text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
PowerShot Basic
Oren Isacson, Alfredo Ortega
August 1, 2010
Abstract
An (incomplete) specification of the Basic language included in several
Canon Powershot Cameras.
1
Contents
0.1
Executing Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . .
14
0.1.1
Format of the SD card . . . . . . . . . . . . . . . . . . .... | pdf |
Confluence EL Injection via OGNL
0x00 前言
上一篇文章《Confluence SSTI via Velocity》中的漏洞原理较为简单,采用了正向分析的方法去还原漏
洞挖掘的过程,这篇文章主要从补丁去逆向分析、尝试独立构造出 POC。
0x01 简介
本文将要介绍以下内容:
介绍OGNL 基本语法 & 内置沙箱机制,并通过一些例子进行初步掌握
梳理 Confluence 处理 HTTP 请求的基本流程
分析 CVE-2022-26134 的补丁,然后独立构造 Exploit
0x02 表达式语言 OGNL
OGNL 部分:
OGNL 介绍
基本使用 (能看懂并定制 poc/exp)
实战利用 (... | pdf |
Criminal Procedure Timeline
???
Stop
Search
Arrest
Questions
Appearance
Bail
Lets Make a Deal
Trial
???
Something happens which causes the police to
want to investigate you
Stop
Police are investigating something
In order to stop you to investigate, police must
have
"reasonable articulable suspicion"... | pdf |
Total
Recall
Implicit Learning as a
Cyptographic Primitive
Tess Schrodinger
• Introduction
• Curriculum vitae
• Cognitive Memory
• Consciousness
• Sub consciousness
Thoughts(&(Perceptions
Memories(&(Stored(Knowledge
Fears
Violent(Motives
Unacceptable(Sexual(Desires
Irrational(Wishes
Immoral(Urges
Shameful(Experiences
... | pdf |
1"
2"
3"
7"
8"
9"
10"
11"
12"
This"is"how"networks"show"up"in"your"network"list"when"searching"for"wifi"networks"
on"your"device."
13"
When"you"join"a"network,"this"interacCon"happens."
14"
15"
16"
KARMA"aKacks"do"exactly"the"same"thing"as"a"normal"associaCon,"it’s"just"an"evil"AP"
instead"of"the"actual"AP"doing"it."
17... | pdf |
"The further the spiritual evolution of mankind advances, the more certain it seems to me that the path to
genuine religiosity does not lie through the fear of life, and the fear of death, and blind faith, but through
striving after rational knowledge."
-Albert Einstein
Industrial Cyber Security
From the Perspect... | pdf |
知道创宇漏洞社区计划
知道创宇 张祖优(Fooying)
S
Z
漏洞社区
KCon
追求干货有趣的
黑客大会
Sebug
聚焦漏洞,提供漏洞威
胁情报信息与交易平台
ZoomEye
网络空间搜索
引擎,全球漏
洞感知与预警
K
过去
在过去,基于 ZoomEye 我们做了许多事
组件识别
通过自主研发引擎,我
们对网络空间进行了重
要端口探测与组件识别
开放搜索
我们公开了许多研究成
果,并开放海量结果数
据提供大家搜索
全球路由器后门探测
2014年2月份,我们针对
全球路由器进行全网扫描
并发出安全预警
摄像头漏洞探测
2014年3月,针对国外黑帽
大会曝光的家庭摄像头漏洞
进行全网的探测并发出预警
心脏出血
2014年4月,... | pdf |
About me
o What I am not?
•
Formally Educated
•
Developer
•
Hacker
o What I am?
•
Interested
How I am about to spend your time?
o What is GoH?
o What's behind it?
o Not so wet T-Shirt contest
o Node.js potential risks
o Takeaways
Game of Hacks – An idea is born
using System;
using System.Security.Cryptog... | pdf |
Zhanlu Lab, Tencent Inc.
针对Docker容器网络的ARP欺骗
与中间人攻击
演讲人:王凯 Kame Wang
2019
关于我
• 王凯,Kame Wang;
• 腾讯安全湛泸实验室高级研究员;
• 中国科学院大学信息安全博士;
• 研究兴趣包括:云安全、移动安全、区块链、自动化漏洞挖掘。
PART 01
研究背景
目录
CONTENTS
PART 02
本地测试
PART 03
云端测试
PART 04
讨论与总结
01
02
03
04
•
Docker及其虚拟网络
•
ARP欺骗与中间人攻击
PART.01
研究背景
CLICK ADD RELATED TITLE TEXT, AND CLICK AD... | pdf |
Exploiting Internet Surveillance Systems
Defcon 18, 2010
Decius
The “Great Debate”
How should the information infrastructure of the
future balance the individual’s desire for privacy
with the state’s interest in monitoring suspected
criminals?
