text
stringlengths
100
9.93M
category
stringclasses
11 values
微软AD如何定位域控 我在本地搭建了⼀个域 DC 192.168.1.200 名字为DCSERVER client 192.168.1.151 DNS loca.test.com 在搭建完域之后,先把域控启动后再启动客户机的机器的时候抓了⼀下包 在3-6条 1.client请求DNS服务器的ldap.tcp.dc._msdcs.loca.test.com的SRV记录 2.DNS服务器返回SRV⾥记录的服务、端⼝、 A记录。(192.168.1.200:389) 3.client拿到SRV⾥的值以后发送解析A记录的请求 4.DNS服务器返回了解析的域名+IP地址 第1.2步是从DNS SRV⾥拿数据 第3.4步是把拿到的srv...
pdf
Hacking in a Foreign Language: A Network Security Guide to Russia Kenneth Geers CISSP DEFCON 13 Briefing Outline 1. Russia as a Threat 2. Russia as a Resource 3. Crossing Borders: Methodology 4. The International Political Scene Russia as a Threat Hacking: A Russian Perspective • Excellent technical education • Under...
pdf
T /IA C 中 国 保 险 行 业 协 会 团 体 标 准 T/IAC XXXXX—2018 201X-XX-XX 发布 XXXX - XX - XX 实施 201X-XX-XX 印发 ICS 35.100.05, 35.240.40 L79, A11 保险行业研发运营一体化成熟度模型 DevOps maturity model for Internet application in insurance industry (征求意见稿) 中国保险行业协会 发 布 T/IAC XXXXX—201X I 目 ...
pdf
做红队你需要学习“如何挖掘战壕”(三) 0x00 前言 在前两篇的文章中,我们先是分析了红队基础设施架构,并指出构成的3大元素:ip和域名、C2工具、 前置器,然后我们在第二篇文章中针对ip和域名的选择做了分享。这是第三篇,我们将是分析C2工具, 这儿的C2工具主要使用的是CobaltStrike。CobaltStrike功能强大,此处仅分析和我们红队基础设施相关 的部分。 0x01 Payload加载流程 为什么红队基础设施要讲Payload加载呢?因为这涉及到Payload分段加载和放置位置的问题。如果 Payload使用分段加载一定要注意远程下载Payload的时候。Payload不一定是放置在TeamServer服务 器上...
pdf
Policy Backgrounder Wireless Public Safety Data Networks Operating on Unlicensed Airwaves: Overview and Profiles By Naveen Lakshmipathy∗ Updated – March 2007 From the firefighters who died on 9/11 to the rescue workers struggling to help victims of Hurricane Katrina, recent crises have demonstrated that the ab...
pdf
electron安全简记  0x01-electron启动  通常 electron 项⽬的应⽤⼊⼝是 main.js ,也可以 package.json 中配置 npm start 脚本,它 以 package.json 中的 main 属性寻找⼊⼝⽂件 electron . main.js 的⼤致逻辑就是调⽤ BrowserWindow 启动窗体,在此之前执⾏ preload.js 预加载⼀些 ipc函数接⼝、设置环境变量等 # main.js const { app, BrowserWindow } = require('electron') const path = require('path') function crea...
pdf
Cookie之困 zootrope 清华大学网络与信息安全实验室NISL 走 马 Cookies  Lack  Integrity: Real-­‐World  Implications Xiaofeng Zheng,  Jian Jiang,  Jinjin Liang,  Haixin Duan, Shuo Chen,  Tao  Wan  and  Nicholas  Weaver USENIX  Security  '15 https://www.usenix.org/conference/usenixsecurity15/technical-­‐sessions/pr...
pdf
Auditing 6LoWPAN Networks Using Standard Penetration Testing Tools Adam Reziouk Airbus Defence and Space adam.reziouk@airbus.com Arnaud Lebrun Airbus Defence and Space arnaud.lebrun@airbus.com Jonathan-Christofer Demay Airbus Defence and Space jcdemay@airbus.com ABSTRACT The Internet of Things is expected to...
pdf
Malicious Encrypted Traffic Detection HITCON CMT 2018 Aragorn aragorn51882@gmail.com About Me • Aragorn / • Master of National Taiwan university • Security consultant in Somewhere • NTUCSA () • Malware AnalysisOperating Facebook fan page Packet ForensicPenetration Test • Speaker • 2016 TANET Network Technology Pro...
pdf
#BHUSA   @BlackHatEvents Ghost in the Wireless, iwlwifi Edition Nicolas Iooss, Gabriel Campana #BHUSA   @BlackHatEvents Information Classification: General Context - Up-to-date Ubuntu 18.04 LTS - HTTP server - Android smartphone 2 #BHUSA   @BlackHatEvents Information Classification: General Context # dmesg iwlwifi 0000...
pdf
SSLstrip – hijacking SSH Sessions Bowne Page 1 of 5 What You Need for This Project  A computer running Linux to be the Attacker (I wrote the instructions on a Ubuntu 8.04 virtual machine).  A second computer running any OS to be the Target. I used my Windows 7 host machine as the target. Goal The Attacker w...
pdf
Overview ● Propaganda definition and short history ● Propaganda fundamentals ● Propaganda in the 4th estate (mainstream media) ● Propaganda in 21st century (rise of the machines) ● Fighting back ○ Hardening the human hardware and software ○ Using our machines to help against the fight ● Conclusion remarks ● References...
