text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Defcon 11
Las Vegas, NV USA
FILE: dc11-havenco.sxi / 24/01/03 / Page 1
ryan@metacolo.com
HavenCo: what really happened
HavenCo: what really happened
Ryan Lackey
<ryan@metacolo.com>
3 August 2003
Defcon 11, Las Vegas, CA USA
latest version and supporting docs at:
http://www.metacolo.com/papers/dc11-havenco/
Defcon ... | pdf |
dwangoAC
TASBot
the perfectionist
The amazing life & achievements of...
Twitch.tv/dwangoAC twitter @MrTASBot
Allan 'dwangoAC' Cecil
http://acbit.net
Presented and written by...
Allan 'dwangoAC' Cecil
President of the North Bay Linux Users’ Group
http://nblug.org
http://acbit.net
Presented and written by...
Allan 'dwan... | pdf |
Presents
My Favorite Fails, 2013
Rich Mogull
@rmogull
Thursday, September 26, 13
5
Thursday, September 26, 13
Beijing, China
2011
Thursday, September 26, 13
Thursday, September 26, 13
•
25 student
•
50 instances
•
50 SSH connections
Thursday, September 26, 13
1 IP Address
Thursday, September 26, 13
Thursday, September ... | pdf |
Pillaging DVCS Repos
Adam Baldwin
INTRODUCTION
Distributed Version Control Systems (DVCS) including Git, Mercurial (HG), and Bazaar
(BZR) are becoming increasingly popular and also a convenient method of deploying
updates to web applications. DVCS track revision history and other information about
the repository ins... | pdf |
Douglas McKee
Mark Bereza
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
DEBUG THIS,
NERD
Watchdog error message
Binary Patch
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
What do we
have?
• Execution
control via GOT
override
• Netcat installed
by def
• Memory on
heap
What do we
want?
• Persistence
• Root access
How d... | pdf |
Socially owned by the
cloud
Defcon 17
1
Where is our data?
• Bankboxes and filing cabinets.
• On a computer hard drive at home
• On dvd in storage
• Stored in private holes in the internet
• Stored in public so everyone can see it
2
Evolution of the private
sphere
• Close family / friends
• BBS / Cyberfriends
• Inter... | pdf |
THE ROAD LESS
SURREPTITIOUSLY
TRAVELED
@pukingmonkey
DEF CON 21
THE LOSS OF LOCATIONAL PRIVACY
WHILE TRAVELING IN YOUR
AUTOMOBILE
– Automatic License Plate Readers (ALPRs)
– Snitch devices in your car
• Transponder based Electronic Toll Collection
(ETC)
• GPS
• S... | pdf |
Konstantinos Karagiannis
CTO, Security Consulting
@konstanthacker
ethereum is not bitcoin
“The key component
is this idea of a
Turing-complete
blockchain”
--Vitalik Buterin
smart contracts
• Business logic
programs
• Semi autonomous
• Move value,
enforce
agreements
• Creativity the limit
literally a billion reaso... | pdf |
Toasterkit - A NetBSD Rootkit
Anthony Martinez
Thomas Bowen
http://mrtheplague.net/toasterkit/
Toasterkit - A NetBSD Rootkit
1. Who we are
2. What is NetBSD? Why NetBSD?
3. Rootkits on NetBSD
4. Architectural Overview
5. Our contributions
6. Demo
7. Protection
8. Prevention
Who we are - Anthony Martinez
Anthony is a sy... | pdf |
宝塔⾯板 7.6.0 ,基于python3+flask
⽬录在 /www/server/panel/
config
task.json
定时任务信息
menu.json
⾸⻚路由配置信息
{
"JOBS": [
{
"id": "1",
"func": "jobs:control_task",
"args": null,
"trigger": "interval",
"seconds": 15
},
{
"id": "2",
"func": "jobs:install_task",
"args": null,
... | pdf |
Wietze Beukema (@wietze)
D3FC0N, August 2022
SAVE THE ENVIRONMENT (VARIABLE)
HIJACKING LEGITIMATE APPLICATIONS WITH A MINIMAL FOOTPRINT
D3F
C0N
@Wietze
▪ Sr Threat Hunter on CrowdStrike’s OverWatch Elite team
▪ Based in London, UK
▪ Previously presented at BSides London, MITRE ATT&CK EU Community,
SANS DFIR
HELLO WORLD... | pdf |
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
*https://www.hpe.com/us/en/insights/articles/medical-device-security-hacking-prevention-measures-1806.html
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
PM
PM
CMS
PM
CMS
Data
Packets
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
CMS Opens
Channel
“SYN”
CMS Opens
Channel
“SYN”
PM... | pdf |
Copyright 2011 Trend Micro Inc.
Targeted Malware Attacks
Nart Villeneuve
Copyright 2011 Trend Micro Inc.
Threat Landscape
• There are numerous attacks everyday; some are specific
and targeted while others are automated and
indiscriminate.
