text
stringlengths
100
9.93M
category
stringclasses
11 values
Click Fraud Detection using Practical Memetics Defcon 15, Aug 3-5, 2007 Broward Horne http://www.realmeme.com Overview • Advertising Click Fraud • Botnets (Agents Of Click Fraud) • S-Curve • Original Meme Theory (Dawkins) • Empirical Meme Theory (Me! Ho!) • Expanded Meme Mining Model • MySpace Example • IAFF.com Exa...
pdf
Cheating in eSports How to cheat at virtual cycling using USB hacks Brad Dixon, Carve Systems Photo by Markus Spiske on Unsplash Sweaty eSports EGVsOG CVRWorldCup Virtual Cycling is Part of Cycling Cycling: Over 100 Years of Cheating Innovation 1903, 1904: Hippolyte Aucouturier 1904: Maurice Garin 1947: Jean Robic Will...
pdf
BSD Security Fundamentals Sean Lewis sml@subterrain.net http://www.subterrain.net Scope and Scale • Focus: FreeBSD - enterprise hardware support and most 'mainstream' of the open source BSD trees. • Security refresher and some new and interesting BSD security information. • Emphasis on host-based security, one of t...
pdf
Live Hacking like a MVH – 
 A walkthrough on methodology and strategies to win big Frans Rosén – @fransrosen Frans Rosén – @fransrosen Frans Rosén @fransrosen Security Advisor at Detectify #6 on HackerOne leaderboard/all-time Blogs at labs.detectify.com Frans Rosén – @fransrosen Frans Rosén @fransrosen H1-702 2017: Wi...
pdf
Practical Foxhunting 101 Adam Wirth - SimonJ @SimonJ_DC Overview ‣ About me ‣ About Foxhunting ‣ Equipment Overview & Selection ‣ Preparation ‣ Techniques 2 Who Am I? ‣ More than 15 years professional experience as a software & systems engineer ‣ Most of my career has been spent working on wireless communicati...
pdf
macterminalrce 0x00 https://mp.weixin.qq.com/s/xqoylh0j0Ny_FL4PlkwH-Q terminal terminal 0x01 mac /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/LaunchServices.framework/Versions/A/Support/ lsregister -dump > dumpfile dumpfile commandtoolterminal terminalterminalterminalsetting pocterminals...
pdf
43 43 00205! w 7 ! 日程 1SQZPM w • uu • • • o • o <D57klo • o q&7 1U9ZQRMOQ6aeeUZS • o BQVQO s3Ma_Qmsmm & 9[Dmm • BB3o n x <D57klo • xo nm m • o n • o n nC9= • no xtn qs • o • o kl • 3o • • 9ZQX • EC2& • o • C4BoECB2UZU<UQC4B • • • o • • kl • o • <D5oQZ1U9ZQRMOQ • 7C=oQZ2C3 • o • ENaZa)<DC • o • 7kl • MZS...
pdf
• 研究背景 • 研究内容 • 总结 Part. 01 研究背景 2 3 探索⼀切、攻破⼀切 近年有关网络设备的安全事件 时间 事件 2014-04 思科(cisco)和瞻博(juniper)发现存在heartbleed漏洞 2014-11 卡巴斯基实验室发布报告披露黑暗能量(BlackEnergy)可 以攻击思科(cisco)路由器 2015-09 火眼(fireeye)发布了有关思科(cisco)路由器SYNful Knock后门的报告 2015-10 安全公司volexity的Steven Adair发现了攻击思科(cisco) web vpn的案例 2015-12 瞻博(juniper)发现漏洞: 万能密码登录设备(CVE-...
pdf
19.07.2013 DEX EDUCATION 201 ANTI-EMULATION TIM STRAZZERE - HITCON 2013 Friday, July 19, 13 WHOAMI • Lead Research & Response Engineer @ Lookout Mobile Security (yes.. an av) • Reversed the Android Market/Google Play Protocol • Always enjoyed reversing “exotic” platforms, writing tools to automate the mundane • Jun...
