text
stringlengths
100
9.93M
category
stringclasses
11 values
The$Open$Crypto$Audit$Project:$ Our$Story6 Kenneth White & Matthew Green DEF CON 22 | 2014.08.08 Open$Crypto$Audit$Project6 Everyone has a story. This is ours. DEF CON 22 | 2014.08.08 Agenda6 •  First Principles •  Post-Snowden Era •  The TrueCrypt Story •  Open Crypto Audit Project •  Secure Coding & Trust • ...
pdf
From “One Country - One Floppy” to “Startup Nation” The story of the early days of the Israeli hacking community © PerimeterX 2016 2 Israeli Tech Leaders: Let’s see how it all started Hacking Cracking Phreaking Carding 90’s Terminology The BBS Scene The BBS Scene The BBS Scene BBS Mischief The Story of the Ethics Group...
pdf
1 Resin<=Q.L.TS⽂件读取 ⼏个⽉前发现的洞直接fuzz到的p0desta师傅挺早就发现了,官⽅在去年12⽉8号修复了这个漏洞。 https://caucho.com/products/resin/download 此漏洞泛微不可⽤因为泛微的安全过滤器不允许URL出现分号。 看过resin代码的都知道他在下⾯这个地⽅匹配 Servlet com.caucho.server.dispatch.ServletMapper#mapServlet 默认存在 resin-file 和 resin-jsp 当所有 Servlet 都匹配不到的时候就会⾛ resin-file ⾸先看读取jsp⽂件内容 ...
pdf
• • • • • • • PythonConsole.cmd • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
pdf
记一次受限制的文件下载 其实这个操作比较简陋主要是减少了很多其他功夫 首先在 app 中发现这个功能 可以下载合同信息,里边有很多敏感信息等 且可以下载导出的 点击下载 然后分享一下 手机登录 qq 然后就可以分享到 qq 好友 就可以查看文件了 就能获取到这个合同的详细信息了 这里有一个点 有几个数据包 是能看到 合同 的内容 ,合同的下载地址两个信息 这里的 frameurl 需要留意一下 但是 有签名校验 ,无法越权等操作(这里的签名之前绕过所以加了两层 不太好去跟 也是 后边直接 hook 的原因) 其中发现有一个数据包泄露了合同地址 于是直接 curl 下载一下看看 发现无响应 然后我解析了一下域名发现 这时候在考虑它是怎...
pdf
Popping a Smart Gun DEF CON 25 plore@tuta.io What is a smart gun? Skyfall Why I care Armatix iP1: watch and pistol Normal operation 25 cm Here’s a token Hey! *squeeze* 1 2 “Good, now I can fire” 3 4 (Demo of normal operation) Motivation: a good challenge Forum post on Armatix iP1 review, November ...
pdf
Nicholas J. Percoco Jibran Ilyas Trustwave’s SpiderLabs Agenda •  About Us •  How did we get the malware? •  Analysis Outline •  Sample A – Casino Club in Las Vegas •  Sample B – Hotel in New York •  Sample C – Video Poker in Lake Tahoe •  Sample D – Restaurant in Michigan •  Conclusions •  Tools We Like ...
pdf
New Phishing Attacks Exploiting OAuth Authorization Flows August 7, 2021 Jenko Hwong jhwong@netskope.com @jenkohwong $ az ad signed-in-user show [ { "jobTitle": "Researcher", "department": "Threat Research Labs", "company": "Netskope, Inc.", "email": "jhwong@netskope.com" "twitter": ...
pdf
Feline Entropy Project Defcon XV Nick Kryptr nkryptr@classful.net What this is NOT: A discussion of political reality: -Any eg. Trusted Computing Initiative will necessarily involve key escrow or similar sophomoric attempt to subvert user security and privacy. -That a large telco recently admitted to transporting wh...
pdf
Beacon Object Files A Beacon Object File (BOF) is a compiled C program, written to a convention that allows it to execute within a Beacon process and use internal Beacon APIs. BOFs are a way to rapidly extend the Beacon agent with new post- exploitation features. 信标对象文件(BOF)是一个已编译的 C 程序,按照约定编写,使它可以在信 标进程中执行并使用内部信标 ...
pdf
Weaponizing data science for social engineering:   Automated E2E spear phishing on Twitter  John Seymour and Philip Tully  {jseymour, ptully}@zerofox.com  Introduction and Abstract  Historically, machine learning for information security has prioritized defense: think intrusion  detection systems, malware classificatio...
pdf
PentesterAcademy.co m/ ©PentesterAcademy.com VoIPShark:+Open+Source+VoIP+Analysis+ Platform+ Nishant/Sharma/ Jeswin+Mathai+ Ashish+Bhangale+ PentesterAcademy.com+&+AttackDefense.com+ PentesterAcademy.co m/ ©PentesterAcademy.com PentesterAcademy.co m/ About+Us+ Me,/Nishant/Sharma/ •  R&D+Manager+and+Lead+Trainer,+Pent...
pdf
SP 0:00:00 PLAY Whitney B. Merrill Attorney & Hacker @wbm312 Tech & the FTC Terrell McSweeny Commissioner Federal Trade Commission @TMcSweenyFTC DISCLOSURE The views expressed do not necessarily reflect the views of the Commission or any individual Commissioner. -- MENU -- WHAT IS THE FTC LOOKING BACK T...
