text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
微软AD如何定位域控
我在本地搭建了⼀个域
DC
192.168.1.200
名字为DCSERVER
client
192.168.1.151
DNS
loca.test.com
在搭建完域之后,先把域控启动后再启动客户机的机器的时候抓了⼀下包
在3-6条
1.client请求DNS服务器的ldap.tcp.dc._msdcs.loca.test.com的SRV记录
2.DNS服务器返回SRV⾥记录的服务、端⼝、 A记录。(192.168.1.200:389)
3.client拿到SRV⾥的值以后发送解析A记录的请求
4.DNS服务器返回了解析的域名+IP地址
第1.2步是从DNS SRV⾥拿数据
第3.4步是把拿到的srv... | pdf |
Hacking in a Foreign Language:
A Network Security Guide to Russia
Kenneth Geers
CISSP
DEFCON
13
Briefing Outline
1. Russia as a Threat
2. Russia as a Resource
3. Crossing Borders: Methodology
4. The International Political Scene
Russia as a Threat
Hacking: A Russian Perspective
• Excellent technical education
• Under... | pdf |
T /IA C
中 国 保 险 行 业 协 会 团 体 标 准
T/IAC XXXXX—2018
201X-XX-XX 发布 XXXX - XX - XX 实施
201X-XX-XX 印发
ICS 35.100.05, 35.240.40
L79, A11
保险行业研发运营一体化成熟度模型
DevOps maturity model for Internet application in insurance industry
(征求意见稿)
中国保险行业协会 发 布
T/IAC XXXXX—201X
I
目 ... | pdf |
做红队你需要学习“如何挖掘战壕”(三)
0x00 前言
在前两篇的文章中,我们先是分析了红队基础设施架构,并指出构成的3大元素:ip和域名、C2工具、
前置器,然后我们在第二篇文章中针对ip和域名的选择做了分享。这是第三篇,我们将是分析C2工具,
这儿的C2工具主要使用的是CobaltStrike。CobaltStrike功能强大,此处仅分析和我们红队基础设施相关
的部分。
0x01 Payload加载流程
为什么红队基础设施要讲Payload加载呢?因为这涉及到Payload分段加载和放置位置的问题。如果
Payload使用分段加载一定要注意远程下载Payload的时候。Payload不一定是放置在TeamServer服务
器上... | pdf |
Policy Backgrounder
Wireless Public Safety Data Networks
Operating on Unlicensed Airwaves:
Overview and Profiles
By Naveen Lakshmipathy∗
Updated – March 2007
From the firefighters who died on 9/11 to the rescue workers struggling to help victims of Hurricane
Katrina, recent crises have demonstrated that the ab... | pdf |
electron安全简记
0x01-electron启动
通常 electron 项⽬的应⽤⼊⼝是 main.js ,也可以 package.json 中配置 npm start 脚本,它
以 package.json 中的 main 属性寻找⼊⼝⽂件
electron .
main.js 的⼤致逻辑就是调⽤ BrowserWindow 启动窗体,在此之前执⾏ preload.js 预加载⼀些
ipc函数接⼝、设置环境变量等
# main.js
const { app, BrowserWindow } = require('electron')
const path = require('path')
function crea... | pdf |
Cookie之困
zootrope
清华大学网络与信息安全实验室NISL
走 马
Cookies
Lack
Integrity:
Real-‐World
Implications
Xiaofeng Zheng,
Jian Jiang,
Jinjin Liang,
Haixin Duan,
Shuo Chen,
Tao
Wan
and
Nicholas
Weaver
USENIX
Security
'15
https://www.usenix.org/conference/usenixsecurity15/technical-‐sessions/pr... | pdf |
Auditing 6LoWPAN Networks
Using Standard Penetration Testing Tools
Adam Reziouk
Airbus Defence and Space
adam.reziouk@airbus.com
Arnaud Lebrun
Airbus Defence and Space
arnaud.lebrun@airbus.com
Jonathan-Christofer Demay
Airbus Defence and Space
jcdemay@airbus.com
ABSTRACT
The Internet of Things is expected to... | pdf |
Malicious Encrypted Traffic Detection
HITCON CMT 2018
Aragorn
aragorn51882@gmail.com
About Me
•
Aragorn /
•
Master of National Taiwan university
•
Security consultant in Somewhere
•
NTUCSA ()
•
Malware AnalysisOperating Facebook fan page
Packet ForensicPenetration Test
•
Speaker
•
2016 TANET Network Technology Pro... | pdf |
#BHUSA @BlackHatEvents
Ghost in the Wireless,
iwlwifi Edition
Nicolas Iooss, Gabriel Campana
#BHUSA @BlackHatEvents
Information Classification: General
Context
-
Up-to-date Ubuntu 18.04 LTS
-
HTTP server
-
Android smartphone
2
#BHUSA @BlackHatEvents
Information Classification: General
Context
# dmesg
iwlwifi 0000... | pdf |
SSLstrip – hijacking SSH Sessions
Bowne
Page 1 of 5
What You Need for This Project
A computer running Linux to be the Attacker (I wrote the instructions on a Ubuntu 8.04 virtual
machine).
A second computer running any OS to be the Target. I used my Windows 7 host machine as the
target.
Goal
The Attacker w... | pdf |
Overview
●
Propaganda definition and short history
●
Propaganda fundamentals
●
Propaganda in the 4th estate (mainstream media)
●
Propaganda in 21st century (rise of the machines)
●
Fighting back
○
Hardening the human hardware and software
○
Using our machines to help against the fight
●
Conclusion remarks
●
References... | pdf |
Who we are
● bughardy
(aka Matteo Beccaro)
bughardy@cryptolab.net
Italian student with passion of
IT, networking and pentesting.
In 2013 ended his studies in
high school and apply for
Politecnico of Turin at Computer
Engineering.
