text
stringlengths
100
9.93M
category
stringclasses
11 values
Beyond the MCSE: Red Teaming Active Directory Sean Metcalf (@Pyrotek3) s e a n @ adsecurity . org www.ADSecurity.org About Me Founder Trimarc, a security company. Microsoft Certified Master (MCM) Directory Services Microsoft MVP Speaker: Black Hat, BSides, DEF CON, DerbyCon, Shakacon Security Consultant / Security ...
pdf
Infiltrating Corporate Intranet Like NSA Pre-auth RCE on Leading SSL VPNs Orange Tsai (@orange_8361) Meh Chang (@mehqq_) USA 2019 Orange Tsai • Principal security researcher at DEVCORE • Captain of HITCON CTF team • 0day researcher, focusing on Web/Application security orange_8361 Meh Chang mehqq_ • Security research...
pdf
边信道攻击实战 Kevin2600 . Kevin2600 . 专注无线电; 嵌入式设备安全研究 . NewSky 安全研究员 + 安全培训讲师 . 坚信黑客精神就是不断探索未知领域 边信道的传说? 边信道的传说? . Side-Channel 必须掌握很深的数学知识? . Side-Channel 必须使用昂贵的硬件设备? . Side-Channel 都有哪些实战中的运用? . Side-Channel 作为小白该如何开始? Contents: • 边信道的那点事 • 边信道案例 – EM Leaking • 边信道案例 – Timing Attack • 边信道案例 – Fault Injection Attack...
pdf
代码审计 代码审计(一 一) 熊海 熊海cms V1.0 最近在学习代码审计,试着将这些东西记录下来,也是当做一种总结吧。今天我进行这款cms的代码审计叫熊海cms V1.0,它是一款小型的网站内容管 理系统,非常适合个人建站使用。因为年代久远了,所以这款cms漏洞还是比较多的,审计起来难度不难,非常适合我这种小菜鸡入门学习的。话不多 说,我们先来看看它的源代码目录分布吧。 admin//管理员后台 css//css样式 files//功能函数 images//图片文件 inc//配置信息 install//安装目录文件 seacmseditor//seacms编辑器 template//模板文件 upload//文件上传 inde...
pdf
NSM 101 for ICS About me Chris Sistrunk, PE Electrical Engineer Sr. ICS Security Consultant – Control system security assessments – ICS Village (DEF CON & RSA Conference) Entergy (11+ years) – SCADA Engineer (10 years) – Project Robus (ICS Protocol Fuzzing) • 30+ implementation vulnerabilities in DNP3 stacks ...
pdf
TCTF 2019 TCTF 2019 PWN vim zerotask plang Reverse Elements Fixed Point sanitize Web Ghost Pepper Wallbreaker Easy Crypto babyrsa MISC flropyd Neuron Break http://ctf.0ops.sjtu.cn/ 23 March 2019, 06:00 UTC — 25 March 2019, 06:00 UTC Nu1L PWN vim a stepperm_state_Tbuffer freegotbufferfreegot system from pwn import * from h...
pdf
DIRA: Automatic Detection, Identification, and Repair of Control-Hijacking Attacks Alexey Smirnov Tzi-cker Chiueh Computer Science Department State University of New York at Stony Brook Stony Brook, NY 11794-4400 {alexey, chiueh}@cs.sunysb.edu Abstract Buffer overflow attacks are known to be the most com- mon type of att...
pdf
1 luks 全盘加密的⼀个通⽤解密⽅法--从内存中提 取LUKS MASTER KEY 前⾔ 破解LUKS全盘加密 从内存镜像中提取MASTER KEY 第⼀步 判断加密算法 第⼆步 DUMP 包含秘钥的内存 第三步 从内存寻找aes key 第四步 解密分区 第五步 解密其他分区 作者:橙⼦酱 之前的⽂章中提到了⼀种有启动分区的情况 磁盘主引导->引导分区->引导内核->系统启动->解密挂载分区 (⼀个引导分区 +⼀个主分区) 遇到这种情况就可以通过简单的提取⽂件系统中的秘钥解决. 但是运⽓不好还会遇到两种更变态的情况 磁盘主引导->引导分区->引导内核->引导内核中解密挂载分区->系统启动->解密挂载分区(只有⼀个引 导...
pdf
From  0  to  Secure  in  1  Minute DEFCON  23 Nir Valtman &  Moshe  Ferber About  Us Nir  Valtman Moshe  Ferber ü CISO  Retail  in  NCR  Corporation. § We  own  a  private  cloud  &  offering  SaaS § Yes…  we  do  security! ü Instructor  for  Cloud  Security...
pdf
Copyright 2003 Corporate Defense Strategies 1 TSCM The real story behind sweeping for eavesdropping devices ECHNICAL ECURITY OUNTER EASURES Jeffrey S. Prusan Michael D. Glasser Copyright 2003 Corporate Defense Strategies 2 TSCM Outline •Tools used for sweeps •Demo of how phones are tapped •Signs that your offices are “...
pdf
D u m a r t f u z z e r : M a k e t h e d u m b f u z z e r s m a r t 陈振宇 个人安全研究员 背景 • 内存类漏洞占很大比例 • Fuzzing仍然是发现内存类漏洞的重要手段 • 有源码fuzzing工具已经很完善 • 无源码fuzzing的方法缺点较多,一般无源码 的Fuzzing也叫黑盒fuzz • 有时不得不进行黑盒fuzz。如闭源项目。 背景:黑盒fuzz的困难 • 状态机 • dlopen • qemu, unicorn • 效率低 • 缺乏路径反馈 • 没有路径反馈的一般称为dumb fuzz,反之会叫smart fuzz • 没有地址消杀器 •...
pdf
Collaborative Penetration Testing With Lair About Us • Tom Steele – Consultant at FishNet Security – @_tomsteele • Dan Kottmann – Consultant at FishNet Security – Security assessments – Hobbyist coder – @djkottmann The Problem Lair What is Lair • Web application for managing and tracking the execution of network asse...
