<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第321期)</title>
	<link rel="stylesheet" type="text/css" href="/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="/css/people.css" />
    <link rel="shortcut icon" href="/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="https://libs.baidu.com/jquery/1.8.3/jquery.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第321期）</strong></h5>
<blockquote> 2020/04/20-2020/04/26</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>通达OA 任意用户登录漏洞（匿名RCE）分析<br><a target="_blank" href="https://www.zrools.org/2020/04/23/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1-%E9%80%9A%E8%BE%BEOA-%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E%EF%BC%88%E5%8C%BF%E5%90%8DRCE%EF%BC%89%E5%88%86%E6%9E%90/">https://www.zrools.org/2020/04/23/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1-%E9%80%9A%E8%BE%BEOA-%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B7%E7%99%BB%E5%BD%95%E6%BC%8F%E6%B4%9E%EF%BC%88%E5%8C%BF%E5%90%8DRCE%EF%BC%89%E5%88%86%E6%9E%90/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>内网横向渗透攻击流程<br><a target="_blank" href="https://forum.90sec.com/t/topic/949">https://forum.90sec.com/t/topic/949</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Windows域环境及域渗透<br><a target="_blank" href="https://mp.weixin.qq.com/s/gvDzKFIsdhtkOKRANscEJA">https://mp.weixin.qq.com/s/gvDzKFIsdhtkOKRANscEJA</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>关于防守方封IP的一些想法<br><a target="_blank" href="https://mp.weixin.qq.com/s/pgaTlc8LoUvH7RtgeKCBrg">https://mp.weixin.qq.com/s/pgaTlc8LoUvH7RtgeKCBrg</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Vulfocus: 漏洞docker镜像集成平台<br><a target="_blank" href="https://mp.weixin.qq.com/s/ArDDWYuc1A64qUzeyPRzZA">https://mp.weixin.qq.com/s/ArDDWYuc1A64qUzeyPRzZA</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>一次有趣的钓鱼测试<br><a target="_blank" href="https://mp.weixin.qq.com/s/JZs26mle8diovfPpAggP7A">https://mp.weixin.qq.com/s/JZs26mle8diovfPpAggP7A</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>waf-bypass学习<br><a target="_blank" href="https://xz.aliyun.com/t/7578">https://xz.aliyun.com/t/7578</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>安全架构设计与评审<br><a target="_blank" href="https://mp.weixin.qq.com/s/PXCr_QrV7iLUz44750JXcA">https://mp.weixin.qq.com/s/PXCr_QrV7iLUz44750JXcA</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>2020 虎符网络安全竞赛 web Writeup<br><a target="_blank" href="https://www.anquanke.com/post/id/203417">https://www.anquanke.com/post/id/203417</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Pulsar：一款功能强大的可视化网络足迹扫描平台<br><a target="_blank" href="https://www.freebuf.com/articles/network/232520.html">https://www.freebuf.com/articles/network/232520.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>以虎嗅网4W+文章的文本挖掘为例，展现数据分析的一整套流程 <br><a target="_blank" href="https://www.jiqizhixin.com/articles/2018-12-20-18">https://www.jiqizhixin.com/articles/2018-12-20-18</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>短兵：API安全典型漏洞剖析 <br><a target="_blank" href="https://zine.la/article/1eaf51e700924b3290218f0d6c7b7247/?from=timeline">https://zine.la/article/1eaf51e700924b3290218f0d6c7b7247/?from=timeline</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>移动 app安全评估检测技术分析<br><a target="_blank" href="https://www.kiwisec.com/news/detail/5e97cf7142bc562941eb0069.html">https://www.kiwisec.com/news/detail/5e97cf7142bc562941eb0069.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>近源渗透测试之USBninja实战<br><a target="_blank" href="https://mp.weixin.qq.com/s/qCA-6zXbwpj8nyn5791zfg">https://mp.weixin.qq.com/s/qCA-6zXbwpj8nyn5791zfg</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于数据流的越权检测<br><a target="_blank" href="https://mp.weixin.qq.com/s/FC6ROeMAdGUxkjVjFd914A">https://mp.weixin.qq.com/s/FC6ROeMAdGUxkjVjFd914A</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android程序安全分析入门<br><a target="_blank" href="https://mp.weixin.qq.com/s/58HGpBRngfov1yXReaTpNA">https://mp.weixin.qq.com/s/58HGpBRngfov1yXReaTpNA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>红队测评技巧：对公司发起OSINT<br><a