<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第144期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第144期）</strong></h5>
<blockquote> 2016/11/28-2016/12/04</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Mirai现新的利用方式，开始扫描7547端口【需翻墙】<br><a target="_blank" href="http://pastebin.com/eZrrLGzv">http://pastebin.com/eZrrLGzv</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>FIREEYE RESPONDS TO WAVE OF DESTRUCTIVE CYBER ATTACKS IN GULF REGION<br><a target="_blank" href="https://www.fireeye.com/blog/threat-research/2016/11/fireeye_respondsto.html">https://www.fireeye.com/blog/threat-research/2016/11/fireeye_respondsto.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>网络空间安全蓝皮书：中国网络空间安全发展报告(2016)<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzA3OTA3NDkyNw==&amp;mid=2653171023&amp;idx=1&amp;sn=d5721c33b9d6a4114c3dd0c033c33df7&amp;chksm=84698e4fb31e0759ef220b21011a7c8d394fc63309bde44731bce4ef6230ec8a736a3a8e8f20&amp;mpshare=1&amp;scene=24&amp;srcid=1130CIeqhSbOAk1q30hvuOqv#rd">http://mp.weixin.qq.com/s?__biz=MzA3OTA3NDkyNw==&amp;mid=2653171023&amp;idx=1&amp;sn=d5721c33b9d6a4114c3dd0c033c33df7&amp;chksm=84698e4fb31e0759ef220b21011a7c8d394fc63309bde44731bce4ef6230ec8a736a3a8e8f20&amp;mpshare=1&amp;scene=24&amp;srcid=1130CIeqhSbOAk1q30hvuOqv#rd</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>再见SIEM，你好SOAPA！<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MjM5MzM3NjM4MA==&amp;mid=2654679834&amp;idx=1&amp;sn=4728f8e35dfa8b88d422f0f0738505f6&amp;chksm=bd5862098a2feb1f8209dce182820dd7cf542515f1ecb4092d8fb1b2a14fa8d7281271b3b38f&amp;mpshare=1&amp;scene=2&amp;srcid=12012h4OLG8dqgGvyOYTg6DG&amp;from=timeline#rd">http://mp.weixin.qq.com/s?__biz=MjM5MzM3NjM4MA==&amp;mid=2654679834&amp;idx=1&amp;sn=4728f8e35dfa8b88d422f0f0738505f6&amp;chksm=bd5862098a2feb1f8209dce182820dd7cf542515f1ecb4092d8fb1b2a14fa8d7281271b3b38f&amp;mpshare=1&amp;scene=2&amp;srcid=12012h4OLG8dqgGvyOYTg6DG&amp;from=timeline#rd</a></div><div class="single"><span id="tags">[事件]&nbsp;&nbsp;</span>超过100万谷歌帐户被Gooligan恶意软件盗取<br><a target="_blank" href="http://www.mottoin.com/92954.html">http://www.mottoin.com/92954.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>2017年安全行业八大预测<br><a target="_blank" href="http://www.aqniu.com/news-views/21474.html">http://www.aqniu.com/news-views/21474.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>黑客小说：杀手 （第十一章 新的阶段）<br><a target="_blank" href="http://www.jianshu.com/p/a65e09fc5057">http://www.jianshu.com/p/a65e09fc5057</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>以色列凭什么成为全球监控技术的中心？<br><a target="_blank" href="http://www.freebuf.com/special/120592.html">http://www.freebuf.com/special/120592.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>中央网信办等下文：支持高校开设网络安全“特长班”<br><a target="_blank" href="http://www.toutiao.com/i6304849503455281665/">http://www.toutiao.com/i6304849503455281665/</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>Firefox 0day被用于攻击Tor用户<br><a target="_blank" href="http://www.solidot.org/story?sid=50554">http://www.solidot.org/story?sid=50554</a></div><div class="single"><span id="tags">[人物]&nbsp;&nbsp;</span>访谈｜通付盾CEO汪德嘉<br><a target="_blank" href="http://www.aqniu.com/news-views/21423.html">http://www.aqniu.com/news-views/21423.html</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>AZScanner：自动漏洞扫描器<br><a target="_blank" href="https://github.com/az0ne/AZScanner">https://github.com/az0ne/AZScanner</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>ArchSummit 北京 2016 PPT 下载合集<br><a