text
stringlengths
100
9.93M
category
stringclasses
11 values
Security)Auditing)Mobile)Apps) ! DEF)CON)23! Sat.,)Aug)9,)2015)9C1! Sam)Bowne) City)College)San)Francisco! Slides)and)projects)at)samsclass.info) Adding&Trojans&to&Apps& Slides'and'projects'at'samsclass.info' Android&is&#1& •  80%&market& share&in&2014& – Link&Ch&4a& Slides'and'projects'at'samsclass.info' App&Signing& ...
pdf
GSM: WE CAN HEAR EVERYONE NOW! DEFCON 2019 Campbell Murray, Eoin Buckley James Kulikowski, Bartek Piekarski BlackBerry © 2018 BlackBerry. All Rights Reserved. 2 AGENDA • Slides detail a key vulnerability in GSM. • Highlights derivation of indicator to exploit this vulnerability. • Section 1: Concept Overview • Section ...
pdf
甲⽅方威胁情报杂谈 分享嘉宾 阿⾥里里安全 王伟 alert7 Who am I? • Aka alert7 ,Xfocus核⼼心成员 • 曾McAfee⾼高级研究员 • 原翰海海源 联合创始⼈人&技术总监 • 微博 _alert7_ • 阿⾥里里安全归零实验室 功夫 议程 甲⽅方威胁情报的尴尬 甲⽅方情报能⼒力力成熟度模型 传统情报体系 情报的⼀一些特性 把威胁情报卖给甲⽅方 甲⽅方威胁情报的尴尬-现状的尴尬 2015年年圈内戏称威胁情报元年年,各⼤大 甲⽅方公司纷纷建⽴立威胁情报团队 2017年年年年尾,听说好多甲⽅方威胁 情报团队解散 价值衡量量的尴尬 正向业务(挣钱的) 负向业务(花钱的) ...
pdf
ZCTF writeup Nu1L Misc: Russian zips 我的世界的东西。。。 Zctf{4t1Ve_!} Sign in 公众号回复 flag misc400 stegsolve 看图片发现这个 文件末尾有一串 base64,解密得到一个损坏的压缩包 修复后解压。发现很多 txt,有一个 start,打开是乱码,但是看内容前几个字符,发现是 bz2 的文件头,把后缀改成 bz2 就可 以解压了,发现还有一个 txt 指向下一个 txt,于是,把所有的 txt 改成 bz2,在 windows 下批量解压,然后在 linux 下 cat 所有文件,直接得到了密码,然后解压 flag.rar 得到密 码 Web: We...
pdf
对URLDNS探测class的补充 问题 刚刚有个师傅私聊问到我这个问题,这⾥来谈⼀谈,当时⼤师傅的⽂章⾥确实也没提到这 ⼀点 遗忘的师傅可以回顾下:https://gv7.me/articles/2021/construct-java-detection-class-deserialization -gadget/ 这个问题就是:为什么明明没这个类我在本地⽣成的时候明明没有这个类为什么还会收到 DNS请求 解决 在问题之前我们简单说下调⽤流程,⽅便简单会议下 将url与检测类分别放⼊HashMap的key/value 触发反序列化后先是恢复HashMap的key再恢复value 之后调⽤putVal时触发key的hashcode⽅...
pdf
nmap -sC -sV 10.10.10.46 ​ ​ sudo zip2john backup.zip > hash sudo john -w /usr/share/wordlists/rockyou.txt hash //zip2johnziphashjohn //wordlistskalirockyou.txt hack the box——-Shield 0x00 ​ ​ ​ sudo john --format=Raw-MD5 --fork=4 -w=/usr/share/wordlists/rockyou.txt hashmd5 //md5Raw-MD5 ​ sudo sqlmap -r 46search.sql ...
pdf
The follow steps can be used to bypass the certificate pinning used by the August Smart phone  app without needing to jailbreak the device.  Step 1: Open settings  Step 2: Press and hold the application version number.  Step 3: Enter "DreadfulDow" in the prompt. The prompt is case sensitive.  Step 4: Tap on https://api...
pdf
MetaPhish “PDF Infection, Web SpearPhishing, TOR abuse & communications” http://www.attackresearch.com _____________________________________ Val Smith (valsmith@attackresearch.com) David Kerb (dkerb@attackresearch.com) Colin Ames (amesc@attackresearch.com) Page 1 of 26 Last modified: 06/27/2009 Contents 1 Introduction ...
pdf
Backdooring the Frontdoor Hacking a "perfectly secure" smart lock. About me ● Software Engineer by trade ● Hacker by passion ● Lock picker for fun ● The best puzzles are not meant to be solved ● Twitter: @jmaxxz August Smart Lock August's marketing team Source: august.com (August 17th, 2015) "Unlike physical keys whic...
pdf
Fast Forensics Using Simple Statistics & Cool Tools WHAT’S ALL THE FFUSS ABOUT? Do You Hear What I Hear? 7/9/2013 Fast Forensics Using Simple Statistics & Cool Tools 2 Overview – What Can Us Defenders Do? • Malware Effects • What did the malware affect? • Where are all the bad files? • Did it modify the registry? Proc...
pdf
What is the PACS-Man? Tools of The Trade How do we improve the experience in the field? Automation! Demo Time Contribute to Odo! (it’s a framework) • Potential Credential Producers • BLEKey • ESP RFID Tool • Wiegotcha • Telephoto Lens + OCR • Potential Credential Consumers • Chameleon Mini • Libnfc • Emutag • Support ...
pdf
http://www.infobytesec.com Francisco Amato / Federico Kirschbaum evilgrade, "You STILL have pending upgrades!“ Defcon 18 2010 http://www.infobytesec.com Introduction Topics - Client side explotation - Update process - Poor implementation of update processes - Attack ve...
pdf
New Techniques for Discovering Smart Device Vulnerabilities 小灰灰 / Xiaohuihui Baidu Security Lab Senior Security Researcher 30-May2019 2 Who am I Senior Security Researcher at Baidu Security Lab Research areas: IoT security / AI security / autopilot vehicle security Experienced hardware cracker Previously Responsibl...
