text
stringlengths
100
9.93M
category
stringclasses
11 values
1 针对Dynamic Link Library(DLL)攻击⼿法的深⼊ 分析 1.Dynamic Link Library基础知识 1.1.DLL的结构 1.2加载DLL 1.2.1显式加载 1.2.2隐式加载 1.3.win常⽤dll及其功能简介 1.4.DLL如何加载 2.DLL劫持可能发⽣的⼏个场景 2.1.场景1:可以直接劫持某个应⽤的DLL 2.2.场景2:不存在DLL 劫持 2.3.场景3:DLL 搜索顺序劫持 2.4.其他 3.常⻅的DLL攻击利⽤⼿法 3.1.DLL 加载劫持进⾏钓⻥维权 3.1.1.实例1 Qbot(⼜名 Qakbot 或 Pinkslipbot)劫持Calc.exe的WindowsCodecs....
pdf
Go With the Flow: Enforcing Program Behavior Through Syscall Sequences and Origins Claudio Canella claudio.canella@iaik.tugraz.at Abstract As the number of vulnerabilities continues to increase every year, we require more and more methods of constraining the applications that run on our sys- tems. Control-Flow Integrit...
pdf
LTE REDIRECTION Forcing Targeted LTE Cellphone into Unsafe Network Wanqiao Zhang Unicorn Team – Communication security researcher Haoqi Shan Unicorn Team – Hardware/Wireless security researcher Qihoo 360 Technology Co. Ltd. LTE and IMSI catcher myths • In Nov. 2015, BlackHat EU, Ravishankar Borgaonkar, and Altaf Shaik ...
pdf
HITCON 101 Sharing SELinux 從不認識到在一起 About Me 王禹軒 (Bighead) ● 中央大學 Advanced Defense Lab ○ 打胖 ● 工研院 Intern ○ Whitelist 1.0 PoC ○ Hypervisor-based Whitelist (page verification) ○ SELinux SELinux Top Search The ways to disable SELinux ● Setenforce 0 ● Edit /etc/selinux/config : SELINUX = permissive or disable ● Delete pol...
pdf
Author: pen4uin 0x00 写在前面 0x01 获取Net-NTLM Hash 0x02 可利用的函数 01 include() 02 include_once() 03 require() 04 require_once() 05 file_get_contents() 06 file() 07 readfile() 08 file_exists() 09 filesize() 10 unlink() 11 fopen() 12 is_file() 13 file_put_contents() ∞ xxx() 0x03 可能出现的漏洞场景 SSRF file:// XXE php://filter 文件包含 文件删除...
pdf
JNDI 注⼊利⽤ Bypass ⾼版本 JDK 限制 0x00 前⾔ JNDI 注⼊利⽤⾮常⼴泛但是在⾼版本 JDK 中由于默认 codebase 为 true 从⽽导致客户端默认不会请求远程Server 上的恶意 Class,不过这种⼿法也有 Bypass 的⽅式,本⽂主要学习 KINGX 师傅所提出的两种 Bypass 的⽅法 KINGX 师傅⽂章链接:https://mp.weixin.qq.com/s/Dq1CPbUDLKH2IN0NA_nBDA JNDI 注⼊通常利⽤ rmi 、ldap 两种⽅式来进⾏利⽤,其中 ldap 所适⽤的 JDK 版本更加多⼀些 RMI:JDK 8u113、JDK 7u122、JDK 6u1...
pdf
Ayoub ELAASSAL ayoub.elaassal@wavestone.com @ayoul3__ CICS BREAKDOWN Hack your way to transaction city © WAVESTONE 2 What people think of when I talk about mainframes © WAVESTONE 3 The reality: IBM zEC 13 technical specs: • 10 TB of RAM • 141 processors,5 GHz • Dedicated processors for JAVA, XML and UNIX ...
pdf
Windows Internals Seventh Edition Part 2 Andrea Allievi Alex Ionescu Mark E. Russinovich David A. Solomon © Windows Internals, Seventh Edition, Part 2 Published with the authorization of Microsoft Corporation by: Pearson Education, Inc. Copyright © 2022 by Pearson Education, Inc. All rights reserved. This publication i...
pdf
Hacking Measured Boot and UEFI Dan Griffin JW Secure, Inc. WWJBD? Don’t let h@xors keep you from getting the girl… Introduction • What is UEFI? • What is a TPM? • What is “secure boot”? • What is “measured boot”? • What is “remote attestation”? Hardware Landscape • BYOD • Capability standards – Phones ...
pdf
Truman Kain TEVORA Dragnet Your Social Engineering Sidekick TL;DR Your social engineering conversions will increase with Dragnet. Current States of: •OSINT •Analytics •S.E. Engagements OSINT •Manual •Repetitive •Fleeting when automated Analytics Big companies live off of it –Jeff Bezos, 1997 “3 years ago I was wor...
pdf
Evil Printer How to Hack Windows Machines with Printing Protocol Who are We? • Zhipeng Huo (@R3dF09) • Senior security researcher • Member of EcoSec Team at Tencent Security Xuanwu Lab • Windows and macOS platform security • Speaker of Black Hat Europe 2018 Who are We? • Chuanda Ding (@FlowerCode_) • Senior security re...
