SecWiki周刊(第311期)
2020/02/10-2020/02/16
安全资讯
2020中国网络安全产品部署评价一览图
https://www.z4a.net/images/2020/01/19/2020.jpg
https://www.z4a.net/images/2020/01/19/2020.jpg
从美国防部“2021财年预算提案” 看美军网络空间建设趋势特点
https://mp.weixin.qq.com/s/ysG4z8UrfEZTlBovGTWcZw
https://mp.weixin.qq.com/s/ysG4z8UrfEZTlBovGTWcZw
RSAC 2020创新沙盒十强分析
https://mp.weixin.qq.com/s/UFlsR8NBFYpHUUWuJG-nPQ
https://mp.weixin.qq.com/s/UFlsR8NBFYpHUUWuJG-nPQ
安全技术
一次对学校AVCON系统的渗透
https://mp.weixin.qq.com/s/_v4ym4C-eI9A_If92Grs7Q
https://mp.weixin.qq.com/s/_v4ym4C-eI9A_If92Grs7Q
利用 GOST 搭建加密中转隧道
https://www.40huo.cn/blog/gost-tls-tunnel.html
https://www.40huo.cn/blog/gost-tls-tunnel.html
CVE-2019-8449 Jira 枚举用户漏洞的利用
https://www.bacde.me/post/cve-2019-8449-jira-enum-usernames/
https://www.bacde.me/post/cve-2019-8449-jira-enum-usernames/
基于内存 Webshell 的无文件攻击技术研究
https://www.anquanke.com/post/id/198813
https://www.anquanke.com/post/id/198813
军工领域建设网络安全攻防靶场平台的思路
https://mp.weixin.qq.com/s/UmW3WCtDIOWw1bXfJnLnhg
https://mp.weixin.qq.com/s/UmW3WCtDIOWw1bXfJnLnhg
Vulhub系列:EVM 1
https://mp.weixin.qq.com/s/hbTDgONOdTQGbftffEwrEQ
https://mp.weixin.qq.com/s/hbTDgONOdTQGbftffEwrEQ
从APTX系列报告解读看攻防能力建设路径
https://mp.weixin.qq.com/s/EtgeZJj6EHid_qb2QMSHSw
https://mp.weixin.qq.com/s/EtgeZJj6EHid_qb2QMSHSw
2020年CCF安全会议近期可投稿列表
https://mp.weixin.qq.com/s/Gok2bTlzalM4qVw2DglLrA
https://mp.weixin.qq.com/s/Gok2bTlzalM4qVw2DglLrA
美国(军)态势感知体系能力分析
https://mp.weixin.qq.com/s/SGi2BRpR7DVEJvekd7d2Jw
https://mp.weixin.qq.com/s/SGi2BRpR7DVEJvekd7d2Jw
shadowsocks redirect attack exploit
https://github.com/LeadroyaL/ss-redirect-vuln-exp
https://github.com/LeadroyaL/ss-redirect-vuln-exp
XSS 扫描器成长记
https://paper.seebug.org/1119/
https://paper.seebug.org/1119/
ARM固件基址定位工具开发
https://www.anquanke.com/post/id/198276
https://www.anquanke.com/post/id/198276
Modbus协议与S7Comm协议浅析
https://mp.weixin.qq.com/s/dDyKmFIz0DrBWQY23pUttw
https://mp.weixin.qq.com/s/dDyKmFIz0DrBWQY23pUttw
SecWiki周刊(第310期)
https://www.sec-wiki.com/weekly/310
https://www.sec-wiki.com/weekly/310
基于 angr 的漏洞利用自动生成之缓冲区溢出案例分析
https://xz.aliyun.com/t/7199
https://xz.aliyun.com/t/7199
Rex: 自动化利用引擎分析
https://xz.aliyun.com/t/7179
https://xz.aliyun.com/t/7179
GitHub敏感数据泄露报告
https://mp.weixin.qq.com/s/6RELktZJF2pn4rL-0-Y7Jw
https://mp.weixin.qq.com/s/6RELktZJF2pn4rL-0-Y7Jw
Shodan Pentesting Guide
https://community.turgensec.com/shodan-pentesting-guide/
https://community.turgensec.com/shodan-pentesting-guide/
2019年网络安全应急响应分析报告
https://shs3.b.qianxin.com/qax/9486d13e7726e705e67450c607bcc563.pdf
https://shs3.b.qianxin.com/qax/9486d13e7726e705e67450c607bcc563.pdf
CVE-2019-1388: Windows UAC 提权
https://mp.weixin.qq.com/s/q4UICIVwC4HX-ytvWo8Dvw
https://mp.weixin.qq.com/s/q4UICIVwC4HX-ytvWo8Dvw
hackazon: A modern vulnerable web app
https://github.com/rapid7/hackazon
https://github.com/rapid7/hackazon
DOM Clobbering Attack学习记录
https://wonderkun.cc/2020/02/15/DOM%20Clobbering%20Attack%E5%AD%A6%E4%B9%A0%E8%AE%B0%E5%BD%95/
https://wonderkun.cc/2020/02/15/DOM%20Clobbering%20Attack%E5%AD%A6%E4%B9%A0%E8%AE%B0%E5%BD%95/
浅析javascript原型链污染攻击
https://xz.aliyun.com/t/7182
https://xz.aliyun.com/t/7182
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第311期)
