<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第33期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第33期）</strong></h5>
<blockquote> 2014/10/13-2014/10/19</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>CTF365 Beta Started <br><a target="_blank" href="http://blog.ctf365.com/ctf365-beta-started/">http://blog.ctf365.com/ctf365-beta-started/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>This POODLE bites: exploiting the SSL 3.0 fallback<br><a target="_blank" href="http://googleonlinesecurity.blogspot.hk/2014/10/this-poodle-bites-exploiting-ssl-30.html">http://googleonlinesecurity.blogspot.hk/2014/10/this-poodle-bites-exploiting-ssl-30.html</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>PEDA:Python Exploit Development Assistance for GDB<br><a target="_blank" href="http://ropshell.com/peda/">http://ropshell.com/peda/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Breakpoint 2014 Slides<br><a target="_blank" href="https://ruxconbreakpoint.com/slides/">https://ruxconbreakpoint.com/slides/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>POODLE漏洞分析<br><a target="_blank" href="http://blog.vulnhunt.com/index.php/2014/10/16/poodle%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/">http://blog.vulnhunt.com/index.php/2014/10/16/poodle%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>《安全参考》HACKCTO-201410-22<br><a target="_blank" href="http://www.hackcto.com/post/2014-10-15/40063170495">http://www.hackcto.com/post/2014-10-15/40063170495</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Easy RM to MP3 Converter(2.7.3.700)栈溢出漏洞调试笔记<br><a target="_blank" href="http://drops.wooyun.org/papers/3178">http://drops.wooyun.org/papers/3178</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Win64bit提权0day漏洞（CVE-2014-4113）的样本<br><a target="_blank" href="http://acibqjug4v.l3.yunpan.cn/lk/csfuISUqtG2iX">http://acibqjug4v.l3.yunpan.cn/lk/csfuISUqtG2iX</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Alictf linux exploit解题<br><a target="_blank" href="http://www.91ri.org/11043.html">http://www.91ri.org/11043.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>从Dump到POC系列一:Win32k内核提权漏洞分析<br><a target="_blank" href="http://blogs.360.cn/blog/dump-to-poc-to-win32k-kernel-privilege-escalation-vulnerability/">http://blogs.360.cn/blog/dump-to-poc-to-win32k-kernel-privilege-escalation-vulnerability/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Sandworm to Blacken: The SCADA Connection<br><a target="_blank" href="http://blog.trendmicro.com/trendlabs-security-intelligence/sandworm-to-blacken-the-scada-connection/">http://blog.trendmicro.com/trendlabs-security-intelligence/sandworm-to-blacken-the-scada-connection/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>CCNP Security Firewall Day 01 ASA Intro, Basic fundation<br><a target="_blank" href="http://pan.baidu.com/s/1dD6E9eL">http://pan.baidu.com/s/1dD6E9eL</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>uxss在线测试页面<br><a target="_blank" href="https://github.com/click1/uxss">https://github.com/click1/uxss</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Metasploitable 2 Exploitability Guide<br><a target="_blank" href="https://community.rapid7.com/docs/DOC-1875">https://community.rapid7.com/docs/DOC-1875</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>开源大数据查询分析引擎现状<br><a target="_blank" href="http://yepeng.blog.51cto.com/3101105/1565691">http://yepeng.blog.51cto.com/3101105/1565691</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>如何构建工程师文化团队<br><a target="_blank" href="http://vdisk.weibo.com/s/A0GI9rXObEQn/1413455046">http://vdisk.weibo.com/s/A0GI9rXObEQn/1413455046</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>SANDWORM APT Windows OLE PACKAGE INF 0day来袭<br><a target="_blank" href="http://blog.vulnhunt.com/index.php/2014/10/14/cve-2014-4114_sandworm-apt-windows-ole-package-inf-arbitrary-code-execution/">http://blog.vulnhunt.com/index.php/2014/10/14/cve-2014-4114_sandworm-apt-windows-ole-package-inf-arbitrary-code-execution/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>MS14-063 – FastFat vulnerability fixed years ago<br><a target="_blank" href="http://blog.beyondtrust.com/ms14-063-fastfat-vulnerability-fixed-years-ago">http://blog.beyondtrust.com/ms14-063-fastfat-vulnerability-fixed-years-ago</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>QCon隐私和安全性<br><a target="_blank" href="http://vdisk.weibo.com/s/A0GI9rXObuzs/1413624007">http://vdisk.weibo.com/s/A0GI9rXObuzs/1413624007</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span> Analysis of SandWorm (CVE-2014-4124) 0-Day<br><a target="_blank" href="http://research.zscaler.com/2014/10/analysis-of-sandworm-cve-2014-4124-0-day.html">http://research.zscaler.com/2014/10/analysis-of-sandworm-cve-2014-4124-0-day.