text
stringlengths
100
9.93M
category
stringclasses
11 values
(maybe ?)APT1 : technical backstage @r00tbsd – Paul Rascagnères from Malware.lu Malware.lu July 2013 @r00tbsd – Paul Rascagnères (maybe ?)APT1: technical backstage (maybe?)APT1 : technical backstage @r00tbsd – Paul Rascagnères from Malware.lu Plan - Malware.lu presentation - Information gathering - Poison Ivy - Take-ov...
pdf
Presenter Jeff Yestrumskas Sr. Manager, InfoSec @ SaaS org. Personal DEFCON attendee:presenter ratio = 10:1 Presenter Matt Flick Principal, FYRM Associates Information Assurance Consulting Beer connoisseur Agenda What is XAB? XAB History What’s New? Nitty Gritty XAB Process Flow Live Demo Wrap-up What is XAB? Anonymous...
pdf
Training the Next Generation of Hardware Hackers Teaching Computer Organization and Assembly Language Hands-On with Embedded Systems Wednesday, May 5, 2010 Development • Took about a year to develop and run through our first semester with the material • We want to share our ideas, what we learned, and the tools ...
pdf
garble 研究 目录 Go编译流程 garble 结果 编译输出 asm compile link 其他 garble的混淆 文本的混淆 总结 参考 Go编译流程 创建临时目录,mkdir -p $WORK/b001/ 查找依赖信息,cat >$WORK/b001/importcfg << ... 执行源代码编译,/usr/local/go/pkg/tool/darwin_amd64/compile ... 收集链接库文件,cat >$WORK/b001/importcfg.link << ... 生成可执行文件,/usr/local/go/pkg/tool/darwin_amd64/link -o ... 移动可执行文件,m...
pdf
Ghost in the Wireless, iwlwifi edition Nicolas Iooss and Gabriel Campana nicolas.iooss@ledger.fr gabriel.campana@ledger.fr Ledger Donjon Abstract. Wi-Fi replaced Ethernet and became the main network pro- tocol on laptops for the last few years. Software implementations of the Wi-Fi protocol naturally became the targets ...
pdf
Reverse&Engineering&& Mac&Malware&& Sarah&Edwards&& @iamevltwin& mac4n6.com& & whoami& Senior&Digital&Forensics&Analyst&with&Harris&CorporaAon& •  Computer&Intrusions,&Criminal,&Counter&Terrorism,&Counter&Intelligence& •  Mac,&Windows,&*nix,&Mobile,&Malware,&anything&&&everything…& Government&Contractor&N&Embedded&Full...
pdf
1 gnunet presentation for DC10 by — not disclosed due to DMCA — 2 gnunet Requirements • Anonymity • Confidentiality • Deniability • Accountability • Efficiency 3 Applications • anonymous sharing of medical histories • distributed backups of important data • ad-hoc communication between small devices • and others 4 Infrast...
pdf
Chip & PIN is definitely broken Credit Card skimming and PIN harvesting in an EMV world Andrea Barisani <andrea@inversepath.com> Daniele Bianco <daniele@inversepath.com> Chip & PIN is definitely broken ­ v1.4  Copyright 2011 Inverse Path S.r.l. Adam Laurie <adam@aperturelabs.com> Zac Franken <zac@aperturelabs.com> What...
pdf
1 2 ● Who are we ● Background ● Picking our battles ● The web vuln ● Intermission ● Telematics ○ What is it ○ Local vulnerabilities discovered ○ Writing a blind exploit ○ Remote vulnerability ● Conclusion ● Public statements ● Questions Jesse @jessemichael Mickey @HackingThings Alex ...
pdf
1 OLONLNOV-从.NET源码看⽂件上传绕waf @我是killer .NET⾥⼀般使⽤ context.Request.Files 来处理⽂件上传,编写如下代码测试。 跟⼊⽂件上传处理流程 C# 复制代码 using System.Web; namespace WebApplication1 {    public class Handler1 : IHttpHandler   {        public void ProcessRequest(HttpContext context)       {            context.Response.ContentType = "text/p...
pdf
放个垃圾设备,⽔个⽂章 某⽯⽹科云数据库审计与防护系统 源码来源: docker search hi****one 搜索到两个内容 这⾥拉取 zhu***zaxy/hi****one 镜像 docker pull zhu***zaxy/hi****one 然后docker run启动,这⾥启动需要注意下权限问题 附带参数 --privileged 后⾯的⼀些端⼝映射需要⾃⼰去设置,这⾥只演示如何启动容器 docker run --privileged=true -it -d zhu***zaxy/hi****ne /usr/sbin/init 启动过后进⼊容器 docker exec -it 容器id /bin/bash 全局...
pdf
Mixminion: Design of a Type III Anonymous Remailer Protocol George Danezis1, Roger Dingledine2, David Hopwood3, and Nick Mathewson2 1 Cambridge University <george.danezis@cl.cam.ac.uk> 2 The Free Haven Project <{arma,nickm}@freehaven.net> 3 Independent consultant <david.hopwood@zetnet.co.uk> Abstract. We present Mixmin...
pdf
周末hitconctf2021两道题简单记录。 W3rmup PHP这题有两个⼩考点,结合起来⽐较有趣。⾸先是题⽬中这个循环,考察的是经典的循环体中改变被 遍历对象的⻓度导致遍历不全的bug。我们只要传⼊类似 $arr= ['123', false, "';$(id)'"] 这样的数组, 就可以绕过 escapeshellarg 的过滤逃逸单引号。因为在循环到 $arr[1] 时,由于unset的作⽤, $arr 数组⻓度 会变成2,这样在下次循环就⽆法满⾜ $i<count($arr) 直接结束了。 题⽬第2个考点是,php的 yaml_parse 使⽤的是yaml1.1的协议,会将 NO 解析为布尔值false,⽽ NO ⼜恰巧...
