SecWiki周刊(第269期)
2019/04/22-2019/04/28
安全资讯
2019 西湖论剑-院士圆桌视频
https://mp.weixin.qq.com/s/XO38NB5whYHxcr9RaoBFXw
https://mp.weixin.qq.com/s/XO38NB5whYHxcr9RaoBFXw
美国高端智库的政策专家储备及其人才吸引机制研究—以兰德公司为例
https://mp.weixin.qq.com/s/0N8vOoO2B6a79XGG5I-j0w
https://mp.weixin.qq.com/s/0N8vOoO2B6a79XGG5I-j0w
中国网络安全行业分类及全景图2019H1
https://mp.weixin.qq.com/s/4O_4MvLVma_9uEQO4IU14g
https://mp.weixin.qq.com/s/4O_4MvLVma_9uEQO4IU14g
安全技术
7kbscan-WebPathBrute Web路径暴力探测工具
https://github.com/7kbstorm/7kbscan-WebPathBrute
https://github.com/7kbstorm/7kbscan-WebPathBrute
另一种Tomcat渗透Getshell技巧
https://www.ch1ng.com/blog/147.html
https://www.ch1ng.com/blog/147.html
RD-10射频探测器-隐藏摄像头侦查器中文手册
https://mp.weixin.qq.com/s/Q12ScpUctVqg7aC3BRVLeg
https://mp.weixin.qq.com/s/Q12ScpUctVqg7aC3BRVLeg
CaidaoMitmProxy:基于HTTP代理中转菜刀过WAF
https://www.ch1ng.com/blog/173.html
https://www.ch1ng.com/blog/173.html
开源powershell CMD bash命令混淆检测工具
https://github.com/We5ter/Flerken
https://github.com/We5ter/Flerken
Gitlab+Jenkins+SonarQube 实现代码审计指南
https://bloodzer0.github.io/ossa/other-security-branch/devsecops/gjs/
https://bloodzer0.github.io/ossa/other-security-branch/devsecops/gjs/
在社交网络上刷粉刷量,技术上是如何实现的?
https://www.infoq.cn/article/ceDbB*8IpzJrwyIJ8v1J
https://www.infoq.cn/article/ceDbB*8IpzJrwyIJ8v1J
cmsprint: CMS和中间件指纹库
https://github.com/Lucifer1993/cmsprint
https://github.com/Lucifer1993/cmsprint
Weblogic反序列化远程命令执行漏洞(CNVD-C-2019-48814)
https://nosec.org/home/detail/2514.html
https://nosec.org/home/detail/2514.html
提升云中业务集成安全性的七个步骤
https://www.infoq.cn/article/psah2GOSvCxK1gP1h-93
https://www.infoq.cn/article/psah2GOSvCxK1gP1h-93
写给机器学习从业者的 12 条宝贵建议
https://www.infoq.cn/article/NLTXhVkMTSlsGK_dkXgh
https://www.infoq.cn/article/NLTXhVkMTSlsGK_dkXgh
IP 定位 逆向追踪溯源访客真实身份调查取证
https://lcx.cc/post/4595/
https://lcx.cc/post/4595/
如何打造自己的PoC框架-Pocsuite3-使用篇
https://paper.seebug.org/904/
https://paper.seebug.org/904/
Google搜索中的突变XSS
https://xz.aliyun.com/t/4865
https://xz.aliyun.com/t/4865
从算法到工程,解读阿里巴巴大规模图表征学习框架Euler
https://v.qq.com/x/page/y08637p8dqu.html?from=timeline
https://v.qq.com/x/page/y08637p8dqu.html?from=timeline
How to start learning Digital Forensics
https://medium.com/@a.alwashli/how-to-start-learning-digital-forensics-8038bcc9af6a
https://medium.com/@a.alwashli/how-to-start-learning-digital-forensics-8038bcc9af6a
How to Predict Which Vulnerabilities Will Be Exploited
https://www.usenix.org/conference/enigma2019/presentation/dumitras
https://www.usenix.org/conference/enigma2019/presentation/dumitras
Linux入侵排查案例分析
https://mp.weixin.qq.com/s/ZnQuboW4jLSBz_9pEFIPxg
https://mp.weixin.qq.com/s/ZnQuboW4jLSBz_9pEFIPxg
研究生第一篇学术论文常犯问题总结
https://mp.weixin.qq.com/s/4ue0JlvJNbSTjzUM9NDejA
https://mp.weixin.qq.com/s/4ue0JlvJNbSTjzUM9NDejA
VTest - 漏洞测试辅助系统
https://github.com/opensec-cn/vtest
https://github.com/opensec-cn/vtest
聊聊AWD攻防赛流程及准备经验
https://www.freebuf.com/articles/network/201222.html
https://www.freebuf.com/articles/network/201222.html
Dirmap:一款高级Web目录文件扫描工具
https://www.freebuf.com/sectool/200890.html
https://www.freebuf.com/sectool/200890.html
LinuxCheck: linux信息收集脚本
https://github.com/al0ne/LinuxCheck
https://github.com/al0ne/LinuxCheck
看我如何揪出远控背后的幕后黑手
https://www.freebuf.com/vuls/200895.html
https://www.freebuf.com/vuls/200895.html
对APT34泄露工具的分析—PoisonFrog和Glimpse
https://mp.weixin.qq.com/s/gYUCTLi2GpmatGOcRODZwA
https://mp.weixin.qq.com/s/gYUCTLi2GpmatGOcRODZwA
移动应用安全基础篇——绕过iOS越狱检测
https://mp.weixin.qq.com/s/DsmgR6BT5UOg9IBa4_-jhg
https://mp.weixin.qq.com/s/DsmgR6BT5UOg9IBa4_-jhg
DDCTF2019 部分 writeup 及思路
http://phantom0301.cc/2019/04/19/ddctf2019/
http://phantom0301.cc/2019/04/19/ddctf2019/
CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vul
https://mp.weixin.qq.com/s/YIwLaXNqjvW7fky5nJmiDw
https://mp.weixin.qq.com/s/YIwLaXNqjvW7fky5nJmiDw
从DCGAN到SELF-MOD:GAN的模型架构发展一览
https://kexue.fm/archives/6549
https://kexue.fm/archives/6549
浅谈RASP技术攻防之实战[代码实现篇]
https://www.03sec.com/3239.shtml
https://www.03sec.com/3239.shtml
Datacon DNS攻击流量识别 内测笔记
http://momomoxiaoxi.com/%E6%95%B0%E6%8D%AE%E5%88%86%E6%9E%90/2019/04/24/datacondns1/
http://momomoxiaoxi.com/%E6%95%B0%E6%8D%AE%E5%88%86%E6%9E%90/2019/04/24/datacondns1/
HiSilicon DVR 黑客笔记
https://xz.aliyun.com/t/4840
https://xz.aliyun.com/t/4840
DNS based threat hunting and DoH (DNS over HTTPS)
https://blog.redteam.pl/2019/04/dns-based-threat-hunting-and-doh.html?m=1
https://blog.redteam.pl/2019/04/dns-based-threat-hunting-and-doh.html?m=1
基于PaddlePaddle的业界首个开源视频识别工具集
https://mp.weixin.qq.com/s/f5n9HC6jIfWcTWNxqmyvQw
https://mp.weixin.qq.com/s/f5n9HC6jIfWcTWNxqmyvQw
2019-DDCTF-WEB-WriteUp
https://xz.aliyun.com/t/4862
https://xz.aliyun.com/t/4862
threat-actor-ta505-targets-financial-enterprises
https://www.cybereason.com/blog/threat-actor-ta505-targets-financial-enterprises-using-lolbins-and-a-new-backdoor-malware
https://www.cybereason.com/blog/threat-actor-ta505-targets-financial-enterprises-using-lolbins-and-a-new-backdoor-malware
ct-exposer: discovers sub-domains by searching Certificate Transparency logs
https://github.com/chris408/ct-exposer
https://github.com/chris408/ct-exposer
Drupal 1-click to RCE分析
https://lorexxar.cn/2019/04/19/drupal-1-click-rce/
https://lorexxar.cn/2019/04/19/drupal-1-click-rce/
VulnHub靶机学习——Fristileaks实战记录
https://mp.weixin.qq.com/s/QnTjOKqhLhP0TxcJ8CkszQ
https://mp.weixin.qq.com/s/QnTjOKqhLhP0TxcJ8CkszQ
如何绕过域账户登录失败次数的限制
https://nosec.org/home/detail/2510.html
https://nosec.org/home/detail/2510.html
carbanak-week-part-three-behind-the-backdoor
https://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-three-behind-the-backdoor.html
https://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-three-behind-the-backdoor.html
结合实例浅析壳编写的流程与难点
https://www.anquanke.com/post/id/176980
https://www.anquanke.com/post/id/176980
Operation ShadowHammer: a high-profile supply chain attack
https://securelist.com/operation-shadowhammer-a-high-profile-supply-chain-attack/90380/
https://securelist.com/operation-shadowhammer-a-high-profile-supply-chain-attack/90380/
利用Foxit Reader的PDF Printer实现提权
https://www.4hou.com/vulnerable/17538.html
https://www.4hou.com/vulnerable/17538.html
一步步绕过Windows域中的防火墙获取支付卡敏感数据
https://nosec.org/home/detail/2523.html
https://nosec.org/home/detail/2523.html
浅谈RASP技术攻防之实战[环境配置篇]
https://www.03sec.com/3238.shtml
https://www.03sec.com/3238.shtml
DDoS 反射放大攻击全球探测分析
https://paper.seebug.org/898/
https://paper.seebug.org/898/
Analysis of an IRC based Botnet
https://www.stratosphereips.org/blog/2019/4/12/analysis-of-a-irc-based-botnet
https://www.stratosphereips.org/blog/2019/4/12/analysis-of-a-irc-based-botnet
三种对CORS错误配置的利用方法
https://www.freebuf.com/articles/web/200350.html
https://www.freebuf.com/articles/web/200350.html
如何获得印度最大股票经纪公司的AWS凭证?
https://nosec.org/home/detail/2521.html
https://nosec.org/home/detail/2521.html
用普通权限的域帐户获得域环境中所有DNS解析记录
https://nosec.org/home/detail/2527.html
https://nosec.org/home/detail/2527.html
给DNS划重点:分析ISC BIND必知必会
https://www.freebuf.com/vuls/200828.html
https://www.freebuf.com/vuls/200828.html
Windows常见backdoor、权限维持方法及排查技术
https://xz.aliyun.com/t/4842
https://xz.aliyun.com/t/4842
风控对抗中的常规特征及处置选择
https://zhuanlan.zhihu.com/p/62525083
https://zhuanlan.zhihu.com/p/62525083
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第269期)
