<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第199期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第199期）</strong></h5>
<blockquote> 2017/12/18-2017/12/24</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>迈克菲实验室：2018年5大网络安全趋势预测<br><a target="_blank" href="http://www.4hou.com/info/news/9350.html">http://www.4hou.com/info/news/9350.html</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>非英雄史观的乙方安全和甲方安全工作体验<br><a target="_blank" href="https://im1gd.me/2017/12/18/jiangvsyi/">https://im1gd.me/2017/12/18/jiangvsyi/</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>黑客的滑铁卢——美国大断网全纪实<br><a target="_blank" href="https://mp.weixin.qq.com/s/25f5gK0fXIr_UV9xROLX3w">https://mp.weixin.qq.com/s/25f5gK0fXIr_UV9xROLX3w</a></div><div class="single"><span id="tags">[人物]&nbsp;&nbsp;</span>张长河：从国家队骨干到网络安全护法<br><a target="_blank" href="https://mp.weixin.qq.com/s/W5VC5tgktdYe_MWidBwByQ">https://mp.weixin.qq.com/s/W5VC5tgktdYe_MWidBwByQ</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>APT34攻击再升级，利用CVE-2017-11882漏洞攻击中东国家<br><a target="_blank" href="http://www.4hou.com/vulnerable/9296.html">http://www.4hou.com/vulnerable/9296.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>闷声发大财年度之星：2017挖矿木马的疯狂敛财暗流<br><a target="_blank" href="https://weibo.com/ttarticle/p/show?id=2309404186375594332080">https://weibo.com/ttarticle/p/show?id=2309404186375594332080</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>水落石出！原来WannaCry事件元凶是三胖！<br><a target="_blank" href="http://www.4hou.com/info/news/9369.html">http://www.4hou.com/info/news/9369.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>2017年值得关注的10起数据泄露事件<br><a target="_blank" href="https://weibo.com/ttarticle/p/show?id=2309404186255733731332">https://weibo.com/ttarticle/p/show?id=2309404186255733731332</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>2018年金融行业网络犯罪趋势预测<br><a target="_blank" href="http://www.4hou.com/info/news/9210.html">http://www.4hou.com/info/news/9210.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>Windows 10预装的密码管理器可能会有凭证泄漏风险<br><a target="_blank" href="http://www.4hou.com/vulnerable/9342.html">http://www.4hou.com/vulnerable/9342.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>Looking Ahead: Three Bold Cybersecurity Predictions for 2018<br><a target="_blank" href="https://securityintelligence.com/looking-ahead-three-bold-cybersecurity-predictions-for-2018/?from=timeline">https://securityintelligence.com/looking-ahead-three-bold-cybersecurity-predictions-for-2018/?from=timeline</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>2018年国家重点研发计划40个重点专项<br><a target="_blank" href="https://mp.weixin.qq.com/s/q2Inex4wgBLOMVJgFnDXuQ">https://mp.weixin.qq.com/s/q2Inex4wgBLOMVJgFnDXuQ</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>GoAhead httpd 2.5 &lt; 3.6.5 - &#039;LD_PRELOAD&#039; Remote Code Execution<br><a target="_blank" href="https://www.exploit-db.com/exploits/43360/">https://www.exploit-db.com/exploits/43360/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>S2-055 反序列化漏洞Exploit CVE-2017-7525<br><a target="_blank" href="https://github.com/iBearcat/S2-055">https://github.com/iBearcat/S2-055</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Redis未授权访问致远程植入挖矿脚本（防御篇）<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzI3Njk2OTIzOQ==&amp;mid=2247483818&amp;idx=1&amp;sn=b6068877196e1c240003ade42b2d4b77&amp;chksm=eb6c23d2dc1baac498500e2d7ea3d2ff84e2ea90a9f02362b4ceddec275dcbdea359a18099b5#rd">https://mp.weixin.qq.com/s?__biz=MzI3Njk2OTIzOQ==&amp;mid=2247483818&amp;idx=1&amp;sn=b6068877196e1c240003ade42b2d4b77&amp;chksm=eb6c23d2dc1baac498500e2d7ea3d2ff84e2ea90a9f02362b4ceddec275dcbdea359a18099b5#rd</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>快速自检电脑是否被黑客入侵过(Linux版)<br><a target="_blank" href="https://www.pppan.net/blog/detail/2017-12-24-linux-self-check">https://www.pppan.net/blog/detail/2017-12-24-linux-self-check</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>高级持续渗透-第一季关于后门<br><a target="_blank" href="https://micropoor.blogspot.jp/2017/12/php.html">https://micropoor.blogspot.jp/2017/12/php.