<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第45期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第45期）</strong></h5>
<blockquote> 2015/01/05-2015/01/11</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>扒一扒那些“开后门”的路由器厂商<br><a target="_blank" href="http://www.freebuf.com/news/special/55444.html">http://www.freebuf.com/news/special/55444.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>World’s first (known) bootkit for OS X can permanently backdoor Macs<br><a target="_blank" href="http://arstechnica.com/security/2015/01/worlds-first-known-bootkit-for-os-x-can-permanently-backdoor-macs/">http://arstechnica.com/security/2015/01/worlds-first-known-bootkit-for-os-x-can-permanently-backdoor-macs/</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>SRG:Security Research Group For Student<br><a target="_blank" href="http://srg.gitcafe.io/">http://srg.gitcafe.io/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>AOL Advertising Network Abused to Distribute Malware<br><a target="_blank" href="http://thehackernews.com/2015/01/aol-advertising-network-abused-to_6.html">http://thehackernews.com/2015/01/aol-advertising-network-abused-to_6.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>[网络安全]美国网络信息安全产业格局分析报告<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MjM5NDMzNTk2MA==&amp;mid=202435694&amp;idx=3&amp;sn=2e67bdf66924b00507855140d2e02630&amp;scene=2&amp;from=timeline&amp;isappinstalled=0%23rd">http://mp.weixin.qq.com/s?__biz=MjM5NDMzNTk2MA==&amp;mid=202435694&amp;idx=3&amp;sn=2e67bdf66924b00507855140d2e02630&amp;scene=2&amp;from=timeline&amp;isappinstalled=0%23rd</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Who’s Attacking Whom? Realtime Attack Trackers<br><a target="_blank" href="http://krebsonsecurity.com/2015/01/whos-attacking-whom-realtime-attack-trackers/">http://krebsonsecurity.com/2015/01/whos-attacking-whom-realtime-attack-trackers/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>情境感知（Context-Aware-Security）的几点理解<br><a target="_blank" href="http://www.sec-un.org/context-aware-context-aware-security-several-points-of-understanding.html">http://www.sec-un.org/context-aware-context-aware-security-several-points-of-understanding.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Top 10 Web Hacking Techniques of 2014<br><a target="_blank" href="http://blog.whitehatsec.com/top-10-web-hacking-techniques-of-2014/">http://blog.whitehatsec.com/top-10-web-hacking-techniques-of-2014/</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>REcon:2015 computer security conference<br><a target="_blank" href="http://recon.cx/2015/index.html">http://recon.cx/2015/index.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>DOD Fights Researcher Over Access to Report on Israel&#039;s Nuclear Needs<br><a target="_blank" href="http://www.courthousenews.com/2014/12/31/dod-fights-researcher-over-access-to-report-on-israels-nuclear-needs.htm">http://www.courthousenews.com/2014/12/31/dod-fights-researcher-over-access-to-report-on-israels-nuclear-needs.htm</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>关于信息安全短板的思考<br><a target="_blank" href="http://www.sec-un.org/thoughts-on-information-security-weaknesses.html">http://www.sec-un.org/thoughts-on-information-security-weaknesses.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>美国能源部的安全威胁情报应用案例 Flexible Transform<br><a target="_blank" href="http://www.sec-un.org/united-states-energy-security-threat-intelligence-application-flexible-transform.html">http://www.sec-un.org/united-states-energy-security-threat-intelligence-application-flexible-transform.html</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>NUKE同学共享的安全威胁情报相关资料<br><a target="_blank" href="http://www.sec-un.org/nuke-classmates-shared-security-threat-intelligence-related-information-continuous-updates.html">http://www.sec-un.org/nuke-classmates-shared-security-threat-intelligence-related-information-continuous-updates.