text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
THE ROAD LESS
SURREPTITIOUSLY
TRAVELED
@pukingmonkey
DEF CON 21
THE LOSS OF LOCATIONAL PRIVACY
WHILE TRAVELING IN YOUR
AUTOMOBILE
– Automatic License Plate Readers (ALPRs)
– Snitch devices in your car
• Transponder based Electronic Toll Collection
(ETC)
• GPS
• S... | pdf |
【技术分享】Exchange渗透测试总结
本期安仔课堂,ISEC实验室的唐老师将为大家介绍Exchange相关知识点,欢迎感兴趣的
朋友一起交流学习。
一 、Exchange概述
Exchange是微软出品的邮件服务器系统,凭借其强大的功能优势被应用到很多企业、学校的
邮件系统搭建中。
截至目前,Exchange已有多个成熟版本,例如:Exchange Server 2010、2013、2016及最
新版本2019。此外,Exchange又可分为Exchange Server和Exchange Online ,为了方便,
本文将主要以本地Exchange Server 2010为例进行演示。
二、组成
首先,让我们一起了解下Exch... | pdf |
Discovering+and+Triangulating+Rogue+Cell+Towers
Eric%Escobar,%PE
Security%Engineer
What+is+a+rogue+cell+tower?
•
A+device+created+by+governments+or+hackers+that+has+the+ability+
to+trick+your+phone+into+thinking+it’s+a+real+cell+phone+tower.
•
Also+known+as+IMSI+catchers,+interceptors,+cell-site+simulators,+
Stingrays,... | pdf |
When Lawyers Attack! - Dealing With the New Rules
of Electronic Discovery
John E. Benson, Esq.
A Companion to the Presentations
Given at Blackhat USA 2008 and DEFCON 15
August 2008
Author’s Note
I hope that my talks and these materials help alleviate some of the confusion that has been
created by the advent of ele... | pdf |
1
从⼀次实战,聊聊获取源代码的姿势
Liquid Files
LxLL ⼀般思路
LxLN 试⽤
LxLO 柳暗花明
LxLP 单⽤户模式
LxLQ 后台鸡肋命令执⾏(低权限)
EXP
进c神的圈⼦也挺久,还没有发过帖⼦,于是借最近的⼀个案例,来聊聊实战中获取源码的⼀些姿势。
(也是前段时间某次闭⻔分享的素材: hope you guys enjoy it~
Liquid Files是国外的⼀款⽹盘,官⽹:https://www.liquidfiles.com/
Liquid Files
2
是收费的⼀套系统,⽼外⽤得多。
咱们今天就来试试获取这套系统的源代码,并进⾏前期的攻击⾯评估(初步的代码审计)
正如我在⽂章《记⼀次Java... | pdf |
The Emperor Has No Cloak - WEP Cloaking Exposed
Deepak Gupta and Vivek Ramachandran
Security Research Team (Amit, Gopi, Pravin)
1. Summary:
WEP Cloaking is a recently proposed anti-WEP-cracking technique that is claiming to
be the savior of legacy WLAN devices still replying on WEP encryption. The WEP
Cloaking me... | pdf |
Harness: Powershell
Weaponization Made
Easy (or at least easier)
Rich Kelley
@RGKelley5
What’s this all about anyway?
• Audience:
Penetration testers
Red Teams
Powershell activists
Python enthusists
• Bottom line
Powershell weaponization can be somewhat cumbersome
Hopefully I’ve made that a little easier wit... | pdf |
无文件马
Resin 3.x
WebApp
Filter
基于 addFilterMapping
Servlet
基于 addServletMapping
Resin 3.x & 4.x
Filter
无文件马
Resin 3.x
内存马相关实现、本地测试版本:resin v3.1.16
WebApp
当前代码运行时上下文环境
配置 web.xml
com.example.general.ServletShell#doGet 方法处断点,获得相关的调用栈如下
逐步分析
com.caucho.server.dispatch.ServletInvocation
成员方法 getContextRequest()
<servlet>
... | pdf |
How You Can Buy AT&T,
T-Mobile, and Sprint
Real-Time Location Data
on the Black Market
Joseph Cox, DEF CON 27
“There is a new bail bond database
company that is geo tracking people.
People are reselling o the wrong people.
Call me [REDACTED]”
Id rather explain it telephonically. I
know a ton about the subject a... | pdf |
www.senseofsecurity.com.au
© Sense of Security 2013
Page ‹#› – 13-Sep-13
Compliance, Protection & Business Confidence
Sense of Security Pty Ltd
!
Sydney
Level 8, 66 King Street
Sydney NSW 2000 Australia
Melbourne
Level 10, 401 Docklands Drv
Docklands VIC 3008 Australia
T: 1300 922 923
T: +61 (0) 2 929... | pdf |
An Excerpt from the iDefense 2011
Cyber Threats and Trends Report
Dec. 1, 2010
The Verisign® iDefense® Intelligence Operations Team
Contents
1 Technology Trends
3
1.1 Malicious Code Trends
3
1.1.1 Anti-analysis Tactics Become More Restrictive
3
1.1.2 Mobile Malware
4
1.1.3 Malware and 64-bit Platforms
5
1.1... | pdf |
Scanner Frequencies: Clark County Trunking System, Clark County, Nevada
http://radioreference.com/modules.php?name=RR&sid=669
1 of 6
6/18/2007 14:49
NOT LOGGED IN
Home · Your Account · Forums · Database · Wiki · Submit Info
Search
RR Help Desk
Clark County System
US > Nevada > Clark County
System Informati... | pdf |
应用程序接口(API)
数据安全研究报告
(2020 年)
中国信息通信研究院安全研究所
2020 年 7 月
版权声明
本报告版权属于中国信息通信研究院安全研究所,并受
法律保护。转载、摘编或利用其它方式使用本报告文字或者
观点的,应注明“来源:中国信息通信研究院安全研究所”。
违反上述声明者,本院将追究其相关法律责任。
前
言
伴随着云计算、大数据、人工智能等技术的蓬勃发展,移动互
联网、物联网产业加速创新,移动设备持有量不断增加,Web 应用、
移动应用已融入生产生活的各个领域。这一过程中,应用程序接口
(Application Programming Interface,API)作为数据传输流转
的重要通道发挥着举足轻重的作... | pdf |
Network Anti-Reconnaissance
Messing with Nmap Through Smoke and Mirrors
- AltF4
Anti-Reconnaissance
● Consider 3 main phases of a network attack:
1) Gain Access
2) Perform Reconnaissance
3) Exploit Vulnerability
● Focusing on the second phase
● Anti-Reconnaissance
● Obscures the network
– Obfuscate
● Not Intrusion D... | pdf |
Bypassing Authenticated Wireless
Networks
Dean Pierce
Brandon Edwards
Anthony Lineberry
Introduction to
Authenticated Networks
An authenticated wireless network is a
network which requires a username and
password to go online.
