text
stringlengths
100
9.93M
category
stringclasses
11 values
FAIRPLAY DRM和混淆实现 0 1 DRM Fairplay - DRM 0 1 介绍 数字版权保护 应用于电子书籍/音乐/视频 App DRM自2013年引入 私有代码,高度混淆 Fairplay - DRM 0 1 Load Command $ otool -l target | grep -i crypt cmd LC_ENCRYPTION_INFO_64 cryptoff 16384 cryptsize 4177920 cryptid 1 Fairplay - DRM 0 1 Fairplay Open - From Kernel Fairplay - DRM 0 1 Fairplay Open - MIG #inc...
pdf
Not-so-Limited Warranty: Target Attacks on warranties for fun and profit  High school Student  Senior in fall  Warranty Enthusiast  Reading long paragraphs is fun  Programmer for Cyberdyne Security Solutions  New startup – cyberdynesecuritysolutions.com  Email me: Darkred@cybdss.com • Any number used t...
pdf
Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle Chen Yan Zhejiang University yanchen@zju.edu.cn Wenyuan Xu Zhejiang University & University of South Carolina wyxu@cse.sc.edu Jianhao Liu Qihoo 360 liujianhao@360.cn ABSTRACT To improve road safety and driving experiences, au...
pdf
Nail the Coffin Shut: Kurt Grutzmacher - Defcon 16 grutz @ jingojango.net NTLM IS DEAD grutz @ jingojango.net NTLM is DEAD! grutz @ jingojango.net NTLM is DEAD! Slide # Who I am... Corporate Penetration Tester for nearly a decade (with a CISSP for business purposes, gotta do what ya gotta do) Have seen the worst secur...
pdf
$ S T A N D A R D _ I N F O R M A T I O N $ F I L E N A M E Windows取证分析 海 报 你不能保护你不知道的东西 digital-forensics.sans.org DFPS_FOR500_v4.9_4-19 Poster Created by Rob Lee with support of the SANS DFIR Faculty ©2019 Rob Lee. All Rights Reserved. 翻译:Leon(liyi05@qianxin.com) 文件重命名 本地文件移动 卷文件移动 (通过命令行) 卷文件移动 (通过文件 管理器复制/粘贴) 文...
pdf
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks Kaiwen Shen 1,∗, Chuhan Wang 1, ∗, Minglei Guo 1, Xiaofeng Zheng 1,2,†, Chaoyi Lu 1, Baojun Liu 1,†, Yuxuan Zhao 4, Shuang Hao 3, Haixin Duan 1,2, Qingfeng Pan 5 and Min Yang 6 1Tsinghua University 2Qi An Xin Technology Research...
pdf
Md Sohail Ahmad Md Sohail Ahmad Prabhash Prabhash Dhyani Dhyani AirTight Networks AirTight Networks www.airtightnetworks.com www.airtightnetworks.com Wi-Fish Finder: Who will bite the bait? There is >50 % chance that your laptop will! © AirTight Networks 2009 Submitted to DEFCON 17 About the Speaker Last year brough...
pdf
The Art and Science of Security Research The Art and Science of Security Research Gregory Conti gregory.conti@usma.edu Gregory Conti gregory.conti@usma.edu http://commons.wikimedia.org/wiki/File:Venus_botticelli_detail.jpg The views expressed in this presentation are those of the author and do not reflect the offi...
pdf
Black Hat USA 2007 Tactical Exploitation Tactical Exploitation ““the other way to pen-test “ the other way to pen-test “ hdm / valsmith hdm / valsmith Black Hat USA 2007 who are we ? who are we ? H D Moore <hdm [at] metasploit.com> BreakingPoint Systems || Metasploit Valsmith <valsmith [at] metasploit.com> Offens...
pdf
aaaddress1@chroot.org Windows Injection 101: from Zero to ROP ./Bio✨ • ⾺馬聖豪, aaaddress1 aka adr • Chroot, TDOH • TDOHConf: 2016 議程組長 & 2017 活動組長 • 精通 C/C++、Windows 特性、逆向⼯工程 • Speaker: HITCON CMT 2015 HITCON CMT 2016 Lightning SITCON 2016 SITCON 2017 iThome#Chatbot 2017 BSidesLV 2016 ICNC'17 MC2015 CISC 20...
pdf
Bio About Me With VN Security since year 2009 Almost Every Weekend >  CTF player >  Weekend gamer Running zxandora.com project. Most of the time >  Soon >  Very Soon >  Brand New Online Sandbox Hack in The Box Crew Once a year >  Good friends >  CTF CTF and CTF About Me >  2008, Hack In The Box CTF W...
pdf
我从SharpC2 上的学到的东西 Perface 在这里非常感谢 @RastaMouse 师傅开发的这款.NET C2,去年刚开始看的时候他的视频教程对我 帮助很大,期间作者也重构过代码,到现在还是很喜欢最新的 Experimental版代码 实话说这是我 从SharpSploit项目以来读到的第二份令人舒服的代码了。3端分离式设计,让我也慢慢培养自己如 何展现写代码前思路上的体现,让阅读代码的人非常舒服,这是我今后追求的目标。 今天对SharpC2学习做个收尾,(为什么要收尾呢,后面会提到)。不知道大家怎么看这款开源.NET C2,我是非常喜欢的,对待新手非常友好。好了 言归正传。 主要要分享3个点: 1. SharpC2 ...
pdf
http:// toool us Lockpick Village Pins Wafers Combo Resist ant Bumpi ng Impres sion Master ing Picks Why do Locks Matter ? http:// toool us Locks Hold a Special Place in Our Lives http:// toool us Locks Hold a Special Place in Our Lives http:// toool us Locks Hold a Special Place in Our Lives http:// tooo...
