text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
谨将我们的工作献给
即将毕业离校的兄弟们 — 林晓鑫、刘德超、黄巍、周蓝
珺、胡禹轩、王新喜、何春晓、崔剑、李浩。
以及
潘海东即将出世的小 Baby!
– II –
0
译者序
Linux System Prorgramming ( LSP) 的文工作实
工业 IBM 理
的。工作的同的
同。们林晓鑫、王、崔春、、何春晓、、李、
、、、。的 SMS@lilacbbs.com 文献
的王。刘文、王、刘德超、、王新喜同
校工作。的校。工业文
TeX 作的工作李。
的工作 LSP 文进。
内布原 IBM (
工程) 晓 ( SUN ) 的们
的业时间对进的校提出的
。们的的同。们示。
程 Harbin Linux User Gro... | pdf |
Greetz from Room 101
Kenneth Geers
www.chiefofstation.com
DEFCON 15
Contents: A Cyber War in Three Parts
PREFACE...............................................................................................................................................................................3
1984....................... | pdf |
Evil
DoS
A*acks
and
Strong
Defenses
Sam
Bowne
and
Ma*hew
Prince
DEF
CON
21
August
2,
2013
Bio
Bio
Evil
A*acks
Sockstress
New
IPv6
RA
Flood
Sockstress
TCP
Handshake
Images
from
drawingstep.com
and
us.123rf.com
Client
Server
TCP
Window
Si... | pdf |
!
"
#
$
%
&
'
(
(
#
%
)
%
*
*
+
,
-
.
/
0
1
.
2
,
3
-
0
/
0
4
5
2
.
6
7
0
8
-
,
5
8
,
7
0
8
6
5
1
.
9
,
4
2
.
,
/
0
3
8
-
0
:
.
2
.
7
-
9
0
8
5
7
.
;
3
5
<
=
/
.
8
-
7
0
/
<
,
9
.
1
>
5
-
?
@
.
?
5
7
2
.
6
5
8
-
?
.
<
,
6
-
A
B
2
-
?
0
3
C
?
6
0
/
.
0
:
-
?
.
6
.
.
2
.
7
-
9
0
8... | pdf |
Increasing the security of
your election by fixing it
Daniel C. Silverstein
Damon McCormick
dans@csua.berkeley.edu
damonmcc@uclink.berkeley.edu
Part One:
Disaster Strikes
The 2000 US Presidential Election led
many to question the accuracy of paper
ballot systems
Several companies seized
on this opportunity to
promo... | pdf |
DEFCON 15
August 3, 2007
Robert W. Clark
United States v. Prochner, 417 F.3d 54 (D. Mass.
July 22, 2005)
Definition of Special Skills
Special skill - a skill not possessed by members of the
general public and usually requiring substantial
education, training or licensing.
Examples - pilots, lawyers, doctors,... | pdf |
MSI - Microsoft Windows Installer Elevation of Privilege
Summary: The Microsoft Windows Installer permits under some circumstances to a “standard user” an arbitrary
permissions and content overwrite with SYSTEM privileges.
( Microsoft Windows Installer: https://docs.microsoft.com/en-us/windows/win32/msi/windows-inst... | pdf |
1
Zoho ManageEngine ADSelfService Plus
偶然看到这篇⽂章勾起了好奇
https://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine-
adselfservice-plus.html
这⾥说⽂件上传和命令注⼊没修,我想着看他上⾯修复的权限绕过感觉有问题于是找了个最新版测试
结果找错了版本⽩⼲了⼀天活,我在他中⽂官⽹下载的最新版为6115版本
下⾯讲的都是6115才回出现的问题,实际上官⽅最新为6117版本,在6116版本的安全过滤器
范围直接变为*
⼀、前⾔
2
导致很多都洞⽆法利... | pdf |
Sharepoint Knowledge
Network
A component of Microsoft Office Sharepoint
Server 2007 (MOSS )
Total Information Awareness
Not just for the government anymore
KN is about connecting people
KN is enterprise social networking
KN enables users to collaborate
KN automates the discovery and sharing of
undocumented knowledg... | pdf |
本篇文章翻译自:Offensive WMI - Exploring Namespaces, Classes & Methods (Part 2) ::
0xInfection's Blog — Random ramblings of an Infected Geek.
本篇文章是 WMI 攻击手法研究的第二篇,主要研究 WMI 中的 3 个组件,在整篇文章中,我们将交替使
用 WMI 和 CIM cmdlet,以便熟悉这两种 cmdlet 类型。
一、命名空间
让我们简单回顾一下命名空间是什么:
命名空间结构信息类似于文件系统中文件夹,但是,与物理位置 (例如磁盘上) 不同,它们本质上
更具有逻辑。
WMI 中的所有命名空间都是... | pdf |
Traps
of
Gold
Michael
Brooks
&
Andrew
Wilson
Cau.on.
Please
vet
anything
discussed
with
legal
and
management.
FRUSTRATION
http://www.flickr.com/photos/14511253@N04/4411497087/sizes/o/in/photostream/
Our
en.re
defense
strategy
is
REACTIVE…
AKA,
losing
Fixes
... | pdf |
REVERSE ENGINEERING
17 CARS
IN UNDER 10 MINUTES
BRENT
STONE
Disclaimer About This Talk and The Github Repo
The views expressed in this presentation are those of the
author and do not reflect the official policy or position of the
United States Air Force, the United States Army, the United
States Department of Defe... | pdf |
1
从commons-fileupload源码看⽂件上传绕waf
之前hvv的时候遇到个⽂件上传,有waf没绕过去就想着从⽂件上传解析流程看看有什么可利⽤的地⽅,
于是有了这篇⽂章。
那次主要是⽂件名的地⽅绕不过去,尝试了挺多⽅法就不⼀⼀说了。
⾸先搭建了⼀个和⽬标类似的环境,使⽤commons-fileupload做⽂件上传。
⾸先在 formLists = fileUpload.parseRequest(request); 处打断点跟⼊⽂件上传解析流
程。
注意到下⾯肯定是以及解析完了,那么解析的地⽅肯定在箭头处。
跟⼊到 org.apache.commons.fileupload.FileUploadBase.F... | pdf |
Filter内存马
分类
filter 内存马是 servlet-api 内存马下的一种,在tomcat高版本中存在实现了动态注册 tomcat
组件的方法,其中就存在 addFilter 方法,用于动态注册 Filter .
