<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第185期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第185期）</strong></h5>
<blockquote> 2017/09/11-2017/09/17</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>2017国家网络安全宣传周参展企业盘点<br><a target="_blank" href="https://mp.weixin.qq.com/s/fNH-gfKMK7hjfUq7J6Y1-Q">https://mp.weixin.qq.com/s/fNH-gfKMK7hjfUq7J6Y1-Q</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>Ten Malicious Libraries Found on PyPI<br><a target="_blank" href="https://www.bleepingcomputer.com/news/security/ten-malicious-libraries-found-on-pypi-python-package-index/">https://www.bleepingcomputer.com/news/security/ten-malicious-libraries-found-on-pypi-python-package-index/</a></div><div class="single"><span id="tags">[视频]&nbsp;&nbsp;</span>53亿台蓝牙功能设备受“BlueBorne”攻击影响【视频】<br><a target="_blank" href="https://www.easyaq.com/news/1543340364.shtml">https://www.easyaq.com/news/1543340364.shtml</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Equifax数据开价600比特币，有黑客号召众筹模式进行购买<br><a target="_blank" href="https://nosec.org/my/threats/1562#">https://nosec.org/my/threats/1562#</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>黑客小说 杀手 第十八章 X计划<br><a target="_blank" href="http://www.jianshu.com/p/7fdc32b207e6">http://www.jianshu.com/p/7fdc32b207e6</a></div><div class="single"><span id="tags">[法规]&nbsp;&nbsp;</span>公共互联网网络安全威胁监测与处置办法<br><a target="_blank" href="http://www.gov.cn/xinwen/2017-09/13/5224866/files/398ec5602a254ef39e3523e2ac90c4bd.doc">http://www.gov.cn/xinwen/2017-09/13/5224866/files/398ec5602a254ef39e3523e2ac90c4bd.doc</a></div><div class="single"><span id="tags">[事件]&nbsp;&nbsp;</span>美国在网络战场上与ISIS展开全面对抗<br><a target="_blank" href="https://www.easyaq.com/news/1014953255.shtml">https://www.easyaq.com/news/1014953255.shtml</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>How to Deter Russian Cyber Attacks<br><a target="_blank" href="http://nationalinterest.org/blog/the-buzz/how-deter-russian-cyber-attacks-21514">http://nationalinterest.org/blog/the-buzz/how-deter-russian-cyber-attacks-21514</a></div><div class="single"><span id="tags">[事件]&nbsp;&nbsp;</span>墨西哥退税网站MoneyBack泄露400GB客户敏感数据<br><a target="_blank" href="https://www.easyaq.com/news/678569852.shtml">https://www.easyaq.com/news/678569852.shtml</a></div><div class="single"><span id="tags">[视频]&nbsp;&nbsp;</span>The CTO Journey at a Small Startup<br><a target="_blank" href="https://zapier.com/engineering/startup-cto/?utm_source=wanqu.co&amp;utm_campaign=Wanqu+Daily&amp;utm_medium=website">https://zapier.com/engineering/startup-cto/?utm_source=wanqu.co&amp;utm_campaign=Wanqu+Daily&amp;utm_medium=website</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>全球165万台设备被感染，电脑变僵尸挖矿军！<br><a target="_blank" href="https://www.easyaq.com/news/1309421880.shtml">https://www.easyaq.com/news/1309421880.shtml</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>公安机关信息安全等级保护检查工作规范（试行）<br><a target="_blank" href="http://www.djbh.net/webdev/web/PolicyStandardsAction.do?p=getGlgf&amp;id=8a8182565deefd0d015e6f9f0d640088&amp;from=timeline&amp;isappinstalled=0">http://www.djbh.net/webdev/web/PolicyStandardsAction.do?p=getGlgf&amp;id=8a8182565deefd0d015e6f9f0d640088&amp;from=timeline&amp;isappinstalled=0</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>​FireEye：朝鲜为什么对加密货币兴趣浓厚？<br><a target="_blank" href="https://www.easyaq.com/news/694315619.shtml">https://www.easyaq.com/news/694315619.shtml</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>蓝牙协议爆严重安全漏洞，可在旧版本设备上构建勒索僵尸网络<br><a target="_blank" href="http://www.4hou.com/info/news/7627.html">http://www.4hou.com/info/news/7627.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Critical Bluetooth Flaws Put Over 5 Billion Devices At Risk Of Hacking<br><a target="_blank" href="https://www.forbes.com/sites/lconstantin/2017/09/12/critical-bluetooth-flaws-put-over-5-billion-devices-at-risk-of-hacking/#381c46bd68b1">https://www.forbes.com/sites/lconstantin/2017/09/12/critical-bluetooth-flaws-put-over-5-billion-devices-at-risk-of-hacking/#381c46bd68b1</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>美国私营军事承包商9402份招聘文件是如何泄露的？