公网JIRA获得NASA数据的
https://nosec.org/home/detail/2168.html
https://nosec.org/home/detail/2168.html
SecWiki周刊(第254期)
https://www.sec-wiki.com/weekly/254
https://www.sec-wiki.com/weekly/254
全国联网打印机安全态势研究报告
https://mp.weixin.qq.com/s/LXJR3s6GpkgWZNNGyhuYMQ
https://mp.weixin.qq.com/s/LXJR3s6GpkgWZNNGyhuYMQ
TP-Link TL-R600VPN远程执行代码漏洞分析
https://xz.aliyun.com/t/3877
https://xz.aliyun.com/t/3877
保障IDC安全:分布式HIDS集群架构设计
https://mp.weixin.qq.com/s/5pVKNI6_hzhaXTOUxU9bTA
https://mp.weixin.qq.com/s/5pVKNI6_hzhaXTOUxU9bTA
金融机构重要时期安全保障思路
http://blog.nsfocus.net/thoughts-safety-guarantee-financial-institutions-important-period/
http://blog.nsfocus.net/thoughts-safety-guarantee-financial-institutions-important-period/
从Github的issue找到1500美金的漏洞
https://nosec.org/home/detail/2170.html
https://nosec.org/home/detail/2170.html
机器学习新隐写术:伪装训练集,隐藏任务意图
https://mp.weixin.qq.com/s/xUTf-OyOpn6HaPkIzvK-_w
https://mp.weixin.qq.com/s/xUTf-OyOpn6HaPkIzvK-_w
[上篇]从补丁diff到EXP--CVE-2018-8453漏洞分析与利用
https://mp.weixin.qq.com/s/ogKCo-Jp8vc7otXyu6fTig
https://mp.weixin.qq.com/s/ogKCo-Jp8vc7otXyu6fTig
Flask-admin Reflected XSS引发的思考
https://www.freebuf.com/vuls/194179.html
https://www.freebuf.com/vuls/194179.html
OAuth授权不当导致的Twitter私信读取漏洞
https://www.freebuf.com/vuls/192668.html
https://www.freebuf.com/vuls/192668.html
索尼PSV的F00D破解之路
https://nosec.org/home/detail/2166.html
https://nosec.org/home/detail/2166.html
深入浅出SSRF,Part-1
https://nosec.org/home/detail/2167.html
https://nosec.org/home/detail/2167.html
价值23000美元的uber用户信息泄露漏洞
https://nosec.org/home/detail/2173.html
https://nosec.org/home/detail/2173.html
浅析Java序列化和反序列化
https://mp.weixin.qq.com/s/8lkpqHJ_CrRizPDZ38svTg
https://mp.weixin.qq.com/s/8lkpqHJ_CrRizPDZ38svTg
情报威胁、恶意文件分析、取证相关2018部分会议youtube视频
https://www.youtube.com/playlist?list=PLN43v68nCimtXKndCmY1pIhQtCjClYjyf
https://www.youtube.com/playlist?list=PLN43v68nCimtXKndCmY1pIhQtCjClYjyf
ISO/IEC 27000经典官方资料
https://mp.weixin.qq.com/s/F9oIpYvHB3FdAyjRSdUgRA
https://mp.weixin.qq.com/s/F9oIpYvHB3FdAyjRSdUgRA
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第255期)