They are increasingly common, although the
same security flaws exist now that existed
... | pdf |
账户名
密码
RASCOM
1A2b3C4d56.
RAS_admin
R1a2b3c4d56.
应急时碰到的一套系统,简单记录下
0x01 硬编码问题
科迈RAS4.0在安装时会创建2个管理员账户 RAS_admin 、 RASCOM ,这两个账户硬编码了2组密码,
这就导致如果机器开了RDP,那么可以通过这两组帐密直接登录
0x02 SQL注入问题
审计的时候发现这套源码通过COM组件形式调用的SQL语句,IDA里看到均为直接拼接,没有做过滤
Server/CmxCheckBind.php
python3 sqlmap.py -u "http://10.100.100.133:8088/Server/CmxCheckBind.... | pdf |
ACL Steganography:
Permissions to Hide Your Porn
by Michael Perklin
Michael Perklin
BaISc, MSIA, CISSP, EnCE, ACE
Security Professional
Corporate Investigator (Cyber-Crime)
Digital Forensic Examiner
Computer Geek + Legal Support hybrid
In This Talk...
What is Steganography?
Historical examples of physical and digital f... | pdf |
利用区块链技术隐藏C&C服务器IP
这个月刚结束的Blackhat亚洲会议上有很多有意思的议题。其中有一个议题:How Did the
Adversaries Abusing Bitcoin Blockchain Evade Our Takeover引起了我的兴趣。主要是介绍了攻
击者利用比特币区块链的技术隐藏C&C服务器IP逃避接管的技术。简单学习记录一下。
介绍
网络安全一直是猫捉老鼠的游戏。过去,我们看到恶意软件生态系统采用了诸如代码混淆,多态性,域
生成算法(DGA)以及虚拟机和沙箱规避等概念,只要防御能够对这些威胁进行一致且普遍的抑制。
一些攻击者最近开始使用比特币区块链来传达命令和控制(C&C)信息。由于一旦矿工确认交... | pdf |
Advanced Netfilter; Content Replacement (ala
Snort_inline) and Port Knocking Based on p0f
DEFCON 12
Michael Rash
http:/ / www.cipherdyne.org
http:/ / www.enterasys.com /
08/ 01/ 2004
Introduction
● Iptables logging form at
● Passive OS fingerprinting with p0f
● What can iptables tell us?
● fwknop
● Iptables string m a... | pdf |
M A N N I N G
the art of
How to take over any
company in the world
Includes free practice environment
ROYCE DAVIS
Phase 1:
Information gathering
Penetration
tester
MS17-010
MSSQL
Server
Apache Tomcat
Jenkins
Discover
weaknesses
Access
vulnerable
hosts
Take over
entire network
Provide
recommendations
Final
deliverable
... | pdf |
Copyright©2017 Nippon Telegraph and Telephone Corporation
Cybersecurity
Talent Development
in NTT Group
Takehiro Ozaki, NTT-CERT
Mitsuhiro Hatada, NTT Com-SIRT
Copyright©2017 Nippon Telegraph and Telephone Corporation
About us
l Takehiro Ozaki
l NTT Secure Platform Laboratories
lSenior Research Engin... | pdf |
INTERSTATE: A Stateful Protocol Fuzzer for SIP
Thoulfekar Alrahem, Alex Chen, Nick DiGiussepe, Jefferey Gee, Shang-Pin Hsiao, Sean Mattox,
Taejoon Park, Albert Tam, Ian G. Harris
Department of Computer Science
University of California Irvine
Irvine, CA 92697 USA
harris@ics.uci.edu
Marcel Carlsson
FortConsult
Tranevej 1... | pdf |
codegate WriteUp By StrawHat.md
Author: Straw Hat
codegate WriteUp By StrawHat.md
Pwn
ARVM
VIMT
isolated
File-V
Web
CAFE
superbee
babyFirst
myblog
Crypto
PrimeGenerator
Dark Arts
Blockchain
Ankiwoom Invest
Pwn
ARVM
from pwn import *
context.arch='arm'
context.log_level='debug'
sc=["mov r0,#0","mov r1,#0x2000","mov r2,#... | pdf |
Guests ‘N Goblins:
EXPOSING WI-FI EXFILTRATION RISKS AND MITIGATION TECHNIQUES
Presenter: Pete Desfigies
! By day : Security Analyst @ TELUS Communications
! By night: break things
! Hobbies: Break more things
Presenter: Joshua Brierton
! By Day: SIEM Geek
! By Night: Boat Geek
! Hobbies: Ca... | pdf |
It’s assembler,
Jim, but not as
we know it!
Morgan Gangwere
DEF CON 26
Hello, I’m Morgan Gangwere and this is It’s assembler, Jim, but not as we know it!