pdf
Who we are ● bughardy (aka Matteo Beccaro) bughardy@cryptolab.net Italian student with passion of IT, networking and pentesting. In 2013 ended his studies in high school and apply for Politecnico of Turin at Computer Engineering. ● Eagle1753 (aka Matteo Collura) eagle1753@onenetbeyond.org Italian student, applied...
pdf
一、Web Web Web Web 服务器安全 PHP 其实不过是 Web 服务器的一个模块功能,所以首先要保证 Web 服务器的安全。当然 Web 服务器要安全又必须是先保证系统安全,这样就扯远了, 无穷无尽。PHP 可以和各种 Web 服务器结合,这里也只讨论 Apache。非常建议以 chroot 方式安装启动 Apache,这样即 使 Apache 和 PHP 及其脚本出现漏洞,受影响的也只有这个禁锢的系统,不会危害实际系 统。但是使用 chroot 的 Apache 后,给应用也会带来一定的麻烦,比如连接 mysql 时必须用 127.0.0.1地址使用 tcp 连接而不能用 localhost 实现 socket 连接,...
pdf
NTFS transactions的研究 之前看到的transacted_hollowing(https://github.com/hasherezade/transacted_hollowing) 和 最近blackhat上 的⼀个议题rope,都⽤到了NTFS事务来达到隐藏⽂件免杀的效果,所以就学习了⼀下NTFS transactions的⼀些操 作。 介绍 NTFS transactions https://docs.microsoft.com/en-us/windows/win32/fileio/about-transactional-ntfs Transactional NTFS (TxF) 是在 Windows Vist...
pdf
T e c h n i c a l A n a l y s i s o f A c c e s s T o k e n T h e f t a n d M a n i p u l a t i o n REPORT Technical Analysis of Access Token Theft and Manipulation 2 REPORT Table of Contents 3 Introduction 5 Access Token Creation and User Account Control 7 Access Token Manipulation 8 Looking at the Code: T...
pdf
Not So Super Notes How Well Does US Dollar Note Security Prevent Counterfeiting? US Constitution: Article 1, Section 8 1922 1929 1934 1950 1990 2003
pdf
Mass$Scanning$the$Internet$ Tips,$tricks,$results$ $ Robert$Graham$ Paul$McMillan$ Dan$Tentler$ 0.0.0.0/0$ Why$scan$the$Internet$(defensive)$ •  How$many$systems$are$vulnerable$to$ Heartbleed?$ •  How$many$systems$can$be$used$for$NTP$ amplificaKon?$ •  How$many$systems$vulnerable$to$DLLink$ router$vulnerability/$ •  Sur...
pdf
- 1 6 082 1 2 3 04 0 01 S U LR X MQS Q S X L I X X 1)*) *.*(312*3( ,*3*1)*) 1)*) 1*.*(31.*,*3* *.*(312*3( ,*3*1)*) 1*.*( 31.*,*3* :: = CA:3(1A E 11.::1.::1.1.::11.1. :31()',2:.:1 .: =41:1.::1 1A .1=414111.1 E 11.::1.::1.1.::11.1 .1 =414111.1.:31()',2: .:1 .: =41:1.::1 TOR_a JW 'C '.)(=' = ' '. JW'C LMOW...
pdf
Marisa Fagan InfoSec Mentors Project DEF CON 2010 The InfoSec Mentors Project • Started May 2010 • 51 matches made so far • Based on volunteer interests and exp • “To introduce people in the Information Security Community to people they might not otherwise get to meet.” • World-wide participation What makes a good ...
pdf
Run ChatGLM-6B Finetune your ChatGLM from scratch! Run ChatGLM-6B 2023/05/21 1 TOC GLM Fintune Prerequisite: Mixed Precision, ZeRO P-tuning Full Parameter LoRA Deploy with Gradio Run ChatGLM-6B 2 GLM: Pretraining Run ChatGLM-6B 3 OpenSource GLM Series GLM Github Paper GLM-130B Github Paper ChatGLM-6B Github Blog can be...
pdf
CVE-2022-26134 Confluence Server Data Center OGNL RCE 环境 windows server 2016 + Confluence 7.15.1 下载exe然后直接下一步下一步就行了。 web在8090端口,8000是rmi端口。 安装试用版,输入授权码即可。 然后配置数据库 需要额外装一个pgsql,创建一个名为confluence的数据库。 接着选示范站点,然后选在confluence中管理用户。 配置管理员账号密码,然后就安装完成了。 分析 官方通告上写了用新的xwork-1.0.3-atlassian-10.jar替换老的xwork-1.0.3-atlassian-8.jar ...
pdf
National Security Agency Cybersecurity and Infrastructure Security Agency Cybersecurity Technical Report Kubernetes Hardening Guidance August 2021 S/N U/OO/168286-21 PP-21-1104 Version 1.0 U/OO/168286-21 | PP-21-1104 | August 2021 Ver. 1.0 ii National Security Agency Cybersecurity and Infrastructure Secu...
pdf
Post-quantum cryptography Daniel J. Bernstein & Tanja Lange University of Illinois at Chicago; Ruhr University Bochum & Technische Universiteit Eindhoven 12 September 2020 Cryptography Sender “Alice” Receiver “Bob” Tsai Ing-Wen picture credit: By 總統府, Attribution, Wikimedia. Donald Trump picture credit: By Shealah Crai...