<br><a target="_blank" href="https://www.easyaq.com/news/189596332.shtml">https://www.easyaq.com/news/189596332.shtml</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>研究人员发现利用Excel宏可发起跳板攻击<br><a target="_blank" href="https://www.easyaq.com/news/2133633215.shtml">https://www.easyaq.com/news/2133633215.shtml</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Apache Struts vulnerability likely behind Equifax breach, Congress launches prob<br><a target="_blank" href="https://www.scmagazine.com/apache-struts-vulnerability-likely-behind-equifax-breach-congress-launches-probes/article/687955/">https://www.scmagazine.com/apache-struts-vulnerability-likely-behind-equifax-breach-congress-launches-probes/article/687955/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>黑客获得美国电网的控制访问权限<br><a target="_blank" href="https://nosec.org/my/threats/1556">https://nosec.org/my/threats/1556</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Mongodb提升安全能力，以应对全球最新一波的勒索<br><a target="_blank" href="https://nosec.org/my/threats/1557">https://nosec.org/my/threats/1557</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>4000余台ElasticSearch服务器遭PoS恶意软件感染<br><a target="_blank" href="https://www.easyaq.com/news/574579272.shtml">https://www.easyaq.com/news/574579272.shtml</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>最近挖src一些小套路总结<br><a target="_blank" href="http://www.cuijianxiong.top/?p=148">http://www.cuijianxiong.top/?p=148</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>Ichidan：最强暗网搜索引擎，暗网版的shodan<br><a target="_blank" href="https://mp.weixin.qq.com/s/BiB_pIb9VdoPhjr1e3TeYA">https://mp.weixin.qq.com/s/BiB_pIb9VdoPhjr1e3TeYA</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>项目实战：如何构建知识图谱<br><a target="_blank" href="https://mp.weixin.qq.com/s/cL1aKdu8ig8-ocOPirXk2w">https://mp.weixin.qq.com/s/cL1aKdu8ig8-ocOPirXk2w</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>.NET框架0Day漏洞CVE-2017-8759复现过程<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2116.html">https://xianzhi.aliyun.com/forum/read/2116.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>后渗透测试神器Empire的详解<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2091.html">https://xianzhi.aliyun.com/forum/read/2091.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>自己总结的常规入侵流程脑图<br><a target="_blank" href="https://klionsec.github.io/2017/09/08/pentestaction/">https://klionsec.github.io/2017/09/08/pentestaction/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY<br><a target="_blank" href="https://www.fireeye.com/blog/threat-research/2017/09/zero-day-used-to-distribute-finspy.html">https://www.fireeye.com/blog/threat-research/2017/09/zero-day-used-to-distribute-finspy.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>比敌人更了解敌人 [ 取证入门 web篇 ]<br><a target="_blank" href="http://www.freebuf.com/column/147929.html">http://www.freebuf.com/column/147929.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Onethink 全版本SSRF漏洞[0day]<br><a target="_blank" href="https://nosec.org/my/threats/1555">https://nosec.org/my/threats/1555</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android O 内核加固与缓解机制<br><a target="_blank" href="http://ne2der.com/2017/Hardening-the-Kernel-in-Android-Oreo/">http://ne2der.com/2017/Hardening-the-Kernel-in-Android-Oreo/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>ARM exploitation for IoT – Episode 2<br><a target="_blank" href="https://quequero.org/2017/09/arm-exploitation-iot-episode-2/">https://quequero.org/2017/09/arm-exploitation-iot-episode-2/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>HTTPS浅析与抓包分析 <br><a target="_blank" href="http://www.lsablog.com/protocol/https/https-analysis/">http://www.lsablog.com/protocol/https/https-analysis/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Kali linux2.0系统安装DVWA渗透测试平台 <br><a target="_blank" href="https://bbs.ichunqiu.com/thread-27087-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-27087-1-1.html?from=sec</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>工控蜜罐Conpot部署和入门指南<br><a target="_blank" href="http://www.freebuf.com/column/147545.html">http://www.freebuf.com/column/147545.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>揭秘地下色情诱导网站<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/29184710">https://zhuanlan.zhihu.com/p/29184710</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>软件供应链来源攻击分析报告<br><a target="_blank" href="http://bobao.360.cn/learning/detail/4395.html">http://bobao.360.cn/learning/detail/4395.