text
stringlengths
100
9.93M
category
stringclasses
11 values
THE ROAD LESS SURREPTITIOUSLY TRAVELED @pukingmonkey DEF CON 21 THE LOSS OF LOCATIONAL PRIVACY WHILE TRAVELING IN YOUR AUTOMOBILE – Automatic License Plate Readers (ALPRs) – Snitch devices in your car • Transponder based Electronic Toll Collection (ETC) • GPS • S...
pdf
【技术分享】Exchange渗透测试总结 本期安仔课堂,ISEC实验室的唐老师将为大家介绍Exchange相关知识点,欢迎感兴趣的 朋友一起交流学习。 一 、Exchange概述 Exchange是微软出品的邮件服务器系统,凭借其强大的功能优势被应用到很多企业、学校的 邮件系统搭建中。 截至目前,Exchange已有多个成熟版本,例如:Exchange Server 2010、2013、2016及最 新版本2019。此外,Exchange又可分为Exchange Server和Exchange Online ,为了方便, 本文将主要以本地Exchange Server 2010为例进行演示。 二、组成 首先,让我们一起了解下Exch...
pdf
Discovering+and+Triangulating+Rogue+Cell+Towers Eric%Escobar,%PE Security%Engineer What+is+a+rogue+cell+tower? • A+device+created+by+governments+or+hackers+that+has+the+ability+ to+trick+your+phone+into+thinking+it’s+a+real+cell+phone+tower. • Also+known+as+IMSI+catchers,+interceptors,+cell-site+simulators,+ Stingrays,...
pdf
When Lawyers Attack! - Dealing With the New Rules of Electronic Discovery John E. Benson, Esq. A Companion to the Presentations Given at Blackhat USA 2008 and DEFCON 15 August 2008 Author’s Note I hope that my talks and these materials help alleviate some of the confusion that has been created by the advent of ele...
pdf
1 从⼀次实战,聊聊获取源代码的姿势 Liquid Files LxLL ⼀般思路 LxLN 试⽤ LxLO 柳暗花明 LxLP 单⽤户模式 LxLQ 后台鸡肋命令执⾏(低权限) EXP 进c神的圈⼦也挺久,还没有发过帖⼦,于是借最近的⼀个案例,来聊聊实战中获取源码的⼀些姿势。 (也是前段时间某次闭⻔分享的素材: hope you guys enjoy it~ Liquid Files是国外的⼀款⽹盘,官⽹:https://www.liquidfiles.com/ Liquid Files 2 是收费的⼀套系统,⽼外⽤得多。 咱们今天就来试试获取这套系统的源代码,并进⾏前期的攻击⾯评估(初步的代码审计) 正如我在⽂章《记⼀次Java...
pdf
The Emperor Has No Cloak - WEP Cloaking Exposed Deepak Gupta and Vivek Ramachandran Security Research Team (Amit, Gopi, Pravin) 1. Summary: WEP Cloaking is a recently proposed anti-WEP-cracking technique that is claiming to be the savior of legacy WLAN devices still replying on WEP encryption. The WEP Cloaking me...
pdf
Harness: Powershell Weaponization Made Easy (or at least easier) Rich Kelley @RGKelley5 What’s this all about anyway? • Audience: Penetration testers Red Teams Powershell activists Python enthusists • Bottom line Powershell weaponization can be somewhat cumbersome Hopefully I’ve made that a little easier wit...
pdf
无文件马 Resin 3.x WebApp Filter 基于 addFilterMapping Servlet 基于 addServletMapping Resin 3.x & 4.x Filter 无文件马 Resin 3.x 内存马相关实现、本地测试版本:resin v3.1.16 WebApp 当前代码运行时上下文环境 配置 web.xml com.example.general.ServletShell#doGet 方法处断点,获得相关的调用栈如下 逐步分析 com.caucho.server.dispatch.ServletInvocation 成员方法 getContextRequest() <servlet>  ...
pdf
How You Can Buy AT&T, T-Mobile, and Sprint Real-Time Location Data on the Black Market Joseph Cox, DEF CON 27 “There is a new bail bond database company that is geo tracking people. People are reselling o the wrong people. Call me [REDACTED]” Id rather explain it telephonically. I know a ton about the subject a...
pdf
www.senseofsecurity.com.au © Sense of Security 2013 Page ‹#› – 13-Sep-13 Compliance, Protection & Business Confidence Sense of Security Pty Ltd ! Sydney Level 8, 66 King Street Sydney NSW 2000 Australia Melbourne Level 10, 401 Docklands Drv Docklands VIC 3008 Australia T: 1300 922 923 T: +61 (0) 2 929...
pdf
An Excerpt from the iDefense 2011 Cyber Threats and Trends Report Dec. 1, 2010 The Verisign® iDefense® Intelligence Operations Team Contents 1 Technology Trends 3 1.1 Malicious Code Trends 3 1.1.1 Anti-analysis Tactics Become More Restrictive 3 1.1.2 Mobile Malware 4 1.1.3 Malware and 64-bit Platforms 5 1.1...
pdf
Scanner Frequencies: Clark County Trunking System, Clark County, Nevada http://radioreference.com/modules.php?name=RR&sid=669 1 of 6 6/18/2007 14:49 NOT LOGGED IN Home · Your Account · Forums · Database · Wiki · Submit Info Search RR Help Desk Clark County System US > Nevada > Clark County System Informati...
