<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第189期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第189期）</strong></h5>
<blockquote> 2017/10/09-2017/10/15</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>《网络安全法》执法案例汇总第二期<br><a target="_blank" href="http://mp.weixin.qq.com/s/ouDszZXtibPqGWubgawjZQ">http://mp.weixin.qq.com/s/ouDszZXtibPqGWubgawjZQ</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>我国网络信息安全产业概览（政策+产业链+挑战）<br><a target="_blank" href="https://mp.weixin.qq.com/s/D2CxcifjuwvXixh_P2Z3pw">https://mp.weixin.qq.com/s/D2CxcifjuwvXixh_P2Z3pw</a></div><div class="single"><span id="tags">[人物]&nbsp;&nbsp;</span>专访火绒安全马刚<br><a target="_blank" href="https://mp.weixin.qq.com/s/KvDCmR2jlvT9xTsms7vNCw">https://mp.weixin.qq.com/s/KvDCmR2jlvT9xTsms7vNCw</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>探索机器学习模型，保障账户安全<br><a target="_blank" href="http://www.freebuf.com/articles/rookie/150179.html">http://www.freebuf.com/articles/rookie/150179.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>因弱密码导致澳大利亚国防相关内部资料被黑客窃取<br><a target="_blank" href="https://nosec.org/my/threats/1588">https://nosec.org/my/threats/1588</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>无国界威胁：美国陆军网络司令部协助防御国家网络<br><a target="_blank" href="https://mp.weixin.qq.com/s/chS8rz7k6xyG2X9KmK1Myg">https://mp.weixin.qq.com/s/chS8rz7k6xyG2X9KmK1Myg</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>无处不在的窥视-美国Xkeyscore计划简介<br><a target="_blank" href="https://mp.weixin.qq.com/s/8JeIRebbLJnIzQqJ7HVmAA">https://mp.weixin.qq.com/s/8JeIRebbLJnIzQqJ7HVmAA</a></div><div class="single"><span id="tags">[人物]&nbsp;&nbsp;</span>小城：我这一路的摸爬滚打<br><a target="_blank" href="https://mp.weixin.qq.com/s/FupWpgckJIzUKD0Edi1Dgw">https://mp.weixin.qq.com/s/FupWpgckJIzUKD0Edi1Dgw</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>FBI可获取部分VPN服务商的用户日志<br><a target="_blank" href="https://mp.weixin.qq.com/s/wW9juEphrqwSBy9sle0DYw">https://mp.weixin.qq.com/s/wW9juEphrqwSBy9sle0DYw</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Microsoft Windows SMB远程代码执行漏洞(CVE-2017-11780)<br><a target="_blank" href="https://nosec.org/my/threats/1587">https://nosec.org/my/threats/1587</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>ISC2017 第五届中国互联网安全大会课程资料-提取码:f45d<br><a target="_blank" href="https://eyun.360.cn/surl_yjrTuVTt8Mc ">https://eyun.360.cn/surl_yjrTuVTt8Mc </a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Typecho SSRF漏洞分析和利用<br><a target="_blank" href="https://joychou.org/web/typecho-ssrf-analysis-and-exploit.html">https://joychou.org/web/typecho-ssrf-analysis-and-exploit.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>渗透之从新手入门到入狱<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-27658-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-27658-1-1.html?from=sec</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>渗透测试学习笔记之案例五<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2206.html">https://xianzhi.aliyun.com/forum/read/2206.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>struts-scan: struts2漏洞全版本检测和利用工具<br><a target="_blank" href="https://github.com/Lucifer1993/struts-scan">https://github.com/Lucifer1993/struts-scan</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>河马-利用机器学习检测WEBSHELL<br><a target="_blank" href="http://blog.shellpub.com/2017/10/11/%E6%B2%B3%E9%A9%ACwebshell%E6%9C%BA%E5%99%A8%E5%AD%A6%E4%B9%A0.html">http://blog.shellpub.com/2017/10/11/%E6%B2%B3%E9%A9%ACwebshell%E6%9C%BA%E5%99%A8%E5%AD%A6%E4%B9%A0.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Apache Tomcat JSP Upload Bypass exp - CVE-2017-12617<br><a target="_blank" href="https://github.com/cyberheartmi9/CVE-2017-12617">https://github.com/cyberheartmi9/CVE-2017-12617</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Kali Linux信息收集工具全<br><a target="_blank" href="http://www.freebuf.com/column/150118.html">http://www.freebuf.com/column/150118.html</a></div><div class="single"><span id="tags">[书籍]&nbsp;&nbsp;</span>一本 CTF 领域的大杂烩指南<br><a target="_blank" href="https://firmianay.gitbooks.io/ctf-all-in-one/content/">https://firmianay.gitbooks.io/ctf-all-in-one/content/</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>2017 Splunk Conference Sessions<br><a target="_blank" href="http://conf.splunk.com/sessions/2017-sessions.html">http://conf.splunk.com/sessions/2017-sessions.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>[终端安全]Linux应急响应姿势浅谈<br><a target="_blank" href="http://www.4hou.com/system/7899.html">http://www.4hou.com/system/7899.