Filter 生命周期
如果之前有调试tomcat源码的话可以知道 Filter 是在 tomcat 服务器启动时通过 init 方法启动
的,服务器关闭时通过 destroy 方法销毁。中间通过执行 doFilter 方法进行进行过滤。
public class demoFilter implements Filter {
@Override
public void init(FilterC... | pdf |
For
little
or
no
money…
What
is
a
Security
Opera0ons
Center
(SOC)
Events
IDS
Management
System
Analyst
Systems
Analysts
Contextual
Info
Reporting
Incident
Response
Why
do
you
need
a
SOC?
Central
location
to
collect
information
on
threats
• Exter... | pdf |
>>
>>
Process injection
Breaking All macOS Security Layers
With a Single Vulnerability
>>
Hello!
I’m
Security researcher at Computest
Thijs Alkemade
>Thijs Alkemade (@xnyhps)
>Security researcher at Computest
>Computest research lab: Sector 7
>Other recent work includes:
- 0click Zoom RCE at Pwn2Own
Vancouver 2021
- W... | pdf |
1
修改windows hash
⼀般是拿下域控进⾏操作,建议使⽤域管权限修改,不会出现账户过期问题
其他例⼦
如果出现过期问题,可在域控上修改⽤户属性,也可通过dsmod远程修改
总结
# 管理员权限修改
python3 smbpasswd.py test.com/zhangsan@192.168.111.146 -newpass "Test@12345
6666" -altuser administrator -altpass "Test@123" -debug -admin
1
2
Shell
复制代码
smbpasswd.py j.doe@192.168.1.11
smbpasswd.py contoso.local/j... | pdf |
前⾔
在参与BugBounty时,排⾏榜中有⼀些⼈分数很⾼,除了他很勤奋外,还有很好的⾃动化来发现资产中的漏洞,像h1这
种赏⾦平台竞争也很⼤,明显的漏洞⼏乎很少,要不资产独特,要不漏洞点很隐蔽,否则不容易发现,我在⼀开始接触
这个平台,因为xss最好上⼿,所以我花了很多时间在这上⾯,但是反射型xss很容易重复,因为其他⼈也很容易发现,
或者扫到,所以最开始那段时间,我把⽬光集中在Dom Xss上,并且制作了⾃动化来帮助我发现这种类型的漏洞,尽管
国内并不重视Xss,但是国外对于Xss的奖励还算可观,所以对于学习这个漏洞类型来说很有助⼒,因为有钱赚 (^-^),
⽽且还有⼀些师傅不嫌弃的帮助,我⾮常感谢,所以我想分享⼀些⾃⼰在参与B... | pdf |
Cracking Cryptocurrency
Brainwallets
Ryan Castellucci
DRAFT SLIDES, WILL BE REVISED!
FOR FINAL VERSION AFTER TALK
https://rya.nc/dc23
Disclaimer
Stealing from people with weak passphrases
isn’t nice. Don’t be an asshole.
What’s a cryptocurrency?
● Bitcoin is the most widely known example.
● Electronic money which can... | pdf |
1.
2. xxx
3. xxx
ED
1. tcp/ipwin/linuxpython
2. javawebjava
iot
3. kalinmapsqlmapburpsuiteida
->->->->->->->->
->->->
mmorpg
web
apppwn
websrcphp
java
web
sxfvpn
1. sxf vpn
2. vpn
3.
4. vpnphpapachenodejs
5.
6.
1.
2.
3.
4.
5.
1.
2.
3.
1.
2.
3.
4.
5. p
p
6.
7.
8.
9.
10. cms | pdf |
“Cyber” Who Done It?!
Attribution Analysis
Through Arrest History
Jake%Kouns,%CISO
jake@riskbasedsecurity.com
@jkouns
August&2016
Lee%Johnstone
Security%Researcher
@83leej
N%O%T%%%J%U%S%T%%%S%E%C%U%R%I%T%Y%%,%%%%T%H%E%%%R%I%G%H%T%%%S%E%C%U%R%I%T%Y%
cyber
Cyber?%Drink!
N%O%T%%%J%U%S%T%%%S%E%C%U%R%I%T%Y%%,%%%%T%H%E%%%R... | pdf |
Red Team Ops with CS: Operations
0x00 前言
CS的作者Raphael Mudge有2套公开视频,非常值得学习,一个是18年的《In-memory Evasion》,一
个是19年的《Red Team Operations with Cobalt Strike》。前段时间再次观看了《In-memory
Evasion》并作了相应笔记,而《Red Team Operations with Cobalt Strike》始终没有完整的看过一
遍,正好这次一口气搞完。学习一定要做笔记,能写出工具的一定要写成工具。
《Red Team Operations with Cobalt Strike》这个课程分... | pdf |
我是谁
姓名:董弘琛
ID:月白
90后白帽子,360网络安全专家,擅长渗透测试、
代码审计、脚本开发等相关安全技能。金融行业相
关安全服务经验丰富,希望能和各位师傅们交流学
习更多的知识。
同时也感谢我的领导、团队以及主办方对我的帮助
与支持。
先来聊聊代码审计
什么是代码审计?
为什么要代码审计?
如何进行代码审计?
什么是代码审计
检查源代码中的安全缺陷,检查程序源代码是否存在
安全隐患,或者有编码不规范的地方,通过自动化工
具或者人工审查的方式,对程序源代码逐条进行检查
和分析,发现这些源代码缺陷引发的安全漏洞,并提
供代码修订措施和建议。
什么是代码审计
就是在代码中寻找安全隐患
什么隐患?
如何寻找?
为什么代码审计
网... | pdf |
© WAVESTONE
1
Ayoub ELAASSAL
ayoub.elaassal@wavestone.com
@ayoul3__
Dealing the perfect hand
Shuffling memory blocks on z/OS
© WAVESTONE
2
What people think of when I talk about
mainframes
© WAVESTONE
3
The reality: IBM zEC 13 technical specs:
• 10 TB of RAM
• 141 processors,5 GHz
• Dedicated processors for JAVA, XML ... | pdf |
Practice of
Android Reverse Engineering
Jim Huang ( 黃敬群 )
Developer, 0xlab
jserv@0xlab.org
July 23, 2011 / HITcon
Rights to copy
Attribution – ShareAlike 3.0
You are free
to copy, distribute, display, and perform the work
to make derivative works
to make commercial use of the work
Under the following conditions
Attribu... | pdf |
ProxyLogon
is Just the Tip of the Iceberg
A New Attack Surface on Microsoft Exchange Server!
