SecWiki周刊(第379期)
2021/05/31-2021/06/06
安全技术
PeiQi-WIKI-POC文库
https://github.com/PeiQi0/PeiQi-WIKI-POC
https://github.com/PeiQi0/PeiQi-WIKI-POC
EISS2021-办公网零信任安全建设实践
https://www.anquanke.com/post/id/241954
https://www.anquanke.com/post/id/241954
窃密者Facefish分析报告
https://blog.netlab.360.com/ssh_stealer_facefish_cn/
https://blog.netlab.360.com/ssh_stealer_facefish_cn/
利用Script Gadget进行CSP绕过
https://www.anquanke.com/post/id/239359
https://www.anquanke.com/post/id/239359
从RFC规范看如何绕过waf上传表单 上篇
https://www.anquanke.com/post/id/241265
https://www.anquanke.com/post/id/241265
从RFC规范看如何绕过waf上传表单 下篇
https://www.anquanke.com/post/id/242583
https://www.anquanke.com/post/id/242583
XCTF2021-Final-Dubbo WriteUp: SSRF -> Dubbo Consumer RCE
https://xz.aliyun.com/t/9627
https://xz.aliyun.com/t/9627
NetGear R7000P 路由器栈溢出漏洞硬件调试与分析
https://www.anquanke.com/post/id/241100
https://www.anquanke.com/post/id/241100
Code Signing - iOS 代码段的校验机制分析
https://mp.weixin.qq.com/s/msUwo3YUcfHXkuAp5wRfyQ
https://mp.weixin.qq.com/s/msUwo3YUcfHXkuAp5wRfyQ
2021年网络安全产业链图谱
https://mp.weixin.qq.com/s/IDlXpFBtX19CE9PLoSgVYA
https://mp.weixin.qq.com/s/IDlXpFBtX19CE9PLoSgVYA
neo4j-cve: Graph database version of the CVE database
https://github.com/jazwiecki/neo4j-cve
https://github.com/jazwiecki/neo4j-cve
智能合约安全系列 -- 举一反三总结篇
https://mp.weixin.qq.com/s/ZxrBHgZ5a_IuU0nNySIlwA
https://mp.weixin.qq.com/s/ZxrBHgZ5a_IuU0nNySIlwA
PatchDB: A Large-Scale Security Patch Dataset
https://github.com/SunLab-GMU/PatchDataset
https://github.com/SunLab-GMU/PatchDataset
python脚本笔记:随机代理的目录爆破工具
https://www.sec-in.com/article/1074
https://www.sec-in.com/article/1074
McAfee 如何使用图思考 ATT&CK
https://mp.weixin.qq.com/s/rlFmQdZZTHUnX2D1JSVtFQ
https://mp.weixin.qq.com/s/rlFmQdZZTHUnX2D1JSVtFQ
来自Readme的威胁-疑似长达数年的供应链攻击分析
https://security.tencent.com/index.php/blog/msg/192
https://security.tencent.com/index.php/blog/msg/192
浅谈命令执行的绕过方法
https://www.anquanke.com/post/id/241808
https://www.anquanke.com/post/id/241808
JavaWeb网页截图中的ssrf
https://www.sec-in.com/article/1080
https://www.sec-in.com/article/1080
Jar 组件自动化风险监测和升级实践
https://mp.weixin.qq.com/s/3tmwACw-weWCBzipHK79AQ
https://mp.weixin.qq.com/s/3tmwACw-weWCBzipHK79AQ
SecWiki周刊(第378期)
https://www.sec-wiki.com/weekly/378
https://www.sec-wiki.com/weekly/378
SCRUTINIZER:通过反编译和机器学习检测恶意软件中的代码复用
https://mp.weixin.qq.com/s/hdqCwSoXdxAYB8OfL5oJEQ
https://mp.weixin.qq.com/s/hdqCwSoXdxAYB8OfL5oJEQ
重载DNS缓存中毒攻击:侧通道革命
https://mp.weixin.qq.com/s/tDYASD3RKUgcHybGR-HcnQ
https://mp.weixin.qq.com/s/tDYASD3RKUgcHybGR-HcnQ
技术分享 | 基于windows操作系统的锦行蜜罐新节点技术
https://mp.weixin.qq.com/s/ghFNc0NJGexylNuECpjifw
https://mp.weixin.qq.com/s/ghFNc0NJGexylNuECpjifw
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第379期)
