text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Beyond the MCSE:
Red Teaming Active Directory
Sean Metcalf (@Pyrotek3)
s e a n @ adsecurity . org
www.ADSecurity.org
About Me
Founder Trimarc, a security company.
Microsoft Certified Master (MCM) Directory
Services
Microsoft MVP
Speaker: Black Hat, BSides, DEF CON, DerbyCon,
Shakacon
Security Consultant / Security ... | pdf |
Infiltrating Corporate Intranet
Like NSA
Pre-auth RCE on Leading SSL VPNs
Orange Tsai (@orange_8361)
Meh Chang (@mehqq_)
USA 2019
Orange Tsai
• Principal security researcher at DEVCORE
• Captain of HITCON CTF team
• 0day researcher, focusing on
Web/Application security
orange_8361
Meh Chang
mehqq_
• Security research... | pdf |
边信道攻击实战
Kevin2600
. Kevin2600
. 专注无线电; 嵌入式设备安全研究
. NewSky 安全研究员 + 安全培训讲师
. 坚信黑客精神就是不断探索未知领域
边信道的传说?
边信道的传说?
. Side-Channel 必须掌握很深的数学知识?
. Side-Channel 必须使用昂贵的硬件设备?
. Side-Channel 都有哪些实战中的运用?
. Side-Channel 作为小白该如何开始?
Contents:
• 边信道的那点事
• 边信道案例 – EM Leaking
• 边信道案例 – Timing Attack
• 边信道案例 – Fault Injection Attack... | pdf |
代码审计
代码审计(一
一) 熊海
熊海cms V1.0
最近在学习代码审计,试着将这些东西记录下来,也是当做一种总结吧。今天我进行这款cms的代码审计叫熊海cms V1.0,它是一款小型的网站内容管
理系统,非常适合个人建站使用。因为年代久远了,所以这款cms漏洞还是比较多的,审计起来难度不难,非常适合我这种小菜鸡入门学习的。话不多
说,我们先来看看它的源代码目录分布吧。
admin//管理员后台
css//css样式
files//功能函数
images//图片文件
inc//配置信息
install//安装目录文件
seacmseditor//seacms编辑器
template//模板文件
upload//文件上传
inde... | pdf |
NSM 101 for ICS
About me
Chris Sistrunk, PE
Electrical Engineer
Sr. ICS Security Consultant
– Control system security assessments
– ICS Village (DEF CON & RSA Conference)
Entergy (11+ years)
– SCADA Engineer (10 years)
– Project Robus (ICS Protocol Fuzzing)
• 30+ implementation vulnerabilities in DNP3 stacks ... | pdf |
TCTF 2019
TCTF 2019
PWN
vim
zerotask
plang
Reverse
Elements
Fixed Point
sanitize
Web
Ghost Pepper
Wallbreaker Easy
Crypto
babyrsa
MISC
flropyd
Neuron Break
http://ctf.0ops.sjtu.cn/ 23 March 2019, 06:00 UTC — 25 March 2019, 06:00
UTC Nu1L
PWN
vim
a
stepperm_state_Tbuffer
freegotbufferfreegot
system
from pwn import *
from h... | pdf |
DIRA: Automatic Detection, Identification, and Repair of Control-Hijacking
Attacks
Alexey Smirnov
Tzi-cker Chiueh
Computer Science Department
State University of New York at Stony Brook
Stony Brook, NY 11794-4400
{alexey, chiueh}@cs.sunysb.edu
Abstract
Buffer overflow attacks are known to be the most com-
mon type of att... | pdf |
1
luks 全盘加密的⼀个通⽤解密⽅法--从内存中提
取LUKS MASTER KEY
前⾔
破解LUKS全盘加密
从内存镜像中提取MASTER KEY
第⼀步 判断加密算法
第⼆步 DUMP 包含秘钥的内存
第三步 从内存寻找aes key
第四步 解密分区
第五步 解密其他分区
作者:橙⼦酱
之前的⽂章中提到了⼀种有启动分区的情况
磁盘主引导->引导分区->引导内核->系统启动->解密挂载分区 (⼀个引导分区 +⼀个主分区)
遇到这种情况就可以通过简单的提取⽂件系统中的秘钥解决.
但是运⽓不好还会遇到两种更变态的情况
磁盘主引导->引导分区->引导内核->引导内核中解密挂载分区->系统启动->解密挂载分区(只有⼀个引
导... | pdf |
From
0
to
Secure
in
1
Minute
DEFCON
23
Nir Valtman &
Moshe
Ferber
About
Us
Nir
Valtman
Moshe
Ferber
ü CISO
Retail
in
NCR
Corporation.
§
We
own
a
private
cloud
&
offering
SaaS
§
Yes…
we
do
security!
ü Instructor
for
Cloud
Security... | pdf |
Copyright 2003 Corporate
Defense Strategies
1
TSCM
The real story behind sweeping
for eavesdropping devices
ECHNICAL
ECURITY
OUNTER
EASURES
Jeffrey S. Prusan
Michael D. Glasser
Copyright 2003 Corporate
Defense Strategies
2
TSCM
Outline
•Tools used for sweeps
•Demo of how phones are tapped
•Signs that your offices are “... | pdf |
D u m a r t f u z z e r :
M a k e t h e d u m b f u z z e r
s m a r t
陈振宇 个人安全研究员
背景
•
内存类漏洞占很大比例
•
Fuzzing仍然是发现内存类漏洞的重要手段
•
有源码fuzzing工具已经很完善
•
无源码fuzzing的方法缺点较多,一般无源码
的Fuzzing也叫黑盒fuzz
•
有时不得不进行黑盒fuzz。如闭源项目。
背景:黑盒fuzz的困难
•
状态机
•
dlopen
•
qemu, unicorn
•
效率低
•
缺乏路径反馈
•
没有路径反馈的一般称为dumb fuzz,反之会叫smart fuzz
•
没有地址消杀器
•... | pdf |
Collaborative Penetration Testing
With Lair
About Us
• Tom Steele
– Consultant at FishNet Security
– @_tomsteele
• Dan Kottmann
– Consultant at FishNet Security
– Security assessments
– Hobbyist coder
– @djkottmann
The Problem
Lair
What is Lair
• Web application for managing and tracking
the execution of network asse... | pdf |
0x01 前言
看到赛博回忆录白白白师傅发了一篇反制ysoserial的文章,于是兴高采烈的准备自己试一把。结果在自己动手操作的时
候,pa一下,没打成功。于是和木头师傅探讨了一下,因为当时有事,第二天才去调试,发现了这个乌龙。。那就分享
一下思路。
0x02 正片
一、 ysoserial反制
registry.list和registry.bind,这两处就是调用的原生的RegistryImpl_Stub,会触发UnicastRef#invoke-
>StreamRemoteCall#executeCall导致反序列化,这里就有反序列化点了。
一开始我对反制存疑,可以看到这里存在了java沙箱的机值,会限制命令的执行。:
后来验证... | pdf |
Urban/Metropolitan Area
i
December 2006
Tactical Interoperable Communications Scorecards
Tactical Interoperable Communications Scorecards
Tactical Interoperable Communications Scorecards
Tactical Interoperable Communications Scorecards
Tactical Interoperable Communications Scorecards
Summary Report and Findings... | pdf |
The Year of HD Voice -- 2010
Who, what, where, how?
