<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第273期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第273期）</strong></h5>
<blockquote> 2019/05/20-2019/05/26</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>远不止FBI和CIA——美国情报机构红宝书<br><a target="_blank" href="https://mp.weixin.qq.com/s/AUwNbrUuiE7DldWeK9QcOA">https://mp.weixin.qq.com/s/AUwNbrUuiE7DldWeK9QcOA</a></div><div class="single"><span id="tags">[法规]&nbsp;&nbsp;</span>关于《网络安全审查办法（征求意见稿）》公开征求意见<br><a target="_blank" href="http://www.cac.gov.cn/2019-05/24/c_1124532846.htm">http://www.cac.gov.cn/2019-05/24/c_1124532846.htm</a></div><div class="single"><span id="tags">[观点]&nbsp;&nbsp;</span>网络安全行业不会一家独大<br><a target="_blank" href="https://mp.weixin.qq.com/s/pyJYZZqrdiVjjtCdRaxkOw">https://mp.weixin.qq.com/s/pyJYZZqrdiVjjtCdRaxkOw</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>应急响应实战笔记<br><a target="_blank" href="https://github.com/Bypass007/Emergency-Response-Notes">https://github.com/Bypass007/Emergency-Response-Notes</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2019-0708 Technical Analysis (RDP-RCE)<br><a target="_blank" href="https://wazehell.io/2019/05/22/cve-2019-0708-technical-analysis-rdp-rce/">https://wazehell.io/2019/05/22/cve-2019-0708-technical-analysis-rdp-rce/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>鱼叉攻击-尝试<br><a target="_blank" href="https://payloads.online/archivers/2019-05-21/1?from=timeline">https://payloads.online/archivers/2019-05-21/1?from=timeline</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>域渗透——普通用户权限获得DNS记录<br><a target="_blank" href="https://3gstudent.github.io/%E5%9F%9F%E6%B8%97%E9%80%8F-%E6%99%AE%E9%80%9A%E7%94%A8%E6%88%B7%E6%9D%83%E9%99%90%E8%8E%B7%E5%BE%97DNS%E8%AE%B0%E5%BD%95/">https://3gstudent.github.io/%E5%9F%9F%E6%B8%97%E9%80%8F-%E6%99%AE%E9%80%9A%E7%94%A8%E6%88%B7%E6%9D%83%E9%99%90%E8%8E%B7%E5%BE%97DNS%E8%AE%B0%E5%BD%95/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>蚁剑绕WAF进化图鉴<br><a target="_blank" href="https://mp.weixin.qq.com/s/u8_d8MXvFuwOyIMZZMBsog">https://mp.weixin.qq.com/s/u8_d8MXvFuwOyIMZZMBsog</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span> Acunetix Vulnerability Scanner现可进行网络安全扫描<br><a target="_blank" href="https://nosec.org/home/detail/2651.html">https://nosec.org/home/detail/2651.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>无需括号和分号的XSS<br><a target="_blank" href="https://nosec.org/home/detail/2654.html">https://nosec.org/home/detail/2654.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>CTF中常见编码、代码混淆及加解密<br><a target="_blank" href="https://mp.weixin.qq.com/s/-19rmEhN7T_VQJKYZntHCQ">https://mp.weixin.qq.com/s/-19rmEhN7T_VQJKYZntHCQ</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>分布式web漏洞扫描平台WDScanner v1.1版本发布<br><a target="_blank" href="https://mp.weixin.qq.com/s/ZbahHqET6ePysrqUFgeNYA">https://mp.weixin.qq.com/s/ZbahHqET6ePysrqUFgeNYA</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>RCTF 2019 Web Writeup<br><a target="_blank" href="https://xz.aliyun.com/t/5218">https://xz.aliyun.com/t/5218</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>从后渗透分析应急响应的那些事儿（二）免杀初识篇<br><a target="_blank" href="https://mp.weixin.qq.com/s/BBnbrDQ2EcXbz5AZF6PY8g">https://mp.weixin.qq.com/s/BBnbrDQ2EcXbz5AZF6PY8g</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>如何将XSS漏洞从中危提升到严重<br><a target="_blank" href="https://nosec.org/home/detail/2661.html">https://nosec.org/home/detail/2661.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>深度学习算法地图<br><a target="_blank" href="https://mp.weixin.qq.com/s/fRBdRo8eI1N_bUqh7k7I3A">https://mp.weixin.qq.com/s/fRBdRo8eI1N_bUqh7k7I3A</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span> 我生命中最昂贵的经历：SIM卡移植攻击<br><a target="_blank" href="https://nosec.org/home/detail/2662.html">https://nosec.org/home/detail/2662.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>异常检测的N种方法<br><a target="_blank" href="https://mp.weixin.qq.com/s/w7SbAHxZsmHqFtTG8ZAXNg">https://mp.weixin.qq.com/s/w7SbAHxZsmHqFtTG8ZAXNg</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>第一届HDCTF Write up<br><a target="_blank" href="https://www.anquanke.com/post/id/178909">https://www.anquanke.com/post/id/178909</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Pymetasploit3：使用Python3实现Metasploit自动化<br><a target="_blank" href="https://nosec.org/home/detail/2663.html">https://nosec.org/home/detail/2663.