pdf
0x01 前言 看到赛博回忆录白白白师傅发了一篇反制ysoserial的文章,于是兴高采烈的准备自己试一把。结果在自己动手操作的时 候,pa一下,没打成功。于是和木头师傅探讨了一下,因为当时有事,第二天才去调试,发现了这个乌龙。。那就分享 一下思路。 0x02 正片 一、 ysoserial反制 registry.list和registry.bind,这两处就是调用的原生的RegistryImpl_Stub,会触发UnicastRef#invoke- >StreamRemoteCall#executeCall导致反序列化,这里就有反序列化点了。 一开始我对反制存疑,可以看到这里存在了java沙箱的机值,会限制命令的执行。: 后来验证...
pdf
Urban/Metropolitan Area i December 2006 Tactical Interoperable Communications Scorecards Tactical Interoperable Communications Scorecards Tactical Interoperable Communications Scorecards Tactical Interoperable Communications Scorecards Tactical Interoperable Communications Scorecards Summary Report and Findings...
pdf
The Year of HD Voice -- 2010 Who, what, where, how? (Actually, who, how, where, what) Doug Mohney - Background • Following the ICT sector for over two decades • Writing for Boardwatch, The Inquirer, VON Magazine (Pulvermedia), TMC • Started HD voice coverage in May 2009 • Launch of HD Voice News (HD Connect Now) in A...
pdf
#BHUSA @BlackHatEvents Chasing Your Tail With A Raspberry Pi Matt Edmondson #BHUSA @BlackHatEvents Information Classification: General Why Are We Talking About This? • For some people, trying to figure out if they’re being followed is a matter of physical safety for themselves or others • I was approached by a frien...
pdf
And Point of Sale Systems HACKING HOTEL KEYS Security Consultant TWITTER, LinkedIN @westonhecker Rapid7 www.rapid7.com Senior Security Engineer/Senior Pentester/ Security Researcher. About 11 years pen-testing, Security Research, Speaker at Defcon 22, 23 and 24 Las Vegas, HOPE 11, TakedownCON 2016,B-sides Boston, B...
pdf
Web API 安全漏洞与检测防护 徐诣博 2017.8.25 目录 Contents Page 2、Web API 安全漏洞 3、WAF Web API 漏洞防护 4、Web API 安全开发建议 1 、Web API 安全威胁 目录 Contents Page 第 1 章 Web API 安全威胁 什么是 Web API • 使用 HTTP 协议通过网络调用的 API • Web API 是一个 Web 系统,可以通过访问 URI 与服务器完成信息交互,或者获取存放在服务 器上的数据信息等,调用者通过程序访问并机 械地使用这些数据。 • Web API 和 Web Services • JSON 谁在用 Web API AP...
pdf
数据安全杂谈(⼀) 本⽂发表于赛博回忆录。 前⾔ 随着数据安全提上安全的⽇常,⼤家其实可以发现,传统的那种堆叠安全设备的防护⽅式是⼀个低效 的,不太实⽤的⼀种防护⼿段。 所以防护的重⼼发⽣了偏移 ⼀个公司的安全建设随着防护的重⼼发⽣偏移,从⽽导致安全建设的中⼼也发⽣了偏移 痛 其实⼀个企业在做企业级的安全建设的时候,都会存在⼀些相应的痛点问题,这些痛点的解决随时随 地,都牵涉着⼀个安全团队的安全建设的进度。 这样单独总结出来⼤家可能觉得,这并不是痛点啊?下⾯我就⼀⼀解释⼀下这些痛点! 1、资源有限 预防性的安全建设资源有限 已经建设的业务投⼊⽅⾯资源有限 已经发布的产品线 资源有限 时间不够 能⼒不⾜ 没有⼈负责的业务 2、时间不够...
pdf
Developing Managed Code Rootkits for the Java Runtime Environment Developing Managed Code Rootkits for the Java Runtime Environment DEFCON 24, August 6th 2016 Benjamin Holland (daedared) ben-holland.com DEFCON 24, August 6th 2016 Developing Managed Code Rootkits for the Java Runtime Environment Developing Managed Code ...
pdf
Hacking Desire “Reverse-engineering what people want” Ian Clarke, CEO Uprizer Labs ian@uprizer.com Why? • Everyone has needs and desires • If we can predict these, then we can give people what they want • This will make them happy • ??? • Profit! Specific problems we could solve • Music (last.fm, Indy, Pandora) • Movies...
pdf
1 DEFCON 2018 USA ALEXANDRE BORGES RING 0/-2 ROOKITS : COMPROMISING DEFENSES DEFCON 2018 - USA ALEXANDRE BORGES - MALWARE AND SECURITY RESEARCHER PROFILE AND TOC TOC: • Introduction • Rootkits: Ring 0 • Advanced Malwares and Rootkits: Ring -2 • Malware and Security Researcher. • Consultant, Instructor and Speaker ...
pdf
Gaining Access to Android User Data Into The Droid DEF CON 20 Introduction • Why this talk is useful • Defend access / gain access • Device seizure, loss, border crossing, stop and search, espionage... • The company • viaForensics - Mobile security and digital forensics, strong R&D team, government agencies and corpor...
pdf
CVE-2021-37580-apacheshenyuadmin 漏洞 Apacheshenyuadmin-jwt越权漏洞,通过伪造jwt获取管理员。 漏洞成因: 硬编码jwtkey 1. 只解析了jwttoken的内容,并没有针对其内容进⾏判断 2. 影响版本 shenyu:v2.3.0-v2.4.0 漏洞分析 直接在权限校验处打上断点 org/apache/shenyu/admin/shiro/config/ShiroRealm.AuthenticationInfo getCredential会获取header头内的token并返还。然后代码会判断token是否有值。 如果有就会进⼊getUserInfoByToken⽅法 or...
