SecWiki周刊(第67期)
2015/06/08-2015/06/14
安全资讯
卡巴斯基被价值5000万的木马黑了
http://www.91ri.org/13185.html
http://www.91ri.org/13185.html
Israel, NSA May Have Hacked Antivirus Firm Kaspersky Lab
http://www.tomsguide.com/us/kaspersky-hack-israel-nsa,news-21084.html
http://www.tomsguide.com/us/kaspersky-hack-israel-nsa,news-21084.html
2015年第24周安全通报
http://blog.topsec.com.cn/ad_lab/2015%e5%b9%b4%e7%ac%ac24%e5%91%a8%e5%ae%89%e5%85%a8%e9%80%9a%e6%8a%a5/
http://blog.topsec.com.cn/ad_lab/2015%e5%b9%b4%e7%ac%ac24%e5%91%a8%e5%ae%89%e5%85%a8%e9%80%9a%e6%8a%a5/
Palo Alto Networks News of the Week – June 6
http://researchcenter.paloaltonetworks.com/2015/06/palo-alto-networks-news-of-the-week-june-6/
http://researchcenter.paloaltonetworks.com/2015/06/palo-alto-networks-news-of-the-week-june-6/
Kaspersky Finds New Nation-State Attack—In Its Own Network
http://www.wired.com/2015/06/kaspersky-finds-new-nation-state-attack-network/
http://www.wired.com/2015/06/kaspersky-finds-new-nation-state-attack-network/
WebRAY理念谈:“威胁情报与情景感知”
http://www.sec-un.org/webray-on-threat-information-and-context-awareness.html
http://www.sec-un.org/webray-on-threat-information-and-context-awareness.html
All US .gov websites ordered to be HTTPS-only by the end of next year
http://blog.lumension.com/10228/all-us-gov-websites-https/
http://blog.lumension.com/10228/all-us-gov-websites-https/
阿里巴巴为什么要收购一家安全公司
http://wwww.huxiu.com/article/117570/1.html?f=wangzhan
http://wwww.huxiu.com/article/117570/1.html?f=wangzhan
安全技术
深入看看 Windows 10 CFG(控制流保护) 技术
http://dwz.cn/OJY4y
http://dwz.cn/OJY4y
google推出一个新的开源安卓逆向工具enjarify
https://github.com/google/enjarify
https://github.com/google/enjarify
CVE-2015-1743 (MS15-056) 是 IE EPM 绕过的漏洞
http://dwz.cn/OWZU0
http://dwz.cn/OWZU0
linux常见漏洞利用技术实践
http://drops.wooyun.org/binary/6521
http://drops.wooyun.org/binary/6521
Text Mining and Analytics
https://www.coursera.org/course/textanalytics
https://www.coursera.org/course/textanalytics
“强网杯”网络安全挑战赛WriteUp
http://www.freebuf.com/articles/web/69260.html
http://www.freebuf.com/articles/web/69260.html
Seaborn: statistical data visualization
http://stanford.edu/~mwaskom/software/seaborn/#
http://stanford.edu/~mwaskom/software/seaborn/#
通过 COM1 实现 VMware Workstation 逃逸
http://dwz.cn/OWZTE
http://dwz.cn/OWZTE
Encrypto:Secure Any File with AES-256 Encryption
http://macpaw.com/encrypto
http://macpaw.com/encrypto
TLS 注入: 通过 TLS 回调运行 Shellcode
http://dwz.cn/NR1DA
http://dwz.cn/NR1DA
这是一个在 Cryptam 分析时 AV 检测到的 CVE-2014-4114 样本
http://dwz.cn/OWZR1
http://dwz.cn/OWZR1
2015 RSAC热点研讨会
http://www.nsfocus.com.cn/event/rsa2015/download.html
http://www.nsfocus.com.cn/event/rsa2015/download.html
