text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
CommonCollection1
InvokeTransformer
//
// Source code recreated from a .class file by IntelliJ IDEA
// (powered by FernFlower decompiler)
//
package
;
import
Serializable;
import
InvocationTargetException;
import
Method;
import
FunctorException;
import
Transformer;
public class InvokerTransformer implements Tr... | pdf |
1
DNSPD: Entrap Botnets Through DNS
Cache Poisoning Detection
p1t1r
HITCON 2010
2
自介
Hi, this is p1t1r
資安背景
Rootkit
Web
Network
DNS spoofing
3
DNS攻擊
DNS Cache Poisoning攻擊
很危險的東西,迄今尚未被解決
你上的任何網站都有可能是攻擊者的網站
防禦機制
一大堆
不過預設的DNS環境是未受保護的
4
DNSPD
防禦,順便抓 Botnet
Botnet 正夯 !!!
問題:
這個防禦機制夠穩當嗎?
要看... | pdf |
Secure SofwareDevelopment LifeCycle
为您构架安全的业务系统
企业最佳安全实践
系统安全
网络安全
应用安全
1990-2017
2002-2017
2006-2017
网络攻击的方向
木桶原理
安全攻击,最薄弱环节的攻击;
安全问题,最薄弱环节的集群式爆发;
最薄弱环节的攻击
没有考虑安全设计的业务系统,理论上安全风险较高;
没有经过长时间考验的业务系统,实际安全风险较高;
没有经过验证的业务逻辑,带来的新形式的攻击较多。
最新业务的攻击
漏洞
防御
体系
威胁
防御
体系
漏洞防御体系
依照漏洞思维来建立的防御系统:
1、既有漏洞的安全经验;
2、测试发现的漏洞情况;
优势:简单、快速、高效;
... | pdf |
--面向企业src的漏洞挖掘
从0到1,发现与拓展攻
击面
Speaker name:羽
Date:2019/04/19
01
子域名枚举、端口扫描、路径扫描、旁站c段查询
常规性资产收集
02
关注页面内容、关注目录、敏感关键字搜索
巧用搜索引擎
03
构造接口、构造文件、构造目录、框架搭配
发挥创造性思维
04
微信公众号、小程序
关注企业动态
05
gayhub搜索、漏洞回挖、假性社工
其他tips
06
从一个文件服务器静态资源泄露引发的血案
综合案例
content
常规性资产收集
基本的资产收集方式:子域名枚举、端口扫描、路径
扫描、旁站c段查询
子域名枚举
4
子域名爆破:sublist3r、subdomainsBur... | pdf |
!
!
Taie-Bugbounty-killer是什什么意思?
主要⽬目标是分享⼀一些更更快速的刷SRC赏⾦金金的⾃自动化挖洞洞技巧命令和⼯工具协同。使⽤用⾥里里⾯面的⽅方法,我们能
够快速批量量找到可以被利利⽤用的⼦子域、api令牌和其它敏敏感漏漏洞洞。
摘要
之前许诺给⼤大家的⾃自动化赏⾦金金挖洞洞技巧,现在来了了,我不不知道你们现在的挖洞洞⽅方式是什什么?我现在的挖
洞洞⽅方式是能⽤用⽼老老外的⼀一条命令⾃自动化或者整合⾃自动化我就不不⼿手动挨个去信息收集可以挖掘。希望这个系
列列可以给你们提供⼀一些不不⼀一样的挖洞洞思路路技巧。
1. ⼼心脏滴⾎血漏漏洞洞
By: @imranparray101
Source: lin... | pdf |
PRESENTED BY:
© Mandiant, A FireEye Company. All rights reserved.
Investigating
PowerShell Attacks
DefCon 22 2014
August 8, 2014
Ryan Kazanciyan, Matt Hastings
© Mandiant, A FireEye Company. All rights reserved.
Background Case Study
2
Attacker
Client
Victim
VPN
WinRM,
SMB,
NetBIOS
Victim workstatio... | pdf |
zsxq
Hacking⾃动化就是好玩的星球相关,星球介绍: https://mp.weixin.qq.com/s?__biz=MzU2NzcwNTY3Mg==&mid
=2247484177&idx=1&sn=e394fc7db94d90fd64b2402ba54a4731&chksm=fc986a36cbefe3202b37f8943b11b
98176b14d0f2c139857b5510c2ac49acf2e462d06629799&token=338286590&lang=zh_CN#rd
很多⿊客和安全⼯具的构造是那么巧妙,我看了很多安全⼯具的代码,将它们值得学习的地⽅记录了下来。⼀点点
开发+安全的结合,Hacking... | pdf |
My Life As A Spyware
Developer
Why I’m Probably Going to Hell
Who
Am
I
• Integrated
Solu2ons
Lead
for
Matrikon
Toronto/Chicago
– Custom
so=ware
for
Power
Plants
– NERC
CIP
for
the
past
year
or
so
• Previously
developed
Pharmacy
systems,
online
ca... | pdf |
#BHUSA @BlackHatEvents
A
Fully
Trained Jedi,
You Are Not
Adam Shostack
#BHUSA @BlackHatEvents
How Many Jedi?
2
#BHUSA @BlackHatEvents
How Many Jedi?