pdf
1 中国实战化白帽人才能力 白皮书 2021.1 补天漏洞响应平台 奇安信安服团队 奇安信行业安全研究中心 i 专家点评 红蓝对抗和实战化渗透,近年来受到越来越多企业的重视,也成为企业安全体系建设不可 或缺的重要环节。尤其是每年的大型网络安全实战攻防演习更催生了行业对白帽子群体的 关注和需求,也对白帽子能力提出了更高的要求。补天的实战化白帽能力白皮书是一个很 好的行业尝试,可以作为白帽子群体能力发展的一个很好的参考,也可以为初学者答疑解 惑,指明方向。 Tencent Blade Team 技术负责人 张博(cradmin) 补天平台作为国内最大的漏洞平台,拥有超过 7.4 万名白帽子,每年发放超过数千万漏洞 ...
pdf
Do you like to read? I know how to take over your Kindle with an e-book Slava Makkaveev How popular is Amazon Kindle? 10th Generation ■ Kindle Oasis ■ Kindle Paperwhite ■ Kindle 9th Generation ■ Kindle Oasis 8th Generation ■ Kindle Oasis ■ Kindle 7th Generation ■ Kindle Voyage ■ Kindle Paperwhite ■ Kindle 6th Generat...
pdf
Intranet Invasion Through Anti-DNS Pinning David Byrne, CISSP, MCSE Security Architect EchoStar Satellite / Dish Network David.Byrne@echostar.com JavaScript Malware • Cross Site Scripting (XSS) • Port scanning • Web site fingerprinting • Cross Site Request Forgery (CSRF) • Browser history theft • Self-propagating w...
pdf
function hooking for osx and linux joe damato @joedamato timetobleed.com slides are on timetobleed.com (free jmpesp) i’m not a security researcher. call me a script kiddie: @joedamato laughinglarry.com slayerinc.com dbgrady.files.wordpress.com assembly is in att syntax WTF is an ABI ? WTF is an Application Binary I...
pdf
http://Irongeek.com Adrian Crenshaw Project site: http://www.irongeek.com/i.php?page=security/programmable-hid-usb-keystroke-dongle http://Irongeek.com  Tenacity Solutions http://www.tenacitysolutions.net/  Kentuckiana ISSA http://www.issa-kentuckiana.org/  PJRC http://www.pjrc.com/ http://Irongeek.com...
pdf
Unintended Consequences: Four Years under the DMCA 1. Executive Summary Since they were enacted in 1998, the “anti- circumvention” provisions of the Digital Millennium Copyright Act (“DMCA”), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyrigh...
pdf
Through the Competitive World of Bug Bounty Find Blue Oceans Muneaki Nishimura (nishimunea) Muneaki Nishimura (nishimunea) Weekend Bug Hunter Lecturer of Web Security of Security Camp in Japan Weekend Bug Hunter Lecturer of Web Security of Security Camp in Japan Found 30 Bugs in Firefox Received Reward of $70,000+ from...
pdf
Do Not Trust the ASA, Trojans! Jacob Baines Lead Security Researcher, Rapid7 August 11, 2022 2 Introduction Adaptive Security Appliance (ASA) Original ASA ASA-X ASA-X with FirePOWER Services 3 ASAv Product Landing Page Introduction ASA Virtual Appliance (ASAv) 4 Firepower 9300 Series Firepower 1000 Series Firepower 210...
pdf
Go Go Gadget Python Nick Waite Furkan Cayçı Hardware for software people • Gadgets are cool • Writing drivers is not so easy – Usually done in C – Requires knowledge of low-level interfaces – Can easily crash your box • Many devices do not need compiled drivers – Low data rates – libUSB and other abstraction layers •...
pdf
构建安全监控平台 lion_00 CCIE 2011年11月 CISSP 2013年4月 安全爱好者 关于我: 安全监控应该怎么做 开源/商业 大量的告警有人看吗 怎么才可以让告警准确一些 监控的范围以及层次 以核心资源为中心进行保护 尽量将所有边界囊括其中 一 网络层 数据源:出口流量镜像 IDS:suricata 简单展示界面:BASE 报表展示:SNORBY 网络IDS 起到了眼睛的作用,绝大多数攻击 可以通过编辑网络IDS的规则便可以发现,比如SQLMAP, AWVS等等。 二 日志的存储与展示 数据源:出口流量镜像 将外部访问的HTTP/HTTPS数据从网络流量中提取出来,以便后续使用 三 访问日志(HTT...
pdf
0x0000 they steal a way innocence and peace tho i'm a king i'm a king on my knees and i know they are wrong when they say i am strong as the darkness covers me j knapp remedial heap overflows dlmalloc style buffer overflows by atlas atlas@r4780y.com http://atlas.r4780y.com 0x0100 - Intro to Buffer Overflows ● gets() ...
pdf
What To Do When Your Data Winds Up p Where It Shouldn’t Don M. Blumenthal Defcon 16 Defcon 16 Las Vegas, Nevada August 9 2008 August 9, 2008 © 2008 – Don M. Blumenthal Disclaimer Disclaimer Opinions expressed are my own and Opinions expressed are my own and intended for informational purposes. They should not be ...
pdf
1 Attacking BaseStations Hendrik Schmidt <hschmidt@ernw.de> / @hendrks_ Brian Butterly <bbutterly@ernw.de> / @BadgeWizard 2 Who we are o Old-school network geeks, working as security researchers for o Germany based ERNW GmbH o Independent o Deep technical knowledge o Structured (assessment) approach o Business reasonab...
pdf
Hacker in the Wires Phil Polstra Bloomsburg University of Pennsylvania @ppolstra http://philpolstra.com What is this talk about? ● A hacking device that lives on a gigabit Ethernet wire ● Device is a CatchWire from WAW Technologies ● Running ● Multiple command & control / exfiltration options – Network on which it is...
