text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Anch Presents:
The Monkey In the Middle
A pen-testers guide to playing
in traffic.
Twitter: @boneheadsanon
A little about me
Over 10 years experience in
testing pens (Fountain is my
favorite)
Why we play in traffic?
❖ Traffic is interesting stuff.!
❖ Gives us insight in to how
things work.!
❖ Allows us to gather
inf... | pdf |
Mainframe Surrogat Chains
By Jake Labelle
<jake.labelle@hotmail.co.uk>
08/08/2020
Who Am I
● Jake Labelle
● Associate Security Consultant at F-Secure
● Been on a couple Mainframe Jobs (not a
expert)
● Streaming from Basingstoke, UK
● Was going to put a picture but just look
to the right
z/OS High Level
● Mainframe o... | pdf |
GNU History Library
Edition 6.1, for History Library Version 6.1.
October 2009
Chet Ramey, Case Western Reserve University
Brian Fox, Free Software Foundation
This document describes the GNU History library (version 6.1, 9 October 2009), a program-
ming tool that provides a consistent user interface for recalling lines... | pdf |
Saving Cyberspace by
Reinventing File Sharing
Eijah
v1.02
The Modern Internet
The Price of Convenience
“…One can easily remain free of even the most intense political oppression simply by placing one’s faith and trust in
institutions of authority.”
– Glenn Greenwald
“When I am afraid, I put... | pdf |
Trooping to Taiwan: Technical
Sophistication and Connections
in Closed Espionage Ecosystems
Matt Brooks, Citizen Lab
Campaign
Connections
Challenges
Conclusion
Campaign
DMShell++
Campaign Success
• At least one target fell victim
• Interesting post-compromise tactic
• Detection avoidance?
• Better server-side compone... | pdf |
一分钟免杀cobaltstrike
收录于话题
#cobaltstrike 1
#免杀 1
#渗透测试 48
#内网安全 3
#代码 2
简要介绍
本次利用到的是Nim语言
1.Nim 是一门开源的编程语言
2.Nim 的独到之处在于它可以编译成其他编程语言代码(主要是 C 语言和 JavaScript)
3.将 Nim 与 C 语言或 JavaScript 代码集成在一起可以获得最大的价值
4.Nim 可以生成高质量的 C 语言代码,避免出现 C 语言的典型错误(如内存泄露和数组指针错误)
下载Nim安装包
https://nim-lang.org/install.html
官方提供Windows、Linux、Mac版本,根据自己... | pdf |
Copyright©2019 nao_sec All Rights Reserved.
1
Copyright©2019 nao_sec All Rights Reserved.
Who are we
• Shota Nakajima
• Malware Analyst
• Engage in incident response
• Work at Cyber Defense Institute, Inc. in Japan
• Rintaro Koike
• Chief researcher / founder of nao_sec
• Threat Hunter
• Malicious traffic / script / do... | pdf |
Breaking
TrustZone-M
PRIVILEGE ESCALATION
ON LPC55S69
What are two firmware
engineers doing at DEFCON?
Designing hardware Root of Trust for Oxide Computer Company
In-house, microkernel OS written in Rust
Leverage publicly-available, security-focused microcontroller
Plan to open-source everything by time product ships... | pdf |
Revolutionizing the Field of Grey-box Attack Surface
Testing with Evolutionary Fuzzing
Jared D. DeMott
Computer Science
Michigan State University
demottja@msu.edu
Richard J. Enbody
Computer Science
Michigan State University
enbody@msu.edu
William F. Punch
GARAGe
Michigan State University
punch@msu.edu
Acc... | pdf |
#BHUSA @BlackHatEvents
Open Threat Hunting
Framework
John Dwyer, X-Force Head of Research (@TactiKoolSec, LinkedIn: john-dwyer-xforce)
Neil Wyler, X-Force Global ATA Lead (@Grifter801)
Sameer Koranne, X-Force Global OT Lead
#BHUSA @BlackHatEvents
Information Classification: General
Chasing Excellence
High Performers
V... | pdf |
1
[show me your privileges and I will lead you to SYSTEM]
Andrea Pierini, Paris, June 19th 2019
2
dir /a /r %USERPROFILE%
➔ Cyclist & Scuba Diver, Father & Husband
➔ IT Architect & Security Manager
➔ Long time experience
➔ InfoSec addicted
➔ Windows Server & Linux
“early adopter”
“whoami /priv” - Andrea Pierini
@dec... | pdf |
!
!
Sentient&Storage:&&
Do&SSDs&have&a&mind&of&their&own?&
!
!
!
!
!
!
!
!
!
Tom!Kopchak!
Kopchak!
!
2!
Table&of&Contents&
Abstract!.................................................................................................................................................!8!
Introduction!............................. | pdf |
安服崽日常做代码审计的时候,经常需要把已经发布的 java 项目反编译
之前一直都是把所有 jar 和 class 打进一个 zip 包,扔到 jd-gui,然后在 save all resource,这
种办法很蠢。
直到 bearcat 师傅发给我一个消息,我才发现,原来批量反编译 java 代码是这么简单的一件
事,只需要一个命令就可以了。
Idea 自带的反编译项目地址:https://github.com/fesh0r/fernflower
对我们安服崽来说还是不太方便,稍微做了一些改动,增加了筛选 class 的功能,黑白名单
方式让脚本只反编译我们需要的 class,仅仅只是 indexof 来做筛选
只需要... | pdf |
“Grasshopper always wrong in argument with Chicken.”
- Book of Chan
Functional
Fuzzing
with Funk
and further explorations into the use of
functional languages for network scripting
Benjamin Kurtz
Q:WTF? A:
Funk is a framework for the scripted generation of network
traffic, written using the Chicken Scheme-to-C comp... | pdf |
Fuzzing Linux with Xen
DEF CON 29
Tamas K Lengyel
2
don’t microwave your pets
Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.
