<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第50期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第50期）</strong></h5>
<blockquote> 2015/02/09-2015/02/15</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Top 5 Malware Trends on the Horizon<br><a target="_blank" href="http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/top-5-malware-trends-on-the-horizon/">http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/top-5-malware-trends-on-the-horizon/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>五大机构携手成立移动金融安全研究联合实验室<br><a target="_blank" href="http://money.163.com/15/0212/10/AI8DCLNO00253B0H.html">http://money.163.com/15/0212/10/AI8DCLNO00253B0H.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Pwn2Own 2015: Exploitation at its Finest!<br><a target="_blank" href="http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2015-Exploitation-at-its-Finest/ba-p/6708265">http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2015-Exploitation-at-its-Finest/ba-p/6708265</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Biter bitten as hacker leaks source code for popular exploit kit<br><a target="_blank" href="http://www.theregister.co.uk/2015/02/13/rig_exploit_kit_source_code_leak/">http://www.theregister.co.uk/2015/02/13/rig_exploit_kit_source_code_leak/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Today I Am Releasing Ten Million Passwords<br><a target="_blank" href="https://xato.net/passwords/ten-million-passwords/">https://xato.net/passwords/ten-million-passwords/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>2014年互联网安全厂商年终报告汇总（国外版）上<br><a target="_blank" href="http://www.freebuf.com/news/special/58645.html">http://www.freebuf.com/news/special/58645.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Facebook launches social network for sharing security threat info<br><a target="_blank" href="http://www.cnet.com/news/facebook-launches-social-network-for-sharing-security-threat-info/">http://www.cnet.com/news/facebook-launches-social-network-for-sharing-security-threat-info/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>A Global Black Market for Stolen Personal Data<br><a target="_blank" href="http://www.trendmicro.com/vinfo/us/security/special-report/cybercriminal-underground-economy-series/global-black-market-for-stolen-data/">http://www.trendmicro.com/vinfo/us/security/special-report/cybercriminal-underground-economy-series/global-black-market-for-stolen-data/</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[书籍]&nbsp;&nbsp;</span>汽车安全：汽车黑客手册（电子书下载）<br><a target="_blank" href="http://www.freebuf.com/articles/others-articles/58625.html">http://www.freebuf.com/articles/others-articles/58625.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Firmware Forensics: Diffs, Timelines, ELFs and Backdoors<br><a target="_blank" href="http://w00tsec.blogspot.tw/2015/02/firmware-forensics-diffs-timelines-elfs.html">http://w00tsec.blogspot.tw/2015/02/firmware-forensics-diffs-timelines-elfs.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>隐写术总结<br><a target="_blank" href="http://drops.wooyun.org/tips/4862">http://drops.wooyun.org/tips/4862</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>语义分析的一些方法(三)<br><a target="_blank" href="http://www.flickering.cn/ads/2015/02/%e8%af%ad%e4%b9%89%e5%88%86%e6%9e%90%e7%9a%84%e4%b8%80%e4%ba%9b%e6%96%b9%e6%b3%95%e4%b8%89/">http://www.flickering.cn/ads/2015/02/%e8%af%ad%e4%b9%89%e5%88%86%e6%9e%90%e7%9a%84%e4%b8%80%e4%ba%9b%e6%96%b9%e6%b3%95%e4%b8%89/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>RingZer0 2015 CTF Shellcoding<br><a target="_blank" href="https://ctf-team.vulnhub.com/ringzer0-2015-ctf-shellcoding/">https://ctf-team.vulnhub.com/ringzer0-2015-ctf-shellcoding/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>FuzzTesting<br><a target="_blank" href="http://wiki.wireshark.org/FuzzTesting">http://wiki.wireshark.org/FuzzTesting</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>浅析Docker架构、原理及实例配置演示<br><a target="_blank" href="https://community.emc.com/docs/DOC-42054">https://community.emc.com/docs/DOC-42054</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Cure53 XSSMas Challenge &#039;14 Writeup<br><a target="_blank" href="http://masatokinugawa.l0.cm/2015/02/cure53-xssmas-challenge-14-writeup.html">http://masatokinugawa.l0.cm/2015/02/cure53-xssmas-challenge-14-writeup.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>MS14-066 In Depth Analysis | MalwareTech<br><a target="_blank" href="http://www.malwaretech.com/2014/11/ms14-066-in-depth-analysis.html">http://www.malwaretech.com/2014/11/ms14-066-in-depth-analysis.