pdf
Raspberry MoCA: an Automated Penetration Platform Andrew Hunt Volgeneau School of Engineering, George Mason University Fairfax, VA ahunt5@masonlive.gmu.edu Abstract— Media Over Coaxial Alliance (MoCA) is a protocol encapsulating Ethernet protocols over coaxial cabling common to interior television wiring. Pre...
pdf
www.senseofsecurity.com.au © Sense of Security 2015 Page 1 – 8 August 2015 Compliance, Protection & Business Confidence Sense of Security Pty Ltd Sydney Level 8, 66 King Street Sydney NSW 2000 Australia Melbourne Level 10, 401 Docklands Drv Docklands VIC 3008 Australia T: 1300 922 923 T: +61 (0) 2 ...
pdf
Building a Real Session Layer These slides are unfortunately, of little use. Please see updated materials at fived.capelis.dj. Please allow me to introduce myself I'm me. There. Introduction Done! Let's start at the beginning (Everyone knows this part... but just let me quickly go through it.) What's a Session Layer? I...
pdf
Cheating in eSports How to cheat at virtual cycling using USB hacks Brad Dixon, Carve Systems Photo by Markus Spiske on Unsplash Sweaty eSports EGVsOG CVRWorldCup Virtual Cycling is Part of Cycling Cycling: Over 100 Years of Cheating Innovation 1903, 1904: Hippolyte Aucouturier 1904: Maurice Garin 1947: Jean Robic Will...
pdf
用Golang编写 dll劫持的一些坑 (2) 源于知识星球的一个想法,利用一些已知的dll劫持的程序作为"模板",自动生成白加黑的程序。 我想用Golang编写劫持的dll,这样也方便可以做成在线平台。 当然dll加载模式不同劫持的方式也不同。 我找到是vscode它的更新程序,也有它官方的签名 看 inno_updater.exe 的导入表,我只用实现它的5个函数就可以了。 因为我想做成通用型的,对于这种输入表导入的dll做劫持,只需要在 DllMain 中获取主程序的入口点, 然后将shellcode写入入口点,之后主程序运行就会执行我们的shellcode了。 C代码如下 测试过是能够正常使用的。 但是把它转成Go的过程中,...
pdf
LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT Jesus Molina @verifythentrust security@nomeames.com HACKING IN MOVIES The Italian Job • Seth Green takes control of all kind of public transit so the mini-coopers can run free • “all  I did was come...
pdf
Unboxing Android Everything you wanted to know about Android packers Slava Makkaveev Avi Bashan Who Are We? @Avi Founder at myDRO, former Mobile R&D Team Leader at Check Point, security researcher at Lacoon Mobile Security. Experienced in OS Internal research, mobile security, Linux kernel. @Slava Senior Security Re...
pdf
渗 透 测试 之信 息搜 集 的 研 究 与 漏 洞 防 范   张 明 航 张卷美   (北京 电 子科 技学院 北京 1 0 00 70 )   ( 1 54 01 01 62 3@ q q.  com )   R e search and Vu lnerab i l i ty Preven tion of In forma t ion  Gat herin g in   P en et rat ion  Test   Zha ng  M ing du o a n d Zhan g J u anm ei   (Beij ing  Electron i c S cienc...
pdf
1 Tomcat中的appBase 第⼀次看⻅有关tomcat appBase是在漏洞百出-⼏个Jolokia RCE的“新”利⽤⽅式⼀⽂中 该⽂后续就展示出了可以直接在新建的vhost中访问/etc/paasswd等⽂件资源,已经跳出 TOCMAT/webapps的限制,并且在其他漏洞中也⻅到了对appBase这⼀属性的利⽤,当时⼼中就有⼀ 些疑问:为什么appBase这⼀属性就可以控制TOMCAT相关资源位置,⼜是什么机制让其实时⽣效 现在就在此⽂中尝试从代码的⻆度简单描述原理、过程 tomcat分析版本:10.0.18 ⾸先寻找appBase从何⽽来 简单看到field的描述如下 简单排查appBase的引⽤,最重...
pdf
http://www.sincuser.f9.co.uk/035/htsquad.htm “How to channel your inner Henry Rollins” By Jayson E. Street https://www.defcon.org /html/links/dc- speakerscorner.html #wiseman-street “I care less if I can't be part of your scene because I am the scene. I am ...
pdf
Breaking Secure Bootloaders Talk Outline Smartphones often use signature verification to protect their firmware This is implemented in bootloaders, which can also provide facilities for firmware updates Weaknesses in these update protocols can be exploited to bypass signature protections The core SoC and peripheral chi...
pdf
1 amazon-redshift-jdbc-driver RCE(CVE-OLOO- QNWOW) 漏洞分析 漏洞复现 漏洞修复 这个漏洞与之前的 pgsql JDBC 漏洞(CVE-2022-21724)是师出同⻔。 漏洞详细:https://github.com/aws/amazon-redshift-jdbc-driver/security/advisories/GHSA-jc69- hjw2-fm86 DriverManager 类建⽴ JDBC 的连接代码如下 调⽤栈 漏洞分析 package org.example; import java.sql.DriverManager; import java.sql.S...
pdf
Ashley X Belinda Let’s Play Hide and Seek In the Cloud The APT Malwares Favored in Cloud Service HITCON 2015 Let’s Play Hide and Seek in the Cloud • Speakers • APT vs Cloud Service • Hide and Seek in SaaS – Redirect – Storage – Control Channel • Wh...