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>智能摄像头安全分析及案例参考<br><a target="_blank" href="https://mp.weixin.qq.com/s/LS125u6qFxUoXm2CwnPepw">https://mp.weixin.qq.com/s/LS125u6qFxUoXm2CwnPepw</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>应急响应笔记<br><a target="_blank" href="https://bypass007.github.io/Emergency-Response-Notes/">https://bypass007.github.io/Emergency-Response-Notes/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Microsoft Edge Renderer Exploitation (CVE-2019-0940). Part 1<br><a target="_blank" href="https://blog.exodusintel.com/2019/05/19/pwn2own-2019-microsoft-edge-renderer-exploitation-cve-2019-9999-part-1/">https://blog.exodusintel.com/2019/05/19/pwn2own-2019-microsoft-edge-renderer-exploitation-cve-2019-9999-part-1/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>APT28分析之CVE-2015-1641样本分析<br><a target="_blank" href="https://xz.aliyun.com/t/5198">https://xz.aliyun.com/t/5198</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>CVE-2019-0803: Win32k Elevation of Privilege Poc<br><a target="_blank" href="https://github.com/ExpLife0011/CVE-2019-0803">https://github.com/ExpLife0011/CVE-2019-0803</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2019-8506 JavaScriptCore exploit<br><a target="_blank" href="http://lordofpwn.kr/index.php/writeup/cve-2019-8506-javascriptcore-exploit/">http://lordofpwn.kr/index.php/writeup/cve-2019-8506-javascriptcore-exploit/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Sojobo - Yet another binary analysis framework<br><a target="_blank" href="https://antonioparata.blogspot.com/2019/05/sojobo-yet-another-binary-analysis.html">https://antonioparata.blogspot.com/2019/05/sojobo-yet-another-binary-analysis.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>jQuery 安全模型解释<br><a target="_blank" href="https://www.cnblogs.com/aichenxy/p/7207319.html">https://www.cnblogs.com/aichenxy/p/7207319.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>APP漏洞利用组合拳——应用克隆案例分析<br><a target="_blank" href="http://blog.nsfocus.net/app-vulnerability-exploitation-combination-boxing/">http://blog.nsfocus.net/app-vulnerability-exploitation-combination-boxing/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>从Zend虚拟机分析PHP加密扩展<br><a target="_blank" href="https://blog.zsxsoft.com/post/40">https://blog.zsxsoft.com/post/40</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>西部数码MyCloud NAS命令执行漏洞<br><a target="_blank" href="https://nosec.org/home/detail/2664.html">https://nosec.org/home/detail/2664.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>iOS/OSX Content Filter Kernel UAF Analysis + POC<br><a target="_blank" href="https://blog.zecops.com/vulnerabilities/analysis-and-poc-of-content-filter-kernel-use-after-free/">https://blog.zecops.com/vulnerabilities/analysis-and-poc-of-content-filter-kernel-use-after-free/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>CheckVM-Sandbox<br><a target="_blank" href="https://github.com/sharepub/CheckVM-Sandbox">https://github.com/sharepub/CheckVM-Sandbox</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Hacking Facebook the Hard Way<br><a target="_blank" href="https://www.symbo1.com/articles/2019/05/21/hacking-facebook-the-hard-way.html">https://www.symbo1.com/articles/2019/05/21/hacking-facebook-the-hard-way.