pdf
应用程序接口(API) 数据安全研究报告 (2020 年) 中国信息通信研究院安全研究所 2020 年 7 月 版权声明 本报告版权属于中国信息通信研究院安全研究所,并受 法律保护。转载、摘编或利用其它方式使用本报告文字或者 观点的,应注明“来源:中国信息通信研究院安全研究所”。 违反上述声明者,本院将追究其相关法律责任。 前 言 伴随着云计算、大数据、人工智能等技术的蓬勃发展,移动互 联网、物联网产业加速创新,移动设备持有量不断增加,Web 应用、 移动应用已融入生产生活的各个领域。这一过程中,应用程序接口 (Application Programming Interface,API)作为数据传输流转 的重要通道发挥着举足轻重的作...
pdf
Network Anti-Reconnaissance Messing with Nmap Through Smoke and Mirrors - AltF4 Anti-Reconnaissance ● Consider 3 main phases of a network attack: 1) Gain Access 2) Perform Reconnaissance 3) Exploit Vulnerability ● Focusing on the second phase ● Anti-Reconnaissance ● Obscures the network – Obfuscate ● Not Intrusion D...
pdf
Bypassing Authenticated Wireless Networks Dean Pierce Brandon Edwards Anthony Lineberry Introduction to Authenticated Networks An authenticated wireless network is a network which requires a username and password to go online. They are increasingly common, although the same security flaws exist now that existed ...
pdf
账户名 密码 RASCOM 1A2b3C4d56. RAS_admin R1a2b3c4d56. 应急时碰到的一套系统,简单记录下 0x01 硬编码问题 科迈RAS4.0在安装时会创建2个管理员账户 RAS_admin 、 RASCOM ,这两个账户硬编码了2组密码, 这就导致如果机器开了RDP,那么可以通过这两组帐密直接登录 0x02 SQL注入问题 审计的时候发现这套源码通过COM组件形式调用的SQL语句,IDA里看到均为直接拼接,没有做过滤 Server/CmxCheckBind.php python3 sqlmap.py -u "http://10.100.100.133:8088/Server/CmxCheckBind....
pdf
ACL Steganography: Permissions to Hide Your Porn by Michael Perklin Michael Perklin BaISc, MSIA, CISSP, EnCE, ACE Security Professional Corporate Investigator (Cyber-Crime) Digital Forensic Examiner Computer Geek + Legal Support hybrid In This Talk... What is Steganography? Historical examples of physical and digital f...
pdf
利用区块链技术隐藏C&C服务器IP 这个月刚结束的Blackhat亚洲会议上有很多有意思的议题。其中有一个议题:How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover引起了我的兴趣。主要是介绍了攻 击者利用比特币区块链的技术隐藏C&C服务器IP逃避接管的技术。简单学习记录一下。 介绍 网络安全一直是猫捉老鼠的游戏。过去,我们看到恶意软件生态系统采用了诸如代码混淆,多态性,域 生成算法(DGA)以及虚拟机和沙箱规避等概念,只要防御能够对这些威胁进行一致且普遍的抑制。 一些攻击者最近开始使用比特币区块链来传达命令和控制(C&C)信息。由于一旦矿工确认交...
pdf
Advanced Netfilter; Content Replacement (ala Snort_inline) and Port Knocking Based on p0f DEFCON 12 Michael Rash http:/ / www.cipherdyne.org http:/ / www.enterasys.com / 08/ 01/ 2004 Introduction ● Iptables logging form at ● Passive OS fingerprinting with p0f ● What can iptables tell us? ● fwknop ● Iptables string m a...
pdf
M A N N I N G the art of How to take over any company in the world Includes free practice environment ROYCE DAVIS Phase 1: Information gathering Penetration tester MS17-010 MSSQL Server Apache Tomcat Jenkins Discover weaknesses Access vulnerable hosts Take over entire network Provide recommendations Final deliverable ...
pdf
Copyright©2017 Nippon  Telegraph  and  Telephone  Corporation Cybersecurity Talent  Development in  NTT  Group Takehiro Ozaki,  NTT-CERT Mitsuhiro  Hatada,  NTT  Com-SIRT Copyright©2017 Nippon  Telegraph  and  Telephone  Corporation About  us l Takehiro Ozaki l NTT Secure Platform Laboratories lSenior Research Engin...
pdf
INTERSTATE: A Stateful Protocol Fuzzer for SIP Thoulfekar Alrahem, Alex Chen, Nick DiGiussepe, Jefferey Gee, Shang-Pin Hsiao, Sean Mattox, Taejoon Park, Albert Tam, Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA 92697 USA harris@ics.uci.edu Marcel Carlsson FortConsult Tranevej 1...
pdf
codegate WriteUp By StrawHat.md Author: Straw Hat codegate WriteUp By StrawHat.md Pwn ARVM VIMT isolated File-V Web CAFE superbee babyFirst myblog Crypto PrimeGenerator Dark Arts Blockchain Ankiwoom Invest Pwn ARVM from pwn import * context.arch='arm' context.log_level='debug' sc=["mov r0,#0","mov r1,#0x2000","mov r2,#...
pdf
Guests ‘N Goblins: EXPOSING WI-FI EXFILTRATION RISKS AND MITIGATION TECHNIQUES Presenter: Pete Desfigies !  By day : Security Analyst @ TELUS Communications !  By night: break things !  Hobbies: Break more things Presenter: Joshua Brierton !  By Day: SIEM Geek !  By Night: Boat Geek !  Hobbies: Ca...
pdf
It’s assembler, Jim, but not as we know it! Morgan Gangwere DEF CON 26 Hello, I’m Morgan Gangwere and this is It’s assembler, Jim, but not as we know it! We’re going to be looking at some fun shenanigans you can have with embedded devices running Linux (and other things) 1 Dedication Never forget the shoulders you ...