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>windows server 2012上的MS17－010漏洞复现<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-26998-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-26998-1-1.html?from=sec</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>D-link 10个0Day漏洞分析（附细节）<br><a target="_blank" href="http://www.freebuf.com/vuls/147445.html">http://www.freebuf.com/vuls/147445.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.<br><a target="_blank" href="https://github.com/vysec/CVE-2017-8759">https://github.com/vysec/CVE-2017-8759</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Nicky Bloor - BaRMIe - Poking Java&#039;s Back Door - 44CON 2017<br><a target="_blank" href="https://www.slideshare.net/NickBloor3/nicky-bloor-barmie-poking-javas-back-door-44con-2017">https://www.slideshare.net/NickBloor3/nicky-bloor-barmie-poking-javas-back-door-44con-2017</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>我理解的态势感知<br><a target="_blank" href="http://www.jianshu.com/p/8f7d8ae7bade?utm_source=desktop&amp;utm_medium=timeline">http://www.jianshu.com/p/8f7d8ae7bade?utm_source=desktop&amp;utm_medium=timeline</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>jsql-injection Java sql注入工具<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-26917-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-26917-1-1.html?from=sec</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>新态势感知系列（1）：从态势感知到全方位态势感知<br><a target="_blank" href="http://yepeng.blog.51cto.com/3101105/1966070?from=timeline&amp;isappinstalled=0">http://yepeng.blog.51cto.com/3101105/1966070?from=timeline&amp;isappinstalled=0</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>SheepSec: 7 Reflected Cross-site Scripting (XSS) Examples<br><a target="_blank" href="http://sheepsec.com/blog/7-reflected-xss.html">http://sheepsec.com/blog/7-reflected-xss.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Spaghetti v0.1.1 - Web Application Security Scanner<br><a target="_blank" href="https://github.com/m4ll0k/Spaghetti">https://github.com/m4ll0k/Spaghetti</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>工控蜜罐 Conpot 的进阶玩法<br><a target="_blank" href="http://www.freebuf.com/column/147560.html">http://www.freebuf.com/column/147560.html</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>甲方工作杂谈<br><a target="_blank" href="https://mp.weixin.qq.com/s/k5-0tpRps8HFJCdOxtRygg">https://mp.weixin.qq.com/s/k5-0tpRps8HFJCdOxtRygg</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>P4wnP1 – The Pi Zero based USB attack Platform <br><a target="_blank" href="https://dantheiotman.com/2017/09/15/p4wnp1-the-pi-zero-based-usb-attack-platform/">https://dantheiotman.com/2017/09/15/p4wnp1-the-pi-zero-based-usb-attack-platform/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>快禁用“语音助手”！黑客可利用超声波劫持所有主流语音识别平台<br><a target="_blank" href="https://www.easyaq.com/news/223816956.shtml">https://www.easyaq.com/news/223816956.shtml</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>如何制作基础认证钓鱼页面？<br><a target="_blank" href="http://www.4hou.com/technology/7600.html">http://www.4hou.com/technology/7600.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>一些有趣的代码审计“小”题目<br><a target="_blank" href="https://github.com/CHYbeta/Code-Audit-Challenges">https://github.com/CHYbeta/Code-Audit-Challenges</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>通过DNS响应欺骗来绕过域控制验证<br><a target="_blank" href="http://www.4hou.com/technology/7657.html">http://www.4hou.com/technology/7657.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>HandyCollaborator: Burp Suite plugin created for using Collaborator tool <br><a target="_blank" href="https://github.com/federicodotta/HandyCollaborator">https://github.com/federicodotta/HandyCollaborator</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>从PHP源码与扩展开发谈PHP任意代码执行与防御<br><a target="_blank" href="https://blog.zsxsoft.com/post/30?hmsr=toutiao.io&amp;utm_medium=toutiao.io&amp;utm_source=toutiao.io">https://blog.zsxsoft.com/post/30?hmsr=toutiao.io&amp;utm_medium=toutiao.io&amp;utm_source=toutiao.io</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>ASPX编译dll隐藏shell&amp;Docker Remote API利用姿势<br><a target="_blank" href="http://blackwolfsec.cc/2017/09/11/Dll-aspx&amp;docker/">http://blackwolfsec.cc/2017/09/11/Dll-aspx&amp;docker/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>How to perform SSH Log Poisoning through LFI to exploit a web server?