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>american fuzzy lop (1.40b)<br><a target="_blank" href="http://lcamtuf.coredump.cx/afl/">http://lcamtuf.coredump.cx/afl/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>windows平台下高级shellcode编程技术<br><a target="_blank" href="http://blog.topsec.com.cn/ad_lab/windows%e5%b9%b3%e5%8f%b0%e4%b8%8b%e5%8a%9f%e8%83%bd%e6%80%a7shellcode%e7%9a%84%e7%bc%96%e5%86%99/">http://blog.topsec.com.cn/ad_lab/windows%e5%b9%b3%e5%8f%b0%e4%b8%8b%e5%8a%9f%e8%83%bd%e6%80%a7shellcode%e7%9a%84%e7%bc%96%e5%86%99/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>IDA ADB Helper:辅助Android调试的插件<br><a target="_blank" href="http://techbliss.org/threads/adb-qt-super-version.626/">http://techbliss.org/threads/adb-qt-super-version.626/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>语义分析的一些方法(一)<br><a target="_blank" href="http://www.flickering.cn/ads/2015/02/%e8%af%ad%e4%b9%89%e5%88%86%e6%9e%90%e7%9a%84%e4%b8%80%e4%ba%9b%e6%96%b9%e6%b3%95%e4%b8%80/">http://www.flickering.cn/ads/2015/02/%e8%af%ad%e4%b9%89%e5%88%86%e6%9e%90%e7%9a%84%e4%b8%80%e4%ba%9b%e6%96%b9%e6%b3%95%e4%b8%80/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>SSJS Web Shell Injection：netsec<br><a target="_blank" href="http://www.reddit.com/r/netsec/comments/2v8l1z/ssjs_web_shell_injection/">http://www.reddit.com/r/netsec/comments/2v8l1z/ssjs_web_shell_injection/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>A Self-Compiling Android Data Obfuscation Tool<br><a target="_blank" href="http://arxiv.org/pdf/1502.01625v1.pdf">http://arxiv.org/pdf/1502.01625v1.pdf</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Gh0st RAT: Complete Malware Analysis – Part 1<br><a target="_blank" href="http://resources.infosecinstitute.com/gh0st-rat-complete-malware-analysis-part-1/">http://resources.infosecinstitute.com/gh0st-rat-complete-malware-analysis-part-1/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>A New Zero-Day of Adobe Flash CVE-2015-0313 Exploited in the Wild<br><a target="_blank" href="https://www.trustwave.com/Resources/SpiderLabs-Blog/A-New-Zero-Day-of-Adobe-Flash-CVE-2015-0313-Exploited-in-the-Wild/">https://www.trustwave.com/Resources/SpiderLabs-Blog/A-New-Zero-Day-of-Adobe-Flash-CVE-2015-0313-Exploited-in-the-Wild/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Installing and Using Cuckoo Malware Analysis Sandbox<br><a target="_blank" href="http://www.proteansec.com/linux/installing-using-cuckoo-malware-analysis-sandbox/">http://www.proteansec.com/linux/installing-using-cuckoo-malware-analysis-sandbox/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>CVE-2015-0311 (Flash up to 16.0.0.287) integrating Exploit Kits <br><a target="_blank" href="http://malware.dontneedcoffee.com/2015/01/cve-2015-0311-flash-up-to-1600287.html">http://malware.dontneedcoffee.com/2015/01/cve-2015-0311-flash-up-to-1600287.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Linux.BackDoor.XNote.1 indicators<br><a target="_blank" href="http://www.deependresearch.org/2015/02/linuxbackdoorxnote1-indicators.html">http://www.deependresearch.org/2015/02/linuxbackdoorxnote1-indicators.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>一个信息泄露漏洞的成长: CVE-2015-0310分析与利用<br><a target="_blank" href="http://vdisk.weibo.com/share/batch/z8Mc-3059u1zr,z8Mc-3059u1zU">http://vdisk.weibo.com/share/batch/z8Mc-3059u1zr,z8Mc-3059u1zU</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>lcamtuf&#039;s blog: Bi-level TIFFs and the tale of the unexpectedly early patch<br><a target="_blank" href="http://lcamtuf.blogspot.tw/2015/02/bi-level-tiffs-and-tale-of-unexpectedly.html">http://lcamtuf.blogspot.tw/2015/02/bi-level-tiffs-and-tale-of-unexpectedly.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Kippo-Graph 1.5 released!<br><a target="_blank" href="http://bruteforce.gr/kippo-graph-1-5-released.html">http://bruteforce.gr/kippo-graph-1-5-released.html</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>ExploitingSessionManagement.pdf<br><a target="_blank" href="http://www.italiangrid.it/sites/default/files/ExploitingSessionManagement.pdf">http://www.italiangrid.it/sites/default/files/ExploitingSessionManagement.pdf</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>互联网企业级监控系统实践<br><a target="_blank" href="http://noops.me/?p=1798">http://noops.me/?p=1798</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Dirs3arch v0.3.0 - HTTP(S) Directory/File Brute Forcer <br><a target="_blank" href="http://www.kitploit.com/2015/02/dirs3arch-v030-https-directoryfile.html">http://www.kitploit.com/2015/02/dirs3arch-v030-https-directoryfile.html</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Buffer Overflow EIP Offset String Generator<br><a target="_blank" href="http://projects.jason-rush.com/buffer-overflow-eip-offset-string-generator">http://projects.jason-rush.com/buffer-overflow-eip-offset-string-generator</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>分布式端口扫描利刃: 使用DNmap创建Nmap集群<br><a target="_blank" href="http://www.secpulse.com/archives/4713.html">http://www.secpulse.com/archives/4713.