pdf
DDoS – Yesterday, Today and tomorrow Frank Tse, William Guo Nexusguard Page § 2 Agenda DDoS Introduction DDoS Attack Analysis DDoS Detection and Mitigation Fighting DDoS in Mobile Era 1 2 3 4 FAQ 5 Page § 3 About us Nexusguard, incorporated in 2008, is a premium provider of end-to-end, in-the-cloud...
pdf
安洵杯 Writeup 1 安洵杯 Writeup Author:Nu1L Web cssgame 参考https://www.smi1e.top/通过css注⼊窃取html中的数据/ 环境有点不同,不太好⾃动化,写了个脚本⼀键⽣成css⽂件,启了个httpserver,然后⼿动⼀位⼀位的跑就⾏了。 Web cssgame iamthinking easy_serialize_php easy_web Pwn Heap RE Crackme EasyEncryption game Misc 吹着⻉斯扫⼆维码 Attack music Crypto This_is_not_a_standard_AES256 funney-php ju...
pdf
Keren Elazari aka @K3r3n3 www.K3r3n3.com A Confession TAKE THE RED PILL? @K3r3n3 @K3r3n3 Source : “25 Years Of Vulnerabilities: 1988-2012 Sourcefire Research Report” Barnaby Jack, 1977-2013 Photo: IOACTIVE RESEARCH What Matters! https://www.iamthecavalry.org/ Don’t Keep Your Bugs To Yourself www.bugcr...
pdf
www.LIFARS.com info@lifars.com ©2022 SecurityScorecard Inc. 244 Fifth Avenue, Suite 2035, New York, NY 10001 1.212.222.7061 Prepared by: Vlad Pasca, LIFARS, LLC Date: 02/14/2022 A Detailed Analysis of The LockBit Ransomware www.LIFARS.com | 1 Table of Contents Executive Summary .......................
pdf
1 SMS Fuzzing – SIM Toolkit Attack Bogdan Alecu bogdalecu@gmail.com www.m-sec.net Abstract In this paper I will show how to make a phone send an SMS message without the user’s consent and how to make the phone not to receive any message. The method used works on any phone, no matter if it’s a smartphone or not and ...
pdf
SUCTF-WP-Nu1L SUCTF-WP-Nu1L upload Cocktail's Remix hardCpp BabyStack rev easy sql sudrv playfmt Checkin EasyPHP Prime RSA MT babyunic guess_game protocol Game Pythonginx DSA Akira Homework Signin upload Status: solved Tags: Web ssrf compress.zip if(preg_match('/^(ftp|zlib|data|glob|phar|ssh2|compress.bzip2|compress.zl...
pdf
SCTF2018-WP Author: Nu1L SCTF2018-WP Author: Nu1L Web easiest web - phpmyadmin NGINX BabySyc - Simple PHP Web BabyIntranet Pwn bufoverflow_a sbbs bufoverflow_b WTFgame Crypto ElGamal Hacker a number problem it may contain 'flag' Misc Modbus Re Babymips Script In Script Where is my 13th count crackme2 simple Web {{'a'.con...
pdf
Air Traffic Control I it 2 0 Insecurity 2.0 Righter Kunkel, CISSP, CISA Security Researcher DEF CON 18 DEF CON 18 Agenda  Who am I?  Overview from last year y  Insecurity's today  Jet tracking  Jet tracking DEF CON 18 Righter Kunkel 2 Who am I?  Security Field for >13 years  Worked with secure operating p g sys...
pdf
VoIP Wars : Return of the SIP Fatih Özavcı Security Consultant @ Sense of Security (Australia) www.senseofsecurity.com.au @fozavci 2 # whois ● Security Consultant @ Sense of Security (Australia) ● 10+ Years Experience in Penetration Testing ● 800+ Penetration Tests, 40+ Focused on NGN/VoIP – SIP/NGN/VoIP Systems Pen...
pdf
Break, Memory By Richard Thieme The Evolution of the Problem The problem was not that people couldn’t remember; the problem was that people couldn’t forget. As far back as the 20th century, we realized that socio-historical problems were best handled on a macro level. It was inefficient to work on individuals wh...
pdf
1 1 2 2 3 3 4 4 5 5 6 6 D D C C B B A A NOTE: RESISTORS ARE IN OHMS +/- 5% AND CAPACITORS ARE IN MICROFARADS UNLESS OTHERWISE NOTED. SEE BOM FOR ACTUAL VOLTAGE AND SPECIFICATION. 3V3 E0 1 E1 2 E2 3 GND 4 SDA 5 SCL 6 WC 7 VCC 8 U4 24LC512-I/SN 1 2 Y1 5.0MHz 3V3 3V3 #RES PROPRX PROPTX PROPSDA PROPSCL 4/19/2013 B B 2 1 Jo...
pdf
DIY Nukeproofing: A New Dig at “Data-Mining” By 3AlarmLampscooter DEF CON 23 Version 0.1b @3AlarmLampscoot on twitter for updates DIY Nukeproofing: Outline ● Why technologies like SILEX / AVLIS / MLIS are democratizing nuclear proliferation (FUD) ● Identifying risk and requirements to mitigate it ● Getting “shovel-re...
pdf
Co v ert Messaging Through TCP Timestamps John Gin  Rac hel Greenstadt  P eter Lit w ac k  Ric hard Tibb etts  fgifgreeniep li twa ck ti bb et tsg m it ed u Massac h usetts Institute of T ec hnology Abstract W e presen t a proto col for sending data o v er a common class of lo wbandwidth co v ert c hannels Co v ert...