pdf
Attacking Tor at the Application Layer Gregory Fleischer (gfleischer@gmail.com) DRAFT SLIDES Updated slides will be provided after the talk. Most importantly, the updates will include links to permanent location for all online demos. Introduction Introduction • What this talk is about • identifying Tor web traffic • fi...
pdf
Routing in The Dark Scalable Searches in Dark P2P Networks Ian Clarke and Oskar Sandberg The Freenet Project Ian Clarke & Oskar Sandberg - 2005 – p.1/33 Introduction • We have long been interested in decentralised “Peer to Peer” networks. Especially Freenet. Ian Clarke & Oskar Sandberg - 2005 – p.2/33 Introduction • We...
pdf
下一代移动应用安全 江苏通付盾信息安全技术有限公司 移动应用发展 5 G 时 代 的 到 来 ? G D P R 对 国 内 关 于 在 移 劢 应 用 数 据 方 面 未 来 的 影 响 ? 攻防不对等导致黑客屡屡得手 攻击被发现的平均时间 229天 企业自行发现的比例 33% 小时 月 天/ 周 问题不再是是否被黑, 而是什么时候被黑和你什么时候发现被黑 实施攻击 入侵得手 发现 补救 防护对象与防护边界的变化 外网 互联网 内网 业务 专网 数据,传输 从专业安全转向互联网+安全 从内向外 从边界安全转向IT生态安全 从一向多 业务驱动安全 互联网+ 现今移动安...
pdf
- 1 - Limitations of OAS-Based Blocking - 1 - Table of Contents Executive Summary 2 APIs - the attack is also the route to protection 3 Using OAS for Security 3 Limitations of OAS-Based Blocking 4 Summary 8 - 2 - Executive Summary The OpenAPI Specification (OAS) (fka Swagger) helps developers and secu...
pdf
微软签名缺陷利用 - 老但有用的技术 0x00 前言 这项技术原理很简单,一般正规公司开发的PE文件都有数字签名,但是微软提供的签名技术,并没有签 名所有数据,还有部分结构体,没有纳入签名计算,因此我们可以修改这些结构体,放入我们的 shellcode,而不影响签名校验。 这项技术到底有多大用呢?我的结论是作用只能算锦上添花,不是雪中送碳的技术。这2天有个老哥把这 项技术写成了适合CS使用的.net和BOF程序。我们看看他的程序结构。 0x00 SigFile红队工具分析 首先我们通过作者提供的SigFile程序把shellcode通过加密保存在正规的PE文件中,然后上传到目标服 务器。在这一步会面临AV/EDR的静态扫描,大部分...
pdf
@Y4tacker 2022虎符CTF-Java部分 写在前⾯ ⾮⼩⽩⽂,代码基于marshalsec项⽬基础上进⾏修改 正⽂ 本⾝我是不太懂hessian的反序列化,⼤概去⽹上搜了⼀下配合ROME利⽤的思路(如果反序 列化map对象,在逻辑后⾯通过put操作,从⽽触发对key调⽤hashCode打ROME),这⾥不清 楚可以看看ROME利⽤链以及hessian反序列化的⼀些简单东西 ⾸先简单看下docker,可以看到会导致不能出⽹ version: '2.4' services:  nginx:    image: nginx:1.15    ports:      - "0.0.0.0:8090:80"    rest...
pdf
Information Security Operation providers Group Japan ©ISOG-J How to make your SOC/CSIRT team more trustworthy?: ISOG-J Maturity Model and self-checking tool Yasunari Momoi momo@iij.ad.jp Internet Initiative Japan Inc. / ISOG-J 1 ©ISOG-J Information Security Operation providers Group Japan Agenda • about me • what is ...
pdf
1 DEFCON 16 Black vs. White The complete life cycle of a real world breach… August 13th, 2008 David Kennedy aka ReL1K Ken Stasiak aka Static Scott White aka Sasquatch Andrew Weidenhamer aka Leroy CD Distribution   Note, this presentation was made specifically for the CD distribution at DEFCON. The majority...
pdf
INTERSTATE: A Stateful Protocol  Fuzzer for SIP Thoulfekar Alrahem, Alex Chen, Nick DiGiussepe,  Jefferey Gee, Shang‐Pin Hsiao, Sean Mattox,  Taejoon Park,  Albert Tam, Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA 92697 USA harris@ics.uci.edu Marcel Carlsson Fortconsult Tranev...
pdf
Infiltrate Your Kubernetes Cluster Kubernetes in Attacker View Zhaoyan Xu Principle Research Engineer Palo Alto Networks May 29, 2019 Tongbo Luo Chief AI Secruity Scientist JD.com Agenda Background Security Features of Kubernetes Attack Vectors Lateral Movement Practices Questions Background ➢ Kubernetes becomes popul...
pdf
2022/4/25 09:43 A blueprint for evading industry leading endpoint protection in 2022 | Vincent Van Mieghem https://vanmieghem.io/blueprint-for-evading-edr-in-2022/ 1/12 A blueprint for evading industry leading endpoint protection in 2022 MONDAY. APRIL 18, 2022 - 19 MINS EVASION OBFUSCATION About two years ago I quit ...
pdf
MouseJack and Beyond: Keystroke Sniffing and Injection Vulnerabilities in 2.4GHz Wireless Mice and Keyboards Marc Newlin marc@bastille.net @marcnewlin July 8, 2016 v0.1 Abstract What if your wireless mouse or keyboard was an e↵ective attack vector? Research reveals this to be the case for non-Bluetooth wireless mice and ...