pdf
XMPP Stanza Smuggling or How I Hacked Zoom Ivan Fratric, Google Project Zero BlackHat USA 2022 About the speaker Ivan Fratric ● Google Project Zero since 2016 ● Previously: Google Security Team, academia (Uni ZG) ● Publishing security research for >>10 years ● Author: WinAFL, Domato, TinyInst, Jackalope, … ● Twitter: @...
pdf
@Y4tacker ROME改造计划 成果 从ysoserial原本的4000+缩短到1320(Base64+弹计算器) 写在前⾯ ⾸先⾮常感谢这次的D^3CTF给我⼀次学习的机会,两个Java题都挺有意思学到了不同的东 西,因为第⼆个⽐较简单就不分享了,这⾥分享⼀下如何去缩短ROME利⽤链,本⾝我也是 之前没学习过ROME,这⾥以⼀个旁观者的视⾓来讲述好累,全篇没有各种⾼级技术不涉及 ASM 的改造,仅仅只是⼀些Trick和利⽤链的精简,同时⾮常感谢我的同学@HolaAs以及我的 朋友@风潇在我做题过程当中给我的帮助 简单分析 ⾸先看看路由,很简单要求传⼊字符长度不超过1956 接下来免不了找依赖后⾯发现了ROME可以⽤,在ys...
pdf
Career Mythbusters Separating Fact from Fiction in your Security Career Lee Kushner / Mike Murray Lee@LJKushner.com / mmurray@episteme.ca 2 Who Are We? • Lee Kushner – Over 10 years of Success Recruitment of Information Security Professionals – Founder and CEO of the Leading Information Security Recruitment Firm, L...
pdf
http://en.wikipedia.org/wiki/Cellular_frequencies Your Weapons and Targets! This will be updated onsite!!!
pdf
反间谍计划: ⾃自建基站与数据嗅探⽅方法论 百度安全实验室 ⼩小灰灰 关于我 百度安全实验室 ⾼高级安全研究员 研究领域:IoT安全/AI安全/⽆无⼈人⻋车 安全 多次破解硬件设备 之前负责: •  BSRC、应急处置、0day分析 •  百度产品 安全评估 •  百度安全监控体系建设 ⼤大纲 •  联⽹网IOT设备测试⽬目的、测试⽅方法 •  如何实现⾃自动附着、MITM流量量 •  如何搭建LTE测试基站 •  漏漏洞洞实例例介绍 •  其他测试⽅方法 ⽬目的及守则 •  ⽬目的: –  了了解GSM的安全⻛风险 –  通过搭建测试基站,辅助IOT设备安全漏漏 洞洞挖掘 –  增强产...
pdf
青衣2 0 1 1 .0 8 .2 9 剑 客 世界的溯源神话 青衣2 0 1 1 .0 8 .2 9 💔 伤⼼心的鱼🐟 户实验室 程序猿🐒 渗透狗🐶 ⿊黑阔杂志编辑👨 产品经理💻 销售💰 青衣2 0 1 1 .0 8 .2 9 何为溯源? 青衣2 0 1 1 .0 8 .2 9 何为溯源?⼀一个找爹的过程 ⼀一定要给孩⼦子找到爸爸, 不能让他么有爹。 乔布斯⼤大神,完全就是《天龙⼋八部》中乔峰!都是自小没见过亲⽣生⽗父母,被平凡养 ⽗父母带⼤大。少年成名,⼀一跃登顶。然后在世⼈人瞩目中,众叛亲离,含恨隐去……再 然后,王者归来,傲凌绝顶。最终,盛年之时,颠峰乐章戛然⽽而⽌止,留给世界⼀一片 惊愕。他俩共用⼀一个称谓:...
pdf
macOS 从运行库劫持到内核提权 周智 About • Senior Security Engineer of AntFinancial (Alipay) LightYear Security Labs • Product security and offensive security research • Acknowledged by Microsoft, Apple, Adobe and VMware for reporting security vulnerabilities • Conference speaking: • BlackHat USA 2017 • HITB 2019 • TyphoonCon 2019 ...
pdf
考勤机的管理方式 本 地 管 理 局 域 网 管 理 互 联 网 管 理 星耀实验室是斗象科技网络安全发展战略的重要组成, 星耀之名取自《山海经》中的星耀独角兽,实验室专 注于前沿创新的安全技术的研究,覆盖包括红蓝对抗、 漏洞挖掘、IoT及移动安全等各安全细分领域,通过研 究积累和内部研发,为公司安全能力支撑保驾护航。 设备的外部通信 从简化后的通信架构来看,我们对设备的漏洞 挖掘可以从设备与云端的通信、以及设备与用 户的通信这两方面入手 流量分析 设备启动后会主动连接到 tls.*****.com 但是没有校验 服务器的证书 流量分析 设备=>云端 云端=>设备 设备向云端上传了自身的信息, 包括固件版本和操作系统类型 云端返回的...
pdf
Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligence Nihad A. Hassan Rami Hijazi Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence ISBN-13 (pbk): 978-1-4842-3212-5 ISBN-13 (electronic): 978-1-4842-3213-2 https://doi.org/10.1007/978-1-4842-3213-2 Libra...
pdf
4.1 Manual Strategic Cyber LLC (A HelpSystems Company) www.cobaltstrike.com/ / 2/ Table of Contents Table&of&Contents&..................................................................................................................................&2/ 1.&Welcome&to&Cobalt&Strike&......................................
pdf
ICS 35.020 CCS YD 中 华 人 民 共 和 国 通 信 行 业 标 准 YD/T 1756T—2018 [代替 YD/T] 研发运营一体化(DevOps)能力成熟度 模型 第 4 部分:技术运营 The Capability Maturity Model of DevOps Part 4 : Technical Operation management (送审稿) (本稿完成日期:2019.6.20) [××××]-[××]-[××]发布 [××××]-[××]-[××]实施 中华人民共和国工业和信息化部! 发 布 YD/T 1756T—2018 I 目 次 目 ...
