<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第262期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第262期）</strong></h5>
<blockquote> 2019/03/04-2019/03/10</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>2019年全球网络安全热词排行榜<br><a target="_blank" href="https://mp.weixin.qq.com/s/agrm_Xgi1GJP3vmCiL4aVg">https://mp.weixin.qq.com/s/agrm_Xgi1GJP3vmCiL4aVg</a></div><div class="single"><span id="tags">[人物]&nbsp;&nbsp;</span>张颖：左手SIEM右手服装设计的美女博士<br><a target="_blank" href="https://mp.weixin.qq.com/s/qSVjRnMu_Monu_6E2_gsmQ">https://mp.weixin.qq.com/s/qSVjRnMu_Monu_6E2_gsmQ</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>一图看懂网络安全执法检查<br><a target="_blank" href="https://mp.weixin.qq.com/s/gAS2cFaWMUdY0s6sT6ZtHw">https://mp.weixin.qq.com/s/gAS2cFaWMUdY0s6sT6ZtHw</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>公安部“净网2018”专项行动取得显著成效<br><a target="_blank" href="https://www.toutiao.com/i6665463916635619843">https://www.toutiao.com/i6665463916635619843</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>美国国安局逆向工程框架——Ghidra的简单使用<br><a target="_blank" href="https://www.giantbranch.cn/2019/03/06/%E7%BE%8E%E5%9B%BD%E5%9B%BD%E5%AE%89%E5%B1%80%E9%80%86%E5%90%91%E5%B7%A5%E7%A8%8B%E6%A1%86%E6%9E%B6%E2%80%94%E2%80%94Ghidra%E7%9A%84%E7%AE%80%E5%8D%95%E4%BD%BF%E7%94%A8/">https://www.giantbranch.cn/2019/03/06/%E7%BE%8E%E5%9B%BD%E5%9B%BD%E5%AE%89%E5%B1%80%E9%80%86%E5%90%91%E5%B7%A5%E7%A8%8B%E6%A1%86%E6%9E%B6%E2%80%94%E2%80%94Ghidra%E7%9A%84%E7%AE%80%E5%8D%95%E4%BD%BF%E7%94%A8/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>账户逻辑漏洞<br><a target="_blank" href="https://bloodzer0.github.io/vulnerability/logical-vulnerability/account/">https://bloodzer0.github.io/vulnerability/logical-vulnerability/account/</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>CTF顶级工具与资源<br><a target="_blank" href="https://www.aqniu.com/learn/44310.html">https://www.aqniu.com/learn/44310.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>信息泄漏<br><a target="_blank" href="https://bloodzer0.github.io/vulnerability/il/">https://bloodzer0.github.io/vulnerability/il/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Cookies 安全白皮书<br><a target="_blank" href="https://www.netsparker.com/security-cookies-whitepaper/">https://www.netsparker.com/security-cookies-whitepaper/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>渗透之权限维持杂谈<br><a target="_blank" href="https://www.anquanke.com/post/id/171891">https://www.anquanke.com/post/id/171891</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Web漏洞分析之——顺瓜摸藤 <br><a target="_blank" href="http://blog.nsfocus.net/web%e6%bc%8f%e6%b4%9e%e5%88%86%e6%9e%90%e4%b9%8b-%e9%a1%ba%e7%93%9c%e6%91%b8%e8%97%a4/">http://blog.nsfocus.net/web%e6%bc%8f%e6%b4%9e%e5%88%86%e6%9e%90%e4%b9%8b-%e9%a1%ba%e7%93%9c%e6%91%b8%e8%97%a4/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>使用贝叶斯网络来识别0day攻击路径<br><a target="_blank" href="http://www.arkteam.net/?p=4253">http://www.arkteam.net/?p=4253</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Windows 漏洞利用辅助工具<br><a target="_blank" href="https://github.com/bitsadmin/wesng">https://github.com/bitsadmin/wesng</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>电子取证最全清单<br><a target="_blank" href="https://mp.weixin.qq.com/s/ES83wSU-WBrUONGjCN6jYw">https://mp.weixin.qq.com/s/ES83wSU-WBrUONGjCN6jYw</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>步步为营之游走于内网<br><a target="_blank" href="https://mp.weixin.qq.com/s/xGYfxdp_TQmXiuWvC1sN-g">https://mp.weixin.qq.com/s/xGYfxdp_TQmXiuWvC1sN-g</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>WordPress &lt;= 5.0 (CVE-2019-8942 &amp; CVE-2019-8943) 远程代码执行漏洞 Exploit<br><a target="_blank" href="https://gist.github.com/allyshka/f159c0b43f1374f87f2c3817d6401fd6">https://gist.github.com/allyshka/f159c0b43f1374f87f2c3817d6401fd6</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>Data-Knowledge-Action: 企业安全数据分析入门<br><a target="_blank" href="https://www.cdxy.me/?p=803">https://www.cdxy.me/?p=803</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Finding and exploiting CVE-2018–7445 <br><a target="_blank" href="https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1">https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>从补丁 DIFF 到 EXP：CVE-2019-0623 漏洞分析与利用<br><a target="_blank" href="https://paper.seebug.org/832/">https://paper.seebug.org/832/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>FOFA爬虫大法——API的简单利用<br><a target="_blank" href="https://nosec.org/home/detail/2302.html">https://nosec.org/home/detail/2302.