pdf
2022UIUCTF-Spoink(pebble最新模板注⼊) 写在前⾯ 之前周末忙着强⽹杯,对这道题只做了⼀半就搁置下来了,最后卡在绕过最新pebble模板引擎 RCE那⾥,今天抽空来继续进⾏剩下的分析,正好题⽬⾥有⼏个在现实场景当中能⽤的trick顺 便也分享了 题⽬环境分析 也是挺不错题⽬直接给了docker环境便于本地搭建,同时设置了权限需要执⾏./getflag才能获 取获得flag FROM openjdk:18-slim-bullseye RUN mkdir /usr/src/app WORKDIR /usr/src/app # create user RUN groupadd chalusr RUN useradd...
pdf
“Get Off of My Cloud”: Cloud Credential Compromise and Exposure Ben Feinstein & Jeff Jarmoc Dell SecureWorks Counter Threat Unit℠ 2 The Public Cloud 3 Brief Introduction to the Amazon Cloud • First, some terminology and definitions… • Amazon Web Services (AWS) • Elastic Compute Cloud (EC2) • Amazon Machine Image (AMI)...
pdf
WarBallooning – Kismet Wireless Eye in the Sky Presented by: Rick Hill DEFCON 16 Sunday, Aug. 10 WarBallooning Concept Thanks for coming! WarDriving limited visibility in the city $4.00 / Gallon gas means driving less Balloon – better platform than rocket Perfect for covering 5 - 10 mile Urban Areas Questions dur...
pdf
USB Attack to Decrypt Wi-Fi Communications Presented by: Jeremy Dorrough Disclaimer Opinions expressed in this presentation are my own. I am speaking for myself, not Genworth, nor anyone else. Image Source: iwishisaidthat.com About Me • 10+ years in IT Security industry • Worked in defense, utility & financial sect...
pdf
Hackers Hiring Hackers: How to Do Things Better Tottenkoph IrishMASMS Disclaimer This presentation is intended for the attendees and may contain information that is privileged or unsuitable for overly sensitive persons with low self-esteem, no sense of humour, or irrational religious/political beliefs. Those of you ...
pdf
Machine Learning Protect against tomorrow’s threats Adversarial Machine Learning And Several Countermeasures Trend Micro ch0upi miaoski 7 Dec 2017 Machine Learning Protect against tomorrow’s threats Machine Learning Protect against tomorrow’s threats ch0upi • Staff engineer in Trend Micro • Mac...
pdf
ICS 35.240.40 CCS A 11 JR 中 华 人 民 共 和 国 金 融 行 业 标 准 JR/T 0196—2020 多方安全计算金融应用技术规范 Secure multi-party computation financial application technical specification 2020 - 11 - 24 发布 2020 - 11 -24 实施 中国人民银行 发 布 JR/T 0196—2020 I 目 次 前言 ............................................................................
pdf
KCon KCon 重现速8僵尸车队 蓝牙4.0 BLE协议的进攻 杨 晋 ThreatBook 曾仸职于 Microsoft,COMODO,Qihoo360 邮箱:yangjin@threatbook.cn Linkedin:Jin Yang PART 01 BLE是什么? PART 02 协议技术特点 PART 03 寻找身边的设备 PART 04 如何嗅探BLE协议数据 PART 05 协议分析与攻击方式 目录 CONTENTS 01 BLE是什么? BLE是什么? - Bluetooth 4.0 协议家族 (2012)...
pdf
10505 Judicial Drive, Suite 201 | Fairfax, VA 22030 | V: 703.352.2982 | F: 203.286.2533 | sales@kryptowire.com Vulnerable Out of the Box: An Evaluation of Android Carrier Devices Abstract Pre-installed apps and firmware pose a risk due to vulnerabilities that can be pre-positioned on a device, rendering the devi...
pdf
WEAPONIZING HYPERVISORS TO FIGHT & BEAT CAR & MEDICAL DEVICE ATTACKS Ali Islam – CEO Numen Inc Dan Regalado – DanuX – CTO Numen Inc AGENDA Basic&Concepts& Q&A& Embedded&Environment& Demo&–&Attacks&&&Use&cases& Hypervisors & Strong Trending Confidential Agent-less vs Agent (AV) •  Sophisticated Invisibili...
pdf
The Token Menace SSO Wars This Photo by Unknown Author is licensed under CC BY > whoarewe § Alvaro Muñoz Security Researcher with Micro Focus Fortify team @Pwntester § Oleksandr Mirosh Security Researcher with Micro Focus Fortify team @OlekMirosh Agenda • Introduction • Delegated Authentication • Authentication Tokens ...
pdf
Building Absurd Christmas Light Shows Computer Controlled Lights <Video of light show> Basic Elements of a Light Show • LEDs • Power Supplies • Waterproof cases • Cabling • Pixel Controllers • Sequencing Software • Show Controller + Software • FM Transmitter +Zip Ties…. Lots and lots of zip ties Traditional Mini-Ligh...
pdf
Anti-RE Techniques in DRM Code Jan Newger Seminar Advanced Exploitation Techniques RWTH Aachen, Germany jan.newger@rwth-aachen.de ABSTRACT In order to prevent music from being copied among con- sumers, content providers often use DRM systems to pro- tect their music files. This document describes the approach taken whil...
pdf
Cool stuff learned from the Department of Defense Cyber Crime Digital Forensic Challenge (2006) David C. Smith, CISSP CISM Georgetown University with contributions from Mike McDonanld, The Professionals” (3rd Place Team, Florida State University) A little bit about me..  Information Security Professional, in IT over 1...
pdf
app="LF-" <?php class ping extends spController { function main() { $host = $_GET['host']; $num = (int) $_GET['num']; $host = str_replace("|", "", $host); $host = str_replace(" ", "", $host); $host = str_replace("&", "", $host); $host = str_replace(">", "", $host...
