text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
(maybe ?)APT1 : technical backstage
@r00tbsd – Paul Rascagnères from Malware.lu
Malware.lu
July 2013
@r00tbsd – Paul Rascagnères
(maybe ?)APT1:
technical backstage
(maybe?)APT1 : technical backstage
@r00tbsd – Paul Rascagnères from Malware.lu
Plan
- Malware.lu presentation
- Information gathering
- Poison Ivy
- Take-ov... | pdf |
Presenter
Jeff Yestrumskas
Sr. Manager, InfoSec @ SaaS org.
Personal DEFCON attendee:presenter ratio = 10:1
Presenter
Matt Flick
Principal, FYRM Associates
Information Assurance Consulting
Beer connoisseur
Agenda
What is XAB?
XAB History
What’s New?
Nitty Gritty
XAB Process Flow
Live Demo
Wrap-up
What is XAB?
Anonymous... | pdf |
Training the Next
Generation of
Hardware Hackers
Teaching Computer Organization and
Assembly Language Hands-On with
Embedded Systems
Wednesday, May 5, 2010
Development
• Took about a year to develop and run
through our first semester with the
material
• We want to share our ideas, what we
learned, and the tools ... | pdf |
garble 研究
目录
Go编译流程
garble
结果
编译输出
asm
compile
link
其他
garble的混淆
文本的混淆
总结
参考
Go编译流程
创建临时目录,mkdir -p $WORK/b001/
查找依赖信息,cat >$WORK/b001/importcfg << ...
执行源代码编译,/usr/local/go/pkg/tool/darwin_amd64/compile ...
收集链接库文件,cat >$WORK/b001/importcfg.link << ...
生成可执行文件,/usr/local/go/pkg/tool/darwin_amd64/link -o ...
移动可执行文件,m... | pdf |
Ghost in the Wireless, iwlwifi edition
Nicolas Iooss and Gabriel Campana
nicolas.iooss@ledger.fr
gabriel.campana@ledger.fr
Ledger Donjon
Abstract. Wi-Fi replaced Ethernet and became the main network pro-
tocol on laptops for the last few years. Software implementations of the
Wi-Fi protocol naturally became the targets ... | pdf |
Reverse&Engineering&&
Mac&Malware&&
Sarah&Edwards&&
@iamevltwin&
mac4n6.com&
&
whoami&
Senior&Digital&Forensics&Analyst&with&Harris&CorporaAon&
• Computer&Intrusions,&Criminal,&Counter&Terrorism,&Counter&Intelligence&
• Mac,&Windows,&*nix,&Mobile,&Malware,&anything&&&everything…&
Government&Contractor&N&Embedded&Full... | pdf |
1
gnunet
presentation for DC10
by
— not disclosed due to DMCA —
2
gnunet Requirements
• Anonymity
• Confidentiality
• Deniability
• Accountability
• Efficiency
3
Applications
• anonymous sharing of medical histories
• distributed backups of important data
• ad-hoc communication between small devices
• and others
4
Infrast... | pdf |
Chip & PIN is definitely broken
Credit Card skimming and PIN harvesting
in an EMV world
Andrea Barisani
<andrea@inversepath.com>
Daniele Bianco
<daniele@inversepath.com>
Chip & PIN is definitely broken v1.4
Copyright 2011 Inverse Path S.r.l.
Adam Laurie
<adam@aperturelabs.com>
Zac Franken
<zac@aperturelabs.com>
What... | pdf |
1
2
● Who are we
● Background
● Picking our battles
● The web vuln
● Intermission
● Telematics
○ What is it
○ Local vulnerabilities discovered
○ Writing a blind exploit
○ Remote vulnerability
● Conclusion
● Public statements
● Questions
Jesse @jessemichael
Mickey @HackingThings
Alex ... | pdf |
1
OLONLNOV-从.NET源码看⽂件上传绕waf
@我是killer
.NET⾥⼀般使⽤ context.Request.Files 来处理⽂件上传,编写如下代码测试。
跟⼊⽂件上传处理流程
C#
复制代码
using System.Web;
namespace WebApplication1
{
public class Handler1 : IHttpHandler
{
public void ProcessRequest(HttpContext context)
{
context.Response.ContentType = "text/p... | pdf |
放个垃圾设备,⽔个⽂章
某⽯⽹科云数据库审计与防护系统
源码来源:
docker search hi****one
搜索到两个内容
这⾥拉取 zhu***zaxy/hi****one 镜像
docker pull zhu***zaxy/hi****one
然后docker run启动,这⾥启动需要注意下权限问题
附带参数 --privileged
后⾯的⼀些端⼝映射需要⾃⼰去设置,这⾥只演示如何启动容器
docker run --privileged=true -it -d zhu***zaxy/hi****ne
/usr/sbin/init
启动过后进⼊容器
docker exec -it 容器id /bin/bash
全局... | pdf |
Mixminion: Design of a Type III Anonymous
Remailer Protocol
George Danezis1, Roger Dingledine2, David Hopwood3, and Nick Mathewson2
1 Cambridge University <george.danezis@cl.cam.ac.uk>
2 The Free Haven Project <{arma,nickm}@freehaven.net>
3 Independent consultant <david.hopwood@zetnet.co.uk>
Abstract. We present Mixmin... | pdf |
周末hitconctf2021两道题简单记录。
W3rmup PHP这题有两个⼩考点,结合起来⽐较有趣。⾸先是题⽬中这个循环,考察的是经典的循环体中改变被
遍历对象的⻓度导致遍历不全的bug。我们只要传⼊类似 $arr= ['123', false, "';$(id)'"] 这样的数组,
就可以绕过 escapeshellarg 的过滤逃逸单引号。因为在循环到 $arr[1] 时,由于unset的作⽤, $arr 数组⻓度
会变成2,这样在下次循环就⽆法满⾜ $i<count($arr) 直接结束了。
题⽬第2个考点是,php的 yaml_parse 使⽤的是yaml1.1的协议,会将 NO 解析为布尔值false,⽽ NO ⼜恰巧... | pdf |
Attacking Tor at the
Application Layer
Gregory Fleischer (gfleischer@gmail.com)
DRAFT SLIDES
Updated slides will be provided after the talk.
