text
stringlengths
100
9.93M
category
stringclasses
11 values
谨将我们的工作献给 即将毕业离校的兄弟们 — 林晓鑫、刘德超、黄巍、周蓝 珺、胡禹轩、王新喜、何春晓、崔剑、李浩。 以及 潘海东即将出世的小 Baby! – II – 0 译者序 Linux System Prorgramming ( LSP) 的文工作实 工业 IBM 理 的。工作的同的 同。们林晓鑫、王、崔春、、何春晓、、李、 、、、。的 SMS@lilacbbs.com 文献 的王。刘文、王、刘德超、、王新喜同 校工作。的校。工业文 TeX 作的工作李。 的工作 LSP 文进。 内布原 IBM ( 工程) 晓 ( SUN ) 的们 的业时间对进的校提出的 。们的的同。们示。 程 Harbin Linux User Gro...
pdf
Greetz from Room 101 Kenneth Geers www.chiefofstation.com DEFCON 15 Contents: A Cyber War in Three Parts PREFACE...............................................................................................................................................................................3 1984.......................
pdf
Evil  DoS  A*acks  and  Strong Defenses Sam  Bowne  and  Ma*hew  Prince DEF  CON  21 August  2,  2013 Bio Bio Evil  A*acks Sockstress New  IPv6  RA  Flood Sockstress TCP  Handshake Images  from  drawingstep.com  and  us.123rf.com Client Server TCP  Window  Si...
pdf
                 !  "  # $ %  & ' ( ( # % ) % * * + , - . / 0 1 . 2 , 3 - 0 / 0 4 5 2 . 6 7 0 8 - , 5 8 , 7 0 8 6 5 1 . 9 , 4 2 . , / 0 3 8 - 0 : . 2 . 7 - 9 0 8 5 7 . ; 3 5 < = / . 8 - 7 0 / < , 9 . 1 > 5 - ? @ . ? 5 7 2 . 6 5 8 - ? . < , 6 - A B 2 - ? 0 3 C ? 6 0 / . 0 : - ? . 6 . . 2 . 7 - 9 0 8...
pdf
Increasing the security of your election by fixing it Daniel C. Silverstein Damon McCormick dans@csua.berkeley.edu damonmcc@uclink.berkeley.edu Part One: Disaster Strikes The 2000 US Presidential Election led many to question the accuracy of paper ballot systems Several companies seized on this opportunity to promo...
pdf
DEFCON 15 August 3, 2007 Robert W. Clark United States v. Prochner, 417 F.3d 54 (D. Mass. July 22, 2005) Definition of Special Skills Special skill - a skill not possessed by members of the general public and usually requiring substantial education, training or licensing. Examples - pilots, lawyers, doctors,...
pdf
MSI - Microsoft Windows Installer Elevation of Privilege Summary: The Microsoft Windows Installer permits under some circumstances to a “standard user” an arbitrary permissions and content overwrite with SYSTEM privileges. ( Microsoft Windows Installer: https://docs.microsoft.com/en-us/windows/win32/msi/windows-inst...
pdf
1 Zoho ManageEngine ADSelfService Plus 偶然看到这篇⽂章勾起了好奇 https://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine- adselfservice-plus.html 这⾥说⽂件上传和命令注⼊没修,我想着看他上⾯修复的权限绕过感觉有问题于是找了个最新版测试 结果找错了版本⽩⼲了⼀天活,我在他中⽂官⽹下载的最新版为6115版本 下⾯讲的都是6115才回出现的问题,实际上官⽅最新为6117版本,在6116版本的安全过滤器 范围直接变为* ⼀、前⾔ 2 导致很多都洞⽆法利...
pdf
Sharepoint Knowledge Network A component of Microsoft Office Sharepoint Server 2007 (MOSS ) Total Information Awareness Not just for the government anymore KN is about connecting people KN is enterprise social networking KN enables users to collaborate KN automates the discovery and sharing of undocumented knowledg...
pdf
本篇文章翻译自:Offensive WMI - Exploring Namespaces, Classes & Methods (Part 2) :: 0xInfection's Blog — Random ramblings of an Infected Geek. 本篇文章是 WMI 攻击手法研究的第二篇,主要研究 WMI 中的 3 个组件,在整篇文章中,我们将交替使 用 WMI 和 CIM cmdlet,以便熟悉这两种 cmdlet 类型。 一、命名空间 让我们简单回顾一下命名空间是什么: 命名空间结构信息类似于文件系统中文件夹,但是,与物理位置 (例如磁盘上) 不同,它们本质上 更具有逻辑。 WMI 中的所有命名空间都是...
pdf
Traps  of  Gold Michael  Brooks  &  Andrew  Wilson Cau.on.  Please  vet  anything discussed  with  legal  and management. FRUSTRATION http://www.flickr.com/photos/14511253@N04/4411497087/sizes/o/in/photostream/ Our  en.re  defense  strategy  is REACTIVE… AKA,  losing Fixes  ...
pdf
REVERSE ENGINEERING 17 CARS IN UNDER 10 MINUTES BRENT STONE Disclaimer About This Talk and The Github Repo The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Air Force, the United States Army, the United States Department of Defe...
pdf
1 从commons-fileupload源码看⽂件上传绕waf 之前hvv的时候遇到个⽂件上传,有waf没绕过去就想着从⽂件上传解析流程看看有什么可利⽤的地⽅, 于是有了这篇⽂章。 那次主要是⽂件名的地⽅绕不过去,尝试了挺多⽅法就不⼀⼀说了。 ⾸先搭建了⼀个和⽬标类似的环境,使⽤commons-fileupload做⽂件上传。 ⾸先在 formLists = fileUpload.parseRequest(request); 处打断点跟⼊⽂件上传解析流 程。 注意到下⾯肯定是以及解析完了,那么解析的地⽅肯定在箭头处。 跟⼊到 org.apache.commons.fileupload.FileUploadBase.F...
