<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第182期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第182期）</strong></h5>
<blockquote> 2017/08/21-2017/08/27</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>2017年网络犯罪现状分析报告<br><a target="_blank" href="http://www.4hou.com/info/news/7268.html">http://www.4hou.com/info/news/7268.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>美军网络司令部升级&amp;美国情报体系大起底<br><a target="_blank" href="http://www.arkteam.net/?p=2663">http://www.arkteam.net/?p=2663</a></div><div class="single"><span id="tags">[人物]&nbsp;&nbsp;</span>王伟：五年前就已财务自由，但他决定再拼十年<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzIzMTAzNzUxMQ==&amp;mid=2652881480&amp;idx=1&amp;sn=92e0b5189cc92314c0b8680cb0a8ceb9&amp;scene=0#wechat_redirect">https://mp.weixin.qq.com/s?__biz=MzIzMTAzNzUxMQ==&amp;mid=2652881480&amp;idx=1&amp;sn=92e0b5189cc92314c0b8680cb0a8ceb9&amp;scene=0#wechat_redirect</a></div><div class="single"><span id="tags">[人物]&nbsp;&nbsp;</span>王红阳：低调也会发光<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MjM5NjkyMTk5Mg==&amp;mid=2650597864&amp;idx=1&amp;sn=60a58436e65283ce404eb837404c31a1&amp;scene=0#wechat_redirect">https://mp.weixin.qq.com/s?__biz=MjM5NjkyMTk5Mg==&amp;mid=2650597864&amp;idx=1&amp;sn=60a58436e65283ce404eb837404c31a1&amp;scene=0#wechat_redirect</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>概念研究：新型攻击可以修改已发送的电子邮件内容<br><a target="_blank" href="http://www.4hou.com/info/news/7379.html">http://www.4hou.com/info/news/7379.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>全景揭秘美网军司令部“升级记”<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzI4MTM5NDMwOQ==&amp;mid=2247487942&amp;idx=1&amp;sn=178e424144cdcf6cfd1ba99776d059eb&amp;scene=0#wechat_redirect">https://mp.weixin.qq.com/s?__biz=MzI4MTM5NDMwOQ==&amp;mid=2247487942&amp;idx=1&amp;sn=178e424144cdcf6cfd1ba99776d059eb&amp;scene=0#wechat_redirect</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>小密圈备份-json版本<br><a target="_blank" href="https://github.com/AndreaOm/xiaomiquan_bak">https://github.com/AndreaOm/xiaomiquan_bak</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Java RMI 反序列化漏洞检测工具的编写<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-20414-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-20414-1-1.html?from=sec</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>hitb sg2017<br><a target="_blank" href="https://gsec.hitb.org/materials/sg2017/">https://gsec.hitb.org/materials/sg2017/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>一些牛逼的博客推荐<br><a target="_blank" href="http://mp.weixin.qq.com/s/cxBbymkYBdvWMeyFxps3YA">http://mp.weixin.qq.com/s/cxBbymkYBdvWMeyFxps3YA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>逻辑漏洞小结<br><a target="_blank" href="https://tom0li.github.io/2017/07/17/%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E%E5%B0%8F%E7%BB%93/">https://tom0li.github.io/2017/07/17/%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E%E5%B0%8F%E7%BB%93/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>geetest_break: 极验验证码破解-源码+手册<br><a target="_blank" href="https://github.com/FanhuaandLuomu/geetest_break">https://github.com/FanhuaandLuomu/geetest_break</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>WiFi万能钥匙SRC安全沙龙 第一期 PPT<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzI1NTY2MTkwNw==&amp;mid=2247483798&amp;idx=1&amp;sn=8992a94f41f91945f201ebcd48a104c5&amp;scene=0#wechat_redirect">https://mp.weixin.qq.com/s?