SecWiki周刊(第274期)
2019/05/27-2019/06/02
安全资讯
数据安全管理办法(征求意见稿)
http://www.cac.gov.cn/2019-05/28/c_1124546022.htm
http://www.cac.gov.cn/2019-05/28/c_1124546022.htm
安全技术
ApacheTomca远程执行代码(CVE-2019-0232)漏洞浅析和复现
https://mp.weixin.qq.com/s/dhry2nxTyN4C0BUeBvOdZQ
https://mp.weixin.qq.com/s/dhry2nxTyN4C0BUeBvOdZQ
datacon比赛方向三-攻击源与攻击者分析writeup
https://github.com/ReAbout/datacon
https://github.com/ReAbout/datacon
CTFTraining: CTF Training 经典赛题复现环境
https://github.com/CTFTraining/CTFTraining
https://github.com/CTFTraining/CTFTraining
利用 JAVA 调试协议 JDWP 实现反弹 shell
https://paper.seebug.org/933/
https://paper.seebug.org/933/
Analysis of CVE-2019-0708 (BlueKeep)
https://www.malwaretech.com/2019/05/analysis-of-cve-2019-0708-bluekeep.html
https://www.malwaretech.com/2019/05/analysis-of-cve-2019-0708-bluekeep.html
MIMIC Defense CTF 2019 final writeup
https://paper.seebug.org/932/
https://paper.seebug.org/932/
2019 强网杯online Web Writeup
https://tttang.com/archive/1301/
https://tttang.com/archive/1301/
A Debugging Primer with CVE-2019–0708
https://medium.com/@straightblast426/a-debugging-primer-with-cve-2019-0708-ccfa266682f6
https://medium.com/@straightblast426/a-debugging-primer-with-cve-2019-0708-ccfa266682f6
Threat Hunting with Jupyter Notebooks— Part 1: Your First Notebook
https://posts.specterops.io/threat-hunting-with-jupyter-notebooks-part-1-your-first-notebook-9a99a781fde7?gi=6e2ca22b44b7
https://posts.specterops.io/threat-hunting-with-jupyter-notebooks-part-1-your-first-notebook-9a99a781fde7?gi=6e2ca22b44b7
netstat源代码调试&原理分析
https://blog.spoock.com/2019/05/26/netstat-learn/
https://blog.spoock.com/2019/05/26/netstat-learn/
InfluxDB authentication bypass 0day
https://www.komodosec.com/post/when-all-else-fails-find-a-0-day
https://www.komodosec.com/post/when-all-else-fails-find-a-0-day
ISCC2019部分writeup
https://www.anquanke.com/post/id/179216
https://www.anquanke.com/post/id/179216
永久性 WMIC 事件订阅 - 权限维持(三)
https://rcoil.me/2019/05/%E6%B0%B8%E4%B9%85%E6%80%A7%20WMIC%20%E4%BA%8B%E4%BB%B6%E8%AE%A2%E9%98%85%20-%20%E6%9D%83%E9%99%90%E7%BB%B4%E6%8C%81%EF%BC%88%E4%B8%89%EF%BC%89/
https://rcoil.me/2019/05/%E6%B0%B8%E4%B9%85%E6%80%A7%20WMIC%20%E4%BA%8B%E4%BB%B6%E8%AE%A2%E9%98%85%20-%20%E6%9D%83%E9%99%90%E7%BB%B4%E6%8C%81%EF%BC%88%E4%B8%89%EF%BC%89/
netstat 源代码调试 & 原理分析
https://paper.seebug.org/934/
https://paper.seebug.org/934/
Decryption-Tools: 勒索病毒解密工具的汇总
https://github.com/jiansiting/Decryption-Tools
https://github.com/jiansiting/Decryption-Tools
CVE-2018-12067及类似漏洞分析与相关思考
https://xz.aliyun.com/t/5248
https://xz.aliyun.com/t/5248
跟我一起学习玩转二维码
https://www.freebuf.com/geek/204516.html
https://www.freebuf.com/geek/204516.html
nansh0u-campaign-hackers-arsenal-grows-stronger
https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
使用Gpg4Win+Outlook Express实现发送和接收加密邮件
https://www.cnblogs.com/Lyckerr/p/8624076.html
https://www.cnblogs.com/Lyckerr/p/8624076.html
某CMS组合漏洞至Getshell
https://xz.aliyun.com/t/5277
https://xz.aliyun.com/t/5277
应急响应处置流程Windows篇
https://www.freebuf.com/articles/network/203494.html
https://www.freebuf.com/articles/network/203494.html
Microsoft Office - 权限维持(一)
https://rcoil.me/2019/05/Microsoft%20Office%20-%20%E6%9D%83%E9%99%90%E7%BB%B4%E6%8C%81%EF%BC%88%E4%B8%80%EF%BC%89/
https://rcoil.me/2019/05/Microsoft%20Office%20-%20%E6%9D%83%E9%99%90%E7%BB%B4%E6%8C%81%EF%BC%88%E4%B8%80%EF%BC%89/
Diving into the Security Analyst's Mind
https://posts.specterops.io/diving-into-the-security-analysts-mind-b1708668e8d4
https://posts.specterops.io/diving-into-the-security-analysts-mind-b1708668e8d4
Breaking Out of rkt – 3 New Unpatched CVEs
https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/
https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/
Exploiting File Uploads Pt. 1 – MIME Sniffing to Stored XSS
https://anotherhackerblog.com/exploiting-file-uploads-pt1/
https://anotherhackerblog.com/exploiting-file-uploads-pt1/
HiddenWasp Malware Stings Targeted Linux Systems
https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/
https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/
Attribution is hard — at least for Dock: A Safari sandbox escape & LPE
https://phoenhex.re/2019-05-26/attribution-is-hard-at-least-for-dock
https://phoenhex.re/2019-05-26/attribution-is-hard-at-least-for-dock
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第274期)
