当前节点:secwiki
时间节点
2021-01-27 00:09:27SecWiki周报
信创产业:操作系统深度研究(PPT原文) https://mp.weixin.qq.com/s/fA1xDbQ9qbV1L2AgitFXdw
全球网络反恐格局中的中国力量 https://mp.weixin.qq.com/s/1dpbZO_rD4GSfaPqjw5Luw
SSRF安全指北 https://mp.weixin.qq.com/s/EYVFHgNClgNGrk_92PZ90A
浅谈隧道搭建工具之Neo-reGeorg https://www.anquanke.com/post/id/228917
宝塔面板Windows版提权方法 https://github.com/Hzllaga/BT_Panel_Privilege_Escalation
容器环境定制的渗透测试工具 https://github.com/cdk-team/CDK/wiki/CDK-Home-CN
两个有趣的DNS 安全问题研究 https://xz.aliyun.com/t/9047
Java安全02-从ClassLoader到冰蝎Java篇 https://xz.aliyun.com/t/9050
JavaWeb中的信息泄漏——H2 database https://www.sec-in.com/article/827
2021-01-26 00:08:52SecWiki周报
美国国防部DevSecOps实践 https://mp.weixin.qq.com/s/EPpgQlgc_8eY21xJRZkBqQ
SecWiki周刊(第360期) https://www.sec-wiki.com/weekly/360
APT-Hunter : Threat Hunting Tool via Windows Event Log https://shells.systems/introducing-apt-hunter-threat-hunting-tool-via-windows-event-log/
2021-01-25 00:08:17SecWiki周报
2021-01-24 00:07:44SecWiki周报
2021-01-23 00:06:56SecWiki周报
Five86-2靶机渗透实战 https://www.hetianlab.com/specialized/20210115135759
Windows后渗透之权限维持 https://www.sec-in.com/article/794
用PyOD工具库进行「异常检测」 https://zhuanlan.zhihu.com/p/58313521
基于机器学习的敏感信息泄露治理探索 https://mp.weixin.qq.com/s/9ZOSyPJdyxgrbsY4FIvgXw
CVE-2020-16040: Chromium V8引擎整数溢出漏洞分析 https://mp.weixin.qq.com/s/j-WbrCQVb4E2JfY-bDqzJw
2021-01-22 00:06:34SecWiki周报
FAVICONS和缓存:浏览器中的持久跟踪 https://mp.weixin.qq.com/s/K7IesHkuUTV2yAh9_yl6kw
Fuzzing战争系列之二:不畏浮云遮望眼 https://mp.weixin.qq.com/s/G26MJOH4VPene1Sd_zjEQw
2021-01-21 00:05:30SecWiki周报
构造一个CodeDB来探索全新的白盒静态扫描方案 https://lorexxar.cn/2020/10/30/whitebox-2/
针对电话号码信息收集和OSINT框架 https://mp.weixin.qq.com/s/6JzvO58Q05O2NoS9mX_mPQ
从一道CTF题目到非对称加密GPG/PGP的学习 https://www.anquanke.com/post/id/228129
基于抽象语法树和深度学习的高效漏洞检测方法 https://www.anquanke.com/post/id/221892
CVE-2020-2883——WebLogic反序列化初探 https://www.anquanke.com/post/id/227604
校园内网web平台Getshell(下·最终篇) https://www.sec-in.com/article/798
2021-01-20 00:04:52SecWiki周报
记一次反制追踪溯本求源 https://mp.weixin.qq.com/s/xW2u4s8xCTnLCkpDoK5Yzw
以太坊钓鱼合约:因为了解,所以上当 https://mp.weixin.qq.com/s/4zztI9f-pzvLxVFxlVdgMw
关于恶意软件加密流量检测的思考 https://mp.weixin.qq.com/s/hVq3eBMDsX6tj1PsoUpy8Q
常见的匿名化隐私保护技术 https://mp.weixin.qq.com/s/46yaHiXqDpq4cY4W1uqKsQ
Apache Flink漏洞复现 https://www.hetianlab.com/specialized/20210115143514
校园内网web平台的渗透测试(上)无限加分? https://www.sec-in.com/article/778
2021-01-19 00:04:11SecWiki周报