pdf
Attacking Information Visualization System Usability Overloading and Deceiving the Human Gregory Conti Mustaque Ahamad John Stasko College of Computing College of Computing College of Computing Georgia Institute of Technology Georgia Institute of Technology Georgia Institute o...
pdf
Boutique Kit Playing WarGames with expensive rootkits and malware Josh “m0nk” Thomas display( eratta_dc21.drink); This is Ricky… Ricky likes to drink… Drink when you see Ricky… display( eratta_dc21.abuse); Opening Question Hands up if you run Android Keep ‘em up if you run a custom ROM / Kernel Down if you a...
pdf
BSODomizer HD • History • HDMI 101 • FPGA: WTF?! • Design • Challenges In Debt to Our Friends • Kris Bahnsen (l33tbunni) • Raivis Rengelis (RaivisR) • Parker Dillmann (LonghornEngineer) • #tymkrs This project would not have happened without the help, support, and patience of... The Original BSODomizer • Released at DE...
pdf
研发运营安全白皮书 (2020年) 云计算开源产业联盟 OpenSource Cloud Alliance for industry,OSCAR 2020年7月 版权声明 本白皮书版权属于云计算开源产业联盟,并受法律保护。 转载、摘编或利用其它方式使用本调查报告文字或者观点的, 应注明“来源:云计算开源产业联盟”。违反上述声明者,本联 盟将追究其相关法律责任。 前 言 近年来,安全事件频发,究其原因,软件应用服务自身存在代码 安全漏洞,被黑客利用攻击是导致安全事件发生的关键因素之一。随 着信息化的发展,软件应用服务正在潜移默化的改变着生活的各个方 面,渗透到各个行业和领域,其自身安全问题也愈发成为业界关注的 焦点。...
pdf
Roaming Mantis: an Anatomy of a DNS Hijacking Campaign Suguru Ishimaru GReAT APAC Kaspersky Lab Manabu Niseki NTT-CERT NTT SC Labs Hiroaki Ogawa Professional Service McAfee 2 Contents 1. Introduction 2. What is Roaming Mantis 3. MoqHao and SMShing 4. Attribution 5. Conclusions HITCON CMT 2019 $ whoami Introduction of ...
pdf
DIY Electric Car Dave Brown DC forums: RegEdit Voltswagon@live.com Background • 8 years IT • 3 years IT Security • 12 years Electronics & more • FIRST Robotics • Solar Power Station • Solar Water Heater • Rain Barrels • Bike Generator • Murphy Bed • Workbench • Voltswagon Road Map • EV History • EV...
pdf
PHP filter_var Bypass 截⽌ 2022.03.27 ⽆官⽅补 丁 0x00 前⾔ 本⽂是对⽂章 《PHP filter_var shenanigans》中所表述内容的进⼀步测试和学习研究记录。 测试环境:macOS Mojave + PHP 7.4.28 + gdb 0x01 本地环境搭建 下载并切换到希望调试的源码环境 这⾥仅开启必要的扩展组件来编译 编译时可能会遇到如下报错 git clone https://github.com/php/php-src cd php-src/ git checkout PHP-7.4.28 1 2 3 ./buildconf --force ./configure -...
pdf
@patrickwardle STICK THAT IN YOUR (ROOT)PIPE & SMOKE IT “leverages the best combination of humans and technology to discover security vulnerabilities in our customers’ web apps, mobile apps, and infrastructure endpoints” WHOIS @patrickwardle always looking for more experts! xpc, rootpipe, malware, patches & 0days ...
pdf
One Device to Pwn Them All Phil Polstra Bloomsburg University of Pennsylvania @ppolstra http://philpolstra.com What is this talk about? ● A pocket sized device that can be ● Drop box (can be battery powered for days if needed) ● Remote hacking drone (controlled from up to 2 miles away) ● Airborne hacking drone (when c...
pdf
BYPASSING BIOMETRIC SYSTEMS WITH 3D PRINTING Yamila Levalle @ylevalle WHAT IS A BIOMETRIC SYSTEM? { } Behavioural Traits: ● Gait ● Voice ● Signature Physical Traits: ● Iris ● Fingerprint ● Ear Shape ● DNA ● Face ● Vein Pattern HOW BIOMETRIC SYSTEMS WORK? BIOMETRIC SYSTEMS ATTACKS UNITED STATES 2010 PRESENTATION ATTA...
pdf
1 http://www.soldierx.com/defcon18/hacking_docsis_for_fun_and_profit-blake_bitemytaco.ppt Humor 2 Maybe Ted Stevens has a series of hacked modems and a drop amp at his place. Could this be the reason he thinks that the internet is a series of tubes? Background • Personal – I currently do research for S2ERC (Securi...
pdf
July 27-30, 2017 1 2 3 4 5 6 7 8 9 10 11 12 Max Bazaliy Jailbreaking Apple Watch July 27-30, 2017 whoami 1 2 3 4 5 6 7 8 9 10 11 12 o  Security researcher at Lookout o  Lead researcher on Pegasus exploit chain o  Focused on advanced exploitation techniques o  Fried Apple team co-found...
pdf
Mac OS X Server File Services Administration For Version 10.3 or Later 034-2346_Cvr 9/12/03 10:24 AM Page 1  Apple Computer, Inc. © 2003 Apple Computer, Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication for the purpose of learning t...
pdf
Joe Grand aka , Grand Idea Studio, Inc. Jacob Appelbaum aka ioerror Chris Tarnovsky, Flylogic Engineering "Smart" Parking Meter Implementations, Globalism, and You aka Meter Maids Eat Their Young
pdf
Seven  Ways  to Hang  Yourself  with Google  Android Yekaterina Tsipenyuk O'Neil Principal Security Researcher Erika Chin Ph.D. Student at UC Berkeley §  Founding  Member  of  the  Security  Research Group  at  For@fy  (now  an  HP  Company) §  Code  audits,  iden@fying ...
