<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第264期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第264期）</strong></h5>
<blockquote> 2019/03/18-2019/03/24</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[人物]&nbsp;&nbsp;</span>宋克亚 ：商业银行渗透测试体系建设思考<br><a target="_blank" href="https://mp.weixin.qq.com/s/xiZvVANcJF4qeG8Tce5iGw">https://mp.weixin.qq.com/s/xiZvVANcJF4qeG8Tce5iGw</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>从一份起诉书看美国开源情报的实战应用<br><a target="_blank" href="https://mp.weixin.qq.com/s/DoHc7G0yyW6iyORR0zxBBg">https://mp.weixin.qq.com/s/DoHc7G0yyW6iyORR0zxBBg</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>2018年度网安上市公司最新数据<br><a target="_blank" href="https://mp.weixin.qq.com/s/vCZQNrbEo-sFBTQoBF8x1g">https://mp.weixin.qq.com/s/vCZQNrbEo-sFBTQoBF8x1g</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>美公布2020财年预算 国防部96亿美元资助网络活动<br><a target="_blank" href="https://mp.weixin.qq.com/s/FHPhXYTeDlkAZ42N7-XVaQ">https://mp.weixin.qq.com/s/FHPhXYTeDlkAZ42N7-XVaQ</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>自动监控目标子域，助你快速挖洞——Sublert<br><a target="_blank" href="https://nosec.org/home/detail/2363.html">https://nosec.org/home/detail/2363.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>OSCP备考指南<br><a target="_blank" href="https://www.lshack.cn/656/">https://www.lshack.cn/656/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>国际上跟暗网业务相关的厂商<br><a target="_blank" href="https://mp.weixin.qq.com/s/ehO5UWBlGuLmFCSPef_oyw">https://mp.weixin.qq.com/s/ehO5UWBlGuLmFCSPef_oyw</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>OUTLOOK.COM 存储型XSS漏洞挖掘<br><a target="_blank" href="https://omespino.com/write-up-1000-usd-in-5-minutes-xss-stored-in-outlook-com-ios-browsers/">https://omespino.com/write-up-1000-usd-in-5-minutes-xss-stored-in-outlook-com-ios-browsers/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>MySQLMonitor: MySQL实时监控工具（黑盒测试辅助工具）<br><a target="_blank" href="https://github.com/TheKingOfDuck/MySQLMonitor">https://github.com/TheKingOfDuck/MySQLMonitor</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>异常检测的N种方法<br><a target="_blank" href="https://mp.weixin.qq.com/s/kv-ZrOF4nnxXoQwFOodzjA">https://mp.weixin.qq.com/s/kv-ZrOF4nnxXoQwFOodzjA</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>使用 Docker 搭建 EFK<br><a target="_blank" href="https://blog.forecho.com/use-efk.html">https://blog.forecho.com/use-efk.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>WordPress-5.1.1-CSRF-To-RCE安全事件详析 <br><a target="_blank" href="http://blog.topsec.com.cn/archives/3759">http://blog.topsec.com.cn/archives/3759</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>一篇报告了解国内首个针对加密流量的检测引擎<br><a target="_blank" href="https://www.aqniu.com/tools-tech/45207.html">https://www.aqniu.com/tools-tech/45207.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Snare 与 Tanner——下一代高级 Web 蜜罐把玩 <br><a target="_blank" href="http://phantom0301.cc/2019/03/13/snare-and-tanner/">http://phantom0301.cc/2019/03/13/snare-and-tanner/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Orc - Bash 开发的 Linux 后渗透测试框架<br><a target="_blank" href="https://github.com/zMarch/Orc">https://github.com/zMarch/Orc</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Ghidra 从 XXE 到 RCE<br><a target="_blank" href="https://xlab.tencent.com/cn/2019/03/18/ghidra-from-xxe-to-rce/">https://xlab.tencent.com/cn/2019/03/18/ghidra-from-xxe-to-rce/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>ICS安全工具系列3.1：多功能安全工具<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/60080122">https://zhuanlan.zhihu.com/p/60080122</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>委内瑞拉大规模停电事件的初步分析与思考启示<br><a target="_blank" href="https://www.4hou.com/other/16826.html">https://www.4hou.com/other/16826.