<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第53期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第53期）</strong></h5>
<blockquote> 2015/03/02-2015/03/08</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>网络空间安全企业500强<br><a target="_blank" href="http://www.aqniu.com/security-reports/6735.html">http://www.aqniu.com/security-reports/6735.html</a></div><div class="single"><span id="tags">[视频]&nbsp;&nbsp;</span>Ars kicks off March with Hacker Movie Madness <br><a target="_blank" href="http://arstechnica.com/the-multiverse/2015/03/ars-kicks-off-march-with-hacker-movie-madness/">http://arstechnica.com/the-multiverse/2015/03/ars-kicks-off-march-with-hacker-movie-madness/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Xiaomi Mi 4 Pre-loaded with Malware and Custom Android ROM<br><a target="_blank" href="http://thehackernews.com/2015/03/Xiaomi-Mi-4-malware.html">http://thehackernews.com/2015/03/Xiaomi-Mi-4-malware.html</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>SECore：SECurity Organizer &amp; Reporter Exchange<br><a target="_blank" href="https://secore.info/">https://secore.info/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>机读安全威胁情报实例之 FireEye POISON IVY<br><a target="_blank" href="http://www.sec-un.org/fireeye-machine-readable-security-threat-intelligence-instance-poison-ivy.html">http://www.sec-un.org/fireeye-machine-readable-security-threat-intelligence-instance-poison-ivy.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>机读安全威胁情报实例之 Mandiant APT1<br><a target="_blank" href="http://www.sec-un.org/mandiant-security-threat-intelligence-instance-apt1.html">http://www.sec-un.org/mandiant-security-threat-intelligence-instance-apt1.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Signal 2.0: Private messaging comes to the iPhone<br><a target="_blank" href="https://whispersystems.org/blog/the-new-signal/">https://whispersystems.org/blog/the-new-signal/</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>与马道长聊 Docker<br><a target="_blank" href="http://teahour.fm/2015/02/13/docker-introduction.html">http://teahour.fm/2015/02/13/docker-introduction.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>​360安全应急响应中心重大改版(2015年3月)<br><a target="_blank" href="http://weibo.com/p/1001603817394094115262">http://weibo.com/p/1001603817394094115262</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>我从Superfish事件中学到的<br><a target="_blank" href="http://drops.wooyun.org/papers/5080">http://drops.wooyun.org/papers/5080</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Angler Exploit Kit Using k33nteam’s Internet Explorer Use After Free<br><a target="_blank" href="https://www.fireeye.com/blog/threat-research/2015/02/angler_exploit_kitu.html">https://www.fireeye.com/blog/threat-research/2015/02/angler_exploit_kitu.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>[我们是这样理解语言的-2]统计语言模型<br><a target="_blank" href="http://www.flickering.cn/nlp/2015/02/%E6%88%91%E4%BB%AC%E6%98%AF%E8%BF%99%E6%A0%B7%E7%90%86%E8%A7%A3%E8%AF%AD%E8%A8%80%E7%9A%84-2%E7%BB%9F%E8%AE%A1%E8%AF%AD%E8%A8%80%E6%A8%A1%E5%9E%8B/">http://www.flickering.cn/nlp/2015/02/%E6%88%91%E4%BB%AC%E6%98%AF%E8%BF%99%E6%A0%B7%E7%90%86%E8%A7%A3%E8%AF%AD%E8%A8%80%E7%9A%84-2%E7%BB%9F%E8%AE%A1%E8%AF%AD%E8%A8%80%E6%A8%A1%E5%9E%8B/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Boston Key Party 2015 – Wellington<br><a target="_blank" href="http://wiremask.eu/boston-key-party-2015-wellington/">http://wiremask.eu/boston-key-party-2015-wellington/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>修改硬盘固件的木马_V1.3<br><a target="_blank" href="http://www.antiy.com/response/EQUATION_ANTIY_REPORT.html">http://www.antiy.com/response/EQUATION_ANTIY_REPORT.