<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第184期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第184期）</strong></h5>
<blockquote> 2017/09/04-2017/09/10</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>S2-052 Remote Code Execution attack when using the Struts REST plugin<br><a target="_blank" href="https://cwiki.apache.org/confluence/display/WW/S2-052">https://cwiki.apache.org/confluence/display/WW/S2-052</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>恶意软件分析工具库<br><a target="_blank" href="https://www.520waf.com/2017/09/most-important-considerations-with-malware-analysis-cheats-and-tools-list/">https://www.520waf.com/2017/09/most-important-considerations-with-malware-analysis-cheats-and-tools-list/</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>CARTA：Gartner的持续自适应风险与信任评估战略方法简介<br><a target="_blank" href="http://yepeng.blog.51cto.com/3101105/1962560">http://yepeng.blog.51cto.com/3101105/1962560</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>瑞典数据通信公司Westermo多个工业级路由器存在高危漏洞<br><a target="_blank" href="https://www.easyaq.com/news/1238028561.shtml">https://www.easyaq.com/news/1238028561.shtml</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>微软内核漏洞致反病毒软件形同虚设，所有Windows版本受影响<br><a target="_blank" href="https://www.easyaq.com/news/1589499437.shtml">https://www.easyaq.com/news/1589499437.shtml</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>维基解密泄露第23批CIA文件：“盔甲护身”（Protego）导弹控制系统<br><a target="_blank" href="https://www.easyaq.com/news/1366007751.shtml">https://www.easyaq.com/news/1366007751.shtml</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>影子经纪人每月披露两批NSA网络武器，要价近400万美元<br><a target="_blank" href="https://www.easyaq.com/news/1718673897.shtml">https://www.easyaq.com/news/1718673897.shtml</a></div><div class="single"><span id="tags">[人物]&nbsp;&nbsp;</span>[人物志] KDD Cup 2017双料冠军燕鹏<br><a target="_blank" href="https://mp.weixin.qq.com/s/-wAr-tWqvS2NLfwxKcnEQQ">https://mp.weixin.qq.com/s/-wAr-tWqvS2NLfwxKcnEQQ</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>美国征信巨头Equifax遭黑客入侵，1.43亿公民身份数据泄漏<br><a target="_blank" href="http://www.4hou.com/info/news/7594.html">http://www.4hou.com/info/news/7594.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>新三板网络安全公司2017年上半年业绩快报<br><a target="_blank" href="https://mp.weixin.qq.com/s/gfiE46nj_74KInzmVNACrQ">https://mp.weixin.qq.com/s/gfiE46nj_74KInzmVNACrQ</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>国信用机构Equifax遭黑客入侵泄露1.43亿用户信息<br><a target="_blank" href="https://nosec.org/my/threats/1551">https://nosec.org/my/threats/1551</a></div><div class="single"><span id="tags">[爆库]&nbsp;&nbsp;</span>Taringa：阿根廷“微博” 2800万用户数据遭泄<br><a target="_blank" href="https://mp.weixin.qq.com/s/nTpDikcWX3HHYqoZuicKQw">https://mp.weixin.qq.com/s/nTpDikcWX3HHYqoZuicKQw</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>俄罗斯曾在Facebook投入10万美元的政治广告影响2016美国大选<br><a target="_blank" href="https://www.easyaq.com/news/62412640.shtml">https://www.easyaq.com/news/62412640.shtml</a></div><div class="single"><span id="tags">[爆库]&nbsp;&nbsp;</span>Equifax hack hits credit histories of up to 143 million Americans<br><a target="_blank" href="https://www.washingtonpost.com/business/technology/equifax-hack-hits-credit-histories-of-up-to-143-million-americans/2017/09/07/a4ae6f82-941a-11e7-b9bc-b2f7903bab0d_story.html">https://www.washingtonpost.com/business/technology/equifax-hack-hits-credit-histories-of-up-to-143-million-americans/2017/09/07/a4ae6f82-941a-11e7-b9bc-b2f7903bab0d_story.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>渗透美国和欧洲电网后，俄罗斯黑客组织“蜻蜓”埋伏以待<br><a target="_blank" href="https://www.easyaq.com/news/1182894136.shtml">https://www.easyaq.com/news/1182894136.shtml</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>多个主流安卓手机芯片厂商的Bootloader存在漏洞<br><a target="_blank" href="https://www.easyaq.com/news/1036467692.shtml">https://www.easyaq.com/news/1036467692.shtml</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>安全创业公司靠什么产品赢得市场<br><a target="_blank" href="https://mp.weixin.qq.com/s/Y2TO8FcY8cXyyrh-nlgxVA">https://mp.weixin.qq.com/s/Y2TO8FcY8cXyyrh-nlgxVA</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>美国第二轮GridEx-IV网络战演习：重点关注基础设施保护，首次纳入金融与电信行业<br><a target="_blank" href="https://www.easyaq.com/news/278224224.shtml">https://www.easyaq.com/news/278224224.shtml</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>2.6万台MongoDB数据库被劫持 用户惨遭调戏<br><a target="_blank" href="https://www.easyaq.com/news/405021770.shtml">https://www.easyaq.com/news/405021770.shtml</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>S2-052复现过程（附POC利用） heatlevel<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-26789-1-1.html">https://bbs.ichunqiu.com/thread-26789-1-1.