SecWiki周刊(第79期)
2015/08/31-2015/09/06
安全资讯
我从Ashley Madison事件中学到的
http://drops.wooyun.org/news/8295
http://drops.wooyun.org/news/8295
China and Russia are using hacked data to target U.S. spies
http://www.latimes.com/nation/la-na-cyber-spy-20150831-story.html
http://www.latimes.com/nation/la-na-cyber-spy-20150831-story.html
12 Must-Follow Feeds in the World of Security
http://www.wired.com/2015/09/12-must-follow-feeds-world-security/
http://www.wired.com/2015/09/12-must-follow-feeds-world-security/
Microsoft's Project Sonar: Malware detonation as a service
http://www.zdnet.com/article/microsofts-project-sonar-malware-detonation-as-a-service/
http://www.zdnet.com/article/microsofts-project-sonar-malware-detonation-as-a-service/
高通的新手机芯片将能识别恶意程序
http://www.solidot.org/story?sid=45342
http://www.solidot.org/story?sid=45342
DDoS Attackers Double Down on Gambling Sites
https://www.incapsula.com/blog/ddos-attackers-double-down-on-gambling-sites.html
https://www.incapsula.com/blog/ddos-attackers-double-down-on-gambling-sites.html
安全技术
BWAPP:一款非常好用的漏洞演示平台
http://www.freebuf.com/tools/76885.html
http://www.freebuf.com/tools/76885.html
python修改linux日志(logtamper.py)
http://www.secoff.net/archives/475.html
http://www.secoff.net/archives/475.html
HITCON 2015 IoT Wargame – R0 挑戰題
http://kb.hitcon.org/post/127947378507/hitcon-2015-iot-wargame-r0-%E6%8C%91%E6%88%B0%E9%A1%8C
http://kb.hitcon.org/post/127947378507/hitcon-2015-iot-wargame-r0-%E6%8C%91%E6%88%B0%E9%A1%8C
HitCon-2015-spartan-0day-exploit
https://github.com/exp-sky/HitCon-2015-spartan-0day-exploit
https://github.com/exp-sky/HitCon-2015-spartan-0day-exploit
IP Ranges - Private IP Address Range
http://www.ipaddresslocation.org/ip_ranges/get_ranges.php
http://www.ipaddresslocation.org/ip_ranges/get_ranges.php
NIPS 2015 List of Accepted Papers
https://nips.cc/Conferences/2015/AcceptedPapers
https://nips.cc/Conferences/2015/AcceptedPapers
mitmproxy套件使用攻略及定制化开发
http://www.freebuf.com/tools/76361.html
http://www.freebuf.com/tools/76361.html
利用 Appcache 和 ServiceWorker 进行持久型session hijacking 和 XSS
http://bluereader.org/article/72405088
http://bluereader.org/article/72405088
Machine vs. Machine: Inside DARPA’s Fully Automated CTF
https://www.youtube.com/watch?v=gnyCbU7jGYA&feature=youtu.be
https://www.youtube.com/watch?v=gnyCbU7jGYA&feature=youtu.be
隐蔽的战场—Flash Web攻击
https://github.com/evilcos/papers/blob/master/%E9%9A%90%E8%94%BD%E7%9A%84%E6%88%98%E5%9C%BA%E2%80%94Flash%20Web%E6%94%BB%E5%87%BB.pptx
https://github.com/evilcos/papers/blob/master/%E9%9A%90%E8%94%BD%E7%9A%84%E6%88%98%E5%9C%BA%E2%80%94Flash%20Web%E6%94%BB%E5%87%BB.pptx
Research Spotlight: Learning Detectors of Malicious Network Traffic
http://blogs.cisco.com/security/talos/machine-learning-detectors
http://blogs.cisco.com/security/talos/machine-learning-detectors
osquery :: Performant Endpoint Visibility
https://osquery.io/
https://osquery.io/
Belkin F9K1111 V1.04.10 Firmware Analysis
http://blog.vectranetworks.com/blog/belkin-analysis
http://blog.vectranetworks.com/blog/belkin-analysis
Extracting Windows Users Password Hints with PowerShell
http://www.labofapenetrationtester.com/2015/09/extracting-windows-users-password-hints.html
http://www.labofapenetrationtester.com/2015/09/extracting-windows-users-password-hints.html
破解使用radius实现802.1x认证的企业无线网络
http://drops.wooyun.org/tools/8294
http://drops.wooyun.org/tools/8294
General Writing Resources
https://owl.english.purdue.edu/owl/section/1/
https://owl.english.purdue.edu/owl/section/1/