We’re going to be looking at some fun shenanigans you can have with embedded
devices running Linux (and other things)
1
Dedication
Never forget the
shoulders you ... | pdf |
Attacking Information Visualization System Usability
Overloading and Deceiving the Human
Gregory Conti
Mustaque Ahamad
John Stasko
College of Computing
College of Computing
College of Computing
Georgia Institute of Technology
Georgia Institute of Technology
Georgia Institute o... | pdf |
Boutique Kit
Playing WarGames with expensive rootkits and malware
Josh “m0nk” Thomas
display( eratta_dc21.drink);
This is Ricky…
Ricky likes to drink…
Drink when you see Ricky…
display( eratta_dc21.abuse);
Opening Question
Hands up if you run Android
Keep ‘em up if you run a custom ROM / Kernel
Down if you a... | pdf |
BSODomizer HD
• History
• HDMI 101
• FPGA: WTF?!
• Design
• Challenges
In Debt to Our Friends
• Kris Bahnsen (l33tbunni)
• Raivis Rengelis (RaivisR)
• Parker Dillmann (LonghornEngineer)
• #tymkrs
This project would not have happened without the
help, support, and patience of...
The Original BSODomizer
• Released at DE... | pdf |
研发运营安全白皮书
(2020年)
云计算开源产业联盟
OpenSource Cloud Alliance for industry,OSCAR
2020年7月
版权声明
本白皮书版权属于云计算开源产业联盟,并受法律保护。
转载、摘编或利用其它方式使用本调查报告文字或者观点的,
应注明“来源:云计算开源产业联盟”。违反上述声明者,本联
盟将追究其相关法律责任。
前 言
近年来,安全事件频发,究其原因,软件应用服务自身存在代码
安全漏洞,被黑客利用攻击是导致安全事件发生的关键因素之一。随
着信息化的发展,软件应用服务正在潜移默化的改变着生活的各个方
面,渗透到各个行业和领域,其自身安全问题也愈发成为业界关注的
焦点。... | pdf |
Roaming Mantis:
an Anatomy of a DNS
Hijacking Campaign
Suguru Ishimaru
GReAT APAC
Kaspersky Lab
Manabu Niseki
NTT-CERT
NTT SC Labs
Hiroaki Ogawa
Professional Service
McAfee
2
Contents
1. Introduction
2. What is Roaming Mantis
3. MoqHao and SMShing
4. Attribution
5. Conclusions
HITCON CMT 2019
$ whoami
Introduction of ... | pdf |
DIY Electric Car
Dave Brown
DC forums: RegEdit
Voltswagon@live.com
Background
• 8 years IT
• 3 years IT Security
• 12 years Electronics &
more
• FIRST Robotics
• Solar Power Station
• Solar Water Heater
• Rain Barrels
• Bike Generator
• Murphy Bed
• Workbench
• Voltswagon
Road Map
• EV History
• EV... | pdf |
PHP filter_var Bypass 截⽌ 2022.03.27 ⽆官⽅补
丁
0x00 前⾔
本⽂是对⽂章 《PHP filter_var shenanigans》中所表述内容的进⼀步测试和学习研究记录。
测试环境:macOS Mojave + PHP 7.4.28 + gdb
0x01 本地环境搭建
下载并切换到希望调试的源码环境
这⾥仅开启必要的扩展组件来编译
编译时可能会遇到如下报错
git clone https://github.com/php/php-src
cd php-src/
git checkout PHP-7.4.28
1
2
3
./buildconf --force
./configure -... | pdf |
@patrickwardle
STICK THAT IN YOUR
(ROOT)PIPE & SMOKE IT
“leverages the best combination of humans and technology to discover
security vulnerabilities in our customers’ web apps, mobile apps, and
infrastructure endpoints”
WHOIS
@patrickwardle
always looking for
more experts!
xpc, rootpipe, malware, patches & 0days ... | pdf |
One Device to Pwn Them All
Phil Polstra
Bloomsburg University of Pennsylvania
@ppolstra
http://philpolstra.com
What is this talk about?
● A pocket sized device that can be
● Drop box (can be battery powered for days if needed)
● Remote hacking drone (controlled from up to 2 miles away)
● Airborne hacking drone (when c... | pdf |
BYPASSING BIOMETRIC
SYSTEMS WITH 3D PRINTING
Yamila Levalle @ylevalle
WHAT IS A BIOMETRIC SYSTEM?
{
}
Behavioural Traits:
●
Gait
●
Voice
●
Signature
Physical Traits:
●
Iris
●
Fingerprint
●
Ear Shape
●
DNA
●
Face
●
Vein Pattern
HOW BIOMETRIC SYSTEMS WORK?
BIOMETRIC SYSTEMS ATTACKS
UNITED STATES 2010
PRESENTATION ATTA... | pdf |
1
http://www.soldierx.com/defcon18/hacking_docsis_for_fun_and_profit-blake_bitemytaco.ppt
Humor
2
Maybe Ted Stevens has a series of
hacked modems and a drop amp at his
place. Could this be the reason he
thinks that the internet is a series of
tubes?
Background
• Personal
– I currently do research for S2ERC (Securi... | pdf |
July 27-30, 2017
1
2
3
4
5
6
7
8
9
10
11
12
Max Bazaliy
Jailbreaking
Apple Watch
July 27-30, 2017
whoami
1
2
3
4
5
6
7
8
9
10
11
12
o Security researcher at Lookout
o Lead researcher on Pegasus exploit chain
o Focused on advanced exploitation techniques
o Fried Apple team co-found... | pdf |
Mac OS X Server
File Services
Administration
For Version 10.3 or Later
034-2346_Cvr 9/12/03 10:24 AM Page 1
Apple Computer, Inc.
© 2003 Apple Computer, Inc. All rights reserved.
The owner or authorized user of a valid copy of
Mac OS X Server software may reproduce this
publication for the purpose of learning t... | pdf |
Joe Grand aka , Grand Idea Studio, Inc.
