text
stringlengths
100
9.93M
category
stringclasses
11 values
Defcon 11 Las Vegas, NV USA FILE: dc11-havenco.sxi / 24/01/03 / Page 1 ryan@metacolo.com HavenCo: what really happened HavenCo: what really happened Ryan Lackey <ryan@metacolo.com> 3 August 2003 Defcon 11, Las Vegas, CA USA latest version and supporting docs at: http://www.metacolo.com/papers/dc11-havenco/ Defcon ...
pdf
dwangoAC TASBot the perfectionist The amazing life & achievements of... Twitch.tv/dwangoAC twitter @MrTASBot Allan 'dwangoAC' Cecil http://acbit.net Presented and written by... Allan 'dwangoAC' Cecil President of the North Bay Linux Users’ Group http://nblug.org http://acbit.net Presented and written by... Allan 'dwan...
pdf
Presents My Favorite Fails, 2013 Rich Mogull @rmogull Thursday, September 26, 13 5 Thursday, September 26, 13 Beijing, China 2011 Thursday, September 26, 13 Thursday, September 26, 13 • 25 student • 50 instances • 50 SSH connections Thursday, September 26, 13 1 IP Address Thursday, September 26, 13 Thursday, September ...
pdf
Pillaging DVCS Repos Adam Baldwin INTRODUCTION Distributed Version Control Systems (DVCS) including Git, Mercurial (HG), and Bazaar (BZR) are becoming increasingly popular and also a convenient method of deploying updates to web applications. DVCS track revision history and other information about the repository ins...
pdf
Douglas McKee Mark Bereza • • • • • • • • • • • • • • • • DEBUG THIS, NERD Watchdog error message Binary Patch • • • • • • • • • • • • • • • • • • • • • • • • • • • • What do we have? • Execution control via GOT override • Netcat installed by def • Memory on heap What do we want? • Persistence • Root access How d...
pdf
Socially owned by the cloud Defcon 17 1 Where is our data? • Bankboxes and filing cabinets. • On a computer hard drive at home • On dvd in storage • Stored in private holes in the internet • Stored in public so everyone can see it 2 Evolution of the private sphere • Close family / friends • BBS / Cyberfriends • Inter...
pdf
THE ROAD LESS SURREPTITIOUSLY TRAVELED @pukingmonkey DEF CON 21 THE LOSS OF LOCATIONAL PRIVACY WHILE TRAVELING IN YOUR AUTOMOBILE – Automatic License Plate Readers (ALPRs) – Snitch devices in your car • Transponder based Electronic Toll Collection (ETC) • GPS • S...
pdf
Konstantinos Karagiannis CTO, Security Consulting @konstanthacker ethereum is not bitcoin “The key component is this idea of a Turing-complete blockchain” --Vitalik Buterin smart contracts • Business logic programs • Semi autonomous • Move value, enforce agreements • Creativity the limit literally a billion reaso...
pdf
Toasterkit - A NetBSD Rootkit Anthony Martinez Thomas Bowen http://mrtheplague.net/toasterkit/ Toasterkit - A NetBSD Rootkit 1. Who we are 2. What is NetBSD? Why NetBSD? 3. Rootkits on NetBSD 4. Architectural Overview 5. Our contributions 6. Demo 7. Protection 8. Prevention Who we are - Anthony Martinez Anthony is a sy...
pdf
宝塔⾯板 7.6.0 ,基于python3+flask ⽬录在 /www/server/panel/ config task.json 定时任务信息 menu.json ⾸⻚路由配置信息 { "JOBS": [ { "id": "1", "func": "jobs:control_task", "args": null, "trigger": "interval", "seconds": 15 }, { "id": "2", "func": "jobs:install_task", "args": null, ...
pdf
Wietze Beukema (@wietze) D3FC0N, August 2022 SAVE THE ENVIRONMENT (VARIABLE) HIJACKING LEGITIMATE APPLICATIONS WITH A MINIMAL FOOTPRINT D3F C0N @Wietze ▪ Sr Threat Hunter on CrowdStrike’s OverWatch Elite team ▪ Based in London, UK ▪ Previously presented at BSides London, MITRE ATT&CK EU Community, SANS DFIR HELLO WORLD...
pdf
• • • • • • • • • • • • • • • • • • *https://www.hpe.com/us/en/insights/articles/medical-device-security-hacking-prevention-measures-1806.html • • • • • • • • • • • • • • • • • • • • • • • • • • • • PM PM CMS PM CMS Data Packets • • • • • • • • • • • • • • • • • • CMS Opens Channel “SYN” CMS Opens Channel “SYN” PM...
pdf
Copyright 2011 Trend Micro Inc. Targeted Malware Attacks Nart Villeneuve Copyright 2011 Trend Micro Inc. Threat Landscape • There are numerous attacks everyday; some are specific and targeted while others are automated and indiscriminate. • Attackers may be highly skilled and well resourced adversaries or simp...
pdf
大海捞针:使用沙箱捕获多个零日漏洞 李琦 安全开发工程师 金权 漏洞挖掘和利用工程师 2019-5-30 关于我们 李琦 (@leeqwind) 360 核心安全高级威胁自动化团队 安全开发工程师 金权 (@jq0904) 360 核心安全高级威胁自动化团队 漏洞挖掘和利用工程师 • 高级威胁自动化和沙箱 • 使用沙箱发现在野 0day 漏洞 大纲 无处不在的网络攻击 我们至今捕获的五次在野利用 0day 漏洞的攻击事件 CVE-2018-15982 捕获到一次使用新的 Flash 0day (CVE-2018-15982) 针对政府机 构的国际网络攻击。 2018-11 CVE-2018-8174 首家捕获新的使用浏览器 0day...
pdf
Nu1L TWCTF2019 Writeup Nu1L Teamhttps://nu1l-ctf.com Nu1L TWCTF2019 Writeup Pwn warmup printf Asterisk-Alloc mi SecureKarte Web j2x2j PHP Note Oneline Calc Reverse Easy Crack Me Meow Holy Grail War M Poly Cipher EBC Crypto Real Baby RSA Simple logic Pwn warmup from pwn import * context(arch='amd64') p = process('./warm...