Orange Tsai
Orange Tsai
• Orange Tsai, focusing on Web and Application 0-day research
• Principal Security Researcher of DEVCORE
• Captain of HITCON CTF Team
• Speaker of Security Conferences
• Black Hat USA & ASIA / DEFCON / H... | pdf |
Build a free cellular traffic capture tool
with a vxworks based femoto
Hacking Femtocell
Hacking Femtocell
1
Yuwei Zheng @DEF CON 23
Haoqi Shan @DEF CON 23
From: 360 Unicorn Team
Main contents
Hacking Femtocell
• About us
• Why do we need it
• How to get a free Femtocell
• Deeply Hack
• Capture packets
• Summary ... | pdf |
Windows命令执⾏获取web路径
在某些情况下,存在Windows命令执⾏,但是不出⽹,也没有回显。
但是需要获取⼀个web绝对路径,可以通过这个路径配合其他漏洞拿webshell,也
可以把命令执⾏结果写⼊到web路径下进⾏访问(相当于回显)。
在Win中可以通过以下⽅法获得:
想直接看结论的跳转到 总结 即可。
⼀些坑
这⾥借鉴了520师傅的命令
https://sec.lz520520.com/2021/01/596/
(这⾥去掉了cmd /c,⽤的时候再加上也是可以的)
for /f %i in ('dir /s /b C:\Users\46479\qqqq.txt') do (echo
%i)
1
但是发现不⽀持有空... | pdf |
Cunning with CNG:
Soliciting Secrets from Schannel
DEF COn 24
1470502800
Why do you care?
Ability to decrypt Schannel TLS connections that use ephemeral key exchanges
Ability to decrypt and extract private certificate and session ticket key directly
from memory
Public Cert/SNI to PID/Logon Session Mapping
W... | pdf |
某运维审计系统任意⽂件写⼊漏洞挖掘过程
分享下最近挖掘漏洞的⼀些⼿段。
临近实习,有⽊有⼤佬收实习⼩弟,端茶倒⽔样样精通。
⽬标系统如下:
是⼀个安全审计系统,根据主⻚的关键词在⽹络安全产品⼤全中进⾏查询,得知⽬标系统开发商为⼴州某科。
`⽹络安全产品⼤全`:https://t.wangan.com/c/products.html
同时,通过搜索引擎查到了⼀些历史漏洞。
本以为可以直接拉出payload出来打呢。但是看了下,⽬前所遇到的系统版本为3.*最新版,⽽乌云所存储的时间居然是2011年?
这明显对不上了,且新版使⽤的mvc模式。直接略过
既然没有可利⽤的公开漏洞,那么只有⾃⼰挖掘漏洞了。还是⽼⽅法,通过fofa采集了⼀波相同... | pdf |
~ Jay Turla @shipcod3
CAR INFOTAINMENT HACKING
METHODOLOGY AND ATTACK
SURFACE SCENARIOS
WHOAMI
▸ Jay Turla @shipcod3
▸ app security engineer
@Bugcrowd
▸ ROOTCON goon
▸ contributed to some
security tools
▸ I love PS4
▸ Not the creator of Turla malware
▸ Loves to party
BEFORE ANYTHING ELSE….. WE NEED AN INSPIRATIONA... | pdf |
TenProtect))Conficential,)Copyright)@Tencent,)2019)
游戏安全的攻防艺术
joeywzhu@tencent.com)
2019.02)
TenProtect))Conficential,)Copyright)@Tencent,)2019)
个⼈人简介
• 2013⾄至今,腾讯游戏业务安全部技术专家)
• 2005-2012,趋势科技架构师)
• 2005-2008,))开发和设计)PE病毒沙箱)
• 2008-2012,)开发和设计脚本漏漏洞洞分析引擎)
• 2013)to)now,)开发和设计游戏安全通⽤用⽅方案)
• 2011.8)Defcon讲演 “Chines... | pdf |
#BHUSA @BlackHatEvents
Devils Are in the File Descriptors:
It Is Time To Catch Them All
Le Wu from Baidu Security
Le Wu(@NVamous)
•
Focus on Android/Linux bug hunting and exploit
•
Found 200+ vulnerabilities in the last two years
•
Blackhat Asia 2022 speaker
About me
2
Outline
Background
Diving into issues in the... | pdf |
Motorola Type II Trunking
http://www.signalharbor.com/ttt/01apr/index.html
1 of 6
6/18/2007 14:11
This article first appeared in the April 2001 issue of Monitoring Times.
MOTOROLA TYPE II TRUNKING
With all of the various trunk-tracking scanners and software out there it is sometimes difficult to
make sense of talkgr... | pdf |
Betrayed by the keyboard
How what you type can give you away
Matt Wixey
Research Lead, PwC UK Cyber Security
www.pwc.com
Building a secure
digital society.
PwC │ 2
Disclaimer
•
This content is presented for educational purposes only
•
What this presentation isn’t…
PwC │ 3
Introduction
Matt Wixey
• Research Lead for th... | pdf |
Generic, Decentralized, Unstoppable Anonymity:
The Phantom Protocol
DEFCON 16 Presentation
Magnus Bråding 2008
Short Author Presentation
Magnus Bråding
• Swedish security researcher (Fortego Security)
• 10+ years in the security business
• Central contributor and driving force behind
woodmann.com reverse engineering co... | pdf |
Microkernel development:
from project to implementation
Technical Notes
Rodrigo Maximiano Antunes de Almeida
rmaalmeida@gmail.com
Universidade Federal de Itajubá
Summary
This is the technical notes about the ESC talk: “Microkernel development: from project to
implementation” given by Rodrigo Maximiano Antunes d... | pdf |
www.synack.com
@colbymoore
@patrickwardle
optical surgery; implanting a dropcam
colby moore / patrick wardle
Synack
Colby Moore (vrl/synack)
Patrick Wardle (nasa/nsa/vrl/synack)
Synack’s R&D team
who we are
> an outline
overview
root access
vulnerabilities
implant
an overview
what/why?
