SecWiki周刊(第184期)
2017/09/04-2017/09/10
      安全资讯
    
S2-052 Remote Code Execution attack when using the Struts REST plugin
https://cwiki.apache.org/confluence/display/WW/S2-052
https://cwiki.apache.org/confluence/display/WW/S2-052
微软内核漏洞致反病毒软件形同虚设,所有Windows版本受影响
https://www.easyaq.com/news/1589499437.shtml
https://www.easyaq.com/news/1589499437.shtml
维基解密泄露第23批CIA文件:“盔甲护身”(Protego)导弹控制系统
https://www.easyaq.com/news/1366007751.shtml
https://www.easyaq.com/news/1366007751.shtml
影子经纪人每月披露两批NSA网络武器,要价近400万美元
https://www.easyaq.com/news/1718673897.shtml
https://www.easyaq.com/news/1718673897.shtml
Equifax hack hits credit histories of up to 143 million Americans
https://www.washingtonpost.com/business/technology/equifax-hack-hits-credit-histories-of-up-to-143-million-americans/2017/09/07/a4ae6f82-941a-11e7-b9bc-b2f7903bab0d_story.html
https://www.washingtonpost.com/business/technology/equifax-hack-hits-credit-histories-of-up-to-143-million-americans/2017/09/07/a4ae6f82-941a-11e7-b9bc-b2f7903bab0d_story.html
Taringa:阿根廷“微博” 2800万用户数据遭泄
https://mp.weixin.qq.com/s/nTpDikcWX3HHYqoZuicKQw
https://mp.weixin.qq.com/s/nTpDikcWX3HHYqoZuicKQw
CARTA:Gartner的持续自适应风险与信任评估战略方法简介
http://yepeng.blog.51cto.com/3101105/1962560
http://yepeng.blog.51cto.com/3101105/1962560
瑞典数据通信公司Westermo多个工业级路由器存在高危漏洞
https://www.easyaq.com/news/1238028561.shtml
https://www.easyaq.com/news/1238028561.shtml
[人物志] KDD Cup 2017双料冠军燕鹏
https://mp.weixin.qq.com/s/-wAr-tWqvS2NLfwxKcnEQQ
https://mp.weixin.qq.com/s/-wAr-tWqvS2NLfwxKcnEQQ
渗透美国和欧洲电网后,俄罗斯黑客组织“蜻蜓”埋伏以待
https://www.easyaq.com/news/1182894136.shtml
https://www.easyaq.com/news/1182894136.shtml
美国第二轮GridEx-IV网络战演习:重点关注基础设施保护,首次纳入金融与电信行业
https://www.easyaq.com/news/278224224.shtml
https://www.easyaq.com/news/278224224.shtml
2.6万台MongoDB数据库被劫持 用户惨遭调戏
https://www.easyaq.com/news/405021770.shtml
https://www.easyaq.com/news/405021770.shtml
多个主流安卓手机芯片厂商的Bootloader存在漏洞
https://www.easyaq.com/news/1036467692.shtml
https://www.easyaq.com/news/1036467692.shtml
美国征信巨头Equifax遭黑客入侵,1.43亿公民身份数据泄漏
http://www.4hou.com/info/news/7594.html
http://www.4hou.com/info/news/7594.html
国信用机构Equifax遭黑客入侵泄露1.43亿用户信息
https://nosec.org/my/threats/1551
https://nosec.org/my/threats/1551
新三板网络安全公司2017年上半年业绩快报
https://mp.weixin.qq.com/s/gfiE46nj_74KInzmVNACrQ
https://mp.weixin.qq.com/s/gfiE46nj_74KInzmVNACrQ
安全创业公司靠什么产品赢得市场
https://mp.weixin.qq.com/s/Y2TO8FcY8cXyyrh-nlgxVA
https://mp.weixin.qq.com/s/Y2TO8FcY8cXyyrh-nlgxVA
俄罗斯曾在Facebook投入10万美元的政治广告影响2016美国大选
https://www.easyaq.com/news/62412640.shtml
https://www.easyaq.com/news/62412640.shtml
      安全技术
    
S2-052复现过程(附POC利用) heatlevel
https://bbs.ichunqiu.com/thread-26789-1-1.html
https://bbs.ichunqiu.com/thread-26789-1-1.html
nmap使用指南(终极版)
http://www.myh0st.cn/index.php/archives/39/
http://www.myh0st.cn/index.php/archives/39/
KCon 2017 PPT 下载
https://github.com/knownsec/KCon/tree/master/2017
https://github.com/knownsec/KCon/tree/master/2017
一起来学习用JNI加固你的Java代码,文末有彩蛋哦
http://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&mid=100000391&idx=1&sn=d7a5776d049484c6077e7d05695ce8eb&chksm=68fe9e8e5f8917980a30c180cd5693745ee93dc91a9bb8895e3a59a764a470caa1e601ed5901#rd
