SecWiki周刊(第365期)
2021/02/22-2021/02/28
安全技术
NDSS 2021 参会小记—2月22日论文报告
https://mp.weixin.qq.com/s/LI49ioKYMksguQMqKH1Rcw
https://mp.weixin.qq.com/s/LI49ioKYMksguQMqKH1Rcw
内网渗透代理之frp的应用与改造(一)
https://www.anquanke.com/post/id/231424
https://www.anquanke.com/post/id/231424
Apache Axis1 与 Axis2 WebService 的漏洞利用总结
https://paper.seebug.org/1489/
https://paper.seebug.org/1489/
JAVA安全基础(二)-- 反射机制
https://xz.aliyun.com/t/9117
https://xz.aliyun.com/t/9117
CDN 2021 完全攻击指南 (一)
https://www.anquanke.com/post/id/227818
https://www.anquanke.com/post/id/227818
美国国家安全局发布零信任安全模型指南
https://mp.weixin.qq.com/s/UsClBKw4Fglcn8ludJtRKQ
https://mp.weixin.qq.com/s/UsClBKw4Fglcn8ludJtRKQ
CDN 2021 完全攻击指南 (三)
https://www.anquanke.com/post/id/231441
https://www.anquanke.com/post/id/231441
DA14531芯片固件逆向系列(2)- 操作系统底层机制分析
https://xz.aliyun.com/t/9186
https://xz.aliyun.com/t/9186
f8x: 红/蓝队环境自动化部署工具
https://github.com/ffffffff0x/f8x
https://github.com/ffffffff0x/f8x
业务安全的上岸体历
https://www.sec-in.com/article/890
https://www.sec-in.com/article/890
钓鱼基础设施的应用分析
https://www.anquanke.com/post/id/231444
https://www.anquanke.com/post/id/231444
Angr源码阅读笔记01
https://www.anquanke.com/post/id/231460
https://www.anquanke.com/post/id/231460
内网渗透代理之frp的应用与改造(二)
https://www.anquanke.com/post/id/231685
https://www.anquanke.com/post/id/231685
SecWiki周刊(第364期)
https://www.sec-wiki.com/weekly/364
https://www.sec-wiki.com/weekly/364
CDN 2021 完全攻击指南 (二)
https://www.anquanke.com/post/id/231437
https://www.anquanke.com/post/id/231437
菜菜鸡的初体验之内网渗透
https://xz.aliyun.com/t/9190
https://xz.aliyun.com/t/9190
详解反弹shell多维检测技术
https://www.freebuf.com/articles/network/263684.html
https://www.freebuf.com/articles/network/263684.html
An Exploration of JSON Interoperability Vulnerabilities
https://labs.bishopfox.com/tech-blog/an-exploration-of-json-interoperability-vulnerabilities
https://labs.bishopfox.com/tech-blog/an-exploration-of-json-interoperability-vulnerabilities
A Cyber Threat Intelligence Self-Study Plan: Part 1
https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a
https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a
美国网络空间攻击特点与模式
https://mp.weixin.qq.com/s/gbyWEB6IbANJ-B2eRboYHg
https://mp.weixin.qq.com/s/gbyWEB6IbANJ-B2eRboYHg
美军网络空间作战理论体系初探
https://mp.weixin.qq.com/s/Im-bacvc_1GGvLPtRspicw
https://mp.weixin.qq.com/s/Im-bacvc_1GGvLPtRspicw
从“产品模式”到“运营模式”
https://mp.weixin.qq.com/s/mIbwVj3oVEnippj5YGkNTA
https://mp.weixin.qq.com/s/mIbwVj3oVEnippj5YGkNTA
恶意代码检测的本质性思考
https://zhuanlan.zhihu.com/p/352004681
https://zhuanlan.zhihu.com/p/352004681
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第365期)
