text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
1
针对Dynamic Link Library(DLL)攻击⼿法的深⼊
分析
1.Dynamic Link Library基础知识
1.1.DLL的结构
1.2加载DLL
1.2.1显式加载
1.2.2隐式加载
1.3.win常⽤dll及其功能简介
1.4.DLL如何加载
2.DLL劫持可能发⽣的⼏个场景
2.1.场景1:可以直接劫持某个应⽤的DLL
2.2.场景2:不存在DLL 劫持
2.3.场景3:DLL 搜索顺序劫持
2.4.其他
3.常⻅的DLL攻击利⽤⼿法
3.1.DLL 加载劫持进⾏钓⻥维权
3.1.1.实例1 Qbot(⼜名 Qakbot 或 Pinkslipbot)劫持Calc.exe的WindowsCodecs.... | pdf |
Go With the Flow: Enforcing Program Behavior
Through Syscall Sequences and Origins
Claudio Canella
claudio.canella@iaik.tugraz.at
Abstract
As the number of vulnerabilities continues to increase every year, we require
more and more methods of constraining the applications that run on our sys-
tems. Control-Flow Integrit... | pdf |
LTE REDIRECTION
Forcing Targeted LTE Cellphone into Unsafe Network
Wanqiao Zhang
Unicorn Team – Communication security researcher
Haoqi Shan
Unicorn Team – Hardware/Wireless security researcher
Qihoo 360 Technology Co. Ltd.
LTE and IMSI catcher myths
• In Nov. 2015, BlackHat EU, Ravishankar Borgaonkar, and Altaf Shaik ... | pdf |
HITCON 101 Sharing
SELinux
從不認識到在一起
About Me
王禹軒 (Bighead)
● 中央大學 Advanced Defense Lab
○ 打胖
● 工研院 Intern
○ Whitelist 1.0 PoC
○ Hypervisor-based Whitelist (page verification)
○ SELinux
SELinux Top Search
The ways to disable SELinux
● Setenforce 0
● Edit /etc/selinux/config : SELINUX = permissive or disable
● Delete pol... | pdf |
Author: pen4uin
0x00 写在前面
0x01 获取Net-NTLM Hash
0x02 可利用的函数
01 include()
02 include_once()
03 require()
04 require_once()
05 file_get_contents()
06 file()
07 readfile()
08 file_exists()
09 filesize()
10 unlink()
11 fopen()
12 is_file()
13 file_put_contents()
∞ xxx()
0x03 可能出现的漏洞场景
SSRF
file://
XXE
php://filter
文件包含
文件删除... | pdf |
JNDI 注⼊利⽤ Bypass ⾼版本 JDK 限制
0x00 前⾔
JNDI 注⼊利⽤⾮常⼴泛但是在⾼版本 JDK 中由于默认 codebase 为 true 从⽽导致客户端默认不会请求远程Server
上的恶意 Class,不过这种⼿法也有 Bypass 的⽅式,本⽂主要学习 KINGX 师傅所提出的两种 Bypass 的⽅法
KINGX 师傅⽂章链接:https://mp.weixin.qq.com/s/Dq1CPbUDLKH2IN0NA_nBDA
JNDI 注⼊通常利⽤ rmi 、ldap 两种⽅式来进⾏利⽤,其中 ldap 所适⽤的 JDK 版本更加多⼀些
RMI:JDK 8u113、JDK 7u122、JDK 6u1... | pdf |
Ayoub ELAASSAL
ayoub.elaassal@wavestone.com
@ayoul3__
CICS BREAKDOWN
Hack your way to transaction city
© WAVESTONE
2
What people think of when I talk about mainframes
© WAVESTONE
3
The reality: IBM zEC 13 technical specs:
• 10 TB of RAM
• 141 processors,5 GHz
• Dedicated processors for JAVA, XML and
UNIX ... | pdf |
Windows Internals
Seventh Edition
Part 2
Andrea Allievi
Alex Ionescu
Mark E. Russinovich
David A. Solomon
© Windows Internals, Seventh Edition, Part 2
Published with the authorization of Microsoft Corporation by:
Pearson Education, Inc.
Copyright © 2022 by Pearson Education, Inc.
All rights reserved. This publication i... | pdf |
Hacking Measured Boot and
UEFI
Dan Griffin
JW Secure, Inc.
WWJBD?
Don’t let h@xors keep you from
getting the girl…
Introduction
• What is UEFI?
• What is a TPM?
• What is “secure boot”?
• What is “measured boot”?
• What is “remote attestation”?
Hardware Landscape
• BYOD
• Capability standards
– Phones
... | pdf |
Truman Kain
TEVORA
Dragnet
Your Social Engineering Sidekick
TL;DR
Your social engineering conversions
will increase with Dragnet.
Current States of:
•OSINT
•Analytics
•S.E. Engagements
OSINT
•Manual
•Repetitive
•Fleeting when automated
Analytics
Big companies live off of it
–Jeff Bezos, 1997
“3 years ago I was wor... | pdf |
Evil Printer
How to Hack Windows Machines with Printing Protocol
Who are We?
• Zhipeng Huo (@R3dF09)
• Senior security researcher
• Member of EcoSec Team at Tencent Security Xuanwu Lab
• Windows and macOS platform security
• Speaker of Black Hat Europe 2018
Who are We?
