http://p2.qhimg.com/t01ee0ded1a480b06ce.jpg

1、powershell版的netcat更新

https://github.com/secabstraction/PowerCat

2、Mobile Security Certificate Pinning

http://blog.dewhurstsecurity.com/2015/11/10/mobile-security-certificate-pining.html


3、angular表达式注入漏洞练习

http://ryhanson.com/angular-expression-injection-vulnerability/

4、数字取证:ntfs元数据时间线建立

http://countuponsecurity.com/2015/11/10/digital-forensics-ntfs-metadata-timeline-creation/


5、剖析IoT hack(Avast研究员黑了vizio智能电视获取家庭网络的访问权限)

https://blog.avast.com/2015/11/11/the-anatomy-of-an-iot-hack/

6、将GasPot代码加入到ICS蜜罐中

http://blog.trendmicro.com/trendlabs-security-intelligence/gaspot-integrated-into-conpot-contributing-to-open-source-ics-research/


7、FireEye报告:分析DLL side-loading技术

https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-dll-sideloading.pdf

8、proftpd的https/ftps协议混乱导致XSS

http://bugs.proftpd.org/show_bug.cgi?id=4143#c0

https://var.thejh.net/http_ftp_cross_protocol_mitm_attacks.pdf


9、通过智能手表识别和跟踪你触摸过的任何物体

http://www.disneyresearch.com/wp-content/uploads/EMSense-Recognizing-Handled-Uninstrumented-Electro-Mechanical-Objects-Using-Software-Defined-Radio-Paper.pdf

10、革命性的设备检测Mimikatz使用

http://blog.cobaltstrike.com/2015/11/11/revolutionary-device-detects-mimikatz-use/


11、欺骗谷歌身份验证TOTP与NTP(第一部分)

https://blog.gaborszathmari.me/2015/11/11/tricking-google-authenticator-totp-with-ntp/

12、Microsoft .NET Framework XSS / 提权漏洞 CVE-2015-6099

http://www.securityfocus.com/archive/1/536875


13、PacSecJP会议PPT:攻击MPLS网络

http://www.slideshare.net/PacSecJP/georgi-geshev-warranty-void-if-label-removed

文章原文链接:https://www.anquanke.com/post/id/82897