Steve Jackson Games
Communications Assistance for Law Enforcement Act
Co... | pdf |
OpenRasp分析
OpenRasp分析
写在前⾯
⼀些⽇志说明
正⽂
初始化
为什么要将rasp.jar加载⾄Bootstrap类加载器
配置初始化
ModuleLoader类初始化
引擎启动
JS初始化
Checker的初始化
CustomClassTransformer
Hook
回答上⾯遗留的ModuleClassloader的问题
如何绕过
基于正则的绕过
通过修改某些属性
覆盖插件
参考⽂章
写在前⾯
花了点时间学习了下openrasp的核⼼代码,这⾥做下简单的分析
相关项⽬地址:
⽂件名
⽂件内容
plugin/plugin-DATE.log
检测插件的⽇志,e.g 插件异常、插件调试输出
rasp/rasp-DAT... | pdf |
Improving Antivirus Accuracy
with Hypervisor Assisted
Analysis
Danny Quist
Danny Quist
Offensive Computing, LLC
dquist@offensivecomputing.net
Twitter: ocomputing
Danny Quist
Reverse engineer
Automated reverse engineering
Unpacker of strange malware
RE Training Course
Founder Offensive Computing
Largest open col... | pdf |
Ricky Lawshae, OSCP, GPEN
March 23, 2009
Picking Electronic Locks Using TCP Sequence Prediction
Abstract:
Card reader systems are being relied on more and more frequently as a method of electronically
controlling access to physical locations. These systems, especially in larger deployments, usually
consist of RF... | pdf |
apache proxy⸺
0x00
apacheoverviewhttps://t.zsxq.com/ubm2rVf
p
apachhttps://t.zsxq.com/rBmaU7a
hookhttps://www.anquanke.com/post/id/257539
0x01
p
vscodec/c++ubuntuapache
hook
[root@centos httpd-2.2.23-worker]# export SHOW_HOOKS=1
[root@centos httpd-2.2.23-worker]# ./bin/httpd -k start
Registering hooks for core.c
H... | pdf |
域渗透从⼊入⻔门到⾃自闭
前期准备
前⾔言
本系列列在于从简单的Windows域环境搭建到利利⽤用域的特性,通过哈希传递攻击、凭证窃取技术
结合互联⽹网公布现成的安全研究⼯工具,进⾏行行域横向移动渗透,最终到达我们⽬目标,拿到ad域控
制器器权限。
实验环境设置
下⾯面列列出本次实验环境计算机跟练习中的⼀一些配置设置,均在VMWARE下完成。
我们的域名将被命名为h4x0er.org公司,因此创建域,然后将这些PC电脑加⼊入域,let’s go!
本次实验环境⼀一共有三台电脑,⼀一台AD域控制器器DC,另外两台员⼯工PC。
系统ISO下载地址: https://msdn.itellyou.cn/
Windows Server 201... | pdf |
侠盗猎车——数字钥匙Hacking
演讲人:@Kevin2600 @MonkeyKing
2 0 1 8
#Whoami
@Kevin2600
银基安全研究员
专注无线电和嵌入式系统安全
会棍: KCON; XCON; 阿里先知; BESIDES; OZSECON; DEFCON26
PART 01
汽车钥匙简史 101
目录
CONTENTS
PART 02
安米钥匙架构 & 功能
PART 03
安米钥匙攻击点分析
RF 干扰攻击
钥匙共享分析
蓝牙加密破解
01
02
03
PART
01
汽车钥匙简史
汽车钥匙 101
•
机械钥匙 (仍在使用)
•
远程控制 (红外线; 固定码; 滚动码)
•
RFID (无... | pdf |
BITSInject
Control your BITS, get SYSTEM
Dor Azouri
Security Researcher @SafeBreach
BITS Background & Terms
PowerShell
bitsadmin
...
BITS Job
Download
Upload
Upload-Reply
COM Interfaces (C/C++)
qmgrprxy.dll
qmgr.dll
State File
More Background
Available since 2001 (Windows XP)
Most known use: Windows Update
Advanced fea... | pdf |
The Politics of Privacy
and Technology:
Fighting an Uphill Battle
Eric Fulton, CEO SubSector Solutions
Daniel Zolnikov, MT House Representative
Note, a prettier and updated version of this
presentation can be obtained by emailing:
daniel.zolnikov@gmail.com
or
eric@subsectorcorp.com
Daniel Zolnikov
MT State House
Re... | pdf |
Bringing Sexy Back
Breaking in with Style…
Pentest? Really?!?!
• Pentest has betting getting a bad rap lately
• The demand hasn’t dropped off…
• Testers hate doing it because its boring
Why is pentesting boring?
Its seldom about 0day, its most about lame
php bugs or password cracking…
Why is pentesting boring?
Custome... | pdf |
关于系统化应对 NSA 网络军火装备的操作手册
©安天版权所有,欢迎无损转载
第 1 页
关于系统化应对 NSA 网络军火装备的操作手册
安天安全研究与应急处理中心(安天 CERT)
报告初稿完成时间:2017 年 05 月 22 日 06 时 00 分
首次发布时间:2017 年 05 月 22 日 08 时 00 分
本版本更新时间:2017 年 05 月 22 日 19 时 00 分
关于系统化应对 NSA 网络军火装备的操作手册
©安天版权所有,欢迎无损转载
第 2 页
1 概述
北京时间 2017 年 5 月 12 日 20 时左右,全球爆发大规模的 “WannaCry”(中文名称魔窟)勒索软件感
... | pdf |
Network Mathematics - Why is it a Small World?
Oskar Sandberg
1
Networks
Formally, a network is a collection of points and
connections between them.
2
Networks
Formally, a network is a collection of points and
connections between them.
This is an abstraction which can be used to
describe a lot of different systems (tec... | pdf |
#BHUSA @BlackHatEvents
Human or Not: Can You Really
Detect the Fake Voices?
Liu Xin, Tan Yuan
School of Information Science and Engineering, Lanzhou University
#BHUSA @BlackHatEvents
Information Classification: General
Contents
What’s Fake Voice
Introduction of AI-synthesized speeches
Existing Detectors
Existi... | pdf |
《SRC混子是如何炼成的?》
SRC到底应该怎么搞?
来自漏洞之王的回复
来自月入几十万的大佬回复
又一个来自月入几十万的大佬回复
信息收集?
了解业务?
