<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第49期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第49期）</strong></h5>
<blockquote> 2015/02/02-2015/02/08</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>初创公司通过CPU拦截恶意软件<br><a target="_blank" href="http://www.aqniu.com/neotech/6497.html">http://www.aqniu.com/neotech/6497.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>一种新型的DDoS：“胡乱域名”攻击<br><a target="_blank" href="http://www.aqniu.com/threat-alert/6568.html">http://www.aqniu.com/threat-alert/6568.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>2月3日sec-un安全技术沙龙技术观点速记<br><a target="_blank" href="http://www.sec-un.org/february-3-sec-un-security-technology-salon-technical-shorthand.html">http://www.sec-un.org/february-3-sec-un-security-technology-salon-technical-shorthand.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>奥巴马要求140亿美元建立网络空间安全<br><a target="_blank" href="http://www.aqniu.com/news/6529.html">http://www.aqniu.com/news/6529.html</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>美国国家网络空间国际战略<br><a target="_blank" href="http://www.valleytalk.org/2015/02/06/%e8%a7%a3%e5%af%86%ef%bc%9a%e7%be%8e%e5%9b%bd%e5%9b%bd%e5%ae%b6%e7%bd%91%e7%bb%9c%e7%a9%ba%e9%97%b4%e5%9b%bd%e9%99%85%e6%88%98%e7%95%a5/">http://www.valleytalk.org/2015/02/06/%e8%a7%a3%e5%af%86%ef%bc%9a%e7%be%8e%e5%9b%bd%e5%9b%bd%e5%ae%b6%e7%bd%91%e7%bb%9c%e7%a9%ba%e9%97%b4%e5%9b%bd%e9%99%85%e6%88%98%e7%95%a5/</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>SyScan&#039;15 Singapore program<br><a target="_blank" href="https://www.syscan.org/index.php/sg/program">https://www.syscan.org/index.php/sg/program</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>TangScan:唐朝Web漏洞扫描器框架<br><a target="_blank" href="https://github.com/WooYun/TangScan">https://github.com/WooYun/TangScan</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Microsoft Windows Server 2003 SP2(CVE-2014-4076)本地提权(含exp)<br><a target="_blank" href="http://www.cnxhacker.com/2015/02/02/6966.html">http://www.cnxhacker.com/2015/02/02/6966.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>谷歌全球ip地址库，妈妈再也不用担心我上不去谷歌啦~<br><a target="_blank" href="http://www.cnxhacker.com/2014/06/11/424.html">http://www.cnxhacker.com/2014/06/11/424.html</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>通过javascript破解TP-Link路由器（含Poc和视频）<br><a target="_blank" href="http://www.cnxhacker.com/2015/02/05/7084.html">http://www.cnxhacker.com/2015/02/05/7084.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android Banking Trojan and SMS stealer floating in the wild<br><a target="_blank" href="http://research.zscaler.com/2015/02/android-banking-trojan-and-sms-stealer.html">http://research.zscaler.com/2015/02/android-banking-trojan-and-sms-stealer.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>leakScan:在线漏洞扫描<br><a target="_blank" href="https://github.com/Skycrab/leakScan">https://github.com/Skycrab/leakScan</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>wydomain:目标系统信息收集组件<br><a target="_blank" href="https://github.com/ring04h/wydomain">https://github.com/ring04h/wydomain</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Dshell:a network forensic analysis framework.<br><a target="_blank" href="https://github.com/USArmyResearchLab/Dshell">https://github.com/USArmyResearchLab/Dshell</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>文件系统取证分析（第11章：NTFS概念）<br><a target="_blank" href="http://www.cnblogs.com/skogkatt/p/4246783.html">http://www.cnblogs.com/skogkatt/p/4246783.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Python scripts for reverse engineering.<br><a target="_blank" href="https://github.com/tandasat/scripts_for_RE">https://github.com/tandasat/scripts_for_RE</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Exploiting “BadIRET” (CVE-2014-9322, Linux kernel privilege escalation)<br><a target="_blank" href="http://labs.bromium.com/2015/02/02/exploiting-badiret-vulnerability-cve-2014-9322-linux-kernel-privilege-escalation/">http://labs.bromium.com/2015/02/02/exploiting-badiret-vulnerability-cve-2014-9322-linux-kernel-privilege-escalation/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Akamai互联网安全情报:2014年第四季度DDoS报告<br><a target="_blank" href="http://www.aqniu.com/security-reports/6509.html">http://www.aqniu.com/security-reports/6509.