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>论持久战——带你走进腾讯DDoS防护体系<br><a target="_blank" href="http://security.tencent.com/index.php/blog/msg/71">http://security.tencent.com/index.php/blog/msg/71</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>Hadoop，超越MapReduce<br><a target="_blank" href="http://vdisk.weibo.com/s/A0GI9rXObTJj/1413450007">http://vdisk.weibo.com/s/A0GI9rXObTJj/1413450007</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Two Limited, Targeted Attacks; Two New Zero-Days<br><a target="_blank" href="http://www.fireeye.com/blog/technical/targeted-attack/2014/10/two-targeted-attacks-two-new-zero-days.html">http://www.fireeye.com/blog/technical/targeted-attack/2014/10/two-targeted-attacks-two-new-zero-days.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>破壳漏洞（ShellShock）应急概要 最终版V4<br><a target="_blank" href="http://blog.knownsec.com/2014/10/shellshock_response_profile_v4/">http://blog.knownsec.com/2014/10/shellshock_response_profile_v4/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Drupal 7.x SQL Injection exp (CVE-2014-3704)<br><a target="_blank" href="http://www.unhonker.com/bug/1666.html">http://www.unhonker.com/bug/1666.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>RecSys 2014 Sessions<br><a target="_blank" href="https://www.youtube.com/playlist?list=PLaZufLfJumb9A95nS5AmY6G5mqYnwIfZX">https://www.youtube.com/playlist?list=PLaZufLfJumb9A95nS5AmY6G5mqYnwIfZX</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>DROPBOX.COM HACKED First Teaser<br><a target="_blank" href="http://pastebin.com/aRgTJzzg">http://pastebin.com/aRgTJzzg</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android常见缺陷<br><a target="_blank" href="http://vdisk.weibo.com/s/annw3IyYhcN24/1413175971">http://vdisk.weibo.com/s/annw3IyYhcN24/1413175971</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>PHP扩展开发入门<br><a target="_blank" href="http://blog.csdn.net/heiyeshuwu/article/details/40041601">http://blog.csdn.net/heiyeshuwu/article/details/40041601</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>SSLStrip 的未来 —— HTTPS 前端劫持<br><a target="_blank" href="http://www.cnblogs.com/index-html/p/ssl-frontend-hijack.html">http://www.cnblogs.com/index-html/p/ssl-frontend-hijack.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Hack in the Box 2014 CTF Writeup<br><a target="_blank" href="http://blog.orange.tw/2014/10/hack-in-box-2014-ctf-writeup-keygenme.html">http://blog.orange.tw/2014/10/hack-in-box-2014-ctf-writeup-keygenme.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>沙虫事件木马分析：BlackEnergy Use in 0day Attack CVE-2014-4114<br><a target="_blank" href="http://blog.vulnhunt.com/index.php/2014/10/16/blackenergy-use-in-0day-attack-cve-2014-4114/">http://blog.vulnhunt.com/index.php/2014/10/16/blackenergy-use-in-0day-attack-cve-2014-4114/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Bypassing WAFs with SVG<br><a target="_blank" href="https://www.securusglobal.com/community/2014/10/13/bypassing-wafs-with-svg/">https://www.securusglobal.com/community/2014/10/13/bypassing-wafs-with-svg/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android UXSS阶段性小结及自动化测试<br><a target="_blank" href="http://drops.wooyun.org/tools/3186">http://drops.wooyun.org/tools/3186</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>asis-ctf-finals-2014  write-ups<br><a target="_blank" href="https://github.com/ctfs/write-ups/tree/master/asis-ctf-finals-2014#readme">https://github.com/ctfs/write-ups/tree/master/asis-ctf-finals-2014#readme</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>DataTables: Table plug-in for jQuery<br><a target="_blank" href="http://www.datatables.net/">http://www.datatables.net/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>An Analysis of Windows Zero-day Vulnerability ‘CVE-2014-4114’ aka <br><a target="_blank" href="http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-windows-zero-day-vulnerability-cve-2014-4114-aka-sandworm/">http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-windows-zero-day-vulnerability-cve-2014-4114-aka-sandworm/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>沙虫（CVE-2014-4114）相关威胁综合分析报告<br><a target="_blank" href="http://www.antiy.com/response/cve-2014-4114.html?from=timeline&amp;isappinstalled=0">http://www.antiy.com/response/cve-2014-4114.html?from=timeline&amp;isappinstalled=0</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>CSAW CTF 2014 VM<br><a target="_blank" href="https://isisblogs.poly.edu/2014/10/14/csaw-ctf-2014-vm/">https://isisblogs.poly.edu/2014/10/14/csaw-ctf-2014-vm/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>POODLE attacks on SSLv3 <br><a target="_blank" href="https://www.imperialviolet.org/2014/10/14/poodle.html">https://www.imperialviolet.org/2014/10/14/poodle.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Drupal SQL Injection Attempts in the Wild<br><a target="_blank" href="http://blog.sucuri.net/2014/10/drupal-sql-injection-attempts-in-the-wild.html">http://blog.sucuri.net/2014/10/drupal-sql-injection-attempts-in-the-wild.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Hammer:A web vulnnerability scanner<br><a target="_blank" href="https://github.com/yangbh/Hammer">https://github.com/yangbh/Hammer</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>The CERT Oracle Coding Standard for Java-Android<br><a target="_blank" href="https://www.securecoding.cert.org/confluence/pages/viewpage.action?pageId=111509535">https://www.securecoding.cert.org/confluence/pages/viewpage.action?pageId=111509535</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Web流量劫持 —— 思维脑图<br><a target="_blank" href="http://naotu.baidu.com/viewshare.html?shareId=aqn87r5unwss">http://naotu.baidu.com/viewshare.html?shareId=aqn87r5unwss</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Ghostery:Transparency + Control = Privacy<br><a target="_blank" href="https://www.ghostery.com/en/">https://www.ghostery.com/en/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>rsync的几则tips<br><a target="_blank" href="http://phpsec.sinaapp.com/?p=245">http://phpsec.sinaapp.com/?p=245</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Malware Analysis: Case Study<br><a target="_blank" href="https://www.notsosecure.com/blog/2014/10/16/malware-analysis/">https://www.notsosecure.com/blog/2014/10/16/malware-analysis/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>手机百度前端工程化之路<br><a target="_blank" href="http://qdemo.sinaapp.com/box-fe-road.htm#0">http://qdemo.sinaapp.com/box-fe-road.htm#0</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>知名移动应用案例分析<br><a target="_blank" href="http://vdisk.weibo.com/s/A0GI9rXObTJY/1413439994">http://vdisk.weibo.com/s/A0GI9rXObTJY/1413439994</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>蔡学镛架构设计方法-2014-8-17<br><a target="_blank" href="http://vdisk.weibo.com/s/q8FZMJO4W2qq">http://vdisk.weibo.com/s/q8FZMJO4W2qq</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Drupal 7.31 pre Auth SQL Injection Vulnerability<br><a target="_blank" href="https://www.sektioneins.de/en/blog/14-10-15-drupal-sql-injection-vulnerability.html">https://www.sektioneins.de/en/blog/14-10-15-drupal-sql-injection-vulnerability.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>XXE Attacks<br><a target="_blank" href="http://resources.infosecinstitute.com/xxe-attacks/">http://resources.infosecinstitute.com/xxe-attacks/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Drupal - pre Auth SQL Injection Vulnerability<br><a target="_blank" href="http://drops.wooyun.org/papers/3197">http://drops.wooyun.org/papers/3197</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/33">SecWiki周刊(第33期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
