<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第265期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第265期）</strong></h5>
<blockquote> 2019/03/25-2019/03/31</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[事件]&nbsp;&nbsp;</span>美国230万灾难幸存者隐私信息恐遭泄露<br><a target="_blank" href="https://nosec.org/home/detail/2396.html">https://nosec.org/home/detail/2396.html</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Coablt strike官方教程中文译版本<br><a target="_blank" href="https://backlion.cnblogs.com/p/10616308.html?from=timeline">https://backlion.cnblogs.com/p/10616308.html?from=timeline</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>谷歌论坛的越权漏洞（500美金）<br><a target="_blank" href="https://nosec.org/home/detail/2419.html">https://nosec.org/home/detail/2419.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>VMware 本地权限提升<br><a target="_blank" href="https://bugs.chromium.org/p/project-zero/issues/detail?id=1733">https://bugs.chromium.org/p/project-zero/issues/detail?id=1733</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>勒索病毒应急响应 自救手册（第二版）<br><a target="_blank" href="https://www.anquanke.com/post/id/175550">https://www.anquanke.com/post/id/175550</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Osquery检测入侵痕迹<br><a target="_blank" href="https://evilanne.github.io/2019/02/20/Osquery%E6%A3%80%E6%B5%8B%E5%85%A5%E4%BE%B5%E7%97%95%E8%BF%B9/">https://evilanne.github.io/2019/02/20/Osquery%E6%A3%80%E6%B5%8B%E5%85%A5%E4%BE%B5%E7%97%95%E8%BF%B9/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>利用BadUSB控制整个网络<br><a target="_blank" href="https://nosec.org/home/detail/2425.html">https://nosec.org/home/detail/2425.html</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>SearchApp: 小型网络空间搜索引擎<br><a target="_blank" href="https://github.com/imjdl/SearchApp">https://github.com/imjdl/SearchApp</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Pwn2Own 2019 Firefox 远程代码执行漏洞(CVE-2019-9810)的 POC<br><a target="_blank" href="https://github.com/xuechiyaobai/CVE-2019-9810-PoC/">https://github.com/xuechiyaobai/CVE-2019-9810-PoC/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>小师妹聊安全标准（二）<br><a target="_blank" href="https://www.freebuf.com/articles/es/199084.html">https://www.freebuf.com/articles/es/199084.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>详解Laravel 5.8 SQL注入漏洞<br><a target="_blank" href="https://nosec.org/home/detail/2395.html">https://nosec.org/home/detail/2395.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>IoT 设备固件分析之网络协议 fuzz<br><a target="_blank" href="https://mp.weixin.qq.com/s/5gwJpqj7ysue19OcoPI16A">https://mp.weixin.qq.com/s/5gwJpqj7ysue19OcoPI16A</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>PayPal旗下Braintree网站的“不寻常”漏洞（3200美金）<br><a target="_blank" href="https://nosec.org/home/detail/2420.html">https://nosec.org/home/detail/2420.html</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Linux CTF 二进制挑战的详细逆向工程分析<br><a target="_blank" href="https://blog.kartone.ninja/2019/03/25/when-a-reverse-me-ctf-binary-makes-you-loose-that-job/">https://blog.kartone.ninja/2019/03/25/when-a-reverse-me-ctf-binary-makes-you-loose-that-job/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>初入甲方的企业安全建设规划<br><a target="_blank" href="https://www.freebuf.com/articles/es/198597.html">https://www.freebuf.com/articles/es/198597.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>一篇域攻击文章的复现<br><a target="_blank" href="https://xz.aliyun.com/t/4441">https://xz.aliyun.com/t/4441</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>通过漏洞利用模版使漏洞利用自动化<br><a target="_blank" href="https://www.4hou.com/web/16902.html">https://www.4hou.com/web/16902.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>阿里云和谷歌（1300美金）的XSS漏洞<br><a target="_blank" href="https://nosec.org/home/detail/2402.html">https://nosec.org/home/detail/2402.