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>SecWiki如何快捷提交资讯<br><a target="_blank" href="http://www.sec-wiki.com/about/submit">http://www.sec-wiki.com/about/submit</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>VulReport in TW<br><a target="_blank" href="https://vulreport.net/">https://vulreport.net/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>深入大数据安全分析:为什么需要大数据安全分析<br><a target="_blank" href="http://yepeng.blog.51cto.com/3101105/1599937">http://yepeng.blog.51cto.com/3101105/1599937</a></div><div class="single"><span id="tags">[视频]&nbsp;&nbsp;</span>Video: Hackers: the Internet&#039;s immune system<br><a target="_blank" href="http://www.ted.com/talks/keren_elazari_hackers_the_internet_s_immune_system?">http://www.ted.com/talks/keren_elazari_hackers_the_internet_s_immune_system?</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>ICCS 2015:International Conference on Cyber Security<br><a target="_blank" href="http://iccs.fordham.edu/program/iccs2015/">http://iccs.fordham.edu/program/iccs2015/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Cyber-Terrorism: Complexity and Strategy<br><a target="_blank" href="http://resources.infosecinstitute.com/cyber-terrorism-complexity-strategy/">http://resources.infosecinstitute.com/cyber-terrorism-complexity-strategy/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Linux恶意软件简史<br><a target="_blank" href="http://select.yeeyan.org/view/102595/439271">http://select.yeeyan.org/view/102595/439271</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>ShmooCon 2015 Schedule<br><a target="_blank" href="http://www.shmoocon.org/schedule">http://www.shmoocon.org/schedule</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Kali Linux 视频教程<br><a target="_blank" href="http://www.cnblogs.com/xuanhun/tag/Kali%20Linux/">http://www.cnblogs.com/xuanhun/tag/Kali%20Linux/</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>Hacker学习发展流程图 V1.0<br><a target="_blank" href="http://a1pass.blog.163.com/blog/static/29713732201505105831199">http://a1pass.blog.163.com/blog/static/29713732201505105831199</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Metasploit系列教程(第一季)<br><a target="_blank" href="http://www.freebuf.com/articles/web/35930.html">http://www.freebuf.com/articles/web/35930.html</a></div><div class="single"><span id="tags">[视频]&nbsp;&nbsp;</span>2014 Video archives of security conferences and workshops<br><a target="_blank" href="http://contagiodump.blogspot.com/2015/01/video-archives-of-security-conferences.html">http://contagiodump.blogspot.com/2015/01/video-archives-of-security-conferences.html</a></div><div class="single"><span id="tags">[视频]&nbsp;&nbsp;</span>31C3 #youtube video<br><a target="_blank" href="https://www.youtube.com/user/mediacccde">https://www.youtube.com/user/mediacccde</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>DARPA<br><a target="_blank" href="http://www.cybergrandchallenge.com/">http://www.cybergrandchallenge.com/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Embedded devices hacking --IPCAM hacking<br><a target="_blank" href="http://hackdog.me/dog/index.php/2014/11/17/3.html">http://hackdog.me/dog/index.php/2014/11/17/3.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>“暗隐间谍”--利用NDK NativeActivity技术实现Android加固<br><a target="_blank" href="http://blog.csdn.net/androidsecurity/article/details/42142575">http://blog.csdn.net/androidsecurity/article/details/42142575</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>the-backdoor-factory:Patch PE, ELF, Mach-O binaries with shellcode<br><a target="_blank" href="https://github.com/secretsquirrel/the-backdoor-factory">https://github.com/secretsquirrel/the-backdoor-factory</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>pyspider 爬虫教程(1):HTML 和 CSS 选择器<br><a target="_blank" href="http://blog.binux.me/2015/01/pyspider-tutorial-level-1-html-and-css-selector/">http://blog.binux.me/2015/01/pyspider-tutorial-level-1-html-and-css-selector/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Dalvik 指令集汇编<br><a target="_blank" href="http://hj-h.com/558.html">http://hj-h.com/558.