pdf
Outline Background Meddle Framework XRDP Fuzzing DeviceIoControl Sandbox Conclusion Meddle: Framework for piggy-back fuzzing and tool development Geo↵ McDonald glmcdona@gmail.com, unaffiliated presentation August 8, 2014 DEF CON 22 Geo↵McDonald glmcdona@gmail.com, unaffiliated presentation Meddle: Framework for piggy-back ...
pdf
5space WriteUp By Nu1L 5space WriteUp By Nu1L Pwn takeeasy easyfp easybuf Reverse ddl re1 Web easyupload easysqli codereview Misc D1fFeReNcE_F@1G Can_you_be_rich Crypto Chaotic babystream 创新⽅向 Love trinewbee Pwn takeeasy ⽩给溢出,直接溢出打 easyfp bye的时候stream可以uaf, 打IO来泄漏然后打free_hook from pwn import * # s = process("./pwn",asl...
pdf
Screw Being A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter Jake Kouns @jkouns Chief Information Security Officer (CISO) Risk Based Security Carsten Eiram @CarstenEiram Chief Research Officer (CRO) Risk Based Security N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y N O T J...
pdf
Betrayed by the keyboard How what you type can give you away Matt Wixey Research Lead, PwC UK Cyber Security www.pwc.com Building a secure digital society. PwC │ 2 Disclaimer • The views and opinions expressed here are not necessarily those of PwC • This content is presented for educational purposes only • What this ...
pdf
⿊黑⽆无⽌止境 — 那些年我们绕过的锁 Kevin2600 议程: . 关于锁的那点事 . 开锁@数字时代 . 开锁@⽆无线时代 . 开锁@物联⺴⽹网时代 I . 开锁@物联⺴⽹网时代 II 锁的起源: 历史上最早出现的锁,由⽊木头制成.可以追溯到4000年前 的古埃及. 在随后的罗⻢马世纪, ⼜又出现了由⾦金银铜等材质制成的锁. 这在当时是财富及⾝身份的象征. 在中国仰韶⽂文化遗址中出现过早期的⽊木质锁. 汉朝时出现 了俗称三簧锁的铜质簧⽚片锁,可以说是中国锁具发展历上 的⼀一次质的⻜飞越. 锁的类型: 锁的结构: 起始 错误 正确 开锁 开锁@⽆无线时代 Samsung: Ezon RFID ⻔门锁 分析ing: Prox...
pdf
Fuzzing on train: AI制导PDF文件生成技术的探索之旅 邹权臣 中国信息安全测评中心博士后 马金鑫 中国信息安全测评中心副研究员 个人简介 马金鑫 中国信息安全测评中心 副研究员 北京邮电大学硕士生导师 研究方向:软件安全、漏洞分析 主持多项国家、省部级科研项目,发表20余篇学术论文,获 得软件著作权5项,发明专利2项,曾发现多个0Day漏洞。 邹权臣 中国信息安全测评中心 博士后 研究方向:自动化漏洞分析 负责、参与多项国家、省部级科研项目,发表 多篇学术论文。 majinxin2003@126.com zouquanchen@126.com 目录 研究背景 方案设计 实验分析 结论与展望 研究背景 高结构化样...
pdf
S-log4j2RCE 说明 log4j2 与 log4j 属于不同项目,且二者的配置方式也存在差异, log4j 是通过 log4j.properties 来进行配置的,而 log4j2 是通过 xml 文件来进行配置的。 环境搭建 pom.xml 测试代码 在众多测试代码当中大家都是利用 Logger.error() 来触发漏洞但,根据 log4j2 的默认漏洞级别 trace<debug<info<warn<error<fatal , error 和 fatal 两个级别的日志会打印到控制台,同 时也会触发漏洞,当然还可以通过配置文件获取动态级别两个方式调整。 1. 默认缺省配置 <dependencies>   <depe...
pdf
PHISHING WITHOUT FAILURE AND FRUSTRATION or “How I learned to stop worrying and love the layer 8” Unabridged Version Jay Beale CTO, InGuardians 1 Larry Pesce Director of Research, InGuardians """ ▪ As white hats, phishing should be just as easy as for black hats, right? • Write a crafty e-mail that directs readers t...
pdf
The Present & Future of Xprobe2 Founder O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 0 – 2 0 0 3 T H E S Y S – S E C U R I T Y G R O U P Revolutionizing Active Operating System Fingerprinting Ofir Arkin ofir@sys-security.com O F I R A R K I N, F O U N D E R, ...
pdf
© Copyright 2019 NCC Group An NCC Group Publication Common Security Issues in Financially- Oriented Web Applications A guideline for penetration testers Prepared by: Soroush Dalili Version 2.0 NCC Group | Page 2 © Copyright 2019 NCC Group Contents 1 Introduction ................................................
pdf
.NET Framework Rootkits – Backdoors Inside Your Framework 1 .NET Framework Rootkits: Backdoors inside your Framework March, 2009 (Revised) Erez Metula ErezMetula@2bsecure.co.il ErezMetula@gmail.com .NET Framework Rootkits – Backdoors Inside Your Framework 2 Table of content TABLE OF CONTENT .....................
pdf
Kubernetes Privilege Escalation: Container Escape == Cluster Admin? Yuval Avrahami & Shaul Ben Hai, Palo Alto Networks #BHUSA  @BlackHatEvents whoami ● Cloud security researchers @PANW ● Vulnerability research in the cloud ○ Azurescape ● Threat hunting in the cloud ○ Slioscape Kubernetes Privilege Escalation: Containe...
