SecWiki周刊(第209期)
2018/02/26-2018/03/04
安全资讯
币圈一日,人间十年:黑客想了三刻钟就笑了
http://www.freebuf.com/articles/neopoints/163671.html
http://www.freebuf.com/articles/neopoints/163671.html
百度文库被发现上传了日企的内部机密文件
https://www.solidot.org/story?sid=55661
https://www.solidot.org/story?sid=55661
教育部办公厅关于印发《2018年教育信息化和网络安全工作要点》的通知
http://www.edu.cn/xxh/focus/zc/201803/t20180301_1587275.shtml
http://www.edu.cn/xxh/focus/zc/201803/t20180301_1587275.shtml
GitHub 遭到 1.35Tbps 的 DDoS 攻击
https://www.solidot.org/story?sid=55657
https://www.solidot.org/story?sid=55657
腾讯联合联发科发布TRP-AI反病毒引擎
http://tech.qq.com/a/20180226/020272.htm
http://tech.qq.com/a/20180226/020272.htm
安全技术
ArcSight简介-ArcSight技术系列之一
https://mp.weixin.qq.com/s?__biz=MzI2MjQ1NTA4MA==&mid=2247483846&idx=1&sn=22671cab5c81369c4d9135b2a604a421&chksm=ea4bab81dd3c22972d3112979eb089b50a23786b7af78f7cb34451d4723fb72be650056184d9#rd
https://mp.weixin.qq.com/s?__biz=MzI2MjQ1NTA4MA==&mid=2247483846&idx=1&sn=22671cab5c81369c4d9135b2a604a421&chksm=ea4bab81dd3c22972d3112979eb089b50a23786b7af78f7cb34451d4723fb72be650056184d9#rd
实施规划和架构设计-ArcSight实战系列之二
https://mp.weixin.qq.com/s?__biz=MzI2MjQ1NTA4MA==&mid=2247484002&idx=1&sn=962231e3b73e3e9c7f3d2472ab57949a&chksm=ea4ba825dd3c213343ee20a51786b1cd9db48242f668b048e5b25f4fd3b1cafebee04784c6e1#rd
https://mp.weixin.qq.com/s?__biz=MzI2MjQ1NTA4MA==&mid=2247484002&idx=1&sn=962231e3b73e3e9c7f3d2472ab57949a&chksm=ea4ba825dd3c213343ee20a51786b1cd9db48242f668b048e5b25f4fd3b1cafebee04784c6e1#rd
The Easiest Metasploit Guide You’ll Ever Read
https://a.ndronic.us/guides/metasploit/html/index.html
https://a.ndronic.us/guides/metasploit/html/index.html
威胁猎人:2017年度中国互联网黑产报告
http://mp.weixin.qq.com/s/evGK8v2rjM4IGYODYXFvtA
http://mp.weixin.qq.com/s/evGK8v2rjM4IGYODYXFvtA
Windows / Linux Local Privilege Escalation Workshop
https://github.com/sagishahar/lpeworkshop
https://github.com/sagishahar/lpeworkshop
金融科技SDL安全设计checklist
https://mp.weixin.qq.com/s/MR3SmOLj834LK4RBMcZ2pg
https://mp.weixin.qq.com/s/MR3SmOLj834LK4RBMcZ2pg
某CMS V5.7 SP2 后台Getshell
https://xianzhi.aliyun.com/forum/topic/2071
https://xianzhi.aliyun.com/forum/topic/2071
Effective and Real-time In-App Activity Analysis in Encrypted Internet Traffic Streams
http://www.kdd.org/kdd2017/papers/view/effective-and-real-time-in-app-activity-analysis-in-encrypted-internet-traf
http://www.kdd.org/kdd2017/papers/view/effective-and-real-time-in-app-activity-analysis-in-encrypted-internet-traf
HTML5 Security Cheat Sheet
https://www.owasp.org/index.php/HTML5_Security_Cheat_Sheet
https://www.owasp.org/index.php/HTML5_Security_Cheat_Sheet
china-operator-ip: 中国运营商IP地址库(每日更新)
https://github.com/gaoyifan/china-operator-ip
https://github.com/gaoyifan/china-operator-ip
Tomcat CVE-2018-1305 分析
https://mp.weixin.qq.com/s/PZsOQy2lpR1lHqLWmAXlbg
https://mp.weixin.qq.com/s/PZsOQy2lpR1lHqLWmAXlbg
Gophish: Open-Source Phishing Framework