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>A sample of malware I analyzed<br><a target="_blank" href="https://raw.githubusercontent.com/arvinddoraiswamy/blahblah/master/somevirus.pdf">https://raw.githubusercontent.com/arvinddoraiswamy/blahblah/master/somevirus.pdf</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>libfacedetection:人脸检测库<br><a target="_blank" href="https://github.com/ShiqiYu/libfacedetection">https://github.com/ShiqiYu/libfacedetection</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>逆向分析 360 for linux 版本<br><a target="_blank" href="http://v2ex.com/t/168194#reply0">http://v2ex.com/t/168194#reply0</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Angler Exploit Kit – New Variants<br><a target="_blank" href="http://blogs.cisco.com/security/talos/angler-variants">http://blogs.cisco.com/security/talos/angler-variants</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Awk 20 分钟入门介绍<br><a target="_blank" href="http://blog.jobbole.com/83844/">http://blog.jobbole.com/83844/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>笔记: Data Retrieval over DNS in SQL Injection Attacks<br><a target="_blank" href="https://www.ricter.me/posts/%E7%AC%94%E8%AE%B0:%20Data%20Retrieval%20over%20DNS%20in%20SQL%20Injection%20Attacks">https://www.ricter.me/posts/%E7%AC%94%E8%AE%B0:%20Data%20Retrieval%20over%20DNS%20in%20SQL%20Injection%20Attacks</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>iptraf: A TCP/UDP Network Monitoring Utility | Unixmen<br><a target="_blank" href="http://www.unixmen.com/iptraf-tcpudp-network-monitoring-utility/">http://www.unixmen.com/iptraf-tcpudp-network-monitoring-utility/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>对欧姆龙设备的一次全球统计报告<br><a target="_blank" href="http://plcscan.org/blog/2015/02/omron-fins-protocol-global-census-report/">http://plcscan.org/blog/2015/02/omron-fins-protocol-global-census-report/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>电子取证实例：基于文件系统的磁盘数据取证分析<br><a target="_blank" href="http://www.freebuf.com/articles/system/57804.html">http://www.freebuf.com/articles/system/57804.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>wyportmap:目标端口扫描+系统服务指纹识别<br><a target="_blank" href="https://github.com/ring04h/wyportmap">https://github.com/ring04h/wyportmap</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>How To Keep A Process Running After Putty Or SSH Session Closed<br><a target="_blank" href="http://www.unixmen.com/linux-troubleshooting-keep-process-running-putty-ssh-session-closed/">http://www.unixmen.com/linux-troubleshooting-keep-process-running-putty-ssh-session-closed/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CPU backdoors<br><a target="_blank" href="http://danluu.com/cpu-backdoors/">http://danluu.com/cpu-backdoors/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>理解php对象注入<br><a target="_blank" href="http://drops.wooyun.org/papers/4820">http://drops.wooyun.org/papers/4820</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Comparing DOM based XSS Identification Tools on Rea Vulnerability<br><a target="_blank" href="http://blog.mindedsecurity.com/2015/02/comparing-dom-based-xss-identification.html">http://blog.mindedsecurity.com/2015/02/comparing-dom-based-xss-identification.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Analysis on Internet Explorer&#039;s UXSS<br><a target="_blank" href="http://innerht.ml/blog/ie-uxss.html">http://innerht.ml/blog/ie-uxss.