text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
FAIRPLAY
DRM和混淆实现
0 1
DRM
Fairplay - DRM
0 1
介绍
数字版权保护
应用于电子书籍/音乐/视频
App DRM自2013年引入
私有代码,高度混淆
Fairplay - DRM
0 1
Load Command
$ otool -l target
| grep -i crypt
cmd LC_ENCRYPTION_INFO_64
cryptoff 16384
cryptsize 4177920
cryptid 1
Fairplay - DRM
0 1
Fairplay Open - From Kernel
Fairplay - DRM
0 1
Fairplay Open - MIG
#inc... | pdf |
Not-so-Limited Warranty: Target Attacks
on warranties for fun and profit
High school Student
Senior in fall
Warranty Enthusiast
Reading long paragraphs is fun
Programmer for Cyberdyne Security Solutions
New startup – cyberdynesecuritysolutions.com
Email me: Darkred@cybdss.com
• Any number used t... | pdf |
Can You Trust Autonomous Vehicles: Contactless Attacks
against Sensors of Self-driving Vehicle
Chen Yan
Zhejiang University
yanchen@zju.edu.cn
Wenyuan Xu
Zhejiang University
& University of South Carolina
wyxu@cse.sc.edu
Jianhao Liu
Qihoo 360
liujianhao@360.cn
ABSTRACT
To improve road safety and driving experiences, au... | pdf |
Nail the Coffin Shut:
Kurt Grutzmacher - Defcon 16
grutz @ jingojango.net
NTLM IS DEAD
grutz @ jingojango.net
NTLM is DEAD!
grutz @ jingojango.net
NTLM is DEAD!
Slide #
Who I am...
Corporate Penetration Tester for nearly a decade (with a CISSP for
business purposes, gotta do what ya gotta do)
Have seen the worst secur... | pdf |
$ S T A N D A R D _ I N F O R M A T I O N
$ F I L E N A M E
Windows取证分析
海 报
你不能保护你不知道的东西
digital-forensics.sans.org
DFPS_FOR500_v4.9_4-19
Poster Created by Rob Lee with support of the SANS DFIR Faculty
©2019 Rob Lee. All Rights Reserved.
翻译:Leon(liyi05@qianxin.com)
文件重命名
本地文件移动
卷文件移动
(通过命令行)
卷文件移动
(通过文件
管理器复制/粘贴)
文... | pdf |
Weak Links in Authentication Chains:
A Large-scale Analysis of Email Sender Spoofing Attacks
Kaiwen Shen 1,∗, Chuhan Wang 1, ∗, Minglei Guo 1, Xiaofeng Zheng 1,2,†, Chaoyi Lu 1,
Baojun Liu 1,†, Yuxuan Zhao 4, Shuang Hao 3, Haixin Duan 1,2, Qingfeng Pan 5 and Min Yang 6
1Tsinghua University 2Qi An Xin Technology Research... | pdf |
Md Sohail Ahmad
Md Sohail Ahmad
Prabhash
Prabhash Dhyani
Dhyani
AirTight Networks
AirTight Networks
www.airtightnetworks.com
www.airtightnetworks.com
Wi-Fish Finder:
Who will bite
the bait?
There is >50 % chance that
your laptop will!
© AirTight Networks 2009
Submitted to DEFCON 17
About the Speaker
Last year brough... | pdf |
The Art and Science
of Security Research
The Art and Science
of Security Research
Gregory Conti
gregory.conti@usma.edu
Gregory Conti
gregory.conti@usma.edu
http://commons.wikimedia.org/wiki/File:Venus_botticelli_detail.jpg
The views expressed in this
presentation are those of the
author and do not reflect the
offi... | pdf |
Black Hat USA 2007
Tactical Exploitation
Tactical Exploitation
““the other way to pen-test “
the other way to pen-test “
hdm / valsmith
hdm / valsmith
Black Hat USA 2007
who are we ?
who are we ?
H D Moore <hdm [at] metasploit.com>
BreakingPoint Systems || Metasploit
Valsmith <valsmith [at] metasploit.com>
Offens... | pdf |
aaaddress1@chroot.org
Windows Injection 101:
from Zero to ROP
./Bio✨
• ⾺馬聖豪, aaaddress1 aka adr
• Chroot, TDOH
• TDOHConf: 2016 議程組長 & 2017 活動組長
• 精通 C/C++、Windows 特性、逆向⼯工程
• Speaker: HITCON CMT 2015
HITCON CMT 2016 Lightning
SITCON 2016
SITCON 2017
iThome#Chatbot 2017
BSidesLV 2016
ICNC'17
MC2015
CISC 20... | pdf |
Bio
About Me
With VN Security since year
2009
Almost Every
Weekend
> CTF player
> Weekend gamer
Running zxandora.com
project.
Most of the time
> Soon
> Very Soon
> Brand New Online
Sandbox
Hack in The Box Crew
Once a year
> Good friends
> CTF CTF and CTF
About Me
> 2008, Hack In The Box CTF W... | pdf |
我从SharpC2 上的学到的东西
Perface
在这里非常感谢 @RastaMouse 师傅开发的这款.NET C2,去年刚开始看的时候他的视频教程对我
帮助很大,期间作者也重构过代码,到现在还是很喜欢最新的 Experimental版代码 实话说这是我
从SharpSploit项目以来读到的第二份令人舒服的代码了。3端分离式设计,让我也慢慢培养自己如
何展现写代码前思路上的体现,让阅读代码的人非常舒服,这是我今后追求的目标。
今天对SharpC2学习做个收尾,(为什么要收尾呢,后面会提到)。不知道大家怎么看这款开源.NET
C2,我是非常喜欢的,对待新手非常友好。好了 言归正传。
主要要分享3个点:
1. SharpC2 ... | pdf |
http://
toool us
Lockpick
Village
Pins
Wafers
Combo
Resist
ant
Bumpi
ng
Impres
sion
Master
ing
Picks
Why do Locks Matter ?