pdf
Author Recar https://github.com/Ciyfly ksubdomain浅析 ksubdomain是一款基于无状态的子域名爆破工具,类似无状态端口扫描,支持在Windows/Linux/Mac上 进行快速的DNS爆破,拥有重发机制不用担心漏包。 ksubdomain的作者是 w8ay ksubdomain 地址 https://github.com/boy-hack/ksubdomain ksubdomain的介绍 https://paper.seebug.org/1325/ 主要是使用无状态的概念 直接使用网卡发包而不是通过socket去操作 对于子域名枚举来说 只发一个udp包等等dns服务器的应...
pdf
1 threat protection | compliance | archiving & governance | secure communication Malware Command and Control Channels - a journey into Darkness - By Brad Woodberg - Emerging Threats Product Manager / Proofpoint 2 Agenda C2 Intro and Background (7 mins) Modern C2 Techniques (6 mins) Case Studies (15 mins) Predictions ...
pdf
前 言 报告方法论 当前,数字化转型已深入各行各业,API——这个曾经的底层代码接口,不仅发展成为 产品本身,更成为企业承载价值、连接业务的核心载体,一个由API使用者和开发者组成 的、围绕API产品生命周期的价值交换新模式正日益成熟,特别是与微服务、DevOps等技 术的融合,都将使得API战略成为企业加速创新的利器。 该报告旨在通过全面的视角反映API生态的发展现状,包括API使用者和开发者的主要 诉求、策略、行为,展现API产品生命周期各阶段的实践过程、工具使用情况,并进一步探 讨API技术未来可能的发展方向、价值实现方式,力求为相关企业、组织、个人制定API战 略提供一个参考视角。 该报告的观察和发现主要基于数据统计,我们...
pdf
Locking Down Mac OS X Def Con 11 Jay Beale Bastille Linux JJB Security Consulting, LLC. GWU Cyber Security Policy & Research Institute Talk Contents This talk with cover • Auditing the core operating system. • Choosing tigher settings. • Automating this process with Bastille Linux. Auditing OS X One hour of lock-down:...
pdf
Secure Tokin’ & Doobiekeys: How to roll your own counterfeit hardware security devices @sercurelyfitz, @r00tkillah $whoami Michael* (@r00tkillah) has done hard-time in real-time. An old-school computer engineer by education, he spends his days championing product security for a large semiconductor company. Previously,...
pdf
MJ0011 th_decoder@126.com Reversing Windows8: Interesting Features of Kernel Security 1 Goal: Revising Windows 8 Release Preview Find new security features to defend or mitigate kernel vulnerability attack Target: ntoskrnl Tools: IDA Pro/Hex-rays/windbg Agenda 2 – Disable Null Page Memory Allocation – D...
pdf
Scylla & 1.0 Alpha (101% Colombiano) http://www.2secure.org Sergio Valderrama (flacman at cuteam dot org) Carlos Rodriguez (iker at cuteam dot org) Special thanks to: RPM (Our designer, and webshell creator), Zealot (for his help with charybdis), Tronador (he build pieces of mail modules) Download: You would be ...
pdf
背景说明 Tomcat v5 的⽂档中 Class Loader Definitions 部分存在⼀段区别于 tomcat v6/7/8/9 的⼀段定义 https://tomcat.apache.org/tomcat-5.5-doc/class-loader-howto.html $CATALINA_HOME/server/lib/catalina.jar 由ClassLoader catalinaLoader 进⾏加载,⽽且该 由该Class Loader加载的类和资源对 web application 不可⻅。 附:Tomcat v6 $CATALINA_HOME/server/lib 的 Class Loader...
pdf
Room for Escape: Scribbling Outside the Lines of Template Security Oleksandr Mirosh​ (oleksandr.mirosh@microfocus.com) ​& Alvaro Muñoz​ (pwntester@github.com) Abstract Now more than ever, digital communication and collaboration are essential to the modern human experience. People around the globe work together onli...
pdf
http://gtvhacker.com/pres/dc20.ppt Hacking The Google TV GTVHacker Presented by: Amir “zenofex” Etemadieh, CJ “cj_000” Heres, Tom “tdweng” Dwenger, and Dan “bliss” Rosenberg http://gtvhacker.com/pres/dc20.ppt GTVHacker: The Team GTVHacker  GTVHacker is a group of 6 hackers with individual skill sets who work togethe...
pdf
0x00 0x01 0x02js 0x03 chromeoverride // ==UserScript== // @name hexo // @namespace http://tampermonkey.net/ // @version 0.1 // @description try to take over the world! // @author You // @match http://127.0.0.1:8000/* // @grant none //@run-at document-end // ==/UserScript== (fun...
pdf
I’M A NEWBIE YET I CAN HACK ZIGBEE Take Unauthorized Control Over ZigBee Devices LI Jun ,YANG Qing Unicorn Team – Radio and Hardware Security Research Qihoo 360 Technology Co. Ltd. Who we are? Unicorn Team • Qihoo360’s UnicornTeam consists of a group of brilliant security researchers. We focus on the security of anyt...
pdf
Beat to 1337 Mike Arpaia & Ted Reed Creating A Successful University Cyber Defense Organization (Note: slide text will be mostly replaced by images during the presentation, this deck is designed as a handout) This presentation... Will show you a five step program to: 1. Plan! - make a goal for yourself and your un...
pdf
看见有人再发 nc 的反序列化。这玩意不是一堆么?下面就是特别简单的一个。刚入门的小白应该都能看出来 因为 web.xml 下的 servelt/* 所对应的类是 nc.bs.framework.server.InvokerServlet 其大概意思是根据/*后面的服务名查找对应类 根据文档。有一处 UploadServlet。对应类:nc.document.pub.fileSystem.servlet.UploadServlet 然后直接找这个类。看了 doget 和 dopost 都指向 doaction 方法。随便看一下就 知道了。 开发是老实人,这里啥都没有,直接把 InputStream 拿去反序列化。多简单。 ...