• Attackers may be highly skilled and well resourced
adversaries or simp... | pdf |
大海捞针:使用沙箱捕获多个零日漏洞
李琦
安全开发工程师
金权
漏洞挖掘和利用工程师
2019-5-30
关于我们
李琦 (@leeqwind)
360 核心安全高级威胁自动化团队
安全开发工程师
金权 (@jq0904)
360 核心安全高级威胁自动化团队
漏洞挖掘和利用工程师
• 高级威胁自动化和沙箱
• 使用沙箱发现在野 0day 漏洞
大纲
无处不在的网络攻击
我们至今捕获的五次在野利用 0day 漏洞的攻击事件
CVE-2018-15982
捕获到一次使用新的 Flash 0day (CVE-2018-15982) 针对政府机
构的国际网络攻击。
2018-11
CVE-2018-8174
首家捕获新的使用浏览器 0day... | pdf |
Nu1L TWCTF2019 Writeup
Nu1L Teamhttps://nu1l-ctf.com
Nu1L TWCTF2019 Writeup
Pwn
warmup
printf
Asterisk-Alloc
mi
SecureKarte
Web
j2x2j
PHP Note
Oneline Calc
Reverse
Easy Crack Me
Meow
Holy Grail War
M Poly Cipher
EBC
Crypto
Real Baby RSA
Simple logic
Pwn
warmup
from pwn import *
context(arch='amd64')
p = process('./warm... | pdf |
Author Recar https://github.com/Ciyfly
ksubdomain浅析
ksubdomain是一款基于无状态的子域名爆破工具,类似无状态端口扫描,支持在Windows/Linux/Mac上
进行快速的DNS爆破,拥有重发机制不用担心漏包。
ksubdomain的作者是 w8ay
ksubdomain 地址 https://github.com/boy-hack/ksubdomain
ksubdomain的介绍 https://paper.seebug.org/1325/
主要是使用无状态的概念 直接使用网卡发包而不是通过socket去操作
对于子域名枚举来说 只发一个udp包等等dns服务器的应... | pdf |
1
threat protection | compliance | archiving & governance | secure communication
Malware Command and Control Channels
- a journey into Darkness -
By Brad Woodberg
-
Emerging Threats Product Manager / Proofpoint
2
Agenda
C2 Intro and Background (7 mins)
Modern C2 Techniques (6 mins)
Case Studies (15 mins)
Predictions ... | pdf |
前 言
报告方法论
当前,数字化转型已深入各行各业,API——这个曾经的底层代码接口,不仅发展成为
产品本身,更成为企业承载价值、连接业务的核心载体,一个由API使用者和开发者组成
的、围绕API产品生命周期的价值交换新模式正日益成熟,特别是与微服务、DevOps等技
术的融合,都将使得API战略成为企业加速创新的利器。
该报告旨在通过全面的视角反映API生态的发展现状,包括API使用者和开发者的主要
诉求、策略、行为,展现API产品生命周期各阶段的实践过程、工具使用情况,并进一步探
讨API技术未来可能的发展方向、价值实现方式,力求为相关企业、组织、个人制定API战
略提供一个参考视角。
该报告的观察和发现主要基于数据统计,我们... | pdf |
Locking Down Mac OS X
Def Con 11
Jay Beale
Bastille Linux
JJB Security Consulting, LLC.
GWU Cyber Security Policy & Research Institute
Talk Contents
This talk with cover
• Auditing the core operating system.
• Choosing tigher settings.
• Automating this process with Bastille
Linux.
Auditing OS X
One hour of lock-down:... | pdf |
Secure Tokin’ & Doobiekeys:
How to roll your own counterfeit hardware security devices
@sercurelyfitz, @r00tkillah
$whoami
Michael* (@r00tkillah) has done hard-time in real-time. An old-school computer engineer by education, he spends his days
championing product security for a large semiconductor company. Previously,... | pdf |
MJ0011
th_decoder@126.com
Reversing Windows8:
Interesting Features of
Kernel Security
1
Goal:
Revising Windows 8 Release Preview
Find new security features to defend or mitigate kernel
vulnerability attack
Target:
ntoskrnl
Tools: IDA Pro/Hex-rays/windbg
Agenda
2
– Disable Null Page Memory Allocation
– D... | pdf |
Scylla & 1.0 Alpha
(101% Colombiano)
http://www.2secure.org
Sergio Valderrama (flacman at cuteam dot org)
Carlos Rodriguez (iker at cuteam dot org)
Special thanks to: RPM (Our designer, and webshell creator), Zealot (for his help with
charybdis), Tronador (he build pieces of mail modules)
Download: You would be ... | pdf |
背景说明
Tomcat v5 的⽂档中 Class Loader Definitions 部分存在⼀段区别于 tomcat v6/7/8/9 的⼀段定义
https://tomcat.apache.org/tomcat-5.5-doc/class-loader-howto.html
$CATALINA_HOME/server/lib/catalina.jar 由ClassLoader catalinaLoader 进⾏加载,⽽且该
由该Class Loader加载的类和资源对 web application 不可⻅。
附:Tomcat v6 $CATALINA_HOME/server/lib 的 Class Loader... | pdf |
Room for Escape: Scribbling Outside the
Lines of Template Security
Oleksandr Mirosh (oleksandr.mirosh@microfocus.com) & Alvaro Muñoz (pwntester@github.com)
Abstract
Now more than ever, digital communication and collaboration are essential to the modern
human experience. People around the globe work together onli... | pdf |
http://gtvhacker.com/pres/dc20.ppt
Hacking The Google TV
GTVHacker
Presented by: Amir “zenofex” Etemadieh, CJ “cj_000” Heres,
Tom “tdweng” Dwenger, and Dan “bliss” Rosenberg
http://gtvhacker.com/pres/dc20.ppt
GTVHacker: The Team
GTVHacker
GTVHacker is a group of 6 hackers with
individual skill sets who work togethe... | pdf |
0x00
0x01
0x02js
0x03
chromeoverride
// ==UserScript==
// @name hexo
// @namespace http://tampermonkey.net/
// @version 0.1
// @description try to take over the world!
// @author You
// @match http://127.0.0.1:8000/*
// @grant none
//@run-at document-end
// ==/UserScript==
(fun... | pdf |
I’M A NEWBIE YET I CAN HACK ZIGBEE
Take Unauthorized Control Over ZigBee Devices
LI Jun ,YANG Qing
Unicorn Team – Radio and Hardware Security Research
Qihoo 360 Technology Co. Ltd.
Who we are? Unicorn Team
• Qihoo360’s UnicornTeam consists of a group
of brilliant security researchers. We focus on
the security of anyt... | pdf |
Beat to 1337
Mike Arpaia & Ted Reed
Creating A Successful University Cyber Defense Organization
(Note: slide text will be mostly replaced by images during
the presentation, this deck is designed as a handout)
This presentation...
