SecWiki周刊(第64期)
2015/05/18-2015/05/24
安全资讯
DEF CON CTF 2015 Qualifiers are Complete
https://blog.legitbs.net/2015/05/def-con-ctf-2015-qualifiers-are-complete.html
https://blog.legitbs.net/2015/05/def-con-ctf-2015-qualifiers-are-complete.html
Black Hat USA 2015 | Briefings
http://www.blackhat.com/us-15/briefings.html
http://www.blackhat.com/us-15/briefings.html
Vectra-基于网络流量的异常行为分析系统
http://mp.weixin.qq.com/s?__biz=MzAwNzAyNjkyMA==&mid=207687691&idx=1&sn=ce3d208fbc6cbb38271afdf65aff4f54&scene=5#rd
http://mp.weixin.qq.com/s?__biz=MzAwNzAyNjkyMA==&mid=207687691&idx=1&sn=ce3d208fbc6cbb38271afdf65aff4f54&scene=5#rd
Defcon 23 CTF quals - Top 20 Graph
http://stalkr.net/defcon/graph.htm
http://stalkr.net/defcon/graph.htm
安全技术
Intel SGX安全技术学习研究引导手册
http://www.vonwei.com/post/IntelSGXGuide.html
http://www.vonwei.com/post/IntelSGXGuide.html
IEEE Symposium on Security and Privacy 2015
http://www.ieee-security.org/TC/SP2015/program.html
http://www.ieee-security.org/TC/SP2015/program.html
Sniffing GSM traffic with HackRF
https://z4ziggy.wordpress.com/2015/05/17/sniffing-gsm-traffic-with-hackrf/
https://z4ziggy.wordpress.com/2015/05/17/sniffing-gsm-traffic-with-hackrf/
PHP Multipart/form-data remote DOS 防御方案研究
http://www.leavesongs.com/PHP/PHP-Multipart-form-data-remote-DOS-Vulnerability.html
http://www.leavesongs.com/PHP/PHP-Multipart-form-data-remote-DOS-Vulnerability.html
LaZagne:Credentials recovery project
https://github.com/AlessandroZ/LaZagne
https://github.com/AlessandroZ/LaZagne
cve-2014-7911安卓提权漏洞分析
http://drops.wooyun.org/papers/6082
http://drops.wooyun.org/papers/6082
利用GRC进行安全研究和审计 – 将无线电信号转换为数据包
http://drops.wooyun.org/tips/4118
http://drops.wooyun.org/tips/4118
An Exploit Kit dedicated to CSRF Pharming
http://malware.dontneedcoffee.com/2015/05/an-exploit-kit-dedicated-to-csrf.html
http://malware.dontneedcoffee.com/2015/05/an-exploit-kit-dedicated-to-csrf.html
Security Firm Redefines APT: African Phishing Threat
http://krebsonsecurity.com/2015/05/security-firm-redefines-apt-african-phishing-threat/
http://krebsonsecurity.com/2015/05/security-firm-redefines-apt-african-phishing-threat/
IIS的新UNICODE漏洞 WideChar和MultiByte字符转换问题
http://weibo.com/p/1001603843609647549905
http://weibo.com/p/1001603843609647549905
powershell各种反弹姿势以及取证(一)
http://drops.wooyun.org/tips/6090
http://drops.wooyun.org/tips/6090
浅谈被加壳ELF的调试
http://drops.wooyun.org/papers/6162
http://drops.wooyun.org/papers/6162
Logjam: How Diffie-Hellman Fails in Practice
https://weakdh.org/
https://weakdh.org/
NO SQL! NO INJECTION?