http://
toool us
Locks Hold a Special Place in Our Lives
http://
toool us
Locks Hold a Special Place in Our Lives
http://
toool us
Locks Hold a Special Place in Our Lives
http://
tooo... | pdf |
DDoS – Yesterday, Today and tomorrow
Frank Tse, William Guo
Nexusguard
Page § 2
Agenda
DDoS Introduction
DDoS Attack Analysis
DDoS Detection and Mitigation
Fighting DDoS in Mobile Era
1
2
3
4
FAQ
5
Page § 3
About us
Nexusguard, incorporated in 2008, is a premium provider of end-to-end,
in-the-cloud... | pdf |
安洵杯 Writeup
1
安洵杯 Writeup
Author:Nu1L
Web
cssgame
参考https://www.smi1e.top/通过css注⼊窃取html中的数据/
环境有点不同,不太好⾃动化,写了个脚本⼀键⽣成css⽂件,启了个httpserver,然后⼿动⼀位⼀位的跑就⾏了。
Web
cssgame
iamthinking
easy_serialize_php
easy_web
Pwn
Heap
RE
Crackme
EasyEncryption
game
Misc
吹着⻉斯扫⼆维码
Attack
music
Crypto
This_is_not_a_standard_AES256
funney-php
ju... | pdf |
Keren Elazari
aka @K3r3n3
www.K3r3n3.com
A Confession
TAKE THE RED PILL?
@K3r3n3
@K3r3n3
Source : “25 Years Of Vulnerabilities: 1988-2012 Sourcefire Research Report”
Barnaby Jack, 1977-2013
Photo: IOACTIVE
RESEARCH What Matters!
https://www.iamthecavalry.org/
Don’t Keep Your Bugs To Yourself
www.bugcr... | pdf |
www.LIFARS.com
info@lifars.com
©2022 SecurityScorecard Inc.
244 Fifth Avenue, Suite 2035,
New York, NY 10001
1.212.222.7061
Prepared by: Vlad Pasca, LIFARS, LLC
Date:
02/14/2022
A Detailed Analysis
of The LockBit
Ransomware
www.LIFARS.com | 1
Table of Contents
Executive Summary ....................... | pdf |
1
SMS Fuzzing – SIM Toolkit Attack
Bogdan Alecu
bogdalecu@gmail.com
www.m-sec.net
Abstract
In this paper I will show how to make a phone send an SMS message
without the user’s consent and how to make the phone not to
receive any message. The method used works on any phone, no
matter if it’s a smartphone or not and ... | pdf |
SUCTF-WP-Nu1L
SUCTF-WP-Nu1L
upload
Cocktail's Remix
hardCpp
BabyStack
rev
easy sql
sudrv
playfmt
Checkin
EasyPHP
Prime
RSA
MT
babyunic
guess_game
protocol
Game
Pythonginx
DSA
Akira Homework
Signin
upload
Status: solved
Tags: Web
ssrf
compress.zip
if(preg_match('/^(ftp|zlib|data|glob|phar|ssh2|compress.bzip2|compress.zl... | pdf |
SCTF2018-WP
Author: Nu1L
SCTF2018-WP
Author: Nu1L
Web
easiest web - phpmyadmin
NGINX
BabySyc - Simple PHP Web
BabyIntranet
Pwn
bufoverflow_a
sbbs
bufoverflow_b
WTFgame
Crypto
ElGamal Hacker
a number problem
it may contain 'flag'
Misc
Modbus
Re
Babymips
Script In Script
Where is my 13th count
crackme2
simple
Web
{{'a'.con... | pdf |
Air Traffic Control
I
it 2 0
Insecurity 2.0
Righter Kunkel, CISSP, CISA
Security Researcher
DEF CON 18
DEF CON 18
Agenda
Who am I?
Overview from last year
y
Insecurity's today
Jet tracking
Jet tracking
DEF CON 18
Righter Kunkel
2
Who am I?
Security Field for >13 years
Worked with secure operating
p
g
sys... | pdf |
VoIP Wars : Return of the SIP
Fatih Özavcı
Security Consultant @ Sense of Security (Australia)
www.senseofsecurity.com.au
@fozavci
2
# whois
● Security Consultant @ Sense of Security (Australia)
● 10+ Years Experience in Penetration Testing
● 800+ Penetration Tests, 40+ Focused on NGN/VoIP
– SIP/NGN/VoIP Systems Pen... | pdf |
Break, Memory
By
Richard Thieme
The Evolution of the Problem
The problem was not that people couldn’t remember; the problem was that people
couldn’t forget.
As far back as the 20th century, we realized that socio-historical problems were
best handled on a macro level. It was inefficient to work on individuals wh... | pdf |
1
1
2
2
3
3
4
4
5
5
6
6
D
D
C
C
B
B
A
A
NOTE: RESISTORS ARE IN OHMS +/- 5% AND CAPACITORS ARE IN MICROFARADS UNLESS
OTHERWISE NOTED. SEE BOM FOR ACTUAL VOLTAGE AND SPECIFICATION.
3V3
E0
1
E1
2
E2
3
GND
4
SDA
5
SCL
6
WC
7
VCC
8
U4
24LC512-I/SN
1
2
Y1
5.0MHz
3V3
3V3
#RES
PROPRX
PROPTX
PROPSDA
PROPSCL
4/19/2013
B
B
2
1
Jo... | pdf |
DIY Nukeproofing: A New Dig at
“Data-Mining”
By 3AlarmLampscooter
DEF CON 23
Version 0.1b
@3AlarmLampscoot on twitter for updates
DIY Nukeproofing: Outline
● Why technologies like SILEX / AVLIS / MLIS
are democratizing nuclear proliferation (FUD)
● Identifying risk and requirements to mitigate it
● Getting “shovel-re... | pdf |
Co
v
ert
Messaging
Through
TCP
Timestamps
John
Gin
Rac
hel
Greenstadt
P
eter
Lit
w
ac
k
Ric
hard
Tibb
etts
fgifgreeniep
li
twa
ck
ti
bb
et
tsg
m
it
ed
u
Massac
h
usetts
Institute
of
T
ec
hnology
Abstract
W
e
presen
t
a
proto
col
for
sending
data
o
v
er
a
common
class
of
lo
wbandwidth
co
v
ert
c
hannels
Co
v
ert... | pdf |
Bug Hunters
dump user
data.
