text
stringlengths
100
9.93M
category
stringclasses
11 values
Anch Presents: The Monkey In the Middle A pen-testers guide to playing in traffic. Twitter: @boneheadsanon A little about me Over 10 years experience in testing pens (Fountain is my favorite) Why we play in traffic? ❖ Traffic is interesting stuff.! ❖ Gives us insight in to how things work.! ❖ Allows us to gather inf...
pdf
Mainframe Surrogat Chains By Jake Labelle <jake.labelle@hotmail.co.uk> 08/08/2020 Who Am I ● Jake Labelle ● Associate Security Consultant at F-Secure ● Been on a couple Mainframe Jobs (not a expert) ● Streaming from Basingstoke, UK ● Was going to put a picture but just look to the right z/OS High Level ● Mainframe o...
pdf
GNU History Library Edition 6.1, for History Library Version 6.1. October 2009 Chet Ramey, Case Western Reserve University Brian Fox, Free Software Foundation This document describes the GNU History library (version 6.1, 9 October 2009), a program- ming tool that provides a consistent user interface for recalling lines...
pdf
Saving Cyberspace by Reinventing File Sharing Eijah v1.02 The Modern Internet The Price of Convenience “…One  can  easily  remain  free  of  even  the  most  intense  political  oppression  simply  by  placing  one’s  faith  and  trust  in   institutions of authority.”   – Glenn Greenwald “When  I  am  afraid,  I  put...
pdf
Trooping to Taiwan: Technical Sophistication and Connections in Closed Espionage Ecosystems Matt Brooks, Citizen Lab Campaign Connections Challenges Conclusion Campaign DMShell++ Campaign Success • At least one target fell victim • Interesting post-compromise tactic • Detection avoidance? • Better server-side compone...
pdf
一分钟免杀cobaltstrike 收录于话题 #cobaltstrike 1 #免杀 1 #渗透测试 48 #内网安全 3 #代码 2 简要介绍 本次利用到的是Nim语言 1.Nim 是一门开源的编程语言 2.Nim 的独到之处在于它可以编译成其他编程语言代码(主要是 C 语言和 JavaScript) 3.将 Nim 与 C 语言或 JavaScript 代码集成在一起可以获得最大的价值 4.Nim 可以生成高质量的 C 语言代码,避免出现 C 语言的典型错误(如内存泄露和数组指针错误) 下载Nim安装包 https://nim-lang.org/install.html 官方提供Windows、Linux、Mac版本,根据自己...
pdf
Copyright©2019 nao_sec All Rights Reserved. 1 Copyright©2019 nao_sec All Rights Reserved. Who are we • Shota Nakajima • Malware Analyst • Engage in incident response • Work at Cyber Defense Institute, Inc. in Japan • Rintaro Koike • Chief researcher / founder of nao_sec • Threat Hunter • Malicious traffic / script / do...
pdf
Breaking TrustZone-M PRIVILEGE ESCALATION ON LPC55S69 What are two firmware engineers doing at DEFCON? Designing hardware Root of Trust for Oxide Computer Company In-house, microkernel OS written in Rust Leverage publicly-available, security-focused microcontroller Plan to open-source everything by time product ships...
pdf
Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared D. DeMott Computer Science Michigan State University demottja@msu.edu Richard J. Enbody Computer Science Michigan State University enbody@msu.edu William F. Punch GARAGe Michigan State University punch@msu.edu Acc...
pdf
#BHUSA @BlackHatEvents Open Threat Hunting Framework John Dwyer, X-Force Head of Research (@TactiKoolSec, LinkedIn: john-dwyer-xforce) Neil Wyler, X-Force Global ATA Lead (@Grifter801) Sameer Koranne, X-Force Global OT Lead #BHUSA @BlackHatEvents Information Classification: General Chasing Excellence High Performers V...
pdf
1 [show me your privileges and I will lead you to SYSTEM] Andrea Pierini, Paris, June 19th 2019 2 dir /a /r %USERPROFILE% ➔ Cyclist & Scuba Diver, Father & Husband ➔ IT Architect & Security Manager ➔ Long time experience ➔ InfoSec addicted ➔ Windows Server & Linux “early adopter” “whoami /priv” - Andrea Pierini @dec...
pdf
! ! Sentient&Storage:&& Do&SSDs&have&a&mind&of&their&own?& ! ! ! ! ! ! ! ! ! Tom!Kopchak! Kopchak! ! 2! Table&of&Contents& Abstract!.................................................................................................................................................!8! Introduction!.............................
pdf
安服崽日常做代码审计的时候,经常需要把已经发布的 java 项目反编译 之前一直都是把所有 jar 和 class 打进一个 zip 包,扔到 jd-gui,然后在 save all resource,这 种办法很蠢。 直到 bearcat 师傅发给我一个消息,我才发现,原来批量反编译 java 代码是这么简单的一件 事,只需要一个命令就可以了。 Idea 自带的反编译项目地址:https://github.com/fesh0r/fernflower 对我们安服崽来说还是不太方便,稍微做了一些改动,增加了筛选 class 的功能,黑白名单 方式让脚本只反编译我们需要的 class,仅仅只是 indexof 来做筛选 只需要...
pdf
“Grasshopper always wrong in argument with Chicken.” - Book of Chan Functional Fuzzing with Funk and further explorations into the use of functional languages for network scripting Benjamin Kurtz Q:WTF? A: Funk is a framework for the scripted generation of network traffic, written using the Chicken Scheme-to-C comp...