pdf
针对域证书服务的攻击(1)- ESC1 0x00 前言 关于域证书服务攻击的白皮书出来大半个月了 https://www.specterops.io/assets/resources/Certified_ Pre-Owned.pdf,下文以白皮书代指。作者也在BH21后放出了利用工具。在前期大家的主要关注点都集 中在NTLM relay ad cs HTTP来获取域控权限的ESC8上。其实白皮书中关于攻击项的技术有19个,我计 划边学边写。这个过程中难免出错,望指正。 昨天我把域环境搭建好,同时也在其中一台服务器上开启了AD CS服务,打算试试Certify和ForgeCert工 具。在测试Certify工具的时候,看到github...
pdf
ruoyi rce payload snake yaml ssti yaml emmmmmm ssti jar Spring Thymeleaf @Controller public class SstiController { @RequestMapping("/ssti") public String ssti(@RequestParam String payload) { return payload; } } @Controller String thymeleaf SSTI @Controller public class SstiControll...
pdf
& Privileged&Confidential 01 • • 82 5 Privileged&Confidential 5 Privileged&Confidential 0 & 2 Privileged&Confidential Privileged&Confidential & 01 T Privileged&Confidential T Privileged&Confidential • O% & S1 S& • 05 R1 • 0pC 1P 4Op • t4aC81 Privileged&Confidential Privileged&Confidential & 02 Privileged&Confide...
pdf
Pwning "the toughest target": the exploit chain of winning the largest bug bounty in the history of ASR program Jianjun Dai Guang Gong Wenlin Yang #whoami • Guang Gong • Senior Security Researcher and Team Leader of 360 Alpha Team • Android/Chrome CVE hunter • Speaker at Black Hat,...
pdf
Frontrunning the Frontrunners D r . P a u l V i x i e , C E O F a r s i g h t S e c u r i t y , I n c . © Copyright 2016 Farsight Security, Inc. All Right Reserved. Introduction Frontrunners Exploit Non-Public Information To Register Domain Names For Profit • "This Advisory considers the opportunity for a party wi...
pdf
Spring 四天学习总结 ⼀、Spring概述 Spring 是分层的 Java SE/EE 应⽤ full-stack 轻量级开源框架,以 IoC(Inverse Of Control: 反转控制)和 AOP(Aspect Oriented Programming:⾯向切⾯编程)为内核,提供了展现层 Spring MVC 和持久层 Spring JDBC 以及业务层事务管理等众多的企业级应⽤技术,还能整合 开源世界众多 著名的第三⽅框架和类库,逐渐成为使⽤最多的 Java EE 企业应⽤开源框架。 主要特点如下: ①轻量级IoC容器。IoC容器是⽤于管理所有bean的声明周期,是Spring的核⼼组件。在此基础 之上,开发者...
pdf
IOActive, Inc. Copyright ©2015. All Rights Reserved. Abusing XSLT for Practical Attacks Fernando Arnaboldi Senior Security Consultant IOActive, Inc. Copyright ©2015. All Rights Reserved. Why XSLT ? IOActive, Inc. Copyright ©2015. All Rights Reserved. Why XSLT ? •  XML vulnerabilities are fun. They may get yo...
pdf
Fuzzing AOSP for non-crash bugs Elphet & Guang Gong @360 Alpha Team About us ●Elphet ○Security Researcher (Intern) of 360 Alpha Team ○Focus on Android system and application security ●Guang Gong ○Senior Security Researcher and Team Leader of 360 Alpha Team ○Focus on Android/Chrome Introduction • Fuzzers catch memo...
pdf
RCTF2020-WP Author:Nu1L Team RCTF2020-WP RE My Switch Game play_the _game go-flag panda_trace rust-flag Cipher PWN bf Best_php note golang_interface no_write 0c WEB swoole rBlog 2020 EasyBlog Calc MISC Welcome to the RCTF 2020 mysql_interface Switch PRO Controller bean FeedBack Crypto easy_f(x) BlockChain roiscoin RE M...
pdf
Alberto Garcia Illera (@algillera) Javier Vazquez Vidal (@bi0h4z4rd_) Javier Vázquez Vidal • Hardware security specialist • Loves breaking “toys” security • Freelance • From Cádiz Alberto García Illera Index • Hacking of the ECU • Do a forensic job after a car crash Why did this happen? • A friend kept bu...
pdf
Text 腳本小子的告白 -硬碟的秘密大公開 Confessionsofscriptkiddie-HardDriveSecretLetOut Who Am I? thx OSSLab 成⽴立者 練過神功 所以只會硬不太 會軟 我是怎樣開始踏上研究 DIY 萬歲! 這就是資料恢復真實成本 要找到⼀一樣相容硬碟 ⼜又不保證成功率 碟⽚片上有隱性刮傷 能Extract 的資料是否客⼾戶要的 設備成本 (低塵操作環境,資料恢復設備)
 簡單說 有時這跟賭博⾏行業差不多 終極好⼈人技已講完收⼯工 議程三分鐘 已經講完了 ⼤大 家現在可散場好了 來這做⾏行 業賺錢. 向⽔水電⼯工學習的講師表⽰示我當然可 以超過三分鐘 這可是5...