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>一文读懂TensorFlow（附代码、学习资料）<br><a target="_blank" href="https://mp.weixin.qq.com/s/SlitM8JToD7dN5E5Ue9wjA">https://mp.weixin.qq.com/s/SlitM8JToD7dN5E5Ue9wjA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>奇葩webshell技巧<br><a target="_blank" href="http://mp.weixin.qq.com/s/_Yg1C-6_liquATHB-vz65Q">http://mp.weixin.qq.com/s/_Yg1C-6_liquATHB-vz65Q</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>BroCon ’17 会议材料，包括视频和PDF<br><a target="_blank" href="https://www.bro.org/community/brocon2017.html">https://www.bro.org/community/brocon2017.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>AngelSword: 漏洞检测框架<br><a target="_blank" href="https://github.com/Lucifer1993/AngelSword">https://github.com/Lucifer1993/AngelSword</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>如何快速大规模批量进行常规端口渗透<br><a target="_blank" href="http://www.freebuf.com/column/150205.html">http://www.freebuf.com/column/150205.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>CVE-2017-8759_Word漏洞复现<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-27989-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-27989-1-1.html?from=sec</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>漫谈前期信息收集<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-27820-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-27820-1-1.html?from=sec</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Adobe ColdFusion Deserialization RCE (CVE-2017-11283, CVE-2017-11238)<br><a target="_blank" href="https://nickbloor.co.uk/2017/10/13/adobe-coldfusion-deserialization-rce-cve-2017-11283-cve-2017-11238/">https://nickbloor.co.uk/2017/10/13/adobe-coldfusion-deserialization-rce-cve-2017-11283-cve-2017-11238/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Metasploit和Cobalt Strike的四种联动场景<br><a target="_blank" href="https://secvul.com/topics/862.html">https://secvul.com/topics/862.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>xss-game游戏挑战赛系列一<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/29946924?group_id=900655230264414208">https://zhuanlan.zhihu.com/p/29946924?group_id=900655230264414208</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Mybatis OGNL导致的并发安全问题<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/30085658">https://zhuanlan.zhihu.com/p/30085658</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>阿里巴巴Java开发规约插件简要说明<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/30136165">https://zhuanlan.zhihu.com/p/30136165</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>PHPCMS MT_RAND SEED CRACK致authkey泄露<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2202.html">https://xianzhi.aliyun.com/forum/read/2202.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>深网与暗网初学者指南<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/29963330">https://zhuanlan.zhihu.com/p/29963330</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>Hacking Books PDF 600+<br><a target="_blank" href="https://drive.google.com/drive/folders/0B5rqWHARHFcVNUpNamdoMlRqRm8">https://drive.google.com/drive/folders/0B5rqWHARHFcVNUpNamdoMlRqRm8</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Python 协程之从放弃到死亡再到重生<br><a target="_blank" href="https://lightless.me/archives/python-coroutine-from-boom-to-dead-to-rebirth.html">https://lightless.me/archives/python-coroutine-from-boom-to-dead-to-rebirth.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>超过37000 Chrome 用户安装假的AdBlock Plus 插件<br><a target="_blank" href="https://nosec.org/my/threats/1586">https://nosec.org/my/threats/1586</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>爱奇艺业务安全风控体系的建设实践<br><a target="_blank" href="https://mp.weixin.qq.com/s/2gcNY0LmgxpYT1K6uDaWtg">https://mp.weixin.qq.com/s/2gcNY0LmgxpYT1K6uDaWtg</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>记录与分享PHP WebShell 绕过WAF 的一些经验<br><a target="_blank" href="https://github.com/lcatro/PHP-WebShell-Bypass-WAF">https://github.com/lcatro/PHP-WebShell-Bypass-WAF</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>趋势科技产品Widgets模块多个漏洞复现<br><a target="_blank" href="https://secvul.com/topics/873.html">https://secvul.com/topics/873.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Macro-less Code Exec in MSWord<br><a target="_blank" href="https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/">https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>另类WebShell监测机制--基于auditd<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzI5ODE0ODA5MQ==&amp;mid=2652278266&amp;idx=1&amp;sn=7b2f89643afaa22527644774a77b297b">https://mp.weixin.qq.com/s?