• Chuanda Ding (@FlowerCode_)
• Senior security re... | pdf |
第五空间 WriteUp By Nu1L
第五空间 WriteUp By Nu1L
PWN
bountyhunter
CrazyVM
notegame
pb
Crypto
ecc
signin
doublesage
Blockchain
CallBox
Web
EasyCleanup
pklovecloud
PNG图⽚转换器
yet_another_mysql_injection
WebFTP
个⼈信息保护
data_protection
Mobile
uniapp
Misc
签到题
云安全
Cloud_QM
PWN
bountyhunter
from pwn import *
s = remote("139.9.123.168",... | pdf |
Module 2
Typical goals of malware and their
implementations
https://github.com/hasherezade/malware_training_vol1
Hooking
Hooking: the idea
•Hooking means intercepting the original execution of the
function with a custom code
•Goal: to create a proxy through which the input/output of the
called function bypasses
•Po... | pdf |
0-Day 輕鬆談 (0-Day Easy Talk)
2013/07/19 @ HITCON
<Orange@chroot.org>
Happy Fuzzing Internet Explorer
0-Day 甘苦談 (0-Day WTF Talk)
2013/07/19 @ HITCON
<Orange@chroot.org>
Happy Fuzzing Internet Explorer
這是一場簡單的演講
This is an Easy Talk
分享一些我的 Fuzzing 心得
Share Some Fuzzing Review of Mine
以及很... | pdf |
How Unique is Your Browser?
a report on the Panopticlick experiment
Peter Eckersley
Senior Staff Technologist
Electronic Frontier Foundation
pde@eff.org
What is “identifying information”?
Name & address!
But also...
Latanya Sweeney:
ZIP + DOB + gender
identifies almost all US residents
7 billion people on earth
→ t... | pdf |
So you think you want to be a
pen-tester.
Anch - @boneheadsanon – anch@subba.net
Introductions
• Penetration Tester – 10 years
• Red Team Lead – 5 years
• I’m here to help.
• Contact Info:
Twitter: @boneheadsanon
E-Mail: anch@subba.net
• The Leprecaun?
The Wonderful World of Penetration
Testing
Misconceptions and R... | pdf |
#BHUSA @BlackHatEvents
Blasting Event-Driven Cornucopia:
WMI-based User-Space Attacks
Blind SIEMs and EDRs
Claudiu Teodorescu
Andrey Golchikov
Igor Korkin
#BHUSA @BlackHatEvents
Information Classification: General
The Binarly Team
Claudiu “to the rescue” Teodorescu – @cteo13
Digital Forensics, Reverse Engineerin... | pdf |
Max Goncharov, Philippe Lin
2015/8/28-29
Your Lightbulb Is Not Hacking You –
Observation from a Honeypot Backed by Real Devices
1
2
Hit-Point
“ねこあつめ”
$ whoami
• Philippe Lin
• Staff engineer, Trend Micro
• (x) Maker
(o) Cat Feeder
3
$ whoami
• Max Goncharov
• Senior Threat Researcher,
Trend Micro
• (x) Evil Russian Hac... | pdf |
THE$ACHILLES'$HEEL$OF$CFI
关于 CFI
0 1
CFI 是什么
2005年微软研究院联合学术界提出的一项漏洞利用缓解技术
用于防御利用内存破坏漏洞来获得软件行为控制权的外部攻击
确保程序执行时的控制流转移符合事先确定的控制流图
关于 CFI
0 2
CFI 的实现
Clang CFI
Microsoft Control Flow Guard
Intel Control-Flow Enforcement Technology
Microsoft eXtended Flow Guard
Clang CFI
0 3
Clang CFI 如何工作
-fsanitize=cfi-cast-strict: Enable... | pdf |
#!/usr/bin/env bash
#######################################################
# #
# 'ptrace_scope' misconfiguration #
# Local Privilege Escalation #
# #
##################... | pdf |
How to Build Your Very Own Sleep Lab:
The Execution
Presented by:
Keith Biddulph & Ne0nRa1n
Overview
What does it do?
We're collecting data for later interpretation:
Electroencephalogram (EEG)
Heart rate monitor (HRM)
Electronic Ocular Monitor (EOM)
Infrared pictures
Overview
What does it not do?
Breathing measuremen... | pdf |
#BHUSA @BlackHatEvents
Dive into
Apple IO80211Family
Vol. II
wang yu
#BHUSA @BlackHatEvents
Information Classification: General
About me
yu.wang@cyberserval.cn
Co-founder & CEO at Cyberserval
https://www.cyberserval.com/
Background of this research project
Dive into Apple IO80211FamilyV2
https://www.blackhat.com/us-20... | pdf |
SAVING THE INTERNET
Jay Healey
@Jason_Healey
Atlantic Council
1.
Shift in people demographics – different nations, different values and
relationship of millenials
2.
Shift in device and computing demographics – massive uptick in devices (IoT
and IoE), change in how people connect (mobile), change in how and wher... | pdf |
Make JDBC Attack Brilliant Again
Chen Hongkun(@Litch1) | Xu Yuanzhen(@pyn3rd)
TRACK 2
Your Designation, Company Name Here
1.The derivation of JDBC
attacking
2.In-depth analysis of occurred implementations
3.Set fire on JDBC of diverse applications
Agenda
1.The derivation of JDBC
attacking
2.In-depth analysis of occurre... | pdf |
Your site here
LOGO
移动APP风险防护与安全测评
Android平台
Your site here
LOGO
移动APP风险防护
前言
APP面临的安全威胁
APP加固
APP原理
APP反编译保护
APP反汇编保护
APP防篡改保护
APP防调试与注入保护
APP脱壳攻击测试
Your site here
LOGO
前言
Android开发者常常面临的一个问题就是防破解、
防二次打包。现如今,安全问题越来越重要,越来越多
的Android开发者也开始寻求安全的保护方案。
Your site here
LOGO
APP面临的安全威胁 ... | pdf |
THE RADIOACTIVE BOY
SCOUT:
NOW EVERYONE CAN GET
INTO THE NUCLEAR ARMS
RACE
WHAT IS A HACKER
• SOMEONE VERY CREATIVE
• AN EXPLORER
• REVERSE ENGINEER
• SOMEONE WHO DOES’T HAVE A BOX
TO THINK OUT OF
• DOESN’T DRINK THE KOOLAIDE
• BOLDLY GOES WHERE NO MAN HAS
GONE BEFORE
RADIATION, GAMMA RAYS
• HIGH ENERGY PHOTONS
• CESIU... | pdf |
John Menerick − August 2015
Backdooring Git
‹#›
Legal Disclaimer
‹#›
Thank you for coming
‹#›
What we are covering
‹#›
What we are not covering
‹#›
What we are not covering
‹#›
Software is like sex; it is better when it is free
Linus Torvalds
Name the Quote
Setting the Stage
‹#›
Good luck!