Applying Machine Learning to Network Security Monitoring
https://www.blackhat.com/docs/webcast/05152014-applying-machine-learning-to-network-security-monitoring.pdf
https://www.blackhat.com/docs/webcast/05152014-applying-machine-learning-to-network-security-monitoring.pdf
The Good, the Bad, and the Parked
https://labs.opendns.com/2015/09/01/the-good-the-bad-and-the-parked/
https://labs.opendns.com/2015/09/01/the-good-the-bad-and-the-parked/
Shellter:dynamic shellcode injection tool
https://www.shellterproject.com/introducing-shellter/
https://www.shellterproject.com/introducing-shellter/
Linux workstation security checklist
https://github.com/lfit/itpol/blob/master/linux-workstation-security.md
https://github.com/lfit/itpol/blob/master/linux-workstation-security.md
Research on the state of public FTP servers
http://findex.cedsys.nl/research/mass-ftp-crawling/
http://findex.cedsys.nl/research/mass-ftp-crawling/
OWASP_Testing_Guide_v4
https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf
https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf
ColdFusion Bomb: A Chain Reaction From XSS to RCE
https://www.bishopfox.com/blog/2015/08/coldfusion-bomb-a-chain-reaction-from-xss-to-rce/
https://www.bishopfox.com/blog/2015/08/coldfusion-bomb-a-chain-reaction-from-xss-to-rce/
KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts
http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/
http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/
PlugX Threat Activity in Myanmar
http://pages.arbornetworks.com/rs/082-KNA-087/images/ASERT%20Threat%20Intelligence%20Brief%202015-05%20PlugX%20Threat%20Activity%20in%20Myanmar.pdf
http://pages.arbornetworks.com/rs/082-KNA-087/images/ASERT%20Threat%20Intelligence%20Brief%202015-05%20PlugX%20Threat%20Activity%20in%20Myanmar.pdf
BGP for Humans: Making Sense of Border Gateway Protocol
https://www.incapsula.com/blog/bgp-routing-explained.html
https://www.incapsula.com/blog/bgp-routing-explained.html
Shifu: A new interesting Banking Trojan
http://marcoramilli.blogspot.com/2015/09/shifu-new-interesting-banking-trojan.html
http://marcoramilli.blogspot.com/2015/09/shifu-new-interesting-banking-trojan.html
PHP unserialization vulnerabilities: What are we missing
http://www.slideshare.net/_s_n_t/php-unserialization-vulnerabilities-what-are-we-missing
http://www.slideshare.net/_s_n_t/php-unserialization-vulnerabilities-what-are-we-missing
MMD-0041-2015 - Reversing PE Mail-Grabber Spambot & its c99 Gate
http://blog.malwaremustdie.org/2015/09/mmd-0041-2015-reversing-pe-mail-grabber.html
http://blog.malwaremustdie.org/2015/09/mmd-0041-2015-reversing-pe-mail-grabber.html
HTTP Evader - Automate Firewall Evasion Tests
http://noxxi.de/research/http-evader.html
http://noxxi.de/research/http-evader.html
IT Security Catalog v.2.0
https://www.gitbook.com/content/book/arthurgerkis/it-sec-catalog/index.html
https://www.gitbook.com/content/book/arthurgerkis/it-sec-catalog/index.html
A Brief History of Spear Phishing
http://resources.infosecinstitute.com/a-brief-history-of-spear-phishing/
http://resources.infosecinstitute.com/a-brief-history-of-spear-phishing/
ROVNIX攻击平台分析 -利用WordPress平台传播的多插件攻击平台
http://drops.wooyun.org/papers/7478
http://drops.wooyun.org/papers/7478
You are the WM
http://blog.z3bra.org/2015/01/you-are-the-wm.html?hn
http://blog.z3bra.org/2015/01/you-are-the-wm.html?hn
Sleepy Puppy XSS Payload Management Framework
https://github.com/Netflix/sleepy-puppy
https://github.com/Netflix/sleepy-puppy
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第79期)