pdf
crawlergo是一个使用 chrome headless 模式进行URL收集的浏览器爬虫。它对整个网页的关键 位置与DOM渲染阶段进行HOOK,自动进行表单填充并提交,配合智能的JS事件触发,尽可能的 收集网站暴露出的入口。内置URL去重模块,过滤掉了大量伪静态URL,对于大型网站仍保持较快 的解析与抓取速度,最后得到高质量的请求结果集合。 crawlergo 目前支持以下特性: * 原生浏览器环境,协程池调度任务 * 表单智能填充、自动化提交 * 完整DOM事件收集,自动化触发 * 智能URL去重,去掉大部分的重复请求 * 全面分析收集,包括javascript文件内容、页面注释、robots.txt文件和常见路径Fuzz *...
pdf
从BSRC看互联网企业安全漏洞及 威胁趋势 百度安全应急响应中心 Baidu Security Response Center 百度安全应急响应中心 Baidu Security Response Center 目录 ‣ 互联网企业漏洞分布 ‣ 漏洞趋势 ‣ 趋势分析 ‣ 未来的关注点 百度安全应急响应中心 Baidu Security Response Center 互联网企业漏洞分布 • 安全设计缺陷(逻辑漏洞)20% • XSS 18% • 信息泄露 12% • 越权 25% • 其他 25% 百度安全应急响应中心 Baidu Security Response Center 逻辑漏洞(业务强相关性漏洞) •通常是对业务的威胁...
pdf
Six Degrees of Domain Admin About Us I am Andy Robbins Job: Pentester at Veris Group’s ATD Speaker: BSidesLV/Seattle, ISC2 World Congress, ISSA International Trainer: Black Hat USA 2016 Other: Ask me about ACH Twitter: @_wald0 About Us I am Rohan Vazarkar Job: Pentester at Veris Group’s ATD Tool creator/de...
pdf
1 .NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019 DEF CON USA 2019 by Alexandre Borges ALEXANDRE BORGES – MALWARE AND SECURITY RESEARCHER DEF CON USA 2019 2 Malware and Security Researcher. Speaker at DEF CON USA 2018 Speaker at DEF CON China 2019 Speaker at CONFidence Conference 2019 (Poland) Speaker...
pdf
IOActive, Inc. Copyright ©2014. All Rights Reserved. Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System Shane Macaulay Director of Cloud Services IOActive, Inc. Copyright ©2014. All Rights Reserved. The Long Road • Barnaby Jack, forever in our hearts and minds. “It’...
pdf
Attacking .Net Applications At Runtime By: Jon McCoy Abstract This paper will introduce methodology for attacking .NET programs at Runtime. This attack will grant control over the targets variables, core logic, and the GUI. This attack is implemented with .NET code, and is heavily based on reflection. This paper has a ...
pdf
CyBRICS CTF By Nu1L Author:Nu1L CyBRICS CTF By Nu1L WEB Hunt Developer's Laptop Gif2png Woc RE Hide and Seek Baby Rev Polyglot NetWork XCorp Google Cloud rebyC CatGirl Breach Quiz Hellish Reverse Cyber Serial Too Secure Broken Invitation CTB Pwnogram DockEsc Forensic Krevedka Keyshooter WEB Hunt flag Developer's Laptop...
pdf
Auto-adapting Stealth Communication Channels Daniel J. Burroughs University of Central Florida About myself • Assistant Professor at UCF • Research includes – Correlation of distributed network sensors – Law enforcement data sharing network Correlation of IDS/Sensors • Previous research project I worked on – Presente...
pdf
sliver 简单使⽤及源码浅析 1 sliver 简单使⽤及源码浅析 作者 https://github.com/Ciyfly 因笔者技术能⼒有限 有些地⽅有些错误欢迎各位师傅指出 也欢迎各位师傅有任何问题跟我交流沟通 ⽬录 @Recar ⽬录 简单使⽤ 先启动⼀个监听器 ⽣成植⼊端 exe 上线 临时退出当前会话 后台 ⽣成shellcode bin 开启多⼈模式 ⽣成连接配置 客户端 客户端连接 server 服务端 server main console.Start() 服务端开启多⼈模式通信 multiplayer 开启多⼈模式 ⽣成连接配置 client 客户端 implant 植⼊端 截图 sliver 植⼊端...
pdf
Pen-Testing the Backbone Raven, NMRC raven@nmrc.org White box, black box? ● Black box testing is good for external recon and data gathering. ● However, it's far more difficult and likely to be destructive in implementation. ● Many or most backbone vulnerabilites are denial- of-service oriented. ● Since people get unh...
pdf
 0xcsandker  csandker  RSS Feed //Posts //History of Windows //Archive //Tags & Search //ME  Switch Theme Offensive Windows IPC Internals 1: Named Pipes 10 Jan 2021 (Last Updated: 7 1⽉ 2022) >> Introduction >> Named Pipe Messaging >> Data Transfer Modes >> Overlapping Pipe I/O, Blocking mode & In-/Out Buffers >> Na...
pdf
jndi注入高版本绕过与反序列化 昨天群里聊到这了,虽然都是炒冷饭,但有些细节可能分析清楚点也有好处。主要分析分三个部分 1、jndi注入的原理 2、jndi注入与反序列化的关系 3、jndi注入与jdk版本的关系 jndi注入的原理: jndi是java用于访问目录和命名服务的 API。使用jndi进行查询本来是一个正常的功能,但由于实现时没 有考虑安全问题,如果查询恶意对象就会导致被攻击。但攻击的结果并不一定是rce。 jndi的查询大致可以分两步: 1、客户端请求一个命名服务并获取一个对象。 2、客户端解析这个对象。 那么漏洞出现在哪步呢?实际上是两步都有可能,因为jndi支持RMI、LDAP、CORBA、DNS四种协议, 每...
pdf
John Shaw, Wisconsin DOT, 2013 Federal Highway Administration, 2013 Non-Significant Address Part (NAP) Upper Address Part (UAP) Lower Address Part (LAP) 00:00 09 4E:22:19 Manufacturer-assigned, irrelevant Can be derived from traffic Sent in every packet University of Washington STAR Lab Washington State Transportation ...