3
#BHUSA @BlackHatEvents
We talk a lot about Jedi
4
#BHUSA @BlackHatEvents
It’s a Bad Goal
Expectations of heroism drive burnout
Not everyone wants to be torn from their... | pdf |
对灯塔ARL进⾏⼀些定制-host碰撞
0x00 前⾔
看了⼀下灯塔ARL整体感觉还不错,该有的基本功能都有界⾯也不错,只不过⼀些细节上不符合我
的预期,这两天⼤概浏览了⼀下整体的代码功能,拎出⼏个点来先进⾏⼀波优化。
0x01 host碰撞原先设计
ARL确实带有host碰撞功能,在任务创建⾥
我们跟⼀下host碰撞的实现,直接搜host碰撞
接着搜这个findvhost
进⼊这个find_vhost
可以看到在app->services->findVhost.py⾥,但是看起来并不是我们要的那种修改host字段后进⾏
爆破的代码逻辑,所以接着看看这个find_vhost在哪⾥被调⽤
这⼀块有好⼏个findvhost相关的函... | pdf |
CTF Beginner,
How to Start from 0
skybullet
從這場演講會聽到什麼
• 關於我們
• 什麼是 CTF
• CTF 題型介紹
• 給 CTF 初學者的建議
關於我們
chalz
- 北科資工
- web developer
我們是誰
ku
- 清大物理
- 大阪大學
- IoT 韌體工程師
skybullet
- HITCON 2015
- 桌遊店
- 2015 年 10 月 ∼
比賽經驗
D-CTF Qualification 2015 ( rank 198 / 993 )
HITCON 2015 ( rank 63 / 969 )
9447 Security Soc... | pdf |
package com.pynerd.example.methods;
import org.python.core.PyFunction;
import org.python.core.PyObject;
import org.python.util.PythonInterpreter;
import java.lang.reflect.InvocationTargetException;
public class JythonDemo1 {
public static void main(String[] args) throws ClassNotFoundException, NoSuchMe
thodExceptio... | pdf |
MBR Bootkit不在叙述写这个的还是比较多的,UEFI Bootkit相较于MBR Bootkit从某种意义上来说开发
要更为方便因为UEFI具有统一规范可以直接使用C/C++上手开发。
在正式介绍前先来简单说一下UEFI下Windows启动过程
1. 基本过程如下
PC开机,加电自检固件UEFI加载执行,初始化硬件
2. 固件UEFI根据启动项从EFI分区中加载并启动 \EFI\Microsoft\boot\bootmgfw.efi (Windows
boot manager)
3. bootmgfw.efi加载启动Winload.efi(Windows Os loader)
4. Winload.efi加载执行Nto... | pdf |
1
CobaltStrike内存免杀-AceLdr
分享⼀个 CobaltStrike内存免杀的⼯具.
https://github.com/kyleavery/AceLdr
作者收集了市⾯上公开的内存查杀技术,
1. Hunt-Sleeping-Beacons
2. BeaconHunter
3. BeaconEye
4. Patriot
5. Moneta
6. PE-sieve
7. MalMemDetect.
然后再做出对应的对抗,涉及到的技巧:
Creates a new heap for any allocations from Beacon and encrypts entries before ... | pdf |
1
Owning the Users
With “The Middler”
Copyright 2008 Jay Beale
Jay Beale
Co-Founder, Intelguardians
Author, Bastille UNIX
2
Copyright 2008 Jay Beale
Talk Agenda
I’m releasing The Middler now, an attack proxy tool to automate
attacks on browsers and everything else using HTTP.
Here’s the Talk Agenda:
•
The Attack Vector... | pdf |
Anomalist Books
AnomalistBooks.com
“Credible people have seen
incredible things.”
—Major General John Samford
Chief of Intelligence
United States Air Force
March 1953
Governments around the world have had
to deal with the UFO phenomenon for a
good part of a century. How and why they
did so is the subject of UFOs an... | pdf |
From SQL Injection to MIPS
Overflows
Rooting SOHO Routers
Zachary Cutlip
Tactical Network Solutions
Craig Heffner
Acknowledgements
What I’m going to talk about
Novel uses of SQL injection
Buffer overflows on MIPS architecture
0-day Vulnerabilities in Netgear routers
Embedded device investigation process
Live demo: Root ... | pdf |
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
WO
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF ARIZONA
MDY Industries, LLC,
Plaintiff/Counterdefendant,
vs.
Blizzard Entertainment, Inc.; and
Vivendi Games, Inc.,
Defendants/Counterclaimants.
__________________________________
Bli... | pdf |
Fuzzing for Software
Security Testing and
Quality Assurance
For a list of related Artech House titles, please turn to the back of this book.
Fuzzing for Software
Security Testing and
Quality Assurance
Ari Takanen
Jared DeMott
Charlie Miller
artechhouse.com
Library of Congress Cataloging-in-Publication Data
A catalog ... | pdf |
1
Call the plumber –
You have a leak in your (named) pipe
2
• Presenter introduction
• Key terms
• Connecting to named pipes
• Pipe ACLs And Connection Limitation
• Named pipes in the wild
Agenda
• Enumerating And Scanning For Named Pipes
• Sniffing Named Pipes Content
• Fuzzing Named Pipes
• Exploitation And Impact
• ... | pdf |
CU-DevSecOps 实践白皮书
中国联合网络通信有限公司研究院
2021 年 9 月
CU-DevSecOps 实践白皮书
1
前言
万物互联的数字智能世界,推动着全球数字经济的高速发展。随
着云原生应用、大数据应用、产业互联网以及物联网智能应用软件
的不断发展,传统的软件开发流程已不能适应快速变化的业务和迭
代需要,于是敏捷开发流程应运而生。敏捷开发通过增量和迭代式
的开发模式,可以大大缩短软件的交付周期并能进行持续改进,从
而能够很好地响应快速的需求更改以及外部环境变化。近年来敏捷
开发的广泛应用和云计算技术的快速发展,促进着开发和运维的同
步优化,并进一步形成了 DevOps,即开发运维一体化。DevOps 极... | pdf |
0x01:利⽤编辑器的超链接组件导致存储XSS
鄙⼈太菜了,没啥⾼质量的洞呀,随便⽔⼀篇⽂章吧。
在⽉⿊⻛⾼的夜晚,某骇客喊我起床挖洞,偷瞄了⼀下发现平台正好出活动了,想着⼩⽜试⼑吧
⾸先信息收集了⼀下,发现⼀个奇怪了域名引起了我的注意,访问后,发现是⼀个投稿平台,可以发布⽂章到后台
进⾏审核。
使⽤账户登录进系统,就能发现⼀处⽂章管理
第⼀时间就想到发布⽂章,再观察系统中发现⼀个不知名的编辑器(知道的⼤⽜可以说⼀下)存在 超链接 功能,
那么就尝试利⽤⼀下吧
在超链接中注⼊伪协议来构造xss
这⾥有个⼩细节就是下⽅的⼩按钮
1. 当处于开启状态时:触发超链接按钮后,⻚⾯会在新窗⼝中执⾏跳转操作
2. 当处于关闭状态时,触发超链接按... | pdf |
qingxp9
whoami
杨芸菲 @qingxp9
360 PegasusTeam 无线安全研究员
WLAN安全研究、WIPS等无线安全产品研发
C-SEC 《如今我们面临的无线威胁》
CCF YOCSEF沈阳《公共无线安全的现状与未来》
“绵羊墙”公共WiFi风险演示系统
东北大学无线安全课程客座讲师
Outline
① 无人机安全威胁背景
② 基于802.11的反无人机方案
③ 低成本反无人机系统的设计与实现
④ 承载在802.11上的无人机管控方案
无人机安全威胁
近年来,无人机应用范围越来越广泛(航拍、快递、灾后搜救、数据采集),无人
机数量迅速增加,随之也产生了一系列安全管控问题。
未经许可闯入敏感区域... | pdf |
0x0000
i'm learning a lesson called patience.
can't wait 'til i have it all learned.