pdf
Bug Hunters dump user data. Can they keep it? Well they’re keeping it anyway. Who? Data Protection Officer & Privacy Attorney - a lawyer, but not your lawyer Co-Founder of Truffle Security, TruffleHog author, bug hunter, security researcher, etc… Whitney Merrill @wbm312 Dylan Ayrey @InsecureNature Do bug hunters ...
pdf
Manyonymity: It‟s Who You Don‟t Know GM  To Think About  PHP Distributed Encryption  What is an acceptable level of mass- market encryption?  How does the “average joe” fingerprint and protect their daily communication?  What are the true benefits of open- source vs. major company-owned encryption services?  Wh...
pdf
P A G E Uncovering SAP vulnerabilities: Reversing and breaking the Diag protocol Martin Gallo – Core Security Defcon 20 – July 2012 P A G E 2 Agenda • Introduction • Motivation and related work • SAP Netweaver architecture and protocols layout • Dissecting and understanding the Diag protocol • Results an...
pdf
1 ⼆二次“登陆”导致的权限提升 1.1 “登陆”的实现   登陆功能应该是Web项⽬目⾥里里⻅见到的⽐比较多的业务模块的,通常会跟session会话结合,完成对应的操 作,常⻅见的实现过程如下:   session本身是⼀一个容器器,⾥里里⾯面可以存放类似⽤用户身份等权限控制所需的元素,在对应的接⼝口完成对 应的鉴权功能。最简单的例例如如果在当前会话session中没有找到对应的登陆凭证,说明⽤用户没有登录 或者登录失效,如果找到了了证明⽤用户已经登录可执⾏行行后⾯面操作,防⽌止接⼝口的未授权访问。或者是权限细 粒度覆盖业务接⼝口,将业务相关的关键参数(例例如userid、fileid等)与当前⽤用户的身份凭证(⼀一般是 sessi...
pdf
It’s all about the timing. . . Haroon Meer and Marco Slaviero {haroon,marco}@sensepost.com SensePost Abstract This paper is broken up into several distinct parts, all related loosely to timing and its role in information se- curity today. While timing has long been recognized as an important component in the crypt-anal...
pdf
A Journey Into Fuzzing WebAssembly Virtual Machines Patrick Ventuzelo #BHUSA  @BlackHatEvents #BHUSA @BlackHatEvents Patrick Ventuzelo (@Pat_Ventuzelo) ● Founder & CEO of FuzzingLabs | Senior Security Researcher ○ Fuzzing and vulnerability research ○ Development of security tools ● Training/Online courses ○ Rust Sec...
pdf
Why are our tools terrible? George Hotz (geohot) (and a bit about other things) “geohot” pwnium • ab.__defineGetter__("byteLength", function() { return 0xFFFFFFFC; }); • spawn crosh with fake messages • send commands to crosh by spoofing the window id • try_touch_experiment %s command injection • race condition in m...
pdf
“I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts of Global Cyber-Warfare) Jayson E. Street, CISSP, GSEC, GCIH, GCFA, IEM, IAM, ETC… Let go of my EGO • Lets start out with a little about yours truly. • Defcon17@F0rb1dd3n.com http://F0rb1dd3n.com ...
pdf
C2profile中的magic_mz_x86和magic_mz_x64 0x00 前言 周末写一个在线工具(后面会发布的),看见C2profile中magic_mz_*配置项,于是搜了搜,发现没有 人写关于这个。打算这周写个文档发星球。哪知道周一看twitter,发现有同学抢先一步发了,卷阿,太 卷了!不过我还是要写。他文章中有一些笔误:https://www.redteam.cafe/red-team/shellcode-inject ion/magic_mz_x86-and-magic_mz_x64 这个功能是4.2以后加入的,不是 2.4.3 dec abp应该是dec ebp 都是笔误,无伤大雅,可能一些新手同学会出问题,...
pdf
1 DEFCON 28 08-082020 DEFCON 28 Whispers Among the Stars Perpetrating (and Preventing) Satellite Eavesdropping Attacks James Pavur, DPhil Student Oxford University, Department of Computer Science Perpetrating (and Preventing) Satellite Eavesdropping Attacks James Pavur, DPhil Student Oxford University, Department of Co...
pdf
JTAGulator Block Diagram Document rev. 1.0 March 20, 2013 Joe Grand, Grand Idea Studio, Inc. MCU Parallax Propeller EEPROM 24LC512 2 (I2C) Power Switch MIC2025-2YM LDO LD1117S33TR USB 5V 3.3V D/A AD8655 1.2V - 3.3V ~13mV/step Serial-to-USB FT232RL 2 1 (PWM) Host PC USB Mini-B Voltage Level Translator TXS0108EPWR Volta...
pdf
#BHUSA   @BlackHatEvents Google Reimagined a Phone. It’s Our Job to Red Team & Secure it Xuan Xing Eugene Rodionov Christopher Cole Farzan Karimi #BHUSA   @BlackHatEvents Information Classification: General ● Who We Are ● What’s Our Scope ● How We Help Secure Android & Pixel ● Pixel 6 Attack Surface ● Proof of Co...
pdf
1 ⼀个图标伪装上线⽊⻢分析 事件背景 分析经过 并不简单 娱乐⼀下 ⽊⻢IOC 加⼊社区 某重要活动结束前⼀天,安全的⽭与盾星球内部交流群⾥有位蓝队兄弟扔出来三个公鸡队样本让群⾥还 在的师傅帮忙分析⼀下,由此便展开了下⾯的分析经过。 ⾸先拿到样本之后,⽤file命令做简单识别,file能识别的⽂件格式还是很多的。但这三个样本不巧,被公 鸡队做了⼿脚,已经混淆了⽂件头。 ⽤010Editor打开⽂件,简单查看了下,发现⽂件当中存在明⽂字符串,整体来说此时样本⽐较奇怪。 事件背景 分析经过 2 这时候坤佬(wonderkun)在群⾥来了句,看出来⽂件混淆的⽅式了,⽤0xEE异或即可得到混淆前的原 ⽂件。具体原理坤佬解释这是统计学:不...