pdf
Fuzzing Linux with Xen DEF CON 29 Tamas K Lengyel 2 don’t microwave your pets Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex​. Performance results are based on testing as of dates shown in configurations and may not reflect all publicly available ​updates. ...
pdf
WSUSPENDU / 52 Yves Le Provost & Romain Coltel ANSSI WSUSpendu USE WSUS TO HANG ITS CLIENTS SATURDAY, 29TH JULY 2017 YVES LE PROVOST & ROMAIN COLTEL WSUSPENDU / 52 Yves Le Provost & Romain Coltel Who we are, what we do… - Yves Le Provost - Security auditor for more than 10 years - Currently works for French cyber defen...
pdf
Aura A peer-to-peer reputation system Cat Okita Copyright 2003 2 INDEX INDEX ................................................................................................................................................................... 2 ABSTRACT .......................................................................
pdf
New  Exploit  Mi-ga-on In  Internet  Explorer HITCON  X @K33nTeam  @KeenTeam @promised_lu About  Me Amateur  browser  exploiter Main  work  is  wri-ng  fuzzers 2 3 Background Internet  Explorer  Vulnerability  Sta-s-cs 4 2013 •  CVE-­‐2013-­‐0025  CParaElement  Use-­‐AR...
pdf
The Next Generation of Cryptanalytic Hardware FPGAs (Field Programmable Gate Arrays) allow custom silicon to be implemented easily. The result is a chip that can be built specifically for cracking passwords. This presentation focuses on uncovering some of the underlying basics behind gate logic and shows how it can...
pdf
Tag-side attacks against NFC What is NFC? Contactless communication between two devices in close proximity Many uses, primarily door controls and payment systems Why attack NFC? Interesting technology Low-level analysis tools can be prohibitively expensive Known to be insecure, but still widely used ISO-14443 Focuses...
pdf
Sniffing Keystrokes With Lasers/Voltmeters Sniffing Keystrokes With Lasers/Voltmeters Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage Copyright 2009 Inverse Path Ltd. Andrea Barisani Chief Security Engineer <andrea@inversepath.com> http://www.inversepath.com Daniele Bianco Hard...
pdf
John@johnthunder.one 那就做個綿羊牆好了! http://www.directsystems.com/support/diff_h http://www.cisco.com/c/dam/en/us/support/do cs/switches/catalyst-6500-series- switches/10570-41d.gif Acce sPoi nt PC_A PC_B AP PC_A PC_B
pdf
The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. The Wide World of WAFs Ben Feinstein, CISSP GCFA SecureWorks Counter Threat Unit™ DEFCON 16 August 8, 2008 The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. • Web Application Firewalls (WAFs) ...
pdf
应用程序接口(API) 数据安全研究报告 (2020 年) 中国信息通信研究院安全研究所 2020 年 7 月 版权声明 本报告版权属于中国信息通信研究院安全研究所,并受 法律保护。转载、摘编或利用其它方式使用本报告文字或者 观点的,应注明“来源:中国信息通信研究院安全研究所”。 违反上述声明者,本院将追究其相关法律责任。 前 言 伴随着云计算、大数据、人工智能等技术的蓬勃发展,移动互 联网、物联网产业加速创新,移动设备持有量不断增加,Web 应用、 移动应用已融入生产生活的各个领域。这一过程中,应用程序接口 (Application Programming Interface,API)作为数据传输流转 的重要通道发挥着举足轻重的作...
pdf
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matters of Unlicensed Operation in the TV Broadcast Bands Additional Spectrum for Unlicensed Devices Below 900 MHz and in the 3 GHz Band ET Docket No. 04-186 ET Docket No. 02-380 REPLY COMMENTS OF DELL INC., GOOGLE, INC., THE HEWLETT...
pdf
dwangoAC TASBot the perfectionist The amazing life & achievements of... The amazing life & achievements of... Agenda ● Intro to Speedrunning video games, Tool-Assisted Speedruns, and Emulators ● TASBot: Playing back a TAS on real hardware ● TAS techniques, history, evolution ● Emulator tools - memory search, Lua scri...
pdf
Cracking 400,000 Passwords Matt Weir Sudhir Aggarwal Florida State University Special Thanks: Dr. Sudhir Aggarwal Professor Breno de Medeiros National Institute of Justice National White Collar Crime Center My Research Assist Law Enforcement Develop better ways to model how people actually create passwords Investiga...
pdf
Hacking OpenVMS Claes Nyberg Christer Öberg James Tusini Some facts about OpenVMS An Operating system with the following feature Multi-user / Multi-processing Virtual memory Real time processing Transaction processing History of ownership DIGITAL (1978 – 1998) COMPAQ (1998 – 2001) HP (2001 - Today) Some facts ...
pdf
sslvpn tips记录 升级包密码获取 众所周知,sslvpn的补丁包其实是个压缩包,diff补丁包是需要密码的。 先放一个包结构: 32位原始压缩包md5值|00|原始压缩包 众所周知,皮卡丘升级是依靠 SANGFOR_Updater 来进行升级的,那么升级包密码就在这个里面二话不说 ida启动,没加壳,很容易就找到了 压缩包结构 压缩包分为两类 cssu 合集类 ssu单包类 ssu 包结构结构 32位原始压缩包md5值|00|原始压缩包 目录结构 cssu包结构 ssu组合+upgrade.conf(升级配置文件) sslvpn443 端口的一些TIPS /sftmpfs/etc/htdocs/com/ 但是在此目录下写入...
