text
stringlengths
100
9.93M
category
stringclasses
11 values
CommonCollection1 InvokeTransformer // // Source code recreated from a .class file by IntelliJ IDEA // (powered by FernFlower decompiler) // package ; import Serializable; import InvocationTargetException; import Method; import FunctorException; import Transformer; public class InvokerTransformer implements Tr...
pdf
1 DNSPD: Entrap Botnets Through DNS Cache Poisoning Detection p1t1r HITCON 2010 2 自介  Hi, this is p1t1r  資安背景  Rootkit  Web  Network  DNS spoofing 3 DNS攻擊  DNS Cache Poisoning攻擊  很危險的東西,迄今尚未被解決  你上的任何網站都有可能是攻擊者的網站  防禦機制  一大堆  不過預設的DNS環境是未受保護的 4 DNSPD  防禦,順便抓 Botnet  Botnet 正夯 !!!  問題:  這個防禦機制夠穩當嗎?  要看...
pdf
Secure SofwareDevelopment LifeCycle 为您构架安全的业务系统 企业最佳安全实践 系统安全 网络安全 应用安全 1990-2017 2002-2017 2006-2017 网络攻击的方向 木桶原理 安全攻击,最薄弱环节的攻击; 安全问题,最薄弱环节的集群式爆发; 最薄弱环节的攻击 没有考虑安全设计的业务系统,理论上安全风险较高; 没有经过长时间考验的业务系统,实际安全风险较高; 没有经过验证的业务逻辑,带来的新形式的攻击较多。 最新业务的攻击 漏洞 防御 体系 威胁 防御 体系 漏洞防御体系 依照漏洞思维来建立的防御系统: 1、既有漏洞的安全经验; 2、测试发现的漏洞情况; 优势:简单、快速、高效; ...
pdf
--面向企业src的漏洞挖掘 从0到1,发现与拓展攻 击面 Speaker name:羽 Date:2019/04/19 01 子域名枚举、端口扫描、路径扫描、旁站c段查询 常规性资产收集 02 关注页面内容、关注目录、敏感关键字搜索 巧用搜索引擎 03 构造接口、构造文件、构造目录、框架搭配 发挥创造性思维 04 微信公众号、小程序 关注企业动态 05 gayhub搜索、漏洞回挖、假性社工 其他tips 06 从一个文件服务器静态资源泄露引发的血案 综合案例 content 常规性资产收集 基本的资产收集方式:子域名枚举、端口扫描、路径 扫描、旁站c段查询 子域名枚举 4 子域名爆破:sublist3r、subdomainsBur...
pdf
! ! Taie-Bugbounty-killer是什什么意思? 主要⽬目标是分享⼀一些更更快速的刷SRC赏⾦金金的⾃自动化挖洞洞技巧命令和⼯工具协同。使⽤用⾥里里⾯面的⽅方法,我们能 够快速批量量找到可以被利利⽤用的⼦子域、api令牌和其它敏敏感漏漏洞洞。 摘要 之前许诺给⼤大家的⾃自动化赏⾦金金挖洞洞技巧,现在来了了,我不不知道你们现在的挖洞洞⽅方式是什什么?我现在的挖 洞洞⽅方式是能⽤用⽼老老外的⼀一条命令⾃自动化或者整合⾃自动化我就不不⼿手动挨个去信息收集可以挖掘。希望这个系 列列可以给你们提供⼀一些不不⼀一样的挖洞洞思路路技巧。 1. ⼼心脏滴⾎血漏漏洞洞 By: @imranparray101 Source: lin...
pdf
PRESENTED BY: © Mandiant, A FireEye Company. All rights reserved. Investigating PowerShell Attacks DefCon 22 2014 August 8, 2014 Ryan Kazanciyan, Matt Hastings © Mandiant, A FireEye Company. All rights reserved. Background Case Study 2 Attacker Client Victim VPN WinRM, SMB, NetBIOS Victim workstatio...
pdf
zsxq Hacking⾃动化就是好玩的星球相关,星球介绍: https://mp.weixin.qq.com/s?__biz=MzU2NzcwNTY3Mg==&mid =2247484177&idx=1&sn=e394fc7db94d90fd64b2402ba54a4731&chksm=fc986a36cbefe3202b37f8943b11b 98176b14d0f2c139857b5510c2ac49acf2e462d06629799&token=338286590&lang=zh_CN#rd 很多⿊客和安全⼯具的构造是那么巧妙,我看了很多安全⼯具的代码,将它们值得学习的地⽅记录了下来。⼀点点 开发+安全的结合,Hacking...
pdf
My Life As A Spyware Developer Why I’m Probably Going to Hell Who  Am  I •  Integrated  Solu2ons  Lead  for  Matrikon Toronto/Chicago – Custom  so=ware  for  Power  Plants – NERC  CIP  for  the  past  year  or  so •  Previously  developed  Pharmacy  systems, online  ca...
pdf
#BHUSA @BlackHatEvents A Fully Trained Jedi, You Are Not Adam Shostack #BHUSA @BlackHatEvents How Many Jedi? 2 #BHUSA @BlackHatEvents How Many Jedi? 3 #BHUSA @BlackHatEvents We talk a lot about Jedi 4 #BHUSA @BlackHatEvents It’s a Bad Goal Expectations of heroism drive burnout Not everyone wants to be torn from their...
pdf
对灯塔ARL进⾏⼀些定制-host碰撞  0x00 前⾔  看了⼀下灯塔ARL整体感觉还不错,该有的基本功能都有界⾯也不错,只不过⼀些细节上不符合我 的预期,这两天⼤概浏览了⼀下整体的代码功能,拎出⼏个点来先进⾏⼀波优化。 0x01 host碰撞原先设计  ARL确实带有host碰撞功能,在任务创建⾥ 我们跟⼀下host碰撞的实现,直接搜host碰撞 接着搜这个findvhost 进⼊这个find_vhost 可以看到在app->services->findVhost.py⾥,但是看起来并不是我们要的那种修改host字段后进⾏ 爆破的代码逻辑,所以接着看看这个find_vhost在哪⾥被调⽤ 这⼀块有好⼏个findvhost相关的函...