●
Eagle1753
(aka Matteo Collura)
eagle1753@onenetbeyond.org
Italian student, applied... | pdf |
一、Web
Web
Web
Web 服务器安全
PHP 其实不过是 Web 服务器的一个模块功能,所以首先要保证 Web 服务器的安全。当然
Web 服务器要安全又必须是先保证系统安全,这样就扯远了, 无穷无尽。PHP 可以和各种
Web 服务器结合,这里也只讨论 Apache。非常建议以 chroot 方式安装启动 Apache,这样即
使 Apache 和 PHP 及其脚本出现漏洞,受影响的也只有这个禁锢的系统,不会危害实际系
统。但是使用 chroot 的 Apache 后,给应用也会带来一定的麻烦,比如连接 mysql 时必须用
127.0.0.1地址使用 tcp 连接而不能用 localhost 实现 socket 连接,... | pdf |
NTFS transactions的研究
之前看到的transacted_hollowing(https://github.com/hasherezade/transacted_hollowing) 和 最近blackhat上
的⼀个议题rope,都⽤到了NTFS事务来达到隐藏⽂件免杀的效果,所以就学习了⼀下NTFS transactions的⼀些操
作。
介绍
NTFS transactions
https://docs.microsoft.com/en-us/windows/win32/fileio/about-transactional-ntfs
Transactional NTFS (TxF) 是在 Windows Vist... | pdf |
T
e
c
h
n
i
c
a
l
A
n
a
l
y
s
i
s
o
f
A
c
c
e
s
s
T
o
k
e
n
T
h
e
f
t
a
n
d
M
a
n
i
p
u
l
a
t
i
o
n
REPORT
Technical Analysis of Access Token Theft and Manipulation
2
REPORT
Table of Contents
3
Introduction
5
Access Token Creation and User Account Control
7
Access Token Manipulation
8
Looking at the Code: T... | pdf |
Not So Super Notes
How Well Does US Dollar Note Security Prevent Counterfeiting?
US Constitution: Article 1, Section 8
1922
1929
1934
1950
1990
2003 | pdf |
Mass$Scanning$the$Internet$
Tips,$tricks,$results$
$
Robert$Graham$
Paul$McMillan$
Dan$Tentler$
0.0.0.0/0$
Why$scan$the$Internet$(defensive)$
• How$many$systems$are$vulnerable$to$
Heartbleed?$
• How$many$systems$can$be$used$for$NTP$
amplificaKon?$
• How$many$systems$vulnerable$to$DLLink$
router$vulnerability/$
• Sur... | pdf |
-
1
6
082
1
2
3
04
0
01
S
U
LR
X
MQS
Q
S
X L
I
X
X
1)*)
*.*(312*3( ,*3*1)*)
1)*) 1*.*(31.*,*3*
*.*(312*3( ,*3*1)*) 1*.*(
31.*,*3*
::
=
CA:3(1A
E
11.::1.::1.1.::11.1.
:31()',2:.:1 .: =41:1.::1
1A .1=414111.1
E
11.::1.::1.1.::11.1 .1
=414111.1.:31()',2:
.:1 .: =41:1.::1
TOR_a
JW 'C
'.)(=' =
' '.
JW'C
LMOW... | pdf |
Marisa Fagan
InfoSec Mentors Project
DEF CON 2010
The InfoSec Mentors
Project
• Started May 2010
• 51 matches made so far
• Based on volunteer interests and exp
• “To introduce people in the Information
Security Community to people they might
not otherwise get to meet.”
• World-wide participation
What makes a good
... | pdf |
Run ChatGLM-6B
Finetune your ChatGLM from scratch!
Run ChatGLM-6B
2023/05/21
1
TOC
GLM
Fintune
Prerequisite: Mixed Precision, ZeRO
P-tuning
Full Parameter
LoRA
Deploy with Gradio
Run ChatGLM-6B
2
GLM: Pretraining
Run ChatGLM-6B
3
OpenSource GLM Series
GLM Github Paper
GLM-130B Github Paper
ChatGLM-6B Github Blog
can be... | pdf |
CVE-2022-26134 Confluence Server Data
Center OGNL RCE
环境
windows server 2016 + Confluence 7.15.1
下载exe然后直接下一步下一步就行了。
web在8090端口,8000是rmi端口。
安装试用版,输入授权码即可。
然后配置数据库
需要额外装一个pgsql,创建一个名为confluence的数据库。
接着选示范站点,然后选在confluence中管理用户。
配置管理员账号密码,然后就安装完成了。
分析
官方通告上写了用新的xwork-1.0.3-atlassian-10.jar替换老的xwork-1.0.3-atlassian-8.jar
... | pdf |
National Security Agency
Cybersecurity and Infrastructure Security Agency
Cybersecurity Technical Report
Kubernetes Hardening Guidance
August 2021
S/N U/OO/168286-21
PP-21-1104
Version 1.0
U/OO/168286-21 | PP-21-1104 | August 2021 Ver. 1.0
ii
National
Security
Agency
Cybersecurity
and Infrastructure
Secu... | pdf |
Post-quantum cryptography
Daniel J. Bernstein & Tanja Lange
University of Illinois at Chicago; Ruhr University Bochum & Technische Universiteit Eindhoven
12 September 2020
Cryptography
Sender
“Alice”
Receiver
“Bob”
Tsai Ing-Wen picture credit: By 總統府, Attribution, Wikimedia. Donald Trump picture credit: By Shealah Crai... | pdf |
2022UIUCTF-Spoink(pebble最新模板注⼊)
写在前⾯
之前周末忙着强⽹杯,对这道题只做了⼀半就搁置下来了,最后卡在绕过最新pebble模板引擎
RCE那⾥,今天抽空来继续进⾏剩下的分析,正好题⽬⾥有⼏个在现实场景当中能⽤的trick顺
便也分享了
题⽬环境分析
也是挺不错题⽬直接给了docker环境便于本地搭建,同时设置了权限需要执⾏./getflag才能获
取获得flag
FROM openjdk:18-slim-bullseye
RUN mkdir /usr/src/app
WORKDIR /usr/src/app
# create user
RUN groupadd chalusr
RUN useradd... | pdf |
“Get Off of My Cloud”:
Cloud Credential
Compromise and Exposure
Ben Feinstein & Jeff Jarmoc
Dell SecureWorks Counter Threat Unit℠
2
The Public Cloud
3
Brief Introduction to the Amazon Cloud
• First, some terminology and definitions…
• Amazon Web Services (AWS)
• Elastic Compute Cloud (EC2)
• Amazon Machine Image (AMI)... | pdf |
WarBallooning – Kismet Wireless
Eye in the Sky
Presented by:
Rick Hill
DEFCON 16
Sunday, Aug. 10
WarBallooning Concept
Thanks for coming!