‹#›
Revision control vs. Sou... | pdf |
the pentest is dead,
long live the pentest!
Taylor Banks
& Carric
1
carric
2
taylor
3
44
Overview
1 the pentest is dead
1.1 history of the pentest
1.2 pentesting goes mainstream
2 long live the pentest
2.1 the value of the pentest
2.2 evolution of the pentest
2.3 a framework for repeatable testing
2.4 pentesting in the... | pdf |
Wesley McGrew
Assistant Research Professor
Mississippi State University
Department of Computer Science & Engineering
Distributed Analytics and Security Institute
Instrumenting Point-of-Sale
Malware
A Case Study in Communicating Malware Analysis More Effectively
Introduction
• The pragmatic and unapologetic offensi... | pdf |
Getting F***** on the River
Gus Fritschie and Steve Witmer
with help from
Mike Wright, and JD Durick
August 6, 2011
Presentation Overview
Preflop
Who We Are
What is Online Poker
Online Poker History
Current Events
Flop
Past Vulnerabilities
RNG
SuperUser
SSL
Account Compromise
Poker Bots
Turn
Online... | pdf |
DefCon 19, Las Vegas 2011
Port Scanning Without Sending Packets
Gregory Pickett, CISSP, GCIA, GPEN
Chicago, Illinois
gregory.pickett@hellfiresecurity.com
Hellfire Security
Overview
How This All Started
It’s Not A Magic Trick
Loose Lips Sink Ships
Catch Me If You Can
Back To The Future
Suppose You Have This Guy On Your ... | pdf |
目录
0 前言与基础概念
1 exec 无过滤拼接 RCE 易
2 任意文件写入 RCE 易
3 文件上传 RCE 中
4 任意登录后台+后台 RCE 易
5 SQL 语句执行+写入权限+绝对路径 RCE 易
6 XSS+electron RCE 易
7 XXE+php 协议 RCE 易
8 SSRF+远程文件下载 RCE 中
9 文件包含 RCE 中上
10 反序列化 RCE 难
11 表达式注入 RCE 中上
12 JNDI 注入 RCE 中上
13 JDBC+反序列化 RCE 中上
14 SSTI 注入 RCE 易
15 缓冲区溢出 RCE 难
16 php 环境变量注入 RCE... | pdf |
THE BLUETOOTH
DEVICE DATABASE
Ryan Holeman
twitter: @hackgnar
Sunday, July 7, 13
OVERVIEW
• Collect BT devices
Sunday, July 7, 13
WHY?
• Curiosity
• Awareness
• Provide open data sets
• Provide collection tools
Sunday, July 7, 13
WHAT?
• Data
• Device geolocation
• BT address
• BT device names
• BT meta data
Sunday, J... | pdf |
Power Analysis Attacks
能量分析攻擊
童御修1 李祐棠2 JP 2,3 陳君明4,5 鄭振牟1,3
1 國立臺灣大學 電機工程學系
2 國立臺灣大學 電信工程學研究所
3 中央研究院 資訊科技創新研究中心
4 國立臺灣大學 數學系
5 銓安智慧科技 (股)
Agenda
•Introduction
- Attacks on Implementations
- Experiment Setup
•Demo -- Break AES-128
•Power Analysis Attacks
- Foundation
- Example on AES-128
- Workflows ... | pdf |
$ whoami
b1t<master@zomeye.org>
GitHub/Twitter @zom3y3
#Pentest #C #Antivirus #Python #Botnet #DDoS
TO BE A MALWARE HUNTER!
Attention !
以下言论仅代表个人观点,与任何组织和其他个人没有任何关系
本议题数据纯属虚构,如有雷同纯属巧合
Outline
•
为什么研究僵尸网络?
•
僵尸网络识别、监控技术分享
•
Silver Lords黑客组织追踪分析
为什么研究僵尸网络
•
解决思路:封IP+杀进程
从哪里开始
•
2014年底,当我在阿里云每天需要解决30个“恶意主机”工单的时候…
怎么解决?
A... | pdf |
REFLECTION’S HIDDEN POWER
“MODIFYING PROGRAMS AT RUN-TIME”
By J~~~~~~~ M~~~~~~
5/27/08
i
Contents
Contents
......................................................................................................................................................
ii
Abstract
................................................ | pdf |
© 2011 绿盟科技
www.nsfocus.com
nsfocus.com
www.nsfocus.com
nsfocus.com
如何打造一款内网穿梭的利器
安全服务部 ---- 曲文集
引子
引子
它在这里
http://www.rootkiter.com/EarthWorm
引子
它的功能有
a) 端口转发(可团队协同)
b) 多平台支持
c) 和本地测试工具联动
d) 便携式
http://www.rootkiter.com/EarthWorm
引子
它的功能有
a) 端口转发(可团队协同)
b) 多平台支持
c) 和本地测试工具联动
d) 便携式... | pdf |
Secure SDLC Practices in
Smart Contracts Development
Speaker: Pavlo Radchuk
@rdchksec
2018
AppSec Engineer with Masters degree (several of experience)
Smart Contract Audit Team Lead
My team performs 7-10 audits per month
About me
Conducting different researches for new techniques, vulns etc.