“Dropcam is a cloud-based W... | pdf |
1
NYCMIKE
NYCMIKE
The World of Pager Sniffing
The World of Pager Sniffing
and Interception:
and Interception:
More Activity than one may
More Activity than one may
suspect.
suspect.
+
=
Music: The Cools Kids – Gold and a Pager
The idea is the let the music play while folks enter the room then move on to
the next slid... | pdf |
Credit Cards: Everything You have
Ever Wanted to Know
Robert “hackajar” Imhoff-Dousharm
A brief History
● 1950 DinersClub
● 1958 American Express
● 1958 BankAmericard (Visa)
● 1966 MasterCard International (ICA)
● 1986 Discover Card
Technology
● Knuckle Buster's
● Dial-Up Authorization Terminal
● High Speed Leased Lin... | pdf |
HIDS PHP WebShell Bypass 研究与分析
——do9gy
背景:2022 年春天,参加了某 HIDS Bypass 挑战赛,赛题恰好是关于 PHP WebShell 绕
过的,结合 Fuzz 技术获得了几个侥幸可以绕过的样本,围绕#WebShell 检测那些事的主题,
与各位做一个分享。
挑战赛规则如下:
1、WebShell 指外部能传参控制(如通过 GET/POST/HTTP Header 头等方式)执行任
意代码 或命令,比如 eval($_GET[1]);。在文件写固定指令不算 Shell,被认定为无
效,如<?php system(‘whoami’);
2、绕过检测引擎的 WebShell... | pdf |
How to Hack Millions of Routers
Craig Heffner, Seismic LLC
SOHO Router…Security?
Common Attack Techniques
Cross Site Request Forgery
No trust relationship between browser and router
Can’t forge Basic Authentication credentials
Anti-CSRF
Limited by the same origin policy
DNS Rebinding
Rebinding prevention... | pdf |
D3CTF Writeup
1
D3CTF Writeup
Author:Nu1L
Web
ezupload
先写htaccess让他可以执⾏脚本
POST / HTTP/1.1
Content-Type: multipart/form-data; boundary=--------------------------030808716877952631606047
User-Agent: PostmanRuntime/7.20.1
Accept: */*
Cache-Control: no-cache
Postman-Token: aeee478c-f649-433f-b007-6799bb3db9f2
Host: c... | pdf |
Transformations
Defcon
21
IPv4
IP ID Randomization
o
Exclude Fragments
o
Others … Randomize and Clear Outgoing “DF”
TTL Standardized
o
Exclude ICMP Echo Requests and Routing Protocols (RIP, BGP)
o
Others … Accounting for Hops Already Traveled
o
Recalibrate for Maximum Allowed
ToS Cleared
E... | pdf |
任意文件下载击溃跳板站点
这次的实战渗透过程,信息收集是很重要的一个阶段。尽可能收集目标网站或目标主机尽量多的信
息。信息收集的方式:
主动信息收集是通过直接访问网站主动获取信息,对IP开放的端口、CMS、中间件、敏感目
录、敏感文件、脚本类型、JS里的域名、操作系统扫描分析。
被动信息收集是基于公开的渠道,在不与目标系统直接交互的情况下获取信息,比如搜索引擎
获取网站的URI、获取IP绑定的域名、C段、域名whois信息、证书对应的其他资产做扩展信息收
集。
常用的几个小技巧:
1)利用windows和linux区分大小写的区别,在访问的时候尝试把路径部分改成大写,
https://www.aaa.com/upload/inde... | pdf |
Wibbly Wobbly, Timey Wimey
What's Really Inside Apple's U1 Chip
Jiska Classen
Secure Mobile Networking Lab - SEEMOO
Technical University of Darmstadt, Germany
Alexander Heinrich
Secure Mobile Networking Lab - SEEMOO
Technical University of Darmstadt, Germany
Ultra Wideband (UWB) U1 Chip
Nobody knows what
it is or doe... | pdf |
Ripping Media Off of the Wire
A Step-by-Step Guide
A Step-by-Step Guide
By Honey
honey.rtmp@gmail.com
whoami: Honey is
a Network Administrator for 4+ years
a Research Assistant for a Ballistic research grant by the
NIST
an Adjunct Professor at John Jay College of Criminal
an Adjunct Professor at John Jay College ... | pdf |
目录
目录
目录
目录
1.概述3
2.输入验证和输出显示3
2.1命令注入4
2.2跨站脚本4
2.3文件包含5
2.4代码注入5
2.5 SQL 注入6
2.6 XPath 注入6
2.7 HTTP 响应拆分6
2.8文件管理6
2.9文件上传7
2.10变量覆盖7
2.11动态函数7
3.会话安全8
3.1 HTTPOnly 设置8
3.2 domain 设置8
3.3 path 设置8
3.4 cookies 持续时间8
3.5 secure 设置8
3.6 session 固定9
3.7 CSRF 9
4.加密9
4.1明文存储密码9
4.2密码弱加密9
4.3密码存储在攻击者能访问到的文件9
5.认证和授权10
5.1用... | pdf |
Windows Internals
Seventh Edition
Part 2
Andrea Allievi
Alex Ionescu
Mark E. Russinovich
David A. Solomon
Editor-in-Chief: Brett Bartow
Development Editor: Mark Renfrow
Managing Editor: Sandra Schroeder
Senior Project Editor: Tracey Croom
Executive Editor: Loretta Yates
Production Editor: Dan Foster
Copy Editor: Char... | pdf |
Web
Web安全威脅偵測與防護
安全威脅偵測與防護
Roger Chiu
Roger Chiu
邱春樹
邱春樹
Malware
Malware--Test Lab
Test Lab
http://www.malware
http://www.malware--test.com
test.com
PDF created with pdfFactory Pro trial version www.pdffactory.com
訓練大綱
訓練大綱
u
u 相關新聞報導
相關新聞報導
u
u 網站被植入惡意程式之展示
網站被植入惡意程式之展示
u
u 2007
2007年
年OWASP
OWASP十大
十大Web
Web資安漏洞
資安漏洞... | pdf |
Reverse Engineering the Tesla
Battery Management System to
Increase Power Available
Patrick Kiley
2
Patrick Kiley – Principal Security Consultant - Rapid7
• Member of the Penetration Testing team at
Rapid7
• Performed research in Avionics security
• Internet connected transportation platforms.