WarDriving limited visibility in the city
$4.00 / Gallon gas means driving less
Balloon – better platform than rocket
Perfect for covering 5 - 10 mile Urban
Areas
Questions dur... | pdf |
USB Attack to Decrypt Wi-Fi
Communications
Presented by: Jeremy Dorrough
Disclaimer
Opinions expressed in this presentation are
my own. I am speaking for myself, not
Genworth, nor anyone else.
Image Source: iwishisaidthat.com
About Me
• 10+ years in IT Security
industry
• Worked in defense,
utility & financial
sect... | pdf |
Hackers Hiring Hackers: How to
Do Things Better
Tottenkoph
IrishMASMS
Disclaimer
This presentation is intended for the attendees and may contain information that is
privileged or unsuitable for overly sensitive persons with low self-esteem, no sense of
humour, or irrational religious/political beliefs. Those of you ... | pdf |
Machine
Learning
Protect against
tomorrow’s
threats
Adversarial
Machine Learning
And Several
Countermeasures
Trend Micro
ch0upi
miaoski
7 Dec 2017
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
ch0upi
•
Staff engineer in Trend Micro
•
Mac... | pdf |
ICS 35.240.40
CCS A 11
JR
中 华 人 民 共 和 国 金 融 行 业 标 准
JR/T 0196—2020
多方安全计算金融应用技术规范
Secure multi-party computation financial application technical specification
2020 - 11 - 24 发布
2020 - 11 -24 实施
中国人民银行
发 布
JR/T 0196—2020
I
目 次
前言 ............................................................................ | pdf |
KCon
KCon
重现速8僵尸车队
蓝牙4.0 BLE协议的进攻
杨 晋
ThreatBook
曾仸职于 Microsoft,COMODO,Qihoo360
邮箱:yangjin@threatbook.cn
Linkedin:Jin Yang
PART 01 BLE是什么?
PART 02 协议技术特点
PART 03 寻找身边的设备
PART 04 如何嗅探BLE协议数据
PART 05 协议分析与攻击方式
目录
CONTENTS
01 BLE是什么?
BLE是什么?
- Bluetooth 4.0 协议家族 (2012)... | pdf |
10505 Judicial Drive, Suite 201 | Fairfax, VA 22030 | V: 703.352.2982 | F: 203.286.2533 | sales@kryptowire.com
Vulnerable Out of the Box:
An Evaluation of Android Carrier Devices
Abstract
Pre-installed apps and firmware pose a risk due to vulnerabilities that can be pre-positioned on a device,
rendering the devi... | pdf |
WEAPONIZING HYPERVISORS
TO FIGHT & BEAT
CAR & MEDICAL DEVICE
ATTACKS
Ali Islam – CEO Numen Inc
Dan Regalado – DanuX – CTO Numen Inc
AGENDA
Basic&Concepts&
Q&A&
Embedded&Environment&
Demo&–&Attacks&&&Use&cases&
Hypervisors & Strong Trending
Confidential
Agent-less vs Agent (AV)
• Sophisticated Invisibili... | pdf |
The Token Menace
SSO Wars
This Photo by Unknown Author is licensed under CC BY
> whoarewe
§
Alvaro Muñoz
Security Researcher with Micro Focus Fortify team
@Pwntester
§
Oleksandr Mirosh
Security Researcher with Micro Focus Fortify team
@OlekMirosh
Agenda
• Introduction
• Delegated Authentication
• Authentication Tokens
... | pdf |
Building Absurd
Christmas Light Shows
Computer Controlled Lights
<Video of light show>
Basic Elements of a Light Show
• LEDs
• Power Supplies
• Waterproof cases
• Cabling
• Pixel Controllers
• Sequencing Software
• Show Controller + Software
• FM Transmitter
+Zip Ties….
Lots and lots of zip ties
Traditional Mini-Ligh... | pdf |
Anti-RE Techniques in DRM Code
Jan Newger
Seminar Advanced Exploitation Techniques
RWTH Aachen, Germany
jan.newger@rwth-aachen.de
ABSTRACT
In order to prevent music from being copied among con-
sumers, content providers often use DRM systems to pro-
tect their music files. This document describes the approach
taken whil... | pdf |
Cool stuff learned from the
Department of Defense
Cyber Crime Digital Forensic
Challenge (2006)
David C. Smith, CISSP CISM
Georgetown University
with contributions from Mike McDonanld, The
Professionals” (3rd Place Team, Florida State
University)
A little bit about me..
