SecWiki周刊(第282期)
2019/07/22-2019/07/28
安全资讯
ThreatGEN:Red vs. Blue--在游戏中学习网络安全技能
https://mp.weixin.qq.com/s/OoCTXMYALjDQvCEOXvG2ZQ
https://mp.weixin.qq.com/s/OoCTXMYALjDQvCEOXvG2ZQ
《新时代的中国国防》白皮书发布,多处涉及网络安全
https://mp.weixin.qq.com/s/d85LGOF-GubW6I7bGZ2Ovw
https://mp.weixin.qq.com/s/d85LGOF-GubW6I7bGZ2Ovw
美俄的网络威胁都针对民用基础设施
https://www.solidot.org/story?sid=61455
https://www.solidot.org/story?sid=61455
安全技术
代码审计-dubbo admin <=2.6.1远程命令执行漏洞
https://javasec.cn/index.php/archives/193/
https://javasec.cn/index.php/archives/193/
JNI技术绕过rasp防护实现jsp webshell
https://mp.weixin.qq.com/s/vnDytPBUP72hoFfSOzES2A
https://mp.weixin.qq.com/s/vnDytPBUP72hoFfSOzES2A
基于元数据提取的渗透测试案例
https://mp.weixin.qq.com/s/Y-56kD2zGTakaMKJoD9JsQ
https://mp.weixin.qq.com/s/Y-56kD2zGTakaMKJoD9JsQ
SOFA-Hessian反序列漏洞
https://mp.weixin.qq.com/s/vW6IgaA_Imc7-_Bac9XNQg
https://mp.weixin.qq.com/s/vW6IgaA_Imc7-_Bac9XNQg
Jackson CVE-2019-12384 Anatomy Of a Vulnerability Class
https://mp.weixin.qq.com/s/fZ1Or_mRt9j8uANkgJM5-A
https://mp.weixin.qq.com/s/fZ1Or_mRt9j8uANkgJM5-A
SA-CORE-2019-008 DRUPAL 访问绕过漏洞分析
https://kylingit.com/blog/sa-core-2019-008-drupal%E8%AE%BF%E9%97%AE%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/
https://kylingit.com/blog/sa-core-2019-008-drupal%E8%AE%BF%E9%97%AE%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/
反溯源-cs和msf域名上线
https://xz.aliyun.com/t/5728
https://xz.aliyun.com/t/5728
书评-《企业级自动化代码安全扫描实战》
https://mp.weixin.qq.com/s/QKV7PD11BIFvt-ND2iqHrw
https://mp.weixin.qq.com/s/QKV7PD11BIFvt-ND2iqHrw
路由器漏洞分析系列(4):CVE-2019-7297 7298 D-Link DIR-823G 命令注入漏洞分析及复现
https://xz.aliyun.com/t/5705
https://xz.aliyun.com/t/5705
MesaTEE安全形式化验证实践
https://mp.weixin.qq.com/s/X5PyWgQFZ11wLx8gpFtXOg
https://mp.weixin.qq.com/s/X5PyWgQFZ11wLx8gpFtXOg
供应链安全系列-攻击编译阶段(一)
https://mp.weixin.qq.com/s/_BG0T0uJZhYUpM_NUmSmqA
https://mp.weixin.qq.com/s/_BG0T0uJZhYUpM_NUmSmqA
前端加密之使用Firefox来解密
https://www.cnblogs.com/xsserhaha/p/11246074.html
https://www.cnblogs.com/xsserhaha/p/11246074.html
病毒武器智能化技术现状与运用趋势
https://mp.weixin.qq.com/s/ojfjlJEdGSIjrR2ptYhPSw
https://mp.weixin.qq.com/s/ojfjlJEdGSIjrR2ptYhPSw
从微软、FB、华为的网络安全备忘录说开去
https://mp.weixin.qq.com/s/VBI4IHKAfDn5PYQMesw5Sg
https://mp.weixin.qq.com/s/VBI4IHKAfDn5PYQMesw5Sg
SDL安全设计工具,一款支持多人协作实施威胁建模的微信小程序
https://mp.weixin.qq.com/s/XIZU03tHvf61X8XkJxK0Bg
https://mp.weixin.qq.com/s/XIZU03tHvf61X8XkJxK0Bg
软件安全构建成熟度模型 (BSIMM) 介绍
https://mp.weixin.qq.com/s/9z5DKipgAm2QdU4xg7NJeg
https://mp.weixin.qq.com/s/9z5DKipgAm2QdU4xg7NJeg
Grizzly Browser Fuzzing Framework
https://blog.mozilla.org/security/2019/07/10/grizzly/
https://blog.mozilla.org/security/2019/07/10/grizzly/
可信计算和可信赖计算的渊源
https://mp.weixin.qq.com/s/iOIxEZK-H9VeGGRmmGewsQ
https://mp.weixin.qq.com/s/iOIxEZK-H9VeGGRmmGewsQ
哈萨克斯坦拦截HTTPS流量事件的详细分析
https://nosec.org/home/detail/2809.html
https://nosec.org/home/detail/2809.html
路由器漏洞分析系列(3):CVE-2018-20057 DIR-619L&605L后门漏洞分析及复现
https://xz.aliyun.com/t/5702
https://xz.aliyun.com/t/5702
创建一个可隐秘接管AD中对象的后门
https://nosec.org/home/detail/2803.html
https://nosec.org/home/detail/2803.html
谷歌学术指标2019年(计算机安全及加密)
https://mp.weixin.qq.com/s/uMla2_Iqc2h5hyRAZk-64A
https://mp.weixin.qq.com/s/uMla2_Iqc2h5hyRAZk-64A
深度学习中的Normalization模型
https://mp.weixin.qq.com/s/D1Qvh-kqcmtp6pkH-CwPmg
https://mp.weixin.qq.com/s/D1Qvh-kqcmtp6pkH-CwPmg
Reading the Tea Leaves:威胁情报的对比分析
https://mp.weixin.qq.com/s/Jqfc8N_6EfDF4EB4GAnGMw
https://mp.weixin.qq.com/s/Jqfc8N_6EfDF4EB4GAnGMw
威胁建模系统教程-简介和工具(一)
https://mp.weixin.qq.com/s/kV2nXuBywUnkj_VWA7CftQ
https://mp.weixin.qq.com/s/kV2nXuBywUnkj_VWA7CftQ
基层安全管理者需要具备的素质
https://mp.weixin.qq.com/s/r7sk8yUiVCGUnWPK5i9z5Q
https://mp.weixin.qq.com/s/r7sk8yUiVCGUnWPK5i9z5Q
记一次对恶意LNK文件的分析
https://nosec.org/home/detail/2807.html
https://nosec.org/home/detail/2807.html
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第282期)