SecWiki周刊(第359期) https://www.sec-wiki.com/weekly/359
Five86-1靶机渗透实战 https://www.hetianlab.com/specialized/20210114134638
2021-01-18 00:03:36SecWiki周报
incaseformat来袭,针对病毒进行分析 https://mp.weixin.qq.com/s/EwExVZqmiLLZ5R3172d2wQ
Netgear固件分析与后门植入 https://mp.weixin.qq.com/s/o9v4V673ayyMTY1vGjveFg
SecWiki安全周刊-年卷-2020 https://mp.weixin.qq.com/s/pI495N48AYbA3gYkf4zlqQ
开源包托管服务存在的供应链安全问题 https://mp.weixin.qq.com/s/DjfldjeqJY786nqdcsXzBg
Cobalt Strike4.0远控木马分析 https://mp.weixin.qq.com/s/Sv0lR4G2eQf4_L8W4CqRYw
深度探索:解除文件占用那些坑 https://anhkgg.com/unlockfile/
局域网监控软件WFilter ICF 鸡肋0day RCE漏洞挖掘 https://drivertom.blogspot.com/2021/01/wfilter-icf-0day-rce.html
基于机器学习的Web管理后台识别方法探索 https://mp.weixin.qq.com/s/vccQcK2GNqWkGuxEGe22Zg
2021-01-17 00:02:58SecWiki周报
API安全测试方法论 https://blog.csdn.net/bloodzero_new/article/details/112479328
2021-01-16 00:02:26SecWiki周报
2020年勒索病毒疫情分析报告 http://zt.360.cn/1101061855.php?dtid=1101062360&did=610740603
初探 Python Flask+Jinja2 SSTI https://www.anquanke.com/post/id/226900
BORG :一个快速进化的僵尸网络 https://security.tencent.com/index.php/blog/msg/175
通过 OpenVPN 实现流量审计 https://green-m.me//2021/01/12/audit-traffic-through-openvpn/
SharePoint Rce 系列分析(三) https://mp.weixin.qq.com/s/Z2hDtlsu0zgKY8YWhDBS7g
SharePoint Rce 系列分析(二) https://mp.weixin.qq.com/s/ZLSFXUoNNAFxqeiD9RpYZg
浅谈绕过disable_functions的部分方法的原理 https://www.anquanke.com/post/id/228712
JSON DataSet for macOS mapped to MITRE ATT&CK Tactics https://github.com/sbousseaden/macOS-ATTACK-DATASET
Js文件追踪到未授权访问 https://www.sec-in.com/article/806
2021-01-15 00:13:40SecWiki周报
关于PDD员工发帖溯源联想到的相关技术与实现 https://mp.weixin.qq.com/s/coRsNLMT_FAr6xSHwPgOUg
Real World CTF 2020 DBaaSadge Writeup https://www.hetianlab.com/specialized/20210112133159
在XML中测试Fastjson反序列化 https://www.sec-in.com/article/810
2021-01-14 00:12:50SecWiki周报
NDSS 2021 论文录用列表 https://mp.weixin.qq.com/s/6QVEJP-Z8s-NgrbNoAiH2Q
自动化渗透测试系统技术路径分析 https://mp.weixin.qq.com/s/gtXfPvT8Yatp3IMVdCID7Q
子域名枚举的艺术——主动子域枚举 https://www.sec-in.com/article/793
又一个流量代理扫描平台 https://misakikata.github.io/2021/01/%E5%8F%88%E5%8F%92%E4%B8%80%E4%B8%AA%E4%BB%A3%E7%90%86%E6%89%AB%E6%8F%8F%E5%B9%B3%E5%8F%B0/
2021-01-13 00:12:07SecWiki周报
2021-01-12 00:11:35SecWiki周报
G.O.S.S.I.P 安全学术会议排行榜(2020版) https://feysh.com/ranking/2020/
组策略限制3389登录的绕过方式 https://mp.weixin.qq.com/s/4eDNmiiXp7afLKdYzHeb3Q
SecWiki周刊(第358期) https://www.sec-wiki.com/weekly/358
拯救圣诞世界 https://www.sec-in.com/article/766