Information Security Professional, in
IT over 1... | pdf |
app="LF-"
<?php
class ping extends spController
{
function main()
{
$host = $_GET['host'];
$num = (int) $_GET['num'];
$host = str_replace("|", "", $host);
$host = str_replace(" ", "", $host);
$host = str_replace("&", "", $host);
$host = str_replace(">", "", $host... | pdf |
Outline
Background
Meddle Framework
XRDP Fuzzing
DeviceIoControl
Sandbox
Conclusion
Meddle: Framework for piggy-back fuzzing and
tool development
Geo↵ McDonald
glmcdona@gmail.com, unaffiliated presentation
August 8, 2014
DEF CON 22
Geo↵McDonald
glmcdona@gmail.com, unaffiliated presentation
Meddle: Framework for piggy-back ... | pdf |
5space WriteUp By Nu1L
5space WriteUp By Nu1L
Pwn
takeeasy
easyfp
easybuf
Reverse
ddl
re1
Web
easyupload
easysqli
codereview
Misc
D1fFeReNcE_F@1G
Can_you_be_rich
Crypto
Chaotic
babystream
创新⽅向
Love
trinewbee
Pwn
takeeasy
⽩给溢出,直接溢出打
easyfp
bye的时候stream可以uaf, 打IO来泄漏然后打free_hook
from pwn import *
# s = process("./pwn",asl... | pdf |
Screw Being A Pentester -
When I Grow Up I Want To Be A
Bug Bounty Hunter
Jake Kouns
@jkouns
Chief Information Security Officer (CISO)
Risk Based Security
Carsten Eiram
@CarstenEiram
Chief Research Officer (CRO)
Risk Based Security
N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y
N O T J... | pdf |
Betrayed by the keyboard
How what you type can give you away
Matt Wixey
Research Lead, PwC UK Cyber Security
www.pwc.com
Building a secure
digital society.
PwC │ 2
Disclaimer
•
The views and opinions expressed here are not
necessarily those of PwC
•
This content is presented for educational purposes only
•
What this ... | pdf |
⿊黑⽆无⽌止境 — 那些年我们绕过的锁
Kevin2600
议程:
. 关于锁的那点事
. 开锁@数字时代
. 开锁@⽆无线时代
. 开锁@物联⺴⽹网时代 I
. 开锁@物联⺴⽹网时代 II
锁的起源:
历史上最早出现的锁,由⽊木头制成.可以追溯到4000年前
的古埃及.
在随后的罗⻢马世纪, ⼜又出现了由⾦金银铜等材质制成的锁.
这在当时是财富及⾝身份的象征.
在中国仰韶⽂文化遗址中出现过早期的⽊木质锁. 汉朝时出现
了俗称三簧锁的铜质簧⽚片锁,可以说是中国锁具发展历上
的⼀一次质的⻜飞越.
锁的类型:
锁的结构:
起始
错误
正确
开锁
开锁@⽆无线时代
Samsung: Ezon RFID ⻔门锁
分析ing:
Prox... | pdf |
Fuzzing on train:
AI制导PDF文件生成技术的探索之旅
邹权臣
中国信息安全测评中心博士后
马金鑫
中国信息安全测评中心副研究员
个人简介
马金鑫
中国信息安全测评中心 副研究员
北京邮电大学硕士生导师
研究方向:软件安全、漏洞分析
主持多项国家、省部级科研项目,发表20余篇学术论文,获
得软件著作权5项,发明专利2项,曾发现多个0Day漏洞。
邹权臣
中国信息安全测评中心 博士后
研究方向:自动化漏洞分析
负责、参与多项国家、省部级科研项目,发表
多篇学术论文。
majinxin2003@126.com
zouquanchen@126.com
目录
研究背景
方案设计
实验分析
结论与展望
研究背景
高结构化样... | pdf |
S-log4j2RCE
说明
log4j2 与 log4j 属于不同项目,且二者的配置方式也存在差异, log4j 是通过
log4j.properties 来进行配置的,而 log4j2 是通过 xml 文件来进行配置的。
环境搭建
pom.xml
测试代码
在众多测试代码当中大家都是利用 Logger.error() 来触发漏洞但,根据 log4j2 的默认漏洞级别
trace<debug<info<warn<error<fatal , error 和 fatal 两个级别的日志会打印到控制台,同
时也会触发漏洞,当然还可以通过配置文件获取动态级别两个方式调整。
1. 默认缺省配置
<dependencies>
<depe... | pdf |
PHISHING WITHOUT FAILURE AND
FRUSTRATION
or “How I learned to stop worrying and love the layer 8”
Unabridged Version
Jay Beale
CTO, InGuardians
1
Larry Pesce
Director of Research, InGuardians
"""
▪ As white hats, phishing should be just as easy as for black hats, right?
• Write a crafty e-mail that directs readers t... | pdf |
The Present & Future of Xprobe2
Founder
O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P
© 2 0 0 0 – 2 0 0 3 T H E S Y S – S E C U R I T Y G R O U P
Revolutionizing Active Operating
System Fingerprinting
Ofir Arkin
ofir@sys-security.com
O F I R A R K I N, F O U N D E R, ... | pdf |
© Copyright 2019 NCC Group
An NCC Group Publication
Common Security Issues in Financially-
Oriented Web Applications
A guideline for penetration testers
Prepared by:
Soroush Dalili
Version 2.0
NCC Group | Page 2
© Copyright 2019 NCC Group
Contents
1
Introduction ................................................ | pdf |
.NET Framework Rootkits – Backdoors Inside Your Framework
1
.NET Framework Rootkits:
Backdoors inside your
Framework
March, 2009 (Revised)
Erez Metula
ErezMetula@2bsecure.co.il
ErezMetula@gmail.com
.NET Framework Rootkits – Backdoors Inside Your Framework
2
Table of content
TABLE OF CONTENT ..................... | pdf |
Kubernetes Privilege Escalation:
Container Escape == Cluster Admin?