Can they keep it?
Well they’re keeping it
anyway.
Who?
Data Protection Officer &
Privacy Attorney - a lawyer,
but not your lawyer
Co-Founder of Truffle Security,
TruffleHog author, bug hunter,
security researcher, etc…
Whitney Merrill
@wbm312
Dylan Ayrey
@InsecureNature
Do bug hunters
... | pdf |
Manyonymity:
It‟s Who You Don‟t Know
GM
To Think About
PHP Distributed Encryption
What is an acceptable level of mass-
market encryption?
How does the “average joe” fingerprint
and protect their daily communication?
What are the true benefits of open-
source vs. major company-owned
encryption services?
Wh... | pdf |
P A G E
Uncovering SAP vulnerabilities:
Reversing and breaking
the Diag protocol
Martin Gallo – Core Security
Defcon 20 – July 2012
P A G E 2
Agenda
• Introduction
• Motivation and related work
• SAP Netweaver architecture and protocols layout
• Dissecting and understanding the Diag protocol
• Results an... | pdf |
1 ⼆二次“登陆”导致的权限提升
1.1 “登陆”的实现
登陆功能应该是Web项⽬目⾥里里⻅见到的⽐比较多的业务模块的,通常会跟session会话结合,完成对应的操
作,常⻅见的实现过程如下:
session本身是⼀一个容器器,⾥里里⾯面可以存放类似⽤用户身份等权限控制所需的元素,在对应的接⼝口完成对
应的鉴权功能。最简单的例例如如果在当前会话session中没有找到对应的登陆凭证,说明⽤用户没有登录
或者登录失效,如果找到了了证明⽤用户已经登录可执⾏行行后⾯面操作,防⽌止接⼝口的未授权访问。或者是权限细
粒度覆盖业务接⼝口,将业务相关的关键参数(例例如userid、fileid等)与当前⽤用户的身份凭证(⼀一般是
sessi... | pdf |
It’s all about the timing. . .
Haroon Meer and Marco Slaviero
{haroon,marco}@sensepost.com
SensePost
Abstract
This paper is broken up into several distinct parts, all
related loosely to timing and its role in information se-
curity today. While timing has long been recognized
as an important component in the crypt-anal... | pdf |
A Journey Into Fuzzing
WebAssembly Virtual Machines
Patrick Ventuzelo
#BHUSA @BlackHatEvents
#BHUSA @BlackHatEvents
Patrick Ventuzelo (@Pat_Ventuzelo)
●
Founder & CEO of FuzzingLabs | Senior Security Researcher
○
Fuzzing and vulnerability research
○
Development of security tools
●
Training/Online courses
○
Rust Sec... | pdf |
Why are our tools
terrible?
George Hotz (geohot)
(and a bit about other things)
“geohot”
pwnium
• ab.__defineGetter__("byteLength",
function() { return 0xFFFFFFFC; });
• spawn crosh with fake messages
• send commands to crosh by spoofing the window id
• try_touch_experiment %s command injection
• race condition in m... | pdf |
“I am walking through a city made of
glass and I have a bag full of rocks”
(Dispelling the myths and discussing the facts of Global Cyber-Warfare)
Jayson E. Street,
CISSP, GSEC, GCIH, GCFA,
IEM, IAM, ETC…
Let go of my EGO
• Lets start out with a little about yours truly.
•
Defcon17@F0rb1dd3n.com
http://F0rb1dd3n.com
... | pdf |
C2profile中的magic_mz_x86和magic_mz_x64
0x00 前言
周末写一个在线工具(后面会发布的),看见C2profile中magic_mz_*配置项,于是搜了搜,发现没有
人写关于这个。打算这周写个文档发星球。哪知道周一看twitter,发现有同学抢先一步发了,卷阿,太
卷了!不过我还是要写。他文章中有一些笔误:https://www.redteam.cafe/red-team/shellcode-inject
ion/magic_mz_x86-and-magic_mz_x64
这个功能是4.2以后加入的,不是 2.4.3
dec abp应该是dec ebp
都是笔误,无伤大雅,可能一些新手同学会出问题,... | pdf |
1
DEFCON 28
08-082020
DEFCON 28
Whispers Among the Stars
Perpetrating (and Preventing) Satellite Eavesdropping Attacks
James Pavur, DPhil Student
Oxford University, Department of Computer Science
Perpetrating (and Preventing) Satellite Eavesdropping Attacks
James Pavur, DPhil Student
Oxford University, Department of Co... | pdf |
JTAGulator Block Diagram
Document rev. 1.0
March 20, 2013
Joe Grand, Grand Idea Studio, Inc.
MCU
Parallax Propeller
EEPROM
24LC512
2 (I2C)
Power Switch
MIC2025-2YM
LDO
LD1117S33TR
USB
5V
3.3V
D/A
AD8655
1.2V - 3.3V
~13mV/step
Serial-to-USB
FT232RL
2
1 (PWM)
Host PC
USB Mini-B
Voltage Level
Translator
TXS0108EPWR
Volta... | pdf |
#BHUSA @BlackHatEvents
Google Reimagined a Phone. It’s Our Job to
Red Team & Secure it
Xuan
Xing
Eugene
Rodionov
Christopher
Cole
Farzan
Karimi
#BHUSA @BlackHatEvents
Information Classification: General
●
Who We Are
●
What’s Our Scope
●
How We Help Secure Android & Pixel
●
Pixel 6 Attack Surface
●
Proof of Co... | pdf |
1
⼀个图标伪装上线⽊⻢分析
事件背景
分析经过
并不简单
娱乐⼀下
⽊⻢IOC
加⼊社区
某重要活动结束前⼀天,安全的⽭与盾星球内部交流群⾥有位蓝队兄弟扔出来三个公鸡队样本让群⾥还
在的师傅帮忙分析⼀下,由此便展开了下⾯的分析经过。
⾸先拿到样本之后,⽤file命令做简单识别,file能识别的⽂件格式还是很多的。但这三个样本不巧,被公
鸡队做了⼿脚,已经混淆了⽂件头。
⽤010Editor打开⽂件,简单查看了下,发现⽂件当中存在明⽂字符串,整体来说此时样本⽐较奇怪。
事件背景
分析经过
2
这时候坤佬(wonderkun)在群⾥来了句,看出来⽂件混淆的⽅式了,⽤0xEE异或即可得到混淆前的原
⽂件。具体原理坤佬解释这是统计学:不... | pdf |
A Few Comments on Mind Games
"the only way you can tell the truth," a friend at NSA said, "is through
fiction" ... so I did ...