pdf
ProxyNotShell (疑似) 分析与poc 1. 漏洞原理分析 Exchange 的ProxyNotShell 漏洞已经爆出来挺久了,临时缓解措施都已经绕过几轮了,但是一直没有 poc放出来,也没有明确的漏洞原理泄露。前一段时间twitter上有人分享了一些思路,可能是 ProxyNotShell 的 ssrf 部分。不过热度过去了也没太多人关注,所以我把这个思路的poc写了一下,和 大家分享一下。如果最后不是ProxyNotShell, 那就叫它 NotProxyNotShell 吧。。。 首先回忆一下 ProxyShell 的利用链:autodiscover 前端端点的 ssrf 漏洞自带 kerberos 认证,认...
pdf
0x00 前⾔ 如有技术交流或渗透测试/代码审计/红队⽅向培训/红蓝对抗评估需求的朋友 欢迎联系QQ/VX-547006660 0x01 前奏 最近在测试某知名安全⼚商的过程中,发现其⼀处重要业务的⼦域竟出现了难得⼀⻅的⾃研WAF,如此⼀来勾起了 我的兴趣~ 仔细研究该业务点后,发现某处传参,会直接将传参内容写⼊JS中,⼤⼤的危险 Aut hor: J 0o1ey 于是与WAF的⼀次交锋便从此刻开始~ 0x02 平静的闭合与常规操作 由上图的输出位置可知,⽆WAF情况下,我们只需要通过 三个符号来闭合前半部分JS,再⽤//注释后⽅JS,再直接eval执⾏JS代码即可 构造Payload 由于eval,alert,括号等太敏感~毫⽆疑...
pdf
1 HTTP IDS Evasions Revisited Daniel J. Roelker Abstract—This paper describes two general IDS evasion techniques and applies them to the HTTP protocol. These techniques are illustrated using some older types of HTTP evasions and some new HTTP evasions. The different types of evasions occur in both the Request UR...
pdf
Stealing Profits from Stock Market Spammers Defcon 17 - Grant Jordan - 7/31/09 © Copyright 2008, The NASDAQ OMX Group, Inc. or: How I Learned to Stop Worrying and Love the Spam Who were we? • Grant Jordan & Kyle Vogt • MIT students with too much free time • Lots of ridiculous projects • …...
pdf
安全圈里的小锁匠 网络尖刀成员 郭晓东 GD 家庭安全的第一道-­门锁 2 门 与 锁 第一章 锁的历史 4 • 草绳与觿 • 门闩 • 三簧锁 • 叶片锁 • 套筒转心锁 • 弹子锁 锁的历史 5 • 草绳与觿 • 门闩 • 三簧锁 • 叶片锁 • 套筒转心锁 • 弹子锁 锁的历史 6 • 草绳与觿 • 门闩 • 三簧锁 • 叶片锁 • 套筒转心锁 • 弹子锁 锁的历史 7 • 草绳与觿 • 门闩 • 三簧锁 • 叶片锁 • 套筒转心锁 • 弹子锁 锁的历史 8 • 草绳与觿 • 门闩 • 三簧锁 • 叶片锁 • 套筒转心锁 • 弹子锁 锁的历史 第二章 锁的分类 10 一、A级锁,B级锁,超B级锁 二、边柱锁,传统非边柱锁 1分...
pdf
Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering Joe Grand (@joegrand) aka Kingpin Grand Idea Studio, Inc. PCB Reverse Engineering • The art of "undesigning" an existing system • Destructive and non-destructive methods • Why? – Determine system or subsystem functionality – S...
pdf
I Know What You Are By the Smell of Your Wi-Fi Denton Gentry @dgentry denny@geekhold.com We’re here today to talk about a mechanism which identifies the type of device connecting to a Wi-Fi network. It can be quite specific: it can tell the difference between an iPhone 5 and an iPhone 5s, between a Samsung Galaxy ...
pdf
今天看到一篇文章: https://bitsadm.in/blog/windows-security-updates-for-hackers 讲述如何通过Windows的补丁号来评估系统面临的风险以及工具的相关实现,它通过爬取微软官方更新 中的KB号和系统已有的进行对比,和hacking8的提权辅助 https://i.hacking8.com/tiquan 有一点异曲 同工之妙。 它发布的工具是: https://github.com/bitsadmin/wesng 我摘出一些觉得有用的代码出来。 识别系统版本 通过systeminfo,得知我的系统版本是 19042 可得出我的系统版本是 20H2 Windows版本号过去发布的...
pdf
Format • Three parts in today’s presentation. – Kernel auditing research. – A sample of exploitable bugs. – Kernel exploitation. • Pause for questions at completion of each section, but questions are welcome throughout. Part (i) Kernel Auditing Research. Kernel Auditing Overview • Manual Open Source Kernel Security Aud...
pdf
_vti_fpxploitation mshannon@fpxploiter.org Frontpage: Laying the ground work What is it? ● Microsoft's integrated Web Site development tool. ● System for adding basic to advanced functionality with little or no web page experience. ● Integrated MS Office package ● Security Nightmare Who is Vermeer Technologies? ● I...
pdf
So Many Ways to Slap a YoHo: Hacking Facebook & YoVille Sean Barnum, Cybersecurity Principal MITRE EvilAdamSmith, Sr. Security Consultant Tom Stracener “Strace”, Contract Engineer MITRE Misclaneous Disclaimers © Stracener, Tom 2010 Its Medicinal! © Stracener, Tom 2010 What is YoVille? © Stracener, Tom 2010 What ...
pdf
“Yeah Boy!” 1 General Flow of talk •Play 10-20 second intro from Public Enemy’s Bring The Noise... •If you love rap, you’re probably confident with high self esteem and extremely out going. •and that’s really what this talk is all about.... References: News article: http://www.independent.co.uk/arts-entertainment/music/...
pdf
0-7803-8367-2/04/$20.00 ©2004 IEEE Abstract-- Techniques and methods currently exist to detect if a certain type of rootkit has exploited a computer systems. However, these current techniques and methods can only indicate that a system has been exploited by a rootkit. We are currently developing a methodology to...