- “walk on water”
fun with symboliks
symbolik analysis in pure python
0x0001 – who am i?
● Jesus dude
● husband
● father
● hobby farmer
● biker
0x0002 – who am i?
● oh, and i'm atlas 0f d00m
● re
● vr
● hw
● fw
● radio
● cars/meddevs/S... | pdf |
议题:
捡
漏
式
挖掘CVE漏
洞
演
讲人:
朱铜庆
ID:
Dawu
部
门/职
位:
404实验室
研究方向:
Web/Windows 逻
辑漏
洞相
关
标签
:
联
系
方式
:
漂
流
瓶
吧
历史上的捡
漏
01
02
03
总
结
和归纳
提升和突破
01
历史上的捡
漏
广撒
网,
总
有鱼
ZoomEye寻
找未授权访问
的页面
ZoomEye
md5(admin,32) = 21232f297a57a5a743894a0e4a801fc3
也许厂商和你都
没
想到,
这
个补丁是“
假”
的
CVE-2016-10033 -> CVE-2016-10045
mail ( string $to , strin... | pdf |
Author:z3r0yu
CobaltStrike 插件开发
目录
CONTENTS
1. 概述
2. Sleep 语言相关
3. Aggressor Script 相关
4. 总结
概
述
01
CobaltStrike 插件的编写主要是使用agscript(Aggressor Script),这个CobaltStrike 3.0之后内置的脚
本语言。agscript是基于 Sleep 语言进行二次开发的。Sleep 是一种深受Perl启发的基于Java的脚本语言。
所以在开始编写 CobaltStrike 之前我们必须要了解 Sleep 语言的语法和agscript中内置的各种函数。
Sleep 开发手册:
http://sl... | pdf |
Good Vibrations:
Hacking Motion Sickness on the
Cheap
INTRODUCTION
Motion Sickness
• No universally accepted definition
• Defined by signs and symptoms, which varies
• Agreed that it came about when man first
tried to improve natural mobility
• Greeks had first recorded account, occurred at
sea
– Where the term naus... | pdf |
How to Find 12 Kernel
Information Disclosure
Vulnerabilities in 3 Months
Tanghui Chen, Long Li | Baidu Security Lab
2019
Contents
0. Who am I?
1. Understanding Vulnerabilities
2. Vulnerability Analysis
•
Heap and stack data poisoning
•
Vulnerability detection techniques
•
CVE Analysis
3. Results
Who am I?
•
Senior Se... | pdf |
Protecting Data with Short-
Lived Encryption Keys and
Hardware Root of Trust
Dan Griffin
DefCon 2013
Time-Bound Keys
Announcements
• New tool: TimedKey.exe
• New whitepaper: Trusted Tamperproof
Time on Mobile Devices
• Check out http://www.jwsecure.com/dan
What does the NSA think?
• The NSA has been public about:
– ... | pdf |
1
Your logo here…
Robert “RSnake” Hansen - CEO
SecTheory LLC
http://www.sectheory.com
http://ha.ckers.org – the lab
http://sla.ckers.org – the forum
Joshua “Jabra”Abraham
Rapid7 LLC - Security Researcher
http://www.rapid7.com
http://blog.spl0it.org
2
3
Why does this matter?
Privacy advocacy
Peop... | pdf |
简单写一下审计了几个月这个 oa 的思路
首先肯定还是看 web.xml
对 jsp 文件的鉴权以及 oa 的补丁都在 SecurityFilter 中
E8 和 E9 的主要差别就是 E9 多了一个/api 的访问 也就是这个 servlet
这个 servlet 就是扫描 com.cloudstore 和 com.api 包下的@Path 注解的一个 rest 接口
SecurityFilter 初始化时会调用 weaver.security.filter.SecurityMain 的 initFilterBean 方法会
初始化安全规则
会加载这两个文件夹下对应 Ecology 版本的 XML 规则文件
后面这些代码太多了 就... | pdf |
MouseJack, KeySni↵er and Beyond: Keystroke Sniffing and Injection
Vulnerabilities in 2.4GHz Wireless Mice and Keyboards
Marc Newlin
marc@bastille.net
@marcnewlin
August 7, 2016
v0.2
Abstract
What if your wireless mouse or keyboard was an e↵ective attack vector? Research reveals this to be the
case for non-Bluetooth wirel... | pdf |
信誉危机
广受认可的硬件和软件遭遇信任危机
Seunghun Han
国家安全研究所高级安全研究员
29 May 2019
- NSR(韩国国家安全研究所)高级安全研究员
- Black Hat Asia 2019影响力成员
- KIMCHICON审查委员会成员
- 作为演讲嘉宾出席以下会议:
- USENIX Security 2018
- Black Hat Asia 2017 - 2019
- HITBSecConf 2016 - 2017
- BeVX and KIMCHICON 2018
- “64-bit multi-core OS principles and structure, Vol. 1 and Vol. 2... | pdf |
Towards a Trusted Immutable Kernel Extension (TIKE) for Self-Healing Systems:
a Virtual Machine Approach
Julian B. Grizzard, Eric R. Dodson, Gregory J. Conti, John G. Levine, Henry L. Owen
Georgia Institute of Technology; Atlanta, Georgia 30332–0250
Phone: 404.894.2955 Fax: 404.894.9959 Email: grizzard@ece.gatech.edu (... | pdf |
Hooked Browser
Meshed-Networks with
WebRTC and BeEF
The sad tale of vegetarian browsers
Trigger warning: presentation includes JavaScript
$ whoami
• Christian Frichot
• @xntrik
• Co-Author of The Browser Hacker’s Handbook
• @beefproject developer
DEFCON 23 @xntrik Vegie Browsers
DEFCON 23 @xntrik Vegie Browsers
$ ... | pdf |
Tracking Motorola Systems
http://www.signalharbor.com/ttt/00mar/index.html
1 of 5
6/18/2007 14:07
This article first appeared in the March 2000 issue of Monitoring Times.
