<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第39期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第39期）</strong></h5>
<blockquote> 2014/11/24-2014/11/30</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>走近科学：剑指Android和iOS系统的DoubleDirect中间人攻击<br><a target="_blank" href="http://www.freebuf.com/news/special/52615.html">http://www.freebuf.com/news/special/52615.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>IP.Board 3.4.5中SQL注入漏洞的利用与分析<br><a target="_blank" href="http://www.freebuf.com/articles/web/53018.html">http://www.freebuf.com/articles/web/53018.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>金玉其外败絮其中：百度杀毒“雪狼引擎”逆向分析<br><a target="_blank" href="http://www.freebuf.com/articles/system/53021.html">http://www.freebuf.com/articles/system/53021.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>深度：剖析三星Galaxy KNOX远程代码执行漏洞（含视频）<br><a target="_blank" href="http://www.freebuf.com/news/52668.html">http://www.freebuf.com/news/52668.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>偏门系统拾遗：Tru64 Unix系统搭建渗透指南<br><a target="_blank" href="http://www.freebuf.com/articles/system/52782.html">http://www.freebuf.com/articles/system/52782.html</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>ICMP重定向攻击<br><a target="_blank" href="http://blog.zimperium.com/doubledirect-zimperium-discovers-full-duplex-icmp-redirect-attacks-in-the-wild/">http://blog.zimperium.com/doubledirect-zimperium-discovers-full-duplex-icmp-redirect-attacks-in-the-wild/</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>Pfsense HA（高可用性群集）<br><a target="_blank" href="http://drops.wooyun.org/%e8%bf%90%e7%bb%b4%e5%ae%89%e5%85%a8/4010">http://drops.wooyun.org/%e8%bf%90%e7%bb%b4%e5%ae%89%e5%85%a8/4010</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2014-6332 Swf 攻击样本分析<br><a target="_blank" href="http://bobao.360.cn/learning/detail/111.html">http://bobao.360.cn/learning/detail/111.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>WordPress 3.0-3.92 存储型XSS添加管理员&amp;getshell脚本<br><a target="_blank" href="http://bobao.360.cn/learning/detail/112.html">http://bobao.360.cn/learning/detail/112.html</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Nmap源码分析（脚本引擎）<br><a target="_blank" href="http://blog.csdn.net/aspirationflow/article/details/7956928">http://blog.csdn.net/aspirationflow/article/details/7956928</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>XDef2014 全国网络与信息安全防护峰会PPT<br><a target="_blank" href="http://www.xdef.org.cn/2014/agenda.html">http://www.xdef.org.cn/2014/agenda.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>提高NodeJS网站的安全性：Web服务器防黑客攻击技巧<br><a target="_blank" href="http://ourjs.com/detail/%E6%8F%90%E9%AB%98nodejs%E7%BD%91%E7%AB%99%E7%9A%84%E5%AE%89%E5%85%A8%E6%80%A7-web%E6%9C%8D%E5%8A%A1%E5%99%A8%E9%98%B2%E9%BB%91%E5%AE%A2%E6%94%BB%E5%87%BB%E6%8A%80%E5%B7%A7">http://ourjs.com/detail/%E6%8F%90%E9%AB%98nodejs%E7%BD%91%E7%AB%99%E7%9A%84%E5%AE%89%E5%85%A8%E6%80%A7-web%E6%9C%8D%E5%8A%A1%E5%99%A8%E9%98%B2%E9%BB%91%E5%AE%A2%E6%94%BB%E5%87%BB%E6%8A%80%E5%B7%A7</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>土耳其黑客入侵本国电力系统，怒删贫困地区巨额债务账单（含视频）<br><a target="_blank" href="http://www.freebuf.com/news/52685.html">http://www.freebuf.com/news/52685.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Winshock(MS14-066)最新分析与研究<br><a target="_blank" href="http://www.securitysift.com/exploiting-ms14-066-cve-2014-6321-aka-winshock/">http://www.securitysift.com/exploiting-ms14-066-cve-2014-6321-aka-winshock/</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>对西门子S7 PLC块(Blocks)的探索<br><a target="_blank" href="http://plcscan.org/blog/2014/11/s7-plc-list-blocks-scan/">http://plcscan.org/blog/2014/11/s7-plc-list-blocks-scan/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>黑客辞典：暗网（the Dark Web）<br><a target="_blank" href="http://www.freebuf.com/news/special/52445.html">http://www.freebuf.com/news/special/52445.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>cve-2014-0569 漏洞利用分析 <br><a target="_blank" href="http://drops.wooyun.org/papers/4024">http://drops.wooyun.org/papers/4024</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>youtube-dl:视频下载利器<br><a target="_blank" href="https://rg3.github.io/youtube-dl/">https://rg3.github.io/youtube-dl/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>利用UC Server API绕过验证码爆破创始人密码获取UC Key<br><a target="_blank" href="http://zone.wooyun.org/content/16851">http://zone.wooyun.org/content/16851</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Metasploit渗透Ubuntu 12.04攻击测试演练<br><a target="_blank" href="http://www.freebuf.com/articles/system/52692.html">http://www.freebuf.com/articles/system/52692.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Web渗透练习技巧N则（一）<br><a target="_blank" href="http://www.freebuf.com/articles/web/52413.html">http://www.freebuf.com/articles/web/52413.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>WordPress 3.0-3.9.2 XSS 漏洞详细分析<br><a target="_blank" href="http://www.secpulse.com/archives/2365.html">http://www.secpulse.com/archives/2365.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Web攻击日志分析的过去现在与未来<br><a target="_blank" href="http://drops.wooyun.org/tips/4051">http://drops.wooyun.org/tips/4051</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>知其一不知其二之Jenkins Hacking <br><a target="_blank" href="http://www.secpulse.com/archives/2166.html">http://www.secpulse.com/archives/2166.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>海康威视（Hikvision）安防监控录像机曝远程代码执行漏洞<br><a target="_blank" href="http://www.freebuf.com/vuls/52939.html">http://www.freebuf.com/vuls/52939.