2021-01-11 00:51:17SecWiki周报
使用自己的代码查找漏洞:检测功能相似但不一致的代码 https://mp.weixin.qq.com/s/ELbtEhd1wedkEqhboPpLuQ
基于异构图卷积网络的网络威胁情报建模 https://mp.weixin.qq.com/s/TszbHM__hpYvdHsCoMmkUQ
2021-01-10 00:13:42SecWiki周报
美国国家网络靶场系统架构与设计原理剖析①总论 https://mp.weixin.qq.com/s/8yz12RyCyNXGhcAVFZX60g
2021-01-09 00:13:08SecWiki周报
对 SolarWinds 事件更深的思考:如何防御供应链攻击 https://mp.weixin.qq.com/s/GdER32Z7K86boHVc-Kic3g
浅析开源蜜罐识别与全网测绘 https://mp.weixin.qq.com/s/hq-z2HBGz3nehnCVg_H-RQ
2021-01-08 00:12:30SecWiki周报
Deep X-Ray: 一种机器学习驱动的WAF规则窃取器 https://data.hackinn.com/ppt/CIS2020/%E4%B8%BB%E8%AE%BA%E5%9D%9B/Deep%20X-Ray-%20%E4%B8%80%E7%A7%8D%E6%9C%BA%E5%99%A8%E5%AD%A6%E4%B9%A0%E9%A9%B1%E5%8A%A8%E7%9A%84WAF%E8%A7%84%E5%88%99%E7%AA%83%E5%8F%96%E5%99%A8.pdf
红队视角看Sunburst后门中的TTPs https://mp.weixin.qq.com/s/wtEbawfOd1g_T2ovp1SaGg
隐秘的角落 -- JDK CORBA 安全性研究(下) https://paper.seebug.org/1446/
隐秘的角落 -- JDK CORBA 安全性研究(上) https://paper.seebug.org/1445/
mmpi: 邮件快速检测库 https://github.com/a232319779/mmpi
疑似 APT35 与响尾蛇组织使用的域名被披露 https://mp.weixin.qq.com/s/BNVsnlXYtaZ9_Pk_oKgZRg
一个普通网安从业人员的2020 https://mp.weixin.qq.com/s/PYCIMOk8_wUg7eLFEVOoUQ
技術型管理人的自我成長 https://mp.weixin.qq.com/s/moARUZG3BNOJL7EAiXDMJA
2021-01-07 00:11:51SecWiki周报
2021-01-06 00:01:31SecWiki周报
一次性通过CISSP考试之旅 https://blog.csdn.net/bloodzero_new/article/details/112240136
Kubernetes中使用Helm2的安全风险 http://rui0.cn/archives/1573
2021-01-05 00:16:58SecWiki周报
消费级物联网安全基线 https://github.com/MiSecurity/Cyber-Security-Baseline-for-Consumer-Internet-of-Things/blob/main/resources/pdf/%E6%B6%88%E8%B4%B9%E7%BA%A7%E7%89%A9%E8%81%94%E7%BD%91%E5%AE%89%E5%85%A8%E5%9F%BA%E7%BA%BF.pdf
从访客网络到潜入机房 https://mp.weixin.qq.com/s/T7A7ydK1EaEwNNKnBwN9Aw
2020年下半年全球网络恐怖主义态势分析 https://mp.weixin.qq.com/s/Us54DtL99pdCRErJWvsM8w
ATT&CK 2020更新指南 https://mp.weixin.qq.com/s/cPiVersg8VyK4fBTK8W1Ag
欧盟人工智能的网络安全挑战:人工智能威胁图谱 https://mp.weixin.qq.com/s/4qbCusJde_z0AM1eDC4YiA
实时态势数据驱动的平行仿真推演方法 https://zhuanlan.zhihu.com/p/163628289
通过 ATT&CK 归因攻击 https://mp.weixin.qq.com/s/NSAURU3qpYhhKs8Q8AdBag
SecWiki周刊(第357期) https://www.sec-wiki.com/weekly/357
How to Look for Ideas in Computer Science Research https://zhiyunq.medium.com/how-to-look-for-ideas-in-computer-science-research-7a3fa6f4696f
基于语义token分析的克隆代码检测系统 https://mp.weixin.qq.com/s/e_NvzMbOqDspns3VLXBjYw
2021-01-04 00:17:30SecWiki周报
Windows Lateral Movement Part 2 – DCOM https://www.mdsec.co.uk/2020/09/i-like-to-move-it-windows-lateral-movement-part-2-dcom/
