SecWiki周刊(第54期)
2015/03/09-2015/03/15
安全资讯
CODEGATE CTF 2015
http://codegate.grayhash.com/html/Main.html?lang=eng
http://codegate.grayhash.com/html/Main.html?lang=eng
US military looks to 3,000 new security hires by 2016
http://www.welivesecurity.com/2015/03/10/us-military-looks-3000-new-security-hires-2016/
http://www.welivesecurity.com/2015/03/10/us-military-looks-3000-new-security-hires-2016/
Operating System Vulnerabilities, Exploits and Insecurity
http://www.welivesecurity.com/2015/03/10/operating-system-vulnerabilities-exploits-insecurity/
http://www.welivesecurity.com/2015/03/10/operating-system-vulnerabilities-exploits-insecurity/
INFILTRATE 2015 conference
http://www.infiltratecon.com/speakers.html
http://www.infiltratecon.com/speakers.html
Black Hat Asia 2015
https://www.blackhat.com/asia-15/briefings.html
https://www.blackhat.com/asia-15/briefings.html
安全技术
WIFI万能钥匙Python查询脚本
http://thecjw.0ginr.com/blog/archives/534
http://thecjw.0ginr.com/blog/archives/534
CVE-2015-0204 OpenSSL FREAK Attack漏洞检测方法及修复建议
https://sobug.com/article/detail/15
https://sobug.com/article/detail/15
360加固保ELF脱壳总结
http://thecjw.0ginr.com/blog/archives/552
http://thecjw.0ginr.com/blog/archives/552
从逆向360驱动谈Linux安全软件应如何设计
http://blog.cloud-sec.org/uncategorized/%e4%bb%8e%e9%80%86%e5%90%91360%e9%a9%b1%e5%8a%a8%e8%b0%88linux%e5%ae%89%e5%85%a8%e8%bd%af%e4%bb%b6%e8%ae%be%e8%ae%a1/
http://blog.cloud-sec.org/uncategorized/%e4%bb%8e%e9%80%86%e5%90%91360%e9%a9%b1%e5%8a%a8%e8%b0%88linux%e5%ae%89%e5%85%a8%e8%bd%af%e4%bb%b6%e8%ae%be%e8%ae%a1/
Data-Hack SQL注入检测
http://drops.wooyun.org/tips/5118
http://drops.wooyun.org/tips/5118
CVE-2015-0240:Samba全系版本远程命令执行漏洞检测方法及修复建议
https://sobug.com/article/detail/14
https://sobug.com/article/detail/14
详解Android App AllowBackup配置带来的风险
https://sobug.com/article/detail/16
https://sobug.com/article/detail/16
Python Registry Parser (regparse)
http://sysforensics.org/2015/03/python-registry-parser.html
http://sysforensics.org/2015/03/python-registry-parser.html
分析配置文件的格式解密加密数据
http://drops.wooyun.org/binary/5147
http://drops.wooyun.org/binary/5147
BSides Tampa 2015 Videos
http://www.irongeek.com/i.php?page=videos/bsidestampa2015/mainlist
http://www.irongeek.com/i.php?page=videos/bsidestampa2015/mainlist
Bayesian Methods for Hackers
https://camdavidsonpilon.github.io/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/
https://camdavidsonpilon.github.io/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers/
新浪微博IPAD客户端XSS(file域) + 构造Worm
http://www.leavesongs.com/PENETRATION/ipad-weibo-store-xss-worm.html
http://www.leavesongs.com/PENETRATION/ipad-weibo-store-xss-worm.html
Justniffer:network protocol analyzer
http://justniffer.sourceforge.net/
http://justniffer.sourceforge.net/
Full details on CVE-2015-0096 and the failed MS10-046 Stuxnet fix
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Full-details-on-CVE-2015-0096-and-the-failed-MS10-046-Stuxnet/ba-p/6718459#.VP_AEFND5U0
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Full-details-on-CVE-2015-0096-and-the-failed-MS10-046-Stuxnet/ba-p/6718459#.VP_AEFND5U0
peCloak.py – An Experiment in AV Evasion
http://www.securitysift.com/pecloak-py-an-experiment-in-av-evasion/
http://www.securitysift.com/pecloak-py-an-experiment-in-av-evasion/
2015 春节 CC 攻击习科调查 IV
http://attach.blackbap.org/pdf/CC_Attack_by_mateng7410.pdf
http://attach.blackbap.org/pdf/CC_Attack_by_mateng7410.pdf
Mobile self-defense
http://nullcon.net/website/archives/ppt/goa-15/mobile-self-defence.pdf
http://nullcon.net/website/archives/ppt/goa-15/mobile-self-defence.pdf
wig:WebApp Information Gatherer
https://github.com/jekyc/wig
https://github.com/jekyc/wig
利用redis写webshell
http://www.secpulse.com/archives/5357.html
http://www.secpulse.com/archives/5357.html
Making Finfisher Undetectable
http://lqdc.github.io/making-finfisher-undetectable.html
http://lqdc.github.io/making-finfisher-undetectable.html
Fireeye Mandiant 2014 安全报告 Part2
http://drops.wooyun.org/news/5153
http://drops.wooyun.org/news/5153
Elasticsearch权威指南
http://es.xiaoleilu.com/
http://es.xiaoleilu.com/
密码找回逻辑漏洞总结
http://drops.wooyun.org/web/5048
http://drops.wooyun.org/web/5048
Machine Learning for Programming
http://www.infoq.com/presentations/machine-learning-general-programming
http://www.infoq.com/presentations/machine-learning-general-programming
Bypassing ASLR with CVE-2015-0071
http://blog.trendmicro.com/trendlabs-security-intelligence/bypassing-aslr-with-cve-2015-0071-an-out-of-bounds-read-vulnerability/
http://blog.trendmicro.com/trendlabs-security-intelligence/bypassing-aslr-with-cve-2015-0071-an-out-of-bounds-read-vulnerability/
机器学习资料大汇总
http://www.52ml.net/star
http://www.52ml.net/star
Fingerprinter:Versions Fingerprinter
https://github.com/erwanlr/Fingerprinter
https://github.com/erwanlr/Fingerprinter
Kaspersky Security Bulletin. Spam in 2014
https://securelist.com/analysis/kaspersky-security-bulletin/69225/kaspersky-security-bulletin-spam-in-2014/
https://securelist.com/analysis/kaspersky-security-bulletin/69225/kaspersky-security-bulletin-spam-in-2014/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第54期)