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Awesome-Cellular-Hacking<br><a target="_blank" href="https://github.com/W00t3k/Awesome-Cellular-Hacking">https://github.com/W00t3k/Awesome-Cellular-Hacking</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Injecting shellcode into x64 ELF binaries<br><a target="_blank" href="https://www.matteomalvica.com/blog/2019/05/18/elf-injection/">https://www.matteomalvica.com/blog/2019/05/18/elf-injection/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>XSS without parentheses and semi-colons<br><a target="_blank" href="https://portswigger.net/blog/xss-without-parentheses-and-semi-colons">https://portswigger.net/blog/xss-without-parentheses-and-semi-colons</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Reverse Engineering the iClicker Base Station<br><a target="_blank" href="https://blog.ammaraskar.com/iclicker-reverse-engineering/">https://blog.ammaraskar.com/iclicker-reverse-engineering/</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>国赛-bbvvmm-SM4逆向分析，虚拟机指令分析<br><a target="_blank" href="https://xz.aliyun.com/t/5195">https://xz.aliyun.com/t/5195</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Stealing Downloads from Slack Users<br><a target="_blank" href="https://medium.com/tenable-techblog/stealing-downloads-from-slack-users-be6829a55f63">https://medium.com/tenable-techblog/stealing-downloads-from-slack-users-be6829a55f63</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Using the Exception Directory to find GetProcAddress<br><a target="_blank" href="https://modexp.wordpress.com/2019/05/19/shellcode-getprocaddress/">https://modexp.wordpress.com/2019/05/19/shellcode-getprocaddress/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Reversing Golang Binaries: Part-1<br><a target="_blank" href="https://medium.com/@nishanmaharjan17/reversing-golang-binaries-part-1-c273b2ca5333">https://medium.com/@nishanmaharjan17/reversing-golang-binaries-part-1-c273b2ca5333</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>【移动安全】移动应用安全基础篇——破掉iOS加密数据<br><a target="_blank" href="https://mp.weixin.qq.com/s/e2DQ18txynHqwplCROsoEA">https://mp.weixin.qq.com/s/e2DQ18txynHqwplCROsoEA</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>ESCAPING THE CHROME SANDBOX WITH A WIN32K NDAY<br><a target="_blank" href="https://blog.exodusintel.com/2019/05/17/windows-within-windows/">https://blog.exodusintel.com/2019/05/17/windows-within-windows/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>2000day in Safari<br><a target="_blank" href="https://speakerdeck.com/bo0om/2000day-in-safari">https://speakerdeck.com/bo0om/2000day-in-safari</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>SonarQube踩坑记<br><a target="_blank" href="https://bloodzer0.github.io/ossa/application-security/code-audit/sonarqube-error/">https://bloodzer0.github.io/ossa/application-security/code-audit/sonarqube-error/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Even more secret Telegrams<br><a target="_blank" href="https://medium.com/@labunskya/secret-telegrams-bdd2035b6e84">https://medium.com/@labunskya/secret-telegrams-bdd2035b6e84</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Is MIME Sniffing XSS a real thing?<br><a target="_blank" href="https://www.komodosec.com/post/mime-sniffing-xss">https://www.komodosec.com/post/mime-sniffing-xss</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>XSSed my way to 1000$<br><a target="_blank" href="https://gauravnarwani.com/xssed-my-way-to-1000/">https://gauravnarwani.com/xssed-my-way-to-1000/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Getting Into Browser Exploitation<br><a target="_blank" href="https://liveoverflow.com/getting-into-browser-exploitation-new-series-introduction-browser-0x00/">https://liveoverflow.com/getting-into-browser-exploitation-new-series-introduction-browser-0x00/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>An extremely insecure Ethereum cryptowallet<br><a target="_blank" href="https://gitlab.com/badbounty/dvcw">https://gitlab.com/badbounty/dvcw</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Details of SIM port hack<br><a target="_blank" href="https://medium.com/coinmonks/the-most-expensive-lesson-of-my-life-details-of-sim-port-hack-35de11517124?sk=4c29b27bacb2eff038ec8fe4d40cd615">https://medium.com/coinmonks/the-most-expensive-lesson-of-my-life-details-of-sim-port-hack-35de11517124?sk=4c29b27bacb2eff038ec8fe4d40cd615</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>WD My Cloud RCE<br><a target="_blank" href="https://bnbdr.github.io/posts/wd/">https://bnbdr.github.io/posts/wd/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Reversing Golang Binaries: Part-2<br><a target="_blank" href="https://medium.com/@nishanmaharjan17/reversing-golang-binaries-part-2-26f522264d01">https://medium.com/@nishanmaharjan17/reversing-golang-binaries-part-2-26f522264d01</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Calling iOS Native Functions from Python Using Frida and RPC<br><a target="_blank" href="https://grepharder.github.io/blog/0x04_calling_ios_native_functions_from_python_using_frida_and_rpc.html">https://grepharder.github.io/blog/0x04_calling_ios_native_functions_from_python_using_frida_and_rpc.