Yuval Avrahami & Shaul Ben Hai, Palo Alto Networks
#BHUSA @BlackHatEvents
whoami
● Cloud security researchers @PANW
● Vulnerability research in the cloud
○
Azurescape
● Threat hunting in the cloud
○
Slioscape
Kubernetes Privilege Escalation:
Containe... | pdf |
Practical Tips for Playing Hide and Seek with Linux EDRs
DEFCON 27
@Op_Nomad
Zombie Ant Farm
!
!
!
!
$ who –m
Dimitry Snezhkov
• Technologist
• Member of the X-Force Red Team
ü
hacking
ü
tools, research
ü
all things offensive
@Op_Nomad
github.com/dsnezhkov
Linux Offense: The Context
Linux matters
• It runs 90% of clo... | pdf |
IOActive, Inc. Copyright ©2014. All Rights Reserved.
Hacking Traffic Control Systems
(U.S, UK, Australia, France, etc.)
Cesar Cerrudo
@cesarcer
CTO, IOActive Labs
IOActive, Inc. Copyright ©2014. All Rights Reserved.
About Me
•
Hacker, vulnerability researcher, created novel exploitation
techniques, dozens ... | pdf |
The core problem with authentication
and how we can overcome it
Jason M. Pittman
We’re goin’ deep, son!
Deep philosophically that is…
Tools, who needs ‘em
8.75 of 10 zombies do recommend brains
anyway…
Modern (current) authentication
Passwords specifically
Extends to all types however
... | pdf |
DefCon 19 august 4th-7th, 2011 Rio Hotel, Las Vegas
Key Impressioning (working title, I guess there’s still time to change this?)
Jos Weyers
H. Edward Tickel Jr.
FBI’s go-to NDE guy in the late 70’s
http://www.tresoroeffnung.de/buch.php
THE #1 reference work
Impressioning by Oliver Diederichsen
How long ... | pdf |
Real-time Bluetooth Device Detection
with Blue Hydra
Granolocks
Zero_Chaos
● Pwnie Express
● Focused on device detection
● Enjoys long walks in the woods
● Travel to exotic locations
● Draws pretty weird pictures
● Existential AF
● Hacking the planet
● Gives great back rubs
Granolocks Narcissus
Zero_Chaos Narcissus
● ... | pdf |
Reflective Injection Detection –
RID.py
Or How I slapped together some python c-types
in a week to do what defensive vendors aren't
incorporating into main-line products
Or Bringing the Sexy Back - A defensive tool that
doesn't fail quite as hard as it could
Pre-talk notes
● I don't own any of the artwork. It's al... | pdf |
Searching for Malware:
A Review of Attackers’ Use of
Search Engines to Lure Victims
Paul Judge
David Maynor
The Problem
Sites like Twitter, Yahoo!, Bing and Google all
have some form of popular/trending search
terms.
These terms can be co‐opted by markets and
malware
authors to point to their own wares.
The sites ... | pdf |
Sentient Storage:
Do SSDs have a mind of their own?
Tom Kopchak :: @tomkopchak
About me
Why we're here
• Current forensic practices for
working with hard drives are
well-defined
• Solid state drives behave
differently and present new
challenges
• This presentation will explore
these differences in detail
Fore... | pdf |
Paz Hameiri
TEMPEST radio
station
About myself
◼ System engineer
◼ M.Sc. in Electro-Optical Engineering
◼ Six years of experience with telecommunication systems design and
circuits
DEF CON 25 / Inbar and Eden / From "One Country - One Floppy" to "Startup Nation" - the story of the
early days of the Israeli hacking c... | pdf |
1
清华大学NISL实验室,
Blue-Lotus黑客竞赛战队
@清华诸葛建伟
知道Web安全论坛KCON交流
Blue-Lotus战队
Defcon 20 CTF资格赛回顾
Defcon CTF竞赛
2
o 全球最有影响力的黑客竞赛 – “黑客奥运会”
n 1996年开始,已成功举办16届
n 组织者:DDTek(2009-Present)
o Defcon 20 CTF
n Quals – 资格赛
o Challenges Solving
o 10支队 + 10支其他CTF冠军队 晋级
n Deathmatch – 拉斯维加斯 淘汰赛
n Final – 决赛 ... | pdf |
Le’go My Stego
Le’go My Stego
Steganography
Steganography
in the post Web 2.0 World
in the post Web 2.0 World
James Shewmaker © 2008
James Shewmaker © 2008
Defcon 0x10
Defcon 0x10
Today’s Agenda
Today’s Agenda
Today’s Agenda
Today’s Agenda
Background: Classical Stego
Background: Classical Stego
Digital Stego Te... | pdf |
Friday the 13th: JSON Attacks
Alvaro Muñoz (@pwntester)
Oleksandr Mirosh
HPE Security
> whoami
• Alvaro Muñoz
• Security Research with HPE
• Int3pids CTF player
• @pwntester
• Oleksandr Mirosh
• Security Research with HPE
Introduction
• 2016 was the year of Java Deserialization apocalypse
• Known vector since 2011
• Pr... | pdf |
T1028: WinRM for Lateral Movement
参考:
内网横移之WinRM
Powershell Remoting
Lateral Movement – WinRM
WinRM(Windows Remote Management是WS-Management Protocol Microsoft 实现(具体体现为
Win RM 服务)。
这个协议有没有其他的实现?有,比如 openwsman,也就说在在linux也可以通过该协议管理
Windows(跨平台)。
Ansible 通过该协议进行远程管理Windows
配置和必要信息
参考:Installation and Configuration for Win... | pdf |
A Picture is Worth a Thousand Words, Literally:
Deep Neural Networks for Social Stego
Philip Tully and Michael T. Raggo
Abstract and Introduction
Images, videos and other digital media provide a convenient and expressive way to
communicate through social networks. But such broadcastable and information-rich conten... | pdf |
VDLDS
–
ALL
YOUR
VOICE
ARE
BELONG
TO
US
Ganesh
Devarajan
&
Don
LeBert
Agenda
Introduction
Problem
Background
Scenarios
Architecture
Server
Model
Distributed
Client
server
model
Demo
Future
Work
Introduction
Ganesh
Devarajan
... | pdf |
An ACE Up the Sleeve
Designing Active Directory DACL Backdoors
Andy Robbins and Will Schroeder
SpecterOps
@_wald0
▪ ...