pdf
CTF Beginner, How to Start from 0 skybullet 從這場演講會聽到什麼 • 關於我們 • 什麼是 CTF • CTF 題型介紹 • 給 CTF 初學者的建議 關於我們 chalz - 北科資工 - web developer 我們是誰 ku - 清大物理 - 大阪大學 - IoT 韌體工程師 skybullet - HITCON 2015 - 桌遊店 - 2015 年 10 月 ∼ 比賽經驗 D-CTF Qualification 2015 ( rank 198 / 993 ) HITCON 2015 ( rank 63 / 969 ) 9447 Security Soc...
pdf
package com.pynerd.example.methods; import org.python.core.PyFunction; import org.python.core.PyObject; import org.python.util.PythonInterpreter; import java.lang.reflect.InvocationTargetException; public class JythonDemo1 { public static void main(String[] args) throws ClassNotFoundException, NoSuchMe thodExceptio...
pdf
MBR Bootkit不在叙述写这个的还是比较多的,UEFI Bootkit相较于MBR Bootkit从某种意义上来说开发 要更为方便因为UEFI具有统一规范可以直接使用C/C++上手开发。 在正式介绍前先来简单说一下UEFI下Windows启动过程 1. 基本过程如下 PC开机,加电自检固件UEFI加载执行,初始化硬件 2. 固件UEFI根据启动项从EFI分区中加载并启动 \EFI\Microsoft\boot\bootmgfw.efi (Windows boot manager) 3. bootmgfw.efi加载启动Winload.efi(Windows Os loader) 4. Winload.efi加载执行Nto...
pdf
1 CobaltStrike内存免杀-AceLdr 分享⼀个 CobaltStrike内存免杀的⼯具. https://github.com/kyleavery/AceLdr 作者收集了市⾯上公开的内存查杀技术, 1. Hunt-Sleeping-Beacons 2. BeaconHunter 3. BeaconEye 4. Patriot 5. Moneta 6. PE-sieve 7. MalMemDetect. 然后再做出对应的对抗,涉及到的技巧: Creates a new heap for any allocations from Beacon and encrypts entries before ...
pdf
1 Owning the Users With “The Middler” Copyright 2008 Jay Beale Jay Beale Co-Founder, Intelguardians Author, Bastille UNIX 2 Copyright 2008 Jay Beale Talk Agenda I’m releasing The Middler now, an attack proxy tool to automate attacks on browsers and everything else using HTTP. Here’s the Talk Agenda: • The Attack Vector...
pdf
Anomalist Books AnomalistBooks.com “Credible people have seen incredible things.” —Major General John Samford Chief of Intelligence United States Air Force March 1953 Governments around the world have had to deal with the UFO phenomenon for a good part of a century. How and why they did so is the subject of UFOs an...
pdf
From SQL Injection to MIPS Overflows Rooting SOHO Routers Zachary Cutlip Tactical Network Solutions Craig Heffner Acknowledgements What I’m going to talk about Novel uses of SQL injection Buffer overflows on MIPS architecture 0-day Vulnerabilities in Netgear routers Embedded device investigation process Live demo: Root ...
pdf
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 WO IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA MDY Industries, LLC, Plaintiff/Counterdefendant, vs. Blizzard Entertainment, Inc.; and Vivendi Games, Inc., Defendants/Counterclaimants. __________________________________ Bli...
pdf
Fuzzing for Software Security Testing and Quality Assurance For a list of related Artech House titles, please turn to the back of this book. Fuzzing for Software Security Testing and Quality Assurance Ari Takanen Jared DeMott Charlie Miller artechhouse.com Library of Congress Cataloging-in-Publication Data A catalog ...
pdf
1 Call the plumber – You have a leak in your (named) pipe 2 • Presenter introduction • Key terms • Connecting to named pipes • Pipe ACLs And Connection Limitation • Named pipes in the wild Agenda • Enumerating And Scanning For Named Pipes • Sniffing Named Pipes Content • Fuzzing Named Pipes • Exploitation And Impact • ...
pdf
CU-DevSecOps 实践白皮书 中国联合网络通信有限公司研究院 2021 年 9 月 CU-DevSecOps 实践白皮书 1 前言 万物互联的数字智能世界,推动着全球数字经济的高速发展。随 着云原生应用、大数据应用、产业互联网以及物联网智能应用软件 的不断发展,传统的软件开发流程已不能适应快速变化的业务和迭 代需要,于是敏捷开发流程应运而生。敏捷开发通过增量和迭代式 的开发模式,可以大大缩短软件的交付周期并能进行持续改进,从 而能够很好地响应快速的需求更改以及外部环境变化。近年来敏捷 开发的广泛应用和云计算技术的快速发展,促进着开发和运维的同 步优化,并进一步形成了 DevOps,即开发运维一体化。DevOps 极...
pdf
0x01:利⽤编辑器的超链接组件导致存储XSS 鄙⼈太菜了,没啥⾼质量的洞呀,随便⽔⼀篇⽂章吧。 在⽉⿊⻛⾼的夜晚,某骇客喊我起床挖洞,偷瞄了⼀下发现平台正好出活动了,想着⼩⽜试⼑吧 ⾸先信息收集了⼀下,发现⼀个奇怪了域名引起了我的注意,访问后,发现是⼀个投稿平台,可以发布⽂章到后台 进⾏审核。 使⽤账户登录进系统,就能发现⼀处⽂章管理 第⼀时间就想到发布⽂章,再观察系统中发现⼀个不知名的编辑器(知道的⼤⽜可以说⼀下)存在 超链接 功能, 那么就尝试利⽤⼀下吧 在超链接中注⼊伪协议来构造xss 这⾥有个⼩细节就是下⽅的⼩按钮 1. 当处于开启状态时:触发超链接按钮后,⻚⾯会在新窗⼝中执⾏跳转操作 2. 当处于关闭状态时,触发超链接按...