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>LFI ON PRODUCTION SERVERS in &quot;springboard.google.com&quot; – $13,337USD<br><a target="_blank" href="https://omespino.com/write-up-google-bug-bounty-lfi-on-production-servers-in-redacted-google-com-13337-usd/">https://omespino.com/write-up-google-bug-bounty-lfi-on-production-servers-in-redacted-google-com-13337-usd/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>AWS Security Incident Response Guide<br><a target="_blank" href="https://d1.awsstatic.com/whitepapers/aws_security_incident_response.pdf">https://d1.awsstatic.com/whitepapers/aws_security_incident_response.pdf</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Incident response at your fingertips with Microsoft Defender ATP live response<br><a target="_blank" href="https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Incident-response-at-your-fingertips-with-Microsoft-Defender-ATP/ba-p/614894">https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Incident-response-at-your-fingertips-with-Microsoft-Defender-ATP/ba-p/614894</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Linux Privilege Escalation via LXD &amp; Hijacked UNIX Socket Credentials<br><a target="_blank" href="https://shenaniganslabs.io/2019/05/21/LXD-LPE.html">https://shenaniganslabs.io/2019/05/21/LXD-LPE.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>A Curious Case of Malwarebytes<br><a target="_blank" href="https://0x00sec.org/t/a-curious-case-of-malwarebytes/13746">https://0x00sec.org/t/a-curious-case-of-malwarebytes/13746</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>The Tier of Threat Actors – Cheatsheet<br><a target="_blank" href="https://itblogr.com/tier-of-threat-actors-cheatsheet/">https://itblogr.com/tier-of-threat-actors-cheatsheet/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>yurita: Anomaly detection framework @ PayPal<br><a target="_blank" href="https://github.com/paypal/yurita">https://github.com/paypal/yurita</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>How to Create a Malware Detection System With Machine Learning<br><a target="_blank" href="https://www.evilsocket.net/2019/05/22/How-to-create-a-Malware-detection-system-with-Machine-Learning/">https://www.evilsocket.net/2019/05/22/How-to-create-a-Malware-detection-system-with-Machine-Learning/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Fun With Custom URI Schemes<br><a target="_blank" href="https://zeropwn.github.io/2019-05-22-fun-with-uri-handlers/">https://zeropwn.github.io/2019-05-22-fun-with-uri-handlers/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>DataCon 2019: 1st place solution of malicious DNS traffic &amp; DGA analysis<br><a target="_blank" href="https://www.cdxy.me/?p=806">https://www.cdxy.me/?p=806</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>智能威胁分析之图数据构建<br><a target="_blank" href="https://mp.weixin.qq.com/s/15Avw3KTnmGIftxYhK34mQ">https://mp.weixin.qq.com/s/15Avw3KTnmGIftxYhK34mQ</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Make Redirection Evil Again: URL Parser Issues in OAuth<br><a target="_blank" href="https://www.tttang.com/archive/1290/">https://www.tttang.com/archive/1290/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>Detecting Patterns with Unsupervised Learning<br><a target="_blank" href="https://medium.com/code-gin/detecting-patterns-with-unsupervised-learning-88ba737d4f34">https://medium.com/code-gin/detecting-patterns-with-unsupervised-learning-88ba737d4f34</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/273">SecWiki周刊(第273期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
