SecWiki周刊(第85期)
2015/10/12-2015/10/18
安全资讯
Industrial control system security in 2014: trends and vulnerabilities
http://blog.ptsecurity.com/2015/10/industrial-control-system-security-in.html
http://blog.ptsecurity.com/2015/10/industrial-control-system-security-in.html
Holy Threat Intel Sharing
http://www.cyintanalysis.com/holy-threat-intel-sharing/
http://www.cyintanalysis.com/holy-threat-intel-sharing/
安全技术
CVE-2015-1641漏洞分析
https://security.alibaba.com/blog/blog.htm?spm=0.0.0.0.qRNloh&id=31
https://security.alibaba.com/blog/blog.htm?spm=0.0.0.0.qRNloh&id=31
SkyWolf_Demo—PHP超强代码审计
http://v.youku.com/v_show/id_XMTM1NTY4ODI0MA==.html
http://v.youku.com/v_show/id_XMTM1NTY4ODI0MA==.html
A Shodan Tutorial and Primer
https://danielmiessler.com/study/shodan/
https://danielmiessler.com/study/shodan/
php-security-scanner
https://github.com/ircmaxell/php-security-scanner
https://github.com/ircmaxell/php-security-scanner
学术顶会-CCS-2015 录用论文
http://www.sigsac.org/ccs/CCS2015/ccs2015-toc.html
http://www.sigsac.org/ccs/CCS2015/ccs2015-toc.html
ISC2015公开PPT
http://8a7b5d.l61.yunpan.cn/lk/cHanFfxej65iG#/-0
http://8a7b5d.l61.yunpan.cn/lk/cHanFfxej65iG#/-0
BlackHat 2015:Red Vs Blue Modern Active Directory Attacks, Detection
https://www.youtube.com/watch?v=ELT3jeV8J8U&list=PLwibn_3po6c9sA7_6sOCTyDWhX26eKJkd&index=48
https://www.youtube.com/watch?v=ELT3jeV8J8U&list=PLwibn_3po6c9sA7_6sOCTyDWhX26eKJkd&index=48
REST API 安全设计指南
http://blog.nsfocus.net/rest-api-design-safety/
http://blog.nsfocus.net/rest-api-design-safety/
看美国司法部如何用twitter等社交媒体取证和质证
http://www.justice.gov/opa/file/784501/download
http://www.justice.gov/opa/file/784501/download
KCon 2015 黑客安全大会视频
http://www.ichunqiu.com/course/775
http://www.ichunqiu.com/course/775
Logstash 最佳实践
https://github.com/chenryn/logstash-best-practice-cn
https://github.com/chenryn/logstash-best-practice-cn
漏洞挖掘基础之格式化字符串
http://drops.wooyun.org/papers/9426
http://drops.wooyun.org/papers/9426
Stored XSS in Akismet WordPress Plugin
https://blog.sucuri.net/2015/10/security-advisory-stored-xss-in-akismet-wordpress-plugin.html
https://blog.sucuri.net/2015/10/security-advisory-stored-xss-in-akismet-wordpress-plugin.html
Satoshi's note: Some Tips to Analyze PatchGuard
http://standa-note.blogspot.com/2015/10/some-tips-to-analyze-patchguard.html
http://standa-note.blogspot.com/2015/10/some-tips-to-analyze-patchguard.html
winsty: 我的PhD总结
http://www.52cs.org/?p=632
http://www.52cs.org/?p=632
libemu-scapy-for-shellcode-on-the-network
https://bwall.github.io/libemu-scapy-for-shellcode-on-the-network/
https://bwall.github.io/libemu-scapy-for-shellcode-on-the-network/
Pentest Box
https://pentestbox.com/
https://pentestbox.com/
利用AFL Fuzz Server
http://puzzor.blogspot.de/2015/08/afl-fuzz-server_79.html
http://puzzor.blogspot.de/2015/08/afl-fuzz-server_79.html
Monitoring tool for PasteBin-alike sites
https://github.com/cvandeplas/pystemon
https://github.com/cvandeplas/pystemon
Topic Modeling FOIA Data
http://www.harvest.ai/blog/2015/10/12/topicmodelingfoiadata
http://www.harvest.ai/blog/2015/10/12/topicmodelingfoiadata
Code coverage using dynamic symbolic execution