pdf
qingxp9 whoami 杨芸菲 @qingxp9 360 PegasusTeam 无线安全研究员 WLAN安全研究、WIPS等无线安全产品研发 C-SEC 《如今我们面临的无线威胁》 CCF YOCSEF沈阳《公共无线安全的现状与未来》 “绵羊墙”公共WiFi风险演示系统 东北大学无线安全课程客座讲师 Outline ① 无人机安全威胁背景 ② 基于802.11的反无人机方案 ③ 低成本反无人机系统的设计与实现 ④ 承载在802.11上的无人机管控方案 无人机安全威胁 近年来,无人机应用范围越来越广泛(航拍、快递、灾后搜救、数据采集),无人 机数量迅速增加,随之也产生了一系列安全管控问题。 未经许可闯入敏感区域...
pdf
0x0000 i'm learning a lesson called patience. can't wait 'til i have it all learned. - “walk on water” fun with symboliks symbolik analysis in pure python 0x0001 – who am i? ● Jesus dude ● husband ● father ● hobby farmer ● biker 0x0002 – who am i? ● oh, and i'm atlas 0f d00m ● re ● vr ● hw ● fw ● radio ● cars/meddevs/S...
pdf
议题: 捡 漏 式 挖掘CVE漏 洞 演 讲人: 朱铜庆 ID: Dawu 部 门/职 位: 404实验室 研究方向: Web/Windows 逻 辑漏 洞相 关 标签 : 联 系 方式 : 漂 流 瓶 吧 历史上的捡 漏 01 02 03 总 结 和归纳 提升和突破 01 历史上的捡 漏 广撒 网, 总 有鱼 ZoomEye寻 找未授权访问 的页面 ZoomEye md5(admin,32) = 21232f297a57a5a743894a0e4a801fc3 也许厂商和你都 没 想到, 这 个补丁是“ 假” 的 CVE-2016-10033 -> CVE-2016-10045 mail ( string $to , strin...
pdf
Author:z3r0yu CobaltStrike 插件开发 目录 CONTENTS 1. 概述 2. Sleep 语言相关 3. Aggressor Script 相关 4. 总结 概 述 01 CobaltStrike 插件的编写主要是使用agscript(Aggressor Script),这个CobaltStrike 3.0之后内置的脚 本语言。agscript是基于 Sleep 语言进行二次开发的。Sleep 是一种深受Perl启发的基于Java的脚本语言。 所以在开始编写 CobaltStrike 之前我们必须要了解 Sleep 语言的语法和agscript中内置的各种函数。 Sleep 开发手册: http://sl...
pdf
Good Vibrations: Hacking Motion Sickness on the Cheap INTRODUCTION Motion Sickness • No universally accepted definition • Defined by signs and symptoms, which varies • Agreed that it came about when man first tried to improve natural mobility • Greeks had first recorded account, occurred at sea – Where the term naus...
pdf
How to Find 12 Kernel Information Disclosure Vulnerabilities in 3 Months Tanghui Chen, Long Li | Baidu Security Lab 2019 Contents 0. Who am I? 1. Understanding Vulnerabilities 2. Vulnerability Analysis • Heap and stack data poisoning • Vulnerability detection techniques • CVE Analysis 3. Results Who am I? • Senior Se...
pdf
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin DefCon 2013 Time-Bound Keys Announcements • New tool: TimedKey.exe • New whitepaper: Trusted Tamperproof Time on Mobile Devices • Check out http://www.jwsecure.com/dan What does the NSA think? • The NSA has been public about: – ...
pdf
1 Your logo here…  Robert “RSnake” Hansen - CEO  SecTheory LLC  http://www.sectheory.com  http://ha.ckers.org – the lab  http://sla.ckers.org – the forum  Joshua “Jabra”Abraham  Rapid7 LLC - Security Researcher  http://www.rapid7.com  http://blog.spl0it.org 2 3  Why does this matter?  Privacy advocacy  Peop...
pdf
简单写一下审计了几个月这个 oa 的思路 首先肯定还是看 web.xml 对 jsp 文件的鉴权以及 oa 的补丁都在 SecurityFilter 中 E8 和 E9 的主要差别就是 E9 多了一个/api 的访问 也就是这个 servlet 这个 servlet 就是扫描 com.cloudstore 和 com.api 包下的@Path 注解的一个 rest 接口 SecurityFilter 初始化时会调用 weaver.security.filter.SecurityMain 的 initFilterBean 方法会 初始化安全规则 会加载这两个文件夹下对应 Ecology 版本的 XML 规则文件 后面这些代码太多了 就...
pdf
MouseJack, KeySni↵er and Beyond: Keystroke Sniffing and Injection Vulnerabilities in 2.4GHz Wireless Mice and Keyboards Marc Newlin marc@bastille.net @marcnewlin August 7, 2016 v0.2 Abstract What if your wireless mouse or keyboard was an e↵ective attack vector? Research reveals this to be the case for non-Bluetooth wirel...
pdf
信誉危机 广受认可的硬件和软件遭遇信任危机 Seunghun Han 国家安全研究所高级安全研究员 29 May 2019 - NSR(韩国国家安全研究所)高级安全研究员 - Black Hat Asia 2019影响力成员 - KIMCHICON审查委员会成员 - 作为演讲嘉宾出席以下会议: - USENIX Security 2018 - Black Hat Asia 2017 - 2019 - HITBSecConf 2016 - 2017 - BeVX and KIMCHICON 2018 - “64-bit multi-core OS principles and structure, Vol. 1 and Vol. 2...