TRACKING MOTOROLA SYSTEMS
The most common trunked radio systems in use by public safety agencies in the United States
are those manufactured by Mot... | pdf |
ly.tl/poker
Elie Bursztein
Celine Bursztein
Jean Michel Picod
ly.tl/poker
Spectre
ly.tl/poker
Inception
ly.tl/poker
ly.tl/poker
ly.tl/poker
ly.tl/poker
ly.tl/poker
ly.tl/poker
ly.tl/poker
ly.tl/poker
Device
ly.tl/poker
ly.tl/poker
ly.tl/poker
Visible differences
Galaxy Core
Poker cheating device
ly.tl/poker
Security ... | pdf |
Don't Ruck Us Again
The Exploit Returns
echo $USER
●
Gal Zror - @waveburst
●
Security research leader at Aleph Research by HCL AppScan
●
10+ RE, 0days, Exploits, embedded Linux devices
Recap
●
Credential leakages + SSH jailbreak
●
Unauth stack buffer overflow
●
Command injection + Auth bypass
R510 Unleashed
●
AP: C110,... | pdf |
APK File Infection on
Android System
Bob Pan
Mobile Security Research Engineer
July 27, 2012
Who is Bob?
Mobile
Security
Industry Trends
Malware increasing on “App Stores”
Chris Di Bona from Google, November 2011:
”virus companies are playing on your fears to try to sell you bs protection
software for An... | pdf |
Hello, and Welcome. My name is Tom Ritter, and I work for iSEC Partners. If you don’t
know who Zax is, you will by the end of this talk.
This talk is about an anonymity network that was started in the fledgling days of the
Cypherpunk era – the early 1990s.
This book hadn’t even come out yet – this is the second ... | pdf |
AAPL – Automated Analog
Telephone Logging.
Using modern techniques and software to
map the PSTN.
- Da Beave & Jfalcon -
Da Beave
•Work in the network security field @ Softwink, Inc.
•Author “Asterisk Hacking” and “Threat Analysis 2008” – Syngress
Press
•Hacker/Programmer
•Author of iWar and various other “hacking” ... | pdf |
1
Copyright © 2015, FireEye, Inc. All rights reserved.
Copyright © 2015, FireEye, Inc. All rights reserved.
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and
Advanced Forensic Analysis
Willi Ballenthin, Matt Graeber, Claudiu Teodorescu
DEF CON 23
2
Copyright © 2015, FireEye, Inc. All rights reserved.
Co... | pdf |
Exploitable Assumptions
Doktor Zoz, Dr. Foley, and Eric
Schmiedl
What the hell is a Hacker?
What the hell is a Hacker?
The movie does get a few things right
Curiosity
Assumptions and Authority!
Hacker Mindset
Good at spotting flaws, inefficiencies
Must know how things work at any
cost
Boil things to most abstract lev... | pdf |
Keeping Secret Secrets Secret
Keeping Secret Secrets Secret
and
and
Sharing Secret Secrets Secretly
Sharing Secret Secrets Secretly
Vic Vandal
Vic Vandal
vvandal@well.com
vvandal@well.com
DefCon
DefCon-XVI / 2008
-XVI / 2008
Vic’s Usual Disclaimer
• Don’t do anything illegal.
• If you do anything illegal, don’t get cau... | pdf |
mdm
0x00
mod_mdm.somdmd
0x01
unix
unixwireshark
1. 90header
2. xmlpostbodybody
bodyheader0
header
1. 140
2. 581b 02 00 00
3. 91203 00 00 00
58int4
1b 02 00 00 0x21b10539
0x02
1. a33
2. char s[128]s128
3. v6postv6[0]postbody
s128
int648qword4
word8byteunsigned int4
mobileidtype
0x03
ipad
mobileidtype
body0
1. 8... | pdf |
Music
Clash - I Fought the Law and the Law Won
Life Inside a
Skinner Box:
Confronting our
Future of
Automated Law
Enforcement
Greg Conti
gregory.conti@usma.edu
Lisa Shay
lisa.shay@usma.edu
Woody Hartzog
whartzog@samford.edu
Disclaimer
The views in this talk are the
authors’ and don’t reflect
the of... | pdf |
1
Jna加载ShellCode优化
起因
修改
最后
@yzddmr6
蚁剑最开始实现java加载shellcode是通过jna的⽅式,这个做法是来源于⼀个apt组织的⽅法
https://norfolkinfosec.com/jeshell-an-oceanlotus-apt32-backdoor/
但是不是很⽅便的⼀点是这个shellcode loader体积⼤于2m,超过了tomcat默认上传最⼤⻓度。所以之
前⼀直的做法都是先把编译好的jar上传到⽬标服务器,然后⽤URLClassLoader去加载⽂件。虽然⼀开
始jar⼏乎是全⽹免杀的,但是落地还是增加了被识别的⻛险。
后来发现新版哥斯拉4也增加了jna,⽤来加... | pdf |
PRESENTED BY:
© Mandiant, A FireEye Company. All rights reserved.
Investigating
PowerShell Attacks
Defcon 2014
(Pre-Conference Draft)
Ryan Kazanciyan, Matt Hastings
© Mandiant, A FireEye Company. All rights reserved.