pdf
Extreme Privilege Escalation On Windows 8/UEFI Systems Corey Kallenberg Xeno Kovah John Butterworth Sam Cornwell ckallenberg@mitre.org, xkovah@mitre.org jbutterworth@mitre.org, scornwell@mitre.org The MITRE Corporation Abstract The UEFI specification has more tightly coupled the bonds of the operating system and the pla...
pdf
A Password is Not Enough Why disk encryption is broken and how we might fix it Daniel Selifonov DEF CON 21 2013-08-02 Five Questions ● Do you encrypt the drive in your computer? ● Using something like TrueCrypt, dmcrypt, loop-aes? ● Do you always cold shutdown when leaving your computer unattended? ● Have you ever le...
pdf
1 The Evolution of The Evolution of Windows Spyware Techniques Windows Spyware Techniques Birdman Birdman birdman@chroot.org birdman@chroot.org birdman@xsolve.com birdman@xsolve.com ccbirdman@gmail.com ccbirdman@gmail.com HIT2005 HIT2005 22 The Evolution of Windows Spyware Techniques By Birdman, HIT2005 The Evolution...
pdf
⿊黑客眼中的⼯工控4.0 ——⼯工控系统安全威胁与应对探索 by Kimon 关于我 • 中国科技⼤大学苏研院 • ADF安全研究团队 • 物联⺴⽹网安全、⼯工控安全 qmwang@vip.126.com 13758178689 ⺩王启蒙 Kimon 提纲 • ⼯工控背景 • ⼯工控系统 • ⼊入侵⽅方式 • 应对探索 ⼯工业4.0与两化融合 ⼯工控系统 • ICS ⼯工业控制系统 • SCADA 数据采集与监控系统 • DCS 分散式控制系统 SCADA系统 SCADA系统 ⼯工控组件 • PLC可编程逻辑控制器 • RTU远程控制单元 • HMI⼈人机交互界⾯面 • 现场设备 PLC • PLC实质是⼀...
pdf
Defense&by&Numb3r5& & Making'problems'for'script'k1dd13s' and'scanner'monkeys! @ChrisJohnRiley' “THE'WISEST'MAN,'IS'HE' WHO'KNOWS,'THAT'HE' KNOWS'NOTHING”' ' ' SOCRATES:'APOLOGY,'21D' This&talk&contains:! !- Numbers - Bad Jokes - Traces of peanuts - Did I mention numbers? !! TL!;DR! Goals!for!this!talk! Describe...
pdf
Who’s&this…&guy& • 10&years&on&the&defensive&side& • File&analysis&&&RE& • Recently&doing&research&using&Machine& Learning& Level&Se?ng& • &ROP& • Technique&to&bypass&nonFexecutable&memory& • Bounce&around&in&memory&execuJng&small& gadgets&that&typically&end&with&a&return& instrucJon& • PIN& • Pin&is&a&dynamic&binary&i...
pdf
The Paparazzi Platform Flexible, Open-Source, UAS Software and Hardware esden, dotAero, misterj, cifo Outline ● History, User Community, Competitions & Missions ● Software ● Hardware ● Example Vehicles ● Demos Who are we? Who is Paparazzi? Micro unmanned aerial vehicle framework http://paparazzi.enac.fr Why do I care?...
pdf
0x01 应用简介 Spring Cloud Function 是 SpringBoot 开发的一个 Servless 中间件(FAAS),支持基于 SpEL 的函数 式动态路由。 0x02 漏洞复现 测试版本: 测试环境: 第 1 种利用:需要修改配置 + 任意路由 这种利用方式来自 逐日实验室 @默安 1. 修改配置文件,添加 "spring.cloud.function.definition:functionRouter" 2. 任意路由 # v3.2.0 https://github.com/spring-cloud/spring-cloud-function/releases/tag/v3.2.0 1 ...
pdf
#BHUSA @BlackHatEvents IAM The One Who Knocks Igal Gofman, Noam Dahan #BHUSA @BlackHatEvents Information Classification: General Igal Gofman @IgalGofman • Head of Research, Ermetic • Microsoft MSTIC • Microsoft security research • Active Directory expert Noam Dahan @NoamDahan • Cloud security researcher • Love/hate re...
pdf
TQLCTF Writeup By Nu1L Author:Nu1L TQLCTF Writeup By Nu1L Pwn unbelievable_write nemu ezvm timezone_challenge Reverse Tales of the Arrow Misc wizard Ranma½ the Ohio State University wordle Web Simple PHP Crypto Signature OTP Pwn unbelievable_write 可以任意offset free,free掉tcache pthread struct然后打got from pwn import * # s =...
pdf
Kenny@Choot.org Kill AV in x64 What’s AV? What’s AV? AV AV 雖然她們 伴隨著 青春歲月 深埋你我 的 D:\ But~ 今天主角是……. 防毒Girl 防毒Girl 噴鼻血(圖) 以上純屬唬爛 演講開始 1. UAC Bypass 2. 數位簽章-Secret 3. Kill AV 主題 UAC Bypass 據說漏洞發現作者是在向微軟回報而 未被重視的情況下,憤怒的公開了原 始程式碼和實作Demo。 小故事 http://www.pretentiousname.com/misc/win7_uac_whitelist2.html 利用條件 1、某些程式在執行時會自動賦予為...
pdf
HOW  TO  TRAIN  YOUR RFID  HACKING  TOOLS By  Craig  Young Security  Researcher Tripwire  VERT HOW  TO  TRAIN  YOUR  RFID  HACKING  TOOLS Table  of  Contents Introduction  ............................................................................................................
pdf
Covert Channels in TCP and IP Headers Drew Hintz drew@overt.org http://guh.nu Drew Hintz - http://guh.nu - 2 At A Glance • Who are you? Who are they? • Definitions • Analysis of some covert channels • Attack against timestamp covert channel • Detection and prevention • New covert channel tool Drew Hintz - http://guh.n...