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>堡垒机：爱奇艺海量服务器安全运维平台的建设<br><a target="_blank" href="https://mp.weixin.qq.com/s/TGswXl9cuwlRmaVsZs46hA">https://mp.weixin.qq.com/s/TGswXl9cuwlRmaVsZs46hA</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>ICS安全工具系列3.3：网络流量检测工具<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/60091755">https://zhuanlan.zhihu.com/p/60091755</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>新的采矿蠕虫PsMiner使用多个高风险漏洞进行传播<br><a target="_blank" href="https://blog.360totalsecurity.com/en/new-mining-worm-psminer-uses-multiple-high-risk-vulnerabilities-to-spread/">https://blog.360totalsecurity.com/en/new-mining-worm-psminer-uses-multiple-high-risk-vulnerabilities-to-spread/</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>SecWiki周刊（第263期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/263">https://www.sec-wiki.com/weekly/263</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>浅谈RASP技术攻防之基础篇<br><a target="_blank" href="https://www.03sec.com/3237.shtml">https://www.03sec.com/3237.shtml</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>在没有 root 或越狱的情况下绕过通用保护机制 <br><a target="_blank" href="https://www.slideshare.net/abrahamaranguren/pwning-mobile-apps-without-root-or-jailbreak-136622746">https://www.slideshare.net/abrahamaranguren/pwning-mobile-apps-without-root-or-jailbreak-136622746</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>跨域方式及其产生的安全问题<br><a target="_blank" href="https://xz.aliyun.com/t/4470">https://xz.aliyun.com/t/4470</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>小师妹聊安全标准<br><a target="_blank" href="https://www.freebuf.com/articles/es/197825.html">https://www.freebuf.com/articles/es/197825.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>浅析MS Excel武器化<br><a target="_blank" href="https://xz.aliyun.com/t/4426">https://xz.aliyun.com/t/4426</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Elasticsearch 安全防护<br><a target="_blank" href="https://elasticsearch.cn/slides/181">https://elasticsearch.cn/slides/181</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2019–5420 and defence-in-depth<br><a target="_blank" href="https://blog.pentesterlab.com/cve-2019-5420-and-defence-in-depth-b502a64a80dd">https://blog.pentesterlab.com/cve-2019-5420-and-defence-in-depth-b502a64a80dd</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>探究PHP中的Mkdir函数 <br><a target="_blank" href="http://blog.topsec.com.cn/archives/3789">http://blog.topsec.com.cn/archives/3789</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>.NET高级代码审计（第一课）XmlSerializer反序列漏洞<br><a target="_blank" href="https://xz.aliyun.com/t/4374">https://xz.aliyun.com/t/4374</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>ICS安全工具系列3.2：攻击指标（IOC）检测工具<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/60080388">https://zhuanlan.zhihu.com/p/60080388</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Elasticsearch 百亿级实时查询优化实战<br><a target="_blank" href="https://mp.weixin.qq.com/s/UV6NoI6-Y3Zh4BR-m5jP8w">https://mp.weixin.qq.com/s/UV6NoI6-Y3Zh4BR-m5jP8w</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>分析攻击俄罗斯及乌克兰金融机构的恶意软件 BUHTRAP 泄漏的源码<br><a target="_blank" href="https://blog.dcso.de/pegasus-buhtrap-analysis-of-the-malware-stage-based-on-the-leaked-source-code/">https://blog.dcso.de/pegasus-buhtrap-analysis-of-the-malware-stage-based-on-the-leaked-source-code/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>国际黑产组织针对部分东亚国家金融从业者攻击活动的报告<br><a target="_blank" href="https://mp.weixin.qq.com/s/S0D3GPmhOKu65KAPpL_i_g">https://mp.weixin.qq.com/s/S0D3GPmhOKu65KAPpL_i_g</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Critical zero-day vulnerability fixed in WordPress Easy WP SMTP plugin.<br><a target="_blank" href="https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/">https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Exploiting OGNL Injection in Apache Struts<br><a target="_blank" href="https://pentest-tools.com/blog/exploiting-ognl-injection-in-apache-struts/">https://pentest-tools.com/blog/exploiting-ognl-injection-in-apache-struts/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span> 绕过Windows Defender的“繁琐”方法<br><a target="_blank" href="https://nosec.org/home/detail/2373.html">https://nosec.org/home/detail/2373.