pdf
A Few Comments on Mind Games "the only way you can tell the truth," a friend at NSA said, "is through fiction" ... so I did ... "Mind Games" is a unique collection of 19 stories of brave new worlds and alternate realities - stories of computer hackers, deception and intelligence, puzzling anomalies, spirituality a...
pdf
Redteaming:主流杀软对抗之路 ABOUT ME ●安全研究员 ●红队攻防,杀软规避研究及武器化它们。 木星安全实验室 ●实验室负责人 ●CompTIA Security+ CISP-PTS CISAW CISP CDPSE 红队作战概览图 研究背景 ●红队攻防的必要因素 ●杀软检测手段的不断升级 目录 静态免杀 动态免杀 自我保护 Bypass之静态免杀 Shellcode加密 IAT导入地址表 混淆编译 Shellcode加密 Shellcode:16进制的机器码。 例如: 杀软查杀cobaltstrike, metasploit等知名远控 通常是通过shellcode特征匹配来进行查杀。 内存加载mim...
pdf
Let’s Sink The Phishermen’s Boat! Teo Sze Siong F-Secure Corporation teo.sze.siong@f-secure.com BE SURE! Let’s et’s et’s et’s Sink ink ink ink The he he he Phisherm hisherm hisherm hishermeeeen’s n’s n’s n’s Boat oat oat oat!!!! Teo Sze Siong teo.sze.siong@f-secure.com Abstract: In recent years,...
pdf
          •                     Google兩大門神         CSWADI                 • • • • • • • •       • • 偽造pdf、jpg等 某知名CMS 0day XSS 通殺! • • •       • • • • •
pdf
Knocking  my  neighbor’s  kid’s cruddy  drone  offline. michael  robinson First,  a  shout  out… Alan  Mitchell Ron  McGuire Chris  Taylor KaAe  Herritage My  neighbor. Sigh. My  neighbor’s  kid. Double  sigh. Way  too  much  discreAonary  spending. My  neighbor. ...
pdf
Ferdinand Schober  Historical Development ◦ Vintage Protection  Different DRM approaches ◦ Privacy Study ◦ Failure Cases ◦ Case Studies  Messing with a gamer ◦ Case Study  Why are games cracked?  Q&A Disc Layout Protection •Games distributed on floppy disc •Easy to duplicate •Use Unique disc layout •E.g. change se...
pdf
1" Breaking WingOS Josep Pi Rodriguez Senior Security Consultant Josep.rodriguez@ioactive.com IOActive, Inc. Copyright ©2018. All Rights Reserved. Agenda •  Intro to WingOS •  Scenarios & Attack surface •  Vulnerabilities •  Exploitation & Demo •  Conclusions IOActive, Inc. Copyright ©2018. All Rights Rese...
pdf
津⻔杯Writeup - Nu1L 津⻔杯Writeup - Nu1L Web UploadHub hate_php GoOSS power_cut RE GoodRE easyRe Crypto 混合编码 justOCB rsa Pwn pwnme PwnCTFM no1 easypwn Misc m1bmp m0usb Mobile hellehellokey Web UploadHub hate_php import requests import string import hashlib ip = requests.get('http://118.24.185.108/ip.php').text print(ip) def...
pdf
臺灣資安人才教育 Cybersecurity Education in Taiwan 吳宗成 臺灣科技大學資訊管理系特聘教授 教育部資訊安全人才培育計畫主持人 tcwu@cs.ntust.edu.tw 2017/08/25 HITCON CMT 1 開宗明義 教育與人才學 2 教育情境 在學教育 In-campus 社群教育 Community 在職教育 On-job 3 教育本質 4 人手 •What you know 人才 •Why you have 人物 •Who you are 教育目標 5 人手 人才 人 物 人手 人才 人 物 何謂「人才學」? • Talent studies or Talent resources(M...
pdf
The Cavalry Year[0] A Path Forward for Public Safety The Cavalry Year[0] A Path Forward for Public Safety Joshua Corman && Nicholas J. Percoco Our Dependance on Technology is Growing Faster than our Ability to Secure it. Problem Statement: While we struggle to secure our organizations, connected technologies now pe...
pdf
#BHUSA @BlackHatEvents To Flexibly Tame Kernel Execution With Onsite Analysis Xuhua Ding Singapore Management University #BHUSA @BlackHatEvents Information Classification: General SMU Classification: Restricted Outline • Review of existing dynamic kernel analysis techniques • Introduction of the onsite analysis infr...
pdf
2 SLIDE about me some call me a one trick pony, others call me passionate • mad scientist hacker who likes to meddle with hardware and software. • particularly obsessed with wireless. • degree in computer science from Southern Utah University • loves include: • web application pentesting • wireless monitoring and tra...
pdf
PowerShell Version Release Date Default Windows Versions PowerShell 1.0 November 2006 Windows Server 2008 (*) PowerShell 2.0 October 2009 Windows 7 Windows Server 2008 R2 (**) PowerShell 3.0 September 2012 Windows 8 Windows Server 2012 PowerShell 4.0 October 2013 Windows 8.1 Windows Server 2012 R2 PowerShell 5.0 Februa...
pdf
Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling James Kettle - james.kettle@portswigger.net - @albinowax The recent rise of HTTP Request Smuggling has seen a flood of critical findings enabling near-complete compromise of numerous major websites. However, the threat has been confined to attacker-a...