Windows Lateral Movement Part 1 – WMI Event Subscription https://www.mdsec.co.uk/2020/09/i-like-to-move-it-windows-lateral-movement-part-1-wmi-event-subscription/
2021-01-03 00:16:55SecWiki周报
fire_vulnerability_scanner: 一款http协议的漏洞扫描框架 https://github.com/coodyer/fire_vulnerability_scanner
基于Docker的分布式OpenVAS(GVM) https://www.freebuf.com/sectool/259225.html
Vulnerabilities of Machine Learning Infrastructure (Slides/Video) http://www.scada.sl/2020/12/vulnerabilities-of-machine-learning.html
DNSMon: 用DNS数据进行威胁发现(2) https://blog.netlab.360.com/use-dns-data-produce-threat-intelligence-2/
鲲鹏计算专场-WriteUp https://mp.weixin.qq.com/s/S7d-oS_b3Xx688a_jeQC2w
浅谈Mysql蜜罐识别 https://mp.weixin.qq.com/s/f30RvhYlB97dXnjzv4_H_Q
网空靶场:从炒作到现实-2020 https://mp.weixin.qq.com/s/zu2Je_A_x06k78tzrXyjbg
2021-01-02 00:16:11SecWiki周报
2021-01-01 00:15:15SecWiki周报
2020 南京大学 “操作系统:设计与实现” https://www.bilibili.com/video/BV1N741177F5
opencve: CVE Alerting Platform https://github.com/opencve/opencve
MDAT - 综合数据库攻击利用工具 https://github.com/SafeGroceryStore/MDAT
2020-12-31 00:14:39SecWiki周报
基于机器学习的漏洞检测高影响因素实证研究 https://www.anquanke.com/post/id/220795
关于Python病毒样本的分析方法 https://www.anquanke.com/post/id/226721
apkleaks: Scanning APK file for URIs, endpoints & secrets https://github.com/dwisiswant0/apkleaks
reverse engineering course covering x86, x64, ARM https://github.com/mytechnotalent/Reverse-Engineering-Tutorial
AD-Pentest-Notes: 用于记录内网渗透(域渗透)学习 https://github.com/chriskaliX/AD-Pentest-Notes
FreeRTOS Reverse Engineering https://mp.weixin.qq.com/s/mnus1BN1CLX4rhrZ1ubnKQ
2020-12-30 00:14:09SecWiki周报
Using MITRE ATT&CK to Identify an APT Attack https://www.trendmicro.com/vinfo/us/security/news/managed-detection-and-response/using-mitre-att-ck-to-identify-an-apt-attack
静态程序分析入门教程 https://github.com/RangerNJU/Static-Program-Analysis-Book
记一次利用阿D注入渗透实战案例 https://mp.weixin.qq.com/s/DqqQkvZ1gNDyLcyNC2COAQ
2020-12-29 00:20:58SecWiki周报
数据安全建设实践系列——数据资产平台建设 https://mp.weixin.qq.com/s/oofMyBaS7EMnUMy61Y-5MQ
沙虫 https://mp.weixin.qq.com/s/eBTXxLn4NFvLq-nmAAXgyg
安全研究员的自我修养 https://mp.weixin.qq.com/s/BuHQSLLeJ-EMhQSqFLgDgg
JAVA安全编码 https://mp.weixin.qq.com/s/p0SZN87PilFHUmENas6QEg
开源自研HIDS——AgentSmith-HIDS https://mp.weixin.qq.com/s/sAh_VH5zTuxHRFawYMvuOw
JARM : 检测恶意服务器的可靠指纹 https://mp.weixin.qq.com/s/p55LNt9PK0MKEjN3MGPAOg