pdf
1. 2. 3. 4. 5. 50k5k 6. 7. 8. 99% 9. 10. 1. 2. 3. 4. 5. 6. ppt 1. apt 2. 3. 2311 1. 2. 3. root rcejb idburp 1. getshell 2. 0daysdl hwgetshellxxx
pdf
Moxie Marlinspike Institute For Disruptive Studies Changing Threats To Privacy moxie@thoughtcrime.org Moxie Marlinspike Institute For Disruptive Studies Moxie Marlinspike Institute For Disruptive Studies Moxie Marlinspike Institute For Disruptive Studies Moxie Marlinspike Institute For Disruptive Studies Moxie Marlinsp...
pdf
INTRODUCTION TO HARDWARE HACKING HOW YOU TOO CAN FIND A DECADE OLD BUG IN WIDELY DEPLOYED DEVICES AVAYA 9600 DESKPHONE —A CASE STUDY WHO AM I ? • PHILIPPE LAULHERET • SENIOR SECURITY RESEARCHER FOR MCAFEE'S ADVANCED THREAT RESEARCH • @PHLAUL • 2 YEARS EMBEDDED SECURITY, 4 YEARS C++ DEV WHY SHOULD YOU CARE ABOUT HARDWA...
pdf
¥10000 Yen Into the Sea Bio: Flipper Job Title:Engineering Technician What: Electric Vehicles Goal: Build a low cost underwater glider “If you want to make an apple pie from scratch, you must first create the universe.” - Carl Sagan What is an underwater glider? Underwater Gliders: -Highly efficient autonomous subma...
pdf
baesystems.com/SWIFT Follow the Money Understanding the money laundering techniques that support large-scale cyber-heists Follow The Money 2 // 28 1. Summary SWIFT plays a key role in helping its community to reinforce and safeguard the integrity of the global financial ecosystem, and maintains a relentless focus on ...
pdf
BeaconEye的原理 Cs的beacon在初始化时会使用 malloc 函数创建一个空间,将beacon的明文信息写入到其中。 这就是一个很明显的检测CobaltStrike的信息, malloc 函数创建的是堆内存,所以只需要遍历每个进程 的堆内存地址就可以了。 当然这一切都归功于很多前辈们对Cobalt Strike的逆向工程。 于是就有了beaconeye的项目https://github.com/CCob/BeaconEye 对于堆内存的查找还有很多注意事项,可以看参考中的文章。 BeaconEye的使用 BeaconEye是c#项目,我对它也不怎么熟悉,下面内容是我自己的方法。 项目-> 属性 设置好.net 框架,我...
pdf
Yang Zhang and his research group (CISPA Helmholtz Center for Information Security) Yun Shen (Spot by NetApp) Azzedine Benameur (Spot by NetApp) All Your GNN Models And Data Belong To Me *All attacks discussed in this talk are simulated in the lab environment. * The Age of Machine Learning Image source (from left t...
pdf
ACTF WriteUp By Nu1L ACTF WriteUp By Nu1L Pwn kkk TreePwn MyKvm Crypto RSA LEAK impossible RSA Web poorui beWhatYouWannaBe ToLeSion gogogo Misc signin Mahjoong safer-telegram-bot-1 BlockChain AAADAO bet2loss Pwn kkk 通过ROP打通parser执⾏shellcode, 然后把提权的exp编码后发送过去执⾏ kkk.ko漏洞出现在加密时以block为单位进⾏加密, 没考虑不对其的情况, 造成堆溢出. 提权的话将packet对...
pdf
Hacking Driverless Vehicles Zoz Intelligent Ground Vehicle Competition Student Unmanned Aerial Systems RoboBoat RoboSub International Aerial Robotics Competition • Advantages: • Energy efficiency • Time efficiency • New applications The Revolution Is Coming The Revolution Is Coming FUD Autonomous/Unmanned Systems Autono...
pdf
CrossC2基本满足了我对linux C2的需求 最近用碎片时间学习和使用了一下CrossC2,可以看出是一线小伙伴结合实战经验写出来的实用性工 具。因此鼓励大家使用和反馈BUG给作者。 1. 什么是CrossC2 CrossC2是一款扩展CobaltStrike在Linux、Android、IOS等系统上使用的闭源免费工具,作者编写了较 为详细的使用文档,可以很快上手。详情请阅读:https://gloxec.github.io/CrossC2/zh_cn/ CobaltStrike: 暂时仅支持3.14最后一个版本(bug fixs), 以及4.x版本(详见cs4.1分支). Linux: 特别老旧的系统可以选择cna中的"L...
pdf
Bvp47 美国NSA方程式的顶级后门 技术细节 版本1.7 目录Contents 1. 摘要 2. 前所未见的后门 3. 后门程序概览 – Bvp47 4. 组织关联和溯源 “The Shadow Brokers Leaks”事件关联 非对称算法私钥匹配 样本深度关联 完整控制命令行 斯诺登事件关联 Bvp47—美国 NSA 方程式组织的顶级后门 文件结构 文件属性 文件结构 使用场景 4 4 4 6 1 2 4 8 8 9 9 12 13 15 5. 遍布全球的受害者 泄露出的受害者信息 利用受害主机作为跳板攻击目标 6. Bvp47后门技术详解 主要行为 Payload 字符串加解密 函数名混淆技巧 Bvp 引擎 系统 Hoo...