pdf
Practical Tips for Playing Hide and Seek with Linux EDRs DEFCON 27 @Op_Nomad Zombie Ant Farm ! ! ! ! $ who –m Dimitry Snezhkov • Technologist • Member of the X-Force Red Team ü hacking ü tools, research ü all things offensive @Op_Nomad github.com/dsnezhkov Linux Offense: The Context Linux matters • It runs 90% of clo...
pdf
IOActive, Inc. Copyright ©2014. All Rights Reserved. Hacking Traffic Control Systems (U.S, UK, Australia, France, etc.) Cesar Cerrudo @cesarcer CTO, IOActive Labs IOActive, Inc. Copyright ©2014. All Rights Reserved. About Me • Hacker, vulnerability researcher, created novel exploitation techniques, dozens ...
pdf
The core problem with authentication and how we can overcome it Jason M. Pittman   We’re goin’ deep, son!   Deep philosophically that is…   Tools, who needs ‘em   8.75 of 10 zombies do recommend brains anyway…   Modern (current) authentication   Passwords specifically   Extends to all types however  ...
pdf
DefCon 19 august 4th-7th, 2011 Rio Hotel, Las Vegas Key Impressioning (working title, I guess there’s still time to change this?) Jos Weyers H. Edward Tickel Jr. FBI’s go-to NDE guy in the late 70’s http://www.tresoroeffnung.de/buch.php THE #1 reference work Impressioning by Oliver Diederichsen How long ...
pdf
Real-time Bluetooth Device Detection with Blue Hydra Granolocks Zero_Chaos ● Pwnie Express ● Focused on device detection ● Enjoys long walks in the woods ● Travel to exotic locations ● Draws pretty weird pictures ● Existential AF ● Hacking the planet ● Gives great back rubs Granolocks Narcissus Zero_Chaos Narcissus ● ...
pdf
Reflective Injection Detection – RID.py Or How I slapped together some python c-types in a week to do what defensive vendors aren't incorporating into main-line products Or Bringing the Sexy Back - A defensive tool that doesn't fail quite as hard as it could Pre-talk notes ● I don't own any of the artwork. It's al...
pdf
Searching for Malware: A Review of Attackers’ Use of Search Engines to Lure Victims Paul Judge David Maynor The Problem Sites like Twitter, Yahoo!, Bing and Google all  have some form of popular/trending search  terms. These terms can be co‐opted by markets and  malware authors to point to their own wares. The sites ...
pdf
Sentient Storage: Do SSDs have a mind of their own? Tom Kopchak :: @tomkopchak About me Why we're here • Current forensic practices for working with hard drives are well-defined • Solid state drives behave differently and present new challenges • This presentation will explore these differences in detail Fore...
pdf
Paz Hameiri TEMPEST radio station About myself ◼ System engineer ◼ M.Sc. in Electro-Optical Engineering ◼ Six years of experience with telecommunication systems design and circuits DEF CON 25 / Inbar and Eden / From "One Country - One Floppy" to "Startup Nation" - the story of the early days of the Israeli hacking c...
pdf
1 清华大学NISL实验室, Blue-Lotus黑客竞赛战队 @清华诸葛建伟 知道Web安全论坛KCON交流 Blue-Lotus战队 Defcon 20 CTF资格赛回顾 Defcon CTF竞赛 2 o   全球最有影响力的黑客竞赛 – “黑客奥运会” n  1996年开始,已成功举办16届 n  组织者:DDTek(2009-Present) o   Defcon 20 CTF n  Quals – 资格赛 o   Challenges Solving o   10支队 + 10支其他CTF冠军队 晋级 n  Deathmatch – 拉斯维加斯 淘汰赛 n  Final – 决赛 ...
pdf
Le’go My Stego Le’go My Stego Steganography Steganography in the post Web 2.0 World in the post Web 2.0 World James Shewmaker © 2008 James Shewmaker © 2008 Defcon 0x10 Defcon 0x10 Today’s Agenda Today’s Agenda  Today’s Agenda Today’s Agenda  Background: Classical Stego Background: Classical Stego  Digital Stego Te...
pdf
Friday the 13th: JSON Attacks Alvaro Muñoz (@pwntester) Oleksandr Mirosh HPE Security > whoami • Alvaro Muñoz • Security Research with HPE • Int3pids CTF player • @pwntester • Oleksandr Mirosh • Security Research with HPE Introduction • 2016 was the year of Java Deserialization apocalypse • Known vector since 2011 • Pr...
pdf
T1028: WinRM for Lateral Movement 参考: 内网横移之WinRM Powershell Remoting Lateral Movement – WinRM WinRM(Windows Remote Management是WS-Management Protocol Microsoft 实现(具体体现为 Win RM 服务)。 这个协议有没有其他的实现?有,比如 openwsman,也就说在在linux也可以通过该协议管理 Windows(跨平台)。 Ansible 通过该协议进行远程管理Windows 配置和必要信息 参考:Installation and Configuration for Win...
pdf
A Picture is Worth a Thousand Words, Literally: Deep Neural Networks for Social Stego Philip Tully and Michael T. Raggo Abstract and Introduction Images, videos and other digital media provide a convenient and expressive way to communicate through social networks. But such broadcastable and information-rich conten...
pdf
VDLDS  –  ALL  YOUR  VOICE  ARE BELONG  TO  US Ganesh  Devarajan  &  Don  LeBert Agenda   Introduction   Problem   Background   Scenarios   Architecture   Server  Model   Distributed  Client  server  model   Demo   Future  Work Introduction   Ganesh  Devarajan ...
