-
-
[分享]专注Web及移动安全[红日安全16期]
-
发表于: 2017-7-25 16:01 2716
-
渗透测试,web安全动态 2017/7/9-2017/7/16 -安全文章 -安全漏洞 -移动安全 -代码审计 安全动态 安全技能 资源与工具分享 安全动态[Security_week] 网络安全生态峰会开始报名啦! [Security_week] 网信办发布《关键信息基础设施安全保护条例(征求意见稿)》全文 [Security_week] 移动APP更要注重网络安全,也要及时开展等保工作 [Security_week] 大国或已暗地打响网络战 有必要出台网络战规则! [Security_week] MSRC-Security-Research - 微软 MSRC 团队近几年演讲资料的汇总 [Security_week] 再谈勒索软件的防御 [Security_week] R 语言基础入门 [Security_week] Python Web 框架介绍 [Security_week] 信息安全漏洞周报(2017年第27期) [Security_week] 安全客 2017 季刊第二期 [Security_week] 安全预警:VMware虚拟机逃逸利用工具已在网上大规模流传,用户请尽快更新 665K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8#2K9h3y4G2L8$3I4Q4x3X3g2U0L8$3#2Q4x3V1k6S2M7Y4c8A6j5$3I4W2M7#2)9J5c8X3A6q4y4%4u0W2K9e0j5`. [Security_week] 架构师之路:一个架构师需要掌握的知识技能 ebeK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6W2K9i4A6Z5j5h3&6Q4x3X3f1#2x3h3y4@1L8#2)9J5k6h3y4G2L8g2)9J5c8X3q4J5N6r3W2U0L8r3g2Q4x3V1k6$3K9h3g2%4i4K6u0r3y4e0V1I4y4o6t1#2y4K6N6X3x3X3c8V1z5o6M7@1k6h3j5#2y4e0M7I4k6h3b7I4 [Security_week] 开发安全的 API 所需要核对的清单 64cK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6K6K9r3W2W2L8r3c8X3P5g2)9J5c8V1q4b7d9g2)9J5k6q4y4W2j5%4g2J5K9i4c8&6i4K6u0V1b7$3S2W2j5$3E0D9K9i4y4@1i4K6u0r3j5X3I4G2j5W2)9J5c8X3#2S2M7%4c8W2M7W2)9J5c8W2u0q4b7f1c8y4c8g2)9J5k6s2A6Z5i4K6u0W2L8h3b7`. 安全技能[Security_technology] Windows平台运行Masscan和Nmap 91aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6e0c8Z5L8%4g2Q4x3X3g2U0L8$3#2Q4x3V1k6H3k6h3&6W2N6s2u0S2N6r3W2G2L8W2)9J5c8U0j5I4y4K6y4Q4x3X3g2Z5N6r3#2D9 [Security_technology] Splash SSRF到获取内网服务器ROOT权限 ff7K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6^5K9h3q4F1P5X3S2A6i4K6u0W2j5h3I4A6P5i4g2F1i4K6u0W2j5$3!0E0i4K6u0r3k6X3!0J5N6h3#2Q4x3V1k6J5k6h3q4V1i4K6u0r3x3e0R3%4x3W2)9J5k6h3S2@1L8h3H3`. [Security_technology] Splunk学习与实践(审计工具) 747K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0M7q4)9J5k6i4N6W2K9i4S2A6L8W2)9J5k6i4q4I4i4K6u0W2j5$3!0E0i4K6u0r3M7#2)9J5c8V1)9#2d9Y4c8Q4x3X3c8p5c8s2m8K6K9$3W2E0k6Y4Z5^5K9@1S2#2L8W2Z5^5f1b7`.