SecWiki周刊(第74期)
2015/07/27-2015/08/02
安全资讯
How to ask for datasets
https://medium.com/@ckreibich/how-to-ask-for-datasets-d5ef791cb38c
https://medium.com/@ckreibich/how-to-ask-for-datasets-d5ef791cb38c
Announcing the Second FLARE On Challenge
https://www.fireeye.com/blog/threat-research/2015/07/announcing_the_secon.html
https://www.fireeye.com/blog/threat-research/2015/07/announcing_the_secon.html
BIND Update Patches Critical DoS Vulnerability
http://www.securityweek.com/bind-update-patches-critical-dos-vulnerability
http://www.securityweek.com/bind-update-patches-critical-dos-vulnerability
PHP 7 arbitrary code execution
http://git.php.net/?p=php-src.git;a=commit;h=6aeee47b2cd47915ccfa3b41433a3f57aea24dd5
http://git.php.net/?p=php-src.git;a=commit;h=6aeee47b2cd47915ccfa3b41433a3f57aea24dd5
The Anthem Hack: All Roads Lead to China
http://www.threatconnect.com/the-anthem-hack-all-roads-lead-to-china/
http://www.threatconnect.com/the-anthem-hack-all-roads-lead-to-china/
安全技术
Noscript XSS filter bypass
http://blog.portswigger.net/2015/07/noscript-xss-filter-bypass.html
http://blog.portswigger.net/2015/07/noscript-xss-filter-bypass.html
XorDDos木马,难逃铁穹检测法眼。
http://www.aptno1.com/YC/102.html
http://www.aptno1.com/YC/102.html
python 安全编码&代码审计
http://drops.wooyun.org/web/7490
http://drops.wooyun.org/web/7490
Tf-idf :: A Single-Page Tutorial
http://www.tfidf.com/
http://www.tfidf.com/
一步一步学ROP之linux_x64篇
http://drops.wooyun.org/papers/7551
http://drops.wooyun.org/papers/7551
DDoS botnet常见类型及特点
http://blog.nsfocus.net/ddos-botnet-common-features/
http://blog.nsfocus.net/ddos-botnet-common-features/
知识图谱——机器大脑中的知识库
http://book.thunlp.org/knowledge_graph/
http://book.thunlp.org/knowledge_graph/
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
https://www.fireeye.com/blog/threat-research/2015/07/hammertoss_stealthy.html
https://www.fireeye.com/blog/threat-research/2015/07/hammertoss_stealthy.html
Non-alphanumeric code With JavaScript & PHP by Gareth Heyes
https://www.owasp.org/images/6/66/OWASP_Manchester_Nonalpha.pdf
https://www.owasp.org/images/6/66/OWASP_Manchester_Nonalpha.pdf
浅析Peach Fuzz
http://blog.nsfocus.net/peach-fuzz/
http://blog.nsfocus.net/peach-fuzz/
基于js的在线16进制编辑器
https://hexed.it/
https://hexed.it/
Sudo 1.8.14 - Unauthorized Privilege Vulnerability
https://www.exploit-db.com/exploits/37710/
https://www.exploit-db.com/exploits/37710/
bettercap:A complete, modular, portable and easily extensible MITM framework
http://www.bettercap.org/
http://www.bettercap.org/
Transparent MITM with Cuckoo Sandbox
http://jbremer.org/mitm/
http://jbremer.org/mitm/
安全威胁情报之HackingTeam邮件分析
http://www.sec-un.org/analysis-on-the-hackingteam-mail-security-threat-intelligence-2.html
http://www.sec-un.org/analysis-on-the-hackingteam-mail-security-threat-intelligence-2.html
恶意文件分析系统中的数字签名验证
http://blog.nsfocus.net/digital-signature-with-malware-analysis/
http://blog.nsfocus.net/digital-signature-with-malware-analysis/
overflow in .NET Framework System.DirectoryServices.Protocols.Utility class
https://www.securify.nl/advisory/SFY20150501/integer_overflow_in__net_framework_system_directoryservices_protocols_utility_class.html
https://www.securify.nl/advisory/SFY20150501/integer_overflow_in__net_framework_system_directoryservices_protocols_utility_class.html
抛砖引玉——Stagefright漏洞初探
http://drops.wooyun.org/mobile/7491
http://drops.wooyun.org/mobile/7491
Business Logic Security Testing with Acunetix v10
http://www.acunetix.com/blog/articles/business-logic-security-testing-with-acunetix-v10/
http://www.acunetix.com/blog/articles/business-logic-security-testing-with-acunetix-v10/
How to use old GSM protocols/encodings to know if a user is Online on the GSM
http://www.evilsocket.net/2015/07/27/how-to-use-old-gsm-protocolsencodings-know-if-a-user-is-online-on-the-gsm-network-aka-pingsms-2-0/
http://www.evilsocket.net/2015/07/27/how-to-use-old-gsm-protocolsencodings-know-if-a-user-is-online-on-the-gsm-network-aka-pingsms-2-0/
Cyber Campaigns Central (List and Descriptions)
http://cybercampaigns.net/
http://cybercampaigns.net/
PlagueScanner:Open source multiple AV scanner framework
https://github.com/PlagueScanner/PlagueScanner
https://github.com/PlagueScanner/PlagueScanner
shinken:Flexible and scalable monitoring framework
https://github.com/naparuba/shinken
https://github.com/naparuba/shinken
Android 反编绎工具JEB简介及下载
http://www.droidsec.cn/android-%e5%8f%8d%e7%bc%96%e7%bb%8e%e5%b7%a5%e5%85%b7jeb%e7%ae%80%e4%bb%8b%e5%8f%8a%e4%b8%8b%e8%bd%bd/
http://www.droidsec.cn/android-%e5%8f%8d%e7%bc%96%e7%bb%8e%e5%b7%a5%e5%85%b7jeb%e7%ae%80%e4%bb%8b%e5%8f%8a%e4%b8%8b%e8%bd%bd/
lets-write-a-pdf-file
https://speakerdeck.com/ange/lets-write-a-pdf-file
https://speakerdeck.com/ange/lets-write-a-pdf-file
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第74期)