Most importantly, the updates will include links to
permanent location for all online demos.
Introduction
Introduction
• What this talk is about
• identifying Tor web traffic
• fi... | pdf |
Routing in The Dark
Scalable Searches in Dark P2P Networks
Ian Clarke and Oskar Sandberg
The Freenet Project
Ian Clarke & Oskar Sandberg - 2005 – p.1/33
Introduction
• We have long been interested in decentralised
“Peer to Peer” networks. Especially Freenet.
Ian Clarke & Oskar Sandberg - 2005 – p.2/33
Introduction
• We... | pdf |
下一代移动应用安全
江苏通付盾信息安全技术有限公司
移动应用发展
5 G 时 代 的 到 来 ?
G D P R 对 国 内 关 于 在 移 劢 应 用 数 据 方 面 未 来 的 影 响 ?
攻防不对等导致黑客屡屡得手
攻击被发现的平均时间
229天
企业自行发现的比例
33%
小时
月
天/ 周
问题不再是是否被黑,
而是什么时候被黑和你什么时候发现被黑
实施攻击
入侵得手
发现
补救
防护对象与防护边界的变化
外网
互联网
内网
业务
专网
数据,传输
从专业安全转向互联网+安全
从内向外
从边界安全转向IT生态安全
从一向多
业务驱动安全
互联网+
现今移动安... | pdf |
- 1 -
Limitations of
OAS-Based
Blocking
- 1 -
Table of Contents
Executive Summary
2
APIs - the attack is also the route to protection
3
Using OAS for Security
3
Limitations of OAS-Based Blocking
4
Summary
8
- 2 -
Executive Summary
The OpenAPI Specification (OAS) (fka Swagger) helps developers and secu... | pdf |
微软签名缺陷利用 - 老但有用的技术
0x00 前言
这项技术原理很简单,一般正规公司开发的PE文件都有数字签名,但是微软提供的签名技术,并没有签
名所有数据,还有部分结构体,没有纳入签名计算,因此我们可以修改这些结构体,放入我们的
shellcode,而不影响签名校验。
这项技术到底有多大用呢?我的结论是作用只能算锦上添花,不是雪中送碳的技术。这2天有个老哥把这
项技术写成了适合CS使用的.net和BOF程序。我们看看他的程序结构。
0x00 SigFile红队工具分析
首先我们通过作者提供的SigFile程序把shellcode通过加密保存在正规的PE文件中,然后上传到目标服
务器。在这一步会面临AV/EDR的静态扫描,大部分... | pdf |
@Y4tacker
2022虎符CTF-Java部分
写在前⾯
⾮⼩⽩⽂,代码基于marshalsec项⽬基础上进⾏修改
正⽂
本⾝我是不太懂hessian的反序列化,⼤概去⽹上搜了⼀下配合ROME利⽤的思路(如果反序
列化map对象,在逻辑后⾯通过put操作,从⽽触发对key调⽤hashCode打ROME),这⾥不清
楚可以看看ROME利⽤链以及hessian反序列化的⼀些简单东西
⾸先简单看下docker,可以看到会导致不能出⽹
version: '2.4'
services:
nginx:
image: nginx:1.15
ports:
- "0.0.0.0:8090:80"
rest... | pdf |
Information Security Operation providers Group Japan
©ISOG-J
How to make your SOC/CSIRT team more
trustworthy?: ISOG-J Maturity Model and
self-checking tool
Yasunari Momoi momo@iij.ad.jp
Internet Initiative Japan Inc. / ISOG-J
1
©ISOG-J
Information Security Operation providers Group Japan
Agenda
•
about me
•
what is ... | pdf |
1
DEFCON 16
Black vs. White
The complete life cycle of a real world breach…
August 13th, 2008
David Kennedy aka ReL1K
Ken Stasiak aka Static
Scott White aka Sasquatch
Andrew Weidenhamer aka Leroy
CD Distribution
Note, this presentation was made specifically for the CD distribution at
DEFCON. The majority... | pdf |
INTERSTATE: A Stateful
Protocol
Fuzzer
for SIP
Thoulfekar
Alrahem, Alex Chen, Nick DiGiussepe,
Jefferey
Gee, Shang‐Pin Hsiao, Sean Mattox,
Taejoon
Park,
Albert Tam, Ian G. Harris
Department of Computer Science
University of California Irvine
Irvine, CA 92697 USA
harris@ics.uci.edu
Marcel Carlsson
Fortconsult
Tranev... | pdf |
Infiltrate Your Kubernetes
Cluster
Kubernetes in Attacker View
Zhaoyan Xu
Principle Research Engineer
Palo Alto Networks
May 29, 2019
Tongbo Luo
Chief AI Secruity Scientist
JD.com
Agenda
Background
Security Features of Kubernetes
Attack Vectors
Lateral Movement Practices
Questions
Background
➢ Kubernetes becomes popul... | pdf |
2022/4/25 09:43
A blueprint for evading industry leading endpoint protection in 2022 | Vincent Van Mieghem
https://vanmieghem.io/blueprint-for-evading-edr-in-2022/
1/12
A blueprint for evading industry leading endpoint
protection in 2022
MONDAY. APRIL 18, 2022 - 19 MINS
EVASION
OBFUSCATION
About two years ago I quit ... | pdf |
MouseJack and Beyond: Keystroke Sniffing and Injection
Vulnerabilities in 2.4GHz Wireless Mice and Keyboards
Marc Newlin
marc@bastille.net
@marcnewlin
July 8, 2016
v0.1
Abstract
What if your wireless mouse or keyboard was an e↵ective attack vector? Research reveals this to be the
case for non-Bluetooth wireless mice and ... | pdf |
see more please visit: https://homeofpdf.com
see more please visit: https://homeofpdf.com
see more please visit: https://homeofpdf.com
本书用“青年与哲人的对话”这一故事形式总结了与弗洛伊德、荣格并称
为“心理 学三大巨头”的阿尔弗雷德•阿德勒的思想(阿德勒心理学)。
风靡欧美的阿德勒心理学对于“人如何能够获得幸福”这个哲学问题给出
了极其简 单而又具体的“答案”。了解了足以被称为“这个世界上的一个
真理”的阿德勒思想之 后,你的人生会发生什么变化呢?又或者,什么
都不会改变吗?