pdf
Sk3wlDbg: Emulating all (well many) of the things with Ida Chris Eagle Sk3wl 0f r00t Disclaimer – Everything I say today is my own opinion and not necessarily the opinion of my employer Who am I? – Senior lecturer of computer science – Computer security researcher – Reverse engineer – Inveterate Capture th...
pdf
Copyright 2003 - SunStorm Security Group Slide Number 1 of 64 After Napster Assessing the Threats, Value and Survivability of Peer-to-Peer Networks Copyright 2003 - SunStorm Security Group Slide Number 2 of 64 Napster: The File Sharing Invasion Copyright 2003 - SunStorm Security Group Slide Number 3 of 64 Napster Over...
pdf
Mobile App Moolah: Profit taking with Mobile Malware Jimmy Shah Mobile Security Researcher Mobile App Moolah: Profit taking with Mobile Malware 2 • Who we are • Mobile malware • Modern for-profit malware • Examples Contents Mobile App Moolah: Profit taking with Mobile Malware 3 Who we are • Mobile Antivirus Researcher...
pdf
#proxyshell for workload 从发布上个文章后,好多从那个文章加微信的朋友都提到了负载问题,但是搬家没时 间看。最近刚搬完家看了一下大致解决了这个问题,顺便做一个记录。脚本已公开至 个人 github。 https://github.com/wudicainiao/proxyshell-for-exchange_workload 0x02 Wsman 发送请求时有顺序的序列,而遇到负载时这个特点会造成顺序发送请求时, 有些请求发给了负载的其他机器,从而造成 cmdlet 调用失败,会报错如下。 但是并不是所有这个报错的都是负载,sid 认证失败后如果还持续发送请求,也会报 该错误。 具体看目标是否存在负载,可查看...
pdf
Confessions(of(a(Professional(Cyber(Stalker( KEN(WESTIN( SR(SECURITY(ANALYST(( KWESTIN@GMAIL.COM(( @KWESTIN( STALKER(REVEALED( D  Ken(WesEn(( D  Former(“ethical”(cyber(stalker( D  Developed(privacy(invading(tools((for(good)( D  Put(bad(people(in(jail( D  Trained(law(enforcement(on(invesEgaEve((OSINT)(techniques( D  Cur...
pdf
SRC漏洞挖掘漫谈 星光 2 0 2 1 年 1 月 9 日 安 全 爱 好 者 , 对 自 动 化 漏 洞 挖 掘 有 着 自 己 的 见 解 。 获 得 2 0 2 1 T S R C 神 洞 猎 手 奖 星光 AK/ SK 信 息 泄 露 , 自 动发 现 SQ L 注 入 绕 WAF探 测 Hos t 碰 撞 检 测 实 现 域 名 监 控和 站 点变 化 监 控 AK/SK 信息泄露,自动发现 一、AK/SK 信息泄露,自动发现 1.API& 响 应 包 中 2.J S⽂ 件 中 3.G it Hu b 中 4 .APK& 中 5 .& 等 场 景 1、API&响应包中 通 过 B u r p 的 筛 选 功 能 搜 索...
pdf
Digital Active Digital Active Self Defense Self Defense DEFCON 12 DEFCON 12 OUDOT Laurent OUDOT Laurent oudot oudot@ @rstack rstack.org .org http://www. http://www.rstack rstack.org/ .org/oudot oudot// Some references • Defending your right to defend: Considerations of an automated strike-back technology – Timothy M. M...
pdf
Analysis of Mutation and Generation-Based Fuzzing Whitepaper Charlie Miller and Zachary N. J. Peterson Independent Security Evaluators www.securityevaluators.com March 1, 2007 c⃝ Independent Security Evaluators 2007. All rights reserved Analysis of Mutation and Generation-Based Fuzzing 1 Abstract We present a study of ...
pdf
SHAREENUM: WE WRAPPED SAMBA SO YOU DON’T HAVE TO Lucas Morris @lucasjmorris Michael McAtee @michael.mcatee About Us Lucas Morris Manager at Crowe Horwath LLP “Manager”, Pentester, Code Monkey Michael McAtee Senior Consultant at Crowe Horwath LLP Pentester, SysAdmin, [something funny here] About Us...
pdf
解析 儲存embedded架構原理理實現漏洞洞與反制 傳台灣某公司主控 SSD 藏後⾨門,”銀監會要求調查" 這是真實的嗎? 儲存裝置有後⾨門嗎? 如果有,哪⼜又是怎樣的狀狀況,我們要怎樣防範? 前⾔言 Thx 
 Hitch 2015 ,2012 講師
 ⼯工信部⾼高級資料恢復⼯工程師
 ACELab Raid ,Flash 認證
 OSSLab 開放軟體實驗室創辦⼈人 講師介紹 儲存裝置上的嵌入式架構 CPU Core +RAM ROM 碟片上的韌體架構 硬碟載入 啟動流程 (以WD為範例例) • MCU ROM bootstrap • 內部或是外在SPI ROM • 碟片上的Module 01 In...
pdf
Robert Imhoff-Dousharm US Resident Las Vegas, NV, USA rimhoffd@shebangsoft.org Professional Sound Byte - Robert has been working with computer systems for over 11 years. He has worked in the security field for the better part of 4 years. His most recent, has been working with credit card technologies, and the secur...
