text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
The$Open$Crypto$Audit$Project:$
Our$Story6
Kenneth White & Matthew Green
DEF CON 22 | 2014.08.08
Open$Crypto$Audit$Project6
Everyone has a story. This is ours.
DEF CON 22 | 2014.08.08
Agenda6
• First Principles
• Post-Snowden Era
• The TrueCrypt Story
• Open Crypto Audit Project
• Secure Coding & Trust
• ... | pdf |
From “One Country - One Floppy” to “Startup Nation”
The story of the early days of the Israeli hacking community
© PerimeterX 2016
2
Israeli Tech Leaders: Let’s see how it all started
Hacking
Cracking
Phreaking
Carding
90’s Terminology
The BBS Scene
The BBS Scene
The BBS Scene
BBS Mischief
The Story of the Ethics Group... | pdf |
1
Resin<=Q.L.TS⽂件读取
⼏个⽉前发现的洞直接fuzz到的p0desta师傅挺早就发现了,官⽅在去年12⽉8号修复了这个漏洞。
https://caucho.com/products/resin/download
此漏洞泛微不可⽤因为泛微的安全过滤器不允许URL出现分号。
看过resin代码的都知道他在下⾯这个地⽅匹配 Servlet
com.caucho.server.dispatch.ServletMapper#mapServlet
默认存在 resin-file 和 resin-jsp
当所有 Servlet 都匹配不到的时候就会⾛ resin-file
⾸先看读取jsp⽂件内容 ... | pdf |
•
•
•
•
•
•
•
PythonConsole.cmd
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
• | pdf |
记一次受限制的文件下载
其实这个操作比较简陋主要是减少了很多其他功夫
首先在 app 中发现这个功能
可以下载合同信息,里边有很多敏感信息等 且可以下载导出的
点击下载 然后分享一下
手机登录
qq
然后就可以分享到 qq 好友
就可以查看文件了
就能获取到这个合同的详细信息了
这里有一个点
有几个数据包 是能看到
合同 的内容 ,合同的下载地址两个信息
这里的 frameurl 需要留意一下
但是 有签名校验 ,无法越权等操作(这里的签名之前绕过所以加了两层 不太好去跟 也是
后边直接 hook 的原因)
其中发现有一个数据包泄露了合同地址
于是直接 curl 下载一下看看
发现无响应
然后我解析了一下域名发现
这时候在考虑它是怎... | pdf |
Popping a Smart Gun
DEF CON 25
plore@tuta.io
What is a smart gun?
Skyfall
Why I care
Armatix iP1: watch and pistol
Normal operation
25 cm
Here’s a
token
Hey!
*squeeze*
1
2
“Good,
now I can
fire”
3
4
(Demo of normal operation)
Motivation: a good challenge
Forum post on Armatix iP1 review, November ... | pdf |
Nicholas J. Percoco
Jibran Ilyas
Trustwave’s SpiderLabs
Agenda
• About Us
• How did we get the malware?
• Analysis Outline
• Sample A – Casino Club in Las Vegas
• Sample B – Hotel in New York
• Sample C – Video Poker in Lake Tahoe
• Sample D – Restaurant in Michigan
• Conclusions
• Tools We Like
... | pdf |
New Phishing Attacks Exploiting OAuth
Authorization Flows
August 7, 2021
Jenko Hwong
jhwong@netskope.com
@jenkohwong
$ az ad signed-in-user show
[
{
"jobTitle": "Researcher",
"department": "Threat Research Labs",
"company": "Netskope, Inc.",
"email": "jhwong@netskope.com"
"twitter": ... | pdf |
Feline Entropy Project
Defcon XV
Nick Kryptr
nkryptr@classful.net
What this is NOT:
A discussion of political reality:
-Any eg. Trusted Computing Initiative will necessarily involve key
escrow or similar sophomoric attempt to subvert user security and
privacy.
-That a large telco recently admitted to transporting
wh... | pdf |
Beacon Object Files
A Beacon Object File (BOF) is a compiled C program, written to a convention
that allows it to execute within a Beacon process and use internal Beacon
APIs. BOFs are a way to rapidly extend the Beacon agent with new post-
exploitation features.
信标对象文件(BOF)是一个已编译的 C 程序,按照约定编写,使它可以在信
标进程中执行并使用内部信标 ... | pdf |
Weaponizing data science for social engineering:
Automated E2E spear phishing on Twitter
John Seymour and Philip Tully
{jseymour, ptully}@zerofox.com
Introduction and Abstract
Historically, machine learning for information security has prioritized defense: think intrusion
detection systems, malware classificatio... | pdf |
PentesterAcademy.co
m/
©PentesterAcademy.com
VoIPShark:+Open+Source+VoIP+Analysis+
Platform+
Nishant/Sharma/
Jeswin+Mathai+
Ashish+Bhangale+
PentesterAcademy.com+&+AttackDefense.com+
PentesterAcademy.co
m/
©PentesterAcademy.com
PentesterAcademy.co
m/
About+Us+
Me,/Nishant/Sharma/
• R&D+Manager+and+Lead+Trainer,+Pent... | pdf |
SP 0:00:00
PLAY
Whitney B. Merrill
Attorney & Hacker
@wbm312
Tech & the FTC
Terrell McSweeny
Commissioner
Federal Trade Commission
@TMcSweenyFTC
DISCLOSURE
The views expressed do not
necessarily reflect the views of the
Commission or any individual
Commissioner.