(Actually, who, how, where, what)
Doug Mohney - Background
• Following the ICT sector for over two decades
• Writing for Boardwatch, The Inquirer, VON
Magazine (Pulvermedia), TMC
• Started HD voice coverage in May 2009
• Launch of HD Voice News (HD Connect Now)
in A... | pdf |
#BHUSA @BlackHatEvents
Chasing Your Tail With A
Raspberry Pi
Matt Edmondson
#BHUSA @BlackHatEvents
Information Classification: General
Why Are We Talking About This?
• For some people, trying to figure out if they’re being
followed is a matter of physical safety for
themselves or others
• I was approached by a frien... | pdf |
And Point of Sale Systems
HACKING HOTEL KEYS
Security Consultant
TWITTER, LinkedIN @westonhecker
Rapid7 www.rapid7.com
Senior Security Engineer/Senior Pentester/ Security
Researcher.
About 11 years pen-testing, Security Research, Speaker at
Defcon 22, 23 and 24 Las Vegas, HOPE 11,
TakedownCON 2016,B-sides Boston, B... | pdf |
Web API 安全漏洞与检测防护
徐诣博
2017.8.25
目录
Contents Page
2、Web API 安全漏洞
3、WAF Web API 漏洞防护
4、Web API 安全开发建议
1 、Web API 安全威胁
目录
Contents Page
第 1 章
Web API 安全威胁
什么是 Web API
• 使用 HTTP 协议通过网络调用的 API
• Web API 是一个 Web 系统,可以通过访问 URI
与服务器完成信息交互,或者获取存放在服务
器上的数据信息等,调用者通过程序访问并机
械地使用这些数据。
• Web API 和 Web Services
• JSON
谁在用 Web API
AP... | pdf |
数据安全杂谈(⼀)
本⽂发表于赛博回忆录。
前⾔
随着数据安全提上安全的⽇常,⼤家其实可以发现,传统的那种堆叠安全设备的防护⽅式是⼀个低效
的,不太实⽤的⼀种防护⼿段。
所以防护的重⼼发⽣了偏移
⼀个公司的安全建设随着防护的重⼼发⽣偏移,从⽽导致安全建设的中⼼也发⽣了偏移
痛
其实⼀个企业在做企业级的安全建设的时候,都会存在⼀些相应的痛点问题,这些痛点的解决随时随
地,都牵涉着⼀个安全团队的安全建设的进度。
这样单独总结出来⼤家可能觉得,这并不是痛点啊?下⾯我就⼀⼀解释⼀下这些痛点!
1、资源有限
预防性的安全建设资源有限
已经建设的业务投⼊⽅⾯资源有限
已经发布的产品线
资源有限
时间不够
能⼒不⾜
没有⼈负责的业务
2、时间不够... | pdf |
Developing Managed Code Rootkits for the Java Runtime Environment
Developing Managed Code Rootkits for the Java
Runtime Environment
DEFCON 24, August 6th 2016
Benjamin Holland (daedared)
ben-holland.com
DEFCON 24, August 6th 2016
Developing Managed Code Rootkits for the Java Runtime Environment
Developing Managed Code ... | pdf |
Hacking Desire
“Reverse-engineering what people want”
Ian Clarke, CEO Uprizer Labs
ian@uprizer.com
Why?
• Everyone has needs and desires
• If we can predict these, then we can give
people what they want
• This will make them happy
• ???
• Profit!
Specific problems we could solve
• Music (last.fm, Indy, Pandora)
• Movies... | pdf |
1
DEFCON 2018 USA
ALEXANDRE BORGES
RING 0/-2 ROOKITS :
COMPROMISING
DEFENSES
DEFCON 2018 - USA
ALEXANDRE BORGES - MALWARE AND SECURITY RESEARCHER
PROFILE AND TOC
TOC:
• Introduction
• Rootkits: Ring 0
• Advanced Malwares and Rootkits: Ring -2
• Malware and Security Researcher.
• Consultant, Instructor and Speaker ... | pdf |
Gaining Access to Android User Data
Into The Droid
DEF CON 20
Introduction
• Why this talk is useful
• Defend access / gain access
• Device seizure, loss, border crossing, stop and search, espionage...
• The company
• viaForensics - Mobile security and digital forensics, strong R&D
team, government agencies and corpor... | pdf |
CVE-2021-37580-apacheshenyuadmin
漏洞
Apacheshenyuadmin-jwt越权漏洞,通过伪造jwt获取管理员。
漏洞成因:
硬编码jwtkey
1.
只解析了jwttoken的内容,并没有针对其内容进⾏判断
2.
影响版本
shenyu:v2.3.0-v2.4.0
漏洞分析
直接在权限校验处打上断点
org/apache/shenyu/admin/shiro/config/ShiroRealm.AuthenticationInfo
getCredential会获取header头内的token并返还。然后代码会判断token是否有值。
如果有就会进⼊getUserInfoByToken⽅法
or... | pdf |
Extreme Privilege Escalation On Windows 8/UEFI Systems
Corey Kallenberg
Xeno Kovah
John Butterworth
Sam Cornwell
ckallenberg@mitre.org, xkovah@mitre.org
jbutterworth@mitre.org, scornwell@mitre.org
The MITRE Corporation
Abstract
The UEFI specification has more tightly coupled the bonds of the operating system and the pla... | pdf |
A Password is Not Enough
Why disk encryption is broken and how we might fix it
Daniel Selifonov
DEF CON 21
2013-08-02
Five Questions
● Do you encrypt the drive in your computer?