target="_blank" href="http://ppt.geekbang.org/archsummit?amp;isappinstalled=0&amp;amp;from=timeline&amp;from=timeline&amp;from=timeline&amp;from=timeline">http://ppt.geekbang.org/archsummit?amp;isappinstalled=0&amp;amp;from=timeline&amp;from=timeline&amp;from=timeline&amp;from=timeline</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>BadKernel----一个笔误引发的漏洞<br><a target="_blank" href="https://github.com/secmob/BadKernel">https://github.com/secmob/BadKernel</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>玩转CSRF之挖洞实例分享<br><a target="_blank" href="http://bbs.ichunqiu.com/thread-16169-1-1.html">http://bbs.ichunqiu.com/thread-16169-1-1.html</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>高能慎入--技术干货PPT之微店安全沙龙第1期北京<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzIzMjY3NzYwNA==&amp;mid=2247483676&amp;idx=1&amp;sn=b38b3e9870717b13fdee9f8e96b4aca6&amp;chksm=e8900897dfe7818143c1936256109262fdd7c4a0759a8d18527a38514c5ad3e5969fd791115c&amp;mpshare=1&amp;scene=1&amp;srcid=1130nvZsugQ5Uu0q8Mm7DJod#rd">http://mp.weixin.qq.com/s?__biz=MzIzMjY3NzYwNA==&amp;mid=2247483676&amp;idx=1&amp;sn=b38b3e9870717b13fdee9f8e96b4aca6&amp;chksm=e8900897dfe7818143c1936256109262fdd7c4a0759a8d18527a38514c5ad3e5969fd791115c&amp;mpshare=1&amp;scene=1&amp;srcid=1130nvZsugQ5Uu0q8Mm7DJod#rd</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>内网渗透定位技术总结<br><a target="_blank" href="http://www.mottoin.com/92978.html">http://www.mottoin.com/92978.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>暗网解读：什么事暗网以及如何工作的<br><a target="_blank" href="https://www.weforum.org/agenda/2016/10/the-dark-web-what-it-is-and-how-it-works">https://www.weforum.org/agenda/2016/10/the-dark-web-what-it-is-and-how-it-works</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>IE浏览器UAF漏洞CVE-2014-0282的分析与利用<br><a target="_blank" href="http://www.mottoin.com/92909.html">http://www.mottoin.com/92909.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>企业常见服务漏洞检测&amp;修复整理<br><a target="_blank" href="http://www.mottoin.com/92742.html">http://www.mottoin.com/92742.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Layer子域名挖掘机4.2纪念版<br><a target="_blank" href="http://www.cnseay.com/4482/">http://www.cnseay.com/4482/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Fofa:三分钟完成全网漏洞报告<br><a target="_blank" href="https://v.qq.com/x/page/q03509j9ak1.html">https://v.qq.com/x/page/q03509j9ak1.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Mozilla SSL Configuration Generator HTTPS配置文件生成工具<br><a target="_blank" href="https://mozilla.github.io/server-side-tls/ssl-config-generator/">https://mozilla.github.io/server-side-tls/ssl-config-generator/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>hduisa/HCTF2016: HCTF 2016 CHALLENGES<br><a target="_blank" href="https://github.com/hduisa/HCTF2016">https://github.com/hduisa/HCTF2016</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>使用nmap暴力猜解网站子域名<br><a target="_blank" href="http://blog.x1622.com/2016/11/subdomain-discovery-with-nmap-and.html">http://blog.x1622.com/2016/11/subdomain-discovery-with-nmap-and.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>hitcon2016 web writeup<br><a target="_blank" href="http://lorexxar.cn/2016/10/10/hitcon2016/">http://lorexxar.cn/2016/10/10/hitcon2016/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>2016 HCTF Crypto 出题总结 <br><a target="_blank" href="http://0x48.pw/2016/11/28/0x28/">http://0x48.pw/2016/11/28/0x28/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>【漏洞预警】Apache Tomcat远程代码执行漏洞(CVE-2016-8735)<br><a target="_blank" href="http://www.mottoin.com/93100.html">http://www.mottoin.com/93100.html</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>最便捷的免费 SSL 证书解决方案<br><a