http://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&mid=100000391&idx=1&sn=d7a5776d049484c6077e7d05695ce8eb&chksm=68fe9e8e5f8917980a30c180cd5693745ee93dc91a9bb8895e3a59a764a470caa1e601ed5901#rd
Chrome 插件 User-Agent Switcher 原来是个隐藏木马
https://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&mid=2247484068&idx=1&sn=19400d4a33fd071706345197bdab38c9&chksm=e8fe9eaddf8917bba905f4da7b15dc6b227c1421e56d48b8fec06d077284adaa920e5d036d0f#rd
https://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&mid=2247484068&idx=1&sn=19400d4a33fd071706345197bdab38c9&chksm=e8fe9eaddf8917bba905f4da7b15dc6b227c1421e56d48b8fec06d077284adaa920e5d036d0f#rd
基于Termux打造Android手机渗透神器(2017-7-22更新)
http://blackwolfsec.cc/2016/12/10/termux/
http://blackwolfsec.cc/2016/12/10/termux/
S2-052 Python检测脚本
https://github.com/ysrc/xunfeng/commit/f9ae69fe176c8bca622831e126cd94414ebe26f6?from=timeline&isappinstalled=0
https://github.com/ysrc/xunfeng/commit/f9ae69fe176c8bca622831e126cd94414ebe26f6?from=timeline&isappinstalled=0
slate: Beautiful static documentation for your API 项目文档编写助手
https://github.com/lord/slate
https://github.com/lord/slate
Android脱壳圣战---360加固宝加固分析和脱壳教程解析
https://mp.weixin.qq.com/s/xSe2Zrv9Ev4qRaN99YmnRA
https://mp.weixin.qq.com/s/xSe2Zrv9Ev4qRaN99YmnRA
cobaltstrike3.8 破解版
https://evi1cg.me/archives/CobaltStrike_3_8_Cracked-html.html
https://evi1cg.me/archives/CobaltStrike_3_8_Cracked-html.html
Struts2 S2-052远程代码执行漏洞分析 
http://blog.topsec.com.cn/ad_lab/struts2-s2-052%e8%bf%9c%e7%a8%8b%e4%bb%a3%e7%a0%81%e6%89%a7%e8%a1%8c%e6%bc%8f%e6%b4%9e%e5%88%86%e6%9e%90/
http://blog.topsec.com.cn/ad_lab/struts2-s2-052%e8%bf%9c%e7%a8%8b%e4%bb%a3%e7%a0%81%e6%89%a7%e8%a1%8c%e6%bc%8f%e6%b4%9e%e5%88%86%e6%9e%90/
渗透测试学习笔记之案例四 
http://avfisher.win/archives/784
http://avfisher.win/archives/784
ThinkerPHP后台远程任意代码执行漏洞
https://xianzhi.aliyun.com/forum/read/2084.html
https://xianzhi.aliyun.com/forum/read/2084.html
利用sklearn检测webshell
http://www.polaris-lab.com/index.php/archives/372/
http://www.polaris-lab.com/index.php/archives/372/
Hunting Pastebin with PasteHunter 
https://techanarchy.net/2017/09/hunting-pastebin-with-pastehunter/
https://techanarchy.net/2017/09/hunting-pastebin-with-pastehunter/
cmsPoc: CMS渗透测试框架
https://github.com/CHYbeta/cmsPoc
https://github.com/CHYbeta/cmsPoc
XSS Without Dots
https://markitzeroday.com/character-restrictions/xss/2017/07/26/xss-without-dots.html
https://markitzeroday.com/character-restrictions/xss/2017/07/26/xss-without-dots.html
分析一个电信劫持跳转下载情色APP的案例
https://www.92ez.com/?action=show&id=23453
https://www.92ez.com/?action=show&id=23453
利用Python实现DGA域名检测
http://www.freebuf.com/articles/web/145981.html
http://www.freebuf.com/articles/web/145981.html
看我如何打造Android渗透测试环境
http://www.4hou.com/technology/7573.html
http://www.4hou.com/technology/7573.html
Pwned In Translation From Subtitles to RCE
https://hitcon.org/2017/CMT/slide-files/d2_s2_r1.pdf
https://hitcon.org/2017/CMT/slide-files/d2_s2_r1.pdf
如何从日志文件溯源出攻击手法?