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Markdown协作平台HackMD的蠕虫型XSS<br><a target="_blank" href="https://nosec.org/home/detail/2349.html">https://nosec.org/home/detail/2349.html</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>安全学术研究者群体分析<br><a target="_blank" href="https://mp.weixin.qq.com/s/TkFFORXP3H7IubOfyTrRDQ">https://mp.weixin.qq.com/s/TkFFORXP3H7IubOfyTrRDQ</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>.NET高级代码审计（第四课） JavaScriptSerializer反序列化漏洞<br><a target="_blank" href="https://www.anquanke.com/post/id/173652">https://www.anquanke.com/post/id/173652</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>实例讲解Apache Struts框架OGNL注入漏洞<br><a target="_blank" href="https://nosec.org/home/detail/2354.html">https://nosec.org/home/detail/2354.html</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>2018年度工业信息安全形势分析<br><a target="_blank" href="http://www.etiri.com.cn/etiri-edit/kindeditor/attached/file/20190318/20190318130339_26274.pdf">http://www.etiri.com.cn/etiri-edit/kindeditor/attached/file/20190318/20190318130339_26274.pdf</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>sega genesis rom hacking with ghidra<br><a target="_blank" href="https://zznop.github.io/romhacking/2019/03/14/sega-genesis-rom-hacking-with-ghidra.html">https://zznop.github.io/romhacking/2019/03/14/sega-genesis-rom-hacking-with-ghidra.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>IoT-Implant-Toolkit：一款针对IoT设备的木马测试工具<br><a target="_blank" href="https://www.freebuf.com/sectool/198174.html">https://www.freebuf.com/sectool/198174.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>PHP7和PHP5在安全上的区别<br><a target="_blank" href="https://nosec.org/home/detail/2375.html">https://nosec.org/home/detail/2375.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Spotless Sandboxes: Evading Malware Analysis Systems using Wear-and-Tear Artifac<br><a target="_blank" href="http://zeroyu.xyz/2019/03/20/Spotless-Sandboxes/">http://zeroyu.xyz/2019/03/20/Spotless-Sandboxes/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Denial of service in Facebook Fizz due to integer overflow (CVE-2019-3560)<br><a target="_blank" href="https://lgtm.com/blog/facebook_fizz_CVE-2019-3560">https://lgtm.com/blog/facebook_fizz_CVE-2019-3560</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>.NET高级代码审计（第三课）Fastjson反序列化漏洞<br><a target="_blank" href="https://www.anquanke.com/post/id/173151">https://www.anquanke.com/post/id/173151</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>驱动人生某样本分析<br><a target="_blank" href="http://0cx.cc/Drivers_Trojan_analysis.jspx">http://0cx.cc/Drivers_Trojan_analysis.jspx</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>智能门锁移动互联网安全风险及加固策略研析<br><a target="_blank" href="https://www.kiwisec.com/news/detail/5c90c33cc649181e28b81ef6.html">https://www.kiwisec.com/news/detail/5c90c33cc649181e28b81ef6.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Hamburglar: collect useful information from urls, directories, and files<br><a target="_blank" href="https://github.com/needmorecowbell/Hamburglar">https://github.com/needmorecowbell/Hamburglar</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Analysis of a Chrome Zero Day: CVE-2019-5786 <br><a target="_blank" href="https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/analysis-of-a-chrome-zero-day-cve-2019-5786/">https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/analysis-of-a-chrome-zero-day-cve-2019-5786/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>RCE in Slanger, a Ruby implementation of Pusher<br><a target="_blank" href="https://www.honoki.net/2019/03/rce-in-slanger-0-6-0/">https://www.honoki.net/2019/03/rce-in-slanger-0-6-0/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Writing a Custom Shellcode Encoder<br><a target="_blank" href="https://medium.com/@0x0FFB347/writing-a-custom-shellcode-encoder-31816e767611">https://medium.com/@0x0FFB347/writing-a-custom-shellcode-encoder-31816e767611</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2014-4113内核漏洞分析<br><a target="_blank" href="https://xz.aliyun.com/t/4456">https://xz.aliyun.com/t/4456</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span> 深入分析Drupal geddon 2 POP攻击链<br><a target="_blank" href="https://nosec.org/home/detail/2221.html">https://nosec.org/home/detail/2221.