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>深度：针对超强手机木马DenDroid的分析与测试<br><a target="_blank" href="http://www.freebuf.com/tools/55392.html">http://www.freebuf.com/tools/55392.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>bypass防火墙绕过技巧总结<br><a target="_blank" href="http://lcx.cc/?i=4474">http://lcx.cc/?i=4474</a></div><div class="single"><span id="tags">[视频]&nbsp;&nbsp;</span>Yeslab现任明教教主TCP/IP 2011完整版<br><a target="_blank" href="http://www.tudou.com/plcover/_ZtUcoNtguw/">http://www.tudou.com/plcover/_ZtUcoNtguw/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>XboxOne_NOV_SDK Download<br><a target="_blank" href="https://mega.co.nz/#!iEhAETgQ!EUMxhVRGl4ENGfGmWIPmLEPNieuA5Z5TzNOxhkrFjaA">https://mega.co.nz/#!iEhAETgQ!EUMxhVRGl4ENGfGmWIPmLEPNieuA5Z5TzNOxhkrFjaA</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>Spy vs. Spy: Rumor Source Obfuscation<br><a target="_blank" href="http://arxiv.org/pdf/1412.8439.pdf">http://arxiv.org/pdf/1412.8439.pdf</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>website backdoors leverage the pastebin service<br><a target="_blank" href="http://blog.sucuri.net/2015/01/website-backdoors-leverage-the-pastebin-service.html">http://blog.sucuri.net/2015/01/website-backdoors-leverage-the-pastebin-service.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span> A Deep Dive Analysis of Android System Service Vulnerability<br><a target="_blank" href="http://researchcenter.paloaltonetworks.com/2015/01/cve-2014-7911-deep-dive-analysis-android-system-service-vulnerability-exploitation/">http://researchcenter.paloaltonetworks.com/2015/01/cve-2014-7911-deep-dive-analysis-android-system-service-vulnerability-exploitation/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>CTF：华硕RT-AC66U路由器漏洞解题分析<br><a target="_blank" href="http://bobao.360.cn/learning/detail/195.html">http://bobao.360.cn/learning/detail/195.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>病毒木马查杀系列教程<br><a target="_blank" href="http://www.52pojie.cn/forum.php?mod=forumdisplay&amp;fid=32&amp;filter=digest&amp;digest=1&amp;orderby=dateline">http://www.52pojie.cn/forum.php?mod=forumdisplay&amp;fid=32&amp;filter=digest&amp;digest=1&amp;orderby=dateline</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>pwntools:CTF framework used by Gallopsled in every CTF<br><a target="_blank" href="https://github.com/Gallopsled/pwntools?v=2.2">https://github.com/Gallopsled/pwntools?v=2.2</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>日志审计系统解决方案<br><a target="_blank" href="http://www.youxia.org/rizhi-shenji-xitong.html">http://www.youxia.org/rizhi-shenji-xitong.html</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>wifiphisher:Fast automated phishing attacks against WPA networks<br><a target="_blank" href="https://github.com/sophron/wifiphisher">https://github.com/sophron/wifiphisher</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Augmenting Binary Analysis with Python and Pin on Vimeo<br><a target="_blank" href="http://vimeo.com/album/3063779/video/114700985">http://vimeo.com/album/3063779/video/114700985</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>31C3 CTF web关writeup<br><a target="_blank" href="http://drops.wooyun.org/papers/4525">http://drops.wooyun.org/papers/4525</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Bitcoin over Tor isn’t a good idea<br><a target="_blank" href="http://arxiv.org/pdf/1410.6079.pdf">http://arxiv.org/pdf/1410.6079.pdf</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Anunak: APT Against Financial Institutions<br><a target="_blank" href="http://www.fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf">http://www.fox-it.com/en/files/2014/12/Anunak_APT-against-financial-institutions2.pdf</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>安全威胁情报体系的建设与应用<br><a target="_blank" href="http://pan.baidu.com/s/1hqGe3YG">http://pan.baidu.com/s/1hqGe3YG</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>安卓app漏洞自动化挖掘PPT<br><a target="_blank" href="http://static.nagain.com/media/AndroidAPP.pdf">http://static.nagain.com/media/AndroidAPP.pdf</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>MaxMind:IP