SecWiki周刊(第329期)
2020/06/15-2020/06/21
      安全资讯
    
全国23省市“新基建”网安任务重点梳理
https://mp.weixin.qq.com/s/Isv3mrwIIEHZi6_gn7u-9g
https://mp.weixin.qq.com/s/Isv3mrwIIEHZi6_gn7u-9g
      安全技术
    
JBOSS 无文件webshell的技术研究
https://mp.weixin.qq.com/s/_SQS9B7tkL1H5fMIgPTOKw
https://mp.weixin.qq.com/s/_SQS9B7tkL1H5fMIgPTOKw
weblogic 无文件webshell的技术研究
https://mp.weixin.qq.com/s/euYuuI78oJhUHt9dVkomKA
https://mp.weixin.qq.com/s/euYuuI78oJhUHt9dVkomKA
一线执法必备的自我隐私保护能力
https://mp.weixin.qq.com/s/h6jE7RD6pzaPINxiRoG0BQ
https://mp.weixin.qq.com/s/h6jE7RD6pzaPINxiRoG0BQ
Vulnhub靶机实战 | joker
https://cloud.tencent.com/developer/article/1647108
https://cloud.tencent.com/developer/article/1647108
基于ClickHouse + Redash + Python去做安全数据分析
https://mp.weixin.qq.com/s/O7IuAZV1XuogKwsoLhx4Qw
https://mp.weixin.qq.com/s/O7IuAZV1XuogKwsoLhx4Qw
Docker逃逸小结 第一版
https://xz.aliyun.com/t/7881
https://xz.aliyun.com/t/7881
抱紧你的SIM卡—5G物理安全初探
https://zhuanlan.zhihu.com/p/149614674
https://zhuanlan.zhihu.com/p/149614674
"白象三代"APT组织攻击活动
https://mp.weixin.qq.com/s/ve2L6_v0EvJZwLSyWijvUw
https://mp.weixin.qq.com/s/ve2L6_v0EvJZwLSyWijvUw
BlueShell: 红蓝对抗跨平台远控工具
https://github.com/whitehatnote/BlueShell?from=timeline
https://github.com/whitehatnote/BlueShell?from=timeline
AsiaCCS 2020 论文录用列表
https://mp.weixin.qq.com/s/uCyikieFzmbF0gAFTeHSfA
https://mp.weixin.qq.com/s/uCyikieFzmbF0gAFTeHSfA
D-Link DIR878路由器命令执行漏洞分析
https://www.freebuf.com/vuls/237533.html
https://www.freebuf.com/vuls/237533.html
goSkylar: 基于Golang开发的企业级外网端口资产扫描
https://github.com/LakeVilladom/goSkylar
https://github.com/LakeVilladom/goSkylar
基于JVM-Sandbox实现RASP安全监控防护
https://github.com/angelwhu/jvm-rasp
https://github.com/angelwhu/jvm-rasp
Microsoft Windows LNK Remote Code Execution Vulnerability - CVE-2020-1299
https://blog.vincss.net/2020/06/cve49-microsoft-windows-lnk-remote-code-execution-vuln-cve-2020-1299-eng.html
https://blog.vincss.net/2020/06/cve49-microsoft-windows-lnk-remote-code-execution-vuln-cve-2020-1299-eng.html
菜刀连接PHP WebShell返回200错误
https://blog.csdn.net/bloodzer0/article/details/106812282
https://blog.csdn.net/bloodzer0/article/details/106812282
Get-WeChat-DB: 获取目标机器的微信数据库和密钥
https://github.com/A2kaid/Get-WeChat-DB
https://github.com/A2kaid/Get-WeChat-DB
码小六 - GitHub 代码泄露监控系统
https://github.com/4x99/code6
https://github.com/4x99/code6
巡风漏洞扫描系统源码分析
https://www.anquanke.com/post/id/207831
https://www.anquanke.com/post/id/207831
2020 DozerCTF部分 Write Up
https://www.anquanke.com/post/id/208526
https://www.anquanke.com/post/id/208526
利用Unicode兼容性绕过WAF
https://jlajara.gitlab.io/web/2020/02/19/Bypass_WAF_Unicode.html
https://jlajara.gitlab.io/web/2020/02/19/Bypass_WAF_Unicode.html