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>s2-053漏洞重现(附exp)<br><a target="_blank" href="http://www.lsablog.com/network_security/penetration/s2-053-bug-repeat/">http://www.lsablog.com/network_security/penetration/s2-053-bug-repeat/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>S2-052 Python检测脚本<br><a target="_blank" href="https://github.com/ysrc/xunfeng/commit/f9ae69fe176c8bca622831e126cd94414ebe26f6?from=timeline&amp;isappinstalled=0">https://github.com/ysrc/xunfeng/commit/f9ae69fe176c8bca622831e126cd94414ebe26f6?from=timeline&amp;isappinstalled=0</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>KCon 2017 PPT 下载<br><a target="_blank" href="https://github.com/knownsec/KCon/tree/master/2017">https://github.com/knownsec/KCon/tree/master/2017</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>nmap使用指南（终极版）<br><a target="_blank" href="http://www.myh0st.cn/index.php/archives/39/">http://www.myh0st.cn/index.php/archives/39/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>渗透测试学习笔记之案例四 <br><a target="_blank" href="http://avfisher.win/archives/784">http://avfisher.win/archives/784</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>cobaltstrike3.8 破解版<br><a target="_blank" href="https://evi1cg.me/archives/CobaltStrike_3_8_Cracked-html.html">https://evi1cg.me/archives/CobaltStrike_3_8_Cracked-html.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Chrome 插件 User-Agent Switcher 原来是个隐藏木马<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&amp;mid=2247484068&amp;idx=1&amp;sn=19400d4a33fd071706345197bdab38c9&amp;chksm=e8fe9eaddf8917bba905f4da7b15dc6b227c1421e56d48b8fec06d077284adaa920e5d036d0f#rd">https://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&amp;mid=2247484068&amp;idx=1&amp;sn=19400d4a33fd071706345197bdab38c9&amp;chksm=e8fe9eaddf8917bba905f4da7b15dc6b227c1421e56d48b8fec06d077284adaa920e5d036d0f#rd</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android脱壳圣战---360加固宝加固分析和脱壳教程解析<br><a target="_blank" href="https://mp.weixin.qq.com/s/xSe2Zrv9Ev4qRaN99YmnRA">https://mp.weixin.qq.com/s/xSe2Zrv9Ev4qRaN99YmnRA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Struts2 S2-052远程代码执行漏洞分析 <br><a target="_blank" href="http://blog.topsec.com.cn/ad_lab/struts2-s2-052%e8%bf%9c%e7%a8%8b%e4%bb%a3%e7%a0%81%e6%89%a7%e8%a1%8c%e6%bc%8f%e6%b4%9e%e5%88%86%e6%9e%90/">http://blog.topsec.com.cn/ad_lab/struts2-s2-052%e8%bf%9c%e7%a8%8b%e4%bb%a3%e7%a0%81%e6%89%a7%e8%a1%8c%e6%bc%8f%e6%b4%9e%e5%88%86%e6%9e%90/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Mysql注入导图-学习篇<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&amp;mid=2247484937&amp;idx=1&amp;sn=2a0eed8c585302951ee07a4e3ee2cae1&amp;chksm=ec1e3621db69bf37f538b683a7f382f683a12751aae681d5262bad66ec3f49dec0263dc9ca38#rd">https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&amp;mid=2247484937&amp;idx=1&amp;sn=2a0eed8c585302951ee07a4e3ee2cae1&amp;chksm=ec1e3621db69bf37f538b683a7f382f683a12751aae681d5262bad66ec3f49dec0263dc9ca38#rd</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>分析一个电信劫持跳转下载情色APP的案例<br><a target="_blank" href="https://www.92ez.com/?action=show&amp;id=23453">https://www.92ez.com/?action=show&amp;id=23453</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>无弹窗渗透测试实验 <br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2061.html">https://xianzhi.aliyun.com/forum/read/2061.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>web测试方法工具篇<br><a target="_blank" href="http://mp.weixin.qq.com/s/iBlBbPjVne_MON6RU2O1yg">http://mp.weixin.qq.com/s/iBlBbPjVne_MON6RU2O1yg</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Hunting Pastebin with PasteHunter <br><a target="_blank" href="https://techanarchy.net/2017/09/hunting-pastebin-with-pastehunter/">https://techanarchy.net/2017/09/hunting-pastebin-with-pastehunter/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>基于Termux打造Android手机渗透神器（2017-7-22更新）<br><a target="_blank" href="http://blackwolfsec.cc/2016/12/10/termux/">http://blackwolfsec.cc/2016/12/10/termux/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>利用Python实现DGA域名检测<br><a target="_blank" href="http://www.freebuf.com/articles/web/145981.html">http://www.freebuf.com/articles/web/145981.