target="_blank" href="http://www.jianshu.com/p/4d1a795837d0?hmsr=toutiao.io&amp;utm_medium=toutiao.io&amp;utm_source=toutiao.io">http://www.jianshu.com/p/4d1a795837d0?hmsr=toutiao.io&amp;utm_medium=toutiao.io&amp;utm_source=toutiao.io</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>拉勾网的安全平台设计、规则化<br><a target="_blank" href="http://www.jianshu.com/p/a56d3753c296?from=timeline&amp;isappinstalled=0">http://www.jianshu.com/p/a56d3753c296?from=timeline&amp;isappinstalled=0</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Quick TR069 Botnet Writeup + Triage. <br><a target="_blank" href="https://morris.guru/quick-tr069-botnet-writeup-triage/">https://morris.guru/quick-tr069-botnet-writeup-triage/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>英国情报机GCHQ发布一款开源数据分析工具：Cyber​​Chef<br><a target="_blank" href="http://www.mottoin.com/92941.html">http://www.mottoin.com/92941.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>SharpMeter：Meterpreter反弹shell生成工具（绕过白名单限制）<br><a target="_blank" href="http://www.mottoin.com/93059.html">http://www.mottoin.com/93059.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Bypassing CSP using polyglot JPEGs<br><a target="_blank" href="http://blog.portswigger.net/2016/12/bypassing-csp-using-polyglot-jpegs.html">http://blog.portswigger.net/2016/12/bypassing-csp-using-polyglot-jpegs.html</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Anti-Anti-Spider: 反爬虫的技术攻关<br><a target="_blank" href="https://github.com/luyishisi/Anti-Anti-Spider">https://github.com/luyishisi/Anti-Anti-Spider</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Burp Suite security automation with Selenium and Jenkins<br><a target="_blank" href="https://www.securify.nl/blog/SFY20160901/burp_suite_security_automation_with_selenium_and_jenkins.html">https://www.securify.nl/blog/SFY20160901/burp_suite_security_automation_with_selenium_and_jenkins.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Three roads lead to Rome<br><a target="_blank" href="http://blogs.360.cn/360safe/2016/11/29/three-roads-lead-to-rome/">http://blogs.360.cn/360safe/2016/11/29/three-roads-lead-to-rome/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Bypassing SAML 2.0 SSO with XML Signature Attacks<br><a target="_blank" href="http://research.aurainfosec.io/bypassing-saml20-SSO/">http://research.aurainfosec.io/bypassing-saml20-SSO/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android木马分析流程及实战<br><a target="_blank" href="http://www.mottoin.com/93078.html">http://www.mottoin.com/93078.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>专栏 | 中文分词工具测评<br><a target="_blank" href="http://www.jiqizhixin.com/article/1916">http://www.jiqizhixin.com/article/1916</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>单点登录原理与简单实现<br><a target="_blank" href="http://www.cnblogs.com/ywlaker/p/6113927.htm">http://www.cnblogs.com/ywlaker/p/6113927.htm</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>黑产揭秘：“打码平台”那点事儿<br><a target="_blank" href="https://jaq.alibaba.com/community/art/show?articleid=628">https://jaq.alibaba.com/community/art/show?articleid=628</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>BitUnmap: Attacking Android Ashmem<br><a target="_blank" href="https://googleprojectzero.blogspot.com/2016/12/bitunmap-attacking-android-ashmem.html">https://googleprojectzero.blogspot.com/2016/12/bitunmap-attacking-android-ashmem.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>德国电信断网：mirai僵尸网络的新变种和旧主控<br><a target="_blank" href="http://blog.netlab.360.com/a-mirai-botnet-evolvement-new-variant-and-old-c2/">http://blog.netlab.360.com/a-mirai-botnet-evolvement-new-variant-and-old-c2/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>美东部断网元凶MIRAI之现场还原与检测<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzI4ODA4MTcxMA==&amp;mid=2649550113&amp;idx=1&amp;sn=bba4b0a196580bf1410f424984ba3b81&amp;chksm=f3db9f60c4ac16761261d2f95ce7980b84e318d24db5fac348a24b09b9b6768f58f575f79712&amp;mpshare=1&amp;scene=2&amp;srcid=1128n2PYLPIiWT0aIccMYsJS&amp;from=timeline#rd">http://mp.weixin.qq.com/s?