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Check Point Forensic Files: A New Monero CryptoMiner Campaign<br><a target="_blank" href="https://blog.checkpoint.com/2019/03/19/check-point-forensic-files-monero-cryptominer-campaign-cryptojacking-crypto-apt-hacking/">https://blog.checkpoint.com/2019/03/19/check-point-forensic-files-monero-cryptominer-campaign-cryptojacking-crypto-apt-hacking/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于对抗生成式模仿学习的实体和事件的联合抽取<br><a target="_blank" href="https://mp.weixin.qq.com/s/z6Gfdp6ly0WdKjbrvhCACw">https://mp.weixin.qq.com/s/z6Gfdp6ly0WdKjbrvhCACw</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>S&amp;P 2019 （四）1~2月份议题速览<br><a target="_blank" href="https://mp.weixin.qq.com/s/z6Al0LT8Kqw_p_onhTyV2w">https://mp.weixin.qq.com/s/z6Al0LT8Kqw_p_onhTyV2w</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>SigintOS: A Wireless Pentest Distro Review<br><a target="_blank" href="https://medium.com/@tomac/sigintos-a-wireless-pentest-distro-review-a7ea93ee8f8b">https://medium.com/@tomac/sigintos-a-wireless-pentest-distro-review-a7ea93ee8f8b</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Java Serialization Objects (JSO): An Exploitation Guide<br><a target="_blank" href="https://www.rapid7.com/research/report/exploiting-jsos/">https://www.rapid7.com/research/report/exploiting-jsos/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>CVE-2018-17057 yet another phar deserialization in TCPDF<br><a target="_blank" href="https://polict.net/blog/CVE-2018-17057">https://polict.net/blog/CVE-2018-17057</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>Efficient and Flexible Discovery of PHP Application Vulnerabilities<br><a target="_blank" href="https://mp.weixin.qq.com/s/xMoDTEvj91RgXFXfykS9tQ">https://mp.weixin.qq.com/s/xMoDTEvj91RgXFXfykS9tQ</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Discovering a zero day and getting code execution on Mozilla&#039;s AWS Network<br><a target="_blank" href="https://blog.assetnote.io/bug-bounty/2019/03/19/rce-on-mozilla-zero-day-webpagetest/">https://blog.assetnote.io/bug-bounty/2019/03/19/rce-on-mozilla-zero-day-webpagetest/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Finding and Exploiting .NET Remoting over HTTP using Deserialisation<br><a target="_blank" href="https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/march/finding-and-exploiting-.net-remoting-over-http-using-deserialisation/">https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/march/finding-and-exploiting-.net-remoting-over-http-using-deserialisation/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Awesome Node.js for penetration testers<br><a target="_blank" href="https://github.com/jesusprubio/awesome-nodejs-pentest">https://github.com/jesusprubio/awesome-nodejs-pentest</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Avira VPN 2.15.2.28160 Elevation of Privilege<br><a target="_blank" href="https://enigma0x3.net/2019/03/20/avira-vpn-2-15-2-28160-elevation-of-privilege/">https://enigma0x3.net/2019/03/20/avira-vpn-2-15-2-28160-elevation-of-privilege/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>.NET高级代码审计（第二课） Json.Net反序列化漏洞<br><a target="_blank" href="https://xz.aliyun.com/t/4464">https://xz.aliyun.com/t/4464</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Multiple Ways to Exploiting OSX using PowerShell Empire<br><a target="_blank" href="https://www.hackingarticles.in/multiple-ways-to-exploiting-osx-using-powershell-empire/">https://www.hackingarticles.in/multiple-ways-to-exploiting-osx-using-powershell-empire/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>CVE-2019-5786 FileReader Exploit<br><a target="_blank" href="https://github.com/exodusintel/CVE-2019-5786/">https://github.com/exodusintel/CVE-2019-5786/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Vulnerability hunting with Semmle QL, part 1<br><a