pdf
see more please visit: https://homeofpdf.com see more please visit: https://homeofpdf.com see more please visit: https://homeofpdf.com 本书用“青年与哲人的对话”这一故事形式总结了与弗洛伊德、荣格并称 为“心理 学三大巨头”的阿尔弗雷德•阿德勒的思想(阿德勒心理学)。 风靡欧美的阿德勒心理学对于“人如何能够获得幸福”这个哲学问题给出 了极其简 单而又具体的“答案”。了解了足以被称为“这个世界上的一个 真理”的阿德勒思想之 后,你的人生会发生什么变化呢?又或者,什么 都不会改变吗? 来吧,让我们与...
pdf
Bypass WAF ⼀些姿势(⼀) 前⾔ WAF 除了对 post 的 payload 进⾏检测,此外还有个功能是对访问的 URL 路径进⾏限制,例如⼀些敏感路径, Weblogic CVE-2019-2725 的 /_async/AsyncResponseService /_async/AsyncResponseService 、CVE-2017-10271 的 /wls- /wls- wsat/CoordinatorPortType* wsat/CoordinatorPortType* 等,这样可以缓解⼀些 weblogic 版本⽆法升级或打补丁的窘境。但是在最近⼀ 次监控告警中,发现某品牌 WAF 被绕过,成功上传 ...
pdf
由于之前在某篇文章看到,但是当时懒没有测试。顺便复现一下,好像之前有搞过但是忘了,emmmm.... 环境: 监听器: 初始机192.168.1.106上线 执行rportfwd指令 psexec上线 他这里的external指向的是192.168.1.108 Evernote Export file:///C:/Users/JiuShi/Desktop/cs反向端口转发上线.html 第1页 共1页 2020/7/17 18:43
pdf
1 THE ADVENTURES OF AV AND THE LEAKY SANDBOX A SafeBreach Labs research paper by Amit Klein, VP Security Research, SafeBreach and Itzik Kotler, co-founder and CTO, SafeBreach July 2017 2 ABSTRACT We describe and demonstrate a novel technique for exfiltrating data from highly secure enterprises which employ strict egr...
pdf
Hardw are bac kdo oring is practical Jonathan Brossard - jonathan.brossard@toucan-system.com Securit y Researc h Engineer & CEO, T oucan System, F rance and Australia Blac khat Briengs and Defcon conferences, Las V egas, 2012 T o cr e ate is to r esist, to r esist is to cr e ate National Council of the Resistance Abstr...
pdf
Stealth Data Dispersion ICMP Moon-Bounce Saqib A. Khan, Principal khan@SecurityV.com Latest Version @ http://SecurityV.com/research Copyright 2002 Security Verification, Inc. All rights reserved. Definition Stealth Data Dispersal is an asynchronous covert channel Copyright 2002 Security Verification, Inc. All rights r...
pdf
Stealing Identity Management Systems Part I: Background of Identity Management systems, and some philosiphy on attacking them What are identity Management Systems? Theory of IDM Some specific products Some common configurations Theory of IDM The system connecting two or more systems that hold Identities (some ...
pdf
开发shiro蜜罐遇到的一些问题 2022年09月14日 / 网络安全 前情概要 我曾经写过一篇文章,https://rce.ink/index/view/366.go 大概意思就是php的网站模拟shiro工具探测的过程配合响应,实现可以根据指定key让工 具实现逼真的测试效果,如图所示: 这样攻击者会觉得网站是shiro框架,并且被我爆破出了一个key。再配合修改phpsessio nid为jsessionid,脚本伪静态修改后缀为jsp达到更好的效果。 我的博客是由webman开发,纯纯php框架。 后续开发 上次写到那里我就去做更有意思的项目了。直到最近我才开始对指定利用链检测、命令回 显等功能进行完善。 我写了一堆php代...
pdf
影响版本: Linux Kernel版本 >= 5.8 Linux Kernel版本 < 5.16.11 / 5.15.25 / 5.10.102 漏洞点是在 splice 系统调用中未清空 pipe_buffer 的标志位,从而将管道页面可写入的状态保 留了下来,这给了我们越权写入只读文件的操作。 攻击者利用该漏洞可以覆盖任意只读文件中的数据,这样将普通的权限提升至root权限。 内核提权 漏洞能覆盖任意可读文件,也有一些限制,不能覆盖第一个字节和最后一个,不能填入 \x00 ,写入大 小最多为linux 页 的大小。 利用可以写 /etc/passwd ,新加一个root或修改root用户,也可以写到 corntab , su...
pdf
UTILIZING POPULAR WEBSITES FOR MALICIOUS PURPOSES USING RDI Daniel Chechik, Anat (Fox) Davidi Security Web Scanners What is RDI? 3 Reflected DOM Injection Legit Legit Malicious A Recipe for Disaster 4  1 simple web page A Recipe for Disaster 5  1 simple web page  1 trustworthy web utility A Recipe f...
pdf
RT2WIN! How 50 lines of Python made me the luckiest guy on Twitter “No purchase necessary, enter as often as you want. So I am.” Introduction • I’m Hunter • Electrical & Computer Engineer • Working in Silicon Valley • Currently disrupting social local mobile big data analytics with cloud based MapReduce deployments on...
pdf
Hacking the Apple TV and Where your Forensic Data Lives Presentation for: Defcon 17 July 30, 2009 Kevin Estis and Randy “r3d” Robbins DMCA Disclaimer 1. Digital Millennium Copyright Act 2. The authors of this presentation respects the intellectual property rights of others and is committed to complying with...
pdf
Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game Joshua “jduck” Drake, Zimperium Steve Christey Coley, MITRE DEF CON 24 Aug 7th, 2016 Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game - DEF CON 24 • About Josh – 20-years of VR, Ran iDefense VCP • About Steve –...