target="_blank" href="https://xz.aliyun.com/t/7610">https://xz.aliyun.com/t/7610</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>宜信SDL实践：产品经理如何驱动产品安全建设<br><a target="_blank" href="https://segmentfault.com/a/1190000021257429">https://segmentfault.com/a/1190000021257429</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Exploiting POST-based XSSI<br><a target="_blank" href="https://blog.cm2.pw/exploiting-post-based-xssi/">https://blog.cm2.pw/exploiting-post-based-xssi/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>MacOS Dylib Injection through Mach-O Binary Manipulation<br><a target="_blank" href="https://malwareunicorn.org/workshops/macos_dylib_injection.html#0">https://malwareunicorn.org/workshops/macos_dylib_injection.html#0</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>流量分析在安全攻防上的探索实践<br><a target="_blank" href="https://mp.weixin.qq.com/s/xz9v7cxQiGdsCUWbl5Lp1A">https://mp.weixin.qq.com/s/xz9v7cxQiGdsCUWbl5Lp1A</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Stowaway -- Multi-hop Proxy Tool for pentesters<br><a target="_blank" href="https://github.com/ph4ntonn/Stowaway">https://github.com/ph4ntonn/Stowaway</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>DLL hijacking vulnerabilities in Nirsoft tools<br><a target="_blank" href="http://borncity.com/win/2020/04/16/dll-hijacking-vulnerabilities-in-nirsoft-tools/">http://borncity.com/win/2020/04/16/dll-hijacking-vulnerabilities-in-nirsoft-tools/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>IFFA文件格式漏洞交互式分析系统<br><a target="_blank" href="http://www.asm64.com/IFFA/index.html">http://www.asm64.com/IFFA/index.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>刨析NSA/ASD的WebShell防御指南<br><a target="_blank" href="https://mp.weixin.qq.com/s/oswnCc18UhYOrc6OC0COaA">https://mp.weixin.qq.com/s/oswnCc18UhYOrc6OC0COaA</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>haidragon/KiwiVM-1: virtualization encryption software for mobile applications<br><a target="_blank" href="https://github.com/haidragon/KiwiVM-1">https://github.com/haidragon/KiwiVM-1</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Lateral Movement: PowerShell Remoting<br><a target="_blank" href="https://medium.com/@subhammisra45/lateral-movement-powershell-remoting-89da402a9885">https://medium.com/@subhammisra45/lateral-movement-powershell-remoting-89da402a9885</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android 中的特殊攻击面（一）——邪恶的对话框<br><a target="_blank" href="https://paper.seebug.org/1174/">https://paper.seebug.org/1174/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Terminal Escape Injection<br><a target="_blank" href="https://www.infosecmatter.com/terminal-escape-injection/">https://www.infosecmatter.com/terminal-escape-injection/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>SMBGhost pre-auth RCE abusing Direct Memory Access structs<br><a target="_blank" href="https://ricercasecurity.blogspot.com/2020/04/ill-ask-your-body-smbghost-pre-auth-rce.html">https://ricercasecurity.blogspot.com/2020/04/ill-ask-your-body-smbghost-pre-auth-rce.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Tale of two hypervisor bugs - Escaping from FreeBSD bhyve<br><a target="_blank" href="http://www.phrack.org/papers/escaping_from_freebsd_bhyve.html">http://www.phrack.org/papers/escaping_from_freebsd_bhyve.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Python RASP 工程化:一次入侵的思考<br><a target="_blank" href="https://mp.weixin.qq.com/s/icWaHsC6dzlclxfLhvQjYA">https://mp.weixin.qq.com/s/icWaHsC6dzlclxfLhvQjYA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Subdomain Takeover: Thoughts on Risks<br><a target="_blank" href="https://mp.weixin.qq.com/s/fn3_2kC6ljUL3ac1Mhuh1A">https://mp.weixin.qq.com/s/fn3_2kC6ljUL3ac1Mhuh1A</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2020-0791<br><a target="_blank" href="https://cpr-zero.checkpoint.com/vulns/cprid-2147/">https://cpr-zero.checkpoint.com/vulns/cprid-2147/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>GhostBuild - MSBuild launchers for various GhostPack/.NET projects<br><a target="_blank" href="https://github.com/bohops/GhostBuild">https://github.com/bohops/GhostBuild</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Uninitialized Memory Disclosures in Web Applications<br><a target="_blank" href="https://blog.silentsignal.eu/2020/04/20/uninitialized-memory-disclosures-in-web-applications/">https://blog.silentsignal.eu/2020/04/20/uninitialized-memory-disclosures-in-web-applications/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>The Zaheck of Android Deep Links!