pdf
Filter内存马 分类 filter 内存马是 servlet-api 内存马下的一种,在tomcat高版本中存在实现了动态注册 tomcat 组件的方法,其中就存在 addFilter 方法,用于动态注册 Filter . Filter 生命周期 如果之前有调试tomcat源码的话可以知道 Filter 是在 tomcat 服务器启动时通过 init 方法启动 的,服务器关闭时通过 destroy 方法销毁。中间通过执行 doFilter 方法进行进行过滤。 public class demoFilter implements Filter {    @Override    public void init(FilterC...
pdf
For  little  or  no  money… What  is  a  Security  Opera0ons Center  (SOC) Events IDS Management System Analyst Systems Analysts Contextual Info Reporting Incident Response Why  do  you  need  a  SOC? Central  location  to  collect information  on  threats • Exter...
pdf
>> >> Process injection Breaking All macOS Security Layers With a Single Vulnerability >> Hello! I’m Security researcher at Computest Thijs Alkemade >Thijs Alkemade (@xnyhps) >Security researcher at Computest >Computest research lab: Sector 7 >Other recent work includes: - 0click Zoom RCE at Pwn2Own Vancouver 2021 - W...
pdf
1 修改windows hash ⼀般是拿下域控进⾏操作,建议使⽤域管权限修改,不会出现账户过期问题 其他例⼦ 如果出现过期问题,可在域控上修改⽤户属性,也可通过dsmod远程修改 总结 # 管理员权限修改 python3 smbpasswd.py test.com/zhangsan@192.168.111.146 -newpass "Test@12345 6666" -altuser administrator -altpass "Test@123" -debug -admin 1 2 Shell 复制代码 smbpasswd.py j.doe@192.168.1.11 smbpasswd.py contoso.local/j...
pdf
前⾔ 在参与BugBounty时,排⾏榜中有⼀些⼈分数很⾼,除了他很勤奋外,还有很好的⾃动化来发现资产中的漏洞,像h1这 种赏⾦平台竞争也很⼤,明显的漏洞⼏乎很少,要不资产独特,要不漏洞点很隐蔽,否则不容易发现,我在⼀开始接触 这个平台,因为xss最好上⼿,所以我花了很多时间在这上⾯,但是反射型xss很容易重复,因为其他⼈也很容易发现, 或者扫到,所以最开始那段时间,我把⽬光集中在Dom Xss上,并且制作了⾃动化来帮助我发现这种类型的漏洞,尽管 国内并不重视Xss,但是国外对于Xss的奖励还算可观,所以对于学习这个漏洞类型来说很有助⼒,因为有钱赚 (^-^), ⽽且还有⼀些师傅不嫌弃的帮助,我⾮常感谢,所以我想分享⼀些⾃⼰在参与B...
pdf
Cracking Cryptocurrency Brainwallets Ryan Castellucci DRAFT SLIDES, WILL BE REVISED! FOR FINAL VERSION AFTER TALK https://rya.nc/dc23 Disclaimer Stealing from people with weak passphrases isn’t nice. Don’t be an asshole. What’s a cryptocurrency? ● Bitcoin is the most widely known example. ● Electronic money which can...
pdf
1. 2. xxx 3. xxx ED 1. tcp/ipwin/linuxpython 2. javawebjava iot 3. kalinmapsqlmapburpsuiteida ->->->->->->->-> ->->-> mmorpg web apppwn websrcphp java web sxfvpn 1. sxf vpn 2. vpn 3. 4. vpnphpapachenodejs 5. 6. 1. 2. 3. 4. 5. 1. 2. 3. 1. 2. 3. 4. 5. p p 6. 7. 8. 9. 10. cms
pdf
“Cyber” Who Done It?! Attribution Analysis Through Arrest History Jake%Kouns,%CISO jake@riskbasedsecurity.com @jkouns August&2016 Lee%Johnstone Security%Researcher @83leej N%O%T%%%J%U%S%T%%%S%E%C%U%R%I%T%Y%%,%%%%T%H%E%%%R%I%G%H%T%%%S%E%C%U%R%I%T%Y% cyber Cyber?%Drink! N%O%T%%%J%U%S%T%%%S%E%C%U%R%I%T%Y%%,%%%%T%H%E%%%R...
pdf
Red Team Ops with CS: Operations 0x00 前言 CS的作者Raphael Mudge有2套公开视频,非常值得学习,一个是18年的《In-memory Evasion》,一 个是19年的《Red Team Operations with Cobalt Strike》。前段时间再次观看了《In-memory Evasion》并作了相应笔记,而《Red Team Operations with Cobalt Strike》始终没有完整的看过一 遍,正好这次一口气搞完。学习一定要做笔记,能写出工具的一定要写成工具。 《Red Team Operations with Cobalt Strike》这个课程分...
pdf
我是谁 姓名:董弘琛 ID:月白 90后白帽子,360网络安全专家,擅长渗透测试、 代码审计、脚本开发等相关安全技能。金融行业相 关安全服务经验丰富,希望能和各位师傅们交流学 习更多的知识。 同时也感谢我的领导、团队以及主办方对我的帮助 与支持。 先来聊聊代码审计 什么是代码审计? 为什么要代码审计? 如何进行代码审计? 什么是代码审计 检查源代码中的安全缺陷,检查程序源代码是否存在 安全隐患,或者有编码不规范的地方,通过自动化工 具或者人工审查的方式,对程序源代码逐条进行检查 和分析,发现这些源代码缺陷引发的安全漏洞,并提 供代码修订措施和建议。 什么是代码审计 就是在代码中寻找安全隐患 什么隐患? 如何寻找? 为什么代码审计 网...
pdf
© WAVESTONE 1 Ayoub ELAASSAL ayoub.elaassal@wavestone.com @ayoul3__ Dealing the perfect hand Shuffling memory blocks on z/OS © WAVESTONE 2 What people think of when I talk about mainframes © WAVESTONE 3 The reality: IBM zEC 13 technical specs: • 10 TB of RAM • 141 processors,5 GHz • Dedicated processors for JAVA, XML ...
