SecWiki周刊(第5期)
2014/03/31-2014/04/06
安全资讯
More than 24M home routers enabling DNS amplification DDoS attacks
http://www.scmagazine.com/more-than-24m-home-routers-enabling-dns-amplification-ddos-attacks/article/341265/
http://www.scmagazine.com/more-than-24m-home-routers-enabling-dns-amplification-ddos-attacks/article/341265/
安全技术
Struts2 S2-020在Tomcat 8下的命令执行分析
http://www.freebuf.com/articles/web/31039.html
http://www.freebuf.com/articles/web/31039.html
DECAF( Dynamic Executable Code Analysis Framework) 动态二进制分析平台
http://blog.sina.com.cn/s/blog_7847a1bf0101wrqi.html
http://blog.sina.com.cn/s/blog_7847a1bf0101wrqi.html
深入理解JavaScript Hijacking原理
http://www.cnblogs.com/hyddd/archive/2009/07/02/1515768.htm
http://www.cnblogs.com/hyddd/archive/2009/07/02/1515768.htm
falcon-eye:linux monitor tool
https://github.com/UlricQin/falcon-eye
https://github.com/UlricQin/falcon-eye
lnav:The Log File Navigator
http://lnav.org/
http://lnav.org/
SysAnalyzer:automated malcode run time analysis application
http://www.aldeid.com/wiki/SysAnalyzer
http://www.aldeid.com/wiki/SysAnalyzer
Smbexec:rapid post exploitation tool
http://www.sectechno.com/2014/03/30/smbexec-rapid-post-exploitation-tool/
http://www.sectechno.com/2014/03/30/smbexec-rapid-post-exploitation-tool/
NINJA PingU:open-source high performance network scanner
http://owasp.github.io/NINJA-PingU/index.html
http://owasp.github.io/NINJA-PingU/index.html
Web Application Firewalls Are Worth the Investment for Enterprises
http://www.gartner.com/technology/reprints.do?id=1-1RTLH9W&ct=140313&st=sb
http://www.gartner.com/technology/reprints.do?id=1-1RTLH9W&ct=140313&st=sb
现代体系结构上的 UNIX 系统──内核程序员的 SMP 和 Caching 技术
http://vdisk.weibo.com/s/qFP9Ntxv48OA
http://vdisk.weibo.com/s/qFP9Ntxv48OA
International Conference on Learning Representations 2014
http://openreview.net/venue/iclr2014
http://openreview.net/venue/iclr2014
SQLMAP 实例COOKBOOK
http://drops.wooyun.org/tips/1343
http://drops.wooyun.org/tips/1343
Polypasshash:A Password hashing scheme
http://polypasshash.github.io/PolyPassHash/
http://polypasshash.github.io/PolyPassHash/
A Close Look at RTF Zero-Day Attack CVE-2014-1761
http://blogs.mcafee.com/mcafee-labs/close-look-rtf-zero-day-attack-cve-2014-1761-shows-sophistication-attackers
http://blogs.mcafee.com/mcafee-labs/close-look-rtf-zero-day-attack-cve-2014-1761-shows-sophistication-attackers
nude:Nudity detection with Python
https://github.com/hhatto/nude.py
https://github.com/hhatto/nude.py
Watchman:微博平台的链路追踪及服务质量保障系统
http://www.infoq.com/cn/articles/weibo-watchman
http://www.infoq.com/cn/articles/weibo-watchman
More than 24M home routers enabling DNS amplification DDoS attacks
http://www.scmagazine.com/more-than-24m-home-routers-enabling-dns-amplification-ddos-attacks/article/341265/
http://www.scmagazine.com/more-than-24m-home-routers-enabling-dns-amplification-ddos-attacks/article/341265/
Office”组合”式漏洞攻击样本分析
http://blog.vulnhunt.com/index.php/2014/04/04/office%e7%bb%84%e5%90%88%e5%bc%8f%e6%bc%8f%e6%b4%9e%e6%94%bb%e5%87%bb%e6%a0%b7%e6%9c%ac%e5%88%86%e6%9e%90/
http://blog.vulnhunt.com/index.php/2014/04/04/office%e7%bb%84%e5%90%88%e5%bc%8f%e6%bc%8f%e6%b4%9e%e6%94%bb%e5%87%bb%e6%a0%b7%e6%9c%ac%e5%88%86%e6%9e%90/
一种基于Web Workers和CORS技术实现的Web僵尸网络
http://hi.baidu.com/html5sec/item/bd0a12e5a3b4af0a570f1d4e
http://hi.baidu.com/html5sec/item/bd0a12e5a3b4af0a570f1d4e
DLL Side-Loading: Another Blind-Spot for Anti-Virus
http://www.fireeye.com/blog/technical/cyber-exploits/2014/04/dll-side-loading-another-blind-spot-for-anti-virus.html
http://www.fireeye.com/blog/technical/cyber-exploits/2014/04/dll-side-loading-another-blind-spot-for-anti-virus.html
Struts2 S2-020在Tomcat 8下的命令执行分析
http://sec.baidu.com/index.php?research/detail/id/18
http://sec.baidu.com/index.php?research/detail/id/18
DPDK:Data Plane Development Kit
http://dpdk.org/