pdf
Game of Chromes: Owning the Web with Zombie Chrome Extensions Abstract 2 Malicious Extensions Analysis 3 Malicious Extension I - Bot distribution through Facebook and Wix.com 3 Malicious Extension II - Bot distribution through Facebook and Google Drive 6 Vulnerable Extensions Analysis 8 Vulnerable Extension I ...
pdf
All Your RFz Are Belong to Me: Hacking the Wireless World with  Software Defined Radio Balint  Seeber balint@spench.net @spenchdotnet Notes and links in PDF comments on each slide Applications Engineer balint@ettus.com Overview • RF 101 • The journey into Software Defined Radio • Hospital pager systems • Tracking plane...
pdf
Microservices and FaaS for Offensive Security Ryan Baxendale $ whoami Ryan Baxendale Penetration Tester Centurion Information Security Pte Ltd - www.centurioninfosec.sg Singapore twitter.com/ryancancomputer github.com/ryanbaxendale linkedin.com/in/ryanbaxendale AWS Lambda Jan 2015 - AWS Lambda Preview Open to all AWS ...
pdf
PHPCHIP.COM PHP动态特性的捕捉与逃逸 Phith0n 2019 About Me phith0n • https://www.leavesongs.com • http://weibo.com/101yx • https://github.com/phith0n 长亭科技 • https://github.com/chaitin/xray 精通 • PHP • Python • Golang • Javascript 等语言Hello World程序的拼写 目录 CONTENTS PART 01 PHP与动态特性 01 PART 02 如何检测PHP动态特性 02 PART 03 从攻击者的角度突破限制 03 • P...
pdf
Java类加载机制 本⽂发表于赛博回忆录。 正如我们学习Java安全⼀样,⼤家都知道,RCE是第⼀⽣产⼒,那么就要从Java的类加载机制和反射机制 这两类基础开始学习,下⾯我们来由浅⼊深的了解⼀下Java的类加载机制。 Java是⼀个靠JVM实现编译运⾏,从⽽跨平台的⼀个开发语⾔。 然后在虚拟机中默认了提供了了三种类加载器,启动类加载器(Bootstrap ClassLoader)、扩展类加载 器(Extension ClassLoader)、应⽤类加载器(Application ClassLoader) 双亲委派模型 三种不同的加载器,那么⼜存在⼀个谁加载,加载顺序是什么的问题,其⼤概的加载顺序可以通过学习 双亲委派模型来了解 J...
pdf
Welcome Home! Internet Open Telemetry Martin Hron security researcher HITCON 2018 Buzzword 2 A word or phrase which has become fashionable or popular, or sounds technical or important and is used to impress people 3 So let’s talk about IoT What is IoT? 4 Flashback: How it has started 5 • Make my house smart. DYI way. F...
pdf
You Spent All That Money ...And You Still Got Owned Presented By: Joe McCray joe@learnsecurityonline.com http://www.linkedin.com/in/joemccray http://twitter.com/j0emccray Let me take you back.... Step 1: Tell customer you are 31337 security professional Customers only applied patches if it fixed something on the syst...
pdf
从数据视角探索安全威胁 阿里云安全工程师 / cdxy whoami 0 cdxy 数据分析 / 威胁感知 异常数据清洗 1 信息穿透模型 2 Nday感知 3 落地思考 4 目录 | Content 异常数据清洗 1 Chapter 1 威胁感知模型基础 异常基线A 异常基线B 复杂模型 异常数据清洗的价值 云环境威胁感知现状 挑战 异常数据清洗价值 百万主机 PB级数据 有限的存储、计算资源 以不损失告警为前提 压缩数据量 业务场景复杂 运营资源有限 通用性、准确率要求高 理解业务特征 提升告警置信度 代码类日志清洗——词法分析 参数类日志清洗——字...
pdf
h"p://Irongeek.com0 Adrian0Crenshaw0 h"p://Irongeek.com0 !  I0run0Irongeek.com0 !  I0have0an0interest0in0InfoSec0 educa=on0 !  I0don’t0know0everything0@0I’m0just0a0 geek0with0=me0on0my0hands0 !  Sr.0Informa=on0Security0Consultant0 at0TrustedSec0 !  Co@Founder0of0Derbycon0 h"p://www.derbycon.com000 Twitter: @Irongeek_AD...
pdf
⾸先给LDC,添加对⽤⼾账⼾ kaba 的基于资源的约束委派 接着申请到⽬标机器的票据: C:\Users\Administrator\Desktop>SharpAllowedToAct.exe -m kaba -u administrator -p 1qaz2WSX -t KASPERSKY -a LDC.dev.pig.com -d dev.pig.com [+] Domain = dev.pig.com [+] Domain Controller = LDC.dev.pig.com [+] Machine added by the attacker = [+] Distinguished Name = CN=kaba,CN=...
pdf
Fuzzit: A Mobile Fuzzing Tool  Kevin Mahaffey   John Hering  Anthony Lineberry  Flexilis – http://www.flexilis.com  Introduction to Fuzzit  Fuzzit is a tool designed to find vulnerabilities in mobile devices.  It implements a testing technique that  most readers will be familiar with called fuzzing.  In short, fuzzing ...
pdf
Advanced Physical Security Beyond Dumpster Diving and Social Engineering or, Screw the Firewall and the Secretary Too Eric Schmiedl security.ericschmiedl.com “We Want Information… Information… Information… “ “You won’t get it.” “By hook or by crook, we will…” – The Prisoner (1967) "Many of Russia's wealthiest banks...
pdf
1 The Tor Project Our mission is to be the global resource for technology, advocacy, research and education in the ongoing pursuit of freedom of speech, privacy rights online, and censorship circumvention. 2 ● Online Anonymity – Open Source – Open Network ● Community of researchers, developers, users and relay ...
