<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第329期)</title>
	<link rel="stylesheet" type="text/css" href="/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="/css/people.css" />
    <link rel="shortcut icon" href="/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="https://libs.baidu.com/jquery/1.8.3/jquery.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第329期）</strong></h5>
<blockquote> 2020/06/15-2020/06/21</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>全国23省市“新基建”网安任务重点梳理<br><a target="_blank" href="https://mp.weixin.qq.com/s/Isv3mrwIIEHZi6_gn7u-9g">https://mp.weixin.qq.com/s/Isv3mrwIIEHZi6_gn7u-9g</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>也来聊聊态势感知（上）<br><a target="_blank" href="https://mp.weixin.qq.com/s/dCGMfKsFzYaZiffjkBBYpg">https://mp.weixin.qq.com/s/dCGMfKsFzYaZiffjkBBYpg</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Nagiosxi 5.6.11-5.6.13版本的一个RCE漏洞<br><a target="_blank" href="https://bacde.me/post/nagiosxi-rce-1/">https://bacde.me/post/nagiosxi-rce-1/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>BlueShell: 红蓝对抗跨平台远控工具<br><a target="_blank" href="https://github.com/whitehatnote/BlueShell?from=timeline">https://github.com/whitehatnote/BlueShell?from=timeline</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>码小六 - GitHub 代码泄露监控系统<br><a target="_blank" href="https://github.com/4x99/code6">https://github.com/4x99/code6</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>也来聊聊态势感知（中）<br><a target="_blank" href="https://mp.weixin.qq.com/s/XSjqehGDx5mv599LojaR0g">https://mp.weixin.qq.com/s/XSjqehGDx5mv599LojaR0g</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Jsonp漏洞简析及自动化漏洞挖掘脚本编写<br><a target="_blank" href="https://mp.weixin.qq.com/s/SuEpF3RIZIv2CcIUok8SoQ">https://mp.weixin.qq.com/s/SuEpF3RIZIv2CcIUok8SoQ</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>使用ZoomEye寻找APT攻击的蛛丝马迹<br><a target="_blank" href="https://www.freebuf.com/sectool/237758.html">https://www.freebuf.com/sectool/237758.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Vulnhub靶机实战 | joker<br><a target="_blank" href="https://cloud.tencent.com/developer/article/1647108">https://cloud.tencent.com/developer/article/1647108</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>也来聊聊态势感知（下）<br><a target="_blank" href="https://mp.weixin.qq.com/s/14MPTJ34SOnqBssObkxqFw">https://mp.weixin.qq.com/s/14MPTJ34SOnqBssObkxqFw</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第328期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/328">https://www.sec-wiki.com/weekly/328</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Exploring ATT&amp;CK and MISP data with Maltego<br><a target="_blank" href="https://www.maltego.com/blog/exploring-att-ck-and-misp-data-with-maltego/">https://www.maltego.com/blog/exploring-att-ck-and-misp-data-with-maltego/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>简述获取shellcode的几种方式<br><a target="_blank" href="https://www.freebuf.com/articles/system/237300.html">https://www.freebuf.com/articles/system/237300.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Docker逃逸小结 第一版<br><a target="_blank" href="https://xz.aliyun.com/t/7881">https://xz.aliyun.com/t/7881</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>一种新型shellcode仿真框架分析<br><a target="_blank" href="https://mp.weixin.qq.com/s/9XHNMwIhmZLtOI385_4iaQ">https://mp.weixin.qq.com/s/9XHNMwIhmZLtOI385_4iaQ</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>firefox-hackbar-2.2.9 自签名学习版全过程<br><a target="_blank" href="https://xz.aliyun.com/t/7857">https://xz.aliyun.com/t/7857</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>实战笔记：滑动验证码攻防对抗<br><a target="_blank" href="https://www.freebuf.com/articles/web/238038.html">https://www.freebuf.com/articles/web/238038.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Microsoft Windows LNK Remote Code Execution Vulnerability - CVE-2020-1299<br><a target="_blank" href="https://blog.vincss.net/2020/06/cve49-microsoft-windows-lnk-remote-code-execution-vuln-cve-2020-1299-eng.html">https://blog.vincss.net/2020/06/cve49-microsoft-windows-lnk-remote-code-execution-vuln-cve-2020-1299-eng.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>菜刀连接PHP WebShell返回200错误<br><a target="_blank" href="https://blog.csdn.net/bloodzer0/article/details/106812282">https://blog.csdn.net/bloodzer0/article/details/106812282</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Valak 恶意软件与 Gozi ConfCrew 的千丝万缕联系<br><a target="_blank" href="https://paper.seebug.org/1246/">https://paper.seebug.org/1246/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>巡风漏洞扫描系统源码分析<br><a target="_blank" href="https://www.anquanke.com/post/id/207831">https://www.anquanke.com/post/id/207831</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于ClickHouse + Redash + Python去做安全数据分析<br><a target="_blank" href="https://mp.weixin.qq.com/s/O7IuAZV1XuogKwsoLhx4Qw">https://mp.weixin.qq.com/s/O7IuAZV1XuogKwsoLhx4Qw</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Gitlab安装与配置LDAP登录<br><a target="_blank" href="https://blog.csdn.net/bloodzer0/article/details/106809701">https://blog.csdn.net/bloodzer0/article/details/106809701</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>weblogic 无文件webshell的技术研究<br><a target="_blank" href="https://mp.weixin.qq.com/s/euYuuI78oJhUHt9dVkomKA">https://mp.weixin.qq.com/s/euYuuI78oJhUHt9dVkomKA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>利用Unicode兼容性绕过WAF<br><a target="_blank" href="https://jlajara.gitlab.io/web/2020/02/19/Bypass_WAF_Unicode.html">https://jlajara.gitlab.io/web/2020/02/19/Bypass_WAF_Unicode.