pdf
第五空间 WriteUp By Nu1L 第五空间 WriteUp By Nu1L PWN bountyhunter CrazyVM notegame pb Crypto ecc signin doublesage Blockchain CallBox Web EasyCleanup pklovecloud PNG图⽚转换器 yet_another_mysql_injection WebFTP 个⼈信息保护 data_protection Mobile uniapp Misc 签到题 云安全 Cloud_QM PWN bountyhunter from pwn import * s = remote("139.9.123.168",...
pdf
Module 2 Typical goals of malware and their implementations https://github.com/hasherezade/malware_training_vol1 Hooking Hooking: the idea •Hooking means intercepting the original execution of the function with a custom code •Goal: to create a proxy through which the input/output of the called function bypasses •Po...
pdf
0-Day 輕鬆談 (0-Day Easy Talk) 2013/07/19 @ HITCON <Orange@chroot.org> Happy Fuzzing Internet Explorer 0-Day 甘苦談 (0-Day WTF Talk) 2013/07/19 @ HITCON <Orange@chroot.org> Happy Fuzzing Internet Explorer 這是一場簡單的演講 This is an Easy Talk 分享一些我的 Fuzzing 心得 Share Some Fuzzing Review of Mine 以及很...
pdf
How Unique is Your Browser? a report on the Panopticlick experiment Peter Eckersley Senior Staff Technologist Electronic Frontier Foundation pde@eff.org  What is “identifying information”? Name & address! But also... Latanya Sweeney: ZIP + DOB + gender identifies almost all US residents 7 billion people on earth → t...
pdf
So you think you want to be a pen-tester. Anch - @boneheadsanon – anch@subba.net Introductions • Penetration Tester – 10 years • Red Team Lead – 5 years • I’m here to help. • Contact Info: Twitter: @boneheadsanon E-Mail: anch@subba.net • The Leprecaun? The Wonderful World of Penetration Testing Misconceptions and R...
pdf
#BHUSA @BlackHatEvents Blasting Event-Driven Cornucopia: WMI-based User-Space Attacks Blind SIEMs and EDRs Claudiu Teodorescu Andrey Golchikov Igor Korkin #BHUSA @BlackHatEvents Information Classification: General The Binarly Team  Claudiu “to the rescue” Teodorescu – @cteo13  Digital Forensics, Reverse Engineerin...
pdf
Max Goncharov, Philippe Lin 2015/8/28-29 Your Lightbulb Is Not Hacking You – Observation from a Honeypot Backed by Real Devices 1 2 Hit-Point “ねこあつめ” $ whoami • Philippe Lin • Staff engineer, Trend Micro • (x) Maker (o) Cat Feeder 3 $ whoami • Max Goncharov • Senior Threat Researcher, Trend Micro • (x) Evil Russian Hac...
pdf
THE$ACHILLES'$HEEL$OF$CFI 关于 CFI 0 1 CFI 是什么 2005年微软研究院联合学术界提出的一项漏洞利用缓解技术 用于防御利用内存破坏漏洞来获得软件行为控制权的外部攻击 确保程序执行时的控制流转移符合事先确定的控制流图 关于 CFI 0 2 CFI 的实现 Clang CFI Microsoft Control Flow Guard Intel Control-Flow Enforcement Technology Microsoft eXtended Flow Guard Clang CFI 0 3 Clang CFI 如何工作 -fsanitize=cfi-cast-strict: Enable...
pdf
​ #!/usr/bin/env bash ####################################################### # # # 'ptrace_scope' misconfiguration # # Local Privilege Escalation # # # ##################...
pdf
How to Build Your Very Own Sleep Lab: The Execution Presented by: Keith Biddulph & Ne0nRa1n Overview What does it do? We're collecting data for later interpretation: Electroencephalogram (EEG) Heart rate monitor (HRM) Electronic Ocular Monitor (EOM) Infrared pictures Overview What does it not do? Breathing measuremen...
pdf
#BHUSA @BlackHatEvents Dive into Apple IO80211Family Vol. II wang yu #BHUSA @BlackHatEvents Information Classification: General About me yu.wang@cyberserval.cn Co-founder & CEO at Cyberserval https://www.cyberserval.com/ Background of this research project Dive into Apple IO80211FamilyV2 https://www.blackhat.com/us-20...
pdf
SAVING THE INTERNET Jay Healey @Jason_Healey Atlantic Council 1. Shift in people demographics – different nations, different values and relationship of millenials 2. Shift in device and computing demographics – massive uptick in devices (IoT and IoE), change in how people connect (mobile), change in how and wher...
pdf
Make JDBC Attack Brilliant Again Chen Hongkun(@Litch1) | Xu Yuanzhen(@pyn3rd) TRACK 2 Your Designation, Company Name Here 1.The derivation of JDBC attacking 2.In-depth analysis of occurred implementations 3.Set fire on JDBC of diverse applications Agenda 1.The derivation of JDBC attacking 2.In-depth analysis of occurre...
pdf
Your site here LOGO 移动APP风险防护与安全测评 Android平台 Your site here LOGO 移动APP风险防护  前言  APP面临的安全威胁  APP加固  APP原理  APP反编译保护  APP反汇编保护  APP防篡改保护  APP防调试与注入保护  APP脱壳攻击测试 Your site here LOGO 前言 Android开发者常常面临的一个问题就是防破解、 防二次打包。现如今,安全问题越来越重要,越来越多 的Android开发者也开始寻求安全的保护方案。 Your site here LOGO APP面临的安全威胁 ...