SecWiki周刊(第356期) https://www.sec-wiki.com/weekly/356
2020-12-28 00:15:59SecWiki周报
浅谈安全运营平台中数据分析交互逻辑的设计 https://zhuanlan.zhihu.com/p/339629476
复杂网络中的节点相似性 https://mp.weixin.qq.com/s/EGpjUVdjJlEjYbdbjbpR7A
聊聊漏洞自动修复技术的行业现状 https://mp.weixin.qq.com/s/xgwdhBSvE7yW0YcekGEWjA
2020-12-27 00:15:31SecWiki周报
发现并提取 Cobalt Strike 的配置信息 https://mp.weixin.qq.com/s/-jajjhu-6KVQvaZoh59Wuw
2020-12-26 00:15:00SecWiki周报
记一次渗透日本某大学实战案例 https://mp.weixin.qq.com/s/FFpyzQQeOAvTRQ0iGtXW5A
溯源反制基本思路与实战 https://mp.weixin.qq.com/s/axNXFgyaD-5WSIkPwjkPrQ
2020-12-25 00:14:22SecWiki周报
爱奇艺SOAR探索与实践 https://mp.weixin.qq.com/s/ovJKGWusN2kgxQ_4GkQ8QA
自动化安全工具平台 https://mp.weixin.qq.com/s/OMhS9yFlcpI9KOQduSxq9g
工业互联网数据安全白皮书(2020) http://www.nisia.org.cn/filedownload/203590
软件供应链来源攻击分析报告 https://mp.weixin.qq.com/s/ypKn7uanv7oSDc4h8zvmgQ
MySQL注入Load_File()函数应用 https://mp.weixin.qq.com/s/nl_xYX5rd1UiIK4t9XYDuA
搞基大队QQ群验证问题解题过程 https://mp.weixin.qq.com/s/BmaflwjC6tghjJlysbtYkg
记传奇私服浏览器劫持的处置方案 https://mp.weixin.qq.com/s/-ckPlrgU3O_WEDmTo3Rbyg
Source Code Audit Training Archive https://blog.recurity-labs.com/2020-12-23/code-audit-training-archive.html
2020-12-24 00:14:33SecWiki周报
聊聊APT的溯源分析 https://mp.weixin.qq.com/s/hSnOYoC71z_HIU4PVf4tmw
细说APT之Rootkit自我保护 https://xz.aliyun.com/t/8675
基于AI的恶意加密流量检测效果专题研究 https://www.aqniu.com/vendor/71886.html
从Solarwinds供应链攻击(金链熊)看APT行动中的隐蔽作战 https://mp.weixin.qq.com/s/UqXC1vovKUu97569LkYm2Q
Analyzing Cobalt Strike for Fun and Profit https://www.randhome.io/blog/2020/12/20/analyzing-cobalt-strike-for-fun-and-profit/
用DNS进行网络度量和安全分析 https://mp.weixin.qq.com/s/L_wDNJtznQvrCyx1Kd1SlQ
SolarWinds失陷服务器测绘分析报告 https://www.anquanke.com/post/id/226029
2020-12-23 00:13:54SecWiki周报
计算机系统研究的一些体会 https://www.bilibili.com/video/BV1Ap4y167w3?p=1
一次众测实战sql注入绕过 https://mp.weixin.qq.com/s/9BXMK4mVNKqQiBRkkiEJWg
2020-12-22 00:13:10SecWiki周报
Exploiting a Single Instruction Race Condition in Binder https://blog.longterm.io/cve-2020-0423.html
HTTP协议攻击方法汇总(下) https://www.anquanke.com/post/id/225955
HTTP协议攻击方法汇总(上) https://www.anquanke.com/post/id/224321
如何查找相关人的信息 https://mp.weixin.qq.com/s/yeuMivJaizmAQAHL1poHTw
Molerats组织滥用云服务的攻击活动分析 https://mp.weixin.qq.com/s/iWYr18hSLBBL4Y1-hAmEeg
AISecOps智能安全运营技术白皮书 http://blog.nsfocus.net/wp-content/uploads/2020/12/AISecOps_White_Paper_NSFOCUS_20201218.pdf
Fortify的使用技巧 https://mp.weixin.qq.com/s/VUg92RSsZRpGPWaPKBWPNQ