pdf
KC n 陈愉鑫 第五代加固技术 ARM代码虚拟化保护技术 目录 CONTENTS PART 01 Android 平台加固技术概述 PART 02 什么是虚拟机保护技术 PART 03 VYD 指令集设计 PART 04 VYD 虚拟机设计 PART 05 VYD 编译器设计 PART 06 ARM VM的问题 PART 00 个人简介 知乎: 无名侠 专栏:大话二进制安全 知道创宇 IA 实验室,Android 病毒分析 i春秋,特种行业逆向分析线下讲师 我们为什么要加固? PART 01 A d id 平台加固技术概述 1.保护核心代码,防止被逆向,泄密 2.防止营销作弊 3.防止代码被修改 4……… 加固技术的发展历史 ...
pdf
一次完整的代码审计 前言: 因为本人一直活跃于教育 SRC,所以本次针对的系统也是各大高校所使用的 系统。 系统名称: 某一卡通门户系统 正文: 0x01: NET 平台下的源码挖掘 个人非常喜欢针对于.NET 和 JAVA 平台所开发的程序做测试,相反,对 于 php 就是一窍不通了。。。。 在针对 NET 平台,因为大部分使用的都是 IIS 中间件,对大小写不敏感, 所以在生成字典的时候也会方便很多。 由于 NET 平台的特性,大部分程序的源代码都会打包成程序集,存储在根 目录下的 bin 目录。这导致了部分运维喜欢备份 bin 目录,且将备份过后的 文件存储于网站根目录下,若黑客使用事先准备好的字典,就可以轻而易举 的获取到源...
pdf
JVM字节码学习笔记——class ⽂件结构 0x01 前⾔ 本系列学习笔记均来⾃《深⼊理解 JVM 字节码》(作者:张亚),本笔记仅⽤于个⼈学习知 识总结。 对于学习 java 安全、想了解 JVM 字节码的童鞋们强烈建议购买正版书去阅读。 0x02 class ⽂件结构 java 是跨平台的⼀门语⾔,但是 jvm 却不是跨平台的,但是不同平台的 JVM 帮我们屏蔽了差 异,通过 JVM 可以把源代码编译成和平台⽆关的字节码,这样我们的源代码就不⽤根据不同 平台编译成不同⼆进制是可执⾏⽂件了。这也是 java 字节码的意义所在。 class ⽂件由⼗部分组成,具体如下: 魔数(magic number) 版本号(minor&maj...
pdf
C.R.E.A.M. C.R.E.A.M. –– Cache Rules Evidently Cache Rules Evidently Ambiguous, Misunderstood Ambiguous, Misunderstood Jacob Thompson Security Analyst Independent Security Evaluators jthompson@securityevaluators.com Payroll Statement from ADP • Name • Address • Last four of SSN • Last four of bank acct. Prescription C...
pdf
关于沙箱逃避的一些 Tips: https://research.checkpoint.com/2022/invisible-cuckoo-cape-sandbox-evasion/ @Check Point 发布了关于沙箱逃避的一些分析,这个公司听起来有点陌生,知名项目 Evasion techniques就是它们出品。 常见的一些规避沙箱技巧: 汇编指令检测(比如使用 cpuid 指令来获取处理器信息来区分沙箱) 检测注册表项(正常环境中没有,但是特定的虚拟环境中存在) 文件系统检测(正常环境中没有,但是特定的虚拟环境中存在) @Check Point 发现的一些新的规避沙箱的技巧: Windows API 函数调用中的漏网...
pdf
DefCon 21, Las Vegas 2013 Let’s Screw With nMap Gregory Pickett, CISSP, GCIA, GPEN Chicago, Illinois gregory.pickett@hellfiresecurity.com Hellfire Security Overview Nosey Bastards! All About Packet Normalization Working It All Out Putting It Into Practice Finishing Up Network Defenders We see scans and probes of our ne...
pdf
Asp 安全审计 http://hi.baidu.com/micropoor 1 ASP ASP ASP ASP 代码安全审计 ------PHP ------PHP ------PHP ------PHP 安全新闻早 8888 点特别篇 2012/3/20 注入漏洞: 1.Request.QueryString:获取地址栏参数(以及以 GET 方式提交的数据) 如:Request.QueryString("id") 2.Request.Form: 获取以 POST 方式提交的数据(接收 Form 提交来的数据) 如:Request.Form("id") 3.Request.Cookies: 获取浏览器 Cookier 信息。 4....
pdf
CON KUNG-FU Defending Yourself @ DefCon Presented by: Rob DeGulielmo rdegulielmo@hotmail.com Defcon 16 – asleep at the wheel  Crap! Firefox is possessed!  DNS redirection allowed for malicious code insertion on legitimate webpages 2 2009 DefCon 17 - Con Kung-Fu : Defending Yourself @ DefCon Defcon 16 – asleep at th...
pdf
ʻpyREticʼ – In memory reverse engineering for obfuscated Python bytecode Rich Smith <rich@immunityinc.com> Immunity Inc Abstract Growing numbers of commercial and closed source applications are being developed using the Python programming language. The trend with developers of such applications appears to be that...
pdf
An Attacker Looks At Docker Approaching Multi-Container Applications Wesley McGrew, Ph.D. Director of Cyber Operations HORNE Cyber wesley.mcgrew@hornecyber.com @mcgrewsecurity My Background • Ph.D. Computer Science – Mississippi State University • Academia • NSA CAE – Research, Education, Cyber Operations – MSU • Indus...
pdf
Three Generations of DoS Attacks (with Audience Participation, as Victims) Defcon, 2011 Bio Summary • The DoS Circus • Layer 4 DDoS: Thousands of attackers bring down one site • Layer 7 DoS: One attacker brings down one site • Link-Local DoS: IPv6 RA Attack: One attacker brings down a whole network The D...