pdf
An ACE Up the Sleeve Designing Active Directory DACL Backdoors Andy Robbins and Will Schroeder SpecterOps @_wald0 ▪ ... ▪ Job: Adversary Resilience Lead at SpecterOps ▪ Co-founder/developer: BloodHound ▪ Trainer: BlackHat 2016 ▪ Presenter: DEF CON, DerbyCon, ekoparty, Paranoia, ISSA Intl, ISC2 World Congress, vari...
pdf
The Proxy Era of Microsoft Exchange Server Orange Tsai Orange Tsai • Orange Tsai, focusing on Web and Application 0-day research • Principal Security Researcher of DEVCORE • Captain of HITCON CTF Team • Speaker of Security Conferences • Black Hat USA & ASIA / DEFCON / HITB / HITCON … • Selected Awards and Honors: • 20...
pdf
Return to sender Detecting kernel exploits with eBPF Guillaume Fournier August 2022 About me ● Cloud Workload Security (CWS) ● Leverage eBPF to detect threats ● Embedded in the Datadog Agent Blackhat 2022 Guillaume Fournier Senior Security Engineer @Datadog gui774ume.fournier@gmail.com 2 ● Context and threat model ● Wh...
pdf
WriteUp By Nu1L Author:Nu1L WriteUp By Nu1L PWN wind_farm_panel shell Misc babymaze2_beta babymaze1 WEB hello_php ezcms easyci Crypto babyLWE digits_missing RE friendlyRE PWN wind_farm_panel free, Orange+FSOP from pwn import * # s = process("./pwn") s = remote("182.92.203.154","28452") def add(idx,size,buf): s.sen...
pdf
EL3 Tour: Get The Ultimate Privilege of Android Phone Guanxing Wen 2019 Bio ✤ Senior Security Researcher at Pangu ✤ Exploitation and Reversing Engineering ✤ Recently ✤ Firmware, Bootloader, Kernel ✤ Previously ✤ Adobe Flash Agenda ✤ ARMv8 Privilege mode ✤ Post-startup architecture of Huawei P20 ✤ Hunt EL3 Vulne...
pdf
The Dark Side of Winsock - Lecture Notes (C) 2005 Jonathan Levin, All Rights Reserved 1 The Dark Side of Winsock By Jonathan Levin DefCon XIII, Las Vegas Http://www.securicy.net/Talks/dc-spi.pdf The Dark Side of Winsock - Lecture Notes (C) 2005 Jonathan Levin, All Rights Reserved 2 Introduction & Nomenclature You proba...
pdf
S U B O R N E R A Windows Bribery for Invisible Persistence Sebastián Castro @r4wd3r R 4 W S E C . C O M Singapore August 25 - 26, 2022 R 4 W S E C . C O M  @r4wd3r S U B O R N E R W H O A M I Username r4wd3r Full User name Sebastián Castro Comment Infosec nerd, stuff breaker ~10y User’s comment Terrible at ...
pdf
From Dvr to See Exploit of IoT Device 0K5y Nobody@360GearTeam 1559113201 Date Larryxi Nobody@360GearTeam What’s time 0x00 目录 0x01 前言闲谈 0x02 漏洞挖掘 0x03 环境调试 0x04 漏洞利用 0x05 总结反思 0x01 前言闲谈 有朋自远方来 IoT 四层模型 IoT 现状问题 IoT 利用架构 IoT 攻击思维 0x02 漏洞挖掘 环境前瞻 获取固件的十种方法 软件层面 硬件层面 前瞻发现 `etc/init.d/S99` 中注释掉了`telnetd` `/etc/passwd` 中存在硬...
pdf
應用密碼學入門 @HITCON CMT 2018 我是誰 ● Allen Chou ● 我好像沒什麼值得介紹的 ● https://allenchou.cc/ ● GitHub: s3131212 ● s3131212@gmail.com ● FB: s3131212 背景知識 密碼學是什麼 ● 不是研究怎麼設安全的密碼 ● 不是教你怎麼破解別人 Facebook ● 你不會因為知道密碼學在幹嘛就變成天才駭客 ● 很多數學 ○ 我是說,真的很多 ○ 不過我並沒有打算講很多數學理論 ○ 我自己數學也不好 QQ ● 如果已經沒興趣了,可以趕快離開我不會介意 密碼學是什麼 ● 古典密碼學 ○ 資料保密、傳遞 ○ 密碼破譯 ● 現代密碼學 ...
pdf
Urban Exploration - A Hacker’s View phreakmonkey (K.C.) mutantMandias (Mandias) phreakmonkey.com Background: What is Urban Exploration? Urban Exploration is the practice of discovering, exploring, and often photographing the more “off-beat” areas of human civilization. “This hobby consists of a lot more th...
pdf
It WISN't me, attacking industrial wireless mesh networks DEF CON 26 Introduction Erwin Paternotte Lead security consultant @stokedsecurity Mattijs van Ommeren Principal security consultant @alcyonsecurity 15.7.2018 2 Previous research WirelessHART A Security Analysis, Max Duijsens, Master (2015) - https://pure....
pdf
The Hackers Guide to Search and Arrest. by Steve Dunker J.D. I. When Can an Officer Legally “Stop” an individual? A. Voluntary Stops It is legal for an Officer at any time to “Ask” a person to stop and talk. - A person has the right to say “yes” or “no”. B. Investigative Stops - Reasonable Suspicion required. C. Adm...