pdf
2008 年駭客年會徵求論文 HIT 2008   Call For Paper u 時間:2008 年 7 月 19 日~20 日(星期六~星期日) u 主辦單位:CHROOT – Security Research Group (http://www.chroot.org) u 活動網址:http://hitcon.org   台灣第四屆駭客年會將於 2008 年 7 月 19~20 日(週六、日)舉行,歡迎各界人士踴躍 投稿。論文內容以探討實作技術並能演講 50 分鐘為佳。 為了讓會議主題能夠明確,我們擬定了以下議題,有興趣的朋友可以從下列議題中選 擇自己擅長的方面進行準備(包括論文、程式碼和投影片),但不以下列的議...
pdf
Mind Games 1 Introduction to Species, Lost in Apple-eating Time I have to admit, I love this wee little story. It’s the best I could do at the time, trying to express the unthinkable in words. It was the unthinkable, I think, that I was thinking, walking around the park near which I live in Fox Point, Wisconsin, thinki...
pdf
Discover  Flash  Player  Zero-­‐day A4acks  In  The  Wild  From  Big  Data Peter  Pi @heisecode Agenda •  Who  am  I •  Background •  Discover  flash  0-­‐day  a4acks  from  big  set samples •  Vector  Length  miGgaGon About  me •  Security  researcher •  APT  pr...
pdf
WHEN THE SECRETARY OF STATE SAYS: “PLEASE STOP HACKING US…” David An Former U.S. Diplomat Bureau of Political-Military Affairs U.S. State Department Figures: Left, historical photo of 1973 Paris Peace Accords to restore peace following the Vietnam (American) War. Right, Reuters, May 2015, Iran negotiates with t...
pdf
IPv6: No Longer Optional John Curran ARIN President & CEO Quick History of the Internet Protocol 2 •  Internet Protocol version 4 (IPv4, or just “IP”) –  First developed for the original Internet (ARPANET) in spring 1978 –  Deployed globally with growth of the Internet –  Total of 4 billion IP addresses availab...
pdf
Are all BSDs created equally? A survey of BSD kernel vulnerabili9es.; ! ! ! Ilja!van!Sprundel!<ivansprundel@ioac4ve.com>! Who Am I; •  Ilja!van!Sprundel!! •  ivansprundel@ioac4ve.com! •  Director!of!Penetra4on!Tes4ng!at!IOAc4ve!! •  Pen!test! •  Code!review! •  Break!stuff!for!fun!and!profit!J!! Outline/Agenda ; •  Intr...
pdf
Feds and 0Days: From Before Heartbleed to After FBI-Apple @Jason_Healey Columbia University Today’s Talk 1. How does US government decide to retain or disclose 0days vulnerabilities? 2. How many 0days does the US government keep to itself every year? – Hundreds? Thousands? More? Less? 3. How big is the full US arsen...
pdf
Christopher  Pogue  is  the  Managing  Consultant  of  the  SpiderLabs  Incident  Response and  Digital  Forensics  team.  Having  served  as  a  US  Army  Signal  Corps  Warrant  Officer, he  worked  on  digital  forensic  invesIgaIons  and  as  Cyber  Se...
pdf
TRACKING SPIES IN THE SKIES ABOUT THE TALK LAW ENFORCEMENT AND AERIAL SURVEILLANCE History of aerial surveillance (Sam Richards) Technology on spy planes (Jerod MacDonald-Evoy) Detecting surveillance aircraft (Jason Hernandez) HISTORY OF THE SKY SPIES Odd plane patterns noticed, WSJ, Baltimore r/conspiracy (John Wie...
pdf
FLAWFINDER(1) Flawfinder FLAWFINDER(1) NAME flawfinder − lexically find potential security flaws ("hits") in source code SYNOPSIS flawfinder [−−help|−h] [−−version] [−−listrules] [−−allowlink] [−−followdotdir] [−−nolink] [−−patch=filename|−P filename] [−−inputs|−I] [ −−minlevel=X | −m X ] [−−falsepositive|−F] [−−neverignore|−...
pdf
Tactical Exploitation ”The Other Way to Pen-Test” http://metasploit.com/confs/ H D Moore (hdm[at]metasploit.com) Valsmith (valsmith[at]metasploit.com) Last modified: 06/27/2007 Contents 1 Introduction 2 1.1 Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 Background . . . . . . . . . . . . ...
pdf
Towards an Approach for Automatically Repairing Compromised Network Systems Julian B. Grizzard, Sven Krasser, Henry L. Owen School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, Georgia 30332–0250, USA {grizzard, sven, owen}@ece.gatech.edu Gregory J. Conti, Eric R. Dodson College of Com...
pdf
Unraveling SCADA Protocols: Using Sulley Fuzzer - Ganesh Devarajan 2 Agenda Introduction to SCADA networks Overview SCADA Protocols Modbus DNP3 ICCP UCA 2.0 and IEC 61850 Standards SCADA Security Attack scenarios Past known attacks SCADA Fuzzer Demo Conclusion Future work 3 SCADA Definition SCADA Supervis...
pdf
技 术 标 准 研发运营一体化能力成熟度模型 第 1 部分:总体架构 The DevOps capability maturity model Part 1: General architecture (征求意见稿) 2017 年 11 月 18 日 YDB XXXXX—XXXX I 目 次 目次................................................................................... I! 前言..........................................................................