Will show you a five step program to:
1. Plan! - make a goal for yourself and your un... | pdf |
看见有人再发 nc 的反序列化。这玩意不是一堆么?下面就是特别简单的一个。刚入门的小白应该都能看出来
因为 web.xml 下的 servelt/* 所对应的类是 nc.bs.framework.server.InvokerServlet
其大概意思是根据/*后面的服务名查找对应类
根据文档。有一处 UploadServlet。对应类:nc.document.pub.fileSystem.servlet.UploadServlet
然后直接找这个类。看了 doget 和 dopost 都指向 doaction 方法。随便看一下就
知道了。
开发是老实人,这里啥都没有,直接把 InputStream 拿去反序列化。多简单。 ... | pdf |
crawlergo是一个使用 chrome headless 模式进行URL收集的浏览器爬虫。它对整个网页的关键
位置与DOM渲染阶段进行HOOK,自动进行表单填充并提交,配合智能的JS事件触发,尽可能的
收集网站暴露出的入口。内置URL去重模块,过滤掉了大量伪静态URL,对于大型网站仍保持较快
的解析与抓取速度,最后得到高质量的请求结果集合。
crawlergo 目前支持以下特性:
* 原生浏览器环境,协程池调度任务
* 表单智能填充、自动化提交
* 完整DOM事件收集,自动化触发
* 智能URL去重,去掉大部分的重复请求
* 全面分析收集,包括javascript文件内容、页面注释、robots.txt文件和常见路径Fuzz
*... | pdf |
从BSRC看互联网企业安全漏洞及
威胁趋势
百度安全应急响应中心
Baidu Security Response Center
百度安全应急响应中心
Baidu Security Response Center
目录
‣
互联网企业漏洞分布
‣
漏洞趋势
‣
趋势分析
‣
未来的关注点
百度安全应急响应中心
Baidu Security Response Center
互联网企业漏洞分布
• 安全设计缺陷(逻辑漏洞)20%
• XSS 18%
• 信息泄露 12%
• 越权 25%
• 其他 25%
百度安全应急响应中心
Baidu Security Response Center
逻辑漏洞(业务强相关性漏洞)
•通常是对业务的威胁... | pdf |
Six Degrees of
Domain Admin
About Us
I am Andy Robbins
Job: Pentester at Veris Group’s ATD
Speaker: BSidesLV/Seattle, ISC2 World Congress, ISSA
International
Trainer: Black Hat USA 2016
Other: Ask me about ACH
Twitter: @_wald0
About Us
I am Rohan Vazarkar
Job: Pentester at Veris Group’s ATD
Tool creator/de... | pdf |
1
.NET MALWARE THREAT:
INTERNALS AND
REVERSING
DEF CON USA 2019
DEF CON USA 2019
by Alexandre Borges
ALEXANDRE BORGES – MALWARE AND SECURITY RESEARCHER
DEF CON USA 2019
2
Malware and Security Researcher.
Speaker at DEF CON USA 2018
Speaker at DEF CON China 2019
Speaker at CONFidence Conference
2019 (Poland)
Speaker... | pdf |
IOActive, Inc. Copyright ©2014. All Rights Reserved.
Weird-Machine Motivated Practical
Page Table Shellcode & Finding
Out What's Running on Your
System
Shane Macaulay
Director of Cloud Services
IOActive, Inc. Copyright ©2014. All Rights Reserved.
The Long Road
•
Barnaby Jack, forever in our hearts and minds.
“It’... | pdf |
Attacking .Net Applications At Runtime
By: Jon McCoy
Abstract
This paper will introduce methodology for attacking .NET programs at Runtime. This attack
will grant control over the targets variables, core logic, and the GUI. This attack is
implemented with .NET code, and is heavily based on reflection.
This paper has a ... | pdf |
CyBRICS CTF By Nu1L
Author:Nu1L
CyBRICS CTF By Nu1L
WEB
Hunt
Developer's Laptop
Gif2png
Woc
RE
Hide and Seek
Baby Rev
Polyglot
NetWork
XCorp
Google Cloud
rebyC
CatGirl Breach
Quiz
Hellish Reverse
Cyber
Serial
Too Secure
Broken Invitation
CTB
Pwnogram
DockEsc
Forensic
Krevedka
Keyshooter
WEB
Hunt
flag
Developer's Laptop... | pdf |
Auto-adapting Stealth
Communication Channels
Daniel J. Burroughs
University of Central Florida
About myself
• Assistant Professor at UCF
• Research includes
– Correlation of distributed network sensors
– Law enforcement data sharing network
Correlation of IDS/Sensors
• Previous research project I worked on
– Presente... | pdf |
sliver 简单使⽤及源码浅析
1
sliver 简单使⽤及源码浅析
作者
https://github.com/Ciyfly
因笔者技术能⼒有限 有些地⽅有些错误欢迎各位师傅指出 也欢迎各位师傅有任何问题跟我交流沟通
⽬录
@Recar
⽬录
简单使⽤
先启动⼀个监听器
⽣成植⼊端 exe
上线
临时退出当前会话 后台
⽣成shellcode bin
开启多⼈模式
⽣成连接配置
客户端
客户端连接
server 服务端
server main
console.Start()
服务端开启多⼈模式通信
multiplayer 开启多⼈模式
⽣成连接配置
client 客户端
implant 植⼊端
截图
sliver 植⼊端... | pdf |
Pen-Testing the Backbone
Raven, NMRC
raven@nmrc.org
White box, black box?
● Black box testing is good for external recon and
data gathering.
● However, it's far more difficult and likely to be
destructive in implementation.
● Many or most backbone vulnerabilites are denial-
of-service oriented.
