SecWiki周刊(第3期)
2014/03/17-2014/03/23
安全资讯
网络安全威胁周报——第201411期
http://drops.wooyun.org/news/1195
http://drops.wooyun.org/news/1195
安全技术
Reverse Clickjacking
https://plus.google.com/+AleksandrDobkin-Google/posts/JMwA7Y3RYzV?cfem=1
https://plus.google.com/+AleksandrDobkin-Google/posts/JMwA7Y3RYzV?cfem=1
dve数据虚拟执行技术对抗dep+aslr+emet+cfi
http://hi.baidu.com/yuange1975/item/863a25e4501f542c5a7cfb7b
http://hi.baidu.com/yuange1975/item/863a25e4501f542c5a7cfb7b
第三方账号登陆的过程及由此引发的血案
http://drops.wooyun.org/papers/1210
http://drops.wooyun.org/papers/1210
PySonar:精确、友好的 Python 静态分析器
https://github.com/yinwang0/pysonar2
https://github.com/yinwang0/pysonar2
dnspod_inter_ddns:Dnspod International DDNS
https://github.com/jenson-shi/dnspod_inter_ddns
https://github.com/jenson-shi/dnspod_inter_ddns
XORSearch: Finding Embedded Executables
http://blog.didierstevens.com/2014/03/20/xorsearch-finding-embedded-executables/
http://blog.didierstevens.com/2014/03/20/xorsearch-finding-embedded-executables/
网络安全威胁周报——第201411期
http://drops.wooyun.org/news/1195
http://drops.wooyun.org/news/1195
EvilGuard:Anroid平台新的攻击方式
http://blogs.360.cn/360mobile/2014/03/18/analysis_of_evil_guard/
http://blogs.360.cn/360mobile/2014/03/18/analysis_of_evil_guard/
针对SSL的中间人攻击演示和防范
http://www.youxia.org/mitm-ssl-attack.html
http://www.youxia.org/mitm-ssl-attack.html
Tor隐身大法 —— 用Tor来帮助我们进行渗透测试
http://drops.wooyun.org/tips/1226
http://drops.wooyun.org/tips/1226
SQL大师(Joe Celko)经典力作 – 《SQL权威指南(第4版)》
http://sec007.cc/1573.html
http://sec007.cc/1573.html
explib:JS写shellcode
https://github.com/guhe120/explib/blob/master/lib/explib.js
https://github.com/guhe120/explib/blob/master/lib/explib.js
Threatglass:Web-Based Malware Analysis Tool
http://www.threatglass.com/
http://www.threatglass.com/
PHP语法分析器:RE2C && BISON 总结
http://www.searchtb.com/2014/03/php%e8%af%ad%e6%b3%95%e5%88%86%e6%9e%90%e5%99%a8%ef%bc%9are2c-bison-%e6%80%bb%e7%bb%93.html
http://www.searchtb.com/2014/03/php%e8%af%ad%e6%b3%95%e5%88%86%e6%9e%90%e5%99%a8%ef%bc%9are2c-bison-%e6%80%bb%e7%bb%93.html
STRUTS2框架的getClassLoader漏洞利用
http://www.inbreak.net/archives/526
http://www.inbreak.net/archives/526
Crypto 101:一门密码学入门课程
https://www.crypto101.io/
https://www.crypto101.io/
趋势科技《中国移动网络犯罪地下市场》
http://www.trendmicro.com.cn/pdf/pdf-20140317.pdf
http://www.trendmicro.com.cn/pdf/pdf-20140317.pdf
The Art of Leaks - read version - Yoyo
https://github.com/ga1ois/CanSecWest2014/blob/master/The%20Art%20of%20Leaks%20-%20read%20version%20-%20Yoyo.pdf
https://github.com/ga1ois/CanSecWest2014/blob/master/The%20Art%20of%20Leaks%20-%20read%20version%20-%20Yoyo.pdf
ROPs_are_for_the_99%
https://github.com/tombkeeper/Talks/blob/master/CanSecWest_2014/ROPs_are_for_the_99%25_%5BCSW2014%5D.pdf
https://github.com/tombkeeper/Talks/blob/master/CanSecWest_2014/ROPs_are_for_the_99%25_%5BCSW2014%5D.pdf
Wi-Fi Password Dump v2.0
http://www.sectechno.com/2014/03/16/wi-fi-password-dump-v2-0/
http://www.sectechno.com/2014/03/16/wi-fi-password-dump-v2-0/
Doit.im,掌控每一天系列公开课
http://bulo.hujiang.com/u/19449463/
http://bulo.hujiang.com/u/19449463/
malware tracker: PDF Current Threats
http://www.malwaretracker.com/pdfthreat.php
http://www.malwaretracker.com/pdfthreat.php
From Windows to Droids: An Insight in to Multi-vector Attack Mechanisms in RATs
http://www.fireeye.com/blog/technical/2014/03/from-windows-to-droids-an-insight-in-to-multi-vector-attack-mechanisms-in-rats.html
http://www.fireeye.com/blog/technical/2014/03/from-windows-to-droids-an-insight-in-to-multi-vector-attack-mechanisms-in-rats.html
从Windows 到安卓:多重攻击机制的远控的分析
http://drops.wooyun.org/papers/1270
http://drops.wooyun.org/papers/1270
北京鼎开预装刷机数据统计apk(rom固化版)分析
http://drops.wooyun.org/tips/1169
http://drops.wooyun.org/tips/1169
shodan_pharmer
https://github.com/DanMcInerney/shodan_pharmer
https://github.com/DanMcInerney/shodan_pharmer
Google DNS劫持背后的技术分析
http://drops.wooyun.org/papers/1207