-- MENU --
WHAT IS THE FTC
LOOKING BACK
T... | pdf |
Raspberry MoCA: an Automated Penetration
Platform
Andrew Hunt
Volgeneau School of Engineering, George Mason University
Fairfax, VA
ahunt5@masonlive.gmu.edu
Abstract— Media Over Coaxial Alliance (MoCA) is a protocol
encapsulating Ethernet protocols over coaxial cabling common to
interior
television
wiring. Pre... | pdf |
www.senseofsecurity.com.au
© Sense of Security 2015
Page 1 – 8 August 2015
Compliance, Protection & Business Confidence
Sense of Security Pty Ltd
Sydney
Level 8, 66 King Street
Sydney NSW 2000
Australia
Melbourne
Level 10, 401 Docklands Drv
Docklands VIC 3008
Australia
T: 1300 922 923
T: +61 (0) 2 ... | pdf |
Building a Real Session Layer
These slides are unfortunately, of little use.
Please see updated materials at fived.capelis.dj.
Please allow me to introduce myself
I'm me.
There.
Introduction Done!
Let's start at the beginning
(Everyone knows this part... but just let me quickly go through it.)
What's a Session Layer?
I... | pdf |
Cheating in eSports
How to cheat at virtual cycling using USB hacks
Brad Dixon, Carve Systems
Photo by Markus Spiske on Unsplash
Sweaty eSports
EGVsOG
CVRWorldCup
Virtual Cycling is Part of Cycling
Cycling: Over 100 Years of Cheating Innovation
1903, 1904: Hippolyte Aucouturier
1904: Maurice Garin
1947: Jean Robic
Will... | pdf |
用Golang编写 dll劫持的一些坑 (2)
源于知识星球的一个想法,利用一些已知的dll劫持的程序作为"模板",自动生成白加黑的程序。
我想用Golang编写劫持的dll,这样也方便可以做成在线平台。
当然dll加载模式不同劫持的方式也不同。
我找到是vscode它的更新程序,也有它官方的签名
看 inno_updater.exe 的导入表,我只用实现它的5个函数就可以了。
因为我想做成通用型的,对于这种输入表导入的dll做劫持,只需要在 DllMain 中获取主程序的入口点,
然后将shellcode写入入口点,之后主程序运行就会执行我们的shellcode了。
C代码如下
测试过是能够正常使用的。
但是把它转成Go的过程中,... | pdf |
LEARN HOW TO CONTROL EVERY ROOM AT A
LUXURY HOTEL REMOTELY: THE DANGERS OF
INSECURE HOME AUTOMATION DEPLOYMENT
Jesus Molina
@verifythentrust
security@nomeames.com
HACKING IN MOVIES
The Italian Job
• Seth Green takes control of all
kind of public transit so the
mini-coopers can run free
• “all I did was come... | pdf |
Unboxing Android
Everything you wanted to know about Android packers
Slava Makkaveev
Avi Bashan
Who Are We?
@Avi
Founder at myDRO, former Mobile R&D Team Leader at
Check Point, security researcher at Lacoon Mobile Security.
Experienced in OS Internal research, mobile security,
Linux kernel.
@Slava
Senior Security Re... | pdf |
渗 透 测试 之信 息搜 集 的 研 究 与 漏 洞 防 范
张 明 航
张卷美
(北京 电 子科 技学院
北京
1 0 00 70 )
( 1 54 01 01 62 3@ q q.
com )
R e search
and
Vu lnerab i l i ty
Preven tion
of
In forma t ion
Gat herin g
in
P en et rat ion
Test
Zha ng
M ing du o
a n d
Zhan g
J u anm ei
(Beij ing
Electron i c
S cienc... | pdf |
1
Tomcat中的appBase
第⼀次看⻅有关tomcat appBase是在漏洞百出-⼏个Jolokia RCE的“新”利⽤⽅式⼀⽂中
该⽂后续就展示出了可以直接在新建的vhost中访问/etc/paasswd等⽂件资源,已经跳出
TOCMAT/webapps的限制,并且在其他漏洞中也⻅到了对appBase这⼀属性的利⽤,当时⼼中就有⼀
些疑问:为什么appBase这⼀属性就可以控制TOMCAT相关资源位置,⼜是什么机制让其实时⽣效
现在就在此⽂中尝试从代码的⻆度简单描述原理、过程
tomcat分析版本:10.0.18
⾸先寻找appBase从何⽽来
简单看到field的描述如下
简单排查appBase的引⽤,最重... | pdf |
http://www.sincuser.f9.co.uk/035/htsquad.htm
“How to channel your inner Henry Rollins”
By Jayson E. Street
https://www.defcon.org
/html/links/dc-
speakerscorner.html
#wiseman-street
“I care less if I can't be part of your scene because I am
the scene. I am ... | pdf |
Breaking Secure Bootloaders
Talk Outline
Smartphones often use signature verification to protect their firmware
This is implemented in bootloaders, which can also provide facilities for firmware updates
Weaknesses in these update protocols can be exploited to bypass signature protections
The core SoC and peripheral chi... | pdf |
1
amazon-redshift-jdbc-driver RCE(CVE-OLOO-
QNWOW)
漏洞分析
漏洞复现
漏洞修复
这个漏洞与之前的 pgsql JDBC 漏洞(CVE-2022-21724)是师出同⻔。
漏洞详细:https://github.com/aws/amazon-redshift-jdbc-driver/security/advisories/GHSA-jc69-
hjw2-fm86
DriverManager 类建⽴ JDBC 的连接代码如下
调⽤栈
漏洞分析
package org.example;
