<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第293期)</title>
	<link rel="stylesheet" type="text/css" href="/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="/css/people.css" />
    <link rel="shortcut icon" href="/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="https://libs.baidu.com/jquery/1.8.3/jquery.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第293期）</strong></h5>
<blockquote> 2019/10/07-2019/10/13</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[事件]&nbsp;&nbsp;</span> 有黑客正拍卖一个包含9200万巴西公民详细信息的数据库<br><a target="_blank" href="https://nosec.org/home/detail/3018.html">https://nosec.org/home/detail/3018.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>Facebook、Twitter涉嫌违反欧盟GDPR 或面临数十亿美元罚款<br><a target="_blank" href="https://nosec.org/home/detail/3021.html">https://nosec.org/home/detail/3021.html</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>SRC漏洞挖掘实用技巧<br><a target="_blank" href="https://mp.weixin.qq.com/s/g-vlNmn4uQKUnBKZ7LMJvA">https://mp.weixin.qq.com/s/g-vlNmn4uQKUnBKZ7LMJvA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>红蓝对抗——加密Webshell“冰蝎”攻防<br><a target="_blank" href="https://mp.weixin.qq.com/s/o6aUI-sk0A7fSDMTinoMNg">https://mp.weixin.qq.com/s/o6aUI-sk0A7fSDMTinoMNg</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Web安全Day8 - XXE实战攻防<br><a target="_blank" href="https://xz.aliyun.com/t/6502">https://xz.aliyun.com/t/6502</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>泛微E-cology OA系统SQL注入漏洞<br><a target="_blank" href="https://nosec.org/home/detail/3030.html">https://nosec.org/home/detail/3030.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Hacking Windows 备忘录<br><a target="_blank" href="https://xz.aliyun.com/t/6498">https://xz.aliyun.com/t/6498</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Cobalt Strike - 使用其他方式抓取密码/dump hash<br><a target="_blank" href="https://github.com/Ch1ngg/AggressorScript-RunDumpHash">https://github.com/Ch1ngg/AggressorScript-RunDumpHash</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>资产十问 <br><a target="_blank" href="https://www.sec-un.org/%e8%b5%84%e4%ba%a7%e5%8d%81%e9%97%ae/">https://www.sec-un.org/%e8%b5%84%e4%ba%a7%e5%8d%81%e9%97%ae/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>CatchMail: 收集邮箱的工具<br><a target="_blank" href="https://github.com/0Kee-Team/CatchMail">https://github.com/0Kee-Team/CatchMail</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>ThinkPHP5.1.X反序列化利用链<br><a target="_blank" href="https://xz.aliyun.com/t/6467">https://xz.aliyun.com/t/6467</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2019-1315：基于错误报告机制的Windows提权漏洞<br><a target="_blank" href="https://nosec.org/home/detail/3027.html">https://nosec.org/home/detail/3027.html</a></div><div class="single"><span id="tags">[事件]&nbsp;&nbsp;</span>TeamViewer疑似被入侵事件分析<br><a target="_blank" href="https://nosec.org/home/detail/3038.html">https://nosec.org/home/detail/3038.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span> D-Link路由器曝出RCE漏洞，牵涉多个型号<br><a target="_blank" href="https://nosec.org/home/detail/3020.html">https://nosec.org/home/detail/3020.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>美国政府持续深入开展爱因斯坦项目以提升网络威胁感知能力（2019） <br><a target="_blank" href="https://www.sec-un.org/%e7%be%8e%e5%9b%bd%e6%94%bf%e5%ba%9c%e6%8c%81%e7%bb%ad%e6%b7%b1%e5%85%a5%e5%bc%80%e5%b1%95%e7%88%b1%e5%9b%a0%e6%96%af%e5%9d%a6%e9%a1%b9%e7%9b%ae%e4%bb%a5%e6%8f%90%e5%8d%87%e7%bd%91%e7%bb%9c%e5%a8%81/">https://www.sec-un.org/%e7%be%8e%e5%9b%bd%e6%94%bf%e5%ba%9c%e6%8c%81%e7%bb%ad%e6%b7%b1%e5%85%a5%e5%bc%80%e5%b1%95%e7%88%b1%e5%9b%a0%e6%96%af%e5%9d%a6%e9%a1%b9%e7%9b%ae%e4%bb%a5%e6%8f%90%e5%8d%87%e7%bd%91%e7%bb%9c%e5%a8%81/</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第292期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/292">https://www.sec-wiki.com/weekly/292</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>“北极星杯”AWD线上赛复盘<br><a target="_blank" href="https://xz.aliyun.com/t/6477">https://xz.aliyun.com/t/6477</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>协议层的攻击—HTTP请求走私<br><a target="_blank" href="https://paper.seebug.org/1048/">https://paper.seebug.org/1048/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>php反序列化靶机实战<br><a target="_blank" href="https://mp.weixin.qq.com/s/2bkCRZf6_An2fWEdXbHxrg">https://mp.weixin.qq.com/s/2bkCRZf6_An2fWEdXbHxrg</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>ATT&amp;CK一般性学习笔记<br><a target="_blank" href="https://mp.weixin.qq.com/s/qfthyNQ3E_TruEbREcIJzg">https://mp.weixin.qq.com/s/qfthyNQ3E_TruEbREcIJzg</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>基于mitmproxy的被动扫描代理<br><a target="_blank" href="https://www.freebuf.com/articles/web/216301.html">https://www.freebuf.com/articles/web/216301.