SecWiki周刊(第257期)
2019/01/28-2019/02/03
安全资讯
美国“国家网络情报体系”架构详解
https://mp.weixin.qq.com/s/8rkXGZsAEqTWu5C8WPmbsA
https://mp.weixin.qq.com/s/8rkXGZsAEqTWu5C8WPmbsA
安全技术
JWT Attack Walk-Through
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/january/jwt-attack-walk-through/
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/january/jwt-attack-walk-through/
Kunpeng:一款开源的跨语言漏洞POC框架
https://opensec-cn.github.io/#/articles/1
https://opensec-cn.github.io/#/articles/1
Defeating Flask’s Session Management
https://blog.paradoxis.nl/defeating-flasks-session-management-65706ba9d3ce
https://blog.paradoxis.nl/defeating-flasks-session-management-65706ba9d3ce
XXE on https://duckduckgo.com
https://hackerone.com/reports/483774
https://hackerone.com/reports/483774
Java Web安全-代码审计(一)
https://mp.weixin.qq.com/s/o1-G9LaK6OFUWbJs3cfKBg
https://mp.weixin.qq.com/s/o1-G9LaK6OFUWbJs3cfKBg
安卓APP测试之HOOK大法-Xposed篇
https://mp.weixin.qq.com/s/vnganjOQp5pUpc8hUswtww
https://mp.weixin.qq.com/s/vnganjOQp5pUpc8hUswtww
UAC Bypass via SystemPropertiesAdvanced.exe and DLL Hijacking
https://egre55.github.io/system-properties-uac-bypass/
https://egre55.github.io/system-properties-uac-bypass/
基于Flink的超大规模在线实时反欺诈系统的建设与实践
https://mp.weixin.qq.com/s/5opaOA9Rqk-3Sb-9bBRPJQ
https://mp.weixin.qq.com/s/5opaOA9Rqk-3Sb-9bBRPJQ
winafl中基于插桩的覆盖率反馈原理
http://riusksk.me/2019/02/02/winafl%E4%B8%AD%E5%9F%BA%E4%BA%8E%E6%8F%92%E6%A1%A9%E7%9A%84%E8%A6%86%E7%9B%96%E7%8E%87%E5%8F%8D%E9%A6%88%E5%8E%9F%E7%90%86/
http://riusksk.me/2019/02/02/winafl%E4%B8%AD%E5%9F%BA%E4%BA%8E%E6%8F%92%E6%A1%A9%E7%9A%84%E8%A6%86%E7%9B%96%E7%8E%87%E5%8F%8D%E9%A6%88%E5%8E%9F%E7%90%86/
使用Aggressor脚本雕饰Cobalt Strike
https://mp.weixin.qq.com/s/CEI1XYkq2PZmYsP0DRU7jg
https://mp.weixin.qq.com/s/CEI1XYkq2PZmYsP0DRU7jg
Java Web安全-代码审计(二)
https://mp.weixin.qq.com/s/mlqjOlhefcsO9z51cw4S7w
https://mp.weixin.qq.com/s/mlqjOlhefcsO9z51cw4S7w
渗透利器Cobalt Strike - 第1篇 功能及使用
https://xz.aliyun.com/t/3975
https://xz.aliyun.com/t/3975
无符号Golang程序逆向方法解析
https://www.anquanke.com/post/id/170332
https://www.anquanke.com/post/id/170332
Java Web安全-代码审计(三)
https://mp.weixin.qq.com/s/sMLVaYtlBPaHuiU-Sboopg
https://mp.weixin.qq.com/s/sMLVaYtlBPaHuiU-Sboopg
Telegram中文圈现状
https://www.freebuf.com/articles/network/194822.html
https://www.freebuf.com/articles/network/194822.html
2018年初整理的一些内网渗透TIPS
https://github.com/Ridter/Intranet_Penetration_Tips
https://github.com/Ridter/Intranet_Penetration_Tips
voucher_swap: Exploiting MIG reference counting in iOS 12
https://googleprojectzero.blogspot.com/2019/01/voucherswap-exploiting-mig-reference.html
https://googleprojectzero.blogspot.com/2019/01/voucherswap-exploiting-mig-reference.html
how-to-argue-like-cobalt-strike
https://blog.xpnsec.com/how-to-argue-like-cobalt-strike/
https://blog.xpnsec.com/how-to-argue-like-cobalt-strike/
北邮中学生网安杯2019 web解题记录
https://www.anquanke.com/post/id/170299
https://www.anquanke.com/post/id/170299
带你读神器之KunPeng源代码分析
https://mp.weixin.qq.com/s/JLMaygM_MioszehGYpY2rw
https://mp.weixin.qq.com/s/JLMaygM_MioszehGYpY2rw
MacOS/iOS CVE-2019-6231 漏洞深入分析
https://www.anquanke.com/post/id/170358
https://www.anquanke.com/post/id/170358
内网渗透知识基础及流程
https://www.anquanke.com/post/id/170471
https://www.anquanke.com/post/id/170471
如何利用开源威胁信息分析APT团伙
https://mp.weixin.qq.com/s/HZJQD0jHj2ACkgtvGmtyPw
https://mp.weixin.qq.com/s/HZJQD0jHj2ACkgtvGmtyPw
TrackRay: 溯光(Trackray)渗透测试框架 2.0
https://github.com/iSafeBlue/TrackRay
https://github.com/iSafeBlue/TrackRay
easyProxy: 内网穿透代理服务器
https://github.com/cnlh/easyProxy
https://github.com/cnlh/easyProxy
安卓APP测试之HOOK大法