• Experience in hardw... | pdf |
Stitching numbers
Alex Moneger
Security Engineer
10th of August 2014
Generating ROP payloads from in memory numbers
Cisco Con!dential
2
© 2013-2014 Cisco and/or its a"liates. All rights reserved.
! Work for Cisco Systems
! Security engineer in the Cloud Web Security Business Unit (big cloud
based security ... | pdf |
刘柏江
几维安全创始人兼CTO
IoT时代LLVM编译器防护的艺术
目录
万物互联,代码安全先行
01
传统代码保护、LLVM安全编译器
02
03
混淆、块调度、代码虚拟化
万物互联,安全先行
物理安全
防止丢失或者被盗
业务安全
防止用户隐私数据泄漏
系统安全
防止底层漏洞被恶意利用
策略安全
万物互联,代码安全先行
防逆向
打配合
提高门槛
争取时间
防止核心算法被重构
提升策略安全的强度
提高破解成本,将逆向菜鸟拒之门外
加大破解难度,延长破解时间,为
运营争取更多的有利窗口期
物联网时代即将开启
Android Things
让您可以为各种消费者,
零售和工业应用程序构
建智能互联设备。
AliOS Things
面向Io... | pdf |
Robots with lasers and cameras (but no security):
Liberating your vacuum from the cloud
DEFCON 29 – Dennis Giese
(08.08.2021) DEFCON 29 – Dennis Giese
2
About me
• PhD student at Northeastern University, USA
– Working with Prof. Guevara Noubir @Khoury
– Research field: Wireless and embedded security&privacy
• In... | pdf |
S-C3P0反序列化
起因
一个关于 fastjson 不出网的利用方法,利用 C3P0 结合 ROME 二次反序列化注入内存马。
漏洞原理
yso源码
首先来看 yso 的构造链,以及如何生成 payload 。构造链:
com.mchange.v2.c3p0.impl.PoolBackedDataSourceBase->readObject -
> com.mchange.v2.naming.ReferenceIndirector$ReferenceSerialized->getObject -
> com.sun.jndi.rmi.registry.RegistryContext->lookup
package ysoseri... | pdf |
Shifting the Focus of
WiFi Security:
Beyond cracking your
neighbor's wep key
Who are we and why do you care?
Thomas “Mister_X” d'Otreppe de Bouvette
Founder of Aircrack-ng
Rick “Zero_Chaos” Farina
Aircrack-ng Team Member
Embedded Development
FD: Also works for a WIPS Vendor
DISCLAIMER:
Some of the topics in t... | pdf |
Information Leakage
or
Call a Plumber ---
your Info is Leaking
Joe Klein, CISSP
Sr. Security Engineer, AVAYA
kleinj@avaya.com
Overview
Background for this Speech
What is Information Leakage?
What is the Risk?
Types of Information Leakage?
Technical
People
Process
How to Protect?
Background of the speech... | pdf |
The Information Security Experts
Copyright © 2008 SecureWorks, Inc. All rights reserved.
Snort Plug-in Development:
Teaching an Old Pig New Tricks
Ben Feinstein, CISSP GCFA
SecureWorks Counter Threat Unit™
DEFCON 16
August 8, 2008
The Information Security Experts
Copyright © 2008 SecureWorks, Inc. All rights reserved.
... | pdf |
S-shiro权限绕过
环境搭建
源码地址
使用github下载器即可下载
CVE-2020-1957
代码配置
认证设置
package org.javaboy.shirobasic;
import org.apache.shiro.mgt.SecurityManager;
import org.apache.shiro.spring.web.ShiroFilterFactoryBean;
import org.apache.shiro.web.mgt.DefaultWebSecurityManager;
import org.springframework.context.annotation.Bean;
import org.... | pdf |
Pushing a Camel through the
eye of the Needle!
[Funneling Data in and out of Protected Networks]
SensePost 2008
About:us
• SensePost
– Specialist Security firm based in South Africa;
– Customers all over the globe;
– Talks / Papers / Books
• {marco,haroon}@sensepost.com
– Spend most of our time breaking stuff
((thinkin... | pdf |
有幸受我师⽗鸡头的邀请,参加《鸡友故事会》,分享⼀些随笔,名字就叫四分之⼀⼈
⽣好了,我的四分之⼀。
从接触安全到现在其实已经很多年了,⼩时侯因为家⾥的电脑感染熊猫烧⾹病毒,⽼爸
修了很久,⽤尽了办法,从那个时候⼼⾥⾯就埋下了⼀个种⼦,后来拜师花钱买⼯具被骗,
我都经历过,那是⼀个阿D、明⼩⼦就可以吊打⼀⼤⽚⽹站的年代,可我却从来没有静下⼼
来,⼊⻔研究过原理,想想现在觉得蛮遗憾的,后来因为上学,放弃了很久,直到⼤学选择
专业,原来,⼼⾥的种⼦早就发了芽,违背了家⾥的意愿,最后⼀天⾃⼰偷偷修改了志愿的
顺序,放弃了家⾥安排的⼀些路,⾛上了web
的桥,我想,可能这就是⾃⼰的坚持吧,后
来和身边的⼩伙伴聊天,原来很多⼈⼼⾥都是怀着最初... | pdf |
Old-Skool Brought Back
A 1964 Modem Demo
K.C. Budd "phreakmonkey"
Taylor Banks "dr. kaos"
Modems, explained
Modulator / Demodulator
Modulator: Encodes a digital signal over an analog
representation
Demodulator: Reconstructs the digital signal from the
analog representation
Digital signal rate = bits per secon... | pdf |
Using Guided Missiles in Drivebys
Automatic browser
fingerprinting and
exploitation with the
Metasploit Framework:
Browser Autopwn
James Lee
2
Browser Autopwn
● Auxiliary module for the Metasploit Framework
● Fingerprints a client
● Determines what exploits might work
● Used to suck
● Now it doesn't
3
Outlin... | pdf |
S-SnakeYaml反序列化
SnakeYaml 基本使用
导包
序列化
MyClass 类
序列化测试
<dependency>
<groupId>org.yaml</groupId>
<artifactId>snakeyaml</artifactId>
<version>1.27</version>
</dependency>
package test;
public class Myclass {
String value;
public Myclass(String args){
value=args;
}
public String getValue... | pdf |
)
((
( (((
)()()
Alibaba Security
1
• Xiaolong Bai
• Alibaba Security Engineer
• Ph.D. graduated from Tsinghua University
• Published papers on the top 4: S&P, Usenix Security, CCS, NDSS
• Twitter, Weibo, Github: bxl1989
• Min (Spark) Zheng
• Alibaba Security Expert
• Ph.D. graduated from The CUHK
• Twitter@SparkZhen... | pdf |
使用静态代码检测微服务越权、未授权访问漏洞
作者:xsser
背景
现在的互联网很多都是来自阿里那一套,公司的整体的应用的架构都
是微服务,在微服务下基于 spring boot 之类的搭建了 一套开发体
系。在历史的发展下,微服务一般发展成这样的架构
安全做为一个属性,需要深入契合这个框架。为什么要讲微服务呢?