"Mind Games" is a unique collection of 19 stories of brave new worlds
and alternate realities - stories of computer hackers, deception and
intelligence, puzzling anomalies, spirituality a... | pdf |
Redteaming:主流杀软对抗之路
ABOUT ME
●安全研究员
●红队攻防,杀软规避研究及武器化它们。
木星安全实验室
●实验室负责人
●CompTIA Security+
CISP-PTS
CISAW
CISP
CDPSE
红队作战概览图
研究背景
●红队攻防的必要因素
●杀软检测手段的不断升级
目录
静态免杀
动态免杀
自我保护
Bypass之静态免杀
Shellcode加密
IAT导入地址表
混淆编译
Shellcode加密
Shellcode:16进制的机器码。
例如:
杀软查杀cobaltstrike, metasploit等知名远控
通常是通过shellcode特征匹配来进行查杀。
内存加载mim... | pdf |
Let’s Sink The Phishermen’s Boat!
Teo Sze Siong
F-Secure Corporation
teo.sze.siong@f-secure.com
BE SURE!
Let’s
et’s
et’s
et’s Sink
ink
ink
ink The
he
he
he Phisherm
hisherm
hisherm
hishermeeeen’s
n’s
n’s
n’s Boat
oat
oat
oat!!!!
Teo Sze Siong
teo.sze.siong@f-secure.com
Abstract: In recent years,... | pdf |
•
Google兩大門神
CSWADI
•
•
•
•
•
•
•
•
•
•
偽造pdf、jpg等
某知名CMS 0day XSS 通殺!
•
•
•
•
•
•
•
• | pdf |
Knocking
my
neighbor’s
kid’s
cruddy
drone
offline.
michael
robinson
First,
a
shout
out…
Alan
Mitchell
Ron
McGuire
Chris
Taylor
KaAe
Herritage
My
neighbor.
Sigh.
My
neighbor’s
kid.
Double
sigh.
Way
too
much
discreAonary
spending.
My
neighbor.
... | pdf |
Ferdinand Schober
Historical Development
◦ Vintage Protection
Different DRM approaches
◦ Privacy Study
◦ Failure Cases
◦ Case Studies
Messing with a gamer
◦ Case Study
Why are games cracked?
Q&A
Disc Layout Protection
•Games distributed on floppy disc
•Easy to duplicate
•Use Unique disc layout
•E.g. change se... | pdf |
1"
Breaking WingOS
Josep Pi Rodriguez
Senior Security Consultant
Josep.rodriguez@ioactive.com
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Agenda
• Intro to WingOS
• Scenarios & Attack surface
• Vulnerabilities
• Exploitation & Demo
• Conclusions
IOActive, Inc. Copyright ©2018. All Rights Rese... | pdf |
津⻔杯Writeup - Nu1L
津⻔杯Writeup - Nu1L
Web
UploadHub
hate_php
GoOSS
power_cut
RE
GoodRE
easyRe
Crypto
混合编码
justOCB
rsa
Pwn
pwnme
PwnCTFM
no1
easypwn
Misc
m1bmp
m0usb
Mobile
hellehellokey
Web
UploadHub
hate_php
import requests
import string
import hashlib
ip = requests.get('http://118.24.185.108/ip.php').text
print(ip)
def... | pdf |
臺灣資安人才教育
Cybersecurity Education in Taiwan
吳宗成
臺灣科技大學資訊管理系特聘教授
教育部資訊安全人才培育計畫主持人
tcwu@cs.ntust.edu.tw
2017/08/25 HITCON CMT
1
開宗明義
教育與人才學
2
教育情境
在學教育
In-campus
社群教育
Community
在職教育
On-job
3
教育本質
4
人手 •What you know
人才 •Why you have
人物 •Who you are
教育目標
5
人手
人才
人
物
人手
人才
人
物
何謂「人才學」?
• Talent studies or Talent resources(M... | pdf |
The Cavalry Year[0]
A Path Forward for Public Safety
The Cavalry Year[0]
A Path Forward for Public Safety
Joshua Corman && Nicholas J. Percoco
Our Dependance on Technology is
Growing Faster than our Ability to
Secure it.
Problem Statement:
While we struggle to secure our
organizations, connected
technologies now pe... | pdf |
#BHUSA @BlackHatEvents
To Flexibly Tame Kernel
Execution With Onsite Analysis
Xuhua Ding
Singapore Management University
#BHUSA @BlackHatEvents
Information Classification: General
SMU Classification: Restricted
Outline
• Review of existing dynamic kernel analysis techniques
• Introduction of the onsite analysis infr... | pdf |
2
SLIDE
about me
some call me a one trick pony, others call me passionate
•
mad scientist hacker who likes to meddle with hardware
and software.
•
particularly obsessed with wireless.