<br><a target="_blank" href="https://infosecaddicts.com/ssh-log-poisoning-performed-lfi-exploit-web-server/">https://infosecaddicts.com/ssh-log-poisoning-performed-lfi-exploit-web-server/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Detecting Mimikatz &amp; other Suspicious LSASS Access - Part 1<br><a target="_blank" href="https://www.eideon.com/2017-09-09-THL01-Mimikatz/">https://www.eideon.com/2017-09-09-THL01-Mimikatz/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Catfish—缓存漏洞&amp;&amp;配合CSRF到Getshell<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2103.html">https://xianzhi.aliyun.com/forum/read/2103.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>sqli-labs lession 5 之盲注型SQL入门<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-27052-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-27052-1-1.html?from=sec</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Anatomy of a Hack: SQLi to Enterprise Admin<br><a target="_blank" href="https://www.notsosecure.com/anatomy-of-a-hack-sqli-to-enterprise-admin/">https://www.notsosecure.com/anatomy-of-a-hack-sqli-to-enterprise-admin/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>利用基于控制流图（CFG）的模糊 Hash 实现恶意软件的分类<br><a target="_blank" href="https://github.com/radareorg/r2con-2017/blob/master/talks/cfg-fuzzy-hash/Machoke-cfg-based-fuzzy-hash.pdf">https://github.com/radareorg/r2con-2017/blob/master/talks/cfg-fuzzy-hash/Machoke-cfg-based-fuzzy-hash.pdf</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>在一款D-Link消费级路由器上，我发现了10个严重漏洞<br><a target="_blank" href="http://www.4hou.com/technology/7638.html">http://www.4hou.com/technology/7638.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>浅谈企业内部安全漏洞的运营(一)——规范化<br><a target="_blank" href="https://mp.weixin.qq.com/s/eHB9zA0dZ-4Fv6ZpKzkHYA">https://mp.weixin.qq.com/s/eHB9zA0dZ-4Fv6ZpKzkHYA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Advanced Flash vulnerabilities in Youtube – Part 4<br><a target="_blank" href="https://opnsec.com/2017/09/advanced-flash-vulnerabilities-in-youtube-part-4/">https://opnsec.com/2017/09/advanced-flash-vulnerabilities-in-youtube-part-4/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2016-5195(Dirtycow)检测脚本及Ubuntu升级内核方法 <br><a target="_blank" href="http://pirogue.org/2017/09/12/dirtycow/">http://pirogue.org/2017/09/12/dirtycow/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>代码审计之Catfish CMS v4.5.7后台作者权限越权两枚+存储型XSS一枚#<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-26914-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-26914-1-1.html?from=sec</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Bypass_safedog_Sql注入<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-26843-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-26843-1-1.html?from=sec</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Empire中的Invoke-WScriptBypassUAC利用分析<br><a target="_blank" href="http://www.4hou.com/technology/7636.html">http://www.4hou.com/technology/7636.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>socksmon: Monitor arbitrary TCP traffic using your HTTP proxy<br><a target="_blank" href="https://github.com/mrschyte/socksmon">https://github.com/mrschyte/socksmon</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Debugging malicious windows scriptlets with Google chrome<br><a target="_blank" href="https://medium.com/@0xamit/debugging-malicious-windows-scriptlets-with-google-chrome-c31ba409975c">https://medium.com/@0xamit/debugging-malicious-windows-scriptlets-with-google-chrome-c31ba409975c</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>攻击SQL Server的CLR库<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2110.html">https://xianzhi.aliyun.com/forum/read/2110.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>asatools: Main repository to pull all NCC Group Cisco ASA-related tool projects.