pdf
DefCon 21, Las Vegas 2013 Let’s Screw With nMap Gregory Pickett, CISSP, GCIA, GPEN Chicago, Illinois gregory.pickett@hellfiresecurity.com Hellfire Security Overview Nosey Bastards! All About Packet Normalization Working It All Out Putting It Into Practice Finishing Up Network Defenders We see scans and probes of our ne...
pdf
Module 1 A journey from high level languages, through assembly, to the running process https://github.com/hasherezade/malware_training_vol1 Running executables: process Process: basics Process • When we run an EXE file, the system creates a Process Process • A process is a container for all the resources that the appl...
pdf
关于如何在kali-2019.4上安装 Venom 我尝试在最新版的kali-2019.4上面安装venom,但是安装软件依赖的时候提示超 时,无法继续安装,如下图 后面在各大安全群寻求帮助,都没有答复,而后只能向国外友人询问,他告诉我最 新版kali无法安装是因为没有安装zenity 安装 成功截图,生成exe均没有问题 安装zenity apt-get install zenity 下载源码 git clone https://github.com/r00t-3xp10it/venom.git 设定执行许可 cd venom-main sudo find ./ -name "*.sh" -exec chmod +x {} \; ...
pdf
Hacking WITH the iPod Touch Thomas Wilhelm a.k.a. Hacker Junkie 1 Personal Experience Penetration Tester / Project Manager Fortune 20 Company Internal and External System Network Architectures Certifications: ISSMP, CISSP, SCSECA, SCNA, SCSA, NSA-IEM, NSA-IAM 2 Personal Experience Associate Professor Colorado Technical...
pdf
RESEARCH ON THE MACHINES HELP THE FTC PROTECT PRIVACY AND SECURITY Humans User: Terrell McSweeny Function: Commissioner, FTC @TMcSweenyFTC User: Lorrie Cranor Function: Chief Technologist, FTC @lorrietweet Machines Speech Schematics Privacy & Security Protections Now Issues of the Day We Need Your Hel...
pdf
DEFCON XVII July 31-Aug 2, 2009 Las Vegas, Nevada Screen Scraper Tricks: Difficult cases mike@schrenk.com Agenda TODAY'S AGENDA DEFCON XVII July 31-Aug 2, 2009 Las Vegas, Nevada Screen Scraper Tricks: Difficult cases mike@schrenk.com Agenda TODAY'S AGENDA Review Basic Review Basic ...
pdf
! " #$ % &''& ( #) * + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * &,) &''& * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * ( - + * * * * * * * * * * * * * * * * * * *...
pdf
Momigari 最新的Windows操作系统内核在野漏洞概述 Boris Larin @oct0xor 30-May-19 Anton Ivanov @antonivanovm 讲师介绍 高级恶意软件分析师(启发式检测和漏洞研究团队) Boris Larin 高级威胁研究和检测团队负责人 Anton Ivanov Twitter: @oct0xor Twitter: @antonivanovm 3 内容梗概 Momigari: 日本人在秋天寻找最美 丽的树叶的传统 中国东北 吉林省 蛟河市. [新华社图片] http://en.safea.gov.cn/2017-10/26/content_33734832_2.htm 4 内容...
pdf
MouseJack: Injecting Keystrokes into Wireless Mice Marc Newlin | marc@bastille.net | @marcnewlin Marc Newlin Security Researcher @ Bastille Networks ((Mouse|Key)Jack|KeySniffer) ● Wireless mice and keyboards ○ 16 vendors ○ proprietary protocols (non-Bluetooth) ○ 4 families of transceivers ● 16 vulnerabilities ○ keys...
pdf
{ GOD MODE unlocked: Hardware backdoors in x86 CPUs domas / @xoreaxeaxeax / DEF CON 2018  Christopher Domas  Cyber Security Researcher ./bio disclaimer: The research presented herein was conducted and completed as an independent consultant. None of the research presented herein was conducted under the auspices of ...
pdf
From ROOT to SPECIAL PWNING IBM Mainframes Soldier of Fortran @mainframed767 DISCLAIMER! All research was done under personal time. I am not here in the name of, or on behalf of, my employer. Any views expressed in this talk are my own and not those of my employer. This talk discusses work performed in...
pdf
PISE: Protocol Inference using Symbolic Execution and Automata Learning Ron Marcovich, Orna Grumberg, and Gabi Nakibly Computer Science Department, Technion, Haifa, Israel {ron.mar,orna,gnakibly}@cs.technion.ac.il Abstract. Protocol Inference is the process of gaining information about a protocol from a binary code tha...
pdf
Kenny @ Chroot.org Operation GG (Good Game) 台灣最熱⾨門網遊安裝檔 驚⾒見APT後⾨門 •  Introduction 玩家⾓角度 (Kenny) –  如何發現 / 偵測? –  Event TimeLine •  Operation Winnti (Kaspersky 報告) (GD) •  Operation Old Cooper 通報+追查(PK) •  Unplugging PlugX 清除 (Trend Micro) I am just a Player. 線上遊戲代理商,以串連世界玩家⼀一同遊戲為主要事業。 在東南亞和台灣創造了最⼤大的線上遊戲平台。 ...