Analyzing competitors rep... | pdf |
How
the
hell
do
you
play
this
game?
Page
2
of
42
An
Introduction........................................................................................................... 4
A
Thank
you ............................................................................................... | pdf |
De1CTF WP
Author:Nu1L Team
De1CTF WP
Misc
Misc/Misc Chowder
mc_join
Web
clac
check in
Hard_Pentest_1&2
Pwn
stl_container
code_runner
BroadCastTest
pppd
Crypto
ECDH
NLFSR
Homomorphic
Re
/little elves
parser
FLw
Misc
Misc/Misc Chowder
, pnghttps://drive.google.com/file/d/1JBdPj7eRaXuLCTFGn7Al
uAxmxQ4k1jvX/view
docx, , You... | pdf |
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75 | pdf |
Investigating the Practicality
and Cost of Abusing
Memory Errors with DNS
Project Bitfl1p by Luke Young
$ whoami
Undergraduate Student - Sophomore
Founder of Hydrant Labs LLC
This presentation is based upon research conducted as a employee of
Hydrant Labs LLC and was not supported or authorized by any previous,
cu... | pdf |
java-安全编码规范-1.0.1
java-安全编码规范-1.0.1
编写依据与参考文件:
1.《信息安全技术 应用软件安全编程指南》(国标 GBT38674-2020)
2.《国家电网公司网络和信息安全反违章措施-安全编码二十条》(信通技术〔2014〕117
号)
3.《国家电网公司应用软件系统通用安全要求》(企标 Q_GDW 1597-2015)
4.《Common Weakness Enumeration》 - 国际通用计算机软件缺陷字典
5.《OWASP Top 10 2017》 - 2017年十大Web 应用程序安全风险
6.《fortify - 代码审计规则》
7.《java开发手册》(阿里巴巴出品)
第一条 设计开发... | pdf |
I‘m on Your Phone, Listening –
Attacking VoIP Configuration
Interfaces
Stephan Huber | Fraunhofer SIT, Germany
Philipp Roskosch | Fraunhofer SIT, Germany
About us
Stephan
Security Researcher @Testlab
Mobile Security (Fraunhofer SIT)
Code Analysis Tool development
IOT Stuff
Founder of @TeamSIK
2
About us
Philipp
... | pdf |
A"GTVHACKER"LLC"PRODUCTION"
GTVHACKER"PRESENTS:
GTVHacker"
• Formed'to'root'the'original'
Google'TV'in'2010'
• Released'exploits'for'every'
Google'TV'device'
• Plus'some'others:'
Chromecast,'Roku,'Nest'
• Many'more'to'come!''
Speaking"Members"
Amir"Etemadieh"(Zenofex)"–'Research'ScienHst'at'Accuvant'LABS,'
founded... | pdf |
Adventures in buttplug
penetration (testing)
@smealum
Intro to teledildidonics
Word of the day
teledildonics /ˈtelədildōäniks/
From the Greek têle, meaning “afar”, and the English dildo, meaning “dildo”.
Use scenario 1: solo play
Use scenario 2: local co-op
Use scenario 3: remote co-op
Internet
Use scenario 3b: remote ... | pdf |
Clark County Detention Center
330 S. Casino Center Blvd (702-671-3900)
Las Vegas City Jail
3200 Stewart Ave (702-229-6099)
Emergency Contact #: _____________
Bail Bond Contact #: ______________
Clark County Detention Center
330 S. Casino Center Blvd (702-671-3900)
Las Vegas City Jail
3200 Stewart Ave (702-22... | pdf |
Anti-Forensics
and Anti-Anti-Forensics
by Michael Perklin
(But not Anti-Anti-Anti-Forensics)
(...or Uncle-Forensics...)
Outline
Techniques that can complicate digital-forensic
examinations
Methodologies to mitigate these techniques
Other digital complications
This talk will deal with a variety of complications that ca... | pdf |
Hacking Social Lives:
MySpace.com
Presented By Rick Deacon
DEFCON 15
August 3-5, 2007
A Quick Introduction
Full-time IT Specialist at a CPA firm located in
Beachwood, OH.
Part-time Student at Lorain County
Community College and the University of
Akron.
Studying for Bachelor’s in Computer
Information Systems – N... | pdf |
This document and its content is the property of Airbus Defence and Space.
It shall not be communicated to any third party without the owner’s written consent. All rights reserved.
Auditing 6LoWPAN networks
using Standard Penetration Testing Tools
Adam Reziouk
Arnaud Lebrun
Jonathan-Christofer Demay
2
Adam Rezi... | pdf |
Android
App逆向工程與簽章技術
Joey{27350000
@
hst.tw}
這場演講「三不一沒有」
三不一沒有
• 三不
– 我不是駭客(我是魯蛇)
– 我不會Android
– 這場演講不難,大家都聽得懂
• 一沒有
– 這場演講沒有太多梗,有的話幫幫忙笑一下
About
Me
• Joey
Chen
• 目前
- 國立臺灣科技大學資管所 菸酒生 研究生
- Hack-‐Stuff
Technology
Core
member
- 趨勢科技實習生
• 證照
– ISO
27001:2013
– BS
1001... | pdf |
Architecturally Leaking Data from the
Microarchitecture
Black Hat USA 2022
Pietro Borrello
Sapienza University of Rome
Andreas Kogler
Graz University of Technology
Martin Schwarzl
Graz University of Technology
Moritz Lipp
Amazon Web Services
Daniel Gruss
Graz University of Technology
Michael Schwarz
CISPA Helmholtz Cen... | pdf |
Oath Betrayed: Torture, Medical Complicity, and the War on Terror
by Steven H. Miles, M. D. (Random House. New York. 2006)
Reviewed by Richard Thieme
ThiemeWorks
PO Box 170737
Milwaukee WI 53217-8061
414 351 2321
rthieme@thiemeworks.com
www.thiemeworks.com
number of words in the body of the review: 765
We all come to b... | pdf |
2
3
4
5
6
•
•
•
•
•
•
•
7
Where do
the apps
store data?