__biz=MzI4ODA4MTcxMA==&amp;mid=2649550113&amp;idx=1&amp;sn=bba4b0a196580bf1410f424984ba3b81&amp;chksm=f3db9f60c4ac16761261d2f95ce7980b84e318d24db5fac348a24b09b9b6768f58f575f79712&amp;mpshare=1&amp;scene=2&amp;srcid=1128n2PYLPIiWT0aIccMYsJS&amp;from=timeline#rd</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>写在阿里一周年<br><a target="_blank" href="http://www.zoomfeng.com/blog/alibaba-one-year.html">http://www.zoomfeng.com/blog/alibaba-one-year.html</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>WIFI安全之包结构解析 <br><a target="_blank" href="http://sccsec.com/2016/11/23/WIFI%E5%AE%89%E5%85%A8%E4%B9%8B%E5%8C%85%E7%BB%93%E6%9E%84%E8%A7%A3%E6%9E%90/">http://sccsec.com/2016/11/23/WIFI%E5%AE%89%E5%85%A8%E4%B9%8B%E5%8C%85%E7%BB%93%E6%9E%84%E8%A7%A3%E6%9E%90/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Google: Announcing OSS-Fuzz: Continuous Fuzzing for Open Source Software<br><a target="_blank" href="https://security.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html">https://security.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Google XSS Game Writeup<br><a target="_blank" href="https://b1ngz.github.io/google-xss-game-writeup/">https://b1ngz.github.io/google-xss-game-writeup/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Analysis of multiple vulnerabilities in AirDroid<br><a target="_blank" href="https://blog.zimperium.com/analysis-of-multiple-vulnerabilities-in-airdroid/">https://blog.zimperium.com/analysis-of-multiple-vulnerabilities-in-airdroid/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>HOW I BYPASSED APPLE&#039;S MOST SECURE ICLOUD ACTIVATION LOCK<br><a target="_blank" href="http://www.hemanthjoseph.com/2016/11/how-i-bypassed-apples-most-secure-find.html?m=1">http://www.hemanthjoseph.com/2016/11/how-i-bypassed-apples-most-secure-find.html?m=1</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>How WeChat uses one censorship policy in China and another internationally<br><a target="_blank" href="https://citizenlab.org/2016/11/wechat-china-censorship-one-app-two-systems/">https://citizenlab.org/2016/11/wechat-china-censorship-one-app-two-systems/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>XSExtractor: 提取新闻、博客等长文本网页的正文工具<br><a target="_blank" href="https://github.com/qingyu1229/XSExtractor">https://github.com/qingyu1229/XSExtractor</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>新人指导心得体会<br><a target="_blank" href="http://zhenhua-lee.github.io/manmage/mentor.html">http://zhenhua-lee.github.io/manmage/mentor.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>One Bit To Rule A System: Analyzing CVE-2016-7255 Exploit In The Wild<br><a target="_blank" href="http://blog.trendmicro.com/trendlabs-security-intelligence/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild/">http://blog.trendmicro.com/trendlabs-security-intelligence/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>DPAT：渗透测试者的域密码审计工具<br><a target="_blank" href="https://github.com/clr2of8/DPAT">https://github.com/clr2of8/DPAT</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>渗透Oracle 11g（续）<br><a target="_blank" href="https://www.t00ls.net/articles-23609.html">https://www.t00ls.net/articles-23609.html</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>I wrote a password cracking manual<br><a target="_blank" href="http://www.netmux.com/blog/hash-crack">http://www.netmux.com/blog/hash-crack</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Firefox 