__biz=MzI1NTY2MTkwNw==&amp;mid=2247483798&amp;idx=1&amp;sn=8992a94f41f91945f201ebcd48a104c5&amp;scene=0#wechat_redirect</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>windows提权系列中篇<br><a target="_blank" href="http://mp.weixin.qq.com/s/ERXOLhWo0-lJbMV143I8hA">http://mp.weixin.qq.com/s/ERXOLhWo0-lJbMV143I8hA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>浏览器漏洞挖掘思路<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/28719766?utm_medium=social&amp;utm_source=weibo">https://zhuanlan.zhihu.com/p/28719766?utm_medium=social&amp;utm_source=weibo</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>aircrack &amp; hashcat 非字典高速破解目标无线密码<br><a target="_blank" href="https://klionsec.github.io/2015/04/14/aircrack-hascat/">https://klionsec.github.io/2015/04/14/aircrack-hascat/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>渗透测试学习笔记之案例三 <br><a target="_blank" href="http://avfisher.win/archives/766">http://avfisher.win/archives/766</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>ThinkPHP缓存函数设计缺陷导致GetShell漏洞复现<br><a target="_blank" href="https://drops.org.cn/index.php/archives/262/">https://drops.org.cn/index.php/archives/262/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>QQ邮箱反射型xss漏洞 <br><a target="_blank" href="http://pirogue.org/2017/08/25/qqmailxss/">http://pirogue.org/2017/08/25/qqmailxss/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>mimikatz 用法小记 [ 非交互抓取本地密码明文及hash ]<br><a target="_blank" href="https://klionsec.github.io/2016/07/23/mimikatz-one/">https://klionsec.github.io/2016/07/23/mimikatz-one/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>菜比的php一句话木马学习之路<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-26365-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-26365-1-1.html?from=sec</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2017-6327: Symantec Messaging Gateway &lt;= 10.6.3-2 unauthenticated root RCE<br><a target="_blank" href="http://seclists.org/fulldisclosure/2017/Aug/28">http://seclists.org/fulldisclosure/2017/Aug/28</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>浅谈分布式渗透框架的架构与设计<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/28781870">https://zhuanlan.zhihu.com/p/28781870</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>如何利用 socat 更方便地穿透目标内网<br><a target="_blank" href="https://klionsec.github.io/2017/07/31/socat-meterpreter/">https://klionsec.github.io/2017/07/31/socat-meterpreter/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Autosonda：自动化检测防火墙规则工具<br><a target="_blank" href="http://www.solidot.org/story?sid=53559">http://www.solidot.org/story?sid=53559</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>很多时候你需要的只是一个shell<br><a target="_blank" href="https://klionsec.github.io/2016/09/27/revese-shell/">https://klionsec.github.io/2016/09/27/revese-shell/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>携程安全自动化测试之路<br><a target="_blank" href="http://techshow.ctrip.com/archives/2315.html">http://techshow.ctrip.com/archives/2315.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>信息收集——僵尸扫描<br><a target="_blank" href="http://mp.weixin.qq.com/s/1i8BbkGsVcXPIQ9_TK30zw">http://mp.weixin.qq.com/s/1i8BbkGsVcXPIQ9_TK30zw</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>一次针对人肉者的反社工<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-26353-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-26353-1-1.html?from=sec</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>D-Link-Dir-850L-远程命令执行漏洞<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2010.html">https://xianzhi.aliyun.com/forum/read/2010.html</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Rendertron: Docker 版本的 Chrome headless<br><a target="_blank" href="https://github.com/GoogleChrome/rendertron">https://github.com/GoogleChrome/rendertron</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Http-Proxy-Scan: 利用censys.io快速爬取http代理<br><a target="_blank" href="https://github.com/t4mo/Http-Proxy-Scan">https://github.com/t4mo/Http-Proxy-Scan</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>ScrumWorks Pro Remote Code Execution<br><a target="_blank" href="https://blogs.securiteam.com/index.php/archives/3387">https://blogs.securiteam.com/index.php/archives/3387</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>蜜罐与内网安全从0到1（一）<br><a target="_blank" href="https://sosly.me/index.php/2017/08/23/goldenspark1/">https://sosly.me/index.php/2017/08/23/goldenspark1/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>db_security:数据库安全审计工具<br><a target="_blank" href="https://github.com/aWeiMiaoMiao/db_security">https://github.com/aWeiMiaoMiao/db_security</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>XSS Challenges闯关笔记<br><a target="_blank" href="http://www.cnblogs.com/r00tuser/p/7413526.html">http://www.cnblogs.com/r00tuser/p/7413526.