Is data
cached in
multiple
places?
Is data
encrypted
on the
device?
Is the
message
recoverable
?
Is
supporting
evidence
present?
8
9
10
11
12
iTunes / API Can Access
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
•
•
•... | pdf |
URLDNS
ysoserial
首先是关于ysoserial项目,牛逼就完事了。
序列化的过程
1. 首先使用 ysoserial 生成反序列化文件,然后自行编写反序列流程,触发构造链。
踩坑:不要使用powershell生成,反序列化过程中会报错
2. 反序列化 bin 文件,触发 gadget :
3. 触发请求:
4. 然后查看urldns中gadget的生成过程:ysoserial入口文件位于: ysoserial.GeneratePayload ,
URLDNS文件: ysoserial.payloads.URLDNS
java -jar ysoserial-master-d367e379d9-1.jar URLDN... | pdf |
DEFCON 20
SAFES AND CONTAINERS –
INSECURITY DESIGN EXCELLANCE
DESIGN DEFECTS IN SECURITY
PRODUCTS THAT HAVE REAL
CONSEQUENCES IN
PROTECTING LIVES AND
PROPERTY
GUN SAFES: A CASE STUDY
♦ GUN SAFES AND PROPERTY SAFES
ARE SOLD TO STORE WEAPONS
♦ MANY ARE NOT SECURE
♦ ANALYSIS OF INSECURITY
– Boltworks and me... | pdf |
Module 1
A journey from high level languages, through
assembly, to the running process
https://github.com/hasherezade/malware_training_vol1
Creating Executables
Compiling, linking, etc
• The code of the application must be executed by a processor
• Depending on the programming language that we choose, the application ... | pdf |
Offensive Golang
Bonanza
Writing Golang Malware
Ben Kurtz @symbolcrash1 awgh@awgh.org
Introductions
First Defcon talk 16 years ago
Host of the Hack the Planet podcast
All kinds of random projects
Enough about me, we’ve gotta hustle
What We’re Doing
Easy Mode: Listen along and you’ll get a
sense of the ... | pdf |
利用GraalVM实现免杀加载器
2022-09-16 · 红蓝对抗
起因是与NoOne想围观一下CS47又整了些什么反破解操作,发现 TeamServerImage 套了个GraalVM。贴一段官
网的介绍以及如何看待乎的链接:
如何评价 GraalVM 这个项目?
性能优化就不说了,关键它支持多种主流语言的JIT和Java的AOT,也就是可以编译成不依赖外部JRE的
PE/ELF,大家有没有想起些什么~
精简JRE,打造无依赖的Java-ShellCode-Loader
Mr6师傅通过将精简JRE与JavaShellCodeLoader打包的方式,实现了免杀良好的加载器。GraalVM则是将class
编译为了机器码,一般不用再... | pdf |
Advanced MySQL Exploitation
Muhaimin Dzulfakar
Defcon 2009 – Las Vegas
1
Who am I
Muhaimin Dzulfakar
Security Consultant
Security-Assessment.com
2
SQL Injection
An attack technique used to exploit web sites that construct SQL
statement from user input
Normally it is used to read, modify and delete database data... | pdf |
Jailbreaking the 3DS
@smealum(
Intro to 3DS
”Old”(3DS(line
What’s a 3DS?
New(3DS(line
3DS(XL
2DS
New(3DS(XL
3DS
New(2DS(XL
New(3DS
• Out(starting(2014(
• CPU:(4x(ARM11(MPCore((804MHz)(
• GPU:(DMP(PICA(
• RAM:(256MB(FCRAM,(6MB(VRAM(
• IO/Security(CPU:(ARM946(
• Hardware-based(backwards(
compatible(with(... | pdf |
(((uuunnn))) SSSm
m
maaassshhhiiinnnggg ttthhheee SSStttaaaccckkk:::
22288 77755 666ee 22299 55533 666dd 66611 7733 66688 66699 66ee 66677 22200 55544 6688 6655 2200 55533 77744 66611 66633 666bb 333aa
8 5 e 9 3 d 1 73 8 9 6e 7 0 4 68 65 20
3 4 1 3 b ... | pdf |
android UnCrackable
OWASPcrackmeapp
Githubhttps://github.com/OWASP/owasp-mstg/tree/master/Crackmes
: https://pan.baidu.com/s/1YCiUU2Xy2xBSUQNxric8mQ : 81kn
pixel xl arm64-v8a
python 3.8.0
frida 12.8.0
java 11.0.8
jadx 1.1.0
IDA 7.0
Ghidra 9.1.2
Android Level 1
UnCrackable1
javaroot
jadxfrida
owasp-mstg/Crackmes/Androi... | pdf |
JS逆向 | WebPack站点实战(⼀)
收录于合集
#JS逆向
4个
⽂章配套B站视频,很多话语简略了,建议配着视频看。
地址:https://www.bilibili.com/video/BV13F411P7XB/
开始之前了,简单过⼀下下⾯⼏个⽅法加深印象,便于更好理解加载器。也可以直接从
webpack标题开始看起。
Function/函数/⽅法
常规的js函数命名⽅法:
//1. 常规function
var test = function(){
console.log(123);
}
function test(){
console.log(2);
}
今天的主⻆,⾃执⾏函数。
//2. ... | pdf |
Direct Memory Attack the KERNEL
by: ULF FRISK
Rise of the Machines:
Agenda
PWN LINUX, WINDOWS and OS X kernels by DMA code injection
DUMP memory at >150MB/s
PULL and PUSH files
EXECUTE code
OPEN SOURCE project
USING a $100 PCIe-card
About Me: Ulf Frisk
Penetration tester
Online banking security
Employed in the financia... | pdf |
WHY CORRUPTED (?) SAMPLES IN
RECENT APT?