Geolocation <br><a target="_blank" href="https://www.maxmind.com/en/home">https://www.maxmind.com/en/home</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>SpamAssassin:Enterprise Open-Source Spam Filter<br><a target="_blank" href="http://spamassassin.apache.org/">http://spamassassin.apache.org/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Email Address Harvesting for Phishing Attacks<br><a target="_blank" href="http://www.shortbus.ninja/email-address-harvesting-for-phishing-attacks/">http://www.shortbus.ninja/email-address-harvesting-for-phishing-attacks/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>pyspider:A Powerful Spider(Web Crawler) System in Python<br><a target="_blank" href="https://github.com/binux/pyspider">https://github.com/binux/pyspider</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Targeted Attacks against Industrial Control Systems<br><a target="_blank" href="https://seclab.cs.ucsb.edu/media/uploads/papers/targetedattacksvsicss.pdf">https://seclab.cs.ucsb.edu/media/uploads/papers/targetedattacksvsicss.pdf</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>漫谈搜素引擎的排序模型<br><a target="_blank" href="http://blog.csdn.net/yangbutao/article/details/42501371">http://blog.csdn.net/yangbutao/article/details/42501371</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Useful tools for CTF<br><a target="_blank" href="http://delimitry.blogspot.com/2014/10/useful-tools-for-ctf.html">http://delimitry.blogspot.com/2014/10/useful-tools-for-ctf.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>人类社会行为分析 SSI<br><a target="_blank" href="http://www.oschina.net/p/ssi">http://www.oschina.net/p/ssi</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>30 Best Sources For Linux / *BSD / Unix Documentation On the Web<br><a target="_blank" href="http://www.cyberciti.biz/tips/linux-unix-bsd-documentations.html">http://www.cyberciti.biz/tips/linux-unix-bsd-documentations.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Yosemite中安装 Metasploit Framework<br><a target="_blank" href="https://gist.github.com/illnino/a5de098e31e820bab4d7">https://gist.github.com/illnino/a5de098e31e820bab4d7</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Beginner&#039;s Guide to Linkers<br><a target="_blank" href="http://www.lurklurk.org/linkers/linkers.html">http://www.lurklurk.org/linkers/linkers.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Hacking the Tor Network: Follow Up<br><a target="_blank" href="http://resources.infosecinstitute.com/hacking-tor-network-follow/">http://resources.infosecinstitute.com/hacking-tor-network-follow/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>PyExcelerate:Accelerated Excel XLSX Writing Library for Python<br><a target="_blank" href="https://github.com/kz26/PyExcelerate">https://github.com/kz26/PyExcelerate</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>A new Reverse-Engineering Tool for Android and Java Bytecode<br><a target="_blank" href="http://sseblog.ec-spride.de/2014/12/codeinspect/">http://sseblog.ec-spride.de/2014/12/codeinspect/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Websites Compromised with CloudFrond Injection<br><a target="_blank" href="http://blog.sucuri.net/2015/01/websites-compromised-with-cloudfrond-injection.html">http://blog.sucuri.net/2015/01/websites-compromised-with-cloudfrond-injection.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>初探验证码识别<br><a target="_blank" href="http://drops.wooyun.org/tips/4550">http://drops.wooyun.org/tips/4550</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android APP通用型拒绝服务漏洞分析报告<br><a target="_blank" href="http://www.weibo.com/p/1001603796016938781326">http://www.weibo.com/p/1001603796016938781326</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>被遺忘的資訊洩漏<br><a target="_blank" href="http://www.slideshare.net/shaolin3/information-leakage-in-taiwan">http://www.slideshare.net/shaolin3/information-leakage-in-taiwan</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>2014移动安全年度漏洞报告<br><a