pdf
1 2 3 Reference: https://docs.microsoft.com/en-us/windows/win32/secauthz/how-dacls- control-access-to-an-object 4 5 6 7 8 9 Reference: https://github.com/samratashok/nishang/blob/master/Backdoors/Set- RemotePSRemoting.ps1 10 11 Reference - https://github.com/samratashok/nishang/blob/master/Backdoors/Set- RemoteWMI.ps1 ...
pdf
Client-Side HTTP Cookie Security: Attack and Defense David Wyde DEF CON 22 Game Plan •  Why are HTTP cookies valuable to attackers? •  How do popular web browsers store cookies? •  How can cookies be stolen? •  How can cookies be protected? Disclaimers •  The opinions in this presentation are mine, and not my...
pdf
Blue Team Hell: A story of ISPs, Healthcare, and Education Text Amanda Berlin @Infosystir Blue team started at ISPs Healthcare Purple team Windows Admin Network Security Jack of all trades very visual - All the memes!! Text Hot sauce for charity that’s not Charity Text Adult Supervision Required If you’re squeamish…...
pdf
Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin By Skunkworks -First time DEFCON speaker and attendee -Electrical Engineering Undergrad at a Major University -Hardware Geek with diverse interests -Not affiliated with Lockheed-Martin! -Not affiliated with Bitcoin! -Basic introduct...
pdf
Security Measurement and Assuring  Reliability through metrics Technology ( SMART) Applying Reliability Metrics to  Security Vulnerabilities Wayne Zage, Dolores Zage, Blake Self Presentation Outline 1. Background/overview of S2ERC and design  metrics 2. Vulnerability Analyses Security and Software Engineering  Resear...
pdf
ROARCTF WP By Nu1L ROARCTF WP By Nu1L Misc Hi_433MHz WEB &Revenge hackback ezsql HTML PWN easy_pwn qtnc 2a1 RE Singular DLP steGO slime_war Crypto ecdsa Crypto_System easyrsa Misc Hi_433MHz WEB &Revenge http://47.104.232.98:36301/?url=file:///fl%2561g import string import sys import requests import time payloads = stri...
pdf
Web中间件常见漏洞总结 ---by lyxhh IIS IIS是Internet Information Services的缩写,意为互联网信息服务,是由微软公司提供的基于运行Microsoft Windows的互联网基本服务。 IIS目前只适用于 目前只适用于Windows...
pdf
1 Half a Sheep is Better Than None A great deal of the pleasure of reading “Project Halfsheep: or How the Agency’s Alien Got High” by Susan Hasler comes from reading the novel on several levels. One level is the story of an alien from the planet Utorb who crash lands on earth and falls into the hands of the Ameri...
pdf
这周末抽空写了写,之前知识星球宣传⾥⾯说要分享这个经验,很多⼈也是看了这个才加的,所以趁现在还记得就 先写出来。 时间在2020年,当时xray的反射型xss扫描很好⽤,于是想知道原理,好奇探索了下⼤概的xss扫描规则,在xss扫 描器成⻓记.md有讲述,xray会先发送⼀个随机字符串,根据在html/js中反射的位置构造⼀个⽆害的payload,判 断标签是否闭合就能判断出是否存在反射xss,后⾯验证的payload⾃⾏去构造就好了。 xray没开源,我就⾃⼰写⼀个了,然后加了⼀个爬⾍,⾃⼰爬⾃⼰扫,通过爬⾍的数据,发现很多地⽅还有可以优 化的地⽅,⼜看了⼀些公开的xss的报告,把很多奇葩条件下的xss扫描都加了进去。当时⾃⼰的机...
pdf
Next Generation Collaborative Reversing with Ida Pro and CollabREate Chris Eagle and Tim Vidas Naval Postgraduate School Shameless Plug Coming soon to finer book stores Defcon 16 CollabREate 3 Prepare for Demo Defcon demo package Compiled plugins Plugin source Binary for everyone to analyze http://www.idabook.com/def...
pdf
S-Mimikatz源码调试 前期准备 mimikatz源码:地址 调试环境: vs2019 几点设置: 1. 因为官方项目没有debug方案,所以需要手动添加debug配置 2. 项目属性配置 程序入口 调试以 privilege::debug 为例。打开调试-> mimikatz 调试属性->配置属性->调试->命令参数 wmain()是 mimikatz`的入口函数。 命令分发 从上面的循环中获取到请求参数之后就进入到命令分发的 mimikatz_dispatchCommand() 函数。 这里首先有一个 kull_m_file_fullPath 方法,然后进行匹配,暂时不知道具体作用是什么,之 后进入 mimikat...
pdf
Technical Service Bulletin: FXR-14 Modifying GE MVS VHF Group 2 150 – 174 MHz for Amateur Radio Applications in the 219 – 220 & 222 – 225 MHz Band A FluX Research project in several phases Release Date: 04-01-2011 Last Update: v1.2 03-01-2011 By: Matt Krick, K3MK matt@kgmn.net Radio Model #: GE MVS - NPFH3OSS Warni...
pdf
CSCS: 以技術力協助公民社會 的初次嘗試 Pellaeon Lin @ HITCON CMT 2017 pellaeon@ocf.tw Human rights defenders are the canaries in the mine of digital rights violations and cyber attacks Human rights defenders? - 生命權、財產權、獲公平審判權 - 免於酷刑和奴役 - 人身、思想、宗教、言論自由 - 性傾向與認同 - 網際網路、通訊 NGO 技術社群 Civil Society Cyber Shield NGO 面臨的資安威脅 - 釣魚、追蹤廣告、政府竊聽、翻牆...
pdf
New Memory Forensics Techniques to Defeat Device Monitoring Malware Andrew Case, Gustavo Moreira, Austin Sellers, Golden G. Richard III andrew@dfir.org, gmoreira@volexity.com, asellers@volexity.com, golden@cct.lsu.edu April 4, 2022 1 Introduction Malware that is capable of monitoring hardware devices poses a significan...