pdf
THE RADIOACTIVE BOY SCOUT: NOW EVERYONE CAN GET INTO THE NUCLEAR ARMS RACE WHAT IS A HACKER • SOMEONE VERY CREATIVE • AN EXPLORER • REVERSE ENGINEER • SOMEONE WHO DOES’T HAVE A BOX TO THINK OUT OF • DOESN’T DRINK THE KOOLAIDE • BOLDLY GOES WHERE NO MAN HAS GONE BEFORE RADIATION, GAMMA RAYS • HIGH ENERGY PHOTONS • CESIU...
pdf
John Menerick − August 2015 Backdooring Git ‹#› Legal Disclaimer ‹#› Thank you for coming ‹#› What we are covering ‹#› What we are not covering ‹#› What we are not covering ‹#› Software is like sex; it is better when it is free Linus Torvalds Name the Quote Setting the Stage ‹#› Good luck! ‹#› Revision control vs. Sou...
pdf
the pentest is dead, long live the pentest! Taylor Banks & Carric 1 carric 2 taylor 3 44 Overview 1 the pentest is dead 1.1 history of the pentest 1.2 pentesting goes mainstream 2 long live the pentest 2.1 the value of the pentest 2.2 evolution of the pentest 2.3 a framework for repeatable testing 2.4 pentesting in the...
pdf
Wesley McGrew Assistant Research Professor Mississippi State University Department of Computer Science & Engineering Distributed Analytics and Security Institute Instrumenting Point-of-Sale Malware A Case Study in Communicating Malware Analysis More Effectively Introduction • The pragmatic and unapologetic offensi...
pdf
Getting F***** on the River Gus Fritschie and Steve Witmer with help from Mike Wright, and JD Durick August 6, 2011 Presentation Overview Preflop Who We Are What is Online Poker Online Poker History Current Events Flop Past Vulnerabilities RNG SuperUser SSL Account Compromise Poker Bots Turn Online...
pdf
DefCon 19, Las Vegas 2011 Port Scanning Without Sending Packets Gregory Pickett, CISSP, GCIA, GPEN Chicago, Illinois gregory.pickett@hellfiresecurity.com Hellfire Security Overview How This All Started It’s Not A Magic Trick Loose Lips Sink Ships Catch Me If You Can Back To The Future Suppose You Have This Guy On Your ...
pdf
目录 0 前言与基础概念 1 exec 无过滤拼接 RCE 易 2 任意文件写入 RCE 易 3 文件上传 RCE 中 4 任意登录后台+后台 RCE 易 5 SQL 语句执行+写入权限+绝对路径 RCE 易 6 XSS+electron RCE 易 7 XXE+php 协议 RCE 易 8 SSRF+远程文件下载 RCE 中 9 文件包含 RCE 中上 10 反序列化 RCE 难 11 表达式注入 RCE 中上 12 JNDI 注入 RCE 中上 13 JDBC+反序列化 RCE 中上 14 SSTI 注入 RCE 易 15 缓冲区溢出 RCE 难 16 php 环境变量注入 RCE...
pdf
THE BLUETOOTH DEVICE DATABASE Ryan Holeman twitter: @hackgnar Sunday, July 7, 13 OVERVIEW • Collect BT devices Sunday, July 7, 13 WHY? • Curiosity • Awareness • Provide open data sets • Provide collection tools Sunday, July 7, 13 WHAT? • Data • Device geolocation • BT address • BT device names • BT meta data Sunday, J...
pdf
Power Analysis Attacks 能量分析攻擊 童御修1 李祐棠2 JP 2,3 陳君明4,5 鄭振牟1,3 1 國立臺灣大學 電機工程學系 2 國立臺灣大學 電信工程學研究所 3 中央研究院 資訊科技創新研究中心 4 國立臺灣大學 數學系 5 銓安智慧科技 (股) Agenda •Introduction - Attacks on Implementations - Experiment Setup •Demo -- Break AES-128 •Power Analysis Attacks - Foundation - Example on AES-128 - Workflows ...
pdf
$ whoami b1t<master@zomeye.org> GitHub/Twitter @zom3y3 #Pentest #C #Antivirus #Python #Botnet #DDoS TO BE A MALWARE HUNTER! Attention ! 以下言论仅代表个人观点,与任何组织和其他个人没有任何关系 本议题数据纯属虚构,如有雷同纯属巧合 Outline • 为什么研究僵尸网络? • 僵尸网络识别、监控技术分享 • Silver Lords黑客组织追踪分析 为什么研究僵尸网络 • 解决思路:封IP+杀进程 从哪里开始 • 2014年底,当我在阿里云每天需要解决30个“恶意主机”工单的时候… 怎么解决? A...
pdf
REFLECTION’S HIDDEN POWER “MODIFYING PROGRAMS AT RUN-TIME” By J~~~~~~~ M~~~~~~ 5/27/08 i Contents Contents ...................................................................................................................................................... ii Abstract ................................................
pdf
© 2011 绿盟科技 www.nsfocus.com nsfocus.com www.nsfocus.com nsfocus.com 如何打造一款内网穿梭的利器 安全服务部 ---- 曲文集 引子 引子 它在这里 http://www.rootkiter.com/EarthWorm 引子 它的功能有 a) 端口转发(可团队协同) b) 多平台支持 c) 和本地测试工具联动 d) 便携式 http://www.rootkiter.com/EarthWorm 引子 它的功能有 a) 端口转发(可团队协同) b) 多平台支持 c) 和本地测试工具联动 d) 便携式...
