<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第259期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第259期）</strong></h5>
<blockquote> 2019/02/11-2019/02/17</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[事件]&nbsp;&nbsp;</span>暗网出现大量疑似中国大陆航空客户数据售卖<br><a target="_blank" href="https://nosec.org/home/detail/2234.html">https://nosec.org/home/detail/2234.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>从RSA 2019创新沙盒“十强”看网络安全技术动向<br><a target="_blank" href="https://www.aqniu.com/industry/43694.html">https://www.aqniu.com/industry/43694.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>关于开展支付安全风险专项排查工作的通知-解读<br><a target="_blank" href="https://www.kiwisec.com/news/detail/5c613ef0c649181e28b81d9a.html">https://www.kiwisec.com/news/detail/5c613ef0c649181e28b81d9a.html</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>2018网安领域重磅报告全集 提取码: 8hai<br><a target="_blank" href="https://pan.baidu.com/share/init?surl=zMFI4l0DemcPBowgNY3tDA">https://pan.baidu.com/share/init?surl=zMFI4l0DemcPBowgNY3tDA</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Tide(潮汐)网络空间探测平台检索思路分享<br><a target="_blank" href="https://mp.weixin.qq.com/s/mSikxVFvrsGnl6Eflbx1GQ">https://mp.weixin.qq.com/s/mSikxVFvrsGnl6Eflbx1GQ</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>邮件钓鱼攻击与溯源<br><a target="_blank" href="https://www.freebuf.com/vuls/195090.html">https://www.freebuf.com/vuls/195090.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Chrome V8 中类型错误导致的越界读写漏洞与利用介绍<br><a target="_blank" href="https://github.com/vngkv123/aSiagaming/tree/master/Chrome-v8-906043">https://github.com/vngkv123/aSiagaming/tree/master/Chrome-v8-906043</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>Python数据挖掘与实战<br><a target="_blank" href="https://github.com/LinXueyuanStdio/PythonDataMining">https://github.com/LinXueyuanStdio/PythonDataMining</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>将军令：数据安全平台建设实践<br><a target="_blank" href="https://mp.weixin.qq.com/s/hk8I_93fyS5NWholu6v8_Q">https://mp.weixin.qq.com/s/hk8I_93fyS5NWholu6v8_Q</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>利用Google从公开的Trello面板中的获得大量敏感信息<br><a target="_blank" href="https://nosec.org/home/detail/2233.html">https://nosec.org/home/detail/2233.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>  CentOS Web Panel 0.9.8.763 存储型 XSS 漏洞披露<br><a target="_blank" href="https://www.exploit-db.com/exploits/46349">https://www.exploit-db.com/exploits/46349</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>DNSGrep——超快速DNS记录查询<br><a target="_blank" href="https://nosec.org/home/detail/2241.html">https://nosec.org/home/detail/2241.html</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第258期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/258">https://www.sec-wiki.com/weekly/258</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>我所了解的物联网设备渗透测试手段（硬件篇）<br><a target="_blank" href="https://www.freebuf.com/articles/wireless/195129.html">https://www.freebuf.com/articles/wireless/195129.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span> Ubuntu Linux dirty_sock 本地提权漏洞利用<br><a target="_blank" href="https://shenaniganslabs.io/2019/02/13/Dirty-Sock.html">https://shenaniganslabs.io/2019/02/13/Dirty-Sock.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>YouTube Studio 两处漏洞详情披露 <br><a target="_blank" href="https://www.linkedin.com/pulse/hacking-youtube-fun-profit-alexandru-coltuneac/">https://www.linkedin.com/pulse/hacking-youtube-fun-profit-alexandru-coltuneac/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>A collection of pentest and development tips<br><a target="_blank" href="https://github.com/3gstudent/Pentest-and-Development-Tips">https://github.com/3gstudent/Pentest-and-Development-Tips</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>反向RDP攻击：RDP客户端上的代码执行<br><a target="_blank" href="http://www.4hou.com/technology/16125.html">http://www.4hou.com/technology/16125.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>分析银行木马的恶意 LNK 快捷方式及由 ISESteroids 混淆的 Powershell Dropper<br><a target="_blank" href="https://maxkersten.nl/binary-analysis-course/malware-analysis/lnk-isesteroids-powershell-dropper/">https://maxkersten.nl/binary-analysis-course/malware-analysis/lnk-isesteroids-powershell-dropper/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Webiness Inventory 2.3 &#039;email&#039; 参数 SQL 注入漏洞披露<br><a target="_blank" href="https://www.exploit-db.com/exploits/46350">https://www.exploit-db.com/exploits/46350</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>如何在不知道MySQL列名的情况下注入出数据？