● Since people get unh... | pdf |
0xcsandker
csandker
RSS Feed
//Posts
//History of Windows
//Archive
//Tags & Search
//ME
Switch Theme
Offensive Windows IPC Internals 1:
Named Pipes
10 Jan 2021 (Last Updated: 7 1⽉ 2022)
>> Introduction
>> Named Pipe Messaging
>> Data Transfer Modes
>> Overlapping Pipe I/O, Blocking mode & In-/Out Buffers
>> Na... | pdf |
jndi注入高版本绕过与反序列化
昨天群里聊到这了,虽然都是炒冷饭,但有些细节可能分析清楚点也有好处。主要分析分三个部分
1、jndi注入的原理
2、jndi注入与反序列化的关系
3、jndi注入与jdk版本的关系
jndi注入的原理:
jndi是java用于访问目录和命名服务的 API。使用jndi进行查询本来是一个正常的功能,但由于实现时没
有考虑安全问题,如果查询恶意对象就会导致被攻击。但攻击的结果并不一定是rce。
jndi的查询大致可以分两步:
1、客户端请求一个命名服务并获取一个对象。
2、客户端解析这个对象。
那么漏洞出现在哪步呢?实际上是两步都有可能,因为jndi支持RMI、LDAP、CORBA、DNS四种协议,
每... | pdf |
John Shaw, Wisconsin DOT, 2013
Federal Highway Administration, 2013
Non-Significant Address Part (NAP)
Upper Address Part (UAP)
Lower Address Part (LAP)
00:00
09
4E:22:19
Manufacturer-assigned, irrelevant
Can be derived from traffic
Sent in every packet
University of Washington STAR Lab
Washington State Transportation ... | pdf |
ProxyNotShell (疑似) 分析与poc
1. 漏洞原理分析
Exchange 的ProxyNotShell 漏洞已经爆出来挺久了,临时缓解措施都已经绕过几轮了,但是一直没有
poc放出来,也没有明确的漏洞原理泄露。前一段时间twitter上有人分享了一些思路,可能是
ProxyNotShell 的 ssrf 部分。不过热度过去了也没太多人关注,所以我把这个思路的poc写了一下,和
大家分享一下。如果最后不是ProxyNotShell, 那就叫它 NotProxyNotShell 吧。。。
首先回忆一下 ProxyShell 的利用链:autodiscover 前端端点的 ssrf 漏洞自带 kerberos 认证,认... | pdf |
0x00 前⾔
如有技术交流或渗透测试/代码审计/红队⽅向培训/红蓝对抗评估需求的朋友
欢迎联系QQ/VX-547006660
0x01 前奏
最近在测试某知名安全⼚商的过程中,发现其⼀处重要业务的⼦域竟出现了难得⼀⻅的⾃研WAF,如此⼀来勾起了
我的兴趣~
仔细研究该业务点后,发现某处传参,会直接将传参内容写⼊JS中,⼤⼤的危险
Aut hor: J 0o1ey
于是与WAF的⼀次交锋便从此刻开始~
0x02 平静的闭合与常规操作
由上图的输出位置可知,⽆WAF情况下,我们只需要通过
三个符号来闭合前半部分JS,再⽤//注释后⽅JS,再直接eval执⾏JS代码即可
构造Payload
由于eval,alert,括号等太敏感~毫⽆疑... | pdf |
1
HTTP IDS Evasions Revisited
Daniel J. Roelker
Abstract—This paper describes two general IDS evasion
techniques and applies them to the HTTP protocol. These
techniques are illustrated using some older types of HTTP
evasions and some new HTTP evasions.
The different types of evasions occur in both the Request UR... | pdf |
Stealing Profits from
Stock Market Spammers
Defcon 17 -
Grant Jordan -
7/31/09
© Copyright 2008, The NASDAQ OMX Group, Inc.
or:
How I Learned to Stop Worrying and Love the Spam
Who were we?
• Grant Jordan & Kyle Vogt
• MIT students with too much
free time
• Lots of ridiculous projects
• …... | pdf |
安全圈里的小锁匠
网络尖刀成员
郭晓东
GD
家庭安全的第一道-门锁
2
门
与
锁
第一章
锁的历史
4
• 草绳与觿
• 门闩
• 三簧锁
• 叶片锁
• 套筒转心锁
• 弹子锁
锁的历史
5
• 草绳与觿
• 门闩
• 三簧锁
• 叶片锁
• 套筒转心锁
• 弹子锁
锁的历史
6
• 草绳与觿
• 门闩
• 三簧锁
• 叶片锁
• 套筒转心锁
• 弹子锁
锁的历史
7
• 草绳与觿
• 门闩
• 三簧锁
• 叶片锁
• 套筒转心锁
• 弹子锁
锁的历史
8
• 草绳与觿
• 门闩
• 三簧锁
• 叶片锁
• 套筒转心锁
• 弹子锁
锁的历史
第二章
锁的分类
10
一、A级锁,B级锁,超B级锁
二、边柱锁,传统非边柱锁
1分... | pdf |
Deconstructing the Circuit Board Sandwich:
Effective Techniques for PCB Reverse Engineering
Joe Grand (@joegrand) aka Kingpin
Grand Idea Studio, Inc.
PCB Reverse Engineering
• The art of "undesigning" an existing system
• Destructive and non-destructive methods
• Why?
– Determine system or subsystem functionality
– S... | pdf |
I Know What
You Are By the
Smell of Your
Wi-Fi
Denton Gentry
@dgentry
denny@geekhold.com
We’re here today to talk about a mechanism which identifies the type of device
connecting to a Wi-Fi network. It can be quite specific: it can tell the difference
between an iPhone 5 and an iPhone 5s, between a Samsung Galaxy ... | pdf |
今天看到一篇文章: https://bitsadm.in/blog/windows-security-updates-for-hackers
讲述如何通过Windows的补丁号来评估系统面临的风险以及工具的相关实现,它通过爬取微软官方更新
中的KB号和系统已有的进行对比,和hacking8的提权辅助 https://i.hacking8.com/tiquan 有一点异曲
同工之妙。
它发布的工具是: https://github.com/bitsadmin/wesng 我摘出一些觉得有用的代码出来。
识别系统版本
通过systeminfo,得知我的系统版本是 19042
可得出我的系统版本是 20H2
Windows版本号过去发布的... | pdf |
Format
• Three parts in today’s presentation.
– Kernel auditing research.
– A sample of exploitable bugs.
– Kernel exploitation.
• Pause for questions at completion of
each section, but questions are
welcome throughout.
Part (i)
Kernel Auditing Research.
Kernel Auditing Overview
• Manual Open Source Kernel Security
Aud... | pdf |
_vti_fpxploitation
mshannon@fpxploiter.org
Frontpage: Laying the ground work
What is it?
● Microsoft's integrated Web Site development
tool.
● System for adding basic to advanced
functionality with little or no web page
experience.
● Integrated MS Office package
● Security Nightmare
Who is Vermeer Technologies?
● I... | pdf |
So Many Ways to Slap a YoHo:
Hacking Facebook & YoVille
Sean Barnum,
Cybersecurity Principal
MITRE
EvilAdamSmith,
Sr. Security Consultant
Tom Stracener “Strace”,
Contract Engineer
MITRE
Misclaneous Disclaimers
© Stracener, Tom 2010
Its Medicinal!
© Stracener, Tom 2010
What is YoVille?
© Stracener, Tom 2010
What ... | pdf |
“Yeah Boy!”
1
General Flow of talk
•Play 10-20 second intro from Public Enemy’s Bring The Noise...
•If you love rap, you’re probably confident with high self esteem and extremely out going.
•and that’s really what this talk is all about....
References:
News article:
http://www.independent.co.uk/arts-entertainment/music/... | pdf |
0-7803-8367-2/04/$20.00 ©2004 IEEE
Abstract-- Techniques and methods currently exist to detect if
a certain type of rootkit has exploited a computer systems.