▪ Job: Adversary Resilience Lead at
SpecterOps
▪ Co-founder/developer: BloodHound
▪ Trainer: BlackHat 2016
▪ Presenter: DEF CON, DerbyCon, ekoparty,
Paranoia, ISSA Intl, ISC2 World Congress,
vari... | pdf |
The Proxy Era of
Microsoft Exchange Server
Orange Tsai
Orange Tsai
• Orange Tsai, focusing on Web and Application 0-day research
• Principal Security Researcher of DEVCORE
• Captain of HITCON CTF Team
• Speaker of Security Conferences
• Black Hat USA & ASIA / DEFCON / HITB / HITCON …
• Selected Awards and Honors:
• 20... | pdf |
Return to sender
Detecting kernel exploits with eBPF
Guillaume Fournier
August 2022
About me
● Cloud Workload Security (CWS)
● Leverage eBPF to detect threats
● Embedded in the Datadog Agent
Blackhat 2022
Guillaume Fournier
Senior Security Engineer @Datadog
gui774ume.fournier@gmail.com
2
● Context and threat model
● Wh... | pdf |
WriteUp By Nu1L
Author:Nu1L
WriteUp By Nu1L
PWN
wind_farm_panel
shell
Misc
babymaze2_beta
babymaze1
WEB
hello_php
ezcms
easyci
Crypto
babyLWE
digits_missing
RE
friendlyRE
PWN
wind_farm_panel
free,
Orange+FSOP
from pwn import *
# s = process("./pwn")
s = remote("182.92.203.154","28452")
def add(idx,size,buf):
s.sen... | pdf |
EL3 Tour: Get The Ultimate Privilege
of Android Phone
Guanxing Wen
2019
Bio
✤ Senior Security Researcher at Pangu
✤ Exploitation and Reversing Engineering
✤ Recently
✤ Firmware, Bootloader, Kernel
✤ Previously
✤ Adobe Flash
Agenda
✤ ARMv8 Privilege mode
✤ Post-startup architecture of Huawei P20
✤ Hunt EL3 Vulne... | pdf |
The Dark Side of Winsock - Lecture Notes
(C) 2005 Jonathan Levin, All Rights Reserved
1
The Dark Side of Winsock
By Jonathan Levin
DefCon XIII, Las Vegas
Http://www.securicy.net/Talks/dc-spi.pdf
The Dark Side of Winsock - Lecture Notes
(C) 2005 Jonathan Levin, All Rights Reserved
2
Introduction & Nomenclature
You proba... | pdf |
S U B O R N E R
A Windows Bribery for Invisible Persistence
Sebastián Castro
@r4wd3r
R 4 W S E C . C O M
Singapore
August 25 - 26,
2022
R 4 W S E C . C O M
@r4wd3r
S U B O R N E R
W H O A M I
Username
r4wd3r
Full User name
Sebastián Castro
Comment
Infosec nerd, stuff breaker ~10y
User’s comment
Terrible at ... | pdf |
From Dvr to See
Exploit of IoT Device
0K5y
Nobody@360GearTeam
1559113201 Date
Larryxi
Nobody@360GearTeam
What’s time
0x00 目录
0x01 前言闲谈
0x02 漏洞挖掘
0x03 环境调试
0x04 漏洞利用
0x05 总结反思
0x01 前言闲谈
有朋自远方来
IoT 四层模型
IoT 现状问题
IoT 利用架构
IoT 攻击思维
0x02 漏洞挖掘
环境前瞻
获取固件的十种方法
软件层面
硬件层面
前瞻发现
`etc/init.d/S99` 中注释掉了`telnetd`
`/etc/passwd` 中存在硬... | pdf |
應用密碼學入門
@HITCON CMT 2018
我是誰
●
Allen Chou
●
我好像沒什麼值得介紹的
●
https://allenchou.cc/
●
GitHub: s3131212
●
s3131212@gmail.com
●
FB: s3131212
背景知識
密碼學是什麼
●
不是研究怎麼設安全的密碼
●
不是教你怎麼破解別人 Facebook
●
你不會因為知道密碼學在幹嘛就變成天才駭客
●
很多數學
○
我是說,真的很多
○
不過我並沒有打算講很多數學理論
○
我自己數學也不好 QQ
●
如果已經沒興趣了,可以趕快離開我不會介意
密碼學是什麼
●
古典密碼學
○
資料保密、傳遞
○
密碼破譯
●
現代密碼學
... | pdf |
Urban Exploration
- A Hacker’s View
phreakmonkey (K.C.)
mutantMandias (Mandias)
phreakmonkey.com
Background:
What is Urban Exploration?
Urban Exploration is the practice of discovering, exploring,
and often photographing the more “off-beat” areas of
human civilization.
“This hobby consists of a lot more th... | pdf |
It WISN't me, attacking industrial wireless mesh networks
DEF CON 26
Introduction
Erwin Paternotte
Lead security consultant
@stokedsecurity
Mattijs van Ommeren
Principal security consultant
@alcyonsecurity
15.7.2018
2
Previous research
WirelessHART A Security Analysis, Max Duijsens, Master (2015) -
https://pure.... | pdf |
The Hackers Guide to Search and Arrest.
by Steve Dunker J.D.
I. When Can an Officer Legally “Stop” an individual?
A. Voluntary Stops
It is legal for an Officer at any time to “Ask” a person to stop and talk.
- A person has the right to say “yes” or “no”.
