SecWiki周刊(第293期)
2019/10/07-2019/10/13
安全资讯
有黑客正拍卖一个包含9200万巴西公民详细信息的数据库
https://nosec.org/home/detail/3018.html
https://nosec.org/home/detail/3018.html
Facebook、Twitter涉嫌违反欧盟GDPR 或面临数十亿美元罚款
https://nosec.org/home/detail/3021.html
https://nosec.org/home/detail/3021.html
安全技术
Cobalt Strike - 使用其他方式抓取密码/dump hash
https://github.com/Ch1ngg/AggressorScript-RunDumpHash
https://github.com/Ch1ngg/AggressorScript-RunDumpHash
ISCX-IDS-2012 intrusion detection evaluation dataset
https://www.unb.ca/cic/datasets/ids.html
https://www.unb.ca/cic/datasets/ids.html
红蓝对抗——加密Webshell“冰蝎”攻防
https://mp.weixin.qq.com/s/o6aUI-sk0A7fSDMTinoMNg
https://mp.weixin.qq.com/s/o6aUI-sk0A7fSDMTinoMNg
TeamViewer疑似被入侵事件分析
https://nosec.org/home/detail/3038.html
https://nosec.org/home/detail/3038.html
CVE-2019-17059:Cyberoam SSL VPN的RCE漏洞
https://nosec.org/home/detail/3034.html
https://nosec.org/home/detail/3034.html
PENTESTING-BIBLE
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
泛微E-cology OA系统SQL注入漏洞
https://nosec.org/home/detail/3030.html
https://nosec.org/home/detail/3030.html
侧信道攻击,从喊666到入门之—错误注入攻击白盒
https://www.anquanke.com/post/id/188340
https://www.anquanke.com/post/id/188340
“北极星杯”AWD线上赛复盘
https://xz.aliyun.com/t/6477
https://xz.aliyun.com/t/6477
Revoke-Obfuscation: PowerShell Obfuscation Detection Framework
https://github.com/danielbohannon/Revoke-Obfuscation
https://github.com/danielbohannon/Revoke-Obfuscation
工控安全入门(五)—— plc逆向初探
https://www.anquanke.com/post/id/187792
https://www.anquanke.com/post/id/187792
一小时完成上位机SCADA
http://jzgkchina.com/node/1273
http://jzgkchina.com/node/1273
CVE-2019-1315:基于错误报告机制的Windows提权漏洞
https://nosec.org/home/detail/3027.html
https://nosec.org/home/detail/3027.html
一文看懂ATT&CK框架以及使用场景实例
https://www.anquanke.com/post/id/187998
https://www.anquanke.com/post/id/187998
美国政府持续深入开展爱因斯坦项目以提升网络威胁感知能力(2019)
https://www.sec-un.org/%e7%be%8e%e5%9b%bd%e6%94%bf%e5%ba%9c%e6%8c%81%e7%bb%ad%e6%b7%b1%e5%85%a5%e5%bc%80%e5%b1%95%e7%88%b1%e5%9b%a0%e6%96%af%e5%9d%a6%e9%a1%b9%e7%9b%ae%e4%bb%a5%e6%8f%90%e5%8d%87%e7%bd%91%e7%bb%9c%e5%a8%81/
https://www.sec-un.org/%e7%be%8e%e5%9b%bd%e6%94%bf%e5%ba%9c%e6%8c%81%e7%bb%ad%e6%b7%b1%e5%85%a5%e5%bc%80%e5%b1%95%e7%88%b1%e5%9b%a0%e6%96%af%e5%9d%a6%e9%a1%b9%e7%9b%ae%e4%bb%a5%e6%8f%90%e5%8d%87%e7%bd%91%e7%bb%9c%e5%a8%81/
协议层的攻击—HTTP请求走私
https://paper.seebug.org/1048/
https://paper.seebug.org/1048/
Repository of YARA rules made by McAfee ATR Team
https://github.com/advanced-threat-research/Yara-Rules
https://github.com/advanced-threat-research/Yara-Rules
ThinkPHP5.1.X反序列化利用链
https://xz.aliyun.com/t/6467
https://xz.aliyun.com/t/6467
SecWiki周刊(第292期)
https://www.sec-wiki.com/weekly/292
https://www.sec-wiki.com/weekly/292
HackMD Stored XSS and HackMD Desktop RCE
https://5alt.me/2019/10/HackMD%20Stored%20XSS%20and%20HackMD%20Desktop%20RCE/
https://5alt.me/2019/10/HackMD%20Stored%20XSS%20and%20HackMD%20Desktop%20RCE/
Venom - A Multi-hop Proxy for Penetration Testers
https://github.com/Dliv3/Venom
https://github.com/Dliv3/Venom
Web安全Day8 - XXE实战攻防
https://xz.aliyun.com/t/6502
https://xz.aliyun.com/t/6502
ATT&CK一般性学习笔记
https://mp.weixin.qq.com/s/qfthyNQ3E_TruEbREcIJzg
https://mp.weixin.qq.com/s/qfthyNQ3E_TruEbREcIJzg
[CVE-2019-9535] Iterm2命令执行的不完整复现
https://mp.weixin.qq.com/s/4KcpS4eNGQ8bL6DTM4K0aQ
https://mp.weixin.qq.com/s/4KcpS4eNGQ8bL6DTM4K0aQ
Hacking Windows 备忘录
https://xz.aliyun.com/t/6498
https://xz.aliyun.com/t/6498
D-Link路由器曝出RCE漏洞,牵涉多个型号
https://nosec.org/home/detail/3020.html
https://nosec.org/home/detail/3020.html
CatchMail: 收集邮箱的工具
https://github.com/0Kee-Team/CatchMail
https://github.com/0Kee-Team/CatchMail
The Art of WebKit Exploitation
http://blog.umangis.me/the-art-of-webkit-exploitation/
http://blog.umangis.me/the-art-of-webkit-exploitation/
以攻擊者的角度制定防禦策略
https://devco.re/blog/2019/10/09/def-strategy/
https://devco.re/blog/2019/10/09/def-strategy/
基于mitmproxy的被动扫描代理
https://www.freebuf.com/articles/web/216301.html
https://www.freebuf.com/articles/web/216301.html
SharpSniper利用分析
https://3gstudent.github.io/3gstudent.github.io/SharpSniper%E5%88%A9%E7%94%A8%E5%88%86%E6%9E%90/
https://3gstudent.github.io/3gstudent.github.io/SharpSniper%E5%88%A9%E7%94%A8%E5%88%86%E6%9E%90/
How a double-free bug in WhatsApp turns to RCE
https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/
https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/
从Exchange服务器上搜索和导出邮件
https://www.4hou.com/technology/20718.html
https://www.4hou.com/technology/20718.html
在PWN题中绕过lea esp以及关于Ret2dl的一些补充
https://www.anquanke.com/post/id/187875
https://www.anquanke.com/post/id/187875
vBulletin再修复高危RCE和SQL注入漏洞
https://nosec.org/home/detail/3022.html
https://nosec.org/home/detail/3022.html
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第293期)
