SecWiki周刊(第328期)
2020/06/08-2020/06/14
安全资讯
《黑镜》:斯诺登揭露NSA的社交图谱工厂
https://www.anquanke.com/post/id/207943
https://www.anquanke.com/post/id/207943
安全技术
MSSQL注入 突破不能堆叠的限制执行系统命令
https://mp.weixin.qq.com/s/CcgUb7mLlP2xjcrpy5VGbQ
https://mp.weixin.qq.com/s/CcgUb7mLlP2xjcrpy5VGbQ
基于正则的VSCode代码审计插件
https://github.com/m4yfly/vscode-maudit
https://github.com/m4yfly/vscode-maudit
冰蝎改造之适配基于tomcat Filter的无文件webshell
https://mp.weixin.qq.com/s/n1wrjep4FVtBkOxLouAYfQ
https://mp.weixin.qq.com/s/n1wrjep4FVtBkOxLouAYfQ
AISecOps:打造可信任安全智能
https://mp.weixin.qq.com/s/Tz9V05CHqLg_Wt4yfJZffQ
https://mp.weixin.qq.com/s/Tz9V05CHqLg_Wt4yfJZffQ
XSS修炼之-独孤九剑
http://xcao.vip/test/xss%E4%BF%AE%E7%82%BC%E4%B9%8B%E7%8B%AC%E5%AD%A4%E4%B9%9D%E5%89%91.pdf
http://xcao.vip/test/xss%E4%BF%AE%E7%82%BC%E4%B9%8B%E7%8B%AC%E5%AD%A4%E4%B9%9D%E5%89%91.pdf
玖色直播安全情报报告
https://www.anquanke.com/post/id/207825
https://www.anquanke.com/post/id/207825
GREYONE: Data Flow Sensitive Fuzzing
https://securitygossip.com/blog/2020/05/29/greyone-data-flow-sensitive-fuzzing/
https://securitygossip.com/blog/2020/05/29/greyone-data-flow-sensitive-fuzzing/
[Sec-Trans-12] Github信息收集
https://mp.weixin.qq.com/s/LnjKK1YJ7BvMXPuFbeq37w
https://mp.weixin.qq.com/s/LnjKK1YJ7BvMXPuFbeq37w
ShellCode远程加载器改造计划
https://uknowsec.cn/posts/notes/ShellCode%E8%BF%9C%E7%A8%8B%E5%8A%A0%E8%BD%BD%E5%99%A8%E6%94%B9%E9%80%A0%E8%AE%A1%E5%88%92.html
https://uknowsec.cn/posts/notes/ShellCode%E8%BF%9C%E7%A8%8B%E5%8A%A0%E8%BD%BD%E5%99%A8%E6%94%B9%E9%80%A0%E8%AE%A1%E5%88%92.html
Google 技术文档写作课
https://developers.google.com/tech-writing/one
https://developers.google.com/tech-writing/one
开源软件供应链攻击回顾
https://www.anquanke.com/post/id/207836
https://www.anquanke.com/post/id/207836
碎遮SZhe_Scan Web漏洞扫描器
https://github.com/Cl0udG0d/SZhe_Scan
https://github.com/Cl0udG0d/SZhe_Scan
Monstra CMS RCE漏洞分析(CVE-2020-13384)
https://xz.aliyun.com/t/7850
https://xz.aliyun.com/t/7850
D-Link DIR815路由器缓冲区溢出漏洞再分析
https://xz.aliyun.com/t/7835
https://xz.aliyun.com/t/7835
ScanCVE: 监控Github上CVE增量
https://github.com/grayddq/ScanCVE
https://github.com/grayddq/ScanCVE
用于UAF漏洞的二进制级定向模糊测试
https://www.anquanke.com/post/id/207827
https://www.anquanke.com/post/id/207827
Misbinding Attacks on Secure Device Pairing and Bootstrapping
https://securitygossip.com/blog/2020/05/19/misbinding-attacks-on-secure-device-pairing-and-bootstrapping/
https://securitygossip.com/blog/2020/05/19/misbinding-attacks-on-secure-device-pairing-and-bootstrapping/
vBulletin 5.6.1 SQL注入漏洞
https://xz.aliyun.com/t/7831
https://xz.aliyun.com/t/7831
Diving into the SMBLost vulnerability (CVE-2020-1301)