来吧,让我们与... | pdf |
Bypass WAF ⼀些姿势(⼀)
前⾔
WAF 除了对 post 的 payload 进⾏检测,此外还有个功能是对访问的 URL 路径进⾏限制,例如⼀些敏感路径,
Weblogic CVE-2019-2725 的 /_async/AsyncResponseService
/_async/AsyncResponseService 、CVE-2017-10271 的 /wls-
/wls-
wsat/CoordinatorPortType*
wsat/CoordinatorPortType* 等,这样可以缓解⼀些 weblogic 版本⽆法升级或打补丁的窘境。但是在最近⼀
次监控告警中,发现某品牌 WAF 被绕过,成功上传 ... | pdf |
由于之前在某篇文章看到,但是当时懒没有测试。顺便复现一下,好像之前有搞过但是忘了,emmmm....
环境:
监听器:
初始机192.168.1.106上线
执行rportfwd指令
psexec上线
他这里的external指向的是192.168.1.108
Evernote Export
file:///C:/Users/JiuShi/Desktop/cs反向端口转发上线.html
第1页 共1页
2020/7/17 18:43 | pdf |
1
THE ADVENTURES OF AV
AND THE LEAKY SANDBOX
A SafeBreach Labs research paper by
Amit Klein, VP Security Research, SafeBreach and
Itzik Kotler, co-founder and CTO, SafeBreach
July 2017
2
ABSTRACT
We describe and demonstrate a novel technique for exfiltrating data from highly secure enterprises which employ strict
egr... | pdf |
Hardw
are
bac
kdo
oring
is
practical
Jonathan
Brossard
-
jonathan.brossard@toucan-system.com
Securit
y
Researc
h
Engineer
&
CEO,
T
oucan
System,
F
rance
and
Australia
Blac
khat
Briengs
and
Defcon
conferences,
Las
V
egas,
2012
T
o
cr
e
ate
is
to
r
esist,
to
r
esist
is
to
cr
e
ate
National
Council
of
the
Resistance
Abstr... | pdf |
Stealth Data Dispersion
ICMP Moon-Bounce
Saqib A. Khan, Principal
khan@SecurityV.com
Latest Version @ http://SecurityV.com/research
Copyright 2002 Security Verification, Inc.
All rights reserved.
Definition
Stealth Data Dispersal is an asynchronous
covert channel
Copyright 2002 Security Verification, Inc.
All rights r... | pdf |
Stealing Identity Management
Systems
Part I: Background of Identity
Management systems, and some
philosiphy on attacking them
What are identity Management
Systems?
Theory of IDM
Some specific products
Some common configurations
Theory of IDM
The system connecting two or more systems that hold
Identities (some ... | pdf |
开发shiro蜜罐遇到的一些问题
2022年09月14日 / 网络安全
前情概要
我曾经写过一篇文章,https://rce.ink/index/view/366.go
大概意思就是php的网站模拟shiro工具探测的过程配合响应,实现可以根据指定key让工
具实现逼真的测试效果,如图所示:
这样攻击者会觉得网站是shiro框架,并且被我爆破出了一个key。再配合修改phpsessio
nid为jsessionid,脚本伪静态修改后缀为jsp达到更好的效果。
我的博客是由webman开发,纯纯php框架。
后续开发
上次写到那里我就去做更有意思的项目了。直到最近我才开始对指定利用链检测、命令回
显等功能进行完善。
我写了一堆php代... | pdf |
影响版本:
Linux Kernel版本 >= 5.8
Linux Kernel版本 < 5.16.11 / 5.15.25 / 5.10.102
漏洞点是在 splice 系统调用中未清空 pipe_buffer 的标志位,从而将管道页面可写入的状态保
留了下来,这给了我们越权写入只读文件的操作。
攻击者利用该漏洞可以覆盖任意只读文件中的数据,这样将普通的权限提升至root权限。
内核提权
漏洞能覆盖任意可读文件,也有一些限制,不能覆盖第一个字节和最后一个,不能填入 \x00 ,写入大
小最多为linux 页 的大小。
利用可以写 /etc/passwd ,新加一个root或修改root用户,也可以写到 corntab , su... | pdf |
UTILIZING POPULAR WEBSITES FOR
MALICIOUS PURPOSES USING RDI
Daniel Chechik, Anat (Fox) Davidi
Security Web Scanners
What is RDI?
3
Reflected DOM Injection
Legit
Legit
Malicious
A Recipe for Disaster
4
1 simple web page
A Recipe for Disaster
5
1 simple web page
1 trustworthy web utility
A Recipe f... | pdf |
RT2WIN!
How 50 lines of Python made me the luckiest guy on Twitter
“No purchase necessary, enter as often as you want. So I am.”
Introduction
• I’m Hunter
• Electrical & Computer Engineer
• Working in Silicon Valley
• Currently disrupting social local mobile big data analytics with
cloud based MapReduce deployments on... | pdf |
Hacking the Apple TV
and Where your Forensic
Data Lives
Presentation for:
Defcon 17
July 30, 2009
Kevin Estis
and
Randy “r3d” Robbins
DMCA Disclaimer
1.
Digital Millennium Copyright Act
2.
