SecWiki周刊(第372期)
2021/04/12-2021/04/18
安全技术
Spring Boot中关于%2e的Trick
http://rui0.cn/archives/1643
http://rui0.cn/archives/1643
哥斯拉插件开发指南——初入茅庐
https://mp.weixin.qq.com/s/Q2eFRQQCEVf4bf_jNsWX2g
https://mp.weixin.qq.com/s/Q2eFRQQCEVf4bf_jNsWX2g
CobaltStrike上线Chrome 0day
https://misakikata.github.io/2021/04/CobaltStrike%E4%B8%8A%E7%BA%BFChrome-0day/
https://misakikata.github.io/2021/04/CobaltStrike%E4%B8%8A%E7%BA%BFChrome-0day/
深入 .NET ViewState 反序列化及其利用
https://mp.weixin.qq.com/s/RlY5HL_ak4G8EdcXyevWDg
https://mp.weixin.qq.com/s/RlY5HL_ak4G8EdcXyevWDg
“域前置Cobalt Strike”之踩坑
https://mp.weixin.qq.com/s/Wh-A3qiyrjPv0KzYeAS-Xw
https://mp.weixin.qq.com/s/Wh-A3qiyrjPv0KzYeAS-Xw
Chromium V8 JavaScript引擎远程代码执行漏洞分析讨论
http://noahblog.360.cn/chromium_v8_remote_code_execution_vulnerability_analysis/
http://noahblog.360.cn/chromium_v8_remote_code_execution_vulnerability_analysis/
InScan: 边界打点后的自动化渗透工具
https://github.com/inbug-team/InScan/
https://github.com/inbug-team/InScan/
反制Webdriver - 从Bot到RCE进发
https://lorexxar.cn/2021/04/16/chrome-webdriver-attack/
https://lorexxar.cn/2021/04/16/chrome-webdriver-attack/
Driftingblues5靶机实战
https://www.sec-in.com/article/1021
https://www.sec-in.com/article/1021
MindAPI: Bringing order to API hacking chaos
https://github.com/dsopas/MindAPI
https://github.com/dsopas/MindAPI
SecWiki周刊(第371期)
https://www.sec-wiki.com/weekly/371
https://www.sec-wiki.com/weekly/371
Spring Boot Fat Jar 写文件漏洞到稳定 RCE 的探索
https://landgrey.me/blog/22/
https://landgrey.me/blog/22/
Java执行shellcode的几种方法
https://mp.weixin.qq.com/s/p74WQwOfkSSZlsuRDke8jw
https://mp.weixin.qq.com/s/p74WQwOfkSSZlsuRDke8jw
安全学术圈2020年度总结
https://mp.weixin.qq.com/s/Tn_nNer_xdDbWmComqV8uw
https://mp.weixin.qq.com/s/Tn_nNer_xdDbWmComqV8uw
三款开源HIDS功能对比评估
https://mp.weixin.qq.com/s/6zLrq-jfkaQWBdeNO2RaYQ
https://mp.weixin.qq.com/s/6zLrq-jfkaQWBdeNO2RaYQ
从BCTF人机对抗视角浅谈自动化攻防技术发展
https://mp.weixin.qq.com/s/5wR37FLoTPn3fftxZw_Brw
https://mp.weixin.qq.com/s/5wR37FLoTPn3fftxZw_Brw
基于TTPs的自动化威胁主体追踪技术
https://mp.weixin.qq.com/s/VMOEL7jIQZPZwdCtXo0e3Q
https://mp.weixin.qq.com/s/VMOEL7jIQZPZwdCtXo0e3Q
主流WebShell工具流量层分析
https://xz.aliyun.com/t/9404
https://xz.aliyun.com/t/9404
HackMyVM:CROSSROADS:1
https://www.sec-in.com/article/1009
https://www.sec-in.com/article/1009
SmartyPHP沙箱逃逸分析
https://www.anquanke.com/post/id/235505
https://www.anquanke.com/post/id/235505
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第372期)