<br><a target="_blank" href="https://medium.com/@shivsahni2/the-zaheck-of-android-deep-links-a5f57dc4ae4c">https://medium.com/@shivsahni2/the-zaheck-of-android-deep-links-a5f57dc4ae4c</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>OSS-Fuzz data in Vulners<br><a target="_blank" href="https://vulners.blog/2020/04/17/ossfuzz-from-vulners/">https://vulners.blog/2020/04/17/ossfuzz-from-vulners/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Everything You Need to Know About IDOR<br><a target="_blank" href="https://medium.com/@aysebilgegunduz/everything-you-need-to-know-about-idor-insecure-direct-object-references-375f83e03a87">https://medium.com/@aysebilgegunduz/everything-you-need-to-know-about-idor-insecure-direct-object-references-375f83e03a87</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>CryptoHack – A fun platform for learning cryptography<br><a target="_blank" href="https://cryptohack.org/">https://cryptohack.org/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Tinyshell Under the Microscope<br><a target="_blank" href="https://themittenmac.com/tinyshell-under-the-microscope/">https://themittenmac.com/tinyshell-under-the-microscope/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Dissecting the Windows Defender Driver<br><a target="_blank" href="https://www.n4r1b.com/posts/2020/04/dissecting-the-windows-defender-driver-wdfilter-part-4/">https://www.n4r1b.com/posts/2020/04/dissecting-the-windows-defender-driver-wdfilter-part-4/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>How We Hacked an Android Game And Ranked First globally<br><a target="_blank" href="https://payatu.com/blog/hrushikesh/how-i-hacked-an-android-game-and-ranked-first">https://payatu.com/blog/hrushikesh/how-i-hacked-an-android-game-and-ranked-first</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Sqlserver, or the Miner in the Basement<br><a target="_blank" href="https://thedfirreport.com/2020/04/20/sqlserver-or-the-miner-in-the-basement/">https://thedfirreport.com/2020/04/20/sqlserver-or-the-miner-in-the-basement/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Assistant plugin for vulnerability research<br><a target="_blank" href="https://github.com/Martyx00/VulnFanatic">https://github.com/Martyx00/VulnFanatic</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>JSON Web Token Validation Bypass in Auth0 Authentication API<br><a target="_blank" href="https://insomniasec.com/blog/auth0-jwt-validation-bypass">https://insomniasec.com/blog/auth0-jwt-validation-bypass</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>iOS acquisition methods compared: logical, full file system and iCloud<br><a target="_blank" href="https://blog.elcomsoft.com/2020/04/ios-acquisition-methods-compared-logical-full-file-system-and-icloud/">https://blog.elcomsoft.com/2020/04/ios-acquisition-methods-compared-logical-full-file-system-and-icloud/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Is BGP safe yet? · Cloudflare<br><a target="_blank" href="https://isbgpsafeyet.com/">https://isbgpsafeyet.com/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>joincap: Merge multiple pcap files together, gracefully.