pdf
1 Injectable Exploits Kevin Johnson – kevin@inguardians.com Justin Searle – justin@inguardians.com Frank DiMaggio – frank@secureideas.net Copyright 2009 InGuardians, Inc. 2 Copyright 2009 InGuardians, Inc. Who are we? •  Kevin Johnson –  BASE/SamuraiWTF/Laudanum/Yokoso! Project Lead –  Penetration Tester – ...
pdf
Lateral Movement Remote Desktop Protocol Description RDPis routinely used by your administrators, help desk, or others it provides an attractive attack vector for adversaries who are trying to blend in with standard network activity. Once on a client system, the attacker can simply leverage the built in Mic...
pdf
! ! Attacks from Within: Windows Spreads Mirai to Enterprise IoT - Draft Steinthor Bjarnason Arbor Networks, ASERT sbjarnason@arbor.net Jason Jones Arbor Networks, ASERT jasonjones@arbor.net Abstract When the Mirai IoT Bot surfaced in September 2016, it received a lot of publicity, not only because of the la...
pdf
Resilient Botnet Command and Control with Tor Dennis Brown July 2010 Introduction ● Who am I? ● Work for Tenable Network Solutions ● Spoken previously at Toorcon, PaulDotCom Podcast ● Run Rhode Island's Defcon Group DC401 Doesn't it suck when your botnet gets shut down? ● Lots of time lost ● Setting up servers ● Bui...
pdf
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of Unlicensed Operation in the TV Broadcast Bands Additional Spectrum for Unlicensed Devices Below 900 MHz and in the 3 GHz Band ET Docket No. 04-186 ET Docket No. 02-380 COMMENTS OF MOTOROLA, INC. Steve B. Sharkey Director, ...
pdf
The Night the Lights went out in ‘Vegas: Demystifying Smart Meter Networks Barrett Weisshaar Garret Picchioni Copyright Trustwave 2010 Confidential Overview What this Presentation is: •  Overview of Smart Meter & Smart Grid technology •  Detail network traffic-based approach − As opposed to meter firmware mo...
pdf
2 4 ➡ ➡ ➡ 5 6 7 8 9 10 11 12 13 15 ➡ ➡ 16 17 18 19 20 21 23 ➡ ➡ ➡ 24 25 26 27 28 29 30 32 ➡ ➡ ➡ 33 34 35 37 ➡ ➡ ➡ ➡ 38 39 40 41 ➡ ➡ ➡ ➡ 43 ➡ ➡ ➡ ➡ 44 45 ➡ ➡ ➡ ➡ ➡ 46 48 ➡ 49 ➡ ➡ ➡ 50
pdf
Boomstick-Fu Physical Security at its Most Basic and Brutal Level DefCon 15 Deviant Ollam | Noid | Thorn | Jur1st Show Of Hands • Gun Owners • Regular Shooters • Used a Firearm Defensively • Considering a Purchase What This Talk Is About (and what it’s NOT about) • Defensive Firearm Ownership • Hardware Within the La...
pdf
Network Protocol Reverse Engineering Eavesdropping on the Machines Tim Estell – BAE Systems Katea Murray – Leidos 2016-08-05 Estell/Murray Eavesdropping on the Machines 2 What is this talk about? • Eavesdropping on the machines • Machines are going to have a communications protocol • We may not have seen it and they p...
pdf
1 Google Drive 上传⼯具编写 有⼀天,有⼈找我帮忙写⼀个⼯具,被我义正⾔辞的拒绝了。我可不帮⼈写⼯具,我只是爱学习。 这部分内容,官⽅⽂档写得很是清楚。Google 提供的 APIs 访问是基于 Oauth2.0 认证的,其流程可以 ⼤致分为以下⼏个步骤: 1. 客户端 App 发起认证(若⽤户没有登录,则需要先登录) 2. 弹出授权⻚⾯,⽤户点击允许后,Google 认证服务器给我们返回⼀个授权码(Authorization code) 3. 客户端获取到授权码以后,⽤授权码向认证服务器请求 Access Token 4. 服务器验证授权码⽆误后返回 Access Token ⾄客户端 5. 拿到 Ac...
pdf
Editors Vulnerability Handbook • Version 0.0.6 • Summary Editors Update Description #Include {FCKeditor} 2010/04/10 "_"真不是那么好绕 的~~望高手飞过告 知 #Include {eWebEditor} 2010/02/13 你是否跟我一样讨厌 此物的精简版? #Include {Cuteditor} 2009/11/29 #Include {Freetextbox} 2009/11/29 #Include {Webhtmleditor} 2009/11/29 经过参考诸多资料- 证实此物已终止更新 #Include...
pdf
分享一下WAF Bypass 一个小的tips 本文通过php 源码来理解 bypass waf 绕过原理 一段PHP代码 绕过一 boundary获取方式 首先看看Content-Type 是怎么获取的到 Content-Type: multipart/form-data; boundary=aa https://github.com/php/php-src/blob/90b7bde61507cee1c6b37f153909d72f5b203b8c/main/rfc18 67.c 首先从Content-Type 获取boundary 然后拿等号后面的值做boundary 的值。那么绕过如下: <?php    var_dump...
pdf
S-kerberos协议原理 参考文章 Kerberos协议的组成部分 第一次通信 第二次通信 第三次通信 Kerberos协议中的攻击分类 S-kerberos协议原理 参考文章 详解kerberos认证原理 内网渗透测试:Kerberos 协议& Kerberos 认证原理 学习过程主要是参考的第一篇文章,作者将认证的三个流程讲述的非常清楚,只不过中间有细微的错误,和笔误,所 以参考第二篇文章进行改正。 Kerberos协议的组成部分 客户端(Client):发送请求的一方 服务端(Server):接收请求的一方 密钥分发中心(Key Distribution Center,KDC):密钥分发中心,默认安装在域控里,包括AS和T...