● Using something like TrueCrypt, dmcrypt,
loop-aes?
● Do you always cold shutdown when leaving
your computer unattended?
● Have you ever le... | pdf |
1
The Evolution of
The Evolution of
Windows Spyware Techniques
Windows Spyware Techniques
Birdman
Birdman
birdman@chroot.org
birdman@chroot.org
birdman@xsolve.com
birdman@xsolve.com
ccbirdman@gmail.com
ccbirdman@gmail.com
HIT2005
HIT2005
22
The Evolution of Windows Spyware Techniques By Birdman, HIT2005
The Evolution... | pdf |
⿊黑客眼中的⼯工控4.0
——⼯工控系统安全威胁与应对探索
by Kimon
关于我
• 中国科技⼤大学苏研院
• ADF安全研究团队
• 物联⺴⽹网安全、⼯工控安全
qmwang@vip.126.com
13758178689
⺩王启蒙 Kimon
提纲
• ⼯工控背景
• ⼯工控系统
• ⼊入侵⽅方式
• 应对探索
⼯工业4.0与两化融合
⼯工控系统
• ICS ⼯工业控制系统
• SCADA 数据采集与监控系统
• DCS 分散式控制系统
SCADA系统
SCADA系统
⼯工控组件
• PLC可编程逻辑控制器
• RTU远程控制单元
• HMI⼈人机交互界⾯面
• 现场设备
PLC
• PLC实质是⼀... | pdf |
Defense&by&Numb3r5&
&
Making'problems'for'script'k1dd13s'
and'scanner'monkeys!
@ChrisJohnRiley'
“THE'WISEST'MAN,'IS'HE'
WHO'KNOWS,'THAT'HE'
KNOWS'NOTHING”'
'
'
SOCRATES:'APOLOGY,'21D'
This&talk&contains:!
!- Numbers
- Bad Jokes
- Traces of peanuts
- Did I mention numbers?
!!
TL!;DR!
Goals!for!this!talk!
Describe... | pdf |
Who’s&this…&guy&
• 10&years&on&the&defensive&side&
• File&analysis&&&RE&
• Recently&doing&research&using&Machine&
Learning&
Level&Se?ng&
• &ROP&
• Technique&to&bypass&nonFexecutable&memory&
• Bounce&around&in&memory&execuJng&small&
gadgets&that&typically&end&with&a&return&
instrucJon&
• PIN&
• Pin&is&a&dynamic&binary&i... | pdf |
The Paparazzi Platform
Flexible, Open-Source, UAS Software and
Hardware
esden, dotAero, misterj, cifo
Outline
● History, User Community,
Competitions & Missions
● Software
● Hardware
● Example Vehicles
● Demos
Who are we?
Who is Paparazzi?
Micro unmanned aerial vehicle framework
http://paparazzi.enac.fr
Why do I care?... | pdf |
0x01 应用简介
Spring Cloud Function 是 SpringBoot 开发的一个 Servless 中间件(FAAS),支持基于 SpEL 的函数
式动态路由。
0x02 漏洞复现
测试版本:
测试环境:
第 1 种利用:需要修改配置 + 任意路由
这种利用方式来自 逐日实验室 @默安
1. 修改配置文件,添加 "spring.cloud.function.definition:functionRouter"
2. 任意路由
# v3.2.0
https://github.com/spring-cloud/spring-cloud-function/releases/tag/v3.2.0
1
... | pdf |
#BHUSA @BlackHatEvents
IAM The One Who Knocks
Igal Gofman, Noam Dahan
#BHUSA @BlackHatEvents
Information Classification: General
Igal Gofman
@IgalGofman
• Head of Research, Ermetic
• Microsoft MSTIC
• Microsoft security research
• Active Directory expert
Noam Dahan
@NoamDahan
• Cloud security researcher
• Love/hate re... | pdf |
TQLCTF Writeup By Nu1L
Author:Nu1L
TQLCTF Writeup By Nu1L
Pwn
unbelievable_write
nemu
ezvm
timezone_challenge
Reverse
Tales of the Arrow
Misc
wizard
Ranma½
the Ohio State University
wordle
Web
Simple PHP
Crypto
Signature
OTP
Pwn
unbelievable_write
可以任意offset free,free掉tcache pthread struct然后打got
from pwn import *
# s =... | pdf |
Kenny@Choot.org
Kill AV in x64
What’s AV?
What’s AV?
AV
AV
雖然她們
伴隨著
青春歲月
深埋你我
的
D:\
But~
今天主角是…….
防毒Girl
防毒Girl
噴鼻血(圖)
以上純屬唬爛
演講開始
1. UAC Bypass
2. 數位簽章-Secret
3. Kill AV
主題
UAC Bypass
據說漏洞發現作者是在向微軟回報而
未被重視的情況下,憤怒的公開了原
始程式碼和實作Demo。
小故事
http://www.pretentiousname.com/misc/win7_uac_whitelist2.html
利用條件
1、某些程式在執行時會自動賦予為... | pdf |
HOW
TO
TRAIN
YOUR
RFID
HACKING
TOOLS
By
Craig
Young
Security
Researcher
Tripwire
VERT
HOW
TO
TRAIN
YOUR
RFID
HACKING
TOOLS
Table
of
Contents
Introduction
............................................................................................................ | pdf |
Covert Channels in
TCP and IP Headers
Drew Hintz
drew@overt.org
http://guh.nu
Drew Hintz - http://guh.nu - 2
At A Glance
• Who are you? Who are they?
• Definitions
• Analysis of some covert channels
• Attack against timestamp covert channel
• Detection and prevention
• New covert channel tool
Drew Hintz - http://guh.n... | pdf |
Demystifying Key
Stretching and PAKEs
Steve “Sc00bz” Thomas
2
Who am I? Why am I here?