Jacob Appelbaum aka ioerror
Chris Tarnovsky, Flylogic Engineering
"Smart" Parking Meter Implementations,
Globalism, and You
aka
Meter Maids Eat Their Young | pdf |
Seven
Ways
to
Hang
Yourself
with
Google
Android
Yekaterina Tsipenyuk O'Neil
Principal Security Researcher
Erika Chin
Ph.D. Student at UC Berkeley
§ Founding
Member
of
the
Security
Research
Group
at
For@fy
(now
an
HP
Company)
§ Code
audits,
iden@fying
... | pdf |
1.
2.
3.
4.
5.
50k5k
6.
7.
8. 99%
9.
10.
1.
2.
3.
4.
5.
6. ppt
1. apt
2.
3.
2311
1.
2.
3.
root
rcejb
idburp
1. getshell
2.
0daysdl
hwgetshellxxx | pdf |
Moxie Marlinspike
Institute For Disruptive Studies
Changing Threats To Privacy
moxie@thoughtcrime.org
Moxie Marlinspike
Institute For Disruptive Studies
Moxie Marlinspike
Institute For Disruptive Studies
Moxie Marlinspike
Institute For Disruptive Studies
Moxie Marlinspike
Institute For Disruptive Studies
Moxie Marlinsp... | pdf |
INTRODUCTION TO
HARDWARE HACKING
HOW YOU TOO CAN FIND A DECADE OLD BUG IN WIDELY DEPLOYED DEVICES
AVAYA 9600 DESKPHONE —A CASE STUDY
WHO AM I ?
• PHILIPPE LAULHERET
• SENIOR SECURITY RESEARCHER FOR MCAFEE'S ADVANCED THREAT RESEARCH
• @PHLAUL
• 2 YEARS EMBEDDED SECURITY, 4 YEARS C++ DEV
WHY SHOULD YOU CARE ABOUT HARDWA... | pdf |
¥10000 Yen Into the Sea
Bio: Flipper
Job Title:Engineering Technician
What: Electric Vehicles
Goal:
Build a low cost underwater glider
“If you want to make an apple pie from scratch, you
must first create the universe.” - Carl Sagan
What is an underwater
glider?
Underwater Gliders:
-Highly efficient autonomous subma... | pdf |
baesystems.com/SWIFT
Follow the Money
Understanding the money laundering
techniques that support large-scale cyber-heists
Follow The Money
2 // 28
1. Summary
SWIFT plays a key role in helping its community to reinforce and safeguard the integrity of the global
financial ecosystem, and maintains a relentless focus on ... | pdf |
BeaconEye的原理
Cs的beacon在初始化时会使用 malloc 函数创建一个空间,将beacon的明文信息写入到其中。
这就是一个很明显的检测CobaltStrike的信息, malloc 函数创建的是堆内存,所以只需要遍历每个进程
的堆内存地址就可以了。
当然这一切都归功于很多前辈们对Cobalt Strike的逆向工程。
于是就有了beaconeye的项目https://github.com/CCob/BeaconEye
对于堆内存的查找还有很多注意事项,可以看参考中的文章。
BeaconEye的使用
BeaconEye是c#项目,我对它也不怎么熟悉,下面内容是我自己的方法。
项目-> 属性
设置好.net 框架,我... | pdf |
Yang Zhang and his research group (CISPA Helmholtz Center for Information Security)
Yun Shen (Spot by NetApp)
Azzedine Benameur (Spot by NetApp)
All Your GNN Models And Data
Belong To Me
*All attacks discussed in this talk are simulated in the lab environment.
*
The Age of Machine Learning
Image source (from left t... | pdf |
ACTF WriteUp By Nu1L
ACTF WriteUp By Nu1L
Pwn
kkk
TreePwn
MyKvm
Crypto
RSA LEAK
impossible RSA
Web
poorui
beWhatYouWannaBe
ToLeSion
gogogo
Misc
signin
Mahjoong
safer-telegram-bot-1
BlockChain
AAADAO
bet2loss
Pwn
kkk
通过ROP打通parser执⾏shellcode, 然后把提权的exp编码后发送过去执⾏
kkk.ko漏洞出现在加密时以block为单位进⾏加密, 没考虑不对其的情况, 造成堆溢出.
提权的话将packet对... | pdf |
Hacking Driverless
Vehicles
Zoz
Intelligent Ground Vehicle Competition
Student Unmanned Aerial Systems
RoboBoat
RoboSub
International Aerial Robotics Competition
• Advantages:
• Energy efficiency
• Time efficiency
• New applications
The Revolution Is Coming
The Revolution Is Coming
FUD
Autonomous/Unmanned Systems
Autono... | pdf |
CrossC2基本满足了我对linux C2的需求
最近用碎片时间学习和使用了一下CrossC2,可以看出是一线小伙伴结合实战经验写出来的实用性工
具。因此鼓励大家使用和反馈BUG给作者。
1. 什么是CrossC2
CrossC2是一款扩展CobaltStrike在Linux、Android、IOS等系统上使用的闭源免费工具,作者编写了较
为详细的使用文档,可以很快上手。详情请阅读:https://gloxec.github.io/CrossC2/zh_cn/
CobaltStrike: 暂时仅支持3.14最后一个版本(bug fixs), 以及4.x版本(详见cs4.1分支).