https://getgophish.com/
https://getgophish.com/
cloudmapper: 生成AWS环境的网络拓扑图
https://github.com/duo-labs/cloudmapper
https://github.com/duo-labs/cloudmapper
渗透技巧—利用Masterkey离线导出Chrome浏览器中保存的密码
http://www.4hou.com/technology/10474.html
http://www.4hou.com/technology/10474.html
基于 S2E 符号执行分析平台自动化地发现漏洞、生成 PoC
https://github.com/S2E/docs/blob/master/src/Tutorials/pov.rst
https://github.com/S2E/docs/blob/master/src/Tutorials/pov.rst
ESD: Enumeration sub domains(枚举子域名)
https://github.com/FeeiCN/ESD
https://github.com/FeeiCN/ESD
FLASH 0day(CVE-2018-4878)从POC到利用
https://mp.weixin.qq.com/s/F2N04exaW8QO1IeHRZgmfg
https://mp.weixin.qq.com/s/F2N04exaW8QO1IeHRZgmfg
Cobalt Strike神器高级教程利用Aggressor脚本编写目标上线邮件提醒
https://www.anquanke.com/post/id/98829
https://www.anquanke.com/post/id/98829
EvilOSX:macOS/OSX后渗透工具
https://github.com/Marten4n6/EvilOSX
https://github.com/Marten4n6/EvilOSX
Cobalt Strike中DNS隐蔽隧道的利用,以及使用DLP进行检测
https://www.anquanke.com/post/id/99408
https://www.anquanke.com/post/id/99408
SPF: SpeedPhishing simple social engineering phishing framework
https://github.com/tatanus/SPF
https://github.com/tatanus/SPF
密码科学技术国家重点实验室2018年开放课题发布
https://mp.weixin.qq.com/s/u1mDFINefmUEeeDsYrUsAw
https://mp.weixin.qq.com/s/u1mDFINefmUEeeDsYrUsAw
2017年度黑灰产画像:黑灰产服务型产业链报告
https://mp.weixin.qq.com/s/jb7Cl3YXNRAfN-2Awuewig
https://mp.weixin.qq.com/s/jb7Cl3YXNRAfN-2Awuewig
Android动态日志系统Holmes
https://tech.meituan.com/android_holmes.html
https://tech.meituan.com/android_holmes.html
Tallow: Transparent Tor for Windows
https://reqrypt.org/tallow.html
https://reqrypt.org/tallow.html
PaddlePaddle平台对抗样本工具包Advbox
https://mp.weixin.qq.com/s/_r6d2uQ3aHcOZe8uLKAbYg
https://mp.weixin.qq.com/s/_r6d2uQ3aHcOZe8uLKAbYg
A guide to Linux Privilege Escalation
https://payatu.com/guide-linux-privilege-escalation/
https://payatu.com/guide-linux-privilege-escalation/
浅析Gartner评出的十一大信息安全技术
https://www.sec-un.org/%E6%B5%85%E6%9E%90gartner%E8%AF%84%E5%87%BA%E7%9A%84%E5%8D%81%E4%B8%80%E5%A4%A7%E4%BF%A1%E6%81%AF%E5%AE%89%E5%85%A8%E6%8A%80%E6%9C%AF/
https://www.sec-un.org/%E6%B5%85%E6%9E%90gartner%E8%AF%84%E5%87%BA%E7%9A%84%E5%8D%81%E4%B8%80%E5%A4%A7%E4%BF%A1%E6%81%AF%E5%AE%89%E5%85%A8%E6%8A%80%E6%9C%AF/
python沙箱逃逸小结
https://blog.sectown.cn/archives/41/
https://blog.sectown.cn/archives/41/
Altprobe - IDS events collector
https://github.com/olegzhr/altprobe
https://github.com/olegzhr/altprobe
CVE-2018-4087 PoC: Escaping the sandbox by misleading bluetoothd
http://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/
http://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/
SANS:2018年网络威胁情报现状调研报告
http://blog.51cto.com/yepeng/2073791
http://blog.51cto.com/yepeng/2073791
渗透的本质是信息搜集(第一季)
http://blog.csdn.net/micropoor/article/details/79400904
http://blog.csdn.net/micropoor/article/details/79400904
Exploit SSTI in Flask/Jinja2
https://joychou.org/web/exploit-ssti-in-flask-jinja2.html