Background Case Study
2
Attacker
Client
Victim
VPN
WinRM,
SMB,
NetBIOS
Victim workstations,
serv... | pdf |
author:Y4er
环境
Cassandra 4.0.0
漏洞分析
先说原理,enable_user_defined_functions_threads为false时会隐式禁用security-manager,导致
可以通过udf执行java代码。
官方公告 https://lists.apache.org/thread/r0593lq5dto52fgw8y2vvcydc2tdyq40
使用以下配置
enable_user_defined_functions: true
enable_scripted_user_defined_functions: true
enable_user_defined_functions_thr... | pdf |
bypass NAT
0x00
portswiggertop-10-web-hacking-techniques-of-2020-nominations-open2020
https://portswigger.net/research/top-10-web-hacking-techniques-of-2020-nominations-open
https://samy.pl/slipstream/
NATslipstreaming
nat
nat
rrrrrr
0x01
nat slipstreamhttps://samy.pl/slipstream/
https://forum.butian.net/share/88
... | pdf |
DefCon 13
Shmoo-Fu: Hacker Goo,
Goofs, and Gear with the
Shmoo
The Shmoo Group
www.shmoo.com
DefCon 13
What's up Shmoo?
● Howdy & introductions...
● Our festivities will include:
– IDN Fallout & Homograph Attacks
for Personal Identities
– Super Spy Stuff
– Revving Up Rainbow Tables
– Rogue Squadron & EAP Peeking
– S... | pdf |
Well, really, just SRCDS, but who really cares?
Bruce Potter, Logan Lodge
gdead@shmoo.com, L0l0@shmoo.com
Gaming is a USD47 billion global market.
Console gaming alone is estimated to be USD27 billion in size.
PC online games is a USD6.5 billion industry. Projected to be
USD13 billion by 2012.
Online MMOGs... | pdf |
DevOps 实践指南精要
作者:张乐 2018.04
Case Study
Operation InVersion at LinkedIn (2011)
启示:需要将偿还技术债作为⽇日常⼯工作的⼀一部分
2011年年IPO之后的六个⽉月,LinkedIn
持续与痛苦的、有问题的部署⽃斗争
VP of Engineering决定停⽌止所有功
能开发两个⽉月
彻底检修环境、部署、架构问题
背景
2003年年成⽴立,帮助⽤用户 “connect to your network for better job opportunities.
2015年年11⽉月数据
350 million会员,每秒数万请求
后台系统每秒百万次查询请求
开始... | pdf |
Catching DNS tunnels with
Catching DNS tunnels with
IDS that doesn’t suck A.I.
IDS that doesn’t suck A.I.
A talk about Artificial Intelligence,
A talk about Artificial Intelligence,
geometry and malicious network
geometry and malicious network
traffic.
traffic.
Agenda
Agenda
Introduction
Introduction
Neural N... | pdf |
JspWebShell新姿势解读
写在前⾯
刚刚⽆意间发现我yzddmr6发了篇新⽂章,⾥⾯提到了⼀个jspwebshell的新姿势,但是没有
具体分析,那么这⾥我就接着来分析⼀波
⾸先代码长这样
正⽂
如果按照传统Java的javac的⽅式编译这样⼀定是会出错的,这⾥不贴图⾃⼰试试,⽽jsp不同
于普通的java程序,jsp是有⾃⼰的对类编译时的实现机制,其编译类的时候最终是
在 org.apache.jasper.compiler.JDTCompiler#generateClass ⽣成我们的class⽂件
(省略中途的很多步骤直捣黄龙,不然讲着也费劲)
这是调⽤栈,有兴趣可以深⼊分析
<%
Runtime.getRun... | pdf |
03
2020
DevSecOps
行业洞察报告
法律声明
此报告为悬镜安全与 Freebuf 咨询联合制作,报告中的文字、图片、表格等版权均为悬镜安全与 Freebuf 咨询
共同所有。任何组织、个人未经悬镜安全及 Freebuf 咨询授权,不得转载、更改或者以任何方式传送、复印、
派发该报告内容,违者将依法追究法律责任。转载或引用本报告内容,不得进行如下活动:
不得擅自同意他人转载、引用本报告内容。
不得引用本报告进行商业活动或商业炒作。
本报告中的信息及观点仅供参考,悬镜安全及 Freebuf 咨询对本报告拥有最终解释权。
悬镜安全,DevSecOps敏捷安全领导者,由北京大学网络安全技术研究团队
“XMIRROR”主导创立,... | pdf |
“How can I pwn thee?
Let me count the ways”
RenderMan
RenderLab.net & Church of Wifi
Render@Renderlab.Net
How can I pwn thee?
● Born out of conversations at SECTOR
● Workforce is increasingly mobile and wireless
● Mobile users are away from your watchful
BOFH eye (and punishment)
● How do you educate them, protect you... | pdf |
頸椎呵護指北
超機密
第2次雞友核心群報告書
Plan zur Komplementarität der Menschheit
1.Zwischenbericht
目录
颈椎病的危害和衍生症状
简单实用的颈椎呵护操
工作台的配置方案
借助外力的放松颈椎方式
颈椎病的危害和衍生症状
• 1、颈椎病是由于椎骨受颈脖四面的水肿压迫而导致的身体其他部位与颈部与头部的供血不
足,经常会引起头晕、头疼、颈椎酸疼、骨刺等常见症状,这直截影响到对身体的损害。
• 2、神经根型颈椎病患者通常情况下会有颈部疼痛的症状。咳嗽、喷嚏、或上肢伸展以及颈
部过屈、过伸等,都会引起疼痛加剧。
• 3、颈部疼痛是神经根型颈椎病的主要临床表现,疼痛多表现为钻痛或刀割... | pdf |
The NMRC
The NMRC Warez
Warez 2005
2005
Extravaganza
Extravaganza
DefCon
DefCon 2005
2005
nnomad
omad m
mobile
obile rresearch
esearch ccentre
entre
“With just a few keystrokes, cybercriminals around the world
can disrupt our economy.” - Ralph Basham, Director of the
U.S. Secret Service at RSA 2005.
“With just a ... | pdf |
分类建议: 计算机/软件开发/安全
人民邮电出版社网址:www.ptpress.com.cn
上册
上册
逆向工程权威指南
逆
向
工
程
权
威
指
南
逆向工程是一种分析目标系统的过程。
本书专注于软件逆向工程,即研究编译后的可执行程序。本书是写给初学者
的一本权威指南。全书共分为12个部分,共102章,涉及软件逆向工程相关
的众多技术话题,堪称是逆向工程技术百科全书。全书讲解详细,附带丰富
的代码示例,还给出了很多习题来帮助读者巩固所学的知识,附录部分给出
了习题的解答。
本书适合对逆向工程技术、操作系统底层技术、程序分析技术感兴趣的读者
阅读,也适合专业的程序开发人员参考。
“... 谨向这本出色的教程致以个人的敬意!”