import java.sql.DriverManager;
import java.sql.S... | pdf |
Ashley X Belinda
Let’s Play Hide and Seek
In the Cloud
The APT Malwares Favored in Cloud Service
HITCON 2015 Let’s Play Hide and Seek in the Cloud
• Speakers
• APT vs Cloud Service
• Hide and Seek in SaaS
–
Redirect
–
Storage
–
Control Channel
• Wh... | pdf |
针对域证书服务的攻击(1)- ESC1
0x00 前言
关于域证书服务攻击的白皮书出来大半个月了 https://www.specterops.io/assets/resources/Certified_
Pre-Owned.pdf,下文以白皮书代指。作者也在BH21后放出了利用工具。在前期大家的主要关注点都集
中在NTLM relay ad cs HTTP来获取域控权限的ESC8上。其实白皮书中关于攻击项的技术有19个,我计
划边学边写。这个过程中难免出错,望指正。
昨天我把域环境搭建好,同时也在其中一台服务器上开启了AD CS服务,打算试试Certify和ForgeCert工
具。在测试Certify工具的时候,看到github... | pdf |
ruoyi rce
payload snake yaml ssti yaml
emmmmmm ssti jar
Spring Thymeleaf
@Controller
public class SstiController {
@RequestMapping("/ssti")
public String ssti(@RequestParam String payload) {
return payload;
}
}
@Controller String thymeleaf
SSTI
@Controller
public class SstiControll... | pdf |
& Privileged&Confidential
01
•
• 82
5 Privileged&Confidential
5 Privileged&Confidential
0
& 2
Privileged&Confidential
Privileged&Confidential
&
01
T Privileged&Confidential
T Privileged&Confidential
•
O% & S1
S&
•
05
R1
•
0pC
1P
4Op
•
t4aC81
Privileged&Confidential
Privileged&Confidential
&
02
Privileged&Confide... | pdf |
Pwning "the toughest target":
the exploit chain of winning the largest
bug bounty in the history of ASR program
Jianjun Dai Guang Gong Wenlin Yang
#whoami
•
Guang Gong
• Senior Security Researcher and Team Leader of 360 Alpha Team
• Android/Chrome CVE hunter
• Speaker at Black Hat,... | pdf |
Frontrunning the Frontrunners
D r . P a u l V i x i e , C E O F a r s i g h t
S e c u r i t y , I n c .
© Copyright 2016 Farsight Security, Inc.
All Right Reserved.
Introduction
Frontrunners Exploit Non-Public Information
To Register Domain Names For Profit
• "This Advisory considers the opportunity for a party wi... | pdf |
Spring 四天学习总结
⼀、Spring概述
Spring 是分层的 Java SE/EE 应⽤ full-stack 轻量级开源框架,以 IoC(Inverse Of Control:
反转控制)和 AOP(Aspect Oriented Programming:⾯向切⾯编程)为内核,提供了展现层
Spring MVC 和持久层 Spring JDBC 以及业务层事务管理等众多的企业级应⽤技术,还能整合
开源世界众多 著名的第三⽅框架和类库,逐渐成为使⽤最多的 Java EE 企业应⽤开源框架。
主要特点如下:
①轻量级IoC容器。IoC容器是⽤于管理所有bean的声明周期,是Spring的核⼼组件。在此基础
之上,开发者... | pdf |
IOActive, Inc. Copyright ©2015. All Rights Reserved.
Abusing XSLT for Practical
Attacks
Fernando Arnaboldi
Senior Security Consultant
IOActive, Inc. Copyright ©2015. All Rights Reserved.
Why XSLT ?
IOActive, Inc. Copyright ©2015. All Rights Reserved.
Why XSLT ?
•
XML vulnerabilities are fun. They may get yo... | pdf |
Fuzzing AOSP
for non-crash bugs
Elphet & Guang Gong
@360 Alpha Team
About us
●Elphet
○Security Researcher (Intern) of 360 Alpha Team
○Focus on Android system and application security
●Guang Gong
○Senior Security Researcher and Team Leader of 360 Alpha Team
○Focus on Android/Chrome
Introduction
• Fuzzers catch memo... | pdf |
RCTF2020-WP
Author:Nu1L Team
RCTF2020-WP
RE
My Switch Game
play_the _game
go-flag
panda_trace
rust-flag
Cipher
PWN
bf
Best_php
note
golang_interface
no_write
0c
WEB
swoole
rBlog 2020
EasyBlog
Calc
MISC
Welcome to the RCTF 2020
mysql_interface
Switch PRO Controller
bean
FeedBack
Crypto
easy_f(x)
BlockChain
roiscoin
RE
M... | pdf |
Alberto Garcia Illera
(@algillera)
Javier Vazquez Vidal
(@bi0h4z4rd_)
Javier Vázquez Vidal
• Hardware security specialist
• Loves breaking “toys” security
• Freelance
• From Cádiz
Alberto García Illera
Index
• Hacking of the ECU
• Do a forensic job after a car crash
Why did this happen?
• A friend kept bu... | pdf |
Text
腳本小子的告白 -硬碟的秘密大公開
Confessionsofscriptkiddie-HardDriveSecretLetOut
Who Am I?
thx
OSSLab 成⽴立者
練過神功 所以只會硬不太
會軟
我是怎樣開始踏上研究
DIY 萬歲!
這就是資料恢復真實成本
要找到⼀一樣相容硬碟 ⼜又不保證成功率
碟⽚片上有隱性刮傷
能Extract 的資料是否客⼾戶要的
設備成本 (低塵操作環境,資料恢復設備)
簡單說 有時這跟賭博⾏行業差不多
終極好⼈人技已講完收⼯工
議程三分鐘 已經講完了 ⼤大
家現在可散場好了 來這做⾏行
業賺錢.