https://joychou.org/web/exploit-ssti-in-flask-jinja2.html
谷歌上线自带中文的机器学习免费课程
https://mp.weixin.qq.com/s/U2XBScWThbIEB4EdV4q63A
https://mp.weixin.qq.com/s/U2XBScWThbIEB4EdV4q63A
SQL注入ByPass的一些小技巧
https://mp.weixin.qq.com/s/fSBZPkO0-HNYfLgmYWJKCg
https://mp.weixin.qq.com/s/fSBZPkO0-HNYfLgmYWJKCg
2017-2018年中国数据防泄漏(DLP)市场分析
https://www.sec-un.org/2017-2018%e5%b9%b4%e4%b8%ad%e5%9b%bd%e6%95%b0%e6%8d%ae%e9%98%b2%e6%b3%84%e6%bc%8f%ef%bc%88dlp%ef%bc%89%e5%b8%82%e5%9c%ba%e5%88%86%e6%9e%90/
https://www.sec-un.org/2017-2018%e5%b9%b4%e4%b8%ad%e5%9b%bd%e6%95%b0%e6%8d%ae%e9%98%b2%e6%b3%84%e6%bc%8f%ef%bc%88dlp%ef%bc%89%e5%b8%82%e5%9c%ba%e5%88%86%e6%9e%90/
Python大法之从火车余票查询到打造抢Supreme神器
https://bbs.ichunqiu.com/thread-34102-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-34102-1-1.html?from=sec
Docker Swarm容器集群管理工具
https://jiayi.space/post/docker-swarmrong-qi-ji-qun-guan-li-gong-ju
https://jiayi.space/post/docker-swarmrong-qi-ji-qun-guan-li-gong-ju
Memcached之反射拒绝服务攻击技术原理
http://blog.topsec.com.cn/ad_lab/memcached%e4%b9%8b%e5%8f%8d%e5%b0%84%e6%8b%92%e7%bb%9d%e6%9c%8d%e5%8a%a1%e6%94%bb%e5%87%bb%e6%8a%80%e6%9c%af%e5%8e%9f%e7%90%86/?from=timeline
http://blog.topsec.com.cn/ad_lab/memcached%e4%b9%8b%e5%8f%8d%e5%b0%84%e6%8b%92%e7%bb%9d%e6%9c%8d%e5%8a%a1%e6%94%bb%e5%87%bb%e6%8a%80%e6%9c%af%e5%8e%9f%e7%90%86/?from=timeline
Java反序列化漏洞学习实践一:从Serializbale接口开始,先弹个计算器
http://www.polaris-lab.com/index.php/archives/447/
http://www.polaris-lab.com/index.php/archives/447/
韩家炜在数据挖掘上开辟的「小路」是什么
https://mp.weixin.qq.com/s/5UyAoAm0Llfm3YoobKSSCA
https://mp.weixin.qq.com/s/5UyAoAm0Llfm3YoobKSSCA
基于Memcached分布式系统DRDoS拒绝服务攻击技术研究
http://blog.csdn.net/microzone/article/details/79262549
http://blog.csdn.net/microzone/article/details/79262549
WebEye-自动化恶意 HTTP 流量收集
https://arxiv.org/pdf/1802.06012.pdf
https://arxiv.org/pdf/1802.06012.pdf
基于软件无线电对无线领域进行探索
https://unicorn.360.com/blog/2017/12/28/dc010_Exploring_the_Wireless_World_With_SDR/
https://unicorn.360.com/blog/2017/12/28/dc010_Exploring_the_Wireless_World_With_SDR/
漏洞分析与实践之基于SAML实现的单点登录系统
http://avfisher.win/archives/906
http://avfisher.win/archives/906
Memcache UDP反射放大攻击技术分析
http://blog.netlab.360.com/what-we-know-about-memcache-udp-reflection-ddos/
http://blog.netlab.360.com/what-we-know-about-memcache-udp-reflection-ddos/
MADLIRA - 通过机器学习和信息检索检测 Android 恶意软件
https://github.com/dkhuuthe/MADLIRA
https://github.com/dkhuuthe/MADLIRA
VwFirewall: 微盾VirtualWall防火墙整套源代码
https://github.com/dekuan/VwFirewall
https://github.com/dekuan/VwFirewall
解决DEDECMS历史难题--找后台目录
https://xianzhi.aliyun.com/forum/topic/2064
https://xianzhi.aliyun.com/forum/topic/2064
SQL injection: 9 ways to bypass Web Application Firewall
https://www.digitalmunition.me/2018/02/sql-injection-9-ways-bypass-web-application-firewall/
https://www.digitalmunition.me/2018/02/sql-injection-9-ways-bypass-web-application-firewall/
Script to steal passwords from ssh.
