<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第256期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第256期）</strong></h5>
<blockquote> 2019/01/21-2019/01/27</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>2018年国际网络安全形势回顾<br><a target="_blank" href="https://mp.weixin.qq.com/s/B9ZKTBS8VsvAkUUKI7hrUQ">https://mp.weixin.qq.com/s/B9ZKTBS8VsvAkUUKI7hrUQ</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>2018 年度国内外网络空间安全形势回顾<br><a target="_blank" href="https://mp.weixin.qq.com/s/tQmQljt0pWxWfTtd7_1bIw">https://mp.weixin.qq.com/s/tQmQljt0pWxWfTtd7_1bIw</a></div><div class="single"><span id="tags">[法规]&nbsp;&nbsp;</span>美国发布《2019国家情报战略》<br><a target="_blank" href="https://mp.weixin.qq.com/s/44RDuUmw00Rz_LQeU4QJOQ">https://mp.weixin.qq.com/s/44RDuUmw00Rz_LQeU4QJOQ</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>Presentation Skill: 从学术到商业<br><a target="_blank" href="https://mp.weixin.qq.com/s/Frge3EX8sEdOEuygHEJNkg">https://mp.weixin.qq.com/s/Frge3EX8sEdOEuygHEJNkg</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>OpenDnsdb: 去哪儿网OPS团队开源的DNS管理系统<br><a target="_blank" href="https://github.com/qunarcorp/open_dnsdb">https://github.com/qunarcorp/open_dnsdb</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>信息收集总结<br><a target="_blank" href="https://blog.csdn.net/qq_33336310/article/details/86665344">https://blog.csdn.net/qq_33336310/article/details/86665344</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>企业级自动化代码安全扫描实战<br><a target="_blank" href="https://mp.weixin.qq.com/s/T6EYwGpEQr64OGXGj2R5eA">https://mp.weixin.qq.com/s/T6EYwGpEQr64OGXGj2R5eA</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Abusing Exchange: One API call away from Domain Admin<br><a target="_blank" href="https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/">https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>2018年Windows漏洞年度盘点<br><a target="_blank" href="https://mp.weixin.qq.com/s/CtjPAuCJ1znw6pGHlpaR1w">https://mp.weixin.qq.com/s/CtjPAuCJ1znw6pGHlpaR1w</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于网络特征学习的个性化推荐系统 01<br><a target="_blank" href="https://mp.weixin.qq.com/s/9hHDIrm32iPrX7xEHP_AKg">https://mp.weixin.qq.com/s/9hHDIrm32iPrX7xEHP_AKg</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>对某HWP漏洞样本的shellcode分析<br><a target="_blank" href="https://www.anquanke.com/post/id/169872">https://www.anquanke.com/post/id/169872</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>2019年哈尔滨ASC安全峰会的会议PPT<br><a target="_blank" href="https://github.com/ansionasc/ASC/tree/master/2019">https://github.com/ansionasc/ASC/tree/master/2019</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>XXE萌新进阶全攻略<br><a target="_blank" href="https://www.freebuf.com/vuls/194112.html">https://www.freebuf.com/vuls/194112.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>关于风控预警体系的搭建方案<br><a target="_blank" href="https://mp.weixin.qq.com/s/2r61XB_Po4s3ihkLy46xbA">https://mp.weixin.qq.com/s/2r61XB_Po4s3ihkLy46xbA</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于网络特征学习的个性化推荐系统 03#<br><a target="_blank" href="https://mp.weixin.qq.com/s/O7f9p5kGIiH0M7kMcRMD7w">https://mp.weixin.qq.com/s/O7f9p5kGIiH0M7kMcRMD7w</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>多种设备基于 SNMP 协议的敏感信息泄露漏洞数据分析报告<br><a target="_blank" href="https://paper.seebug.org/795/">https://paper.seebug.org/795/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>PhpSpreadsheet 1.5.0 XXE漏洞复现及分析<br><a target="_blank" href="https://www.anquanke.com/post/id/170068">https://www.anquanke.com/post/id/170068</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>2018DDoS攻击-IP团伙行为分析报告<br><a target="_blank" href="http://blog.nsfocus.net/behavior_analysis_of_ip_chain_gangs/">http://blog.nsfocus.net/behavior_analysis_of_ip_chain_gangs/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>iOS渗透测试工具，第３篇：Frida与Objection<br><a target="_blank" href="https://nosec.org/home/detail/2192.html">https://nosec.org/home/detail/2192.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>vmware-exploitation: A bunch of links related to VMware escape exploits<br><a target="_blank" href="https://github.com/xairy/vmware-exploitation">https://github.com/xairy/vmware-exploitation</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>公链安全之以太坊君士坦丁堡重入漏洞分析<br><a target="_blank" href="https://bcsec.org/index/detail/tag/2/id/465">https://bcsec.org/index/detail/tag/2/id/465</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>TripleDoggy: 基于clang static analyzer的源码漏洞检测插件<br><a target="_blank" href="https://github.com/GoSSIP-SJTU/TripleDoggy">https://github.com/GoSSIP-SJTU/TripleDoggy</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span> 固件的逆向解包及破解方法<br><a target="_blank" href="http://www.bincker.net/?p=835">http://www.bincker.net/?p=835</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>利用msbuild.exe绕过应用程序白名单安全机制的多种姿势<br><a target="_blank" href="https://nosec.org/home/detail/2193.html">https://nosec.org/home/detail/2193.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>We&#039;re under attack! 