因为有统一的框架,可以通过静态代码去一些事情。外购的系统,不
能接入到微服务里的,我们没办法拿到源代码,也自然无法做静态代
码的事情。
难以解决的安全问题
当今在越来越完善的 SDLC 安全建设之下,很多安全问题已经逐步变
少,例如 SQLI、RCE 等,企业的安全建设在研发安全方面已经逐步完
善,常见的 WE... | pdf |
细数安卓APP那些远程攻击漏洞
z7sky & 行之 @360VulpeckerTeam
演讲者简介
weibo: @0xr0ot
@z7sky
z7sky & 行之
360VulpeckerTeam成员
研究方向:Android 系统安全和第三方APP 安全
概览
Mobile Pwn2Own 2013
Mobile Pwn2Own 2013上安全研究人员Pinkie Pie 利用chrome的两个0day漏洞,实现了远
程代码执行攻击,通过远程的web页面控制了系统。
随后,2014年日本安全研究人员Takeshi Terada 公布了Pwn2own 大赛exploit中intent协议漏
洞的利用方法。
影响面最大的远程攻击入... | pdf |
App
4
1CSRF
CSRF
2
3Cookie
Cookie
CookieXssCookieHttpOnlyXss
/Xss
Cookie
Xss
CookieHttpOnly
HtmlJslogin
location.href
location.href
AppWebViewUrl
AppWebViewDeepLinkAppWebView
Url
Url
AppJsBridgeWebViewNative
WebViewUrlNative
WebViewNativecall
WebView
AppApp
callHook
call
invokeNative()NativeenablePageJsBridge()
Native
... | pdf |
XCTF WP
AuthorNu1L Team
wpWP
NaNroot@nu1l.com 2.0
Nu1L
XCTF WP
lua
BLSMPS
babyjail
babybaes
hardstack
house of pig
hello arm
dngs2010
warmupcms
GSA
apk
Dubbo
space
lamaba
3*3
babydebug
easycms
spider
coturn
lua
local bit_band = bit.band
local bit_lshift = bit.lshift
local bit_rshift = bit.rshift
local math_floor = m... | pdf |
Firefox Extension Spyware
ant
Hacks in Taiwan Conference 2008
Outline
1. 不安全的 Firefox extension
2. Firefox extension spyware
3. Firefox 3 準備好了嗎?
不安全的 Firefox extension
● FormSpy
● 著名的 Firefox extension spyware
● 2006/07 發現
● 偽裝成合法的 NumberedLinks 0.9
● 竊取信用卡卡號、密碼、網路銀行 PIN 碼、
以及 ICQ, FTP, IMAP, POP3 的密碼。
● FFsniFF
... | pdf |
The Second Edition:
Remembering Who We Are
by Richard Thieme
Most of us live a large part of our lives skating on the ice of trivial essentials, the
necessary tasks that fill our waking days. We pause from time to time and look at the
etched images in the ice and think, this is the pattern of our lives, these images re... | pdf |
Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN
Feng Xiao, Ph.D. student at PennState, Cyber Security Lab
Jianwei Huang, Researcher at Wuhan University
Peng Liu, Professor at PennState, Cyber Security Lab
What’s SDN?
func
Virtual
Switch
func
func
Control
Plane
Data
Plane
Software-Defined Networking... | pdf |
大力出奇迹の
WiFi Hacking
杨
哲 (Longas)
ZerOne无线安全研究组织
ZerOne WirelessSec Research
SDR
LTE-‐FDD
RFID
WiFi
干扰
GSM
APPLICATION
SPEED INTERNET
能源
BLUETOOTH
ZigBee
OpenBSC
轨道交通
RESOURCE
LTE-‐FDD
Wireless
GPS
Infrared
NO
教育行业
车联网
GSM-‐R
LTE-‐HDD
民航
OpenBTS
电力行业
NFC
卫星通信
无线电
HackRF
交通
物联网
有源RFID
SOCIAL
无线电
BLOG
干扰
医疗
APPLICATI... | pdf |
Introducing nmrcOS
Inertia <inertia@nmrc.org>
Scope
Hackers
System administrators
Distro builders
Overall goals for the project
Stable, secure, trusted system
Intended users
Intended uses
History of the Project
Initial approach
Analysis of problems
Solution
How nmrcOS changed to solve these problems
Rationale for these... | pdf |
Windows Kernel Programming, Second Edition
Pavel Yosifovich
This book is for sale at http://leanpub.com/windowskernelprogrammingsecondedition
This version was published on 2022-01-22
This is a Leanpub book. Leanpub empowers authors and publishers with the Lean Publishing process.
Lean Publishing is the act of publishin... | pdf |
Momigari
Overview of the latest Windows OS kernel exploits
found in the wild
Boris Larin
@oct0xor
30-May-19
Anton Ivanov
@antonivanovm
$whoweare
Senior Malware Analyst (Heuristic Detection and Vulnerability Research Team)
Boris Larin
Head of Advanced Threats Research and Detection Team
Anton Ivanov
Twitter: @oct0xor
... | pdf |
DEFCON 17
July 31, 2009
R.W. Clark
United States v. Prochner, 417 F.3d 54 (D. Mass.
July 22, 2005)
Definition of Special Skills
Special skill - a skill not possessed by members of the
general public and usually requiring substantial
education, training or licensing.