pdf
A Review of Mind Wars: Brain Research and National Defense By Jonathan D. Moreno Dana Press (The Dana Foundation: New York and Washington DC) 2006 by Richard Thieme “What we don’t know is so much bigger than we are.” A Haitian Proverb Oh, how I wish that reviewing a book like this were simple and straightforward! That...
pdf
multipart-parse.md 5/19/2021 1 / 33 从RFC规范看如何绕过waf上传表单 背景介绍 传统waf以规则匹配为主,如果只是⽆差别的使⽤规则匹配整个数据包,当规则数量逐渐变多,会造成更多性能 损耗,当然还会发⽣误报情况。为了能够解决这些问题,需要对数据包进⾏解析,进⾏精准位置的规则匹配。 正常业务中上传表单使⽤普遍,不仅能够传参,还可以进⾏文件的上传,当然这也是⼀个很好的攻击点,waf想 要能够精准拦截针对表单的攻击,需要进⾏multipart/form-data格式数据的解析,并针对每个部分,如参数 值,文件名,文件内容进⾏针对性的规则匹配拦截。 虽然RFC规范了multipart/form-data...
pdf
Worming through IDEs David Dworken `whoami` ● David Dworken (@ddworken) ● Security Engineer at Google ○ Standard disclaimer: Opinions expressed are my own ● Hacking in both senses of the word ○ Writing silly useless but interesting code ○ Breaking serious real code for fun ● I found and reported 30+ bugs in IDEs over a...
pdf
The BeEF addons discussed in our talk, Hacking Google Chrome OS, are available at: http://kyleosborn.com/chrome/
pdf
Flying With Firearms Domestic Laws & Policies from the TSA’s “Prohibited Items” list… http://www.tsa.gov/travelers/airtravel/prohibited/permitted-prohibited-items.shtm Ammunition - Check with your airline or travel agent to see if ammunition is permitted in checked baggage on the airline you are flying. If ammunit...
pdf
. . . . . . . .. . . . . eXercise In Messaging and Presence Pwnage fun with XMPP Ava Latrope iSEC Partners Defcon 17 Ava Latrope (iSEC Partners) eXercise In Messaging and Presence Pwnage Defcon 17 1 / 32 . . . . . . Introduction Outline Outline .. .1 Introduction The basics Common Stanzas ...2 The victims Clients Serve...
pdf
RESTing On Your Laurels Will Get You Pwned By Abraham Kang, Dinis Cruz, and Alvaro Munoz Goals and Main Point • Originally a 2 hour presentation so we will only be focusing on identifying remote code execution and data exfiltration vulnerabilities through REST APIs. • Remember that a REST API is nothing more t...
pdf
FROM PRINTER TO PWND Leveraging Multifunction Printers During Penetration Testing INTRODUCTION  From Dayton Ohio region  Last 18 years in IT  10 year in security  3 of those as a security penetration tester  Member of foofus.net team  3rd time presenting at Defcon w00t! AGENDA  Multi function printer features...
pdf
Maximum CTF Get the most from capture the flag Friday, July 31, 2009 capture the flag (Two Toy Soldiers) http://www.flickr.com/photos/janramroth/2264184078/ http://creativecommons.org/licenses/by/2.0/deed.en jot.punkt planet "Hack the ______" lightning round Friday, July 31, 2009 Trivia 100 from 2006 qualifier. And yeah t...
pdf
Blog PaddingOracle攻击 2021-08-10 · 密码学 根据加解密时是否用同一组密钥,可以分为对称加密和非对称加密。对称加密中根据对数据处理粒度的不 同,可以分为分组加密算法(AES、3DES、DES、Blowfish、RC2、CAST)和流加密算法(ChaCha20、 Salsa20、RC4) 常见的非对称加密算法有RSA、ElGamal、DSA、ECC等 分组加密算法中根据加解密时对数据的分组编排方式,经典工作模式有ECB、CBC、PCBC、CFB、OFB、CTR 等,其中后三者可以将分组加密转化为流加密形式。为了在保证机密性的前提下进一步保证完整性,现代工 作模式有CCM(CBC-MAC)、EAX、GCM、...
pdf
2017年,"Process Doppelganging", NTFS+section https://github.com/hasherezade/process_doppelganging https://www.youtube.com/watch?v=Cch8dvp836w 进程的创建不支持NTFS transacted文件,所以分割进程的步骤寻找创建方法 跟踪 CreateProcessW 调用 (xp) NtOpenFile NtCreateSection NtCreateProcessEx ... NtCreateThreadEx 在win10下,直接使用 NtCreateUserProcess 创建,看起来无法使用nt...
pdf
知道创宇404实验室发布 打造世界领先网络空间测绘能力 演讲人: heige@0x557 hei@knownsec.com 2019 PART 01 Xmap 2.0 发布 目录 CONTENTS PART 02 节点分析 PART 03 ZoomEye“50 0节点计划” PART 04 IPv6 测绘 01 02 03 04 05 PART 05 ZoomEye全球 蜜罐识别 • 获取更多数据 • 赋予数据灵魂 两个关键 –heige “探测资源及技术已经成为网络空间测绘的核心竞争力!” CLICK ADD RELATED TITLE TEXT, AND CLICK ADD RELATED TITLE TEXT, CLICK...
pdf
BitTorrent Protocol Abuses Written by Michael Brooks and David Aslanian Introduction The BitTorrent protocol is now 7 years old. The protocol has become wildly successful in a very short period of time, but with this success comes growing pains. The protocol originally envisioned by Bram Cohen is fairly secure. V...
pdf
How to use CSP to stop XSS Ken Lee Friday, August 2, 13 Who is this guy? • Product Security Engineer at Etsy • Previously worked at a financial software company • @kennysan • klee@etsy.com Friday, August 2, 13 What is CSP? • Content Security Policy • Browser-based XSS Defense • http://www.w3.org/TR/CSP/ Friday, August...