pdf
Demystifying Key Stretching and PAKEs Steve “Sc00bz” Thomas 2 Who am I? Why am I here? 3 Who am I? Why am I here? ● Password cracker ● Cryptography enthusiast ● I just wanted a pw manager – Bugs and vulns galore – How would I make one? ● PHC Panelist – I broke Schvrch and old Makwa 4 ● Key Stretching – What? – Why? – ...
pdf
01 02 03 MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) 2 IBM Security Who is this Drew Carey Look Alike On Stage? •  Red Team Ops Lead at IBM X-Force Red •  I conduct red teaming operations against defense contractors and some of North America’s largest banks •  On the board...
pdf
New Techniques in SQLi Obfuscation SQL never before used in SQL Injection Nick Galbreath @ngalbreath nick@client9.com DEFCON 20 at the Rio in sunny Las Vegas 2012-07-27 Friday 4:20 pm! http://slidesha.re/ MfOiNR Follow along or get the latest version: That's an OH, not a zer0 SQL Specification • http://www.contrib.and...
pdf
We have you by the gadgets Hitting your OS below the belt Legal Notice Our opinion is our own. It DOES NOT IN ANY WAY represent the view of our employers. whoami - Toby whoami - Mickey Agenda • Who we are • What are Gadgets o A little bit of history o Why this matters o How to develop gadgets o Gadget sec...
pdf
THESE AREN’T THE PERMISSIONS YOU’RE LOOKING FOR Anthony Lineberry David Luke Richardson Tim Wyatt DefCon 18 AGENDA • Android Internals Overview • Security/Permission Model • Why Ask For Permission When You Can Ask For Forgiveness? • Log-Cat – Our Inside Mole • The Ultimate Permission (Yes, we’re talking about root) ...
pdf
EXTENSION-LAND EXPLOITS AND ROOTKITS IN YOUR BROWSER EXTENSIONS BARAK STERNBERG // DEFCON 2021 ABOUT ME • Barak Sternberg (@livingbeef) • Senior Security Researcher, Previously Author @ SentinelOne Labs. • “Hacking smart-devices for fun and profit” // DC28 IoT Village. • BSc & MSC in CS on algorithms (bioinfo) from TA...
pdf
ZeroDay: Roswell by Richard Thieme I used to think that death bed revelations were nonsense. I knew lots of guys who kept their vows to the last breath. Some even spread disinformation as they died under torture. Intelligence professionals have discipline that sticks, most of the time. I was sure that I did too....
pdf
简而言之,用户可以创建一个机器账户,机器账户改名为dc,然后申请TGT,然后把自己改 名,然后DC在TGS_REQ时会找不到这个账户就会以自己的密钥加密TGS,然后就得到了一 个高权限的ST。 利用过程 测试账户为普通域账户 检查目标是否受到影响: 1 Rubeus.exe asktgt /user:labs /password:abc123! /domain:ssosec.lab /dc:SSO DC.ssosec.lab /nopac /nowrap 在无pac时和有pac时票据大小明显不同: 尝试攻击(域用户默认可以新建机器账户): 新增机器帐号使用powermad 1 New‐MachineAccount ‐MachineA...
pdf
WMCTF WriteUp By Nu1L AuthorNu1L Team WMCTF WriteUp By Nu1L RE Meet_in_July Welcome to CTF Wmware easy_apk easy_re WEB Make PHP Great Again gogogo base64 Make PHP Great Again 2.0 web_checkin2 SimpleAuth webweb web_checkin Misc Music_game XMAN_Happy_birthday Performance_artist sign-in Dalabengba Part1 Part2 Part3 Music_...
pdf
User Profile Based Anomaly Detection Fighting Malicious Insider Threat at Office365 Lei He Principal Engineering Manager, Microsoft Corporation 2019-05-30 The Context - Office365 Security Requirements *Customer lockbox onboarding is must only for enterprise service accessing customer data. • Cannot use Corp identity ...
pdf
360 企业安全集团 Attacking Kerberos 演讲人:吴方东,n1nty @ 360 A-TEAM 2 0 1 8 吴方东,n1nty @ 360 A-TEAM 安全研究员 • 360 企业安全集团旗下的纯技术研究团队。 • 致力于 Web 渗透,APT 攻防对抗,前瞻性攻防工具预研。 • 进行严肃、有深度的技术研究,深入还原攻与防的技术本质。 360 A-TEAM 资深失眠患者 服务端验证“你是否真的是你所声称的那个人”的过程 非加密通道会导致明文密码泄露 USERNAME/PASSWORD 我要登陆,这是我的账号密码 对比账号密码 成功 失败 • 不需要传输密码本身 • 可在非加密通道使用 USER01 我要登陆 ...
pdf
DEF CON 19: This is REALLY not the Droid you’re looking for… Nicholas J. Percoco – Trustwave’s SpiderLabs Sean Schulte – Trustwave’s SSL Team Copyright Trustwave 2011 Agenda •  Introductions •  Primer / History: Android Platform Development •  Mobile User Interface DOs and DON’Ts •  Research Motivations •  Re...
pdf
2022/5/16 05:03 Evernote Export file:///C:/Users/jiushi/Desktop/Active Directory 域权限提升漏洞(CVE-2022-26963)漏洞复现.html 1/7 漏洞原理: 默认情况下,用户模板不易受到攻击。当我们根据用户模板请求证书时,用户帐户的用户主体名称 (UPN) 将嵌入可用于识别的 SAN 中。由于 UPN 必须是唯一的,而且我们通常无 法修改 UPN,因此我们无法利用此模板。此外,由于我们无法更改证书签名请求中的 SAN 值,因此我们无法通过指定其 UPN 来模拟其他用户。 但是,计算机帐户没有 UPN。机器模板不使用 UPN 进行身份验证,而是使...
pdf
Summary of Attacks Against BIOS and Secure Boot Yuriy Bulygin, John Loucaides, Andrew Furtak, Oleksandr Bazhaniuk, Alexander Matrosov Intel Security In The Beginning Was The Legacy BIOS.. Legacy BIOS 1. CPU Reset vector in BIOS ‟ROM‟ (Boot Block)  2. Basic CPU, chipset initialization  3. Initialize Cache-a...