3
Who am I? Why am I here?
● Password cracker
● Cryptography enthusiast
● I just wanted a pw manager
– Bugs and vulns galore
– How would I make one?
● PHC Panelist
– I broke Schvrch and old Makwa
4
● Key Stretching
– What?
– Why?
– ... | pdf |
01
02
03
MS Just Gave the Blue Team
Tactical Nukes
(And How Red Teams Need To Adapt)
2
IBM Security
Who is this Drew Carey Look Alike On Stage?
• Red Team Ops Lead at IBM X-Force Red
• I conduct red teaming operations against defense
contractors and some of North America’s largest banks
• On the board... | pdf |
New Techniques in
SQLi Obfuscation
SQL never before used in SQL Injection
Nick Galbreath
@ngalbreath
nick@client9.com
DEFCON 20 at the Rio in sunny Las Vegas
2012-07-27 Friday 4:20 pm!
http://slidesha.re/
MfOiNR
Follow along or get the latest version:
That's an OH, not a zer0
SQL Specification
• http://www.contrib.and... | pdf |
We have you by the gadgets
Hitting your OS below the belt
Legal Notice
Our opinion is our own. It DOES NOT IN
ANY WAY represent the view of our
employers.
whoami - Toby
whoami - Mickey
Agenda
• Who we are
• What are Gadgets
o A little bit of history
o Why this matters
o How to develop gadgets
o Gadget sec... | pdf |
THESE AREN’T THE
PERMISSIONS YOU’RE
LOOKING FOR
Anthony Lineberry
David Luke Richardson
Tim Wyatt
DefCon 18
AGENDA
• Android Internals Overview
• Security/Permission Model
• Why Ask For Permission When You
Can Ask For Forgiveness?
• Log-Cat – Our Inside Mole
• The Ultimate Permission
(Yes, we’re talking about root)
... | pdf |
EXTENSION-LAND
EXPLOITS AND ROOTKITS IN
YOUR BROWSER EXTENSIONS
BARAK STERNBERG // DEFCON 2021
ABOUT ME
•
Barak Sternberg (@livingbeef)
•
Senior Security Researcher, Previously Author @ SentinelOne Labs.
•
“Hacking smart-devices for fun and profit” // DC28 IoT Village.
•
BSc & MSC in CS on algorithms (bioinfo) from TA... | pdf |
ZeroDay: Roswell
by
Richard Thieme
I used to think that death bed revelations were nonsense. I knew lots of guys who kept
their vows to the last breath. Some even spread disinformation as they died under torture.
Intelligence professionals have discipline that sticks, most of the time.
I was sure that I did too.... | pdf |
简而言之,用户可以创建一个机器账户,机器账户改名为dc,然后申请TGT,然后把自己改
名,然后DC在TGS_REQ时会找不到这个账户就会以自己的密钥加密TGS,然后就得到了一
个高权限的ST。
利用过程
测试账户为普通域账户
检查目标是否受到影响:
1
Rubeus.exe asktgt /user:labs /password:abc123! /domain:ssosec.lab /dc:SSO
DC.ssosec.lab /nopac /nowrap
在无pac时和有pac时票据大小明显不同:
尝试攻击(域用户默认可以新建机器账户):
新增机器帐号使用powermad
1
New‐MachineAccount ‐MachineA... | pdf |
WMCTF WriteUp By Nu1L
AuthorNu1L Team
WMCTF WriteUp By Nu1L
RE
Meet_in_July
Welcome to CTF
Wmware
easy_apk
easy_re
WEB
Make PHP Great Again
gogogo
base64
Make PHP Great Again 2.0
web_checkin2
SimpleAuth
webweb
web_checkin
Misc
Music_game
XMAN_Happy_birthday
Performance_artist
sign-in
Dalabengba
Part1
Part2
Part3
Music_... | pdf |
User Profile Based
Anomaly Detection
Fighting Malicious Insider Threat at Office365
Lei He
Principal Engineering Manager, Microsoft Corporation
2019-05-30
The Context - Office365 Security Requirements
*Customer lockbox onboarding is must only for enterprise service accessing customer data.
•
Cannot use Corp identity ... | pdf |
360 企业安全集团
Attacking Kerberos
演讲人:吴方东,n1nty @ 360 A-TEAM
2 0 1 8
吴方东,n1nty @ 360 A-TEAM
安全研究员
• 360 企业安全集团旗下的纯技术研究团队。
• 致力于 Web 渗透,APT 攻防对抗,前瞻性攻防工具预研。
• 进行严肃、有深度的技术研究,深入还原攻与防的技术本质。
360 A-TEAM
资深失眠患者
服务端验证“你是否真的是你所声称的那个人”的过程
非加密通道会导致明文密码泄露
USERNAME/PASSWORD
我要登陆,这是我的账号密码
对比账号密码
成功
失败
•
不需要传输密码本身
•
可在非加密通道使用
USER01
我要登陆
... | pdf |
DEF CON 19:
This is REALLY not the Droid you’re looking for…
Nicholas J. Percoco – Trustwave’s SpiderLabs
Sean Schulte – Trustwave’s SSL Team
Copyright Trustwave 2011
Agenda
•
Introductions
•
Primer / History: Android Platform Development
•
Mobile User Interface DOs and DON’Ts
•
Research Motivations
•
Re... | pdf |
2022/5/16 05:03
Evernote Export
file:///C:/Users/jiushi/Desktop/Active Directory 域权限提升漏洞(CVE-2022-26963)漏洞复现.html
1/7
漏洞原理:
默认情况下,用户模板不易受到攻击。当我们根据用户模板请求证书时,用户帐户的用户主体名称 (UPN) 将嵌入可用于识别的 SAN 中。由于 UPN 必须是唯一的,而且我们通常无
法修改 UPN,因此我们无法利用此模板。此外,由于我们无法更改证书签名请求中的 SAN 值,因此我们无法通过指定其 UPN 来模拟其他用户。
但是,计算机帐户没有 UPN。机器模板不使用 UPN 进行身份验证,而是使... | pdf |
Summary of Attacks Against
BIOS and Secure Boot
Yuriy Bulygin, John Loucaides, Andrew Furtak,
Oleksandr Bazhaniuk, Alexander Matrosov
Intel Security
In The Beginning
Was The Legacy BIOS..