http://triton.quarkslab.com/blog/Code-coverage-using-dynamic-symbolic-execution/
http://triton.quarkslab.com/blog/Code-coverage-using-dynamic-symbolic-execution/
Analysis of an encrypted HDD
https://www.sstic.org/media/SSTIC2015/SSTIC-actes/hardware_re_for_software_reversers/SSTIC2015-Article-hardware_re_for_software_reversers-czarny_rigo.pdf
https://www.sstic.org/media/SSTIC2015/SSTIC-actes/hardware_re_for_software_reversers/SSTIC2015-Article-hardware_re_for_software_reversers-czarny_rigo.pdf
Writing Cisco IOS Rootkits
https://dl.packetstormsecurity.net/papers/general/cisco_ios_rootkits.pdf
https://dl.packetstormsecurity.net/papers/general/cisco_ios_rootkits.pdf
iOS APP安全杂谈之三
http://drops.wooyun.org/papers/9598
http://drops.wooyun.org/papers/9598
The rise of .NET and powershell malware
https://securelist.com/blog/research/72417/the-rise-of-net-and-powershell-malware/
https://securelist.com/blog/research/72417/the-rise-of-net-and-powershell-malware/
Using APT tactics and techniques in your pentests
http://strategicsec.com/using-apt-tactics-techniques-in-pentests/
http://strategicsec.com/using-apt-tactics-techniques-in-pentests/
Cybersecurity Research: Addressing the Legal Barriers and Disincentives
http://www.ischool.berkeley.edu/files/cybersec-research-nsf-workshop.pdf
http://www.ischool.berkeley.edu/files/cybersec-research-nsf-workshop.pdf
studying an encrypted external HDD
http://hardwear.io/wp-content/uploads/2015/10/Slide-hardware_re_for_software_reversers-By-Czarny-Rigo.pdf
http://hardwear.io/wp-content/uploads/2015/10/Slide-hardware_re_for_software_reversers-By-Czarny-Rigo.pdf
Mapping FinFisher's Continuing Proliferation
http://citizenlab.org/2015/10/mapping-finfishers-continuing-proliferation/
http://citizenlab.org/2015/10/mapping-finfishers-continuing-proliferation/
PENTESTIT | Penetration Test Lab
https://lab.pentestit.ru/
https://lab.pentestit.ru/
A close look at an operating botnet
http://conorpp.com/blog/a-close-look-at-an-operating-botnet/
http://conorpp.com/blog/a-close-look-at-an-operating-botnet/
Android Vulnerabilities Database
http://androidvulnerabilities.org/
http://androidvulnerabilities.org/
Reverse shell over SMS (Exploiting CVE-2015-5897)
http://blog.gdssecurity.com/labs/2015/10/13/reverse-shell-over-sms-exploiting-cve-2015-5897.html
http://blog.gdssecurity.com/labs/2015/10/13/reverse-shell-over-sms-exploiting-cve-2015-5897.html
ICMP Tunnels- A Case Study
https://www.notsosecure.com/2015/10/15/icmp-tunnels-a-case-study/
https://www.notsosecure.com/2015/10/15/icmp-tunnels-a-case-study/
New Javascript Deobfuscator Tool
http://www.kahusecurity.com/2015/new-javascript-deobfuscator-tool/
http://www.kahusecurity.com/2015/new-javascript-deobfuscator-tool/
Intelligence-Driven Risk Analysis
http://www.threatconnect.com/threat-intelligence-driven-risk-analysis/
http://www.threatconnect.com/threat-intelligence-driven-risk-analysis/
安全专题
CTF 相关工具和资料
https://www.sec-wiki.com/topic/65
https://www.sec-wiki.com/topic/65
NoSQL 安全工具汇总
https://www.sec-wiki.com/topic/66
https://www.sec-wiki.com/topic/66
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第85期)