Performance results are based on testing as of dates shown in configurations and may not reflect all publicly available updates. ... | pdf |
WSUSPENDU
/ 52
Yves Le Provost & Romain Coltel
ANSSI
WSUSpendu
USE WSUS TO HANG ITS CLIENTS
SATURDAY, 29TH JULY 2017
YVES LE PROVOST & ROMAIN COLTEL
WSUSPENDU
/ 52
Yves Le Provost & Romain Coltel
Who we are, what we do…
-
Yves Le Provost
-
Security auditor for more than 10 years
-
Currently works for French cyber defen... | pdf |
Aura
A peer-to-peer reputation system
Cat Okita
Copyright 2003
2
INDEX
INDEX ................................................................................................................................................................... 2
ABSTRACT ....................................................................... | pdf |
New
Exploit
Mi-ga-on
In
Internet
Explorer
HITCON
X
@K33nTeam
@KeenTeam
@promised_lu
About
Me
Amateur
browser
exploiter
Main
work
is
wri-ng
fuzzers
2
3
Background
Internet
Explorer
Vulnerability
Sta-s-cs
4
2013
•
CVE-‐2013-‐0025
CParaElement
Use-‐AR... | pdf |
The Next Generation of Cryptanalytic
Hardware
FPGAs (Field Programmable Gate Arrays) allow custom silicon to be
implemented easily. The result is a chip that can be built specifically
for cracking passwords. This presentation focuses on uncovering
some of the underlying basics behind gate logic and shows how it can... | pdf |
Tag-side attacks against NFC
What is NFC?
Contactless communication between two
devices in close proximity
Many uses, primarily door controls and
payment systems
Why attack NFC?
Interesting technology
Low-level analysis tools can be prohibitively expensive
Known to be insecure, but still widely used
ISO-14443
Focuses... | pdf |
Sniffing Keystrokes With Lasers/Voltmeters
Sniffing Keystrokes With Lasers/Voltmeters
Side Channel Attacks Using Optical Sampling Of
Mechanical Energy And Power Line Leakage
Copyright 2009 Inverse Path Ltd.
Andrea Barisani
Chief Security Engineer
<andrea@inversepath.com>
http://www.inversepath.com
Daniele Bianco
Hard... | pdf |
John@johnthunder.one
那就做個綿羊牆好了!
http://www.directsystems.com/support/diff_h
http://www.cisco.com/c/dam/en/us/support/do
cs/switches/catalyst-6500-series-
switches/10570-41d.gif
Acce
sPoi
nt
PC_A
PC_B
AP
PC_A
PC_B | pdf |
The Information Security Experts
Copyright © 2008 SecureWorks, Inc. All rights reserved.
The Wide World of WAFs
Ben Feinstein, CISSP GCFA
SecureWorks Counter Threat Unit™
DEFCON 16
August 8, 2008
The Information Security Experts
Copyright © 2008 SecureWorks, Inc. All rights reserved.
•
Web Application Firewalls (WAFs)
... | pdf |
应用程序接口(API)
数据安全研究报告
(2020 年)
中国信息通信研究院安全研究所
2020 年 7 月
版权声明
本报告版权属于中国信息通信研究院安全研究所,并受
法律保护。转载、摘编或利用其它方式使用本报告文字或者
观点的,应注明“来源:中国信息通信研究院安全研究所”。
违反上述声明者,本院将追究其相关法律责任。
前
言
伴随着云计算、大数据、人工智能等技术的蓬勃发展,移动互
联网、物联网产业加速创新,移动设备持有量不断增加,Web 应用、
移动应用已融入生产生活的各个领域。这一过程中,应用程序接口
(Application Programming Interface,API)作为数据传输流转
的重要通道发挥着举足轻重的作... | pdf |
Before the
FEDERAL COMMUNICATIONS COMMISSION
Washington, D.C. 20554
In the Matters of
Unlicensed Operation in the TV Broadcast Bands
Additional Spectrum for Unlicensed Devices
Below 900 MHz and in the 3 GHz Band
ET Docket No. 04-186
ET Docket No. 02-380
REPLY COMMENTS OF DELL INC., GOOGLE, INC.,
THE HEWLETT... | pdf |
dwangoAC
TASBot
the perfectionist
The amazing life & achievements of...
The amazing life & achievements of...
Agenda
●
Intro to Speedrunning video games, Tool-Assisted Speedruns, and Emulators
●
TASBot: Playing back a TAS on real hardware
●
TAS techniques, history, evolution
●
Emulator tools - memory search, Lua scri... | pdf |
Cracking 400,000
Passwords
Matt Weir
Sudhir Aggarwal
Florida State University
Special Thanks:
Dr. Sudhir Aggarwal
Professor Breno de Medeiros
National Institute of Justice
National White Collar Crime Center
My Research
Assist Law Enforcement
Develop better ways to
model how people actually
create passwords
Investiga... | pdf |
Hacking OpenVMS
Claes Nyberg
Christer Öberg
James Tusini
Some facts about OpenVMS
An Operating system with the following feature
Multi-user / Multi-processing
Virtual memory
Real time processing
Transaction processing
History of ownership
DIGITAL (1978 – 1998)
COMPAQ (1998 – 2001)
HP (2001 - Today)
Some facts ... | pdf |
sslvpn tips记录
升级包密码获取
众所周知,sslvpn的补丁包其实是个压缩包,diff补丁包是需要密码的。
先放一个包结构:
32位原始压缩包md5值|00|原始压缩包
众所周知,皮卡丘升级是依靠 SANGFOR_Updater 来进行升级的,那么升级包密码就在这个里面二话不说
ida启动,没加壳,很容易就找到了
压缩包结构
压缩包分为两类 cssu 合集类 ssu单包类
ssu 包结构结构
32位原始压缩包md5值|00|原始压缩包
目录结构
cssu包结构
ssu组合+upgrade.conf(升级配置文件)
sslvpn443 端口的一些TIPS
/sftmpfs/etc/htdocs/com/ 但是在此目录下写入... | pdf |
Sk3wlDbg:
Emulating all (well many)
of the things with Ida
Chris Eagle
Sk3wl 0f r00t
Disclaimer
– Everything I say today is my own
opinion and not necessarily the
opinion of my employer
Who am I?