pdf
Towards a Trusted Immutable Kernel Extension (TIKE) for Self-Healing Systems: a Virtual Machine Approach Julian B. Grizzard, Eric R. Dodson, Gregory J. Conti, John G. Levine, Henry L. Owen Georgia Institute of Technology; Atlanta, Georgia 30332–0250 Phone: 404.894.2955 Fax: 404.894.9959 Email: grizzard@ece.gatech.edu (...
pdf
Hooked Browser Meshed-Networks with WebRTC and BeEF The sad tale of vegetarian browsers Trigger warning: presentation includes JavaScript $ whoami • Christian Frichot • @xntrik • Co-Author of The Browser Hacker’s Handbook • @beefproject developer DEFCON 23 @xntrik Vegie Browsers DEFCON 23 @xntrik Vegie Browsers $ ...
pdf
Tracking Motorola Systems http://www.signalharbor.com/ttt/00mar/index.html 1 of 5 6/18/2007 14:07 This article first appeared in the March 2000 issue of Monitoring Times. TRACKING MOTOROLA SYSTEMS The most common trunked radio systems in use by public safety agencies in the United States are those manufactured by Mot...
pdf
ly.tl/poker Elie Bursztein Celine Bursztein Jean Michel Picod ly.tl/poker Spectre ly.tl/poker Inception ly.tl/poker ly.tl/poker ly.tl/poker ly.tl/poker ly.tl/poker ly.tl/poker ly.tl/poker ly.tl/poker Device ly.tl/poker ly.tl/poker ly.tl/poker Visible differences Galaxy Core Poker cheating device ly.tl/poker Security ...
pdf
Don't Ruck Us Again The Exploit Returns echo $USER ● Gal Zror - @waveburst ● Security research leader at Aleph Research by HCL AppScan ● 10+ RE, 0days, Exploits, embedded Linux devices Recap ● Credential leakages + SSH jailbreak ● Unauth stack buffer overflow ● Command injection + Auth bypass R510 Unleashed ● AP: C110,...
pdf
APK File Infection on Android System Bob Pan Mobile Security Research Engineer July 27, 2012 Who is Bob? Mobile Security Industry Trends Malware increasing on “App Stores” Chris Di Bona from Google, November 2011: ”virus companies are playing on your fears to try to sell you bs protection software for An...
pdf
Hello, and Welcome. My name is Tom Ritter, and I work for iSEC Partners. If you don’t know who Zax is, you will by the end of this talk. This talk is about an anonymity network that was started in the fledgling days of the Cypherpunk era – the early 1990s. This book hadn’t even come out yet – this is the second ...
pdf
AAPL – Automated Analog Telephone Logging. Using modern techniques and software to map the PSTN. - Da Beave & Jfalcon - Da Beave •Work in the network security field @ Softwink, Inc. •Author “Asterisk Hacking” and “Threat Analysis 2008” – Syngress Press •Hacker/Programmer •Author of iWar and various other “hacking” ...
pdf
1 Copyright © 2015, FireEye, Inc. All rights reserved. Copyright © 2015, FireEye, Inc. All rights reserved. WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis Willi Ballenthin, Matt Graeber, Claudiu Teodorescu DEF CON 23 2 Copyright © 2015, FireEye, Inc. All rights reserved. Co...
pdf
Exploitable Assumptions Doktor Zoz, Dr. Foley, and Eric Schmiedl What the hell is a Hacker? What the hell is a Hacker? The movie does get a few things right Curiosity Assumptions and Authority! Hacker Mindset Good at spotting flaws, inefficiencies Must know how things work at any cost Boil things to most abstract lev...
pdf
Keeping Secret Secrets Secret Keeping Secret Secrets Secret and and Sharing Secret Secrets Secretly Sharing Secret Secrets Secretly Vic Vandal Vic Vandal vvandal@well.com vvandal@well.com DefCon DefCon-XVI / 2008 -XVI / 2008 Vic’s Usual Disclaimer • Don’t do anything illegal. • If you do anything illegal, don’t get cau...
pdf
mdm 0x00 mod_mdm.somdmd 0x01 unix unixwireshark 1. 90header 2. xmlpostbodybody bodyheader0 header 1. 140 2. 581b 02 00 00 3. 91203 00 00 00 58int4 1b 02 00 00 0x21b10539 0x02 1. a33 2. char s[128]s128 3. v6postv6[0]postbody s128 int648qword4 word8byteunsigned int4 mobileidtype 0x03 ipad mobileidtype body0 1. 8...
pdf
Music Clash - I Fought the Law and the Law Won Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement Greg Conti gregory.conti@usma.edu Lisa Shay lisa.shay@usma.edu Woody Hartzog whartzog@samford.edu Disclaimer The views in this talk are the authors’ and don’t reflect the of...
pdf
1 Jna加载ShellCode优化 起因 修改 最后 @yzddmr6 蚁剑最开始实现java加载shellcode是通过jna的⽅式,这个做法是来源于⼀个apt组织的⽅法 https://norfolkinfosec.com/jeshell-an-oceanlotus-apt32-backdoor/ 但是不是很⽅便的⼀点是这个shellcode loader体积⼤于2m,超过了tomcat默认上传最⼤⻓度。所以之 前⼀直的做法都是先把编译好的jar上传到⽬标服务器,然后⽤URLClassLoader去加载⽂件。虽然⼀开 始jar⼏乎是全⽹免杀的,但是落地还是增加了被识别的⻛险。 后来发现新版哥斯拉4也增加了jna,⽤来加...
pdf
PRESENTED BY: © Mandiant, A FireEye Company. All rights reserved. Investigating PowerShell Attacks Defcon 2014 (Pre-Conference Draft) Ryan Kazanciyan, Matt Hastings © Mandiant, A FireEye Company. All rights reserved. Background Case Study 2 Attacker Client Victim VPN WinRM, SMB, NetBIOS Victim workstations, serv...
pdf
author:Y4er 环境 Cassandra 4.0.0 漏洞分析 先说原理,enable_user_defined_functions_threads为false时会隐式禁用security-manager,导致 可以通过udf执行java代码。 官方公告 https://lists.apache.org/thread/r0593lq5dto52fgw8y2vvcydc2tdyq40 使用以下配置 enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_thr...