pdf
Secure SDLC Practices in Smart Contracts Development Speaker: Pavlo Radchuk @rdchksec 2018 AppSec Engineer with Masters degree (several of experience) Smart Contract Audit Team Lead My team performs 7-10 audits per month About me Conducting different researches for new techniques, vulns etc. Analyzing competitors rep...
pdf
How  the  hell  do  you  play  this  game? Page  2  of  42 An  Introduction........................................................................................................... 4 A  Thank  you ...............................................................................................
pdf
De1CTF WP Author:Nu1L Team De1CTF WP Misc Misc/Misc Chowder mc_join Web clac check in Hard_Pentest_1&2 Pwn stl_container code_runner BroadCastTest pppd Crypto ECDH NLFSR Homomorphic Re /little elves parser FLw Misc Misc/Misc Chowder , pnghttps://drive.google.com/file/d/1JBdPj7eRaXuLCTFGn7Al uAxmxQ4k1jvX/view docx, , You...
pdf
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75
pdf
Investigating the Practicality and Cost of Abusing Memory Errors with DNS Project Bitfl1p by Luke Young $ whoami Undergraduate Student - Sophomore Founder of Hydrant Labs LLC This presentation is based upon research conducted as a employee of Hydrant Labs LLC and was not supported or authorized by any previous, cu...
pdf
java-安全编码规范-1.0.1 java-安全编码规范-1.0.1 编写依据与参考文件: 1.《信息安全技术 应用软件安全编程指南》(国标 GBT38674-2020) 2.《国家电网公司网络和信息安全反违章措施-安全编码二十条》(信通技术〔2014〕117 号) 3.《国家电网公司应用软件系统通用安全要求》(企标 Q_GDW 1597-2015) 4.《Common Weakness Enumeration》 - 国际通用计算机软件缺陷字典 5.《OWASP Top 10 2017》 - 2017年十大Web 应用程序安全风险 6.《fortify - 代码审计规则》 7.《java开发手册》(阿里巴巴出品) 第一条 设计开发...
pdf
I‘m on Your Phone, Listening – Attacking VoIP Configuration Interfaces Stephan Huber | Fraunhofer SIT, Germany Philipp Roskosch | Fraunhofer SIT, Germany About us Stephan Security Researcher @Testlab Mobile Security (Fraunhofer SIT) Code Analysis Tool development IOT Stuff Founder of @TeamSIK 2 About us Philipp ...
pdf
A"GTVHACKER"LLC"PRODUCTION" GTVHACKER"PRESENTS: GTVHacker" •  Formed'to'root'the'original' Google'TV'in'2010' •  Released'exploits'for'every' Google'TV'device' •  Plus'some'others:' Chromecast,'Roku,'Nest' •  Many'more'to'come!'' Speaking"Members" Amir"Etemadieh"(Zenofex)"–'Research'ScienHst'at'Accuvant'LABS,' founded...
pdf
Adventures in buttplug penetration (testing) @smealum Intro to teledildidonics Word of the day teledildonics /ˈtelədildōäniks/ From the Greek têle, meaning “afar”, and the English dildo, meaning “dildo”. Use scenario 1: solo play Use scenario 2: local co-op Use scenario 3: remote co-op Internet Use scenario 3b: remote ...
pdf
Clark County Detention Center 330 S. Casino Center Blvd (702-671-3900) Las Vegas City Jail 3200 Stewart Ave (702-229-6099) Emergency Contact #: _____________ Bail Bond Contact #: ______________ Clark County Detention Center 330 S. Casino Center Blvd (702-671-3900) Las Vegas City Jail 3200 Stewart Ave (702-22...
pdf
Anti-Forensics and Anti-Anti-Forensics by Michael Perklin (But not Anti-Anti-Anti-Forensics) (...or Uncle-Forensics...) Outline Techniques that can complicate digital-forensic examinations Methodologies to mitigate these techniques Other digital complications This talk will deal with a variety of complications that ca...
pdf
Hacking Social Lives: MySpace.com Presented By Rick Deacon DEFCON 15 August 3-5, 2007 A Quick Introduction Full-time IT Specialist at a CPA firm located in Beachwood, OH. Part-time Student at Lorain County Community College and the University of Akron. Studying for Bachelor’s in Computer Information Systems – N...
pdf
This document and its content is the property of Airbus Defence and Space. It shall not be communicated to any third party without the owner’s written consent. All rights reserved. Auditing 6LoWPAN networks using Standard Penetration Testing Tools Adam Reziouk Arnaud Lebrun Jonathan-Christofer Demay 2 Adam Rezi...
pdf
Android  App逆向工程與簽章技術 Joey{27350000  @  hst.tw} 這場演講「三不一沒有」 三不一沒有 •  三不 – 我不是駭客(我是魯蛇) – 我不會Android – 這場演講不難,大家都聽得懂 •  一沒有 – 這場演講沒有太多梗,有的話幫幫忙笑一下 About  Me •  Joey  Chen •  目前 -  國立臺灣科技大學資管所 菸酒生 研究生 -  Hack-­‐Stuff  Technology  Core  member -  趨勢科技實習生 •  證照 –  ISO  27001:2013 –  BS  1001...