—... | pdf |
SQLReInjector
Automated Exfiltrated Data Identification
Jason A. Novak
Assistant Director, Digital Forensics
Chicago, IL
Andrea London
Digital Forensic Examiner
Dallas, TX
Overview
Problem
Historical Solution
SQLReInjector
Demo
Get It!
Questions?
Who We Are
Bibliography
Problem
Problem
• 97% of data ... | pdf |
1001 ways to PWN prod
A tale of 60 RCE in 60 minutes
1. What’s in this talk?
2. RCE, RCE, RCE!!!
3. Takeaways
@TheLaluka
thinkloveshare.com
1
1. What’s in this talk?
2
In this talk, RCEs are :
- Authent-less
- Fully chained
- Disclosed & Fixed
- Legally POCed 🙃
Le Breakage
Lalu
3
*angry customer data noise*
4
5
2. RC... | pdf |
Art of the possible
Christopher Cleary
ccleary266@gmail.com
“Plans are nothing; planning is everything.”
- Dwight D. Eisenhower (1890-1969)
1
Clash of
civilizations
“Invincibility lies in the defense;
the possibility of victory in the attack.”
- Sun Tzu
DEFCON 19
How did I get here and what
did I learn... | pdf |
Secondary
Contexts
Mahmoud M. Awali
@0xAwali
attacker
Tricks To Identify Some " Hidden " Reverse HTTP Proxies
TRACE OR GET /Endpoint-To-Proxy HTTP/1.1
Host: www.company.com
Max-Forwards: Number e.g. 1 , 2 OR 3
User-Agent: Mozilla/5.0
Referer: https://previous.com/path
Origin: https://www.company.com
Rules ... | pdf |
When
Space
Elephants
A/ack
DEFCON
19
Presented
by
Abstrct
Who
Am
I?
– Expert
in
designing
videogame
UI
– Specialized
in
Human-‐Computer
InteracJon
– Graphic
Designer
– Technical
Writer
Who
am
I
really?
Database
and
InformaJon
Security
Geek ... | pdf |
The August application logs a significant amount of sensitive data. With social engineering, or
temporary access to the unlocked phone of an August user these logs can be extracted. The
following procedure can be use to extract log data without the use of any special tools.
Step 1: Open settings
Step 2: Press and h... | pdf |
A SafeBreach Labs research by
Itzik Kotler, CTO and co-founder, SafeBreach
Amit Klein, VP Security Research, SafeBreach
The Adventures of AV
and the Leaky Sandbox
About Itzik Kotler
• 15+ years in InfoSec
• CTO & Co-Founder of Safebreach
• Presented in RSA, HITB, BlackHat, DEFCON, CCC, …
• http://www.ikotler.org
About ... | pdf |
Reverse Engineering by Crayon:
Reverse Engineering by Crayon:
Game Changing Hypervisor and
Game Changing Hypervisor and
Game Changing Hypervisor and
Game Changing Hypervisor and
Visualization Analysis
Visualization Analysis
Fine-grained covert debugging using
hypervisors and analysis via visualization
Daniel A. Qu... | pdf |
检测ldap协议以及获取相关字段的⼀种⽅式
JNDI注⼊常⽤rmi和ldap协议去打,本⽂主要讲述通过go语⾔检测ldap协议以及获取相关字段的⼀种⽅式
通过跟4ra1n师傅的⽂章的学习和与他本⼈的交流,他的检测思路是⽤go语⾔模拟回包,然后分析数据包,获取其中需要的路径字段。因为要确定⽬标是哪个payload⽣效,所以获取ldap/rmi请求的路
径是必要的。
我在实现他⽂章⾥的思路的时候发现⼀些不理解的地⽅
模拟扫描器打payload:
fake server 端:
我打印出请求路径的hex
wireshark抓包:
可以看到这个#look的hex跟上⾯fake server端不⼀样,但是fake server端的hex转成st... | pdf |
Blockchain Security:
From Curves to Contracts
Dr. Jimmy Chen, IKV & NTU
Alex Liu, AMIS & MaiCoin
HITCON Pacific 2016
Aspects of Security
• ECDSA for Transaction Signing (including hardware signing)
• Hash Function Collision Resistance
• Privacy Preserving Features (Zero-Knowledge Proofs)
• Consensus Algorith... | pdf |
1
janne.lindqvist@tml.hut.fi
June 30, .2007
IPv6 is Bad for Your Privacy
Janne Lindqvist
Helsinki University of Technology (TKK)
and
International Computer Science Institute (ICSI)
2
janne.lindqvist@tml.hut.fi
June 30, .2007
Definition
• A covert channel is a mechanism that is not
designed for communication, but can
... | pdf |
Multiplayer Metasploit
Tag-Team Pen Testing and Reporting
Ryan Linn
Defcon 18
Sunday, July 4, 2010
Outline
• Description of Problem
• Discussion of current solutions
• Overview of XMLRPC database
integration
• Discussion of types of objects
• Demos
Sunday, July 4, 2010
What’s the problem?
• Pen testing/security audit ... | pdf |
© Ofir Arkin, 2006 - 2007
Ofir Arkin, kNAC!
kNAC!
August 2007
Ofir Arkin, CTO
10 (or more) ways to bypass a NAC solution
© Ofir Arkin, 2006 - 2007
Ofir Arkin, kNAC!
In Memory of Oshri Oz
September 13, 1972 - May 27, 2007
© Ofir Arkin, 2006 - 2007
Ofir Arkin, kNAC!
Agenda
What is NAC?
NAC Basics
10 (or more) ways to... | pdf |
惡意程式分析組
病毒不再神秘 - 讓我們⽀支解惡意⾏行為!