pdf
Mind Games 1 Introduction to “The Last Science Fiction Story” I t’s true, the breaking waves of the future – as we construct it inside our societal mind, inside our cultural frames - inundate the past and the future often happens now before the past, some of the eddies of the future, some of the backwaters of the past....
pdf
对抗AV检测 -- 病毒遗传感染 对抗AV检测 -- 病毒遗传感染 技术的探索 技术的探索 nEINEI/[bytehero team] 病毒遗传感染技术的探索 病毒遗传感染技术的探索 • 内容介绍: 关于病毒遗传感染技术 • 关于病毒遗传感染技术 • - 计算机病毒/人工生命/自进化 • - 多态/ 变形之后的思路 • - 多态/变形的弱点在哪里? • 遗传感染的一种实现思路 • - 舍弃掉解密器/收缩器 舍弃掉解密器/收缩器 • - 构造一个新的变形机制 • - 病毒“基因”的提取 • - 宿主交叉/变异点的选择 宿主交叉/变异点的选择 • - 构造宿主/病毒的双执行环境 • - 宿主/病毒及感染后的重定位 • 完整的遗传感染...
pdf
T1047: WMI for Lateral Movement 参考:Windows管理规范 Windows管理规范(英语:Windows Management Instrumentation,缩写WMI)由一系列对 Windows Driver Model的扩展组成,它通过仪器组件提供信息和通知,并提供了一个操作系统的 接口。WMI是微软对分布式管理工作组(DMTF)的基于Web的企业管理类(WBEM)和通用信 息模型(CIM)标准的实现。 简单的说下重点: 允许使用脚本语言(VBScript 或Powersehll)管理本地或远程服务器和个人电脑 预转在Windows 2000以后的所有Windows 系统中(包括Windows...
pdf
环境搭建 安装Oracle19c,安装的时候这里要选AL32UTF8 接下来会卡在42%,多等一会就好了。 安装fmw_12.2.1.3.0_infrastructure.jar 下一步下一步就行 然后安装bi fmw_12.2.1.4.0_bi_windows64_Disk1 下一步下一步就行了 然后运行rcu.bat 创建完bi所用的数据库之后运行C:\Oracle\Middleware\Oracle_Home\bi\bin\config.cmd配置bi 然后就安装完成了。 分析 修改C:\Oracle\Middleware\Oracle_Home\user_projects\domains\bi\bin\setDomainEn...
pdf
Abusing Web Hooks For Command And Control Dimitry Snezhkov @Op_nomad X-Force Red IBM Corporation What we are going to talk about Subject: Safe(er) bidirectional delivery of content and communication across network boundaries with the use of WebHook technology. From: - Hostile networks - Monitored networks - Censored...
pdf
Dec 2017 Copyright*©LAC*Co.,*Ltd.*All*Rights*Reserved. Yoshihiro Ishikawa Open%Source%as%fuel%of%recent%APT Copyright*©LAC*Co.,*Ltd.*All*Rights*Reserved. Who%am%i?% • Organization:*LAC* • Department:*Cyber*Counter*Threat*Team* • Job*Title:*Security*Researcher* CISSP yoshihiro.ishikawa[at]lac.co.jp Yoshihiro*Ishikawa* ...
pdf
author:Y4er 前言 看到推特上有人发 PrinterLogic Web Stack unserialize RCE,但是poc打码了,所以自己下了一个 分析一下。 这玩意是个打印机,开放了一个基于iis/php/laravel的web,而且php源码是加密的,本文就对其 进行解密并分析漏洞。 解密源码 打开php文件看到文件是加密的 找到php的安装路径 C:\Program Files (x86)\PHP\7.3.28.0 ,查看php.ini的配置 用到了一个php_decoder.dll,直接拖入ida中。经过分析导入表中引入zend_compile_file,多是处 理加密解密的重写。 跟进到sub_100011D...
pdf
Homeless Vikings Cut it out. You’re just making it worse. A marginally entertaining talk by Dave Josephsen Who IS this guy? • Dave. Sysadmin. • Various (mostly useless) Certifications • I wrote a book. You should buy it (I could use the $4) • I write the monitoring column for ;login magazine. • Use SourceMage! You mi...
pdf
实战攻防演习之 红队视角下的防御体系突破 1 实战攻防演习之 红队视角下的防御体系突破 3 前 言 网络实战攻防演习,是新形势下关键信息系统网络 安全保护工作的重要组成部分。演习通常是以实际运 行的信息系统为保护目标,通过有监督的攻防对抗, 最大限度地模拟真实的网络攻击,以此来检验信息系 统的实际安全性和运维保障的实际有效性。 2016年以来,在国家监管机构的有力推动下,网 络实战攻防演习日益得到重视,演习范围越来越广, 演习周期越来越长,演习规模越来越大。国家有关部 门组织的全国性网络实战攻防演习从2016年仅有几家 参演单位,到2019年已扩展到上百家参演单位;同时 各省、各市、各行业的监管机构,也都在积极地筹备 和组织各...
pdf
DEF CON 24 Side-channel attacks on high- security electronic safe locks plore@tuta.io Background – Electronic safe locks Image: ellenm1 on Flickr / CC BY-NC Background – Electronic safe locks • In scope: decent, listed locks – UL Type 1 High-security electronic lock • Out of scope: cheap, poor-quality locks Sa...
pdf
侧信道分析 感谢北京理⼯⼤学-王安教授的讲解 0x00 什么是侧信道 什么是侧信道?⼀个简单的例⼦就是某些泡⾯和饮料中奖,以可能会随机附赠⽕腿肠,⽽带有⽕腿肠的桶和不带⽕ 腿肠的桶重量不⼀样,摇晃起来响声不⼀样,通过摇晃我们能简单分析出“哪桶是中奖了的泡⾯”这⼚商不希望我们 知道的信息,这就是侧信道。这样的例⼦在⽣活中还有很多,⽐如对于⼩区按键门禁,长期按的⼏个键上的油脂、 指纹、磨损,同样也是我们猜解其密码的侧信道信息,⽐如⼀个六位数密码的门禁,猜测空间是106 ⽽当我们获知 其密钥的组合时,我们猜测空间就降低到了 6! 相对于偏社会⼯程学⼀点的例⼦,看见⼩区⼀家⼈扔垃圾,⽽他们扔的垃圾⾥⾯有:婴⼉奶粉罐头瓶、啤酒瓶、少 量烟头、...