http://www.4hou.com/penetration/7571.html
http://www.4hou.com/penetration/7571.html
Struts2远程代码执行漏洞CVE-2017-9805 Struts2.5至2.5.12受影响
https://bbs.ichunqiu.com/thread-26778-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-26778-1-1.html?from=sec
Firmware exploitation with JEB part 2
https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-2/
https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-2/
malwareinfosec/EKFiddle: A framework to study Exploit Kits
https://github.com/malwareinfosec/EKFiddle
https://github.com/malwareinfosec/EKFiddle
Exploiting Python Deserialization Vulnerabilities
https://crowdshield.com/blog.php?name=exploiting-python-deserialization-vulnerabilities
https://crowdshield.com/blog.php?name=exploiting-python-deserialization-vulnerabilities
Detecting Chrome Headless
https://antoinevastel.github.io/bot%20detection/2017/08/05/detect-chrome-headless.html
https://antoinevastel.github.io/bot%20detection/2017/08/05/detect-chrome-headless.html
Abusing JavaScript frameworks to bypass XSS mitigations
http://blog.portswigger.net/2017/09/abusing-javascript-frameworks-to-bypass.html
http://blog.portswigger.net/2017/09/abusing-javascript-frameworks-to-bypass.html
jgamblin/nmaptable: Transform NMap Scans to an D3.js HTML Table
https://github.com/jgamblin/nmaptable/
https://github.com/jgamblin/nmaptable/
[书籍] Deep Learning with Python 
https://github.com/fchollet/deep-learning-with-python-notebooks
https://github.com/fchollet/deep-learning-with-python-notebooks
Using Alternate Data Streams to Bypass User Account Controls
https://www.redcanary.com/blog/using-alternate-data-streams-bypass-user-account-controls/
https://www.redcanary.com/blog/using-alternate-data-streams-bypass-user-account-controls/
Rare ASP.NET request validation bypass using request encoding
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/rare-asp.net-request-validation-bypass-using-request-encoding/
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/rare-asp.net-request-validation-bypass-using-request-encoding/
Uber Bug Bounty: Gaining Access To An Internal Chat System
http://blog.mish.re/index.php/2017/09/06/uber-bug-bounty-gaining-access-to-an-internal-chat-system/
http://blog.mish.re/index.php/2017/09/06/uber-bug-bounty-gaining-access-to-an-internal-chat-system/
Automated Red Team Infrastructure Deployment with Terraform - Part 1
https://rastamouse.me/2017/08/automated-red-team-infrastructure-deployment-with-terraform---part-1/
https://rastamouse.me/2017/08/automated-red-team-infrastructure-deployment-with-terraform---part-1/
SecWiki周刊(第183期)
https://www.sec-wiki.com/weekly/183
https://www.sec-wiki.com/weekly/183
passmaker: 可以自定义规则的密码字典生成器
https://github.com/bit4woo/passmaker
https://github.com/bit4woo/passmaker
蜜罐与内网安全从0到1(二)
https://sosly.me/index.php/2017/09/05/jymiguan2/
https://sosly.me/index.php/2017/09/05/jymiguan2/
Hunting AdwindRAT with SSL Heuristics
http://www.netresec.com/?page=Blog&month=2017-09&post=Hunting-AdwindRAT-with-SSL-Heuristics
http://www.netresec.com/?page=Blog&month=2017-09&post=Hunting-AdwindRAT-with-SSL-Heuristics
Android启动过程的分析
http://www.4hou.com/mobile/7373.html
http://www.4hou.com/mobile/7373.html
D-Link 路由器信息泄露和远程命令执行漏洞分析及全球数据分析报告
https://paper.seebug.org/385/
https://paper.seebug.org/385/
TSpider: Yet Another Web Spider  动态Web爬虫