-CASE OF JAPAN AND TAIWAN
By Suguru Ishimaru
Dec 2016
Introduction
3 |
Introduction
$ whoami
Suguru_ISHIMARU
$ whois suguru_ishimaru
Job_title: Researcher
Department: Global Research Analysis Team
Organization: Kaspersky Labs
E-mail: suguru.ishimaru[at]kaspersky.com
https://s... | pdf |
The SOA/XML Threat Model
and New XML/SOA/Web 2.0 Attacks & Threats
Steve Orrin
Dir of Security Solutions, SSG-SPI
Intel Corp.
Agenda
•Intro to SOA/Web 2.0 and the Security Challenge
•The XML/SOA Threat Model
•Details on XML/Web Services & SOA Threats
•Next Generation and Web 2.0 Threats
•The Evolving Enterprise and En... | pdf |
Suicide Risk Assessment
and Intervention Tactics
Amber Baldet
Trigger Warning:
Discussion of mental health, self-harm,
substance use/abuse, trauma, suicide
This won't be
depressing.
amberella@attrition.org
@amberbaldet
Today You Will Learn
● Risk analysis profiling framework
● Identifying clues & warning si... | pdf |
作者:http://www.sectop.com/
文档制作:http://www.mythhack.com
PHP 代码审计
目录
1. 概述 ...................................................................... 2
2. 输入验证和输出显示 ......................................................... 2
1.
命令注入 ............................................................ 3
2.
跨站脚本 ............... | pdf |
后渗透收集
参考链接
https://www.trendmicro.com/en_us/research/21/g/biopass-rat-new-malware-sniffs-victims-via-live-
streaming.html
表格
整理了BIOPASS RAT所做的动作
此模块部分不可用,请升级帐户后使用
AutoRun
为持久性创建计划任务
调用pythoncom进行
OpenEverything
Downloads and
runs Everything from
voidtools
会下载官方
everything,启动后使
用ShowWindow隐藏
窗口,everything启动
后会启动一个http... | pdf |
©2021 云安全联盟大中华区-版权所有
1
©2021 云安全联盟大中华区-版权所有
2
目 录
一、前
言..........................................................................................................................................5
二、落地案例清单........................................................................................................................ | pdf |
⸺frida
0x00
443flagssl
IDAIDAVPN
443
0x01
Atrust
frida
idapwnLinuxfrida
idakpi
pwn
“”
frida
1. webvpn
2.
ida
3. hook
fridavpnhookfuzz
0x02
fridafridafrida
apkapkapkfridaobjection
Linuxmacwindowshookfridafridahook
fridahook
demofrida-traceclihook
vpn
ps -ef | grep ECAgent //pid
sudo /home/miku/miniconda3/envs/py... | pdf |
The Pregnancy Panopticon
Cooper Quintin, Staff Technologist, EFF
July 2017
Defcon 25
ELECTRONIC FRONTIER FOUNDATION
EFF.ORG 1
Table of Contents
Abstract
3
Methods
3
MITM Proxy
4
Jadx and Android Studio
4
Kryptowire
4
Security Issues
5
Code execution and content injection
5
Account Hijacking
6... | pdf |
Comparing Application Security Tools
Defcon 15 - 8/3/2007
Eddie Lee
Fortify Software
Agenda
Intro to experiment
Methodology to reproduce experiment on your own
Results from my experiment
Conclusions
Introduction
Tools Used
“Market Leading” Dynamic Testing Tools
A Static Code Analyzer
Dynamic Test Tracing Tool
The Appli... | pdf |
提供各种IT类书籍pdf下载,如有需要,请 QQ: 2011705918
注:链接至淘宝,不喜者勿入! 整理那么多资料也不容易,请多多见谅!非诚勿扰!
[ G e n e r a l I n f o r ma t i o n ]
书名= 日志管理与分析权威指南
作者= (美)褚瓦金,(美)施密特,(美)菲利普斯著
丛书名= 华章程序员书库
页数= 3 1 6
S S 号= 1 3 5 8 9 0 4 2
出版日期= 2 0 1 4 . 0 6
出版社= 北京:机械工业出版社
I S B N 号= 9 7 8 - 7 - 1 1 1 - 4 6 9 1 8 - 6
中图法分类号= T P 3 9 3 . 0 7
原书定价= 6 9 ... | pdf |
0CTF-Writeup
Aut hor-Nu1L
PWN:
char
明显的栈溢出,但输入限制了只能是可打印字符,各种找rop gadget,通过int 0x80执
行execve
EXP:
from pwn import *
VERBOSE = 1
LOCAL = 1
DEBUG = 0
if VERBOSE:
context.log_level = 'debug'
if LOCAL:
io = process('./char')
if DEBUG:
gdb.attach(io)
else:
io = remote('202.120.7.214', 23222)
#raw_input('go?')