However, these current techniques and methods can only
indicate that a system has been exploited by a rootkit. We are
currently developing a methodology to... | pdf |
Mind Games
1
Introduction to
“The Last Science Fiction Story”
I
t’s true, the breaking waves of the future – as we construct it
inside our societal mind, inside our cultural frames - inundate the
past and the future often happens now before the past, some of
the eddies of the future, some of the backwaters of the past.... | pdf |
对抗AV检测 -- 病毒遗传感染
对抗AV检测 -- 病毒遗传感染
技术的探索
技术的探索
nEINEI/[bytehero team]
病毒遗传感染技术的探索
病毒遗传感染技术的探索
•
内容介绍:
关于病毒遗传感染技术
•
关于病毒遗传感染技术
•
-
计算机病毒/人工生命/自进化
•
-
多态/ 变形之后的思路
•
-
多态/变形的弱点在哪里?
•
遗传感染的一种实现思路
•
-
舍弃掉解密器/收缩器
舍弃掉解密器/收缩器
•
-
构造一个新的变形机制
•
-
病毒“基因”的提取
•
-
宿主交叉/变异点的选择
宿主交叉/变异点的选择
•
-
构造宿主/病毒的双执行环境
•
-
宿主/病毒及感染后的重定位
•
完整的遗传感染... | pdf |
T1047: WMI for Lateral Movement
参考:Windows管理规范
Windows管理规范(英语:Windows Management Instrumentation,缩写WMI)由一系列对
Windows Driver Model的扩展组成,它通过仪器组件提供信息和通知,并提供了一个操作系统的
接口。WMI是微软对分布式管理工作组(DMTF)的基于Web的企业管理类(WBEM)和通用信
息模型(CIM)标准的实现。
简单的说下重点:
允许使用脚本语言(VBScript 或Powersehll)管理本地或远程服务器和个人电脑
预转在Windows 2000以后的所有Windows 系统中(包括Windows... | pdf |
环境搭建
安装Oracle19c,安装的时候这里要选AL32UTF8
接下来会卡在42%,多等一会就好了。
安装fmw_12.2.1.3.0_infrastructure.jar 下一步下一步就行
然后安装bi fmw_12.2.1.4.0_bi_windows64_Disk1 下一步下一步就行了
然后运行rcu.bat
创建完bi所用的数据库之后运行C:\Oracle\Middleware\Oracle_Home\bi\bin\config.cmd配置bi
然后就安装完成了。
分析
修改C:\Oracle\Middleware\Oracle_Home\user_projects\domains\bi\bin\setDomainEn... | pdf |
Abusing Web Hooks
For Command And Control
Dimitry Snezhkov
@Op_nomad
X-Force Red
IBM Corporation
What we are going to talk about
Subject: Safe(er) bidirectional delivery of content and communication across
network boundaries with the use of WebHook technology.
From:
- Hostile networks
- Monitored networks
- Censored... | pdf |
Dec 2017
Copyright*©LAC*Co.,*Ltd.*All*Rights*Reserved.
Yoshihiro Ishikawa
Open%Source%as%fuel%of%recent%APT
Copyright*©LAC*Co.,*Ltd.*All*Rights*Reserved.
Who%am%i?%
• Organization:*LAC*
• Department:*Cyber*Counter*Threat*Team*
• Job*Title:*Security*Researcher*
CISSP
yoshihiro.ishikawa[at]lac.co.jp
Yoshihiro*Ishikawa*
... | pdf |
author:Y4er
前言
看到推特上有人发 PrinterLogic Web Stack unserialize RCE,但是poc打码了,所以自己下了一个
分析一下。
这玩意是个打印机,开放了一个基于iis/php/laravel的web,而且php源码是加密的,本文就对其
进行解密并分析漏洞。
解密源码
打开php文件看到文件是加密的
找到php的安装路径 C:\Program Files (x86)\PHP\7.3.28.0 ,查看php.ini的配置
用到了一个php_decoder.dll,直接拖入ida中。经过分析导入表中引入zend_compile_file,多是处
理加密解密的重写。
跟进到sub_100011D... | pdf |
Homeless Vikings
Cut it out. You’re just making it worse.
A marginally entertaining talk by Dave Josephsen
Who IS this guy?
• Dave. Sysadmin.
• Various (mostly useless) Certifications
• I wrote a book. You should buy it (I could use the $4)
• I write the monitoring column for ;login magazine.
• Use SourceMage!
You mi... | pdf |
实战攻防演习之
红队视角下的防御体系突破
1
实战攻防演习之
红队视角下的防御体系突破
3
前 言
网络实战攻防演习,是新形势下关键信息系统网络
安全保护工作的重要组成部分。演习通常是以实际运
行的信息系统为保护目标,通过有监督的攻防对抗,
最大限度地模拟真实的网络攻击,以此来检验信息系
统的实际安全性和运维保障的实际有效性。
2016年以来,在国家监管机构的有力推动下,网
络实战攻防演习日益得到重视,演习范围越来越广,
演习周期越来越长,演习规模越来越大。国家有关部
门组织的全国性网络实战攻防演习从2016年仅有几家
参演单位,到2019年已扩展到上百家参演单位;同时
各省、各市、各行业的监管机构,也都在积极地筹备
和组织各... | pdf |
DEF CON 24
Side-channel attacks on high-
security electronic safe locks
plore@tuta.io
Background – Electronic safe locks
Image: ellenm1 on Flickr / CC BY-NC
Background – Electronic safe locks
• In scope: decent, listed locks
– UL Type 1 High-security electronic lock
• Out of scope: cheap, poor-quality locks
Sa... | pdf |
侧信道分析
感谢北京理⼯⼤学-王安教授的讲解
0x00 什么是侧信道
什么是侧信道?⼀个简单的例⼦就是某些泡⾯和饮料中奖,以可能会随机附赠⽕腿肠,⽽带有⽕腿肠的桶和不带⽕
腿肠的桶重量不⼀样,摇晃起来响声不⼀样,通过摇晃我们能简单分析出“哪桶是中奖了的泡⾯”这⼚商不希望我们
知道的信息,这就是侧信道。这样的例⼦在⽣活中还有很多,⽐如对于⼩区按键门禁,长期按的⼏个键上的油脂、
指纹、磨损,同样也是我们猜解其密码的侧信道信息,⽐如⼀个六位数密码的门禁,猜测空间是106 ⽽当我们获知
其密钥的组合时,我们猜测空间就降低到了 6!