pdf
Protecting Against and Investigating Insider Threats A methodical, multi-pronged approach to protecting your organization Antonio A. Rucci Program Director Technical Intelligence and Security Programs Global Initiatives Directorate Oak Ridge National Laboratory Oak Ridge, TN 37831 AGENDA A methodical, multi-pronged ap...
pdf
tips 分享下今晚看的小tips => SharpC2 Client端如何生成 stager的 (SharpC2最后一版是 experimental测试版 上不了线 哈哈哈这个我们后面再聊) 功能其实并不复杂,但是令我好奇的是如何生成powershell stager的,因为在我去年看SharpC2时还没 有这些东西,希望能够帮助一些想要学习写C2的伙伴。 1. 首先Client端 使用WPF MVVM模型,通过调试我们可以定位到 PayloadGenratorViewModel.cs 然后通过GetListeners() 获取所有监听器 http,tcp,smb 基于c# async await关键字 异步任务处理...
pdf
© 2018 Gigamon. All rights reserved. 1 可视及赋能 Gigamon助力构建现代网络多层次可视及安全 Gigamon / 英国技盟 技术经理 顾威 180 1600 0621 © 2017-2020 Gigamon Inc. All rights reserved. 1 © 2018 Gigamon. All rights reserved. 2 公司简介 分 支 机 构 20 国家 客 户 行 业 公共服务 | 金融服务 医疗健康 | 零售业 高科技 | 运营商 市 场 地 位 NGNPB 市场开拓及领导者 市场份额第一 专 利 66 世界专利 客 户 3,200 +客户 83...
pdf
1 © Copyright 2010, National Security Corporation, all rights reserved DEFCON XVIII DEFCON XVIII DEFCON XVIII Tales from the Crypto G. Mark Hardy, CISM, CISA, CISSP National Security Corporation gmhardy@nationalsecurity.com +1 410.933.9333 @g_mark © Copyright 2010, National Security Corporation, all rights reserved 2 D...
pdf
D A V E J O S E P H S E N homeless vikings S H O R T- L I V E D B G P S E S S I O N H I J A C K I N G , A N E W C H A P T E R I N T H E S PA M WA R S Dave Josephsen is author of the upcoming book Building Monitoring Infrastructure with Nagios (Addison-Wesley). He currently works as the senior systems administrator for ...
pdf
_vti_fpxploitation mshannon@fpxploiter.org Frontpage: Laying the ground work What is it? Microsoft's integrated Web Site development tool. System for adding basic to advanced functionality with little or no web page experience. Integrated MS Office package Security Nightmare Who is Vermeer Technologies? In early 199...
pdf
“Sputnik-II” Economical Multi-Band Antenna Version 2.0 — 04-01-2010 BANDS: A B C D 2m – 1.25m – 70cm 19 ½” 1” 12 ⅜” 21” 2m – 70cm 19 ½” 1” 6” 21” Antenna Versions: The antenna was originally designed to cover 2m – 1.25m – 70cm in a single ground plane style unit. The design utilizes 2 elements for t...
pdf
WIPING OUT CSRF JOE ROZNER | @JROZNER IT’S 2017 WHAT IS CSRF? WHEN AN ATTACKER FORCES A VICTIM TO EXECUTE UNWANTED OR UNINTENTIONAL HTTP REQUESTS 4 WHERE DOES CSRF COME FROM? LET’S TALK HTTP SAFE VS. UNSAFE ▸ Safe ▸ GET ▸ HEAD ▸ OPTIONS ▸ Unsafe ▸ PUT ▸ POST ▸ DELETE 8 SAFE VS. UNSAFE LET’S TALK COOKIES COOKI...
pdf
SECURITY & INNOVATION Cyber[Crime|War] Iftach Ian Amit 1 www.securityandinnovation.com Cyber[Crime|War] Linking State Governed Cyber Warfare with Online Criminal Groups Table of Contents Introduction............................
pdf
Ghost Telephonist Impersonates You Through LTE CSFB Yuwei ZHENG, Lin HUANG Qing YANG, Haoqi SHAN, Jun LI UnicornTeam, 360 Technology July 30, 017 Who We Are •  360 Technology is a leading Internet security company in China. Our core products are anti-virus security software on PC and cellphones. •  UnicornTeam (ht...
pdf
Staying Connected During a Revolution or Disaster Thomas Wilhelm Introduction / Background Copyright Trustwave 2010 Confidential Speaker Info – Thomas Wilhelm Education • Masters Degrees in Computer Security: − Computer Science − Management • Ph.D. Student in Information Technology: − Information Assurance a...
pdf
BUILDING AN ANDROID IDS ON NETWORK LEVEL Jaime Sanchez @segofensiva http://www.seguridadofensiva.com jsanchez@seguridadofensiva.com 2 $  WHO  I  AM §  Passionate  about  computer  security. §  Computer  Engineering  degree  and  an  Execu7ve MBA. §  In  my  free  7me  I  condu...
pdf
FROM CAPTURE TO CASHOUT HACKING NEXT-GEN ATMS Senior Security Consultant/Senior Pentester TWITTER, LinkedIN @westonhecker Rapid7 www.rapid7.com A Little Bit About Myself 2 Senior Security Engineer / Senior Pentester / Security Researcher with 12 years experience in programming and reverse engineering Speaker at Defcon...
pdf
What you’ll learn • What are the origins of this exploit. • What are the differences between “executable” and “Static” images? • How to create images with PHP & GD • How to fool servers into executing images (instead of serving them to browsers) • How to do cool things with images on Web 2.0 websites The Executable...
