SecWiki周刊(第178期)
2017/07/24-2017/07/30
安全资讯
[译]攻击者如何利用机器学习预测BEC成功
https://www.520waf.com/2017/07/business-email-compromise/
https://www.520waf.com/2017/07/business-email-compromise/
Black Hat 2017:不容错过的七大主题演讲
https://mp.weixin.qq.com/s?__biz=MzI4MjA1MzkyNA==&mid=2655295536&idx=1&sn=3c4a3a70208b60ea81b1283585d542ba&scene=0#wechat_redirect
https://mp.weixin.qq.com/s?__biz=MzI4MjA1MzkyNA==&mid=2655295536&idx=1&sn=3c4a3a70208b60ea81b1283585d542ba&scene=0#wechat_redirect
新三板网络安全公司完全名单2017Q2
https://www.sec-un.org/%e6%96%b0%e4%b8%89%e6%9d%bf%e7%bd%91%e7%bb%9c%e5%ae%89%e5%85%a8%e5%85%ac%e5%8f%b8%e5%ae%8c%e5%85%a8%e5%90%8d%e5%8d%952017q2/
https://www.sec-un.org/%e6%96%b0%e4%b8%89%e6%9d%bf%e7%bd%91%e7%bb%9c%e5%ae%89%e5%85%a8%e5%85%ac%e5%8f%b8%e5%ae%8c%e5%85%a8%e5%90%8d%e5%8d%952017q2/
Tor也加入了漏洞奖励计划,悬赏4000美元挖漏洞
http://www.4hou.com/info/news/6771.html
http://www.4hou.com/info/news/6771.html
维基解密曝第18批Vault7文件:CIA“帝国”项目
https://www.easyaq.com/news/1721672781.shtml
https://www.easyaq.com/news/1721672781.shtml
安全技术
渗透测试学习平台Web For Pentester
http://uknowsec.cn/posts/notes/Web-For-Pentester-I-%E7%BB%83%E4%B9%A0%E7%AC%94%E8%AE%B0.html
http://uknowsec.cn/posts/notes/Web-For-Pentester-I-%E7%BB%83%E4%B9%A0%E7%AC%94%E8%AE%B0.html
sql注入常规思路及奇葩技巧
http://mp.weixin.qq.com/s/hBkJ1M6LRgssNyQyati1ng
http://mp.weixin.qq.com/s/hBkJ1M6LRgssNyQyati1ng
WiFi定位劫持·续篇——GPS劫持
http://www.toutiao.com/i6441333182192157186/
http://www.toutiao.com/i6441333182192157186/
恶意充电宝的克星——USB安全接口
http://www.toutiao.com/i6446917020100329997/
http://www.toutiao.com/i6446917020100329997/
简易BadUSB,攻击效果不简单
http://www.toutiao.com/i6446159632455959053/
http://www.toutiao.com/i6446159632455959053/
[Bypass WAF] Php webshell without numbers and letters
https://securityonline.info/bypass-waf-php-webshell-without-numbers-letters
https://securityonline.info/bypass-waf-php-webshell-without-numbers-letters
CNNVD 关于Apache Tomcat安全绕过漏洞情况的通报
http://mp.weixin.qq.com/s/fkBVw0BH5kcc0jdKC4c9ZA
http://mp.weixin.qq.com/s/fkBVw0BH5kcc0jdKC4c9ZA
四大顶会之USENIX Security '17 录用论文及议题列表
https://www.usenix.org/conference/usenixsecurity17/technical-sessions
https://www.usenix.org/conference/usenixsecurity17/technical-sessions
SLocker: Android ransomware
https://github.com/fs0c1ety/SLocker
https://github.com/fs0c1ety/SLocker
报告三 webshell检测模块与模块测试(下)
https://mp.weixin.qq.com/s/yh_uX8jPfbn-_wzGOkugaA
https://mp.weixin.qq.com/s/yh_uX8jPfbn-_wzGOkugaA
报告三 Webshell检测模块与模块测试(上篇)
https://mp.weixin.qq.com/s/8PauKA6KU3TXp2FEmcoqeQ
https://mp.weixin.qq.com/s/8PauKA6KU3TXp2FEmcoqeQ
Black Hat USA 2017 议题 PPT 下载(部分)
https://www.blackhat.com/us-17/briefings.html
https://www.blackhat.com/us-17/briefings.html
Android版本的"Wannacry"文件加密病毒样本分析(附带锁机)
http://www.52pojie.cn/thread-627399-1-1.html
http://www.52pojie.cn/thread-627399-1-1.html
基于威胁情报的攻击组织画像与溯源
https://mp.weixin.qq.com/s?__biz=MjM5MTA3Nzk4MQ==&mid=2650171036&idx=1&sn=9de1c828c46d989fc9e4cf72a8653401&scene=0#wechat_redirect
