<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第77期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第77期）</strong></h5>
<blockquote> 2015/08/17-2015/08/23</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>BlackHat Trainings Experience<br><a target="_blank" href="http://www.sec-un.org/blackhat-trainings-experience.html">http://www.sec-un.org/blackhat-trainings-experience.html</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>ACM CCS 2015 Accepted Papers<br><a target="_blank" href="http://www.sigsac.org/ccs/CCS2015/pro_paper.html">http://www.sigsac.org/ccs/CCS2015/pro_paper.html</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>DerbyCon 2015 Schedule and Abstract<br><a target="_blank" href="http://www.derbycon.com/derbycon-2015-schedule-and-abstract/">http://www.derbycon.com/derbycon-2015-schedule-and-abstract/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>AVA: A Social Engineering Vulnerability Scanner<br><a target="_blank" href="https://www.schneier.com/blog/archives/2015/08/ava_a_social_en.html">https://www.schneier.com/blog/archives/2015/08/ava_a_social_en.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Science Isn’t Broken<br><a target="_blank" href="http://fivethirtyeight.com/features/science-isnt-broken/">http://fivethirtyeight.com/features/science-isnt-broken/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>New data uncovers the surprising predictability of Android lock patterns<br><a target="_blank" href="http://arstechnica.com/security/2015/08/new-data-uncovers-the-surprising-predictability-of-android-lock-patterns/">http://arstechnica.com/security/2015/08/new-data-uncovers-the-surprising-predictability-of-android-lock-patterns/</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>10+ Years of System Security Circus<br><a target="_blank" href="http://s3.eurecom.fr/~balzarot/notes/top4/index.html">http://s3.eurecom.fr/~balzarot/notes/top4/index.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>How to Exploit BitTorrent for Large-Scale DoS Attacks<br><a target="_blank" href="http://thehackernews.com/2015/08/bittorrent-dos-attack.html">http://thehackernews.com/2015/08/bittorrent-dos-attack.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Fifteen Famous Bug Bounty Hunters<br><a target="_blank" href="http://resources.infosecinstitute.com/fifteen-famous-bug-bounty-hunters/">http://resources.infosecinstitute.com/fifteen-famous-bug-bounty-hunters/</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>BlackHat &amp; Defcon 2015 观感<br><a target="_blank" href="http://weibo.com/p/1001603876902510403147">http://weibo.com/p/1001603876902510403147</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>2015年第34周安全通报<br><a target="_blank" href="http://blog.topsec.com.cn/ad_lab/2015%e5%b9%b4%e7%ac%ac34%e5%91%a8%e5%ae%89%e5%85%a8%e9%80%9a%e6%8a%a5/">http://blog.topsec.com.cn/ad_lab/2015%e5%b9%b4%e7%ac%ac34%e5%91%a8%e5%ae%89%e5%85%a8%e9%80%9a%e6%8a%a5/</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Wordpress4.2.3提权与SQL注入漏洞(CVE-2015-5623)分析<br><a target="_blank" href="http://security.tencent.com/index.php/blog/msg/93">http://security.tencent.com/index.php/blog/msg/93</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Discuz!后台秒getshell（第三方安全问题）<br><a target="_blank" href="http://0day5.com/archives/3339">http://0day5.com/archives/3339</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Discuz全版本存储型DOM XSS（可打管理员）<br><a target="_blank" href="http://0day5.com/archives/3323">http://0day5.com/archives/3323</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>HackingTeamfulldump (不算完整235g压缩版)<br><a target="_blank" href="http://pan.baidu.com/s/1kTBzrVp ">http://pan.baidu.com/s/1kTBzrVp </a></div><div class="single"><span id="tags">[书籍]&nbsp;&nbsp;</span>Modern Windows Exploit Development<br><a target="_blank" href="http://expdev-kiuhnm.rhcloud.com/download-the-book/">http://expdev-kiuhnm.rhcloud.com/download-the-book/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Cookies Lack Integrity: Real-World Implications<br><a target="_blank" href="https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-zheng-updated.pdf">https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-zheng-updated.pdf</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>WAF绕过(网站安全狗示例)<br><a target="_blank" href="http://pan.baidu.com/share/link?shareid=4040209898&amp;uk=2517263830">http://pan.baidu.com/share/link?shareid=4040209898&amp;uk=2517263830</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>PHP 7 ZEND_HASH_IF_FULL_DO_RESIZE Use After Free 漏洞分析<br><a target="_blank" href="http://blog.knownsec.com/2015/08/php-7-zend_hash_if_full_do_resize-use-after-free-analysis/">http://blog.knownsec.com/2015/08/php-7-zend_hash_if_full_do_resize-use-after-free-analysis/</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>UCSD Computer Security Course Slide<br><a target="_blank" href="http://cseweb.ucsd.edu/classes/fa12/cse127-a/syllabus.html">http://cseweb.ucsd.edu/classes/fa12/cse127-a/syllabus.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Inside Neutrino botnet builder<br><a target="_blank" href="https://blog.malwarebytes.org/botnets/2015/08/inside-neutrino-botnet-builder/">https://blog.malwarebytes.org/botnets/2015/08/inside-neutrino-botnet-builder/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Distributed Nmap Port Scanning with a DNmap Megacluster<br><a target="_blank" href="http://www.tripwire.com/state-of-security/vulnerability-management/distributed-nmap-port-scanning-dnmap-megacluster/">http://www.tripwire.com/state-of-security/vulnerability-management/distributed-nmap-port-scanning-dnmap-megacluster/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Discuz! X系列远程代码执行漏洞分析<br><a target="_blank" href="http://www.secpulse.com/archives/35819.html">http://www.secpulse.com/archives/35819.