<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第260期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第260期）</strong></h5>
<blockquote> 2019/02/18-2019/02/24</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>关于境内大量家用路由器DNS被篡改情况通报<br><a target="_blank" href="https://mp.weixin.qq.com/s/5ZOhusBPwQ0WdTBgrStfMg">https://mp.weixin.qq.com/s/5ZOhusBPwQ0WdTBgrStfMg</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>RSA 2019参展机构增至736家 云安全已成主流<br><a target="_blank" href="https://www.aqniu.com/industry/43763.html">https://www.aqniu.com/industry/43763.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>北京师范大学被列为“联合国网络犯罪问题政府间专家组”观察员<br><a target="_blank" href="https://mp.weixin.qq.com/s/Ra1rcTl7K-Dtug9tNUwLPA">https://mp.weixin.qq.com/s/Ra1rcTl7K-Dtug9tNUwLPA</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>端口安全(持续更新)<br><a target="_blank" href="https://bloodzer0.github.io/ossa/infrastructure-security/host-security/host-security-scan/port/">https://bloodzer0.github.io/ossa/infrastructure-security/host-security/host-security-scan/port/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>某市某单位“驱动人生”事件7小时应急响应<br><a target="_blank" href="https://mp.weixin.qq.com/s/C8x6fVm7QVwWCEpzCBBRSg">https://mp.weixin.qq.com/s/C8x6fVm7QVwWCEpzCBBRSg</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>全网筛查 WinRAR 代码执行漏洞 (CVE-2018-20250)<br><a target="_blank" href="https://xlab.tencent.com/cn/2019/02/22/investigating-winrar-code-execution-vulnerability-cve-2018-20250-at-internet-scale/">https://xlab.tencent.com/cn/2019/02/22/investigating-winrar-code-execution-vulnerability-cve-2018-20250-at-internet-scale/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>WinRAR漏洞复现过程<br><a target="_blank" href="https://fuping.site/2019/02/21/WinRAR-Extracting-Code-Execution-Validate/">https://fuping.site/2019/02/21/WinRAR-Extracting-Code-Execution-Validate/</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>今年的OffensiveCon大会议题质量不错（附资料下载）<br><a target="_blank" href="https://mp.weixin.qq.com/s/8bpcNK06tpKbi7gHJEdlUA">https://mp.weixin.qq.com/s/8bpcNK06tpKbi7gHJEdlUA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Micro8: PHP安全新闻早8点全部文档<br><a target="_blank" href="https://github.com/Micropoor/Micro8">https://github.com/Micropoor/Micro8</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>白帽子转型甲方杂绪<br><a target="_blank" href="https://bloodzer0.github.io/ossa/miscellaneous/jsrc-1/">https://bloodzer0.github.io/ossa/miscellaneous/jsrc-1/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>信息安全意识漫谈<br><a target="_blank" href="https://book.yunzhan365.com/tkgd/nrkm/mobile/index.html">https://book.yunzhan365.com/tkgd/nrkm/mobile/index.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>三层网络靶场搭建&amp;MSF内网渗透<br><a target="_blank" href="https://www.anquanke.com/post/id/170649">https://www.anquanke.com/post/id/170649</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>wordpress-image-远程代码执行漏洞分析<br><a target="_blank" href="https://kylingit.com/blog/wordpress-image-%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/">https://kylingit.com/blog/wordpress-image-%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Onion之眼：暗网的隐私与追踪<br><a target="_blank" href="https://mp.weixin.qq.com/s/JyGaOV-wBVYCF6gKhYswWw">https://mp.weixin.qq.com/s/JyGaOV-wBVYCF6gKhYswWw</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Discuz 3.4 越权登陆漏洞分析<br><a target="_blank" href="https://nosec.org/home/detail/2256.html">https://nosec.org/home/detail/2256.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>WordPress 5.0.0 曝出远程代码执行<br><a target="_blank" href="https://nosec.org/home/detail/2261.html">https://nosec.org/home/detail/2261.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>API安全设计指南(持续收集，非原创)<br><a target="_blank" href="https://bloodzer0.github.io/ossa/application-security/sdl/api-security-design/">https://bloodzer0.github.io/ossa/application-security/sdl/api-security-design/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Adobe ColdFusion 反序列化RCE漏洞分析（CVE-2019-7091）<br><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzAwNTI1NDI3MQ==&amp;mid=2649613813&amp;idx=1&amp;sn=fc1c55360efd5a1ff2e7d8ff25825f8a&amp;scene=21#wechat_redirect">https://mp.weixin.qq.com/s?