从基础架构分析
运维安全
业务安全
应用安全
内部安全
运维安全
基础服务
网络
服务器&设备
Web(Server
应用层
信息泄露
基础服务
ftp
ssh
telnet
smtp
dns
smb
snmp
ldap
rsync
database
vnc
activemq
elasticsreach
hadoop
……
网络
DDOS
扫描
内网入口
服务器&设备
本地提权
SSL
Bash
WebServer
Tomcat
……
JBoss
Resin
Web(logic
... | pdf |
RenderMan
Michael “theprez98” Schearer
render@renderlab.net
theprez98@verizon.net
HACKERS VS. DISASTERS
Our hacker brains are pre-wired to find alternate
uses for many devices. We look at the world as a
puzzle to solve in everything we do. We can
come up with the most extraordinary solutions
to problems under the m... | pdf |
强网杯-WP
Author:Nu1L Team
强网杯-WP
强网先锋
bank
web辅助
主动
侧防
upload
baby_crt
babymessage
Siri
Funhash
红方辅助
babynotes
Just_a_Galgame
区块链
EasyFake
IPFS
Misc
miscstudy
Crypto
fault
modestudy
Web
easy_java
babewp
half_infiltration
dice2cry
Re
aaenc
flower
safe_m2m
firmware_blob
imitation_game
xx_warmup_obf
Pwn
direct
easyoverflow
leak... | pdf |
Building a Threat Intelligence
Program
Michael Smith, CISSP-ISSEP
APJ Security CTO
mismith@akamai.com
@rybolov
©2015 AKAMAI | FASTER FORWARDTM
Straw Poll: What Is Threat Intelligence?
Data feeds for purchase
Big Data, Big Data, Big Data
OSINT
Output from a SIEM
Tools dumps
Executive reports
Reporting fr... | pdf |
某⼤厅后台未授权上传
<html><head>
<meta charset="utf-8">
<title>.net版本活动⼤厅通杀本地上传webshell脚本</title></head><body>
<form action="https://⽬标域名/后台后
缀/UpLoad/Savelmagesmethd="postenctype=multipart/form-data">
<label for="file">⽂件名:</label>
<input type="file" name="Filedata" id="Filedata"> <br><input type="submit"
name="submit" value... | pdf |
Binder Fuzz based on drozer &
Some interesting Vulnerabilities sharing
(@0xr0ot)
Kcon Beijing 2016
0xr0ot.sec@gmail.com
Who am I
• ID:0xr0ot(not 0xroot)
• Security researcher(2
years)
• Mainly focus on
Android security
• Always like basketball
Agenda
• drozer introduction
• Binder fuzz model
• Case share
•... | pdf |
MesaTEE SGX:借助 Intel SGX 重新
定义人工智能和大数据分析
Yu Ding
百度 X-Lab 安全研究员
May-29-2019
自我介绍
• https://dingelish.com
• https://github.com/dingelish
• https://github.com/baidu/rust-sgx-sdk
•
在百度 X-Lab 担任安全研究员
•
Rust 爱好者
•
漏洞利用/缓解领域博士
•
从事 Rust-SGX 项目
MesaTEE SGX
借助 Intel SGX 重新定义人工智能和大数据分析
适用于 隐私保护 计算的 Intel SGX
• Intel SGX 背景
• 基于... | pdf |
Confluence SSTI via Velocity
0x00 前言
之前的文章《CodeQL在Shiro550中的应用》的小结里有写到自己关于 漏洞分析 的浅薄理解, 机械地跟进代
码其实并没有太大的意义, 意识到这个问题后的自己也在刻意地练习自己写文章的风格, 希望能改掉一些不好的
习惯。
0x01 简介
本文将要介绍以下内容:
模板引擎 Velocity 基础使用
模拟挖掘 CVE-2020-4027
怎么选择切入点
遇到问题 解决问题的过程
逐步构造出可利用的 Exploit
漏洞复现
本文的侧重点:
思考 & 记录如何站在漏洞挖掘者的角度去正向地分析漏洞。
0x02 模板引擎 Velocity
Velocity 部分... | pdf |
Realtime Bluetooth Device Detection
with Blue Hydra
Granolocks
Zero_Chaos
Granolocks Narcissus
● Experimenter
● Developer
● Long walks in the woods
● Travel to exotic locations
● Hacking the planet
● Give great back rubs
Zero_Chaos Narcissus
● Eagle Scout
● Open{Zaurus,Embedded,wrt} Maintainer
● Aircrack-ng Developer
–... | pdf |
MITM插件:SSRF公⽹出⽹检测
依赖条件:
需要配置 yak bridge 公⽹部署⽅案详情⻅https://github.com/yaklang/yak-bridge-docker
1.
使⽤Yakit配置好公⽹镜像
2.
SSRF检测原理:
触发条件:
流经MITM的流量,应该过滤⼀下参数,疑似SSRF参数应该参与测试
1.
参数条件:
2.
参数名直接相关 redirect / url / url_callback / webhook / target
.... 等
a.
参数值为 http(s?):// 开头的,可以直接替换成我们想要的SSRF⽬标
b.
yaklang.io公⽹镜像反连体系
基础知识:https:/... | pdf |
Insecure Internal Storage in Android
Claud Xiao
HITCON, Taipei
2014.08
It’s well known that in Android
§ external storage is globally read/writable thus not secure;
§ internal storage is isolated for each apps by sandbox thus
is secure enough.
§ By Google’s suggestion, applications store sensitive data a... | pdf |
最近忍者师傅因为某件事情,寝食不安,所以给他写篇星球文,安抚他寂寞的心灵。
https://my.oschina.net/9199771/blog/5085337
书接上文,之前提到我们可以用java版的libinjection进行sql注入防护。
那么我今天花了一天的时间,在sqlmap的level=5 和 risk=3的情况下对拼接的sql进行安全测试,本文不涵盖tamper,否则本文的内容会异常复杂。
在试验过程中我发现,其实很多的报错情况,以及一些sql报错,可以看到一些 libinjection 没有对应防护策略的端倪。
上文中提到了GTID_SUBSET注入问题。
testing 'MySQL >= 5.6 AND e... | pdf |
Dan Haagman, InfoSecurity 2009
HACKING
FROM WEB APPS
7Safe Company Overview 2009
Secure Coding Course, © 7Safe
6/11/2010
Hacking Oracle from web apps
1
Sumit Siddharth
Aleksander Gorkowienko
7Safe, UK
Dan Haagman, InfoSecurity 2009
Pentesters @7safe
Specialize in Application Security
About US
7Safe Co... | pdf |
VLAN hopping, ARP poisoning and
Man-In-The-Middle Attacks in
Virtualized Environments
Ronny L. Bull⇤, Jeanna N. Matthews†, Kaitlin A. Trumbull‡
⇤†Clarkson University {bullrl, jnm}@clarkson.edu
⇤‡Utica College {rlbull, katrumbu}@utica.edu
Abstract—Cloud service providers offer their customers the
ability to deploy virtu... | pdf |
SCADA and ICS for
Security Experts:
How to Avoid Cyberdouchery
James Arlen, CISA
DEF CON 18 - Las Vegas - 2010
1
Disclaimer
I am employed in the Infosec industry,
but not authorized to speak on behalf
of my employer or clients.