相对于偏社会⼯程学⼀点的例⼦,看见⼩区⼀家⼈扔垃圾,⽽他们扔的垃圾⾥⾯有:婴⼉奶粉罐头瓶、啤酒瓶、少
量烟头、... | pdf |
Off Grid communications with Android
Meshing the mobile world
Josh “m0nk” Thomas
The MITRE Corporation
Bedford, MA USA
jbthomas@mitre.org
Jeff “Stoker” Robble
The MITRE Corporation
Bedford, MA USA
jrobble@mitre.org
The SPAN project is an open source implementation of a
generalized Mobile Ad-Hoc Network framew... | pdf |
Warez Trading and Criminal
Copyright Infringement
Eric Goldman
Marquette University Law School
eric.goldman@marquette.edu
http://eric_goldman.tripod.com
Overview
Definition of warez trading
Applicable criminal laws
Some prosecutions
Some policy concerns
The bottom line:
Warez trading has been criminalized
More war... | pdf |
JDK 7u21分析
0x01 写在前⾯
JDK7u21原⽣gadget链的构造⼗分经典,在对于其构造及思想学习后,写下本⽂作为笔记。
0x02 所需的知识点
JDK7u21这个链⽤了很多的Java基础知识点,主要如下:
Java 反射
javassist 动态修改类
Java 静态类加载
Java 动态代理
hash碰撞
为了⽅便⼤家理解此⽂,因此我会对这些知识点进⾏简单介绍,如果都了解的朋友可以直接
翻到后⾯的分析过程。
0x03 基础知识
1、Java 反射
反射 (Reflection) 是 Java 的特征之⼀,在C/C++中是没有反射的,反射的存在使得运⾏中的
Java 程序能够获取⾃身的信息,并且可以操作类或对象的内... | pdf |
Crowd Security Intelligence
@colbymoore @patrickwardle
syn.ac/defc0n22
download slides
optical
implanting this
surgery
who we are
we source a global contingent vetted security experts
worldwide and pay them on an incentivized basis to
discover security vulnerabilities in our customers’ web
apps, mobi... | pdf |
隐藏信息接管k8s集群
最近在恶补⼀些体系框架,想到之前遇到的⼀个攻防场景,做个分享,⾮科普向。
很多⼈都分享过未授权场景的利⽤,但是关于证书认证、token认证下攻防的场景不是很
多。
基础概念补全
K8S
k8s全称kubernetes,是⼀个开源的,⽤于管理云平台中多个主机上的容器化应⽤的编排
管理⼯具,提供了应⽤部署,规划,更新,维护的⼀种机制,可简单理解为容器集权设备。
kubernetes ⼜涉及到⼏个核⼼组件,其中,apiserver提供了资源操作的唯⼀⼊⼝,操作基本
上都是通过 apiserver 这个组件进⾏的,它提供 HTTP RESTful 形式的 API 供集群内外客户端
调⽤。kubernetes 对于访问... | pdf |
Automated
Malware
Similarity
Analysis
Daniel
Raygoza
daniel@raygoza.net
Abstract
Malware
analysis
has
evolved
in
both
the
sophistication
of
the
samples
analyzed
and
the
tools
of
the
trade.
Unfortunately
human
analysis
of
samples
is
still
very
expensive
and
time
consuming.
As
teams
of
malware
analysts
have
grown
... | pdf |
数据安全能力建设实施指南 V1.0
(征求意见稿)
!
!
!
!
!
!
!
!
!
!
!
!
!
《数据安全能力成熟度模型(DSMM)》配套文档 2018-9-29!
!
!
!
2!
目 录
前 言 ................................................................................ 3!
1 范围 ................................................................................ 4!
2 规范性引用文件 ... | pdf |
U
.
S.
D
E
P
A
R
T
M
E
N
T
O
F
C
O
M
M
E
R
C
E
N
A
TI
O
N
A
L
T
E
L
E
C
O
M
M
U
N
I
C
A
T
I
O
N
S
&
I
N
F
O
R
M
A
TI
O
N
A
D
M
I
N
IS
T
R
A
T
I
O
N
MOBILE (AERONAUTICAL TELEMETERING)
S)
5.68
5.73
5.90
5.95
6.2
6.525
6.685
6.765
7.0
7.1
7.3
7.35
8.1
8.195
8.815
8.965
9.040
9.4
9.5
9.9
9.995
10.003
10.005
10.1
10.15
... | pdf |
本⽂作者:Drunkmars(⾸次投稿,赠送知识星球)
最近在某地⽅举⾏攻防演练的时候进⼊后台管理拿到了⼀个webshell,但是 tasklist /svc
tasklist /svc 查
看进程360、电脑管家赫然在列,我的⼩伙伴本来准备使⽤注⼊dll来达到上线cs多⼈运动的效果,
但是奈何中间出了点差错始终上不了线,机缘巧合之下发现被控主机有⼀个
SunloginClient.exe
SunloginClient.exe 进程,于是便有了下⽂。
0 x 0 1 初 探
0 x 0 1 初 探
进⼊后台的过程就不说了,这⾥上传了⼀个asp⼤⻢进⼊到对⽅主机,whoami⼀看⼀个user权限
然后⼀发 tasklist /sv... | pdf |
Bvp47
美国NSA方程式的顶级后门
技术细节
版本1.7
目录Contents
1. 摘要
2. 前所未见的后门
3. 后门程序概览 – Bvp47
4. 组织关联和溯源
“The Shadow Brokers Leaks”事件关联
非对称算法私钥匹配
样本深度关联
完整控制命令行
斯诺登事件关联
Bvp47—美国 NSA 方程式组织的顶级后门
文件结构
文件属性
文件结构
使用场景
4
4
4
6
1
2
4
8
8
9
9
12
13
15
5. 遍布全球的受害者
泄露出的受害者信息
利用受害主机作为跳板攻击目标
6. Bvp47后门技术详解
主要行为
Payload
字符串加解密
函数名混淆技巧
Bvp 引擎
系统 Hoo... | pdf |
TenProtect Conficential, Copyright @Tencent, 2019
游戏安全的攻防艺术
joeywzhu@tencent.com
2019.02
TenProtect Conficential, Copyright @Tencent, 2019
个人简介
• 2013 至今,腾讯游戏业务安全部技术专家
• 2005-2012 ,趋势科技架构师
• 2005-2008, 开发和设计 PE 病毒沙箱
• 2008-2012, 开发和设计脚本漏洞分析引擎
• 2013 to now, 开发和设计游戏安全通用方案
• 2011.8 Defcon 讲演 “ Chinese phishing at Defc... | pdf |
CodeQLOpenJDK
CodeQL
CodeQL Extractor
Extractor
src.zip
CodeQL
LGTMCodeQLQL
LGTMGitHubWorkflow
LGTMOpenJDKDatabase
openjdk/jdk8utag
ubuntu 16.04
Boot_JDKjdk 1.7.0_80
Target_OpenJDK:OpenJDK 8u73
Boot_JDK
tar.gz Boot_JDK jdk-7u80-linux-x64.tar.gz
Toolchain
#
mkdir /usr/lib/jvm
tar -zxvf jdk-7u80-linux-x64.gz -C /u... | pdf |
Lessons Learned from
Five Years of Building
Capture the Flag
Vito Genovese
DEF CON Beijing 2018
Hello!
