SecWiki周刊(第256期)
2019/01/21-2019/01/27
安全资讯
[观点]  Presentation Skill: 从学术到商业
https://mp.weixin.qq.com/s/Frge3EX8sEdOEuygHEJNkg
[法规]  美国发布《2019国家情报战略》
https://mp.weixin.qq.com/s/44RDuUmw00Rz_LQeU4QJOQ
[新闻]  2018年国际网络安全形势回顾
https://mp.weixin.qq.com/s/B9ZKTBS8VsvAkUUKI7hrUQ
[新闻]  2018 年度国内外网络空间安全形势回顾
https://mp.weixin.qq.com/s/tQmQljt0pWxWfTtd7_1bIw
安全技术
[运维安全]  OpenDnsdb: 去哪儿网OPS团队开源的DNS管理系统
https://github.com/qunarcorp/open_dnsdb
[Web安全]  iOS渗透测试工具,第3篇:Frida与Objection
https://nosec.org/home/detail/2192.html
[漏洞分析]  公链安全之以太坊君士坦丁堡重入漏洞分析
https://bcsec.org/index/detail/tag/2/id/465
[数据挖掘]  基于网络特征学习的个性化推荐系统 01
https://mp.weixin.qq.com/s/9hHDIrm32iPrX7xEHP_AKg
[设备安全]  工业控制系统网络杀伤链(The ICS Cyber Kill Chain)
https://zhuanlan.zhihu.com/p/55119502
[漏洞分析]  PhpSpreadsheet 1.5.0 XXE漏洞复现及分析
https://www.anquanke.com/post/id/170068
[Web安全]  企业级自动化代码安全扫描实战
https://mp.weixin.qq.com/s/T6EYwGpEQr64OGXGj2R5eA
[漏洞分析]  Abusing Exchange: One API call away from Domain Admin
https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/
[数据挖掘]  大规模多租户数据平台安全思考(二)
https://www.anquanke.com/post/id/169959
[漏洞分析]  2018年Windows漏洞年度盘点
https://mp.weixin.qq.com/s/CtjPAuCJ1znw6pGHlpaR1w
[漏洞分析]  对某HWP漏洞样本的shellcode分析
https://www.anquanke.com/post/id/169872
[取证分析]  2018DDoS攻击-IP团伙行为分析报告
http://blog.nsfocus.net/behavior_analysis_of_ip_chain_gangs/
[Web安全]  XXE萌新进阶全攻略
https://www.freebuf.com/vuls/194112.html
[漏洞分析]  TripleDoggy: 基于clang static analyzer的源码漏洞检测插件
https://github.com/GoSSIP-SJTU/TripleDoggy
[漏洞分析]  多种设备基于 SNMP 协议的敏感信息泄露漏洞数据分析报告
https://paper.seebug.org/795/
[文档]  2019年哈尔滨ASC安全峰会的会议PPT
https://github.com/ansionasc/ASC/tree/master/2019
[杂志]  SecWiki周刊(第255期)
https://www.sec-wiki.com/weekly/255
[设备安全]   固件的逆向解包及破解方法
http://www.bincker.net/?p=835
[数据挖掘]  基于网络特征学习的个性化推荐系统 03#
https://mp.weixin.qq.com/s/O7f9p5kGIiH0M7kMcRMD7w
[数据挖掘]  大规模多租户数据平台安全思考(一)
https://www.anquanke.com/post/id/169958
[漏洞分析]  vmware-exploitation: A bunch of links related to VMware escape exploits
https://github.com/xairy/vmware-exploitation
[取证分析]  IPOsint: Discovery IP Address of the target
https://github.com/j3ssie/IPOsint
[移动安全]  深度长文:细说iOS代码签名
http://xelz.info/blog/2019/01/11/ios-code-signature/
[数据挖掘]  基于网络特征学习的个性化推荐系统 02#
https://mp.weixin.qq.com/s/ZLFnltcraIBuYOSjyhSCmQ
[恶意分析]  Check Point Forensic Files: GandCrab Returns with Friends (Trojans)
https://blog.checkpoint.com/2019/01/18/check-point-forensic-files-gandcrab-returns-with-friends-trojans/
[恶意分析]  FANCI: 基于特征的自动NXDomain分类和情报
http://www.arkteam.net/?p=4210
[恶意分析]  Scrutiny on the bug bounty
https://xz.aliyun.com/t/3935
[论文]  The wolf of name street hijackingdomains through their nameservers
https://mp.weixin.qq.com/s/Hwngr-y3KcK5WnR0AIZ0Kg
[恶意分析]  BinCAT, our static binary code analyzer for reversers
https://github.com/airbus-seclab/bincat/releases/tag/v1.1
[取证分析]  关于风控预警体系的搭建方案
https://mp.weixin.qq.com/s/2r61XB_Po4s3ihkLy46xbA
[其它]  利用msbuild.exe绕过应用程序白名单安全机制的多种姿势
https://nosec.org/home/detail/2193.html
[数据挖掘]  html-similarity: Compare html similarity using structural and style metrics
https://github.com/matiskay/html-similarity
[取证分析]  Digital Forensics – PlugX and Artifacts left behind | Count Upon Security
https://countuponsecurity.com/2018/06/20/digital-forensics-plugx-and-artifacts-left-behind/
[恶意分析]  Vidar窃密木马分析(下)
https://www.anquanke.com/post/id/170193
[Web安全]  We're under attack! 23 Node.js security best practices
https://medium.com/@nodepractices/were-under-attack-23-node-js-security-best-practices-e33c146cb87d
[设备安全]  analysis-exposure-change-assets-iot-2018
http://blog.nsfocus.net/analysis-exposure-change-assets-iot-2018/
[恶意分析]  Automatic string formatting deobfuscation
https://xz.aliyun.com/t/3906
[恶意分析]  Vidar窃密木马分析(上)
https://www.anquanke.com/post/id/170191
-----微信ID:SecWiki-----
SecWiki,12年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com

本期原文地址: SecWiki周刊(第256期)