Everything I say can be blamed on
great food, mind-control and jet lag.
2
Credentials
1... | pdf |
09/07/09
ken@ipl31.net
1
Fear and Loathing in Community
Wireless Networks
Ken Caruso – Co-Founder Seattlewireless.net,
Freenetworks.org
09/07/09
ken@ipl31.net
2
Notice to CD Users
If you are reading this off of the CD,
please note that I have a lot of info in
the speakers notes, I like to keep the
slides terse, ... | pdf |
Transferability of Adversarial Examples
to Attack Cloud-based Image
Classification Service
Dou Goodman(兜哥) @
Our Team X-Lab
AI#Security#Research#@
Open#Source#Projects:
Today’s Topics
Cloud-based
Image Classifier Service
+perturbation
Origin
Adversary
Class:#Cat#
Score:#0.99
Class:#Flesh#
Score:#0.99
... | pdf |
Switches Get Stitches: Episode 3
Then there were three of them.
Who are we?
Last episode on switches get stitches…
Scalance X-Family < V5.0.0
echo -n "admin:password:C0A800020002F72C" | md5sum
C0A8006500000960
C0A8006500001A21
C0A80065000049A6
C0A8006500005F31
C0A800650007323F
This is the hash on the wire. M... | pdf |
haya
ATT&CK红队战术漫谈
◉ haya
◉ 木星安全实验室 · 红队负责人
◉ Github: https://github.com/hayasec
◉ Blog: hayasec.me
◉ 红蓝对抗与红队武器化
ABOUT ME
今天聊点啥?
ATT&CK与红队攻击战术漫谈
ATT&CK矩阵(站在攻击者的视角来描述攻击中各阶段用到的技术的模型)
初 始
访 问
执 行
攻 击
权 限
维 持
权 限
提 升
防 御
绕 过
凭 据
获 取
数 据
披 露
横 向
移 动
目 标
数 据
收 集
内 网
数 据
窃 出
偷渡式攻击
外部程序攻击
硬件植入
USB复制
鱼叉式附件
鱼叉式钓鱼
供应链攻击
可信关系
有效帐户... | pdf |
Interview with David MacMichael – February 13, 2006
by Richard Thieme
David MacMichael is a former CIA Analyst, US Marine and historian. He was a senior
estimates officer with special responsibility for Western Hemisphere Affairs at the CIA's
National Intelligence Council from 1981 to 1983. He resigned from the CIA ra... | pdf |
Securing Our Cyberspace
Copyright © 2011 CyberSecurity Malaysia
Ministry of Science,
Technology & Innovation
MAHMUD AB RAHMAN
(MyCERT, CyberSecurity Malaysia)
Reversing Android Malware
Copyright © 2011 CyberSecurity Malaysia 2
Secu... | pdf |
CobaltStrike 4.3 简单修改
几个月没有使用CobaltStrike了,因此最新的4.3,我也没有自己修改的版本。今天为了测试
HiveNightmare于是乎修改了下。
网上有@Twi1ight同学写的比较通用的CSAgent。
CSAgent使用需要引入jar包,并且windows下不能使用cobaltstrike.exe去启动。我个人还是习惯一个
cobaltstrike.jar,只做必要的修改,因此就自己修改了下。
主要修改了Authorization.class、BeaconData.class,两文件。
方便新手同学自己简单修改,我还是详细说下步骤:
Authorization.java,我在代码中标注,... | pdf |
ADVANCED WIRELESS ATTACKS AGAINST
ENTERPRISE NETWORKS
LAB SETUP GUIDE
VERSION 1.0.2
Gabriel Ryan
@s0lst1c3 @gdssecurity
gryan@gdssecurity.com
solstice.me
Advanced Wireless Attacks Against Enterprise Networks
Introduction
© 2017 Gabriel Ryan All Rights Reserved
2
INTRODUCTION
For this workshop, we’ll be usi... | pdf |
Thinking Outside
of the Console (Box)
Squidly1
gameconsolez@gmail.com / haksys.schleppingsquid.net
DefCon 15 / August 04, 2007
SaveDarfur.org
HAXO(RED)
See G. Mark FMI see him @ Hacker Jeopardy
Crisis ongoing. Read up & help
Squidly1
Squidly1
Computer Network Defense Team Lead (US Navy)
Former Red Team Lead
Inde... | pdf |
6/25/11
Balancing the Pwn Trade Deficit Series:
APT Secrets in Asia
{Anthony Lai,Benson Wu,Jeremy Chiu} Xecure Founder and
Researcher
PK, Security Researcher
6/25/11
There is no national secret here
We welcome spies and SS here.
