<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第217期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第217期）</strong></h5>
<blockquote> 2018/04/23-2018/04/29</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>公安部关于印发《网络安全等级保护测评机构管理办法》的通知<br><a target="_blank" href="https://mp.weixin.qq.com/s/HVPSSB_QtWle7GjJhJT_Ww">https://mp.weixin.qq.com/s/HVPSSB_QtWle7GjJhJT_Ww</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>外卖送餐信息被指在网上售卖<br><a target="_blank" href="http://www.bjnews.com.cn/inside/2018/04/23/484211.html">http://www.bjnews.com.cn/inside/2018/04/23/484211.html</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>XKungfoo 2018精彩回顾-Day2<br><a target="_blank" href="http://www.4hou.com/xactivity/11242.html">http://www.4hou.com/xactivity/11242.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>恶意软件分析之—勒索即服务(Raas)<br><a target="_blank" href="http://www.4hou.com/typ/11186.html">http://www.4hou.com/typ/11186.html</a></div><div class="single"><span id="tags">[新闻]&nbsp;&nbsp;</span>黑客组织 Orangeworm 针对全球医疗保健行业发起间谍活动<br><a target="_blank" href="https://mp.weixin.qq.com/s/DhQAdkeXRW-22UPgB5iR6A">https://mp.weixin.qq.com/s/DhQAdkeXRW-22UPgB5iR6A</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>ThaiCERT Seizes Hidden Cobra Server Linked to GhostSecret, Sony Attacks <br><a target="_blank" href="https://threatpost.com/thaicert-seizes-hidden-cobra-server-linked-to-ghostsecret-sony-attacks/131498/">https://threatpost.com/thaicert-seizes-hidden-cobra-server-linked-to-ghostsecret-sony-attacks/131498/</a></div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>XKungfoo 2018精彩回顾-Day1<br><a target="_blank" href="http://www.4hou.com/xactivity/11228.html">http://www.4hou.com/xactivity/11228.html</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[会议]&nbsp;&nbsp;</span>2018首席安全官（CSO）国际高峰论坛（干货PPT下载）<br><a target="_blank" href="https://www.anquanke.com/post/id/106707">https://www.anquanke.com/post/id/106707</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>渗透测试实战-BlackMarket靶机入侵<br><a target="_blank" href="https://www.anquanke.com/post/id/106855">https://www.anquanke.com/post/id/106855</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Jira-Scan: CVE-2017-9506 POC<br><a target="_blank" href="https://github.com/random-robbie/Jira-Scan">https://github.com/random-robbie/Jira-Scan</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>DB_BaseLine: 数据库基线检查工具<br><a target="_blank" href="https://github.com/wstart/DB_BaseLine">https://github.com/wstart/DB_BaseLine</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Drupal CVE-2018-7600 漏洞利用和攻击<br><a target="_blank" href="https://xz.aliyun.com/t/2312">https://xz.aliyun.com/t/2312</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>听说你内网渗透遇到困难？—MSF的NAT映射技巧<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-39238-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-39238-1-1.html?from=sec</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Fireline: 360发布的一款免费静态代码分析工具<br><a target="_blank" href="http://magic.360.cn/zh/article_zh.html">http://magic.360.cn/zh/article_zh.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>cheetah-gui:基于字典的webshell密码爆破工具<br><a target="_blank" href="https://github.com/sunnyelf/cheetah-gui/blob/master/README_zh.md">https://github.com/sunnyelf/cheetah-gui/blob/master/README_zh.md</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>ssrf漏洞学习与利用<br><a target="_blank" href="http://www.zerokeeper.com/web-security/ssrf-vulnerability-learning-and-utilization.html">http://www.zerokeeper.com/web-security/ssrf-vulnerability-learning-and-utilization.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>A bunch of Red Pills: VMware Escapes<br><a target="_blank" href="https://keenlab.tencent.com/en/2018/04/23/A-bunch-of-Red-Pills-VMware-Escapes/">https://keenlab.tencent.com/en/2018/04/23/A-bunch-of-Red-Pills-VMware-Escapes/</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>格式化字符串hijack retaddr及三个白帽-pwnme_k0 writeup<br><a target="_blank" href="https://www.anquanke.com/post/id/105989">https://www.anquanke.com/post/id/105989</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>金融企业网络安全应急响应之基础篇<br><a target="_blank" href="https://mp.weixin.qq.com/s/Ug2vImj8wB1_kbXLGUmouQ">https://mp.weixin.qq.com/s/Ug2vImj8wB1_kbXLGUmouQ</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>记Discuz!的一个绕过技巧<br><a target="_blank" href="https://secvul.com/topics/1165.html">https://secvul.com/topics/1165.