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Microsoft Internet Explorer 9-11 Windows 7-8.1 Vulnerability (patched in 2014)<br><a target="_blank" href="http://www.vnsecurity.net/research/2015/02/12/msie-vuln-analysis.html">http://www.vnsecurity.net/research/2015/02/12/msie-vuln-analysis.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>2014年Android恶意代码发展报告<br><a target="_blank" href="http://blog.avlyun.com/2015/02/2137/malware-report/">http://blog.avlyun.com/2015/02/2137/malware-report/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE2015-0057漏洞样本构造探索<br><a target="_blank" href="http://drops.wooyun.org/papers/4939">http://drops.wooyun.org/papers/4939</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span> Create regular expressions using chained methods.<br><a target="_blank" href="https://github.com/thebinarysearchtree/regexpbuilderjs">https://github.com/thebinarysearchtree/regexpbuilderjs</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Pentesting iOS Applications<br><a target="_blank" href="http://www.slideshare.net/jasonhaddix/pentesting-ios-applications">http://www.slideshare.net/jasonhaddix/pentesting-ios-applications</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>BabelCrypt:Universal Encryption Layer for Mobile Messaging Applications <br><a target="_blank" href="https://www.mulliner.org/collin/academic/publications/babelcrypt_fc15_slides.pdf">https://www.mulliner.org/collin/academic/publications/babelcrypt_fc15_slides.pdf</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>mysql syntax bypass some WAF<br><a target="_blank" href="http://zone.wooyun.org/content/18601">http://zone.wooyun.org/content/18601</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Bindead - a static analysis tool for binaries.<br><a target="_blank" href="https://bitbucket.org/mihaila/bindead/wiki/Home">https://bitbucket.org/mihaila/bindead/wiki/Home</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>stunnel SSL Encryption Wrapper<br><a target="_blank" href="http://n0where.net/stunnel/">http://n0where.net/stunnel/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>腾讯电脑管家TAV引擎逆向分析<br><a target="_blank" href="http://drops.wooyun.org/tips/4931">http://drops.wooyun.org/tips/4931</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>WebKnight - Open Source Web Application Firewall (WAF) for IIS<br><a target="_blank" href="https://www.aqtronix.com/?PageID=99">https://www.aqtronix.com/?PageID=99</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>语义分析的一些方法(二)<br><a target="_blank" href="http://www.flickering.cn/ads/2015/02/%e8%af%ad%e4%b9%89%e5%88%86%e6%9e%90%e7%9a%84%e4%b8%80%e4%ba%9b%e6%96%b9%e6%b3%95%e4%ba%8c/">http://www.flickering.cn/ads/2015/02/%e8%af%ad%e4%b9%89%e5%88%86%e6%9e%90%e7%9a%84%e4%b8%80%e4%ba%9b%e6%96%b9%e6%b3%95%e4%ba%8c/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android Service Security<br><a target="_blank" href="http://drops.wooyun.org/tips/4907">http://drops.wooyun.org/tips/4907</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>pretty awesome XSS auditor bypass<br><a target="_blank" href="http://www.thespanner.co.uk/2015/02/10/xss-auditor-bypass/">http://www.thespanner.co.uk/2015/02/10/xss-auditor-bypass/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Fun With Info-Leaks<br><a target="_blank" href="https://rh0dev.github.io/blog/2015/fun-with-info-leaks/?utm_content=buffer4ba41&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer">https://rh0dev.github.io/blog/2015/fun-with-info-leaks/?utm_content=buffer4ba41&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>PHP中的内存破坏漏洞利用（CVE-2014-8142和CVE-2015-0231）<br><a target="_blank" href="http://drops.wooyun.org/papers/4864">http://drops.wooyun.org/papers/4864</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Bypassing Windows’ 10 Protections using a Single Bit<br><a target="_blank" href="http://breakingmalware.com/vulnerabilities/one-bit-rule-bypassing-windows-10-protections-using-single-bit/">http://breakingmalware.com/vulnerabilities/one-bit-rule-bypassing-windows-10-protections-using-single-bit/</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全专题</strong>
    </div><div class="single">数据挖掘中得常见Python库<br><a target="_blank" href="https://www.sec-wiki.com/topic/58">https://www.sec-wiki.com/topic/58</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/50">SecWiki周刊(第50期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