•
degree in computer science from Southern Utah University
•
loves include:
•
web application pentesting
•
wireless monitoring and tra... | pdf |
PowerShell Version
Release Date
Default Windows Versions
PowerShell 1.0
November 2006
Windows Server 2008 (*)
PowerShell 2.0
October 2009
Windows 7 Windows Server 2008 R2 (**)
PowerShell 3.0
September 2012
Windows 8 Windows Server 2012
PowerShell 4.0
October 2013
Windows 8.1 Windows Server 2012 R2
PowerShell 5.0
Februa... | pdf |
Browser-Powered Desync Attacks: A New Frontier in
HTTP Request Smuggling
James Kettle - james.kettle@portswigger.net - @albinowax
The recent rise of HTTP Request Smuggling has seen a flood of critical findings enabling near-complete compromise of
numerous major websites. However, the threat has been confined to attacker-a... | pdf |
1
Injectable Exploits
Kevin Johnson – kevin@inguardians.com
Justin Searle – justin@inguardians.com
Frank DiMaggio – frank@secureideas.net
Copyright 2009 InGuardians, Inc.
2
Copyright 2009 InGuardians, Inc.
Who are we?
• Kevin Johnson
– BASE/SamuraiWTF/Laudanum/Yokoso! Project Lead
– Penetration Tester
– ... | pdf |
Lateral
Movement
Remote Desktop Protocol
Description
RDPis routinely used by your administrators, help desk,
or others it provides an attractive attack vector for
adversaries who are trying to blend in with standard
network activity. Once on a client system, the attacker
can simply leverage the built in Mic... | pdf |
!
!
Attacks from Within:
Windows Spreads Mirai to Enterprise IoT - Draft
Steinthor Bjarnason
Arbor Networks, ASERT
sbjarnason@arbor.net
Jason Jones
Arbor Networks, ASERT
jasonjones@arbor.net
Abstract
When the Mirai IoT Bot surfaced in September
2016, it received a lot of publicity, not only because
of the la... | pdf |
Resilient Botnet Command
and Control with Tor
Dennis Brown
July 2010
Introduction
● Who am I?
● Work for Tenable Network Solutions
● Spoken previously at Toorcon, PaulDotCom
Podcast
● Run Rhode Island's Defcon Group DC401
Doesn't it suck when your botnet
gets shut down?
● Lots of time lost
● Setting up servers
● Bui... | pdf |
Before the
FEDERAL COMMUNICATIONS COMMISSION
Washington, DC 20554
In the Matter of
Unlicensed Operation in the TV Broadcast
Bands
Additional Spectrum for Unlicensed
Devices Below 900 MHz and in the 3 GHz
Band
ET Docket No. 04-186
ET Docket No. 02-380
COMMENTS OF MOTOROLA, INC.
Steve B. Sharkey
Director, ... | pdf |
The Night the Lights went out in ‘Vegas:
Demystifying Smart Meter Networks
Barrett Weisshaar
Garret Picchioni
Copyright Trustwave 2010
Confidential
Overview
What this Presentation is:
• Overview of Smart Meter & Smart Grid technology
• Detail network traffic-based approach
− As opposed to meter firmware mo... | pdf |
2
4
➡
➡
➡
5
6
7
8
9
10
11
12
13
15
➡
➡
16
17
18
19
20
21
23
➡
➡
➡
24
25
26
27
28
29
30
32
➡
➡
➡
33
34
35
37
➡
➡
➡
➡
38
39
40
41
➡
➡
➡
➡
43
➡
➡
➡
➡
44
45
➡
➡
➡
➡
➡
46
48
➡
49
➡
➡
➡
50 | pdf |
Boomstick-Fu
Physical Security at its
Most Basic and Brutal Level
DefCon 15
Deviant Ollam | Noid | Thorn | Jur1st
Show Of Hands
• Gun Owners
• Regular Shooters
• Used a Firearm Defensively
• Considering a Purchase
What This Talk Is About
(and what it’s NOT about)
• Defensive Firearm Ownership
• Hardware Within the La... | pdf |
Network Protocol Reverse
Engineering
Eavesdropping on the Machines
Tim Estell – BAE Systems
Katea Murray – Leidos
2016-08-05 Estell/Murray
Eavesdropping on the Machines
2
What is this talk about?
• Eavesdropping on the machines
• Machines are going to have a communications protocol
• We may not have seen it and they p... | pdf |
1
Google Drive 上传⼯具编写
有⼀天,有⼈找我帮忙写⼀个⼯具,被我义正⾔辞的拒绝了。我可不帮⼈写⼯具,我只是爱学习。
这部分内容,官⽅⽂档写得很是清楚。Google 提供的 APIs 访问是基于 Oauth2.0 认证的,其流程可以
⼤致分为以下⼏个步骤:
1. 客户端 App 发起认证(若⽤户没有登录,则需要先登录)
2. 弹出授权⻚⾯,⽤户点击允许后,Google 认证服务器给我们返回⼀个授权码(Authorization
code)
3. 客户端获取到授权码以后,⽤授权码向认证服务器请求 Access Token
4. 服务器验证授权码⽆误后返回 Access Token ⾄客户端
5. 拿到 Ac... | pdf |
Editors Vulnerability
Handbook
• Version
0.0.6
• Summary
Editors
Update
Description
#Include
{FCKeditor}
2010/04/10
"_"真不是那么好绕
的~~望高手飞过告
知
#Include
{eWebEditor}
2010/02/13
你是否跟我一样讨厌
此物的精简版?