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>利用 PhantomJS + Python 完成动态检测XSS<br><a target="_blank" href="http://blog.fr1day.me/2016/09/05/XSS_dynamic_detection_using_PhantomJs/">http://blog.fr1day.me/2016/09/05/XSS_dynamic_detection_using_PhantomJs/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Discuz X3.3补丁安全分析<br><a target="_blank" href="https://cert.360.cn/static/files/Discuz%20X3.3%E8%A1%A5%E4%B8%81%E5%AE%89%E5%85%A8%E5%88%86%E6%9E%90.pdf">https://cert.360.cn/static/files/Discuz%20X3.3%E8%A1%A5%E4%B8%81%E5%AE%89%E5%85%A8%E5%88%86%E6%9E%90.pdf</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>重新理解 http 协议<br><a target="_blank" href="https://klionsec.github.io/2017/06/18/http-basic/">https://klionsec.github.io/2017/06/18/http-basic/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>XSS Tricks:从self-XSS到上了你的百度 <br><a target="_blank" href="http://blog.fr1day.me/2016/09/07/XSS_Tricks_%E4%BB%8Eself-XSS%E5%88%B0%E4%B8%8A%E4%BA%86%E4%BD%A0%E7%9A%84%E7%99%BE%E5%BA%A6/">http://blog.fr1day.me/2016/09/07/XSS_Tricks_%E4%BB%8Eself-XSS%E5%88%B0%E4%B8%8A%E4%BA%86%E4%BD%A0%E7%9A%84%E7%99%BE%E5%BA%A6/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>机器学习在安全攻防的实践<br><a target="_blank" href="http://blog.nsfocus.net/machine-learning-techworld2017/">http://blog.nsfocus.net/machine-learning-techworld2017/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>互联网广告作弊十八般武艺(下)<br><a target="_blank" href="https://mp.weixin.qq.com/s/Ut0_yj2YoPMwEAokNDPv5g">https://mp.weixin.qq.com/s/Ut0_yj2YoPMwEAokNDPv5g</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>专栏：IDA反汇编/反编译静态分析iOS模拟器程序<br><a target="_blank" href="http://blog.csdn.net/column/details/ios-ida.html">http://blog.csdn.net/column/details/ios-ida.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>黑客的探路狗-ReconDog-信息收集工具<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-26242-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-26242-1-1.html?from=sec</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>3个步骤实现简单语言解释器（自制简易编程语言）<br><a target="_blank" href="http://www.4hou.com/technology/7328.html">http://www.4hou.com/technology/7328.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>通过Shellcode聚类识别定向攻击相关的恶意代码<br><a target="_blank" href="https://mp.weixin.qq.com/s/5RYOMEyOa5kR-yQ9So07sA">https://mp.weixin.qq.com/s/5RYOMEyOa5kR-yQ9So07sA</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>国际网络犯罪基础设施被曝光<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzI4ODA4MTcxMA==&amp;mid=2649550825&amp;idx=1&amp;sn=872c19bf16f23764962dec2b5c520ea4&amp;scene=0#wechat_redirect">https://mp.weixin.qq.com/s?__biz=MzI4ODA4MTcxMA==&amp;mid=2649550825&amp;idx=1&amp;sn=872c19bf16f23764962dec2b5c520ea4&amp;scene=0#wechat_redirect</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>站在Java的视角，深度分析防不胜防的小偷——“XSS”<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&amp;mid=100000340&amp;idx=1&amp;sn=6ca4ec15ef6338daf1d4a907351d7c08&amp;chksm=68fe9e5d5f89174b44f">http://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&amp;mid=100000340&amp;idx=1&amp;sn=6ca4ec15ef6338daf1d4a907351d7c08&amp;chksm=68fe9e5d5f89174b44f</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>SecWiki周刊（第181期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/181">https://www.sec-wiki.com/weekly/181</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>PhpcmsV9从反射型XSS到CSRF绕过到Getshell<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzI5MzY2MzM0Mw==&amp;mid=2247484057&amp;idx=1&amp;sn=f06345169823dfc359287bf33bda34e0">https://mp.weixin.qq.com/s?