pdf
Exploiting SCADA Systems Jeremy Brown Vulnerability Research Engineer @ Tenable Attack Vectors via Software Vulnerabilities Client-side attacks from web browsers, e-mail, and malicious servers Server-side attacks from the internet or internal network Clickjacking!? So.. whats wrong? Security has been implemented ...
pdf
© 2013 Cisco and/or its affiliates. All rights reserved. Page 1 of 20 White Paper Examining the Bitsquatting Attack Surface Bit errors in memory, when they occur in a stored domain name, can direct Internet traffic to the wrong domain potentially compromising security. When a domain name one bit different from a...
pdf
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! Orange Tsai Taiwan No.1 About Orange Tsai The most professional red team in Taiwan About Orange Tsai The largest hacker conference in Taiwan founded by chrO.ot About Orange Tsai Speaker - Speaker at several security conferences HITCON, WooYun...
pdf
Servlet的线程安全问题 引⼊ ⾸先看看这样的代码,有什么问题 这⾥既要求cmd不能包含 Calculator 又必须要包含 Calculator ,能做到吗,当然是可以 的 Servlet的多线程机制 Servlet实际上是⼀个单件,当我们第⼀次请求某个Servlet时,Servlet容器将会根据web.xml配 置⽂件或者是注解实例化这个Servlet类,之后如果又有新的客户端请求该Servlet时,则⼀般不 会再实例化该Servlet类,这说明了什么呢?简单来说,当多个⽤户⼀起访问时,得到的其实是 同⼀个Servlet实例,这样的话,他们对实例的成员变量的修改其实会影响到别⼈,所以在开发 的时候如果没有注意这个问题往往会有...
pdf
August, 2007 ©2007 Finjan Software Ltd. All rights reserved. The Inherent Insecurity of Widgets and Gadgets Aviv Raff Iftach Ian Amit Who are we? • Aviv Raff • Security researcher at Finjan’s MCRC • Iftach Ian Amit • Director of security research at Finjan Introduction - Widgets? • What is a widget? • Widgets are smal...
pdf
Steganography in Commonly Used HF Radio Protocols @pdogg77 @TheDukeZip pdogg ● Paul / pdogg / @pdogg77 ● Day Job: Security Researcher at Confer Technologies Inc. ● Hobby: Licensed as an amateur radio operator in 1986, ARRL VE ● This is my second trip to DEF CON thedukezip ● Brent / thedukezip / @thedukezip ...
pdf
SRC 1. IP 2. 1.SSL 2. 3.Github 4.DNS 5. SSL 12 SRC SSL 1.censys.io 2.crt.sh 1.riskiq 2.shodan 3.findsubdomains [] [] 4.censys.io 5.dnsdb.io DNS SSLGithub crt.shnss.a.com Github ​ ​ GET ​ json ​ fastjson ​ ​ Github github IP IPASIP IP : http://IPwhois.cnnic.net.cn/ 123.58.191.1 [IP] ​ IP ​ Netease-Network ​ IPNetea...
pdf
Links to Police Procedure Cases & Essays When Can the Police Make a Stop? Probable Cause Brinegar v. US (1949) http://vlex.com/vid/20016296 case Maryland v. Pringle (2003) http://www.oyez.org/cases/2000-2009/2003/2003_02_809/ case Reasonable Suspicion Alabama v. White (1990) http://supreme.justia.com/us/496/3...
pdf
Electronic Frontier Finland ry http://www.effi.org/ EFFI Mikko Välimäki & Ville Oksanen DEFCON XI, 2nd August 2003 Electronic Frontier Finland ry http://www.effi.org/ Electronic Frontier Finland ry  Founded in September 2001, over 300 members • Board and many active members are experts in law and technology  Comme...
pdf
Your Goal: Be a Harder Target Many of the same risks apply U.S. v. Schaffer suspect should know “If I were your lawyer, I’d advise you not to answer that tweet.” directly to any individuals forums known to support or promote illegal activity consider disabling comments Authorship Analysis in Cybercrime Investi...
pdf
快手业务安全 ——敌众我寡的歼灭战 讲师介绍 姓名:陈成 • 2014.2 中国科学院 信息安全 博士 • 2018.3 快手-风控业务安全负责人 目录 01 初识黑灰产 02 走进风控 03 核心打法 一、初识黑灰产 黑色产业链 人数盘大 敌暗我明 n 善于伪装、反侦察意 识强 产业链逐渐完善 n 集团化、规模化、智 能化 n 百万从业人员 n 年产值达千亿 灰色产业链 从“肉鸡”到“真鸡” Ø 真人真机 Ø 平台化、裂变化 Ø 多场景、多行业 14 15 37 52 184 692 1542 2014年 2015年 2016年 2017年 2018年 2019年 2020年 2014年-2020年真人作弊APP开发者数量发展走势...
pdf
mac 0x00 scheme 0x01 macdefault application default application 2.pypython launchpython windows Uniform Type Identifier https://en.wikipedia.org/wiki/Uniform_Type_Identifier https://developer.apple.com/library/archive/documentation/Miscellaneous/Reference/UTIRef/Articles/System- DeclaredUniformTypeIdentifiers.html...
pdf
Packing & the Friendly Skies Deviant Ollam Packing & the Friendly Skies Why Transporting Firearms May Be The Best Way To Safeguard Your Tech When You Fly Deviant Ollam Packing & the Friendly Skies Deviant Ollam you may have seen me before… Packing & the Friendly Skies Deviant Ollam i speak at lots of cons… Packing & th...