https://mp.weixin.qq.com/s?__biz=MjM5MTA3Nzk4MQ==&mid=2650171036&idx=1&sn=9de1c828c46d989fc9e4cf72a8653401&scene=0#wechat_redirect
2017网络安全生态峰会议题PPT 密码#ece1
https://2e31da.link.eyun.360.cn/lk/surl_yVrRVCtVS89
https://2e31da.link.eyun.360.cn/lk/surl_yVrRVCtVS89
FudanDNN-NLP:基于深度学习的中文自然语言处理工具
http://openkg.cn/tool/fudandnn-nlp
http://openkg.cn/tool/fudandnn-nlp
报告一 阿里云安骑士 Webshell规则逆向
https://mp.weixin.qq.com/s/oZ7Jmo_rIblGYArHecn7lQ
https://mp.weixin.qq.com/s/oZ7Jmo_rIblGYArHecn7lQ
Redemption: Real-time Protection Against Ransomware at End-Hosts 勒索软件检测
http://www.ccs.neu.edu/home/mkharraz/publications/raid2017redemption.pdf
http://www.ccs.neu.edu/home/mkharraz/publications/raid2017redemption.pdf
机器学习识别XSS实践
https://www.cdxy.me/?p=773
https://www.cdxy.me/?p=773
xssfork-一款xss探测工具
http://www.codersec.net/2017/07/xssfork%E4%B8%80%E6%AC%BExss%E6%8E%A2%E6%B5%8B%E5%B7%A5%E5%85%B7/
http://www.codersec.net/2017/07/xssfork%E4%B8%80%E6%AC%BExss%E6%8E%A2%E6%B5%8B%E5%B7%A5%E5%85%B7/
报告二 腾讯云 Webshell检测规则逆向
https://mp.weixin.qq.com/s/3Zx2FTXXxpTiqe56b8hJQg
https://mp.weixin.qq.com/s/3Zx2FTXXxpTiqe56b8hJQg
网络威胁情报标准:STIX标准
https://mp.weixin.qq.com/s?__biz=MzI4NzU2NjU4NQ==&mid=2247485182&idx=1&sn=c8a245647d1a96e9f542a191d88cfbc1&scene=0#wechat_redirect
https://mp.weixin.qq.com/s?__biz=MzI4NzU2NjU4NQ==&mid=2247485182&idx=1&sn=c8a245647d1a96e9f542a191d88cfbc1&scene=0#wechat_redirect
如何使用Fuzzing挖掘ImageMagick的漏洞
https://github.com/lcatro/Fuzzing-ImageMagick/blob/master/%E5%A6%82%E4%BD%95%E4%BD%BF%E7%94%A8Fuzzing%E6%8C%96%E6%8E%98ImageMagick
https://github.com/lcatro/Fuzzing-ImageMagick/blob/master/%E5%A6%82%E4%BD%95%E4%BD%BF%E7%94%A8Fuzzing%E6%8C%96%E6%8E%98ImageMagick
WordPress插件WP Statistics SQL注入漏洞分析
https://www.bksec.net/Web/WordPress-WP-Statistics-SQLinjection.html
https://www.bksec.net/Web/WordPress-WP-Statistics-SQLinjection.html
CSA云计算关键领域安全指南4.0 (中文版)剖析
https://mp.weixin.qq.com/s?__biz=MzI4MTIyNjkxOQ==&mid=2247484179&idx=1&sn=afbd75c6631b6f12f1657d6f04a9f6de&scene=0#wechat_redirect
https://mp.weixin.qq.com/s?__biz=MzI4MTIyNjkxOQ==&mid=2247484179&idx=1&sn=afbd75c6631b6f12f1657d6f04a9f6de&scene=0#wechat_redirect
Burpsuite常用模块详解以及渗透测试上的运用
https://bbs.ichunqiu.com/thread-25058-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-25058-1-1.html?from=sec
数据中心机房标准及规范汇总 密码# gzek
https://pan.baidu.com/s/1eSOnL7c
https://pan.baidu.com/s/1eSOnL7c
基于docker的蜜罐学习
http://mp.weixin.qq.com/s/C7RqU6NfOKgYyN_HsFxXNw
http://mp.weixin.qq.com/s/C7RqU6NfOKgYyN_HsFxXNw
通过 WebView 攻击 Android 应用
https://zhuanlan.zhihu.com/p/28107901
https://zhuanlan.zhihu.com/p/28107901
Use Office to maintain persistence 利用Office软件实现长久控制
https://3gstudent.github.io/3gstudent.github.io/Use-Office-to-maintain-persistence/
https://3gstudent.github.io/3gstudent.github.io/Use-Office-to-maintain-persistence/
如何运用kali-xplico网络取证分析?