target="_blank" href="https://blogs.technet.microsoft.com/srd/2018/08/16/vulnerability-hunting-with-semmle-ql-part-1/">https://blogs.technet.microsoft.com/srd/2018/08/16/vulnerability-hunting-with-semmle-ql-part-1/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>控制系统设备：架构和供应渠道概述<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/58878866">https://zhuanlan.zhihu.com/p/58878866</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Red Team Telemetry: Empire Edition<br><a target="_blank" href="https://www.lares.com/red-team-telemetry-empire-edition/">https://www.lares.com/red-team-telemetry-empire-edition/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Development of a new Windows 10 KASLR Bypass (in One WinDBG Command)<br><a target="_blank" href="https://www.offensive-security.com/vulndev/development-of-a-new-windows-10-kaslr-bypass-in-one-windbg-command/">https://www.offensive-security.com/vulndev/development-of-a-new-windows-10-kaslr-bypass-in-one-windbg-command/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Vulnerability hunting with Semmle QL, part 2<br><a target="_blank" href="https://blogs.technet.microsoft.com/srd/2019/03/19/vulnerability-hunting-with-semmle-ql-part-2/">https://blogs.technet.microsoft.com/srd/2019/03/19/vulnerability-hunting-with-semmle-ql-part-2/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>How to Detect an Intruder-driven Group Policy Changes<br><a target="_blank" href="https://habr.com/en/post/444048/">https://habr.com/en/post/444048/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>An introduction to privileged file operation abuse on Windows<br><a target="_blank" href="https://offsec.provadys.com/intro-to-file-operation-abuse-on-Windows.html">https://offsec.provadys.com/intro-to-file-operation-abuse-on-Windows.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Reflected XSS in SolarWinds Database Performance Analyzer<br><a target="_blank" href="https://medium.com/greenwolf-security/reflected-xss-in-solarwinds-database-performance-analyzer-988bd7a5cd5">https://medium.com/greenwolf-security/reflected-xss-in-solarwinds-database-performance-analyzer-988bd7a5cd5</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2018-8024: Apache Spark XSS vulnerability in UI<br><a target="_blank" href="https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-8024">https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-8024</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Google Books X-Hacking<br><a target="_blank" href="https://medium.com/@terjanq/google-books-x-hacking-29c249862f19">https://medium.com/@terjanq/google-books-x-hacking-29c249862f19</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>A-Detector: An anomaly-based intrusion detection system.<br><a target="_blank" href="https://github.com/alexfrancow/A-Detector">https://github.com/alexfrancow/A-Detector</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>OOB-Server: A Bind9 server for pentesters to use for Out-of-Band vulnerabilities<br><a target="_blank" href="https://github.com/JuxhinDB/OOB-Server">https://github.com/JuxhinDB/OOB-Server</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Karta - source code assisted fast binary matching plugin for IDA<br><a target="_blank" href="https://github.com/CheckPointSW/Karta">https://github.com/CheckPointSW/Karta</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Java deserialization RCE in Tomcat cluster<br><a target="_blank" href="https://blog.csdn.net/u011721501/article/details/88637270">https://blog.csdn.net/u011721501/article/details/88637270</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android app deobfuscation using static-dynamic cooperation<br><a target="_blank" href="https://www.virusbulletin.com/blog/2019/03/vb2018-paper-and-video-android-app-deobfuscation-using-static-dynamic-cooperation/">https://www.virusbulletin.com/blog/2019/03/vb2018-paper-and-video-android-app-deobfuscation-using-static-dynamic-cooperation/</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/264">SecWiki周刊(第264期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