HITCON GIRLS 資安女孩
HITCON GIRLS
由⼀一群對資安有興趣,想學習更多技術的女孩們
所組成。︒
讀書會
我們分成不同的組別,進⾏行討論、︑學習和互補,
惡意程式分析組針對 Malware 進⾏行分析,內容
其中包含各種動態⼯工具以及反組譯的討論。︒
成員介紹
Turkey
台灣駭客協會 秘書
唯⼀一的台灣駭客協會正職XD
珣珣
輔仁⼤大學資訊⼯工程所 碩⼀一
NISRA 成員
成員
成員介紹
Joey
台灣科技⼤大學 資訊管理所
Lucas
任職於趨勢科技
Charles
任職於Team T5
教練
資安學習地圖
資訊收集
Informatio... | pdf |
Licensing Agreements 101:
The Creative Commons
DefCon 13 – June 29-31, 2005
Presented By: Jim Rennie
Licensing Agreements 101: The Creative Commons - Slide 2 of 36
Disclaimer
This Presentation is for educational
purposes only.
It is not legal advice.
The speaker is not a lawyer.
If you require legal advice, ret... | pdf |
CDnetsec.com
Education
Masters Degrees in:
▪ Computer Science
▪ Management
Author since 2007
Professional Penetration Testing
Ninja Hacking
Netcat Power Tools
Penetration Testing’s Open Source Toolkit, V2
Certifications
ISSMP, CISSP, SCSECA, SCNA, SCSA, IEM/IAM
Crystal Defense Network Security Solu... | pdf |
1"
反击恶意软件:
源头做起不不挖坑
DEF"CON"CHINA"1.0"(2019)"
DEF CON CHINA 1.0 (2019)
by Alexandre Borges
ALEXANDRE"BORGES"–"MALWARE"AND"SECURITY"RESEARCHER"
DEF"CON"CHINA"1.0"(2019)"
2"
ü Malware and Security
Researcher. "
ü Speaker at DEFCON USA 2018
ü Speaker at HITB 2019
Amsterdam
ü Speaker at CONFidence Conf.
2019
... | pdf |
Improving Cybersecurity through
Non-Technical Exercises and In-
House Strategic Analysis
View from the Czech Republic
by Michal Thim
DRAFT - DO NOT QUOTE
DISCLAIMER: The views and opinions expressed in this presentation are those of the presenter and do
not necessarily reflect the official policy, position of the Nati... | pdf |
Teaching Old Shellcode
New Tricks
DEF CON 25
@midnite_runr
Whoami
• US Marine (out in 2001)
• Wrote BDF/BDFProxy
• Found OnionDuke
• Co-Authored Ebowla
• Work @ Okta
• Twitter: @midnite_runr
• Github: github.com/
secretsquirrel
Why This Talk
•
It’s fun
•
It’s time to update publicly available Windows
shellcode... | pdf |
Assembly Language Is
Too High Level
...or the drinking game replaces 'cyber' with 'assembly is too high level'
DEF CON 25
XlogicX
Shoutz
● KRT_c0c4!n3 (art)
● Fat Cat Fab Lab (where I hack)
● NYC2600 (who I friend)
● DC201 (Because DEF CON)
- My girlfriend KRT_c0c4!n3 (art director) did... | pdf |
2021GKCTF-NAN-WP
NaN 战队隶属 Nu1L 2.0 计划,有兴趣加入者可发送个人简历至 root@nu1l.com
队伍名称:NAN
队伍成员:
Siebene
pray77
SYJ
一:Reverse
1. QQQQT
使用 exeinforpe 检查发现是用的 Enigma Virtual Box 打的包
下载工具 EnigmaVBUnpacker 将 exe 解包一下
得到 QQQQT_unpacked.exe
拖入 IDA 分析
关键逻辑在函数 sub_4012F0 里面,就是一个标准的 base58,然后比较字符串,写个脚
本解一下即可
查找字符串得到比较数据和 bas... | pdf |
SharpC2 beacon插件机制
Demo代码位置: AgentModules\DemoModule\Module.cs
关于插件接口定义 代码位置:Agents\Stage\Interfaces\IAgentModule.cs
Init() 方法初始化插件,接收两个参数。第一个AgentController 规范beacon的行为,定义beacon的通用
功能; 其中 RegisterAgentModule方法需要关注下
再来看第二个参数 ConfigController.cs;
// AgentController.cs
public void RegisterAgentModule(IAgentModu... | pdf |
Unlimited Results: Breaking Firmware Encryption of ESP32-V3
Karim M. Abdellatif, Olivier H´eriveaux, and Adrian Thillard
Motivation
• ESP32 is deployed in hundreds of million
devices as announced by Espressif 1
• ESP32-V3 has been recently used as the main
MCU in Jade hardware wallet (Blockstream)2
• Encrypted firmware... | pdf |
0x00:前⾔
某天测⼚商业务时,发现其中有⼀个提供⾳乐播放业务的资产,正好⾥⾯有我想听的歌,于是就有了这篇⽂章
0x01:信息收集
F12简单看下⽬标信息环境:
ServerSoft:IIS 7.5 CMS:JYMusic(ThinkPHP)
0x02:开搞和碰壁
抱着试试看的⼼态随便找了个资源⽂件试了发解析漏洞,没想到成功了,那么现在只需要找到上传点就能getshell
了。
常⻅的编辑器
Ueditor/Umeditor
Kindeditor
ckeditor/ckfinder
程序上传点
头像/⽂章/附件...
上传组件
⽬标站开放注册,登录后发现存在头像上传功能,原以为直接可以搞定了,结果却不尽⼈意,应该是⼆次渲染
了。... | pdf |
Security by Politics -
Why it will never
work
Lukas Grunwald
DN-Systems GmbH Germany
DefCon 15 – Las Vegas
USA
Agenda
Motivation
Some basics
Brief overview ePassport (MRTD)
Why cloning?
How to attack the system
BAC (Basic Access Control)
EAC (Extended Access Control)
Enrollment: Unexpected risks
Motivation ... | pdf |
Applied Ca$h Eviction through ATM Exploitation
Trey Keown
Red Balloon Security
New York, USA
trey@redballoonsecurity.com
Brenda So
Red Balloon Security
New York, USA
brenda@redballoonsecurity.com
Abstract—Automated Teller Machines (ATMs) are among the
oldest devices to be connected to a network. Despite this, the
high ... | pdf |
1
Hacking US
Traffic Control Systems
Cesar Cerrudo
@cesarcer
CTO at IOActive Labs
About me
Hacker, vulnerability researcher, created novel exploitation
techniques, dozens of vulnerabilities found (MS Windows, SQL
Server, Oracle, etc.).