The authors of this presentation respects the intellectual property rights of others and is committed to complying
with... | pdf |
Vulnerabilities 101:
How to Launch or Improve Your
Vulnerability Research Game
Joshua “jduck” Drake, Zimperium
Steve Christey Coley, MITRE
DEF CON 24
Aug 7th, 2016
Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game - DEF CON 24
• About Josh
– 20-years of VR, Ran iDefense VCP
• About Steve
–... | pdf |
KC n
陈愉鑫
第五代加固技术 ARM代码虚拟化保护技术
目录
CONTENTS
PART 01
Android 平台加固技术概述
PART 02
什么是虚拟机保护技术
PART 03
VYD 指令集设计
PART 04
VYD 虚拟机设计
PART 05
VYD 编译器设计
PART 06
ARM VM的问题
PART 00 个人简介
知乎: 无名侠
专栏:大话二进制安全
知道创宇 IA 实验室,Android 病毒分析
i春秋,特种行业逆向分析线下讲师
我们为什么要加固?
PART 01
A d
id 平台加固技术概述
1.保护核心代码,防止被逆向,泄密
2.防止营销作弊
3.防止代码被修改
4………
加固技术的发展历史
... | pdf |
一次完整的代码审计
前言:
因为本人一直活跃于教育 SRC,所以本次针对的系统也是各大高校所使用的
系统。
系统名称: 某一卡通门户系统
正文:
0x01: NET 平台下的源码挖掘
个人非常喜欢针对于.NET 和 JAVA 平台所开发的程序做测试,相反,对
于 php 就是一窍不通了。。。。
在针对 NET 平台,因为大部分使用的都是 IIS 中间件,对大小写不敏感,
所以在生成字典的时候也会方便很多。
由于 NET 平台的特性,大部分程序的源代码都会打包成程序集,存储在根
目录下的 bin 目录。这导致了部分运维喜欢备份 bin 目录,且将备份过后的
文件存储于网站根目录下,若黑客使用事先准备好的字典,就可以轻而易举
的获取到源... | pdf |
JVM字节码学习笔记——class ⽂件结构
0x01 前⾔
本系列学习笔记均来⾃《深⼊理解 JVM 字节码》(作者:张亚),本笔记仅⽤于个⼈学习知
识总结。
对于学习 java 安全、想了解 JVM 字节码的童鞋们强烈建议购买正版书去阅读。
0x02 class ⽂件结构
java 是跨平台的⼀门语⾔,但是 jvm 却不是跨平台的,但是不同平台的 JVM 帮我们屏蔽了差
异,通过 JVM 可以把源代码编译成和平台⽆关的字节码,这样我们的源代码就不⽤根据不同
平台编译成不同⼆进制是可执⾏⽂件了。这也是 java 字节码的意义所在。
class ⽂件由⼗部分组成,具体如下:
魔数(magic number)
版本号(minor&maj... | pdf |
C.R.E.A.M.
C.R.E.A.M. –– Cache Rules Evidently
Cache Rules Evidently
Ambiguous, Misunderstood
Ambiguous, Misunderstood
Jacob Thompson
Security Analyst
Independent Security Evaluators
jthompson@securityevaluators.com
Payroll Statement from ADP
• Name
• Address
• Last four of SSN
• Last four of bank acct.
Prescription C... | pdf |
关于沙箱逃避的一些 Tips:
https://research.checkpoint.com/2022/invisible-cuckoo-cape-sandbox-evasion/
@Check Point 发布了关于沙箱逃避的一些分析,这个公司听起来有点陌生,知名项目 Evasion
techniques就是它们出品。
常见的一些规避沙箱技巧:
汇编指令检测(比如使用 cpuid 指令来获取处理器信息来区分沙箱)
检测注册表项(正常环境中没有,但是特定的虚拟环境中存在)
文件系统检测(正常环境中没有,但是特定的虚拟环境中存在)
@Check Point 发现的一些新的规避沙箱的技巧:
Windows API 函数调用中的漏网... | pdf |
DefCon 21, Las Vegas 2013
Let’s Screw With nMap
Gregory Pickett, CISSP, GCIA, GPEN
Chicago, Illinois
gregory.pickett@hellfiresecurity.com
Hellfire Security
Overview
Nosey Bastards!
All About Packet Normalization
Working It All Out
Putting It Into Practice
Finishing Up
Network Defenders
We see scans and probes of our ne... | pdf |
Asp 安全审计
http://hi.baidu.com/micropoor
1
ASP
ASP
ASP
ASP 代码安全审计
------PHP
------PHP
------PHP
------PHP 安全新闻早 8888 点特别篇
2012/3/20
注入漏洞:
1.Request.QueryString:获取地址栏参数(以及以 GET 方式提交的数据)
如:Request.QueryString("id")
2.Request.Form:
获取以 POST 方式提交的数据(接收 Form 提交来的数据)
如:Request.Form("id")
3.Request.Cookies:
获取浏览器 Cookier 信息。
4.... | pdf |
CON KUNG-FU
Defending Yourself @ DefCon
Presented by:
Rob DeGulielmo
rdegulielmo@hotmail.com
Defcon 16 – asleep at the wheel
Crap! Firefox is possessed!
DNS redirection allowed for malicious code
insertion on legitimate webpages
2
2009 DefCon 17 - Con Kung-Fu : Defending Yourself @ DefCon
Defcon 16 – asleep at th... | pdf |
ʻpyREticʼ – In memory reverse engineering for
obfuscated Python bytecode
Rich Smith <rich@immunityinc.com>
Immunity Inc
Abstract
Growing numbers of commercial and closed source applications are being developed using the Python
programming language. The trend with developers of such applications appears to be that... | pdf |
An Attacker Looks At Docker
Approaching Multi-Container Applications
Wesley McGrew, Ph.D.
Director of Cyber Operations
HORNE Cyber
wesley.mcgrew@hornecyber.com @mcgrewsecurity
My Background
• Ph.D. Computer Science – Mississippi State University
• Academia
• NSA CAE – Research, Education, Cyber Operations – MSU
• Indus... | pdf |
Three Generations of DoS
Attacks
(with Audience Participation, as
Victims)
Defcon, 2011
Bio
Summary
• The DoS Circus
• Layer 4 DDoS: Thousands of attackers
bring down one site
• Layer 7 DoS: One attacker brings
down one site
• Link-Local DoS: IPv6 RA Attack: One
attacker brings down a whole network
The D... | pdf |
A Review of Mind Wars: Brain Research and National Defense
By Jonathan D. Moreno
Dana Press (The Dana Foundation: New York and Washington DC)
2006
by
Richard Thieme
“What we don’t know is so much bigger than we are.”