– Senior lecturer of computer science
– Computer security researcher
– Reverse engineer
– Inveterate Capture th... | pdf |
Copyright 2003 - SunStorm Security Group
Slide Number 1 of 64
After Napster
Assessing the Threats, Value and Survivability
of Peer-to-Peer Networks
Copyright 2003 - SunStorm Security Group
Slide Number 2 of 64
Napster: The File Sharing
Invasion
Copyright 2003 - SunStorm Security Group
Slide Number 3 of 64
Napster Over... | pdf |
Mobile App Moolah:
Profit taking with Mobile Malware
Jimmy Shah
Mobile Security Researcher
Mobile App Moolah: Profit taking with Mobile Malware
2
•
Who we are
•
Mobile malware
•
Modern for-profit malware
•
Examples
Contents
Mobile App Moolah: Profit taking with Mobile Malware
3
Who we are
•
Mobile Antivirus Researcher... | pdf |
#proxyshell for workload
从发布上个文章后,好多从那个文章加微信的朋友都提到了负载问题,但是搬家没时
间看。最近刚搬完家看了一下大致解决了这个问题,顺便做一个记录。脚本已公开至
个人 github。
https://github.com/wudicainiao/proxyshell-for-exchange_workload
0x02
Wsman 发送请求时有顺序的序列,而遇到负载时这个特点会造成顺序发送请求时,
有些请求发给了负载的其他机器,从而造成 cmdlet 调用失败,会报错如下。
但是并不是所有这个报错的都是负载,sid 认证失败后如果还持续发送请求,也会报
该错误。
具体看目标是否存在负载,可查看... | pdf |
Confessions(of(a(Professional(Cyber(Stalker(
KEN(WESTIN(
SR(SECURITY(ANALYST((
KWESTIN@GMAIL.COM((
@KWESTIN(
STALKER(REVEALED(
D Ken(WesEn((
D Former(“ethical”(cyber(stalker(
D Developed(privacy(invading(tools((for(good)(
D Put(bad(people(in(jail(
D Trained(law(enforcement(on(invesEgaEve((OSINT)(techniques(
D Cur... | pdf |
SRC漏洞挖掘漫谈
星光
2 0 2 1 年 1 月 9 日
安 全 爱 好 者 , 对 自 动 化 漏 洞 挖 掘 有 着 自 己 的 见 解 。
获 得 2 0 2 1 T S R C 神 洞 猎 手 奖
星光
AK/ SK 信 息 泄 露 , 自 动发 现
SQ L 注 入 绕 WAF探 测
Hos t 碰 撞 检 测 实 现
域 名 监 控和 站 点变 化 监 控
AK/SK 信息泄露,自动发现
一、AK/SK 信息泄露,自动发现
1.API& 响 应 包 中
2.J S⽂ 件 中
3.G it Hu b 中
4 .APK& 中
5 .& 等 场 景
1、API&响应包中
通 过 B u r p 的 筛 选 功 能 搜 索... | pdf |
Digital Active
Digital Active
Self Defense
Self Defense
DEFCON 12
DEFCON 12
OUDOT Laurent
OUDOT Laurent
oudot
oudot@
@rstack
rstack.org
.org
http://www.
http://www.rstack
rstack.org/
.org/oudot
oudot//
Some references
•
Defending your right to defend: Considerations of an automated strike-back
technology
– Timothy M. M... | pdf |
Analysis of Mutation and Generation-Based Fuzzing
Whitepaper
Charlie Miller and Zachary N. J. Peterson
Independent Security Evaluators
www.securityevaluators.com
March 1, 2007
c⃝ Independent Security Evaluators 2007. All rights reserved
Analysis of Mutation and Generation-Based Fuzzing
1
Abstract
We present a study of ... | pdf |
SHAREENUM: WE WRAPPED
SAMBA SO YOU DON’T HAVE TO
Lucas Morris
@lucasjmorris
Michael McAtee
@michael.mcatee
About Us
Lucas Morris
Manager at Crowe Horwath LLP
“Manager”, Pentester, Code Monkey
Michael McAtee
Senior Consultant at Crowe Horwath LLP
Pentester, SysAdmin, [something funny here]
About Us... | pdf |
解析
儲存embedded架構原理理實現漏洞洞與反制
傳台灣某公司主控 SSD 藏後⾨門,”銀監會要求調查"
這是真實的嗎?
儲存裝置有後⾨門嗎?
如果有,哪⼜又是怎樣的狀狀況,我們要怎樣防範?
前⾔言
Thx
Hitch 2015 ,2012 講師
⼯工信部⾼高級資料恢復⼯工程師
ACELab Raid ,Flash 認證
OSSLab 開放軟體實驗室創辦⼈人
講師介紹
儲存裝置上的嵌入式架構
CPU Core +RAM
ROM
碟片上的韌體架構
硬碟載入 啟動流程 (以WD為範例例)
• MCU ROM bootstrap
• 內部或是外在SPI ROM
• 碟片上的Module 01 In... | pdf |
Robert Imhoff-Dousharm
US Resident
Las Vegas, NV, USA
rimhoffd@shebangsoft.org
Professional Sound Byte -
Robert has been working with computer systems for over 11 years. He has worked in the security
field for the better part of 4 years. His most recent, has been working with credit card technologies,
and the secur... | pdf |
Exploiting SCADA Systems
Jeremy Brown
Vulnerability Research Engineer
@ Tenable
Attack Vectors via Software
Vulnerabilities
Client-side attacks from web
browsers, e-mail, and malicious
servers
Server-side attacks from the
internet or internal network
Clickjacking!?
