<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第257期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第257期）</strong></h5>
<blockquote> 2019/01/28-2019/02/03</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>美国“国家网络情报体系”架构详解<br><a target="_blank" href="https://mp.weixin.qq.com/s/8rkXGZsAEqTWu5C8WPmbsA">https://mp.weixin.qq.com/s/8rkXGZsAEqTWu5C8WPmbsA</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Kunpeng：一款开源的跨语言漏洞POC框架<br><a target="_blank" href="https://opensec-cn.github.io/#/articles/1">https://opensec-cn.github.io/#/articles/1</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>easyProxy: 内网穿透代理服务器<br><a target="_blank" href="https://github.com/cnlh/easyProxy">https://github.com/cnlh/easyProxy</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>内网渗透知识基础及流程<br><a target="_blank" href="https://www.anquanke.com/post/id/170471">https://www.anquanke.com/post/id/170471</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>渗透利器Cobalt Strike - 第1篇 功能及使用<br><a target="_blank" href="https://xz.aliyun.com/t/3975">https://xz.aliyun.com/t/3975</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>2018年初整理的一些内网渗透TIPS<br><a target="_blank" href="https://github.com/Ridter/Intranet_Penetration_Tips">https://github.com/Ridter/Intranet_Penetration_Tips</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>二阶SQL注入漏洞<br><a target="_blank" href="https://mp.weixin.qq.com/s/6Bt6-MwK0RtvRdtbMHrCuQ">https://mp.weixin.qq.com/s/6Bt6-MwK0RtvRdtbMHrCuQ</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>安卓APP测试之HOOK大法-Xposed篇<br><a target="_blank" href="https://mp.weixin.qq.com/s/vnganjOQp5pUpc8hUswtww">https://mp.weixin.qq.com/s/vnganjOQp5pUpc8hUswtww</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>XXE on https://duckduckgo.com<br><a target="_blank" href="https://hackerone.com/reports/483774">https://hackerone.com/reports/483774</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>带你读神器之KunPeng源代码分析<br><a target="_blank" href="https://mp.weixin.qq.com/s/JLMaygM_MioszehGYpY2rw">https://mp.weixin.qq.com/s/JLMaygM_MioszehGYpY2rw</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Java Web安全-代码审计（一）<br><a target="_blank" href="https://mp.weixin.qq.com/s/o1-G9LaK6OFUWbJs3cfKBg">https://mp.weixin.qq.com/s/o1-G9LaK6OFUWbJs3cfKBg</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>如何利用2FA实现无密码控制他人帐户（影响Google, Microsoft, Instagram, Cloudflare）<br><a target="_blank" href="https://nosec.org/home/detail/2211.html">https://nosec.org/home/detail/2211.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>TrackRay: 溯光(Trackray)渗透测试框架 2.0<br><a target="_blank" href="https://github.com/iSafeBlue/TrackRay">https://github.com/iSafeBlue/TrackRay</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>北邮中学生网安杯2019 web解题记录<br><a target="_blank" href="https://www.anquanke.com/post/id/170299">https://www.anquanke.com/post/id/170299</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>过D盾webshell分享<br><a target="_blank" href="https://xz.aliyun.com/t/3959">https://xz.aliyun.com/t/3959</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>甲方威胁情报生存指南<br><a target="_blank" href="https://mp.weixin.qq.com/s/Rdw7_z4jn3Z1AWp-S2B2Vg">https://mp.weixin.qq.com/s/Rdw7_z4jn3Z1AWp-S2B2Vg</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>企业安全建设之HIDS<br><a target="_blank" href="https://www.freebuf.com/articles/es/194510.html">https://www.freebuf.com/articles/es/194510.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Telegram中文圈现状<br><a target="_blank" href="https://www.freebuf.com/articles/network/194822.html">https://www.freebuf.com/articles/network/194822.