pdf
PHYSICAL ACCESS CONTROL SYSTEMS Are you protected by two screws and a plastic cover?...... Probably! Zac Franken Defcon 15 What we are going to cover: • Overview of physical credentials • Brief overview of biometric systems • Biometric worked example • Demo of attack Basic system Anti-Passback system Physical Cr...
pdf
Securing the Tor Network Mike Perry Riverbed Technology Black Hat USA 2007 Defcon 2007 Who am I? ● Volunteer Tor developer ● Forward+Reverse engineer ● Employed by Riverbed (shameless plug) – Leading manufacturer of WAN accelerators – 20­200X (not percent. X) improvement of CIFS – 5­50X improvement of MAPI/Exchange – P...
pdf
1 Apache Commons Text RCE(CVE-OLOO- QOWWX) 漏洞分析 漏洞复现 漏洞防御 漏洞详细:https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om 根据⽂中提到的 lookups 可以定位到 InterpolatorStringLookup#lookup ⽅法 漏洞分析 2 第5⾏将 : 的第⼀次出现的下标赋给 prefixPos,如果 prefixPos ⼤于 0,则会将 : 前半部分赋给 prefix(此处会进⾏⼩写处理),后半部分赋给 name。 接着在 stringLookupMap 查看是否存在对应的键名...
pdf
#Proxyshell# 个人记录 目前 proxyshell 实战中遇到最多的问题有两种。一个是 powershell 端点获取问题,一个是获 取 cmdlet 可执行端点后 get webshell 中间遇到的坑。 一、powershell 端点获取问题 目前大部分人利用 poc 时都是使用 administrator 测试是不是存在可以利用的 powershell 端 点,获取不到爆破邮箱。这里使用头像哥思路可花较少时间获取 ps Exhange 的权限。 1. 原始 poc 浅析 https://github.com/dmaasland/proxyshell-poc/blob/main/proxyshell.py 结合最先公...
pdf
0x00 IDAburp 1. 2. 3. 4. vpnvpn 0x01 1. IAM 2. idedr 3. 4. ipurl wafids 5. 0x02 1. SDP 2. NIST 3. SDP SDP SDPSDP SDPSDPSDP agentagentSDP iptablesipSDP agentipiptablesip SDP NIST NIST (PDP)(PEP) NISTISOAccess management-AMPDPPEP NISTPDP/PEP NISTPDPSDPPEPSDPagent 0x03 sxfatrustatrustvpn VPN ip vpn vpn at...
pdf
§  David Mortman, enStratus §  Rob Graham, ErrataSec §  Dave Maynor, ErrataSec §  Chris Hoff, Juniper §  James Arlen, Liquid Matrix §  Larry Pesce, PaulDotCom §  Rich Mogull, Securosis Fail Panel Five
pdf
PHP 代码审计 培训教材 路虽远,行则必达。 - 2 - 目录 代码审计基础........................................................................... - 4 - 代码审计概念.................................................................................- 4 - 需要了解一些函数.........................................................................- 6 - 需要了解的超全局变量............
pdf
DefCon 13 Shmoo-Fu: Hacker Goo, Goofs, and Gear with the Shmoo The Shmoo Group www.shmoo.com DefCon 13 Stickers anyone? DefCon 13 What's up Shmoo? ● Howdy & introductions... ● Our festivities will include: – Super Spy Stuff – IDN Fallout & Homograph Attacks for Personal Identities – Revving Up Rainbow Tables – Rogue...
pdf
SigFlip原理:将数据隐写到已签名的PE文件上 Github地址: https://github.com/med0x2e/SigFlip 可以怎么玩呢,可以白加黑当冲锋马的时候,白文件写入shellcode,黑文件加载白文件的shellcode。 也可以做维权使用,将shellcode注入到系统的白文件中,dll劫持或者loader加到启动项里面。 使用 两个目录 Bof 和 DotNet ,DotNet是c#写的用来可行性测试,包含注入代码,loader加载功能,Bof是C 写的,也包含注入代码和loader加载功能,主要是可以编译成bof文件给Cobalt Strike使用。 c#代码loader的部分直接CreateRe...
pdf
脚本⼩⼦觉悟之获取⽹⻚正确编码 0x00 认识text与content 先来⼀段熟悉的代码: 那么 text 与 content 的区别,我们可以跟进看看 content 代表返回 raw 类型的byte字节流数据,这个时候的数据没有编码概念。 text 通过阅读注释和代码,可知返回的是编码后数据,其中获取编码的流程是,先通过 response 的header头来 判断,如果没有,则Fallback到 chardet 去猜测,然后使⽤获取到的最终编码类型对byte数据进⾏编码。 resp = requests.get(url=url, verify=False) print(resp.text) print(resp.content...
pdf
The  Evolu*on  of  Chrome  Security Architecture Huan  Ren Chromium  Contributor Qihoo  360  Technology  Ltd Introduc*on  to  Speaker •  2011.07  -­‐  Present,  Qihoo  360  Technology  Ltd. Engineering  lead  of  360  browser  team •  2007  -­‐  2011,  Staff  S...
pdf
⾃动src之ARL⼤改造-优化漏扫  0x00 前⾔  这篇⽂章是继续对灯塔ARL的优化以达到较好的辅助src漏洞挖掘。继前⾯通过对host碰撞的简单优 化我⼤概了解了⼀下arl的逻辑,接下来这篇⽂章是针对更加复杂的nuclei的漏扫模块做⼀定的优 化。 0x01 简单看⼀下nuclei扫描逻辑  这⾥的nuclei扫描可以理解为arl调⽤的⼤名鼎鼎的漏扫⼯具nuclei作为主要漏扫引擎。不知道nuclei 的可以⾃⼰去GitHub下载安装⼤致体验⼀下,暂时可以简单的理解为国外版的xray。ARL这⾥直接 将nuclei作为漏扫引擎来集成使⽤了。 我们⼤概看⼀下代码上的逻辑,搜⼀下nuclei 跟进去 看起来是展示扫描结果的,⽽我们...