Spies/SS are human, too :)
6/25/11
Why we are here again
Last
year, ... | pdf |
Boutique Kit
Playing WarGames with expensive rootkits and malware
Josh “m0nk” Thomas
Opening Question
Hands up if you run Android
Keep ‘em up if you run a custom ROM / Kernel
Down if you actually compiled it
Back up if you didn’t look at the source
Back up if you didn’t do a FULL source audit
Don’t lie, Santa ... | pdf |
1 解决txt记录写文件的大小限制问题
1.0.1 前言
公众号NOP Team曾经发布一个名为“远程下载的通用替代方案|红队攻防”,文章链接为
https://mp.weixin.qq.com/s/Z1zp7klk--uQ1OnzljNESw,这篇文章有个痛点就是不能写入
太大的文件,本次tip目的为解决这个痛点。
1.0.2 解决思路
由于留给TXT记录的长度最长差不多为65515左右的原因,导致通过单词txt记录写入大文件成
为不可能。
解决办法就是制造多个txt记录写入文件再进行转换。如此一来大文件就可以写入了。
具体细节在下面脚本,这里就不过多描述,因为本来就很水
1.0.3 武器化
dnsWriteFile.py
im... | pdf |
1
shadow tls
最近看到v2ex上有⼈分享了⼀个有意思的技术
https://v2ex.com/t/875975
前⾔
2
简单来说,这个技术可以在tls握⼿阶段实现完全合法有效的与指定域名⽹站的握⼿,⽽后续的传输数据
阶段则是传输⾃身的恶意payload。
这样我可以让tls握⼿阶段,SNI以及证书同步伪装,使得流量更加可信。
对应的demo项⽬ https://github.com/ihciah/shadow-tls
分析之前,先搞清楚tls的协议结构。
1. tls分为两层,记录层和握⼿层,记录层只有⼀种记录协议;握⼿层有4种协议,Handshake、Alert、
ChangeCipherSpec、App... | pdf |
JS逆向|40分钟视频通杀⼤⼚登陆加密
收录于合集
#JS逆向
4个
介绍
书接上⽂Burpy|⼀款流量解密插件 属于配套了
其实这个⽀付宝案例已经发过⽂了,我实在是懒得写别的站点⽂章;重新录了个通杀的视
频,就以⽀付宝为案例讲解了,基本秒扣加解密函数,视频⾥有百度、爱奇艺、优酷、微
博都简单扣了⼀下,⼏分钟搞定,⼤家有案例的话也可以私发我。
点击下⽅图⽚跳转到视频
或访问:
2022-07-23 12:42 发表于北京
原创
不愿透露姓名的热⼼⽹友 ⼀位不愿透露姓名的热⼼⽹友
https://www.bilibili.com/video/BV16d4y1S7Su
⼀键三连啊看官们
下⾯就⽼⽂新发了,可以直接忽略不看。
⽹站:aHR... | pdf |
Are$we$creating$incidents?
August$26,$2015$
在 臺北$
Shin$Adachi,$CISSP,$CISM,$CISA,$PMP
Shin$Adachi,$CISSP,$CISM,$CISA,$PMP
0
Disclaimer
• The$presentation$itself,$and$the$views$and$
opinions$expressed$by$the$presenter$therein$do$
NOT$reflect$those$of$any$of$my$affiliations$at$all.$
• NONE$of$such$affiliations$above$th... | pdf |
Backdooring the Lottery
and
Other Security Tales
from Gaming
July 30, 2017
Gus Fritschie and Evan Teitelman
Presentation Overview
1. Introductions
2. What has happened since 2011
3. Historical overview of security incidents in gaming
4. Eddie Tipton and the lottery
5. Russian slot attacks
6. Conclusion
© SeNet Inter... | pdf |
Hacking travel routers
like it’s 1999
Mikhail Sosonkin
Mikhail Sosonkin
“Synack leverages the best combination of humans and technology
to discover security vulnerabilities in our customers’ web
apps, mobile apps, IoT devices and infrastructure endpoints”
Director of R&D
Always a Student
@hexlogic
mikhail@synack.com
... | pdf |
Key-Logger, Video, Mouse
How to turn your KVM into a
raging key-logging monster
MEETTHETEAM
Yaniv Balmas
“This should theoretically work”
Security Researcher
Lior Oppenheim
“The mad scientist”
Check Point Software
Technologies
Check Point Software
Technologies
Security Researcher
TOOMANYCOMPUTERS
• Computers
• Mo... | pdf |
Lives on the Line
Securing Crisis Maps in Libya, Sudan, and Pakistan
DEFCON 19 - 2011
george chamales - rogue genius llc
george chamales // DEFCON USA - 2011
The Humanitarian Technology Community
needs your help.
2
george chamales // DEFCON USA - 2011
Crisis
Aid
Information
Crisis Mapping
Platform
Reports
Aid
Aid
3
ge... | pdf |
#BHUSA @BlackHatEvents
A New Trend for the Blue Team
Using a Practical Symbolic Engine to Detect Evasive Forms of
Malware/Ransomware
Hank Chen
Sheng-Hao Ma
Mars Cheng
@hank0438
@aaaddress1
@marscheng_
TXOne Networks Inc.
#BHUSA @BlackHatEvents
Who are we?
Hank Chen
Sheng-Hao Ma
Mars Cheng
Manager
PSIRT and Threat Re... | pdf |
Breaking Wind:
Adventures in Hacking
Wind Farm Control Networks
Jason Staggs, Ph.D.
University of Tulsa
Tulsa, Oklahoma
whoami
• Security researcher
– Focus in control systems and network security
• PhD in Computer Science from The University of Tulsa
– Cellular networks, security engineering and forensics
• Presente... | pdf |
Nim https://nim-lang.org/
Nim,,js WebAssembly
brew install nim
brew install mingw
nimble install winim
gcl https://github.com/byt3bl33d3r/OffensiveNim
demo
Offensive Nim
Nim
Offensive Nim
Test
minidump_bin
dump
shellcode
shellcode_bin
demo
| pdf |
This Space Intentionally Left Blank
1
Executive Summary
●
Data in the air
–
Snatched by antennas
–
Antennas not protected
–
Antenna Farmers not all spooks
●
Data pushed from antennas to Vault
–
Dropped off onto classified network
–
Data cannot come back up from vault
●
Data packaged and pushed from vault to The Man
–
T... | pdf |
Who am I and what am I doing?