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>微信PC端技术研究(2)-CE+OD拿下语音<br><a target="_blank" href="https://mp.weixin.qq.com/s/h9d8aO79OvkpV9bknVT60A">https://mp.weixin.qq.com/s/h9d8aO79OvkpV9bknVT60A</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>如何利用开源威胁信息分析APT团伙<br><a target="_blank" href="https://mp.weixin.qq.com/s/HZJQD0jHj2ACkgtvGmtyPw">https://mp.weixin.qq.com/s/HZJQD0jHj2ACkgtvGmtyPw</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>使用Aggressor脚本雕饰Cobalt Strike<br><a target="_blank" href="https://mp.weixin.qq.com/s/CEI1XYkq2PZmYsP0DRU7jg">https://mp.weixin.qq.com/s/CEI1XYkq2PZmYsP0DRU7jg</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>安卓APP测试之HOOK大法<br><a target="_blank" href="https://mp.weixin.qq.com/s/3vNeeLm8Wy75tJJ7JvFsfA">https://mp.weixin.qq.com/s/3vNeeLm8Wy75tJJ7JvFsfA</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>winafl中基于插桩的覆盖率反馈原理 <br><a target="_blank" href="http://riusksk.me/2019/02/02/winafl%E4%B8%AD%E5%9F%BA%E4%BA%8E%E6%8F%92%E6%A1%A9%E7%9A%84%E8%A6%86%E7%9B%96%E7%8E%87%E5%8F%8D%E9%A6%88%E5%8E%9F%E7%90%86/">http://riusksk.me/2019/02/02/winafl%E4%B8%AD%E5%9F%BA%E4%BA%8E%E6%8F%92%E6%A1%A9%E7%9A%84%E8%A6%86%E7%9B%96%E7%8E%87%E5%8F%8D%E9%A6%88%E5%8E%9F%E7%90%86/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于网络特征学习的个性化推荐系统 04#<br><a target="_blank" href="https://mp.weixin.qq.com/s/MMUZHkGs9Ce0xtmLhHZ54A">https://mp.weixin.qq.com/s/MMUZHkGs9Ce0xtmLhHZ54A</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于Flink的超大规模在线实时反欺诈系统的建设与实践<br><a target="_blank" href="https://mp.weixin.qq.com/s/5opaOA9Rqk-3Sb-9bBRPJQ">https://mp.weixin.qq.com/s/5opaOA9Rqk-3Sb-9bBRPJQ</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Exchange邮箱安全代理系统开发<br><a target="_blank" href="http://www.xsec.io/2019/1/3/mail-sec-proxy-golang.html">http://www.xsec.io/2019/1/3/mail-sec-proxy-golang.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>malware-analysis/analyzing-darkhydrus-2-0<br><a target="_blank" href="https://0ffset.net/reverse-engineering/malware-analysis/analyzing-darkhydrus-2-0/">https://0ffset.net/reverse-engineering/malware-analysis/analyzing-darkhydrus-2-0/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>无符号Golang程序逆向方法解析<br><a target="_blank" href="https://www.anquanke.com/post/id/170332">https://www.anquanke.com/post/id/170332</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>安天移动恶意代码对抗的8年之路<br><a target="_blank" href="http://blog.avlsec.com/2019/02/5337/anti-virus/">http://blog.avlsec.com/2019/02/5337/anti-virus/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Java Web安全-代码审计（二）<br><a target="_blank" href="https://mp.weixin.qq.com/s/mlqjOlhefcsO9z51cw4S7w">https://mp.weixin.qq.com/s/mlqjOlhefcsO9z51cw4S7w</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>voucher_swap: Exploiting MIG reference counting in iOS 12<br><a target="_blank" href="https://googleprojectzero.blogspot.com/2019/01/voucherswap-exploiting-mig-reference.html">https://googleprojectzero.blogspot.com/2019/01/voucherswap-exploiting-mig-reference.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>2019年针对API安全的4点建议<br><a target="_blank" href="https://github.com/neal1991/articles-translator/blob/master/2019%E5%B9%B4%E9%92%88%E5%AF%B9API%E5%AE%89%E5%85%A8%E7%9A%844%E7%82%B9%E5%BB%BA%E8%AE%AE.md">https://github.com/neal1991/articles-translator/blob/master/2019%E5%B9%B4%E9%92%88%E5%AF%B9API%E5%AE%89%E5%85%A8%E7%9A%844%E7%82%B9%E5%BB%BA%E8%AE%AE.md</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>SEACMS 8.9版本-从变量覆盖到变量覆盖的SQL注入漏洞<br><a target="_blank" href="https://nosec.org/home/detail/2222.html">https://nosec.org/home/detail/2222.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Exploiting SystemD JournalD Part 1<br><a target="_blank" href="https://capsule8.com/blog/exploiting-systemd-journald-part-1/">https://capsule8.com/blog/exploiting-systemd-journald-part-1/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>lavarel框架配置不当导致敏感数据泄露<br><a target="_blank" href="https://nosec.org/home/detail/2217.html">https://nosec.org/home/detail/2217.