__biz=MzI5ODE0ODA5MQ==&amp;mid=2652278266&amp;idx=1&amp;sn=7b2f89643afaa22527644774a77b297b</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>微博深度学习平台架构和实践<br><a target="_blank" href="http://geek.csdn.net/news/detail/239447">http://geek.csdn.net/news/detail/239447</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>内核漏洞进击之旅－－Dark Composition Exploitation Case Study<br><a target="_blank" href="https://whereisk0shl.top/Dark%20Composition%20Exploit%20in%20Ring0.html">https://whereisk0shl.top/Dark%20Composition%20Exploit%20in%20Ring0.html</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>基于Django的双因子认证实现<br><a target="_blank" href="http://www.freebuf.com/articles/network/150071.html">http://www.freebuf.com/articles/network/150071.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>低成本实现百 Gbps DDoS/CC 攻击防护<br><a target="_blank" href="http://mp.weixin.qq.com/s/RgyPq9BA3XHJ8cW1CQD71Q">http://mp.weixin.qq.com/s/RgyPq9BA3XHJ8cW1CQD71Q</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>DependencyCheck: OWASP 一款检查Java依赖库缺陷的工具<br><a target="_blank" href="https://github.com/jeremylong/DependencyCheck#">https://github.com/jeremylong/DependencyCheck#</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>新型IoT机顶盒恶意软件Rowdy网络分析报告 <br><a target="_blank" href="http://blog.nsfocus.net/iot-set-top-box-malware-rowdy-network-analysis-report/">http://blog.nsfocus.net/iot-set-top-box-malware-rowdy-network-analysis-report/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>OpenFire后台插件上传获取webshell及免密码登录linux服务器<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-27954-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-27954-1-1.html?from=sec</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>一处漏洞全家遭殃！趋势科技多款软件均存在远程命令执行漏洞<br><a target="_blank" href="http://www.4hou.com/vulnerable/7902.html">http://www.4hou.com/vulnerable/7902.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>利用 shodan hacking 辅助快速渗透大中型目标<br><a target="_blank" href="http://www.jianshu.com/p/ee22367303d5">http://www.jianshu.com/p/ee22367303d5</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>工具推荐：逆向破解利器OllyDbg<br><a target="_blank" href="http://www.4hou.com/tools/7890.html">http://www.4hou.com/tools/7890.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>利用mysql general log 写shell 可行性简要分析<br><a target="_blank" href="http://www.freebuf.com/column/150308.html">http://www.freebuf.com/column/150308.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>php文件包含漏洞<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2204.html">https://xianzhi.aliyun.com/forum/read/2204.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Detecting BadBIOS, Evil Maids, Bootkits, and Other Firmware Malware SeaGL<br><a target="_blank" href="https://ia601507.us.archive.org/2/items/seagl-2017/seagl-2017.pdf">https://ia601507.us.archive.org/2/items/seagl-2017/seagl-2017.pdf</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>使用威胁情报追踪攻击者——Part 1 威胁情报的另类分类<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/30105006?group_id=902331950856048640">https://zhuanlan.zhihu.com/p/30105006?group_id=902331950856048640</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Java 反序列化原理及漏洞利用<br><a target="_blank" href="http://www.4hou.com/technology/7904.html">http://www.4hou.com/technology/7904.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>玩儿懂深度学习Part 1：传统机器学习的回顾<br><a target="_blank" href="https://jizhi.im/blog/post/gpu-p1">https://jizhi.im/blog/post/gpu-p1</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>2005-2017年国内科研单位在国际安全顶级会议中发表文章量统计<br><a target="_blank" href="https://mp.weixin.qq.com/s/Kivzuq9EkHZKa0gNFcokSQ">https://mp.weixin.qq.com/s/Kivzuq9EkHZKa0gNFcokSQ</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Teemo: 域名收集及枚举工具<br><a target="_blank" href="https://github.com/bit4woo/Teemo">https://github.com/bit4woo/Teemo</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>不重启Tomcat，覆盖本地代码<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2189.html">https://xianzhi.aliyun.com/forum/read/2189.html</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>代码安全的历史与发展现状<br><a target="_blank" href="http://www.freebuf.com/articles/terminal/149569.html">http://www.freebuf.com/articles/terminal/149569.