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Compromising theIntermediary Web Services That Rehost Websites<br><a target="_blank" href="https://securitygossip.com/blog/2020/05/15/melting-pot-of-origins-compromising-theintermediary-web-services-that-rehost-websites/">https://securitygossip.com/blog/2020/05/15/melting-pot-of-origins-compromising-theintermediary-web-services-that-rehost-websites/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Centos7搭建原生LDAP服务<br><a target="_blank" href="https://blog.csdn.net/bloodzer0/article/details/106805913">https://blog.csdn.net/bloodzer0/article/details/106805913</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>甲方安全开源项目清单<br><a target="_blank" href="https://mp.weixin.qq.com/s/FS8JVnZqqXw1M9czyeF8dw">https://mp.weixin.qq.com/s/FS8JVnZqqXw1M9czyeF8dw</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>某cms的一次审计<br><a target="_blank" href="https://xz.aliyun.com/t/7872">https://xz.aliyun.com/t/7872</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Reverse Engineering a VxWorks OS Based Router<br><a target="_blank" href="https://blog.quarkslab.com/reverse-engineering-a-vxworks-os-based-router.html">https://blog.quarkslab.com/reverse-engineering-a-vxworks-os-based-router.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>goSkylar: 基于Golang开发的企业级外网端口资产扫描<br><a target="_blank" href="https://github.com/LakeVilladom/goSkylar">https://github.com/LakeVilladom/goSkylar</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>利用Twitter如何挖掘有价值的开源信息--工具篇<br><a target="_blank" href="https://mp.weixin.qq.com/s/ukP2ASwXA8HDuDNYGHC-Sw">https://mp.weixin.qq.com/s/ukP2ASwXA8HDuDNYGHC-Sw</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>&quot;白象三代&quot;APT组织攻击活动<br><a target="_blank" href="https://mp.weixin.qq.com/s/ve2L6_v0EvJZwLSyWijvUw">https://mp.weixin.qq.com/s/ve2L6_v0EvJZwLSyWijvUw</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>针对知名航天和军事公司的攻击活动分析<br><a target="_blank" href="https://paper.seebug.org/1248/">https://paper.seebug.org/1248/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>内网渗透之内网穿透<br><a target="_blank" href="https://mp.weixin.qq.com/s/L3rVjrz3pLncFmVrS5S0dQ">https://mp.weixin.qq.com/s/L3rVjrz3pLncFmVrS5S0dQ</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>深度解读：Verizon 2020年数据泄露报告<br><a target="_blank" href="https://mp.weixin.qq.com/s/sDu5eydjesAwsI2v8dEj5Q">https://mp.weixin.qq.com/s/sDu5eydjesAwsI2v8dEj5Q</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>D-Link DIR878路由器命令执行漏洞分析<br><a target="_blank" href="https://www.freebuf.com/vuls/237533.html">https://www.freebuf.com/vuls/237533.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>JBOSS 无文件webshell的技术研究<br><a target="_blank" href="https://mp.weixin.qq.com/s/_SQS9B7tkL1H5fMIgPTOKw">https://mp.weixin.qq.com/s/_SQS9B7tkL1H5fMIgPTOKw</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>一线执法必备的自我隐私保护能力<br><a target="_blank" href="https://mp.weixin.qq.com/s/h6jE7RD6pzaPINxiRoG0BQ">https://mp.weixin.qq.com/s/h6jE7RD6pzaPINxiRoG0BQ</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>内网渗透之ICMP隐藏隧道<br><a target="_blank" href="https://xz.aliyun.com/t/7875">https://xz.aliyun.com/t/7875</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Get-WeChat-DB: 获取目标机器的微信数据库和密钥<br><a target="_blank" href="https://github.com/A2kaid/Get-WeChat-DB">https://github.com/A2kaid/Get-WeChat-DB</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Subrion CMS 代码审计<br><a target="_blank" href="https://mp.weixin.qq.com/s/HX12VGVtJo3zc7XI8OVwpg">https://mp.weixin.qq.com/s/HX12VGVtJo3zc7XI8OVwpg</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>基于JVM-Sandbox实现RASP安全监控防护<br><a target="_blank" href="https://github.com/angelwhu/jvm-rasp">https://github.com/angelwhu/jvm-rasp</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Suricata工控规则研究<br><a target="_blank" href="https://www.freebuf.com/articles/ics-articles/237420.html">https://www.freebuf.com/articles/ics-articles/237420.html</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>2020 DozerCTF部分 Write Up<br><a target="_blank" href="https://www.anquanke.com/post/id/208526">https://www.anquanke.com/post/id/208526</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Java单向代码执行链配合的动态代码上下文执行<br><a target="_blank" href="http://rui0.cn/archives/1408">http://rui0.cn/archives/1408</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>高质量科研论文写作<br><a target="_blank" href="https://www.bilibili.com/video/BV1hg4y1q7Ge">https://www.bilibili.com/video/BV1hg4y1q7Ge</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>AsiaCCS 2020 论文录用列表<br><a target="_blank" href="https://mp.weixin.qq.com/s/uCyikieFzmbF0gAFTeHSfA">https://mp.weixin.qq.com/s/uCyikieFzmbF0gAFTeHSfA</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>时间序列预测方法总结<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/67832773">https://zhuanlan.zhihu.com/p/67832773</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>抱紧你的SIM卡—5G物理安全初探<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/149614674">https://zhuanlan.zhihu.com/p/149614674</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，8年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/329">SecWiki周刊(第329期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;
                        <a href='https://security.ximalaya.com/'>XMSRC</a>&nbsp;
                        <br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2020                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