So.. whats wrong?
Security has been implemented
... | pdf |
© 2013 Cisco and/or its affiliates. All rights reserved.
Page 1 of 20
White Paper
Examining the Bitsquatting Attack Surface
Bit errors in memory, when they occur in a stored domain name, can direct Internet
traffic to the wrong domain potentially compromising security. When a domain name
one bit different from a... | pdf |
A New Era of SSRF - Exploiting URL Parser in
Trending Programming Languages!
Orange Tsai
Taiwan No.1
About Orange Tsai
The most professional red team in Taiwan
About Orange Tsai
The largest hacker conference in Taiwan
founded by chrO.ot
About Orange Tsai
Speaker - Speaker at several security conferences
HITCON, WooYun... | pdf |
Servlet的线程安全问题
引⼊
⾸先看看这样的代码,有什么问题
这⾥既要求cmd不能包含 Calculator 又必须要包含 Calculator ,能做到吗,当然是可以
的
Servlet的多线程机制
Servlet实际上是⼀个单件,当我们第⼀次请求某个Servlet时,Servlet容器将会根据web.xml配
置⽂件或者是注解实例化这个Servlet类,之后如果又有新的客户端请求该Servlet时,则⼀般不
会再实例化该Servlet类,这说明了什么呢?简单来说,当多个⽤户⼀起访问时,得到的其实是
同⼀个Servlet实例,这样的话,他们对实例的成员变量的修改其实会影响到别⼈,所以在开发
的时候如果没有注意这个问题往往会有... | pdf |
August, 2007
©2007 Finjan Software Ltd. All rights reserved.
The Inherent Insecurity of
Widgets and Gadgets
Aviv Raff
Iftach Ian Amit
Who are we?
• Aviv Raff
•
Security researcher at Finjan’s MCRC
• Iftach Ian Amit
•
Director of security research at Finjan
Introduction - Widgets?
• What is a widget?
• Widgets are smal... | pdf |
Steganography in Commonly
Used HF Radio Protocols
@pdogg77 @TheDukeZip
pdogg
● Paul / pdogg /
@pdogg77
● Day Job: Security
Researcher at Confer
Technologies Inc.
● Hobby: Licensed as
an amateur radio
operator in 1986,
ARRL VE
● This is my second
trip to DEF CON
thedukezip
● Brent / thedukezip / @thedukezip
... | pdf |
SRC
1. IP
2.
1.SSL
2.
3.Github
4.DNS
5.
SSL
12
SRC
SSL
1.censys.io
2.crt.sh
1.riskiq
2.shodan
3.findsubdomains
[]
[]
4.censys.io
5.dnsdb.io
DNS
SSLGithub
crt.shnss.a.com
Github
GET
json
fastjson
Github
github
IP
IPASIP
IP
: http://IPwhois.cnnic.net.cn/ 123.58.191.1
[IP]
IP
Netease-Network
IPNetea... | pdf |
Links to Police Procedure Cases & Essays
When Can the Police Make a Stop?
Probable Cause
Brinegar v. US (1949)
http://vlex.com/vid/20016296 case
Maryland v. Pringle (2003)
http://www.oyez.org/cases/2000-2009/2003/2003_02_809/ case
Reasonable Suspicion
Alabama v. White (1990)
http://supreme.justia.com/us/496/3... | pdf |
Electronic Frontier Finland ry
http://www.effi.org/
EFFI
Mikko Välimäki & Ville Oksanen
DEFCON XI, 2nd August 2003
Electronic Frontier Finland ry
http://www.effi.org/
Electronic Frontier Finland ry
Founded in September 2001, over 300 members
• Board and many active members are experts in
law and technology
Comme... | pdf |
Your Goal: Be a Harder Target
Many of the same risks apply
U.S. v. Schaffer
suspect should know
“If I were your lawyer, I’d advise you
not to answer that tweet.”
directly to any
individuals
forums known to support
or promote illegal activity
consider disabling comments
Authorship Analysis in Cybercrime
Investi... | pdf |
快手业务安全
——敌众我寡的歼灭战
讲师介绍
姓名:陈成
• 2014.2 中国科学院 信息安全 博士
• 2018.3 快手-风控业务安全负责人
目录
01
初识黑灰产
02
走进风控
03
核心打法
一、初识黑灰产
黑色产业链
人数盘大
敌暗我明
n 善于伪装、反侦察意
识强
产业链逐渐完善
n 集团化、规模化、智
能化
n 百万从业人员
n 年产值达千亿
灰色产业链
从“肉鸡”到“真鸡”
Ø 真人真机
Ø 平台化、裂变化
Ø 多场景、多行业
14
15
37
52
184
692
1542
2014年
2015年
2016年
2017年
2018年
2019年
2020年
2014年-2020年真人作弊APP开发者数量发展走势... | pdf |
mac
0x00
scheme
0x01
macdefault application
default application
2.pypython launchpython
windows
Uniform Type Identifier
https://en.wikipedia.org/wiki/Uniform_Type_Identifier
https://developer.apple.com/library/archive/documentation/Miscellaneous/Reference/UTIRef/Articles/System-
DeclaredUniformTypeIdentifiers.html... | pdf |
Packing & the Friendly Skies
Deviant Ollam
Packing & the Friendly Skies
Why Transporting Firearms May Be The Best
Way To Safeguard Your Tech When You Fly
Deviant Ollam
Packing & the Friendly Skies
Deviant Ollam
you may have seen me before…
Packing & the Friendly Skies
Deviant Ollam
i speak at lots of cons…
Packing & th... | pdf |
WIPING OUT CSRF
JOE ROZNER | @JROZNER
IT’S 2017
WHAT IS CSRF?
