SecWiki周刊(第86期)
2015/10/19-2015/10/25
安全资讯
Threat Intelligence Overview
https://www.youtube.com/watch?v=q_X9DAElc1c
https://www.youtube.com/watch?v=q_X9DAElc1c
全球网络安全专业实力最强十所大学
http://www.aqniu.com/security-reports/11092.html
http://www.aqniu.com/security-reports/11092.html
IBM Runs World’s Worst Spam-Hosting ISP?
http://krebsonsecurity.com/2015/10/ibm-runs-worlds-worst-spam-hosting-isp/
http://krebsonsecurity.com/2015/10/ibm-runs-worlds-worst-spam-hosting-isp/
Free COMODO PositiveSSL from 80host
http://freessl.80host.com/cgi-bin/certificate-apply.pl
http://freessl.80host.com/cgi-bin/certificate-apply.pl
Logscape:Operational Intelligence, Log Management
http://www.logscape.com/index.html#pricing
http://www.logscape.com/index.html#pricing
国内网络个人安全现状浅论
http://weibo.com/p/1001603900428533265627
http://weibo.com/p/1001603900428533265627
想成为技术牛人, 千万不要成为虚名牢笼的奴隶
http://card.weibo.com/article/h5/s#cid=1001603719145786056597&vid=&extparam=
http://card.weibo.com/article/h5/s#cid=1001603719145786056597&vid=&extparam=
32个国家和地区被部署了间谍软件FinFisher
http://mp.weixin.qq.com/s?__biz=MzI4MjA1MzkyNA==&mid=400213000&idx=1&sn=adeee3ed3781788684143f61b9a8986c&scene=1
http://mp.weixin.qq.com/s?__biz=MzI4MjA1MzkyNA==&mid=400213000&idx=1&sn=adeee3ed3781788684143f61b9a8986c&scene=1
VARA 2015 大会简报及两个不错的议题
http://chuansong.me/n/1840952
http://chuansong.me/n/1840952
DigitalOcean 的 CMO 如何在红海做用户增长
https://strace.co/cn/post/growth-hacking-digitalocean.html
https://strace.co/cn/post/growth-hacking-digitalocean.html
2015中国互联网安全领袖峰会
http://www.thecss.cn/css/index.html
http://www.thecss.cn/css/index.html
1Password Leaks Your Data
http://myers.io/2015/10/22/1password-leaks-your-data/
http://myers.io/2015/10/22/1password-leaks-your-data/
安全技术
使用sqlmapapi和http-proxy检测SQL注入漏洞
http://blog.csdn.net/u011721501/article/details/49251047
http://blog.csdn.net/u011721501/article/details/49251047
Flash Exploit Used in Pawn Storm Circumvents Mitigation Techniques
http://blog.trendmicro.com/trendlabs-security-intelligence/latest-flash-exploit-used-in-pawn-storm-circumvents-mitigation-techniques/
http://blog.trendmicro.com/trendlabs-security-intelligence/latest-flash-exploit-used-in-pawn-storm-circumvents-mitigation-techniques/
DNS隧道技术绕防火墙
http://drops.wooyun.org/tips/9597
http://drops.wooyun.org/tips/9597
HITCON CTF 2015 Quals Web 出題心得
http://kb.hitcon.org/post/131488130087/hitcon-ctf-2015-quals-web-%E5%87%BA%E9%A1%8C%E5%BF%83%E5%BE%97
http://kb.hitcon.org/post/131488130087/hitcon-ctf-2015-quals-web-%E5%87%BA%E9%A1%8C%E5%BF%83%E5%BE%97
Dumping ntds.dit files using PowerShell
https://www.dsinternals.com/en/dumping-ntds-dit-files-using-powershell/
https://www.dsinternals.com/en/dumping-ntds-dit-files-using-powershell/
Technology Overview for Threat Intelligence Platforms
http://www.gartner.com/technology/reprints.do?id=1-2LVV2L5&ct=150825
http://www.gartner.com/technology/reprints.do?id=1-2LVV2L5&ct=150825
智能设备逆向工程之外部Flash读取与分析篇
http://drops.wooyun.org/binary/9797
http://drops.wooyun.org/binary/9797
2015 hack-lu slide
http://2015.hack.lu/archive/2015/