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>以攻促防：企业蓝军建设思考<br><a target="_blank" href="https://mp.weixin.qq.com/s/8iJs2ON66NY1Jdbt7c-BTA">https://mp.weixin.qq.com/s/8iJs2ON66NY1Jdbt7c-BTA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>寻找隐藏在CloudFlare和Tor后的真实IP<br><a target="_blank" href="https://nosec.org/home/detail/2405.html">https://nosec.org/home/detail/2405.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Google 基础架构安全设计概述<br><a target="_blank" href="https://mp.weixin.qq.com/s/MOJCYDN-W9KObOZpc6kx1g">https://mp.weixin.qq.com/s/MOJCYDN-W9KObOZpc6kx1g</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>cve-2019-0808-poc<br><a target="_blank" href="https://github.com/ze0r/cve-2019-0808-poc/">https://github.com/ze0r/cve-2019-0808-poc/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>社工攻击-BadUSB攻防<br><a target="_blank" href="https://mp.weixin.qq.com/s/R4MdPVTOqUNg8-1HSOyQzw">https://mp.weixin.qq.com/s/R4MdPVTOqUNg8-1HSOyQzw</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>红队基础建设:隐藏你的C2 server<br><a target="_blank" href="https://xz.aliyun.com/t/4509">https://xz.aliyun.com/t/4509</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>点融NIDS实践 <br><a target="_blank" href="http://www.ebwill.com/2018/09/10/DR_NIDS/">http://www.ebwill.com/2018/09/10/DR_NIDS/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>软件供应链来源攻击分析报告<br><a target="_blank" href="https://mp.weixin.qq.com/s/If_Q0BlIZTiYp_7d1zJMWw">https://mp.weixin.qq.com/s/If_Q0BlIZTiYp_7d1zJMWw</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>酷炫的深度学习网络图画法<br><a target="_blank" href="https://bigquant.com/community/t/topic/150804">https://bigquant.com/community/t/topic/150804</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>automated-pentest-自动化扫描和生成渗透测试报告的 Parrot OS 系统容器<br><a target="_blank" href="https://github.com/vishnudxb/automated-pentest">https://github.com/vishnudxb/automated-pentest</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>GithubMonitor: 关键词监控GitHub泄漏<br><a target="_blank" href="https://github.com/Macr0phag3/GithubMonitor">https://github.com/Macr0phag3/GithubMonitor</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>使用 BadUSB 攻击路由设备控制目标网络<br><a target="_blank" href="https://medium.com/tenable-techblog/owning-the-network-with-badusb-72daa45d1b00">https://medium.com/tenable-techblog/owning-the-network-with-badusb-72daa45d1b00</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Druid拦截功能的配置与简单绕过<br><a target="_blank" href="https://mp.weixin.qq.com/s/lGalf63VXCva2I5BpmSMgQ">https://mp.weixin.qq.com/s/lGalf63VXCva2I5BpmSMgQ</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>browspy: 浏览器用户全部信息收集JavaScript<br><a target="_blank" href="https://github.com/Urinx/browspy">https://github.com/Urinx/browspy</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>基于机器学习的Web日志异常检测实践 <br><a target="_blank" href="https://www.wzsite.cn/2018/10/22/%E5%9F%BA%E4%BA%8E%E6%9C%BA%E5%99%A8%E5%AD%A6%E4%B9%A0%E7%9A%84Web%E6%97%A5%E5%BF%97%E5%BC%82%E5%B8%B8%E6%A3%80%E6%B5%8B%E5%AE%9E%E8%B7%B5/">https://www.wzsite.cn/2018/10/22/%E5%9F%BA%E4%BA%8E%E6%9C%BA%E5%99%A8%E5%AD%A6%E4%B9%A0%E7%9A%84Web%E6%97%A5%E5%BF%97%E5%BC%82%E5%B8%B8%E6%A3%80%E6%B5%8B%E5%AE%9E%E8%B7%B5/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Tomcat变体利用：host-manager<br><a target="_blank" href="https://xz.aliyun.com/t/4435">https://xz.aliyun.com/t/4435</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>OSINT Primer：域名（第1部分）<br><a target="_blank" href="https://xz.aliyun.com/t/4504">https://xz.aliyun.com/t/4504</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>对泄漏的未初始化内核内存的取证分析<br><a target="_blank" href="https://dfir.ru/2019/03/25/forensic-analysis-of-disclosed-uninitialized-kernel-memory/">https://dfir.ru/2019/03/25/forensic-analysis-of-disclosed-uninitialized-kernel-memory/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>交互式Git教程 ​​​<br><a