0day in the wild is being used to attack Tor users<br><a target="_blank" href="http://arstechnica.com/security/2016/11/firefox-0day-used-against-tor-users-almost-identical-to-one-fbi-used-in-2013/">http://arstechnica.com/security/2016/11/firefox-0day-used-against-tor-users-almost-identical-to-one-fbi-used-in-2013/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>JSON-handle DomXSS Vulnerability (Ver 1.4.11) 漏洞分析<br><a target="_blank" href="http://linux.im/2016/11/29/firefox-addon-JSON-handle-DomXSS.html">http://linux.im/2016/11/29/firefox-addon-JSON-handle-DomXSS.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>一个目录穿越引发的注入及后续——XG SDK漏洞回顾与思考<br><a target="_blank" href="http://www.ms509.com/?p=474">http://www.ms509.com/?p=474</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>重新来看变量注入，利用命令执行/提升权限，绕过UAC<br><a target="_blank" href="https://breakingmalware.com/vulnerabilities/command-injection-and-elevation-environment-variables-revisited/">https://breakingmalware.com/vulnerabilities/command-injection-and-elevation-environment-variables-revisited/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Code Execution and Privilege Escalation – Databases<br><a target="_blank" href="http://resources.infosecinstitute.com/code-execution-and-privilege-escalation-databases/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+infosecResources+%28InfoSec+Resources%29">http://resources.infosecinstitute.com/code-execution-and-privilege-escalation-databases/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+infosecResources+%28InfoSec+Resources%29</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第143期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/143">https://www.sec-wiki.com/weekly/143</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>DNS-Shell: DNS-Shell is an interactive Shell over DNS channel<br><a target="_blank" href="https://github.com/sensepost/DNS-Shell">https://github.com/sensepost/DNS-Shell</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>cosa-nostra: 基于家族和图表显示的恶意程序分析工具<br><a target="_blank" href="https://github.com/joxeankoret/cosa-nostra">https://github.com/joxeankoret/cosa-nostra</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>FreePBX 13: From Cross-Site Scripting to Remote Command Execution<br><a target="_blank" href="https://blog.ripstech.com/2016/freepbx-from-cross-site-scripting-to-remote-command-execution/">https://blog.ripstech.com/2016/freepbx-from-cross-site-scripting-to-remote-command-execution/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>在Empire中配置使用Tor<br><a target="_blank" href="http://www.mottoin.com/92761.html">http://www.mottoin.com/92761.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>assert免杀一句话<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzA5ODA0NDE2MA==&amp;mid=2649712881&amp;idx=1&amp;sn=8a980de7df522f6fa019fbb063381cef&amp;chksm=888c589ebffbd188503d1ecb31b8c96bc62143e09feef2b2fb0d9654c159018a5fa1c45a0fe6&amp;scene=0#rd">http://mp.weixin.qq.com/s?__biz=MzA5ODA0NDE2MA==&amp;mid=2649712881&amp;idx=1&amp;sn=8a980de7df522f6fa019fbb063381cef&amp;chksm=888c589ebffbd188503d1ecb31b8c96bc62143e09feef2b2fb0d9654c159018a5fa1c45a0fe6&amp;scene=0#rd</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>More Than 1 Million Google Accounts Breached by Gooligan <br><a target="_blank" href="http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/?from=timeline">http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/?from=timeline</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/144">SecWiki周刊(第144期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