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>谈谈OpenVAS的点滴<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-27079-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-27079-1-1.html?from=sec</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>一次误报引发的DNS检测方案的思考：DNS隧道检测平民解决方案<br><a target="_blank" href="http://www.freebuf.com/articles/network/149328.html">http://www.freebuf.com/articles/network/149328.html</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>E-Mail Tracking-论文<br><a target="_blank" href="https://www.schneier.com/blog/archives/2017/10/e-mail_tracking.html">https://www.schneier.com/blog/archives/2017/10/e-mail_tracking.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>rubygems.org远程命令执行漏洞分析<br><a target="_blank" href="http://www.4hou.com/vulnerable/7917.html">http://www.4hou.com/vulnerable/7917.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>代码审计新姿势，从任意读到任意重置用户密码<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2209.html">https://xianzhi.aliyun.com/forum/read/2209.html</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第188期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/188">https://www.sec-wiki.com/weekly/188</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>深度学习框架中的魔鬼 — 探究人工智能系统中的安全问题 <br><a target="_blank" href="http://blogs.360.cn/blog/devils-in-the-deep-learning-framework/">http://blogs.360.cn/blog/devils-in-the-deep-learning-framework/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>iOS Privacy: steal.password - Easily get the user&#039;s Apple ID password<br><a target="_blank" href="https://krausefx.com/">https://krausefx.com/</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>GSM Assessment Toolkit - A security evaluation framework for GSM networks<br><a target="_blank" href="https://github.com/romankh/gsm-assessment-toolkit">https://github.com/romankh/gsm-assessment-toolkit</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>玩儿懂深度学习Part 3：搭建深度神经网络<br><a target="_blank" href="https://jizhi.im/blog/post/gpu-p3">https://jizhi.im/blog/post/gpu-p3</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>木马APP的简单分析(Android Killer分析)<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-27661-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-27661-1-1.html?from=sec</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Manalyze: A static analyzer for PE executables<br><a target="_blank" href="https://github.com/JusticeRage/Manalyze">https://github.com/JusticeRage/Manalyze</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>玩儿懂深度学习Part 2：Tensorflow 简明原理<br><a target="_blank" href="https://jizhi.im/blog/post/gpu-p2">https://jizhi.im/blog/post/gpu-p2</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Remote Code Execution on rubygems.org<br><a target="_blank" href="https://nosec.org/my/threats/1585">https://nosec.org/my/threats/1585</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>PaX/Grsecurity 代码分析<br><a target="_blank" href="https://github.com/hardenedlinux/grsecurity-101-tutorials/tree/master/grsec-code-analysis">https://github.com/hardenedlinux/grsecurity-101-tutorials/tree/master/grsec-code-analysis</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Outlook Home Page – Another Ruler Vector<br><a target="_blank" href="https://sensepost.com/blog/2017/outlook-home-page-another-ruler-vector/">https://sensepost.com/blog/2017/outlook-home-page-another-ruler-vector/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>American Fuzzy Lop实例-基础用法<br><a target="_blank" href="https://mp.weixin.qq.com/s/uBqz9UVcwlWQtpxlX1J2Gw">https://mp.weixin.qq.com/s/uBqz9UVcwlWQtpxlX1J2Gw</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>[译] XSLT attack<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2196.html">https://xianzhi.aliyun.com/forum/read/2196.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Disassembler and Runtime Analysis<br><a target="_blank" href="http://blog.talosintelligence.com/2017/10/disassembler-and-runtime-analysis.html">http://blog.talosintelligence.com/2017/10/disassembler-and-runtime-analysis.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Check it Out: Enforcement of Bounds Checks in Native JIT Code<br><a target="_blank" href="https://www.zerodayinitiative.com/blog/2017/10/5/check-it-out-enforcement-of-bounds-checks-in-native-jit-code">https://www.zerodayinitiative.com/blog/2017/10/5/check-it-out-enforcement-of-bounds-checks-in-native-jit-code</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/189">SecWiki周刊(第189期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