__biz=MzI5MzY2MzM0Mw==&amp;mid=2247484057&amp;idx=1&amp;sn=f06345169823dfc359287bf33bda34e0</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>深入理解 https 加密过程<br><a target="_blank" href="https://klionsec.github.io/2017/07/31/https-learn/">https://klionsec.github.io/2017/07/31/https-learn/</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>Awesome-Hacking: collection of awesome lists for hackers, pentesters &amp; security <br><a target="_blank" href="https://securityonline.info/awesome-hacking-collection-awesome-lists-hackers-pentesters-security-researchers/?utm_source=ReviveOldPost&amp;utm_medium=social&amp;utm_campaign=ReviveOldPost">https://securityonline.info/awesome-hacking-collection-awesome-lists-hackers-pentesters-security-researchers/?utm_source=ReviveOldPost&amp;utm_medium=social&amp;utm_campaign=ReviveOldPost</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>vulscan: Advanced vulnerability scanning with Nmap NSE<br><a target="_blank" href="https://github.com/scipag/vulscan">https://github.com/scipag/vulscan</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>浅谈Session机制及CSRF攻防<br><a target="_blank" href="http://mp.weixin.qq.com/s/aID_N9bgq91EM26qVSVBXw">http://mp.weixin.qq.com/s/aID_N9bgq91EM26qVSVBXw</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>ZzCMS前台任意脚本上传漏洞复现<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-25803-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-25803-1-1.html?from=sec</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>师夷长技——谈谈黑帽（Black Hat）2017大会的一些体会<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzI2NTA4MDE5NQ==&amp;mid=2651622427&amp;idx=1&amp;sn=8dd1d69ffa8a8ae9de43c79c564aae91&amp;scene=0#wechat_redirect">https://mp.weixin.qq.com/s?__biz=MzI2NTA4MDE5NQ==&amp;mid=2651622427&amp;idx=1&amp;sn=8dd1d69ffa8a8ae9de43c79c564aae91&amp;scene=0#wechat_redirect</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>DockerScan：Docker安全分析&amp;测试工具<br><a target="_blank" href="http://www.freebuf.com/column/145215.html">http://www.freebuf.com/column/145215.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>cve-2017-1708-exploits<br><a target="_blank" href="https://dl.packetstormsecurity.net/1708-exploits/msedgechakraint-overflow.txt">https://dl.packetstormsecurity.net/1708-exploits/msedgechakraint-overflow.txt</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>远控木马上演白利用偷天神技：揭秘假破解工具背后的盗刷暗流<br><a target="_blank" href="http://www.freebuf.com/articles/terminal/144590.html">http://www.freebuf.com/articles/terminal/144590.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>使用VENOM加密Payload绕过杀软<br><a target="_blank" href="https://www.linkedin.com/pulse/bypass-anti-virus-detection-encrypted-payloads-using-venom-james-ceh">https://www.linkedin.com/pulse/bypass-anti-virus-detection-encrypted-payloads-using-venom-james-ceh</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于大数据的银行反欺诈的分析报告<br><a target="_blank" href="https://mp.weixin.qq.com/s?src=3&amp;timestamp=1503321842&amp;ver=1&amp;signature=wY1ir8cJnYOrJaEuqSpwGPmtZl0LoKYSaXiV8UTZ3ceU60OTt0979sPIoueestR4ocFA-Nj-7AbAI5W2JmJqdFmxVY4HSfRTAnerzvUl76MUyCm0NV6qI6*qkF*2EGF9Om6pC*NZ*o5lM2hqPyX5RflhMCq99AGpd*Zj7Fv1VIY=">https://mp.weixin.qq.com/s?src=3&amp;timestamp=1503321842&amp;ver=1&amp;signature=wY1ir8cJnYOrJaEuqSpwGPmtZl0LoKYSaXiV8UTZ3ceU60OTt0979sPIoueestR4ocFA-Nj-7AbAI5W2JmJqdFmxVY4HSfRTAnerzvUl76MUyCm0NV6qI6*qkF*2EGF9Om6pC*NZ*o5lM2hqPyX5RflhMCq99AGpd*Zj7Fv1VIY=</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>无线渗透(上)--WPA加密<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&amp;mid=2247484868&amp;idx=1&amp;sn=c9f9547e9bdb4fb9699ab47f2e307d35&amp;chksm=ec1e35ecdb69bcfa42443929bac42d030adda02d1885222aa53d6b4c49b736736be97d11ae7e#rd">https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&amp;mid=2247484868&amp;idx=1&amp;sn=c9f9547e9bdb4fb9699ab47f2e307d35&amp;chksm=ec1e35ecdb69bcfa42443929bac42d030adda02d1885222aa53d6b4c49b736736be97d11ae7e#rd</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Triggering