Linux: 特别老旧的系统可以选择cna中的"L... | pdf |
Bvp47
美国NSA方程式的顶级后门
技术细节
版本1.7
目录Contents
1. 摘要
2. 前所未见的后门
3. 后门程序概览 – Bvp47
4. 组织关联和溯源
“The Shadow Brokers Leaks”事件关联
非对称算法私钥匹配
样本深度关联
完整控制命令行
斯诺登事件关联
Bvp47—美国 NSA 方程式组织的顶级后门
文件结构
文件属性
文件结构
使用场景
4
4
4
6
1
2
4
8
8
9
9
12
13
15
5. 遍布全球的受害者
泄露出的受害者信息
利用受害主机作为跳板攻击目标
6. Bvp47后门技术详解
主要行为
Payload
字符串加解密
函数名混淆技巧
Bvp 引擎
系统 Hoo... | pdf |
Game of Chromes:
Owning the Web with Zombie Chrome Extensions
Abstract
2
Malicious Extensions Analysis
3
Malicious Extension I - Bot distribution through Facebook and Wix.com
3
Malicious Extension II - Bot distribution through Facebook and Google Drive
6
Vulnerable Extensions Analysis
8
Vulnerable Extension I ... | pdf |
All Your RFz Are Belong to Me:
Hacking the Wireless World with
Software Defined Radio
Balint Seeber
balint@spench.net
@spenchdotnet
Notes and links in PDF comments on each slide
Applications Engineer
balint@ettus.com
Overview
• RF 101
• The journey into Software Defined Radio
• Hospital pager systems
• Tracking plane... | pdf |
Microservices and FaaS
for Offensive Security
Ryan Baxendale
$ whoami
Ryan Baxendale
Penetration Tester
Centurion Information Security Pte Ltd - www.centurioninfosec.sg
Singapore
twitter.com/ryancancomputer
github.com/ryanbaxendale
linkedin.com/in/ryanbaxendale
AWS Lambda
Jan 2015 - AWS Lambda Preview
Open to all AWS ... | pdf |
PHPCHIP.COM
PHP动态特性的捕捉与逃逸
Phith0n
2019
About Me
phith0n
• https://www.leavesongs.com
• http://weibo.com/101yx
• https://github.com/phith0n
长亭科技
• https://github.com/chaitin/xray
精通
• PHP
• Python
• Golang
• Javascript
等语言Hello World程序的拼写
目录
CONTENTS
PART 01
PHP与动态特性
01
PART 02
如何检测PHP动态特性
02
PART 03
从攻击者的角度突破限制
03
•
P... | pdf |
Java类加载机制
本⽂发表于赛博回忆录。
正如我们学习Java安全⼀样,⼤家都知道,RCE是第⼀⽣产⼒,那么就要从Java的类加载机制和反射机制
这两类基础开始学习,下⾯我们来由浅⼊深的了解⼀下Java的类加载机制。
Java是⼀个靠JVM实现编译运⾏,从⽽跨平台的⼀个开发语⾔。
然后在虚拟机中默认了提供了了三种类加载器,启动类加载器(Bootstrap ClassLoader)、扩展类加载
器(Extension ClassLoader)、应⽤类加载器(Application ClassLoader)
双亲委派模型
三种不同的加载器,那么⼜存在⼀个谁加载,加载顺序是什么的问题,其⼤概的加载顺序可以通过学习
双亲委派模型来了解
J... | pdf |
Welcome Home!
Internet Open Telemetry
Martin Hron
security researcher
HITCON 2018
Buzzword
2
A word or phrase which has become fashionable or
popular, or sounds technical or important and is used to
impress people
3
So let’s talk about IoT
What is IoT?
4
Flashback: How it has started
5
• Make my house smart. DYI way.
F... | pdf |
You Spent All That Money
...And You Still Got Owned
Presented By:
Joe McCray
joe@learnsecurityonline.com
http://www.linkedin.com/in/joemccray
http://twitter.com/j0emccray
Let me take you back....
Step 1: Tell customer you are 31337 security professional
Customers only applied patches if it fixed something on the syst... | pdf |
从数据视角探索安全威胁
阿里云安全工程师 / cdxy
whoami
0
cdxy
数据分析 / 威胁感知
异常数据清洗
1
信息穿透模型
2
Nday感知
3
落地思考
4
目录 | Content
异常数据清洗
1
Chapter 1
威胁感知模型基础
异常基线A
异常基线B
复杂模型
异常数据清洗的价值
云环境威胁感知现状
挑战
异常数据清洗价值
百万主机
PB级数据
有限的存储、计算资源
以不损失告警为前提
压缩数据量
业务场景复杂
运营资源有限
通用性、准确率要求高
理解业务特征
提升告警置信度
代码类日志清洗——词法分析
参数类日志清洗——字... | pdf |
h"p://Irongeek.com0
Adrian0Crenshaw0
h"p://Irongeek.com0
! I0run0Irongeek.com0
! I0have0an0interest0in0InfoSec0
educa=on0
! I0don’t0know0everything0@0I’m0just0a0
geek0with0=me0on0my0hands0
! Sr.0Informa=on0Security0Consultant0
at0TrustedSec0
! Co@Founder0of0Derbycon0
h"p://www.derbycon.com000
Twitter: @Irongeek_AD... | pdf |
⾸先给LDC,添加对⽤⼾账⼾ kaba 的基于资源的约束委派
接着申请到⽬标机器的票据:
C:\Users\Administrator\Desktop>SharpAllowedToAct.exe -m kaba -u administrator -p 1qaz2WSX -t
KASPERSKY -a LDC.dev.pig.com -d dev.pig.com
[+] Domain = dev.pig.com
[+] Domain Controller = LDC.dev.pig.com
[+] Machine added by the attacker =
[+] Distinguished Name = CN=kaba,CN=... | pdf |
Fuzzit: A Mobile Fuzzing Tool
Kevin Mahaffey
John Hering
Anthony Lineberry
Flexilis – http://www.flexilis.com
Introduction to Fuzzit
Fuzzit is a tool designed to find vulnerabilities in mobile devices. It implements a testing technique that
most readers will be familiar with called fuzzing. In short, fuzzing ... | pdf |
Advanced Physical Security
Beyond Dumpster Diving and Social
Engineering
or,
Screw the Firewall and the Secretary Too
Eric Schmiedl
security.ericschmiedl.com
“We Want Information… Information… Information… “
“You won’t get it.”
“By hook or by crook, we will…”
– The Prisoner (1967)
"Many of Russia's wealthiest banks... | pdf |
1
The Tor Project
Our mission is to be the global resource for
technology, advocacy, research and
education in the ongoing pursuit of freedom
of speech, privacy rights online, and
censorship circumvention.