Examples - pilots, lawyers, doctors, ... | pdf |
Click to edit Master subtitle style
Stamp Out Hash Corruption,
Crack All the Things!
Ryan Reynolds
Manager, Crowe Horwath
Pentester
Twitter: @reynoldsrb
Jonathan Claudius
SpiderLabs Security Researcher, Trustwave
Vulnerability Research
Twitter: @claudijd
What’s inside?
Windows Hash Extraction
Story of W... | pdf |
ssrfmap包含了ssrf的⼤部分⽤法,于是看了下ssrfmap的代码和检测的⼿法,再结合⼀些ssrf的trick,想着能不能
弄个⾃动化检测ssrf+利⽤的⼯具。
SSRF基础知识
ssrf出现最根本的原因,就是服务端使⽤了⽹络函数,⽽⼀般编程语⾔⽹络函数底层调⽤的都是 curl (当然,这个
要看具体的函数代码以及底层逻辑),curl⼜⽀持很多协议,所以ssrf就可以使⽤这些协议。
curl 是⼀个开源的⽤于数据传输的命令⾏⼯具与库,它使⽤ URL 语法格式,⽀持众多传输协议,包括:
HTTP、HTTPS、FTP、FTPS、GOPHER、TFTP、SCP、SFTP、SMB、TELNET、DICT、LDAP、LDAPS、
FIL... | pdf |
Bosses love Excel …
hackers too!
Juan Garrido “Silverhack”
Chema Alonso (@chemaalonso)
INFORMATICA64.COM
Who?
About
• Security Researchers
• Working at INFORMATICA64
• http://www.informatica64.com
What?
Terminal Applications
Why?
RDP
Citrix
Using Bing
Secure?
Verbosity
• Conf -files are too verbosity ... | pdf |
GNU Readline Library
Edition 6.1, for Readline Library Version 6.1.
October 2009
Chet Ramey, Case Western Reserve University
Brian Fox, Free Software Foundation
This manual describes the GNU Readline Library (version 6.1, 9 October 2009), a library
which aids in the consistency of user interface across discrete program... | pdf |
RESTing On Your Laurels Will Get
You Pwned
By Abraham Kang, Dinis Cruz, and
Alvaro Muñoz
Goals and Main Point
• Originally a 2 hour presentation so we will only be
focusing on identifying remote code execution and
data exfiltration vulnerabilities through REST APIs.
• Remember that a REST API is nothing more th... | pdf |
实战攻防演习之
紫队视角下的实战攻防演习组织
1
实战攻防演习之
紫队视角下的实战攻防演习组织
3
前 言
网络实战攻防演习,是新形势下关键信息系统网络
安全保护工作的重要组成部分。演习通常是以实际运
行的信息系统为保护目标,通过有监督的攻防对抗,
最大限度地模拟真实的网络攻击,以此来检验信息系
统的实际安全性和运维保障的实际有效性。
2016年以来,在国家监管机构的有力推动下,网
络实战攻防演习日益得到重视,演习范围越来越广,
演习周期越来越长,演习规模越来越大。国家有关部
门组织的全国性网络实战攻防演习从2016年仅有几家
参演单位,到2019年已扩展到上百家参演单位;同时
各省、各市、各行业的监管机构,也都在积极地筹备
... | pdf |
全生命周期开发安全的旧瓶与新酒
杨廷锋 @安恒信息
传统的S-SDLC
需求
设计
编码
测试
调研
安全需求
威胁建模
安全设计
安全编码
代码审计
设计用例
漏洞扫描
上线
安全测试
基线检查
运行
监测
应急响应
业务/开发团队
运维团队
传统的S-SDLC
需求
设计
编码
测试
上线
运行
SDLC
·
目前的S-SDLC服务以
文档为主,难以闭环
具体代码实现问题
从目前的服务来看在
落地过程中需要大量
的人力投入。但是内
容都是重复性工作,
没有时间深入挖掘漏
洞。
部分设计可能过于专
业,普通的需求经理
和开发人员无法驾驭
整个过程中产生大量
文档,无法迅速转换
成数据,进入到反馈
环。难以适应快速变
化的业务需求
... | pdf |
Finding useful and
embarrassing information
with Maltego
ANDREW MACPHERSON
ROELOF TEMMINGH
2017
© WAVESTONE
2
Dealing the Perfect hand
Shuffling memory blocks on z/OS
CICSPwn: tool to pentest CICS middleware on a Mainframe (Remote code
execution, access control bypass, etc.)
ELV.APF : script for escalating... | pdf |
Olympic-sized Trunking
http://www.signalharbor.com/ttt/01dec/index.html
1 of 8
6/18/2007 14:10
This article first appeared in the December 2001 issue of Monitoring Times.
OLYMPIC-SIZED TRUNKING
The 2002 Winter Olympic Games will begin on February 8, 2002, when
more than two weeks of athletic events will take place i... | pdf |
Beyond the MCSE:
Red Teaming Active Directory
Sean Metcalf (@Pyrotek3)
s e a n @ adsecurity . org
www.ADSecurity.org
About Me
Founder Trimarc, a security company.
Microsoft MCM (AD) & MVP
Speaker:
BSides, Shakacon, Black Hat, DEF CON, DerbyCon
Security Consultant / Researcher
Own & Operate ADSecurity.org
(Microsoft... | pdf |
Closing(Ceremonies(
25th(Anniversary(
Badges'Badges'Badges!'
And…is(that(the(line(for(Swag?!(
#badgelife(
Swag!'
Sold(out(again!(
Thank(you(from(Swag(to(Speaker(Goons!(
(
Transparency'
• More(informaCon(
about(DEF(CON(
departments(and(
what’s(going(on.(
Thanks'to'all'DEF'CON'Goons'
• AdministraCon(
• A(&(E(
• Artwo... | pdf |
0x0000
“We are not as strong as we think we are”
● Rich Mullins
<GHz or bust!
leveraging the power of the
chipcon 1111
(and RFCAT)
0x1000 – intro to <GHz
●
FCC Rules(title 47) parts 15 and 18 allocate and govern parts of the
RF spectrum for unlicensed ISM in the US (US adaptation of the ITU-
R 5.138, 5.150, and 5.280... | pdf |
Botfox – 基於瀏覽器與社交工程之殭屍網路研究
Botnet based on Browser and Social Engineering
動機
你知道嗎?