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Java Web安全-代码审计（三）<br><a target="_blank" href="https://mp.weixin.qq.com/s/sMLVaYtlBPaHuiU-Sboopg">https://mp.weixin.qq.com/s/sMLVaYtlBPaHuiU-Sboopg</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>how-to-argue-like-cobalt-strike<br><a target="_blank" href="https://blog.xpnsec.com/how-to-argue-like-cobalt-strike/">https://blog.xpnsec.com/how-to-argue-like-cobalt-strike/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Windows环境中使用Responder获取NTLMv2哈希并利用<br><a target="_blank" href="https://www.freebuf.com/articles/system/194549.html">https://www.freebuf.com/articles/system/194549.html</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>UAC Bypass via SystemPropertiesAdvanced.exe and DLL Hijacking<br><a target="_blank" href="https://egre55.github.io/system-properties-uac-bypass/">https://egre55.github.io/system-properties-uac-bypass/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>物联网威胁情报研究 <br><a target="_blank" href="http://blog.nsfocus.net/research-threat-intelligence-iot/">http://blog.nsfocus.net/research-threat-intelligence-iot/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>sofacys-zepakab-downloader-spotted-in-the-wild<br><a target="_blank" href="https://blog.yoroi.company/research/sofacys-zepakab-downloader-spotted-in-the-wild/">https://blog.yoroi.company/research/sofacys-zepakab-downloader-spotted-in-the-wild/</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>windows-privilege-abuse-auditing-detection-and-defense<br><a target="_blank" href="https://medium.com/palantir/windows-privilege-abuse-auditing-detection-and-defense-3078a403d74e">https://medium.com/palantir/windows-privilege-abuse-auditing-detection-and-defense-3078a403d74e</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>JavaScript侧信道时间测量<br><a target="_blank" href="https://www.anquanke.com/post/id/170268">https://www.anquanke.com/post/id/170268</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>MacOS/iOS CVE-2019-6231 漏洞深入分析<br><a target="_blank" href="https://www.anquanke.com/post/id/170358">https://www.anquanke.com/post/id/170358</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Abusing S4U2Self: Another Sneaky Active Directory Persistence<br><a target="_blank" href="https://alsid.com/company/news/abusing-s4u2self-another-sneaky-active-directory-persistence">https://alsid.com/company/news/abusing-s4u2self-another-sneaky-active-directory-persistence</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>2018年度区块链安全报告<br><a target="_blank" href="https://share.weiyun.com/56Pytbu">https://share.weiyun.com/56Pytbu</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>JWT Attack Walk-Through<br><a target="_blank" href="https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/january/jwt-attack-walk-through/">https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/january/jwt-attack-walk-through/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>用于异常检测的几种图划分算法<br><a target="_blank" href="https://mp.weixin.qq.com/s/9CQn4qFd88MRU56xBvY_Pw">https://mp.weixin.qq.com/s/9CQn4qFd88MRU56xBvY_Pw</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>2018年活跃DDoS攻击团伙分析报告<br><a target="_blank" href="https://mp.weixin.qq.com/s/5F9CauALuwvAys5mwPHwdQ">https://mp.weixin.qq.com/s/5F9CauALuwvAys5mwPHwdQ</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>详解GDPR向Google亮剑缘由<br><a target="_blank" href="https://mp.weixin.qq.com/s/5sGSSpkrJhgvttKxP-udJA">https://mp.weixin.qq.com/s/5sGSSpkrJhgvttKxP-udJA</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Complex Drupal POP Chain<br><a target="_blank" href="https://blog.ripstech.com/2019/complex-drupal-pop-chain/">https://blog.ripstech.com/2019/complex-drupal-pop-chain/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Defeating Flask’s Session Management<br><a target="_blank" href="https://blog.paradoxis.nl/defeating-flasks-session-management-65706ba9d3ce">https://blog.paradoxis.nl/defeating-flasks-session-management-65706ba9d3ce</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Reverse Engineering a Philips TriMedia CPU based IP camera<br><a target="_blank" href="https://blog.quarkslab.com/reverse-engineering-a-philips-trimedia-cpu-based-ip-camera-part-1.html">https://blog.quarkslab.com/reverse-engineering-a-philips-trimedia-cpu-based-ip-camera-part-1.html</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第256期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/256">https://www.sec-wiki.com/weekly/256</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/257">SecWiki周刊(第257期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