2
● Online Anonymity
– Open Source
– Open Network
● Community of
researchers,
developers, users and
relay ... | pdf |
Evolving Exploits
through Genetic
Algorithms
By soen
Who am I
v CTF Player
v Programmer
v Virus / Worm Aficionado
v Computer Scientist
v Penetration Tester in daylight
Domain Constraints
v What we will cover
v SQL injection (MySQL, SQL, MSSQL, Oracle)
v Command injection (Bash, CMD, PHP, Py... | pdf |
Let’s Sink The Phishermen’s Boat!
=DEFCON 16 @ Las Vegas, Nevada=
Teo Sze Siong, <teo.sze.siong@f-secure.com>
F-Secure Corporation
Why this topic?
• Internet banking has become more and
more preferred choice
• Yet, many people don't understand the
risk they are facing in online banking
Do you think the following prac... | pdf |
Next Generation Data Forensics &
Linux
Thomas Rude, CISSP
August 2002
Agenda
Thomas Rude, © 2002
● Overview of Data Forensics
● Agents of Change
● Future of Data Forensics
● Linux as Next Generation Data Forensics
platform
● Questions
Data Forensics, Infancy
Thomas Rude, © 2002
Historically data forensics has focus... | pdf |
从开发到漏洞挖掘的角色转换
王纬
2020-06-05
关于我
• ID: Proteas
– Weibo: @Proteas
– Twitter: @ProteasWang
• 3 年 Windows C++ 开发经验。
• 5 年 iOS App 开发经验。
• 5 年 iOS & macOS 漏洞挖掘经验。
• 目前处于技术理想主义与技术现实主义之间。
主要内容
• 背景与约束
• 漏洞挖掘与利用
• 为什么要转漏洞挖掘
• 如何转到漏洞挖掘
• 结语
背景与约束
• 每个人眼里都有一个世界。
• 每个人都有自己的局限性。
• 经验是不可传承的,
• 每个人都有属于自己的路,
• 但仍希望本文能对你有所帮助。
背景与约束
• ... | pdf |
问了下师傅,目标有个php dz的站有一个aspx的站,从aspx的读取文件读取到
web.config文件内容,是sa账号,但是降权了,而且传不到aspx文件网站目录里面,
只能传到dz的网站里面,一个asp冰蝎马。
用了师傅的网站看下进程(皮一下哈哈)
上次说过了,iis权限就算是管理员权限都一样,powershell啥的net net1肯定是没戏
的。你直接穿exe也是没戏的,连query user都看不了,也断掉了我们传exp上去提
权。
首先在aspx站找到了sa账号密码和dz的config目录里面找到了root账号i密码。
主要是有的马被杀了,而且由于我对sql server熟悉一点,所以直接执行。
... | pdf |
Time-Based Blind SQL
Injection using Heavy
Queries
A practical approach for MS SQL
Server, MS Access, Oracle and MySQL
databases
and Marathon Tool
Authors: Chema Alonso, Daniel Kachakil, Rodolfo Bordón, Antonio Guzmán y Marta Beltrán
Speakers: Chema Alonso & José Parada Gimeno
Abstract: This document describes... | pdf |
Performance Improvements on Tor
or,
Why Tor is slow and what we’re going to do about it
Roger Dingledine
Steven J. Murdoch
March 11, 2009
As Tor’s user base has grown, the performance of the Tor network has suffered. This document describes
our current understanding of why Tor is slow, and lays out our options for fixing... | pdf |
CableTap
Wirelessly Tapping your Home Network
Marc Newlin
Bastille Networks
marc@bastille.io
@marcnewlin
Logan Lamb
Bastille Networks
logan@bastille.io
Christopher Grayson
Web Sight
chris@websight.io
@_lavalamp
Welcome to the
LineCon after-party.
Marc Newlin (@marcnewlin)
Wireless Security Researcher @ Bastille Netwo... | pdf |
SnakeYaml
SnakeYaml
SnakeYaml
SnakeYaml
SnakeYaml
SPI
ScriptEngineManager
C3P0
ScriptEngineManager
Reference
SnakeYaml
snakeyamlyamlyamlxmlproperties
SpringyamlSnakeYamlYAML1.1
ProcessorUTF-8/UTF-16Java/YAML
yamlhttps://www.yiibai.com/yaml
Spring
ymlyamlpocyml
yamlhttps://www.345tool.com/zh-hans/formatter/yaml-format... | pdf |
DefCon (China) 1, Beijing 2019
打破后端限制!
Gregory Pickett, 获得CISSP, GCIA, GPEN等
多项认证
芝加哥, 伊利利诺斯州
gregory.pickett@hellfiresecurity.com
Hellfire Security
概述
交通系统
逆向⼯工程
我的发现
漏漏洞洞利利⽤用
经验总结
简史
地铁⿊黑客剖析(2008)
NFC地铁⿊黑客(2012)
如何侵⼊入全国交通⽹网络(2012)
利利⽤用边信道攻击破解韩国交通卡
(2017)
有何不不同
绝不不违法
我们不不会偷偷溜溜进⻋车站
... | pdf |
Ways for Web Dogs to Find Linux
Privilege Escalation Vulnerabilities
Hunting Vulnerabilities of D-Bus Services
Ricter Z @ 360 Noah Lab
$ cat /AGENDA.txt
• What is D-Bus?