https://github.com/mthbernardes/sshLooter
https://github.com/mthbernardes/sshLooter
CredSniper: phishing framework written with the Flask and Jinja2
https://github.com/ustayready/CredSniper
https://github.com/ustayready/CredSniper
Chrome 扩展安全研究: 一个UXSS的挖掘经历
https://www.anquanke.com/post/id/98917
https://www.anquanke.com/post/id/98917
IDAPythonEmbeddedToolkit - 用于自动化分析嵌入式设备固件的 IDAPython 脚本
https://github.com/maddiestone/IDAPythonEmbeddedToolkit
https://github.com/maddiestone/IDAPythonEmbeddedToolkit
OAuth2.0认证缺陷-第三方帐号快捷登录授权劫持漏洞
https://bbs.ichunqiu.com/thread-34168-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-34168-1-1.html?from=sec
旅行青蛙逆向破解的自我实践之旅
https://bbs.ichunqiu.com/thread-34154-1-1.html?from=sec
https://bbs.ichunqiu.com/thread-34154-1-1.html?from=sec
Java反序列化漏洞学习实践二:Java的反射机制(Java Reflection)
http://www.polaris-lab.com/index.php/archives/450/
http://www.polaris-lab.com/index.php/archives/450/
绕过某cms自定义检查函数的SQL注入
https://xianzhi.aliyun.com/forum/topic/2094
https://xianzhi.aliyun.com/forum/topic/2094
2017 中国高级持续性威胁(APT)研究报告
https://mp.weixin.qq.com/s/Qxp9fJKQk-ONl0JdCZM3tg
https://mp.weixin.qq.com/s/Qxp9fJKQk-ONl0JdCZM3tg
Yet another LKM rootkit for Linux. It hooks syscall table.
https://github.com/Eterna1/puszek-rootkit
https://github.com/Eterna1/puszek-rootkit
2017年Android恶意软件专题报告
http://blogs.360.cn/blog/review_android_malware_of_2017-2/
http://blogs.360.cn/blog/review_android_malware_of_2017-2/
学界与工业界的AI研究:有哪些重要不同?
https://mp.weixin.qq.com/s/mWaHqfCQKm1eJrZZIcgibA
https://mp.weixin.qq.com/s/mWaHqfCQKm1eJrZZIcgibA
Harpoon: an OSINT / Threat Intelligence tool
https://www.randhome.io/blog/2018/02/23/harpoon-an-osint-/-threat-intelligence-tool/
https://www.randhome.io/blog/2018/02/23/harpoon-an-osint-/-threat-intelligence-tool/
how-to-clear-rdp-connections-history
http://woshub.com/how-to-clear-rdp-connections-history/
http://woshub.com/how-to-clear-rdp-connections-history/
终端检测与防护产品收集列表更新
http://www.hexacorn.com/blog/2018/02/25/endpoint-detection-and-response-edr-solutions-sheet-update-2/
http://www.hexacorn.com/blog/2018/02/25/endpoint-detection-and-response-edr-solutions-sheet-update-2/
JavaScript的反调试技术(上篇)
http://www.4hou.com/technology/10470.html
http://www.4hou.com/technology/10470.html
Java反序列化漏洞学习实践三:理解Java的动态代理机制
http://www.polaris-lab.com/index.php/archives/453/
http://www.polaris-lab.com/index.php/archives/453/
利用Raspberry PI 3打造AWS VPN用户网关
http://www.4hou.com/tools/10488.html
http://www.4hou.com/tools/10488.html
使用Windows命令来实现端口转发
https://xianzhi.aliyun.com/forum/topic/2068
https://xianzhi.aliyun.com/forum/topic/2068
evading-autoruns
https://github.com/huntresslabs/evading-autoruns
https://github.com/huntresslabs/evading-autoruns
利用符号执行的方法动态发现驱动的 IOCTL Codes
https://gist.github.com/jthuraisamy/06a28d7ebb60dd47386477af68d8cbcf
https://gist.github.com/jthuraisamy/06a28d7ebb60dd47386477af68d8cbcf
antivirus_-understanding-evading
https://diablohorn.files.wordpress.com/2018/02/antivirus_-understanding-evading.pdf
https://diablohorn.files.wordpress.com/2018/02/antivirus_-understanding-evading.pdf
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第209期)