現行的安全防護不像你想像的那般健壯 ...
實驗證實,
『它』可以繞過目前所有常見的安全防護 ...
你相信嗎?
『它』的技術含量低到只有我用『它』 ...
你相信嗎?
『它』的建置成本很低很低 ...
你認同嗎?
大腦本身就是一種永遠可以被利用的 0day...
自我介紹
Ant
yftzeng@gmail.com
中研院
自由軟體授權
台灣駭客年會講師
Wow!USB 隨身碟防毒
Wow!ScanEngine 掃毒引擎
Wow!ARP 防護軟體
經濟學
混沌
複雜
... | pdf |
IoT 自动化安全平台体系建设
我是谁?从哪里来?要做什么?
l 我叫孟卓,ID:FengGou
l 来自小米 AIoT 安全实验室
l 保障米系智能产品的安全,赋能业务
团队任务如何达成?
l 消:消除隐患
l 防:防患于未燃
l 员:人员的成长
消除隐患
技术栈复杂
技术难
人才缺失
团队难
产品量激增
压力大
行业经验
无体系
面临严峻挑战
初步尝试
AIoT 消费级物联网产品安全基线
团队能力交叉
误入歧途 - 实验室变流水线工厂
二向箔
IoT自动化审计
的突破
业务构成 -- 抽丝剥茧
芯片
应用
模块
IPC
通信
用户
APP
IoT
智能联动
I2X
二维化
芯片接口
以太流量
无线流量
设备服务
控制协议
固件分... | pdf |
Ge#ng&Windows&to&Play&with&Itself5
A"Hacker’s"Guide"to"Windows"API"Abuse"
"
Brady"Bloxham"
Founder/Principal"Security"Consultant"
@silentbreaksec"
hCp://www.silentbreaksecurity.com"
hCp://www.blacksquirrel.io""
Background5
• Shorten"the"gap"between"
penetraHon"test"and"actual"aCack"
• Few"covert"persistence"tools"
• ... | pdf |
JUST WHAT THE DOCTOR ORDERED?
SCOTT ERVEN
Founder/President – SecMedic
@scotterven
SHAWN MERDINGER
Healthcare Security Researcher
Founder – MedSec LinkedIn Group
@medseclinkedin
1
Why Research Medical Devices?
• Patient Safety & Quality Patient Care
• To Equip Defenders In Assessing &
Protecting These Life... | pdf |
nat smashdemo
0x00
1. httpstls sessionid
2. sessionidpayload
3. sessionid
4.
5. sessionidtls
6. sessionid
7. tcp windowsessionid
0x01
1. scapytcpack
2. https://github.com/tlsfuzzer/tlslite-ng wendellpytls
tlslite/tlsconnection.pypip/ usr/local/lib/python3.8/dist-
packages/tlslite/tlsconnection.py
httpshttpspayl... | pdf |
Linux-Stack Based V2X Framework: SocketV2V
All You Need to Hack Connected Vehicles
Duncan Woodbury, Nicholas Haltmeyer
{p3n3troot0r@protonmail.com, ginsback@protonmail.com}
DEFCON 25: July 29, 2017
p3n3troot0r, ginsback
DEFCON: V2X
DEFCON 25: July 29, 2017
1 / 48
State of the World: (Semi)Autonomous Driving
Technologie... | pdf |
如何在3个月发现12个内
核信息泄露漏洞
陈唐晖 李龙 百度安全实验室
2019
目录
0. 我是谁
1. 认识漏洞
2. 研究漏洞
• 堆栈数据污染
• 检测漏洞技术
• CVE实例分析
3. 成果
4. 总结和思考
我是谁?
•
百度安全实验室资深安全研发工程师
•
百度杀毒、卫士主防设计者和负责人
•
十多年的windows内核研究和开发经验
•
深谙Rootkit技术,内功深厚,剑法独到
•
偶然涉入漏洞挖掘领域
Tanghui Chen
chenhui00530@163.com
什么是内核信息泄露漏洞?
Windows内核存在很多信息泄露漏洞,可能导致绕过KASLR或系统关
键信息泄露,攻击者可以利用它们得到一些重要信息,... | pdf |
Mac OS X Server
Network Services
Administration
For Version 10.3 or Later
034-2351_Cvr 9/12/03 10:26 AM Page 1
Apple Computer, Inc.
© 2003 Apple Computer, Inc. All rights reserved.
The owner or authorized user of a valid copy of Mac OS
X Server software may reproduce this publication for the
purpose of learnin... | pdf |
2022*CTF-Web
写在前⾯
XCTF国际赛系列⼀直不错,周末参与了下这次⽐赛,虽然没有Java但总体还是蛮有意思
这⾥没按题⽬顺序写,只是写了在我⼼中从上到下的排序,对有源码的题⽬做了备份
oh-my-lotto
链接: https://pan.baidu.com/s/1G53aYqIIbHGlowdWFhkKqw 提取码: oism
oh-my-lotto
⼼⽬中⽐较有趣的⼀题呗,重⽣之我是赌神
这是⼀个⾮预期,因为后⾯又上了个revenge,简单分析下题⽬,先看看docker内容,可以知
道⼤概的结构
version: "3"
services:
lotto:
build:
context: ... | pdf |
Analysis Experience of the suspended
EID Card
對「被暫停」的晶片身分證之分析經驗分享
Speaker : Shi-Cho Cha
主講人:查士朝
Dept. of Information Management, NTUST, Chairman and Professor
國立臺灣科技大學資訊管理系 教授兼系主任
Taiwan Information Security Center, Director
國立臺灣科技大學資通安全研究與教學中心主任
Background
背景
2
https://www.ris.gov.tw/apply-
idCard/app/idcard/IDCard... | pdf |
kernel32 export redirection
暂时忽略模式穿越细节知识
kernel32
IsProcessCritical
api-ms-win-core-processthreads-l1-1-2.IsProcessCritical
kernelbase!IsProcessCritical
NtQueryInformationProcess_0x1d_29
ntoskrnl
NtQueryInformationProcess真实实现体
IsProcessCritical
关于Critical Process基本情况参阅msdn
https://devblogs.microsoft.com/oldnewthing/201... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.