SecWiki周刊(第22期)
2014/07/28-2014/08/03
安全资讯
Amazon云已经在不知不觉间成为“犯罪即服务”
http://security.zdnet.com.cn/security_zone/2014/0721/3027820.shtml
http://security.zdnet.com.cn/security_zone/2014/0721/3027820.shtml
安全技术
Bypass iOS Version Check and Certification validation
https://www.netspi.com/blog/entryid/236/bypass-ios-version-check-and-certification-validation
https://www.netspi.com/blog/entryid/236/bypass-ios-version-check-and-certification-validation
JAVA逆向&反混淆-追查Burpsuite的破解原理
http://drops.wooyun.org/tips/2689
http://drops.wooyun.org/tips/2689
Xplico:network forensics tool
http://resources.infosecinstitute.com/xplico/
http://resources.infosecinstitute.com/xplico/
cookie-injecting-tools
https://github.com/lfzark/cookie-injecting-tools/
https://github.com/lfzark/cookie-injecting-tools/
Android短信蠕虫XXshenqi分析
http://www.91ri.org/10305.html
http://www.91ri.org/10305.html
PcShare源代码编译过程
http://debugwar.com/archives/325/pcshare_source_compile
http://debugwar.com/archives/325/pcshare_source_compile
webgame中常见安全问题、防御方式与挽救措施
http://drops.wooyun.org/papers/2677
http://drops.wooyun.org/papers/2677
漏洞科普:对于XSS和CSRF你究竟了解多少
http://www.freebuf.com/articles/web/39234.html
http://www.freebuf.com/articles/web/39234.html
Phishing:public access query for phishing URL
http://support.clean-mx.com/clean-mx/phishing.php
http://support.clean-mx.com/clean-mx/phishing.php
取代cookie的网站追踪技术:”帆布指纹识别”初探
http://security.tencent.com/index.php/blog/msg/59
http://security.tencent.com/index.php/blog/msg/59
Suricata's file extraction on Debian GNU/Linux
http://citypw.blogspot.hk/2014/03/suricatas-file-extraction-on-debian.html
http://citypw.blogspot.hk/2014/03/suricatas-file-extraction-on-debian.html
Shifu:机器学习框架
http://shifu.ml/
http://shifu.ml/
2012年龙星计划机器学习课程
http://pan.baidu.com/share/link?shareid=27613&uk=1513052211
http://pan.baidu.com/share/link?shareid=27613&uk=1513052211
小米安全基础设施建设
http://noops.me/?p=1541
http://noops.me/?p=1541
Shellcode Detection and Emulation with Libemu
http://resources.infosecinstitute.com/shellcode-detection-emulation-libemu/
http://resources.infosecinstitute.com/shellcode-detection-emulation-libemu/
Hypnus 2.0:远程控制系统
http://bbs.hypnusoft.com/thread-248-1-1.html
http://bbs.hypnusoft.com/thread-248-1-1.html
对 *nix WEB服务器的一个隐藏威胁
http://drops.wooyun.org/tips/2646
http://drops.wooyun.org/tips/2646
Matter of Combination - Stego75 - (Pwnium CTF)
http://0xawes0.me/writeups/2014/07/26/stego75-pwnium/
http://0xawes0.me/writeups/2014/07/26/stego75-pwnium/
小米运维自动化从无到有 WOT 2014
http://noops.me/?p=1536
http://noops.me/?p=1536
CVE-2014-3153 aka towelroot
https://github.com/timwr/CVE-2014-3153
https://github.com/timwr/CVE-2014-3153
The NSA's Patents, in One Searchable Database
http://complex.foreignpolicy.com/posts/2014/07/30/the_nsas_patents_in_one_searchable_database_0
http://complex.foreignpolicy.com/posts/2014/07/30/the_nsas_patents_in_one_searchable_database_0
How to Hunt Down Phishing Kits
http://jordan-wright.github.io/blog/2014/07/30/how-to-hunt-down-phishing-kits/
http://jordan-wright.github.io/blog/2014/07/30/how-to-hunt-down-phishing-kits/
Upload a web.config File for Fun & Profit
https://soroush.secproject.com/blog/2014/07/upload-a-web-config-file-for-fun-profit/
https://soroush.secproject.com/blog/2014/07/upload-a-web-config-file-for-fun-profit/
Flashbang:open-source Flash-security helper
https://github.com/cure53/Flashbang
https://github.com/cure53/Flashbang
How did I bypass everything in modsecurity evasion challenge
https://soroush.secproject.com/blog/2014/04/how-did-i-bypass-everything-in-modsecurity-evasion-challenge/
https://soroush.secproject.com/blog/2014/04/how-did-i-bypass-everything-in-modsecurity-evasion-challenge/
存储前沿趋势开讲啦第一季:为大数据再造存储
http://v.qq.com/page/t/i/y/t0132dxykiy.html?__t=1&ptag=1.sina&_out=1
http://v.qq.com/page/t/i/y/t0132dxykiy.html?__t=1&ptag=1.sina&_out=1
How to got root access on FireEye OS
http://blog.silentsignal.eu/2014/07/28/how-to-got-root-access-on-fireeye-os/
http://blog.silentsignal.eu/2014/07/28/how-to-got-root-access-on-fireeye-os/
检测php网站是否已经被攻破的方法
http://drops.wooyun.org/web/2718
http://drops.wooyun.org/web/2718
Cynthia:问题,缺陷,任务管理系统
http://www.oschina.net/p/cynthia
http://www.oschina.net/p/cynthia
Antox:Android client for Project Tox
https://github.com/Astonex/Antox
https://github.com/Astonex/Antox
Cyber Intelligence abusing Internet Explorer to perform Targeted Attacks
http://marcoramilli.blogspot.hk/2014/07/cyber-intelligence-abusing-internet.html
http://marcoramilli.blogspot.hk/2014/07/cyber-intelligence-abusing-internet.html
PhishTank:Join the fight against phishing
http://www.phishtank.com/
http://www.phishtank.com/
Intelligent Exploit Aggregation Network
http://www.intelligentexploit.com/browse-exploit.html
http://www.intelligentexploit.com/browse-exploit.html
Remote code execution on Android devices
http://labs.bromium.com/2014/07/31/remote-code-execution-on-android-devices/
http://labs.bromium.com/2014/07/31/remote-code-execution-on-android-devices/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第22期)