io.recvun... | pdf |
FOR THE LOVE OF MONEY
Finding and exploiting vulnerabilities in mobile point of sales
systems
LEIGH-ANNE GALLOWAY & TIM YUNUSOV
POSITIVE TECHNOLOGIES
MPOS GROWTH
2010
Single vendor
2018
Four leading vendors
shipping thousands of units per day
Motivations
Motivations
MWR Labs “Mission mPOSsible” 2014
Related Work
Me... | pdf |
ChatGPT技术分析
刘群 LIU Qun
华为诺亚方舟实验室 Huawei Noah’s Ark Lab
在线讲座 (an online lecture)
2023-02-16
ChatGPT概览
ChatGPT的出色表现
ChatGPT的关键技术
ChatGPT的不足之处
ChatGPT未来发展方向
Content
ChatGPT概览
ChatGPT的出色表现
ChatGPT的关键技术
ChatGPT的不足之处
ChatGPT未来发展方向
Content
ChatGPT轰动效应
▶ 用户数:5天100万,2个月达到1亿
▶ 所有人都开始讨论ChatGPT,传播速度堪比
新冠病毒
▶ Google内部拉响红色警报
▶ Googl... | pdf |
ExploitSpotting: Locating Vulnerabilities Out Of
Vendor Patches Automatically
Jeongwook Oh
Sr. Security Researcher
WebSense Inc.
Defcon 18
August 1st, 2010
Las Vegas, USA
Why?
● I worked on a security product last 5 years.
● The IPS and vulnerability scanner needed signatures
● We needed technical details on the patc... | pdf |
KILLSUIT
RESEARCH
F-Secure Countercept Whitepaper
F-Secure | Killsuit research
2
CONTENTS
What is Killsuit and how does it work ......................................................3
What is Killsuit ...................................................................................3
How does Killsuit infect a ma... | pdf |
企业安全技术体系建设与实践
关于我
胡珀 , lake2
□ 2007年加入腾讯安全平台部
□ 腾讯T4安全专家,目前负责应用运维安全
□ Web漏洞扫描器、恶意网址检测系统、主机安全Agent建设和运营
□ 安全事件响应、渗透测试、安全培训、安全评估、安全规范
□ 腾讯安全应急响应中心(TSRC)与威胁情报奖励计划
□ 移动安全 & 智能设备安全
关于腾讯
互联网之王,囊括几乎所有的互联网业务模式,安全上是巨大挑战
安全的三个阶段
救火队 -> 全面保障业务发展 -> 业务的核心竞争力
安全生命周期(SDL)
谷歌基础设施安全
学习谷歌先进经验
DDoS攻击防护
全国分布式防护
近源清洗 – 与云堤合作/终端预研中
最... | pdf |
Scripting #SWAG
RISE OF
THE
HYPEBOTS
Duct
Couldn’t buy anything due to bots
Decided to enter the game in 2012
Unfortunately still in the game.
Looks good tho?
About Me
Why Bots?
We Built the Internet
For Them.
The Bots We Loved
1988
1994
1999
2007
First Internet Bot spotted on IRC
AOL Releases WebCrawler
IRC’s fir... | pdf |
Mastering AWS Security
Create and maintain a secure cloud ecosystem
Albert Anthony
BIRMINGHAM - MUMBAI
Mastering AWS Security
Copyright © 2017 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means, without the prior written... | pdf |
@patrickwardle
‘DLL Hijacking’ on OS X?
#@%& Yeah!
“leverages the best combination of humans and technology to discover
security vulnerabilities in our customers’ web apps, mobile apps, and
infrastructure endpoints”
WHOIS
@patrickwardle
always looking for
more experts!
implants
backdoor
remotely accessible means of... | pdf |
The Emperor Has No Cloak – WEP Cloaking Exposed
Vivek Ramachandran
( vivek.ramachandran@airtightnetworks.net )
Deepak Gupta
( deepak.gupta@airtightnetworks.net )
Security Research Team (Amit, Gopi, Pravin)
AirTight Networks
www.airtightnetworks.net
Background
Claim: WEP key cracking can be prevented
using WEP C... | pdf |
Cautious! A New Exploitation Method!
No Pipe but as Nasty as Dirty Pipe
#BHUSA @BlackHatEvents
Zhenpeng Lin, Yuhang Wu, Xinyu Xing
Northwestern University
#BHUSA @BlackHatEvents
#DirtyCred
Zhenpeng Lin
@Markak_
Who Are We
Zhenpeng Lin
PhD Student
zplin.me
Xinyu Xing
Associate Professor
xinyuxing.org
Yuh... | pdf |
EasyTousePDDOS
:BurnerPhoneDDOS2Dollarsaday:70CallsaMin
WestonHeckerSecurityExpert
SystemsNetwork
Analyst/Penetrations
Tester/PresidentOfComputer
SecurityAssociationOf
NorthDakota
A1
Slide 1
A1
Author, 9/16/2013
WhoamIwhatisthistalkabout,
• AboutMe:PenetrationTester,ComputerScience/Geophysics,TonsofCerts,Customexploit... | pdf |
Adam Donenfeld
•
Android chipsets overview in ecosystem
•
Qualcomm chipset subsystem’s overview
•
New kernel vulnerabilities
•
Exploitation of a new kernel vulnerability
•
Conclusions
ADAM DONENFELD
• Years of experience in research (both PC and mobile)
• Vulnerability assessment
• Vulnerability exploitation
... | pdf |
FIRMWARE SLAP:
AUTOMATING DISCOVERY OF
EXPLOITABLE VULNERABILITIES IN
FIRMWARE
CHRISTOPHER ROBERTS
WHO AM I
• Researcher at REDLattice Inc.