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>绿盟科技发布2014年DDoS威胁报告<br><a target="_blank" href="http://www.aqniu.com/?wpdmact=process&amp;did=NjYuaG90bGluaw==">http://www.aqniu.com/?wpdmact=process&amp;did=NjYuaG90bGluaw==</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Attack of the week: FREAK (or &#039;factoring the NSA for fun and profit&#039;)<br><a target="_blank" href="http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html">http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>新型任意文件读取漏洞的研究 <br><a target="_blank" href="http://drops.wooyun.org/papers/5040">http://drops.wooyun.org/papers/5040</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Kolejny XSS w www.google.com (Custom Search Engine)<br><a target="_blank" href="http://sekurak.pl/kolejny-xss-w-www-google-com-custom-search-engine/">http://sekurak.pl/kolejny-xss-w-www-google-com-custom-search-engine/</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>黑客防线2015年第2期杂志<br><a target="_blank" href="http://www.hacker.com.cn/show-7-2744-1.html">http://www.hacker.com.cn/show-7-2744-1.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>在Flash中利用PCRE正则式漏洞CVE-2015-0318的方法<br><a target="_blank" href="http://drops.wooyun.org/papers/5030">http://drops.wooyun.org/papers/5030</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>安全漏洞本质扯谈之安全技能之外<br><a target="_blank" href="http://weibo.com/p/1001643816243969798634">http://weibo.com/p/1001643816243969798634</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>dirs3arch:HTTP(S) directory/file brute forcer<br><a target="_blank" href="https://github.com/maurosoria/dirs3arch">https://github.com/maurosoria/dirs3arch</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>Peacock：大规模主题模型及其在腾讯业务中的应用<br><a target="_blank" href="http://www.flickering.cn/nlp/2015/03/peacock%ef%bc%9a%e5%a4%a7%e8%a7%84%e6%a8%a1%e4%b8%bb%e9%a2%98%e6%a8%a1%e5%9e%8b%e5%8f%8a%e5%85%b6%e5%9c%a8%e8%85%be%e8%ae%af%e4%b8%9a%e5%8a%a1%e4%b8%ad%e7%9a%84%e5%ba%94%e7%94%a8/">http://www.flickering.cn/nlp/2015/03/peacock%ef%bc%9a%e5%a4%a7%e8%a7%84%e6%a8%a1%e4%b8%bb%e9%a2%98%e6%a8%a1%e5%9e%8b%e5%8f%8a%e5%85%b6%e5%9c%a8%e8%85%be%e8%ae%af%e4%b8%9a%e5%8a%a1%e4%b8%ad%e7%9a%84%e5%ba%94%e7%94%a8/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>ElasticSearch 远程代码执行漏洞分析（CVE-2015-1427）<br><a target="_blank" href="http://drops.wooyun.org/papers/5142">http://drops.wooyun.org/papers/5142</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Fireeye Mandiant 2014 安全报告 Part1<br><a target="_blank" href="http://drops.wooyun.org/papers/5042">http://drops.wooyun.org/papers/5042</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Exploiting CVE-2015-0311: A Use-After-Free in Adobe Flash Player<br><a target="_blank" href="http://blog.coresecurity.com/2015/03/04/exploiting-cve-2015-0311-a-use-after-free-in-adobe-flash-player/">http://blog.coresecurity.com/2015/03/04/exploiting-cve-2015-0311-a-use-after-free-in-adobe-flash-player/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Pulsar:Internet Scale Real-time Analytics Using Streaming SQL<br><a target="_blank" href="http://gopulsar.io/">http://gopulsar.io/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>延长 XSS 生命期<br><a target="_blank" href="http://drops.wooyun.org/web/5049">http://drops.wooyun.org/web/5049</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Utilizing NLP To Detect APT in DNS<br><a target="_blank" href="https://labs.opendns.com/2015/03/05/nlp-apt-dns/">https://labs.opendns.com/2015/03/05/nlp-apt-dns/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Modern Defense Against CSRF Attacks<br><a target="_blank" href="https://resonantcore.net/blog/2015/02/modern-defense-against-csrf-attacks">https://resonantcore.net/blog/2015/02/modern-defense-against-csrf-attacks</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>利用第三方软件 0day 漏洞加载和执行的木马分析 <br><a target="_blank" href="http://drops.wooyun.org/tips/5086">http://drops.wooyun.org/tips/5086</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/53">SecWiki周刊(第53期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