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>浅析DARPA的运作机制<br><a target="_blank" href="https://mp.weixin.qq.com/s/T5EqLfqSCU8JRp6Ez4vdpg">https://mp.weixin.qq.com/s/T5EqLfqSCU8JRp6Ez4vdpg</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2019-17059：Cyber​​oam SSL VPN的RCE漏洞<br><a target="_blank" href="https://nosec.org/home/detail/3034.html">https://nosec.org/home/detail/3034.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>一小时完成上位机SCADA<br><a target="_blank" href="http://jzgkchina.com/node/1273">http://jzgkchina.com/node/1273</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span> vBulletin再修复高危RCE和SQL注入漏洞<br><a target="_blank" href="https://nosec.org/home/detail/3022.html">https://nosec.org/home/detail/3022.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>一文看懂ATT&amp;CK框架以及使用场景实例<br><a target="_blank" href="https://www.anquanke.com/post/id/187998">https://www.anquanke.com/post/id/187998</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>以攻擊者的角度制定防禦策略 <br><a target="_blank" href="https://devco.re/blog/2019/10/09/def-strategy/">https://devco.re/blog/2019/10/09/def-strategy/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>从Exchange服务器上搜索和导出邮件<br><a target="_blank" href="https://www.4hou.com/technology/20718.html">https://www.4hou.com/technology/20718.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>[CVE-2019-9535] Iterm2命令执行的不完整复现<br><a target="_blank" href="https://mp.weixin.qq.com/s/4KcpS4eNGQ8bL6DTM4K0aQ">https://mp.weixin.qq.com/s/4KcpS4eNGQ8bL6DTM4K0aQ</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>PDF调试技巧剖析<br><a target="_blank" href="https://www.anquanke.com/post/id/188138">https://www.anquanke.com/post/id/188138</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>The Art of WebKit Exploitation<br><a target="_blank" href="http://blog.umangis.me/the-art-of-webkit-exploitation/">http://blog.umangis.me/the-art-of-webkit-exploitation/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>SharpSniper利用分析<br><a target="_blank" href="https://3gstudent.github.io/3gstudent.github.io/SharpSniper%E5%88%A9%E7%94%A8%E5%88%86%E6%9E%90/">https://3gstudent.github.io/3gstudent.github.io/SharpSniper%E5%88%A9%E7%94%A8%E5%88%86%E6%9E%90/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Repository of YARA rules made by McAfee ATR Team<br><a target="_blank" href="https://github.com/advanced-threat-research/Yara-Rules">https://github.com/advanced-threat-research/Yara-Rules</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>侧信道攻击，从喊666到入门之—错误注入攻击白盒<br><a target="_blank" href="https://www.anquanke.com/post/id/188340">https://www.anquanke.com/post/id/188340</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Venom - A Multi-hop Proxy for Penetration Testers<br><a target="_blank" href="https://github.com/Dliv3/Venom">https://github.com/Dliv3/Venom</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>ISCX-IDS-2012 intrusion detection evaluation dataset<br><a target="_blank" href="https://www.unb.ca/cic/datasets/ids.html">https://www.unb.ca/cic/datasets/ids.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>HackMD Stored XSS and HackMD Desktop RCE <br><a target="_blank" href="https://5alt.me/2019/10/HackMD%20Stored%20XSS%20and%20HackMD%20Desktop%20RCE/">https://5alt.me/2019/10/HackMD%20Stored%20XSS%20and%20HackMD%20Desktop%20RCE/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>How a double-free bug in WhatsApp turns to RCE<br><a target="_blank" href="https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/">https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>PENTESTING-BIBLE<br><a target="_blank" href="https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE">https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>工控安全入门（五）—— plc逆向初探<br><a target="_blank" href="https://www.anquanke.com/post/id/187792">https://www.anquanke.com/post/id/187792</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Revoke-Obfuscation: PowerShell Obfuscation Detection Framework<br><a target="_blank" href="https://github.com/danielbohannon/Revoke-Obfuscation">https://github.com/danielbohannon/Revoke-Obfuscation</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>在PWN题中绕过lea esp以及关于Ret2dl的一些补充<br><a target="_blank" href="https://www.anquanke.com/post/id/187875">https://www.anquanke.com/post/id/187875</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/293">SecWiki周刊(第293期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;
                        <a href='https://security.ximalaya.com/'>XMSRC</a>&nbsp;
                        <br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