逆向 Windbg 的命令可以作为逆向内核的一个选择
http://dwz.cn/OJY4A
http://dwz.cn/OJY4A
基于 Teensy 我实现的 SPI Flash ROM 读写器
https://trmm.net/SPI_flash
https://trmm.net/SPI_flash
MS15-034 PoCs ,安全信息泄漏和内存破坏
http://dwz.cn/OWZP3
http://dwz.cn/OWZP3
一步一步学ROP之linux_x86篇
http://drops.wooyun.org/tips/6597
http://drops.wooyun.org/tips/6597
AppSec EU15 Video
https://www.youtube.com/watch?v=6_yQsbWqVD0&list=PLpr-xdpM8wG-ZTcHhFfAeBthNVZVEtkg9
https://www.youtube.com/watch?v=6_yQsbWqVD0&list=PLpr-xdpM8wG-ZTcHhFfAeBthNVZVEtkg9
BruteX - 由 1N3 写的一个自动爆破所有服务的工具
http://dwz.cn/Owm2M
http://dwz.cn/Owm2M
英特尔内核保护技术开源了,以确保内核和平台的运行时完整性
http://dwz.cn/NR1DN
http://dwz.cn/NR1DN
Reversing DexGuard’s String Encryption
http://opensecurity.in/reversing-dexguards-string-encryption/
http://opensecurity.in/reversing-dexguards-string-encryption/
DUQU2.0 技术分析
http://drops.wooyun.org/tips/6599
http://drops.wooyun.org/tips/6599
Gephi:The Open Graph Viz Platform
http://gephi.github.io/
http://gephi.github.io/
躲避自动化沙箱
http://dwz.cn/NR1Dk
http://dwz.cn/NR1Dk
"利用反向防火墙实现消息传输---在被损坏的机器上安全通信
http://dwz.cn/OWZS0
http://dwz.cn/OWZS0
全球 web 应用程序漏洞的搜索引擎。更深、 更快、 更健壮的扫描
http://dwz.cn/Owm4i
http://dwz.cn/Owm4i
反调试器技巧
http://dwz.cn/Owm2l
http://dwz.cn/Owm2l
awesome-machine-learning
https://github.com/josephmisiti/awesome-machine-learning
https://github.com/josephmisiti/awesome-machine-learning
Windows-Exploit-Suggester
https://github.com/GDSSecurity/Windows-Exploit-Suggester
https://github.com/GDSSecurity/Windows-Exploit-Suggester
从 InstallUtil.exe 执行 Shellcode 绕过所有应用程序的白名单
http://dwz.cn/Owm1V
http://dwz.cn/Owm1V
边信道攻击:不可忽视的安全威胁
http://huodong.kongzhi.net/video/2015ICSIS-cy.html
http://huodong.kongzhi.net/video/2015ICSIS-cy.html
2014工业控制系统信息安全年大型主题系列活动
http://huodong.kongzhi.net/2014ICSIS&SCADA-RTU/index.html
http://huodong.kongzhi.net/2014ICSIS&SCADA-RTU/index.html
iOS 开源取证工具
http://dwz.cn/Owm2J
http://dwz.cn/Owm2J
PWNING A WINDOWS PHONE From shadow to light
http://fr.slideshare.net/hibouchinois/wp8-49181967
http://fr.slideshare.net/hibouchinois/wp8-49181967
The Mystery of Duqu 2.0: a sophisticated cyberespionage actor returns
https://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/
https://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/
DylibHijack- Dylib Hijack Scanner
http://www.sectechno.com/dylibhijack-dylib-hijack-scanner/
http://www.sectechno.com/dylibhijack-dylib-hijack-scanner/
Just-Metadata:Intel Gathering and Analysis of IP Metadata
https://www.christophertruncer.com/just-metadata-intel-gathering-and-analysis-of-ip-metadata/
https://www.christophertruncer.com/just-metadata-intel-gathering-and-analysis-of-ip-metadata/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第67期)