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>CVE-2018-8639-exp<br><a target="_blank" href="https://github.com/ze0r/CVE-2018-8639-exp/">https://github.com/ze0r/CVE-2018-8639-exp/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Linux SNMP NAT 模块越界内存读写漏洞(CVE-2019-9162)<br><a target="_blank" href="https://www.exploit-db.com/exploits/46477?utm_source=dlvr.it&amp;utm_medium=twitter">https://www.exploit-db.com/exploits/46477?utm_source=dlvr.it&amp;utm_medium=twitter</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>红队后渗透测试中的文件传输技巧<br><a target="_blank" href="https://paper.seebug.org/834/?from=timeline">https://paper.seebug.org/834/?from=timeline</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Cobalt Strike 证书修改<br><a target="_blank" href="https://mp.weixin.qq.com/s/59Bj4qk-ClV2eqLu8SKniQ">https://mp.weixin.qq.com/s/59Bj4qk-ClV2eqLu8SKniQ</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>中文公开聊天语料库<br><a target="_blank" href="https://github.com/codemayq/chaotbot_corpus_Chinese">https://github.com/codemayq/chaotbot_corpus_Chinese</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>.NET高级代码审计（第一课）XmlSerializer反序列化漏洞<br><a target="_blank" href="https://www.anquanke.com/post/id/172316">https://www.anquanke.com/post/id/172316</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>写在98篇漏洞分析之后<br><a target="_blank" href="https://whereisk0shl.top/post/2019-03-09">https://whereisk0shl.top/post/2019-03-09</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Python 开发的 metasploit payload 免杀工具<br><a target="_blank" href="https://www.kitploit.com/2019/03/phantom-evasion-python-av-evasion-tool.html">https://www.kitploit.com/2019/03/phantom-evasion-python-av-evasion-tool.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Part 1: Introduction to Exploit Development<br><a target="_blank" href="https://www.fuzzysecurity.com/tutorials/expDev/1.html">https://www.fuzzysecurity.com/tutorials/expDev/1.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Facebook Information Leak<br><a target="_blank" href="http://www.tomanthony.co.uk/blog/facebook-bug-confirm-user-identities/">http://www.tomanthony.co.uk/blog/facebook-bug-confirm-user-identities/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>•结合图论进行入侵检测<br><a target="_blank" href="https://www.slideshare.net/MattSwann1/graph-the-planet-2019-intrusion-detection-with-graphs">https://www.slideshare.net/MattSwann1/graph-the-planet-2019-intrusion-detection-with-graphs</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>jsproxy: 一个基于浏览器端 JS 实现的在线代理<br><a target="_blank" href="https://github.com/EtherDream/jsproxy">https://github.com/EtherDream/jsproxy</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>apt40-examining-a-china-nexus-espionage-actor<br><a target="_blank" href="https://www.fireeye.com/blog/threat-research/2019/03/apt40-examining-a-china-nexus-espionage-actor.html">https://www.fireeye.com/blog/threat-research/2019/03/apt40-examining-a-china-nexus-espionage-actor.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>SMoTherSpectre PoC<br><a target="_blank" href="https://github.com/HexHive/SMoTherSpectre">https://github.com/HexHive/SMoTherSpectre</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>PHP7和PHP5在安全上的区别<br><a target="_blank" href="https://www.freebuf.com/articles/web/197013.html">https://www.freebuf.com/articles/web/197013.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>AI繁荣下的隐忧—Google Tensorflow安全风险剖析<br><a target="_blank" href="https://mp.weixin.qq.com/s/rjcOK3A83oKHkpNgbm9Lbg">https://mp.weixin.qq.com/s/rjcOK3A83oKHkpNgbm9Lbg</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>chomp-scan: 用于简化Bug Bounty/Penetration Test探测阶段的工具脚本<br><a target="_blank" href="https://github.com/SolomonSklash/chomp-scan">https://github.com/SolomonSklash/chomp-scan</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>探索CobaltStrike的External C2框架<br><a target="_blank" href="https://xz.aliyun.com/t/4220">https://xz.aliyun.com/t/4220</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>SecWiki周刊（第261期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/261">https://www.sec-wiki.com/weekly/261</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>从php内核角度分析php弱类型<br><a target="_blank" href="https://www.anquanke.com/post/id/171966">https://www.anquanke.com/post/id/171966</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>威胁建模模型ATT&amp;CK<br><a target="_blank" href="http://blog.nsfocus.net/threat-modeling-model-attck/">http://blog.nsfocus.net/threat-modeling-model-attck/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>LuWu: 红队基础设施自动化部署工具<br><a target="_blank" href="https://github.com/360-A-Team/LuWu">https://github.com/360-A-Team/LuWu</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Ubuntu Linux中的特权提升漏洞Dirty Sock分析（含PoC）<br><a target="_blank" href="https://www.freebuf.com/articles/system/195903.html">https://www.freebuf.com/articles/system/195903.