SecWiki周刊(第337期)
2020/08/10-2020/08/16
安全资讯
美军DISA(国防信息系统局)解析
https://mp.weixin.qq.com/s/ZT54zA39bqZauqvE_JVIQw
https://mp.weixin.qq.com/s/ZT54zA39bqZauqvE_JVIQw
2020年微信办公违规被处理案例
https://mp.weixin.qq.com/s/QOUFyVa4c4xGO1v4FroLXw
https://mp.weixin.qq.com/s/QOUFyVa4c4xGO1v4FroLXw
BCS 2020 安全创客汇总决赛十强盘点
https://www.4hou.com/posts/wZlM
https://www.4hou.com/posts/wZlM
网络赌博的管辖权、代理、赌资、四方的法律规定
https://mp.weixin.qq.com/s/XAp40kxf-I0nmOjDBAD7Dg
https://mp.weixin.qq.com/s/XAp40kxf-I0nmOjDBAD7Dg
安全技术
BloodHound 使用指南
https://mp.weixin.qq.com/s/dBWq1rCZYVS9oDgIGwcCdA
https://mp.weixin.qq.com/s/dBWq1rCZYVS9oDgIGwcCdA
某恒信息pdf后门事件分析
https://mp.weixin.qq.com/s/yNNqLAodTJGP9zO8zvjmGQ
https://mp.weixin.qq.com/s/yNNqLAodTJGP9zO8zvjmGQ
靶场竞品分析-CybExer网络靶场
https://mp.weixin.qq.com/s/8-d0eB2VV0qvG3VNCaJ_zA
https://mp.weixin.qq.com/s/8-d0eB2VV0qvG3VNCaJ_zA
针对绿斑组织近期APT攻击活动的分析报告
https://new.qq.com/omn/20200811/20200811A0V72K00.html
https://new.qq.com/omn/20200811/20200811A0V72K00.html
APT-SpyMax间谍软件家族追踪
https://www.anquanke.com/post/id/213528
https://www.anquanke.com/post/id/213528
2019年中国互联网网络安全报告
https://mp.weixin.qq.com/s/0GU_cC9PGwWPKA1ZdxCF4g##
https://mp.weixin.qq.com/s/0GU_cC9PGwWPKA1ZdxCF4g##
获取每日最新的CVE和CNVD漏洞
https://github.com/ttonys/Scrapy-CVE-CNVD
https://github.com/ttonys/Scrapy-CVE-CNVD
2019年度数字资产反洗钱(AML)研究报告
https://coinholmes.com/static/pdf/2.pdf
https://coinholmes.com/static/pdf/2.pdf
Windows通用应用平台UWP持久化
https://mp.weixin.qq.com/s/rHE2Xj335RzhlB-KvxJLpQ
https://mp.weixin.qq.com/s/rHE2Xj335RzhlB-KvxJLpQ
信息安全:研究体系(220页)
https://mp.weixin.qq.com/s/WeBXUyP3-gbzrRrHmPyY9w
https://mp.weixin.qq.com/s/WeBXUyP3-gbzrRrHmPyY9w
CVE-2017-0261及利用样本分析
https://mp.weixin.qq.com/s/Sk7Lx0sKAfD_wTuhcWiBig
https://mp.weixin.qq.com/s/Sk7Lx0sKAfD_wTuhcWiBig
Apache Struts2 S2-059(CVE-2019-0230) RCE
https://mp.weixin.qq.com/s/GJGSVl4BRLhUV4x2LbsIkw
https://mp.weixin.qq.com/s/GJGSVl4BRLhUV4x2LbsIkw
Windows版TeamViewer漏洞复现
https://mp.weixin.qq.com/s/8ZDpCYb_7X1tJ5ywxbQSMA
https://mp.weixin.qq.com/s/8ZDpCYb_7X1tJ5ywxbQSMA
固件提取系列(一)-固件载体
https://mp.weixin.qq.com/s/xWUoAwilc6v_0BMZXpbZqA
https://mp.weixin.qq.com/s/xWUoAwilc6v_0BMZXpbZqA
小步快跑,快速迭代:安全运营的器术法道
https://security.tencent.com/index.php/blog/msg/162
https://security.tencent.com/index.php/blog/msg/162
从代码角度看各类子域名收集工具
https://paper.seebug.org/1292/
https://paper.seebug.org/1292/
When TLS Hacks You--BlackHat2020
http://zeroyu.xyz/2020/08/11/When-TLS-Hacks-You-BlackHat2020/
http://zeroyu.xyz/2020/08/11/When-TLS-Hacks-You-BlackHat2020/
中小型银行实战攻防演练经验分享
https://mp.weixin.qq.com/s/sGoGelUKd8ehYlghOgg7gw
https://mp.weixin.qq.com/s/sGoGelUKd8ehYlghOgg7gw
一款商业窃密马的前世今生
https://www.anquanke.com/post/id/213411
https://www.anquanke.com/post/id/213411
基于零信任的等保一体机方案
https://www.anquanke.com/post/id/213742
https://www.anquanke.com/post/id/213742
SecWiki周刊(第336期)
https://www.sec-wiki.com/weekly/336
https://www.sec-wiki.com/weekly/336
Angr_CTF已入门到精通
https://www.anquanke.com/post/id/213423
https://www.anquanke.com/post/id/213423
JSP Webshell那些事 -- 攻击篇(上)
https://mp.weixin.qq.com/s/XZvQgh6g69AUNUi_QK9FbQ
https://mp.weixin.qq.com/s/XZvQgh6g69AUNUi_QK9FbQ
从现状看威胁情报发展趋势
https://zhuanlan.zhihu.com/p/183993203
https://zhuanlan.zhihu.com/p/183993203
Awesome CobaltStrike
https://github.com/zer0yu/Awesome-CobaltStrike
https://github.com/zer0yu/Awesome-CobaltStrike
神秘Palantir-平台介绍
https://mp.weixin.qq.com/s/JgLkd4_J5s93FDuS31F-Cg
https://mp.weixin.qq.com/s/JgLkd4_J5s93FDuS31F-Cg
PoC auto collect from GitHub
https://github.com/nomi-sec/PoC-in-GitHub
https://github.com/nomi-sec/PoC-in-GitHub
美国安全自动化和IACD框架
https://mp.weixin.qq.com/s/6IQD7pRsJ_tJ72umOnQiaA
https://mp.weixin.qq.com/s/6IQD7pRsJ_tJ72umOnQiaA
互联网虚假新闻检测挑战赛(冠军)方案
https://mp.weixin.qq.com/s/c8f0wDHigNQUlmxtFVG0aA
https://mp.weixin.qq.com/s/c8f0wDHigNQUlmxtFVG0aA
Decrypting HTTPS: How to Snoop on Your Own Requests
https://bitwiser.dev/2020/08/14/decrypting-https-how-to-snoop-on-your-own-requests/
https://bitwiser.dev/2020/08/14/decrypting-https-how-to-snoop-on-your-own-requests/
How Malicious Tor Relays are Exploiting Users in 2020 (Part I)
https://medium.com/@nusenu/how-malicious-tor-relays-are-exploiting-users-in-2020-part-i-1097575c0cac
https://medium.com/@nusenu/how-malicious-tor-relays-are-exploiting-users-in-2020-part-i-1097575c0cac
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第337期)