• Interested in finding bugs in embedded systems
• Interested in program analysis
• CTF Player
A QUICK BACKGROUND
IN EXPLOITABLE BUGS
DARPA CYBER
GRAND
CHALLENGE
• Automated ... | pdf |
Relocation Bonus
Attacking the Windows Loader Makes Analysts Switch Careers
1 / 67
Introduction
Relocation Bonus - Introduction
2 / 67
Introduction
Nick Cano
Relocation Bonus - Introduction
2 / 67
Introduction
Nick Cano
25 years old
Relocation Bonus - Introduction
2 / 67
Introduction
Nick Cano
25 years old
Senior Secur... | pdf |
Winnti%Polymorphism%
Takahiro%Haruyama%
Symantec%
Who%am%I?%
• Takahiro%Haruyama%(@cci_forensics)%
• Reverse%Engineer%at%Symantec%
– Managed%Adversary%and%Threat%Intelligence%(MATI)%
• https://www.symantec.com/services/cyber-security-services/
deepsight-intelligence/adversary%
• Speaker%
– BlackHat%Briefings%USA/E... | pdf |
Lawful Interception of IP
Lawful Interception of IP
Traffic:
Traffic:
The European Context
The European Context
Jaya Baloo
Jaya Baloo
BLACKHAT
BLACKHAT
July 30, 2003
July 30, 2003
Las Vegas, Nevada
Las Vegas, Nevada
Contents
Contents
Introduction to Lawful Interception
Introduction to Lawful Interception
Interception... | pdf |
[Rabit2013@CloverSec]:~# whoami
ID: Rabit2013,Real name: 朱利军
[Rabit2013@CloverSec]:~# groupinfo
Job : CloverSec Co.,Ltd CSO & CloverSec Labs & Sec Lover
[Rabit2013@CloverSec]:~# cat Persional_Info.txt
•
西电研究生毕业(信息对抗、网络安全专业)
•
历届XDCTF组织与参与者
•
多届SSCTF网络攻防比赛组织与出题
•
某国企行业网络渗透评估
•
嵌入式漏洞挖掘挑战赛5个高危漏洞
•
通用Web应用系统漏洞挖掘若干
•
某国企单位... | pdf |
Introduction to CTF
Traditional Course Practice
More theory and basic concept, but less
practice and lab
Offensive Thinking
Think like a hacker
Real World Attack
Overall attack life cycle
Reconnaissance
Gaining Access
Maintain Access
Clearing Tracks
Need to cope with many fussy work
Most security... | pdf |
企业SDL实践与经验
美图安全经理、Security Paper发起人
SDL是什么
标准化
SDL基本流程
1. 安全培训
2. 需求评估
3. 产品设计
4. 代码编写
5. 渗透测试
6. 上线发布
7. 应急响应
安全培训 – 意识
WEB安全培训
• 针对服务端开发
• 哪里容易出现漏洞
• 怎么写会更安全
APP安全培训
• 针对APP开发
• 数据加密存储
• 不应该存储敏感数据
安全意识
• 针对全体项目成员
• 敏感数据处理办法
• 如何发送敏感数据
需求评估&产品设计 — 覆盖
应用系统自身架构安全
应用系统软件功能安全设计要求
应用系统存储安全设计要求
... | pdf |
一种 UTF-8 编码中文变量过 D 盾的方法
大家好,我是菜菜 reborn。起因是今天在复习 PHP 代码基础,从基
本的变量开始复习起,发现 PHP 变量原来支持中文,然后想起大佬
们都会做免杀,心血来潮想试试中文变量是否可以免杀。
第一种
第二种
然后我就写了两个简单的 assert 的这种马,当然高版本不支持 assert
了。
第一种是一开始我写的,然后我刚写完是不免杀的,4 级 D 盾,我转
成 UTF-8 的编码后,D 盾就杀不到了。
具体转的方式是用 notepad++转的。
第二种我刚写的时候 D 盾是 1 级。
然后转 UTF-8 后也是杀不到了。我不是很懂这里面的编码原理,但是
确实是过了下载... | pdf |
Franz Payer
Tactical Network Solutions
http://cyberexplo.it
Acknowledgements
Zachary Cutlip
Craig Heffner
Tactical Network Solutions
What I’m going to talk about
Music streaming basics
Security investigation process
Music player mimicking
Exploit demo
Man-in-the-middle interception
Questions
What is s... | pdf |
11
Machine Learning
22
Machine Learning as a Tool
33
Machine Learning as a Tool for Societal
Exploitation
44
A Summary on the Current and Future
State of Affairs
55
A Bit About Me
(I‘m going to pretend you care)
66
F1F1cin
Student at Columbia
University in New York
Independent Researcher
Mostly focus on malwar... | pdf |
1
Webshell 访问拦截绕过时候怎么办
安全狗不单单只拦截上传内容,还会检测拦截访问内容,若匹配中了访问规则,就会被拦截。绕
过很简单,只需要在访问的⽂件名后⾯加 / 就能绕过拦截。
正常请求:
绕过请求:
C
复制代码
http://192.168.142.140/coon.php
1
C
复制代码
http://192.168.142.140/coon.php/
1
2
该技巧仅在 WIndows 下⾯ PHP 7.1.32 安全狗的环境下测试成功,其他环境师傅请⾃测 | pdf |
f5
0x00
f5 big-iprceCVE-2022-1388httpd
pocconnection keepalive
smugglingsmugglingsmugglingpre-auth rcechybeta
hop-by-hophttps://t.zsxq.com/juJIAeEhop-by-hop
https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers
0x01 hop-by-hop
rfchttp
end-to-endhop-by-hop
Keep-Alive, Transfer-Encoding, TE, Connect... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.