pdf
WIPING OUT CSRF JOE ROZNER | @JROZNER IT’S 2017 WHAT IS CSRF? WHEN AN ATTACKER FORCES A VICTIM TO EXECUTE UNWANTED OR UNINTENTIONAL HTTP REQUESTS 4 WHERE DOES CSRF COME FROM? ▸ Safe ▸ GET ▸ HEAD ▸ OPTIONS ▸ Unsafe ▸ PUT ▸ POST ▸ DELETE 6 SAFE VS. UNSAFE COOKIES ▸ Cookies typically used to specify session iden...
pdf
听说你在⽤SigFlip在PE签名⾥嵌⼊ shellcode? -- 副标题: 检测SigFlip在PE的签名⾥嵌⼊的shellcode,以及嵌⼊⽅法改进 # 前⾔ 之前看到 @w8ay 实现的⽩加⿊⽣成器,就感觉这个做法⾮常的棒,但是 SigFlip 的做法 真的隐蔽吗?真的不容易被查杀吗? 刚好最近在研究PE的⽂件签名结构和签名,那今天就详细讲解⼀下签名相关的内容,以及如 何改进 SigFlip 实现更深层次的隐藏。 # 原理回顾 对原理⽐较了解的直接跳过这⼀节。 看⼀下微软给的PE⽂件的签名的结构,这⼀张图⾮常的经典,但是这只是⼀个微软签名省略 了⼤部分细节的概括图,但是有助于我们了解⼀些最基本的信息。 ⾸先可以看到图中...
pdf
请谨慎编码,哪怕它只是一句错误处理 wang yu Hacks in Taiwan, 2013 — 来自 win32k ! EPATHOBJ::pprFlattenRec 漏洞的启示 议题简介 第一部分 议题简介 ·关于作者 ( wangyu@360.cn ) ·议题背景 2013 年 3 月 Tavis Ormandy 前辈披露了一个微 软win32k 模块的问题 —— 在内存压力测试的情况 下,例程 win32k!EPATHOBJ::bFlatten 发生了蓝屏。 接下来,关于该蓝屏的利用可谓是一波三折。5 月,随着对链表关系的深度分析,蓝屏问题终于上升 为本地提权问题,exploit-db 对此问题的关注度激 增。 本议题将...
pdf
Security at Kernel Level Philippe Biondi <biondi@cartel-securite.fr> — Defcon 10 August 2,3,4th, 2002 Outline 1 ■ Why ? ▶ Context ▶ A new security model ▶ Conclusion ■ How ? ▶ Taxonomy of action paths ▶ Defending kernel space ▶ Filtering in kernel space ■ Implementations ▶ Existing projects ▶ LSM CARTEL SÉCURITÉ — Phil...
pdf
An Unauthenticated Journey to Root : Pwning Your Company’s Enterprise Software Servers Yvan Genuer Onapsis ygenuer@onapsis.com Pablo Artuso Onapsis partuso@onapsis.com 1. Abstract Companies consist of a plethora of software, hardware, vendors, and solutions working to- gether to keep the business running and alive. Whe...
pdf
www.dbappsecurity.com.cn 百举百捷: 红队视角下又一个突破口, 再看大国独有小程序 2020.6.16/Poc Sir À propos de moi 关于我 Poc Sir Cool-Guy@C-est.Cool 雷神众测以及其他平台专业打酱油白帽子 Hack Inn « www.hackinn.com » 安全议题分享平台运营者 安恒信息实习4年的最长实习生,未来仍将实习 目前一直呆在法国,欢迎大家来找我思考美食、人参 喜欢聊聊两岸三地,微博号挺多的红V、蓝V、橙V、没V都有 Contents 目录 小程序概览 01 获取小程序源码 02 初探好玩的CMRF漏洞 03 小程序的特有API漏洞 04 05 ...
pdf
Vista system restore Vista system restore rootkit rootkit Principle and protection Principle and protection Edward Sun Edward Sun PDF created with pdfFactory Pro trial version www.pdffactory.com About speaker About speaker u u Network ID : Network ID : CardMagic CardMagic u u Author of Author of DarkSpy DarkSpy anti...
pdf
                 ! " # $ % &  # ' ( ) ) * ) + * ) , ( - ' ( ) ' . + % / 0 1 2 3 4 5 2 6  7 8  8 " #  # 7 9 "  9 : 7 ; 8  " 7 " # 9 ; < = # 7 9 " # 9 #   = # 9 " 7 = " # > 9 ? 8  8 " # 9 "   # @ 9 ;   < # 9 @ 9 A 7  8 ! 6  8 " # > 9 ? 8 > 7   A ; 8 = 7 A ;  9 9 8  B C 9   9 > 7 " D ...
pdf
Searching for the Light: Adventures w/ OpticSpy Joe Grand (@joegrand) Hacker, Engineer, Daddy OpticSpy ! Optical receiver to convert light into voltage ! Wavelength: Visible and near IR light (420-940nm) ! Signal speed: 100Hz-1.5MHz ! Data stream polarity: Select normal v. inverted ! Gain and threshold adjustment...
pdf
Author: Ömer Coşkun Why Nation-State Malwares Target Telco Networks: Dissecting Technical Capabilities of Regin and Its Counterparts The supreme art of war is to subdue the enemy without fighting. Sun Tzu Outline ¡  Overview ¡  Telecom Network Architecture ¡  Practical Attack Surfaces ¡  GRX Attack Vectors...