pdf
Practice of Android Reverse Engineering Jim Huang ( 黃敬群 ) Developer, 0xlab jserv@0xlab.org July 23, 2011 / HITcon Rights to copy Attribution – ShareAlike 3.0 You are free to copy, distribute, display, and perform the work to make derivative works to make commercial use of the work Under the following conditions Attribu...
pdf
ProxyLogon is Just the Tip of the Iceberg A New Attack Surface on Microsoft Exchange Server! Orange Tsai Orange Tsai • Orange Tsai, focusing on Web and Application 0-day research • Principal Security Researcher of DEVCORE • Captain of HITCON CTF Team • Speaker of Security Conferences • Black Hat USA & ASIA / DEFCON / H...
pdf
Build a free cellular traffic capture tool with a vxworks based femoto Hacking Femtocell Hacking Femtocell 1 Yuwei Zheng @DEF CON 23 Haoqi Shan @DEF CON 23 From: 360 Unicorn Team Main contents Hacking Femtocell • About us • Why do we need it • How to get a free Femtocell • Deeply Hack • Capture packets • Summary ...
pdf
Windows命令执⾏获取web路径 在某些情况下,存在Windows命令执⾏,但是不出⽹,也没有回显。 但是需要获取⼀个web绝对路径,可以通过这个路径配合其他漏洞拿webshell,也 可以把命令执⾏结果写⼊到web路径下进⾏访问(相当于回显)。 在Win中可以通过以下⽅法获得: 想直接看结论的跳转到 总结 即可。 ⼀些坑 这⾥借鉴了520师傅的命令 https://sec.lz520520.com/2021/01/596/ (这⾥去掉了cmd /c,⽤的时候再加上也是可以的) for /f %i in ('dir /s /b C:\Users\46479\qqqq.txt') do (echo %i) 1 但是发现不⽀持有空...
pdf
Cunning with CNG: Soliciting Secrets from Schannel DEF COn 24 1470502800 Why do you care? Ability to decrypt Schannel TLS connections that use ephemeral key exchanges Ability to decrypt and extract private certificate and session ticket key directly from memory Public Cert/SNI to PID/Logon Session Mapping W...
pdf
某运维审计系统任意⽂件写⼊漏洞挖掘过程 分享下最近挖掘漏洞的⼀些⼿段。 临近实习,有⽊有⼤佬收实习⼩弟,端茶倒⽔样样精通。 ⽬标系统如下: 是⼀个安全审计系统,根据主⻚的关键词在⽹络安全产品⼤全中进⾏查询,得知⽬标系统开发商为⼴州某科。 `⽹络安全产品⼤全`:https://t.wangan.com/c/products.html 同时,通过搜索引擎查到了⼀些历史漏洞。 本以为可以直接拉出payload出来打呢。但是看了下,⽬前所遇到的系统版本为3.*最新版,⽽乌云所存储的时间居然是2011年? 这明显对不上了,且新版使⽤的mvc模式。直接略过 既然没有可利⽤的公开漏洞,那么只有⾃⼰挖掘漏洞了。还是⽼⽅法,通过fofa采集了⼀波相同...
pdf
~ Jay Turla @shipcod3 CAR INFOTAINMENT HACKING METHODOLOGY AND ATTACK SURFACE SCENARIOS WHOAMI ▸ Jay Turla @shipcod3 ▸ app security engineer @Bugcrowd ▸ ROOTCON goon ▸ contributed to some security tools ▸ I love PS4 ▸ Not the creator of Turla malware ▸ Loves to party BEFORE ANYTHING ELSE….. WE NEED AN INSPIRATIONA...
pdf
TenProtect))Conficential,)Copyright)@Tencent,)2019) 游戏安全的攻防艺术 joeywzhu@tencent.com) 2019.02) TenProtect))Conficential,)Copyright)@Tencent,)2019) 个⼈人简介 •  2013⾄至今,腾讯游戏业务安全部技术专家) •  2005-2012,趋势科技架构师) •  2005-2008,))开发和设计)PE病毒沙箱) •  2008-2012,)开发和设计脚本漏漏洞洞分析引擎) •  2013)to)now,)开发和设计游戏安全通⽤用⽅方案) •  2011.8)Defcon讲演 “Chines...
pdf
#BHUSA @BlackHatEvents Devils Are in the File Descriptors: It Is Time To Catch Them All Le Wu from Baidu Security Le Wu(@NVamous) • Focus on Android/Linux bug hunting and exploit • Found 200+ vulnerabilities in the last two years • Blackhat Asia 2022 speaker About me 2 Outline  Background  Diving into issues in the...
pdf
Motorola Type II Trunking http://www.signalharbor.com/ttt/01apr/index.html 1 of 6 6/18/2007 14:11 This article first appeared in the April 2001 issue of Monitoring Times. MOTOROLA TYPE II TRUNKING With all of the various trunk-tracking scanners and software out there it is sometimes difficult to make sense of talkgr...
pdf
Betrayed by the keyboard How what you type can give you away Matt Wixey Research Lead, PwC UK Cyber Security www.pwc.com Building a secure digital society. PwC │ 2 Disclaimer • This content is presented for educational purposes only • What this presentation isn’t… PwC │ 3 Introduction Matt Wixey • Research Lead for th...
pdf
Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol DEFCON 16 Presentation Magnus Bråding 2008 Short Author Presentation Magnus Bråding • Swedish security researcher (Fortego Security) • 10+ years in the security business • Central contributor and driving force behind woodmann.com reverse engineering co...
pdf
Microkernel development: from project to implementation Technical Notes Rodrigo Maximiano Antunes de Almeida rmaalmeida@gmail.com Universidade Federal de Itajubá Summary This is the technical notes about the ESC talk: “Microkernel development: from project to implementation” given by Rodrigo Maximiano Antunes d...
pdf
www.synack.com @colbymoore @patrickwardle optical surgery; implanting a dropcam colby moore / patrick wardle Synack Colby Moore (vrl/synack) Patrick Wardle (nasa/nsa/vrl/synack) Synack’s R&D team who we are > an outline overview root access vulnerabilities implant an overview what/why? “Dropcam is a cloud-based W...