pdf
Evolving Exploits through Genetic Algorithms By soen Who am I v  CTF Player v  Programmer v  Virus / Worm Aficionado v  Computer Scientist v  Penetration Tester in daylight Domain Constraints v  What we will cover v  SQL injection (MySQL, SQL, MSSQL, Oracle) v  Command injection (Bash, CMD, PHP, Py...
pdf
Let’s Sink The Phishermen’s Boat! =DEFCON 16 @ Las Vegas, Nevada= Teo Sze Siong, <teo.sze.siong@f-secure.com> F-Secure Corporation Why this topic? • Internet banking has become more and more preferred choice • Yet, many people don't understand the risk they are facing in online banking Do you think the following prac...
pdf
Next Generation Data Forensics & Linux Thomas Rude, CISSP August 2002 Agenda Thomas Rude, © 2002 ● Overview of Data Forensics ● Agents of Change ● Future of Data Forensics ● Linux as Next Generation Data Forensics platform ● Questions Data Forensics, Infancy Thomas Rude, © 2002 Historically data forensics has focus...
pdf
从开发到漏洞挖掘的角色转换 王纬 2020-06-05 关于我 • ID: Proteas – Weibo: @Proteas – Twitter: @ProteasWang • 3 年 Windows C++ 开发经验。 • 5 年 iOS App 开发经验。 • 5 年 iOS & macOS 漏洞挖掘经验。 • 目前处于技术理想主义与技术现实主义之间。 主要内容 • 背景与约束 • 漏洞挖掘与利用 • 为什么要转漏洞挖掘 • 如何转到漏洞挖掘 • 结语 背景与约束 • 每个人眼里都有一个世界。 • 每个人都有自己的局限性。 • 经验是不可传承的, • 每个人都有属于自己的路, • 但仍希望本文能对你有所帮助。 背景与约束 • ...
pdf
问了下师傅,目标有个php dz的站有一个aspx的站,从aspx的读取文件读取到 web.config文件内容,是sa账号,但是降权了,而且传不到aspx文件网站目录里面, 只能传到dz的网站里面,一个asp冰蝎马。   用了师傅的网站看下进程(皮一下哈哈)   上次说过了,iis权限就算是管理员权限都一样,powershell啥的net net1肯定是没戏 的。你直接穿exe也是没戏的,连query user都看不了,也断掉了我们传exp上去提 权。   首先在aspx站找到了sa账号密码和dz的config目录里面找到了root账号i密码。   主要是有的马被杀了,而且由于我对sql server熟悉一点,所以直接执行。   ...
pdf
Time-Based Blind SQL Injection using Heavy Queries A practical approach for MS SQL Server, MS Access, Oracle and MySQL databases and Marathon Tool Authors: Chema Alonso, Daniel Kachakil, Rodolfo Bordón, Antonio Guzmán y Marta Beltrán Speakers: Chema Alonso & José Parada Gimeno Abstract: This document describes...
pdf
Performance Improvements on Tor or, Why Tor is slow and what we’re going to do about it Roger Dingledine Steven J. Murdoch March 11, 2009 As Tor’s user base has grown, the performance of the Tor network has suffered. This document describes our current understanding of why Tor is slow, and lays out our options for fixing...
pdf
CableTap Wirelessly Tapping your Home Network Marc Newlin Bastille Networks marc@bastille.io @marcnewlin Logan Lamb Bastille Networks logan@bastille.io Christopher Grayson Web Sight chris@websight.io @_lavalamp Welcome to the LineCon after-party. Marc Newlin (@marcnewlin) Wireless Security Researcher @ Bastille Netwo...
pdf
SnakeYaml SnakeYaml SnakeYaml SnakeYaml SnakeYaml SPI ScriptEngineManager C3P0 ScriptEngineManager Reference SnakeYaml snakeyamlyamlyamlxmlproperties SpringyamlSnakeYamlYAML1.1 ProcessorUTF-8/UTF-16Java/YAML yamlhttps://www.yiibai.com/yaml Spring ymlyamlpocyml yamlhttps://www.345tool.com/zh-hans/formatter/yaml-format...
pdf
DefCon (China) 1, Beijing 2019 打破后端限制! Gregory Pickett, 获得CISSP, GCIA, GPEN等 多项认证 芝加哥, 伊利利诺斯州 gregory.pickett@hellfiresecurity.com Hellfire Security 概述   交通系统   逆向⼯工程   我的发现   漏漏洞洞利利⽤用   经验总结 简史  地铁⿊黑客剖析(2008)  NFC地铁⿊黑客(2012)  如何侵⼊入全国交通⽹网络(2012)  利利⽤用边信道攻击破解韩国交通卡 (2017) 有何不不同  绝不不违法  我们不不会偷偷溜溜进⻋车站  ...
pdf
Ways for Web Dogs to Find Linux Privilege Escalation Vulnerabilities Hunting Vulnerabilities of D-Bus Services Ricter Z @ 360 Noah Lab $ cat /AGENDA.txt • What is D-Bus? • D-Bus authentication and PolicyKit • D-Bus services debug tricks • Common exploits for Linux privilege escalation • Real-word examples: polkit CVE,...
pdf
HTTP/2: The Sequel is Always Worse James Kettle - james.kettle@portswigger.net - @albinowax HTTP/2 is easily mistaken for a transport-layer protocol that can be swapped in with zero security implications for the website behind it. Two years ago, I presented HTTP Desync Attacks and kicked off a wave of request smuggling...
