SecWiki周刊(第98期)
2016/01/11-2016/01/17
安全资讯
SSH Backdoor for FortiGate OS Version 4.x up to 5.0.7
http://seclists.org/fulldisclosure/2016/Jan/26
http://seclists.org/fulldisclosure/2016/Jan/26
安全技术
HTTP头注入发现方法(有案例)
http://www.moonsec.com/post-184.html
http://www.moonsec.com/post-184.html
HTTP头注入的发现和工具化利用
http://loudong.360.cn/blog/view/id/14
http://loudong.360.cn/blog/view/id/14
浅谈硬件固件后门的危害和固件安全检测的必要性
http://mp.weixin.qq.com/s?__biz=MzA4MjYwODg0OQ==&mid=401751513&idx=1&sn=273132f9bd64136f74510319f4fe7e03#rd
http://mp.weixin.qq.com/s?__biz=MzA4MjYwODg0OQ==&mid=401751513&idx=1&sn=273132f9bd64136f74510319f4fe7e03#rd
ESET CrackMe Challenge 2015 Walkthrough
https://quequero.org/2016/01/eset-crackme-challenge-2015-walkthrough/
https://quequero.org/2016/01/eset-crackme-challenge-2015-walkthrough/
Exploring Peer to Peer Botnets
http://www.malwaretech.com/2016/01/exploring-peer-to-peer-botnets.html
http://www.malwaretech.com/2016/01/exploring-peer-to-peer-botnets.html
Hunting for Malware with Machine Learning
http://blog.cylance.com/hunting-for-malware-with-machine-learning
http://blog.cylance.com/hunting-for-malware-with-machine-learning
2015 WitAwards互联网安全Slide(PW: 369b)
http://pan.baidu.com/s/1gengcAB
http://pan.baidu.com/s/1gengcAB
HITCON CTF 2015 Final Webful Writeup
http://5alt.me/posts/2015/12/HITCON%20CTF%202015%20Final%20Webful%20Writeup.html
http://5alt.me/posts/2015/12/HITCON%20CTF%202015%20Final%20Webful%20Writeup.html
(xss)when-reflected-becomes-stored
https://respectxss.blogspot.de/2016/01/when-reflected-becomes-stored.html
https://respectxss.blogspot.de/2016/01/when-reflected-becomes-stored.html
JavaScript Deobfuscation Tool
https://isc.sans.edu/forums/diary/JavaScript+Deobfuscation+Tool/20619/
https://isc.sans.edu/forums/diary/JavaScript+Deobfuscation+Tool/20619/
六款大数据采集平台的架构分析
http://www.36dsj.com/archives/39854
http://www.36dsj.com/archives/39854
陈恺:面向海量软件的未知恶意代码检测方法
http://www.inforsec.org/wp/?p=489
http://www.inforsec.org/wp/?p=489
Palantir in a number of parts - Part 11 - Expansion
http://about80minutes.blogspot.com/search/label/Palantir
http://about80minutes.blogspot.com/search/label/Palantir
从活动目录获取域管理员权限的各种姿势
http://drops.wooyun.org/tips/12021
http://drops.wooyun.org/tips/12021
Top 10 Web Hacking Techniques of 2015
http://blog.whitehatsec.com/top-10-web-hacking-techniques-of-2015/
http://blog.whitehatsec.com/top-10-web-hacking-techniques-of-2015/
ICS Security Tools, Tips, and Trade
https://github.com/ITI/ICS-Security-Tools
https://github.com/ITI/ICS-Security-Tools
Ascending the Ranks: The Brazilian Cybercriminal Underground in 2015
http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/brazilian-cybercriminal-underground-2015
http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/brazilian-cybercriminal-underground-2015
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第98期)