pdf
代 码 混 淆 研 究 的 新 方 向 程瑞 西安交通大学软件学院 南子龙 西安交通大学微电子学院 范铭 西安交通大学网安学院 # 我们是谁 • 程瑞 西安交通大学软件工程学院大二 智能网络与网络安全教育部重点实验室实习生 研究方向包括程序分析、模糊测试、恶意软件检测、IoT • 南子龙 西安交通大学微电子学院大四 智能网络与网安安全教育部重点实验室实习生 研究方向包括IoT安全、密码学应用、量子器件、同态芯片 • 范铭 西安交通大学网络空间安全学院副教授 研究方向包括可解释性AI技术、AI安全、移动软件安全 # 目录 • PART I(程瑞) • 引言:代码混淆的定义以及应用 • 现状:研究现状 • 动机:已有研究...
pdf
Could Googling Take Down A President, a Prime Minister, or an Average Citizen? Gregory Conti United States Military Academy West Point, New York gregory.conti@usma.edu Outline • Information Disclosure – Computing Platform – Network Eavesdropping – Destination Websites • Vectors • Cross-site Tracking – Advertising and ...
pdf
用Golang编写 dll劫持的一些坑 (3) 源于知识星球的一个想法,利用一些已知的dll劫持的程序作为"模板",自动生成白加黑的程序。 我想用Golang编写劫持的dll,这样也方便可以做成在线平台。 我们的目标不是让它弹一个信息框,而是让它执行shellcode,并且使用一些hook技术保证白程序只加 载一个dll的同时不和后续的代码冲突 这需要我们编写一个通用的dll白加黑的劫持模板,当然dll加载模 式不同劫持的方式也不同。 我找到是vscode它的更新程序,也有它官方的签名 被劫持的dll在 inno_updater.exe 的导入表中,这种劫持可以叫它 pre-load ,我只用实现它的5个函数 就可以了。 因为我想...
pdf
HID CARD TECHNOLOGIES HID CARD SERVICES CARD APPLICATIONS proximity (read/write contactless smart chip) magnetic stripe contact smart chip multi-technology cards Wiegand Swipe custom configuration complete cards personalization anti-counterfeiting card management custom artwork photo ID badging programm...
pdf
ACL Steganography: Permissions to Hide Your Porn by Michael Perklin Michael Perklin Corporate Investigator Digital Forensic Examiner Security Professional eDiscovery Administrator Computer Geek + Legal Support hybrid Michael Perklin Diploma in Computer Science Technology Bachelor’s Degree in Information Systems Securit...
pdf
Equation FuzzBunch TOC 概述 作者根据EQGRP公开资料进行研究分析,研究相关工具的开发实现和攻击防御思路。 因为木有找到NOPEN这个C2的Windows下的Beacon程序,所以找了一些资料,发现就是FB可 以进行Windows下的C2操作,虽然是个python程序,但是也好过于无。 所以决定查看当前的研究成果,整理一个环境,看看能不能与NOPEN进行联动? FuzzBunch的中文翻译就是模糊测试工具集,用来对目标系统进行渗透。 基本信息 本次分析的代码,来自shadowbroker的爆料,经过网络接力,我们这里使用三好学生修改 Francisco Donoso的的代码。 当然也可以直接从泄露代码构造7...
pdf
Universal plug and play (UPnP) mapping attacks Daniel Garcia Abstract Universal Plug and Play is a popular method for NAT traversal used by common household devices. This document explores the different techniques attackers can use to exploit port mapping services of UPnP/IGD devices on WAN ports. It also details a ...
pdf
ANTI-VIRUS ARTIFACTS III // By ethereal__vx 1 Antivirus Artifacts III Table of Contents Topic Page Introduction 3 Avira 4 - 7 F-Secure 8 - 10 Norton 11 - 15 TrendMicro 16 - 18 WebRoot 19 - 22 BitDefender 23 - 27 MalwareBytes 28 - 30 Adaware 31 - 32 AVAST 33 - 37 Dr. Web 38 - 40 Kaspersky 41 - 43 Conclusion 44 2 Antivir...
pdf
滴滴出行 基于符号执行的反混淆方法研究 演讲人:糜波 2019 PART 01 混淆框架简介 目录 CONTENTS PART 02 混淆技术原理 PART 03 反混淆技术原理 PART 04 后续的工作 01 02 03 04 CLICK ADD RELATED TITLE TEXT, AND CLICK ADD RELATED TITLE TEXT, CLICK ADD RELATED TITLE TEXT, CLICK ON ADD RELATED TITLE WORDS. PART.01 混淆框架简介 • 混淆技术是基于OLLVM开源代码, https://github.com/obfuscator-llvm/obfu...
pdf
WEB 2.0 启发式爬⾍虫实战 猪猪侠 / 2018年06月16日 • 阿⾥里里云⾼高级安全专家 • ⼗十⼀一年年安全从业经历 • 信息安全领域爱好者 • ⾃自动化安全测试 • 数据挖掘 • 微博:@ringzero 关于我 为什什么我们需要⼀一个扫描器器爬⾍虫? 1 安全测试⾃自动化程度低(⼈人⼯工时代) 2 ⼤大量量的⼈人⾁肉测试重复成本投⼊入 3 被测试系统攻击⾯面被遗漏漏 4 安全测试⽤用例例被遗漏漏 5 WEB 2.0 前端框架导致复杂度增加 Angular、React、Vue 测试⼯工具使⽤用情况 BURP SUITE ⾃自研⼯工具 被动代理理扫描 ⿊黑盒漏漏扫 FUZZER 其他 21.1% 9....