pdf
我知道的与RMI相关的Everything RMI (Java Remote Method Invocation) 是Java远程⽅法调⽤,是⼀种允许⼀个 JVM 上的 object 调⽤另⼀个 JVM 上 object ⽅法的机制。RMI 的本质是通过 socket 编程、Java 序列化 和反序列化、动态代理等实现的。 RMI 涉及注册中⼼、服务端和客户端。注册中⼼、服务端、客户端三者之间通信都会涉及序列 化传输⼆进制数据,有序列化,⾃然就会有反序列化。 先知图镇楼https://xz.aliyun.com/t/2223 ⼀、搭建调试环境 1、创建远程⽅法接⼝ import java.rmi.Remote; 1 import ...
pdf
EDR Is Coming; Hide yo Sh!t @TTimzen @r00tkillah Who are we? Michael “@r00tkillah” Leibowitz Topher Timzen (@TTimzen) NSA Playset C# Malware is <3 Principle Troublemaker Principal Vulnerability Enthusiast RED TEAM ! ! ! ! Agenda ● What is EDR and why...
pdf
Introduction to Lockpicking Alek Amrani DEF CON 17 About Me ● Longhorn Lockpicking Club ● UT Austin ISO ● CS Undergrad Format ● First year with Thursday Events ● Long time slot – People most likely will come and go – Split time into three portions ● Originally intended to be “hands on” workshop-esc – “Lost” bag ● Pick...
pdf
Fasten your seatbelts: We are escaping iOS 11 sandbox! Min(Spark) Zheng & Xiaolong Bai @ Alibaba Security Lab Whoami Alibaba Security • SparkZheng @ Twitter,蒸米spark @ Weibo • Alibaba Security Expert • CUHK PhD, Blue-lotus and Insight-labs • iOS 9.3.4 & iOS 11.3.1 OverSky Jailbreak (Private) Alibaba Security • Xiaolon...
pdf
2018 hitcon CTF By Nu1L https://ctf2018.hitcon.org/ 2018/10/20 02:00 UTC ~ 2018/10/22 02:00 UTC PWN children tcache from pwn import * #p=process('./child',env={'LD_PRELOAD':'./libc.so.6'}) p=remote('54.178.132.125', 8763) libc = ELF('./libc.so.6') def add(size,data): p.recvuntil('choice') p.sendline('1') p.recvun...
pdf
Tomcat中表达式动态执⾏Java代码调试 最近在看表达式注⼊的东⻄,漏洞根源归根结底,应该是Java表达式功能强⼤,⽀持执⾏我们 注⼊的Java代码,这⾥觉得有必要代码调试下。因为表达式解析引擎有很多,我这⾥就⽤ Tomcat重点了,它⾥⾯包含了jdk下的 javax.el 就以这个demo为例,idea起简单的Java Web项⽬,修改index.jsp即可,这⾥注意⼀下搭建环 境需要修改下web.xml,在默认情况,Servlet 2.4 / JSP 2.0(以上)⽀持 EL 表达式。且在 index.jsp头部需加上<%@ page isELIgnored="false" %> 效果如下 ${pageContext.req...
pdf
spy  vs.  spy examining  spyware  on  mobile  devices michael  robinson  |  christopher  taylor Zarious  @  zarious.deviantart.com Introduc=on:  The  newest  spy Spyware  can  easily  run  on  mobile  devices. It’s  in  malware and  its commercially available. h...
pdf
1 脱壳⼩⼦-java anti-decompiler保护脱壳 前⾔ 脱壳思路 脱壳效果 开源地址 有⼀天,脚本⼩⼦想开发⼀个⼯具,但脚本⼩⼦⼜不想从头构思设计代码框架,就找找业界有没有 好的⼯具能不能抄抄。终于在脚本⼩⼦快乐星球⾥,找到⼀个看起来还不错的⼯具。但存在⼀个问题, 这个⼯具有代码保护壳。。。脚本⼩⼦本来想当裁缝⼩⼦的,可没想到还得先变成脱壳⼩⼦才⾏。 正⾯硬刚解密算法是⼀种思路,但所需要花费的时间太⻓,性价⽐不是很⾼,并且由于笔者太菜 了,浅尝了下,发现不太容易搞定。这⾥采⽤CSAgent的形式,通过注⼊⽬标程序,替换壳代码的解密 加载过程,直接将解密后的代码写到⽂件当中。 解密加载代码在JavaLauncherIde...
pdf
Log4j2 JNDI author: flagT lookup:172, JndiManager (org.apache.logging.log4j.core.net) lookup:56, JndiLookup (org.apache.logging.log4j.core.lookup) lookup:223, Interpolator (org.apache.logging.log4j.core.lookup) resolveVariable:1116, StrSubstitutor (org.apache.logging.log4j.core.lookup) substitute:1038, StrSubstitutor (...
pdf
rage against the Suggy (AKA Chris Sumner), Online Privacy Foundation, DEF CON 25 Draft: V0.2 – Updated slides (with notes) will be available shortly after DEF CON machine 2011 2011 2012 2011 2012 2013 2011 2012 2013 2016 1. Why are people so divided? Nothing to Hide, Nothing to Fear BLACK & WHITE Gr Grey Grey Grey Gre...
pdf
Building a Public RPZ Service to Protect the World’s Consumers John Bambenek, Manager of Threat Systems Fidelis Cybersecurity The content of this presentation can be considered TLP:WHITE. I will identify any specific data points I discuss that are more sensitive and shouldn’t be disclosed as we go. © Fidelis Cyb...
pdf
A Dozen Years of Shellphish From DEFCON to the Cyber Grand Challenge Zardus HEX on the beach ??? Giovanni Vigna Christopher Kruegel zanardi void UC Santa Barbara zanardi nullptr void balzaroth sicko irish SIMULATION 2004 UC Santa Barbara nullptr zanardi void balzaroth sicko irish TU Vienna void engiman pizzaman SIMULAT...
pdf
DEFCON XXI How my Botnet Purchased Millions of Dollars in Cars & Defeated the Russian Hackers I want to tell you a story about... ● Hacking ● Cars ● Russian Hackers ● Screwing with the system I want to tell you a story about... ● Commercial Botnets ● Creating competitive advantages ● Not using technology as d...