pdf
“Stratagem 1 "Deceiving the heavens to cross the sea” 瞒天过海 (Using the the 36 stratagems for Social Engineering) Jayson E. Street, CISSP, C|EH, GSEC, GCIH, GCFA, IEM, IAM, ETC… Let go of my EGO Who Am I? defcon18@f0rb1dd3n.com Hacker/Social Engineer INFOSEC talk = slide like this ;-) •  Sun Wu (Tzu) “Ping-f...
pdf
============= Non-Executable Stack ARM Exploitation ================= 0.- Introduction 1.- ARM Assembly 1.0 - Exploitation of ARM vs. X86 when stack isn't executable 1.1 - ARM calling convention (APCS) 1.2 - Why simple ret2libc will not work? 1.3 - Understanding the vulne...
pdf
WMCTF 2021 Nu1L Writeup WMCTF 2021 Nu1L Writeup Misc Checkin Questionaire 你画我猜 我画你猜 一笔改画 Foolish Black Ai Entrance LOGO Plants VS Zombies Version1 car hack Crypto checkin easylsb ezl1near PWN red_high_heels dy_maze Nescafe Reverse Re1 Re2 Web ez piwigo Number Misc Checkin checkin Questionaire questionaire 你画我猜 随便画 我画你猜...
pdf
一枚字体CRASH到FUZZING的探索 目录 CONTENTS 1、fuzzing的介绍 2、fuzzing这么好玩,就crash了 3、进阶!apple 字体处理框架的fuzzing 4、升级!fuzzing的探索与改造 5、继续fuzzing,收获漏洞! 0 1 PART 01 0 2 fuzzing的介绍 介绍 0 1 2020是个非常奇妙与难忘的一年,同样fuzzing技术在2020年技术井喷,涌现了一大批fuzzing工具和前沿的 研究; 在2020年的年终时候,我在知乎上对2020年的开源fuzzing做了一些总结与些许研究,一个开源的研究与项 目叫FormatFuzzer,这个项目的出现,让我想起了aflsmart的...
pdf
0x00前言 本期登场的目标虽不是SRC,但是整个漏洞的利用手法很有学习意义。目前在很多大厂的http数据包中 都会添加sign值对数据包是否被篡改进行校验,而sign算法的破解往往是我们漏洞测试的关键所在~ 本人在一些漏洞挖掘实战中经常发现在破解sign值后,在测试各类越权,重放等漏洞时一马平川 今天特此为大家带来这样一个精彩的实战案例。 0x01 背景 学校每学期的体育成绩中会有10%来源于某跑步APP的打卡数据,本人作为一个体测只能勉强及格的废 物,自然得想办法拿到这10分,以防挂科 无奈这个app后台设置的是每学期男生总共要求跑120公里才能完整地拿到10分,非常恶心。 一学期跑120公里,你还不如鲨了我,于是便有了此文对于...
pdf
@patrickwardle OFFENSIVE MALWARE ANALYSIS dissecting osx/fruitfly via a custom c&c server WHOIS “leverages the best combination of humans and technology to discover security vulnerabilities in our customers’ web apps, mobile apps, IoT devices and infrastructure endpoints” security for the 21st century @patrickwardle...
pdf
S-javaagent 参考文章 javaagent使用指南 Java Instrumentation javaagent 实例 Javaagent 是 java 命令的一个参数。参数 javaagent 可以用于指定一个 jar 包,并且对该 java 包有2个要求:1、这个 jar 包的 MANIFEST.MF 文件必须指定 Premain-Class 项。2、 Premain-Class 指定的那个类必须实现 premain() 方法。 premain 方法,从字面上理解,就是 运行在 main 函数之前的的类。当 Java 虚拟机启动时,在执行 main 函数之前, JVM 会先运 行 -javaage...
pdf
作者:白帽汇安全研究院@kejaly 校对:白帽汇安全研究院@r4v3zn 前言 在研究高版本 JDK 反序列化漏洞的时候,往往会涉及到 JEP 290 规范。但是网上公开针对 JEP 290 规范 原理研究的资料并不是很多,这就导致在研究高版本 java 反序列化的时候有些无能为力,所以最近对 JEP 290 规范好好的研究的一番,输出这篇文章,希望和大家一起交流学习。 简介 官方描述: Filter Incoming Serialization Data ,即过滤传入的序列化数据。 主要内容有: Provide a flexible mechanism to narrow the classes that can be des...
pdf
Office Drama ...on macOS WHOIS @patrickwardle analysis exploit chain OUTLINE history Evil Office Docs! defense Recent History macro based attacks, targeting macOS ...defined MACROS Macro: "A macro is a series of commands & instructions that you group together as a single command to accomplish a task automatically...
pdf
Introduction 8 Basic Hacking Known Vulnerabilities 11 Introduction 11 Identifying technologies 13 Introduction 13 Wappalyzer 13 Powered By 14 Summary 15 Identifying the vulnerabilities 16 Introduction 16 Google 16 ExploitDB 17 CVE 19 Summary 19 Finding the POC 2...
pdf
The Real-Life Story of the First Mainframe Container Breakout CROSSOVER EPISODE @IanColdwater @bigendiansmalls • Ian is a leading expert on containers and container security. • Chad is the same, but for mainframes and mainframe security. MINNESNOWTA @IanColdwater @bigendiansmalls DEEP MAGIC @IanColdwater @bige...
pdf
Vanquishing Voyeurs: Secure Ways to Authenticate Insecurely Andrea Bianchi & Zoz ANDREA BIANCHI ZOZ Overview • Password/PIN Features & Observation Attacks • Observation from Without • Physical Key Entry at Insecure Terminal • Mechanical Observation-Resistant Solutions • Observation from Within • Key Protection between...