pdf
1 NYCMIKE NYCMIKE The World of Pager Sniffing The World of Pager Sniffing and Interception: and Interception: More Activity than one may More Activity than one may suspect. suspect. + = Music: The Cools Kids – Gold and a Pager The idea is the let the music play while folks enter the room then move on to the next slid...
pdf
Credit Cards: Everything You have Ever Wanted to Know Robert “hackajar” Imhoff-Dousharm A brief History ● 1950 DinersClub ● 1958 American Express ● 1958 BankAmericard (Visa) ● 1966 MasterCard International (ICA) ● 1986 Discover Card Technology ● Knuckle Buster's ● Dial-Up Authorization Terminal ● High Speed Leased Lin...
pdf
HIDS PHP WebShell Bypass 研究与分析 ——do9gy 背景:2022 年春天,参加了某 HIDS Bypass 挑战赛,赛题恰好是关于 PHP WebShell 绕 过的,结合 Fuzz 技术获得了几个侥幸可以绕过的样本,围绕#WebShell 检测那些事的主题, 与各位做一个分享。 挑战赛规则如下: 1、WebShell 指外部能传参控制(如通过 GET/POST/HTTP Header 头等方式)执行任 意代码 或命令,比如 eval($_GET[1]);。在文件写固定指令不算 Shell,被认定为无 效,如<?php system(‘whoami’); 2、绕过检测引擎的 WebShell...
pdf
How to Hack Millions of Routers Craig Heffner, Seismic LLC SOHO Router…Security? Common Attack Techniques  Cross Site Request Forgery  No trust relationship between browser and router  Can’t forge Basic Authentication credentials  Anti-CSRF  Limited by the same origin policy  DNS Rebinding  Rebinding prevention...
pdf
D3CTF Writeup 1 D3CTF Writeup Author:Nu1L Web ezupload 先写htaccess让他可以执⾏脚本 POST / HTTP/1.1 Content-Type: multipart/form-data; boundary=--------------------------030808716877952631606047 User-Agent: PostmanRuntime/7.20.1 Accept: */* Cache-Control: no-cache Postman-Token: aeee478c-f649-433f-b007-6799bb3db9f2 Host: c...
pdf
Transformations Defcon 21 IPv4  IP ID Randomization o Exclude Fragments o Others … Randomize and Clear Outgoing “DF”  TTL Standardized o Exclude ICMP Echo Requests and Routing Protocols (RIP, BGP) o Others … Accounting for Hops Already Traveled o Recalibrate for Maximum Allowed  ToS Cleared  E...
pdf
任意文件下载击溃跳板站点 这次的实战渗透过程,信息收集是很重要的一个阶段。尽可能收集目标网站或目标主机尽量多的信 息。信息收集的方式: 主动信息收集是通过直接访问网站主动获取信息,对IP开放的端口、CMS、中间件、敏感目 录、敏感文件、脚本类型、JS里的域名、操作系统扫描分析。 被动信息收集是基于公开的渠道,在不与目标系统直接交互的情况下获取信息,比如搜索引擎 获取网站的URI、获取IP绑定的域名、C段、域名whois信息、证书对应的其他资产做扩展信息收 集。 常用的几个小技巧: 1)利用windows和linux区分大小写的区别,在访问的时候尝试把路径部分改成大写, https://www.aaa.com/upload/inde...
pdf
Wibbly Wobbly, Timey Wimey What's Really Inside Apple's U1 Chip Jiska Classen Secure Mobile Networking Lab - SEEMOO Technical University of Darmstadt, Germany Alexander Heinrich Secure Mobile Networking Lab - SEEMOO Technical University of Darmstadt, Germany Ultra Wideband (UWB) U1 Chip Nobody knows what it is or doe...
pdf
Ripping Media Off of the Wire A Step-by-Step Guide A Step-by-Step Guide By Honey honey.rtmp@gmail.com whoami: Honey is a Network Administrator for 4+ years a Research Assistant for a Ballistic research grant by the NIST an Adjunct Professor at John Jay College of Criminal an Adjunct Professor at John Jay College ...
pdf
目录 目录 目录 目录 1.概述3 2.输入验证和输出显示3 2.1命令注入4 2.2跨站脚本4 2.3文件包含5 2.4代码注入5 2.5 SQL 注入6 2.6 XPath 注入6 2.7 HTTP 响应拆分6 2.8文件管理6 2.9文件上传7 2.10变量覆盖7 2.11动态函数7 3.会话安全8 3.1 HTTPOnly 设置8 3.2 domain 设置8 3.3 path 设置8 3.4 cookies 持续时间8 3.5 secure 设置8 3.6 session 固定9 3.7 CSRF 9 4.加密9 4.1明文存储密码9 4.2密码弱加密9 4.3密码存储在攻击者能访问到的文件9 5.认证和授权10 5.1用...
pdf
Windows Internals Seventh Edition Part 2 Andrea Allievi Alex Ionescu Mark E. Russinovich David A. Solomon Editor-in-Chief: Brett Bartow Development Editor: Mark Renfrow Managing Editor: Sandra Schroeder Senior Project Editor: Tracey Croom Executive Editor: Loretta Yates Production Editor: Dan Foster Copy Editor: Char...
pdf
Web Web安全威脅偵測與防護 安全威脅偵測與防護 Roger Chiu Roger Chiu 邱春樹 邱春樹 Malware Malware--Test Lab Test Lab http://www.malware http://www.malware--test.com test.com PDF created with pdfFactory Pro trial version www.pdffactory.com 訓練大綱 訓練大綱 u u 相關新聞報導 相關新聞報導 u u 網站被植入惡意程式之展示 網站被植入惡意程式之展示 u u 2007 2007年 年OWASP OWASP十大 十大Web Web資安漏洞 資安漏洞...
