<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第62期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第62期）</strong></h5>
<blockquote> 2015/05/04-2015/05/10</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>FIDO: Automated Security Incident Response<br><a target="_blank" href="http://techblog.netflix.com/2015/05/introducing-fido-automated-security.html">http://techblog.netflix.com/2015/05/introducing-fido-automated-security.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>硅谷夜话之RSA2015 （1）<br><a target="_blank" href="http://weibo.com/p/1001603840227939594309">http://weibo.com/p/1001603840227939594309</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>2015网络安全市场报告（下）<br><a target="_blank" href="http://www.freebuf.com/news/special/66278.html">http://www.freebuf.com/news/special/66278.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>国家安全法(草案二次审议稿)<br><a target="_blank" href="http://www.npc.gov.cn/npc/xinwen/lfgz/flca/2015-05/06/content_1935766.htm">http://www.npc.gov.cn/npc/xinwen/lfgz/flca/2015-05/06/content_1935766.htm</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>Fuzzing nginx - Hunting vulnerabilities with afl-fuzz<br><a target="_blank" href="https://lolware.net/2015/04/28/nginx-fuzzing.html">https://lolware.net/2015/04/28/nginx-fuzzing.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>安卓APP动态调试-IDA实用攻略<br><a target="_blank" href="http://drops.wooyun.org/mobile/5942">http://drops.wooyun.org/mobile/5942</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>WPS Pixie Dust Attack (Offline WPS Attack)<br><a target="_blank" href="https://forums.kali.org/showthread.php?24286">https://forums.kali.org/showthread.php?24286</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>XSS via window.stop() - Google Safen Up<br><a target="_blank" href="http://blog.bentkowski.info/2015/05/xss-via-windowstop-google-safen-up.html?m=1">http://blog.bentkowski.info/2015/05/xss-via-windowstop-google-safen-up.html?m=1</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android Native API Hooking with Library Injection and ELF Introspection<br><a target="_blank" href="http://www.evilsocket.net/2015/05/04/android-native-api-hooking-with-library-injecto/">http://www.evilsocket.net/2015/05/04/android-native-api-hooking-with-library-injecto/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>浅谈加密这把双刃剑<br><a target="_blank" href="http://www.vonwei.com/post/ctb-locker.html">http://www.vonwei.com/post/ctb-locker.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>xKungFoo 2015 PPT<br><a target="_blank" href="http://xkungfoo.org/%E5%AE%98%E7%BD%91%E5%8F%91%E5%B8%83%E7%89%88.rar">http://xkungfoo.org/%E5%AE%98%E7%BD%91%E5%8F%91%E5%B8%83%E7%89%88.rar</a></div><div class="single"><span id="tags">[书籍]&nbsp;&nbsp;</span>scikit-learn-book<br><a target="_blank" href="http://nbviewer.ipython.org/github/gmonce/scikit-learn-book/tree/master/">http://nbviewer.ipython.org/github/gmonce/scikit-learn-book/tree/master/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>ctf-tools:Some setup scripts for security research tools<br><a target="_blank" href="https://github.com/zardus/ctf-tools">https://github.com/zardus/ctf-tools</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>IIS at Risk: An In-depth Look into CVE-2015-1635<br><a target="_blank" href="http://blog.trendmicro.com/trendlabs-security-intelligence/iis-at-risk-an-in-depth-look-into-cve-2015-1635/">http://blog.trendmicro.com/trendlabs-security-intelligence/iis-at-risk-an-in-depth-look-into-cve-2015-1635/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>隐藏在显存中的基于GPU的rootkit和键盘记录器 <br><a target="_blank" href="https://0xicf.wordpress.com/2015/05/09/new-gpu-based-linux-rootkit-and-keylogger-proof-of-concept-gpu-rootkit-hides-in-vram-snoops-system-activities/">https://0xicf.wordpress.com/2015/05/09/new-gpu-based-linux-rootkit-and-keylogger-proof-of-concept-gpu-rootkit-hides-in-vram-snoops-system-activities/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>SSL/TLS协议安全系列：SSL/TLS概述<br><a target="_blank" href="http://drops.wooyun.org/tips/6002">http://drops.wooyun.org/tips/6002</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>一例“无实体文件”恶意样本分析报告<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MjM5MTA3Nzk4MQ==&amp;amp;mid=207025811&amp;amp;idx=1&amp;amp;sn=76130bdd0d6273af23f234e13faa160f#rd">http://mp.weixin.qq.com/s?__biz=MjM5MTA3Nzk4MQ==&amp;amp;mid=207025811&amp;amp;idx=1&amp;amp;sn=76130bdd0d6273af23f234e13faa160f#rd</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Attacking POS Supply Chains<br><a target="_blank" href="https://blogs.rsa.com/attacking-a-pos-supply-chain-part-1/">https://blogs.rsa.com/attacking-a-pos-supply-chain-part-1/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Tinba - Yet another anti-sandbox tricks<br><a target="_blank" href="https://www.f-secure.com/weblog/archives/00002810.html">https://www.f-secure.com/weblog/archives/00002810.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>New malicious Office docs trick<br><a target="_blank" href="http://bartblaze.blogspot.com/2015/05/new-malicious-office-docs-trick.html">http://bartblaze.blogspot.com/2015/05/new-malicious-office-docs-trick.