pdf
本文内容来自Gu师傅的博客: http://hackergu.com/ 挑选了几个比较有代表性的靶机,来捋一下渗透思路。 DC1 靶机下载地址: https://www.vulnhub.com/entry/dc-1,292/ 渗透思路: 信息收集:主机发现和端口扫描 漏洞利用:Drupal CMS GetShell 权限提升:SUID提权 信息收集 主机发现 基于ARP arp 可以轻易bypass掉各类应用层防火墙,除非是专业的 arp 防火墙。 基于ICMP 端口扫描(服务探测) nmap 在扫描的过程中,使用了 nmap 的 vuln 脚本,这个脚本用于检测目标主机是否有常见的漏洞。 扫描结果太长就不贴了,关键信息是目标开放...
pdf
Advanced Mobile Devices Analysis Using JTAG and Chip-off Forensics Ninja Who am I ž  Captain a.k.a Forensics Ninja ž  Research since 2010 ž  Facebook Forensics (2011) on Hakin9 Magazine ž  Mac Memory Forensics (2014) on Digital Forensics Magazine ž  Investigation and Intelligence Framework (2015) on Fo...
pdf
[ General I nf ormat i on] 书名=代码审计 企业级Web代码安全架构 作者=尹毅编著 页数=230 SS号=13896771 DX号= 出版日期=2016. 01 出版社=北京机械工业出版社
pdf
Copyright Security-Assessment.com Ltd 2003 White Paper Title: Shattering By Example. Prepared by: Brett Moore Network Intrusion Specialist Security-Assessment.com Date: October 2003 03/10/2003 Page 2 of 19 Copyright Security-Assessment.com Ltd 2003 Abstract ‘Shatter attack’ is a term used to describe att...
pdf
“Quantum” Classification of Malware John Seymour seymour1@umbc.edu Charles Nicholas nicholas@umbc.edu August 24, 2015 Abstract Quantum computation has recently become an important area for security research, with its applications to factoring large numbers and secure communication. In practice, only one company (D-Wave)...
pdf
Binary 自動分析的那些事 YSc 2016/07/22 2 ● 當你拿到一個 binary ... 3 ● 當你拿到一個 binary ... – file binary – ltrace – gdb – IDA – ... 4 ● 當你拿到一個 binary ... – file binary – ltrace – gdb – IDA – ... 5 ● 當你拿到一個 binary ... – file binary – ltrace – gdb – IDA – ... 6 ● 一條一條看,一條一條算 ● 用工具( z3 )來算 ● 整支程式自動跑自動算 7 這個議程在幹麻 ● binary 自動分析的原理 ● 如何用 an...
pdf
High Security Locks and Safes Michael Glasser ~ and ~ Deviant Ollam High Security Locks and Safes Why do we use locks? High Security Locks and Safes Why do we use locks? Just to keep things safe and secure? High Security Locks and Safes you can keep the contents of a room safe by wielding a heavy steel door shut… Hi...
pdf
Spring-beans RCE漏洞分析 1 👺 Spring-beans RCE漏洞分析 说明 要求条件: JDK9及其以上版本; 使⽤了Spring-beans包; 使⽤了Spring参数绑定; Spring参数绑定使⽤的是⾮基本参数类型,例如⼀般的POJO即可; 测试环境 https://github.com/p1n93r/spring-rce-war 漏洞分析 Spring参数绑定不过多介绍,可⾃⾏百度;其基本使⽤⽅式就是利⽤ . 的形式,给参数进⾏赋值,实际赋值过程,会使⽤反射调⽤参 数的 getter or setter ; 这个漏洞刚爆出来的时候,我下意思认为是⼀个垃圾洞,因为我觉得需要使⽤的参数内,存在⼀个C...
pdf
对⼀些基于chrome的dom-xss插件学习,有 dom-based-xss-finder 和 XssSniper ,看看它们的原理是什么。 mainfest.json 对于chrome来说,mainfest.json包含了整个插件各种配置,在配置⽂件中,可以找到插件⼀些启动的源代码。 ⼏个⽐较重要的⼏个字段 browser_action 这个字段主要负责扩展图标点击后的弹出内容,⼀般为popup.html content_scripts matches 代表scripts插⼊的时机,默认为document_idle,代表⻚⾯空闲时 js 代表插⼊的scripts⽂件路径 run_at 定义了哪些⻚⾯需要插⼊scripts per...
pdf
© 2007 McAfee, Inc. © 2007 McAfee, Inc. Trojans – A Reality Check Looking at what‘s real Toralv Dirro EMEA Security Strategist, CISSP McAfee® Avert® Labs Dirk Kollberg Virus Research Lead McAfee® Avert® Labs © 2007 McAfee, Inc. So when did all this start? 3 8/14/2007 History Lesson • Term coined by Ken Thompson in 1983...
pdf
Hurley, Burish & Stanton, S.C. SECRET TOOLS Learning About Government Surveillance Software You Can’t Ever See Peyton “Foofus” Engel DEF CON 25 Hurley, Burish & Stanton, S.C. Non-Public Technology  Breath analyzers: source code analysis reveals bugs » These are used for deciding whether to arrest and charge people...
pdf
Teaching Old Shellcode New Tricks DEF CON 2017 @midnite_runr Whoami • US Marine (out in 2001) • Wrote BDF/BDFProxy • Co-Authored Ebowla • Found OnionDuke • Work @ Okta • Twitter: @midnite_runr Why This Talk • It’s fun • It’s time to update publicly available shellcode Outline • Some History • Introduced Methods...
pdf