pdf
Architecturally Leaking Data from the Microarchitecture Black Hat USA 2022 Pietro Borrello Sapienza University of Rome Andreas Kogler Graz University of Technology Martin Schwarzl Graz University of Technology Moritz Lipp Amazon Web Services Daniel Gruss Graz University of Technology Michael Schwarz CISPA Helmholtz Cen...
pdf
Oath Betrayed: Torture, Medical Complicity, and the War on Terror by Steven H. Miles, M. D. (Random House. New York. 2006) Reviewed by Richard Thieme ThiemeWorks PO Box 170737 Milwaukee WI 53217-8061 414 351 2321 rthieme@thiemeworks.com www.thiemeworks.com number of words in the body of the review: 765 We all come to b...
pdf
2 3 4 5 6 • • • • • • • 7 Where do the apps store data? Is data cached in multiple places? Is data encrypted on the device? Is the message recoverable ? Is supporting evidence present? 8 9 10 11 12 iTunes / API Can Access 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 • • •...
pdf
URLDNS ysoserial 首先是关于ysoserial项目,牛逼就完事了。 序列化的过程 1. 首先使用 ysoserial 生成反序列化文件,然后自行编写反序列流程,触发构造链。 踩坑:不要使用powershell生成,反序列化过程中会报错 2. 反序列化 bin 文件,触发 gadget : 3. 触发请求: 4. 然后查看urldns中gadget的生成过程:ysoserial入口文件位于: ysoserial.GeneratePayload , URLDNS文件: ysoserial.payloads.URLDNS java -jar ysoserial-master-d367e379d9-1.jar URLDN...
pdf
DEFCON 20 SAFES AND CONTAINERS – INSECURITY DESIGN EXCELLANCE DESIGN DEFECTS IN SECURITY PRODUCTS THAT HAVE REAL CONSEQUENCES IN PROTECTING LIVES AND PROPERTY GUN SAFES: A CASE STUDY ♦ GUN SAFES AND PROPERTY SAFES ARE SOLD TO STORE WEAPONS ♦ MANY ARE NOT SECURE ♦ ANALYSIS OF INSECURITY –  Boltworks and me...
pdf
Module 1 A journey from high level languages, through assembly, to the running process https://github.com/hasherezade/malware_training_vol1 Creating Executables Compiling, linking, etc • The code of the application must be executed by a processor • Depending on the programming language that we choose, the application ...
pdf
Offensive Golang Bonanza Writing Golang Malware Ben Kurtz @symbolcrash1 awgh@awgh.org Introductions First Defcon talk 16 years ago Host of the Hack the Planet podcast All kinds of random projects Enough about me, we’ve gotta hustle What We’re Doing Easy Mode: Listen along and you’ll get a sense of the ...
pdf
利用GraalVM实现免杀加载器 2022-09-16 · 红蓝对抗 起因是与NoOne想围观一下CS47又整了些什么反破解操作,发现 TeamServerImage 套了个GraalVM。贴一段官 网的介绍以及如何看待乎的链接: 如何评价 GraalVM 这个项目? 性能优化就不说了,关键它支持多种主流语言的JIT和Java的AOT,也就是可以编译成不依赖外部JRE的 PE/ELF,大家有没有想起些什么~ 精简JRE,打造无依赖的Java-ShellCode-Loader Mr6师傅通过将精简JRE与JavaShellCodeLoader打包的方式,实现了免杀良好的加载器。GraalVM则是将class 编译为了机器码,一般不用再...
pdf
Advanced MySQL Exploitation Muhaimin Dzulfakar Defcon 2009 – Las Vegas 1 Who am I Muhaimin Dzulfakar Security Consultant Security-Assessment.com 2 SQL Injection An attack technique used to exploit web sites that construct SQL statement from user input Normally it is used to read, modify and delete database data...
pdf
Jailbreaking the 3DS @smealum( Intro to 3DS ”Old”(3DS(line What’s a 3DS? New(3DS(line 3DS(XL 2DS New(3DS(XL 3DS New(2DS(XL New(3DS •  Out(starting(2014( •  CPU:(4x(ARM11(MPCore((804MHz)( •  GPU:(DMP(PICA( •  RAM:(256MB(FCRAM,(6MB(VRAM( •  IO/Security(CPU:(ARM946( •  Hardware-based(backwards( compatible(with(...
pdf
(((uuunnn))) SSSm m maaassshhhiiinnnggg ttthhheee SSStttaaaccckkk::: 22288 77755 666ee 22299 55533 666dd 66611 7733 66688 66699 66ee 66677 22200 55544 6688 6655 2200 55533 77744 66611 66633 666bb 333aa 8 5 e 9 3 d 1 73 8 9 6e 7 0 4 68 65 20 3 4 1 3 b ...
pdf
android UnCrackable OWASPcrackmeapp Githubhttps://github.com/OWASP/owasp-mstg/tree/master/Crackmes : https://pan.baidu.com/s/1YCiUU2Xy2xBSUQNxric8mQ : 81kn pixel xl arm64-v8a python 3.8.0 frida 12.8.0 java 11.0.8 jadx 1.1.0 IDA 7.0 Ghidra 9.1.2 Android Level 1 UnCrackable1 javaroot jadxfrida owasp-mstg/Crackmes/Androi...