pdf
Equation NOPEN Equation NOPEN 概述 基本信息 运行方法 本地环境变量 本地客户端命令 keepalive autopilot norc 远程目录命令 find cd ls 远程文件操作 get put cat upload grep mailgrep cksum chili 远程网络穿透 tunnel irtun istun jackpop nrtun nstun rawsend rtun rutun stun sutun scan vscan 远程网络命令 icmptime ifconfig nslookup ping trace 远程服务端命令 pid listen call burn 远程服务端常...
pdf
测试程序版本为 11.0.0.33162 ,官网目前只开放12.5版本,但是可以遍历下载ID进行下载 001 程序详情 向日葵为C++编写,使用UPX3.X加壳故此分析前需要进行脱壳处理(github上有UPX项目, 可以直接脱) 此外向日葵在启动的时候会随机启动一个4W+高位端口,具体在 sub_140E0AAE8 可看到 社会孙在视频中有一段疑似session的字符串 根据这段疑似 session 的关键字在向日葵一次正常远程的日志中找到了关键字 CID 002 根据日志找session 随后载入IDA,对CID关键字进行搜索 找到3个函数存在CID关键字字符串 sub_140E20938 、 sub_140E...
pdf
How South Korea Makes White-hat Hackers # 2013 edition! beist (Korea University, GrayHash) email: beist@grayhash.com web: http://grayhash.com About me SeungJin “Beist” Lee Ms-Phd course at Korea University (CIST IAS LAB) Member of advisory council for Cyber Command in Korea Principal Security Consultant at GrayHash Co...
pdf
Kartograph Elie Bursztein and Jocelyn Lagarenne Stanford University 1 Jocelyn Lagarenne & Elie Bursztein Kartograph (cd version) http://ly.tl/t10 Welcome to the real world Jocelyn Lagarenne & Elie Bursztein Kartograph (cd version) http://ly.tl/t10 supernatural powers ! • Learn kungfu • Infinite money • Xray vision • go...
pdf
Wesley McGrew HORNECyber.com An Attacker Looks at Docker: Approaching Multi-Container Applications Wesley McGrew, Ph.D. Director of Cyber Operations HORNE Cyber wesley.mcgrew@hornecyber.com @mcgrewsecurity Wesley McGrew HORNECyber.com 1 An Attacker Looks at Docker: Approaching Multi-Container Applications TABLE OF CONT...
pdf
Copyright © 2012 Virtual Security Research, LLC. All Rights Reserved. Owning the Network: Adventures in Router Rootkits Michael Coppola Copyright © 2012 Virtual Security Research, LLC. All Rights Reserved. Who am I? ▪Security Consultant at Virtual Security Research in Boston, MA (we're hiring!) ▪Student at Northeaster...
pdf
PbootCMS<=3.1.2前台注⼊分析 写在前⾯ 这次学校联合oppo办了场校赛⾥⾯我出了⼀些RealWorld⽅向的赛题,由于这个不是最新版 本再加上思路还是很骚,中间是有⼀些⼩坑的,导致前台注⼊⽆法获取表名,接下来我会抽 丝剥茧⼀点⼀点分析,相信师傅们⼀定能学到东西滴,其他的题⽬则不那么适合分享(坏笑) 这⾥以mysql数据库为例⼦,sqlite同理只是payload稍作改变 正⽂ 出题的初衷是希望学弟们能学会通过学会diff去快速获得漏洞并利⽤,可惜最终只有两个队 伍做出来了,其中⼀个⾮预期是开发没有修复⼀个远古的注⼊导致新版本也能⽤,这⾥主要 分享我的预期以及⼀些踩坑和bypass,⾸先可以看到这⾥的修复(通过描述可以猜...
pdf
YOU'D BETTER SECURE YOUR YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK BLE DEVICES OR WE'LL KICK YOUR BUTTS ! YOUR BUTTS ! @virtualabs | DEF CON 26, Aug. 12th 2018 WHO AM I ? WHO AM I ?   Head of R&D @ Econocom Digital Security   Studying Bluetooth Low Energy for 3 years   Developer & maintainer of BtleJuice ...
pdf
I Fight For The Users Episode I Attacks Against Top Consumer Products Who are we? @zfasel @SecBarbie Our Credentials? (null) Before we get started… Con Speaker Rule 101 If you’re naming vendors and don’t want your talk pulled, even if it’s already known and even if the impact is low, don’t disclose too much ahead of t...
pdf
Cybrics CTF Nu1L Writeup Team Page:https://nu1l-ctf.com Cybrics CTF Nu1L Writeup Disk Data Description Solution QShell Description Solution Caesaref Description Solution Hidden Flag Description Solution Paranoid Description Solution Sender Description Solution Matreshka Description Solution Oldman Reverse Description S...
pdf
1 记次src测试中的ldap注⼊的深⼊利⽤ ldap注⼊点判断 ldap的注⼊简单利⽤ 获取ldap中的密码 修复⽅法 在最近的⼀次的src测试中遇到了⼀个ldap注⼊漏洞,⽬标是⼀个管理平台,漏洞点存在于⽤户名判断处.在 测试时遇到的 ldap注⼊是指ldap过滤器语句(filter)的注⼊ ldap过滤器的基本语法如下 例如⼀个简单的查询语句如下 搜索cn值属性为admin的条⽬ 成功会返回完整条⽬属性 实际使⽤时可能会⽐较复杂 ⽐如说同时搜索匹配⽤户输⼊的⽤户名/邮箱/⼿机号 ldap注⼊点判断 PHP 复制代码 = >= <= |  或 &  与 !  ⾮ *  通配符 (语句) 1 2 3 4 5 6 7...