<br><a target="_blank" href="https://github.com/assafmo/joincap">https://github.com/assafmo/joincap</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android 中的特殊攻击面（二）——危险的deeplink<br><a target="_blank" href="https://paper.seebug.org/1175/">https://paper.seebug.org/1175/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Exploiting (Almost) Every Antivirus Software<br><a target="_blank" href="https://www.rack911labs.com/research/exploiting-almost-every-antivirus-software/">https://www.rack911labs.com/research/exploiting-almost-every-antivirus-software/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>体系化的WAF安全运营实践<br><a target="_blank" href="https://mp.weixin.qq.com/s/BiH23k7xAeuwb5wwaOEKVw">https://mp.weixin.qq.com/s/BiH23k7xAeuwb5wwaOEKVw</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>PHP代码审计之CTF系列(3)<br><a target="_blank" href="https://mp.weixin.qq.com/s/o9HL8kPCuw5f8nvsWhzEhQ">https://mp.weixin.qq.com/s/o9HL8kPCuw5f8nvsWhzEhQ</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>A HTTP PoC Endpoint for cve-2020-5260 <br><a target="_blank" href="https://github.com/brompwnie/cve-2020-5260/">https://github.com/brompwnie/cve-2020-5260/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>OWASP Firmware Security Testing Methodology<br><a target="_blank" href="https://scriptingxss.gitbook.io/firmware-security-testing-methodology/">https://scriptingxss.gitbook.io/firmware-security-testing-methodology/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>GHSL-2020-038: Use after free in Chrome WebAudio<br><a target="_blank" href="https://securitylab.github.com/advisories/GHSL-2020-038-chrome">https://securitylab.github.com/advisories/GHSL-2020-038-chrome</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Grammar based fuzzing PDFs with Domato<br><a target="_blank" href="https://symeonp.github.io/2020/04/18/grammar-based-fuzzing.html">https://symeonp.github.io/2020/04/18/grammar-based-fuzzing.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Abusing HTTP Path Normalization and Cache Poisoning to steal accounts<br><a target="_blank" href="https://samcurry.net/abusing-http-path-normalization-and-cache-poisoning-to-steal-rocket-league-accounts/">https://samcurry.net/abusing-http-path-normalization-and-cache-poisoning-to-steal-rocket-league-accounts/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Building a Basic C2<br><a target="_blank" href="https://0xrick.github.io/misc/c2/">https://0xrick.github.io/misc/c2/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>移动基带安全研究系列文章之概念与系统篇<br><a target="_blank" href="https://paper.seebug.org/1178/">https://paper.seebug.org/1178/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>pingfisher: A ping detection tool for linux<br><a target="_blank" href="https://github.com/xscorp/pingfisher">https://github.com/xscorp/pingfisher</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>webshell &quot;干掉&quot; RASP<br><a target="_blank" href="https://mp.weixin.qq.com/s/yykliM-b4_rStX5ucPWO2w">https://mp.weixin.qq.com/s/yykliM-b4_rStX5ucPWO2w</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>A Defender&#039;s Guide For Rootkit Detection: Episode 1<br><a target="_blank" href="https://labs.jumpsec.com/2020/04/20/a-defenders-guide-for-rootkit-detection-episode-1-kernel-drivers/?preview=true">https://labs.jumpsec.com/2020/04/20/a-defenders-guide-for-rootkit-detection-episode-1-kernel-drivers/?preview=true</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>SystemToken: Steal privileged token to obtain SYSTEM shell<br><a target="_blank" href="https://github.com/yusufqk/SystemToken">https://github.com/yusufqk/SystemToken</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>This challenge is Inon Shkedy&#039;s 31 days API Security Tips.<br><a target="_blank" href="https://github.com/smodnix/31-days-of-API-Security-Tips">https://github.com/smodnix/31-days-of-API-Security-Tips</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>AIL framework - Analysis Information Leak framework<br><a target="_blank" href="https://github.com/ail-project/ail-framework">https://github.com/ail-project/ail-framework</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>半自动化挖掘 request 实现多种中间件回显<br><a target="_blank" href="https://paper.seebug.org/1181/">https://paper.seebug.org/1181/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>爱奇艺的业务安全风控“秘籍”<br><a target="_blank" href="https://www.freebuf.com/articles/people/233378.html">https://www.freebuf.com/articles/people/233378.