pdf
Off Grid communications with Android Meshing the mobile world Josh “m0nk” Thomas The MITRE Corporation Bedford, MA USA jbthomas@mitre.org Jeff “Stoker” Robble The MITRE Corporation Bedford, MA USA jrobble@mitre.org The SPAN project is an open source implementation of a generalized Mobile Ad-Hoc Network framew...
pdf
Warez Trading and Criminal Copyright Infringement Eric Goldman Marquette University Law School eric.goldman@marquette.edu http://eric_goldman.tripod.com Overview Definition of warez trading Applicable criminal laws Some prosecutions Some policy concerns The bottom line:  Warez trading has been criminalized  More war...
pdf
JDK 7u21分析 0x01 写在前⾯ JDK7u21原⽣gadget链的构造⼗分经典,在对于其构造及思想学习后,写下本⽂作为笔记。 0x02 所需的知识点 JDK7u21这个链⽤了很多的Java基础知识点,主要如下: Java 反射 javassist 动态修改类 Java 静态类加载 Java 动态代理 hash碰撞 为了⽅便⼤家理解此⽂,因此我会对这些知识点进⾏简单介绍,如果都了解的朋友可以直接 翻到后⾯的分析过程。 0x03 基础知识 1、Java 反射 反射 (Reflection) 是 Java 的特征之⼀,在C/C++中是没有反射的,反射的存在使得运⾏中的 Java 程序能够获取⾃身的信息,并且可以操作类或对象的内...
pdf
Crowd Security Intelligence @colbymoore @patrickwardle syn.ac/defc0n22 download slides optical implanting this surgery who we are we source a global contingent vetted security experts worldwide and pay them on an incentivized basis to discover security vulnerabilities in our customers’ web apps, mobi...
pdf
隐藏信息接管k8s集群 最近在恶补⼀些体系框架,想到之前遇到的⼀个攻防场景,做个分享,⾮科普向。 很多⼈都分享过未授权场景的利⽤,但是关于证书认证、token认证下攻防的场景不是很 多。 基础概念补全 K8S k8s全称kubernetes,是⼀个开源的,⽤于管理云平台中多个主机上的容器化应⽤的编排 管理⼯具,提供了应⽤部署,规划,更新,维护的⼀种机制,可简单理解为容器集权设备。 kubernetes ⼜涉及到⼏个核⼼组件,其中,apiserver提供了资源操作的唯⼀⼊⼝,操作基本 上都是通过 apiserver 这个组件进⾏的,它提供 HTTP RESTful 形式的 API 供集群内外客户端 调⽤。kubernetes 对于访问...
pdf
Automated
Malware
Similarity
Analysis
 Daniel
Raygoza
 daniel@raygoza.net
 Abstract
 Malware
analysis
has
evolved
in
both
the
sophistication
of
the
samples
 analyzed
and
the
tools
of
the
trade.
Unfortunately
human
analysis
of
samples
 is
still
very
expensive
and
time
consuming.
As
teams
of
malware
analysts
 have
grown
...
pdf
数据安全能力建设实施指南 V1.0 (征求意见稿) ! ! ! ! ! ! ! ! ! ! ! ! ! 《数据安全能力成熟度模型(DSMM)》配套文档 2018-9-29! ! ! ! 2! 目 录 前 言 ................................................................................ 3! 1 范围 ................................................................................ 4! 2 规范性引用文件 ...
pdf
U . S. D E P A R T M E N T O F C O M M E R C E N A TI O N A L T E L E C O M M U N I C A T I O N S & I N F O R M A TI O N A D M I N IS T R A T I O N MOBILE (AERONAUTICAL TELEMETERING) S) 5.68 5.73 5.90 5.95 6.2 6.525 6.685 6.765 7.0 7.1 7.3 7.35 8.1 8.195 8.815 8.965 9.040 9.4 9.5 9.9 9.995 10.003 10.005 10.1 10.15 ...
pdf
本⽂作者:Drunkmars(⾸次投稿,赠送知识星球) 最近在某地⽅举⾏攻防演练的时候进⼊后台管理拿到了⼀个webshell,但是 tasklist /svc tasklist /svc 查 看进程360、电脑管家赫然在列,我的⼩伙伴本来准备使⽤注⼊dll来达到上线cs多⼈运动的效果, 但是奈何中间出了点差错始终上不了线,机缘巧合之下发现被控主机有⼀个 SunloginClient.exe SunloginClient.exe 进程,于是便有了下⽂。 0 x 0 1 初 探 0 x 0 1 初 探 进⼊后台的过程就不说了,这⾥上传了⼀个asp⼤⻢进⼊到对⽅主机,whoami⼀看⼀个user权限 然后⼀发 tasklist /sv...
pdf
Bvp47 美国NSA方程式的顶级后门 技术细节 版本1.7 目录Contents 1. 摘要 2. 前所未见的后门 3. 后门程序概览 – Bvp47 4. 组织关联和溯源 “The Shadow Brokers Leaks”事件关联 非对称算法私钥匹配 样本深度关联 完整控制命令行 斯诺登事件关联 Bvp47—美国 NSA 方程式组织的顶级后门 文件结构 文件属性 文件结构 使用场景 4 4 4 6 1 2 4 8 8 9 9 12 13 15 5. 遍布全球的受害者 泄露出的受害者信息 利用受害主机作为跳板攻击目标 6. Bvp47后门技术详解 主要行为 Payload 字符串加解密 函数名混淆技巧 Bvp 引擎 系统 Hoo...
pdf
TenProtect Conficential, Copyright @Tencent, 2019 游戏安全的攻防艺术 joeywzhu@tencent.com 2019.02 TenProtect Conficential, Copyright @Tencent, 2019 个人简介 • 2013 至今,腾讯游戏业务安全部技术专家 • 2005-2012 ,趋势科技架构师 • 2005-2008, 开发和设计 PE 病毒沙箱 • 2008-2012, 开发和设计脚本漏洞分析引擎 • 2013 to now, 开发和设计游戏安全通用方案 • 2011.8 Defcon 讲演 “ Chinese phishing at Defc...