Legacy BIOS
1.
CPU Reset vector in BIOS ‟ROM‟ (Boot Block)
2.
Basic CPU, chipset initialization
3.
Initialize Cache-a... | pdf |
PHYSICAL ACCESS CONTROL
SYSTEMS
Are you protected by two
screws and a plastic
cover?...... Probably!
Zac Franken
Defcon 15
What we are going to
cover:
• Overview of physical
credentials
• Brief overview of biometric
systems
• Biometric worked example
• Demo of attack
Basic system
Anti-Passback system
Physical Cr... | pdf |
Securing the Tor Network
Mike Perry
Riverbed Technology
Black Hat USA 2007
Defcon 2007
Who am I?
● Volunteer Tor developer
● Forward+Reverse engineer
● Employed by Riverbed (shameless plug)
– Leading manufacturer of WAN accelerators
– 20200X (not percent. X) improvement of CIFS
– 550X improvement of MAPI/Exchange
– P... | pdf |
1
Apache Commons Text RCE(CVE-OLOO-
QOWWX)
漏洞分析
漏洞复现
漏洞防御
漏洞详细:https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om
根据⽂中提到的 lookups 可以定位到 InterpolatorStringLookup#lookup ⽅法
漏洞分析
2
第5⾏将 : 的第⼀次出现的下标赋给 prefixPos,如果 prefixPos ⼤于 0,则会将 : 前半部分赋给
prefix(此处会进⾏⼩写处理),后半部分赋给 name。
接着在 stringLookupMap 查看是否存在对应的键名... | pdf |
#Proxyshell# 个人记录
目前 proxyshell 实战中遇到最多的问题有两种。一个是 powershell 端点获取问题,一个是获
取 cmdlet 可执行端点后 get webshell 中间遇到的坑。
一、powershell 端点获取问题
目前大部分人利用 poc 时都是使用 administrator 测试是不是存在可以利用的 powershell 端
点,获取不到爆破邮箱。这里使用头像哥思路可花较少时间获取 ps Exhange 的权限。
1. 原始 poc 浅析
https://github.com/dmaasland/proxyshell-poc/blob/main/proxyshell.py
结合最先公... | pdf |
0x00
IDAburp
1.
2.
3.
4.
vpnvpn
0x01
1. IAM
2. idedr
3.
4. ipurl
wafids
5.
0x02
1. SDP
2. NIST
3.
SDP
SDP
SDPSDP
SDPSDPSDP
agentagentSDP
iptablesipSDP
agentipiptablesip
SDP
NIST
NIST
(PDP)(PEP)
NISTISOAccess management-AMPDPPEP
NISTPDP/PEP
NISTPDPSDPPEPSDPagent
0x03
sxfatrustatrustvpn
VPN
ip
vpn
vpn
at... | pdf |
§ David Mortman, enStratus
§ Rob Graham, ErrataSec
§ Dave Maynor, ErrataSec
§ Chris Hoff, Juniper
§ James Arlen, Liquid Matrix
§ Larry Pesce, PaulDotCom
§ Rich Mogull, Securosis
Fail Panel Five | pdf |
PHP 代码审计
培训教材
路虽远,行则必达。
- 2 -
目录
代码审计基础........................................................................... - 4 -
代码审计概念.................................................................................- 4 -
需要了解一些函数.........................................................................- 6 -
需要了解的超全局变量............ | pdf |
DefCon 13
Shmoo-Fu: Hacker Goo,
Goofs, and Gear with the
Shmoo
The Shmoo Group
www.shmoo.com
DefCon 13
Stickers anyone?
DefCon 13
What's up Shmoo?
● Howdy & introductions...
● Our festivities will include:
– Super Spy Stuff
– IDN Fallout & Homograph Attacks
for Personal Identities
– Revving Up Rainbow Tables
– Rogue... | pdf |
SigFlip原理:将数据隐写到已签名的PE文件上
Github地址: https://github.com/med0x2e/SigFlip
可以怎么玩呢,可以白加黑当冲锋马的时候,白文件写入shellcode,黑文件加载白文件的shellcode。
也可以做维权使用,将shellcode注入到系统的白文件中,dll劫持或者loader加到启动项里面。
使用
两个目录 Bof 和 DotNet ,DotNet是c#写的用来可行性测试,包含注入代码,loader加载功能,Bof是C
写的,也包含注入代码和loader加载功能,主要是可以编译成bof文件给Cobalt Strike使用。
c#代码loader的部分直接CreateRe... | pdf |
脚本⼩⼦觉悟之获取⽹⻚正确编码
0x00 认识text与content
先来⼀段熟悉的代码:
那么 text 与 content 的区别,我们可以跟进看看
content 代表返回 raw 类型的byte字节流数据,这个时候的数据没有编码概念。
text 通过阅读注释和代码,可知返回的是编码后数据,其中获取编码的流程是,先通过 response 的header头来
判断,如果没有,则Fallback到 chardet 去猜测,然后使⽤获取到的最终编码类型对byte数据进⾏编码。
resp = requests.get(url=url, verify=False)
print(resp.text)
print(resp.content... | pdf |
The
Evolu*on
of
Chrome
Security
Architecture
Huan
Ren
Chromium
Contributor
Qihoo
360
Technology
Ltd
Introduc*on
to
Speaker
• 2011.07
-‐
Present,
Qihoo
360
Technology
Ltd.