__biz=MzAwNTI1NDI3MQ==&amp;mid=2649613813&amp;idx=1&amp;sn=fc1c55360efd5a1ff2e7d8ff25825f8a&amp;scene=21#wechat_redirect</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>TikiTorch  - 一款允许在任意进程中执行任意 ShellCode 的工具<br><a target="_blank" href="https://github.com/rasta-mouse/TikiTorch">https://github.com/rasta-mouse/TikiTorch</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>CVE-2019-0626 | Windows DHCP Server Remote Code Execution Vulnerability<br><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0626">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0626</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>JavaScript源码审计(一)<br><a target="_blank" href="https://mp.weixin.qq.com/s/vfiVt3igcNmlKSanVvHMIA">https://mp.weixin.qq.com/s/vfiVt3igcNmlKSanVvHMIA</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Extracting a 19 Year Old Code Execution from WinRAR<br><a target="_blank" href="https://research.checkpoint.com/extracting-code-execution-from-winrar/">https://research.checkpoint.com/extracting-code-execution-from-winrar/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>使用osqueryd监控系统<br><a target="_blank" href="http://www.polaris-lab.com/index.php/archives/618/">http://www.polaris-lab.com/index.php/archives/618/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>5篇顶会论文带你了解知识图谱最新研究进展<br><a target="_blank" href="https://mp.weixin.qq.com/s/nomVWAuvuxFJLWoxHoUCqg">https://mp.weixin.qq.com/s/nomVWAuvuxFJLWoxHoUCqg</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>企业应用指纹平台框架实践<br><a target="_blank" href="https://mp.weixin.qq.com/s/DeHbVNidE5Oh4WuYXyGX6g">https://mp.weixin.qq.com/s/DeHbVNidE5Oh4WuYXyGX6g</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>CVE-2019-6453: RCE on mIRC <br><a target="_blank" href="https://proofofcalc.com/cve-2019-6453-mIRC/">https://proofofcalc.com/cve-2019-6453-mIRC/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>WordPress 5.0.0 Remote Code Execution<br><a target="_blank" href="https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/">https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>微信PC端技术研究(3)-如何找到消息发送接口<br><a target="_blank" href="https://mp.weixin.qq.com/s/uUXB9AHtnhCsD7gAfFYRoA">https://mp.weixin.qq.com/s/uUXB9AHtnhCsD7gAfFYRoA</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>BlueHatIL 2019 Abstracts<br><a target="_blank" href="https://www.bluehatil.com/abstracts">https://www.bluehatil.com/abstracts</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>C端安全产品的未来之路<br><a target="_blank" href="https://mp.weixin.qq.com/s/Sp15EkyNKBZvOZHrJ7zJ2w">https://mp.weixin.qq.com/s/Sp15EkyNKBZvOZHrJ7zJ2w</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>PowerShell Empire 免杀过 Windows Defender<br><a target="_blank" href="https://www.blackhillsinfosec.com/getting-powershell-empire-past-windows-defender/">https://www.blackhillsinfosec.com/getting-powershell-empire-past-windows-defender/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>AI-Security-Learning: 安全检测与数据挖掘的学习资料<br><a target="_blank" href="https://github.com/0xMJ/AI-Security-Learning">https://github.com/0xMJ/AI-Security-Learning</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Chashell: Go reverse shell that communicates over DNS<br><a target="_blank" href="https://github.com/sysdream/chashell">https://github.com/sysdream/chashell</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>使用 Tor 进行匿名文件分享的开源工具 - OnionShare 2<br><a target="_blank" href="https://micahflee.com/2019/02/onionshare-2/">https://micahflee.com/2019/02/onionshare-2/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>HTTP安全标头及其工作原理（上）<br><a target="_blank" href="http://www.4hou.com/web/16145.html">http://www.4hou.com/web/16145.