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>从零编写一个自己的蜜罐系统<br><a target="_blank" href="https://www.freebuf.com/articles/es/196525.html">https://www.freebuf.com/articles/es/196525.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>GoBrut: A new GoLang Botnet <br><a target="_blank" href="https://blog.yoroi.company/research/gobrut-a-new-golang-botnet/">https://blog.yoroi.company/research/gobrut-a-new-golang-botnet/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>kubernetes集群渗透测试<br><a target="_blank" href="https://www.freebuf.com/news/196993.html">https://www.freebuf.com/news/196993.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>$100,000/year if you can solve this reverse engineering test<br><a target="_blank" href="https://www.linkedin.com/pulse/100000year-you-can-solve-reverse-engineering-test-john-coates/">https://www.linkedin.com/pulse/100000year-you-can-solve-reverse-engineering-test-john-coates/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Linux 内核漏洞利用开发实验项目<br><a target="_blank" href="https://github.com/a13xp0p0v/kernel-hack-drill">https://github.com/a13xp0p0v/kernel-hack-drill</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>femida: Automated blind-xss search for Burp Suite<br><a target="_blank" href="https://github.com/wish-i-was/femida">https://github.com/wish-i-was/femida</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>绕过 JS Sandbox 限制<br><a target="_blank" href="https://licenciaparahackear.github.io/en/posts/bypassing-a-restrictive-js-sandbox/">https://licenciaparahackear.github.io/en/posts/bypassing-a-restrictive-js-sandbox/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>JsDbg: Debugging extensions for Microsoft Edge and Chromium-based browsers<br><a target="_blank" href="https://github.com/MicrosoftEdge/JsDbg">https://github.com/MicrosoftEdge/JsDbg</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>技术层面看RSA的创新沙盒<br><a target="_blank" href="https://mp.weixin.qq.com/s/1-yCu8dvp5GzOfK1i4LIhg">https://mp.weixin.qq.com/s/1-yCu8dvp5GzOfK1i4LIhg</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>绿盟科技 2018物联网安全年报<br><a target="_blank" href="http://blog.nsfocus.net/annual-report-internet-security-2018/">http://blog.nsfocus.net/annual-report-internet-security-2018/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>软件供应链安全威胁：从“奥创纪元”到“无限战争”<br><a target="_blank" href="https://www.anquanke.com/post/id/172832">https://www.anquanke.com/post/id/172832</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>k8s-security-dashboard: A security monitoring solution for Kubernetes<br><a target="_blank" href="https://github.com/k8scop/k8s-security-dashboard">https://github.com/k8scop/k8s-security-dashboard</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>SirepRAT: Remote Command Execution as SYSTEM on Windows IoT Core<br><a target="_blank" href="https://github.com/SafeBreach-Labs/SirepRAT">https://github.com/SafeBreach-Labs/SirepRAT</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Hijacking a Customer Account with a Crafted Image<br><a target="_blank" href="https://www.fortinet.com/blog/threat-research/wordpress-woocommerce-xss-vulnerability----hijacking-a-customer-.html">https://www.fortinet.com/blog/threat-research/wordpress-woocommerce-xss-vulnerability----hijacking-a-customer-.html</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>极验2018交互安全行业研究报告<br><a target="_blank" href="https://www.freebuf.com/articles/paper/196652.html">https://www.freebuf.com/articles/paper/196652.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>代码审计实战思路之浅析PHPCMS<br><a target="_blank" href="https://www.freebuf.com/articles/web/195737.html">https://www.freebuf.com/articles/web/195737.html</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>2018 BOTNET趋势报告<br><a target="_blank" href="http://blog.nsfocus.net/wp-content/uploads/2019/03/2018-BOTNET%E8%B6%8B%E5%8A%BF%E6%8A%A5%E5%91%8A.pdf">http://blog.nsfocus.net/wp-content/uploads/2019/03/2018-BOTNET%E8%B6%8B%E5%8A%BF%E6%8A%A5%E5%91%8A.pdf</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>LEMNA:针对安全应用的深度学习黑盒解释模型<br><a target="_blank" href="http://www.arkteam.net/?p=4264">http://www.arkteam.net/?p=4264</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>dvantech WebAccess 访问控制权限配置不严导致的本地提权漏洞披露<br><a