pdf
bypass NAT 0x00 portswiggertop-10-web-hacking-techniques-of-2020-nominations-open2020 https://portswigger.net/research/top-10-web-hacking-techniques-of-2020-nominations-open https://samy.pl/slipstream/ NATslipstreaming nat nat rrrrrr 0x01 nat slipstreamhttps://samy.pl/slipstream/ https://forum.butian.net/share/88 ...
pdf
DefCon 13 Shmoo-Fu: Hacker Goo, Goofs, and Gear with the Shmoo The Shmoo Group www.shmoo.com DefCon 13 What's up Shmoo? ● Howdy & introductions... ● Our festivities will include: – IDN Fallout & Homograph Attacks for Personal Identities – Super Spy Stuff – Revving Up Rainbow Tables – Rogue Squadron & EAP Peeking – S...
pdf
Well, really, just SRCDS, but who really cares? Bruce Potter, Logan Lodge gdead@shmoo.com, L0l0@shmoo.com Gaming is a USD47 billion global market. Console gaming alone is estimated to be USD27 billion in size. PC online games is a USD6.5 billion industry. Projected to be USD13 billion by 2012. Online MMOGs...
pdf
DevOps 实践指南精要 作者:张乐 2018.04 Case Study Operation InVersion at LinkedIn (2011) 启示:需要将偿还技术债作为⽇日常⼯工作的⼀一部分 2011年年IPO之后的六个⽉月,LinkedIn 持续与痛苦的、有问题的部署⽃斗争 VP of Engineering决定停⽌止所有功 能开发两个⽉月 彻底检修环境、部署、架构问题 背景 2003年年成⽴立,帮助⽤用户 “connect to your network for better job opportunities. 2015年年11⽉月数据 350 million会员,每秒数万请求 后台系统每秒百万次查询请求 开始...
pdf
Catching DNS tunnels with Catching DNS tunnels with IDS that doesn’t suck A.I. IDS that doesn’t suck A.I. A talk about Artificial Intelligence, A talk about Artificial Intelligence, geometry and malicious network geometry and malicious network traffic. traffic. Agenda Agenda Introduction Introduction Neural N...
pdf
JspWebShell新姿势解读 写在前⾯ 刚刚⽆意间发现我yzddmr6发了篇新⽂章,⾥⾯提到了⼀个jspwebshell的新姿势,但是没有 具体分析,那么这⾥我就接着来分析⼀波 ⾸先代码长这样 正⽂ 如果按照传统Java的javac的⽅式编译这样⼀定是会出错的,这⾥不贴图⾃⼰试试,⽽jsp不同 于普通的java程序,jsp是有⾃⼰的对类编译时的实现机制,其编译类的时候最终是 在 org.apache.jasper.compiler.JDTCompiler#generateClass ⽣成我们的class⽂件 (省略中途的很多步骤直捣黄龙,不然讲着也费劲) 这是调⽤栈,有兴趣可以深⼊分析 <%    Runtime.getRun...
pdf
03 2020 DevSecOps 行业洞察报告 法律声明 此报告为悬镜安全与 Freebuf 咨询联合制作,报告中的文字、图片、表格等版权均为悬镜安全与 Freebuf 咨询 共同所有。任何组织、个人未经悬镜安全及 Freebuf 咨询授权,不得转载、更改或者以任何方式传送、复印、 派发该报告内容,违者将依法追究法律责任。转载或引用本报告内容,不得进行如下活动: 不得擅自同意他人转载、引用本报告内容。 不得引用本报告进行商业活动或商业炒作。 本报告中的信息及观点仅供参考,悬镜安全及 Freebuf 咨询对本报告拥有最终解释权。 悬镜安全,DevSecOps敏捷安全领导者,由北京大学网络安全技术研究团队 “XMIRROR”主导创立,...
pdf
“How can I pwn thee? Let me count the ways” RenderMan RenderLab.net & Church of Wifi Render@Renderlab.Net How can I pwn thee? ● Born out of conversations at SECTOR ● Workforce is increasingly mobile and wireless ● Mobile users are away from your watchful BOFH eye (and punishment) ● How do you educate them, protect you...
pdf
頸椎呵護指北 超機密 第2次雞友核心群報告書 Plan zur Komplementarität der Menschheit 1.Zwischenbericht 目录 颈椎病的危害和衍生症状 简单实用的颈椎呵护操 工作台的配置方案 借助外力的放松颈椎方式 颈椎病的危害和衍生症状 • 1、颈椎病是由于椎骨受颈脖四面的水肿压迫而导致的身体其他部位与颈部与头部的供血不 足,经常会引起头晕、头疼、颈椎酸疼、骨刺等常见症状,这直截影响到对身体的损害。 • 2、神经根型颈椎病患者通常情况下会有颈部疼痛的症状。咳嗽、喷嚏、或上肢伸展以及颈 部过屈、过伸等,都会引起疼痛加剧。 • 3、颈部疼痛是神经根型颈椎病的主要临床表现,疼痛多表现为钻痛或刀割...
pdf
The NMRC The NMRC Warez Warez 2005 2005 Extravaganza Extravaganza DefCon DefCon 2005 2005 nnomad omad m mobile obile rresearch esearch ccentre entre “With just a few keystrokes, cybercriminals around the world can disrupt our economy.” - Ralph Basham, Director of the U.S. Secret Service at RSA 2005. “With just a ...