#Include
{Cuteditor}
2009/11/29
#Include
{Freetextbox}
2009/11/29
#Include
{Webhtmleditor}
2009/11/29
经过参考诸多资料-
证实此物已终止更新
#Include... | pdf |
分享一下WAF Bypass 一个小的tips
本文通过php 源码来理解 bypass waf 绕过原理
一段PHP代码
绕过一 boundary获取方式
首先看看Content-Type 是怎么获取的到
Content-Type: multipart/form-data; boundary=aa
https://github.com/php/php-src/blob/90b7bde61507cee1c6b37f153909d72f5b203b8c/main/rfc18
67.c
首先从Content-Type 获取boundary 然后拿等号后面的值做boundary 的值。那么绕过如下:
<?php
var_dump... | pdf |
S-kerberos协议原理
参考文章
Kerberos协议的组成部分
第一次通信
第二次通信
第三次通信
Kerberos协议中的攻击分类
S-kerberos协议原理
参考文章
详解kerberos认证原理
内网渗透测试:Kerberos 协议& Kerberos 认证原理
学习过程主要是参考的第一篇文章,作者将认证的三个流程讲述的非常清楚,只不过中间有细微的错误,和笔误,所
以参考第二篇文章进行改正。
Kerberos协议的组成部分
客户端(Client):发送请求的一方
服务端(Server):接收请求的一方
密钥分发中心(Key Distribution Center,KDC):密钥分发中心,默认安装在域控里,包括AS和T... | pdf |
Equation NOPEN
Equation NOPEN
概述
基本信息
运行方法
本地环境变量
本地客户端命令
keepalive
autopilot
norc
远程目录命令
find
cd ls
远程文件操作
get put cat
upload
grep mailgrep
cksum
chili
远程网络穿透
tunnel
irtun istun jackpop
nrtun
nstun
rawsend
rtun
rutun
stun
sutun
scan
vscan
远程网络命令
icmptime
ifconfig
nslookup
ping trace
远程服务端命令
pid
listen
call
burn
远程服务端常... | pdf |
测试程序版本为 11.0.0.33162 ,官网目前只开放12.5版本,但是可以遍历下载ID进行下载
001 程序详情
向日葵为C++编写,使用UPX3.X加壳故此分析前需要进行脱壳处理(github上有UPX项目,
可以直接脱)
此外向日葵在启动的时候会随机启动一个4W+高位端口,具体在 sub_140E0AAE8 可看到
社会孙在视频中有一段疑似session的字符串
根据这段疑似 session 的关键字在向日葵一次正常远程的日志中找到了关键字 CID
002 根据日志找session
随后载入IDA,对CID关键字进行搜索
找到3个函数存在CID关键字字符串
sub_140E20938 、 sub_140E... | pdf |
How South Korea
Makes White-hat Hackers
# 2013 edition!
beist (Korea University, GrayHash)
email: beist@grayhash.com
web: http://grayhash.com
About me
SeungJin “Beist” Lee
Ms-Phd course at Korea University (CIST IAS LAB)
Member of advisory council for Cyber Command in Korea
Principal Security Consultant at GrayHash
Co... | pdf |
Kartograph
Elie Bursztein and Jocelyn Lagarenne
Stanford University
1
Jocelyn Lagarenne & Elie Bursztein
Kartograph (cd version)
http://ly.tl/t10
Welcome to the real world
Jocelyn Lagarenne & Elie Bursztein
Kartograph (cd version)
http://ly.tl/t10
supernatural powers !
• Learn kungfu
• Infinite money
• Xray vision
• go... | pdf |
Wesley McGrew
HORNECyber.com
An Attacker Looks at Docker:
Approaching Multi-Container Applications
Wesley McGrew, Ph.D.
Director of Cyber Operations
HORNE Cyber
wesley.mcgrew@hornecyber.com
@mcgrewsecurity
Wesley McGrew
HORNECyber.com
1
An Attacker Looks at Docker: Approaching Multi-Container Applications
TABLE OF CONT... | pdf |
Copyright © 2012 Virtual Security Research, LLC.
All Rights Reserved.
Owning the Network:
Adventures in Router Rootkits
Michael Coppola
Copyright © 2012 Virtual Security Research, LLC.
All Rights Reserved.
Who am I?
▪Security Consultant at Virtual Security
Research in Boston, MA (we're hiring!)
▪Student at Northeaster... | pdf |
PbootCMS<=3.1.2前台注⼊分析
写在前⾯
这次学校联合oppo办了场校赛⾥⾯我出了⼀些RealWorld⽅向的赛题,由于这个不是最新版
本再加上思路还是很骚,中间是有⼀些⼩坑的,导致前台注⼊⽆法获取表名,接下来我会抽
丝剥茧⼀点⼀点分析,相信师傅们⼀定能学到东西滴,其他的题⽬则不那么适合分享(坏笑)
这⾥以mysql数据库为例⼦,sqlite同理只是payload稍作改变
正⽂
出题的初衷是希望学弟们能学会通过学会diff去快速获得漏洞并利⽤,可惜最终只有两个队
伍做出来了,其中⼀个⾮预期是开发没有修复⼀个远古的注⼊导致新版本也能⽤,这⾥主要
分享我的预期以及⼀些踩坑和bypass,⾸先可以看到这⾥的修复(通过描述可以猜... | pdf |
YOU'D BETTER SECURE YOUR
YOU'D BETTER SECURE YOUR
BLE DEVICES OR WE'LL KICK
BLE DEVICES OR WE'LL KICK
YOUR BUTTS !
YOUR BUTTS !
@virtualabs | DEF CON 26, Aug. 12th 2018
WHO AM I ?
WHO AM I ?
Head of R&D @ Econocom Digital Security
Studying Bluetooth Low Energy for 3 years
Developer & maintainer of BtleJuice
... | pdf |
I Fight For The Users
Episode I
Attacks Against Top Consumer Products
Who are we?
@zfasel
@SecBarbie
Our Credentials?