pdf
Java反序列化漏洞 - 1.从URL类的⼀个bug 说起 1 Java反序列化漏洞 - 1.从URL类的 ⼀个bug 说起 URL 类的⼀个远古bug Java 的URL 类有个很好玩的bug,当你调⽤它的hashCode()⽅法时,会发起⼀次DNS 解析。例如,当你往HashSet 添加⼀个URL元素时,会触发URL 的hashCode() ⽅法⽐较 元素,然后发出⼀个DNS 请求。 Java反序列化漏洞 - 1.从URL类的⼀个bug 说起 2 这个bug 源于URL 的⼀个错误实现,早在2001 年已经有⼈反馈给oracle,我们现在还能 在Oracle 的java bug 反馈平台看到当时的bug report 记录。 ...
pdf
Exploitation Detection System (EDS) Introduction: in the last several years, the exploits become the strongest cyber weapons in all cyber warfare. The exploit developer/vulnerability researcher become the nuclear scientist of the digital world. Most of Attacks now are APT attacks and they are based on attacking from be...
pdf
Transcending Cloud Limitations by Obtaining Inner Piece WITH DEEPACK CHOPPA Who am I?   I am the terror that flaps in the night   The modren man (secret secret)   Just this crazy guy, y’know? Cloud Storage   Sharing “large” (10mb+) files w/ friends   Availability/Accessibility   Replaces USB keys?   B...
pdf
Satellite TV Technology How it works and what you can do with different dishes OldSkoolS How does content get from the broadcast location to my home? Telstar 6 This section will describe, in detail, how content from CNN Headline News’ broadcast center gets to your home. This information is characteristic of how mos...
pdf
Adminer Server Side Request Forgery (SSRF) Adam Crosser Brian Sizemore Description: We have discovered a way to use adminer to send arbitrary get requests and retrieve JSON responses from internal servers. Specifically, this was demonstrated in order to extract AWS access keys from the AWS metadata service. Imp...
pdf
OWNING THE CLOUT THROUGH SSRF AND PDF GENERATORS Ben Sadeghipour Cody Brocious WHO ARE WE ● Head of Hacker Operations at HackerOne ● Top 20 hacker on HackerOne ● Snapchat, Yahoo, DoD, Airbnb, Valve, etc. ● Youtube/Twitch/social media: @NahamSec Ben Sadeghipour ● Head of Hacker Education at HackerOne ● Not top 20 on H...
pdf
B O S S E E R I K S O N / B I T S E C < B O S S E . E R I K S S O N @ B I T S E C . S E > Runtime Kernel Patching on Mac OS X Defcon 17, Las Vegas Who am I?   Bosse Eriksson   Security Consultant / Researcher at Bitsec   Unhealthy fetish for breaking stuff   Recently been looking into Mac OS X rootkit ...
pdf
Breaking Samsung's Root of Trust: Exploiting Samsung S10 S-Boot Jeffxx #BHUSA   @BLACKHATEVENTS Jeff Chao (Jeffxx) ◆ Researcher at TrapaSecurity ◆ Ex-senior Researcher at TeamT5 ◆ Member of HITCON CTF Team ◆ Member of Chroot ◆ Focus on Mobile and IoT Vulnerabilities AGENDA 01 02 03 04 05 Samsung Security Framework - ...
pdf
apacheurl 0x00 apacheurlnormalizeurldecode 0x01 request.c204271 if (r->parsed_uri.path) { /* Normalize: remove /./ and shrink /../ segments, plus * decode unreserved chars (first time only to avoid * double decoding after ap_unescape_url() below). */ if (!ap_normalize_p...
pdf
Home Insecurity: No Alarms, False Alarms, and SIGINT Logan Lamb lamblm@ornl.gov ABSTRACT The market share of home security systems has substan- tially increased as vendors incorporate more desirable fea- tures: intrusion detection, automation, wireless, and LCD touch panel controls. Wireless connectivity allows vendors...
pdf
BlockFighting with a HOOKER Shane.Macaulay@IOACTIVE.com BLOCKFIGHTER II (@DEFCON24 #w00w00 #Blah!) (K2) ktwo@ktwo.ca What are we doing here? • Methodology & tools for high speed comprehension binary trace/analysis/steering • Super simple to use and FUN! • Monitor and Alter execution • BlockFighters • ROP DEFENDER •...
pdf
谛听 — ⽆无线 Fuzzing 之旅 Kevin2600 翠花的⽇日常 翠花是位在报社⼯工作的⼥女编辑. 她跟很多⼈人⼀一样享受着科技带来的便捷. 智 能⼿手机成为她⽣生活中必不可少的⼀一部分. 每天早晨上班前, 她喜欢打开收⾳音 机了解下当天的天⽓气和交通状况. 上班途中她发现个化妆品打折的海报. 为 了获取更多的信息她⽤用⼿手机读取了海报上的⼆二维码标签. 结束了早上的⼯工作后,翠花喜欢到附近的咖啡店⾥里吃午餐. 最主要的原因 是店家提供免费 WIFI 上⺴⽹网. 下班归途中她带上新买的 Bluetooth ⽿耳机, 听 点⾳音乐放松下. 半路上翠花收到了家⾥里的智能电饭锅发来的 SMS 短信, 提 醒她晚饭已经蒸好, 回...