向⽔水電⼯工學習的講師表⽰示我當然可
以超過三分鐘 這可是5... | pdf |
2008 年駭客年會徵求論文
HIT 2008 Call For Paper
u
時間:2008 年 7 月 19 日~20 日(星期六~星期日)
u
主辦單位:CHROOT – Security Research Group (http://www.chroot.org)
u
活動網址:http://hitcon.org
台灣第四屆駭客年會將於 2008 年 7 月 19~20 日(週六、日)舉行,歡迎各界人士踴躍
投稿。論文內容以探討實作技術並能演講 50 分鐘為佳。
為了讓會議主題能夠明確,我們擬定了以下議題,有興趣的朋友可以從下列議題中選
擇自己擅長的方面進行準備(包括論文、程式碼和投影片),但不以下列的議... | pdf |
Mind Games
1
Introduction to
Species, Lost in Apple-eating Time
I have to admit, I love this wee little story. It’s the best I could do
at the time, trying to express the unthinkable in words.
It was the unthinkable, I think, that I was thinking, walking
around the park near which I live in Fox Point, Wisconsin, thinki... | pdf |
Discover
Flash
Player
Zero-‐day
A4acks
In
The
Wild
From
Big
Data
Peter
Pi
@heisecode
Agenda
• Who
am
I
• Background
• Discover
flash
0-‐day
a4acks
from
big
set
samples
• Vector
Length
miGgaGon
About
me
• Security
researcher
• APT
pr... | pdf |
WHEN THE SECRETARY OF STATE SAYS:
“PLEASE STOP HACKING US…”
David An
Former U.S. Diplomat
Bureau of Political-Military Affairs
U.S. State Department
Figures: Left, historical photo of 1973 Paris Peace Accords to restore peace following the Vietnam (American) War.
Right, Reuters, May 2015, Iran negotiates with t... | pdf |
IPv6: No Longer Optional
John Curran
ARIN President & CEO
Quick History of the Internet Protocol
2
• Internet Protocol version 4 (IPv4, or just “IP”)
– First developed for the original Internet (ARPANET) in spring 1978
– Deployed globally with growth of the Internet
– Total of 4 billion IP addresses availab... | pdf |
Are all BSDs created equally?
A survey of BSD kernel vulnerabili9es.;
!
!
!
Ilja!van!Sprundel!<ivansprundel@ioac4ve.com>!
Who Am I;
• Ilja!van!Sprundel!!
• ivansprundel@ioac4ve.com!
• Director!of!Penetra4on!Tes4ng!at!IOAc4ve!!
• Pen!test!
• Code!review!
• Break!stuff!for!fun!and!profit!J!!
Outline/Agenda ;
• Intr... | pdf |
Feds and 0Days:
From Before Heartbleed to After FBI-Apple
@Jason_Healey
Columbia University
Today’s Talk
1. How does US government decide to retain or
disclose 0days vulnerabilities?
2. How many 0days does the US government
keep to itself every year?
– Hundreds? Thousands? More? Less?
3. How big is the full US arsen... | pdf |
Christopher
Pogue
is
the
Managing
Consultant
of
the
SpiderLabs
Incident
Response
and
Digital
Forensics
team.
Having
served
as
a
US
Army
Signal
Corps
Warrant
Officer,
he
worked
on
digital
forensic
invesIgaIons
and
as
Cyber
Se... | pdf |
TRACKING SPIES IN THE SKIES
ABOUT THE TALK
LAW ENFORCEMENT AND AERIAL SURVEILLANCE
History of aerial surveillance (Sam Richards)
Technology on spy planes (Jerod MacDonald-Evoy)
Detecting surveillance aircraft (Jason Hernandez)
HISTORY OF THE SKY SPIES
Odd plane patterns noticed, WSJ, Baltimore
r/conspiracy (John Wie... | pdf |
FLAWFINDER(1)
Flawfinder
FLAWFINDER(1)
NAME
flawfinder − lexically find potential security flaws ("hits") in source code
SYNOPSIS
flawfinder [−−help|−h] [−−version] [−−listrules]
[−−allowlink] [−−followdotdir] [−−nolink]
[−−patch=filename|−P filename]
[−−inputs|−I] [ −−minlevel=X | −m X ] [−−falsepositive|−F]
[−−neverignore|−... | pdf |
Tactical Exploitation
”The Other Way to Pen-Test”
http://metasploit.com/confs/
H D Moore (hdm[at]metasploit.com)
Valsmith (valsmith[at]metasploit.com)
Last modified: 06/27/2007
Contents
1
Introduction
2
1.1
Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
1.2
Background . . . . . . . . . . . . ... | pdf |
Towards an Approach for Automatically Repairing
Compromised Network Systems
Julian B. Grizzard, Sven Krasser, Henry L. Owen
School of Electrical and Computer Engineering
Georgia Institute of Technology
Atlanta, Georgia 30332–0250, USA
{grizzard, sven, owen}@ece.gatech.edu
Gregory J. Conti, Eric R. Dodson
College of Com... | pdf |
Unraveling SCADA Protocols:
Using Sulley Fuzzer
- Ganesh Devarajan
2
Agenda
Introduction to SCADA networks
Overview
SCADA Protocols
Modbus
DNP3
ICCP
UCA 2.0 and IEC 61850 Standards
SCADA Security
Attack scenarios
Past known attacks
SCADA Fuzzer
Demo
Conclusion
Future work
3
SCADA Definition
SCADA
Supervis... | pdf |
技
术
标
准
研发运营一体化能力成熟度模型
第 1 部分:总体架构
The DevOps capability maturity model
Part 1: General architecture
(征求意见稿)
2017 年 11 月 18 日
YDB XXXXX—XXXX
I
目 次
目次................................................................................... I!