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Go语言任意代码执行漏洞 CVE-2018-6574<br><a target="_blank" href="http://blog.nsfocus.net/cve-2018-6574/">http://blog.nsfocus.net/cve-2018-6574/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>巡风风险扫描系统的一些演变<br><a target="_blank" href="http://www.freebuf.com/sectool/168977.html">http://www.freebuf.com/sectool/168977.html</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>429线下赛write-up<br><a target="_blank" href="http://momomoxiaoxi.com/2018/04/27/4292018/">http://momomoxiaoxi.com/2018/04/27/4292018/</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>HackBox is the combination of awesome techniques.<br><a target="_blank" href="https://github.com/samhaxr/hackbox">https://github.com/samhaxr/hackbox</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>windows10_ntfs_crash_dos：PoC for a NTFS crash that I discovered, in various Wind<br><a target="_blank" href="https://github.com/mtivadar/windows10_ntfs_crash_dos">https://github.com/mtivadar/windows10_ntfs_crash_dos</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>读取型CSRF-需要交互的内容劫持<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-36314-1-1.html">https://bbs.ichunqiu.com/thread-36314-1-1.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>批量扫描智能合约中的整数溢出问题 <br><a target="_blank" href="http://5alt.me/2018/04/%E6%89%B9%E9%87%8F%E6%89%AB%E6%8F%8F%E6%99%BA%E8%83%BD%E5%90%88%E7%BA%A6%E4%B8%AD%E7%9A%84%E6%95%B4%E6%95%B0%E6%BA%A2%E5%87%BA%E9%97%AE%E9%A2%98/">http://5alt.me/2018/04/%E6%89%B9%E9%87%8F%E6%89%AB%E6%8F%8F%E6%99%BA%E8%83%BD%E5%90%88%E7%BA%A6%E4%B8%AD%E7%9A%84%E6%95%B4%E6%95%B0%E6%BA%A2%E5%87%BA%E9%97%AE%E9%A2%98/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>记某司Linux服务器入侵事件<br><a target="_blank" href="https://secvul.com/topics/1142.html">https://secvul.com/topics/1142.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>谈escapeshellarg绕过与参数注入漏洞 <br><a target="_blank" href="https://www.leavesongs.com/PENETRATION/escapeshellarg-and-parameter-injection.html">https://www.leavesongs.com/PENETRATION/escapeshellarg-and-parameter-injection.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>一行代码蒸发了¥6,447,277,680 人民币！<br><a target="_blank" href="https://zhuanlan.zhihu.com/p/35989258">https://zhuanlan.zhihu.com/p/35989258</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>代码审计之任意文件读取漏洞实例<br><a target="_blank" href="https://mp.weixin.qq.com/s/JG1PuHXvtt9sXM1r26uQ9g">https://mp.weixin.qq.com/s/JG1PuHXvtt9sXM1r26uQ9g</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>APT团伙（APT-C-01）新利用漏洞样本分析及关联挖掘<br><a target="_blank" href="https://mp.weixin.qq.com/s/Rj0diLq9w6qiyQSA-CJHGQ">https://mp.weixin.qq.com/s/Rj0diLq9w6qiyQSA-CJHGQ</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Hash Finder  在线查询工具(支持多种类型)<br><a target="_blank" href="http://finder.insidepro.team/">http://finder.insidepro.team/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Electron远程命令执行漏洞(CVE-2018-1000006)<br><a target="_blank" href="http://www.zerokeeper.com/vul-analysis/electron-remote-command-execution-vulnerability-cve20181000006.html">http://www.zerokeeper.com/vul-analysis/electron-remote-command-execution-vulnerability-cve20181000006.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>CVE-2017–11882 RTF<br><a target="_blank" href="https://medium.com/@__fastcall/cve-2017-11882-rtf-44d671dc0fce">https://medium.com/@__fastcall/cve-2017-11882-rtf-44d671dc0fce</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>First glance on OS VRP by Huawei <br><a target="_blank" href="https://embedi.com/blog/first-glance-on-os-vrp-by-huawei/">https://embedi.com/blog/first-glance-on-os-vrp-by-huawei/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>TrunPortForward: Web管理的、多节点、多端口、高度自定义定向转发工具<br><a target="_blank" href="https://github.com/cytvictor/TrunPortForward">https://github.com/cytvictor/TrunPortForward</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Summary of APT33 MD5<br><a target="_blank" href="https://pastebin.com/uGUF4SHJ">https://pastebin.com/uGUF4SHJ</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>一次特殊场景下的鸡肋XSS<br><a target="_blank" href="https://secvul.com/topics/1159.html">https://secvul.com/topics/1159.