(null)
Before we get started…
Con Speaker Rule 101
If you’re naming vendors and
don’t want your talk pulled,
even if it’s already known
and even if the impact is low,
don’t disclose too much ahead of t... | pdf |
Cybrics CTF Nu1L Writeup
Team Page:https://nu1l-ctf.com
Cybrics CTF Nu1L Writeup
Disk Data
Description
Solution
QShell
Description
Solution
Caesaref
Description
Solution
Hidden Flag
Description
Solution
Paranoid
Description
Solution
Sender
Description
Solution
Matreshka
Description
Solution
Oldman Reverse
Description
S... | pdf |
1
记次src测试中的ldap注⼊的深⼊利⽤
ldap注⼊点判断
ldap的注⼊简单利⽤
获取ldap中的密码
修复⽅法
在最近的⼀次的src测试中遇到了⼀个ldap注⼊漏洞,⽬标是⼀个管理平台,漏洞点存在于⽤户名判断处.在
测试时遇到的
ldap注⼊是指ldap过滤器语句(filter)的注⼊
ldap过滤器的基本语法如下
例如⼀个简单的查询语句如下
搜索cn值属性为admin的条⽬ 成功会返回完整条⽬属性
实际使⽤时可能会⽐较复杂
⽐如说同时搜索匹配⽤户输⼊的⽤户名/邮箱/⼿机号
ldap注⼊点判断
PHP
复制代码
=
>=
<=
| 或
& 与
! ⾮
* 通配符
(语句)
1
2
3
4
5
6
7... | pdf |
浅谈 PHP WebShell 的检测与防御
最近腾讯举办的⼀个webshell挑战赛,简单玩了⼀下,发现⼀些绕过的思路对于很多检测产品
都是通⽤的。说明这些产品在遇到的⼀些共性的检测难点上都没有⼀个很好的解决⽅案,以下
简单分析⼀下webshell检测的原理和困境以及⼀些绕过的思路。
正则识别
pass
ssdeep
通过模糊哈希匹配已知样本,可以允许⼀定范围内的修改,原理是分⽚分别计算哈希,连接后
得到字符串,⽐较时计算两个字符串的加权编辑距离,评估样本的相似度。加权编辑距离指⼀
个字符串最少经过多少次操作(增加、删除、修改、交换)得到另⼀个字符串,不同的操作对应
不同的权值,结果相加。
ssdeep只能针对已知样本⽽且没有⼤范... | pdf |
Subver'ng
the
World
of
Warcra4
API
by
Christopher
Mooney
James
Luedke
NDA
If
you
are
a
Blizzard
employee
or
a
Blizzard
fan‐boy
this
NDA
applies
to
you.
You
are
forbidden
to
discuss
this
code
with
anyone
else
upon
penalty
of
tar
and
feather.
In
fact
we
have
tested
this
presenta'on
out
on... | pdf |
windows服务工作原理
windows服务是一种可以在后台完成任务的程序,服务程序一般随着系统启动而启动,启动权限一般是
system,windows vista开始为了提升系统的安全性,将服务程序放在session 0运行,和我们普通的用
户态程序运行在不同的session级别,我们无法跨session进行交互,因此保证了服务程序的安全。我们
随便找一个服务,用 process hacker打开他的进程,就可以看到如下信息:
服务程序不需要用户界面,所以服务程序通常是以控制台程序的形式编写的,入口函数是main函数。一
个服务一般由三部分组成。
1. Service control Manager(SCM),SCM存在于Ser... | pdf |
NFC Hacking: The Easy Way
DEFCON 20
Eddie Lee
eddie{at}blackwinghq.com
About Me
Security Researcher for Blackwing Intelligence (formerly Praetorian
Global)
We’re always looking for cool security projects
Member of Digital Revelation
2-time CTF Champs – Defcon 9 & 10
Not an NFC or RFID expert!
I... | pdf |
Detecting and Defending
Against State-Actor Surveillance
Introduction
CONTENTS
Introduction
Goals and Intent
Surveillance Catalog Leaks
–
Hardware
–
Software
–
Wifi
–
Cellular
Conclusions
Who is involved
! Those that spy.
! Those that get spied on.
Why do Spies Spy?
! Information has valu... | pdf |
性质
机器名
IP
OS
域控
ADDC.apple.me
192.168.10.200
Microsoft Windows Server 2012 R2
Datacenter 6.3.9600 暂缺 Build 9600 x64
证书
服务
CA.apple.me
192.168.10.202
Microsoft Windows Server 2012 R2
Datacenter 6.3.9600 暂缺 Build 9600 x64
域内
主机
Win7-
PC.apple.me
192.168.10.210
Microsoft Windows 7 Ultimate 6.1.7601
Service Pack 1 Build 76... | pdf |
Powershell / MsBuild 免杀上线
分享⼀个前段时间学习测试 Powershell / MsBuild 免杀上线 CS 时写的简单混淆脚本
(Shellcode -> ps1, xml),结合 CS Profile 可以免杀上线 360、⽕绒、Windows Defender 及
Kaspersky,脚本主要对脚本中的⼀些特征函数名、变量名及⼀些特征字段等进⾏随机⽣成
替换,Shellcode 逐字节 xor 解密。
混淆脚本代码⻅⽂末或者 https://github.com/inspiringz/python-
toys/blob/master/1.Simple%20Shellcode%20Obfuscatio... | pdf |
whoami
Tamas Szakaly (sghctoma)
from Hungary, the land of Pipacs , Palinka and gulash :)
pentester/developer @
OSCE
part of team Prauditors, European champion of Global
Cyberlympics 2012
whatami
“ I am not a computer nerd. I prefer to be called a hacker!”
a binary guy
love crackmes and toying with pro... | pdf |
环境搭建
1.项目介绍:
本次项目模拟渗透测试人员在授权的情况下,对目标进行渗透测试,从外网打
点到内网横向渗透,最终获取整个内网权限。本次项目属于三层代理内网穿
透,会学习到各种内网穿透技术,cobalt strike 在内网中各种横行方法,也
会学习到在工具利用失败的情况下,手写 exp 获取边界突破点进入内网,详细
介绍外网各种打点方法,学习到行业流行的内网渗透测试办法,对个人提升很有
帮助。
2.VPS 映射
1.将 ip 映射到公网。在公网 vps 使用配置 frp 工具的 frps.ini 运行 frps.exe
-c frps.ini
在 web1 上配置 frpc.ini 运行 frpc.exe -c f... | pdf |
365-Day: https Cookie Stealing
Mike Perry
Defcon 2007
Who am I?