https://bbs.ichunqiu.com/thread-24825-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-24825-1-1.html?from=sec
国内外敏感信息泄露案例汇总分析
https://mp.weixin.qq.com/s?__biz=MjM5Njc3NjM4MA==&mid=2651072625&idx=1&sn=0f286b169f1bfe74b5b3707f7e0f6224&scene=0#wechat_redirect
https://mp.weixin.qq.com/s?__biz=MjM5Njc3NjM4MA==&mid=2651072625&idx=1&sn=0f286b169f1bfe74b5b3707f7e0f6224&scene=0#wechat_redirect
浅析OGNL表达式求值(S2003/005/009跟踪调试记录)
https://xianzhi.aliyun.com/forum/read/1902.html
https://xianzhi.aliyun.com/forum/read/1902.html
MicroScan 基于B/S架构微扫描器
https://github.com/MiniSafe/microscan
https://github.com/MiniSafe/microscan
如何用Python做舆情时间序列可视化?
http://mp.weixin.qq.com/s/JGHSH_TH25GBwGJdLBgnmA
http://mp.weixin.qq.com/s/JGHSH_TH25GBwGJdLBgnmA
基于Falcon的滴滴内部监控系统
https://mp.weixin.qq.com/s?__biz=MzAwMDU1MTE1OQ==&mid=2653548916&idx=1&sn=ed50fae989b08eed3b9a5c754fa70b23&scene=0#wechat_redirect
https://mp.weixin.qq.com/s?__biz=MzAwMDU1MTE1OQ==&mid=2653548916&idx=1&sn=ed50fae989b08eed3b9a5c754fa70b23&scene=0#wechat_redirect
exploit module for CVE-2017-8464 LNK Code Execution Vulnerability
https://github.com/rapid7/metasploit-framework/pull/8767
https://github.com/rapid7/metasploit-framework/pull/8767
SecWiki周刊(第177期)
https://www.sec-wiki.com/weekly/177
https://www.sec-wiki.com/weekly/177
反入侵之发现后门利用mount-bind将进程和端口信息隐匿
http://www.freebuf.com/articles/network/140535.html
http://www.freebuf.com/articles/network/140535.html
安全事件响应想要成功 需要具备5个条件囊括6类人 AT&T团队分享他们的经验
http://toutiao.secjia.com/incident-response-team-point
http://toutiao.secjia.com/incident-response-team-point
网络安全线上资源大全
http://www.aqniu.com/learn/27008.html
http://www.aqniu.com/learn/27008.html
bypassGET和POST的注入防御思路分享
http://bbs.ichunqiu.com/thread-16134-1-1.html?from=sec
http://bbs.ichunqiu.com/thread-16134-1-1.html?from=sec
mjet: Mogwai Java Management Extensions (JMX) Exploitation Toolkit
https://github.com/mogwaisec/mjet
https://github.com/mogwaisec/mjet
BurpSuite插件:利用BurpSuite Spider收集子域名和相似域名
http://www.polaris-lab.com/index.php/archives/349/
http://www.polaris-lab.com/index.php/archives/349/
渗透测试教程:如何侦查目标以及收集信息?
http://www.4hou.com/penetration/6850.html
http://www.4hou.com/penetration/6850.html
XSS易容术---bypass之编码混淆篇+辅助脚本编写
http://bbs.ichunqiu.com/thread-17500-1-1.html?from=sec
http://bbs.ichunqiu.com/thread-17500-1-1.html?from=sec
Orange: From SSRF Execution Chain to RCE!