A Haitian Proverb
Oh, how I wish that reviewing a book like this were simple and straightforward!
That... | pdf |
multipart-parse.md
5/19/2021
1 / 33
从RFC规范看如何绕过waf上传表单
背景介绍
传统waf以规则匹配为主,如果只是⽆差别的使⽤规则匹配整个数据包,当规则数量逐渐变多,会造成更多性能
损耗,当然还会发⽣误报情况。为了能够解决这些问题,需要对数据包进⾏解析,进⾏精准位置的规则匹配。
正常业务中上传表单使⽤普遍,不仅能够传参,还可以进⾏文件的上传,当然这也是⼀个很好的攻击点,waf想
要能够精准拦截针对表单的攻击,需要进⾏multipart/form-data格式数据的解析,并针对每个部分,如参数
值,文件名,文件内容进⾏针对性的规则匹配拦截。
虽然RFC规范了multipart/form-data... | pdf |
Worming through IDEs
David Dworken
`whoami`
●
David Dworken (@ddworken)
●
Security Engineer at Google
○
Standard disclaimer: Opinions expressed are my own
●
Hacking in both senses of the word
○
Writing silly useless but interesting code
○
Breaking serious real code for fun
●
I found and reported 30+ bugs in IDEs over a... | pdf |
The BeEF addons discussed in our talk, Hacking Google Chrome OS, are available at:
http://kyleosborn.com/chrome/ | pdf |
Flying With Firearms
Domestic Laws & Policies
from the TSA’s “Prohibited Items” list…
http://www.tsa.gov/travelers/airtravel/prohibited/permitted-prohibited-items.shtm
Ammunition - Check with your airline or travel agent to see if ammunition is permitted in checked baggage on
the airline you are flying. If ammunit... | pdf |
.
.
.
.
.
.
.
..
.
.
.
.
eXercise In Messaging and Presence Pwnage
fun with XMPP
Ava Latrope
iSEC Partners
Defcon 17
Ava Latrope (iSEC Partners)
eXercise In Messaging and Presence Pwnage
Defcon 17
1 / 32
.
.
.
.
.
.
Introduction
Outline
Outline
.. .1
Introduction
The basics
Common Stanzas
...2 The victims
Clients
Serve... | pdf |
RESTing On Your Laurels Will Get
You Pwned
By Abraham Kang, Dinis Cruz, and
Alvaro Munoz
Goals and Main Point
• Originally a 2 hour presentation so we will only
be focusing on identifying remote code execution
and data exfiltration vulnerabilities through REST
APIs.
• Remember that a REST API is nothing more t... | pdf |
FROM PRINTER TO PWND
Leveraging Multifunction Printers
During Penetration Testing
INTRODUCTION
From Dayton Ohio region
Last 18 years in IT
10 year in security
3 of those as a security penetration tester
Member of foofus.net team
3rd time presenting at Defcon w00t!
AGENDA
Multi function printer features... | pdf |
Maximum CTF
Get the most from capture the flag
Friday, July 31, 2009
capture the flag
(Two Toy Soldiers)
http://www.flickr.com/photos/janramroth/2264184078/
http://creativecommons.org/licenses/by/2.0/deed.en
jot.punkt
planet
"Hack the ______"
lightning round
Friday, July 31, 2009
Trivia 100 from 2006 qualifier. And yeah t... | pdf |
Blog
PaddingOracle攻击
2021-08-10 · 密码学
根据加解密时是否用同一组密钥,可以分为对称加密和非对称加密。对称加密中根据对数据处理粒度的不
同,可以分为分组加密算法(AES、3DES、DES、Blowfish、RC2、CAST)和流加密算法(ChaCha20、
Salsa20、RC4)
常见的非对称加密算法有RSA、ElGamal、DSA、ECC等
分组加密算法中根据加解密时对数据的分组编排方式,经典工作模式有ECB、CBC、PCBC、CFB、OFB、CTR
等,其中后三者可以将分组加密转化为流加密形式。为了在保证机密性的前提下进一步保证完整性,现代工
作模式有CCM(CBC-MAC)、EAX、GCM、... | pdf |
2017年,"Process Doppelganging", NTFS+section
https://github.com/hasherezade/process_doppelganging
https://www.youtube.com/watch?v=Cch8dvp836w
进程的创建不支持NTFS transacted文件,所以分割进程的步骤寻找创建方法
跟踪 CreateProcessW 调用 (xp)
NtOpenFile
NtCreateSection
NtCreateProcessEx
...
NtCreateThreadEx
在win10下,直接使用 NtCreateUserProcess 创建,看起来无法使用nt... | pdf |
知道创宇404实验室发布
打造世界领先网络空间测绘能力
演讲人:
heige@0x557
hei@knownsec.com
2019
PART 01
Xmap 2.0 发布
目录
CONTENTS
PART 02
节点分析
PART 03
ZoomEye“50
0节点计划”
PART 04
IPv6 测绘
01
02
03
04
05
PART 05
ZoomEye全球
蜜罐识别
•
获取更多数据
•
赋予数据灵魂
两个关键
–heige
“探测资源及技术已经成为网络空间测绘的核心竞争力!”
CLICK ADD RELATED TITLE TEXT, AND CLICK ADD RELATED TITLE
TEXT, CLICK... | pdf |
BitTorrent Protocol Abuses
Written by Michael Brooks and David Aslanian
Introduction
The BitTorrent protocol is now 7 years old. The protocol has become wildly successful in a very
short period of time, but with this success comes growing pains. The protocol originally
envisioned by Bram Cohen is fairly secure. V... | pdf |
How to use CSP to
stop XSS
Ken Lee
Friday, August 2, 13
Who is this guy?
•
Product Security Engineer
at Etsy
•
Previously worked at a
financial software company
•
@kennysan
•
klee@etsy.com
Friday, August 2, 13
What is CSP?