• D-Bus authentication and PolicyKit
• D-Bus services debug tricks
• Common exploits for Linux privilege escalation
• Real-word examples: polkit CVE,... | pdf |
HTTP/2: The Sequel is Always Worse
James Kettle - james.kettle@portswigger.net - @albinowax
HTTP/2 is easily mistaken for a transport-layer protocol that can be swapped in with zero security
implications for the website behind it. Two years ago, I presented HTTP Desync Attacks and kicked off a
wave of request smuggling... | pdf |
apache
0x00
apachercepayloaddos
0x01
ProxyRequests On
GET http://www.baidu.com HTTP/1.1
apache
unix socket
48payload
GET unix:/A*4096/aaa|http://www.baidu.com HTTP/1.1
48unix socket
unix
payload
GET unix:/A*4096/aaa|aaa HTTP/1.1
httpd
0x02
coredumpapache coredump
apachecoredump
1. ulimit -S -c unlimited
2. ap... | pdf |
VMProtect的一次奇妙之旅
何潇潇@永信至诚
VMProtect是什么
VMProtect背后的原理
还原VMProtect的方法
演示还原
总结
CONTENTS
8/27/16'2:30PM
2
VMProtect是什么?
VMProtect是世界上最强大的二进制代码保护软件之一,是由俄
罗斯人开发的,至今没有人公开声称对其完全破解。
03
8/27/16'2:30PM
2
VMProtect是什么?
01
一个基于堆
栈机的intel指
令的模拟器
02
通过编译,把intel
指令编译成精心
设计的一组虚拟
指令(PCode)
特定的解释引
擎,用于解释
执行上述的虚
拟指令
从本质来讲,VMProtect是
8/27... | pdf |
github上的rkxxz/CVE-2022-26809钓鱼攻
击分析
看到群⾥有⼈分享CVE-2022-26809 https://github.com/rkxxz/CVE-2022-26809的exp,并且
readme.md还写的有模有样的。
前⼏天不是有师傅分析了不能RCE吗?怎么这就出来exp了?还msf上线? 事出反常必有妖,
赶紧下载⼆进制来分析⼀把。
# Loader分析
下载样本发现是⼀个 .net的程序
⽤dnspy加载起来,看⼀下,外围的程序仅仅是⼀个loader,在内部解密了⼀个模块,然后
⽤ executingAssembly.LoadModule 加载起来。
动态调试⼀下,把⾥⾯的模块dump出来,接下来... | pdf |
Saif El-Sherei & Etienne Stalmans
What is Fuzzing??
Fuzzing is feeding an Application with
malformed input in hope to find errors and
faults in the application code and with a bit
of luck these faults can lead to exploitable
vulnerabilities
Basic History of Fuzzing
•
1988-199:
•
Boris Beizer Syntax Testing. ... | pdf |
DDoS Protecion Total AnnihilationD
DDoS Mitigation Lab
A
DDoS Mitigation Lab
Independent academic R&D division of
Nexusguard building next generation DDoS
mitigation knowledge and collaborate with
defense community.
Industry body formed to foster synergy among
stakeholders to promote advancement in DDoS
defense know... | pdf |
Rooting macOS Big Sur on Apple Silicon
Xinru Chi and Tielei Wang
About us
• Xinru Chi
• Security Researcher in Pangu Lab
• Extensive experience in macOS/iOS vulnerability research
• Tielei Wang
• Ph.D from PKU, Research scientist at Georgia Tech from 2011-2014
• Known for releasing jailbreak tools for iOS 7-9
• Organ... | pdf |
Browser-Powered Desync Attacks
James Ke(le
A New Frontier in HTTP Request Smuggling
Warning / disclaimer
These slides are intended to supplement the presenta1on.
They are not suitable for stand-alone consump1on.
You can find the whitepaper and presenta1on recording here:
h=ps://portswigger.net/research/browser-powered... | pdf |
Evading next-gen AV using A.I.
Hyrum Anderson
hyrum@endgame.com
@drhyrum
/in/hyrumanderson
The Promise of Machine Learning
• Learn from data what constitutes malicious
content or behavior
• Discriminatory patterns learned automatically,
not obviously constructed by hand
• Generalize to never-before-seen samples and
... | pdf |
I am packer and so can you
Mike Sconzo
Agenda*
*Powered by business synergy
It’s all about me!
• Threat Research at Bit9 + Carbon Black
• Enjoy static analysis, machine learning, network forensics,
and eating BBQ and pie (yes, I live in TX)
• SecRepo.com
• @sooshie
What’s the problem?
Detecting packers, ... | pdf |
S-再看tomcat架构与请求处理流程
tomcat核心功能
1. http服务器,socket通信(TCP/IP)
2. servlet容器
http服务器--coyote
1. EndPoint组件:用于处理连接请求,也就是接收客户端发来的请求
2. Processor组件:用于应用层处理http请求,封装http报文。
server.xml 配置文件
Tomcat启动过程源码剖析
<?xml version="1.0" encoding="UTF-8"?>
<Server port="8005" shutdown="SHUTDOWN">
<Listener className="org.apache.catalina.st... | pdf |
DEF CON 18
“This is not the droid you’re looking for…”
Nicholas J. Percoco & Christian Papathanasiou
Copyright Trustwave 2010
Agenda
• About Us / Introduction
• Introduction to Android
• Motivations Behind this Work
• Building a Linux Kernel Rootkit
• Overcoming Hurdles
• Introducing Mindtrick – The An... | pdf |
1
WEB⾮实⽤之Burp的AutoRepeater使⽤
LxLN 前⾔
LxLO 安装⽅法
LxLP 使⽤例⼦