2020年综述性论文合辑(下) https://mp.weixin.qq.com/s/c43NfYaz3F-t1V93gOGKdw
2020年综述性论文合辑(上) https://mp.weixin.qq.com/s/e-3rSS2F7lVV9SMMnoqylQ
SecWiki周刊(第355期) https://www.sec-wiki.com/weekly/355
S2-016漏洞整理 https://www.sec-in.com/article/753
记录一次从弱口令到远程登陆 https://mp.weixin.qq.com/s/gzchD7_uKHjvISpSpdxFDw
2020-12-21 00:12:28SecWiki周报
SOREL-20M: Sophos-ReversingLabs 20 million sample dataset https://github.com/sophos-ai/SOREL-20M
2020-12-20 20:52:49SecWiki周报
MSSQL绕过微软杀毒提权案例 https://mp.weixin.qq.com/s/GceeUFbwsaHUwKQpY6VFkw
2020-12-19 00:06:54SecWiki周报
domainNamePredictor: 公司域名使用规律预测及生成工具 https://github.com/LandGrey/domainNamePredictor
记一次攻防演习渗透过程 https://gh0st.cn//archives/2020-11-22/1
攻击推理:基于攻击溯源图的威胁评估技术 http://blog.nsfocus.net/threat-assessment-1209/
LibFuzzer workshop学习之路 https://www.anquanke.com/post/id/224823
CVE-2020-15257 containerd-shim Exploit https://www.cdxy.me/?p=837
越权扫描器碎碎念 http://pirogue.org/2020/12/14/bacscanner/
越权扫描器碎碎念 https://mp.weixin.qq.com/s/yMpAiue7OT1I8E3C5Dkngw
我的应用安全方法论:路在脚下 https://mp.weixin.qq.com/s/atfMoXjxccUfrZbFsULiRg
GetShell的姿势总结 https://www.sec-in.com/article/743
2020-12-18 00:06:34SecWiki周报
利用JARM指纹进行TLS服务端标记 https://mp.weixin.qq.com/s/CTBO22SuQft1dBoHv2WRQg
FuzzingPaper: Recent Fuzzing Paper https://github.com/wcventure/FuzzingPaper
吐槽国内对SolarWinds事件的分析 https://mp.weixin.qq.com/s/ytm62hJ59XIDi-QRlZTfEg
NIST、CIS、MITRE、SANS 傻傻分不清楚 https://mp.weixin.qq.com/s/wZF3TAVPr5t2KxMi_Gc2-w
吐槽《吐槽国内对SolarWinds事件的分析》 https://weibo.com/ttarticle/x/m/show/id/2309404582616916688901
数据安全探索与实践 https://mp.weixin.qq.com/s/yGLrdlpSmEe5ChiVn4b8Kg
SolarWinds事件八卦解读 https://mp.weixin.qq.com/s/aWZ0mrapJTpHwL0nBnGhmg
2020安全漏洞年报 http://pub-shbt.s3.360.cn/cert-public-file/2020%E5%AE%89%E5%85%A8%E6%BC%8F%E6%B4%9E%E5%B9%B4%E6%8A%A5.pdf
命令注入靶场空格过滤绕过测试 https://mp.weixin.qq.com/s/pdU1XnBhnxRRGlncY3pDxQ
[SCUCTF新生赛2020]RE部分WP http://blog.bluesadi.cn:4000/2020/11/26/SCUCTF-2020%E6%96%B0%E7%94%9F%E8%B5%9B-RE%E9%83%A8%E5%88%86WP/
某系统Oracle+Bypass盲注 https://www.sec-in.com/article/750
2020-12-17 00:02:18SecWiki周报
linux库说明以及如何修改动态链接库 https://www.sec-in.com/article/725
DeepDi: A Fast and Accurate Disassembler for Binary Code AI https://www.deepbitstech.com/deepdi.html
2020-12-16 00:01:40SecWiki周报
落鹰行动-史上影响力最大的供应链攻击行动揭秘 https://mp.weixin.qq.com/s/lh7y_KHUxag_-pcFBC7d0Q
网络空间测绘技术之:协议识别(RDP篇) https://zhuanlan.zhihu.com/p/336936793