pdf
YOUR VOICE IS MY PASSPORT John Seymour and Azeem Aqil 1 Introduction Voice is starting to be used for authentication 2 Introduction Voice is starting to be used for authentication 3 Introduction Voice is starting to be used for authentication 4 Introduction Voice is starting to be used for authentication 5 Goal: B...
pdf
1 LPHCTF bypass出题⼈视⻆ N. 绕过后缀 O. 绕过可⻅字符检测 P. 绕过⿊名单检测 @yzddmr6 ⾃⼰在L3HCTF中出了⼀道java上传绕过题⽬bypass。其中题⽬中的⼀些trick不仅仅是⽤于CTF出题, 对于实战渗透也是有⼀定的帮助。今天跟⼤家分享⼀下出题时的⼀些思考跟解题细节。 题⽬有三道过滤 后缀jsp/jspx会被替换为空,⽤双写绕过:jsjspp。常规操作 1. 绕过后缀 2. 绕过可⻅字符检测 Plain Text 复制代码   public static String checkExt(String ext) {       ext = ext.toLowerCase(...
pdf
Mind Games 1 Introduction to Species, Lost in Apple-eating Time I have to admit, I love this wee little story. It’s the best I could do at the time, trying to express the unthinkable in words. It was the unthinkable, I think, that I was thinking, walking around the park near which I live in Fox Point, Wisconsin, thinki...
pdf
Tsung Pei Kan peikan@gmail.com 1  Graduated from Central Police University . He likes to study about Kernel and Reverse Engineering. He is interested in the subject of Computer Forensic. He’s working for National Police Agency now. Besides, he is also the docent for Taiwan Network Information Center.  At the b...
pdf
© Copyright 2013 NCC Group An NCC Group Publication Revealing Embedded Fingerprints: Deriving Intelligence from USB Stack Interactions Prepared by: Andy Davis Research Director andy.davis ‘at’ nccgroup.com NCC Group | Page 2 © Copyright 2013 NCC Group Contents 1 List of Figures and Tables ....................
pdf
Hacking WebAssembly Games with Binary Instrumentation WEBASSEMBLY 101 WASM 101 > Developers have done (and continue to do) incredible work speeding up Javascript > However, the dynamic nature of Javascript will always be a roadblock > WebAssembly provides a static, pre-compiled binary format for performance intensi...
pdf
Reaping and breaking keys at scale: when crypto meets big data Nils Amiet Yolan Romailler August 2018 — DEF CON 26 Warning: These slides are not up to date Get the latest slides from: https://research.kudelskisecurity.com/ Warning: if you want to test your keys live You can go to our website: keylookup.kudelskisecuri...
pdf
1 TAKING WINDOWS 10 KERNEL EXPLOITATION TO THE NEXT LEVEL – LEVERAING WRITE-WHAT-WHERE VULNERABILITIES IN CREATORS UPDATE Morten Schenk msc@improsec.com Contents Abstract ...................................................................................................................................................
pdf
General ways to find and exploit directory traversals on Android Xiang Xiaobo (Elphet) @ 360 Alpha Team About Us • Alpha Team @360 Security • 100+ Android vulnerabilities(Google Qualcomm etc) • Won the highest reward in the history of the ASR program. • 5 Pwn contest winner • Pwn2Own Mobile 2015( Nexus 6) • Pwn0Ra...
pdf
The Completion Backwards Principle Bringing Layer 0 Issues To Layer 3 ● geoffrey ● Defcon 0x0F Alarm Systems ● Fire – Actively detects a fire – Alerts inhabitants, and /or authorities ● Burglar – Detects intrusion into the facility premises – Alerts inhabitants, and /or authorities – Often co-exists with a Fire alarm s...
pdf
Hacking electric skateboards: vehicle research for mortals Richo Healey & Mike Ryan @mpeg4codec / Hacking Electric Skateboards / @rich0H Who are these jerks anyway ‣ richo ‣ Computer Jerk ‣ @rich0H ‣ Duck Enthusiast ‣ Ran WrongIslandCon ‣ mike ‣ Bluetooth Guy ‣ @mpeg4codec ‣ Owner/Operator of conscience (sometimes) ...
pdf
Advanced SQL Injection Presented By: Joe McCray joe@learnsecurityonline.com http://twitter.com/j0emccray http://www.linkedin.com/in/joemccray The Last of a Dying Breed A Network Penetration Tester You know – the nmap, exploit, upload netcat type of guy. A.K.A: The only black guy at security conferences Joe McCray.... ...
pdf
简单规则屏蔽goby和masscan  0x00 前⾔  和橙⼦酱讨论了⼀下扫描特征的问题,橙⼦酱提到masscan有固定特征可以被识别,因此记录⼀ 下。 0x01 扫描特征  根据⽂章描述 意思⼤概是nmap⾥的tcp-option字段为4个字节,这是⼀个特征,因此可以使⽤IP上图⾥的 iptables规则直接把nmap的端⼝扫描流量给丢弃掉。对应到wireshark抓包来看是这个字段: 这是⼀个nmap的sT扫描的抓包实例,在tcp option这个字段是24字节,和前⾯说的有所不同,经 过抓包来看正常的tcp请求这个tcp option也是24字节为多。因此这个特征并不存在于nmap的新版 之中。 0x02 masscan的特...
pdf
State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin Gérald Doussot & Roger Meyer | DEF CON 27 New Tool: Singularity ● Everything you need for DNS rebinding ● Reliable: Default settings just work ● Performant: up to 20x faster (3s vs 60s) ● Built-in payloads: Jenkins, Rails, AWS Instan...
pdf
Aura A peer-to-peer reputation system Cat Okita, 2003 Reputation Systems • What is a Reputation System? – Livejournal/Friendster, eBay, Avogato, Slashcode • Why do you care? • What could you use this for? – Establishing trust, performance metrics, meme propagation, spam filtering Challenges • Authentication • Trust • N...
