SecWiki周刊(第87期)
2015/10/26-2015/11/01
安全资讯
RuCTFE 2015
https://ructf.org/e/2015/
https://ructf.org/e/2015/
中国•西安2015 “华山杯” 网络安全技能大赛
http://lab.seclover.com/index.php?m=about
http://lab.seclover.com/index.php?m=about
2015中国网络安全人才需求调查结果
http://www.aqniu.com/news/11222.html
http://www.aqniu.com/news/11222.html
华为第二届网络安全沙龙–问道
http://www.aqniu.com/news/11302.html
http://www.aqniu.com/news/11302.html
第四届全国网络与信息安全防护峰会(XDef安全峰会)
http://www.freebuf.com/fevents/83324.html
http://www.freebuf.com/fevents/83324.html
《中国网络安全企业50强》重磅发布
http://mp.weixin.qq.com/s?__biz=MjM5Njc3NjM4MA==&mid=400078382&idx=1&sn=12293ffb5a79b1f992fd299aae3802c1&scene=2
http://mp.weixin.qq.com/s?__biz=MjM5Njc3NjM4MA==&mid=400078382&idx=1&sn=12293ffb5a79b1f992fd299aae3802c1&scene=2
2015 GeekPwn 活动概要
http://www.freebuf.com/news/82868.html
http://www.freebuf.com/news/82868.html
安全技术
BlueLotus_XSSReceiver:XSS数据接收平台
https://github.com/firesunCN/BlueLotus_XSSReceiver
https://github.com/firesunCN/BlueLotus_XSSReceiver
腾讯防刷负责人:基于用户画像大数据的电商防刷架构
http://mp.weixin.qq.com/s?__biz=MzAwMDU1MTE1OQ==&mid=400931866&idx=1&sn=b96873fc9f726e5705b2653968f1d992
http://mp.weixin.qq.com/s?__biz=MzAwMDU1MTE1OQ==&mid=400931866&idx=1&sn=b96873fc9f726e5705b2653968f1d992
Hack Naked TV
https://www.youtube.com/watch?v=Nrrj0-iai7o
https://www.youtube.com/watch?v=Nrrj0-iai7o
WMI 的攻击,防御与取证分析技术之攻击篇
http://drops.wooyun.org/tips/9973
http://drops.wooyun.org/tips/9973
数据防泄漏DLP技术深度剖析
http://blog.nsfocus.net/data-leak-prevention-technology/
http://blog.nsfocus.net/data-leak-prevention-technology/
CTF中的内存漏洞利用技巧
http://netsec.ccert.edu.cn/wp-content/uploads/2015/10/2015-1029-yangkun-Gold-Mining-CTF.pdf
http://netsec.ccert.edu.cn/wp-content/uploads/2015/10/2015-1029-yangkun-Gold-Mining-CTF.pdf
Javascript缓存投毒学习与实战
http://drops.wooyun.org/tips/9947
http://drops.wooyun.org/tips/9947
How to Download a List of All Registered Domain Names
http://jordan-wright.com/blog/2015/09/30/how-to-download-a-list-of-all-registered-domain-names/
http://jordan-wright.com/blog/2015/09/30/how-to-download-a-list-of-all-registered-domain-names/
Windows 10 - pcap Driver Local Privilege Escalation
https://www.exploit-db.com/exploits/38533/
https://www.exploit-db.com/exploits/38533/
Virtualenv 教程
http://lcblog-wordpress.stor.sinaapp.com/uploads/2015/10/virtualenv%E6%95%99%E7%A8%8B.pdf
http://lcblog-wordpress.stor.sinaapp.com/uploads/2015/10/virtualenv%E6%95%99%E7%A8%8B.pdf
Weird New Tricks for Browser Fingerprinting
https://zyan.scripts.mit.edu/presentations/toorcon2015.pdf
https://zyan.scripts.mit.edu/presentations/toorcon2015.pdf
机器学习和数据挖掘的推荐书单
http://blog.jobbole.com/93520/
http://blog.jobbole.com/93520/
ob_start用于菜刀的可行性分析
http://blog.jowto.com/?p=107
http://blog.jowto.com/?p=107
让你的Python代码更加pythonic
http://wuzhiwei.net/be_pythonic/
http://wuzhiwei.net/be_pythonic/
Advanced JS Deobfuscation Via AST and Partial Evaluation
http://blog.mindedsecurity.com/2015/10/advanced-js-deobfuscation-via-ast-and.html
http://blog.mindedsecurity.com/2015/10/advanced-js-deobfuscation-via-ast-and.html
Elasticsearch国内开发者大会文档
http://pan.baidu.com/s/1o6iXaqe#path=%252FESCC%25234
http://pan.baidu.com/s/1o6iXaqe#path=%252FESCC%25234
有米iOS恶意SDK分析
http://drops.wooyun.org/papers/10047
http://drops.wooyun.org/papers/10047
Code Review 指南
http://blog.psjay.com/posts/code-review-guide/
http://blog.psjay.com/posts/code-review-guide/
Timing attack vulnerability in most Zeus server-sides
http://www.kerneronsec.com/2015/10/timing-attack-vulnerability-in-most.html
http://www.kerneronsec.com/2015/10/timing-attack-vulnerability-in-most.html
Your Registry Blobs Belong to Me (RegHexDump)
http://sysforensics.org/2015/04/your-registry-blobs-belong-to-me-reghexdump/
http://sysforensics.org/2015/04/your-registry-blobs-belong-to-me-reghexdump/
the risk of the "auto-download" feature on Edge and Chrome
http://justhaifei1.blogspot.com/2015/10/watch-your-downloads-risk-of-auto.html
http://justhaifei1.blogspot.com/2015/10/watch-your-downloads-risk-of-auto.html
Information from Microsoft about the PDB.
https://github.com/Microsoft/microsoft-pdb
https://github.com/Microsoft/microsoft-pdb
Attacking the Network Time Protocol
http://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf
http://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf
New research: The underground market fueling for-profit abuse
https://googleonlinesecurity.blogspot.jp/2015/09/new-research-underground-market-fueling.html
https://googleonlinesecurity.blogspot.jp/2015/09/new-research-underground-market-fueling.html
The Advanced Cyber Attack Landscape
http://www.security-finder.ch/fileadmin/dateien/pdf/studien-berichte/fireeye-advanced-cyber-attack-landscape-report.pdf
http://www.security-finder.ch/fileadmin/dateien/pdf/studien-berichte/fireeye-advanced-cyber-attack-landscape-report.pdf
Windows 10 Sandboxed Mount Reparse Point Creation Mitigation Bypass
https://www.exploit-db.com/exploits/38474/
https://www.exploit-db.com/exploits/38474/
Targeted Workstation Compromise with SCCM
https://enigma0x3.wordpress.com/2015/10/27/targeted-workstation-compromise-with-sccm/
https://enigma0x3.wordpress.com/2015/10/27/targeted-workstation-compromise-with-sccm/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第87期)