简单聊聊网络空间测绘纵横之道 https://mp.weixin.qq.com/s/aBvptjz9gzxG_lPBY8ECVA
基于静态依赖分析的安卓GUI自动化探测方法 https://mp.weixin.qq.com/s/YQDxUqo_ufjt3cuDNOUfwQ
巧用Zeek在流量层狩猎哥斯拉Godzilla https://www.anquanke.com/post/id/224831
Go恶意样本分析 https://mp.weixin.qq.com/s/22HqoBW-eVSf1Fzw7fxoFw
2020-12-15 10:21:43SecWiki周报
SecWiki周刊(第354期) https://www.sec-wiki.com/weekly/354
ASPX之黑名单上传限制的绕过 https://mp.weixin.qq.com/s/FMZQpn9ck3bbPLUgdLDXUw
2020-12-14 00:09:34SecWiki周报
FireEye红队工具失窃事件跟进分析 https://mp.weixin.qq.com/s/X-bBV44nMQvDlnl6f4eX7Q
高效工作 https://www.yuque.com/zenany/up/high_productivity_work
各国数据隐私与保护情况 https://mp.weixin.qq.com/s/B061CcZsJKavNEj_ggkRLQ
2020-12-13 00:01:10SecWiki周报
说说APT https://card.weibo.com/article/m/show/id/2309404580597770092748?_wb_client_=1
逆向智能门锁漏洞分析PART(二) https://mp.weixin.qq.com/s/IutPFguZmNvPZd5XrlK6Mg
黑吃黑Getshell到提权实战案例 https://mp.weixin.qq.com/s/Hr-ybKz2CbG4yyTpww23rA
2020-12-12 00:19:48SecWiki周报
serverless functions攻防初探 https://www.cdxy.me/?p=836
SharePoint Rce 系列分析(一) https://mp.weixin.qq.com/s/FfHc8TFUs_4H8JHWbYv3FQ
红蓝对抗之Linux内网渗透 https://security.tencent.com/index.php/blog/msg/174
玩转容器安全三 - Harbor私有镜像仓库 https://blog.csdn.net/bloodzero_new/article/details/111055044
邮件攻防--宏免杀姿势1 http://wolvez.club/2020/12/10/mailsec01/
SQL注入渗透PostgreSQL(bypass tricks) https://xz.aliyun.com/t/8621
从mimikatz学Windows本地hash抓取 https://xz.aliyun.com/t/8601
逆向智能门锁漏洞分析PART(一) https://mp.weixin.qq.com/s/pIeV3uNfRzAYggxRSo7P_g
BypassAv小技巧 https://www.sec-in.com/article/733
Kerberos Bronze Bit Attack (CVE-2020-17049) Scenarios to Potentially Compromise https://www.hub.trimarcsecurity.com/post/leveraging-the-kerberos-bronze-bit-attack-cve-2020-17049-scenarios-to-compromise-active-directory
2020-12-11 00:18:11SecWiki周报
数据安全怎么做——静态敏感数据治理 https://mp.weixin.qq.com/s/AejcWwJWxZWHf9dDRfVWPA
月饼计划之XSS https://www.sec-in.com/article/585
FireEye红队工具失窃事件分析和思考 https://mp.weixin.qq.com/s/fkH9TZKOcWb_Ttvl-VlA4w
从FireEye的泄露看红队的差距 https://mp.weixin.qq.com/s/K2W-hgCUFOzgxrhF6U1s1A
2020-12-10 00:06:35SecWiki周报
中间件内存马注入&冰蝎连接 https://mp.weixin.qq.com/s/eI-50-_W89eN8tsKi-5j4g
从 CVE-2020-17144 看实战环境的漏洞武器化 https://mp.weixin.qq.com/s/nVtE-OFoO076x6T0147AMw
30行代码搞定Monero活跃节点探测 https://mp.weixin.qq.com/s/omsTd3q5tOkknfK35tXGXg
FireEye RedTeam 被黑了 https://mp.weixin.qq.com/s/WupcVZATcNkKE93XcgJ4qg
Spring全家桶各类RCE漏洞浅析 https://mp.weixin.qq.com/s/gfCtSJoefYLjJpaksbKLrQ
红队中易被攻击的一些重点系统漏洞整理 https://github.com/r0eXpeR/redteam_vul