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>利用sklearn检测webshell<br><a target="_blank" href="http://www.polaris-lab.com/index.php/archives/372/">http://www.polaris-lab.com/index.php/archives/372/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>如何从日志文件溯源出攻击手法？<br><a target="_blank" href="http://www.4hou.com/penetration/7571.html">http://www.4hou.com/penetration/7571.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>cmsPoc: CMS渗透测试框架<br><a target="_blank" href="https://github.com/CHYbeta/cmsPoc">https://github.com/CHYbeta/cmsPoc</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>影子经纪人 9月 Tools<br><a target="_blank" href="https://mega.nz/#F!MzwyjSLQ!RNkf1nDdR1lRQkzTVqB5qA!8jgBnC7S">https://mega.nz/#F!MzwyjSLQ!RNkf1nDdR1lRQkzTVqB5qA!8jgBnC7S</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>记一次apk检测 <br><a target="_blank" href="http://5alt.me/2017/09/%E8%AE%B0%E4%B8%80%E6%AC%A1apk%E6%A3%80%E6%B5%8B/">http://5alt.me/2017/09/%E8%AE%B0%E4%B8%80%E6%AC%A1apk%E6%A3%80%E6%B5%8B/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>ThinkerPHP后台远程任意代码执行漏洞<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2084.html">https://xianzhi.aliyun.com/forum/read/2084.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>谈谈端口探测的经验与原理<br><a target="_blank" href="http://www.freebuf.com/articles/network/146087.html">http://www.freebuf.com/articles/network/146087.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>malwareinfosec/EKFiddle: A framework to study Exploit Kits<br><a target="_blank" href="https://github.com/malwareinfosec/EKFiddle">https://github.com/malwareinfosec/EKFiddle</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>一起来学习用JNI加固你的Java代码，文末有彩蛋哦<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&amp;mid=100000391&amp;idx=1&amp;sn=d7a5776d049484c6077e7d05695ce8eb&amp;chksm=68fe9e8e5f8917980a30c180cd5693745ee93dc91a9bb8895e3a59a764a470caa1e601ed5901#rd">http://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&amp;mid=100000391&amp;idx=1&amp;sn=d7a5776d049484c6077e7d05695ce8eb&amp;chksm=68fe9e8e5f8917980a30c180cd5693745ee93dc91a9bb8895e3a59a764a470caa1e601ed5901#rd</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>看我如何打造Android渗透测试环境<br><a target="_blank" href="http://www.4hou.com/technology/7573.html">http://www.4hou.com/technology/7573.html</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>slate: Beautiful static documentation for your API 项目文档编写助手<br><a target="_blank" href="https://github.com/lord/slate">https://github.com/lord/slate</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Struts2远程代码执行漏洞CVE-2017-9805 Struts2.5至2.5.12受影响<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-26778-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-26778-1-1.html?from=sec</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>D-Link 路由器信息泄露和远程命令执行漏洞分析及全球数据分析报告<br><a target="_blank" href="https://paper.seebug.org/385/">https://paper.seebug.org/385/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>TSpider: Yet Another Web Spider  动态Web爬虫<br><a target="_blank" href="https://github.com/Twi1ight/TSpider">https://github.com/Twi1ight/TSpider</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Pwned In Translation From Subtitles to RCE<br><a target="_blank" href="https://hitcon.org/2017/CMT/slide-files/d2_s2_r1.pdf">https://hitcon.org/2017/CMT/slide-files/d2_s2_r1.pdf</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>passmaker: 可以自定义规则的密码字典生成器<br><a target="_blank" href="https://github.com/bit4woo/passmaker">https://github.com/bit4woo/passmaker</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Using Alternate Data Streams to Bypass User Account Controls<br><a target="_blank" href="https://www.redcanary.com/blog/using-alternate-data-streams-bypass-user-account-controls/">https://www.redcanary.com/blog/using-alternate-data-streams-bypass-user-account-controls/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>数字签名攻击报告：正在摧毁软件身份“信用体系”的安全危机<br><a target="_blank" href="http://www.freebuf.com/articles/network/146274.html">http://www.freebuf.com/articles/network/146274.