<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第285期)</title>
	<link rel="stylesheet" type="text/css" href="/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="/css/people.css" />
    <link rel="shortcut icon" href="/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="https://libs.baidu.com/jquery/1.8.3/jquery.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第285期）</strong></h5>
<blockquote> 2019/08/12-2019/08/18</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>网络安全“圣地”之行<br><a target="_blank" href="https://mp.weixin.qq.com/s/xxU0R5eVcP_42VVd2DQeXQ">https://mp.weixin.qq.com/s/xxU0R5eVcP_42VVd2DQeXQ</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>教会微信：突破文件发送100M限制<br><a target="_blank" href="https://mp.weixin.qq.com/s/WfYJDY9OymRTigwn6u7IGw">https://mp.weixin.qq.com/s/WfYJDY9OymRTigwn6u7IGw</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Fortigate SSL VPN任意文件读取（可直接登录VPN）<br><a target="_blank" href="https://nosec.org/home/detail/2867.html">https://nosec.org/home/detail/2867.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>网络与信息安全领域专项赛WP<br><a target="_blank" href="http://zeroyu.xyz/2019/08/16/2019-8-15-writeup/">http://zeroyu.xyz/2019/08/16/2019-8-15-writeup/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>JNDI远程代码执行漏洞详解<br><a target="_blank" href="https://zerothoughts.tumblr.com/post/137769010389/fun-with-jndi-remote-code-injection">https://zerothoughts.tumblr.com/post/137769010389/fun-with-jndi-remote-code-injection</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>DNS攻防皮毛（一）<br><a target="_blank" href="https://mp.weixin.qq.com/s/qnhIalmIu1bz7D6828wldg">https://mp.weixin.qq.com/s/qnhIalmIu1bz7D6828wldg</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Exchange渗透测试总结<br><a target="_blank" href="https://www.anquanke.com/post/id/184342">https://www.anquanke.com/post/id/184342</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>SysmonHunter：一个简单的基于ATT&amp;CK的Sysmon日志狩猎工具<br><a target="_blank" href="https://github.com/baronpan/SysmonHunter">https://github.com/baronpan/SysmonHunter</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2019-0193：Apache Solr远程执行代码漏洞预警<br><a target="_blank" href="https://nosec.org/home/detail/2850.html">https://nosec.org/home/detail/2850.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>IoT固件逆向入门<br><a target="_blank" href="http://zeroyu.xyz/2019/08/15/How_to_start_IoT_Reverse/index.html">http://zeroyu.xyz/2019/08/15/How_to_start_IoT_Reverse/index.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>WebLogic安全研究报告<br><a target="_blank" href="https://mp.weixin.qq.com/s/qxkV_7MZVhUYYq5QGcwCtQ">https://mp.weixin.qq.com/s/qxkV_7MZVhUYYq5QGcwCtQ</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>HTML注入：利用HTML标签绕过CSP<br><a target="_blank" href="https://nosec.org/home/detail/2860.html">https://nosec.org/home/detail/2860.html</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>网络与信息安全领域专赛-WriteUp<br><a target="_blank" href="https://mp.weixin.qq.com/s/1-F5smfdwLUSdit5gP2mYA">https://mp.weixin.qq.com/s/1-F5smfdwLUSdit5gP2mYA</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2018-4259: MacOS NFS vulnerabilties lead to kernel RCE<br><a target="_blank" href="https://blog.semmle.com/cve-2018-4259-macos-nfs-vulnerability/">https://blog.semmle.com/cve-2018-4259-macos-nfs-vulnerability/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>如何攻击Fortigate SSL VPN<br><a target="_blank" href="https://nosec.org/home/detail/2862.html">https://nosec.org/home/detail/2862.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Simple &amp; Interactive SSRF tutorial<br><a target="_blank" href="https://application.security/">https://application.security/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>RouterOS Post Exploitation<br><a target="_blank" href="https://medium.com/tenable-techblog/routeros-post-exploitation-784c08044790">https://medium.com/tenable-techblog/routeros-post-exploitation-784c08044790</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>GetWindowsKernelExploitsKB(获取系统KB补丁对于的MS号)<br><a target="_blank" href="https://www.ch1ng.com/blog/189.html">https://www.ch1ng.com/blog/189.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>基于机器学习的jsp/jspx webshell检测<br><a target="_blank" href="https://xz.aliyun.com/t/5994">https://xz.aliyun.com/t/5994</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>butthax: lovense hush buttplug exploit chain<br><a target="_blank" href="https://github.com/smealum/butthax">https://github.com/smealum/butthax</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>CTF工业信息安全大赛实践与分析<br><a target="_blank" href="https://www.freebuf.com/articles/ics-articles/210687.html">https://www.freebuf.com/articles/ics-articles/210687.