•
Content Security Policy
•
Browser-based XSS Defense
•
http://www.w3.org/TR/CSP/
Friday, August... | pdf |
Protecting Against and
Investigating Insider Threats
A methodical, multi-pronged approach
to protecting your organization
Antonio A. Rucci
Program Director
Technical Intelligence and Security Programs
Global Initiatives Directorate
Oak Ridge National Laboratory
Oak Ridge, TN 37831
AGENDA
A methodical, multi-pronged ap... | pdf |
tips
分享下今晚看的小tips => SharpC2 Client端如何生成 stager的
(SharpC2最后一版是 experimental测试版 上不了线 哈哈哈这个我们后面再聊)
功能其实并不复杂,但是令我好奇的是如何生成powershell stager的,因为在我去年看SharpC2时还没
有这些东西,希望能够帮助一些想要学习写C2的伙伴。
1. 首先Client端 使用WPF MVVM模型,通过调试我们可以定位到 PayloadGenratorViewModel.cs
然后通过GetListeners() 获取所有监听器 http,tcp,smb
基于c# async await关键字 异步任务处理... | pdf |
© 2018 Gigamon. All rights reserved.
1
可视及赋能
Gigamon助力构建现代网络多层次可视及安全
Gigamon / 英国技盟
技术经理 顾威
180 1600 0621
© 2017-2020 Gigamon Inc. All rights reserved.
1
© 2018 Gigamon. All rights reserved.
2
公司简介
分 支 机 构
20 国家
客 户 行 业
公共服务 | 金融服务
医疗健康 | 零售业
高科技 | 运营商
市 场 地 位
NGNPB
市场开拓及领导者
市场份额第一
专 利
66 世界专利
客 户
3,200 +客户
83... | pdf |
1
© Copyright 2010, National Security Corporation, all rights reserved
DEFCON XVIII
DEFCON XVIII
DEFCON XVIII
Tales from the Crypto
G. Mark Hardy, CISM, CISA, CISSP
National Security Corporation
gmhardy@nationalsecurity.com
+1 410.933.9333
@g_mark
© Copyright 2010, National Security Corporation, all rights reserved
2
D... | pdf |
D A V E J O S E P H S E N
homeless vikings
S H O R T- L I V E D B G P S E S S I O N
H I J A C K I N G , A N E W C H A P T E R I N
T H E S PA M WA R S
Dave Josephsen is author of the upcoming book
Building Monitoring Infrastructure with Nagios
(Addison-Wesley). He currently works as the senior
systems administrator for ... | pdf |
_vti_fpxploitation
mshannon@fpxploiter.org
Frontpage: Laying the ground work
What is it?
Microsoft's integrated Web Site development
tool.
System for adding basic to advanced functionality
with little or no web page experience.
Integrated MS Office package
Security Nightmare
Who is Vermeer Technologies?
In early 199... | pdf |
“Sputnik-II”
Economical Multi-Band Antenna
Version 2.0 — 04-01-2010
BANDS:
A
B
C
D
2m – 1.25m – 70cm
19 ½”
1”
12 ⅜”
21”
2m – 70cm
19 ½”
1”
6”
21”
Antenna Versions:
The antenna was originally designed to cover 2m – 1.25m – 70cm in a single ground plane style
unit. The design utilizes 2 elements for t... | pdf |
WIPING OUT CSRF
JOE ROZNER | @JROZNER
IT’S 2017
WHAT IS CSRF?
WHEN AN ATTACKER FORCES A VICTIM
TO EXECUTE UNWANTED OR
UNINTENTIONAL HTTP REQUESTS
4
WHERE DOES CSRF
COME FROM?
LET’S TALK HTTP
SAFE VS. UNSAFE
▸ Safe
▸ GET
▸ HEAD
▸ OPTIONS
▸ Unsafe
▸ PUT
▸ POST
▸ DELETE
8
SAFE VS. UNSAFE
LET’S TALK COOKIES
COOKI... | pdf |
SECURITY & INNOVATION
Cyber[Crime|War]
Iftach Ian Amit 1 www.securityandinnovation.com
Cyber[Crime|War]
Linking State Governed Cyber Warfare with Online Criminal Groups
Table of Contents
Introduction............................ | pdf |
Ghost Telephonist
Impersonates You Through LTE CSFB
Yuwei ZHENG, Lin HUANG Qing YANG, Haoqi SHAN, Jun LI
UnicornTeam, 360 Technology
July 30, 017
Who We Are
• 360 Technology is a leading Internet security company in China. Our
core products are anti-virus security software on PC and cellphones.
• UnicornTeam (ht... | pdf |
Staying Connected During a Revolution or Disaster
Thomas Wilhelm
Introduction / Background
Copyright Trustwave 2010
Confidential
Speaker Info – Thomas Wilhelm
Education
•
Masters Degrees in Computer Security:
− Computer Science
− Management
•
Ph.D. Student in Information Technology:
− Information Assurance a... | pdf |
BUILDING AN ANDROID IDS
ON NETWORK LEVEL
Jaime Sanchez
@segofensiva
http://www.seguridadofensiva.com
jsanchez@seguridadofensiva.com
2
$
WHO
I
AM
§
Passionate
about
computer
security.
§
Computer
Engineering
degree
and
an
Execu7ve
MBA.
§
In
my
free
7me
I
condu... | pdf |
FROM CAPTURE TO CASHOUT
HACKING NEXT-GEN ATMS
Senior Security Consultant/Senior Pentester
TWITTER, LinkedIN @westonhecker
Rapid7 www.rapid7.com
A Little Bit About Myself
2
Senior Security Engineer / Senior Pentester / Security Researcher
with 12 years experience in programming and reverse engineering
Speaker at Defcon... | pdf |
What you’ll learn
• What are the origins of this exploit.
• What are the differences between “executable”
and “Static” images?