<br><a target="_blank" href="https://github.com/nccgroup/asatools">https://github.com/nccgroup/asatools</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Powershell-based Windows Security Auditing Toolbox<br><a target="_blank" href="https://github.com/A-mIn3/WINspect">https://github.com/A-mIn3/WINspect</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>攻撃者視点で見るService Worker / PWA Study SW // Speaker Deck<br><a target="_blank" href="https://speakerdeck.com/masatokinugawa/pwa-study-sw">https://speakerdeck.com/masatokinugawa/pwa-study-sw</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第184期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/184">https://www.sec-wiki.com/weekly/184</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Chrome Unsafe-inline CSP Bypass<br><a target="_blank" href="https://www.math1as.com/index.php/archives/507/">https://www.math1as.com/index.php/archives/507/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Hacking with Netcat part 1: The Basics<br><a target="_blank" href="http://www.hackingtutorials.org/networking/hacking-with-netcat-part-1-the-basics/">http://www.hackingtutorials.org/networking/hacking-with-netcat-part-1-the-basics/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>利用威胁情报数据平台拓展APT攻击线索一例<br><a target="_blank" href="https://mp.weixin.qq.com/s/FYTcRT2kHYOq_rxkY3pilg">https://mp.weixin.qq.com/s/FYTcRT2kHYOq_rxkY3pilg</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>SSD Advisory – WiseGiga NAS Multiple Vulnerabilities<br><a target="_blank" href="https://blogs.securiteam.com/index.php/archives/3402">https://blogs.securiteam.com/index.php/archives/3402</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Command and Control – WebDAV<br><a target="_blank" href="https://pentestlab.blog/2017/09/12/command-and-control-webdav/">https://pentestlab.blog/2017/09/12/command-and-control-webdav/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>从一个补了三次的漏洞看WCF的安全编程 <br><a target="_blank" href="http://xlab.tencent.com/cn/2017/09/11/safe-coding-of-wcf-viewed-from-a-longlive-vulnerability/">http://xlab.tencent.com/cn/2017/09/11/safe-coding-of-wcf-viewed-from-a-longlive-vulnerability/</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>Hacking with Netcat part 2: Bind and reverse shells<br><a target="_blank" href="http://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/">http://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>Hacking with Netcat part 3: Advanced Techniques<br><a target="_blank" href="http://www.hackingtutorials.org/networking/hacking-with-netcat-part-3-advanced-techniques/">http://www.hackingtutorials.org/networking/hacking-with-netcat-part-3-advanced-techniques/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>A Walk in the Workplace – These aren&#039;t the access_tokens you&#039;re looking for<br><a target="_blank" href="http://philippeharewood.com/a-walk-in-the-workplace/">http://philippeharewood.com/a-walk-in-the-workplace/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>awesome-osint: A curated list of amazingly awesome OSINT<br><a target="_blank" href="https://github.com/jivoi/awesome-osint">https://github.com/jivoi/awesome-osint</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>A beginners guide to bug bounties<br><a target="_blank" href="https://ret2libc.wordpress.com/2016/03/22/a-beginners-guide-to-bug-bounties/">https://ret2libc.wordpress.com/2016/03/22/a-beginners-guide-to-bug-bounties/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>crlf-injector: Auto CRLF Injector<br><a target="_blank" href="https://github.com/rudSarkar/crlf-injector">https://github.com/rudSarkar/crlf-injector</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Use DNS Rebinding to Bypass SSRF in JAVA<br><a target="_blank" href="https://joychou.org/web/use-dnsrebinding-to-bypass-ssrf-in-java.html">https://joychou.org/web/use-dnsrebinding-to-bypass-ssrf-in-java.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>JavaScript Dangerous Functions (Part 1) - HTML Manipulation<br><a target="_blank" href="http://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html">http://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Joomla Templates Under Hacking Attack<br><a target="_blank" href="https://nosec.org/my/threats/1553">https://nosec.org/my/threats/1553</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>蜻蜓二代“Dragonfly2.0”恶意组件分析报告（上篇）<br><a target="_blank" href="https://paper.seebug.org/388/">https://paper.seebug.org/388/</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/185">SecWiki周刊(第185期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