target="_blank" href="http://jaq.alibaba.com/blog/blog.htm?spm=0.0.0.0.LHNAaE&amp;id=3">http://jaq.alibaba.com/blog/blog.htm?spm=0.0.0.0.LHNAaE&amp;id=3</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>NtApphelpCacheControl漏洞分析<br><a target="_blank" href="http://blogs.360.cn/blog/ntapphelpcachecontrol_vulnerability_anaysis/">http://blogs.360.cn/blog/ntapphelpcachecontrol_vulnerability_anaysis/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Splinter: an open source tool for testing web applications<br><a target="_blank" href="http://splinter.cobrateam.info/en/latest/">http://splinter.cobrateam.info/en/latest/</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>Hack无线门铃 <br><a target="_blank" href="http://parsec.me/808.html">http://parsec.me/808.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>peframe: static analysis on (portable executable) malware<br><a target="_blank" href="https://github.com/guelfoweb/peframe">https://github.com/guelfoweb/peframe</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>4A安全性分析<br><a target="_blank" href="http://drops.wooyun.org/tips/4484">http://drops.wooyun.org/tips/4484</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Deobfuscating Malicious Macros Using Python<br><a target="_blank" href="http://blog.spiderlabs.com/2015/01/tips-for-deobfuscating-the-malicious-macros-using-python.html">http://blog.spiderlabs.com/2015/01/tips-for-deobfuscating-the-malicious-macros-using-python.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>PinTools:Pin tools for dynamic binary analysis<br><a target="_blank" href="https://github.com/JonathanSalwan/PinTools">https://github.com/JonathanSalwan/PinTools</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>jeb:The Interactive Android Decompiler<br><a target="_blank" href="http://down.52pojie.cn/Tools/Android_Tools/">http://down.52pojie.cn/Tools/Android_Tools/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>针对 Node.js 初学者的入门资源汇总<br><a target="_blank" href="http://blog.jobbole.com/17174/">http://blog.jobbole.com/17174/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>2014年中国网站安全报告<br><a target="_blank" href="http://ad6aslbbut.l7.yunpan.cn/lk/cyPuZG3eXNgLt">http://ad6aslbbut.l7.yunpan.cn/lk/cyPuZG3eXNgLt</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>从WORD中提取EXE的分析技术<br><a target="_blank" href="http://blog.sina.com.cn/s/blog_e8e60bc00102velj.html">http://blog.sina.com.cn/s/blog_e8e60bc00102velj.html</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>BACKDOORING EXECUTABLES OVER HTTP<br><a target="_blank" href="http://www.hackinsight.org/news,186.html">http://www.hackinsight.org/news,186.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>机器学习问题的十个实例<br><a target="_blank" href="http://blog.jobbole.com/62334/">http://blog.jobbole.com/62334/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>三星KNOX远程静默安装漏洞深入分析报告<br><a target="_blank" href="http://www.secpulse.com/archives/3817.html">http://www.secpulse.com/archives/3817.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Per-Context Sanitizer Functions<br><a target="_blank" href="https://gist.github.com/soaj1664/a19779edc44abc9743c5">https://gist.github.com/soaj1664/a19779edc44abc9743c5</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>ASUS Router UDP Broadcast Command Execution<br><a target="_blank" href="https://github.com/jduck/asus-cmd">https://github.com/jduck/asus-cmd</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>发掘和利用ntpd漏洞<br><a target="_blank" href="http://drops.wooyun.org/papers/4486">http://drops.wooyun.org/papers/4486</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>babel-sf:Babel Scripting Framework<br><a target="_blank" href="https://github.com/attackdebris/babel-sf">https://github.com/attackdebris/babel-sf</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>国外程序员收集整理的 PHP 资源大全<br><a target="_blank" href="http://blog.jobbole.com/82908/">http://blog.jobbole.com/82908/</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/45">SecWiki周刊(第45期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