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>为何 shadowsocks 要弃用一次性验证 (OTA)<br><a target="_blank" href="https://blessing.studio/why-do-shadowsocks-deprecate-ota/">https://blessing.studio/why-do-shadowsocks-deprecate-ota/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>ShofEL2, a Tegra X1 and Nintendo Switch exploit<br><a target="_blank" href="https://fail0verflow.com/blog/2018/shofel2/">https://fail0verflow.com/blog/2018/shofel2/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>GravityRAT - The Two-Year Evolution Of An APT Targeting India<br><a target="_blank" href="https://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html">https://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>establishing-a-baseline-for-remote-desktop-protocol<br><a target="_blank" href="https://www.fireeye.com/blog/threat-research/2018/04/establishing-a-baseline-for-remote-desktop-protocol.html">https://www.fireeye.com/blog/threat-research/2018/04/establishing-a-baseline-for-remote-desktop-protocol.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>DomLink：一款自动化的域发现工具<br><a target="_blank" href="http://www.freebuf.com/sectool/169734.html">http://www.freebuf.com/sectool/169734.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span> 智能汽车安全研究报告<br><a target="_blank" href="https://www.computest.nl/wp-content/uploads/2018/04/connected-car-rapport.pdf">https://www.computest.nl/wp-content/uploads/2018/04/connected-car-rapport.pdf</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Bypassing Android Anti-Emulation, Part (II)<br><a target="_blank" href="http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-II/">http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-II/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>利用文件包含漏洞和图片一句话getshell<br><a target="_blank" href="https://xz.aliyun.com/t/2311">https://xz.aliyun.com/t/2311</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Red-Teaming-Toolkit: A collection of open source and commercial tools<br><a target="_blank" href="https://github.com/infosecn1nja/Red-Teaming-Toolkit">https://github.com/infosecn1nja/Red-Teaming-Toolkit</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>SecWiki周刊（第216期)<br><a target="_blank" href="https://www.sec-wiki.com/weekly/216">https://www.sec-wiki.com/weekly/216</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Infer：Facebook开源的一个静态分析工具<br><a target="_blank" href="https://infer.liaohuqiu.net/">https://infer.liaohuqiu.net/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>毕业设计之php RASP(三) 收尾<br><a target="_blank" href="http://www.cnblogs.com/iamstudy/articles/php_code_rasp_3.html">http://www.cnblogs.com/iamstudy/articles/php_code_rasp_3.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>PentesterLab新手教程（一）：代码注入<br><a target="_blank" href="http://www.freebuf.com/sectool/168653.html">http://www.freebuf.com/sectool/168653.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>金融企业网络安全应急响应之技术篇<br><a target="_blank" href="https://mp.weixin.qq.com/s/W3_klh02SsMrRyH3UcYGNw">https://mp.weixin.qq.com/s/W3_klh02SsMrRyH3UcYGNw</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Bypassing Android Anti-Emulation, Part (III)<br><a target="_blank" href="http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-III/">http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-III/</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>第二届阿里云安全算法挑战赛 MJ_3DSUN 队解题方法<br><a target="_blank" href="https://github.com/frank6696/tianchi-aliyun-security-competition">https://github.com/frank6696/tianchi-aliyun-security-competition</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>机器学习之垃圾信息过滤<br><a target="_blank" href="http://www.freebuf.com/articles/network/168850.html">http://www.freebuf.com/articles/network/168850.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Uncovering Unknown Threats With Human-Readable Machine Learning<br><a target="_blank" href="https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-unknown-threats-with-human-readable-machine-learning/">https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-unknown-threats-with-human-readable-machine-learning/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>构建高质量攻击指标的几条建议<br><a target="_blank" href="https://mp.weixin.qq.com/s/ZRiSi3bb-SkMc_54mWPgmw">https://mp.weixin.qq.com/s/ZRiSi3bb-SkMc_54mWPgmw</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Bypassing Android Anti-Emulation, Part (I)<br><a target="_blank" href="http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-I/">http://www.juanurs.com/Bypassing-Android-Anti-Emulation-Part-I/</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>DDCTF 2018 逆向 baby_mips Writeup <br><a target="_blank" href="https://blog.formsec.cn/2018/04/29/DDCTF-2018-%e9%80%86%e5%90%91-baby-mips-Writeup/">https://blog.formsec.cn/2018/04/29/DDCTF-2018-%e9%80%86%e5%90%91-baby-mips-Writeup/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Interactive