pdf
Reverse Engineering the Tesla Battery Management System to Increase Power Available Patrick Kiley 2 Patrick Kiley – Principal Security Consultant - Rapid7 • Member of the Penetration Testing team at Rapid7 • Performed research in Avionics security • Internet connected transportation platforms. • Experience in hardw...
pdf
Stitching numbers Alex Moneger Security Engineer 10th of August 2014 Generating ROP payloads from in memory numbers Cisco Con!dential 2 © 2013-2014 Cisco and/or its a"liates. All rights reserved. !  Work for Cisco Systems !  Security engineer in the Cloud Web Security Business Unit (big cloud based security ...
pdf
刘柏江 几维安全创始人兼CTO IoT时代LLVM编译器防护的艺术 目录 万物互联,代码安全先行 01 传统代码保护、LLVM安全编译器 02 03 混淆、块调度、代码虚拟化 万物互联,安全先行 物理安全 防止丢失或者被盗 业务安全 防止用户隐私数据泄漏 系统安全 防止底层漏洞被恶意利用 策略安全 万物互联,代码安全先行 防逆向 打配合 提高门槛 争取时间 防止核心算法被重构 提升策略安全的强度 提高破解成本,将逆向菜鸟拒之门外 加大破解难度,延长破解时间,为 运营争取更多的有利窗口期 物联网时代即将开启 Android Things 让您可以为各种消费者, 零售和工业应用程序构 建智能互联设备。 AliOS Things 面向Io...
pdf
Robots with lasers and cameras (but no security): Liberating your vacuum from the cloud DEFCON 29 – Dennis Giese (08.08.2021) DEFCON 29 – Dennis Giese 2 About me • PhD student at Northeastern University, USA – Working with Prof. Guevara Noubir @Khoury – Research field: Wireless and embedded security&privacy • In...
pdf
S-C3P0反序列化 起因 一个关于 fastjson 不出网的利用方法,利用 C3P0 结合 ROME 二次反序列化注入内存马。 漏洞原理 yso源码 首先来看 yso 的构造链,以及如何生成 payload 。构造链: com.mchange.v2.c3p0.impl.PoolBackedDataSourceBase->readObject - > com.mchange.v2.naming.ReferenceIndirector$ReferenceSerialized->getObject - > com.sun.jndi.rmi.registry.RegistryContext->lookup package ysoseri...
pdf
Shifting the Focus of WiFi Security: Beyond cracking your neighbor's wep key Who are we and why do you care?  Thomas “Mister_X” d'Otreppe de Bouvette Founder of Aircrack-ng  Rick “Zero_Chaos” Farina Aircrack-ng Team Member Embedded Development FD: Also works for a WIPS Vendor DISCLAIMER: Some of the topics in t...
pdf
Information Leakage or Call a Plumber --- your Info is Leaking Joe Klein, CISSP Sr. Security Engineer, AVAYA kleinj@avaya.com Overview  Background for this Speech  What is Information Leakage?  What is the Risk?  Types of Information Leakage?  Technical  People  Process  How to Protect? Background of the speech...
pdf
The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. Snort Plug-in Development: Teaching an Old Pig New Tricks Ben Feinstein, CISSP GCFA SecureWorks Counter Threat Unit™ DEFCON 16 August 8, 2008 The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. ...
pdf
S-shiro权限绕过 环境搭建 源码地址 使用github下载器即可下载 CVE-2020-1957 代码配置 认证设置 package org.javaboy.shirobasic; import org.apache.shiro.mgt.SecurityManager; import org.apache.shiro.spring.web.ShiroFilterFactoryBean; import org.apache.shiro.web.mgt.DefaultWebSecurityManager; import org.springframework.context.annotation.Bean; import org....
pdf
Pushing a Camel through the eye of the Needle! [Funneling Data in and out of Protected Networks] SensePost 2008 About:us • SensePost – Specialist Security firm based in South Africa; – Customers all over the globe; – Talks / Papers / Books • {marco,haroon}@sensepost.com – Spend most of our time breaking stuff ((thinkin...
pdf
有幸受我师⽗鸡头的邀请,参加《鸡友故事会》,分享⼀些随笔,名字就叫四分之⼀⼈ ⽣好了,我的四分之⼀。 从接触安全到现在其实已经很多年了,⼩时侯因为家⾥的电脑感染熊猫烧⾹病毒,⽼爸 修了很久,⽤尽了办法,从那个时候⼼⾥⾯就埋下了⼀个种⼦,后来拜师花钱买⼯具被骗, 我都经历过,那是⼀个阿D、明⼩⼦就可以吊打⼀⼤⽚⽹站的年代,可我却从来没有静下⼼ 来,⼊⻔研究过原理,想想现在觉得蛮遗憾的,后来因为上学,放弃了很久,直到⼤学选择 专业,原来,⼼⾥的种⼦早就发了芽,违背了家⾥的意愿,最后⼀天⾃⼰偷偷修改了志愿的 顺序,放弃了家⾥安排的⼀些路,⾛上了web 的桥,我想,可能这就是⾃⼰的坚持吧,后 来和身边的⼩伙伴聊天,原来很多⼈⼼⾥都是怀着最初...
pdf
Old-Skool Brought Back A 1964 Modem Demo K.C. Budd  "phreakmonkey" Taylor Banks  "dr. kaos" Modems, explained     Modulator / Demodulator Modulator:  Encodes a digital signal over an analog representation Demodulator:  Reconstructs the digital signal from the analog representation Digital signal rate = bits per secon...
pdf
Using Guided Missiles in Drive­bys    Automatic browser  fingerprinting and  exploitation with the  Metasploit Framework:     Browser Autopwn James Lee 2 Browser Autopwn ● Auxiliary module for the Metasploit Framework ● Fingerprints a client ● Determines what exploits might work ● Used to suck ● Now it doesn't 3 Outlin...
pdf
S-SnakeYaml反序列化 SnakeYaml 基本使用 导包 序列化 MyClass 类 序列化测试 <dependency>    <groupId>org.yaml</groupId>    <artifactId>snakeyaml</artifactId>    <version>1.27</version> </dependency> package test; public class Myclass {    String value;    public Myclass(String args){        value=args;   }    public String getValue...