WHEN AN ATTACKER FORCES A VICTIM
TO EXECUTE UNWANTED OR
UNINTENTIONAL HTTP REQUESTS
4
WHERE DOES CSRF
COME FROM?
▸ Safe
▸ GET
▸ HEAD
▸ OPTIONS
▸ Unsafe
▸ PUT
▸ POST
▸ DELETE
6
SAFE VS. UNSAFE
COOKIES
▸ Cookies typically used to specify session iden... | pdf |
听说你在⽤SigFlip在PE签名⾥嵌⼊
shellcode?
-- 副标题: 检测SigFlip在PE的签名⾥嵌⼊的shellcode,以及嵌⼊⽅法改进
# 前⾔
之前看到 @w8ay 实现的⽩加⿊⽣成器,就感觉这个做法⾮常的棒,但是 SigFlip 的做法
真的隐蔽吗?真的不容易被查杀吗?
刚好最近在研究PE的⽂件签名结构和签名,那今天就详细讲解⼀下签名相关的内容,以及如
何改进 SigFlip 实现更深层次的隐藏。
# 原理回顾
对原理⽐较了解的直接跳过这⼀节。
看⼀下微软给的PE⽂件的签名的结构,这⼀张图⾮常的经典,但是这只是⼀个微软签名省略
了⼤部分细节的概括图,但是有助于我们了解⼀些最基本的信息。
⾸先可以看到图中... | pdf |
请谨慎编码,哪怕它只是一句错误处理
wang yu
Hacks in Taiwan, 2013
— 来自 win32k ! EPATHOBJ::pprFlattenRec 漏洞的启示
议题简介
第一部分
议题简介
·关于作者 ( wangyu@360.cn )
·议题背景
2013 年 3 月 Tavis Ormandy 前辈披露了一个微
软win32k 模块的问题 —— 在内存压力测试的情况
下,例程 win32k!EPATHOBJ::bFlatten 发生了蓝屏。
接下来,关于该蓝屏的利用可谓是一波三折。5
月,随着对链表关系的深度分析,蓝屏问题终于上升
为本地提权问题,exploit-db 对此问题的关注度激
增。
本议题将... | pdf |
Security at Kernel Level
Philippe Biondi
<biondi@cartel-securite.fr>
—
Defcon 10
August 2,3,4th, 2002
Outline
1
■ Why ?
▶ Context
▶ A new security model
▶ Conclusion
■ How ?
▶ Taxonomy of action paths
▶ Defending kernel space
▶ Filtering in kernel space
■ Implementations
▶ Existing projects
▶ LSM
CARTEL SÉCURITÉ — Phil... | pdf |
An Unauthenticated Journey to Root :
Pwning Your Company’s Enterprise Software Servers
Yvan Genuer
Onapsis
ygenuer@onapsis.com
Pablo Artuso
Onapsis
partuso@onapsis.com
1.
Abstract
Companies consist of a plethora of software,
hardware, vendors, and solutions working to-
gether to keep the business running and alive.
Whe... | pdf |
www.dbappsecurity.com.cn
百举百捷:
红队视角下又一个突破口,
再看大国独有小程序
2020.6.16/Poc Sir
À propos de moi
关于我
Poc Sir
Cool-Guy@C-est.Cool
雷神众测以及其他平台专业打酱油白帽子
Hack Inn « www.hackinn.com » 安全议题分享平台运营者
安恒信息实习4年的最长实习生,未来仍将实习
目前一直呆在法国,欢迎大家来找我思考美食、人参
喜欢聊聊两岸三地,微博号挺多的红V、蓝V、橙V、没V都有
Contents
目录
小程序概览
01
获取小程序源码
02
初探好玩的CMRF漏洞
03
小程序的特有API漏洞
04
05 ... | pdf |
Vista system restore
Vista system restore rootkit
rootkit
Principle and protection
Principle and protection
Edward Sun
Edward Sun
PDF created with pdfFactory Pro trial version www.pdffactory.com
About speaker
About speaker
u
u Network ID :
Network ID : CardMagic
CardMagic
u
u Author of
Author of DarkSpy
DarkSpy anti... | pdf |
!
"
#
$
%
&
#
'
(
)
)
*
)
+
*
)
,
(
-
'
(
)
'
.
+
%
/
0
1
2
3
4
5
2
6
7
8
8
"
#
#
7
9
"
9
:
7
;
8
"
7
"
#
9
;
<
=
#
7
9
"
#
9
#
=
#
9
"
7
=
"
#
>
9
?
8
8
"
#
9
"
#
@
9
;
<
#
9
@
9
A
7
8
!
6
8
"
#
>
9
?