bindshell over HTTP <br><a target="_blank" href="http://blog.secu.dk/blog/Tunnels_in_a_hard_filtered_network/">http://blog.secu.dk/blog/Tunnels_in_a_hard_filtered_network/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Energetic Bear/Crouching Yeti: attacks on servers<br><a target="_blank" href="https://securelist.com/energetic-bear-crouching-yeti/85345/">https://securelist.com/energetic-bear-crouching-yeti/85345/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>HooToo TripMate Routers are Cute But Insecure<br><a target="_blank" href="http://blog.ioactive.com/2018/04/hootoo-tripmate-routers-are-cute-but.html">http://blog.ioactive.com/2018/04/hootoo-tripmate-routers-are-cute-but.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Endpoint Isolation with the Windows Firewall<br><a target="_blank" href="https://medium.com/@cryps1s/endpoint-isolation-with-the-windows-firewall-462a795f4cfb">https://medium.com/@cryps1s/endpoint-isolation-with-the-windows-firewall-462a795f4cfb</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>DOM Based Cross-Site Scripting in Google VRView library<br><a target="_blank" href="http://blog.mindedsecurity.com/2018/04/dom-based-cross-site-scripting-in.html">http://blog.mindedsecurity.com/2018/04/dom-based-cross-site-scripting-in.html</a></div><div class="single"><span id="tags">[工具]&nbsp;&nbsp;</span>TDL：Driver loader for bypassing Windows x64 Driver Signature Enforcement<br><a target="_blank" href="https://github.com/hfiref0x/TDL">https://github.com/hfiref0x/TDL</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>PentesterLab新手教程（二）：XML注入<br><a target="_blank" href="http://www.freebuf.com/sectool/169122.html">http://www.freebuf.com/sectool/169122.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>用Apache mod_rewrite来保护你的Empire C2<br><a target="_blank" href="https://www.anquanke.com/post/id/104784">https://www.anquanke.com/post/id/104784</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Stored XSS in Yahoo!<br><a target="_blank" href="https://steemit.com/bugbounty/@theshahzada/stored-xss-in-yahoo">https://steemit.com/bugbounty/@theshahzada/stored-xss-in-yahoo</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>欧洲最严合规GDPR影响众多企业<br><a target="_blank" href="https://mp.weixin.qq.com/s/nEMHu33qfO8GvDqStpVVuQ">https://mp.weixin.qq.com/s/nEMHu33qfO8GvDqStpVVuQ</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>STIX 2.0 示例剖析<br><a target="_blank" href="https://mp.weixin.qq.com/s/B88yOz9UWRm5WhWY6zAyUA">https://mp.weixin.qq.com/s/B88yOz9UWRm5WhWY6zAyUA</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Gitmails: An information gathering tool to colect git commit emails<br><a target="_blank" href="https://github.com/giovanifss/Gitmails">https://github.com/giovanifss/Gitmails</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>关于Powershell对抗安全软件<br><a target="_blank" href="https://micropoor.blogspot.jp/2018/04/powershell.html">https://micropoor.blogspot.jp/2018/04/powershell.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Frida-Python-Binding：Easy to use Frida python binding script<br><a target="_blank" href="https://github.com/Mind0xP/Frida-Python-Binding">https://github.com/Mind0xP/Frida-Python-Binding</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>360：基于 AI 的网络运维<br><a target="_blank" href="https://mp.weixin.qq.com/s/1toUOKq_80pyM8AmCNb8Ww">https://mp.weixin.qq.com/s/1toUOKq_80pyM8AmCNb8Ww</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>解密混淆的PHP程序 <br><a target="_blank" href="https://blog.formsec.cn/2018/04/27/%e8%a7%a3%e5%af%86%e6%b7%b7%e6%b7%86%e7%9a%84PHP%e7%a8%8b%e5%ba%8f/">https://blog.formsec.cn/2018/04/27/%e8%a7%a3%e5%af%86%e6%b7%b7%e6%b7%86%e7%9a%84PHP%e7%a8%8b%e5%ba%8f/</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>picojs：A face detection library in 200 lines of JavaScript<br><a target="_blank" href="https://github.com/tehnokv/picojs">https://github.com/tehnokv/picojs</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Linkedin Autofill Vulnerability<br><a target="_blank" href="https://amisafe.secops.in/linkedin-autofill-vulnerability/">https://amisafe.secops.in/linkedin-autofill-vulnerability/</a></div><div class="single"><span id="tags">[比赛]&nbsp;&nbsp;</span>Reverse Engineering challenges<br><a target="_blank" href="about:blank">about:blank</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>基于Service Worker 的XSS攻击面拓展<br><a target="_blank" href="https://lorexxar.cn/2018/04/20/SW-xss/">https://lorexxar.cn/2018/04/20/SW-xss/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>JWT common pitfalls, attacks, and mitigations<br><a target="_blank" href="https://auth0.com/blog/a-look-at-the-latest-draft-for-jwt-bcp/">https://auth0.com/blog/a-look-at-the-latest-draft-for-jwt-bcp/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>YY直播洗号产业链如何运作？