<br><a target="_blank" href="https://nosec.org/home/detail/2245.html">https://nosec.org/home/detail/2245.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>从生产安全体系视角看数据安全<br><a target="_blank" href="https://mp.weixin.qq.com/s/OS4iCYjqG7fW2ti9NN9f2w">https://mp.weixin.qq.com/s/OS4iCYjqG7fW2ti9NN9f2w</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>xxe-lab: 各种语言版本的XXE漏洞Demo<br><a target="_blank" href="https://github.com/c0ny1/xxe-lab">https://github.com/c0ny1/xxe-lab</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2019-5736: Escape from Docker and Kubernetes containers to root on host<br><a target="_blank" href="https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html">https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>记一次微信数据库解密过程<br><a target="_blank" href="https://www.freebuf.com/articles/rookie/195107.html">https://www.freebuf.com/articles/rookie/195107.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Linux Reverse Engineering CTFs for Beginners<br><a target="_blank" href="https://osandamalith.com/2019/02/11/linux-reverse-engineering-ctfs-for-beginners/">https://osandamalith.com/2019/02/11/linux-reverse-engineering-ctfs-for-beginners/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>拒绝超长函数，从两个curl远程漏洞说起<br><a target="_blank" href="https://security.tencent.com/index.php/blog/msg/129">https://security.tencent.com/index.php/blog/msg/129</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Moloch 那些不得不说的事<br><a target="_blank" href="https://mp.weixin.qq.com/s/irYv_U1qew33vAf_9lCbFg">https://mp.weixin.qq.com/s/irYv_U1qew33vAf_9lCbFg</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Google Chrome skia::SkTDPQueue::insert 堆溢出漏洞披露(CVE-2018-18338)<br><a target="_blank" href="https://bugs.chromium.org/p/chromium/issues/detail?id=890576">https://bugs.chromium.org/p/chromium/issues/detail?id=890576</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>使用以太坊交易进行 C&amp;C 通信的 .NET 下载者分析<br><a target="_blank" href="https://medium.com/@quoscient/ethereum-threat-actors-part-1-dotnet-downloader-using-ethereum-transactions-for-c-c-updates-a6e244d6a402">https://medium.com/@quoscient/ethereum-threat-actors-part-1-dotnet-downloader-using-ethereum-transactions-for-c-c-updates-a6e244d6a402</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>2018年云上挖矿分析报告<br><a target="_blank" href="https://files.alicdn.com/tpsservice/a053a6ea4fdb8140d108f22d6e590063.pdf">https://files.alicdn.com/tpsservice/a053a6ea4fdb8140d108f22d6e590063.pdf</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>基于通用技术的企业安全运营架构<br><a target="_blank" href="https://mp.weixin.qq.com/s/WHhTZSf0JZK5KVH-o6NAoA">https://mp.weixin.qq.com/s/WHhTZSf0JZK5KVH-o6NAoA</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>HackIM 2019 Web记录<br><a target="_blank" href="https://www.anquanke.com/post/id/170708">https://www.anquanke.com/post/id/170708</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>从 0 开始学 Linux 内核之 android 内核栈溢出 ROP 利用<br><a target="_blank" href="https://paper.seebug.org/808/">https://paper.seebug.org/808/</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>坚持不懈：历时一年的Cissp备考之路<br><a target="_blank" href="https://www.freebuf.com/articles/others-articles/195497.html">https://www.freebuf.com/articles/others-articles/195497.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Exploit kits: winter 2019 review<br><a target="_blank" href="https://blog.malwarebytes.com/threat-analysis/2019/02/exploit-kits-winter-2019-review/">https://blog.malwarebytes.com/threat-analysis/2019/02/exploit-kits-winter-2019-review/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>[SSRF] Server Side Request Forgery in a private Program developers.example.com<br><a target="_blank" href="https://www.mohamedharon.com/2019/02/ssrf-server-side-request-forgery-in.html">https://www.mohamedharon.com/2019/02/ssrf-server-side-request-forgery-in.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Linux 内核漏洞利用开发教程<br><a target="_blank" href="https://0x00sec.org/t/point-of-no-c3-linux-kernel-exploitation-part-0/11585">https://0x00sec.org/t/point-of-no-c3-linux-kernel-exploitation-part-0/11585</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Tenda n301路由器固件分析 <br><a target="_blank" href="http://blog.topsec.com.cn/archives/3711">http://blog.topsec.com.cn/archives/3711</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>APT detection based on machine learning<br><a target="_blank" href="https://mp.weixin.qq.com/s/hKsItaIkwqdbmtvvhG6DYg">https://mp.weixin.qq.com/s/hKsItaIkwqdbmtvvhG6DYg</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Angr AEG：堆溢出之Exploit自动生成<br><a target="_blank" href="https://www.freebuf.com/vuls/194619.html">https://www.freebuf.com/vuls/194619.