pdf
CodeQLOpenJDK CodeQL CodeQL Extractor Extractor src.zip CodeQL LGTMCodeQLQL LGTMGitHubWorkflow LGTMOpenJDKDatabase openjdk/jdk8utag ubuntu 16.04 Boot_JDKjdk 1.7.0_80 Target_OpenJDK:OpenJDK 8u73 Boot_JDK tar.gz Boot_JDK jdk-7u80-linux-x64.tar.gz Toolchain # mkdir /usr/lib/jvm tar -zxvf jdk-7u80-linux-x64.gz -C /u...
pdf
Lessons Learned from Five Years of Building Capture the Flag Vito Genovese DEF CON Beijing 2018 Hello! Capture the Flag "CTF" DEF CON 1996 first game 2000 formalized how it was run 2002-2004 ghettohackers 2005-2008 Kenshoto 2009-2012 ddtek 2013-2017 Legitimate Business Syndicate 2018-? Order of the Overflow...
pdf
 0xcsandker  csandker  RSS Feed //Posts //History of Windows //Archive //Tags & Search //ME  Switch Theme Offensive Windows IPC Internals 3: ALPC 24 May 2022 (Last Updated: 29 5⽉ 2022) >> Introduction >> ALPC Internals >> The Basics >> ALPC Message Flow >> ALPC Messaging Details >> ALPC Message Attributes >> Puttin...
pdf
安全画像在58落地实践 目录 0 1 0 2 0 3 0 4 0 5 整体架构 标签生产 标签管理 落地实践 背景 背景 01 背景 背景 黑名单 维度单一,力度粗 判罚依据少,误杀严重 有监督算法模型 模型训练成本高 准确率衰减较快 内容识别 内容变化频繁 字体变化频繁 传统风控策略 黑产特征变化频繁 人工维护成本高 传统 风控  传统风控手段主要是基于行为和内容的拦截,在对抗初期,效果比较明显,但随着黑产攻击行为的 不断变化,问题也逐渐显现  安全画像的目标:利用现有风控手段的安全治理成果,持续对黑产资源进行多维度消耗,提升黑产 攻击成本  传统风控系统虽然行之有效,但是没有对黑产资源进行消耗 解决方案 整体架构 02 系...
pdf
Why Anomaly Based Intrusion Detection Systems are a Hax0rs Best Friend By David Maynor GT Information Security David.Maynor@oit.gatech.edu The history of the castle. • What is a Anomaly based IDS and how does it differ from Signature based systems? a. Signature based systems rely on static analysis of event. b. An...
pdf
• • • • • • • • • • • • • • • • • • *https://www.hpe.com/us/en/insights/articles/medical-device-security-hacking-prevention-measures-1806.html • • • • • • • • • • • • • • • • • • • • • • • • • • • • PM PM CMS PM CMS Data Packets • • • • • • • • • • • • • • • • • • CMS Opens Channel “SYN” CMS Opens Channel “SYN” PM...
pdf
d3ctf WriteUp By Nu1L author:Nu1L d3ctf WriteUp By Nu1L PWN d3dev d3dev-revenge Truth hackphp liproll Reverse jumpjump baby_spear No Name white give Ancient Crypto babyLattice WEB 8-bit pub non RCE? Happy_Valentine's_Day Pool Calc real_cloud_storage real_cloud_serverless Misc Virtual Love_Revenge Virtual Love easyQuant...
pdf
Bypass AMSI的前世今生(6) - .net和wmi(完结) 0x00 前言 这是这个系列完结篇了,其实读完并跟随文章实际测试完前5篇,对抗AMSI应该手到擒来了。这一篇主 要分析下AMSI在.net和WMI中的应用,以分析调用流程为主,对抗方式为辅。明白了原理,在实际攻防 中灵活运用就行了。 0x01 .Net如何调用AMSI 通过第一篇文章我们知道.net调用amsi.dll的文件是clr.dll 我们通过IDA静态分析找到相应的调用函数,如下是F5后的伪代码: C:\Windows\WinSxS\amd64_netfx4- clr_dll_b03f5f7f11d50a3a_4.0.15805.360_none_395b...
pdf
JavaScript在网络安全 中的“身影” 高佳 关于我 职位:斗象科技高级安全研究员 主要负责:众测项目的上线与漏洞审核 • 第一部分 JavaScript的重要性 • 第二部分 JavaScript的信息收集 • 第三部分 JavaScript的前端加密 • 第四部分 JavaScript的混淆与反混淆 目录 JavaScript的重要性 JavaScript的重要性 没有人比我更懂JavaScript JavaScript的重要性 JavaScript的重要性 大人,时代变了 JavaScript的信息收集 JavaScript的信息搜集-URL JavaScript的信息搜集-API JavaScript的信息搜集...
pdf
Covert Channels Towards a Qual Project Rachel Greenstadt Harvard University Covert Channels – p.1/21 Overview ■ About covert channels ■ Example channel: TCP timestamps ■ Problems with the example channel ■ Directions in covert channel research Covert Channels – p.2/21 What’s a Covert Channel? ■ A channel transfers info...
pdf
与业务融合的漏洞检测之路 关于我 • 乌云白帽子 猪猪侠 • 8年信息安全从业经历 • 信息安全领域爱好者 • 安全测试 • 数据挖掘 • 微博:@ringzero DEMO 1 WEB2.0服务端 复杂的用户认证机制,传统漏 洞扫描器无法与业务功能交互 http://v.youku.com/v_show/id_XODc0NjYyODg0.html DEMO 2 移动客户端 功能封闭,导致漏洞扫描器无 法与业务功能交互 http://v.youku.com/v_show/id_XODc0Njc1MzI0.html 旁路传感器还原数据分析出攻击行为 使用业务系统时,从数据流量中检测业务流程漏洞 什么是业务安全? “连接彼此,交换信息。...