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Apache Commons Collections反序列化漏洞学习 <br><a target="_blank" href="http://pirogue.org/2017/12/22/javaSerialKiller/">http://pirogue.org/2017/12/22/javaSerialKiller/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>1.4 Billion Text Credentials Analysis (NLP)<br><a target="_blank" href="https://github.com/philipperemy/tensorflow-1.4-billion-password-analysis">https://github.com/philipperemy/tensorflow-1.4-billion-password-analysis</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>专家教你利用深度学习检测恶意代码<br><a target="_blank" href="http://www.4hou.com/web/9136.html">http://www.4hou.com/web/9136.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>逆向学习粗略导航<br><a target="_blank" href="https://im1gd.me/2017/12/19/nixiangguide/">https://im1gd.me/2017/12/19/nixiangguide/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>重温经典-IIS短文件名漏洞分析及利用 <br><a target="_blank" href="http://www.lsablog.com/network_security/penetration/iis-short-name-analysis-and-exploit/">http://www.lsablog.com/network_security/penetration/iis-short-name-analysis-and-exploit/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>黑掉大数据之Spark<br><a target="_blank" href="https://weibo.com/ttarticle/p/show?id=2309404187794313453016">https://weibo.com/ttarticle/p/show?id=2309404187794313453016</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>傀儡进程的实现与检测<br><a target="_blank" href="https://3gstudent.github.io/3gstudent.github.io/%E5%82%80%E5%84%A1%E8%BF%9B%E7%A8%8B%E7%9A%84%E5%AE%9E%E7%8E%B0%E4%B8%8E%E6%A3%80%E6%B5%8B/">https://3gstudent.github.io/3gstudent.github.io/%E5%82%80%E5%84%A1%E8%BF%9B%E7%A8%8B%E7%9A%84%E5%AE%9E%E7%8E%B0%E4%B8%8E%E6%A3%80%E6%B5%8B/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>对比特币挖矿木马分析研究和清除<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-30830-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-30830-1-1.html?from=sec</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>OPNsense防火墙搭建实验环境，MSF与SSH进行流量转发<br><a target="_blank" href="http://www.freebuf.com/articles/network/157089.html">http://www.freebuf.com/articles/network/157089.html</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>线下赛ASP靶机漏洞利用分析<br><a target="_blank" href="http://mp.weixin.qq.com/s/S1h7vESMB7ytbfxvkZalAw">http://mp.weixin.qq.com/s/S1h7vESMB7ytbfxvkZalAw</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>利用WPAD/PAC与JScript，Exploiting Windows 10<br><a target="_blank" href="https://cert.360.cn/static/files/%E5%88%A9%E7%94%A8WPADPAC%E4%B8%8EJScript%20Exploiting_Windows_10.pdf">https://cert.360.cn/static/files/%E5%88%A9%E7%94%A8WPADPAC%E4%B8%8EJScript%20Exploiting_Windows_10.pdf</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>行业风口上的安全人员职业规划<br><a target="_blank" href="https://mp.weixin.qq.com/s/icRTSbxjT-1Jf216u6F_pg">https://mp.weixin.qq.com/s/icRTSbxjT-1Jf216u6F_pg</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>NetSPI SQL Injection Wiki<br><a target="_blank" href="https://sqlwiki.netspi.com/">https://sqlwiki.netspi.com/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>反序列化的花式利用<br><a target="_blank" href="https://mp.weixin.qq.com/s/PLSCilYr1uuHOHTdNNZ7XQ">https://mp.weixin.qq.com/s/PLSCilYr1uuHOHTdNNZ7XQ</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>ROP Emporium 挑战 WP<br><a target="_blank" href="http://mp.weixin.qq.com/s/KIwpBhMjGX3AUz_QUNNEsA">http://mp.weixin.qq.com/s/KIwpBhMjGX3AUz_QUNNEsA</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Metasploit 一条龙服务<br><a target="_blank" href="http://mp.weixin.qq.com/s/BA6Up-Vtd1Xz73aeVYk-4A">http://mp.weixin.qq.com/s/BA6Up-Vtd1Xz73aeVYk-4A</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Docker镜像扫描器的实现<br><a target="_blank" href="http://www.freebuf.com/column/157784.html">http://www.freebuf.com/column/157784.