pdf
The Declaration of Hacker ( TDOH ) LegBone(腿骨) & Singo 為甚麼要講這個議程… 腿骨說…搞了這麼多年的bypass,不來Hitcon 講一場 會很 “幹” About Me Singo (TDOH中區召集人) 臺灣科技大學 資訊管理系 TDOH 2015 淺談逆向Android手遊 TDOH 2014 XSS新手初探之WorkShop TDOH 2013 資安基礎入門 Sitcon 2015 第一次查課程評價就上手(網路爬蟲) About TDOH 組織宗旨: 1. 培育更多資安人才 2. 推廣資安,改變大眾對駭客的刻板映像 3. 讓駭客們不再孤單,舉辦各種活動、聚會、網路論壇 4...
pdf
Teaching Hacking at College Sam Bowne Computer Networking and Information Technology City College San Francisco New Class at CCSF Hacking is Built into Our Program Why Teach Hacking? • Lectures aren't enough • Students need hands-on labs • Practice attack and defense • Hacking is new and exciting • Even professional ne...
pdf
SECURITY PAPER Preparation Date: 11 Dec 2016 Art of Anti Detection – 1 Introduction to AV & Detection Techniques Prepared by: Ege BALCI Penetration Tester ege.balci<at>invictuseurope.com INVICTUS 2 Security TABLE OF CONTENT 1. Abstract:.......................................................................................
pdf
A Survey and Examination of the Adequacy of the Laws Related to Cyber Warfare DONDI S. WEST* This paper argues that the current rules of war can address the emerging issues raised by cyber warfare. The author begins by giving a survey of the laws that have the biggest impact on cyber warfare. Next, the author di...
pdf
You Cannot See Me unohope [at] chroot.org 講師簡介 講師簡介 講師簡介 講師簡介 Unohope (unohope [at] chroot.org) 研究方向 研究方向 研究方向 研究方向 Web Application Security Network Security Network Security Multimedia Security 相關經歷 相關經歷 相關經歷 相關經歷 經歷 Hacks In Taiwan Conference 2005 Speaker 經歷 Hacks In Taiwan Conference 2006~2008 Wargame Design...
pdf
DefCon 23, Las Vegas 2015 Staying Persistent in Software Defined Networks Gregory Pickett, CISSP, GCIA, GPEN Chicago, Illinois gregory.pickett@hellfiresecurity.com Hellfire Security Overview White Box Ethernet Stupid Is As Stupid Does! Exploiting it! Moving Forward Wrapping Up What Is It? Standard Hardware (“Blank” Sl...
pdf
简单过了下Dubbo的漏洞 开⼯第⼀个想到的就是陈师傅的星球(漏洞百出),Dubbo最近出了⼏个漏洞,历史漏洞我也没 看过,这⾥就简单看下。 Apache Dubbo 是⼀款⾼性能、轻量级的开源Java RPC框架,它提供了三⼤核⼼能⼒:⾯向接 ⼝的远程⽅法调⽤,智能容错和负载均衡,以及服务⾃动注册和发现。dubbo ⽀持多种序列化 ⽅式并且序列化是和协议相对应的。⽐如:Dubbo⽀持dubbo、rmi、hessian、http、 webservice、thrift、redis等多种协议。 Dubbo和序列化关系 参考⾃https://www.anquanke.com/post/id/209251#h3-7 1. Dubbo 从⼤...
pdf
Last mile authentication problem Exploiting the missing link in end-to-end secure communication Our team Thanh Bui Doctoral Candidate Aalto University Finland Sid Rao Doctoral Candidate Aalto University Finland Dr. Markku Antikainen Post-doc researcher University of Helsinki Finland Prof. Tuomas Aura Professor Aalto...
pdf
RE-TARGETABLE GRAMMAR BASED TEST CASE GENERATION JOE ROZNER / @JROZNER TESTING PARSERS IS HARD 2 HOW WE GOT HERE ▸ Mostly black box (ish) implementation of complex languages (context-free-ish) ▸ ~35k lines of grammar in total (ANTLR) ▸ Implemented from incomplete, inaccurate, and contradictory documentation ▸ Radi...
pdf
Binary Obfuscation from the Top Down How to make your compiler do your dirty work. Binary Obfuscation Why Top Down? • Assembly, while “simple,” is tedious. • It’s easier for us to write higher-level code. • Some of us. • Why do it by hand when you can be lazy? Binary Obfuscation What’s the purpose of obfuscation? • To...
pdf
YOU'D BETTER SECURE YOUR YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK BLE DEVICES OR WE'LL KICK YOUR BUTTS ! YOUR BUTTS ! @virtualabs | DEFCON 26 WHO AM I ? WHO AM I ?   Head of R&D @ Econocom Digital Security   Studying Bluetooth Low Energy for 3 years   Developer & maintainer of BtleJuice   Having fun with Nord...
pdf
1 OLONLTLW-奇葩的Resin ⼀、前⾔ ⼆、从其他两个tips说起 N./test%OL/test.jsp O./test/#/../test.jsp 三、其他⼀些tips N.对/test$$/test.jsp进⾏fuzz O.对/test/test.jsp$$进⾏fuzz P.对/test/§§/test.jsp进⾏fuzz 记录今天在做JavaWeb的权限绕过总结时发现Resin的⼀些tips。 ⼀个是某微oa:/services%20/WorkflowServiceXml ⼀个是rr在知识星球发的⼀个tips关于#来绕nginx的403 测试发现tomcat这两个tips都不能⽤,⽽某微使⽤的Resin,于是搭了个...