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>2018勒索病毒白皮书(政企篇)<br><a target="_blank" href="http://zt.360.cn/1101061855.php?dtid=1101062514&amp;did=210845178">http://zt.360.cn/1101061855.php?dtid=1101062514&amp;did=210845178</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Drupal core - Highly critical - Remote Code Execution - SA-CORE-2019-003<br><a target="_blank" href="https://www.drupal.org/sa-core-2019-003">https://www.drupal.org/sa-core-2019-003</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Kali linux 2016.2（Rolling）里安装OpenVAS<br><a target="_blank" href="https://www.cnblogs.com/zlslch/p/6872559.html">https://www.cnblogs.com/zlslch/p/6872559.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>智能设备安全分析手册 <br><a target="_blank" href="http://blog.nsfocus.net/handbook-safety-analysis-intelligent-equipment/">http://blog.nsfocus.net/handbook-safety-analysis-intelligent-equipment/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>exploit for CVE-2018-4193<br><a target="_blank" href="https://github.com/Synacktiv/CVE-2018-4193">https://github.com/Synacktiv/CVE-2018-4193</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>从内容产出看安全领域变化<br><a target="_blank" href="https://mp.weixin.qq.com/s/MZp_BOPPrX4hTgP5s5hUPw">https://mp.weixin.qq.com/s/MZp_BOPPrX4hTgP5s5hUPw</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>智能 GPS 跟踪器的安全与隐私问题研究<br><a target="_blank" href="https://arxiv.org/ftp/arxiv/papers/1902/1902.05318.pdf">https://arxiv.org/ftp/arxiv/papers/1902/1902.05318.pdf</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Analyzing the Windows LNK file attack method<br><a target="_blank" href="https://dexters-lab.net/2019/02/16/analyzing-the-windows-lnk-file-attack-method/">https://dexters-lab.net/2019/02/16/analyzing-the-windows-lnk-file-attack-method/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于分布式欺骗技术的工业网络异常行为自动发现技术<br><a target="_blank" href="https://mp.weixin.qq.com/s/ilEGEmDzT7yQvxpaHTMIjg">https://mp.weixin.qq.com/s/ilEGEmDzT7yQvxpaHTMIjg</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Linux常见backdoor及排查技术<br><a target="_blank" href="https://xz.aliyun.com/t/4090">https://xz.aliyun.com/t/4090</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>EDR检测持久化Persistence入门<br><a target="_blank" href="https://mp.weixin.qq.com/s/AKdnFKn8oXocZ5eyfB2D9g">https://mp.weixin.qq.com/s/AKdnFKn8oXocZ5eyfB2D9g</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>How-To-Secure-A-Linux-Server<br><a target="_blank" href="https://github.com/imthenachoman/How-To-Secure-A-Linux-Server">https://github.com/imthenachoman/How-To-Secure-A-Linux-Server</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>FaceTime Texture 处理过程中的内存破坏漏洞（CVE-2019-6224）<br><a target="_blank" href="https://bugs.chromium.org/p/project-zero/issues/detail?id=1732">https://bugs.chromium.org/p/project-zero/issues/detail?id=1732</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Typora XSS 到 RCE (上)<br><a target="_blank" href="https://www.anquanke.com/post/id/170665">https://www.anquanke.com/post/id/170665</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>Detecting Web Attacks with a Seq2Seq Autoencoder<br><a target="_blank" href="http://blog.ptsecurity.com/2019/02/detecting-web-attacks-with-seq2seq.html">http://blog.ptsecurity.com/2019/02/detecting-web-attacks-with-seq2seq.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Typora XSS 到 RCE（下）<br><a target="_blank" href="https://www.anquanke.com/post/id/170756">https://www.anquanke.com/post/id/170756</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Webkit Exploitation Tutorial<br><a target="_blank" href="https://www.auxy.xyz/tutorial/Webkit-Exp-Tutorial/#virtual-machine">https://www.auxy.xyz/tutorial/Webkit-Exp-Tutorial/#virtual-machine</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第259期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/259">https://www.sec-wiki.com/weekly/259</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>从两道CTF实例看python格式化字符串漏洞<br><a target="_blank" href="https://www.anquanke.com/post/id/170620">https://www.anquanke.com/post/id/170620</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Hacking Jenkins Part 2 - Abusing Meta Programming for Unauthenticated RCE!