http://ieee-security.org/TC/SPW2015/W2SP/slides/No%20SQL!%20no%20injection%20slides.pdf
http://ieee-security.org/TC/SPW2015/W2SP/slides/No%20SQL!%20no%20injection%20slides.pdf
IPsec Vulnerabilities and Software Security Prediction
https://www.altsci.com/ipsec/
https://www.altsci.com/ipsec/
第十一届校赛初赛 writeup
http://blog.sycsec.com/?p=532
http://blog.sycsec.com/?p=532
A Field Guide to Docker Security Measures
https://zwischenzugs.wordpress.com/2015/05/21/a-field-guide-to-docker-security-measures/
https://zwischenzugs.wordpress.com/2015/05/21/a-field-guide-to-docker-security-measures/
IE安全系列:脚本先锋(III)--网马中的Shellcode
http://drops.wooyun.org/tips/6123
http://drops.wooyun.org/tips/6123
Miscellaneous exploit code
https://github.com/XiphosResearch/exploits
https://github.com/XiphosResearch/exploits
Android密码学相关
http://drops.wooyun.org/tips/6049
http://drops.wooyun.org/tips/6049
(s|qu)eries: 面向事件序列的视觉正则表达式检索浏览工具
http://vis.pku.edu.cn/blog/squeries-%e9%9d%a2%e5%90%91%e4%ba%8b%e4%bb%b6%e5%ba%8f%e5%88%97%e7%9a%84%e8%a7%86%e8%a7%89%e6%ad%a3%e5%88%99%e8%a1%a8%e8%be%be%e5%bc%8f%e6%a3%80%e7%b4%a2%e6%b5%8f%e8%a7%88%e5%b7%a5%e5%85%b7/#more-2443#jtss-tsina
http://vis.pku.edu.cn/blog/squeries-%e9%9d%a2%e5%90%91%e4%ba%8b%e4%bb%b6%e5%ba%8f%e5%88%97%e7%9a%84%e8%a7%86%e8%a7%89%e6%ad%a3%e5%88%99%e8%a1%a8%e8%be%be%e5%bc%8f%e6%a3%80%e7%b4%a2%e6%b5%8f%e8%a7%88%e5%b7%a5%e5%85%b7/#more-2443#jtss-tsina
云控攻击之“人生在世”木马分析
http://blogs.360.cn/blog/cloud-life/
http://blogs.360.cn/blog/cloud-life/
Technical Sessions of USENIX 2015
https://www.usenix.org/conference/usenixsecurity15/technical-sessions
https://www.usenix.org/conference/usenixsecurity15/technical-sessions
Open-Falcon|互联网企业级监控系统
http://open-falcon.com/
http://open-falcon.com/
Exploit Kit authors give up on Malwarebytes users
https://blog.malwarebytes.org/exploits-2/2015/05/exploit-kit-authors-give-up-on-malwarebytes-users/
https://blog.malwarebytes.org/exploits-2/2015/05/exploit-kit-authors-give-up-on-malwarebytes-users/
Introduction to Hardware and Embedded Forensics
http://www.sysforensics.org/2015/05/introduction-to-hardware-forensics/
http://www.sysforensics.org/2015/05/introduction-to-hardware-forensics/
PHP multipart/form-data 远程DOS漏洞
http://sec.baidu.com/index.php?research/detail/id/22
http://sec.baidu.com/index.php?research/detail/id/22
nosqlpot:The NoSQL Honeypot Framework
https://github.com/torque59/nosqlpot
https://github.com/torque59/nosqlpot
resources fpr reverse engineering by Tyler Halfpop
https://tylerhalfpop.com/resources/
https://tylerhalfpop.com/resources/
Python Machine Learning Open Source Projects
http://pansop.com/1039/
http://pansop.com/1039/
HardenFlash:Flash binary to stop Flash exploits and zero-days
https://github.com/HaifeiLi/HardenFlash
https://github.com/HaifeiLi/HardenFlash
Windows Group Policy exploitation via MiTM attack
https://blog.coresecurity.com/2015/05/18/ms15-011-microsoft-windows-group-policy-real-exploitation-via-a-smb-mitm-attack/
https://blog.coresecurity.com/2015/05/18/ms15-011-microsoft-windows-group-policy-real-exploitation-via-a-smb-mitm-attack/
Reversing D-Link’s WPS Pin Algorithm
http://www.devttys0.com/2014/10/reversing-d-links-wps-pin-algorithm/#more-2249
http://www.devttys0.com/2014/10/reversing-d-links-wps-pin-algorithm/#more-2249
Tracking input with DTrace on OS X
http://dyjakan.sigsegv.pl/tracking-input-with-dtrace-on-os-x.html
http://dyjakan.sigsegv.pl/tracking-input-with-dtrace-on-os-x.html
Android Wear Security Analysis
https://labs.mwrinfosecurity.com/blog/2015/05/22/android-wear-security-analysis/
https://labs.mwrinfosecurity.com/blog/2015/05/22/android-wear-security-analysis/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第64期)