戳进来看看！<br><a target="_blank" href="https://bbs.ichunqiu.com/thread-39419-1-1.html?from=sec">https://bbs.ichunqiu.com/thread-39419-1-1.html?from=sec</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Google Inbox spoofing vulnerability<br><a target="_blank" href="https://eligrey.com/blog/google-inbox-spoofing-vulnerability/">https://eligrey.com/blog/google-inbox-spoofing-vulnerability/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Debugging Windows Services For Malware Analysis / Reverse Engineering<br><a target="_blank" href="https://secrary.com/Random/WindowsServiceDebugging/">https://secrary.com/Random/WindowsServiceDebugging/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>金融企业IT内控合规管理建设与实践<br><a target="_blank" href="https://mp.weixin.qq.com/s/vxvZAfXRqYDVmdqEXJfUUA">https://mp.weixin.qq.com/s/vxvZAfXRqYDVmdqEXJfUUA</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Exploiting misconfigured CORS Null Origin<br><a target="_blank" href="https://www.soffensive.com/2018/04/exploiting-misconfigured-cors-null.html">https://www.soffensive.com/2018/04/exploiting-misconfigured-cors-null.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Subdomain enumeration<br><a target="_blank" href="http://10degres.net/subdomain-enumeration/">http://10degres.net/subdomain-enumeration/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Small mistakes lead to big problems<br><a target="_blank" href="http://k3research.outerhaven.de/posts/small-mistakes-lead-to-big-problems.html">http://k3research.outerhaven.de/posts/small-mistakes-lead-to-big-problems.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>毕业设计之php RASP(二) 威胁判断<br><a target="_blank" href="http://www.cnblogs.com/iamstudy/articles/php_code_rasp_2.html">http://www.cnblogs.com/iamstudy/articles/php_code_rasp_2.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>使用Apache mod_rewrite实现http流量分发<br><a target="_blank" href="https://mp.weixin.qq.com/s/SIFrdP-w3kvIhQGaAjhV-Q">https://mp.weixin.qq.com/s/SIFrdP-w3kvIhQGaAjhV-Q</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>揭秘第三方跟踪器是如何利用Facebook登录页面跟踪用户的<br><a target="_blank" href="http://www.4hou.com/technology/11208.html">http://www.4hou.com/technology/11208.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Windows security audit events<br><a target="_blank" href="https://www.microsoft.com/en-us/download/details.aspx?id=50034">https://www.microsoft.com/en-us/download/details.aspx?id=50034</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>Integrating PRE-ATT&amp;CK Techniques Into ATT&amp;CK <br><a target="_blank" href="https://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/integrating-pre-attck-techniques-into-attck">https://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/integrating-pre-attck-techniques-into-attck</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Loading Kernel Shellcode<br><a target="_blank" href="https://www.fireeye.com/blog/threat-research/2018/04/loading-kernel-shellcode.html">https://www.fireeye.com/blog/threat-research/2018/04/loading-kernel-shellcode.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>从 CVE-2016-0165 说起：分析、利用和检测（上）<br><a target="_blank" href="https://xiaodaozhi.com/exploit/32.html">https://xiaodaozhi.com/exploit/32.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android Applications Reversing 101 <br><a target="_blank" href="https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/">https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>TPLINK TLWR740N ROUTER REMOTE CODE EXECUTION<br><a target="_blank" href="https://www.fidusinfosec.com/a-curious-case-of-code-reuse-tplink-cve-2017-13772-v2">https://www.fidusinfosec.com/a-curious-case-of-code-reuse-tplink-cve-2017-13772-v2</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>从 CVE-2016-0165 说起：分析、利用和检测（中）<br><a target="_blank" href="https://xiaodaozhi.com/exploit/42.html">https://xiaodaozhi.com/exploit/42.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>从 CVE-2016-0165 说起：分析、利用和检测（下）<br><a target="_blank" href="https://xiaodaozhi.com/exploit/56.html">https://xiaodaozhi.com/exploit/56.html</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/217">SecWiki周刊(第217期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