pdf
Background 越来越多的软件和网站都推出了夜间模式, 所以最近夜间冲浪的时候经常从黑色的IDE切换到白色的网页的时候, 总会瞎眼一波, 就从谷歌插件商店搜了几个能把网页转换成夜间模式的插件, 最终决定用Night Eye. 不同于一般的只会修改background-color: black的插件, 这款插件通过算法来进行各种颜色调整, 既可以让 网页变成夜间模式, 也不会导致黑色背景和黑色字体融为一体. 官网: https://nighteye.app/ 新用户有三个月免费试用, 然后是一年9刀或者40刀永久激活, 所以这里进行一波破解, 有能力购买的老板的还是 建议支持一下官方. 本文通过对这款插件做的一点微小的工作来进行...
pdf
HITCON 2019 - Ta-Lun Yen (es) 1 Trust in Apple’s secret garden: Exploring & Reversing Apple’s Continuity Protocol HITCON 2019 - Ta-Lun Yen (es) 2 Outline ● Motivation ● Introduction to Continuity Protocol ● iCloud, APNS, iMessage ● Continuity – Previous Research – Software Stack – Protocol ● Remarks HITCON 2019 - Ta-...
pdf
Oracle Data Redaction is Broken David Litchfield [david.litchfield@datacom.com.au] 8th November 2013 © Copyright Datacom TSS http://www.datacomtss.com.au Introduction Oracle data redaction is a simple but clever and innovative idea from Oracle. However, at present, there are weaknesses that undermine its effecti...
pdf
Saving Cyberspace by Reinventing File Sharing Eijah v1.0 The Modern Internet A Price of Convenience “…One  can  easily  remain  free  of  even  the  most  intense  political  oppression  simply  by  placing  one’s  faith  and  trust  in   institutions of authority.”   – Glenn Greenwald “When  I  am  afraid,  I  put  m...
pdf
Cross-Platform Analysis of Indirect File Leaks in Android and iOS Applications Daoyuan Wu PhD Candidate at SMU HITCON Pacific’17 Appified World 2 Pic source: https://www.hughesandco.com/native-mobile-apps-vs-web-apps/ Mobile Sandbox Pic source: http://hiqes.com/android-security-part-1/ × Different threat model from ...
pdf
Module 1 A journey from high level languages, through assembly, to the running process https://github.com/hasherezade/malware_training_vol1 Creating shellcodes Shellcode: advantages • Self-sufficient: easy to inject into other applications • Small: can fit into a tiny space i.e. section caves • May be used as a loader...
pdf
1 2 What's the big deal about Docker/AppCanyways? We've had containers for 20 years. What new things are they bringing to the table aka how are they different from LXC and traditional containers? What these new container formats, which leverage existing technologies introduce is that they ease not just the ability ...
pdf
Meticulously Modern Mobile Manipulations [DEF CON 27, Las Vegas] – Leon Jacobs $ whoami ◦ Leon Jacobs / @leonjza ◦ Security Researcher @ SensePost ◦ Been Hacking “stuff” for ~ 10 years I also hated mobile application security a lot more in the past... Lets be honest about mobile application hacking $days since last ...
pdf
Truman Kain TEVORA Dragnet Your Social Engineering Sidekick TL;DR Your social engineering conversions will increase with Dragnet. Current States of: •OSINT •Analytics •S.E. Engagements OSINT •Manual •Repetitive •Fleeting when automated Analytics Big companies live off of it –Jeff Bezos, 1997 “3 years ago I was wor...
pdf
过滤了了相关字符,and,select,updatexml双写绕过就好,空格⽤用/**/代替,拿到密 码 we1c0me%_#2&_@LCTF 。进去之后发现任意提交passwd提示密码不不对,让 num=0,passwd=5487即可。 虽然说写了了waf,但是sqlmap照样能过XD。各种tamper加上就好了了: ​ 题⽬目⼀一共分为三步 第⼀一步是⼀一个正则绕过: 题⽬目的正则应该是php://.resource=(.)$这种形式,⽽而且第⼀一步应该先会检测是否是图⽚片,于双次 绕过就好了了: Nu1L LCTF writeup Web 签到题 我控⼏几不不主我及⼏几啦 苏达学姐的⽹网站 ​ 再读⼀一下file/ad...
pdf
scapytcp 0x00 natgettcpnat wendellh.323TCPTCPFTP scapytcpscapy 0x01 scapy https://scapy.readthedocs.io/en/latest/ demo https://akaljed.wordpress.com/2010/12/12/scapy-as-webserver/ demo #!/usr/bin/python from scapy.all import * # Interacts with a client by going through the three-way handshake. # Shuts down the con...
pdf
Invest in security to secure investments How to hack VMware vCenter server in 60 seconds Alexander Minozhenko #whoami • Pen-tester at Digital Security • Researcher • DCG#7812 / Zeronights • CTF • Thanks for ideas and support to Alexey Sintsov 2 What do pen-testers do? • Scanning • Fingerprinting • B...
pdf
The Ether Wars: Exploits, counter-exploits and honeypots on Ethereum AUGUST 11, 2019 ConsenSys Diligence | The Ether Wars: Exploits, counter-exploits and honeypots on Ethereum 2 About ConsenSys Diligence and MythX • We audit smart contracts and build security tools for smart contract developers • Other who contribut...
pdf
411: A Framework for Managing Security Alerts Kai Zhong @sixhundredns kai@etsy.com Kenneth Lee @kennysan ken@etsy.com Kai Zhong @sixhundredns kai@etsy.com Kenneth Lee @kennysan ken@etsy.com Get 411 here: https://github.com/kiwiz/411/ Slides: https://speakerdeck.com/kennysan/411-a- framework-for-managing-security-aler...