target="_blank" href="https://www.thezdi.com/blog/2019/3/6/webaccess-uncontrol">https://www.thezdi.com/blog/2019/3/6/webaccess-uncontrol</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>一个威胁数万用户GPON家用路由器 的RCE<br><a target="_blank" href="https://xz.aliyun.com/t/4242">https://xz.aliyun.com/t/4242</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>Abusing Web Browsers for Persistent and Stealthy Computation<br><a target="_blank" href="https://mp.weixin.qq.com/s/bvQo-VHWdOEisR2adxx6yA">https://mp.weixin.qq.com/s/bvQo-VHWdOEisR2adxx6yA</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>从 Trezor 硬件加密钱包中提取钱包恢复种子的研究<br><a target="_blank" href="http://colinoflynn.com/2019/03/glitching-trezor-using-emfi-through-the-enclosure/">http://colinoflynn.com/2019/03/glitching-trezor-using-emfi-through-the-enclosure/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>分析用Golang编写的新恶意软件<br><a target="_blank" href="https://www.freebuf.com/articles/network/196498.html">https://www.freebuf.com/articles/network/196498.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>机器学习算法分析引擎助力安全威胁推理分析<br><a target="_blank" href="http://blog.nsfocus.net/machine-learning-algorithms-analysis-engine-security-threat-reasoning/">http://blog.nsfocus.net/machine-learning-algorithms-analysis-engine-security-threat-reasoning/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>SVG XLink SSRF fingerprinting libraries version – Arbaz Hussain – Medium<br><a target="_blank" href="https://medium.com/@arbazhussain/svg-xlink-ssrf-fingerprinting-libraries-version-450ebecc2f3c">https://medium.com/@arbazhussain/svg-xlink-ssrf-fingerprinting-libraries-version-450ebecc2f3c</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>houjingyi233/CPU-vulnerabiility-collections<br><a target="_blank" href="https://github.com/houjingyi233/CPU-vulnerabiility-collections">https://github.com/houjingyi233/CPU-vulnerabiility-collections</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>MacOS Malware Pedia<br><a target="_blank" href="https://research.checkpoint.com/macos-malware-pedia/">https://research.checkpoint.com/macos-malware-pedia/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Setting up Frida Without Jailbreak on the Latest iOS 12.1.4 Device<br><a target="_blank" href="https://blog.securityinnovation.com/frida">https://blog.securityinnovation.com/frida</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Google Launches Backstory —Google的情报工具Backstory<br><a target="_blank" href="https://thehackernews.com/2019/03/backstory-cybersecurity-software.html">https://thehackernews.com/2019/03/backstory-cybersecurity-software.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Automate discovering and dropping payloads on LAN Raspberry Pi&#039;s via ssh<br><a target="_blank" href="https://github.com/BusesCanFly/rpi-hunter">https://github.com/BusesCanFly/rpi-hunter</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Detecting Powershell Empire shenanigans with Sysinternals<br><a target="_blank" href="https://holdmybeersecurity.com/2019/02/27/sysinternals-for-windows-incident-response/">https://holdmybeersecurity.com/2019/02/27/sysinternals-for-windows-incident-response/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>采用NLP机器学习来进行自动化合规风险治理<br><a target="_blank" href="http://blog.nsfocus.net/automated-compliance-risk-management-nlp-machine-learning/">http://blog.nsfocus.net/automated-compliance-risk-management-nlp-machine-learning/</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>美国政略统筹下的网军军事战略<br><a target="_blank" href="https://mp.weixin.qq.com/s/GMvs_YE5W_m532touUOgfg">https://mp.weixin.qq.com/s/GMvs_YE5W_m532touUOgfg</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Great Scott! Timing Attack Demo for the Everyday Webdev<br><a target="_blank" href="https://www.simplethread.com/great-scott-timing-attack-demo/">https://www.simplethread.com/great-scott-timing-attack-demo/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Automation in Exploit Generation with Exploit Templates<br><a target="_blank" href="https://sean.heelan.io/2019/03/05/automation-in-exploit-generation-with-exploit-templates/">https://sean.heelan.io/2019/03/05/automation-in-exploit-generation-with-exploit-templates/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Detecting Malicious Behavior by Unmasking WebSockets<br><a target="_blank" href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/detecting-malicious-behavior-by-unmasking-websockets/">https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/detecting-malicious-behavior-by-unmasking-websockets/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Online