B. Investigative Stops
-
Reasonable Suspicion required.
C. Adm... | pdf |
代 码 混 淆 研 究 的 新 方 向
程瑞
西安交通大学软件学院
南子龙 西安交通大学微电子学院
范铭
西安交通大学网安学院
# 我们是谁
• 程瑞
西安交通大学软件工程学院大二
智能网络与网络安全教育部重点实验室实习生
研究方向包括程序分析、模糊测试、恶意软件检测、IoT
• 南子龙
西安交通大学微电子学院大四
智能网络与网安安全教育部重点实验室实习生
研究方向包括IoT安全、密码学应用、量子器件、同态芯片
• 范铭
西安交通大学网络空间安全学院副教授
研究方向包括可解释性AI技术、AI安全、移动软件安全
# 目录
• PART I(程瑞)
• 引言:代码混淆的定义以及应用
• 现状:研究现状
• 动机:已有研究... | pdf |
Could Googling Take Down A President,
a Prime Minister, or an Average Citizen?
Gregory Conti
United States Military Academy
West Point, New York
gregory.conti@usma.edu
Outline
• Information Disclosure
– Computing Platform
– Network Eavesdropping
– Destination Websites
• Vectors
• Cross-site Tracking
– Advertising and ... | pdf |
用Golang编写 dll劫持的一些坑 (3)
源于知识星球的一个想法,利用一些已知的dll劫持的程序作为"模板",自动生成白加黑的程序。
我想用Golang编写劫持的dll,这样也方便可以做成在线平台。
我们的目标不是让它弹一个信息框,而是让它执行shellcode,并且使用一些hook技术保证白程序只加
载一个dll的同时不和后续的代码冲突 这需要我们编写一个通用的dll白加黑的劫持模板,当然dll加载模
式不同劫持的方式也不同。
我找到是vscode它的更新程序,也有它官方的签名
被劫持的dll在 inno_updater.exe 的导入表中,这种劫持可以叫它 pre-load ,我只用实现它的5个函数
就可以了。
因为我想... | pdf |
HID CARD
TECHNOLOGIES
HID CARD SERVICES
CARD APPLICATIONS
proximity
(read/write contactless
smart chip)
magnetic stripe
contact smart chip
multi-technology cards
Wiegand Swipe
custom configuration
complete cards
personalization
anti-counterfeiting
card management
custom artwork
photo ID badging
programm... | pdf |
ACL Steganography:
Permissions to Hide Your Porn
by Michael Perklin
Michael Perklin
Corporate Investigator
Digital Forensic Examiner
Security Professional
eDiscovery Administrator
Computer Geek + Legal Support hybrid
Michael Perklin
Diploma in Computer Science Technology
Bachelor’s Degree in Information Systems Securit... | pdf |
Equation FuzzBunch
TOC
概述
作者根据EQGRP公开资料进行研究分析,研究相关工具的开发实现和攻击防御思路。
因为木有找到NOPEN这个C2的Windows下的Beacon程序,所以找了一些资料,发现就是FB可
以进行Windows下的C2操作,虽然是个python程序,但是也好过于无。
所以决定查看当前的研究成果,整理一个环境,看看能不能与NOPEN进行联动?
FuzzBunch的中文翻译就是模糊测试工具集,用来对目标系统进行渗透。
基本信息
本次分析的代码,来自shadowbroker的爆料,经过网络接力,我们这里使用三好学生修改
Francisco Donoso的的代码。
当然也可以直接从泄露代码构造7... | pdf |
Universal plug and play
(UPnP)
mapping attacks
Daniel Garcia
Abstract
Universal Plug and Play is a popular method for NAT traversal used by common
household devices. This document explores the different techniques attackers can use to
exploit port mapping services of UPnP/IGD devices on WAN ports. It also details a ... | pdf |
ANTI-VIRUS ARTIFACTS III
// By ethereal__vx
1
Antivirus Artifacts III
Table of Contents
Topic
Page
Introduction
3
Avira
4 - 7
F-Secure
8 - 10
Norton
11 - 15
TrendMicro
16 - 18
WebRoot
19 - 22
BitDefender
23 - 27
MalwareBytes
28 - 30
Adaware
31 - 32
AVAST
33 - 37
Dr. Web
38 - 40
Kaspersky
41 - 43
Conclusion
44
2
Antivir... | pdf |
滴滴出行
基于符号执行的反混淆方法研究
演讲人:糜波
2019
PART 01
混淆框架简介
目录
CONTENTS
PART 02
混淆技术原理
PART 03
反混淆技术原理
PART 04
后续的工作
01
02
03
04
CLICK ADD RELATED TITLE TEXT, AND CLICK ADD RELATED TITLE
TEXT, CLICK ADD RELATED TITLE TEXT, CLICK ON ADD RELATED
TITLE WORDS.
PART.01
混淆框架简介
• 混淆技术是基于OLLVM开源代码, https://github.com/obfuscator-llvm/obfu... | pdf |
WEB 2.0 启发式爬⾍虫实战
猪猪侠 / 2018年06月16日
• 阿⾥里里云⾼高级安全专家
• ⼗十⼀一年年安全从业经历
• 信息安全领域爱好者
• ⾃自动化安全测试
• 数据挖掘
• 微博:@ringzero
关于我
为什什么我们需要⼀一个扫描器器爬⾍虫?