pdf
WEAPONIZING THE BBC MICRO:BIT DAMIEN " " CAUQUIL VIRTUALABS DEF CON 25 - JULY 28, 2017 /ME Head of R&D, Econocom Digital Security Senior security researcher HW/SW Reverse-engineer AGENDA BBC Micro:Bit Features & Capabilities Hacking ideas Hacking into the Micro:Bit Turning the Micro:Bit into a sniffer Hacking various 2....
pdf
红明⾕CTF Web happysql http://eci-2ze7dlrxgodbblkyir9b.cloudeci1.ichunqiu.com/ username=aaaw2aww"|| (strcmp((select%0a*%0afrom%0af1ag),concat("flag{a4398541",char(45),"2ae3",char(45) ,"4439",char(45),"a4f6",char(45),"69eafe0e9b71}"))%0ain%0a(1))#&password=*/# writeShell http://eci-2ze7dlrxgodbcwxp83gz.cloudeci1.ichunqiu.co...
pdf
Practical Aerial Hacking & Surveillance Glenn Wilkinson SensePost DefCon 2014 @glennzw Glenn Wilkinson @glennzw SensePost.com @glennzw @glennzw @glennzw @glennzw @glennzw Practical Aerial Hacking & Surveillance? @glennzw https://www.eff.org/issues/surveillance-drones https://www.eff.org/deeplinks/2012/01/drones-are-w...
pdf
Hacking IIS w/ shubs Dealing with HTTPAPI 2.0 Assets Have you seen this before? • Either, you’re missing the subdomain associated with the IP address (No SSL certificate) • Or the subdomain doesn’t resolve but you can obtain a full/partial subdomain from the SSL certificate Resolving the HTTPAPI 2.0 404 Error • This...
pdf
启明星⾠辰辰ADLab 智能语⾳音设备安全研究 演讲⼈人:王启泽 2019 PART 01 背景 ⽬目录 CONTENTS PART 02 ⽹网络安全 PART 03 语⾳音安全 PART 04 隐私审计 01 02 03 04 PART 01 背景 语⾳音正成为⼈人与设备交互的⽅方式 语⾳音包括相当丰富的信息 • 性别.年年龄 • 环境.健康 • 想法.情绪 • 籍贯 我们研究的对象 我们关注的点 安全及隐私 PART 02 ⽹网络安全 ⾳音箱⽹网络架构 云平台 客户端 智能⾳音箱 https/mqtts https/mqtts dlna/蓝⽛牙 智能设备 ⾃自定协议 云平台的特权命令 /打开远程shell /更更换语⾳音...
pdf
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices Ryan Johnson - Kryptowire Angelos Stavrou - Kryptowire This work was supported by the Department of Homeland Security (DHS) Science and Technology (S&T) via award to the Critical Infrastructure Resilience Institute (CIRI) Center of Excellence (COE) le...
pdf
回显 Resin 4.x 在resin 4.X中跟一下如何获取response对象 com.caucho.server.http.HttpRequest#handleRequest com.caucho.server.http.AbstractHttpRequest#getResponseFacade 返回 response 对象 所以如果能获取到AbstractHttpRequest对象并调用该对象的getResponseFacade方法,即可获取 response对象。 获取AbstractHttpRequest对象,继承关系如下: CTRL + H 基于 TcpSocketLink com.caucho.network...
pdf
A.B.U技术漫谈笔记 pdf版没有索引图,这里我贴上,更直观点。 ABU东西很多,远不止此,期待其他师傅们的分享。同时 师傅们如果有挖掘LOLbins的思路麻烦分享下。 一.介绍 参考: RedCore A.B.U视频教程 # A.B.U 意义: A.B 活下来,U 活下去(反监控,反溯源,反日志,反取证) 活多久的问题 # A.B.U 目的: 反查杀 二.分类 1. 范式A.B.U 1.1静态A.B.U 1.1.1 文件A.B.U 磁盘文件 (1)加密解密项目推荐 C/C++ WjCryptLib库 MD4,AES等 一个.c文件对应一个.h文件 https://github.com/WaterJu...
pdf
Gone Apple Pickin’: Red Teaming macOS Environments in 2021 Cedric Owens DEF CON 29 BIO •Offensive Security Engineer •Blue Team Experience • macOS post exploitation •Enjoy 80s/90s Nostalgia • @cedowens AGENDA • Why Do We Care about macOS? • Overviews Of Common Tech Environments • macOS Payloads & Post Exploitation ...
pdf
The BYOD PEAP Show Mobile Devices Bare Auth Josh Yavor iSEC Partners DEF CON XXI August , Josh Yavor (iSEC Partners) The BYOD PEAP Show DEF CON XXI, August , / Introduction Welcome A Perfect Storm 1 1noaa.gov Josh Yavor (iSEC Partners) The BYOD PEAP Show DEF CON XXI, August , / Introduction Welcome PEAP: Pwned E...
pdf
A Bridge Too Far Defeating Wired 802.1X with a Transparent Bridge Using Linux Alva Lease ‘Skip’ Duckwall IV Exorcyst at gmail d0t com Who Is This Guy? • Been working with Linux since before the 1.0 kernel (1993ish) • Unix admin by trade – transitioned to IT security • Likes alphabet soup: – CISSP, CISA, GCIH, GCIA, G...
pdf