SecWiki周刊(第338期)
2020/08/17-2020/08/23
安全资讯
关于运用大数据推进防范治理电信网络诈骗长效机制建设工作方案
http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057724/n3057728/c8056526/content.html
http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057724/n3057728/c8056526/content.html
公安部关于修改《公安机关办理刑事案件程序规定》的决定
http://www.gov.cn/zhengce/zhengceku/2020-08/16/content_5535125.htm
http://www.gov.cn/zhengce/zhengceku/2020-08/16/content_5535125.htm
安全技术
浅谈哥斯拉内存Shell技术
https://mp.weixin.qq.com/s/D0ACXtPsj91chP4zmGpUjQ
https://mp.weixin.qq.com/s/D0ACXtPsj91chP4zmGpUjQ
Fraudar算法在京东关系网络反欺诈中的应用
https://mp.weixin.qq.com/s/Qp1Yrlu92LwZ-n4kipq0sw
https://mp.weixin.qq.com/s/Qp1Yrlu92LwZ-n4kipq0sw
哥斯拉Godzilla shell管理工具
https://mp.weixin.qq.com/s/_4ACLzaImDMQbZWfhSHnwg
https://mp.weixin.qq.com/s/_4ACLzaImDMQbZWfhSHnwg
PHPCMS V9 前台RCE挖掘分析
https://mp.weixin.qq.com/s/zLXJtekT9O3OuzwBLigMsA
https://mp.weixin.qq.com/s/zLXJtekT9O3OuzwBLigMsA
2020黑帽大会亮点议题&技术观察
https://www.secrss.com/articles/24820
https://www.secrss.com/articles/24820
Angr_CTF从精通到弃坑
https://www.anquanke.com/post/id/214288
https://www.anquanke.com/post/id/214288
智能合约中的那些后门漏洞
https://paper.seebug.org/1300/
https://paper.seebug.org/1300/
冰蝎3.0、哥斯拉后门检测
https://mp.weixin.qq.com/s/GpGubo6CRL9OOEumkyL29A
https://mp.weixin.qq.com/s/GpGubo6CRL9OOEumkyL29A
OpenSA: 运维自动化平台
https://github.com/latentgod/OpenSA
https://github.com/latentgod/OpenSA
Jenkins的后门实现(密码窃取,命令执行)
https://mp.weixin.qq.com/s/C002y-fBZVFv-dQztdC6Bg
https://mp.weixin.qq.com/s/C002y-fBZVFv-dQztdC6Bg
大规模数据安全分类系统架构实践
https://mp.weixin.qq.com/s/mRmDEuDKJSJ_xrYyBMn4Dw
https://mp.weixin.qq.com/s/mRmDEuDKJSJ_xrYyBMn4Dw
DataCon2020 僵尸网络追踪第一题writeup
https://zhuanlan.zhihu.com/p/186254809
https://zhuanlan.zhihu.com/p/186254809
机器学习的模型评估与调参(附代码)
https://mp.weixin.qq.com/s/Uenwe66pwl4SzcW1P2B7Iw
https://mp.weixin.qq.com/s/Uenwe66pwl4SzcW1P2B7Iw
软件源码安全攻防之道(上)
https://mp.weixin.qq.com/s/jb3VQyK3U6BQS0-0ad0K_w
https://mp.weixin.qq.com/s/jb3VQyK3U6BQS0-0ad0K_w
Lilac 2020 暑期pwn培训课件
https://github.com/7Hxz233/Lilac_2020_summer_pwn
https://github.com/7Hxz233/Lilac_2020_summer_pwn
数据中台:基于标签体系的360°用户画像
https://mp.weixin.qq.com/s/zIbhQjP9OTIPG9uRr64xtA
https://mp.weixin.qq.com/s/zIbhQjP9OTIPG9uRr64xtA
物联网安全之MQTT协议安全
https://bacde.me/post/mqtt-security-part-one/
https://bacde.me/post/mqtt-security-part-one/
云安全环境下恶意脚本检测的最佳实践
http://yundunpr.oss-cn-hangzhou.aliyuncs.com/2020/xcon2020.pdf
http://yundunpr.oss-cn-hangzhou.aliyuncs.com/2020/xcon2020.pdf
2019-2020网络安全态势观察报告
https://www.venustech.com.cn/uploads/2020/08/170947121504.pdf
https://www.venustech.com.cn/uploads/2020/08/170947121504.pdf
通达OA11.6 preauth RCE 0day分析
https://drivertom.blogspot.com/2020/08/oa116-preauth-rce-0day.html
https://drivertom.blogspot.com/2020/08/oa116-preauth-rce-0day.html
写给技术创业者的创业思考框架
https://zhuanlan.zhihu.com/p/84058442