pdf
分类建议: 计算机/软件开发/安全 人民邮电出版社网址:www.ptpress.com.cn 上册 上册 逆向工程权威指南 逆 向 工 程 权 威 指 南 逆向工程是一种分析目标系统的过程。 本书专注于软件逆向工程,即研究编译后的可执行程序。本书是写给初学者 的一本权威指南。全书共分为12个部分,共102章,涉及软件逆向工程相关 的众多技术话题,堪称是逆向工程技术百科全书。全书讲解详细,附带丰富 的代码示例,还给出了很多习题来帮助读者巩固所学的知识,附录部分给出 了习题的解答。 本书适合对逆向工程技术、操作系统底层技术、程序分析技术感兴趣的读者 阅读,也适合专业的程序开发人员参考。 “... 谨向这本出色的教程致以个人的敬意!” —...
pdf
SQLReInjector Automated Exfiltrated Data Identification Jason A. Novak Assistant Director, Digital Forensics Chicago, IL Andrea London Digital Forensic Examiner Dallas, TX Overview Problem Historical Solution SQLReInjector Demo Get It! Questions? Who We Are Bibliography Problem Problem • 97% of data ...
pdf
1001 ways to PWN prod A tale of 60 RCE in 60 minutes 1. What’s in this talk? 2. RCE, RCE, RCE!!! 3. Takeaways @TheLaluka thinkloveshare.com 1 1. What’s in this talk? 2 In this talk, RCEs are : - Authent-less - Fully chained - Disclosed & Fixed - Legally POCed 🙃 Le Breakage Lalu 3 *angry customer data noise* 4 5 2. RC...
pdf
Art of the possible Christopher Cleary ccleary266@gmail.com “Plans are nothing; planning is everything.” - Dwight D. Eisenhower (1890-1969) 1 Clash of civilizations “Invincibility lies in the defense; the possibility of victory in the attack.” - Sun Tzu DEFCON 19 How did I get here and what did I learn...
pdf
Secondary Contexts Mahmoud M. Awali @0xAwali attacker Tricks To Identify Some " Hidden " Reverse HTTP Proxies TRACE OR GET /Endpoint-To-Proxy HTTP/1.1 Host: www.company.com Max-Forwards: Number e.g. 1 , 2 OR 3 User-Agent: Mozilla/5.0 Referer: https://previous.com/path Origin: https://www.company.com Rules ...
pdf
When  Space Elephants  A/ack DEFCON  19 Presented  by  Abstrct Who  Am  I? – Expert  in  designing  videogame  UI – Specialized  in  Human-­‐Computer  InteracJon – Graphic  Designer – Technical  Writer Who  am  I  really? Database  and  InformaJon  Security  Geek ...
pdf
The August application logs a significant amount of sensitive data. With social engineering, or  temporary access to the unlocked phone of an August user these logs can be extracted. The  following procedure can be use to extract log data without the use of any special tools.  Step 1: Open settings  Step 2: Press and h...
pdf
A SafeBreach Labs research by Itzik Kotler, CTO and co-founder, SafeBreach Amit Klein, VP Security Research, SafeBreach The Adventures of AV and the Leaky Sandbox About Itzik Kotler • 15+ years in InfoSec • CTO & Co-Founder of Safebreach • Presented in RSA, HITB, BlackHat, DEFCON, CCC, … • http://www.ikotler.org About ...
pdf
Reverse Engineering by Crayon: Reverse Engineering by Crayon: Game Changing Hypervisor and Game Changing Hypervisor and Game Changing Hypervisor and Game Changing Hypervisor and Visualization Analysis Visualization Analysis Fine-grained covert debugging using hypervisors and analysis via visualization Daniel A. Qu...
pdf
检测ldap协议以及获取相关字段的⼀种⽅式 JNDI注⼊常⽤rmi和ldap协议去打,本⽂主要讲述通过go语⾔检测ldap协议以及获取相关字段的⼀种⽅式 通过跟4ra1n师傅的⽂章的学习和与他本⼈的交流,他的检测思路是⽤go语⾔模拟回包,然后分析数据包,获取其中需要的路径字段。因为要确定⽬标是哪个payload⽣效,所以获取ldap/rmi请求的路 径是必要的。 我在实现他⽂章⾥的思路的时候发现⼀些不理解的地⽅ 模拟扫描器打payload: fake server 端: 我打印出请求路径的hex wireshark抓包: 可以看到这个#look的hex跟上⾯fake server端不⼀样,但是fake server端的hex转成st...
pdf
Blockchain Security: From Curves to Contracts Dr. Jimmy Chen, IKV & NTU Alex Liu, AMIS & MaiCoin HITCON Pacific 2016 Aspects of Security • ECDSA for Transaction Signing (including hardware signing) • Hash Function Collision Resistance • Privacy Preserving Features (Zero-Knowledge Proofs) • Consensus Algorith...
pdf
1 janne.lindqvist@tml.hut.fi June 30, .2007 IPv6 is Bad for Your Privacy Janne Lindqvist Helsinki University of Technology (TKK) and International Computer Science Institute (ICSI) 2 janne.lindqvist@tml.hut.fi June 30, .2007 Definition • A covert channel is a mechanism that is not designed for communication, but can ...
pdf
Multiplayer Metasploit Tag-Team Pen Testing and Reporting Ryan Linn Defcon 18 Sunday, July 4, 2010 Outline • Description of Problem • Discussion of current solutions • Overview of XMLRPC database integration • Discussion of types of objects • Demos Sunday, July 4, 2010 What’s the problem? • Pen testing/security audit ...
pdf
© Ofir Arkin, 2006 - 2007 Ofir Arkin, kNAC! kNAC! August 2007 Ofir Arkin, CTO 10 (or more) ways to bypass a NAC solution © Ofir Arkin, 2006 - 2007 Ofir Arkin, kNAC! In Memory of Oshri Oz September 13, 1972 - May 27, 2007 © Ofir Arkin, 2006 - 2007 Ofir Arkin, kNAC! Agenda What is NAC? NAC Basics 10 (or more) ways to...