Developed, sold exploits and 0day vulnerabilities (7-10 years ago)
R... | pdf |
Ode to the DEFCON 15 Badge
Joe Grand (Kingpin)
170 hours of total time spent
2 nights of my honeymoon (oh, how I lament!)
3 circuit board revisions to get it all right
863,600 total components bring them to light
6,800 hackers wearing the badge in all its glory
If you want to learn more, please read this fine st... | pdf |
HITCON PACIFIC 2017
ICS/SCADA Cybersecurity and IT Cybersecurity:
Comparing Apples and Oranges
Presented by David Ong | CEO of Attila Cybertech
8 December 2017
2
2
“… But there are also unknown unknowns.
There are things we don’t know we don’t know.”
Donald Rumsfeld, former Secretary of Defence
... | pdf |
THIEMEWORKS
WORLD TOUR
21 YEARS OF MISCHIEF AND MAYHEM
Chicago
New York
San Francisco
Seattle
San Diego
Boston
Miami
Orlando
San Antonio
Dallas
Austin
Houston
New Orleans
Baton Rouge
Biloxi
Los Alamos
Atlanta
Minneapolis
Phoenix
Denver
Sun Valley
Kansas City
Detroit
Des Moines
St. Louis
Las... | pdf |
美团
APT检测设备的扩展研究
演讲人:朱学文(Ju Zhu)
2019
团队介绍
朱学文(Ju Zhu)
美团/高级安全研究员
9+年的安全研究经验
7+年主要从事高级威胁的研究,包括0Day、nDay和漏洞挖掘
一直致力于使用自动化系统来Hunt野外的高级威胁
多次获得CVE,且受到Google、Apple、Facebook等厂商的致谢
多次作为Speaker受邀参加BlackHat、CodeBlue、CSS等国内外的顶级安全会议
郭梦圆(Mabel Guo)
上海交通大学/美团实习安全研究员
上海交通大学在读硕士
研究生阶段致力于视频隐写/隐写分析研究
擅长iOS逆向以及虚拟化技术
PART ... | pdf |
Mamma’s
Don’t
Let
Your
Babies
Grow
Up
to
Be
Pen
Testers:
Everything
Your
Guidance
Counselor
Forgot
To
Tell
You
About
Pen
TesEng
Who
are
we?
• “2
dudes
by
a
trash
can”
– Dr.
Patrick
Engebretson
• Network
Sec
wonk
– Dr.
Jo... | pdf |
I Hunt
Penetration
Testers!
More Weaknesses in Tools and Procedures
Wesley McGrew, Ph.D.
Distributed Analytics and Security Institute
Mississippi State University
http://mcgrewsecurity.com @mcgrewsecurity
wesley@mcgrewsecurity.com
Introduction
• Wesley McGrew
• Distributed Analytics &
Security Institute,... | pdf |
API-Induced SSRF
How Apple Pay Scattered
Vulnerabilities Across the Web
About me
● Math degree
● Web developer, ~5 years
● Bounties
● At PKC ~1 year, web dev and code
audits for clients - pkc.io
Intro
Overview
● Definitions
● Demo some mistakes
○ Apple Pay
○ Twilio
○ Others
● How not to be like Apple
Intro
Diagram of ... | pdf |
macOS/iOS Kernel Debugging and Heap Feng Shui
Min(Spark) Zheng @ Alibaba Mobile Security
Outline
Alibaba Security
• Introduction
• macOS Two Machine Debugging
• iOS Kernel Debugging
• Debugging Mach_voucher Heap Overflow
• Traditional Heap Feng Shui
• Port Feng Shui
• Conclusion
Whoami
•
Min(Spark) Zheng @ Twitter,蒸米sp... | pdf |
URL跳转奇葩姿势详解
JutaZ
目 录
CONTENT
1
关于我
5
衍生危害
2
URL的标准形式
3
绕过及FUZZ
4
其他跳转方式
一个新手
1
关于我
2
URL的标准形式
scheme://user:password@domain:port/path?query_string#fragments
① 方案名
② 验证信息
③ 主机名
④ 端口号
⑤ 路径
⑥ 查询字符串
⑦ 片段字串
引自《白帽子讲浏览器安全》
3
绕过及FUZZ
实现 test.a.com 跳转到 b.com
限制:仅允许跳转至*.a.com
•
a.com.b.com
•
a.comb.com
•
b.coma.com
•
a.com:80@b... | pdf |
Defense
by
Numb3r5
Making
problems
for
script
k1dd13s
and
scanner
monkeys
@ChrisJohnRiley
“THE
WISEST
MAN,
IS
HE
WHO
KNOWS,
THAT
HE
KNOWS
NOTHING”
SOCRATES:
APOLOGY,
21D
TL
;DR
Goals
for
this
talk
Describe
the
defensive
uses
of
HTTP ... | pdf |
DEF CON 24
Side-channel attacks on high-
security electronic safe locks
plore@tuta.io
Agenda
• Background on electronic safe locks
• Cracking S&G 6120 safe lock
– Recovering keycode using power analysis
• Cracking S&G Titan PivotBolt safe lock
– Recovering keycode using timing attack
– Defeating incorrect-code... | pdf |
Fax?!
What The
To:
Date:
Subject:
Check Point Research
DEFCON 26
Aug-12 2018
Received OK?
WhoAreWe?
Yaniv Balmas
“This should theoretically work”
Security Researcher
Check Point Software Technologies
@ynvb
Eyal Itkin
“That’s cool.”
Security Researcher
Check Point Software Technologies
@eyalitkin
1860
Caselli
Invents... | pdf |
@EyalItkin
Fixed by the vendor
ZigBee
(Radio)
Attacker
ZigBee
Factory
Reset
Attacker
Controlled
WiFi
Ethernet
ZigBee
(Radio)
Attacker
ZigBee
Factory
Reset
Attacker
Controlled
WiFi
Ethernet
ZigBee
(Radio)
Attacker
ZigBee
Factory
Reset
Attacker
Controlled
WiFi
Ethernet
Malicious
OTA Update
ZigBee
Exploit
Wi... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.