http://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html
http://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html
htcap:一款递归型的Web应用扫描器
http://www.4hou.com/tools/6811.html
http://www.4hou.com/tools/6811.html
反击“猫眼电影”网站的反爬虫策略
http://www.freebuf.com/news/140965.html
http://www.freebuf.com/news/140965.html
精选 Flexport 在 HackerOne 这一年 6 个有趣的安全漏洞
http://paper.seebug.org/358/
http://paper.seebug.org/358/
How i Hacked into a PayPal's Server
http://blog.pentestbegins.com/2017/07/21/hacking-into-paypal-server-remote-code-execution-2017/
http://blog.pentestbegins.com/2017/07/21/hacking-into-paypal-server-remote-code-execution-2017/
Deep Learning for detection with XSS
https://github.com/SparkSharly/DL_for_xss
https://github.com/SparkSharly/DL_for_xss
pyt: 针对 Python 应用程序的源码静态分析工具
https://github.com/python-security/pyt
https://github.com/python-security/pyt
Friday the 13th: JSON Attacks
https://www.blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-Json-Attacks.pdf
https://www.blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-Json-Attacks.pdf
安普诺CEO张涛先生之再谈WebShell检测
http://www.freebuf.com/company-information/141538.html
http://www.freebuf.com/company-information/141538.html
详述MSSQL服务在渗透测试中的利用
http://bbs.ichunqiu.com/thread-17737-1-1.html?from=sec
http://bbs.ichunqiu.com/thread-17737-1-1.html?from=sec
从零开始学习渗透Node.js应用程序
https://bbs.ichunqiu.com/thread-21810-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-21810-1-1.html?from=sec
绿盟科技《2017上半年网络安全观察》
http://www.yunzhan365.com/81050356.html
http://www.yunzhan365.com/81050356.html
使用python及工具包进行简单的验证码识别
https://bbs.ichunqiu.com/thread-25093-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-25093-1-1.html?from=sec
轻松劫持无人机,安全问题令人堪忧
http://www.toutiao.com/i6442448924916580878/
http://www.toutiao.com/i6442448924916580878/
用于Windows 7+的Intel VT-X / EPT进程监控工具(如Process Monitor)
https://github.com/hzqst/Syscall-Monitor
https://github.com/hzqst/Syscall-Monitor
cracking-lens-targeting-https-hidden
http://blog.portswigger.net/2017/07/cracking-lens-targeting-https-hidden.html?m=1
http://blog.portswigger.net/2017/07/cracking-lens-targeting-https-hidden.html?m=1
用代码来细说Csrf漏洞危害以及防御
https://bbs.ichunqiu.com/thread-24127-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-24127-1-1.html?from=sec
Dump LAPS passwords with ldapsearch
https://room362.com/post/2017/dump-laps-passwords-with-ldapsearch/
https://room362.com/post/2017/dump-laps-passwords-with-ldapsearch/
CDN校验漏洞催生海量网络投毒-正式报告
https://www.sec-un.com/static/doc/CDN_Checksum_Vulnerability_Analysis.pdf
https://www.sec-un.com/static/doc/CDN_Checksum_Vulnerability_Analysis.pdf
FLARE VM: The Windows Malware Analysis Distribution
https://www.fireeye.com/blog/threat-research/2017/07/flare-vm-the-windows-malware.html
https://www.fireeye.com/blog/threat-research/2017/07/flare-vm-the-windows-malware.html
获取来源IP地址的正确姿势
http://www.freebuf.com/articles/web/140669.html
http://www.freebuf.com/articles/web/140669.html
Threat-Intelligence-Analyst: 威胁情报,恶意样本分析,开源Malware代码收集
https://github.com/pandazheng/Threat-Intelligence-Analyst
https://github.com/pandazheng/Threat-Intelligence-Analyst
黑帽大会20年精选:亮点、争议与夭折
http://mp.weixin.qq.com/s/haNPBtZgPppysdqfVRmpxQ
http://mp.weixin.qq.com/s/haNPBtZgPppysdqfVRmpxQ
如何检测用USB创建并进行类似Stuxnet传播的隐蔽网络
http://www.freebuf.com/news/140930.html
http://www.freebuf.com/news/140930.html
文档元数据——基础信息泄露的源头
http://www.4hou.com/technology/6857.html
http://www.4hou.com/technology/6857.html
WINDOWS平台下的栈溢出攻击从0到1
http://bbs.ichunqiu.com/thread-18052-1-1.html?from=sec
http://bbs.ichunqiu.com/thread-18052-1-1.html?from=sec
保护内网域安全之扫描Active Directory特权和特权帐户(二)
http://www.4hou.com/penetration/5529.html
http://www.4hou.com/penetration/5529.html
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection
https://github.com/airbnb/binaryalert
https://github.com/airbnb/binaryalert
对抗蠕虫 —— 如何让按钮不被 JS 自动点击
https://www.cnblogs.com/index-html/p/anti_xss_worm.html
https://www.cnblogs.com/index-html/p/anti_xss_worm.html
GoAccess: open source real-time web log analyzer and interactive viewer
https://goaccess.io/
https://goaccess.io/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第178期)