pdf
浅谈 PHP WebShell 的检测与防御 最近腾讯举办的⼀个webshell挑战赛,简单玩了⼀下,发现⼀些绕过的思路对于很多检测产品 都是通⽤的。说明这些产品在遇到的⼀些共性的检测难点上都没有⼀个很好的解决⽅案,以下 简单分析⼀下webshell检测的原理和困境以及⼀些绕过的思路。 正则识别 pass ssdeep 通过模糊哈希匹配已知样本,可以允许⼀定范围内的修改,原理是分⽚分别计算哈希,连接后 得到字符串,⽐较时计算两个字符串的加权编辑距离,评估样本的相似度。加权编辑距离指⼀ 个字符串最少经过多少次操作(增加、删除、修改、交换)得到另⼀个字符串,不同的操作对应 不同的权值,结果相加。 ssdeep只能针对已知样本⽽且没有⼤范...
pdf
Subver'ng
the
 World
of
Warcra4
API
 by
 Christopher
Mooney
 James
Luedke
 NDA
 If
you
are
a
Blizzard
employee
or
a
Blizzard
fan‐boy
this
NDA
applies
to
you.

You
 are
 forbidden
 to
 discuss
 this
 code
 with
 anyone
 else
 upon
 penalty
 of
 tar
 and
 feather.
 
 In
 fact
 we
 have
 tested
 this
 presenta'on
 out
 on...
pdf
windows服务工作原理 windows服务是一种可以在后台完成任务的程序,服务程序一般随着系统启动而启动,启动权限一般是 system,windows vista开始为了提升系统的安全性,将服务程序放在session 0运行,和我们普通的用 户态程序运行在不同的session级别,我们无法跨session进行交互,因此保证了服务程序的安全。我们 随便找一个服务,用 process hacker打开他的进程,就可以看到如下信息: 服务程序不需要用户界面,所以服务程序通常是以控制台程序的形式编写的,入口函数是main函数。一 个服务一般由三部分组成。 1. Service control Manager(SCM),SCM存在于Ser...
pdf
NFC Hacking: The Easy Way DEFCON 20 Eddie Lee eddie{at}blackwinghq.com About Me   Security Researcher for Blackwing Intelligence (formerly Praetorian Global)   We’re always looking for cool security projects   Member of Digital Revelation   2-time CTF Champs – Defcon 9 & 10   Not an NFC or RFID expert! I...
pdf
Detecting and Defending Against State-Actor Surveillance Introduction CONTENTS   Introduction   Goals and Intent   Surveillance Catalog Leaks –  Hardware –  Software –  Wifi –  Cellular   Conclusions Who is involved !  Those that spy. !  Those that get spied on. Why do Spies Spy? !  Information has valu...
pdf
性质 机器名 IP OS 域控 ADDC.apple.me 192.168.10.200 Microsoft Windows Server 2012 R2 Datacenter 6.3.9600 暂缺 Build 9600 x64 证书 服务 CA.apple.me 192.168.10.202 Microsoft Windows Server 2012 R2 Datacenter 6.3.9600 暂缺 Build 9600 x64 域内 主机 Win7- PC.apple.me 192.168.10.210 Microsoft Windows 7 Ultimate 6.1.7601 Service Pack 1 Build 76...
pdf
Powershell / MsBuild 免杀上线 分享⼀个前段时间学习测试 Powershell / MsBuild 免杀上线 CS 时写的简单混淆脚本 (Shellcode -> ps1, xml),结合 CS Profile 可以免杀上线 360、⽕绒、Windows Defender 及 Kaspersky,脚本主要对脚本中的⼀些特征函数名、变量名及⼀些特征字段等进⾏随机⽣成 替换,Shellcode 逐字节 xor 解密。 混淆脚本代码⻅⽂末或者 https://github.com/inspiringz/python- toys/blob/master/1.Simple%20Shellcode%20Obfuscatio...
pdf
whoami  Tamas Szakaly (sghctoma)  from Hungary, the land of Pipacs , Palinka and gulash :)  pentester/developer @  OSCE  part of team Prauditors, European champion of Global Cyberlympics 2012 whatami  “ I am not a computer nerd. I prefer to be called a hacker!”  a binary guy  love crackmes and toying with pro...
pdf
环境搭建 1.项目介绍: 本次项目模拟渗透测试人员在授权的情况下,对目标进行渗透测试,从外网打 点到内网横向渗透,最终获取整个内网权限。本次项目属于三层代理内网穿 透,会学习到各种内网穿透技术,cobalt strike 在内网中各种横行方法,也 会学习到在工具利用失败的情况下,手写 exp 获取边界突破点进入内网,详细 介绍外网各种打点方法,学习到行业流行的内网渗透测试办法,对个人提升很有 帮助。 2.VPS 映射 1.将 ip 映射到公网。在公网 vps 使用配置 frp 工具的 frps.ini 运行 frps.exe -c frps.ini 在 web1 上配置 frpc.ini 运行 frpc.exe -c f...
pdf
365-Day: https Cookie Stealing Mike Perry Defcon 2007 Who am I? ● Volunteer Tor developer – Work on Torbutton, TorFlow ● Privacy advocate, censorship opponent ● Forward+Reverse engineer at Riverbed ● Flexitarian ● Random Hacker – Wrote a page-based malloc debugger – Wrote an IRC bot that got quoted as a human in a maj...
