SecWiki周刊(第164期)
2017/04/17-2017/04/23
安全资讯
任意伪造域名-你能分辨出钓鱼网站的域名吗 App Store 刷榜黑幕大揭秘
安全技术
学习使用Clang Libfuzzer Fuzz C/Cpp代码 Apache Log4j反序列化漏洞(CVE-2017-5645) Esteemaudit漏洞复现过程 CVE-2017-0199漏洞复现过程 NSA/fuzzbunch NSA Eternalblue SMB 漏洞分析 NSA Explodingcan 漏洞分析与调试 Edge – SOP bypass courtesy of the reading mode 浅谈漏洞挖掘及代码审计(一) Linux、Windows提权命令速记 木马实现技术概述 Eternalromance (永恒浪漫) 漏洞分析 子域名挖掘修改版 EternalPulsar实践 Web Service 渗透测试从入门到精通 利用机器学习实时对抗Java恶意软件 打造免费企业安全:便宜没好货吗?(一) sicklepoc:Web扫描器开源 leakPasswd: Python 密码泄露查询模块 D2T4 - Emmanuel Gadaix - A Surprise Encounter With a Telco APT 基于Python与Face++实现人脸识别 python-uncompyle6: Python 反编译工具 MySQL注入攻击与防御 Boostnote:开源的程序员专属笔记应用工具 weibo_terminater: 微博终结者爬虫 Malcom Malware Communication Analyzer y Bro IDS. Parte I 每周技术分享第三期--科普WAF Black Hat Python: Infinite possibilities with the Scapy Module Windows绝赞应用 VulnTrack 深入分析NSA用了5年的IIS漏洞 8dot8 on Vimeo 安全相关免费电子书集合 Exploit toolkit CVE-2017-0199 - v2.0 Run virtual routers with docker A quick analysis of the latest Shadow Brokers dump Android malware anti-emulation techniques Cheetah:一款基于字典的webshell密码爆破工具 The Shadow over Android Heap exploitation assistance for Android’s libc allocato awesome-cve-poc:A curated list of CVE PoCs Benchmarks: 常用服务器、数据库、中间件安全配置基线 GitLab 的员工手册-远程办公协作 深度!近期所谓“优酷数据泄露事件”的客观事实还原 通过云Fuzz挖掘TCPDump的漏洞 【重磅推荐】安全客2017季刊第一期新鲜出炉! [0day] Text/Plain Considered Harmful Studies in AI & Pixels & Waves - #5 Metasploit Framework docker 版本 python奇技淫巧 Exploit Monday: Updating Device Guard Code Integrity Policies doublepulsar-c2-traffic-decryptor: 网络层检测DOUBLEPULSAR攻击 使用业务和技术有关的上下文对网络威胁情报(CTI)进行排序 Automating APT Scanning with Loki Scanner and Splunk THUOCL:清华大学开放中文词库 Twitter账户活动情况分析工具 – Simple Twitter Profile Analyzer PowerShell Gallery | PowerShellCookbook 1.3.6 SSL&TLS安全测试 2016年网络安全威胁的回顾与展望 浅谈linux安全加固 通过APC实现Dll注入——绕过Sysmon监控 2016-2017年第一季度工业控制网络安全态势白皮书 Studies in AI & Pixels & Waves - #11 Into the symmetry: Meh : CSRF in Facebook Delegated Account Recovery Tamper Chrome Magnitude EK delivers Cerber | Zerophage Malware Design flaws in Lastpass 2FA implementation SEC Consult: Abusing NVIDIA's node.js to bypass application whitelisting ARM Releases Machine Readable Architecture Specification Studies in AI & Pixels & Waves - #6 Studies in AI & Pixels & Waves - #10 PHP HOOK的若干方法 jSQL Injection: herramienta automatizada en Java para realizar ataques SQL IEETWCollector Arbitrary Directory/File Deletion Pr 全面监听:以斯塔西的名义 android 安全编码指南 SecWiki周刊(第163期) Android漏洞测试套件 Studies in AI & Pixels & Waves - #8 Studies in AI & Pixels & Waves - #7 All videos of Android Security Symposium 2017 百度网盘自动添加资源项目(更新GUI版本) A Closer Look at Chrome's Security: Understanding V8 长城宽带内网严重隐患:边界模糊不清 Hadoop Security for beginners EternalPulsar — A practical example of a made up name Introducing CFI in HardenedBSD | SOLDIERX.COM encoding-web-shells-in-png-idat-chunks Chrome and Firefox Phishing Attack Uses Domains Identical to Known Safe Sites Memory corruption in Array concat DNS Intrusion Detection in Office 365 list-of-waf-security-bypass-research Studies in AI & Pixels & Waves - #9 Introducing SafeStack in HardenedBSD Smart TV Hack via the Broadcast Signal Bypassing Browser Memory Protections Studies in AI & Pixels & Waves - #3 EITEST CAMPAIGN RIG EK / HOEFLERTEXT CHROME POPUP Studies in AI & Pixels & Waves - #1 Ad-LDAP-Enum Studies in AI & Pixels & Waves - #2 Studies in AI & Pixels & Waves - #4-----微信ID:SecWiki-----
SecWiki,12年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第164期)