pdf
Who am I ? Scope of this presentation  We present a new class of vulnerabilities,  Affecting multiple pre-boot authentication software under x86 and x64 architectures,  Exploitable without physical access. Limitations : we will focus on password based authentication solely. Contents  (Technically) defining pre-bo...
pdf
ANATOMY OF A PEN TEST Understanding the [ Mindset | Toolset ] of Penetration Testers ANATOMY OF A PEN TEST Poppin’ Boxes Like a Pro • Handle == [ PushPin | Revolver ] ! • DEF CON Attendee - DC15 - Present1! • U.S. Department of Energy Contractor - A few years3! • Co authored “The Hacker's Guide to OS X” - Kinda neat! •...
pdf
HTTPS://WWW.ISECPARTNERS.COM 1/6 ELECTROMECHANICAL PIN CRACKING IMPLEMENTATION AND PRACTICALITY Justin Engler – jengler[at]isecpartners[dot]com Paul Vines – pvines[at]isecpartners[dot]com iSEC Partners, Inc. 123 Mission Street, Suite 1020 San Francisco, Ca 94105 https://www.isecpartners.com July 8, 2013 Abst...
pdf
网络空间安全技术丛书 企业安全建设指南:金融行业安全架构与技术实践 聂君 李燕 何扬军 编著 ISBN:978-7-111-62203-1 本书纸版由机械工业出版社于2019年出版,电子版由华章分社(北京华章图文信息有限公司,北京奥维 博世图书发行有限公司)全球范围内制作与发行。 版权所有,侵权必究 客服热线:+ 86-10-68995265 客服信箱:service@bbbvip.com 官方网址:www.hzmedia.com.cn 新浪微博 @华章数媒 微信公众号 华章电子书(微信号:hzebook) 目录 对本书的赞誉 序一 序二 序三 前言 第一部分 安全架构 第1章 企业信息安全建设简介 1.1 安全的本质 1.2 安全...
pdf
Oracle WebLogic CVE-2022-21350 漏洞分析 漏洞简述 这是⼀个反序列化漏洞,是⼀条新的gadget,在低版本的JDK中可能会造成RCE⻛险。 漏洞分析 测试环境weblogic14c版本,测试JDK 1.8版本。 ⾸先会调⽤BadAttributeValueExpException.readObject⽅法 接着会调⽤SessionData.toString⽅法 接着会调⽤SessionData.isDebuggingSession⽅法 接着会调⽤SessionData.getAttribute⽅法 接着会调⽤SessionData.getAttributeInternal⽅法 接着会调⽤Attribut...
pdf
PWNHUB CTF WriteUp By Nu1L PWNHUB CTF WriteUp By Nu1L Pwn ezrop Reverse brain letsgo Crypto rootRSA ezRSA ezmat Web EzPDFParser264 easyCMS baby_flask Misc 眼神得好 被偷的flag Game 是兄弟就来砍我 初⼊⻔径 擂台决⽃ Other 签到 MEDIUMBLACKOCR WORDS_CHECK Ppc BABY LINE HILBERT Pwn ezrop close(1) close(2) close(3) 发现有⼀条gadget是add dword ptr [ebp-0x3...
pdf
ElcomSoft.com ElcomSoft.com © 2017 Vladimir Katalov ElcomSoft Co.Ltd. Moscow, Russia Breaking)into)the)iCloud)Keychain ElcomSoft.com Page 2 [Some)of])our)customers ElcomSoft.com Page 3 What)do)we)want)to)hack)today? 1.All)user’s)passwords 2.Credit)card)data ElcomSoft.com Page 4 What’s)inside)the)smartphone? (tip:&almos...
pdf
See no evil, hear no evil Hacking invisibly and silently with light and sound www.pwc.co.uk July 2017 Matt Wixey – PwC UK PwC Intro • Matt Wixey • Lead the research function on PwC’s UK pentesting team • Run The Dark Art Lab research blog • Previously worked in LEA, leading R&D team PwC Agenda • Part I: Jumping air-gap...
pdf
MITM ALL THE IPv6 THINGS! Scott Behrens & Brent Bandelgar DEF CON 21 August 2, 2013 Neohapsis Confidential 2 Who are we? Brent Bandelgar  Security Consultant at Neohapsis Scott Behrens  Senior Security Consultant at Neohapsis  Adjunct Professor at DePaul University Nathaniel Couper-Noles  Principa...
pdf
Beat the Casinos At Their Own Game DEFCON XI Presented By : Paranoid Android Paranoid-Android@hushmail.com Introduction • Who Am I? – Atlantic City Experience – Las Vegas Experience • Disclaimer – You are not a ready! – Am I teaching you anything illegal? • Why Do This? – Money? – Excitement? – New Job? Casino Games •...
pdf
RADAR JAMMING IS LEGAL IN THESE STATES Bill Swearingen / @hevnsnt Legend: RED ILLEGAL GREEN LEGAL WARNING THIS TALK IS ONLY LEGAL IN THE FOLLOWING STATES Legend: RED ILLEGAL GREEN LEGAL WARNING THIS TALK IS ONLY LEGAL IN THE FOLLOWING STATES This talk is rated R for: Super Good Ideas Marginal Advice Offensive...