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>个性化推荐研究进展（可解释性、鲁棒性和公平性）<br><a target="_blank" href="https://mp.weixin.qq.com/s/zIvsOB6G4YOnWq669VCqyg">https://mp.weixin.qq.com/s/zIvsOB6G4YOnWq669VCqyg</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>GreyEnergy与Zebrocy活动存在交叉<br><a target="_blank" href="http://www.4hou.com/web/15939.html">http://www.4hou.com/web/15939.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>AlienVault-OTX及OTX Endpoint Security使用及介绍<br><a target="_blank" href="https://www.freebuf.com/news/195452.html">https://www.freebuf.com/news/195452.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>FakeNewsDeepLearning: Opening the Black-Box of Deep Learning Based Detector<br><a target="_blank" href="https://github.com/sophiabiancalatessa/FakeNewsDeepLearning">https://github.com/sophiabiancalatessa/FakeNewsDeepLearning</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>Byte Cup 2018国际机器学习竞赛夺冠记<br><a target="_blank" href="https://mp.weixin.qq.com/s/2Mh68gfbG_5gKnoICuRmeA">https://mp.weixin.qq.com/s/2Mh68gfbG_5gKnoICuRmeA</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Reverse Engineering a Philips TriMedia CPU based IP camera - Part 2<br><a target="_blank" href="https://blog.quarkslab.com/reverse-engineering-a-philips-trimedia-cpu-based-ip-camera-part-2.html">https://blog.quarkslab.com/reverse-engineering-a-philips-trimedia-cpu-based-ip-camera-part-2.html</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>IDN Visual Security Deep Thinking<br><a target="_blank" href="https://images.seebug.org/archive/idn-visual-security-deep-thinking.pdf">https://images.seebug.org/archive/idn-visual-security-deep-thinking.pdf</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>为Nginx加入一个使用深度学习的软WAF<br><a target="_blank" href="https://www.freebuf.com/articles/web/195563.html">https://www.freebuf.com/articles/web/195563.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span> Windows Access Tokens UIAccess 属性及绕过 UAC 的方法<br><a target="_blank" href="https://tyranidslair.blogspot.com/2019/02/accessing-access-tokens-for-uiaccess.html">https://tyranidslair.blogspot.com/2019/02/accessing-access-tokens-for-uiaccess.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Acrobat Reader DC 文本字段 &quot;comb&quot; 属性远程代码执行漏洞披露(CVE-2019-7039)<br><a target="_blank" href="https://www.talosintelligence.com/reports/TALOS-2018-0714">https://www.talosintelligence.com/reports/TALOS-2018-0714</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span> BlueHat IL 2019 PPT: 软件漏洞缓解机制的趋势、挑战及战略转变<br><a target="_blank" href="https://github.com/Microsoft/MSRC-Security-Research/blob/master/presentations/2019_02_BlueHatIL/2019_01%20-%20BlueHatIL%20-%20Trends%2C%20challenge%2C%20and%20shifts%20in%20software%20vulnerability%20mitigation.pdf">https://github.com/Microsoft/MSRC-Security-Research/blob/master/presentations/2019_02_BlueHatIL/2019_01%20-%20BlueHatIL%20-%20Trends%2C%20challenge%2C%20and%20shifts%20in%20software%20vulnerability%20mitigation.pdf</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>BattlEye anticheat: analysis and mitigation <br><a target="_blank" href="https://vmcall.github.io/reversal/2019/02/10/battleye-anticheat.html">https://vmcall.github.io/reversal/2019/02/10/battleye-anticheat.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>利用谷歌翻译对Facebook和谷歌用户进行钓鱼攻击<br><a target="_blank" href="https://nosec.org/home/detail/2246.html">https://nosec.org/home/detail/2246.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>How to Use Fuzzing in Security Research<br><a target="_blank" href="https://www.ixiacom.com/company/blog/how-use-fuzzing-security-research">https://www.ixiacom.com/company/blog/how-use-fuzzing-security-research</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Github Desktop RCEx2 for Mac latest Version<br><a target="_blank" href="https://www.thinkings.org/2019/02/14/github-desktop-mac-2rce.html">https://www.thinkings.org/2019/02/14/github-desktop-mac-2rce.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>macOS - keylogging through HID device interface<br><a target="_blank" href="https://theevilbit.blogspot.com/2019/02/macos-keylogging-through-hid-device.html">https://theevilbit.blogspot.com/2019/02/macos-keylogging-through-hid-device.html</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/259">SecWiki周刊(第259期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