8
>
7
A
;
8
=
7
A
;
9
9
8
B
C
9
9
>
7
"
D
... | pdf |
Searching for the Light:
Adventures w/ OpticSpy
Joe Grand (@joegrand)
Hacker, Engineer, Daddy
OpticSpy
! Optical receiver to convert light into voltage
! Wavelength: Visible and near IR light (420-940nm)
! Signal speed: 100Hz-1.5MHz
! Data stream polarity: Select normal v. inverted
! Gain and threshold adjustment... | pdf |
Author: Ömer Coşkun
Why Nation-State Malwares Target Telco Networks:
Dissecting Technical Capabilities of Regin and Its Counterparts
The supreme art of war is to subdue the enemy without fighting. Sun Tzu
Outline
¡ Overview
¡ Telecom Network Architecture
¡ Practical Attack Surfaces
¡ GRX Attack Vectors... | pdf |
Java反序列化漏洞 - 1.从URL类的⼀个bug 说起
1
Java反序列化漏洞 - 1.从URL类的
⼀个bug 说起
URL 类的⼀个远古bug
Java 的URL 类有个很好玩的bug,当你调⽤它的hashCode()⽅法时,会发起⼀次DNS
解析。例如,当你往HashSet 添加⼀个URL元素时,会触发URL 的hashCode() ⽅法⽐较
元素,然后发出⼀个DNS 请求。
Java反序列化漏洞 - 1.从URL类的⼀个bug 说起
2
这个bug 源于URL 的⼀个错误实现,早在2001 年已经有⼈反馈给oracle,我们现在还能
在Oracle 的java bug 反馈平台看到当时的bug report 记录。
... | pdf |
Exploitation Detection System (EDS)
Introduction:
in the last several years, the exploits become the strongest cyber weapons in all cyber warfare. The
exploit developer/vulnerability researcher become the nuclear scientist of the digital world.
Most of Attacks now are APT attacks and they are based on attacking from be... | pdf |
Transcending Cloud Limitations
by Obtaining Inner Piece
WITH DEEPACK CHOPPA
Who am I?
I am the terror that flaps in the night
The modren man (secret secret)
Just this crazy guy, y’know?
Cloud Storage
Sharing “large” (10mb+) files w/ friends
Availability/Accessibility
Replaces USB keys?
B... | pdf |
Satellite TV Technology
How it works and what you can do with
different dishes
OldSkoolS
How does content get from the broadcast location to
my home?
Telstar 6
This section will describe, in detail, how content from CNN Headline News’
broadcast center gets to your home. This information is characteristic of
how mos... | pdf |
Adminer Server Side Request Forgery
(SSRF)
Adam Crosser
Brian Sizemore
Description:
We have discovered a way to use adminer to send arbitrary get requests and retrieve JSON
responses from internal servers. Specifically, this was demonstrated in order to extract AWS
access keys from the AWS metadata service.
Imp... | pdf |
OWNING THE CLOUT THROUGH SSRF
AND PDF GENERATORS
Ben Sadeghipour
Cody Brocious
WHO ARE WE
●
Head of Hacker Operations at HackerOne
●
Top 20 hacker on HackerOne
●
Snapchat, Yahoo, DoD, Airbnb, Valve, etc.
●
Youtube/Twitch/social media: @NahamSec
Ben Sadeghipour
●
Head of Hacker Education at HackerOne
●
Not top 20 on H... | pdf |
B O S S E E R I K S O N / B I T S E C
< B O S S E . E R I K S S O N @ B I T S E C . S E >
Runtime Kernel Patching on Mac OS X
Defcon 17, Las Vegas
Who am I?
Bosse Eriksson
Security Consultant / Researcher at Bitsec
Unhealthy fetish for breaking stuff
Recently been looking into Mac OS X rootkit ... | pdf |
Breaking Samsung's Root of Trust:
Exploiting Samsung S10 S-Boot
Jeffxx
#BHUSA @BLACKHATEVENTS
Jeff Chao (Jeffxx)
◆ Researcher at TrapaSecurity
◆ Ex-senior Researcher at TeamT5
◆ Member of HITCON CTF Team
◆ Member of Chroot
◆ Focus on Mobile and IoT Vulnerabilities
AGENDA
01
02
03
04
05
Samsung Security Framework - ... | pdf |
apacheurl
0x00
apacheurlnormalizeurldecode
0x01
request.c204271
if (r->parsed_uri.path) {
/* Normalize: remove /./ and shrink /../ segments, plus
* decode unreserved chars (first time only to avoid
* double decoding after ap_unescape_url() below).
*/
if (!ap_normalize_p... | pdf |
Home Insecurity: No Alarms, False Alarms, and SIGINT
Logan Lamb
lamblm@ornl.gov
ABSTRACT
The market share of home security systems has substan-
tially increased as vendors incorporate more desirable fea-
tures: intrusion detection, automation, wireless, and LCD
touch panel controls. Wireless connectivity allows vendors... | pdf |
BlockFighting with a
HOOKER
Shane.Macaulay@IOACTIVE.com
BLOCKFIGHTER II (@DEFCON24 #w00w00 #Blah!)
(K2) ktwo@ktwo.ca
What are we doing here?
• Methodology & tools for high speed comprehension binary trace/analysis/steering
• Super simple to use and FUN!
• Monitor and Alter execution
• BlockFighters
• ROP DEFENDER
•... | pdf |
谛听 — ⽆无线 Fuzzing 之旅
Kevin2600
翠花的⽇日常
翠花是位在报社⼯工作的⼥女编辑. 她跟很多⼈人⼀一样享受着科技带来的便捷. 智
能⼿手机成为她⽣生活中必不可少的⼀一部分. 每天早晨上班前, 她喜欢打开收⾳音
机了解下当天的天⽓气和交通状况. 上班途中她发现个化妆品打折的海报. 为
了获取更多的信息她⽤用⼿手机读取了海报上的⼆二维码标签.
结束了早上的⼯工作后,翠花喜欢到附近的咖啡店⾥里吃午餐. 最主要的原因
是店家提供免费 WIFI 上⺴⽹网. 下班归途中她带上新买的 Bluetooth ⽿耳机, 听
点⾳音乐放松下. 半路上翠花收到了家⾥里的智能电饭锅发来的 SMS 短信, 提
醒她晚饭已经蒸好, 回... | pdf |
Background
越来越多的软件和网站都推出了夜间模式, 所以最近夜间冲浪的时候经常从黑色的IDE切换到白色的网页的时候,
总会瞎眼一波, 就从谷歌插件商店搜了几个能把网页转换成夜间模式的插件, 最终决定用Night Eye.