pdf
Hacking the Supply Chain The Ripple20 Vulnerabilities Haunt Hundreds of Millions of Critical Devices DEF CON 28 Safe Mode 1 Who are we? 2 JSOF is a software security consultancy • Shlomi Oberman, co-founder, JSOF • Moshe Kol, Security researcher, JSOF; Finder of Ripple20 • Ariel Schön, Security researcher, J...
pdf
1 1 2 2 3 3 4 4 D D C C B B A A 30V TVS1 SMAJ30A GND RAW GND Power Protection 4 1, 2, 3 5, 6, 7, 8 Q1 IRF9388 12V0 5V Switching Regulator 5V0 12V0 GND Cer./Tant. 10V/16V C2 10uF GND GND 2A Hold 4A Trip PTC1 LittleFuse 2920L200/24 D1 R1 330 GND 5V0 Power LED GND GND GND 5V0 GND GND GND 5V0 Beagle Bone Connections 3V3 3V...
pdf
INJECTING ELECTROMAGNETIC PULSE INTO DIGITAL DEVICES • HISTORY OF EMP • STARFISH • MARX GENERATOR • PULSE PARAMETERS • DUMP DEVICES • SMART DEVICES • BYZANTINE FAULTS • SCADA • HOSPITALS • EMP IS MICROPROCESSOR AND OS • INDEPDENTENT • GREEN REVOLUTION • FLY BY WIRE • TWA 800 • EMP DEVICE IN A CAMERA • ½*C*V*V = POWE...
pdf
一个简单的调用例子 注意: 不要启动多个ksubdomain,ksubdomain启动一个就可以发挥最大作用。 可以看到调用很简单,就是填写 options 参数,然后调用runner启动就好了,重要的是options填什 么。 options的参数结构 package main import ( "context" "github.com/boy-hack/ksubdomain/core/gologger" "github.com/boy-hack/ksubdomain/core/options" "github.com/boy-hack/ksubdomain/runner" "github...
pdf
Linux-Stack Based V2X Framework: All You Need to Hack Connected Vehicles Duncan Woodbury, Nicholas Haltmeyer {p3n3troot0r@protonmail.com, ginsback@protonmail.com} July 29, 2017 p3n3troot0r, ginsback DEFCON V2X July 29, 2017 1 / 38 State of the World: (Semi)Autonomous Driving Technologies Vehicular automation widespread...
pdf
SECURITY 1 Rate-limiting State The edge of the Internet is an unruly place Paul Vixie, Farsight Security By design, the Internet core is stupid, and the edge is smart. This design decision has enabled the Internet’s wildcat growth, since without complexity the core can grow at the speed of demand. On the downside, th...
pdf
Web
Privacy
and
 Adobe
Local
Shared
Objects
 (and
other
things
you
should
know)
 Clinton
Wong
 clinton.defcon@gmail.com
 Defcon
16,
August
2008
 These
slides
are
obsolete
 •  This
is
the
presentaKon
included
on
the
 Defcon
16
CD.
 •  Check
the
Defcon
web
site
for
the
latest
 version
of
this
talk.
 This
Talk
Isn’t
About...
pdf
Slide 1 Note: The following slides (and speaker notes) are in draft format. Final presentation slides will be made available after both BlackHat and DEF CON. The most significant changes will be in the Machine Learning section. This deck includes results based on Nearest Neighbour (Weka’s NNge algorithm). The fi...
pdf
SECURITY PAPER Preparation Date: 11 Dec 2016 Art of Anti Detection – 2 PE Backdoor Manufacturing Prepared by: Ege BALCI Penetration Tester ege.balci<at>invictuseurope.com INVICTUS 2 Security Paper TABLE OF CONTENT 1. Abstract:.................................................................................................
pdf
Mac OS X Server Java Application Server Administration For Version 10.3 or Later Mac OS X Server Java Application Server Administration For Version 10.3 or Later January 22, 2004  Apple Computer, Inc. © 2003 Apple Computer, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retri...
pdf
1 tabby分析 tabby是做成⼀个springboot项⽬启动,为什么这么做,暂时不清楚(后⾯清楚了,⽅便数据库操作) App.class#run() 流程如下,判断是否是jdk8,然后加载settings配置,然后设置配置,解析配 置,最后基于配置运⾏分析 2 配置⽂件如下 配置分析 3 简单解释下参数 tabby.build.target: 要分析的⽬标,可以是⼀个⽬录,也可以是⼀个jar包。 tabby.build.isJDKProcess: 将jre中的三个jar包也加⼊到target进⾏分析, "lib/rt.jar","lib/jc e.jar","lib/ext/nashorn.jar" tab...
pdf
Information Visualization Survey http://www.cs.umd.edu/class/spring2001/cmsc838b/presentations/Beth_Weinstein/apt.ppt http://portal.acm.org/citation.cfm?id=260433&dl=ACM&coll=portal http://www.ee.ic.ac.uk/research/information/www/Bobs.html http://www.nickerson.to/visprog/ch7/IMG00049.GIF http://www.ee.ic.ac.uk/research...
pdf
#BHUSA @BlackHatEvents ELF Section Docking Revisiting Stageless Payload Delivery Dimitry Snezhkov, X-Force, IBM Corporation #BHUSA @BlackHatEvents Information Classification: General Who -m Dimitry Snezhkov, X-Force, IBM Corporation • Research (Offense / Defense) • Tooling Support #BHUSA @BlackHatEvents Information Cl...
pdf