pdf
) (( ( ((( )()() Alibaba Security 1 • Xiaolong Bai • Alibaba Security Engineer • Ph.D. graduated from Tsinghua University • Published papers on the top 4: S&P, Usenix Security, CCS, NDSS • Twitter, Weibo, Github: bxl1989 • Min (Spark) Zheng • Alibaba Security Expert • Ph.D. graduated from The CUHK • Twitter@SparkZhen...
pdf
使用静态代码检测微服务越权、未授权访问漏洞 作者:xsser 背景 现在的互联网很多都是来自阿里那一套,公司的整体的应用的架构都 是微服务,在微服务下基于 spring boot 之类的搭建了 一套开发体 系。在历史的发展下,微服务一般发展成这样的架构 安全做为一个属性,需要深入契合这个框架。为什么要讲微服务呢? 因为有统一的框架,可以通过静态代码去一些事情。外购的系统,不 能接入到微服务里的,我们没办法拿到源代码,也自然无法做静态代 码的事情。 难以解决的安全问题 当今在越来越完善的 SDLC 安全建设之下,很多安全问题已经逐步变 少,例如 SQLI、RCE 等,企业的安全建设在研发安全方面已经逐步完 善,常见的 WE...
pdf
细数安卓APP那些远程攻击漏洞 z7sky & 行之 @360VulpeckerTeam 演讲者简介 weibo: @0xr0ot @z7sky z7sky & 行之 360VulpeckerTeam成员 研究方向:Android 系统安全和第三方APP 安全 概览 Mobile Pwn2Own 2013 Mobile Pwn2Own 2013上安全研究人员Pinkie Pie 利用chrome的两个0day漏洞,实现了远 程代码执行攻击,通过远程的web页面控制了系统。 随后,2014年日本安全研究人员Takeshi Terada 公布了Pwn2own 大赛exploit中intent协议漏 洞的利用方法。 影响面最大的远程攻击入...
pdf
App 4 1CSRF CSRF 2 3Cookie Cookie CookieXssCookieHttpOnlyXss /Xss Cookie Xss CookieHttpOnly HtmlJslogin location.href location.href AppWebViewUrl AppWebViewDeepLinkAppWebView Url Url AppJsBridgeWebViewNative WebViewUrlNative WebViewNativecall WebView AppApp callHook call invokeNative()NativeenablePageJsBridge() Native ...
pdf
XCTF WP AuthorNu1L Team wpWP NaNroot@nu1l.com 2.0 Nu1L XCTF WP lua BLSMPS babyjail babybaes hardstack house of pig hello arm dngs2010 warmupcms GSA apk Dubbo space lamaba 3*3 babydebug easycms spider coturn lua local bit_band = bit.band local bit_lshift = bit.lshift local bit_rshift = bit.rshift local math_floor = m...
pdf
Firefox Extension Spyware ant Hacks in Taiwan Conference 2008 Outline 1. 不安全的 Firefox extension 2. Firefox extension spyware 3. Firefox 3 準備好了嗎? 不安全的 Firefox extension ● FormSpy ● 著名的 Firefox extension spyware ● 2006/07 發現 ● 偽裝成合法的 NumberedLinks 0.9 ● 竊取信用卡卡號、密碼、網路銀行 PIN 碼、 以及 ICQ, FTP, IMAP, POP3 的密碼。 ● FFsniFF ...
pdf
The Second Edition: Remembering Who We Are by Richard Thieme Most of us live a large part of our lives skating on the ice of trivial essentials, the necessary tasks that fill our waking days. We pause from time to time and look at the etched images in the ice and think, this is the pattern of our lives, these images re...
pdf
Customize Evil Protocol to Pwn an SDN Controller HACKING THE BRAIN Feng Xiao, Ph.D. student at PennState, Cyber Security Lab Jianwei Huang, Researcher at Wuhan University Peng Liu, Professor at PennState, Cyber Security Lab What’s SDN? func Virtual Switch func func Control Plane Data Plane Software-Defined Networking...
pdf
大力出奇迹の WiFi  Hacking 杨 哲 (Longas) ZerOne无线安全研究组织 ZerOne WirelessSec Research SDR LTE-­‐FDD RFID WiFi 干扰 GSM APPLICATION SPEED INTERNET 能源 BLUETOOTH ZigBee OpenBSC 轨道交通 RESOURCE LTE-­‐FDD Wireless GPS Infrared NO 教育行业 车联网 GSM-­‐R LTE-­‐HDD 民航 OpenBTS 电力行业 NFC 卫星通信 无线电 HackRF 交通 物联网 有源RFID SOCIAL 无线电 BLOG 干扰 医疗 APPLICATI...
pdf
Introducing nmrcOS Inertia <inertia@nmrc.org> Scope Hackers System administrators Distro builders Overall goals for the project Stable, secure, trusted system Intended users Intended uses History of the Project Initial approach Analysis of problems Solution How nmrcOS changed to solve these problems Rationale for these...
pdf
Windows Kernel Programming, Second Edition Pavel Yosifovich This book is for sale at http://leanpub.com/windowskernelprogrammingsecondedition This version was published on 2022-01-22 This is a Leanpub book. Leanpub empowers authors and publishers with the Lean Publishing process. Lean Publishing is the act of publishin...
pdf
Momigari Overview of the latest Windows OS kernel exploits found in the wild Boris Larin @oct0xor 30-May-19 Anton Ivanov @antonivanovm $whoweare Senior Malware Analyst (Heuristic Detection and Vulnerability Research Team) Boris Larin Head of Advanced Threats Research and Detection Team Anton Ivanov Twitter: @oct0xor ...
pdf
DEFCON 17 July 31, 2009 R.W. Clark  United States v. Prochner, 417 F.3d 54 (D. Mass. July 22, 2005)  Definition of Special Skills  Special skill - a skill not possessed by members of the general public and usually requiring substantial education, training or licensing.  Examples - pilots, lawyers, doctors, ...