• How to create images with PHP & GD
• How to fool servers into executing images
(instead of serving them to browsers)
• How to do cool things with images on Web 2.0
websites
The Executable... | pdf |
#BHUSA @BlackHatEvents
Industroyer2
Sandworm's Cyberwarfare Targets Ukraine's Power Grid Again
Anton Cherepanov
Robert Lipovsky
1. Sandworm (2014-2022)
2. Industroyer (2016)
3. Industroyer2 (2022)
• Attack events
• Technical analysis
4. Co-deployed malware
5. Defense
6. Wrap up
Anton Cherepanov
Senior Malware Researche... | pdf |
Boo Primer
by Cameron Kenneth Knight
Converted to PDF from the original HTML at boo.codehaus.org on May 27, 2008.
NOTE: Hyperlinks do not work in the PDF version.
Part 01 - Starting Out
http://boo.codehaus.org/Part+01+-+Starting+Out?print=1
1 of 3
5/27/2008 9:05 PM
Part 01 - Starting Out
Part 01 - Starting Out
Boo ... | pdf |
Living in the
RIA World
Introduction
Who are we?
What’s a RIA?
Why use RIA?
Frameworks
Adobe AIR
MS Silverlight
Google Gears
Mozilla Prism
HTML 5
Attack
Scenarios
RIA vs OS
RIA vs the web
Living in the RIA World:
Blurring the Line between Web and Desktop Security
Alex Stamos
David Thiel
Justine Osborne
Defcon 16
Living... | pdf |
MQ Jumping
. . . . Or, move to the front of
the queue, pass go and collect
£200
Martyn Ruks
DEFCON 15
2007-08-03
2
One Year Ago
•
Last year I talked about IBM Networking attacks and said I
was going to continue with my research.
•
But like any penetration tester I had other client work to do
and that led to me look... | pdf |
Personal Safety Plan
USE THIS PLAN WHEN I’M FEELING
1. ______________________________________________
2. ______________________________________________
3. ______________________________________________
4. ______________________________________________
5. ______________________________________________
Warning Sig... | pdf |
赛博回忆录星球出品,仅供小范围技术交流,请勿拿去随意攻击
赛博回忆录星球出品,仅供小范围技术交流,请勿拿去随意攻击
欢迎关注公众号:赛博回忆录
抓包看看
闭合 username
进行赛勃 fuzz,发现用反引号执行`命令`可导致返回包执行相关命令
赛博成功反弹 shell。
发现网上存在补丁塞博版本,以及无补丁版本,以上均为补丁情况下,现在分析无补丁的。
无补丁的使用单引号’ -V ’返回以下结果,执行了 grep -V
赛博回忆录星球出品,仅供小范围技术交流,请勿拿去随意攻击
赛博回忆录星球出品,仅供小范围技术交流,请勿拿去随意攻击
有补丁的使用单引号’ -V ’则返回以下结果
以下为执行 grep 处的 sh 源码
关键执行命令... | pdf |
Android平台
安全漏洞回顾
肖梓航(Claud Xiao)
HITCON 2013
关于演讲者
• 肖梓航(Claud Xiao)
<secmobi@gmail.com>
• 安天实验室 高级研究员
• 方向:Android和Windows的反病毒、软
件安全
• 看雪、乌云、Insight Labs等社区和组织
的成员,xKungFoo、MDCC、ISF等会
议的讲师
• http://blog.claudxiao.net
• http://wiki.secmobi.com
关于议题
• Android的内核、系统、框架、应用软件
频繁出现安全漏洞……
Android相关漏洞不完整数据
来源:http://android.s... | pdf |
Invisible Finger: Practical Electromagnetic
Interference Attack on Touchscreen-based
Electronic Devices
Haoqi Shan∗§, Boyi Zhang∗§, Zihao Zhan∗, Dean Sullivan†, Shuo Wang∗, Yier Jin∗
∗University of Florida
{haoqi.shan, zby0070, zhan.zihao}@ufl.edu, {shuo.wang, yier.jin}@ece.ufl.edu
†University of New Hampshire
{dean.su... | pdf |
瑞星公司
FastDesktop 后门分析报告
报告贡献者:XywCloud、白同桌、花茶
北京瑞星网安技术股份有限公司
北京瑞星网安技术股份有限公司
1
概述
瑞星威胁情报平台于 2022 年 3 月通过部署在 VirusTotal 上的瑞星扫描器搭载的机器学习引擎捕获
到了数个检出率较低的.NET 恶意程序。
图:其中一个文件的 VirusTotal 初次扫描结果
经分析溯源,我们将这批恶意程序与相关的组件定性为后门,并将其命名为"FastDesktop"。
在分析过程中我们还发现该后门有两个大版本,为便于区分,将其分别命名为 v1 和 v2 版。两个版
本的使用到的攻击... | pdf |
Pwnhub Fantastic Key WP
:
index.php
config.php
<?php
error_reporting(0);
include 'config.php';
$id=$_POST['i']?waf($_POST['i']):rand(1,8);
$v=$_POST['v']?waf($_POST['v']):'anime';
$sql="desc `acg_{$v}`";
if (!$conn->query($sql)){
die('no such table');
}
$sql = "SELECT * FROM acg_{$v} where id = '$id'";
... | pdf |
1
CVE-OLOO-ONPSL
反序列化利⽤链,JNDI注⼊
10.3.6.0.0
12.1.3.0.0
12.2.1.3.0
12.2.1.4.0
测试版本12.2.1.4.0
之前有师傅的⽂章已经分析过了,给出调⽤堆栈
漏洞介绍
漏洞评级
影响范围
安全版本
漏洞分析
12.2.1.4.0
2
从这⾥调⽤链能看出,他基本都是JDK或weblogic⼀个包的,没有像2555/2883那样还需要依赖
coherence,能⼤⼤提⾼不同版本的利⽤兼容性。
⽬前测试下来12.1.3/12.2.1.3/12.2.1.4⽤⼀个包就能打
这⾥记录下⾃⼰的调试记录吧,⽅便后续查阅
⼊⼝点还是之前的 javax... | pdf |
Windows
pass edrhook
1. -
2. NtSuspendProcess
3. NtQuerySystemInform
4. ObjectTypeIndex ObjectTypeIndex
5. NtQueryInformation
6. DUPLICATE_CLOSE_SOURCE
7. 1
8. NtResumeProcess
//
if (NtSuspendProcess(hProcess) != 0) {
CloseHandle(hProcess);
return 1;
}
// NtSuspendProcess
NtSuspendProce... | pdf |
Opt Out or Deauth Trying !