pdf
针对开发人员的钓鱼 下午看到 @wonderkun 分享了一个项目: 此时我还没意识到这个项目的问题,在 clone 之后, Readme.md 的介绍是相当的给力,我想看看它是如 何实现的。 总之看起非常强大,有 gif ,还有支持的功能列表,就和所有的开源 RAT 一样。 究竟是什么? 图标看过去是正常的,看上去和正常 VS 的项目文件一样。 在经过提醒之后,发现这个 VS 的项目文件有点奇怪, Type 为 Screen saver ,文件的后缀名 为 ..sln 。 Screen saver 为 Windows 屏幕保护程序,在用户不活动时,将会触发 屏幕保护程序。 这个文件实际上就是一个 PE ,就是一个可执行文件。...
pdf
1 Java⼩trick之在懵逼中为Random跪下 LxLN 问题 LxLO 解答 LxLO.N 初步解答 LxLO.O 回看问题 LxLP 思考 LxLQ 杂项 LxLS 总结 这个⽉在逛着https://stackoverflow.com突然发现个有点意思的⼀段代码,或者说是有点意思的猴戏 怎么说呢,就是看完以后,不知道为啥⼦,我就在懵逼中跪下了... 为了解决疑问,快速爬起来,我就决定解决这个疑问 先给你们看看这个问题是啥,你们就知道我为何懵逼了 https://stackoverflow.com/questions/15182496/why-does-this-code-using-random-strings- pr...
pdf
API接口安全checklist 身份认证 不要使用 ,请使用标准的认证协议(如 , )。 Basic Auth JWT OAuth 不要重新实现 、 和 ,请使用标准库。 Authentication token generating password storing 限制密码错误尝试次数,并且增加账号冻结功能。 加密所有的敏感数据。 JWT(JSON Web Token) 使用随机复杂的密钥( )以增加暴力破解的难度。 JWT Secret 不要在请求体中直接提取数据,要对数据进行加密( 或 )。 HS256 RS256 使 token 的过期时间尽量的短( , )。 TTL RTTL 不要在 JWT 的请求体中存放敏感数据,因...
pdf
网络产品安全漏洞管理规定 第一条 为了规范网络产品安全漏洞发现、报告、修补和发布等行为,防范网络安全风险,根据《中华人 民共和国网络安全法》,制定本规定。 第二条 中华人民共和国境内的网络产品(含硬件、软件)提供者和网络运营者,以及从事网络产品安全 漏洞发现、收集、发布等活动的组织或者个人,应当遵守本规定。 第三条 国家互联网信息办公室负责统筹协调网络产品安全漏洞管理工作。工业和信息化部负责网络产品 安全漏洞综合管理,承担电信和互联网行业网络产品安全漏洞监督管理。公安部负责网络产品安全漏洞 监督管理,依法打击利用网络产品安全漏洞实施的违法犯罪活动。 有关主管部门加强跨部门协同配合,实现网络产品安全漏洞信息实时共享,对重大网络产品安全...
pdf
Universal*Serial* aBUSe Rogan&Dawes&&&Dominic&White research@sensepost.com Important*Note • This&is&the&text8based&version&of&the&slides,&and&not& the&version&we&plan&to&present.&We&wanted&to&give& you&something&meaningful&to&read&through. • The&toolset&will&be&released&on&our&github: • https://github.com/sensepost/USa...
pdf
0x01 PEID dll ​ dll getshell 0x02 C# https://xz.aliyun.com/t/9168 https://xz.aliyun.com/t/9591 https://xz.aliyun.com/t/9593 https://xz.aliyun.com/t/9592 https://xz.aliyun.com/t/9594 https://xz.aliyun.com/t/9595 https://xz.aliyun.com/t/9597 https://xz.aliyun.com/t/9598 https://xz.aliyun.com/t/9599 https://x...
pdf
Cunning with CNG: Soliciting Secrets from Schannel DefCon 24 Why you might care ❏ Extracting TLS / SSL Keys (of various types) from memory ❏ Ability to decrypt TLS connections that use ephemeral key exchanges ❏ For anything that uses Schannel: RDP, IE, Powershell, etc...pretty much anything .NET too ❏ Past connections ...
pdf
0x01 前言 中午在学校午休,就看了 @忍酱 的反制Goby, @暗羽师傅 的反制Burpsuite还有 @先知社区 里的反制蚁 剑, @f4ltJ4y 的蚁剑复现,挑起了我想反制的心! 蚁剑版本: 2.1.12 0x02 虚假XSS 蚁剑是自带浏览器的,用的是Chrome!本想着暗羽师傅的那篇可以用得到,发现版本不对 发现它调用了dhtmlx框架,可以解析HTML 正是因为这个虚假的XSS,更加激发了我想RCE的心! 我们可以参考: https://xz.aliyun.com/t/8167 <img src=1 onerror=alert(1)> 0x03 放弃RCE 我在想既然有内置浏览器,那么 Chromium浏览器 版本是...
pdf
Backdooring hardware devices by injecting malicious payloads on microcontrollers_ By Sheila A. Berta (@UnaPibaGeek) @UnaPibaGeek WHO AM I?_ Sheila A. Berta (@UnaPibaGeek) Offensive Security Researcher @UnaPibaGeek WHO AM I?_ Sheila A. Berta (@UnaPibaGeek) Offensive Security Researcher A little bit more: - Developer in...
pdf
ScriptEngineManager代码执行 ScriptEngineManager 是用于 java 与 js 之间的相互调用。这个类在 jdk6 中存在。 初始化 ScriptEngineManager 类有两个初始化方法,一个有参,一个无参。有参的初始化方法是传递一 个 ClassLoader ,无参的构造方法是使用进程本身的 CLassLoader 。 这里可以回顾一下 SnakeYaml 反序列化,其中就用到了 ScriptEngineManager 类,传递一个 URLClassLoader ,然后利用 SPI 机制达到代码执行。所以此处可以先回顾一下这个利用过程。 SnakeYaml 反序列化中的初始化 SPI SP...
pdf