前言.......................................................................... | pdf |
DefCon 21, Las Vegas 2013
Let’s Screw With nMap
Gregory Pickett, CISSP, GCIA, GPEN
Chicago, Illinois
gregory.pickett@hellfiresecurity.com
Hellfire Security
Overview
Nosey Bastards!
All About Packet Normalization
Working It All Out
Putting It Into Practice
Finishing Up
Network Defenders
We see scans and probes of our ne... | pdf |
Module 1
A journey from high level languages, through
assembly, to the running process
https://github.com/hasherezade/malware_training_vol1
Running executables: process
Process: basics
Process
• When we run an EXE file, the system creates a Process
Process
• A process is a container for all the resources that the appl... | pdf |
关于如何在kali-2019.4上安装
Venom
我尝试在最新版的kali-2019.4上面安装venom,但是安装软件依赖的时候提示超
时,无法继续安装,如下图
后面在各大安全群寻求帮助,都没有答复,而后只能向国外友人询问,他告诉我最
新版kali无法安装是因为没有安装zenity
安装
成功截图,生成exe均没有问题
安装zenity
apt-get install zenity
下载源码
git clone https://github.com/r00t-3xp10it/venom.git
设定执行许可
cd venom-main
sudo find ./ -name "*.sh" -exec chmod +x {} \;
... | pdf |
Hacking WITH the iPod Touch
Thomas Wilhelm
a.k.a. Hacker Junkie
1
Personal Experience
Penetration Tester / Project Manager
Fortune 20 Company
Internal and External System
Network Architectures
Certifications:
ISSMP, CISSP, SCSECA, SCNA, SCSA,
NSA-IEM, NSA-IAM
2
Personal Experience
Associate Professor
Colorado Technical... | pdf |
RESEARCH ON THE MACHINES
HELP THE FTC PROTECT PRIVACY
AND SECURITY
Humans
User: Terrell McSweeny
Function: Commissioner, FTC
@TMcSweenyFTC
User: Lorrie Cranor
Function: Chief Technologist, FTC
@lorrietweet
Machines
Speech Schematics
Privacy &
Security
Protections Now
Issues of
the Day
We Need
Your Hel... | pdf |
DEFCON XVII July 31-Aug 2, 2009
Las Vegas, Nevada
Screen Scraper Tricks: Difficult cases mike@schrenk.com
Agenda
TODAY'S
AGENDA
DEFCON XVII July 31-Aug 2, 2009
Las Vegas, Nevada
Screen Scraper Tricks: Difficult cases mike@schrenk.com
Agenda
TODAY'S
AGENDA
Review Basic
Review Basic
... | pdf |
!
" #$
%
&''&
(
#)
*
+
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
&,)
&''&
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
(
-
+
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*... | pdf |
Momigari
最新的Windows操作系统内核在野漏洞概述
Boris Larin
@oct0xor
30-May-19
Anton Ivanov
@antonivanovm
讲师介绍
高级恶意软件分析师(启发式检测和漏洞研究团队)
Boris Larin
高级威胁研究和检测团队负责人
Anton Ivanov
Twitter: @oct0xor
Twitter: @antonivanovm
3
内容梗概
Momigari: 日本人在秋天寻找最美
丽的树叶的传统
中国东北 吉林省 蛟河市. [新华社图片]
http://en.safea.gov.cn/2017-10/26/content_33734832_2.htm
4
内容... | pdf |
MouseJack: Injecting Keystrokes
into Wireless Mice
Marc Newlin | marc@bastille.net | @marcnewlin
Marc Newlin
Security Researcher @ Bastille Networks
((Mouse|Key)Jack|KeySniffer)
●
Wireless mice and keyboards
○
16 vendors
○
proprietary protocols (non-Bluetooth)
○
4 families of transceivers
●
16 vulnerabilities
○
keys... | pdf |
{
GOD MODE unlocked:
Hardware backdoors in x86 CPUs
domas / @xoreaxeaxeax / DEF CON 2018
Christopher Domas
Cyber Security Researcher
./bio
disclaimer:
The research presented herein was conducted and
completed as an independent consultant. None of
the research presented herein was conducted
under the auspices of ... | pdf |
From ROOT
to SPECIAL
PWNING IBM
Mainframes
Soldier of Fortran
@mainframed767
DISCLAIMER!
All research was done under
personal time. I am not here
in the name of, or on behalf
of, my employer.
Any views expressed in this
talk are my own and not those
of my employer.
This talk discusses work
performed in... | pdf |
PISE: Protocol Inference using Symbolic
Execution and Automata Learning
Ron Marcovich, Orna Grumberg, and Gabi Nakibly
Computer Science Department, Technion, Haifa, Israel
{ron.mar,orna,gnakibly}@cs.technion.ac.il
Abstract. Protocol Inference is the process of gaining information about
a protocol from a binary code tha... | pdf |
Kenny @ Chroot.org
Operation GG (Good Game)
台灣最熱⾨門網遊安裝檔 驚⾒見APT後⾨門
• Introduction 玩家⾓角度 (Kenny)
– 如何發現 / 偵測?
– Event TimeLine
• Operation Winnti (Kaspersky 報告) (GD)
• Operation Old Cooper 通報+追查(PK)
• Unplugging PlugX 清除 (Trend Micro)
I am just a Player.