target="_blank" href="https://learngitbranching.js.org/">https://learngitbranching.js.org/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>从零开始Java代码审计系列(一)<br><a target="_blank" href="https://xz.aliyun.com/t/4558">https://xz.aliyun.com/t/4558</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Remote command injection through an endpoint security product<br><a target="_blank" href="https://www.pentestpartners.com/security-blog/remote-command-injection-through-an-endpoint-security-product/">https://www.pentestpartners.com/security-blog/remote-command-injection-through-an-endpoint-security-product/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>Simdjson：一个超高速的JSON解析工具<br><a target="_blank" href="https://www.freebuf.com/sectool/198277.html">https://www.freebuf.com/sectool/198277.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>使用 Sboxr 自动化发现和利用 DOM XSS - Part 1<br><a target="_blank" href="https://blog.appsecco.com/automating-discovery-and-exploiting-dom-client-xss-vulnerabilities-using-sboxr-part-1-2e55c120c9e1">https://blog.appsecco.com/automating-discovery-and-exploiting-dom-client-xss-vulnerabilities-using-sboxr-part-1-2e55c120c9e1</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>NTA技术 &amp; 代表性NTA产品一览<br><a target="_blank" href="https://mp.weixin.qq.com/s/MP0tONsz5KRRa-swTwDh9w">https://mp.weixin.qq.com/s/MP0tONsz5KRRa-swTwDh9w</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>通过 DCOM 远程执行 Excel 4.0/XLM 宏实现横向渗透的利用脚本<br><a target="_blank" href="https://github.com/outflanknl/Excel4-DCOM">https://github.com/outflanknl/Excel4-DCOM</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Microsoft Defender ATP investigation unearths privilege escalation flaw<br><a target="_blank" href="https://www.microsoft.com/security/blog/2019/03/25/from-alert-to-driver-vulnerability-microsoft-defender-atp-investigation-unearths-privilege-escalation-flaw/">https://www.microsoft.com/security/blog/2019/03/25/from-alert-to-driver-vulnerability-microsoft-defender-atp-investigation-unearths-privilege-escalation-flaw/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>HackerOne 50M CTF Writeup<br><a target="_blank" href="http://0xc0ffee.io/blog/50M-CTF">http://0xc0ffee.io/blog/50M-CTF</a></div><div class="single"><span id="tags">[无线安全]&nbsp;&nbsp;</span>披露一种针对W-IFI WPA/WPA2协议的MOTS(Man-On-The-Side)的攻击方式<br><a target="_blank" href="https://github.com/zjlywjh001/CanSecWest19">https://github.com/zjlywjh001/CanSecWest19</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>绕过 nftables/PacketFilter 防火墙过滤规则传输 ICMP/ICMPv6 数据包的漏洞详解<br><a target="_blank" href="https://www.synacktiv.com/posts/systems/icmp-reachable.html">https://www.synacktiv.com/posts/systems/icmp-reachable.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2019-7286 Part II: Gaining PC Control<br><a target="_blank" href="https://blog.zecops.com/vulnerabilities/exploit-of-cve-2019-7286/">https://blog.zecops.com/vulnerabilities/exploit-of-cve-2019-7286/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>攻破 Chrome 的 ValueDeserializer::ReadDenseJSArray 越界写漏洞（CVE-2018-17480）<br><a target="_blank" href="https://bugs.chromium.org/p/chromium/issues/detail?id=905940">https://bugs.chromium.org/p/chromium/issues/detail?id=905940</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>PHP内核层解析反序列化漏洞<br><a target="_blank" href="https://mp.weixin.qq.com/s/RL8_kDoHcZoED1G_BBxlWw">https://mp.weixin.qq.com/s/RL8_kDoHcZoED1G_BBxlWw</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Google Groups Authorization Bypass / $500 bounty<br><a target="_blank" href="https://www.komodosec.com/post/google-groups-authorization-bypass">https://www.komodosec.com/post/google-groups-authorization-bypass</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>一行代码逃逸 Safari 沙箱<br><a target="_blank" href="https://weibo.com/ttarticle/p/show?id=2309404354112320866984">https://weibo.com/ttarticle/p/show?id=2309404354112320866984</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>.NET高级代码审计（第五课） .NET