Reverse Engineering a VxWorks OS Based Router
https://blog.quarkslab.com/reverse-engineering-a-vxworks-os-based-router.html
https://blog.quarkslab.com/reverse-engineering-a-vxworks-os-based-router.html
使用ZoomEye寻找APT攻击的蛛丝马迹
https://www.freebuf.com/sectool/237758.html
https://www.freebuf.com/sectool/237758.html
firefox-hackbar-2.2.9 自签名学习版全过程
https://xz.aliyun.com/t/7857
https://xz.aliyun.com/t/7857
Jsonp漏洞简析及自动化漏洞挖掘脚本编写
https://mp.weixin.qq.com/s/SuEpF3RIZIv2CcIUok8SoQ
https://mp.weixin.qq.com/s/SuEpF3RIZIv2CcIUok8SoQ
内网渗透之ICMP隐藏隧道
https://xz.aliyun.com/t/7875
https://xz.aliyun.com/t/7875
Exploring ATT&CK and MISP data with Maltego
https://www.maltego.com/blog/exploring-att-ck-and-misp-data-with-maltego/
https://www.maltego.com/blog/exploring-att-ck-and-misp-data-with-maltego/
Gitlab安装与配置LDAP登录
https://blog.csdn.net/bloodzer0/article/details/106809701
https://blog.csdn.net/bloodzer0/article/details/106809701
一种新型shellcode仿真框架分析
https://mp.weixin.qq.com/s/9XHNMwIhmZLtOI385_4iaQ
https://mp.weixin.qq.com/s/9XHNMwIhmZLtOI385_4iaQ
Valak 恶意软件与 Gozi ConfCrew 的千丝万缕联系
https://paper.seebug.org/1246/
https://paper.seebug.org/1246/
时间序列预测方法总结
https://zhuanlan.zhihu.com/p/67832773
https://zhuanlan.zhihu.com/p/67832773
简述获取shellcode的几种方式
https://www.freebuf.com/articles/system/237300.html
https://www.freebuf.com/articles/system/237300.html
深度解读:Verizon 2020年数据泄露报告
https://mp.weixin.qq.com/s/sDu5eydjesAwsI2v8dEj5Q
https://mp.weixin.qq.com/s/sDu5eydjesAwsI2v8dEj5Q
Compromising theIntermediary Web Services That Rehost Websites
https://securitygossip.com/blog/2020/05/15/melting-pot-of-origins-compromising-theintermediary-web-services-that-rehost-websites/
https://securitygossip.com/blog/2020/05/15/melting-pot-of-origins-compromising-theintermediary-web-services-that-rehost-websites/
Java单向代码执行链配合的动态代码上下文执行
http://rui0.cn/archives/1408
http://rui0.cn/archives/1408
针对知名航天和军事公司的攻击活动分析
https://paper.seebug.org/1248/
https://paper.seebug.org/1248/
Centos7搭建原生LDAP服务
https://blog.csdn.net/bloodzer0/article/details/106805913
https://blog.csdn.net/bloodzer0/article/details/106805913
SecWiki周刊(第328期)
https://www.sec-wiki.com/weekly/328
https://www.sec-wiki.com/weekly/328
Nagiosxi 5.6.11-5.6.13版本的一个RCE漏洞
https://bacde.me/post/nagiosxi-rce-1/
https://bacde.me/post/nagiosxi-rce-1/
某cms的一次审计
https://xz.aliyun.com/t/7872
https://xz.aliyun.com/t/7872
Subrion CMS 代码审计
https://mp.weixin.qq.com/s/HX12VGVtJo3zc7XI8OVwpg
https://mp.weixin.qq.com/s/HX12VGVtJo3zc7XI8OVwpg
实战笔记:滑动验证码攻防对抗
https://www.freebuf.com/articles/web/238038.html
https://www.freebuf.com/articles/web/238038.html
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com本期原文地址: SecWiki周刊(第329期)

 
					 
					 
					