pdf
惡意程式分析組 病毒不再神秘 - 讓我們⽀支解惡意⾏行為! HITCON GIRLS 資安女孩 HITCON GIRLS 由⼀一群對資安有興趣,想學習更多技術的女孩們 所組成。︒ 讀書會 我們分成不同的組別,進⾏行討論、︑學習和互補, 惡意程式分析組針對 Malware 進⾏行分析,內容 其中包含各種動態⼯工具以及反組譯的討論。︒ 成員介紹 Turkey 台灣駭客協會 秘書 唯⼀一的台灣駭客協會正職XD 珣珣 輔仁⼤大學資訊⼯工程所 碩⼀一 NISRA 成員 成員 成員介紹 Joey 台灣科技⼤大學 資訊管理所 Lucas 任職於趨勢科技 Charles 任職於Team T5 教練 資安學習地圖 資訊收集 
 Informatio...
pdf
Licensing Agreements 101: The Creative Commons DefCon 13 – June 29-31, 2005 Presented By: Jim Rennie Licensing Agreements 101: The Creative Commons - Slide 2 of 36 Disclaimer This Presentation is for educational purposes only. It is not legal advice. The speaker is not a lawyer. If you require legal advice, ret...
pdf
CDnetsec.com Education Masters Degrees in: ▪ Computer Science ▪ Management Author since 2007 Professional Penetration Testing Ninja Hacking Netcat Power Tools Penetration Testing’s Open Source Toolkit, V2 Certifications ISSMP, CISSP, SCSECA, SCNA, SCSA, IEM/IAM Crystal Defense Network Security Solu...
pdf
1" 反击恶意软件: 源头做起不不挖坑 DEF"CON"CHINA"1.0"(2019)" DEF CON CHINA 1.0 (2019) by Alexandre Borges ALEXANDRE"BORGES"–"MALWARE"AND"SECURITY"RESEARCHER" DEF"CON"CHINA"1.0"(2019)" 2" ü  Malware and Security Researcher. " ü  Speaker at DEFCON USA 2018 ü  Speaker at HITB 2019 Amsterdam ü  Speaker at CONFidence Conf. 2019 ...
pdf
Improving Cybersecurity through Non-Technical Exercises and In- House Strategic Analysis View from the Czech Republic by Michal Thim DRAFT - DO NOT QUOTE DISCLAIMER: The views and opinions expressed in this presentation are those of the presenter and do not necessarily reflect the official policy, position of the Nati...
pdf
Teaching Old Shellcode New Tricks DEF CON 25 @midnite_runr Whoami • US Marine (out in 2001) • Wrote BDF/BDFProxy • Found OnionDuke • Co-Authored Ebowla • Work @ Okta • Twitter: @midnite_runr • Github: github.com/ secretsquirrel Why This Talk • It’s fun • It’s time to update publicly available Windows shellcode...
pdf
Assembly Language Is Too High Level ...or the drinking game replaces 'cyber' with 'assembly is too high level' DEF CON 25 XlogicX Shoutz ● KRT_c0c4!n3 (art) ● Fat Cat Fab Lab (where I hack) ● NYC2600 (who I friend) ● DC201 (Because DEF CON) - My girlfriend KRT_c0c4!n3 (art director) did...
pdf
2021GKCTF-NAN-WP NaN 战队隶属 Nu1L 2.0 计划,有兴趣加入者可发送个人简历至 root@nu1l.com 队伍名称:NAN 队伍成员: Siebene pray77 SYJ 一:Reverse  1. QQQQT 使用 exeinforpe 检查发现是用的 Enigma Virtual Box 打的包 下载工具 EnigmaVBUnpacker 将 exe 解包一下 得到 QQQQT_unpacked.exe 拖入 IDA 分析  关键逻辑在函数 sub_4012F0 里面,就是一个标准的 base58,然后比较字符串,写个脚 本解一下即可 查找字符串得到比较数据和 bas...
pdf
SharpC2 beacon插件机制 Demo代码位置: AgentModules\DemoModule\Module.cs 关于插件接口定义 代码位置:Agents\Stage\Interfaces\IAgentModule.cs Init() 方法初始化插件,接收两个参数。第一个AgentController 规范beacon的行为,定义beacon的通用 功能; 其中 RegisterAgentModule方法需要关注下 再来看第二个参数 ConfigController.cs; // AgentController.cs public void RegisterAgentModule(IAgentModu...
pdf
Unlimited Results: Breaking Firmware Encryption of ESP32-V3 Karim M. Abdellatif, Olivier H´eriveaux, and Adrian Thillard Motivation • ESP32 is deployed in hundreds of million devices as announced by Espressif 1 • ESP32-V3 has been recently used as the main MCU in Jade hardware wallet (Blockstream)2 • Encrypted firmware...
pdf
0x00:前⾔ 某天测⼚商业务时,发现其中有⼀个提供⾳乐播放业务的资产,正好⾥⾯有我想听的歌,于是就有了这篇⽂章 0x01:信息收集 F12简单看下⽬标信息环境: ServerSoft:IIS 7.5 CMS:JYMusic(ThinkPHP) 0x02:开搞和碰壁 抱着试试看的⼼态随便找了个资源⽂件试了发解析漏洞,没想到成功了,那么现在只需要找到上传点就能getshell 了。 常⻅的编辑器 Ueditor/Umeditor Kindeditor ckeditor/ckfinder 程序上传点 头像/⽂章/附件... 上传组件 ⽬标站开放注册,登录后发现存在头像上传功能,原以为直接可以搞定了,结果却不尽⼈意,应该是⼆次渲染 了。...
pdf
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 – Las Vegas USA Agenda Motivation Some basics Brief overview ePassport (MRTD) Why cloning? How to attack the system BAC (Basic Access Control) EAC (Extended Access Control) Enrollment: Unexpected risks Motivation ...
pdf
Applied Ca$h Eviction through ATM Exploitation Trey Keown Red Balloon Security New York, USA trey@redballoonsecurity.com Brenda So Red Balloon Security New York, USA brenda@redballoonsecurity.com Abstract—Automated Teller Machines (ATMs) are among the oldest devices to be connected to a network. Despite this, the high ...