不同于一般的只会修改background-color: black的插件, 这款插件通过算法来进行各种颜色调整, 既可以让
网页变成夜间模式, 也不会导致黑色背景和黑色字体融为一体.
官网: https://nighteye.app/
新用户有三个月免费试用, 然后是一年9刀或者40刀永久激活, 所以这里进行一波破解, 有能力购买的老板的还是
建议支持一下官方.
本文通过对这款插件做的一点微小的工作来进行... | pdf |
HITCON 2019 - Ta-Lun Yen (es)
1
Trust in Apple’s secret garden:
Exploring & Reversing Apple’s Continuity
Protocol
HITCON 2019 - Ta-Lun Yen (es)
2
Outline
● Motivation
● Introduction to Continuity Protocol
● iCloud, APNS, iMessage
● Continuity
– Previous Research
– Software Stack
– Protocol
● Remarks
HITCON 2019 - Ta-... | pdf |
Oracle Data Redaction is Broken
David Litchfield [david.litchfield@datacom.com.au]
8th November 2013
© Copyright Datacom TSS
http://www.datacomtss.com.au
Introduction
Oracle data redaction is a simple but clever and innovative idea from Oracle. However, at present,
there are weaknesses that undermine its effecti... | pdf |
Saving Cyberspace by
Reinventing File Sharing
Eijah
v1.0
The Modern Internet
A Price of Convenience
“…One can easily remain free of even the most intense political oppression simply by placing one’s faith and trust in
institutions of authority.”
– Glenn Greenwald
“When I am afraid, I put m... | pdf |
Cross-Platform Analysis of
Indirect File Leaks
in Android and iOS Applications
Daoyuan Wu
PhD Candidate at SMU
HITCON
Pacific’17
Appified World
2
Pic source: https://www.hughesandco.com/native-mobile-apps-vs-web-apps/
Mobile Sandbox
Pic source: http://hiqes.com/android-security-part-1/
×
Different threat model from ... | pdf |
Module 1
A journey from high level languages, through
assembly, to the running process
https://github.com/hasherezade/malware_training_vol1
Creating shellcodes
Shellcode: advantages
• Self-sufficient: easy to inject into other applications
• Small: can fit into a tiny space i.e. section caves
• May be used as a loader... | pdf |
1
2
What's the big deal about Docker/AppCanyways? We've had containers for 20
years. What new things are they bringing to the table aka how are they different
from LXC and traditional containers? What these new container formats, which
leverage existing technologies introduce is that they ease not just the ability ... | pdf |
Meticulously
Modern Mobile
Manipulations
[DEF CON 27, Las Vegas] – Leon Jacobs
$ whoami
◦ Leon Jacobs / @leonjza
◦ Security Researcher @ SensePost
◦ Been Hacking “stuff” for ~ 10 years
I also hated mobile application security a lot more in the past...
Lets be honest
about mobile
application hacking
$days since last ... | pdf |
Truman Kain
TEVORA
Dragnet
Your Social Engineering Sidekick
TL;DR
Your social engineering conversions
will increase with Dragnet.
Current States of:
•OSINT
•Analytics
•S.E. Engagements
OSINT
•Manual
•Repetitive
•Fleeting when automated
Analytics
Big companies live off of it
–Jeff Bezos, 1997
“3 years ago I was wor... | pdf |
过滤了了相关字符,and,select,updatexml双写绕过就好,空格⽤用/**/代替,拿到密
码 we1c0me%_#2&_@LCTF 。进去之后发现任意提交passwd提示密码不不对,让
num=0,passwd=5487即可。
虽然说写了了waf,但是sqlmap照样能过XD。各种tamper加上就好了了:
题⽬目⼀一共分为三步
第⼀一步是⼀一个正则绕过:
题⽬目的正则应该是php://.resource=(.)$这种形式,⽽而且第⼀一步应该先会检测是否是图⽚片,于双次
绕过就好了了:
Nu1L LCTF writeup
Web
签到题
我控⼏几不不主我及⼏几啦
苏达学姐的⽹网站
再读⼀一下file/ad... | pdf |
scapytcp
0x00
natgettcpnat
wendellh.323TCPTCPFTP
scapytcpscapy
0x01
scapy
https://scapy.readthedocs.io/en/latest/
demo
https://akaljed.wordpress.com/2010/12/12/scapy-as-webserver/
demo
#!/usr/bin/python
from scapy.all import *
# Interacts with a client by going through the three-way handshake.
# Shuts down the con... | pdf |
Invest in security
to secure investments
How to hack VMware
vCenter server in 60
seconds
Alexander Minozhenko
#whoami
• Pen-tester at Digital Security
• Researcher
• DCG#7812 / Zeronights
• CTF
• Thanks for ideas and support to Alexey Sintsov
2
What do pen-testers do?