pdf
那些年 知识星球运营分享 曹将 个人简介 曹将 畅销书《PPT炼成记》作者 世界500强企业总部培训负责人 自媒体平台详情: • 公众号:曹将 —21万读者 • 微博:曹将PPTao —52万读者 • 知乎:曹将 —10万关读者 知识星球简介 星球 曹将和朋友们 成员数 5000+ 核心成员 88 星球天数 1290 星球运营人数 1.5 巨坑 我是谁 WHO AM I 2016年 一次意外 2018年 转型 2019年 问题 2020年 清晰 有些话 只想跟你少数人说 转岗 时间不够用 招助理 我们的定位 到底是什么 WHO AM I KP 关键合作伙伴 KA 关键活动 VP 价值主张 CR 客户关系 CS 目标客群 CH渠道 K...
pdf
(Un) Fucking Forensics0 Ac#ve/Passive+memory+hacking/debugging+ + K2+/+Director+@IOACTIVE+ hBps://github.com/K2+ + About me?0 •  Hacker+for+a+while+ •  inVtero.net++ •  Memory+analysis+framework+for+Windows++ •  Super+fast/GBPS+throughput+ •  Memory+integrity+checking+of+VM’s/CrashDumps/Memory++ •  Type+aware+memory+ha...
pdf
对 CVE-2022-39197 的曲折重现路 0x01 前言 之前看了@漂亮鼠大佬的文章《最新 CS RCE 曲折的复现路》,对文章的内容非常感兴 趣,但是大佬在文章中故意对关键利用链进行忽略,如图 1.1 所示,也勾起了大家浓烈的研 究兴趣。 图 1.1 大佬隐藏的关键利用链 本来以为按照大佬的提示这会是比较简单的一次复现,但是在实际过程中还是遇到很多 困难,可能这就是大佬和小弟的区别吧。非常感谢二哥@gainover 在复现过程中给予的指点 和帮助。 在阅读本文之前需要首先阅读原文,原文中很多内容已经很详细了,我会尽量不写原文 已经有的内容。算是完成大佬留下的课后作业吧。 0x02 初探 第一次准备寻找相应的利用...
pdf
Eacoo Fullchain Exploit分析 Bug1: 登录绕过 登录绕过主要是框架的设计存在一些问题,可以通过构造cookie触发该逻辑漏洞,然后设置成指定uid登 录.触发的逻辑是使用user profile接口 关键点在于is_login()的逻辑 // apps/user/controller/Personal.php    public function profile() {        if(!is_login()){          $this->error('未登录');       }        if (IS_POST) {          /* 省略代码 */    ...
pdf
Some things about LAN device detection (關於內網設備識別的二三事) Canaan Kao, Terence Liu, Hsien-Wei Hung and Ryan Lung canaan_kao@trend.com.tw Network Threat Defense Technology Group Trend Micro 2015/8/29 1 HitCon2015: LAN device detection Who we are • Network Threat Defense Technology Group (NTDTG) of Trend Micro – ...
pdf
1 PEzor Bypass AntiVirus 前⾔ 安装 常规使⽤ https://iwantmore.pizza/posts/PEzor.html https://iwantmore.pizza/posts/PEzor2.html https://iwantmore.pizza/posts/PEzor3.html ⽤docker的kali安装,使⽤起来⾮常⽅便快速。 复制进去,打包完成以后再复制出来。 前⾔ 安装 常规使⽤ 2 参数说明看readme https://github.com/phra/PEzor 常规重打包exe 1 PEzor.sh -format=exe /tmp/m.exe -z 2 -p '"log c:...
pdf
1 从javac源码看Unicode编码绕过的原因 前⾔ 搭建Javac调试环境 ⽀持变形Unicode的原因 注释+换⾏绕过的原因 ⼀个奇怪的发现 @yzddMr6 ⼤家都知道jsp中可以⽤\uxxxx或者\uuuuuuxxxx这种格式来对恶意代码进⾏混淆,并且还可以⽤注 释+换⾏unicode的⽅式进⾏恶意代码的逃逸。那么是什么造成了这种情况呢,带着问题我们从Javac层 ⾯看⼀看原因是什么。 使⽤源码来调试的原因主要是源码⾥有变量名以及注释等,⽅便理解。 git clone https://github.com/arthur-zhang/javac-source-code-reading 这个项⽬打开后⽆法直接使⽤,有...
pdf
apache proxy 0x00 proxyapache proxyPass /test/ "http://172.28.66.94/" proxyPassReverse /test/ "http://172.28.66.94/" ip/ url8000url proxyPass /test/ "http://www.baidu.com" proxyPassReverse /test/ "http://www.baidu.com" URL /test/.cn http://www.baidu.com.cn http://www.baidu.com.cn dnsrebindssrf 0x01 mod_proxy.ca...
pdf
▪ • Relatively Easy to Exploit • Easily Automated • Usually not monitored ▪ ▪ ▪ ▪ Kerberos ▪ Kerberos Delegation ▪ ▪ Focus on High Privileges ▪ Malicious JIT administration ▪ ▪ ▪ • Ticket based authentication protocol Domain User AS TGS KDC TGT TGS LSASS (KERBEROS) AES256 AES128 RC4 DES ST TGT TGT App Server ST ▪ • W...
pdf
[ 高效能人士的七个习惯 ] ———————————————————————————————————— ———————————————————————————————————— ~ 1 ~ 封面 [ 高效能人士的七个习惯 ] ———————————————————————————————————— ———————————————————————————————————— ~ 2 ~ 感谢 爱书网 www.ilovebook.cn 提供图书模板 [ 高效能人士的七个习惯 ] ———————————————————————————————————— ——————————————————————————————...