http://drops.wooyun.org/papers/1207
软件漏洞分析技巧分享
http://drops.wooyun.org/tips/1261
http://drops.wooyun.org/tips/1261
DDoS protection Using Netfilter/iptables
http://people.netfilter.org/hawk/presentations/devconf2014/iptables-ddos-mitigation_JesperBrouer.pdf
http://people.netfilter.org/hawk/presentations/devconf2014/iptables-ddos-mitigation_JesperBrouer.pdf
Google Docs Users Targeted by Sophisticated Phishing Scam
http://www.symantec.com/connect/blogs/google-docs-users-targeted-sophisticated-phishing-scam
http://www.symantec.com/connect/blogs/google-docs-users-targeted-sophisticated-phishing-scam
Exploit-Exercises Protostar Writeup Part I
http://www.programlife.net/exploit-exercises-protostar-writeup-1.html
http://www.programlife.net/exploit-exercises-protostar-writeup-1.html
PHP后门新玩法:一款猥琐的PHP后门分析
http://drops.wooyun.org/papers/1215
http://drops.wooyun.org/papers/1215
jadx:Dex to Java decompiler
https://github.com/skylot/jadx
https://github.com/skylot/jadx
ColdFusion Admin Compromise Analysis (CVE-2010-2861)
http://blog.spiderlabs.com/2014/03/coldfusion-admin-compromise-analysis-cve-2010-2861.html
http://blog.spiderlabs.com/2014/03/coldfusion-admin-compromise-analysis-cve-2010-2861.html
Attacking Adobe ColdFusion
http://jumpespjump.blogspot.com/2014/03/attacking-adobe-coldfusion.html
http://jumpespjump.blogspot.com/2014/03/attacking-adobe-coldfusion.html
Bypassing web application firewalls using HTTP headers
http://h30499.www3.hp.com/t5/Fortify-Application-Security/Bypassing-web-application-firewalls-using-HTTP-headers/ba-p/6418366
http://h30499.www3.hp.com/t5/Fortify-Application-Security/Bypassing-web-application-firewalls-using-HTTP-headers/ba-p/6418366
Security: What Our Customers Actually Do
http://devconf.cz/filebrowser/download/393
http://devconf.cz/filebrowser/download/393
Overview of OS Fingerprinting
http://resources.infosecinstitute.com/overview-os-fingerprinting/
http://resources.infosecinstitute.com/overview-os-fingerprinting/
sees:Social Enginnering Email Sender
https://github.com/galkan/sees
https://github.com/galkan/sees
MITMer:Automated man-in-the-middle attack tool
https://github.com/husam212/MITMer
https://github.com/husam212/MITMer
关于可视化设计
http://ued.taobao.org/blog/2014/03/%e5%85%b3%e4%ba%8e%e5%8f%af%e8%a7%86%e5%8c%96%e8%ae%be%e8%ae%a1/
http://ued.taobao.org/blog/2014/03/%e5%85%b3%e4%ba%8e%e5%8f%af%e8%a7%86%e5%8c%96%e8%ae%be%e8%ae%a1/
SDN and Security: Network versus Applications
https://devcentral.f5.com/articles/sdn-and-security-network-versus-applications
https://devcentral.f5.com/articles/sdn-and-security-network-versus-applications
35 Best Computer Security Professors of 2013
http://backgroundchecks.org/35-best-computer-security-professors-of-2013.html
http://backgroundchecks.org/35-best-computer-security-professors-of-2013.html
Bypassing web application firewalls using HTTP headers
http://h30499.www3.hp.com/t5/Fortify-Application-Security/Bypassing-web-application-firewalls-using-HTTP-headers/ba-p/6418366
http://h30499.www3.hp.com/t5/Fortify-Application-Security/Bypassing-web-application-firewalls-using-HTTP-headers/ba-p/6418366
DNmap:distributed nmap framwork
http://sourceforge.net/projects/dnmap/
http://sourceforge.net/projects/dnmap/
HTTPS mixed content: still the easiest way to break SSL
https://community.qualys.com/blogs/securitylabs/2014/03/19/https-mixed-content-still-the-easiest-way-to-break-ssl
https://community.qualys.com/blogs/securitylabs/2014/03/19/https-mixed-content-still-the-easiest-way-to-break-ssl
a simple DNS sniffer based on dnssnarf.py
https://gist.github.com/corifeo/4722054
https://gist.github.com/corifeo/4722054
BCTF Writeup
http://drops.wooyun.org/papers/1071
http://drops.wooyun.org/papers/1071
安全专题
常见的安全代码扫描工具
https://www.sec-wiki.com/topic/41
https://www.sec-wiki.com/topic/41
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第3期)