Remoting反序列化漏洞<br><a target="_blank" href="https://www.anquanke.com/post/id/174009">https://www.anquanke.com/post/id/174009</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>router_badusb: BadUSB in Routers<br><a target="_blank" href="https://github.com/tenable/router_badusb">https://github.com/tenable/router_badusb</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>一行代码逃逸 Safari 沙箱<br><a target="_blank" href="https://weibo.com/ttarticle/p/show?id=2309404354112320866984&amp;sudaref=cp0.win&amp;display=0&amp;retcode=6102">https://weibo.com/ttarticle/p/show?id=2309404354112320866984&amp;sudaref=cp0.win&amp;display=0&amp;retcode=6102</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android Runtime Restrictions Bypass<br><a target="_blank" href="https://blog.quarkslab.com/android-runtime-restrictions-bypass.html">https://blog.quarkslab.com/android-runtime-restrictions-bypass.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Analysis of .Net Stealer GrandSteal<br><a target="_blank" href="http://www.peppermalware.com/2019/03/analysis-of-net-stealer-grandsteal-2019.html">http://www.peppermalware.com/2019/03/analysis-of-net-stealer-grandsteal-2019.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Windows 10 IoT Core远程命令执行漏洞验证及建议<br><a target="_blank" href="https://mp.weixin.qq.com/s/Pq2win4kH72eG_n7aKQdIQ">https://mp.weixin.qq.com/s/Pq2win4kH72eG_n7aKQdIQ</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Analysis of NetWiredRC trojan<br><a target="_blank" href="https://maskop9.tech/index.php/2019/01/30/analysis-of-netwiredrc-trojan/">https://maskop9.tech/index.php/2019/01/30/analysis-of-netwiredrc-trojan/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>npk: A mostly-serverless distributed hash cracking platform<br><a target="_blank" href="https://github.com/Coalfire-Research/npk">https://github.com/Coalfire-Research/npk</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>KBuster：以伪造韩国银行APP的韩国黑产活动披露<br><a target="_blank" href="https://mp.weixin.qq.com/s/p2pmW_JH7DgPt5o-HYmTpw">https://mp.weixin.qq.com/s/p2pmW_JH7DgPt5o-HYmTpw</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Analysis and Reproduction of iOS/OSX Vulnerability: CVE-2019-7286<br><a target="_blank" href="https://blog.zecops.com/vulnerabilities/analysis-and-reproduction-of-cve-2019-7286/">https://blog.zecops.com/vulnerabilities/analysis-and-reproduction-of-cve-2019-7286/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Dissecting ShadowHammer<br><a target="_blank" href="https://www.cyberfox.blog/dissecting-shadowhammer/">https://www.cyberfox.blog/dissecting-shadowhammer/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>One-liner Safari sandbox escape exploit<br><a target="_blank" href="https://medium.com/0xcc/one-liner-safari-sandbox-escape-exploit-91082ddbe6ef">https://medium.com/0xcc/one-liner-safari-sandbox-escape-exploit-91082ddbe6ef</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Defeating Userland Hooks (ft. Bitdefender)<br><a target="_blank" href="https://0x00sec.org/t/defeating-userland-hooks-ft-bitdefender/12496">https://0x00sec.org/t/defeating-userland-hooks-ft-bitdefender/12496</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Attacking Java RMI services after JEP 290<br><a target="_blank" href="https://mogwailabs.de/blog/2019/03/attacking-java-rmi-services-after-jep-290/">https://mogwailabs.de/blog/2019/03/attacking-java-rmi-services-after-jep-290/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>fridump3: A universal memory dumper using Frida for Python 3<br><a target="_blank" href="https://github.com/rootbsd/fridump3">https://github.com/rootbsd/fridump3</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/265">SecWiki周刊(第265期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