pdf
1 Hacking US Traffic Control Systems Cesar Cerrudo @cesarcer CTO at IOActive Labs About me Hacker, vulnerability researcher, created novel exploitation techniques, dozens of vulnerabilities found (MS Windows, SQL Server, Oracle, etc.). Developed, sold exploits and 0day vulnerabilities (7-10 years ago) R...
pdf
Ode to the DEFCON 15 Badge Joe Grand (Kingpin) 170 hours of total time spent 2 nights of my honeymoon (oh, how I lament!) 3 circuit board revisions to get it all right 863,600 total components bring them to light 6,800 hackers wearing the badge in all its glory If you want to learn more, please read this fine st...
pdf
HITCON PACIFIC 2017 ICS/SCADA Cybersecurity and IT Cybersecurity: Comparing Apples and Oranges Presented by David Ong | CEO of Attila Cybertech 8 December 2017 2 2 “… But there are also unknown unknowns. There are things we don’t know we don’t know.” Donald Rumsfeld, former Secretary of Defence ...
pdf
THIEMEWORKS WORLD TOUR 21 YEARS OF MISCHIEF AND MAYHEM Chicago New York San Francisco Seattle San Diego Boston Miami Orlando San Antonio Dallas Austin Houston New Orleans Baton Rouge Biloxi Los Alamos Atlanta Minneapolis Phoenix Denver Sun Valley Kansas City Detroit Des Moines St. Louis Las...
pdf
美团 APT检测设备的扩展研究 演讲人:朱学文(Ju Zhu) 2019 团队介绍 朱学文(Ju Zhu) 美团/高级安全研究员 9+年的安全研究经验 7+年主要从事高级威胁的研究,包括0Day、nDay和漏洞挖掘 一直致力于使用自动化系统来Hunt野外的高级威胁 多次获得CVE,且受到Google、Apple、Facebook等厂商的致谢 多次作为Speaker受邀参加BlackHat、CodeBlue、CSS等国内外的顶级安全会议 郭梦圆(Mabel Guo) 上海交通大学/美团实习安全研究员 上海交通大学在读硕士 研究生阶段致力于视频隐写/隐写分析研究 擅长iOS逆向以及虚拟化技术 PART ...
pdf
Mamma’s  Don’t  Let  Your  Babies Grow  Up  to  Be  Pen  Testers: Everything  Your  Guidance  Counselor Forgot  To  Tell  You  About  Pen  TesEng Who  are  we? •  “2  dudes  by  a  trash  can” – Dr.  Patrick  Engebretson •  Network  Sec  wonk – Dr.  Jo...
pdf
I Hunt Penetration Testers! More Weaknesses in Tools and Procedures Wesley McGrew, Ph.D. Distributed Analytics and Security Institute Mississippi State University http://mcgrewsecurity.com @mcgrewsecurity wesley@mcgrewsecurity.com Introduction • Wesley McGrew • Distributed Analytics & 
 Security Institute,...
pdf
API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web About me ● Math degree ● Web developer, ~5 years ● Bounties ● At PKC ~1 year, web dev and code audits for clients - pkc.io Intro Overview ● Definitions ● Demo some mistakes ○ Apple Pay ○ Twilio ○ Others ● How not to be like Apple Intro Diagram of ...
pdf
macOS/iOS Kernel Debugging and Heap Feng Shui Min(Spark) Zheng @ Alibaba Mobile Security Outline Alibaba Security • Introduction • macOS Two Machine Debugging • iOS Kernel Debugging • Debugging Mach_voucher Heap Overflow • Traditional Heap Feng Shui • Port Feng Shui • Conclusion Whoami • Min(Spark) Zheng @ Twitter,蒸米sp...
pdf
URL跳转奇葩姿势详解 JutaZ 目 录 CONTENT 1 关于我 5 衍生危害 2 URL的标准形式 3 绕过及FUZZ 4 其他跳转方式 一个新手 1 关于我 2 URL的标准形式 scheme://user:password@domain:port/path?query_string#fragments ① 方案名 ② 验证信息 ③ 主机名 ④ 端口号 ⑤ 路径 ⑥ 查询字符串 ⑦ 片段字串 引自《白帽子讲浏览器安全》 3 绕过及FUZZ 实现 test.a.com 跳转到 b.com 限制:仅允许跳转至*.a.com • a.com.b.com • a.comb.com • b.coma.com • a.com:80@b...
pdf
Defense  by  Numb3r5 Making  problems  for  script  k1dd13s and  scanner  monkeys @ChrisJohnRiley “THE  WISEST  MAN,  IS  HE WHO  KNOWS,  THAT  HE KNOWS  NOTHING” SOCRATES:  APOLOGY,  21D TL  ;DR Goals  for  this  talk Describe  the defensive  uses  of HTTP ...
pdf
DEF CON 24 Side-channel attacks on high- security electronic safe locks plore@tuta.io Agenda • Background on electronic safe locks • Cracking S&G 6120 safe lock – Recovering keycode using power analysis • Cracking S&G Titan PivotBolt safe lock – Recovering keycode using timing attack – Defeating incorrect-code...
pdf
Fax?! What The To: Date: Subject: Check Point Research DEFCON 26 Aug-12 2018 Received OK? WhoAreWe? Yaniv Balmas “This should theoretically work” Security Researcher Check Point Software Technologies @ynvb Eyal Itkin “That’s cool.” Security Researcher Check Point Software Technologies @eyalitkin 1860 Caselli Invents...
pdf
@EyalItkin Fixed by the vendor ZigBee (Radio) Attacker ZigBee Factory Reset Attacker Controlled WiFi Ethernet ZigBee (Radio) Attacker ZigBee Factory Reset Attacker Controlled WiFi Ethernet ZigBee (Radio) Attacker ZigBee Factory Reset Attacker Controlled WiFi Ethernet Malicious OTA Update ZigBee Exploit Wi...
pdf