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android启动过程的分析<br><a target="_blank" href="http://www.4hou.com/mobile/7373.html">http://www.4hou.com/mobile/7373.html</a></div><div class="single"><span id="tags">[书籍]&nbsp;&nbsp;</span>[书籍] Deep Learning with Python <br><a target="_blank" href="https://github.com/fchollet/deep-learning-with-python-notebooks">https://github.com/fchollet/deep-learning-with-python-notebooks</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>XSS Without Dots<br><a target="_blank" href="https://markitzeroday.com/character-restrictions/xss/2017/07/26/xss-without-dots.html">https://markitzeroday.com/character-restrictions/xss/2017/07/26/xss-without-dots.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>jgamblin/nmaptable: Transform NMap Scans to an D3.js HTML Table<br><a target="_blank" href="https://github.com/jgamblin/nmaptable/">https://github.com/jgamblin/nmaptable/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>基于SDN的蜜网技术概述<br><a target="_blank" href="https://mp.weixin.qq.com/s/qvuVACmGekyyPYORRITVfQ">https://mp.weixin.qq.com/s/qvuVACmGekyyPYORRITVfQ</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>实战演练：看我是如何将LFI变为RFI的<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2060.html">https://xianzhi.aliyun.com/forum/read/2060.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Rare ASP.NET request validation bypass using request encoding<br><a target="_blank" href="https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/rare-asp.net-request-validation-bypass-using-request-encoding/">https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/rare-asp.net-request-validation-bypass-using-request-encoding/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Abusing JavaScript frameworks to bypass XSS mitigations<br><a target="_blank" href="http://blog.portswigger.net/2017/09/abusing-javascript-frameworks-to-bypass.html">http://blog.portswigger.net/2017/09/abusing-javascript-frameworks-to-bypass.html</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第183期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/183">https://www.sec-wiki.com/weekly/183</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>A Yara rule generator for finding related samples and hunting<br><a target="_blank" href="https://github.com/AlienVault-OTX/yabin">https://github.com/AlienVault-OTX/yabin</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Uber Bug Bounty: Gaining Access To An Internal Chat System<br><a target="_blank" href="http://blog.mish.re/index.php/2017/09/06/uber-bug-bounty-gaining-access-to-an-internal-chat-system/">http://blog.mish.re/index.php/2017/09/06/uber-bug-bounty-gaining-access-to-an-internal-chat-system/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>frida-scripts: A collection of Frida.re scripts reverse Apps<br><a target="_blank" href="https://github.com/0xdea/frida-scripts/">https://github.com/0xdea/frida-scripts/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>URL Spoofing with Modern Browser<br><a target="_blank" href="https://www.math1as.com/index.php/archives/505/">https://www.math1as.com/index.php/archives/505/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Modern Web Application Penetration Testing , Hash Length Extension Attacks<br><a target="_blank" href="https://isc.sans.edu/forums/diary/Modern+Web+Application+Penetration+Testing+Hash+Length+Extension+Attacks/22792/">https://isc.sans.edu/forums/diary/Modern+Web+Application+Penetration+Testing+Hash+Length+Extension+Attacks/22792/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Detecting Chrome Headless<br><a target="_blank" href="https://antoinevastel.github.io/bot%20detection/2017/08/05/detect-chrome-headless.html">https://antoinevastel.github.io/bot%20detection/2017/08/05/detect-chrome-headless.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Firmware exploitation with JEB part 3: Reversing the SmartRG’s sr505n<br><a target="_blank" href="https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-3-reversing-the-smartrgs-sr505n/">https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-3-reversing-the-smartrgs-sr505n/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Windows10子系统Bash环境安装<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-26614-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-26614-1-1.html?from=sec</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>蜜罐与内网安全从0到1（二）<br><a target="_blank" href="https://sosly.me/index.php/2017/09/05/jymiguan2/">https://sosly.me/index.php/2017/09/05/jymiguan2/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>云安全规划策略<br><a target="_blank" href="http://www.freebuf.com/column/146950.html">http://www.freebuf.com/column/146950.