Capture the Flag
"CTF"
DEF CON
1996
first game
2000
formalized
how it was run
2002-2004
ghettohackers
2005-2008
Kenshoto
2009-2012
ddtek
2013-2017
Legitimate
Business
Syndicate
2018-?
Order of the
Overflow... | pdf |
0xcsandker
csandker
RSS Feed
//Posts
//History of Windows
//Archive
//Tags & Search
//ME
Switch Theme
Offensive Windows IPC Internals 3: ALPC
24 May 2022 (Last Updated: 29 5⽉ 2022)
>> Introduction
>> ALPC Internals
>> The Basics
>> ALPC Message Flow
>> ALPC Messaging Details
>> ALPC Message Attributes
>> Puttin... | pdf |
安全画像在58落地实践
目录
0 1
0 2
0 3
0 4
0 5
整体架构
标签生产
标签管理
落地实践
背景
背景
01
背景
背景
黑名单
维度单一,力度粗
判罚依据少,误杀严重
有监督算法模型
模型训练成本高
准确率衰减较快
内容识别
内容变化频繁
字体变化频繁
传统风控策略
黑产特征变化频繁
人工维护成本高
传统
风控
传统风控手段主要是基于行为和内容的拦截,在对抗初期,效果比较明显,但随着黑产攻击行为的
不断变化,问题也逐渐显现
安全画像的目标:利用现有风控手段的安全治理成果,持续对黑产资源进行多维度消耗,提升黑产
攻击成本
传统风控系统虽然行之有效,但是没有对黑产资源进行消耗
解决方案
整体架构
02
系... | pdf |
Why Anomaly Based Intrusion
Detection Systems are a Hax0rs
Best Friend
By David Maynor
GT Information Security
David.Maynor@oit.gatech.edu
The history of the castle.
•
What is a Anomaly based IDS and how
does it differ from Signature based
systems?
a. Signature based systems rely on static
analysis of event.
b. An... | pdf |
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
*https://www.hpe.com/us/en/insights/articles/medical-device-security-hacking-prevention-measures-1806.html
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
PM
PM
CMS
PM
CMS
Data
Packets
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
CMS Opens
Channel
“SYN”
CMS Opens
Channel
“SYN”
PM... | pdf |
d3ctf WriteUp By Nu1L
author:Nu1L
d3ctf WriteUp By Nu1L
PWN
d3dev
d3dev-revenge
Truth
hackphp
liproll
Reverse
jumpjump
baby_spear
No Name
white give
Ancient
Crypto
babyLattice
WEB
8-bit pub
non RCE?
Happy_Valentine's_Day
Pool Calc
real_cloud_storage
real_cloud_serverless
Misc
Virtual Love_Revenge
Virtual Love
easyQuant... | pdf |
Bypass AMSI的前世今生(6) - .net和wmi(完结)
0x00 前言
这是这个系列完结篇了,其实读完并跟随文章实际测试完前5篇,对抗AMSI应该手到擒来了。这一篇主
要分析下AMSI在.net和WMI中的应用,以分析调用流程为主,对抗方式为辅。明白了原理,在实际攻防
中灵活运用就行了。
0x01 .Net如何调用AMSI
通过第一篇文章我们知道.net调用amsi.dll的文件是clr.dll
我们通过IDA静态分析找到相应的调用函数,如下是F5后的伪代码:
C:\Windows\WinSxS\amd64_netfx4-
clr_dll_b03f5f7f11d50a3a_4.0.15805.360_none_395b... | pdf |
JavaScript在网络安全
中的“身影”
高佳
关于我
职位:斗象科技高级安全研究员
主要负责:众测项目的上线与漏洞审核
•
第一部分 JavaScript的重要性
•
第二部分 JavaScript的信息收集
•
第三部分 JavaScript的前端加密
•
第四部分 JavaScript的混淆与反混淆
目录
JavaScript的重要性
JavaScript的重要性
没有人比我更懂JavaScript
JavaScript的重要性
JavaScript的重要性
大人,时代变了
JavaScript的信息收集
JavaScript的信息搜集-URL
JavaScript的信息搜集-API
JavaScript的信息搜集... | pdf |
Covert Channels
Towards a Qual Project
Rachel Greenstadt
Harvard University
Covert Channels – p.1/21
Overview
■ About covert channels
■ Example channel: TCP timestamps
■ Problems with the example channel
■ Directions in covert channel research
Covert Channels – p.2/21
What’s a Covert Channel?
■ A channel transfers info... | pdf |
与业务融合的漏洞检测之路
关于我
• 乌云白帽子 猪猪侠
• 8年信息安全从业经历
• 信息安全领域爱好者
• 安全测试
• 数据挖掘
• 微博:@ringzero
DEMO 1
WEB2.0服务端
复杂的用户认证机制,传统漏
洞扫描器无法与业务功能交互
http://v.youku.com/v_show/id_XODc0NjYyODg0.html
DEMO 2
移动客户端
功能封闭,导致漏洞扫描器无
法与业务功能交互
http://v.youku.com/v_show/id_XODc0Njc1MzI0.html
旁路传感器还原数据分析出攻击行为
使用业务系统时,从数据流量中检测业务流程漏洞
什么是业务安全?
