SecWiki周刊(第348期)
2020/10/26-2020/11/01
安全技术
MSSQL绕过360提权实战案例
https://mp.weixin.qq.com/s/Ch342vyszfhUWSlkJEzMOA
https://mp.weixin.qq.com/s/Ch342vyszfhUWSlkJEzMOA
认识 WebAuthn
http://rui0.cn/archives/1543
http://rui0.cn/archives/1543
anonymousmail: 临时邮箱搭建解决方案
https://github.com/openitsystem/anonymousmail
https://github.com/openitsystem/anonymousmail
Hacking All The Cars - Tesla 远程API分析与利用(上)
https://www.anquanke.com/post/id/218396
https://www.anquanke.com/post/id/218396
SonarQube系列(一)安装
https://blog.csdn.net/bloodzero_new/article/details/109368923
https://blog.csdn.net/bloodzero_new/article/details/109368923
北非狐(APT-C-44)攻击活动揭露
https://mp.weixin.qq.com/s/gWOIRNPLVqX761LW8x-S5g
https://mp.weixin.qq.com/s/gWOIRNPLVqX761LW8x-S5g
halogen: Automatically create YARA rules from malicious documents
https://github.com/target/halogen
https://github.com/target/halogen
Hacking All The Cars - Tesla 远程API分析与利用(下)
https://www.anquanke.com/post/id/220907
https://www.anquanke.com/post/id/220907
PHP 绕过禁用函数漏洞的原理与利用分析
https://mp.weixin.qq.com/s/_KCqGJnHaCBjCZ0VPo898Q
https://mp.weixin.qq.com/s/_KCqGJnHaCBjCZ0VPo898Q
Xcheck之Java安全检查引擎
https://mp.weixin.qq.com/s/rb1BfcZeCTr2PIiypXqVjw
https://mp.weixin.qq.com/s/rb1BfcZeCTr2PIiypXqVjw
Repo Jacking: Exploiting the Dependency Supply Chain
https://blog.securityinnovation.com/repo-jacking-exploiting-the-dependency-supply-chain
https://blog.securityinnovation.com/repo-jacking-exploiting-the-dependency-supply-chain
一个文件上传靶场知识总结记录
https://xz.aliyun.com/t/8435
https://xz.aliyun.com/t/8435
Polisis: Automated Analysis and Presentation of Privacy Policies
https://mp.weixin.qq.com/s/N1uC-faM-FQ_uahvmEJ1Xg
https://mp.weixin.qq.com/s/N1uC-faM-FQ_uahvmEJ1Xg
银行业安全运营平台的建设与思考
https://mp.weixin.qq.com/s/UncU7f92p5Mlxt353Galrg
https://mp.weixin.qq.com/s/UncU7f92p5Mlxt353Galrg
恶意ELF二进制文件相似度比较及可视化
https://github.com/CymaticsCC/elf_similarity
https://github.com/CymaticsCC/elf_similarity
某网站Web端爬虫攻防大赛题目交流
https://www.52pojie.cn/thread-1288315-1-1.html
https://www.52pojie.cn/thread-1288315-1-1.html
ATT&CK驱动下安全运营数据分析的实用性挑战
https://mp.weixin.qq.com/s/yNPE4rqpY2NoHug6ZuLS2Q
https://mp.weixin.qq.com/s/yNPE4rqpY2NoHug6ZuLS2Q
SecWiki周刊(第347期)
https://www.sec-wiki.com/weekly/347
https://www.sec-wiki.com/weekly/347
BadCode: 恶意代码逃逸源代码
https://github.com/Rvn0xsy/BadCode
https://github.com/Rvn0xsy/BadCode
隔离网络攻击 专题研究报告
https://mp.weixin.qq.com/s/G4pIpHN2BLSvPWVYvN5VAQ
https://mp.weixin.qq.com/s/G4pIpHN2BLSvPWVYvN5VAQ
DNS加密协议发展及部署现状
https://www.inforsec.org/wp/?p=4367
https://www.inforsec.org/wp/?p=4367
将风险评估结果映射到ATT&CK框架
https://mp.weixin.qq.com/s/DZF4HwX4xuedpqoAFyhw5w
https://mp.weixin.qq.com/s/DZF4HwX4xuedpqoAFyhw5w
实战讲解TP3框架下的渗透思路
https://xz.aliyun.com/t/8417
https://xz.aliyun.com/t/8417
软件源码安全攻防之道(下)
https://mp.weixin.qq.com/s/7HAVA0DgtxlCnD21aiq_mQ
https://mp.weixin.qq.com/s/7HAVA0DgtxlCnD21aiq_mQ
ThinkPHP漏洞分析与利用
https://mp.weixin.qq.com/s/OWi3G4ETrV-yBsnWgdU_Ew
https://mp.weixin.qq.com/s/OWi3G4ETrV-yBsnWgdU_Ew
AKSK 命令执行到谷歌验证码劫持
https://xz.aliyun.com/t/8429
https://xz.aliyun.com/t/8429
构造一个 CodeDB 来探索全新的白盒静态扫描方案
https://paper.seebug.org/1387/
https://paper.seebug.org/1387/
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第348期)