pdf
随着API技术的发展和广泛使用,API安全问题越来越受到人们的 重视。本书从API安全的视角出发,介绍了API技术的发展和变化以及 不同API技术中常见的安全漏洞,探讨了如何使用自动化安全工具检测 API安全漏洞、如何使用API安全设计规避漏洞。全书从API安全漏洞基 础知识入手,逐步讲解API安全设计、API安全治理等内容,并结合头 部互联网企业的API安全案例,分析业界API安全的最佳实践,是国内 第一本讲解API安全知识和技术实战的专业书籍。 本书适合网络安全人员、软件开发人员、系统架构师以及高等院校 相关专业师生阅读学习。 图书在版编目(CIP)数据 API安全技术与实战/钱君生,杨明,韦巍编著.—北京:机械工业出版 社,2...
pdf
如何有效突破 DevOps转型的临界点 张 乐 高效运维社区 合伙人 前百度资深敏捷/DevOps专家 自我介绍 张 乐 • 高效运维社区合伙人、DevOps时代联合创始人 • 前百度资深敏捷教练、DevOps专家 • 国内首批 Certified DevOps Master • DevOps Master 授权讲师,凤凰项目沙盘授权教练 • 全球TOP外企,国内一线互联网 • 百度云、百度金融等新技术产品敏捷转型主导者 • DevOpsDays 大会、GOPS全球运维大会金牌讲师 DevOps 已成为发展趋势 IT 的技术革新 推进 DevOps 转型过程中经常遇到的问题 • 为什么需要DevOps转型? • 如何明确阐述转型的价...
pdf
Cisco Confidential 1 © 2009 Cisco Systems, Inc. All rights reserved. NG Update Copyright © 2010 Cisco Systems, Inc. All rights reserved. Cisco Confidential Panini Inter-VM data exfiltration The art of cache timing covert channel on x86 multi-core Etienne Martineau Kernel Developer August 2015 © 2009 Cisco ...
pdf
Spyware Spyware Forensic With Forensic With Reversing and Static Analysis Reversing and Static Analysis PK PK TWCERT/CC TWCERT/CC 2 Abstract Abstract 目前危害個人機密資料、系統安全的惡意程式,以各種方 目前危害個人機密資料、系統安全的惡意程式,以各種方 式、無孔不入的進入我們電腦,當我們上網下載程式、接 式、無孔不入的進入我們電腦,當我們上網下載程式、接 收電子郵件等,往往會遇到不知檔案是否為惡意程式,但 收電子郵件等,往往會遇到不知檔案是否為惡意程式,但 防毒軟體也未出現警告的情...
pdf
How to overthrow a Government Chris Rock chris@kustodian.com Cyber Mercenaries #2 ? US National Intelligence Director James Clapper says in 2016 Cyber Espionage came second to ISIS as the biggest world threats. 1. ISIS 2. Cyber Espionage 3. North Korea Hackers previously held the crown in 2013, 2014 and 2015. O...
pdf
© 2016 Verint systems inc. All rights reserved worldwide 9 • Invisible Attacks • VPN, AD, PtH, PtT • Invisible Network Traffic • Google Drive, Dropbox • Invisible Malware • Task schedule, Wmi , Powershell Low visibility of Cyber Threats © 2016 Verint systems inc. All rights reserved worldwide 10 • As seen from the scri...
pdf
d f h Lord of the Bing Taking Back Search Engine Hacking From Google and Bing Taking Back Search Engine Hacking From Google and Bing 30 July 2010 Presented by: Presented by: Francis Brown and Rob Ragan Stach & Liu, LLC www.stachliu.com A d Agenda O V E R V I E W • Introduction • Advanced Attacks • Google/Bing Hackin...
pdf
开源生态白皮书 (2020 年) 中国信息通信研究院 2020年10月 版权声明 本白皮书版权属于中国信息通信研究院,并受法律保护。 转载、摘编或利用其它方式使用本白皮书文字或者观点的, 应注明“来源:中国信息通信研究院”。违反上述声明者,本 院将追究其相关法律责任。 前 言 近几年开源技术快速发展,在云计算、大数据、人工智能等领域 逐渐形成技术主流,开源技术已经成为企业构建信息系统的重要选择, 国内企业参与开源生态的热情度持续提升。 本白皮书是中国信息通信研究院在开源领域发布的白皮书,分析 国内外开源生态发展现状,梳理当前发展热点,展望未来发展趋势。 白皮书首先介绍了开源生态发展概况,重点围绕开源布局、开源运营、...
pdf
§ David Mortman, Dell § Rob Graham, ErrataSec § Dave Maynor, ErrataSec § Chris Hoff, Juniper § James Arlen, Liquid Matrix § Larry Pesce, PaulDotCom § Rich Mogull, Securosis § Alex R. Shostack Esq, Ars Infosectica Fail Panel Five
pdf
攻击GraphQL phith0n 什么是 GraphQL ? { REST } 进化 GraphQL 一个为API通信设计的查询语言 描述你的数据 type Project { name: String tagline: String contributors: [User] } 请求你要的数据 { project(name: "GraphQL") { tagline } } 获得可预测的结果 { "project": { "tagline": "A query language for APIs" } } type Project { name: String tagline:...
pdf
Cobalt Strike trick 3 - Pivot:Reverse TCP 当在内⽹需要建⽴起控制链时,如多层路由,下层路由机器⽆法出⽹时,常常会使⽤Beacon Session作为跳板来做转发。 常⻅的控制⽅式有两种:Bind TCP和Bind SMB,这两种都需要⽬标机器对应端⼝开放,但 如果⽬标开启了强度较⾼的防⽕墙,或者硬件防⽕墙有策略时,可能会⽆法访问到⽬标的对 应端⼝,此时可以尝试⼀下Reverse TCP。 在已有Session选择Pivoting->Listener 即可在跳板机上建⽴⼀个监听器,本质上其实是⾃动做的端⼝转发。同样只能使⽤Stageless 类型的Artifact,可以创建⼀个Web Del...
pdf
goby识别指纹的功能很不错,想试试能不能把goby指纹识别里面的指纹提取出来,移植到自己的扫描器 中,结果后面到了逆向虚拟机的程度。。。 goby的crules 在goby 最初的版本中,翻看了一些感兴趣的资源文件后看到有个 crules 文件。 它的文件头是yara文件 并且里面包含了它的指纹 通过文本提取,可以把规则提取出来,但是每个规则之间的逻辑关系,并不清楚。 新版的crules提取 现在goby使用了最新的go版本 1.16 在go1.16,嵌入资源有个官方实现,叫 go embed ,可以根据在二进制中搜索 embed.FS 来确认是否使 用了这个特性。 然后我自己测试了一下,看看 go embed 内嵌资源是如何实...