pdf
#BHUSA @BlackHatEvents Industroyer2 Sandworm's Cyberwarfare Targets Ukraine's Power Grid Again Anton Cherepanov Robert Lipovsky 1. Sandworm (2014-2022) 2. Industroyer (2016) 3. Industroyer2 (2022) • Attack events • Technical analysis 4. Co-deployed malware 5. Defense 6. Wrap up Anton Cherepanov Senior Malware Researche...
pdf
Boo Primer by Cameron Kenneth Knight Converted to PDF from the original HTML at boo.codehaus.org on May 27, 2008. NOTE: Hyperlinks do not work in the PDF version. Part 01 - Starting Out http://boo.codehaus.org/Part+01+-+Starting+Out?print=1 1 of 3 5/27/2008 9:05 PM Part 01 - Starting Out Part 01 - Starting Out Boo ...
pdf
Living in the RIA World Introduction Who are we? What’s a RIA? Why use RIA? Frameworks Adobe AIR MS Silverlight Google Gears Mozilla Prism HTML 5 Attack Scenarios RIA vs OS RIA vs the web Living in the RIA World: Blurring the Line between Web and Desktop Security Alex Stamos David Thiel Justine Osborne Defcon 16 Living...
pdf
MQ Jumping . . . . Or, move to the front of the queue, pass go and collect £200 Martyn Ruks DEFCON 15 2007-08-03 2 One Year Ago • Last year I talked about IBM Networking attacks and said I was going to continue with my research. • But like any penetration tester I had other client work to do and that led to me look...
pdf
Personal Safety Plan USE THIS PLAN WHEN I’M FEELING 1. ______________________________________________ 2. ______________________________________________ 3. ______________________________________________ 4. ______________________________________________ 5. ______________________________________________ Warning Sig...
pdf
赛博回忆录星球出品,仅供小范围技术交流,请勿拿去随意攻击 赛博回忆录星球出品,仅供小范围技术交流,请勿拿去随意攻击 欢迎关注公众号:赛博回忆录 抓包看看 闭合 username 进行赛勃 fuzz,发现用反引号执行`命令`可导致返回包执行相关命令 赛博成功反弹 shell。 发现网上存在补丁塞博版本,以及无补丁版本,以上均为补丁情况下,现在分析无补丁的。 无补丁的使用单引号’ -V ’返回以下结果,执行了 grep -V 赛博回忆录星球出品,仅供小范围技术交流,请勿拿去随意攻击 赛博回忆录星球出品,仅供小范围技术交流,请勿拿去随意攻击 有补丁的使用单引号’ -V ’则返回以下结果 以下为执行 grep 处的 sh 源码 关键执行命令...
pdf
Android平台 安全漏洞回顾 肖梓航(Claud Xiao) HITCON 2013 关于演讲者 • 肖梓航(Claud Xiao) <secmobi@gmail.com> • 安天实验室 高级研究员 • 方向:Android和Windows的反病毒、软 件安全 • 看雪、乌云、Insight Labs等社区和组织 的成员,xKungFoo、MDCC、ISF等会 议的讲师 • http://blog.claudxiao.net • http://wiki.secmobi.com 关于议题 • Android的内核、系统、框架、应用软件 频繁出现安全漏洞…… Android相关漏洞不完整数据 来源:http://android.s...
pdf
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices Haoqi Shan∗§, Boyi Zhang∗§, Zihao Zhan∗, Dean Sullivan†, Shuo Wang∗, Yier Jin∗ ∗University of Florida {haoqi.shan, zby0070, zhan.zihao}@ufl.edu, {shuo.wang, yier.jin}@ece.ufl.edu †University of New Hampshire {dean.su...
pdf
瑞星公司 FastDesktop 后门分析报告 报告贡献者:XywCloud、白同桌、花茶 北京瑞星网安技术股份有限公司 北京瑞星网安技术股份有限公司 1 概述 瑞星威胁情报平台于 2022 年 3 月通过部署在 VirusTotal 上的瑞星扫描器搭载的机器学习引擎捕获 到了数个检出率较低的.NET 恶意程序。 图:其中一个文件的 VirusTotal 初次扫描结果 经分析溯源,我们将这批恶意程序与相关的组件定性为后门,并将其命名为"FastDesktop"。 在分析过程中我们还发现该后门有两个大版本,为便于区分,将其分别命名为 v1 和 v2 版。两个版 本的使用到的攻击...
pdf
Pwnhub Fantastic Key WP : index.php config.php <?php error_reporting(0); include 'config.php'; $id=$_POST['i']?waf($_POST['i']):rand(1,8); $v=$_POST['v']?waf($_POST['v']):'anime'; $sql="desc `acg_{$v}`"; if (!$conn->query($sql)){ die('no such table'); } $sql = "SELECT * FROM acg_{$v} where id = '$id'"; ...
pdf
1 CVE-OLOO-ONPSL 反序列化利⽤链,JNDI注⼊ 10.3.6.0.0 12.1.3.0.0 12.2.1.3.0 12.2.1.4.0 测试版本12.2.1.4.0 之前有师傅的⽂章已经分析过了,给出调⽤堆栈 漏洞介绍 漏洞评级 影响范围 安全版本 漏洞分析 12.2.1.4.0 2 从这⾥调⽤链能看出,他基本都是JDK或weblogic⼀个包的,没有像2555/2883那样还需要依赖 coherence,能⼤⼤提⾼不同版本的利⽤兼容性。 ⽬前测试下来12.1.3/12.2.1.3/12.2.1.4⽤⼀个包就能打 这⾥记录下⾃⼰的调试记录吧,⽅便后续查阅 ⼊⼝点还是之前的 javax...
pdf
Windows pass edrhook 1. - 2. NtSuspendProcess 3. NtQuerySystemInform 4. ObjectTypeIndex ObjectTypeIndex 5. NtQueryInformation 6. DUPLICATE_CLOSE_SOURCE 7. 1 8. NtResumeProcess // if (NtSuspendProcess(hProcess) != 0) { CloseHandle(hProcess); return 1; } // NtSuspendProcess NtSuspendProce...