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>On the Arms Race in Spamming Botnet Mitigation<br><a target="_blank" href="http://blog.ourren.com/2015/05/08/on-the-arms-race-in-spamming-botnet-mitigation/">http://blog.ourren.com/2015/05/08/on-the-arms-race-in-spamming-botnet-mitigation/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>commix:Automated All-in-One OS Command Injection and Exploitation Tool<br><a target="_blank" href="https://github.com/stasinopoulos/commix">https://github.com/stasinopoulos/commix</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Python tools for penetration testers<br><a target="_blank" href="https://github.com/dloss/python-pentest-tools">https://github.com/dloss/python-pentest-tools</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>jellyfish:Linux based userland gpu rootkit<br><a target="_blank" href="https://github.com/x0r1/jellyfish">https://github.com/x0r1/jellyfish</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>pfSense: free network firewall distribution<br><a target="_blank" href="https://www.pfsense.org/">https://www.pfsense.org/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>云端博弈——木马屠城<br><a target="_blank" href="http://security.tencent.com/index.php/blog/msg/83">http://security.tencent.com/index.php/blog/msg/83</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>armpwn:memory corruption on the ARM platform<br><a target="_blank" href="https://github.com/saelo/armpwn">https://github.com/saelo/armpwn</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Instrumenting Android Applications with Frida<br><a target="_blank" href="http://www.frida.re/news/2015/05/09/frida-4-0-0-released/">http://www.frida.re/news/2015/05/09/frida-4-0-0-released/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>CYBERSECURITY MARKET REPORT <br><a target="_blank" href="http://www.valleytalk.org/2015/05/05/cybersecurity-market-report/">http://www.valleytalk.org/2015/05/05/cybersecurity-market-report/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Forcing XXE Reflection through Server Error Messages<br><a target="_blank" href="https://blog.netspi.com/forcing-xxe-reflection-server-error-messages/">https://blog.netspi.com/forcing-xxe-reflection-server-error-messages/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Dynamically inject a shared library into a running process on Android/ARM<br><a target="_blank" href="http://www.evilsocket.net/2015/05/01/dynamically-inject-a-shared-library-into-a-running-process-on-androidarm/#sthash.P013X45P.dpbs">http://www.evilsocket.net/2015/05/01/dynamically-inject-a-shared-library-into-a-running-process-on-androidarm/#sthash.P013X45P.dpbs</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Deploying Dionaea on a Raspberry Pi using MHN<br><a target="_blank" href="https://github.com/threatstream/mhn/wiki/Deploying-Dionaea-on-a-Raspberry-Pi">https://github.com/threatstream/mhn/wiki/Deploying-Dionaea-on-a-Raspberry-Pi</a></div><div class="single"><span id="tags">[书籍]&nbsp;&nbsp;</span>Ios App Reverse Engineering<br><a target="_blank" href="http://www.lulu.com/shop/zishe-sha/ios-app-reverse-engineering/ebook/product-22147315.html">http://www.lulu.com/shop/zishe-sha/ios-app-reverse-engineering/ebook/product-22147315.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>malice:VirusTotal Wanna Be<br><a target="_blank" href="https://github.com/blacktop/malice">https://github.com/blacktop/malice</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Finding targets in drone and quadcopter video streams<br><a target="_blank" href="http://www.pyimagesearch.com/2015/05/04/target-acquired-finding-targets-in-drone-and-quadcopter-video-streams-using-python-and-opencv/">http://www.pyimagesearch.com/2015/05/04/target-acquired-finding-targets-in-drone-and-quadcopter-video-streams-using-python-and-opencv/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>dumplib:Windows Kernel Dump Analyzer<br><a target="_blank" href="https://github.com/nforest/dumplib">https://github.com/nforest/dumplib</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Windows Kernel Exploitation Humla Mumbai<br><a target="_blank" href="http://null.co.in/2015/05/07/windows-kernel-exploitation-hacksys-extreme-vulnerable-driver/">http://null.co.in/2015/05/07/windows-kernel-exploitation-hacksys-extreme-vulnerable-driver/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>OfficeDissector: parser library for static security analysis of Office <br><a target="_blank" href="https://github.com/grierforensics/officedissector">https://github.com/grierforensics/officedissector</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Many ways of malware persistence<br><a target="_blank" href="http://jumpespjump.blogspot.com/2015/05/many-ways-of-malware-persistence-that.html">http://jumpespjump.blogspot.com/2015/05/many-ways-of-malware-persistence-that.html</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>(IN)SECURE Magazine：RSA 2015 SPECIAL ISSUE<br><a target="_blank" href="http://www.net-security.org/insecuremag.php">http://www.net-security.org/insecuremag.php</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>IE安全系列：脚本先锋（II）<br><a target="_blank" href="http://drops.wooyun.org/tips/5765">http://drops.wooyun.org/tips/5765</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/62">SecWiki周刊(第62期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
