SecWiki周刊(第77期)
2015/08/17-2015/08/23
安全资讯
ACM CCS 2015 Accepted Papers New data uncovers the surprising predictability of Android lock patterns DerbyCon 2015 Schedule and Abstract Science Isn’t Broken AVA: A Social Engineering Vulnerability Scanner 2015年第34周安全通报 BlackHat Trainings Experience Fifteen Famous Bug Bounty Hunters How to Exploit BitTorrent for Large-Scale DoS Attacks BlackHat & Defcon 2015 观感 10+ Years of System Security Circus
安全技术
Discuz!后台秒getshell(第三方安全问题) Discuz全版本存储型DOM XSS(可打管理员) PHP 7 ZEND_HASH_IF_FULL_DO_RESIZE Use After Free 漏洞分析 Wordpress4.2.3提权与SQL注入漏洞(CVE-2015-5623)分析 Distributed Nmap Port Scanning with a DNmap Megacluster Modern Windows Exploit Development UCSD Computer Security Course Slide HackingTeamfulldump (不算完整235g压缩版) Cookies Lack Integrity: Real-World Implications Inside Neutrino botnet builder 利用机器学习进行恶意代码分类 NetRipper - Smart traffic sniffing for penetration testers Discuz! X系列远程代码执行漏洞分析 WAF绕过(网站安全狗示例) Setup Your Own MITM, Packet Sniffing WiFi Access Point “企业应急响应和反渗透”之真实案例分析 A light-weight forensic analysis of the AshleyMadison Hack iOS:CVE-2015-5774 Extortionists Target Ashley Madison Users You Dirty RAT: Analyzing an AlienSpy Payload Camera 360应用隐私数据泄露的分析 New activity of The Blue Termite APT Exploiting Ammyy Admin – developing an 0day BlackHat议题分析:浅析BGP劫持利用 DEFCON 23 CTF 战记 SQL注入速查表(上) Deploying, Managing, and Leveraging Honeypots in the Enterprise BinNavi binary analysis tool open sourced by Google UAC Bypass Vulnerability in the Windows Script Host. Snifflab: An environment for testing mobile devices A Neat Stack Corruption, Reverse P/Invoke Structure Packing with Output Param Sybase数据库安全 携程安全沙龙现场笔记&PPT Stealth Techniques: Hiding Files in the Registry Analysis of PS4's security and the state of hacking Chaos Communication Camp 2015-----微信ID:SecWiki-----
SecWiki,12年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第77期)