pdf
apache 0x00 apachercepayloaddos 0x01 ProxyRequests On GET http://www.baidu.com HTTP/1.1 apache unix socket 48payload GET unix:/A*4096/aaa|http://www.baidu.com HTTP/1.1 48unix socket unix payload GET unix:/A*4096/aaa|aaa HTTP/1.1 httpd 0x02 coredumpapache coredump apachecoredump 1. ulimit -S -c unlimited 2. ap...
pdf
VMProtect的一次奇妙之旅 何潇潇@永信至诚 VMProtect是什么 VMProtect背后的原理 还原VMProtect的方法 演示还原 总结 CONTENTS 8/27/16'2:30PM 2 VMProtect是什么? VMProtect是世界上最强大的二进制代码保护软件之一,是由俄 罗斯人开发的,至今没有人公开声称对其完全破解。 03 8/27/16'2:30PM 2 VMProtect是什么? 01 一个基于堆 栈机的intel指 令的模拟器 02 通过编译,把intel 指令编译成精心 设计的一组虚拟 指令(PCode) 特定的解释引 擎,用于解释 执行上述的虚 拟指令 从本质来讲,VMProtect是 8/27...
pdf
github上的rkxxz/CVE-2022-26809钓鱼攻 击分析 看到群⾥有⼈分享CVE-2022-26809 https://github.com/rkxxz/CVE-2022-26809的exp,并且 readme.md还写的有模有样的。 前⼏天不是有师傅分析了不能RCE吗?怎么这就出来exp了?还msf上线? 事出反常必有妖, 赶紧下载⼆进制来分析⼀把。 # Loader分析 下载样本发现是⼀个 .net的程序 ⽤dnspy加载起来,看⼀下,外围的程序仅仅是⼀个loader,在内部解密了⼀个模块,然后 ⽤ executingAssembly.LoadModule 加载起来。 动态调试⼀下,把⾥⾯的模块dump出来,接下来...
pdf
Saif El-Sherei & Etienne Stalmans What is Fuzzing?? Fuzzing is feeding an Application with malformed input in hope to find errors and faults in the application code and with a bit of luck these faults can lead to exploitable vulnerabilities Basic History of Fuzzing • 1988-199: • Boris Beizer Syntax Testing. ...
pdf
DDoS Protecion Total AnnihilationD DDoS Mitigation Lab A DDoS Mitigation Lab Independent academic R&D division of Nexusguard building next generation DDoS mitigation knowledge and collaborate with defense community. Industry body formed to foster synergy among stakeholders to promote advancement in DDoS defense know...
pdf
Rooting macOS Big Sur on Apple Silicon Xinru Chi and Tielei Wang About us • Xinru Chi • Security Researcher in Pangu Lab • Extensive experience in macOS/iOS vulnerability research • Tielei Wang • Ph.D from PKU, Research scientist at Georgia Tech from 2011-2014 • Known for releasing jailbreak tools for iOS 7-9 • Organ...
pdf
Browser-Powered Desync Attacks James Ke(le A New Frontier in HTTP Request Smuggling Warning / disclaimer These slides are intended to supplement the presenta1on. They are not suitable for stand-alone consump1on. You can find the whitepaper and presenta1on recording here: h=ps://portswigger.net/research/browser-powered...
pdf
Evading next-gen AV using A.I. Hyrum Anderson hyrum@endgame.com @drhyrum /in/hyrumanderson The Promise of Machine Learning • Learn from data what constitutes malicious content or behavior • Discriminatory patterns learned automatically, not obviously constructed by hand • Generalize to never-before-seen samples and ...
pdf
I am packer and so can you Mike Sconzo Agenda* *Powered by business synergy It’s all about me! •  Threat Research at Bit9 + Carbon Black •  Enjoy static analysis, machine learning, network forensics, and eating BBQ and pie (yes, I live in TX) •  SecRepo.com •  @sooshie What’s the problem? Detecting packers, ...
pdf
S-再看tomcat架构与请求处理流程 tomcat核心功能 1. http服务器,socket通信(TCP/IP) 2. servlet容器 http服务器--coyote 1. EndPoint组件:用于处理连接请求,也就是接收客户端发来的请求 2. Processor组件:用于应用层处理http请求,封装http报文。 server.xml 配置文件 Tomcat启动过程源码剖析 <?xml version="1.0" encoding="UTF-8"?> <Server port="8005" shutdown="SHUTDOWN">  <Listener className="org.apache.catalina.st...
pdf
DEF CON 18 “This is not the droid you’re looking for…” Nicholas J. Percoco & Christian Papathanasiou Copyright Trustwave 2010 Agenda •  About Us / Introduction •  Introduction to Android •  Motivations Behind this Work •  Building a Linux Kernel Rootkit •  Overcoming Hurdles •  Introducing Mindtrick – The An...
pdf
1 WEB⾮实⽤之Burp的AutoRepeater使⽤ LxLN 前⾔ LxLO 安装⽅法 LxLP 使⽤例⼦ LxLP.N ssrf检测 LxLP.O 未授权检测 LxLP.P 越权检测 LxLQ 其它 0x01 前⾔ 0x02 安装⽅法 Plain Text 复制代码 以前想写⼀个SSRF的检测⼯具,后⾯和朋友⼀聊,感觉⼀直使⽤的AutoRepeater就可以做到 尝试使⽤了这么久,使⽤这个插件挖到的漏洞也不少了,感觉是真实可⽤的 于是作为⼀个专业的狗推,我就要开始推荐AutoRepeater了 它作为⼀个burp⼯具,可以极⼤的简化⼿⼯测试的效率 我常⽤于该⼯具拿来检测SSRF,未授权,越权(平⾏,垂直) 下⾯就简单介绍...