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Critical CSRF to RCE bug chain in Prestashop v1.7.6.4 and below<br><a target="_blank" href="https://stazot.com/prestashop-csrf-to-rce-article/">https://stazot.com/prestashop-csrf-to-rce-article/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>当PLC偶遇老旧但不乏经典的高级组包工具Hping3<br><a target="_blank" href="https://mp.weixin.qq.com/s/iV9Ib9l4rrbC0oZe1gdDcg">https://mp.weixin.qq.com/s/iV9Ib9l4rrbC0oZe1gdDcg</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>远控免杀专题-白名单(113个)总结篇<br><a target="_blank" href="https://mp.weixin.qq.com/s/2bC5otYgIgGnod-cXwkfqw">https://mp.weixin.qq.com/s/2bC5otYgIgGnod-cXwkfqw</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>2019年我国互联网网络安全态势综述<br><a target="_blank" href="https://ncstatic.clewm.net/rsrc/2020/0420/16/976527b7158e60845a7671eded20c6ee.pdf">https://ncstatic.clewm.net/rsrc/2020/0420/16/976527b7158e60845a7671eded20c6ee.pdf</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Attacking and Auditing Docker Containers and Kubernetes Clusters<br><a target="_blank" href="https://github.com/appsecco/attacking-and-auditing-docker-containers-and-kubernetes-clusters">https://github.com/appsecco/attacking-and-auditing-docker-containers-and-kubernetes-clusters</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>一些流行的云waf、cdn、lb的域名列表<br><a target="_blank" href="https://bacde.me/post/some-waf-cdn-lb-list/">https://bacde.me/post/some-waf-cdn-lb-list/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>The Hitchhiker&#039;s Guide to Shellcoding<br><a target="_blank" href="https://slaeryan.github.io/">https://slaeryan.github.io/</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第320期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/320">https://www.sec-wiki.com/weekly/320</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>xioc: Extract IOCs from text, including &quot;escaped&quot; ones.<br><a target="_blank" href="https://github.com/assafmo/xioc">https://github.com/assafmo/xioc</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>2019年工业控制网络安全态势白皮书<br><a target="_blank" href="https://mp.weixin.qq.com/s/phcpafQnNBnyQ10FOcSriQ">https://mp.weixin.qq.com/s/phcpafQnNBnyQ10FOcSriQ</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>一次Reverse出题手记<br><a target="_blank" href="https://xz.aliyun.com/t/7619">https://xz.aliyun.com/t/7619</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>零信任安全架构实践之路<br><a target="_blank" href="https://mp.weixin.qq.com/s/jWBnS144PvBRM-wnMnwseA">https://mp.weixin.qq.com/s/jWBnS144PvBRM-wnMnwseA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>构建企业级研发安全编码规范<br><a target="_blank" href="https://mp.weixin.qq.com/s/PNvCvV4gYJkfIsKJ1ccneA">https://mp.weixin.qq.com/s/PNvCvV4gYJkfIsKJ1ccneA</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>记一次对PUBG外挂病毒的反制过程<br><a target="_blank" href="https://xz.aliyun.com/t/7626">https://xz.aliyun.com/t/7626</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>awesome-virtualization: Collection of resources about Virtualization<br><a target="_blank" href="https://github.com/Wenzel/awesome-virtualization">https://github.com/Wenzel/awesome-virtualization</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Handbook of information collection for penetration testing and src<br><a target="_blank" href="https://github.com/Qftm/Information_Collection_Handbook">https://github.com/Qftm/Information_Collection_Handbook</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Xiaomi Mi9 (Pwn2Own 2019)<br><a target="_blank" href="https://labs.f-secure.com/advisories/xiaomi-mi9/">https://labs.f-secure.com/advisories/xiaomi-mi9/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android Kernel Exploitation<br><a target="_blank" href="https://cloudfuzz.github.io/android-kernel-exploitation/">https://cloudfuzz.github.io/android-kernel-exploitation/</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，8年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/321">SecWiki周刊(第321期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;
                        <a href='https://security.ximalaya.com/'>XMSRC</a>&nbsp;
                        <br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2020                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