pdf
Abusing Sast Tools @DEFCON When scanners do more than just scanning Who am I? Rotem Bar Head of Marketplace @ Cider Security - Bug Bounty Researcher - Cyber Paladin @rotembar Security Engineers A person that tells others where they have problems, and helps them fix them. DevOps Engineers who are in charge of large...
pdf
PowerPwning: Post-Exploiting By Overpowering PowerShell Joe Bialek About Me • Joe Bialek • Security Engineer • Twitter: @JosephBialek • Blog: http://clymb3r.wordpress.com • GitHub: https://github.com/clymb3r PowerShell is Awesome • Provides access to the Win32 API • Doesn’t write to disk when scripts are run on remot...
pdf
Trace Me If You can: Bypassing Linux SyscallTracing Dr. Rex Guo, Lacework Dr. Junyuan Zeng, Linkedin.com #BHUSA @BlackHatEvents About Rex Guo • Principal Engineer @ Lacework • Behavior anomaly detection (Polygraph) • CSPM • Engineering Manager @ Startups • Confluera (XDR) • Tetration (CWPP, now part of Cisco) • Confer...
pdf
Technical changes since the last Tor talk Nick Mathewson The Tor Project <nickm@torproject.org> Defcon XV Aug 4, 2007 ● Tor was working, usable, and seemed pretty secure. (v 0.0.7.2) ● Pretty small network. ● No GUI—hard to use. ● We got a couple of Defcon talks! Marty! We've got to go back to the future2004! ● Hacking...
pdf
Logic Trunked Systems http://www.signalharbor.com/ttt/00may/index.html 1 of 5 6/18/2007 14:08 This article first appeared in the May 2000 issue of Monitoring Times. LOGIC TRUNKED SYSTEMS This month we continue our tour of different trunked radio systems with a look at Logic Trunked Radio (LTR). This protocol was deve...
pdf
The Law of Reversing Fred von Lohmann EFF Senior Staff Attorney Jennifer Stisa Granick EFF Civil Liberties Director DEFCON 17 July 31, 2009 Topics: 1. Legal Traps for Reverse Engineers 2. Jailbreaking the iPhone 3. Online Gaming 4. Lessons and Strategies www.eff.org Work We Do Coders’ Rights DRM Free Speech Fair Use Pr...
pdf
Light & Shadow about Net-Banking $ecurity @ Japan @2013 HITCON 愛奴 & 愛花 Punpun maru Profile • Started lecturing and writing as a freelancer since 2000 • AVTOKYO Speaker (2010, 2011, 2012) • Wrote “Introduction of Information Security ” for the textbook of universities • Regular writer for “Hacker Japan Magazine “ • Seri...
pdf
Somerset Recon Infecting the Embedded Supply Chain Zach Miller Alex Kissinger Somerset Recon Introduction - Who We Are Zach: ● Security Researcher @ Somerset Recon ● Reverse Engineering, Pen Testing ● Twitter: @bit_twidd1er Alex: ● Barista that occasionally does security things @ Somerset Recon ● Cappuccinos, Hardwa...
pdf
特种木马攻击与溯源 天融信阿尔法实验室 冷风 你可以了解到: 特种木马的一些特性 1 2 攻击溯源的一些思路 目录 穿透ISA代理及硬件代理 1 2 绕过流量监控及地址检测 3 使用多协议进行内容穿透 协议加密穿透IPS/IDS 4 5 使用隧道穿透单机防火墙 对抗虚拟机检测 6 7 对抗启发式检测 8 目前杀软的软肋 我们的对手是谁 1 2 如何发现特种木马 3 基于二进制的分析 基于IP的分析 4 5 基于蜜罐的分析 6 一层VPN的溯源 2 溯源之难 怎么定义特种木马? 特种木马对网络的穿透性 穿透ISA代理及硬件代理 1 2 绕过流量监控...
pdf
Defeating Physical Intrusion Detection Alarm Wires Bill Graydon @access_ctrl b.graydon@ggrsecurity.com github.com/bgraydon This is a talk about sensor communication wires. ● Alarm systems and access control first ● Defeating line supervision and end-of-line resistors ○ Surrogate Resistor ○ Voltage Regulation ● De...
pdf
Is WebAssembly Really Safe? - Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way Zhao Hai(@h1zhao) #BHUSA  @BlackHatEvents #BHUSA   @BlackHatEvents Information Classification: General About US TianYu Lab of Cyberpeace Tech Co., Ltd. 天虞实验室 TianYu Lab Lei Li Supervisor Mengchen Yu Manager Zhichen Wang Re...
pdf
Bio SecurityResearcher/Tester(HarrisCorp) FormerArmyRedTeamOperator OneofthedevelopersofPowerSploit Twitter:@obscuresec Blog:www.obscuresec.com Sayhellotokrbtgt He’sbeenheresincethebeginning TheEarlyYears:20012004 GrowingPains:20052008 MaturityRealized:20092012 MemeCount:1 SkeletonsintheCloset:20132014 MemeCount:2...
pdf
1 frp改造S-流量特征 使⽤tls_enable加密后,⾸次连接会⼀个0x17的头部。 pkg/util/net/tls.go,frp⾃实现tls,所以存在很强的特征 特征1 2 这个0x17只有再发起连接时会有,后续均为tls加密传输,所以我们需要修改此处就够了 第⼀步:修改byte内容,然后新增⼀个以该byte开头,后续内容随机的字节切⽚。 pkg/util/net/tls.go Go 复制代码 var ( FRPTLSHeadByte = byte(0x91) FRPTLSHeadBytes =  bytes.Join([][]byte{[]byte{FRPTLSHeadByte}, rand...
pdf