<br><a target="_blank" href="https://devco.re/blog/2019/02/19/hacking-Jenkins-part2-abusing-meta-programming-for-unauthenticated-RCE/">https://devco.re/blog/2019/02/19/hacking-Jenkins-part2-abusing-meta-programming-for-unauthenticated-RCE/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>osquery初识<br><a target="_blank" href="http://www.polaris-lab.com/index.php/archives/617/">http://www.polaris-lab.com/index.php/archives/617/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>sec_profile: 分析安全信息站点、安全趋势、安全工作者账号<br><a target="_blank" href="https://github.com/tanjiti/sec_profile">https://github.com/tanjiti/sec_profile</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Node.js 原型污染攻击的分析与利用<br><a target="_blank" href="https://blog.0daylabs.com/2019/02/15/prototype-pollution-javascript/">https://blog.0daylabs.com/2019/02/15/prototype-pollution-javascript/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Container Escape Flaw Hits AWS, Google Cloud, Linux Distros<br><a target="_blank" href="https://www.securityweek.com/container-escape-flaw-hits-aws-google-cloud-linux-distros">https://www.securityweek.com/container-escape-flaw-hits-aws-google-cloud-linux-distros</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>如何对 JavaScript 引擎进行 Fuzzing<br><a target="_blank" href="https://saelo.github.io/presentations/offensivecon_19_fuzzilli.pdf">https://saelo.github.io/presentations/offensivecon_19_fuzzilli.pdf</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>等保2.0要点解析及落地实施技术攻略<br><a target="_blank" href="https://www.kiwisec.com/news/detail/5c6b6a94c649181e28b81dce.html">https://www.kiwisec.com/news/detail/5c6b6a94c649181e28b81dce.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>HTTP安全标头及其工作原理（下）<br><a target="_blank" href="http://www.4hou.com/web/16146.html">http://www.4hou.com/web/16146.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>绕过Facebook的CSRF防御——25000美金<br><a target="_blank" href="https://nosec.org/home/detail/2258.html">https://nosec.org/home/detail/2258.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>基础事件响应中的 Volatility 工作流程<br><a target="_blank" href="https://laskowski-tech.com/2019/02/18/volatility-workflow-for-basic-incident-response/">https://laskowski-tech.com/2019/02/18/volatility-workflow-for-basic-incident-response/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>TTPs &amp; IOCs &amp; 痛苦金字塔<br><a target="_blank" href="https://mp.weixin.qq.com/s/rZ_XOrsWaFvl8xE2PFuZEg">https://mp.weixin.qq.com/s/rZ_XOrsWaFvl8xE2PFuZEg</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Make It Rain with MikroTik – Tenable TechBlog – Medium<br><a target="_blank" href="https://medium.com/tenable-techblog/make-it-rain-with-mikrotik-c90705459bc6">https://medium.com/tenable-techblog/make-it-rain-with-mikrotik-c90705459bc6</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>一个go语言crackme分析<br><a target="_blank" href="https://mp.weixin.qq.com/s/tgd2u2FPfdC3dyLufSBHVg">https://mp.weixin.qq.com/s/tgd2u2FPfdC3dyLufSBHVg</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>SANCTUARY  - 一款在 TrustZone 生态系统中提供可信环境的安全框架<br><a target="_blank" href="https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_01A-1_Brasser_paper.pdf">https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_01A-1_Brasser_paper.pdf</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Malware PowerShell shellcode analysis<br><a target="_blank" href="https://github.com/JohnLaTwC/Shared/blob/master/notebooks/Malware%20PowerShell%20shellcode%20analysis.ipynb">https://github.com/JohnLaTwC/Shared/blob/master/notebooks/Malware%20PowerShell%20shellcode%20analysis.ipynb</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>NTFS Case Sensitivity on Windows<br><a target="_blank" href="https://tyranidslair.blogspot.com/2019/02/ntfs-case-sensitivity-on-windows.html">https://tyranidslair.blogspot.com/2019/02/ntfs-case-sensitivity-on-windows.