a DNS lookup using Java Deserialization<br><a target="_blank" href="https://blog.paranoidsoftware.com/triggering-a-dns-lookup-using-java-deserialization/">https://blog.paranoidsoftware.com/triggering-a-dns-lookup-using-java-deserialization/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Exploitee.rs Wiki：IOT Exploits Lists<br><a target="_blank" href="https://www.exploitee.rs/index.php/Main_Page">https://www.exploitee.rs/index.php/Main_Page</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>360加固保关键技术浅析<br><a target="_blank" href="http://www.freebuf.com/articles/terminal/145102.html">http://www.freebuf.com/articles/terminal/145102.html</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>不是修改数据的攻击就叫数据攻击<br><a target="_blank" href="http://blog.sina.com.cn/s/blog_85e506df0102x9fa.html">http://blog.sina.com.cn/s/blog_85e506df0102x9fa.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>基于Censys API 的命令行搜索脚本 <br><a target="_blank" href="https://github.com/gelim/censys">https://github.com/gelim/censys</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>用msf生成常用payload<br><a target="_blank" href="http://mp.weixin.qq.com/s/fnpwTblrEYWxGVyETIFu8A">http://mp.weixin.qq.com/s/fnpwTblrEYWxGVyETIFu8A</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>公有云厂商自建威胁情报系统<br><a target="_blank" href="http://www.4hou.com/technology/7355.html">http://www.4hou.com/technology/7355.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>HITB-2017-write-ups<br><a target="_blank" href="https://rawsec.ml/en/HITB-2017-write-ups/">https://rawsec.ml/en/HITB-2017-write-ups/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Spam and phishing in 2017 Q2  卡巴垃圾邮件与网络钓鱼分析报告<br><a target="_blank" href="https://securelist.com/spam-and-phishing-in-q2-2017/81537/">https://securelist.com/spam-and-phishing-in-q2-2017/81537/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>模糊测试之实例讲解<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-26336-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-26336-1-1.html?from=sec</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>OSS-Fuzz Google&#039;s continuous fuzzing service for open source software<br><a target="_blank" href="https://www.usenix.org/sites/default/files/conference/protected-files/usenixsecurity17_slides_serebryany.pdf">https://www.usenix.org/sites/default/files/conference/protected-files/usenixsecurity17_slides_serebryany.pdf</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>在内网中自动化寻找管理员的技术<br><a target="_blank" href="http://www.4hou.com/penetration/7332.html">http://www.4hou.com/penetration/7332.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Accidental Directory Stream<br><a target="_blank" href="https://tyranidslair.blogspot.co.uk/2017/08/accidental-directory-stream.html">https://tyranidslair.blogspot.co.uk/2017/08/accidental-directory-stream.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>SpiderFoot and SHODAN<br><a target="_blank" href="https://asciinema.org/a/127601">https://asciinema.org/a/127601</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Understanding the Mirai Botnet<br><a target="_blank" href="https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-antonakakis.pdf">https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-antonakakis.pdf</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>ipc弹shell 小记<br><a target="_blank" href="https://klionsec.github.io/2016/09/24/ipc-reverse-shell/">https://klionsec.github.io/2016/09/24/ipc-reverse-shell/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Tunnel Manager - From RCE to Docker Escape<br><a target="_blank" href="https://xianzhi.aliyun.com/forum/read/2009.html">https://xianzhi.aliyun.com/forum/read/2009.html</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/182">SecWiki周刊(第182期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