LxLP.N ssrf检测
LxLP.O 未授权检测
LxLP.P 越权检测
LxLQ 其它
0x01 前⾔
0x02 安装⽅法
Plain Text
复制代码
以前想写⼀个SSRF的检测⼯具,后⾯和朋友⼀聊,感觉⼀直使⽤的AutoRepeater就可以做到
尝试使⽤了这么久,使⽤这个插件挖到的漏洞也不少了,感觉是真实可⽤的
于是作为⼀个专业的狗推,我就要开始推荐AutoRepeater了
它作为⼀个burp⼯具,可以极⼤的简化⼿⼯测试的效率
我常⽤于该⼯具拿来检测SSRF,未授权,越权(平⾏,垂直)
下⾯就简单介绍... | pdf |
Mach-o Malware Analysis:
Combatting Mac OSX/iOS Malware
with Data Visualization
INCOMPLETE DRAFT: PLEASE SEE LAST PAGE FOR FINAL PPTX
Remy Baumgarten
Security Engineer at ANRC Services
https://www.linkedin.com/in/remybaumgarten
Website: anrc-services.com
Twitter: @anrctraining
Friday, July 12, 13
About me
mobile malw... | pdf |
Androsia
Securing 'data in process' for your Android Apps
C:\>whoami
• Samit Anwer
• Product Security Team @Citrix R&D India Pvt Ltd
• Web/Mobile App Security Enthusiast
• Speaker:
• AppSec USA (Orlando, USA) 2017,
• c0c0n (Cochin, India) 2017,
• CodeBlue (Tokyo, Japan) 2017,
• IEEE Services (Anchorage, Alaska) 2014,... | pdf |
360雲安全
全球最大的雲安全系統
360副總裁 陸劍鋒
2010-07
木馬——互聯網時代的主要安全威脅
• 單機系統時代,病毒是電腦安全的主要威脅
–傳播介質:磁片等移動介質
–傳播方式:交叉感染
–傳播目的:破壞電腦系統
• 互聯網路時代,木馬是電腦安全的主要威脅
–傳播介質:互聯網路
–傳播方式:網格狀交叉模式
–傳播目的:非法獲取財產
木馬侵犯使用者財產的方式多種多樣
• 木馬形式多樣,角色各異
–盜號木馬:盜取虛擬財產
–僵屍網路:對網站等攻擊、勒索
–肉雞木馬:在用戶的電腦中彈出廣告
–間諜木馬:竊取隱私和商業機密
肉雞
高額利潤催生木馬黑色產業鏈
• 產業中的木馬利益鏈
–造馬
–改馬
–賣馬
–買馬
–發馬
–掛馬... | pdf |
Bad (and Sometimes Good) Tech Policy:
It's Not Just a DC Thing
Chris Conley
ACLU of Northern California
cconley@aclunc.org | @ManConley
Chris Conley
ACLU of Northern California
cconley@aclunc.org | @ManConley | pdf |
Hydra
• Advanced x86 polymorphic engine
• Incorporates existing techniques and introduces new ones in
one package
• All but one feature OS-independent
Random register operations
• Different synonymous instructions per invocation.
• Hydra provides a large library of such instructions and a
platform to add more.
• For ... | pdf |
⼤型企业应用安全⽅案
钟卫林 OWASP 亚洲峰会 深圳 2017年 7月
⼤型企业应用安全的挑战
• 规模 (Scalability)
• 应用数量
• 代码数量
• 开发⼈员数量
• 团队/业务数量
⼤型企业应用安全的挑战
• 复杂度 (Complexity)
• 应用类型
• 编程语⾔类型
• 技术类型
• 编译环境
• 团队架构和⽂化
⼤型企业应用安全的挑战
• 效率 (Efficiency)
• 扫描速度
• 扫描容量
• 系统资源
• ⼯具安装
• ⼯具使用
• 流程集成
⼤型企业应用安全的挑战
• 效用 ( Effectiveness)
• 结果质量
• 准确度
• 从发现到修复
• 与现有环境流程的集成
⼤型企业应用... | pdf |
Windows 本地提权在野 0day 狩猎之旅
Quan Jin <twitter: @jq0904>
DBAPPSecurity
Black Hat USA 2022
注:本文是作者在今年 Black Hat USA 2022 演讲议题的中文版
摘要
本文将讲述我们如何在 2020-2021 两年间狩猎 Windows 本地提权在野 0day 的故事:为什
么我们觉得这件事可行,我们如何研究历史案例,我们如何用学到的经验开发一套检测系统,
以及我们如何改进这套系统使之变得更准确。通过使用这套系统,我们成功捕获了两个
Windows 本地提权在野 0day 和一个 Windows 本地提权在野 1day。
此外,我们... | pdf |
Password Cracking
on a Budget
Matt Weir
Dr. Sudhir Aggarwal
Florida State University
Special Thanks To
• Bill Glodek
• Professor Breno de Medeiros
• National Institute of Justice
About Me
• Name - Matt Weir
• Occupation - PhD Student, Florida State
University
• Previously worked for Northrop Grumman
TASC
-
Network ... | pdf |
1
JDBC反序列化⼊⻔学习
JDBC?
测试环境
建⽴JDBC连接
反序列化简单介绍
断点调试
构造POC
show session status响应包
Exp
补充
资料(原⽂)
不复制粘贴了,⻅JDBC基础介绍
IDEA
Mysql 5.7
https://www.runoob.com/java/java-mysql-connect.html
学习来源 https://xz.aliyun.com/t/8159
JDBC?
1 Java Database Connectivity
测试环境
建⽴JDBC连接
2
下载驱动包
https://dev.mysql.com/downloads/connector/j/
不要下最新的,估... | pdf |
Meme Mining for Fun
Meme Mining for Fun
and Profit
and Profit
By Broward Horne
By Broward Horne
DefCon
DefCon 13
13
33--Part Presentation
Part Presentation
Tactical
Tactical –– MemeMiner
MemeMiner Parlor Tricks
Parlor Tricks
Operational
Operational –– SS--curve theory
curve theory
Strategic
Strategic –– Social ... | pdf |
July 2017
HPE Software Security Research Paper
Introduction
Security issues with deserialization of untrusted data in several programming languages have been known for many
years. However, it got major attention on 2016 which will be remembered as the year of Java Deserialization
apocalypse. Despite being a known... | pdf |
Quantum Computing 101: How to Crack RSA
Walter C. Daugherity
Department of Computer Science
Texas A&M University
BH2002@security.mailshell.com
Quantum Computing - Daugherity
Biography
Walter C. Daugherity is a Senior Lecturer in
Computer Science and Electrical Engineering
at Texas A&M University. He received a
bach... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.