• Airscanner.com
– Mobile Security (AV, firewall, sniffer)
• Dissemination of Information
– Reverse-engineering is a tool…not a weapon
– Knowing your computer
– Don’t steal…pay the programmers
Legal Issues
•
Laws
–No person shall circumvent a technological measure
that effectively control... | pdf |
Game of Chromes
Owning the Web with Zombie Chrome Extensions
Tomer Cohen
April 2016
Sign-up Graph
1000
RPM
9000
RPM
This is what we currently know…
10 Sec
Attack Page
Attack Page
Google Web Store
Extension
Course of Action
Inject Code
Into Facebook tabs
Open Wix Frame
Transparently inside a Facebook page
Sign Up to ... | pdf |
Screw Being A Pentester -
When I Grow Up I Want To Be A
Bug Bounty Hunter
Jake Kouns
@jkouns
Chief Information Security Officer (CISO)
Risk Based Security
Carsten Eiram
@CarstenEiram
Chief Research Officer (CRO)
Risk Based Security
N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y... | pdf |
The Insecure Workstation II
Bob Reloaded
When not having access
qualifies as a disability…
Its not my fault, trust me!
• The information provided in this presentation is
for educational purposes only. I am in no way
responsible for any damage that is the result of the
use or misuse of the information provided in th... | pdf |
Design and Implementation of a Quantum
Design and Implementation of a Quantum
True Random Number Generator
True Random Number Generator
What is True Randomness?
What is True Randomness?
Must be unpredictable.
Must be unpredictable.
For a given set of binary data 'i', the i+1
For a given set of binary data 'i... | pdf |
Hacking(Public(Warning(System(in(LTE(
Mobile(Network
Li, Weiguang
weelight.li@gmail.com
(
UnicornTeam@360 Technology
(
Agenda
01(About(Public(Warning(System(in(LTE(Network(
(
02(The(Vulnerability(in(LTE(Protocol(
(
03(Trigger(the((Vulnerability(
(
(a.(Build(a(Fake(LTE(Base(Station(
(
(b.(Forge(the(Fake(Warning(... | pdf |
FROM BOX TO BACKDOOR
U s i n g O l d S c h o o l To o l s a n d Te c h n i q u e s t o D i s c o v e r
B ac k doors in Modern Dev ic es
Patrick DeSantis | @pat_r10t
ADVANCED PERSISTENT THIRST (APT)
ADVANCED PERSISTENT THIRST (APT)
MOXA AWK-3131A WAP
MOXA WAP: ABOUT
“The AWK-3131A is 802.11n compliant to... | pdf |
ANTHONY ROSE
JACOB KRASNOV
VINCENT ROSE
1
@bcsecurity1
2
Legal Stuff…So we don’t go to jail
Training is for informational and research
purposes only. We believe that ethical hacking,
information security and cyber security should be
familiar subjects to anyone using digital
information and computers. We believe tha... | pdf |
Process Injection Techniques -
Gotta Catch Them All
Amit Klein, VP Security Research
Itzik Kotler, CTO and co-founder
Safebreach Labs
About Itzik Kotler
•
15+ years in InfoSec
•
CTO & Co-Founder of SafeBreach
•
Presented in Black Hat, DEF CON, HITB, RSA, CCC and more.
•
http://www.ikotler.org
About Amit Klein
•
28 yea... | pdf |
Our Instrumented Life
http://www.nydailynews.com/entertainment/tv/2010/06/07/2010-06-07_a_paparazzo_sits_for_his_portrait.html
Greg Conti // West Point // gregory.conti@usma.edu
The views expressed in this presentation are those of the author and
do not reflect the official policy or position of the United States Mili... | pdf |
McAfee
消灭Flash,彻底消除它
一份关于Flash攻击途径的全面的研究报告
演讲人:Haifei Li, Chong Xu
2019
PART 01
目录
CONTENTS
PART 02
背景介绍
PART 03
PART 04
01
02
05
04
03
PART 05
Flash在浏览器环
境中的攻击途径
Flash在Microsoft
Office中的攻击途径
Flash在PDF
中的攻击途径
总结
演讲者
Haifei Li. 安全领域知名的安全研究员。现就职
于迈克菲(加拿大)。研究领域包括(但不局
限于)微软的生态系统,真实攻击的攻击面分
析,下一代防御技术的安全研究及实现。他的
研究结果经常分享于主要... | pdf |
RF Fuzzing // River Loop Security
River Loop Security
River Loop Security
Designing RF Fuzzing Tools to Expose
PHY Layer Vulnerabilities
Matt Knight, Ryan Speers
DEF CON
RF Fuzzing // River Loop Security
whois
Matt Knight
•
Senior Security Engineer at Cruise
Automation
•
RF Principal at River Loop Security
•
BE in ... | pdf |
The Great Hotel Hack
Adventures in attacking hospitality industry
Etizaz Mohsin
https://etizazmohsin.com
Disclaimer
No hotels were harmed during making of this presentation
Do not try this at home!
Images Courtesy: ANTlabs & INTSIGHTS
What this talk is not about
What this talk is about
Biggest threats are simple not so... | pdf |
Building the Pe rfe ct Evil
Tw in
Rich Mo gull
Se curo sis, LLC
e curo sis.co m
Are n’t Evil Tw ins Old
Ne w s?
Ye p, but so is Jim m y Buffe tt and he still se lls o ut
m o re sho w s than go d.
e curo sis.co m
Evil Tw in 1 01
X
1 . Inje ct de auth
2 . Ove rpo w e r
AP and MiTM
3 . Enjo y
pw nage
e curo sis.c... | pdf |
Mac OS X Server
Windows Services
Administration
For Version 10.3 or Later
034-2356_Cvr 9/12/03 10:28 AM Page 1
Apple Computer, Inc.
© 2003 Apple Computer, Inc. All rights reserved.