https://zhuanlan.zhihu.com/p/84058442
DataCon2020 恶意代码分析冠军writeup
https://mp.weixin.qq.com/s/e69Fg9UBX3B2BFiGvsg4Gg
https://mp.weixin.qq.com/s/e69Fg9UBX3B2BFiGvsg4Gg
物联网资产标记方法研究(一)基于先验知识的物联网资产标记实践
http://blog.nsfocus.net/iot-asset-tagging-1-0818/
http://blog.nsfocus.net/iot-asset-tagging-1-0818/
Office文件追踪方案探索
https://www.freebuf.com/articles/database/246984.html
https://www.freebuf.com/articles/database/246984.html
关于Cobalt Strike检测方法与去特征的思考
https://mp.weixin.qq.com/s/5MWDXN3eCaw9m-XHDGaXcQ
https://mp.weixin.qq.com/s/5MWDXN3eCaw9m-XHDGaXcQ
针对学校内网的一次渗透测试
https://xz.aliyun.com/t/8147
https://xz.aliyun.com/t/8147
2020腾讯广告算法大赛方案分享及代码(冠军)
https://mp.weixin.qq.com/s/-lizDyP2y357plcG1M64TA
https://mp.weixin.qq.com/s/-lizDyP2y357plcG1M64TA
JSP Webshell那些事 -- 攻击篇(下)
https://mp.weixin.qq.com/s/YhiOHWnqXVqvLNH7XSxC9w
https://mp.weixin.qq.com/s/YhiOHWnqXVqvLNH7XSxC9w
SecWiki周刊(第337期)
https://www.sec-wiki.com/weekly/337
https://www.sec-wiki.com/weekly/337
萌新从0开始的专业渗透测试报告编写指南
https://mp.weixin.qq.com/s/BKwPy27aVM4fSrTSlLbq7g
https://mp.weixin.qq.com/s/BKwPy27aVM4fSrTSlLbq7g
无字母数字webshell总结
https://xz.aliyun.com/t/8107
https://xz.aliyun.com/t/8107
浅谈PHP无回显命令执行的利用
https://xz.aliyun.com/t/8125
https://xz.aliyun.com/t/8125
揭秘CVE-2020-1464 Windows文件签名验证绕过漏洞疑云
https://mp.weixin.qq.com/s/CRdDJeen-Zqc0RCnMr4kzQ
https://mp.weixin.qq.com/s/CRdDJeen-Zqc0RCnMr4kzQ
利用 ZoomEye 追踪多种 Redteam C&C 后渗透攻击框架
https://mp.weixin.qq.com/s/H66J0ab8UAyVrxRb1RLO4g
https://mp.weixin.qq.com/s/H66J0ab8UAyVrxRb1RLO4g
Go二进制文件逆向分析从基础到进阶——综述
https://www.anquanke.com/post/id/214940
https://www.anquanke.com/post/id/214940
浅探内网横向移动-Pass The Hash
https://xz.aliyun.com/t/8117
https://xz.aliyun.com/t/8117
全端口蜜罐的部署过程与数据分析
https://www.freebuf.com/articles/network/240041.html
https://www.freebuf.com/articles/network/240041.html
基于开源情报网络分析与网页分析
https://mp.weixin.qq.com/s/UIKHaQzXWc6p6Mjonrk8cg
https://mp.weixin.qq.com/s/UIKHaQzXWc6p6Mjonrk8cg
从0到1认识Redis到多维角度场景下的安全分析与利用
https://www.anquanke.com/post/id/214108
https://www.anquanke.com/post/id/214108
半自动化冰蝎流量分析的实践
https://mp.weixin.qq.com/s/w40qI2iPNLx9GjgkYRyhpg
https://mp.weixin.qq.com/s/w40qI2iPNLx9GjgkYRyhpg
CodeQL 若干问题思考及 CVE-2019-3560 审计详解
https://lenny233.github.io/2020/02/20/codql-and-cve-2019-3560/
https://lenny233.github.io/2020/02/20/codql-and-cve-2019-3560/
FAQs on Getting Started in Cyber Threat Intelligence
https://medium.com/katies-five-cents/faqs-on-getting-started-in-cyber-threat-intelligence-f567f267348e
https://medium.com/katies-five-cents/faqs-on-getting-started-in-cyber-threat-intelligence-f567f267348e
以OpenRASP为基础-展开来港港RASP的类加载
https://xz.aliyun.com/t/8148
https://xz.aliyun.com/t/8148
TP5.0.xRCE&5.0.24反序列化分析
https://xz.aliyun.com/t/8143
https://xz.aliyun.com/t/8143
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第338期)