pdf
JS逆向 | WebPack站点实战(⼀) 收录于合集 #JS逆向 4个 ⽂章配套B站视频,很多话语简略了,建议配着视频看。 地址:https://www.bilibili.com/video/BV13F411P7XB/ 开始之前了,简单过⼀下下⾯⼏个⽅法加深印象,便于更好理解加载器。也可以直接从 webpack标题开始看起。 Function/函数/⽅法 常规的js函数命名⽅法: //1. 常规function var test = function(){     console.log(123); } function test(){     console.log(2); } 今天的主⻆,⾃执⾏函数。 //2. ...
pdf
Direct Memory Attack the KERNEL by: ULF FRISK Rise of the Machines: Agenda PWN LINUX, WINDOWS and OS X kernels by DMA code injection DUMP memory at >150MB/s PULL and PUSH files EXECUTE code OPEN SOURCE project USING a $100 PCIe-card About Me: Ulf Frisk Penetration tester Online banking security Employed in the financia...
pdf
WHY CORRUPTED (?) SAMPLES IN RECENT APT? -CASE OF JAPAN AND TAIWAN By Suguru Ishimaru Dec 2016 Introduction 3 | Introduction $ whoami Suguru_ISHIMARU $ whois suguru_ishimaru Job_title: Researcher Department: Global Research Analysis Team Organization: Kaspersky Labs E-mail: suguru.ishimaru[at]kaspersky.com https://s...
pdf
The SOA/XML Threat Model and New XML/SOA/Web 2.0 Attacks & Threats Steve Orrin Dir of Security Solutions, SSG-SPI Intel Corp. Agenda •Intro to SOA/Web 2.0 and the Security Challenge •The XML/SOA Threat Model •Details on XML/Web Services & SOA Threats •Next Generation and Web 2.0 Threats •The Evolving Enterprise and En...
pdf
Suicide Risk Assessment and Intervention Tactics Amber Baldet Trigger Warning: Discussion of mental health, self-harm, substance use/abuse, trauma, suicide This won't be depressing. amberella@attrition.org @amberbaldet Today You Will Learn ● Risk analysis profiling framework ● Identifying clues & warning si...
pdf
作者:http://www.sectop.com/ 文档制作:http://www.mythhack.com PHP 代码审计 目录 1. 概述 ...................................................................... 2 2. 输入验证和输出显示 ......................................................... 2 1. 命令注入 ............................................................ 3 2. 跨站脚本 ...............
pdf
后渗透收集 参考链接 https://www.trendmicro.com/en_us/research/21/g/biopass-rat-new-malware-sniffs-victims-via-live- streaming.html 表格 整理了BIOPASS RAT所做的动作 此模块部分不可用,请升级帐户后使用 AutoRun 为持久性创建计划任务 调用pythoncom进行 OpenEverything Downloads and runs Everything from voidtools 会下载官方 everything,启动后使 用ShowWindow隐藏 窗口,everything启动 后会启动一个http...
pdf
©2021 云安全联盟大中华区-版权所有 1 ©2021 云安全联盟大中华区-版权所有 2 目 录 一、前 言..........................................................................................................................................5 二、落地案例清单........................................................................................................................
pdf
⸺frida 0x00 443flagssl IDAIDAVPN 443 0x01 Atrust frida idapwnLinuxfrida idakpi pwn “” frida 1. webvpn 2. ida 3. hook fridavpnhookfuzz 0x02 fridafridafrida apkapkapkfridaobjection Linuxmacwindowshookfridafridahook fridahook demofrida-traceclihook vpn ps -ef | grep ECAgent //pid sudo /home/miku/miniconda3/envs/py...
pdf
The Pregnancy Panopticon  Cooper Quintin, Staff Technologist, EFF  July 2017  Defcon 25  ELECTRONIC FRONTIER FOUNDATION  EFF.ORG              1  Table of Contents  Abstract 3  Methods 3  MITM Proxy 4  Jadx and Android Studio 4  Kryptowire 4  Security Issues 5  Code execution and content injection 5  Account Hijacking 6...
pdf
Comparing Application Security Tools Defcon 15 - 8/3/2007 Eddie Lee Fortify Software Agenda Intro to experiment Methodology to reproduce experiment on your own Results from my experiment Conclusions Introduction Tools Used “Market Leading” Dynamic Testing Tools A Static Code Analyzer Dynamic Test Tracing Tool The Appli...
pdf
提供各种IT类书籍pdf下载,如有需要,请 QQ: 2011705918 注:链接至淘宝,不喜者勿入! 整理那么多资料也不容易,请多多见谅!非诚勿扰! [ G e n e r a l I n f o r ma t i o n ] 书名= 日志管理与分析权威指南 作者= (美)褚瓦金,(美)施密特,(美)菲利普斯著 丛书名= 华章程序员书库 页数= 3 1 6 S S 号= 1 3 5 8 9 0 4 2 出版日期= 2 0 1 4 . 0 6 出版社= 北京:机械工业出版社 I S B N 号= 9 7 8 - 7 - 1 1 1 - 4 6 9 1 8 - 6 中图法分类号= T P 3 9 3 . 0 7 原书定价= 6 9 ...
pdf
0CTF-Writeup Aut hor-Nu1L PWN: char 明显的栈溢出,但输入限制了只能是可打印字符,各种找rop gadget,通过int 0x80执 行execve EXP: from pwn import * VERBOSE = 1 LOCAL = 1 DEBUG = 0 if VERBOSE: context.log_level = 'debug' if LOCAL: io = process('./char') if DEBUG: gdb.attach(io) else: io = remote('202.120.7.214', 23222) #raw_input('go?') io.recvun...
