SecWiki周刊(第78期)
2015/08/24-2015/08/30
安全资讯
2015 DEF CON CTF Final Scores
https://blog.legitbs.net/2015/08/2015-def-con-ctf-final-scores.html
https://blog.legitbs.net/2015/08/2015-def-con-ctf-final-scores.html
Ashley Madison hackers leave footprints that may help investigators
http://arstechnica.com/security/2015/08/ashley-madison-hackers-leave-footprints-that-may-help-investigators/
http://arstechnica.com/security/2015/08/ashley-madison-hackers-leave-footprints-that-may-help-investigators/
How Much Threat Intelligence Is Too Much?
http://www.darkreading.com/partner-perspectives/tenable/how-much-threat-intelligence-is-too-much/a/d-id/1321843
http://www.darkreading.com/partner-perspectives/tenable/how-much-threat-intelligence-is-too-much/a/d-id/1321843
首次威胁情报研讨沙龙
http://www.aqniu.com/news/9862.html
http://www.aqniu.com/news/9862.html
美国爱因斯坦计划最新动态201508
http://yepeng.blog.51cto.com/3101105/1689128
http://yepeng.blog.51cto.com/3101105/1689128
EFF Announces 2015 Pioneer Award Winners
https://www.eff.org/press/releases/eff-announces-2015-pioneer-award-winners-caspar-bowden-citizen-lab-anriette
https://www.eff.org/press/releases/eff-announces-2015-pioneer-award-winners-caspar-bowden-citizen-lab-anriette
安全技术
Malware Analysis Tutorials: a Reverse Engineering Approach
http://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html
http://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html
Cookies Lack Integrity: Real-World Implications
http://netsec.ccert.edu.cn/duanhx/files/2015/08/sec15_cookies-lack-integrity-published.pdf
http://netsec.ccert.edu.cn/duanhx/files/2015/08/sec15_cookies-lack-integrity-published.pdf
去哪儿网 MySQL 语法审核工具
https://github.com/mysql-inception/inception
https://github.com/mysql-inception/inception
maltelligence:a Malware/Threat Analyst Desktop
https://github.com/maltelligence/maltelligence
https://github.com/maltelligence/maltelligence
fd上公布的vBulletin rce 0day分析
http://seclab.dbappsecurity.com.cn/?p=461
http://seclab.dbappsecurity.com.cn/?p=461
GasPot: honeypot for Veeder Root Gaurdian AST
https://github.com/sjhilt/GasPot
https://github.com/sjhilt/GasPot
冰眼科技安全沙龙PPT
http://pan.baidu.com/s/1bnfRVQZ
http://pan.baidu.com/s/1bnfRVQZ
SQLChop - 一个新型 SQL 注入检测引擎
http://blog.chaitin.com/sqlchop-the-sqli-detection-engine/
http://blog.chaitin.com/sqlchop-the-sqli-detection-engine/
Offensive & Defensive Android Reverse Engineering
https://github.com/rednaga/training/tree/master/DEFCON23
https://github.com/rednaga/training/tree/master/DEFCON23
SQL注入速查表(下)与Oracle注入速查表
http://drops.wooyun.org/tips/8242
http://drops.wooyun.org/tips/8242
APT攻击现状及揭露实践
http://pan.baidu.com/s/1jGEjxtW
http://pan.baidu.com/s/1jGEjxtW
逆向路由器固件之敏感信息泄露 Part2
http://www.freebuf.com/articles/terminal/76481.html
http://www.freebuf.com/articles/terminal/76481.html
HIDden Treasures - TaiG 2
http://newosxbook.com/articles/HIDeAndSeek.html
http://newosxbook.com/articles/HIDeAndSeek.html
越狱插件盗取22万个苹果账号样本分析
http://blog.pangu.io/wy-2015-0136806/
http://blog.pangu.io/wy-2015-0136806/
Linux_Security_Summit_2015
http://kernsec.org/wiki/index.php/Linux_Security_Summit_2015#Schedule
http://kernsec.org/wiki/index.php/Linux_Security_Summit_2015#Schedule
那些 Web Hacking 中的奇技淫巧
http://blog.orange.tw/2015/08/hitcon-2015-community-web-hacking.html
http://blog.orange.tw/2015/08/hitcon-2015-community-web-hacking.html
攻击洋葱路由(Tor)匿名服务的一些综述
http://drops.wooyun.org/papers/8265
http://drops.wooyun.org/papers/8265
WMI Attacks
http://drops.wooyun.org/tips/8189
http://drops.wooyun.org/tips/8189
sonar:A Framework for Scanning and Exploiting Internal Hosts With a Webpage
http://thehackerblog.com/sonar-a-framework-for-scanning-and-exploiting-internal-hosts-with-a-webpage/
http://thehackerblog.com/sonar-a-framework-for-scanning-and-exploiting-internal-hosts-with-a-webpage/
使用exp进行SQL报错注入
http://drops.wooyun.org/tips/8166
http://drops.wooyun.org/tips/8166
Hacking ipcam like Harold in POI
http://hackdog.me/ipcam/#/step-1
http://hackdog.me/ipcam/#/step-1
Exploit PLC on the internet
http://plcscan.org/blog/2015/08/china-knownsec-kcon-2015/
http://plcscan.org/blog/2015/08/china-knownsec-kcon-2015/
Abusing Web Query (.iqy) files for effective phishing
http://www.labofapenetrationtester.com/2015/08/abusing-web-query-iqy-files.html
http://www.labofapenetrationtester.com/2015/08/abusing-web-query-iqy-files.html
揭秘Neutrino僵尸网络生成器
http://drops.wooyun.org/tips/8186
http://drops.wooyun.org/tips/8186
Self-patching Microsoft XML with misalignments and factorials
http://www.phrack.org/papers/self-patching-msxml.html
http://www.phrack.org/papers/self-patching-msxml.html
What I learned from cracking 4000 Ashley Madison passwords
http://www.pxdojo.net/2015/08/what-i-learned-from-cracking-4000.html
http://www.pxdojo.net/2015/08/what-i-learned-from-cracking-4000.html
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第78期)