https://mp.weixin.qq.com/s/3vNeeLm8Wy75tJJ7JvFsfA
https://mp.weixin.qq.com/s/3vNeeLm8Wy75tJJ7JvFsfA
微信PC端技术研究(2)-CE+OD拿下语音
https://mp.weixin.qq.com/s/h9d8aO79OvkpV9bknVT60A
https://mp.weixin.qq.com/s/h9d8aO79OvkpV9bknVT60A
Windows环境中使用Responder获取NTLMv2哈希并利用
https://www.freebuf.com/articles/system/194549.html
https://www.freebuf.com/articles/system/194549.html
Complex Drupal POP Chain
https://blog.ripstech.com/2019/complex-drupal-pop-chain/
https://blog.ripstech.com/2019/complex-drupal-pop-chain/
详解GDPR向Google亮剑缘由
https://mp.weixin.qq.com/s/5sGSSpkrJhgvttKxP-udJA
https://mp.weixin.qq.com/s/5sGSSpkrJhgvttKxP-udJA
lavarel框架配置不当导致敏感数据泄露
https://nosec.org/home/detail/2217.html
https://nosec.org/home/detail/2217.html
SecWiki周刊(第256期)
https://www.sec-wiki.com/weekly/256
https://www.sec-wiki.com/weekly/256
Exploiting SystemD JournalD Part 1
https://capsule8.com/blog/exploiting-systemd-journald-part-1/
https://capsule8.com/blog/exploiting-systemd-journald-part-1/
如何利用2FA实现无密码控制他人帐户(影响Google, Microsoft, Instagram, Cloudflare)
https://nosec.org/home/detail/2211.html
https://nosec.org/home/detail/2211.html
Reverse Engineering a Philips TriMedia CPU based IP camera
https://blog.quarkslab.com/reverse-engineering-a-philips-trimedia-cpu-based-ip-camera-part-1.html
https://blog.quarkslab.com/reverse-engineering-a-philips-trimedia-cpu-based-ip-camera-part-1.html
windows-privilege-abuse-auditing-detection-and-defense
https://medium.com/palantir/windows-privilege-abuse-auditing-detection-and-defense-3078a403d74e
https://medium.com/palantir/windows-privilege-abuse-auditing-detection-and-defense-3078a403d74e
用于异常检测的几种图划分算法
https://mp.weixin.qq.com/s/9CQn4qFd88MRU56xBvY_Pw
https://mp.weixin.qq.com/s/9CQn4qFd88MRU56xBvY_Pw
Exchange邮箱安全代理系统开发
http://www.xsec.io/2019/1/3/mail-sec-proxy-golang.html
http://www.xsec.io/2019/1/3/mail-sec-proxy-golang.html
JavaScript侧信道时间测量
https://www.anquanke.com/post/id/170268
https://www.anquanke.com/post/id/170268
过D盾webshell分享
https://xz.aliyun.com/t/3959
https://xz.aliyun.com/t/3959
SEACMS 8.9版本-从变量覆盖到变量覆盖的SQL注入漏洞
https://nosec.org/home/detail/2222.html
https://nosec.org/home/detail/2222.html
2018年活跃DDoS攻击团伙分析报告
https://mp.weixin.qq.com/s/5F9CauALuwvAys5mwPHwdQ
https://mp.weixin.qq.com/s/5F9CauALuwvAys5mwPHwdQ
安天移动恶意代码对抗的8年之路
http://blog.avlsec.com/2019/02/5337/anti-virus/
http://blog.avlsec.com/2019/02/5337/anti-virus/
基于网络特征学习的个性化推荐系统 04#
https://mp.weixin.qq.com/s/MMUZHkGs9Ce0xtmLhHZ54A
https://mp.weixin.qq.com/s/MMUZHkGs9Ce0xtmLhHZ54A
sofacys-zepakab-downloader-spotted-in-the-wild
https://blog.yoroi.company/research/sofacys-zepakab-downloader-spotted-in-the-wild/
https://blog.yoroi.company/research/sofacys-zepakab-downloader-spotted-in-the-wild/
malware-analysis/analyzing-darkhydrus-2-0
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-darkhydrus-2-0/
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-darkhydrus-2-0/
2019年针对API安全的4点建议
https://github.com/neal1991/articles-translator/blob/master/2019%E5%B9%B4%E9%92%88%E5%AF%B9API%E5%AE%89%E5%85%A8%E7%9A%844%E7%82%B9%E5%BB%BA%E8%AE%AE.md
https://github.com/neal1991/articles-translator/blob/master/2019%E5%B9%B4%E9%92%88%E5%AF%B9API%E5%AE%89%E5%85%A8%E7%9A%844%E7%82%B9%E5%BB%BA%E8%AE%AE.md
2018年度区块链安全报告
https://share.weiyun.com/56Pytbu
https://share.weiyun.com/56Pytbu
Abusing S4U2Self: Another Sneaky Active Directory Persistence
https://alsid.com/company/news/abusing-s4u2self-another-sneaky-active-directory-persistence
https://alsid.com/company/news/abusing-s4u2self-another-sneaky-active-directory-persistence
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第257期)