“连接彼此,交换信息。... | pdf |
From “One Country - One Floppy” to “Startup Nation”
The story of the early days of the Israeli hacking community
I
We*
* Unless otherwise stated
#whoarewe + #whyarewehere
1975
1984
1988
1993
2011
2015
1977
1986
2004
2011
2013
Some of the people in our story
Hacking
Cracking
Phreaking
Carding
90’s Terminology
Hacking
Cr... | pdf |
Weaponize Your Feature
Codes
By MasterChen
Who Am I?
• GreyNoise Podcast Co-Founder and Co-Host https://greynoi.se
• SYNShop Hackerspace member http://synshop.org
• 2014 & 2016 BSidesLV Speaker
• “What I Learned As A Con Man”
• “A Peek Behind Vegas Surveillance”
• 2015 DC Skytalks Speaker
• “Automate Your Stalking”
• ... | pdf |
Micro-Renovator
Bringing Processor Firmware up to Code
Bio
Matt (a.k.a. Syncsrc)
●
Recovering EE / CompE
●
Builder and user of hardware debug features
●
Uses “BIOS” and “UEFI” interchangeably
●
Currently responsible for platform security of a cloud
●
Religiously updates firmware
●
Formerly a product security validation... | pdf |
Exploiting Qualcomm WLAN And Modem
Over-The-Air
Xiling Gong, Peter Pi
Tencent Blade Team
About Us
Xiling Gong (@GXiling)
Senior security researcher at Tencent Blade Team.
Focus on Android Security, Qualcomm Firmware Security.
Speaker of BlackHat, CanSecWest.
Peter Pi(@tencent_blade)
Senior security researcher at Ten... | pdf |
以蓝军视⻆跟踪和分析CANVAS攻击框架泄露事件
全⽂共2605字,阅读⼤约需要5分钟。
3⽉3⽇,绿盟科技研究团队在对⽹络安全事件舆情监控中发现著名的商业渗透框架CANVAS系统源代码发⽣泄露,
绿盟科技M01N蓝军研究团队第⼀时间对该事件进⾏了跟踪,快速分析了CANVAS的攻击框架、所涉及的漏洞和技
术细节。
Immunity CANVAS是⼀套受信任的商业安全评估攻击框架,每⽉都会发布稳定版本,它允许专业⼈员进⾏渗透测
试和对⼿模拟攻击。此次CANVAS的泄露版本为7.26,⽇期为2020年9⽉,包含1000+个漏洞利⽤代码。使⽤
CANVAS成功攻陷系统后,攻击者可以抓取屏幕截图,转储密码凭据,操纵⽬标⽂件系统并提升特权,并... | pdf |
Malware in the Gaming
Micro-economy
Zack Allen
Rusty Bower
Zack & Rusty
Background for non-gamers
● Non-functional cosmetic items
introduced in 2009
● In 2010, an update was released
that allowed players to trade
hats and weapons with each
other
● This has since been expanded
to other games
○
CS:GO, DOTA, League ... | pdf |
1.准备操作系统windows2012 r2 x64(8G RAM,500G HDD)
2.对系统进行全局代理翻墙(系统需要安装.net framwork 3.5 sp1以及microsoft visual
c++ version 2019-2015)
3.点击CORE IMPACT19.1
4.结束CORE IMPACT的相关进程或者服务
5.将破解包中的program files 和programData目录所有文件复制到系统C盘下
6.将破解包中的三个序列号文件复制到C:\Program Files (x86)\Core
Security\Impact\bin\5372-8801-2329-7643-5724 目录下
7.... | pdf |
Blog
利用dll劫持实现免杀与维权
2021-06-29 · 红蓝对抗
根据软件工程高内聚低耦合的思想,把程序要重复使用的代码封装成函数/类方法,将软件要重复使用的程序
封装成链接库。库分为静态链接库和动态链接库,静态链接库顾名思义就是在程序链接阶段打包进文件中,
而动态链接库则是在程序运行时再导入调用。动态链接库有着加载时复用节省内存、补丁更新时可符合开闭
原则等优点,也有容易发生版本冲突、容易被劫持等缺点。Windows平台下的动态链接库常为dll文件,linux
则常为so文件。
dll劫持概念与类型
dll劫持就是要想方设法地调用到恶意dll。为了便于理解,需要了解一下目前Windows默认的dll调用顺序:
Known... | pdf |
Pwning "the toughest target":
the exploit chain of winning the largest
bug bounty in the history of ASR program
Jianjun Dai Guang Gong Wenlin Yang
#whoami
•
Guang Gong
• Senior Security Researcher and Team Leader of 360 Alpha Team
• Android/Chrome CVE hunter
• Speaker at Black Hat,... | pdf |
关于某EDR多处RCE漏洞的简单分析
RCE_1?
漏洞⽂件
1. tool\log\c.php
通过URL传参初始化变量,经典的变量覆盖漏洞。
Y4er
ChaBug 昨天
RCE_2?
1. tool\php_cli.php
同样的问题,感觉这个更过分了,bypass waf webshell?
RCE_3?
1. tool\ldb_cli.php
同。
RCE_4?
1. tool\mdd_sql.php
任意⽂件读取
1. store\cat.php
算了,⼤家都看得懂
啊,这, 算了,不看了 | pdf |
windows特权滥用攻击
本文主要介绍利用windows特权滥用进行本地权限提升攻击。
特权滥用的bug
以高权限运行的进程(一般指system权限)会像其他进程一样对文件进行各类操作(如增删改查),当高权限
进程在没有进行任何防御措施的情况下访问用户文件或者是目录时则有可能造成安全问题。我们一般所
熟知的此类问题有DLL planting或者是利用可写服务操作等,但除此之外还有其他的文件系统的攻击方
法可以被我们利用,且由于此类攻击属于逻辑漏洞,不涉及内存操作所以不会像内核提权那样有太多的
版本限制以及可能造成的bsod等风险。
漏洞位置
用户可写项
一般用户(普通用户)可以写入的位置如下:
用户自己的目录、文件,包括其appd... | pdf |
, , , Las Vegas , 2012
Aditya K Sood | Richard J Enbody
SecNiche Security | Department of Computer Science and Engineering
Michigan State University
Botnets Die Hard
Owned and Operated
2
About Us
Aditya K Sood
● PhD Candidate at Michigan State University
– Working with iSEC Partners
– Founder... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.