線上遊戲代理商,以串連世界玩家⼀一同遊戲為主要事業。
在東南亞和台灣創造了最⼤大的線上遊戲平台。 ... | pdf |
The Declaration of Hacker ( TDOH )
LegBone(腿骨) & Singo
為甚麼要講這個議程…
腿骨說…搞了這麼多年的bypass,不來Hitcon 講一場 會很
“幹”
About Me
Singo (TDOH中區召集人)
臺灣科技大學 資訊管理系
TDOH 2015 淺談逆向Android手遊
TDOH 2014 XSS新手初探之WorkShop
TDOH 2013 資安基礎入門
Sitcon 2015 第一次查課程評價就上手(網路爬蟲)
About TDOH
組織宗旨:
1. 培育更多資安人才
2. 推廣資安,改變大眾對駭客的刻板映像
3. 讓駭客們不再孤單,舉辦各種活動、聚會、網路論壇
4... | pdf |
Teaching Hacking at College
Sam Bowne
Computer Networking and Information Technology
City College San Francisco
New Class at CCSF
Hacking is Built into Our Program
Why Teach Hacking?
• Lectures aren't enough
• Students need hands-on labs
• Practice attack and defense
• Hacking is new and exciting
• Even professional ne... | pdf |
SECURITY PAPER
Preparation Date: 11 Dec 2016
Art of Anti Detection – 1
Introduction to AV & Detection
Techniques
Prepared by:
Ege BALCI
Penetration Tester
ege.balci<at>invictuseurope.com
INVICTUS
2
Security
TABLE OF CONTENT
1.
Abstract:....................................................................................... | pdf |
A Survey and Examination of the Adequacy of
the Laws Related to Cyber Warfare
DONDI S. WEST*
This paper argues that the current rules of war can address the emerging issues raised by cyber
warfare. The author begins by giving a survey of the laws that have the biggest impact on cyber
warfare. Next, the author di... | pdf |
You Cannot See Me
unohope [at] chroot.org
講師簡介
講師簡介
講師簡介
講師簡介
Unohope (unohope [at] chroot.org)
研究方向
研究方向
研究方向
研究方向
Web Application Security
Network Security
Network Security
Multimedia Security
相關經歷
相關經歷
相關經歷
相關經歷
經歷 Hacks In Taiwan Conference 2005 Speaker
經歷 Hacks In Taiwan Conference 2006~2008 Wargame Design... | pdf |
DefCon 23, Las Vegas 2015
Staying Persistent in
Software Defined Networks
Gregory Pickett, CISSP, GCIA, GPEN
Chicago, Illinois
gregory.pickett@hellfiresecurity.com
Hellfire Security
Overview
White Box Ethernet
Stupid Is As Stupid Does!
Exploiting it!
Moving Forward
Wrapping Up
What Is It?
Standard Hardware (“Blank” Sl... | pdf |
简单过了下Dubbo的漏洞
开⼯第⼀个想到的就是陈师傅的星球(漏洞百出),Dubbo最近出了⼏个漏洞,历史漏洞我也没
看过,这⾥就简单看下。
Apache Dubbo 是⼀款⾼性能、轻量级的开源Java RPC框架,它提供了三⼤核⼼能⼒:⾯向接
⼝的远程⽅法调⽤,智能容错和负载均衡,以及服务⾃动注册和发现。dubbo ⽀持多种序列化
⽅式并且序列化是和协议相对应的。⽐如:Dubbo⽀持dubbo、rmi、hessian、http、
webservice、thrift、redis等多种协议。
Dubbo和序列化关系
参考⾃https://www.anquanke.com/post/id/209251#h3-7
1. Dubbo 从⼤... | pdf |
Last mile
authentication
problem
Exploiting the missing link in
end-to-end secure communication
Our team
Thanh Bui
Doctoral Candidate
Aalto University
Finland
Sid Rao
Doctoral Candidate
Aalto University
Finland
Dr. Markku Antikainen
Post-doc researcher
University of Helsinki
Finland
Prof. Tuomas Aura
Professor
Aalto... | pdf |
RE-TARGETABLE GRAMMAR BASED TEST
CASE GENERATION
JOE ROZNER / @JROZNER
TESTING PARSERS IS
HARD
2
HOW WE GOT HERE
▸ Mostly black box (ish) implementation of complex languages (context-free-ish)
▸ ~35k lines of grammar in total (ANTLR)
▸ Implemented from incomplete, inaccurate, and contradictory documentation
▸ Radi... | pdf |
Binary Obfuscation
from the Top Down
How to make your compiler do your dirty work.
Binary Obfuscation
Why Top Down?
• Assembly, while “simple,” is tedious.
• It’s easier for us to write higher-level code.
• Some of us.
• Why do it by hand when you can be lazy?
Binary Obfuscation
What’s the purpose of obfuscation?
• To... | pdf |
YOU'D BETTER SECURE YOUR
YOU'D BETTER SECURE YOUR
BLE DEVICES OR WE'LL KICK
BLE DEVICES OR WE'LL KICK
YOUR BUTTS !
YOUR BUTTS !
@virtualabs | DEFCON 26
WHO AM I ?
WHO AM I ?
Head of R&D @ Econocom Digital Security
Studying Bluetooth Low Energy for 3 years
Developer & maintainer of BtleJuice
Having fun with Nord... | pdf |
1
OLONLTLW-奇葩的Resin
⼀、前⾔
⼆、从其他两个tips说起
N./test%OL/test.jsp
O./test/#/../test.jsp
三、其他⼀些tips
N.对/test$$/test.jsp进⾏fuzz
O.对/test/test.jsp$$进⾏fuzz
P.对/test/§§/test.jsp进⾏fuzz
记录今天在做JavaWeb的权限绕过总结时发现Resin的⼀些tips。
⼀个是某微oa:/services%20/WorkflowServiceXml
⼀个是rr在知识星球发的⼀个tips关于#来绕nginx的403
测试发现tomcat这两个tips都不能⽤,⽽某微使⽤的Resin,于是搭了个... | pdf |
Who am I ?