`. [Security_technology] Memcached -一个故事失败的修补和脆弱的服务器 656K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2@1j5h3I4G2M7$3W2F1N6r3g2D9L8r3W2Y4k6h3&6U0k6g2)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3e0N6Q4x3V1j5H3y4#2)9J5c8X3#2W2L8h3y4S2j5$3S2W2k6q4)9J5k6s2m8S2N6r3y4Z5i4K6u0V1k6X3q4A6L8s2g2J5k6g2)9J5k6h3S2@1L8h3I4Q4x3U0y4E0L8%4u0W2 [Security_technology] 在使用Burp Scanner的Web应用程序脆弱性分析 49cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3S2S2j5$3E0A6L8X3N6S2M7Y4c8A6j5$3I4W2M7#2)9J5k6h3W2F1i4K6u0r3N6Y4g2D9L8X3g2J5j5h3u0A6L8r3W2@1P5g2)9J5k6r3q4F1j5h3I4&6M7$3W2K6i4K6u0V1N6$3g2T1i4K6u0V1j5i4m8H3L8r3W2U0j5i4c8A6L8$3&6Q4x3X3c8#2M7$3W2F1k6#2)9J5k6r3u0#2M7Y4m8Q4x3X3c8K6j5$3q4F1L8X3g2J5i4K6u0r3 [Security_technology] Inject All the Things fcfK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6Q4x3X3g2V1k6h3&6A6j5h3u0D9k6g2)9J5k6h3!0J5k6#2)9J5c8X3u0D9L8$3N6Q4x3V1j5J5x3o6p5%4i4K6u0r3x3o6N6Q4x3V1j5I4y4W2)9J5c8X3W2F1K9X3g2U0N6q4)9J5k6r3q4D9L8q4)9J5k6s2c8Z5k6g2)9J5k6s2c8Z5K9h3&6Y4M7#2)9J5c8R3`.`. [Security_technology] Apache Structs2 S2-048 漏洞动态分析 [Security_technology] 谈谈关于PHP的代码安全相关的一些致命知识 [Security_technology] 美10余家电力企业遭模板注入攻击 [Security_technology] [翻译]现代Web中的JSON劫持 [Security_technology] [翻译]SQL注入新手教程(第二部分) [Security_technology] 能能实战:Jenkins(cve-2017-1000353)反序列化命令执行漏洞验证 [Security_technology] 干货丨从浅层模型到深度模型:概览机器学习优化算法 [Security_technology] 利用 CreateRestrictedToken API Bypass AppLocker [Security_technology] Cisco Talos 团队对利用 Word 模板注入攻击基础设施的分析 [Security_technology] Poppler PDF 存在多个 RCE 漏洞,成功利用可以完全控制用户计算机 [Security_technology] Active Directory中获取域管理员权限的攻击方法 [Security_technology] 常见端口转发工具的使用方式(二) [Security_technology] 关于IP,这里有你想知道的一切!(中篇) [Security_technology] 分享下android下使用的渗透工具(介绍) [Security_technology] Linux安全——iptables(七) [Security_technology] Struts2 S2-048高危漏洞复现!详解几个漏洞攻击载荷利用的对比分析 [Security_technology] 密码破解那些事 工具与资源[Security_tools] Android_Kernel_CVE_POCs CVE-2017-8260 CVE-2017-0705 CVE-2017-8259 [Security_tools] CANAPE.Core - 跨平台的网络协议测试库 [Security_tools] Android_Kernel_CVE_POCs CVE-2017-8260 CVE-2017-0705 CVE-2017-8259 [Security_tools] CANAPE.Core - 跨平台的网络协议测试库 [Security_tools] salt-scanner - 基于 Salt Open 和 Vulners audit API 的 Linux 漏洞扫描器 [Security_tools] 《深入理解Android热修复技术原理》 [Security_tools] w8scan 一款模仿bugscan的扫描器 [Security_tools] SlackShell - 基于 Slack API 的 PowerShell 版本 C&C 命令控制实现 [Security_tools] Winpayloads - 基于 Python2.7 编写的免杀 Windows Payload 生成器 [Security_tools] objection - SensePost 公开的基于 Frida 的 iOS APP Runtime 探测工具,可以向 APP 中注入对象执行代码 [Security_tools] 目录扫描工具 [Security_tools] T50-最快混合包注入器工具 [Security_tools] Burp Vulners Scanner -漏洞扫描器 |