Engineering
lead
of
360
browser
team
• 2007
-‐
2011,
Staff
S... | pdf |
⾃动src之ARL⼤改造-优化漏扫
0x00 前⾔
这篇⽂章是继续对灯塔ARL的优化以达到较好的辅助src漏洞挖掘。继前⾯通过对host碰撞的简单优
化我⼤概了解了⼀下arl的逻辑,接下来这篇⽂章是针对更加复杂的nuclei的漏扫模块做⼀定的优
化。
0x01 简单看⼀下nuclei扫描逻辑
这⾥的nuclei扫描可以理解为arl调⽤的⼤名鼎鼎的漏扫⼯具nuclei作为主要漏扫引擎。不知道nuclei
的可以⾃⼰去GitHub下载安装⼤致体验⼀下,暂时可以简单的理解为国外版的xray。ARL这⾥直接
将nuclei作为漏扫引擎来集成使⽤了。
我们⼤概看⼀下代码上的逻辑,搜⼀下nuclei
跟进去
看起来是展示扫描结果的,⽽我们... | pdf |
“Stratagem 1 "Deceiving the heavens to
cross the sea”
瞒天过海
(Using the the 36 stratagems for Social Engineering)
Jayson E. Street, CISSP, C|EH,
GSEC, GCIH, GCFA,
IEM, IAM, ETC…
Let go of my EGO
Who Am I?
defcon18@f0rb1dd3n.com
Hacker/Social Engineer
INFOSEC talk = slide like this ;-)
• Sun Wu (Tzu) “Ping-f... | pdf |
============= Non-Executable Stack ARM Exploitation =================
0.- Introduction
1.- ARM Assembly
1.0 - Exploitation of ARM vs. X86 when stack isn't executable
1.1 - ARM calling convention (APCS)
1.2 - Why simple ret2libc will not work?
1.3 - Understanding the vulne... | pdf |
WMCTF 2021 Nu1L Writeup
WMCTF 2021 Nu1L Writeup
Misc
Checkin
Questionaire
你画我猜
我画你猜
一笔改画
Foolish Black Ai Entrance
LOGO
Plants VS Zombies Version1
car hack
Crypto
checkin
easylsb
ezl1near
PWN
red_high_heels
dy_maze
Nescafe
Reverse
Re1
Re2
Web
ez piwigo
Number
Misc
Checkin
checkin
Questionaire
questionaire
你画我猜
随便画
我画你猜... | pdf |
一枚字体CRASH到FUZZING的探索
目录
CONTENTS
1、fuzzing的介绍
2、fuzzing这么好玩,就crash了
3、进阶!apple 字体处理框架的fuzzing
4、升级!fuzzing的探索与改造
5、继续fuzzing,收获漏洞!
0 1
PART
01
0 2
fuzzing的介绍
介绍
0 1
2020是个非常奇妙与难忘的一年,同样fuzzing技术在2020年技术井喷,涌现了一大批fuzzing工具和前沿的
研究;
在2020年的年终时候,我在知乎上对2020年的开源fuzzing做了一些总结与些许研究,一个开源的研究与项
目叫FormatFuzzer,这个项目的出现,让我想起了aflsmart的... | pdf |
0x00前言
本期登场的目标虽不是SRC,但是整个漏洞的利用手法很有学习意义。目前在很多大厂的http数据包中
都会添加sign值对数据包是否被篡改进行校验,而sign算法的破解往往是我们漏洞测试的关键所在~
本人在一些漏洞挖掘实战中经常发现在破解sign值后,在测试各类越权,重放等漏洞时一马平川
今天特此为大家带来这样一个精彩的实战案例。
0x01 背景
学校每学期的体育成绩中会有10%来源于某跑步APP的打卡数据,本人作为一个体测只能勉强及格的废
物,自然得想办法拿到这10分,以防挂科
无奈这个app后台设置的是每学期男生总共要求跑120公里才能完整地拿到10分,非常恶心。
一学期跑120公里,你还不如鲨了我,于是便有了此文对于... | pdf |
@patrickwardle
OFFENSIVE MALWARE ANALYSIS
dissecting osx/fruitfly via a custom c&c server
WHOIS
“leverages the best combination of humans and technology to discover
security vulnerabilities in our customers’ web apps, mobile apps, IoT
devices and infrastructure endpoints”
security for the
21st century
@patrickwardle... | pdf |
S-javaagent
参考文章
javaagent使用指南
Java Instrumentation
javaagent 实例
Javaagent 是 java 命令的一个参数。参数 javaagent 可以用于指定一个 jar 包,并且对该
java 包有2个要求:1、这个 jar 包的 MANIFEST.MF 文件必须指定 Premain-Class 项。2、
Premain-Class 指定的那个类必须实现 premain() 方法。 premain 方法,从字面上理解,就是
运行在 main 函数之前的的类。当 Java 虚拟机启动时,在执行 main 函数之前, JVM 会先运
行 -javaage... | pdf |
作者:白帽汇安全研究院@kejaly
校对:白帽汇安全研究院@r4v3zn
前言
在研究高版本 JDK 反序列化漏洞的时候,往往会涉及到 JEP 290 规范。但是网上公开针对 JEP 290 规范
原理研究的资料并不是很多,这就导致在研究高版本 java 反序列化的时候有些无能为力,所以最近对
JEP 290 规范好好的研究的一番,输出这篇文章,希望和大家一起交流学习。
简介
官方描述: Filter Incoming Serialization Data ,即过滤传入的序列化数据。
主要内容有:
Provide a flexible mechanism to narrow the classes that can be des... | pdf |
Office Drama
...on macOS
WHOIS
@patrickwardle
analysis
exploit chain
OUTLINE
history
Evil Office Docs!
defense
Recent History
macro based attacks, targeting macOS
...defined
MACROS
Macro:
"A macro is a series of commands & instructions that you group
together as a single command to accomplish a task automatically... | pdf |
Introduction
8
Basic Hacking Known Vulnerabilities
11
Introduction
11
Identifying technologies
13
Introduction
13
Wappalyzer
13
Powered By
14
Summary
15
Identifying the vulnerabilities
16
Introduction
16
Google
16
ExploitDB
17
CVE
19
Summary
19
Finding the POC
2... | pdf |
The Real-Life Story of the First Mainframe Container Breakout
CROSSOVER EPISODE
@IanColdwater
@bigendiansmalls
• Ian is a leading expert on containers and
container security.
• Chad is the same, but for mainframes and
mainframe security.