• Scanning
• Fingerprinting
• B... | pdf |
The Ether Wars: Exploits,
counter-exploits and
honeypots on Ethereum
AUGUST 11, 2019
ConsenSys Diligence | The Ether Wars: Exploits, counter-exploits and honeypots on Ethereum
2
About ConsenSys Diligence and MythX
• We audit smart contracts and build security tools for smart
contract developers
• Other who contribut... | pdf |
411: A Framework for
Managing Security Alerts
Kai Zhong
@sixhundredns
kai@etsy.com
Kenneth Lee
@kennysan
ken@etsy.com
Kai Zhong
@sixhundredns
kai@etsy.com
Kenneth Lee
@kennysan
ken@etsy.com
Get 411 here:
https://github.com/kiwiz/411/
Slides: https://speakerdeck.com/kennysan/411-a-
framework-for-managing-security-aler... | pdf |
WEAPONIZING THE
BBC MICRO:BIT
DAMIEN "
" CAUQUIL
VIRTUALABS
DEF CON 25 - JULY 28, 2017
/ME
Head of R&D, Econocom Digital Security
Senior security researcher
HW/SW Reverse-engineer
AGENDA
BBC Micro:Bit
Features & Capabilities
Hacking ideas
Hacking into the Micro:Bit
Turning the Micro:Bit into a sniffer
Hacking various 2.... | pdf |
红明⾕CTF
Web
happysql
http://eci-2ze7dlrxgodbblkyir9b.cloudeci1.ichunqiu.com/
username=aaaw2aww"||
(strcmp((select%0a*%0afrom%0af1ag),concat("flag{a4398541",char(45),"2ae3",char(45)
,"4439",char(45),"a4f6",char(45),"69eafe0e9b71}"))%0ain%0a(1))#&password=*/#
writeShell
http://eci-2ze7dlrxgodbcwxp83gz.cloudeci1.ichunqiu.co... | pdf |
Practical Aerial Hacking &
Surveillance
Glenn Wilkinson
SensePost
DefCon 2014
@glennzw
Glenn Wilkinson
@glennzw
SensePost.com
@glennzw
@glennzw
@glennzw
@glennzw
@glennzw
Practical Aerial Hacking &
Surveillance?
@glennzw
https://www.eff.org/issues/surveillance-drones
https://www.eff.org/deeplinks/2012/01/drones-are-w... | pdf |
Hacking IIS
w/ shubs
Dealing with HTTPAPI 2.0
Assets
Have you seen this before?
• Either, you’re missing the subdomain associated with the IP address (No SSL certificate)
• Or the subdomain doesn’t resolve but you can obtain a full/partial subdomain from the SSL
certificate
Resolving the HTTPAPI 2.0 404 Error
• This... | pdf |
启明星⾠辰辰ADLab
智能语⾳音设备安全研究
演讲⼈人:王启泽
2019
PART 01
背景
⽬目录
CONTENTS
PART 02
⽹网络安全
PART 03
语⾳音安全
PART 04
隐私审计
01
02
03
04
PART 01
背景
语⾳音正成为⼈人与设备交互的⽅方式
语⾳音包括相当丰富的信息
• 性别.年年龄
• 环境.健康
• 想法.情绪
• 籍贯
我们研究的对象
我们关注的点
安全及隐私
PART 02
⽹网络安全
⾳音箱⽹网络架构
云平台
客户端
智能⾳音箱
https/mqtts
https/mqtts
dlna/蓝⽛牙
智能设备
⾃自定协议
云平台的特权命令
/打开远程shell
/更更换语⾳音... | pdf |
Vulnerable Out of the Box:
An Evaluation of Android Carrier Devices
Ryan Johnson - Kryptowire
Angelos Stavrou - Kryptowire
This work was supported by the Department of Homeland Security (DHS) Science and Technology (S&T) via award to the Critical Infrastructure Resilience Institute (CIRI) Center of Excellence (COE) le... | pdf |
回显
Resin 4.x
在resin 4.X中跟一下如何获取response对象
com.caucho.server.http.HttpRequest#handleRequest
com.caucho.server.http.AbstractHttpRequest#getResponseFacade
返回 response 对象
所以如果能获取到AbstractHttpRequest对象并调用该对象的getResponseFacade方法,即可获取
response对象。
获取AbstractHttpRequest对象,继承关系如下:
CTRL + H
基于 TcpSocketLink
com.caucho.network... | pdf |
A.B.U技术漫谈笔记
pdf版没有索引图,这里我贴上,更直观点。 ABU东西很多,远不止此,期待其他师傅们的分享。同时
师傅们如果有挖掘LOLbins的思路麻烦分享下。
一.介绍
参考: RedCore A.B.U视频教程
# A.B.U 意义: A.B 活下来,U 活下去(反监控,反溯源,反日志,反取证) 活多久的问题
# A.B.U 目的: 反查杀
二.分类
1. 范式A.B.U
1.1静态A.B.U
1.1.1 文件A.B.U 磁盘文件
(1)加密解密项目推荐 C/C++
WjCryptLib库 MD4,AES等 一个.c文件对应一个.h文件
https://github.com/WaterJu... | pdf |
Gone Apple Pickin’: Red
Teaming macOS
Environments in 2021
Cedric Owens
DEF CON 29
BIO
•Offensive Security Engineer
•Blue Team Experience
•
macOS post exploitation
•Enjoy 80s/90s Nostalgia
•
@cedowens
AGENDA
• Why Do We Care about macOS?
• Overviews Of Common Tech
Environments
• macOS Payloads & Post Exploitation
... | pdf |
The BYOD PEAP Show
Mobile Devices Bare Auth
Josh Yavor
iSEC Partners
DEF CON XXI
August ,
Josh Yavor (iSEC Partners)
The BYOD PEAP Show
DEF CON XXI, August ,
/
Introduction
Welcome
A Perfect Storm
1
1noaa.gov
Josh Yavor (iSEC Partners)
The BYOD PEAP Show
DEF CON XXI, August ,
/
Introduction
Welcome
PEAP: Pwned E... | pdf |
A Bridge Too Far
Defeating Wired 802.1X with a
Transparent Bridge Using Linux
Alva Lease ‘Skip’ Duckwall IV
Exorcyst at gmail d0t com
Who Is This Guy?
• Been working with Linux since before the 1.0
kernel (1993ish)
• Unix admin by trade – transitioned to IT security
• Likes alphabet soup:
– CISSP, CISA, GCIH, GCIA, G... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.