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>RansomWeb:一种新兴的web安全威胁<br><a target="_blank" href="http://drops.wooyun.org/papers/4834">http://drops.wooyun.org/papers/4834</a></div><div class="single"><span id="tags">[视频]&nbsp;&nbsp;</span>Dumping Ad Hashes Without Process Injection<br><a target="_blank" href="http://www.securitytube.net/video/12286?utm_source=HT&amp;utm_medium=twitter&amp;utm_campaign=SM">http://www.securitytube.net/video/12286?utm_source=HT&amp;utm_medium=twitter&amp;utm_campaign=SM</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>PortEx:a Java library for static malware analysis of portable executable file<br><a target="_blank" href="http://katjahahn.github.io/PortEx/">http://katjahahn.github.io/PortEx/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Account Hunting for Invoke-TokenManipulation<br><a target="_blank" href="https://www.trustedsec.com/january-2015/account-hunting-invoke-tokenmanipulation/">https://www.trustedsec.com/january-2015/account-hunting-invoke-tokenmanipulation/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>A New Zero-Day of Adobe Flash CVE-2015-0313 Exploited in the Wild<br><a target="_blank" href="http://blog.spiderlabs.com/2015/02/a-new-zero-day-of-adobe-flash-cve-2015-0313-exploited-in-the-wild.html">http://blog.spiderlabs.com/2015/02/a-new-zero-day-of-adobe-flash-cve-2015-0313-exploited-in-the-wild.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>CMSmap:a python open source CMS scanner<br><a target="_blank" href="https://github.com/dionach/CMSmap">https://github.com/dionach/CMSmap</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>An In-depth analysis of the Fiesta Exploit Kit: An infection in 2015<br><a target="_blank" href="http://blog.0x3a.com/post/110052845124/an-in-depth-analysis-of-the-fiesta-exploit-kit-an">http://blog.0x3a.com/post/110052845124/an-in-depth-analysis-of-the-fiesta-exploit-kit-an</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Python中的高级数据结构<br><a target="_blank" href="http://python.jobbole.com/65218/">http://python.jobbole.com/65218/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>VolatilityBot – An automated malicious code dumper<br><a target="_blank" href="http://fightingmalware.com/blog/?p=221">http://fightingmalware.com/blog/?p=221</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>从源码编译Chrome(chromium)<br><a target="_blank" href="http://wendal.net/2015/02/04.html">http://wendal.net/2015/02/04.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span> Symbolic execution in vuln research<br><a target="_blank" href="http://lcamtuf.blogspot.com/2015/02/symbolic-execution-in-vuln-research.html">http://lcamtuf.blogspot.com/2015/02/symbolic-execution-in-vuln-research.html</a></div><div class="single"><span id="tags">[视频]&nbsp;&nbsp;</span>Best Security Podcasts<br><a target="_blank" href="http://resources.infosecinstitute.com/best-security-podcasts/">http://resources.infosecinstitute.com/best-security-podcasts/</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>黑客防线2015年第1期杂志<br><a target="_blank" href="http://www.hacker.com.cn/show-7-2743-1.html">http://www.hacker.com.cn/show-7-2743-1.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>2014 Static Analysis Benchmarks<br><a target="_blank" href="http://blog.regehr.org/archives/1217">http://blog.regehr.org/archives/1217</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Exploiting “BadIRET” vulnerability<br><a target="_blank" href="https://raw.githubusercontent.com/citypw/citypw-SCFE/master/security/Documentation/exp_badiret_CVE-2014-9322.txt">https://raw.githubusercontent.com/citypw/citypw-SCFE/master/security/Documentation/exp_badiret_CVE-2014-9322.txt</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>ToolsWatch Newsletter January 2015<br><a target="_blank" href="http://www.toolswatch.org/2015/02/toolswatch-newsletter-january-2015/">http://www.toolswatch.org/2015/02/toolswatch-newsletter-january-2015/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>实例详解机器学习如何解决问题<br><a target="_blank" href="http://tech.meituan.com/mt-mlinaction-how-to-ml.html">http://tech.meituan.com/mt-mlinaction-how-to-ml.html</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/49">SecWiki周刊(第49期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