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>拟态防御系列问题分析<br><a target="_blank" href="https://xz.aliyun.com/t/5953">https://xz.aliyun.com/t/5953</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>IOC Explorer：自动化关联失陷指标的工具<br><a target="_blank" href="https://github.com/lion-gu/ioc-explorer">https://github.com/lion-gu/ioc-explorer</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>AggressorScript-UploadAndRunFrp<br><a target="_blank" href="https://github.com/Ch1ngg/AggressorScript-UploadAndRunFrp">https://github.com/Ch1ngg/AggressorScript-UploadAndRunFrp</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Comodo Antivirus - Sandbox Race Condition Use-After-Free (CVE-2019-14694)<br><a target="_blank" href="http://rce4fun.blogspot.com/2019/08/comodo-antivirus-sandbox-race-condition.html">http://rce4fun.blogspot.com/2019/08/comodo-antivirus-sandbox-race-condition.html</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>Defcon 27游记 <br><a target="_blank" href="https://n0b0dycn.me/2019/08/defcon27/">https://n0b0dycn.me/2019/08/defcon27/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Building a custom malware sandbox with PANDA<br><a target="_blank" href="https://adalogics.com/blog/Building-a-custom-malware-sandbox-with-PANDA-Part-1">https://adalogics.com/blog/Building-a-custom-malware-sandbox-with-PANDA-Part-1</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Several DoS conditions in certain HTTP/2 implementations<br><a target="_blank" href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md">https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Three (And A Half) Vulns For The Price of One!<br><a target="_blank" href="https://tactifail.wordpress.com/2019/07/26/three-vulns-for-the-price-of-one/">https://tactifail.wordpress.com/2019/07/26/three-vulns-for-the-price-of-one/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>The state of advanced code injections<br><a target="_blank" href="https://adalogics.com/blog/the-state-of-advanced-code-injections">https://adalogics.com/blog/the-state-of-advanced-code-injections</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>How to Build Your Own Penetration Testing Dropbox Using a Raspberry Pi 4<br><a target="_blank" href="https://artificesecurity.com/blog/2019/8/6/how-to-build-your-own-penetration-testing-drop-box-using-a-raspberry-pi-4">https://artificesecurity.com/blog/2019/8/6/how-to-build-your-own-penetration-testing-drop-box-using-a-raspberry-pi-4</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Responding to Firefox 0-days in the wild<br><a target="_blank" href="https://blog.coinbase.com/responding-to-firefox-0-days-in-the-wild-d9c85a57f15b">https://blog.coinbase.com/responding-to-firefox-0-days-in-the-wild-d9c85a57f15b</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Threat hunting using DNS firewalls and data enrichment<br><a target="_blank" href="https://blog.redteam.pl/2019/08/threat-hunting-dns-firewall.html">https://blog.redteam.pl/2019/08/threat-hunting-dns-firewall.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Reversing an Oppo ozip encryption key from encrypted firmware<br><a target="_blank" href="https://bkerler.github.io/reversing/2019/04/24/the-game-begins/">https://bkerler.github.io/reversing/2019/04/24/the-game-begins/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>goop: Google Search Scraper<br><a target="_blank" href="https://github.com/s0md3v/goop">https://github.com/s0md3v/goop</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>KNOB Attack<br><a target="_blank" href="https://knobattack.com/">https://knobattack.com/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Meteor Blind NoSQL Injection<br><a target="_blank" href="https://medium.com/rangeforce/meteor-blind-nosql-injection-29211775cd01">https://medium.com/rangeforce/meteor-blind-nosql-injection-29211775cd01</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>fuzzowski: the Network Protocol Fuzzer that we will want to use.<br><a target="_blank" href="https://github.com/nccgroup/fuzzowski">https://github.com/nccgroup/fuzzowski</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Privilege Escalation in Cloud Foundry UAA<br><a target="_blank" href="https://www.twistlock.com/labs-blog/privilege-escalation-in-cloud-foundry-uaa-cve-2019-11270/">https://www.twistlock.com/labs-blog/privilege-escalation-in-cloud-foundry-uaa-cve-2019-11270/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>从SOAR中求解应用安全建设强运营突围之法<br><a target="_blank" href="https://mp.weixin.qq.com/s/sedpOhSxEGSdaxX8SACIMA">https://mp.weixin.qq.com/s/sedpOhSxEGSdaxX8SACIMA</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>DEF CON CTF 27 Final 游记 <br><a target="_blank" href="http://iromise.com/2019/08/14/DEF-CON-CTF-27-Final/">http://iromise.com/2019/08/14/DEF-CON-CTF-27-Final/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Static Analysis at Scale: An Instagram Story<br><a target="_blank" href="https://instagram-engineering.com/static-analysis-at-scale-an-instagram-story-8f498ab71a0c">https://instagram-engineering.com/static-analysis-at-scale-an-instagram-story-8f498ab71a0c</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>Microsoft Vulnerability Severity Classification for Windows<br><a target="_blank" href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2A3xt">https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2A3xt</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Generating Personalized Wordlists with NLP For Password Guessing Attacks<br><a target="_blank" href="https://utkusen.com/blog/generating-personalized-wordlists.html">https://utkusen.com/blog/generating-personalized-wordlists.