SecWiki周刊(第59期)
2015/04/13-2015/04/19
安全资讯
Verizon新鲜发布2015年数据泄露调查报告DBIR
http://mp.weixin.qq.com/s?__biz=MzA3MTUwMzI5Nw==&mid=213825938&idx=1&sn=2a5ec95e8a12a5e7e6971ae76965a2cc&scene=1&from=groupmessage&isappinstalled=0#rd
http://mp.weixin.qq.com/s?__biz=MzA3MTUwMzI5Nw==&mid=213825938&idx=1&sn=2a5ec95e8a12a5e7e6971ae76965a2cc&scene=1&from=groupmessage&isappinstalled=0#rd
The new spam: interactive robo-calls from the cloud as cheap as e-mail
http://arstechnica.com/information-technology/2015/04/the-new-spam-interactive-robo-calls-from-the-cloud-as-cheap-as-e-mail/
http://arstechnica.com/information-technology/2015/04/the-new-spam-interactive-robo-calls-from-the-cloud-as-cheap-as-e-mail/
火眼——比黑客更黑的抹黑中国之举
http://mp.weixin.qq.com/s?__biz=MjM5MjEyMTcyMQ==&mid=208021695&idx=2&sn=9c6f579e7e819f797cfc023359698c51#rd
http://mp.weixin.qq.com/s?__biz=MjM5MjEyMTcyMQ==&mid=208021695&idx=2&sn=9c6f579e7e819f797cfc023359698c51#rd
Apache Cassandra JMX/RMI Remote Code Execution
https://labs.mwrinfosecurity.com/advisories/2015/04/17/apache-cassandra-jmxrmi-remote-code-execution/
https://labs.mwrinfosecurity.com/advisories/2015/04/17/apache-cassandra-jmxrmi-remote-code-execution/
2014年网络安全年度简报
http://www.antiy.com/response/2014report.html
http://www.antiy.com/response/2014report.html
ANNOUNCING THE CYBERSECURITY 500 LIST FOR Q2 2015
http://cybersecurityventures.com/cybersecurity-500-q22015/
http://cybersecurityventures.com/cybersecurity-500-q22015/
全球各国黑客部队战力总览
http://www.freebuf.com/news/special/63869.html
http://www.freebuf.com/news/special/63869.html
安全技术
Android Art Hook 技术方案
http://bbs.pediy.com/showthread.php?t=199553
http://bbs.pediy.com/showthread.php?t=199553
MS15-034/CVE-2015-1635 HTTP远程代码执行漏洞分析
http://blogs.360.cn/blog/cve_2015_6135_http_rce_analysis/
http://blogs.360.cn/blog/cve_2015_6135_http_rce_analysis/
一句powershell调用mimikatz抓密码
http://www.secoff.net/archives/389.html
http://www.secoff.net/archives/389.html
10Kstudents video:software vulnerabilities and secure programming
http://10kstudents.eu/
http://10kstudents.eu/
Modern Objective-C Exploitation Techniques
http://www.phrack.org/papers/modern_objc_exploitation.html
http://www.phrack.org/papers/modern_objc_exploitation.html
PDF Password Cracking With John The Ripper
http://blog.didierstevens.com/2015/04/15/pdf-password-cracking-with-john-the-ripper/
http://blog.didierstevens.com/2015/04/15/pdf-password-cracking-with-john-the-ripper/
WOT2015互联网运维与开发者大会课程资料
http://pan.baidu.com/share/link?shareid=1050484341&uk=1364435411
http://pan.baidu.com/share/link?shareid=1050484341&uk=1364435411
The Chronicles of the Hellsing APT: the Empire Strikes Back
https://securelist.com/analysis/publications/69567/the-chronicles-of-the-hellsing-apt-the-empire-strikes-back/
https://securelist.com/analysis/publications/69567/the-chronicles-of-the-hellsing-apt-the-empire-strikes-back/
JMX RMI Exploit
http://www.n0tr00t.com/2015/04/16/JMX-RMI-Exploit.html
http://www.n0tr00t.com/2015/04/16/JMX-RMI-Exploit.html
Public Block Lists of Malicious IPs and URLs
http://www.selectrealsecurity.com/public-block-lists
http://www.selectrealsecurity.com/public-block-lists
OS X Malware Samples
https://objective-see.com/malware.html
https://objective-see.com/malware.html
Extinction Level Event: Evolution of the Sandbox
http://info.lastline.com/blog/extinction-level-event-evolution-of-the-sandbox
http://info.lastline.com/blog/extinction-level-event-evolution-of-the-sandbox
wot-web攻击日志分析 (1).pptx
http://vdisk.weibo.com/s/vqrRvO1fQIKM
http://vdisk.weibo.com/s/vqrRvO1fQIKM
Malware in the Wild: Evolving to Evade Detection
http://www.slideshare.net/lastlinesecurity/malware-in-the-wild-evolving-to-evade-detection
http://www.slideshare.net/lastlinesecurity/malware-in-the-wild-evolving-to-evade-detection
APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER
https://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf
https://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf
pysymemu:An intel 64 symbolic emulator
https://github.com/feliam/pysymemu
https://github.com/feliam/pysymemu
Bypassing kernel ASLR Target : Windows 10
https://drive.google.com/file/d/0B3P18M-shbwrNWZTa181ZWRCclk/edit
https://drive.google.com/file/d/0B3P18M-shbwrNWZTa181ZWRCclk/edit
Hard Disk Firmware Hacking (Part 1)
http://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html
http://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html
iPhone 目标分析及使用 UDID 实施入侵
http://blog.knownsec.com/2015/04/iphone-target-analysis-and-exploitation-with-appleudid/
http://blog.knownsec.com/2015/04/iphone-target-analysis-and-exploitation-with-appleudid/
crossdomain.xml : Beware of Wildcards
http://blog.h3xstream.com/2015/04/crossdomainxml-beware-of-wildcards.html#demo_video_swf
http://blog.h3xstream.com/2015/04/crossdomainxml-beware-of-wildcards.html#demo_video_swf
nmap旁站查询脚本
http://www.secoff.net/archives/400.html
http://www.secoff.net/archives/400.html
数据科学家和他们的可视化工具
http://djchina.org/2015/04/16/openvis_1/
http://djchina.org/2015/04/16/openvis_1/
一个盗取用户淘宝信息的木马分析
http://blogs.360.cn/blog/taobao_information_trojan/
http://blogs.360.cn/blog/taobao_information_trojan/
深入解读:Windows HTTP.sys远程代码执行漏洞跟踪进展
http://mp.weixin.qq.com/s?__biz=MjM5ODYyMTM4MA==&mid=205178018&idx=1&sn=cea04c7ac59e47c8615d46957771ddc3#rd
http://mp.weixin.qq.com/s?__biz=MjM5ODYyMTM4MA==&mid=205178018&idx=1&sn=cea04c7ac59e47c8615d46957771ddc3#rd
解读“重定向SMB”攻击
http://drops.wooyun.org/papers/5723
http://drops.wooyun.org/papers/5723
Google’s April Fool’s prank inadvertently broke their security
http://news.netcraft.com/archives/2015/04/17/googles-april-fools-prank-inadvertently-broke-their-security.html
http://news.netcraft.com/archives/2015/04/17/googles-april-fools-prank-inadvertently-broke-their-security.html
Modern Objective-C Exploitation Techniques
http://www.phrack.com/papers/modern_objc_exploitation.html
http://www.phrack.com/papers/modern_objc_exploitation.html
One Day with Cortana Script Engine
http://security-is-just-an-illusion.blogspot.com/2013/11/one-day-with-cortana-script-engine.html
http://security-is-just-an-illusion.blogspot.com/2013/11/one-day-with-cortana-script-engine.html
What the Ridiculous Fuck, D-Link
http://www.devttys0.com/2015/04/what-the-ridiculous-fuck-d-link/
http://www.devttys0.com/2015/04/what-the-ridiculous-fuck-d-link/
关于移动端的钓鱼式攻击
http://coolshell.cn/articles/17066.html
http://coolshell.cn/articles/17066.html
New POS Malware Emerges
https://www.trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/
https://www.trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/
An Analysis Of MS15-034
http://www.securitysift.com/an-analysis-of-ms15-034/
http://www.securitysift.com/an-analysis-of-ms15-034/
Hard Disk Firmware Hacking (Part 2)
http://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-2.html
http://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-2.html
AppUse(Android测试平台)用户手册 v2-2
http://drops.wooyun.org/tools/5599
http://drops.wooyun.org/tools/5599
《安全参考》HACKCTO-201504-28
http://pan.baidu.com/s/1c04e7Kk
http://pan.baidu.com/s/1c04e7Kk
Analysis of Flash Player shared ByteArray Use-After-Free Vulnerability
https://blog.coresecurity.com/2015/04/13/analysis-of-adobe-flash-player-shared-bytearray-use-after-free-vulnerability/
https://blog.coresecurity.com/2015/04/13/analysis-of-adobe-flash-player-shared-bytearray-use-after-free-vulnerability/
Secunia Research details the Vulnerability in Oracle Outside In
http://secunia.com/blog/secunia-research-details-the-vulnerability-in-oracle-outside-in--424/
http://secunia.com/blog/secunia-research-details-the-vulnerability-in-oracle-outside-in--424/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第59期)