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>NetRipper - Smart traffic sniffing for penetration testers<br><a target="_blank" href="https://github.com/NytroRST/NetRipper">https://github.com/NytroRST/NetRipper</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>利用机器学习进行恶意代码分类<br><a target="_blank" href="http://drops.wooyun.org/tips/8151">http://drops.wooyun.org/tips/8151</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>“企业应急响应和反渗透”之真实案例分析<br><a target="_blank" href="http://drops.wooyun.org/tips/8130">http://drops.wooyun.org/tips/8130</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>UAC Bypass Vulnerability in the Windows Script Host.<br><a target="_blank" href="http://seclist.us/uac-bypass-vulnerability-in-the-windows-script-host.html">http://seclist.us/uac-bypass-vulnerability-in-the-windows-script-host.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>New activity of The Blue Termite APT<br><a target="_blank" href="https://securelist.com/blog/research/71876/new-activity-of-the-blue-termite-apt/">https://securelist.com/blog/research/71876/new-activity-of-the-blue-termite-apt/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>BlackHat议题分析：浅析BGP劫持利用<br><a target="_blank" href="http://www.freebuf.com/articles/network/75305.html">http://www.freebuf.com/articles/network/75305.html</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>Setup Your Own MITM, Packet Sniffing WiFi Access Point<br><a target="_blank" href="http://blog.hackersonlineclub.com/2015/08/snifflab-setup-your-own-mitm-packet.html">http://blog.hackersonlineclub.com/2015/08/snifflab-setup-your-own-mitm-packet.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>You Dirty RAT: Analyzing an AlienSpy Payload<br><a target="_blank" href="https://www.proofpoint.com/us/threat-insight/post/You-Dirty-RAT">https://www.proofpoint.com/us/threat-insight/post/You-Dirty-RAT</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>A light-weight forensic analysis of the AshleyMadison Hack<br><a target="_blank" href="http://blog.includesecurity.com/2015/08/forensic-analysis-of-the-AshleyMadison-Hack.html">http://blog.includesecurity.com/2015/08/forensic-analysis-of-the-AshleyMadison-Hack.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>SQL注入速查表（上）<br><a target="_blank" href="http://drops.wooyun.org/tips/7840">http://drops.wooyun.org/tips/7840</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>携程安全沙龙现场笔记&amp;PPT<br><a target="_blank" href="http://www.secpulse.com/archives/35915.html">http://www.secpulse.com/archives/35915.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Camera 360应用隐私数据泄露的分析<br><a target="_blank" href="http://drops.wooyun.org/tips/8209">http://drops.wooyun.org/tips/8209</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Extortionists Target Ashley Madison Users<br><a target="_blank" href="http://krebsonsecurity.com/2015/08/extortionists-target-ashley-madison-users/">http://krebsonsecurity.com/2015/08/extortionists-target-ashley-madison-users/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>iOS:CVE-2015-5774<br><a target="_blank" href="http://blog.pangu.io/cve-2015-5774/">http://blog.pangu.io/cve-2015-5774/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Sybase数据库安全<br><a target="_blank" href="http://drops.wooyun.org/%e8%bf%90%e7%bb%b4%e5%ae%89%e5%85%a8/7962">http://drops.wooyun.org/%e8%bf%90%e7%bb%b4%e5%ae%89%e5%85%a8/7962</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>A Neat Stack Corruption, Reverse P/Invoke Structure Packing with Output Param<br><a target="_blank" href="http://blogs.microsoft.co.il/sasha/2015/08/18/a-neat-stack-corruption/">http://blogs.microsoft.co.il/sasha/2015/08/18/a-neat-stack-corruption/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Exploiting Ammyy Admin – developing an 0day<br><a target="_blank" href="https://www.scriptjunkie.us/2014/09/exploiting-ammyy-admin-developing-an-0day/">https://www.scriptjunkie.us/2014/09/exploiting-ammyy-admin-developing-an-0day/</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>DEFCON 23 CTF 战记<br><a target="_blank" href="http://blog.ztrix.me/blog/2015/08/16/defcon-23/">http://blog.ztrix.me/blog/2015/08/16/defcon-23/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Deploying, Managing, and Leveraging Honeypots in the Enterprise<br><a target="_blank" href="https://www.threatstream.com/blog/deploying-managing-and-leveraging-honeypots-in-the-enterprise-using-open-source-tools#When:17:11:00Z">https://www.threatstream.com/blog/deploying-managing-and-leveraging-honeypots-in-the-enterprise-using-open-source-tools#When:17:11:00Z</a></div><div class="single"><span id="tags">[视频]&nbsp;&nbsp;</span>Chaos Communication Camp 2015<br><a target="_blank" href="https://media.ccc.de/browse/conferences/camp2015/index.html">https://media.ccc.de/browse/conferences/camp2015/index.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>BinNavi binary analysis tool open sourced by Google<br><a target="_blank" href="https://github.com/google/binnavi">https://github.com/google/binnavi</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Snifflab: An environment for testing mobile devices<br><a target="_blank" href="https://openeffect.ca/snifflab-an-environment-for-testing-mobile-devices/">https://openeffect.ca/snifflab-an-environment-for-testing-mobile-devices/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Stealth Techniques: Hiding Files in the Registry<br><a target="_blank" href="http://www.codereversing.com/blog/archives/261">http://www.codereversing.com/blog/archives/261</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Analysis of PS4&#039;s security and the state of hacking<br><a target="_blank" href="http://cturt.github.io/ps4.html">http://cturt.github.io/ps4.html</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/77">SecWiki周刊(第77期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
