SecWiki周刊(第285期)
2019/08/12-2019/08/18
安全资讯
网络安全“圣地”之行
安全技术
网络与信息安全领域专赛-WriteUp 网络与信息安全领域专项赛WP IoT固件逆向入门 GetWindowsKernelExploitsKB(获取系统KB补丁对于的MS号) AggressorScript-UploadAndRunFrp Dr.Semu - Malware Detection and Classification Tool Based on Dynamic Behavior JNDI远程代码执行漏洞详解 Fortigate SSL VPN任意文件读取(可直接登录VPN) Subdomain takeover - Chapter two: Azure Services Exchange渗透测试总结 Mautic Remote Code Execution Debugging Cordova Applications Microsoft Vulnerability Severity Classification for Windows solr-injection: Apache Solr Injection Research fuzzowski: the Network Protocol Fuzzer that we will want to use. CTF工业信息安全大赛实践与分析 SysmonHunter:一个简单的基于ATT&CK的Sysmon日志狩猎工具 Intercepting traffic from Android Flutter applications SELECT code_execution FROM * USING SQLite; Building a custom malware sandbox with PANDA IOC Explorer:自动化关联失陷指标的工具 Reversing an Oppo ozip encryption key from encrypted firmware butthax: lovense hush buttplug exploit chain Defcon 27游记 DNS攻防皮毛(一) 基于机器学习的jsp/jspx webshell检测 Comodo Antivirus - Sandbox Race Condition Use-After-Free (CVE-2019-14694) KNOB Attack Static Analysis at Scale: An Instagram Story Simple Anti-RE Trick The state of advanced code injections Monitoring the State of Internet Routing Security DEF CON CTF 27 Final 游记 WebLogic安全研究报告 goop: Google Search Scraper Code Execution via Fiber Local Storage 拟态防御系列问题分析 Three (And A Half) Vulns For The Price of One! 教会微信:突破文件发送100M限制 Threat hunting using DNS firewalls and data enrichment CVE-2019-0193:Apache Solr远程执行代码漏洞预警 Responding to Firefox 0-days in the wild 如何攻击Fortigate SSL VPN Several DoS conditions in certain HTTP/2 implementations Generating Personalized Wordlists with NLP For Password Guessing Attacks RouterOS Post Exploitation Simple & Interactive SSRF tutorial CVE-2018-4259: MacOS NFS vulnerabilties lead to kernel RCE Clickjacking DOM XSS on Google.org Privilege Escalation in Cloud Foundry UAA How To Attack Kerberos 101 Offensive Lateral Movement Exploiting Out Of Band XXE using internal network and php wrappers HTML注入:利用HTML标签绕过CSP 从SOAR中求解应用安全建设强运营突围之法 JNDI Injection using Getter Based Deserialization Gadgets How to Build Your Own Penetration Testing Dropbox Using a Raspberry Pi 4 Meteor Blind NoSQL Injection-----微信ID:SecWiki-----
SecWiki,12年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第285期)