The owner or authorized user of a valid copy of
Mac OS X Server software may reproduce this
publication for the purpose of learnin... | pdf |
Log browsing moves
Data organization
Examples
Entropy-based data organization tricks for
browsing logs and packet captures
Sergey Bratus
Department of Computer Science
Dartmouth College
Sergey Bratus
Entropy tricks for browsing logs and packet captures
Log browsing moves
Data organization
Examples
Outline
1
Log browsin... | pdf |
PAC101
PAC102
COC1
PAC201
PAC202
COC2
PAC301
PAC302
COC3
PAC401
PAC402
COC4
PAC501
PAC502
COC5
PAC601
PAC602
COC6
PAC702
PAC701
COC7
PAC802
PAC801
COC8
PAC901
PAC902
COC9
PAC1002
PAC1001
COC10
PAC1101
PAC1102
COC11
PAC1201
PAC1202
COC12
PAC1301
PAC1302
COC13
PAC1401
PAC1402
COC14
PAC1501
PAC1502
COC15
PAC1701
PAC1702
C... | pdf |
OPERATOR HANDBOOK
SEARCH.COPY.PASTE.L33T;)
RED TEAM + OSINT + BLUE TEAM
NETMUX
V1 [02APR2020]
2
Operator Handbook. Copyright © 2020 Netmux LLC
All rights reserved. Without limiting the rights under the
copyright reserved above, no part of this publication may be
reproduced, stored in, or introduced into a retr... | pdf |
Biting the Hand That Feeds You
2007
Biting the Hand That Feeds You
1
Biting the Hand That Feeds You
Storing and Serving Malicious Content from Well Known Web Servers
Billy K Rios – Senior Researcher
Nathan Mcfeters – Senior Researcher
Kicking Down the Cross Domain Door
ii
Intended Audience
This paper assumes... | pdf |
Hacking Data Retention
Small Sister your Digital Privacy Self Defense
(brenno@smallsister.org)
Brenno de Winter, wgasa
• From the Netherlands
• Self proclaimed geek
• First program at age 5
• Focus on security, privacy
• Writing, training, consulting
• Wanna know more? Beer makes me talk!
Privacy and anonimity are
nee... | pdf |
© 2007 Computer Academic Underground
© 2007 Computer Academic Underground
Real-time Steganography
Real-time Steganography
with RTP
with RTP
I)ruid
I)ruid
<druid@caughq.org>
<druid@caughq.org>
http://druid.caughq.org
http://druid.caughq.org
© 2007 Computer Academic Underground
© 2007 Computer Academic Underground
Who am... | pdf |
作者:http://www.sectop.com/
文档制作:http://www.mythhack.com
PHP 漏洞全解 1-9
PHP 漏洞全解(一)-PHP 网页的安全性问题
针对 PHP 的网站主要存在下面几种攻击方式:
1、命令注入(Command Injection)
2、eval 注入(Eval Injection)
3、客户端脚本攻击(Script Insertion)
4、跨网站脚本攻击(Cross Site Scripting, XSS)
5、SQL 注入攻击(SQL injection)
6、跨网站请求伪造攻击(Cross Site Request Forgeries, CSRF)
... | pdf |
Fastjson1.2.80漏洞复现
2022-09-01 · Web安全
Fastjson于5月23日,在commit 560782c与commit 097bff1中更新了security_update_20220523的修复方案。调
整黑白名单的同时额外判断了 Exception ,并在添加类缓存mappings前新增了 autoTypeSupport 的判断。
显而易见 Exception 的派生类中出了叛徒,不久后fastjson-blacklist更新了黑名单类名,直到前几天漏洞作者i
SafeBlue公开了思路与Gadgets,本文是对浅蓝师傅议题中留下的一点小作业的复现记录。
期望类与类缓存
不太了解的同学可以参考上一篇... | pdf |
1
Adam Donenfeld
STUMPING THE
MOBILE CHIPSET
New 0days from down under
AGENDA
• Android chipsets overview in ecosystem
• Qualcomm chipset subsystem’s overview
• New kernel vulnerabilities
• Exploitation of a new kernel vulnerability
• Conclusions
~ $ man Adam
ADAM DONENFELD
• Years of experience in researc... | pdf |
Tomcat JMXProxy RCE
0x00 前言
在介绍该漏洞之前有必要先进行一些说明
(1)不影响默认配置的 Tomcat
(2)不影响 SpringBoot 只影响通过 war 部署的项目
(3)该漏洞为利用链中的一环,配合第三方平台未授权访问或弱口令可以直接利用
既然官方不认,那我直接公开了
0x01 Manager
Tomcat 一直存在一个不是“漏洞”的漏洞: Tomcat Manager 导致上传 war 解压生成 webshell 的 RCE
在 tomcat/conf/tomcat-users.xml 配置
访问 /manager/html 输入用户名和密码,即可在里面上传 war 进行部署
<user use... | pdf |
University of California, Santa Barbara
HITCON Enterprise
August 27th, 2015
A Dozen Years of Shellphish
From DEFCON to the
Cyber Grand Challenge
Antonio Bianchi
antoniob@cs.ucsb.edu
3
A Dozen Years of Shellphish – from DEFCON to the Cyber Grand Challenge
Agenda
● Shellphish
● The DARPA Cyber Grand Challenge
● Shellph... | pdf |
Who am I?
