SecWiki周刊(第44期)
2014/12/29-2015/01/04
安全资讯
IEEE Security & Privacy Gallery of Web Admin's Tears 揭秘安全狗安全云主机12道加固工序 Windows 8.1 (32/64 bit) - Privilege Escalation 测一测才知道,百度安全软件是不是真流氓? The 5 Most Dangerous Software Bugs of 2014 Google Pays Out $50,000 Reward For App Engine Vulnerabilities GitHub supports advanced search operators much like Google 关于“安全威胁情报”的几个思考点漫谈 DEF CON CTF 2015 Silicon Valley Security Meetup soundhax : getting unsigned code execution through sound (DS) Top 10 Security Incidents and Vulnerabilities of 2014 微软威胁情报中心总经理 John Lambert 谈安全 22 years of DEF CON SecWiki社团招募中 2014,这些网站的用户信息被黑客拿到了 Hacker Generates Fingerprint of German Defense Minister from Public Photos Vote For 2014 Best Security Tool
安全技术
DevOOPS – a modern bootstrap dashboard theme Thunderstrike: EFI bootkits for Apple MacBooks Pcshare远控源码偏重分析(一) wdbgark:WinDBG Anti-RootKit Extension PacSec 2014 Security Conference PPT too-many-cooks-exploiting-tr069_tal-oppenheim 揭秘:对美国国安局(NSA)而言,加密技术大多已形同虚设 31C3: a new dawn Retargetable Decompiler Online maiyadi.com 渗透笔记 A Cuckoo Sandbox Extension for Android python-libshorttext:setup script for libshorttext Hyperfox:HTTPs traffic interceptor Log Analysis for Web Attacks: A Beginner's Guide xdef2014-flanker-Android应用漏洞攻与防 4G安全:通过SMS攻击USB调制解调器及SIM卡 RadicalResearch HSTS Super Cookies DNP3设备公网暴露情况统计与分析报告 4G Security: Hacking USB Modem and SIM Card via SMS 安全+技术内刊 027期 内容分发平台个性化推荐系统经验简单总结 On the new Snowden documents Evolution of Banking Malwares, Part 1 NSA today released 3 more compliance reports to Intel Oversight Board 数据挖掘项目总结文档 深入理解AVM验证器 miasm:Reverse engineering framework in Python Machine Learning Library Hunting and Decrypting Communications of Gh0st RAT in Memory Intro to the VPN Exploitation Process Attacks on UEFI Security slides HHVM at Baidu google-security-research Issues Introduction to RFID Security #31c3ctf writeups 正则表达式参考文档 git漏洞cve-2014-9390分析 APTnotes:Various public documents, whitepapers and articles Python编写shellcode注入程序 Isolating and Restricting Client-Side JavaScript Finding and exploiting ntpd vulnerabilities ShmooCon Ticket Contest Writeup 安全漏洞本质扯谈之扯谈安全漏洞本质 2014年总结——竞赛的一年 程序员英语学习指引 利用CSP探测网站登陆状态 夏日的风:盘点2014 被忽视的开发安全问题 2014年移动恶意色情应用研究报告 World's Biggest Data Breaches Mining for Bugs with Graph Database Queries Masochist:XNU Rootkit Framework 浅谈PHP弱类型安全-----微信ID:SecWiki-----
SecWiki,12年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第44期)