pdf
FOR THE LOVE OF MONEY Finding and exploiting vulnerabilities in mobile point of sales systems LEIGH-ANNE GALLOWAY & TIM YUNUSOV POSITIVE TECHNOLOGIES MPOS GROWTH 2010 Single vendor 2018 Four leading vendors shipping thousands of units per day Motivations Motivations MWR Labs “Mission mPOSsible” 2014 Related Work Me...
pdf
ChatGPT技术分析 刘群 LIU Qun 华为诺亚方舟实验室 Huawei Noah’s Ark Lab 在线讲座 (an online lecture) 2023-02-16 ChatGPT概览 ChatGPT的出色表现 ChatGPT的关键技术 ChatGPT的不足之处 ChatGPT未来发展方向 Content ChatGPT概览 ChatGPT的出色表现 ChatGPT的关键技术 ChatGPT的不足之处 ChatGPT未来发展方向 Content ChatGPT轰动效应 ▶ 用户数:5天100万,2个月达到1亿 ▶ 所有人都开始讨论ChatGPT,传播速度堪比 新冠病毒 ▶ Google内部拉响红色警报 ▶ Googl...
pdf
ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically Jeongwook Oh Sr. Security Researcher WebSense Inc. Defcon 18 August 1st, 2010 Las Vegas, USA Why? ● I worked on a security product last 5 years. ● The IPS and vulnerability scanner needed signatures ● We needed technical details on the patc...
pdf
KILLSUIT RESEARCH F-Secure Countercept Whitepaper F-Secure | Killsuit research 2 CONTENTS What is Killsuit and how does it work ......................................................3 What is Killsuit ...................................................................................3 How does Killsuit infect a ma...
pdf
企业安全技术体系建设与实践 关于我 胡珀 , lake2 □ 2007年加入腾讯安全平台部 □ 腾讯T4安全专家,目前负责应用运维安全 □ Web漏洞扫描器、恶意网址检测系统、主机安全Agent建设和运营 □ 安全事件响应、渗透测试、安全培训、安全评估、安全规范 □ 腾讯安全应急响应中心(TSRC)与威胁情报奖励计划 □ 移动安全 & 智能设备安全 关于腾讯 互联网之王,囊括几乎所有的互联网业务模式,安全上是巨大挑战 安全的三个阶段 救火队 -> 全面保障业务发展 -> 业务的核心竞争力 安全生命周期(SDL) 谷歌基础设施安全 学习谷歌先进经验 DDoS攻击防护 全国分布式防护 近源清洗 – 与云堤合作/终端预研中 最...
pdf
Scripting #SWAG RISE OF THE HYPEBOTS Duct Couldn’t buy anything due to bots Decided to enter the game in 2012 Unfortunately still in the game. Looks good tho? About Me Why Bots? We Built the Internet For Them. The Bots We Loved 1988 1994 1999 2007 First Internet Bot spotted on IRC AOL Releases WebCrawler IRC’s fir...
pdf
Mastering AWS Security Create and maintain a secure cloud ecosystem Albert Anthony BIRMINGHAM - MUMBAI Mastering AWS Security Copyright © 2017 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written...
pdf
@patrickwardle ‘DLL Hijacking’ on OS X? #@%& Yeah! “leverages the best combination of humans and technology to discover security vulnerabilities in our customers’ web apps, mobile apps, and infrastructure endpoints” WHOIS @patrickwardle always looking for more experts! implants backdoor remotely accessible means of...
pdf
The Emperor Has No Cloak – WEP Cloaking Exposed Vivek Ramachandran ( vivek.ramachandran@airtightnetworks.net ) Deepak Gupta ( deepak.gupta@airtightnetworks.net ) Security Research Team (Amit, Gopi, Pravin) AirTight Networks www.airtightnetworks.net Background Claim: WEP key cracking can be prevented using WEP C...
pdf
Cautious! A New Exploitation Method! No Pipe but as Nasty as Dirty Pipe #BHUSA  @BlackHatEvents Zhenpeng Lin, Yuhang Wu, Xinyu Xing Northwestern University #BHUSA   @BlackHatEvents #DirtyCred   Zhenpeng Lin @Markak_ Who Are We Zhenpeng Lin PhD Student zplin.me Xinyu Xing Associate Professor xinyuxing.org Yuh...
pdf
EasyTousePDDOS :BurnerPhoneDDOS2Dollarsaday:70CallsaMin WestonHeckerSecurityExpert SystemsNetwork Analyst/Penetrations Tester/PresidentOfComputer SecurityAssociationOf NorthDakota A1 Slide 1 A1 Author, 9/16/2013 WhoamIwhatisthistalkabout, • AboutMe:PenetrationTester,ComputerScience/Geophysics,TonsofCerts,Customexploit...
pdf
Adam Donenfeld • Android chipsets overview in ecosystem • Qualcomm chipset subsystem’s overview • New kernel vulnerabilities • Exploitation of a new kernel vulnerability • Conclusions ADAM DONENFELD • Years of experience in research (both PC and mobile) • Vulnerability assessment • Vulnerability exploitation ...
pdf
FIRMWARE SLAP: AUTOMATING DISCOVERY OF EXPLOITABLE VULNERABILITIES IN FIRMWARE CHRISTOPHER ROBERTS WHO AM I • Researcher at REDLattice Inc. • Interested in finding bugs in embedded systems • Interested in program analysis • CTF Player A QUICK BACKGROUND IN EXPLOITABLE BUGS DARPA CYBER GRAND CHALLENGE • Automated ...