pdf
Lost in Translation C. Grothoff, K. Grothoff, L. Alkhutova, R. Stutsman, M. Atallah Lost in Translation: Translation-based Steganography Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman and Mikhail Atallah {christian,krista}@grothoff.org, {lalkhuto,rstutsma}@purdue.edu, mja@cs.purdue.edu “... because a...
pdf
CS download shellcode 分析 CS version:4.3 CS端IP:172.16.80.3 choose a payload to stage:windows/beacon_https/reverse_https 在⽣成加载shellcode的程序之后放⼊到x32dbg。 定位到shellcode执⾏的地址 在将DF标志清零后(CLD),紧接着⼀个call,这个call主要是把 wininet这个字符串⼊栈 FS寄存器指向当前活动线程的TEB结构,在这个结构体的0x30的位置是PEB结构地址接着去找PEB_LDR_DATA这个 结构体从双向链表中去寻找我们想要的DLL,这个DLL就是之前我们⼊栈的那个wini...
pdf
2018 LCTF By Nu1L 2018 LCTF PWN easy_heap pwn4fun echos just_pwn WEB Travel T4lk 1s ch34p,sh0w m3 the sh31l 1. includewebshell 2. remoteipphar 3. wrapper phar:// =>RCE L playground2 EZ OAuth userssrf -> God of domain pentest sh0w m3 the sh31l 4ga1n 1. 2. tmpfile getshell bestphp's revenge soapssrf+crlfphpsessidflag.php...
pdf
Manna From Heaven! Improving the state of rogue AP attacks! Turn your wifi off!! Our intention is to demonstrate our research findings, not to cause any damage. We have taken precautions, but some danger is inherent to such live demos. Please turn off your wifi now if you would not like to be involved. If you decide n...
pdf
1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 目錄 Android渗透测试学习手册中文版 第一章Android安全入门 第二章准备实验环境 第三章Android应用的逆向和审计 第四章对Android设备进行流量分析 第五章Android取证 第六章玩转SQLite 第七章不太知名的Android漏洞 第八章ARM利用 第九章编写渗透测试报告 2 Android渗透测试学习手册中文版 原书:LearningPentestingforAndroidDevices 译者:飞龙 在线阅读 PDF格式 EPUB格式 MOBI格式 代码仓库 赞助我 协议 CCBY-NC-SA4.0 Android渗透测试学...
pdf
Leave your malware @home MALPROXY Amit Waisel Hila Cohen US About Amit Waisel Offensive Cyber Security Expert Technology lead, Security Research @ XM Cyber Trusted Security Advisor Favorite bit: 1 Private Pilot , Skipper and cat lover Hila Cohen Security Researcher @ XM Cyber @hilaco10 Passionate abo...
pdf
Cyber Grand Shellphish DEFCON 24 August 7, 2016 · Track 2 - 3pm Giovanni Vigna Christopher Kruegel zanardi void HEX on the beach UC Santa Barbara nullptr zanardi void balzaroth sicko irish SIMULATION 2004 UC Santa Barbara nullptr zanardi void balzaroth sicko irish TU Vienna void engiman pizzaman SIMULATION 2005 virus...
pdf
对某 DedeCMS 二开系统全局变量追加漏洞 利用 本文纯属虚构,网站皆为本地靶场。 我写文章总是喜欢带着我的个人感情,去记录我尝试过的失败和踩过的坑,最开始写文章都是为了自己 日后方便想起更多的细节和当时脑子里的想法,所以总是那么的啰啰嗦嗦,嫌长的可以直接看 进入后台 部分 起因 无意中发现某个违法网站所使用的程序在某些细节处很像 DedeCMS ,但又不完全一样,推测出有可能 是自研发或基于 DedeCMS 二开的,感觉有搞头,于是通过 fofa 搜索相关指纹和 ico 得到将近十个 来个类似的站点,并发现了目标的测试站,通过其他站分析得出是 XX公司 基于 DedeCMS 删减后的程 序,于是围绕这十来个站打了...
pdf
n in t h e d it io n Mic h a e l Ba z ze l l Re s o u r c e s f o r Se a r c h in g a n d a n a l y z in g On l in e in f o r ma t io n Ope n s o u r c e In t e l l ig e n c e t e c h n iq u e s -_____ J Copyright © 2022 by Michael Bazzell Project Editors: Y. Varallo, Janice Bartlett Technical Editors: Jason E...
pdf
MOC CTF MOC 前言 Games double sqli & Solved & #SQL #ClickHouse Unsecure Blog & Solved & #JFinal #表达式注入 Sp-Auth & Unsolved & #Spring #OAuth劫持 #CSRF and RCE ? 后记 前言 Web Wirteup 如下 Games double sqli & Solved & #SQL #ClickHouse 首先进入题目,有种 sqli-labs 的既视感。在后面加上了单引号报错了。 通过搜索,不难发现这个是 ClickHouse 的报错。简单浏览下官方文档,构造一个联合查询,帮助我们回显(报错太...
pdf
DoS: Denial Of Shopping Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems by Joseph Gabay A Disclaimer This talk is the result of my personal project. Any views, opinions, or research presented in this talk are personal and belong solely to me. They do not represent or reflect those of any perso...
pdf
Author Damian Finol Venezuelan Engineer in Informatics Currently doing a Masters in Computer Science with focus on Distributed systems and paralellism Working as an Information Security Specialist for a venezuelan Bank Teaching Databases, Operating Systems and Data Security at Universidad Nueva Esparta Totalfarker P...
pdf
Securing Windows Internet Servers 23.org / Covert Systems jon.miller@covertsystems.net Jon Miller Senior Security Engineer Covert Systems, Inc. Always try to use a fresh install and migrate existing data over Make sure to convert to NTFS Default Security Settings are not applied You must apply them manually using ...
pdf