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>asp代码审计<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-26815-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-26815-1-1.html?from=sec</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>禁用Wi-Fi是否可以阻止Android手机发送无线帧？<br><a target="_blank" href="http://www.4hou.com/wireless/7545.html">http://www.4hou.com/wireless/7545.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>从WordPress SQLi谈PHP格式化字符串问题<br><a target="_blank" href="https://paper.seebug.org/386/">https://paper.seebug.org/386/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration<br><a target="_blank" href="https://github.com/SafeBreach-Labs/pacdoor">https://github.com/SafeBreach-Labs/pacdoor</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Kronos银行木马的前世今生<br><a target="_blank" href="http://www.4hou.com/technology/7527.html">http://www.4hou.com/technology/7527.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>fastjson 调试利用记录 <br><a target="_blank" href="http://5alt.me/2017/09/fastjson%E8%B0%83%E8%AF%95%E5%88%A9%E7%94%A8%E8%AE%B0%E5%BD%95/">http://5alt.me/2017/09/fastjson%E8%B0%83%E8%AF%95%E5%88%A9%E7%94%A8%E8%AE%B0%E5%BD%95/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Firmware exploitation with JEB part 2<br><a target="_blank" href="https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-2/">https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-2/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>ShellCode执行代码iptables -P INPUT ACCEPT<br><a target="_blank" href="http://www.91ri.org/17267.html">http://www.91ri.org/17267.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Exploiting Python Deserialization Vulnerabilities<br><a target="_blank" href="https://crowdshield.com/blog.php?name=exploiting-python-deserialization-vulnerabilities">https://crowdshield.com/blog.php?name=exploiting-python-deserialization-vulnerabilities</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Beyond Domain Admins – Domain Controller &amp; AD Administration<br><a target="_blank" href="http://link.crwd.fr/2bsU#https://adsecurity.org/?p=3700">http://link.crwd.fr/2bsU#https://adsecurity.org/?p=3700</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>联网生产类系统安全巡检报告 （电力行业）<br><a target="_blank" href="https://mp.weixin.qq.com/s/jdqB8I6T33x3LlKpUXljJw">https://mp.weixin.qq.com/s/jdqB8I6T33x3LlKpUXljJw</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>DomainFrontingLists: 使用不同 CDN 服务的网站列表样例<br><a target="_blank" href="https://github.com/vysec/DomainFrontingLists">https://github.com/vysec/DomainFrontingLists</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Malware source code database<br><a target="_blank" href="https://github.com/mwsrc">https://github.com/mwsrc</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>BROADPWN: Remote control of ANDROID and IOS via BUG in BROADCOM&#039;s WI-FI<br><a target="_blank" href="https://blog.exodusintel.com/2017/07/26/broadpwn/">https://blog.exodusintel.com/2017/07/26/broadpwn/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>研究人员找到禁用Intel ME组件的方法（乡村故事版）<br><a target="_blank" href="http://www.freebuf.com/news/146032.html">http://www.freebuf.com/news/146032.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Hunting AdwindRAT with SSL Heuristics<br><a target="_blank" href="http://www.netresec.com/?page=Blog&amp;month=2017-09&amp;post=Hunting-AdwindRAT-with-SSL-Heuristics">http://www.netresec.com/?page=Blog&amp;month=2017-09&amp;post=Hunting-AdwindRAT-with-SSL-Heuristics</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Who Is Marcus Hutchins?<br><a target="_blank" href="https://krebsonsecurity.com/2017/09/who-is-marcus-hutchins/">https://krebsonsecurity.com/2017/09/who-is-marcus-hutchins/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Automated Red Team Infrastructure Deployment with Terraform - Part 1<br><a target="_blank" href="https://rastamouse.me/2017/08/automated-red-team-infrastructure-deployment-with-terraform---part-1/">https://rastamouse.me/2017/08/automated-red-team-infrastructure-deployment-with-terraform---part-1/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Firmware exploitation with JEB part 2<br><a target="_blank" href="https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-1/">https://www.pnfsoftware.com/blog/firmware-exploitation-with-jeb-part-1/</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/184">SecWiki周刊(第184期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