Anti-Tracking Bots Radios
and Keystroke Injection
Weston Hecker
Principal Application Security Engineer NCR
Twitter @Westonhecker
A Little About Me.
• About myself: 32 - Work for NCR - Live in North Dakota
• Defcon 22, 23, 24 and 25 Blackhat 2016, Hardwear.io, ICS security
2016, Enterprise ... | pdf |
msdtc.exe是微软分布式传输协调程序。该进程调用系统Microsoft Personal Web Server和Microsoft SQL Server。该服务用于管理多个服
务器。
msdtc.exe是一个并列事务,是分布于两个以上的数据库,消息队列,文件系统或其他事务保护资源管理器,删除要小心。
对应服务MSDTC,全称Distributed Transaction Coordinator,Windows系统默认启动该服务
( 对应进程msdtc.exe,位于%windir%system32)
当Windows操作系统启动Microsoft分布式事务处理协调器(MSDTC)服务时,攻击便开始了,该服务可协调跨越多个资源管理... | pdf |
Build Your SSRF Exploit Framework
SSRF
@ringzero
KNOW IT
• SSRF
• SSRF
• SSRF
HOW
•
• SSRF
•
HACK IT
• SSRF
•
•
Web Interface
KNOW IT, SSRF?
http://10.10.10.10:8080/manager/images/tomcat.gif
KNOW ITSSRF
80 & 8080
SSRF_Interface
Redis server
APP server
HTTP server
SSRF
• ( FingerPrint )
• {Payl... | pdf |
国内SRC漏洞挖掘经验和技巧分享
ID: PwnDog\硬糖_zzz
唐朝 | 成都体育学院体育新闻专业
前PKAV团队成员
研究方向: Web安全以及......
关于我
1.SRC个人推荐
2.SRC的规则
3.漏洞挖掘中的个人经验和技巧分享
目录
同程 网易 360 唯品会 腾讯 阿里巴巴
京东 小米 陌陌 滴滴
百度 蚂蚁金服
SRC个人推荐
备注:排名不分先后,只为排版好看
白帽子
1.合规手段
2.点到为止
3.漏洞保密
SRC的规则
信息收集
1.厂商域名
2.厂商IP段
3.厂商业务信息
域名收集
1. 基于SSL证书查询
2. 第三方网站接口查询
3. Github
4. DNS解析记录
5. 子域名枚举等等
域名... | pdf |
A look inside macOS Installer packages and
common security flaws
This is Me
●
Experience: 11 years professional, 20+ years hobbyist
○
Self-taught → Stanford → iSEC Partners → NCC Group
●
Security consultant: appsec focus
○
IC → Management → IC
This is Me
●
Experience: 11 years professional, 20+ years hobbyist
○
Self-t... | pdf |
Using GPS Spoofing to Control Time
Dave/Karit (@nzkarit) – ZX Security
Defcon 2017
www.zxsecurity.co.nz
@nzkarit
Draft for Defcon Media server
A final copy will be posted on https://zxsecurity.co.nz/events.html after the
talk is given
Draft
2
www.zxsecurity.co.nz
@nzkarit
Dave, Karit, @nzkarit
Security Consultant/P... | pdf |
Asura: A huge PCAP file analyzer
for anomaly packets detection
using massive multithreading
Ruo Ando
Center for Cybersecurity Research and Development
National Institute of Informatics
DEF CON 26, Aug 12 2018
Outline
❑”Too many packets, too few resources”
- 100,000,000 vs 1000,000,000,000
❑ASURA: “Huge PCAP file vs ... | pdf |
某硬件设备漏洞挖掘之路-Web选手初入"二进
制"
Author: Yuanhai
遵守相关法律法规,本文不会带有任何厂商标识。
0x01:前言
很早之前就有打算开始往二进制方向发展,但由于基础较差,需要花费大
量时间从0开始学习。阅读其他师傅所写的文章受益良多。最有印象的
就是忍者师傅所写的《web选手如何快速卷入二进制世界》。简单的二
进制应用在IDA的伪代码状态下与日常的WEB应用审计流程基本一致。
下面就分享一篇个人初学二进制的挖掘实践。
0x02:正文
此次挖掘的目标系统是一个硬件设备(Web应用网关),通过官方服务中心
拿到了更新的固件包(.BIN文件)。然后使用Binwalk对固件进行提取
python -m bi... | pdf |
Mac OS X Server
Mail Service
Administration
For Version 10.3 or Later
034-2349_Cvr 9/12/03 7:28 AM Page 1
K
Apple Computer, Inc.
© 2003 Apple Computer, Inc. All rights reserved.
The owner or authorized user of a valid copy of
Mac OS X Server software may reproduce this
publication for the purpose of learning to u... | pdf |
2007 年駭客年會徵求論文
HIT 2007 Call For Paper
時間:2007 年 7 月 21 日~22 日(星期六~星期日)
主辦單位:CHROOT – Security Research Group (http://www.chroot.org)
活動網址:http://hitcon.org
台灣第三屆駭客年會將於 2007 年 7 月 21~22 日(週六、日)舉行,歡迎各界人士踴躍
投稿。論文內容以探討實作技術並能演講 50 分鐘為佳。
為了讓會議主題能夠明確,我們擬定了以下議題,有興趣的朋友可以從下列議題中選
擇自己擅長的方面進行準備(包括論文、程式碼和投影片),但不以下列的議... | pdf |
DIY Hardware implant over I2C
Part of the NSA Playset
This slide deck will change for the talk to include more information and
details!
Josh Datko and Teddy Reed
DEF CON 2
2
August 10, 2014
Josh Datko and Teddy Reed (DEF CON 2
2
)
DIY Hardware implant over I2C
August 10, 2014
1 / 49
Outline
1
NSA Playset DEF CON Series... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.