pdf
Click to edit Master subtitle style Stamp Out Hash Corruption, Crack All the Things! Ryan Reynolds  Manager, Crowe Horwath  Pentester  Twitter: @reynoldsrb Jonathan Claudius  SpiderLabs Security Researcher, Trustwave  Vulnerability Research  Twitter: @claudijd What’s inside?  Windows Hash Extraction  Story of W...
pdf
ssrfmap包含了ssrf的⼤部分⽤法,于是看了下ssrfmap的代码和检测的⼿法,再结合⼀些ssrf的trick,想着能不能 弄个⾃动化检测ssrf+利⽤的⼯具。 SSRF基础知识 ssrf出现最根本的原因,就是服务端使⽤了⽹络函数,⽽⼀般编程语⾔⽹络函数底层调⽤的都是 curl (当然,这个 要看具体的函数代码以及底层逻辑),curl⼜⽀持很多协议,所以ssrf就可以使⽤这些协议。 curl 是⼀个开源的⽤于数据传输的命令⾏⼯具与库,它使⽤ URL 语法格式,⽀持众多传输协议,包括: HTTP、HTTPS、FTP、FTPS、GOPHER、TFTP、SCP、SFTP、SMB、TELNET、DICT、LDAP、LDAPS、 FIL...
pdf
Bosses love Excel … hackers too! Juan Garrido “Silverhack” Chema Alonso (@chemaalonso) INFORMATICA64.COM Who? About • Security Researchers • Working at INFORMATICA64 • http://www.informatica64.com What? Terminal Applications Why? RDP Citrix Using Bing Secure? Verbosity • Conf -files are too verbosity ...
pdf
GNU Readline Library Edition 6.1, for Readline Library Version 6.1. October 2009 Chet Ramey, Case Western Reserve University Brian Fox, Free Software Foundation This manual describes the GNU Readline Library (version 6.1, 9 October 2009), a library which aids in the consistency of user interface across discrete program...
pdf
RESTing On Your Laurels Will Get You Pwned By Abraham Kang, Dinis Cruz, and Alvaro Muñoz Goals and Main Point • Originally a 2 hour presentation so we will only be focusing on identifying remote code execution and data exfiltration vulnerabilities through REST APIs. • Remember that a REST API is nothing more th...
pdf
实战攻防演习之 紫队视角下的实战攻防演习组织 1 实战攻防演习之 紫队视角下的实战攻防演习组织 3 前 言 网络实战攻防演习,是新形势下关键信息系统网络 安全保护工作的重要组成部分。演习通常是以实际运 行的信息系统为保护目标,通过有监督的攻防对抗, 最大限度地模拟真实的网络攻击,以此来检验信息系 统的实际安全性和运维保障的实际有效性。 2016年以来,在国家监管机构的有力推动下,网 络实战攻防演习日益得到重视,演习范围越来越广, 演习周期越来越长,演习规模越来越大。国家有关部 门组织的全国性网络实战攻防演习从2016年仅有几家 参演单位,到2019年已扩展到上百家参演单位;同时 各省、各市、各行业的监管机构,也都在积极地筹备 ...
pdf
全生命周期开发安全的旧瓶与新酒 杨廷锋 @安恒信息 传统的S-SDLC 需求 设计 编码 测试 调研 安全需求 威胁建模 安全设计 安全编码 代码审计 设计用例 漏洞扫描 上线 安全测试 基线检查 运行 监测 应急响应 业务/开发团队 运维团队 传统的S-SDLC 需求 设计 编码 测试 上线 运行 SDLC · 目前的S-SDLC服务以 文档为主,难以闭环 具体代码实现问题 从目前的服务来看在 落地过程中需要大量 的人力投入。但是内 容都是重复性工作, 没有时间深入挖掘漏 洞。 部分设计可能过于专 业,普通的需求经理 和开发人员无法驾驭 整个过程中产生大量 文档,无法迅速转换 成数据,进入到反馈 环。难以适应快速变 化的业务需求 ...
pdf
Finding useful and embarrassing information with Maltego ANDREW MACPHERSON ROELOF TEMMINGH 2017 © WAVESTONE 2 Dealing the Perfect hand Shuffling memory blocks on z/OS CICSPwn: tool to pentest CICS middleware on a Mainframe (Remote code execution, access control bypass, etc.) ELV.APF : script for escalating...
pdf
Olympic-sized Trunking http://www.signalharbor.com/ttt/01dec/index.html 1 of 8 6/18/2007 14:10 This article first appeared in the December 2001 issue of Monitoring Times. OLYMPIC-SIZED TRUNKING The 2002 Winter Olympic Games will begin on February 8, 2002, when more than two weeks of athletic events will take place i...
pdf
Beyond the MCSE: Red Teaming Active Directory Sean Metcalf (@Pyrotek3) s e a n @ adsecurity . org www.ADSecurity.org About Me Founder Trimarc, a security company. Microsoft MCM (AD) & MVP Speaker: BSides, Shakacon, Black Hat, DEF CON, DerbyCon Security Consultant / Researcher Own & Operate ADSecurity.org (Microsoft...
pdf
Closing(Ceremonies( 25th(Anniversary( Badges'Badges'Badges!' And…is(that(the(line(for(Swag?!( #badgelife( Swag!' Sold(out(again!( Thank(you(from(Swag(to(Speaker(Goons!( ( Transparency' •  More(informaCon( about(DEF(CON( departments(and( what’s(going(on.( Thanks'to'all'DEF'CON'Goons' •  AdministraCon( •  A(&(E( •  Artwo...
pdf
0x0000 “We are not as strong as we think we are” ● Rich Mullins <GHz or bust! leveraging the power of the  chipcon 1111 (and RFCAT) 0x1000 – intro to <GHz ● FCC Rules(title 47) parts 15 and 18 allocate and govern parts of the RF spectrum for unlicensed ISM in the US (US adaptation of the ITU- R 5.138, 5.150, and 5.280...