pdf
Opt Out or Deauth Trying ! Anti-Tracking Bots Radios and Keystroke Injection Weston Hecker Principal Application Security Engineer NCR Twitter @Westonhecker A Little About Me. • About myself: 32 - Work for NCR - Live in North Dakota • Defcon 22, 23, 24 and 25 Blackhat 2016, Hardwear.io, ICS security 2016, Enterprise ...
pdf
msdtc.exe是微软分布式传输协调程序。该进程调用系统Microsoft Personal Web Server和Microsoft SQL Server。该服务用于管理多个服 务器。 msdtc.exe是一个并列事务,是分布于两个以上的数据库,消息队列,文件系统或其他事务保护资源管理器,删除要小心。 对应服务MSDTC,全称Distributed Transaction Coordinator,Windows系统默认启动该服务 ( 对应进程msdtc.exe,位于%windir%system32) 当Windows操作系统启动Microsoft分布式事务处理协调器(MSDTC)服务时,攻击便开始了,该服务可协调跨越多个资源管理...
pdf
Build Your SSRF Exploit Framework
 SSRF @ringzero KNOW IT • SSRF • SSRF • SSRF HOW • • SSRF • HACK IT • SSRF • • Web Interface KNOW IT, SSRF? http://10.10.10.10:8080/manager/images/tomcat.gif KNOW ITSSRF 80 & 8080 SSRF_Interface Redis server APP server HTTP server SSRF • ( FingerPrint ) • {Payl...
pdf
国内SRC漏洞挖掘经验和技巧分享 ID: PwnDog\硬糖_zzz 唐朝 | 成都体育学院体育新闻专业 前PKAV团队成员 研究方向: Web安全以及...... 关于我 1.SRC个人推荐 2.SRC的规则 3.漏洞挖掘中的个人经验和技巧分享 目录 同程 网易 360 唯品会 腾讯 阿里巴巴 京东 小米 陌陌 滴滴 百度 蚂蚁金服 SRC个人推荐 备注:排名不分先后,只为排版好看 白帽子 1.合规手段 2.点到为止 3.漏洞保密 SRC的规则 信息收集 1.厂商域名 2.厂商IP段 3.厂商业务信息 域名收集 1. 基于SSL证书查询 2. 第三方网站接口查询 3. Github 4. DNS解析记录 5. 子域名枚举等等 域名...
pdf
A look inside macOS Installer packages and common security flaws This is Me ● Experience: 11 years professional, 20+ years hobbyist ○ Self-taught → Stanford → iSEC Partners → NCC Group ● Security consultant: appsec focus ○ IC → Management → IC This is Me ● Experience: 11 years professional, 20+ years hobbyist ○ Self-t...
pdf
Using GPS Spoofing to Control Time Dave/Karit (@nzkarit) – ZX Security Defcon 2017 www.zxsecurity.co.nz @nzkarit Draft for Defcon Media server A final copy will be posted on https://zxsecurity.co.nz/events.html after the talk is given Draft 2 www.zxsecurity.co.nz @nzkarit Dave, Karit, @nzkarit Security Consultant/P...
pdf
Asura: A huge PCAP file analyzer for anomaly packets detection using massive multithreading Ruo Ando Center for Cybersecurity Research and Development National Institute of Informatics DEF CON 26, Aug 12 2018 Outline ❑”Too many packets, too few resources” - 100,000,000 vs 1000,000,000,000 ❑ASURA: “Huge PCAP file vs ...
pdf
某硬件设备漏洞挖掘之路-Web选手初入"二进 制" Author: Yuanhai 遵守相关法律法规,本文不会带有任何厂商标识。 0x01:前言 很早之前就有打算开始往二进制方向发展,但由于基础较差,需要花费大 量时间从0开始学习。阅读其他师傅所写的文章受益良多。最有印象的 就是忍者师傅所写的《web选手如何快速卷入二进制世界》。简单的二 进制应用在IDA的伪代码状态下与日常的WEB应用审计流程基本一致。 下面就分享一篇个人初学二进制的挖掘实践。 0x02:正文 此次挖掘的目标系统是一个硬件设备(Web应用网关),通过官方服务中心 拿到了更新的固件包(.BIN文件)。然后使用Binwalk对固件进行提取 python -m bi...
pdf
Mac OS X Server Mail Service Administration For Version 10.3 or Later 034-2349_Cvr 9/12/03 7:28 AM Page 1 K Apple Computer, Inc. © 2003 Apple Computer, Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication for the purpose of learning to u...
pdf
2007 年駭客年會徵求論文 HIT 2007 Call For Paper  時間:2007 年 7 月 21 日~22 日(星期六~星期日)  主辦單位:CHROOT – Security Research Group (http://www.chroot.org)  活動網址:http://hitcon.org   台灣第三屆駭客年會將於 2007 年 7 月 21~22 日(週六、日)舉行,歡迎各界人士踴躍 投稿。論文內容以探討實作技術並能演講 50 分鐘為佳。 為了讓會議主題能夠明確,我們擬定了以下議題,有興趣的朋友可以從下列議題中選 擇自己擅長的方面進行準備(包括論文、程式碼和投影片),但不以下列的議...
pdf
DIY Hardware implant over I2C Part of the NSA Playset This slide deck will change for the talk to include more information and details! Josh Datko and Teddy Reed DEF CON 2 2 August 10, 2014 Josh Datko and Teddy Reed (DEF CON 2 2 ) DIY Hardware implant over I2C August 10, 2014 1 / 49 Outline 1 NSA Playset DEF CON Series...
pdf