实战-站库分离拿下WebShell https://xz.aliyun.com/t/8584
基于AI的暗网流量检测识别效果专题研究 http://cyberopportunity.cn/?p=1280
2020-12-09 00:10:33SecWiki周报
RoarCTF-WriteUp https://mp.weixin.qq.com/s/Ipy-PCnxQWlctQk1oI9arw
记一次St2-045的绕过 https://www.sec-in.com/article/550
针对以色列水利/水务基础设施的网络攻击回顾 https://mp.weixin.qq.com/s/XvPf_irbpZF6B0-fnn1OBA
2020-12-08 00:11:06SecWiki周报
中国网络安全公司资本关系图谱 V2.0 https://mp.weixin.qq.com/s/cv8z0791TLrVG2HYKY1pdg
SecWiki周刊(第353期) https://www.sec-wiki.com/weekly/353
2020-12-07 00:04:47SecWiki周报
EHole: (棱洞)-红队重点攻击系统指纹探测工具 https://github.com/ShiHuang-ESec/EHole
手机app数据画像分析技战法 https://mp.weixin.qq.com/s/FdOeOC6JZE5a0r328nmtew
红蓝对抗中的溯源反制实战 https://mp.weixin.qq.com/s/Dswz7lxNpW5yLxmWKtqY6Q
CAPEv2: Malware Configuration And Payload Extraction https://github.com/kevoreilly/CAPEv2
云安全威胁检测项 https://help.aliyun.com/document_detail/191144.html
Mapping ATT&CK Data Sources to Security Events via OSSEM https://medium.com/threat-hunters-forge/mapping-att-ck-data-sources-to-security-events-via-ossem-%EF%B8%8F-b606d99e738c
2020-12-06 00:06:08SecWiki周报
2020-12-05 00:04:08SecWiki周报
玩转graphQL https://mp.weixin.qq.com/s/gp2jGrLPllsh5xn7vn9BwQ
内网技巧-RDP劫持及利用hash登录 https://xz.aliyun.com/t/8574
As-Exploits: 中国蚁剑后渗透框架 https://xz.aliyun.com/t/8591
云安全(一) - 浅谈基于IaaS公有云的中小型企业基础安全建设 https://blog.csdn.net/bloodzero_new/article/details/110670478
Attribution: A Puzzle 攻击归因 https://blog.talosintelligence.com/2020/08/attribution-puzzle.html
基于Codesys工控软PLC环境 https://mp.weixin.qq.com/s/28BgVoIt7Naij84HEDqtFQ
MITRE ATT&CK基本概念 https://mp.weixin.qq.com/s/yOJNWazCeGKKMR8titj3cg
针对AWS Lambda的运行时攻击 https://mp.weixin.qq.com/s/duF1Z0EDC3n_G378Aq_XYA
APT annual review: What the world's threat actors got up to in 2020 https://securelist.com/apt-annual-review-what-the-worlds-threat-actors-got-up-to-in-2020/99574/
2020-12-04 00:03:51SecWiki周报
WebLogicPasswordDecryptor - 解密 WebLogic 密文 https://github.com/Ch1ngg/WebLogicPasswordDecryptorUi
python代码审计-osroom https://www.sec-in.com/article/709
A Modern Exploration of Windows Memory Corruption Exploits - Part I https://www.forrest-orr.net/post/a-modern-exploration-of-windows-memory-corruption-exploits-part-i-stack-overflows
2020-12-03 00:02:40SecWiki周报
Precise and Scalable Static Bug Finding for Industrial-Sized Code https://qingkaishi.github.io/public_pdfs/thesis.pdf
how2heap注意点总结-上 https://www.sec-in.com/article/722