Courses – Ghidra<br><a target="_blank" href="http://ghidra.re/online-courses/">http://ghidra.re/online-courses/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Don&#039;t worry about being locked with Loccess<br><a target="_blank" href="https://www.eyeohtee.cheap/dont-worry-about-being-locked-with-loccess/">https://www.eyeohtee.cheap/dont-worry-about-being-locked-with-loccess/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>using-docker-kubernetes-for-automating-appsec-and-osint-workflows<br><a target="_blank" href="https://github.com/appsecco/using-docker-kubernetes-for-automating-appsec-and-osint-workflows">https://github.com/appsecco/using-docker-kubernetes-for-automating-appsec-and-osint-workflows</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Facebook Messenger server random memory exposure through corrupted GIF image<br><a target="_blank" href="https://www.vulnano.com/2019/03/facebook-messenger-server-random-memory.html">https://www.vulnano.com/2019/03/facebook-messenger-server-random-memory.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Quick Analysis of a Trickbot Sample with NSA&#039;s Ghidra SRE Framework<br><a target="_blank" href="http://www.peppermalware.com/2019/03/quick-analysis-of-trickbot-sample-with.html">http://www.peppermalware.com/2019/03/quick-analysis-of-trickbot-sample-with.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>stevenaldinger/decker: Declarative penetration testing orchestration framework<br><a target="_blank" href="https://github.com/stevenaldinger/decker">https://github.com/stevenaldinger/decker</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>3 XSS in ProtonMail for iOS – Vladimir Metnew – Medium<br><a target="_blank" href="https://medium.com/@vladimirmetnew/3-xss-in-protonmail-for-ios-95f8e4b17054">https://medium.com/@vladimirmetnew/3-xss-in-protonmail-for-ios-95f8e4b17054</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>New SLUB Backdoor Uses GitHub, Communicates via Slack<br><a target="_blank" href="https://blog.trendmicro.com/trendlabs-security-intelligence/new-slub-backdoor-uses-github-communicates-via-slack/">https://blog.trendmicro.com/trendlabs-security-intelligence/new-slub-backdoor-uses-github-communicates-via-slack/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>以太坊链审计报告之Clef审计报告<br><a target="_blank" href="https://www.freebuf.com/articles/blockchain-articles/196822.html">https://www.freebuf.com/articles/blockchain-articles/196822.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>SectorD02 PowerShell Backdoor Analysis<br><a target="_blank" href="https://threatrecon.nshc.net/2019/03/07/sectord02-powershell-backdoor-analysis/">https://threatrecon.nshc.net/2019/03/07/sectord02-powershell-backdoor-analysis/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Auditing GitHub Repo Wikis for Fun and Profit<br><a target="_blank" href="https://www.smeegesec.com/2019/03/auditing-github-repo-wikis-for-fun-and.html">https://www.smeegesec.com/2019/03/auditing-github-repo-wikis-for-fun-and.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Host Header Poisoning in IBM Websphere<br><a target="_blank" href="https://medium.com/@x41x41x41/host-header-poisoning-in-ibm-websphere-3d459a990f00">https://medium.com/@x41x41x41/host-header-poisoning-in-ibm-websphere-3d459a990f00</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于机器学习的webshell检测（一）<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/58676764">https://zhuanlan.zhihu.com/p/58676764</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Universal RCE with Ruby YAML.load<br><a target="_blank" href="https://staaldraad.github.io/post/2019-03-02-universal-rce-ruby-yaml-load/">https://staaldraad.github.io/post/2019-03-02-universal-rce-ruby-yaml-load/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于深度学习的webshell检测（二）<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/58683374">https://zhuanlan.zhihu.com/p/58683374</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于机器学习的攻击检测（二）上-理解lstm<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/58725390">https://zhuanlan.zhihu.com/p/58725390</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于机器学习的攻击检测（一）<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/58689080">https://zhuanlan.zhihu.com/p/58689080</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于机器学习的攻击检测（二）下-lstm实现<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/58732540">https://zhuanlan.zhihu.com/p/58732540</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/262">SecWiki周刊(第262期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