MINNESNOWTA
@IanColdwater
@bigendiansmalls
DEEP MAGIC
@IanColdwater
@bige... | pdf |
Vanquishing Voyeurs:
Secure Ways to
Authenticate Insecurely
Andrea Bianchi & Zoz
ANDREA
BIANCHI
ZOZ
Overview
•
Password/PIN Features & Observation Attacks
•
Observation from Without
•
Physical Key Entry at Insecure Terminal
•
Mechanical Observation-Resistant Solutions
•
Observation from Within
•
Key Protection between... | pdf |
YOUR VOICE IS MY PASSPORT
John Seymour and Azeem Aqil
1
Introduction
Voice is starting to be used for authentication
2
Introduction
Voice is starting to be used for authentication
3
Introduction
Voice is starting to be used for authentication
4
Introduction
Voice is starting to be used for authentication
5
Goal:
B... | pdf |
1
LPHCTF bypass出题⼈视⻆
N. 绕过后缀
O. 绕过可⻅字符检测
P. 绕过⿊名单检测
@yzddmr6
⾃⼰在L3HCTF中出了⼀道java上传绕过题⽬bypass。其中题⽬中的⼀些trick不仅仅是⽤于CTF出题,
对于实战渗透也是有⼀定的帮助。今天跟⼤家分享⼀下出题时的⼀些思考跟解题细节。
题⽬有三道过滤
后缀jsp/jspx会被替换为空,⽤双写绕过:jsjspp。常规操作
1. 绕过后缀
2. 绕过可⻅字符检测
Plain Text
复制代码
public static String checkExt(String ext) {
ext = ext.toLowerCase(... | pdf |
Mind Games
1
Introduction to
Species, Lost in Apple-eating Time
I have to admit, I love this wee little story. It’s the best I could do
at the time, trying to express the unthinkable in words.
It was the unthinkable, I think, that I was thinking, walking
around the park near which I live in Fox Point, Wisconsin, thinki... | pdf |
Tsung Pei Kan
peikan@gmail.com
1
Graduated from Central Police University . He likes to study about
Kernel and Reverse Engineering. He is interested in the subject of
Computer Forensic. He’s working for National Police Agency now.
Besides, he is also the docent for Taiwan Network Information Center.
At the b... | pdf |
© Copyright 2013 NCC Group
An NCC Group Publication
Revealing Embedded Fingerprints: Deriving
Intelligence from USB Stack Interactions
Prepared by:
Andy Davis
Research Director
andy.davis ‘at’ nccgroup.com
NCC Group | Page 2
© Copyright 2013 NCC Group
Contents
1
List of Figures and Tables .................... | pdf |
Hacking WebAssembly Games
with Binary Instrumentation
WEBASSEMBLY 101
WASM
101
> Developers have done (and continue to do)
incredible work speeding up Javascript
> However, the dynamic nature of Javascript will
always be a roadblock
> WebAssembly provides a static, pre-compiled
binary format for performance intensi... | pdf |
Reaping and breaking keys at scale:
when crypto meets big data
Nils Amiet
Yolan Romailler
August 2018 — DEF CON 26
Warning: These slides are not up to date
Get the latest slides from:
https://research.kudelskisecurity.com/
Warning: if you want to test your keys live
You can go to our website:
keylookup.kudelskisecuri... | pdf |
1
TAKING WINDOWS 10 KERNEL EXPLOITATION TO THE NEXT LEVEL – LEVERAING WRITE-WHAT-WHERE
VULNERABILITIES IN CREATORS UPDATE
Morten Schenk msc@improsec.com
Contents
Abstract ................................................................................................................................................... | pdf |
General ways to find and exploit
directory traversals on Android
Xiang Xiaobo (Elphet) @ 360 Alpha Team
About Us
• Alpha Team @360 Security
• 100+ Android vulnerabilities(Google Qualcomm etc)
• Won the highest reward in the history of the ASR program.
• 5 Pwn contest winner
• Pwn2Own Mobile 2015( Nexus 6)
• Pwn0Ra... | pdf |
The Completion Backwards Principle
Bringing Layer 0 Issues To Layer 3
● geoffrey
● Defcon 0x0F
Alarm Systems
● Fire
– Actively detects a fire
– Alerts inhabitants, and /or authorities
● Burglar
– Detects intrusion into the facility premises
– Alerts inhabitants, and /or authorities
– Often co-exists with a Fire alarm s... | pdf |
Hacking electric skateboards:
vehicle research for mortals
Richo Healey & Mike Ryan
@mpeg4codec / Hacking Electric Skateboards / @rich0H
Who are these jerks anyway
‣ richo
‣ Computer Jerk
‣ @rich0H
‣ Duck Enthusiast
‣ Ran WrongIslandCon
‣ mike
‣ Bluetooth Guy
‣ @mpeg4codec
‣ Owner/Operator of
conscience (sometimes)
... | pdf |
Advanced SQL Injection
Presented By:
Joe McCray
joe@learnsecurityonline.com
http://twitter.com/j0emccray
http://www.linkedin.com/in/joemccray
The Last of a Dying Breed
A Network Penetration Tester
You know – the nmap, exploit, upload netcat type of guy.
A.K.A:
The only black guy at security conferences
Joe McCray.... ... | pdf |
简单规则屏蔽goby和masscan
0x00 前⾔
和橙⼦酱讨论了⼀下扫描特征的问题,橙⼦酱提到masscan有固定特征可以被识别,因此记录⼀
下。
0x01 扫描特征
根据⽂章描述
意思⼤概是nmap⾥的tcp-option字段为4个字节,这是⼀个特征,因此可以使⽤IP上图⾥的
iptables规则直接把nmap的端⼝扫描流量给丢弃掉。对应到wireshark抓包来看是这个字段:
这是⼀个nmap的sT扫描的抓包实例,在tcp option这个字段是24字节,和前⾯说的有所不同,经
过抓包来看正常的tcp请求这个tcp option也是24字节为多。因此这个特征并不存在于nmap的新版
之中。
0x02 masscan的特... | pdf |
State of DNS Rebinding
Attack & Prevention Techniques and
the Singularity of Origin
Gérald Doussot & Roger Meyer | DEF CON 27
New Tool: Singularity
●
Everything you need for DNS
rebinding
●
Reliable: Default settings just work
●
Performant: up to 20x faster (3s vs
60s)
●
Built-in payloads: Jenkins, Rails,
AWS Instan... | pdf |
Aura
A peer-to-peer reputation system
Cat Okita, 2003
Reputation Systems
• What is a Reputation System?
– Livejournal/Friendster, eBay, Avogato,
Slashcode
• Why do you care?
• What could you use this for?