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>企业安全建设—网络镜像流量分析的一些方法与思路<br><a target="_blank" href="http://mp.weixin.qq.com/s/TSlIqCP53nxhi5Vq4TFRnw">http://mp.weixin.qq.com/s/TSlIqCP53nxhi5Vq4TFRnw</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>GuardiCore中国黑产分析报告：Hex-Men！<br><a target="_blank" href="https://www.anquanke.com/post/id/91779">https://www.anquanke.com/post/id/91779</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>subTee gists code backups<br><a target="_blank" href="https://github.com/re4lity/subTee-gits-backups">https://github.com/re4lity/subTee-gits-backups</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>AppCMS v2.0.101 后门分析<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/topic/1806/">https://xianzhi.aliyun.com/forum/topic/1806/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android Accessibility点击劫持攻防<br><a target="_blank" href="https://weibo.com/ttarticle/p/show?id=2309404186371647488370">https://weibo.com/ttarticle/p/show?id=2309404186371647488370</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>渗透技巧——”隐藏”注册表的更多测试<br><a target="_blank" href="http://www.4hou.com/penetration/9132.html">http://www.4hou.com/penetration/9132.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>net-creds:从网络嗅探或Pcap 文件提取敏感数据的工具<br><a target="_blank" href="https://github.com/DanMcInerney/net-creds">https://github.com/DanMcInerney/net-creds</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>安卓反调试<br><a target="_blank" href="https://bbs.pediy.com/thread-223324.htm">https://bbs.pediy.com/thread-223324.htm</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Meterpreter免杀及对抗分析<br><a target="_blank" href="https://green-m.github.io//2017/12/22/meterpreter-dection-and-evasion/">https://green-m.github.io//2017/12/22/meterpreter-dection-and-evasion/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>GoAhead远程代码执行漏洞分析报告<br><a target="_blank" href="https://mp.weixin.qq.com/s/QImpx8PJhaaLZkj7gvTynw">https://mp.weixin.qq.com/s/QImpx8PJhaaLZkj7gvTynw</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Awesome-Vulnerability-Research: 漏洞研究技术资源<br><a target="_blank" href="https://github.com/sergey-pronin/Awesome-Vulnerability-Research">https://github.com/sergey-pronin/Awesome-Vulnerability-Research</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>JAVA代码审计的一些Tips(附脚本)<br><a target="_blank" href="https://mp.weixin.qq.com/s/josQv1X6YjsttZr1O32j2Q">https://mp.weixin.qq.com/s/josQv1X6YjsttZr1O32j2Q</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>TeamViewer 13.0.5058中的权限漏洞测试<br><a target="_blank" href="https://3gstudent.github.io/3gstudent.github.io/TeamViewer-13.0.5058%E4%B8%AD%E7%9A%84%E6%9D%83%E9%99%90%E6%BC%8F%E6%B4%9E%E6%B5%8B%E8%AF%95/">https://3gstudent.github.io/3gstudent.github.io/TeamViewer-13.0.5058%E4%B8%AD%E7%9A%84%E6%9D%83%E9%99%90%E6%BC%8F%E6%B4%9E%E6%B5%8B%E8%AF%95/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>2017 HCTF Final game writeup<br><a target="_blank" href="http://repwn.com/archives/31">http://repwn.com/archives/31</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>2017最新系统集成商大全<br><a target="_blank" href="https://mp.weixin.qq.com/s/aakdkvro9_ukjOvkIp83MQ">https://mp.weixin.qq.com/s/aakdkvro9_ukjOvkIp83MQ</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>PHP代码审计<br><a target="_blank" href="http://mp.weixin.qq.com/s/ZaCSOB1R3nRCwMQd_xSbrQ">http://mp.weixin.qq.com/s/ZaCSOB1R3nRCwMQd_xSbrQ</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>17种安卓native反调试收集<br><a target="_blank" href="https://bbs.pediy.com/thread-223460.htm">https://bbs.pediy.com/thread-223460.htm</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第198期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/198">https://www.sec-wiki.com/weekly/198</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>2017 SECCON CTF vm_no_fun writeup<br><a target="_blank" href="http://repwn.com/archives/30">http://repwn.com/archives/30</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Linux下恶意文件大规模共性分析探讨<br><a target="_blank" href="http://www.freebuf.com/articles/system/157102.html">http://www.freebuf.com/articles/system/157102.