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>SELECT code_execution FROM * USING SQLite;<br><a target="_blank" href="https://research.checkpoint.com/select-code_execution-from-using-sqlite/">https://research.checkpoint.com/select-code_execution-from-using-sqlite/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Mautic Remote Code Execution<br><a target="_blank" href="https://github.com/MegadodoPublications/exploits/blob/master/mautic.md">https://github.com/MegadodoPublications/exploits/blob/master/mautic.md</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Clickjacking DOM XSS on Google.org<br><a target="_blank" href="https://appio.dev/vulns/clickjacking-xss-on-google-org/">https://appio.dev/vulns/clickjacking-xss-on-google-org/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Offensive Lateral Movement<br><a target="_blank" href="https://hausec.com/2019/08/12/offensive-lateral-movement/">https://hausec.com/2019/08/12/offensive-lateral-movement/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Exploiting Out Of Band XXE using internal network and php wrappers<br><a target="_blank" href="https://mahmoudsec.blogspot.com/2019/08/exploiting-out-of-band-xxe-using.html">https://mahmoudsec.blogspot.com/2019/08/exploiting-out-of-band-xxe-using.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Monitoring the State of Internet Routing Security<br><a target="_blank" href="https://observatory.manrs.org">https://observatory.manrs.org</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Dr.Semu - Malware Detection and Classification Tool Based on Dynamic Behavior<br><a target="_blank" href="https://github.com/secrary/DrSemu">https://github.com/secrary/DrSemu</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Intercepting traffic from Android Flutter applications<br><a target="_blank" href="https://blog.nviso.be/2019/08/13/intercepting-traffic-from-android-flutter-applications/">https://blog.nviso.be/2019/08/13/intercepting-traffic-from-android-flutter-applications/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Code Execution via Fiber Local Storage<br><a target="_blank" href="http://hatriot.github.io/blog/2019/08/12/code-execution-via-fiber-local-storage/">http://hatriot.github.io/blog/2019/08/12/code-execution-via-fiber-local-storage/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>JNDI Injection using Getter Based Deserialization Gadgets<br><a target="_blank" href="https://srcincite.io/blog/2019/08/07/attacking-unmarshallers-jndi-injection-using-getter-based-deserialization.html">https://srcincite.io/blog/2019/08/07/attacking-unmarshallers-jndi-injection-using-getter-based-deserialization.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Simple Anti-RE Trick<br><a target="_blank" href="https://secrary.com/Random/anti_re_simple/">https://secrary.com/Random/anti_re_simple/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Subdomain takeover - Chapter two: Azure Services<br><a target="_blank" href="https://blog.cystack.net/subdomain-takeover-chapter-two-azure-services/">https://blog.cystack.net/subdomain-takeover-chapter-two-azure-services/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Debugging Cordova Applications<br><a target="_blank" href="https://www.appknox.com/security/debugging-cordova-applications">https://www.appknox.com/security/debugging-cordova-applications</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>solr-injection: Apache Solr Injection Research<br><a target="_blank" href="https://github.com/artsploit/solr-injection">https://github.com/artsploit/solr-injection</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>How To Attack Kerberos 101<br><a target="_blank" href="https://m0chan.github.io/2019/07/31/How-To-Attack-Kerberos-101.html">https://m0chan.github.io/2019/07/31/How-To-Attack-Kerberos-101.html</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/285">SecWiki周刊(第285期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;
                        <a href='https://security.ximalaya.com/'>XMSRC</a>&nbsp;
                        <br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