23 Node.js security best practices<br><a target="_blank" href="https://medium.com/@nodepractices/were-under-attack-23-node-js-security-best-practices-e33c146cb87d">https://medium.com/@nodepractices/were-under-attack-23-node-js-security-best-practices-e33c146cb87d</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于网络特征学习的个性化推荐系统 02#<br><a target="_blank" href="https://mp.weixin.qq.com/s/ZLFnltcraIBuYOSjyhSCmQ">https://mp.weixin.qq.com/s/ZLFnltcraIBuYOSjyhSCmQ</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>工业控制系统网络杀伤链（The ICS Cyber Kill Chain）<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/55119502">https://zhuanlan.zhihu.com/p/55119502</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>大规模多租户数据平台安全思考（一）<br><a target="_blank" href="https://www.anquanke.com/post/id/169958">https://www.anquanke.com/post/id/169958</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>IPOsint: Discovery IP Address of the target<br><a target="_blank" href="https://github.com/j3ssie/IPOsint">https://github.com/j3ssie/IPOsint</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>FANCI: 基于特征的自动NXDomain分类和情报<br><a target="_blank" href="http://www.arkteam.net/?p=4210">http://www.arkteam.net/?p=4210</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Jok3R<br><a target="_blank" href="https://www.kitploit.com/2019/01/jok3r-network-and-web-pentest-framework.html">https://www.kitploit.com/2019/01/jok3r-network-and-web-pentest-framework.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>BinCAT, our static binary code analyzer for reversers<br><a target="_blank" href="https://github.com/airbus-seclab/bincat/releases/tag/v1.1">https://github.com/airbus-seclab/bincat/releases/tag/v1.1</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Automatic string formatting deobfuscation<br><a target="_blank" href="https://xz.aliyun.com/t/3906">https://xz.aliyun.com/t/3906</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>深度长文：细说iOS代码签名<br><a target="_blank" href="http://xelz.info/blog/2019/01/11/ios-code-signature/">http://xelz.info/blog/2019/01/11/ios-code-signature/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Check Point Forensic Files: GandCrab Returns with Friends (Trojans)<br><a target="_blank" href="https://blog.checkpoint.com/2019/01/18/check-point-forensic-files-gandcrab-returns-with-friends-trojans/">https://blog.checkpoint.com/2019/01/18/check-point-forensic-files-gandcrab-returns-with-friends-trojans/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Scrutiny on the bug bounty<br><a target="_blank" href="https://xz.aliyun.com/t/3935">https://xz.aliyun.com/t/3935</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>大规模多租户数据平台安全思考（二）<br><a target="_blank" href="https://www.anquanke.com/post/id/169959">https://www.anquanke.com/post/id/169959</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>black-energy-analysis<br><a target="_blank" href="https://marcusedmondson.com/2019/01/18/black-energy-analysis/">https://marcusedmondson.com/2019/01/18/black-energy-analysis/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Vidar窃密木马分析（下）<br><a target="_blank" href="https://www.anquanke.com/post/id/170193">https://www.anquanke.com/post/id/170193</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>analysis-exposure-change-assets-iot-2018<br><a target="_blank" href="http://blog.nsfocus.net/analysis-exposure-change-assets-iot-2018/">http://blog.nsfocus.net/analysis-exposure-change-assets-iot-2018/</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第255期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/255">https://www.sec-wiki.com/weekly/255</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Rooting Nagios Via Outdated Libraries<br><a target="_blank" href="https://medium.com/tenable-techblog/rooting-nagios-via-outdated-libraries-bb79427172">https://medium.com/tenable-techblog/rooting-nagios-via-outdated-libraries-bb79427172</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>5 Privilege Escalation Tools by Chiheb Chebbi<br><a target="_blank" href="https://www.peerlyst.com/posts/5-privilege-escalation-tools-chiheb-chebbi?utm_source=twitter&amp;utm_medium=social&amp;utm_content=peerlyst_post&amp;utm_campaign=peerlyst_shared_post">https://www.peerlyst.com/posts/5-privilege-escalation-tools-chiheb-chebbi?utm_source=twitter&amp;utm_medium=social&amp;utm_content=peerlyst_post&amp;utm_campaign=peerlyst_shared_post</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Vidar窃密木马分析（上）<br><a target="_blank" href="https://www.anquanke.com/post/id/170191">https://www.anquanke.com/post/id/170191</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>html-similarity: Compare html similarity using structural and style metrics<br><a target="_blank" href="https://github.com/matiskay/html-similarity">https://github.com/matiskay/html-similarity</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Digital Forensics – PlugX and Artifacts left behind | Count Upon Security<br><a target="_blank" href="https://countuponsecurity.com/2018/06/20/digital-forensics-plugx-and-artifacts-left-behind/">https://countuponsecurity.com/2018/06/20/digital-forensics-plugx-and-artifacts-left-behind/</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>The wolf of name street hijackingdomains through their nameservers<br><a target="_blank" href="https://mp.weixin.qq.com/s/Hwngr-y3KcK5WnR0AIZ0Kg">https://mp.weixin.qq.com/s/Hwngr-y3KcK5WnR0AIZ0Kg</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/256">SecWiki周刊(第256期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
