SecWiki周刊(第77期)
2015/08/17-2015/08/23
安全资讯
ACM CCS 2015 Accepted Papers New data uncovers the surprising predictability of Android lock patterns DerbyCon 2015 Schedule and Abstract Science Isn’t Broken AVA: A Social Engineering Vulnerability Scanner 2015年第34周安全通报 BlackHat Trainings Experience Fifteen Famous Bug Bounty Hunters How to Exploit BitTorrent for Large-Scale DoS Attacks BlackHat & Defcon 2015 观感 10+ Years of System Security Circus
安全技术
Discuz!后台秒getshell(第三方安全问题) Discuz全版本存储型DOM XSS(可打管理员) PHP 7 ZEND_HASH_IF_FULL_DO_RESIZE Use After Free 漏洞分析 Wordpress4.2.3提权与SQL注入漏洞(CVE-2015-5623)分析 Distributed Nmap Port Scanning with a DNmap Megacluster Modern Windows Exploit Development UCSD Computer Security Course Slide Cookies Lack Integrity: Real-World Implications HackingTeamfulldump (不算完整235g压缩版) Inside Neutrino botnet builder 利用机器学习进行恶意代码分类 NetRipper - Smart traffic sniffing for penetration testers Discuz! X系列远程代码执行漏洞分析 WAF绕过(网站安全狗示例) Setup Your Own MITM, Packet Sniffing WiFi Access Point “企业应急响应和反渗透”之真实案例分析 A light-weight forensic analysis of the AshleyMadison Hack iOS:CVE-2015-5774 Extortionists Target Ashley Madison Users You Dirty RAT: Analyzing an AlienSpy Payload Camera 360应用隐私数据泄露的分析 Exploiting Ammyy Admin – developing an 0day New activity of The Blue Termite APT BlackHat议题分析:浅析BGP劫持利用 DEFCON 23 CTF 战记 SQL注入速查表(上) Deploying, Managing, and Leveraging Honeypots in the Enterprise BinNavi binary analysis tool open sourced by Google Snifflab: An environment for testing mobile devices UAC Bypass Vulnerability in the Windows Script Host. A Neat Stack Corruption, Reverse P/Invoke Structure Packing with Output Param 携程安全沙龙现场笔记&PPT Sybase数据库安全 Stealth Techniques: Hiding Files in the Registry Analysis of PS4's security and the state of hacking Chaos Communication Camp 2015-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第77期)