pdf
Botfox – 基於瀏覽器與社交工程之殭屍網路研究 Botnet based on Browser and Social Engineering 動機 你知道嗎? 現行的安全防護不像你想像的那般健壯 ... 實驗證實, 『它』可以繞過目前所有常見的安全防護 ... 你相信嗎? 『它』的技術含量低到只有我用『它』 ... 你相信嗎? 『它』的建置成本很低很低 ... 你認同嗎? 大腦本身就是一種永遠可以被利用的 0day... 自我介紹 Ant yftzeng@gmail.com 中研院 自由軟體授權 台灣駭客年會講師 Wow!USB 隨身碟防毒 Wow!ScanEngine 掃毒引擎 Wow!ARP 防護軟體 經濟學 混沌 複雜 ...
pdf
IoT 自动化安全平台体系建设 我是谁?从哪里来?要做什么? l 我叫孟卓,ID:FengGou l 来自小米 AIoT 安全实验室 l 保障米系智能产品的安全,赋能业务 团队任务如何达成? l 消:消除隐患 l 防:防患于未燃 l 员:人员的成长 消除隐患 技术栈复杂 技术难 人才缺失 团队难 产品量激增 压力大 行业经验 无体系 面临严峻挑战 初步尝试 AIoT 消费级物联网产品安全基线 团队能力交叉 误入歧途 - 实验室变流水线工厂 二向箔 IoT自动化审计 的突破 业务构成 -- 抽丝剥茧 芯片 应用 模块 IPC 通信 用户 APP IoT 智能联动 I2X 二维化 芯片接口 以太流量 无线流量 设备服务 控制协议 固件分...
pdf
Ge#ng&Windows&to&Play&with&Itself5 A"Hacker’s"Guide"to"Windows"API"Abuse" " Brady"Bloxham" Founder/Principal"Security"Consultant" @silentbreaksec" hCp://www.silentbreaksecurity.com" hCp://www.blacksquirrel.io"" Background5 •  Shorten"the"gap"between" penetraHon"test"and"actual"aCack" •  Few"covert"persistence"tools" • ...
pdf
JUST WHAT THE DOCTOR ORDERED? SCOTT ERVEN Founder/President – SecMedic @scotterven SHAWN MERDINGER Healthcare Security Researcher Founder – MedSec LinkedIn Group @medseclinkedin 1 Why Research Medical Devices? • Patient Safety & Quality Patient Care • To Equip Defenders In Assessing & Protecting These Life...
pdf
nat smashdemo 0x00 1. httpstls sessionid 2. sessionidpayload 3. sessionid 4. 5. sessionidtls 6. sessionid 7. tcp windowsessionid 0x01 1. scapytcpack 2. https://github.com/tlsfuzzer/tlslite-ng wendellpytls tlslite/tlsconnection.pypip/ usr/local/lib/python3.8/dist- packages/tlslite/tlsconnection.py httpshttpspayl...
pdf
Linux-Stack Based V2X Framework: SocketV2V All You Need to Hack Connected Vehicles Duncan Woodbury, Nicholas Haltmeyer {p3n3troot0r@protonmail.com, ginsback@protonmail.com} DEFCON 25: July 29, 2017 p3n3troot0r, ginsback DEFCON: V2X DEFCON 25: July 29, 2017 1 / 48 State of the World: (Semi)Autonomous Driving Technologie...
pdf
如何在3个月发现12个内 核信息泄露漏洞 陈唐晖 李龙 百度安全实验室 2019 目录 0. 我是谁 1. 认识漏洞 2. 研究漏洞 • 堆栈数据污染 • 检测漏洞技术 • CVE实例分析 3. 成果 4. 总结和思考 我是谁? • 百度安全实验室资深安全研发工程师 • 百度杀毒、卫士主防设计者和负责人 • 十多年的windows内核研究和开发经验 • 深谙Rootkit技术,内功深厚,剑法独到 • 偶然涉入漏洞挖掘领域 Tanghui Chen chenhui00530@163.com 什么是内核信息泄露漏洞? Windows内核存在很多信息泄露漏洞,可能导致绕过KASLR或系统关 键信息泄露,攻击者可以利用它们得到一些重要信息,...
pdf
Mac OS X Server Network Services Administration For Version 10.3 or Later 034-2351_Cvr 9/12/03 10:26 AM Page 1  Apple Computer, Inc. © 2003 Apple Computer, Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication for the purpose of learnin...
pdf
2022*CTF-Web 写在前⾯ XCTF国际赛系列⼀直不错,周末参与了下这次⽐赛,虽然没有Java但总体还是蛮有意思 这⾥没按题⽬顺序写,只是写了在我⼼中从上到下的排序,对有源码的题⽬做了备份 oh-my-lotto 链接: https://pan.baidu.com/s/1G53aYqIIbHGlowdWFhkKqw 提取码: oism oh-my-lotto ⼼⽬中⽐较有趣的⼀题呗,重⽣之我是赌神 这是⼀个⾮预期,因为后⾯又上了个revenge,简单分析下题⽬,先看看docker内容,可以知 道⼤概的结构 version: "3" services: lotto:   build:     context: ...
pdf
Analysis Experience of the suspended EID Card 對「被暫停」的晶片身分證之分析經驗分享 Speaker : Shi-Cho Cha 主講人:查士朝 Dept. of Information Management, NTUST, Chairman and Professor 國立臺灣科技大學資訊管理系 教授兼系主任 Taiwan Information Security Center, Director 國立臺灣科技大學資通安全研究與教學中心主任 Background 背景 2 https://www.ris.gov.tw/apply- idCard/app/idcard/IDCard...
pdf
kernel32 export redirection 暂时忽略模式穿越细节知识 kernel32 IsProcessCritical api-ms-win-core-processthreads-l1-1-2.IsProcessCritical kernelbase!IsProcessCritical NtQueryInformationProcess_0x1d_29 ntoskrnl NtQueryInformationProcess真实实现体 IsProcessCritical 关于Critical Process基本情况参阅msdn https://devblogs.microsoft.com/oldnewthing/201...
pdf