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>网络空间工控设备的发现与入侵<br><a target="_blank" href="http://evilcos.me/?p=473">http://evilcos.me/?p=473</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>深度：剖析三星Galaxy KNOX远程代码执行漏洞（含视频）<br><a target="_blank" href="http://www.freebuf.com/news/52668.html">http://www.freebuf.com/news/52668.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>2014-11-23 - TRAFFIC ANALYSIS EXERCISE<br><a target="_blank" href="http://www.malware-traffic-analysis.net/2014/11/23/index.html">http://www.malware-traffic-analysis.net/2014/11/23/index.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>The Fuzzing Project<br><a target="_blank" href="https://fuzzing-project.org/">https://fuzzing-project.org/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>涂师傅android手机数据恢复 <br><a target="_blank" href="http://www.tushifu.com/andr.html">http://www.tushifu.com/andr.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Discuz! 6.x/7.x 全局变量防御绕过导致命令执行 <br><a target="_blank" href="http://www.secpulse.com/archives/2338.html">http://www.secpulse.com/archives/2338.html</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>用 Python 和 OpenCV 检测图片上的条形码<br><a target="_blank" href="http://blog.jobbole.com/80448/">http://blog.jobbole.com/80448/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>CVE-2014-1806 .NET Remoting Services漏洞浅析<br><a target="_blank" href="http://drops.wooyun.org/papers/3993">http://drops.wooyun.org/papers/3993</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>安卓上Web漏洞的自动化检测<br><a target="_blank" href="http://www.fooying.com/automated-detection-of-web-vulnerability-in-android/">http://www.fooying.com/automated-detection-of-web-vulnerability-in-android/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>MS14-068 Kerberos Domain Privilege Escalation<br><a target="_blank" href="http://www.secpulse.com/archives/2277.html">http://www.secpulse.com/archives/2277.html</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>detekt：Memory triaging tool<br><a target="_blank" href="https://github.com/botherder/detekt">https://github.com/botherder/detekt</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>“长老木马”三代揪出背后“大毒枭” <br><a target="_blank" href="http://blogs.360.cn/360mobile/2014/11/24/analysis_of_fakedebuggerd_c_and_related_trojans/">http://blogs.360.cn/360mobile/2014/11/24/analysis_of_fakedebuggerd_c_and_related_trojans/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>局域网内针对自制证书网站的SSL中间人攻击<br><a target="_blank" href="http://techblog.youdao.com/?p=1159">http://techblog.youdao.com/?p=1159</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Bypassing Microsoft’s Patch for the Sandworm Zero Day: Even ‘Editing’ Can Cause <br><a target="_blank" href="http://blogs.mcafee.com/mcafee-labs/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm?utm_medium=spredfast&amp;utm_source=twitter&amp;utm_campaign=Labs#sf5821141">http://blogs.mcafee.com/mcafee-labs/bypassing-microsofts-patch-for-the-sandworm-zero-day-even-editing-can-cause-harm?utm_medium=spredfast&amp;utm_source=twitter&amp;utm_campaign=Labs#sf5821141</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>goaccess: real-time web log analyzer and interactive viewer <br><a target="_blank" href="https://github.com/allinurl/goaccess">https://github.com/allinurl/goaccess</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Addressing CVE-2014-6332 SWF Exploit<br><a target="_blank" href="http://researchcenter.paloaltonetworks.com/2014/11/addressing-cve-2014-6332-swf-exploit/">http://researchcenter.paloaltonetworks.com/2014/11/addressing-cve-2014-6332-swf-exploit/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>The mystery of Duqu Framework solved<br><a target="_blank" href="http://securelist.com/blog/research/32354/the-mystery-of-duqu-framework-solved-7/">http://securelist.com/blog/research/32354/the-mystery-of-duqu-framework-solved-7/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>深入探讨ROP 载荷分析<br><a target="_blank" href="http://drops.wooyun.org/papers/4077">http://drops.wooyun.org/papers/4077</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Using PowerShell for Client Side Attacks<br><a target="_blank" href="http://www.labofapenetrationtester.com/2014/11/powershell-for-client-side-attacks.html">http://www.labofapenetrationtester.com/2014/11/powershell-for-client-side-attacks.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Virus Bulletin : Obfuscation in Android malware<br><a target="_blank" href="https://www.virusbtn.com/virusbulletin/archive/2014/07/vb201407-Android-obfuscation">https://www.virusbtn.com/virusbulletin/archive/2014/07/vb201407-Android-obfuscation</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Android samples<br><a target="_blank" href="http://androidsandbox.net/samples/">http://androidsandbox.net/samples/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>掘金安全数据<br><a target="_blank" href="http://djt.qq.com/ppt/459">http://djt.qq.com/ppt/459</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Exploit-Exercises Fusion Level01<br><a target="_blank" href="http://www.programlife.net/exploit-exercises-fusion-level01.html">http://www.programlife.net/exploit-exercises-fusion-level01.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Malicious Flash Files Gain the Upper Hand With New Obfuscation<br><a target="_blank" href="http://blog.trendmicro.com/trendlabs-security-intelligence/malicious-flash-files-gain-the-upper-hand-with-new-obfuscation-techniques/">http://blog.trendmicro.com/trendlabs-security-intelligence/malicious-flash-files-gain-the-upper-hand-with-new-obfuscation-techniques/</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/39">SecWiki周刊(第39期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