https://airbus-cyber-security.com/diving-into-the-smblost-vulnerability-cve-2020-1301/amp/?__twitter_impression=true
https://airbus-cyber-security.com/diving-into-the-smblost-vulnerability-cve-2020-1301/amp/?__twitter_impression=true
白盒系列之变量追踪引擎(一)
https://www.freebuf.com/articles/web/236537.html
https://www.freebuf.com/articles/web/236537.html
Java 8u20反序列化漏洞分析
http://blog.topsec.com.cn/java-8u20%e5%8f%8d%e5%ba%8f%e5%88%97%e5%8c%96%e6%bc%8f%e6%b4%9e%e5%88%86%e6%9e%90/
http://blog.topsec.com.cn/java-8u20%e5%8f%8d%e5%ba%8f%e5%88%97%e5%8c%96%e6%bc%8f%e6%b4%9e%e5%88%86%e6%9e%90/
BetterSafetyKatz: SafetyKatz dynamically fetches the latest pre-compile
https://github.com/Flangvik/BetterSafetyKatz
https://github.com/Flangvik/BetterSafetyKatz
JAVA 8u20 反序列化漏洞分析
https://paper.seebug.org/1232/
https://paper.seebug.org/1232/
MySQL数据库巡检系统的设计与应用
https://tech.meituan.com/2020/06/04/mysql-detection-system.html
https://tech.meituan.com/2020/06/04/mysql-detection-system.html
php-malware-finder – Detect Potentially Malicious PHP
https://github.com/jvoisin/php-malware-finder
https://github.com/jvoisin/php-malware-finder
2019年中国国内安全会议年报
https://www.hackinn.com/index.php/archives/688/
https://www.hackinn.com/index.php/archives/688/
pyc 混淆从入门到工具实现
https://mp.weixin.qq.com/s/qvbwTAmDOvpHrAoNdQ7RRA
https://mp.weixin.qq.com/s/qvbwTAmDOvpHrAoNdQ7RRA
代码克隆检测技术初探和开源工具地址分享
https://www.freebuf.com/sectool/233772.html
https://www.freebuf.com/sectool/233772.html
SecWiki周刊(第327期)
https://www.sec-wiki.com/weekly/327
https://www.sec-wiki.com/weekly/327
Careem AWS S3 Bucket Takeover
https://ahussam.me/careem-aws-s3-bucket-takeover/
https://ahussam.me/careem-aws-s3-bucket-takeover/
Anti-Debugging JavaScript Techniques
https://isc.sans.edu/forums/diary/AntiDebugging+JavaScript+Techniques/26228/
https://isc.sans.edu/forums/diary/AntiDebugging+JavaScript+Techniques/26228/
探索如何使用自动化实现对恶意JavaScript脚本的反混淆处理
https://www.anquanke.com/post/id/207813
https://www.anquanke.com/post/id/207813
记一次测试Gitlab
https://xz.aliyun.com/t/7870
https://xz.aliyun.com/t/7870
Predict attacker groups from the techniques and software used
https://github.com/omergunal/Attacker-Group-Predictor
https://github.com/omergunal/Attacker-Group-Predictor
初探PythonOpcode逃逸
https://xz.aliyun.com/t/7828
https://xz.aliyun.com/t/7828
LFCMS的一次审计
https://xz.aliyun.com/t/7844
https://xz.aliyun.com/t/7844
从CVE-2018-4441看jsc的OOB利用
http://blog.topsec.com.cn/%e4%bb%8ecve-2018-4441%e7%9c%8bjsc%e7%9a%84oob%e5%88%a9%e7%94%a8/
http://blog.topsec.com.cn/%e4%bb%8ecve-2018-4441%e7%9c%8bjsc%e7%9a%84oob%e5%88%a9%e7%94%a8/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第328期)