pdf
From “One Country - One Floppy” to “Startup Nation” The story of the early days of the Israeli hacking community I We* * Unless otherwise stated #whoarewe + #whyarewehere 1975 1984 1988 1993 2011 2015 1977 1986 2004 2011 2013 Some of the people in our story Hacking Cracking Phreaking Carding 90’s Terminology Hacking Cr...
pdf
Weaponize Your Feature Codes By MasterChen Who Am I? • GreyNoise Podcast Co-Founder and Co-Host https://greynoi.se • SYNShop Hackerspace member http://synshop.org • 2014 & 2016 BSidesLV Speaker • “What I Learned As A Con Man” • “A Peek Behind Vegas Surveillance” • 2015 DC Skytalks Speaker • “Automate Your Stalking” • ...
pdf
Micro-Renovator Bringing Processor Firmware up to Code Bio Matt (a.k.a. Syncsrc) ● Recovering EE / CompE ● Builder and user of hardware debug features ● Uses “BIOS” and “UEFI” interchangeably ● Currently responsible for platform security of a cloud ● Religiously updates firmware ● Formerly a product security validation...
pdf
Exploiting Qualcomm WLAN And Modem Over-The-Air Xiling Gong, Peter Pi Tencent Blade Team About Us Xiling Gong (@GXiling) Senior security researcher at Tencent Blade Team. Focus on Android Security, Qualcomm Firmware Security. Speaker of BlackHat, CanSecWest. Peter Pi(@tencent_blade) Senior security researcher at Ten...
pdf
以蓝军视⻆跟踪和分析CANVAS攻击框架泄露事件 全⽂共2605字,阅读⼤约需要5分钟。 3⽉3⽇,绿盟科技研究团队在对⽹络安全事件舆情监控中发现著名的商业渗透框架CANVAS系统源代码发⽣泄露, 绿盟科技M01N蓝军研究团队第⼀时间对该事件进⾏了跟踪,快速分析了CANVAS的攻击框架、所涉及的漏洞和技 术细节。 Immunity CANVAS是⼀套受信任的商业安全评估攻击框架,每⽉都会发布稳定版本,它允许专业⼈员进⾏渗透测 试和对⼿模拟攻击。此次CANVAS的泄露版本为7.26,⽇期为2020年9⽉,包含1000+个漏洞利⽤代码。使⽤ CANVAS成功攻陷系统后,攻击者可以抓取屏幕截图,转储密码凭据,操纵⽬标⽂件系统并提升特权,并...
pdf
Malware in the Gaming Micro-economy Zack Allen Rusty Bower Zack & Rusty Background for non-gamers ● Non-functional cosmetic items introduced in 2009 ● In 2010, an update was released that allowed players to trade hats and weapons with each other ● This has since been expanded to other games ○ CS:GO, DOTA, League ...
pdf
1.准备操作系统windows2012 r2 x64(8G RAM,500G HDD) 2.对系统进行全局代理翻墙(系统需要安装.net framwork 3.5 sp1以及microsoft visual c++ version 2019-2015) 3.点击CORE IMPACT19.1 4.结束CORE IMPACT的相关进程或者服务 5.将破解包中的program files 和programData目录所有文件复制到系统C盘下 6.将破解包中的三个序列号文件复制到C:\Program Files (x86)\Core Security\Impact\bin\5372-8801-2329-7643-5724 目录下 7....
pdf
Blog 利用dll劫持实现免杀与维权 2021-06-29 · 红蓝对抗 根据软件工程高内聚低耦合的思想,把程序要重复使用的代码封装成函数/类方法,将软件要重复使用的程序 封装成链接库。库分为静态链接库和动态链接库,静态链接库顾名思义就是在程序链接阶段打包进文件中, 而动态链接库则是在程序运行时再导入调用。动态链接库有着加载时复用节省内存、补丁更新时可符合开闭 原则等优点,也有容易发生版本冲突、容易被劫持等缺点。Windows平台下的动态链接库常为dll文件,linux 则常为so文件。 dll劫持概念与类型 dll劫持就是要想方设法地调用到恶意dll。为了便于理解,需要了解一下目前Windows默认的dll调用顺序: Known...
pdf
Pwning "the toughest target": the exploit chain of winning the largest bug bounty in the history of ASR program Jianjun Dai Guang Gong Wenlin Yang #whoami • Guang Gong • Senior Security Researcher and Team Leader of 360 Alpha Team • Android/Chrome CVE hunter • Speaker at Black Hat,...
pdf
关于某EDR多处RCE漏洞的简单分析 RCE_1? 漏洞⽂件 1. tool\log\c.php 通过URL传参初始化变量,经典的变量覆盖漏洞。 Y4er ChaBug 昨天 RCE_2? 1. tool\php_cli.php 同样的问题,感觉这个更过分了,bypass waf webshell? RCE_3? 1. tool\ldb_cli.php 同。 RCE_4? 1. tool\mdd_sql.php 任意⽂件读取 1. store\cat.php 算了,⼤家都看得懂 啊,这, 算了,不看了
pdf
windows特权滥用攻击 本文主要介绍利用windows特权滥用进行本地权限提升攻击。 特权滥用的bug 以高权限运行的进程(一般指system权限)会像其他进程一样对文件进行各类操作(如增删改查),当高权限 进程在没有进行任何防御措施的情况下访问用户文件或者是目录时则有可能造成安全问题。我们一般所 熟知的此类问题有DLL planting或者是利用可写服务操作等,但除此之外还有其他的文件系统的攻击方 法可以被我们利用,且由于此类攻击属于逻辑漏洞,不涉及内存操作所以不会像内核提权那样有太多的 版本限制以及可能造成的bsod等风险。 漏洞位置 用户可写项 一般用户(普通用户)可以写入的位置如下: 用户自己的目录、文件,包括其appd...
pdf
, , , Las Vegas , 2012 Aditya K Sood | Richard J Enbody SecNiche Security | Department of Computer Science and Engineering Michigan State University Botnets Die Hard Owned and Operated 2 About Us  Aditya K Sood ● PhD Candidate at Michigan State University – Working with iSEC Partners – Founder...
pdf