pdf
Mach-o Malware Analysis: Combatting Mac OSX/iOS Malware with Data Visualization INCOMPLETE DRAFT: PLEASE SEE LAST PAGE FOR FINAL PPTX Remy Baumgarten Security Engineer at ANRC Services https://www.linkedin.com/in/remybaumgarten Website: anrc-services.com Twitter: @anrctraining Friday, July 12, 13 About me mobile malw...
pdf
Androsia Securing 'data in process' for your Android Apps C:\>whoami • Samit Anwer • Product Security Team @Citrix R&D India Pvt Ltd • Web/Mobile App Security Enthusiast • Speaker: • AppSec USA (Orlando, USA) 2017, • c0c0n (Cochin, India) 2017, • CodeBlue (Tokyo, Japan) 2017, • IEEE Services (Anchorage, Alaska) 2014,...
pdf
360雲安全 全球最大的雲安全系統 360副總裁 陸劍鋒 2010-07 木馬——互聯網時代的主要安全威脅 • 單機系統時代,病毒是電腦安全的主要威脅 –傳播介質:磁片等移動介質 –傳播方式:交叉感染 –傳播目的:破壞電腦系統 • 互聯網路時代,木馬是電腦安全的主要威脅 –傳播介質:互聯網路 –傳播方式:網格狀交叉模式 –傳播目的:非法獲取財產 木馬侵犯使用者財產的方式多種多樣 • 木馬形式多樣,角色各異 –盜號木馬:盜取虛擬財產 –僵屍網路:對網站等攻擊、勒索 –肉雞木馬:在用戶的電腦中彈出廣告 –間諜木馬:竊取隱私和商業機密 肉雞 高額利潤催生木馬黑色產業鏈 • 產業中的木馬利益鏈 –造馬 –改馬 –賣馬 –買馬 –發馬 –掛馬...
pdf
Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing Chris Conley ACLU of Northern California cconley@aclunc.org | @ManConley Chris Conley ACLU of Northern California cconley@aclunc.org | @ManConley
pdf
Hydra • Advanced x86 polymorphic engine • Incorporates existing techniques and introduces new ones in one package • All but one feature OS-independent Random register operations • Different synonymous instructions per invocation. • Hydra provides a large library of such instructions and a platform to add more. • For ...
pdf
⼤型企业应用安全⽅案 钟卫林 OWASP 亚洲峰会 深圳 2017年 7月 ⼤型企业应用安全的挑战 • 规模 (Scalability) • 应用数量 • 代码数量 • 开发⼈员数量 • 团队/业务数量 ⼤型企业应用安全的挑战 • 复杂度 (Complexity) • 应用类型 • 编程语⾔类型 • 技术类型 • 编译环境 • 团队架构和⽂化 ⼤型企业应用安全的挑战 • 效率 (Efficiency) • 扫描速度 • 扫描容量 • 系统资源 • ⼯具安装 • ⼯具使用 • 流程集成 ⼤型企业应用安全的挑战 • 效用 ( Effectiveness) • 结果质量 • 准确度 • 从发现到修复 • 与现有环境流程的集成 ⼤型企业应用...
pdf
Windows 本地提权在野 0day 狩猎之旅 Quan Jin <twitter: @jq0904> DBAPPSecurity Black Hat USA 2022 注:本文是作者在今年 Black Hat USA 2022 演讲议题的中文版 摘要 本文将讲述我们如何在 2020-2021 两年间狩猎 Windows 本地提权在野 0day 的故事:为什 么我们觉得这件事可行,我们如何研究历史案例,我们如何用学到的经验开发一套检测系统, 以及我们如何改进这套系统使之变得更准确。通过使用这套系统,我们成功捕获了两个 Windows 本地提权在野 0day 和一个 Windows 本地提权在野 1day。 此外,我们...
pdf
Password Cracking on a Budget Matt Weir Dr. Sudhir Aggarwal Florida State University Special Thanks To • Bill Glodek • Professor Breno de Medeiros • National Institute of Justice About Me • Name - Matt Weir • Occupation - PhD Student, Florida State University • Previously worked for Northrop Grumman TASC - Network ...
pdf
1 JDBC反序列化⼊⻔学习 JDBC? 测试环境 建⽴JDBC连接 反序列化简单介绍 断点调试 构造POC show session status响应包 Exp 补充 资料(原⽂) 不复制粘贴了,⻅JDBC基础介绍 IDEA Mysql 5.7 https://www.runoob.com/java/java-mysql-connect.html 学习来源 https://xz.aliyun.com/t/8159 JDBC? 1 Java Database Connectivity 测试环境 建⽴JDBC连接 2 下载驱动包 https://dev.mysql.com/downloads/connector/j/ 不要下最新的,估...
pdf
Meme Mining for Fun Meme Mining for Fun and Profit and Profit By Broward Horne By Broward Horne DefCon DefCon 13 13 33--Part Presentation Part Presentation Tactical Tactical –– MemeMiner MemeMiner Parlor Tricks Parlor Tricks Operational Operational –– SS--curve theory curve theory Strategic Strategic –– Social ...
pdf
July 2017 HPE Software Security Research Paper Introduction Security issues with deserialization of untrusted data in several programming languages have been known for many years. However, it got major attention on 2016 which will be remembered as the year of Java Deserialization apocalypse. Despite being a known...
pdf
Quantum Computing 101: How to Crack RSA Walter C. Daugherity Department of Computer Science Texas A&M University BH2002@security.mailshell.com Quantum Computing - Daugherity Biography Walter C. Daugherity is a Senior Lecturer in Computer Science and Electrical Engineering at Texas A&M University. He received a bach...
pdf