1、powershell版的netcat更新
https://github.com/secabstraction/PowerCat
2、Mobile Security Certificate Pinning
http://blog.dewhurstsecurity.com/2015/11/10/mobile-security-certificate-pining.html
3、angular表达式注入漏洞练习
http://ryhanson.com/angular-expression-injection-vulnerability/
4、数字取证:ntfs元数据时间线建立
http://countuponsecurity.com/2015/11/10/digital-forensics-ntfs-metadata-timeline-creation/
5、剖析IoT hack(Avast研究员黑了vizio智能电视获取家庭网络的访问权限)
https://blog.avast.com/2015/11/11/the-anatomy-of-an-iot-hack/
6、将GasPot代码加入到ICS蜜罐中
7、FireEye报告:分析DLL side-loading技术
8、proftpd的https/ftps协议混乱导致XSS
http://bugs.proftpd.org/show_bug.cgi?id=4143#c0
https://var.thejh.net/http_ftp_cross_protocol_mitm_attacks.pdf
9、通过智能手表识别和跟踪你触摸过的任何物体
10、革命性的设备检测Mimikatz使用
http://blog.cobaltstrike.com/2015/11/11/revolutionary-device-detects-mimikatz-use/
11、欺骗谷歌身份验证TOTP与NTP(第一部分)
https://blog.gaborszathmari.me/2015/11/11/tricking-google-authenticator-totp-with-ntp/
12、Microsoft .NET Framework XSS / 提权漏洞 CVE-2015-6099
http://www.securityfocus.com/archive/1/536875
http://www.slideshare.net/PacSecJP/georgi-geshev-warranty-void-if-label-removed
文章原文链接:https://www.anquanke.com/post/id/82897