SecWiki周刊(第438期)
2022/07/18-2022/07/24
安全技术
如何从 0 到 1 打造国防领域的产品
https://mp.weixin.qq.com/s/droA3PllKFf_CSlEE4L-hQ
https://mp.weixin.qq.com/s/droA3PllKFf_CSlEE4L-hQ
反-反蜜罐:以三个反蜜罐插件的缺陷为例
https://drivertom.blogspot.com/2022/07/blog-post.html
https://drivertom.blogspot.com/2022/07/blog-post.html
《物联网终端安全入门与实践之玩转物联网固件》上
https://mp.weixin.qq.com/s/qXmx7NOnOh7mxHr16BkioA
https://mp.weixin.qq.com/s/qXmx7NOnOh7mxHr16BkioA
websocket新型内存马的应急响应
https://mp.weixin.qq.com/s/T3UfA1plrlG-e9lgfB4whg
https://mp.weixin.qq.com/s/T3UfA1plrlG-e9lgfB4whg
物联网终端安全入门与实践之了解物联网终端 (上篇)
https://mp.weixin.qq.com/s/wOVTF99uKimmzzbnjy4tuw
https://mp.weixin.qq.com/s/wOVTF99uKimmzzbnjy4tuw
如何通过GPS追踪器关闭汽车引擎
https://www.wolai.com/callisto-auto/6wKbkRsHs9iJ4Wqm7ptT38
https://www.wolai.com/callisto-auto/6wKbkRsHs9iJ4Wqm7ptT38
SecWiki周刊(第437期)
https://www.sec-wiki.com/weekly/437
https://www.sec-wiki.com/weekly/437
关于X信数据库的解密以及取证
https://mp.weixin.qq.com/s/5ZdAiMlsCZJyEijgZ3VFyA
https://mp.weixin.qq.com/s/5ZdAiMlsCZJyEijgZ3VFyA
对全网上一些JSONP蜜罐探索与识别
https://mp.weixin.qq.com/s/C0F1ywUcQ6MhgNZZIXlFbA
https://mp.weixin.qq.com/s/C0F1ywUcQ6MhgNZZIXlFbA
物联网终端安全入门与实践之玩转物联网固件(中)
https://mp.weixin.qq.com/s/p4ImDz6LfFk2hW_gQrnA2w
https://mp.weixin.qq.com/s/p4ImDz6LfFk2hW_gQrnA2w
一次曲折的代码审计+渗透+绕过WAF+提权实战
https://mp.weixin.qq.com/s/hRwYtDZ-dqqznhS3LdSxUA
https://mp.weixin.qq.com/s/hRwYtDZ-dqqznhS3LdSxUA
2022 软件供应链安全技术白皮书
http://blog.nsfocus.net/wp-content/uploads/2022/07/NSFOCUS.pdf
http://blog.nsfocus.net/wp-content/uploads/2022/07/NSFOCUS.pdf
关于安全情报能力和应用的一些思考
https://mp.weixin.qq.com/s/aHwhGY3YJX1EXUFvFzBLGg
https://mp.weixin.qq.com/s/aHwhGY3YJX1EXUFvFzBLGg
《物联网终端安全入门与实践之了解物联网终端》下
https://mp.weixin.qq.com/s/ZeRDEXBpkdtO6KgBQbTKWg
https://mp.weixin.qq.com/s/ZeRDEXBpkdtO6KgBQbTKWg
代码表征预训练语言模型学习指南:原理、分析和代码
https://mp.weixin.qq.com/s/kQ3ARDM06mKnYdzEwuzVLg
https://mp.weixin.qq.com/s/kQ3ARDM06mKnYdzEwuzVLg
我认为网络安全工具的未来:开篇
https://mp.weixin.qq.com/s/imLgat7aQA-8NQoH-mxpYw
https://mp.weixin.qq.com/s/imLgat7aQA-8NQoH-mxpYw
CVE-2019-0808
https://www.sec-in.com/article/1616
https://www.sec-in.com/article/1616
样本相似分析新尝试:通过音频实现
https://mp.weixin.qq.com/s/Ree7tIPbgu0h8PATDETDoA
https://mp.weixin.qq.com/s/Ree7tIPbgu0h8PATDETDoA
基于追踪标记的WAF设计思路
https://www.freebuf.com/articles/web/338814.html
https://www.freebuf.com/articles/web/338814.html
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第438期)