https://github.com/Twi1ight/TSpider
https://github.com/Twi1ight/TSpider
Firmware exploitation with JEB part 3: Reversing the SmartRG’s sr505n
https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-3-reversing-the-smartrgs-sr505n/
https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-3-reversing-the-smartrgs-sr505n/
Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration
https://github.com/SafeBreach-Labs/pacdoor
https://github.com/SafeBreach-Labs/pacdoor
数字签名攻击报告:正在摧毁软件身份“信用体系”的安全危机
http://www.freebuf.com/articles/network/146274.html
http://www.freebuf.com/articles/network/146274.html
Modern Web Application Penetration Testing , Hash Length Extension Attacks
https://isc.sans.edu/forums/diary/Modern+Web+Application+Penetration+Testing+Hash+Length+Extension+Attacks/22792/
https://isc.sans.edu/forums/diary/Modern+Web+Application+Penetration+Testing+Hash+Length+Extension+Attacks/22792/
Kronos银行木马的前世今生
http://www.4hou.com/technology/7527.html
http://www.4hou.com/technology/7527.html
联网生产类系统安全巡检报告 (电力行业)
https://mp.weixin.qq.com/s/jdqB8I6T33x3LlKpUXljJw
https://mp.weixin.qq.com/s/jdqB8I6T33x3LlKpUXljJw
Beyond Domain Admins – Domain Controller & AD Administration
http://link.crwd.fr/2bsU#https://adsecurity.org/?p=3700
http://link.crwd.fr/2bsU#https://adsecurity.org/?p=3700
ShellCode执行代码iptables -P INPUT ACCEPT
http://www.91ri.org/17267.html
http://www.91ri.org/17267.html
禁用Wi-Fi是否可以阻止Android手机发送无线帧?
http://www.4hou.com/wireless/7545.html
http://www.4hou.com/wireless/7545.html
URL Spoofing with Modern Browser
https://www.math1as.com/index.php/archives/505/
https://www.math1as.com/index.php/archives/505/
A Yara rule generator for finding related samples and hunting
https://github.com/AlienVault-OTX/yabin
https://github.com/AlienVault-OTX/yabin
研究人员找到禁用Intel ME组件的方法(乡村故事版)
http://www.freebuf.com/news/146032.html
http://www.freebuf.com/news/146032.html
Windows10子系统Bash环境安装
https://bbs.ichunqiu.com/thread-26614-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-26614-1-1.html?from=sec
Who Is Marcus Hutchins?
https://krebsonsecurity.com/2017/09/who-is-marcus-hutchins/
https://krebsonsecurity.com/2017/09/who-is-marcus-hutchins/
从WordPress SQLi谈PHP格式化字符串问题
https://paper.seebug.org/386/
https://paper.seebug.org/386/
fastjson 调试利用记录 
http://5alt.me/2017/09/fastjson%E8%B0%83%E8%AF%95%E5%88%A9%E7%94%A8%E8%AE%B0%E5%BD%95/
http://5alt.me/2017/09/fastjson%E8%B0%83%E8%AF%95%E5%88%A9%E7%94%A8%E8%AE%B0%E5%BD%95/
实战演练:看我是如何将LFI变为RFI的
https://xianzhi.aliyun.com/forum/read/2060.html
https://xianzhi.aliyun.com/forum/read/2060.html
frida-scripts: A collection of Frida.re scripts reverse Apps
https://github.com/0xdea/frida-scripts/
https://github.com/0xdea/frida-scripts/
DomainFrontingLists: 使用不同 CDN 服务的网站列表样例
https://github.com/vysec/DomainFrontingLists
https://github.com/vysec/DomainFrontingLists
BROADPWN: Remote control of ANDROID and IOS via BUG in BROADCOM's WI-FI
https://blog.exodusintel.com/2017/07/26/broadpwn/
https://blog.exodusintel.com/2017/07/26/broadpwn/
Firmware exploitation with JEB part 2
https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-1/
https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-1/
Malware source code database
https://github.com/mwsrc
https://github.com/mwsrc
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com本期原文地址: SecWiki周刊(第184期)

 
					 
					 
					