SecWiki周刊(第355期)
2020/12/14-2020/12/20
安全资讯
公安机关网安部门打击网络黑产犯罪工作
https://mp.weixin.qq.com/s/h53qn-2vODsakiCxf9CvXQ
https://mp.weixin.qq.com/s/h53qn-2vODsakiCxf9CvXQ
安全技术
NIST、CIS、MITRE、SANS 傻傻分不清楚
https://mp.weixin.qq.com/s/wZF3TAVPr5t2KxMi_Gc2-w
https://mp.weixin.qq.com/s/wZF3TAVPr5t2KxMi_Gc2-w
巧用Zeek在流量层狩猎哥斯拉Godzilla
https://www.anquanke.com/post/id/224831
https://www.anquanke.com/post/id/224831
DeepDi: A Fast and Accurate Disassembler for Binary Code AI
https://www.deepbitstech.com/deepdi.html
https://www.deepbitstech.com/deepdi.html
落鹰行动-史上影响力最大的供应链攻击行动揭秘
https://mp.weixin.qq.com/s/lh7y_KHUxag_-pcFBC7d0Q
https://mp.weixin.qq.com/s/lh7y_KHUxag_-pcFBC7d0Q
利用JARM指纹进行TLS服务端标记
https://mp.weixin.qq.com/s/CTBO22SuQft1dBoHv2WRQg
https://mp.weixin.qq.com/s/CTBO22SuQft1dBoHv2WRQg
我的应用安全方法论:路在脚下
https://mp.weixin.qq.com/s/atfMoXjxccUfrZbFsULiRg
https://mp.weixin.qq.com/s/atfMoXjxccUfrZbFsULiRg
SOREL-20M: Sophos-ReversingLabs 20 million sample dataset
https://github.com/sophos-ai/SOREL-20M
https://github.com/sophos-ai/SOREL-20M
攻击推理:基于攻击溯源图的威胁评估技术
http://blog.nsfocus.net/threat-assessment-1209/
http://blog.nsfocus.net/threat-assessment-1209/
吐槽国内对SolarWinds事件的分析
https://mp.weixin.qq.com/s/ytm62hJ59XIDi-QRlZTfEg
https://mp.weixin.qq.com/s/ytm62hJ59XIDi-QRlZTfEg
ASPX之黑名单上传限制的绕过
https://mp.weixin.qq.com/s/FMZQpn9ck3bbPLUgdLDXUw
https://mp.weixin.qq.com/s/FMZQpn9ck3bbPLUgdLDXUw
记一次攻防演习渗透过程
https://gh0st.cn//archives/2020-11-22/1
https://gh0st.cn//archives/2020-11-22/1
简单聊聊网络空间测绘纵横之道
https://mp.weixin.qq.com/s/aBvptjz9gzxG_lPBY8ECVA
https://mp.weixin.qq.com/s/aBvptjz9gzxG_lPBY8ECVA
网络空间测绘技术之:协议识别(RDP篇)
https://zhuanlan.zhihu.com/p/336936793
https://zhuanlan.zhihu.com/p/336936793
SolarWinds事件八卦解读
https://mp.weixin.qq.com/s/aWZ0mrapJTpHwL0nBnGhmg
https://mp.weixin.qq.com/s/aWZ0mrapJTpHwL0nBnGhmg
吐槽《吐槽国内对SolarWinds事件的分析》
https://weibo.com/ttarticle/x/m/show/id/2309404582616916688901
https://weibo.com/ttarticle/x/m/show/id/2309404582616916688901
基于静态依赖分析的安卓GUI自动化探测方法
https://mp.weixin.qq.com/s/YQDxUqo_ufjt3cuDNOUfwQ
https://mp.weixin.qq.com/s/YQDxUqo_ufjt3cuDNOUfwQ
LibFuzzer workshop学习之路
https://www.anquanke.com/post/id/224823
https://www.anquanke.com/post/id/224823
GetShell的姿势总结
https://www.sec-in.com/article/743
https://www.sec-in.com/article/743
命令注入靶场空格过滤绕过测试
https://mp.weixin.qq.com/s/pdU1XnBhnxRRGlncY3pDxQ
https://mp.weixin.qq.com/s/pdU1XnBhnxRRGlncY3pDxQ
domainNamePredictor: 公司域名使用规律预测及生成工具
https://github.com/LandGrey/domainNamePredictor
https://github.com/LandGrey/domainNamePredictor
MSSQL绕过微软杀毒提权案例
https://mp.weixin.qq.com/s/GceeUFbwsaHUwKQpY6VFkw
https://mp.weixin.qq.com/s/GceeUFbwsaHUwKQpY6VFkw
[SCUCTF新生赛2020]RE部分WP
http://blog.bluesadi.cn:4000/2020/11/26/SCUCTF-2020%E6%96%B0%E7%94%9F%E8%B5%9B-RE%E9%83%A8%E5%88%86WP/
http://blog.bluesadi.cn:4000/2020/11/26/SCUCTF-2020%E6%96%B0%E7%94%9F%E8%B5%9B-RE%E9%83%A8%E5%88%86WP/
FuzzingPaper: Recent Fuzzing Paper
https://github.com/wcventure/FuzzingPaper
https://github.com/wcventure/FuzzingPaper
SecWiki周刊(第354期)
https://www.sec-wiki.com/weekly/354
https://www.sec-wiki.com/weekly/354
某系统Oracle+Bypass盲注
https://www.sec-in.com/article/750
https://www.sec-in.com/article/750
CVE-2020-15257 containerd-shim Exploit
https://www.cdxy.me/?p=837
https://www.cdxy.me/?p=837
linux库说明以及如何修改动态链接库
https://www.sec-in.com/article/725
https://www.sec-in.com/article/725
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第355期)