Scope of this presentation
We present a new class of vulnerabilities,
Affecting multiple pre-boot authentication
software under x86 and x64 architectures,
Exploitable without physical access.
Limitations : we will focus on password based
authentication solely.
Contents
(Technically) defining pre-bo... | pdf |
ANATOMY OF A PEN TEST
Understanding the [ Mindset | Toolset ] of Penetration Testers
ANATOMY OF A PEN TEST
Poppin’ Boxes Like a Pro
• Handle == [ PushPin | Revolver ] !
• DEF CON Attendee - DC15 - Present1!
• U.S. Department of Energy Contractor - A few years3!
• Co authored “The Hacker's Guide to OS X” - Kinda neat!
•... | pdf |
HTTPS://WWW.ISECPARTNERS.COM
1/6
ELECTROMECHANICAL PIN CRACKING
IMPLEMENTATION AND PRACTICALITY
Justin Engler – jengler[at]isecpartners[dot]com
Paul Vines – pvines[at]isecpartners[dot]com
iSEC Partners, Inc.
123 Mission Street, Suite 1020
San Francisco, Ca 94105
https://www.isecpartners.com
July 8, 2013
Abst... | pdf |
网络空间安全技术丛书
企业安全建设指南:金融行业安全架构与技术实践
聂君 李燕 何扬军 编著
ISBN:978-7-111-62203-1
本书纸版由机械工业出版社于2019年出版,电子版由华章分社(北京华章图文信息有限公司,北京奥维
博世图书发行有限公司)全球范围内制作与发行。
版权所有,侵权必究
客服热线:+ 86-10-68995265
客服信箱:service@bbbvip.com
官方网址:www.hzmedia.com.cn
新浪微博 @华章数媒
微信公众号 华章电子书(微信号:hzebook)
目录
对本书的赞誉
序一
序二
序三
前言
第一部分 安全架构
第1章 企业信息安全建设简介
1.1 安全的本质
1.2 安全... | pdf |
Oracle WebLogic CVE-2022-21350 漏洞分析
漏洞简述
这是⼀个反序列化漏洞,是⼀条新的gadget,在低版本的JDK中可能会造成RCE⻛险。
漏洞分析
测试环境weblogic14c版本,测试JDK 1.8版本。
⾸先会调⽤BadAttributeValueExpException.readObject⽅法
接着会调⽤SessionData.toString⽅法
接着会调⽤SessionData.isDebuggingSession⽅法
接着会调⽤SessionData.getAttribute⽅法
接着会调⽤SessionData.getAttributeInternal⽅法
接着会调⽤Attribut... | pdf |
PWNHUB CTF WriteUp By Nu1L
PWNHUB CTF WriteUp By Nu1L
Pwn
ezrop
Reverse
brain
letsgo
Crypto
rootRSA
ezRSA
ezmat
Web
EzPDFParser264
easyCMS
baby_flask
Misc
眼神得好
被偷的flag
Game
是兄弟就来砍我
初⼊⻔径
擂台决⽃
Other
签到
MEDIUMBLACKOCR
WORDS_CHECK
Ppc
BABY LINE
HILBERT
Pwn
ezrop
close(1)
close(2)
close(3)
发现有⼀条gadget是add dword ptr [ebp-0x3... | pdf |
ElcomSoft.com
ElcomSoft.com
© 2017
Vladimir Katalov
ElcomSoft Co.Ltd.
Moscow, Russia
Breaking)into)the)iCloud)Keychain
ElcomSoft.com
Page 2
[Some)of])our)customers
ElcomSoft.com
Page 3
What)do)we)want)to)hack)today?
1.All)user’s)passwords
2.Credit)card)data
ElcomSoft.com
Page 4
What’s)inside)the)smartphone?
(tip:&almos... | pdf |
See no evil, hear no evil
Hacking invisibly and silently with light and sound
www.pwc.co.uk
July 2017
Matt Wixey – PwC UK
PwC
Intro
• Matt Wixey
• Lead the research function on PwC’s UK pentesting team
• Run The Dark Art Lab research blog
• Previously worked in LEA, leading R&D team
PwC
Agenda
• Part I: Jumping air-gap... | pdf |
MITM ALL THE IPv6 THINGS!
Scott Behrens & Brent Bandelgar
DEF CON 21
August 2, 2013
Neohapsis Confidential
2
Who are we?
Brent Bandelgar
Security
Consultant at
Neohapsis
Scott Behrens
Senior Security
Consultant at
Neohapsis
Adjunct Professor at
DePaul University
Nathaniel Couper-Noles
Principa... | pdf |
Beat the Casinos At
Their Own Game
DEFCON XI
Presented By : Paranoid Android
Paranoid-Android@hushmail.com
Introduction
• Who Am I?
– Atlantic City Experience
– Las Vegas Experience
• Disclaimer
– You are not a ready!
– Am I teaching you anything illegal?
• Why Do This?
– Money?
– Excitement?
– New Job?
Casino Games
•... | pdf |
RADAR JAMMING
IS LEGAL IN THESE STATES
Bill Swearingen / @hevnsnt
Legend:
RED ILLEGAL
GREEN LEGAL
WARNING
THIS TALK IS ONLY LEGAL IN THE FOLLOWING STATES
Legend:
RED ILLEGAL
GREEN LEGAL
WARNING
THIS TALK IS ONLY LEGAL IN THE FOLLOWING STATES
This talk is rated R for:
Super Good Ideas
Marginal Advice
Offensive... | pdf |
Hacking the Supply Chain
The Ripple20 Vulnerabilities Haunt Hundreds of Millions of Critical
Devices
DEF CON 28 Safe Mode
1
Who are we?
