SecWiki周刊(第215期)
2018/04/09-2018/04/15
安全资讯
[恶意分析]  Mirai-like Scanning Activity Detected From China, With Targets in Brazil
https://blog.trendmicro.com/trendlabs-security-intelligence/mirai-like-scanning-activity-detected-from-china-targets-in-brazil/
[新闻]  美国国家网络空间靶场(NCR)建设概况
https://mp.weixin.qq.com/s/GhuEu5-vQfKs25JFi2kDjw
[新闻]  重大体育赛事网络安全威胁评估
https://mp.weixin.qq.com/s/AfYOmFw9IXrunTcDtn4Avg
[新闻]  Google 布局的三家安全情报公司近况汇总
https://mp.weixin.qq.com/s/oRpI7DwWZLfUprxwS0nOew
[新闻]  一文读懂各种拟态防御网络设备
https://mp.weixin.qq.com/s/FHyE0fbEzEEIQoxbX1vSVA
[新闻]  教育部关于加强大中小学国家安全教育的实施意见
http://www.moe.edu.cn/srcsite/A12/s7060/201804/t20180412_332965.html
安全技术
[Web安全]  spring-messaging Remote Code Execution 分析-CVE-2018-1270
https://xz.aliyun.com/t/2252
[Web安全]  内网剑客三结义
http://www.5ecurity.cn/index.php/archives/227/
[运维安全]  JXWAF(锦衣盾):基于openresty(nginx+lua)开发的下一代web应用防火墙
https://github.com/jx-sec/jxwaf
[Web安全]  Spring Data Commons Remote Code Execution 分析-CVE-2018-1273
https://xz.aliyun.com/t/2269
[会议]  RSA 2018 PPT
https://share.weiyun.com/5gvNsTU
[恶意分析]  Gh0st/大灰狼RAT家族通讯协议分析
https://www.anquanke.com/post/id/103831
[漏洞分析]  Exim Off-by-One RCE漏洞(CVE-2018-6789)利用分析(附EXP)
http://www.freebuf.com/vuls/166519.html
[Web安全]  模拟企业流量入侵溯源分析
https://zhuanlan.zhihu.com/p/35623547
[比赛]  如何在CTF中少走弯路(基础篇)
http://www.freebuf.com/articles/rookie/166925.html
[会议]  创新沙盒初探 (1) - RSAC2018之一
https://mp.weixin.qq.com/s/aiVCRboVeWXwope4zcho5A
[Web安全]  树莓派的安全开发之旅(一)
http://mp.weixin.qq.com/s/xEdI49opyD86Ywkbu2QNsA
[比赛]  TCTF/0CTF2018 h4xors.club2 Writeup
https://lorexxar.cn/2018/04/10/0ctf2018-club2/
[Web安全]  Catfish(鲶鱼) CMS V 4.7.21 存储型XSS漏洞
https://xz.aliyun.com/t/2253
[设备安全]  物联网安全成熟度模型:描述和预期用途
http://www.iiconsortium.org/pdf/SMM_Description_and_Intended_Use_2018-04-09.pdf
[Web安全]  CVE-2018-1273: RCE with Spring Data Commons 分析和利用
https://mp.weixin.qq.com/s/bIY0PHvQEbNT2inhS5dZwg
[漏洞分析]  某php框架 5.0.x sql注入漏洞分析
https://xz.aliyun.com/t/2257
[Web安全]  代码审计之CSRF漏洞实例
https://mp.weixin.qq.com/s/PkqHYj_wPMMRwSq82QqL7A
[Web安全]  CVE-2018-7600 Drupal core Remote Code Execution分析
https://research.checkpoint.com/uncovering-drupalgeddon-2/
[漏洞分析]  反虚拟机技术总结
https://mp.weixin.qq.com/s/UNys91yEBtC3QFCKy9bhWg
[数据挖掘]  Rapid7 Labs Open Data
https://opendata.rapid7.com/
[Web安全]  科威盒子导航系统代码审计过程总结
https://blog.csdn.net/vspiders/article/details/79947816
[Web安全]  一名代码审计新手的实战经历与感悟
http://www.freebuf.com/articles/web/166602.html
[Web安全]  Drupal CVE-2018-7600 分析及 PoC 构造
https://paper.seebug.org/567/
[文档]  undersanding-and-evading-get-injectedthread