http://dpdk.org/
DNS泛解析与内容投毒,XSS漏洞以及证书验证的那些事
http://drops.wooyun.org/tips/1354
http://drops.wooyun.org/tips/1354
第二届京东JSRC电商安全沙龙纪实PPT
http://static.3001.net/upload/20140402/13964200397156.rar
http://static.3001.net/upload/20140402/13964200397156.rar
一个科技媒体团队用什么样的团队工具
http://jianshu.io/p/3631a398cd9b#
http://jianshu.io/p/3631a398cd9b#
phantomjs使用说明
http://zhouhua.github.io/2014/03/19/phantomjs/
http://zhouhua.github.io/2014/03/19/phantomjs/
H5SC:HTML5 Security Cheatsheet
https://github.com/cure53/H5SC
https://github.com/cure53/H5SC
Reverse Engineering for Beginners
http://yurichev.com/writings/RE_for_beginners-en.pdf
http://yurichev.com/writings/RE_for_beginners-en.pdf
支持多策略的安全数据库系统研究
http://vdisk.weibo.com/s/zaKA9PTdkdefS/1396588548
http://vdisk.weibo.com/s/zaKA9PTdkdefS/1396588548
Financial cyber threats in 2013. Part 1: phishing
http://www.securelist.com/en/analysis/204792330/Financial_cyber_threats_in_2013_Part_1_phishing
http://www.securelist.com/en/analysis/204792330/Financial_cyber_threats_in_2013_Part_1_phishing
ngxtop:Real-time metrics for nginx server
https://github.com/lebinh/ngxtop
https://github.com/lebinh/ngxtop
Wildcard DNS, Content Poisoning, XSS and Certificate Pinning
http://w00tsec.blogspot.jp/2014/03/wilcard-dns-content-poisoning-xss-and.html
http://w00tsec.blogspot.jp/2014/03/wilcard-dns-content-poisoning-xss-and.html
Android源码分析工具及方法
http://static.sanwho.com/uploads/2014/01/Android%E6%BA%90%E7%A0%81%E5%88%86%E6%9E%90%E5%B7%A5%E5%85%B7%E5%8F%8A%E6%96%B9%E6%B3%95.pdf
http://static.sanwho.com/uploads/2014/01/Android%E6%BA%90%E7%A0%81%E5%88%86%E6%9E%90%E5%B7%A5%E5%85%B7%E5%8F%8A%E6%96%B9%E6%B3%95.pdf
Transceiver for 27 MHz wireless keyboards from Logitech
https://www.cgran.org/wiki/Logitech27MHzTransceiver
https://www.cgran.org/wiki/Logitech27MHzTransceiver
iMilo 实时引擎:Solr vs Elasticsearch
http://www.imilo.cn/findblog/36
http://www.imilo.cn/findblog/36
A Formula for Academic Papers: Introduction
http://slowsearching.blogspot.sg/2014/04/a-formula-for-academic-papers.html
http://slowsearching.blogspot.sg/2014/04/a-formula-for-academic-papers.html
How to Own a Router – Fritz!Box AVM Vulnerability Analysis
http://www.insinuator.net/2014/03/how-to-own-a-router-fritzbox-avm-vulnerability-analysis/
http://www.insinuator.net/2014/03/how-to-own-a-router-fritzbox-avm-vulnerability-analysis/
How to write secure Yii applications
http://www.yiiframework.com/wiki/275/how-to-write-secure-yii-applications/#hh18
http://www.yiiframework.com/wiki/275/how-to-write-secure-yii-applications/#hh18
DNS泛解析与内容投毒,XSS漏洞以及证书验证的那些事
http://drops.wooyun.org/tips/1354
http://drops.wooyun.org/tips/1354
通过dns进行文件下载
http://drops.wooyun.org/tools/1344
http://drops.wooyun.org/tools/1344
Exploring the Effectiveness of Wireless Based Attacks
https://docs.google.com/document/d/16rpRCOCOFQYmKd4FsrtYDI035JsIt5r9ZuivjfBg3zM/edit
https://docs.google.com/document/d/16rpRCOCOFQYmKd4FsrtYDI035JsIt5r9ZuivjfBg3zM/edit
30个有关Python的小技巧
http://blog.jobbole.com/63320/
http://blog.jobbole.com/63320/
HTML5 Using CORS
http://www.html5rocks.com/en/tutorials/cors/
http://www.html5rocks.com/en/tutorials/cors/
Open technology Found CryptoCat iOS
http://vdisk.weibo.com/s/G_jLEbJWrgRb/1396496915
http://vdisk.weibo.com/s/G_jLEbJWrgRb/1396496915
Using the Immunity Debugger API to Automate Analysis
http://vrt-blog.snort.org/2014/04/using-immunity-debugger-api-to-automate.html
http://vrt-blog.snort.org/2014/04/using-immunity-debugger-api-to-automate.html
TrustedSec Tools and Exploits
https://www.trustedsec.com/downloads/tools-download/
https://www.trustedsec.com/downloads/tools-download/
安全专题
Android安全相关书籍汇总
https://www.sec-wiki.com/topic/43
https://www.sec-wiki.com/topic/43
互联网公司的安全架构
https://www.sec-wiki.com/topic/42
https://www.sec-wiki.com/topic/42
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第5期)