– Establishing trust, performance metrics, meme
propagation, spam filtering
Challenges
• Authentication
• Trust
• N... | pdf |
针对开发人员的钓鱼
下午看到 @wonderkun 分享了一个项目:
此时我还没意识到这个项目的问题,在 clone 之后, Readme.md 的介绍是相当的给力,我想看看它是如
何实现的。
总之看起非常强大,有 gif ,还有支持的功能列表,就和所有的开源 RAT 一样。
究竟是什么?
图标看过去是正常的,看上去和正常 VS 的项目文件一样。
在经过提醒之后,发现这个 VS 的项目文件有点奇怪, Type 为 Screen saver ,文件的后缀名
为 ..sln 。
Screen saver 为 Windows 屏幕保护程序,在用户不活动时,将会触发 屏幕保护程序。
这个文件实际上就是一个 PE ,就是一个可执行文件。... | pdf |
1
Java⼩trick之在懵逼中为Random跪下
LxLN 问题
LxLO 解答
LxLO.N 初步解答
LxLO.O 回看问题
LxLP 思考
LxLQ 杂项
LxLS 总结
这个⽉在逛着https://stackoverflow.com突然发现个有点意思的⼀段代码,或者说是有点意思的猴戏
怎么说呢,就是看完以后,不知道为啥⼦,我就在懵逼中跪下了...
为了解决疑问,快速爬起来,我就决定解决这个疑问
先给你们看看这个问题是啥,你们就知道我为何懵逼了
https://stackoverflow.com/questions/15182496/why-does-this-code-using-random-strings-
pr... | pdf |
API接口安全checklist
身份认证
不要使用
,请使用标准的认证协议(如
,
)。
Basic Auth
JWT
OAuth
不要重新实现
、
和
,请使用标准库。
Authentication
token generating
password storing
限制密码错误尝试次数,并且增加账号冻结功能。
加密所有的敏感数据。
JWT(JSON Web Token)
使用随机复杂的密钥(
)以增加暴力破解的难度。
JWT Secret
不要在请求体中直接提取数据,要对数据进行加密(
或
)。
HS256
RS256
使 token 的过期时间尽量的短(
,
)。
TTL
RTTL
不要在 JWT 的请求体中存放敏感数据,因... | pdf |
网络产品安全漏洞管理规定
第一条 为了规范网络产品安全漏洞发现、报告、修补和发布等行为,防范网络安全风险,根据《中华人
民共和国网络安全法》,制定本规定。
第二条 中华人民共和国境内的网络产品(含硬件、软件)提供者和网络运营者,以及从事网络产品安全
漏洞发现、收集、发布等活动的组织或者个人,应当遵守本规定。
第三条 国家互联网信息办公室负责统筹协调网络产品安全漏洞管理工作。工业和信息化部负责网络产品
安全漏洞综合管理,承担电信和互联网行业网络产品安全漏洞监督管理。公安部负责网络产品安全漏洞
监督管理,依法打击利用网络产品安全漏洞实施的违法犯罪活动。
有关主管部门加强跨部门协同配合,实现网络产品安全漏洞信息实时共享,对重大网络产品安全... | pdf |
Universal*Serial*
aBUSe
Rogan&Dawes&&&Dominic&White
research@sensepost.com
Important*Note
• This&is&the&text8based&version&of&the&slides,&and¬&
the&version&we&plan&to&present.&We&wanted&to&give&
you&something&meaningful&to&read&through.
• The&toolset&will&be&released&on&our&github:
• https://github.com/sensepost/USa... | pdf |
0x01
PEID
dll
dll
getshell
0x02
C#
https://xz.aliyun.com/t/9168
https://xz.aliyun.com/t/9591
https://xz.aliyun.com/t/9593
https://xz.aliyun.com/t/9592
https://xz.aliyun.com/t/9594
https://xz.aliyun.com/t/9595
https://xz.aliyun.com/t/9597
https://xz.aliyun.com/t/9598
https://xz.aliyun.com/t/9599
https://x... | pdf |
Cunning with CNG:
Soliciting Secrets from Schannel
DefCon 24
Why you might care
❏
Extracting TLS / SSL Keys (of various types) from memory
❏
Ability to decrypt TLS connections that use ephemeral key exchanges
❏
For anything that uses Schannel: RDP, IE, Powershell, etc...pretty much anything .NET too
❏
Past connections ... | pdf |
0x01 前言
中午在学校午休,就看了 @忍酱 的反制Goby, @暗羽师傅 的反制Burpsuite还有 @先知社区 里的反制蚁
剑, @f4ltJ4y 的蚁剑复现,挑起了我想反制的心!
蚁剑版本: 2.1.12
0x02 虚假XSS
蚁剑是自带浏览器的,用的是Chrome!本想着暗羽师傅的那篇可以用得到,发现版本不对
发现它调用了dhtmlx框架,可以解析HTML
正是因为这个虚假的XSS,更加激发了我想RCE的心!
我们可以参考:
https://xz.aliyun.com/t/8167
<img src=1 onerror=alert(1)>
0x03 放弃RCE
我在想既然有内置浏览器,那么 Chromium浏览器 版本是... | pdf |
Backdooring hardware devices
by injecting malicious payloads
on microcontrollers_
By Sheila A. Berta (@UnaPibaGeek)
@UnaPibaGeek
WHO AM I?_
Sheila A. Berta (@UnaPibaGeek)
Offensive Security Researcher
@UnaPibaGeek
WHO AM I?_
Sheila A. Berta (@UnaPibaGeek)
Offensive Security Researcher
A little bit more:
-
Developer in... | pdf |
ScriptEngineManager代码执行
ScriptEngineManager 是用于 java 与 js 之间的相互调用。这个类在 jdk6 中存在。
初始化
ScriptEngineManager 类有两个初始化方法,一个有参,一个无参。有参的初始化方法是传递一
个 ClassLoader ,无参的构造方法是使用进程本身的 CLassLoader 。
这里可以回顾一下 SnakeYaml 反序列化,其中就用到了 ScriptEngineManager 类,传递一个
URLClassLoader ,然后利用 SPI 机制达到代码执行。所以此处可以先回顾一下这个利用过程。
SnakeYaml 反序列化中的初始化
SPI
SP... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.