● Volunteer Tor developer
– Work on Torbutton, TorFlow
● Privacy advocate, censorship opponent
● Forward+Reverse engineer at Riverbed
● Flexitarian
● Random Hacker
– Wrote a page-based malloc debugger
– Wrote an IRC bot that got quoted as a human in a
maj... | pdf |
Lost in Translation
C. Grothoff, K. Grothoff, L. Alkhutova, R. Stutsman, M. Atallah
Lost in Translation:
Translation-based Steganography
Christian Grothoff, Krista Grothoff,
Ludmila Alkhutova, Ryan Stutsman and Mikhail Atallah
{christian,krista}@grothoff.org, {lalkhuto,rstutsma}@purdue.edu, mja@cs.purdue.edu
“... because a... | pdf |
CS download shellcode 分析
CS version:4.3
CS端IP:172.16.80.3
choose a payload to stage:windows/beacon_https/reverse_https
在⽣成加载shellcode的程序之后放⼊到x32dbg。
定位到shellcode执⾏的地址
在将DF标志清零后(CLD),紧接着⼀个call,这个call主要是把 wininet这个字符串⼊栈
FS寄存器指向当前活动线程的TEB结构,在这个结构体的0x30的位置是PEB结构地址接着去找PEB_LDR_DATA这个
结构体从双向链表中去寻找我们想要的DLL,这个DLL就是之前我们⼊栈的那个wini... | pdf |
2018 LCTF
By Nu1L
2018 LCTF
PWN
easy_heap
pwn4fun
echos
just_pwn
WEB
Travel
T4lk 1s ch34p,sh0w m3 the sh31l
1. includewebshell
2. remoteipphar
3. wrapper phar:// =>RCE
L playground2
EZ OAuth
userssrf ->
God of domain pentest
sh0w m3 the sh31l 4ga1n
1.
2. tmpfile getshell
bestphp's revenge
soapssrf+crlfphpsessidflag.php... | pdf |
Manna From Heaven!
Improving the state of rogue AP attacks!
Turn your wifi off!!
Our intention is to demonstrate our research
findings, not to cause any damage. We have taken
precautions, but some danger is inherent to such
live demos. Please turn off your wifi now if you
would not like to be involved. If you decide n... | pdf |
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.10
目錄
Android渗透测试学习手册中文版
第一章Android安全入门
第二章准备实验环境
第三章Android应用的逆向和审计
第四章对Android设备进行流量分析
第五章Android取证
第六章玩转SQLite
第七章不太知名的Android漏洞
第八章ARM利用
第九章编写渗透测试报告
2
Android渗透测试学习手册中文版
原书:LearningPentestingforAndroidDevices
译者:飞龙
在线阅读
PDF格式
EPUB格式
MOBI格式
代码仓库
赞助我
协议
CCBY-NC-SA4.0
Android渗透测试学... | pdf |
Leave your malware @home
MALPROXY
Amit Waisel Hila Cohen
US
About
Amit Waisel
Offensive Cyber
Security Expert
Technology lead, Security
Research @ XM Cyber
Trusted Security Advisor
Favorite bit: 1
Private Pilot
, Skipper
and cat lover
Hila Cohen
Security Researcher
@ XM Cyber
@hilaco10
Passionate abo... | pdf |
Cyber Grand Shellphish
DEFCON 24
August 7, 2016 · Track 2 - 3pm
Giovanni Vigna
Christopher Kruegel
zanardi
void
HEX on the beach
UC Santa Barbara
nullptr zanardi
void
balzaroth
sicko irish
SIMULATION
2004
UC Santa Barbara
nullptr zanardi
void
balzaroth
sicko irish
TU Vienna
void
engiman
pizzaman
SIMULATION
2005
virus... | pdf |
对某 DedeCMS 二开系统全局变量追加漏洞
利用
本文纯属虚构,网站皆为本地靶场。
我写文章总是喜欢带着我的个人感情,去记录我尝试过的失败和踩过的坑,最开始写文章都是为了自己
日后方便想起更多的细节和当时脑子里的想法,所以总是那么的啰啰嗦嗦,嫌长的可以直接看 进入后台
部分
起因
无意中发现某个违法网站所使用的程序在某些细节处很像 DedeCMS ,但又不完全一样,推测出有可能
是自研发或基于 DedeCMS 二开的,感觉有搞头,于是通过 fofa 搜索相关指纹和 ico 得到将近十个
来个类似的站点,并发现了目标的测试站,通过其他站分析得出是 XX公司 基于 DedeCMS 删减后的程
序,于是围绕这十来个站打了... | pdf |
n in t h e d it io n
Mic h a e l Ba z ze l l
Re s o u r c e s f o r Se a r c h in g a n d a n a l y z in g
On l in e in f o r ma t io n
Ope n s o u r c e
In t e l l ig e n c e t e c h n iq u e s
-_____ J
Copyright © 2022 by Michael Bazzell
Project Editors: Y. Varallo, Janice Bartlett
Technical Editors: Jason E... | pdf |
MOC CTF MOC
前言
Games
double sqli & Solved & #SQL #ClickHouse
Unsecure Blog & Solved & #JFinal #表达式注入
Sp-Auth & Unsolved & #Spring #OAuth劫持 #CSRF and RCE ?
后记
前言
Web Wirteup 如下
Games
double sqli & Solved & #SQL #ClickHouse
首先进入题目,有种 sqli-labs 的既视感。在后面加上了单引号报错了。
通过搜索,不难发现这个是 ClickHouse 的报错。简单浏览下官方文档,构造一个联合查询,帮助我们回显(报错太... | pdf |
DoS: Denial Of Shopping
Analyzing and Exploiting (Physical) Shopping
Cart Immobilization Systems
by Joseph Gabay
A Disclaimer
This talk is the result of my personal project.
Any views, opinions, or research presented in this talk are personal and belong
solely to me. They do not represent or reflect those of any perso... | pdf |
Author
Damian Finol
Venezuelan
Engineer in Informatics
Currently doing a Masters in Computer Science
with focus on Distributed systems and paralellism
Working as an Information Security Specialist for a
venezuelan Bank
Teaching Databases, Operating Systems and Data
Security at Universidad Nueva Esparta
Totalfarker
P... | pdf |
Securing Windows
Internet Servers
23.org / Covert Systems
jon.miller@covertsystems.net
Jon Miller
Senior Security Engineer
Covert Systems, Inc.
Always try to use a fresh install
and migrate existing data over
Make sure to convert to NTFS
Default Security Settings are not
applied You must apply them
manually using ... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.