pdf
Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers 1 / 67 Introduction Relocation Bonus - Introduction 2 / 67 Introduction Nick Cano Relocation Bonus - Introduction 2 / 67 Introduction Nick Cano 25 years old Relocation Bonus - Introduction 2 / 67 Introduction Nick Cano 25 years old Senior Secur...
pdf
Winnti%Polymorphism% Takahiro%Haruyama% Symantec% Who%am%I?% •  Takahiro%Haruyama%(@cci_forensics)% •  Reverse%Engineer%at%Symantec% –  Managed%Adversary%and%Threat%Intelligence%(MATI)% •  https://www.symantec.com/services/cyber-security-services/ deepsight-intelligence/adversary% •  Speaker% –  BlackHat%Briefings%USA/E...
pdf
Lawful Interception of IP Lawful Interception of IP Traffic: Traffic: The European Context The European Context Jaya Baloo Jaya Baloo BLACKHAT BLACKHAT July 30, 2003 July 30, 2003 Las Vegas, Nevada Las Vegas, Nevada Contents Contents Introduction to Lawful Interception Introduction to Lawful Interception Interception...
pdf
[Rabit2013@CloverSec]:~# whoami ID: Rabit2013,Real name: 朱利军 [Rabit2013@CloverSec]:~# groupinfo Job : CloverSec Co.,Ltd CSO & CloverSec Labs & Sec Lover [Rabit2013@CloverSec]:~# cat Persional_Info.txt • 西电研究生毕业(信息对抗、网络安全专业) • 历届XDCTF组织与参与者 • 多届SSCTF网络攻防比赛组织与出题 • 某国企行业网络渗透评估 • 嵌入式漏洞挖掘挑战赛5个高危漏洞 • 通用Web应用系统漏洞挖掘若干 • 某国企单位...
pdf
Introduction to CTF Traditional Course Practice  More theory and basic concept, but less practice and lab  Offensive Thinking  Think like a hacker Real World Attack  Overall attack life cycle  Reconnaissance  Gaining Access  Maintain Access  Clearing Tracks  Need to cope with many fussy work  Most security...
pdf
企业SDL实践与经验 美图安全经理、Security Paper发起人 SDL是什么 标准化 SDL基本流程 1. 安全培训 2. 需求评估 3. 产品设计 4. 代码编写 5. 渗透测试 6. 上线发布 7. 应急响应 安全培训 – 意识 WEB安全培训 • 针对服务端开发 • 哪里容易出现漏洞 • 怎么写会更安全 APP安全培训 • 针对APP开发 • 数据加密存储 • 不应该存储敏感数据 安全意识 • 针对全体项目成员 • 敏感数据处理办法 • 如何发送敏感数据 需求评估&产品设计 — 覆盖 应用系统自身架构安全 应用系统软件功能安全设计要求 应用系统存储安全设计要求 ...
pdf
一种 UTF-8 编码中文变量过 D 盾的方法 大家好,我是菜菜 reborn。起因是今天在复习 PHP 代码基础,从基 本的变量开始复习起,发现 PHP 变量原来支持中文,然后想起大佬 们都会做免杀,心血来潮想试试中文变量是否可以免杀。 第一种 第二种 然后我就写了两个简单的 assert 的这种马,当然高版本不支持 assert 了。 第一种是一开始我写的,然后我刚写完是不免杀的,4 级 D 盾,我转 成 UTF-8 的编码后,D 盾就杀不到了。 具体转的方式是用 notepad++转的。 第二种我刚写的时候 D 盾是 1 级。 然后转 UTF-8 后也是杀不到了。我不是很懂这里面的编码原理,但是 确实是过了下载...
pdf
Franz Payer Tactical Network Solutions http://cyberexplo.it Acknowledgements  Zachary Cutlip  Craig Heffner  Tactical Network Solutions What I’m going to talk about  Music streaming basics  Security investigation process  Music player mimicking  Exploit demo  Man-in-the-middle interception  Questions What is s...
pdf
11 Machine Learning 22 Machine Learning as a Tool 33 Machine Learning as a Tool for Societal Exploitation 44 A Summary on the Current and Future State of Affairs 55 A Bit About Me (I‘m going to pretend you care) 66 F1F1cin  Student at Columbia University in New York  Independent Researcher  Mostly focus on malwar...
pdf
1 Webshell 访问拦截绕过时候怎么办 安全狗不单单只拦截上传内容,还会检测拦截访问内容,若匹配中了访问规则,就会被拦截。绕 过很简单,只需要在访问的⽂件名后⾯加 / 就能绕过拦截。 正常请求: 绕过请求: C 复制代码 http://192.168.142.140/coon.php 1 C 复制代码 http://192.168.142.140/coon.php/ 1 2 该技巧仅在 WIndows 下⾯ PHP 7.1.32 安全狗的环境下测试成功,其他环境师傅请⾃测
pdf
f5 0x00 f5 big-iprceCVE-2022-1388httpd pocconnection keepalive smugglingsmugglingsmugglingpre-auth rcechybeta hop-by-hophttps://t.zsxq.com/juJIAeEhop-by-hop https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers 0x01 hop-by-hop rfchttp end-to-endhop-by-hop Keep-Alive, Transfer-Encoding, TE, Connect...
pdf