1
安全测试⾃自动化程度低(⼈人⼯工时代)
2
⼤大量量的⼈人⾁肉测试重复成本投⼊入
3
被测试系统攻击⾯面被遗漏漏
4
安全测试⽤用例例被遗漏漏
5
WEB 2.0 前端框架导致复杂度增加
Angular、React、Vue
测试⼯工具使⽤用情况
BURP SUITE
⾃自研⼯工具
被动代理理扫描
⿊黑盒漏漏扫
FUZZER
其他
21.1%
9.... | pdf |
本文内容来自Gu师傅的博客: http://hackergu.com/
挑选了几个比较有代表性的靶机,来捋一下渗透思路。
DC1
靶机下载地址: https://www.vulnhub.com/entry/dc-1,292/
渗透思路:
信息收集:主机发现和端口扫描
漏洞利用:Drupal CMS GetShell
权限提升:SUID提权
信息收集
主机发现
基于ARP
arp 可以轻易bypass掉各类应用层防火墙,除非是专业的 arp 防火墙。
基于ICMP
端口扫描(服务探测)
nmap
在扫描的过程中,使用了 nmap 的 vuln 脚本,这个脚本用于检测目标主机是否有常见的漏洞。
扫描结果太长就不贴了,关键信息是目标开放... | pdf |
Advanced Mobile Devices Analysis
Using JTAG and Chip-off
Forensics Ninja
Who am I
Captain a.k.a Forensics Ninja
Research since 2010
Facebook Forensics (2011) on Hakin9
Magazine
Mac Memory Forensics (2014) on Digital
Forensics Magazine
Investigation and Intelligence Framework
(2015) on Fo... | pdf |
[ General I nf ormat i on]
书名=代码审计 企业级Web代码安全架构
作者=尹毅编著
页数=230
SS号=13896771
DX号=
出版日期=2016. 01
出版社=北京机械工业出版社 | pdf |
Copyright Security-Assessment.com Ltd 2003
White Paper
Title: Shattering By Example.
Prepared by:
Brett Moore
Network Intrusion Specialist
Security-Assessment.com
Date:
October 2003
03/10/2003
Page 2 of 19
Copyright Security-Assessment.com Ltd 2003
Abstract
‘Shatter attack’ is a term used to describe att... | pdf |
“Quantum” Classification of Malware
John Seymour
seymour1@umbc.edu
Charles Nicholas
nicholas@umbc.edu
August 24, 2015
Abstract
Quantum computation has recently become
an important area for security research, with
its applications to factoring large numbers
and secure communication. In practice, only
one company (D-Wave)... | pdf |
Binary 自動分析的那些事
YSc
2016/07/22
2
●
當你拿到一個 binary ...
3
●
當你拿到一個 binary ...
–
file binary
–
ltrace
–
gdb
–
IDA
–
...
4
●
當你拿到一個 binary ...
–
file binary
–
ltrace
–
gdb
–
IDA
–
...
5
●
當你拿到一個 binary ...
–
file binary
–
ltrace
–
gdb
–
IDA
–
...
6
●
一條一條看,一條一條算
●
用工具( z3 )來算
●
整支程式自動跑自動算
7
這個議程在幹麻
●
binary 自動分析的原理
●
如何用 an... | pdf |
High Security Locks and Safes
Michael Glasser
~ and ~
Deviant Ollam
High Security
Locks and
Safes
Why do we use locks?
High Security
Locks and
Safes
Why do we use locks?
Just to keep things safe and secure?
High Security
Locks and
Safes
you can keep the contents of a room safe by wielding a heavy steel door shut…
Hi... | pdf |
Spring-beans RCE漏洞分析
1
👺
Spring-beans RCE漏洞分析
说明
要求条件:
JDK9及其以上版本;
使⽤了Spring-beans包;
使⽤了Spring参数绑定;
Spring参数绑定使⽤的是⾮基本参数类型,例如⼀般的POJO即可;
测试环境
https://github.com/p1n93r/spring-rce-war
漏洞分析
Spring参数绑定不过多介绍,可⾃⾏百度;其基本使⽤⽅式就是利⽤ . 的形式,给参数进⾏赋值,实际赋值过程,会使⽤反射调⽤参
数的 getter or setter ;
这个漏洞刚爆出来的时候,我下意思认为是⼀个垃圾洞,因为我觉得需要使⽤的参数内,存在⼀个C... | pdf |
对⼀些基于chrome的dom-xss插件学习,有 dom-based-xss-finder 和 XssSniper ,看看它们的原理是什么。
mainfest.json
对于chrome来说,mainfest.json包含了整个插件各种配置,在配置⽂件中,可以找到插件⼀些启动的源代码。
⼏个⽐较重要的⼏个字段
browser_action
这个字段主要负责扩展图标点击后的弹出内容,⼀般为popup.html
content_scripts
matches 代表scripts插⼊的时机,默认为document_idle,代表⻚⾯空闲时
js 代表插⼊的scripts⽂件路径
run_at 定义了哪些⻚⾯需要插⼊scripts
per... | pdf |
© 2007 McAfee, Inc.
© 2007 McAfee, Inc.
Trojans – A Reality Check
Looking at what‘s real
Toralv Dirro
EMEA Security Strategist, CISSP
McAfee® Avert® Labs
Dirk Kollberg
Virus Research Lead
McAfee® Avert® Labs
© 2007 McAfee, Inc.
So when did all this start?
3
8/14/2007
History Lesson
• Term coined by Ken Thompson in 1983... | pdf |
Hurley, Burish & Stanton, S.C.
SECRET TOOLS
Learning About Government Surveillance
Software You Can’t Ever See
Peyton “Foofus” Engel
DEF CON 25
Hurley, Burish & Stanton, S.C.
Non-Public Technology
Breath analyzers: source code analysis reveals
bugs
» These are used for deciding whether to arrest and
charge people... | pdf |
Teaching Old Shellcode
New Tricks
DEF CON 2017
@midnite_runr
Whoami
• US Marine (out in 2001)
• Wrote BDF/BDFProxy
• Co-Authored Ebowla
• Found OnionDuke
• Work @ Okta
• Twitter: @midnite_runr
Why This Talk
• It’s fun
• It’s time to update publicly available shellcode
Outline
• Some History
• Introduced Methods... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.