http://p2.qhimg.com/t01ee0ded1a480b06ce.jpg

1、sector 2015会议PPT以及视频

http://sector.ca/presentations

2、NIST发行移动的安全设备

https://nccoe.nist.gov/projects/building_blocks/mobile_device_security

3、免费在线的SSL/TLS服务测试工具

https://www.htbridge.com/ssl/

4、使用python/twiste剖析Microsoft SQL Server加密认证

http://blog.thinkst.com/2015/11/stripping-encryption-from-microsoft-sql.html

5、新钓鱼恶意工具包的后门技术分析

http://blog.phishlabs.com/new-phish-kit-backdoor-techniques-the-dufresne-and-the-vezzini

6、webGun:一款在线的XSS PAYLOAD构造工具

http://brutelogic.com.br/webgun/

7、欺诈软件“离线"加密你的数据不再和CC通信了

http://blog.checkpoint.com/2015/11/04/offline-ransomware-encrypts-your-data-without-cc-communication/

8、移动设备的passcode和生物识别是如何处理的?(第二部分的)

https://pen-testing.sans.org/blog/pen-testing/2015/11/04/whats-the-deal-with-mobile-device-passcodes-and-biometrics-part-2-of-2

9、捕捉dridex C2信息

https://www.vanimpe.eu/2015/11/01/hunting-dridex-c2-info/

10、carder如何使用EBAY作为虚拟ATM的

http://krebsonsecurity.com/2015/11/how-carders-can-use-ebay-as-a-virtual-atm/

11、OpenCanary:一个基于python的蜜罐

https://speakerdeck.com/pyconza/pyconza-2015-opencanary-a-new-python-based-honeypot-by-azhar-desai

12、shifu银行木马尝试绕过FortiSandbox沙盒

http://blog.fortinet.com/post/a-tale-of-shifu-and-its-attempt-to-bypass-fortisandbox

13、分析Dyreza(账户信息窃取工具)所使用的技术

https://blog.malwarebytes.org/intelligence/2015/11/a-technical-look-at-dyreza/

文章原文链接:https://www.anquanke.com/post/id/82853