• Seth Fogie, VP Airscanner
• Airscanner Mobile Security
– Mobile AntiVirus
– Mobile Encrypter
– and more coming…
• Author
– Security Warrior
– Maximum Wireless Security
– InformIT.com Security Section
Overview
• Basic Security Issues
• Conceal A Backdoor Wizard
• Keyboard Logger
• Reverse Engineering Overvie... | pdf |
Key Decoding and Duplication Attacks for the
Schlage Primus High-Security Lock
David Lawrence
Eric Van Albert
Robert Johnson
locks@mit.edu
DEF CON 21
August 3, 2013
dlaw, ervanalb, robj (DEF CON 21)
Attacking the Schlage Primus
August 3, 2013
1 / 31
Standard pin-tumbler locks
Photo credit: user pbroks13 on Wikimedia Co... | pdf |
Today’s Modern Network
Killing Robot
Viki Navratilova
viki@uchicago.edu
Network Security Officer
The University of Chicago
How to Create a Network Killing
Robot
Slap together different technologies
– Borrow from the strengths of each
Make it easy for lots of people to use (AOL effect)
– Means giving up ‘I am an ... | pdf |
Zidong Han
Bridge Attack
—Double-edged Sword in MobileSec
Self Introduction
l Mobile Security researcher
-Tencent Mobile Security Labs Razor Team
l Focuses on App vulnerability and IOT related security
l GeekPwn 2018 winner in “Hacker Pwn in House”
l HITB-SECCONF-2018-Beijing
Agenda
Ø What is Bri... | pdf |
•
什么是入侵攻击模拟
•
要解决的问题
•
存在的挑战
•
入侵攻击模拟演练
•
机制简介
•
突破入口模拟
•
防御水位衡量
•
模拟演练机制简介
•
检测/响应水位衡量
•
其他业务场景落地
•
企业采用多种安全措施,每一种都可能因
配置错误/运营问题失效,且难以察觉
•
如仅依靠蓝军或外采渗透测试,案例数量
较少、时间上不连续、可能遗漏、成本高
•
安全水位无法量化,建设效果难以衡量
•
从攻击者视角对企业基础设施进行持续的自动化安全测试
•
针对安全措施失效、蓝军成本高的问题
•
定义模型量化当前安全水位,发现问题,反哺防御检测能力
•
->解决无法量化的问题
•
2017年,Gartner将入侵攻击模拟技术(BAS)列为... | pdf |
We are Here to Help:
How FIPS 140 Helps (and Hurts) Security
Agenda
● Who Am I?
● Background
● What is FIPS 140?
● How the validation process works
● Look at the Requirements
● Best/Worst of the Requirements
● What does the future hold?
● Closing/Q&A
Who is l0stkn0wledge?
● Work directly with FIPS 140
● Over five years... | pdf |
程聪 阿里云安全-系统安全专家
基 于 硬 件 虚 拟 化 技 术 的 新 一 代 二 进 制 分 析 利 器
自我介绍
现就职于阿里云安全-系统安全团队
主要研究方向:
•
病毒检测
•
主机安全
•
内核安全
•
虚拟化安全
•
二进制攻防
演讲内容
•
背景介绍
•
QEMU/KVM简介
•
无影子页ept hook
•
虚拟化调试器
•
内核级trace
•
总结
背景介绍
大家先来看下左边这张图片,搞内核安全的应该不陌
生。windows x64内核引入patchguard后,对内核
敏感部分,进行patch、hook,修改msr、IDT表等
操作,都会触发蓝屏
从PatchGuard谈起
但是有很多场景还是需要对内核进行... | pdf |
unixsocket
0x00
httpburphttptcptcptcpdump
tcp
sslvpnunixsocket
unixsocket
0x01 unix socket
unix socketsockettcpudpunixsocketsocket
unixsocketsocket
tcpsocketunixsocket
unixsocket
netstatunixsocket
webunixsocket
netstat
netstat -alnp
unixsocketunixsocket
0x02
#!/bin/bash
#!/bin/bash
# Parameters
socket="/run/foo.s... | pdf |
Vendor Name
PART NUMBER
DESCRIPTION
QTY.
Price(USD)
Total Price(USD)
Total Weight ABS
(Grams)
McMaster-Carr
4687T110
Thick-Wall Dark Gray PVC
Threaded Pipe 1/4 Pipe Size X 2'
Length, Threaded Ends
1
10.01
10.01
0
McMaster-Carr
8585K11
Impact-Resistant Polycarbonate
Round Tube 3/8" OD, 1/4" ID,
Clear
2
0.77
1.54
0
McMas... | pdf |
-[ Past and Future in OS X Malware ]-
1
Who Am I
§ An Economist and MBA.
§ Computer enthusiast for the past 30 years.
§ Someone who worked at one of the world’s best ATM
networks, the Portuguese Multibanco.
§ A natural-born reverser and assembler of all kinds of
things, not just bits & bytes.
2
Who’s no... | pdf |
MTVEC CORRUPTION FOR
HARDENING ISA
Adam 'pi3' Zabrocki
Twitter: @Adam_pi3
GLITCHING RISC-V CHIPS:
Alex Matrosov
Twitter: @matrosov
/USR/BIN/WHOWEARE
Adam ‘pi3’ Zabrocki:
2
•
Phrack author
•
Bughunter (Hyper-V, Intel/NVIDIA vGPU,
Linux kernel, OpenSSH, Apache, gcc SSP /
ProPolice, Apache, xpdf, more…) – CVEs
•
The ER... | pdf |
Improving Web Vulnerability Scanning
Daniel Zulla
1
Introduction
Hey!
■ Hi there!
■ I’m Dan. This is my first year at DEFCON.
■ I do programming and security start-ups.
■ I do some penetration testing as well
2
More Introduction
■ Today I’m going to talk about vulnerability scanning
■ Primary on the web
■ “The cloud” i... | pdf |
Microsoft Edge MemGC Internals
Henry Li,TrendMicro
2015/08/29
Agenda
• Background
• MemGC Internals
• Prevent the UAF'S exploit
• Weaknesses of MemGC
Notes
• Research is based on Windows 10
10041( edgehtml.dll, chakra.dll)
• The latest windows versions( windows 10
10240) data structure there are some small
changes
... | pdf |
Multipot: A More Potent Variant
of Evil Twin
K. N. Gopinath
Senior Wireless Security Researcher and
Senior Engineering Manager
AirTight Networks
http://www.airtightnetworks.net
Email: gopinath.kn@airtightnetworks.net
What is this presentation about?
It is about discovery of a more potent variant of Evil Twin.
We... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.