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span> Oracle Java glyph_CloseContour 的运行时 TTF 字体越界读取漏洞<br><a target="_blank" href="https://bugs.chromium.org/p/project-zero/issues/detail?id=1779">https://bugs.chromium.org/p/project-zero/issues/detail?id=1779</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>DARPA HACCS计划介绍<br><a target="_blank" href="http://www.arkteam.net/?p=4243">http://www.arkteam.net/?p=4243</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>“Relaying” Kerberos - Having fun with unconstrained delegation<br><a target="_blank" href="https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/">https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>如何绕过 EDR’s 的内存保护<br><a target="_blank" href="https://movaxbx.ru/2019/02/19/bypass-edrs-memory-protection-introduction-to-hooking/">https://movaxbx.ru/2019/02/19/bypass-edrs-memory-protection-introduction-to-hooking/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>CNN+BLSTM+CTC的验证码识别从训练到部署<br><a target="_blank" href="https://www.freebuf.com/articles/web/195469.html">https://www.freebuf.com/articles/web/195469.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Azure AD Connect for Red Teamers<br><a target="_blank" href="https://blog.xpnsec.com/azuread-connect-for-redteam/">https://blog.xpnsec.com/azuread-connect-for-redteam/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>$1.000 SSRF in Slack<br><a target="_blank" href="https://medium.com/@elberandre/1-000-ssrf-in-slack-7737935d3884">https://medium.com/@elberandre/1-000-ssrf-in-slack-7737935d3884</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Windows Firewall Post Exploitation with Netsh<br><a target="_blank" href="https://www.hackingarticles.in/windows-firewall-post-exploitation-with-netsh/">https://www.hackingarticles.in/windows-firewall-post-exploitation-with-netsh/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Slack网站上SSRF漏洞的挖掘和防护绕过<br><a target="_blank" href="https://nosec.org/home/detail/2259.html">https://nosec.org/home/detail/2259.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>通过 JavaScript 编译器攻击 Edge<br><a target="_blank" href="https://github.com/bkth/Attacking-Edge-Through-the-JavaScript-Compiler">https://github.com/bkth/Attacking-Edge-Through-the-JavaScript-Compiler</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>LG Device Manager LHA 内核驱动本地提权漏洞（CVE-2019-8372）<br><a target="_blank" href="http://www.jackson-t.ca/lg-driver-lpe.html">http://www.jackson-t.ca/lg-driver-lpe.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Proofpoint releases Q4 2018 Threat Report and Year in Review<br><a target="_blank" href="https://www.proofpoint.com/us/threat-insight/post/proofpoint-releases-q4-2018-threat-report-and-year-review">https://www.proofpoint.com/us/threat-insight/post/proofpoint-releases-q4-2018-threat-report-and-year-review</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>erbbysam/DNSGrep: Quickly Search Large DNS Datasets<br><a target="_blank" href="https://github.com/erbbysam/dnsgrep/">https://github.com/erbbysam/dnsgrep/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>探索Ruby项目中的反序列化问题<br><a target="_blank" href="https://xz.aliyun.com/t/4111">https://xz.aliyun.com/t/4111</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span> OSX Privileged Helper Tool： <br><a target="_blank" href="https://github.com/blankwall/Offensive-Con/blob/master/OffCon.pdf">https://github.com/blankwall/Offensive-Con/blob/master/OffCon.pdf</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span> Kerberos unconstrained delegation abuse toolkit<br><a target="_blank" href="https://github.com/dirkjanm/krbrelayx">https://github.com/dirkjanm/krbrelayx</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Physical Extraction and File System Imaging of iOS 12 Devices <br><a target="_blank" href="https://blog.elcomsoft.com/2019/02/physical-extraction-and-file-system-imaging-of-ios-12-devices/">https://blog.elcomsoft.com/2019/02/physical-extraction-and-file-system-imaging-of-ios-12-devices/</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>Pwning WPA/WPA2 Networks With Bettercap and the PMKID Client-Less Attack<br><a target="_blank" href="https://www.evilsocket.net/2019/02/13/Pwning-WiFi-networks-with-bettercap-and-the-PMKID-client-less-attack/">https://www.evilsocket.net/2019/02/13/Pwning-WiFi-networks-with-bettercap-and-the-PMKID-client-less-attack/</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/260">SecWiki周刊(第260期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