2
JSOF is a software security consultancy
• Shlomi Oberman, co-founder, JSOF
• Moshe Kol, Security researcher, JSOF; Finder of Ripple20
• Ariel Schön, Security researcher, J... | pdf |
1
1
2
2
3
3
4
4
D
D
C
C
B
B
A
A
30V
TVS1
SMAJ30A
GND
RAW
GND
Power Protection
4
1, 2, 3
5, 6, 7, 8
Q1
IRF9388
12V0
5V Switching Regulator
5V0
12V0
GND
Cer./Tant.
10V/16V
C2
10uF
GND
GND
2A Hold
4A Trip
PTC1
LittleFuse 2920L200/24
D1
R1
330
GND
5V0
Power LED
GND
GND
GND
5V0
GND
GND
GND
5V0
Beagle Bone Connections
3V3
3V... | pdf |
INJECTING
ELECTROMAGNETIC PULSE
INTO DIGITAL DEVICES
• HISTORY OF EMP
• STARFISH
• MARX GENERATOR
• PULSE PARAMETERS
• DUMP DEVICES
• SMART DEVICES
• BYZANTINE FAULTS
• SCADA
• HOSPITALS
• EMP IS MICROPROCESSOR AND OS
• INDEPDENTENT
• GREEN REVOLUTION
• FLY BY WIRE
• TWA 800
• EMP DEVICE IN A CAMERA
• ½*C*V*V = POWE... | pdf |
一个简单的调用例子
注意: 不要启动多个ksubdomain,ksubdomain启动一个就可以发挥最大作用。
可以看到调用很简单,就是填写 options 参数,然后调用runner启动就好了,重要的是options填什
么。
options的参数结构
package main
import (
"context"
"github.com/boy-hack/ksubdomain/core/gologger"
"github.com/boy-hack/ksubdomain/core/options"
"github.com/boy-hack/ksubdomain/runner"
"github... | pdf |
Linux-Stack Based V2X Framework: All You Need to
Hack Connected Vehicles
Duncan Woodbury, Nicholas Haltmeyer
{p3n3troot0r@protonmail.com, ginsback@protonmail.com}
July 29, 2017
p3n3troot0r, ginsback
DEFCON V2X
July 29, 2017
1 / 38
State of the World: (Semi)Autonomous Driving
Technologies
Vehicular automation widespread... | pdf |
SECURITY
1
Rate-limiting State
The edge of the Internet is an unruly place
Paul Vixie, Farsight Security
By design, the Internet core is stupid, and the edge is smart. This design decision has enabled the
Internet’s wildcat growth, since without complexity the core can grow at the speed of demand. On
the downside, th... | pdf |
Web
Privacy
and
Adobe
Local
Shared
Objects
(and
other
things
you
should
know)
Clinton
Wong
clinton.defcon@gmail.com
Defcon
16,
August
2008
These
slides
are
obsolete
• This
is
the
presentaKon
included
on
the
Defcon
16
CD.
• Check
the
Defcon
web
site
for
the
latest
version
of
this
talk.
This
Talk
Isn’t
About... | pdf |
Slide 1
Note:
The following slides (and speaker notes) are in
draft format. Final presentation slides will be
made available after both BlackHat and DEF CON.
The most significant changes will be in the
Machine Learning section. This deck includes
results based on Nearest Neighbour (Weka’s
NNge algorithm). The fi... | pdf |
SECURITY PAPER
Preparation Date: 11 Dec 2016
Art of Anti Detection – 2
PE Backdoor Manufacturing
Prepared by:
Ege BALCI
Penetration Tester
ege.balci<at>invictuseurope.com
INVICTUS
2
Security Paper
TABLE OF CONTENT
1. Abstract:................................................................................................. | pdf |
Mac OS X Server
Java Application
Server Administration
For Version 10.3 or Later
Mac OS X Server Java Application
Server Administration
For Version 10.3 or Later
January 22, 2004
Apple Computer, Inc.
© 2003 Apple Computer, Inc.
All rights reserved.
No part of this publication may be
reproduced, stored in a retri... | pdf |
1
tabby分析
tabby是做成⼀个springboot项⽬启动,为什么这么做,暂时不清楚(后⾯清楚了,⽅便数据库操作)
App.class#run() 流程如下,判断是否是jdk8,然后加载settings配置,然后设置配置,解析配
置,最后基于配置运⾏分析
2
配置⽂件如下
配置分析
3
简单解释下参数
tabby.build.target: 要分析的⽬标,可以是⼀个⽬录,也可以是⼀个jar包。
tabby.build.isJDKProcess: 将jre中的三个jar包也加⼊到target进⾏分析, "lib/rt.jar","lib/jc
e.jar","lib/ext/nashorn.jar"
tab... | pdf |
Information Visualization Survey
http://www.cs.umd.edu/class/spring2001/cmsc838b/presentations/Beth_Weinstein/apt.ppt
http://portal.acm.org/citation.cfm?id=260433&dl=ACM&coll=portal
http://www.ee.ic.ac.uk/research/information/www/Bobs.html
http://www.nickerson.to/visprog/ch7/IMG00049.GIF
http://www.ee.ic.ac.uk/research... | pdf |
#BHUSA @BlackHatEvents
ELF Section Docking
Revisiting Stageless Payload Delivery
Dimitry Snezhkov,
X-Force, IBM Corporation
#BHUSA @BlackHatEvents
Information Classification: General
Who -m
Dimitry Snezhkov, X-Force, IBM Corporation
• Research (Offense / Defense)
• Tooling Support
#BHUSA @BlackHatEvents
Information Cl... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.