https://blog.xpnsec.com/undersanding-and-evading-get-injectedthread/
[恶意分析]  云态势感知产品-沙箱高级威胁检测
http://www.4hou.com/technology/11010.html
[观点]  情报 3.0 时代情报的特征、任务与工具
https://mp.weixin.qq.com/s/_9VgIcg_m_reYJH-wRjOMA
[杂志]  SecWiki周刊(第214期)
https://www.sec-wiki.com/weekly/214
[恶意分析]  蜜罐捕捉恶意软件样本溯源分析
http://www.4hou.com/technology/11012.html
[编程技术]  基于余弦相似性的404页面识别
https://thief.one/2018/04/12/1/
[恶意分析]  近年来APT组织使用的10大(类)安全漏洞
https://mp.weixin.qq.com/s/9vmyFql871eJlYzezZjEsg
[工具]  RFD Checker - security CLI tool to test Reflected File Download issues
https://github.com/dsopas/rfd-checker
[观点]  2017金融科技安全分析报告
https://mp.weixin.qq.com/s/RpYilQpXXuJXEfMhlSJ3lA
[运维安全]  攻击基础设施记录Part 1:服务器设置
https://www.anquanke.com/post/id/103345
[工具]  Hunting Newly Registered Domains
https://github.com/gfek/Hunting-New-Registered-Domains
[漏洞分析]  Automatically Stealing Password Hashes with Microsoft Outlook and OLE
https://insights.sei.cmu.edu/cert/2018/04/automatically-stealing-password-hashes-with-microsoft-outlook-and-ole.html
[恶意分析]  Cobalt Strike上手学习
http://rcoil.me/2018/04/Cobalt%20Strike%E5%AD%A6%E4%B9%A0/
[Web安全]  ESI(Edge Side Include )注入技术
https://www.anquanke.com/post/id/103641
[取证分析]  Threat Hunting & Adversary Emulation: The HELK vs APTSimulator - Part 1
https://isc.sans.edu/forums/diary/Threat+Hunting+Adversary+Emulation+The+HELK+vs+APTSimulator+Part+1/23525/
[运维安全]  日志源有效性监控UseCase-ArcSight实战系列之五
https://mp.weixin.qq.com/s/a1JSiPRkuHvSxxzmvQh_HA
[取证分析]  Threat Hunting & Adversary Emulation: The HELK vs APTSimulator - Part 2
https://isc.sans.edu/forums/diary/Threat+Hunting+Adversary+Emulation+The+HELK+vs+APTSimulator+Part+2/23529/
[工具]  A python script that finds endpoints in JavaScript files
https://github.com/GerbenJavado/LinkFinder
[工具]   A tool for identifying misconfigured CloudFront domains
https://github.com/MindPointGroup/cloudfrunt
[漏洞分析]  四两拨千斤 —Ubuntu kernel eBPF 0day分析
https://security.tencent.com/index.php/blog/msg/124
[Web安全]  代码审计之后台Getshell的两种常规姿势
https://mp.weixin.qq.com/s/jc1mYH8o2YyteY8hEyTbnw
[Web安全]  Stealing HttpOnly Cookie via XSS
https://xz.aliyun.com/t/2266
[恶意分析]  利用Angr分析恶意软件的通信协议
https://xz.aliyun.com/t/2262
[Web安全]  由Three Hit聊聊二次注入
http://www.freebuf.com/articles/web/167089.html
[恶意分析]  Malware monitor - leveraging PyREBox for malware analysis
https://blog.talosintelligence.com/2018/04/malware-monitor-pyrebox-for-analysis.html#more%22
-----微信ID:SecWiki-----
SecWiki,12年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com

本期原文地址: SecWiki周刊(第215期)