http://2015.hack.lu/archive/2015/
Reassembleable Disassembling
https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-wang-shuai.pdf
https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-wang-shuai.pdf
2015绿盟科技云安全解决方案
http://blog.nsfocus.net/wp-content/uploads/2015/10/2015-NSFOCUS-Cloud-Security-Solution.pdf
http://blog.nsfocus.net/wp-content/uploads/2015/10/2015-NSFOCUS-Cloud-Security-Solution.pdf
Packet-Sniffing-Backdoor
https://github.com/JustinTom/Packet-Sniffing-Backdoor
https://github.com/JustinTom/Packet-Sniffing-Backdoor
Statistics for Hackers
https://speakerdeck.com/jakevdp/statistics-for-hackers
https://speakerdeck.com/jakevdp/statistics-for-hackers
Multi-stage exploit installing trojan
http://www.welivesecurity.com/2015/10/20/multi-stage-exploit-installing-trojan/
http://www.welivesecurity.com/2015/10/20/multi-stage-exploit-installing-trojan/
simple debugger
https://bitbucket.org/gbrindisi/sdbg
https://bitbucket.org/gbrindisi/sdbg
ZDI-13-246 (2013) Java 1.7.0_15 Sandbox Bypass via ObjectOutputStream
http://benmmurphy.github.io/blog/2015/10/23/zdi-13-246-2013-java-1-dot-7-0-15-sandbox-bypass-via-objectoutputstream/index.html
http://benmmurphy.github.io/blog/2015/10/23/zdi-13-246-2013-java-1-dot-7-0-15-sandbox-bypass-via-objectoutputstream/index.html
打造一个自动检测页面是否存在XSS的插件(完结篇)
http://www.freebuf.com/tools/82743.html
http://www.freebuf.com/tools/82743.html
Execute Shellcode From Registry with InstallUtil.exe
https://gist.github.com/subTee/e07e4a8aa6dc0e1cdf5d
https://gist.github.com/subTee/e07e4a8aa6dc0e1cdf5d
Internal Threat Intelligence – What Hunters Do
http://raffy.ch/blog/2015/10/16/internal-threat-intelligence-what-hunters-do/
http://raffy.ch/blog/2015/10/16/internal-threat-intelligence-what-hunters-do/
Exploiting Insecure crossdomain.xml , Just bad
http://aajalal.github.io/Exploiting-Insecure-crossdomain-spreaker/
http://aajalal.github.io/Exploiting-Insecure-crossdomain-spreaker/
meterpreter常见脚本介绍
http://drops.wooyun.org/tips/9732
http://drops.wooyun.org/tips/9732
Understanding File System Minifilter and Legacy Filter Load Order
http://blogs.msdn.com/b/ntdebugging/archive/2013/03/25/understanding-file-system-minifilter-and-legacy-filter-load-order.aspx
http://blogs.msdn.com/b/ntdebugging/archive/2013/03/25/understanding-file-system-minifilter-and-legacy-filter-load-order.aspx
2014 Global Report on the Cost of Cyber Crime
http://h20195.www2.hp.com/v2/getpdf.aspx/4AA5-5207ENW.pdf?ver=1.0
http://h20195.www2.hp.com/v2/getpdf.aspx/4AA5-5207ENW.pdf?ver=1.0
解决工控网络通信协议威胁的实践
http://plcscan.org/blog/2015/10/ids-rules-for-scada-systems/
http://plcscan.org/blog/2015/10/ids-rules-for-scada-systems/
Joomla SQL Injection Vulnerability Exploit in Full Administrative Access
https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/
https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/
Attacking Ruby on Rails Applications
http://phrack.org/papers/attacking_ruby_on_rails.html
http://phrack.org/papers/attacking_ruby_on_rails.html
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第86期)