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>More Complex Intruder Attacks with Burp!<br><a target="_blank" href="https://www.trustedsec.com/2017/12/complex-intruder-attacks-burp/">https://www.trustedsec.com/2017/12/complex-intruder-attacks-burp/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2017-17522 Python webbrowser.py 命令执行漏洞分析<br><a target="_blank" href="https://lightless.me/archives/cve-2017-17522.html">https://lightless.me/archives/cve-2017-17522.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>VxWorks系统典型漏洞分析与影响范围统计<br><a target="_blank" href="https://mp.weixin.qq.com/s/sV5696BRcR-GdEanYKWwNA">https://mp.weixin.qq.com/s/sV5696BRcR-GdEanYKWwNA</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>用命令行与Python，使用YARA规则<br><a target="_blank" href="http://mp.weixin.qq.com/s/wjrR2gsApl7vH3CtWMGmxw">http://mp.weixin.qq.com/s/wjrR2gsApl7vH3CtWMGmxw</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>通过Microsoft Office 窃取 NTLM Hashes<br><a target="_blank" href="https://evi1cg.me/archives/Get_NTLM_Hashes.html">https://evi1cg.me/archives/Get_NTLM_Hashes.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>OWASP Hakcing Lab在线漏洞环境<br><a target="_blank" href="http://www.freebuf.com/sectool/157072.html">http://www.freebuf.com/sectool/157072.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>10分钟带你上手TensorFlow实践（附代码）<br><a target="_blank" href="https://mp.weixin.qq.com/s/UdXiDgbM18h4S6GczOOU5A">https://mp.weixin.qq.com/s/UdXiDgbM18h4S6GczOOU5A</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>watchdog: IF (网页某区域有变化) THEN (邮件提醒你)<br><a target="_blank" href="https://github.com/SaulLawliet/watchdog">https://github.com/SaulLawliet/watchdog</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>WordPress Captcha 插件后门事件 分析溯源报告<br><a target="_blank" href="https://mp.weixin.qq.com/s/VoLu-dvx91q4OEjnJB4EjQ">https://mp.weixin.qq.com/s/VoLu-dvx91q4OEjnJB4EjQ</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>OWASP juice shop (三)<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-30816-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-30816-1-1.html?from=sec</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>DDE攻击的迭代：利用Excel进行攻击<br><a target="_blank" href="http://www.4hou.com/vulnerable/9212.html">http://www.4hou.com/vulnerable/9212.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>S3Scanner: Scan for open S3 buckets and dump<br><a target="_blank" href="https://github.com/sa7mon/S3Scanner">https://github.com/sa7mon/S3Scanner</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Public S3 Bucket Search Engine<br><a target="_blank" href="http://blog.rojanrijal.com/2017/12/public-s3-bucket-search-engine-open.html?m=1">http://blog.rojanrijal.com/2017/12/public-s3-bucket-search-engine-open.html?m=1</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>利用分析利器Angr帮助更好的Exploit<br><a target="_blank" href="http://www.freebuf.com/sectool/157108.html">http://www.freebuf.com/sectool/157108.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Cyberespionage Campaign Sphinx Goes Mobile With AnubisSpy<br><a target="_blank" href="http://blog.trendmicro.com/trendlabs-security-intelligence/cyberespionage-campaign-sphinx-goes-mobile-anubisspy/">http://blog.trendmicro.com/trendlabs-security-intelligence/cyberespionage-campaign-sphinx-goes-mobile-anubisspy/</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/199">SecWiki周刊(第199期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