pdf
Exploiting Digital Cameras Oren Isacson - oren]at[coresecurity.com Alfredo Ortega - aortega]at[coresecurity.com Exploit Writers Team Core Security Technologies August 1, 2010 Exploiting Digital Cameras August 1, 2010 1 / 27 Introduction This talk is about: • How to script Canon Powershot cameras. • How we reversed the ...
pdf
0x00 前⾔ 如有技术交流或渗透测试/代码审计/红队⽅向培训/红蓝对抗评估需求的朋友 欢迎联系QQ/VX-547006660 0x01 起因 某项⽬靶标,是⼀个⼈员管理系统,通过webpack暴露的接⼝ 我们成功找到了⼀个未鉴权的密码修改接⼝,通过fuzz 我们获取到了该接⼝的参数username与password,并成功修改了admin账号密码进⼊后台 在⼀个任意上传的后台功能点,我们遇到了⻜塔WAF+流量检测设备,于是便有了本⽂ 0x02 摸清检测规则 众所周知,⻜塔公司的WAF+流量检测设备还是⽐较⽜逼的,我直接尝试上传⼀个免杀webshell,毫⽆疑问直接 GG了 经过测试,上传⽆害内容1111但⽂件名为XXX.aspx也...
pdf
Verisign CONFIDENTIAL Verisign CONFIDENTIAL Verisign® iDefense® Cyber Security Trends Rick Howard, iDefense General Manager June 22, 2011 2 How Technical Are You? 3 Agenda Operation Aurora Impact Stuxnet Impact Cyber Security Disruptors 4 Learning Points Theory Fact 5 Operation Aurora Impact 6 The Aurora Attacks – 5 U...
pdf
根据网上公开内容编写,漏洞通告: https://mp.weixin.qq.com/s/OGBP0OkVdC2bZ0lzK2ZdjA 工具效果: 漏洞无损检测: 命令执行: 数据库文件读取: 文件上传: 代码加密: 流量解密: 命令执行流量特征(Base65):
pdf
Aura A peer-to-peer reputation system Cat Okita, 2003 Reputation Systems • What is a Reputation System? – Livejournal/Friendster, eBay, Advogato, Slashcode • Why do you care? • What could you use this for? – Establishing trust, performance metrics, meme propagation, spam filtering Challenges • Authentication • Trust • ...
pdf
0x00 0x01 cd /Users/miku/Documents/hack/attack-tools/burpsuite/Burp2020.91 xxx/xxx/xx/jdk14/bin/java -jar Loader.jar export JAVA_HOME=xxxx/xxx/xxx/jdk14 export PATH=xxxx/xxx/xxxx/bin:$PATH cd /Users/miku/Documents/hack/attack-tools/burpsuite/Burp2020.91 xxx/xxx/xx/jdk14/bin/java -jar Loader.jar /Library/Java/JavaV...
pdf
0x01 起因 前两天和朋友聊天,他发现了⼀家在hackerone上赏⾦颇⾼的Program,并且发现了其中的漏洞 让⽼夫羡慕不已 去hackerone看了看⼚商信息,漏洞奖励确实是⾮常诱⼈的 ⽽且BugBounty Program Launched on Apr 2015.... 8年hackerone的⽼⼚商了,业务点本来就不多,⼜被世界各国⽜逼的⿊客们挖了⼋年,难度可想⽽知 但是为了赏⾦迎难⽽上,才应该是真正的漏洞猎⼈该有的⻛格。 0x03 ⾛业务点万念俱灰到发现敏感请求 从Hackerone的Program scope中搜集了⼀下业务信息,虽然展开测试 测试了常规的⼀些WEB漏洞,IDOR等漏洞,发现完全没有⼀点机会,Fil...
pdf
08.10.2014 ANDROID HACKER PROTECTION LEVEL 0 TIM “DIFF” STRAZZERE - JON “JUSTIN CASE” SAWYER Defcon 22 + some blackphone stuff • CTO of Applied Cybersecurity LLC • Professional Exploit Troll • Has big mouth • @TeamAndIRC • github.com/CunningLogic ! • Research & Response Engineer @ Lookout • Obfuscation Junkie ...
pdf
刘镇东(yzddMr6),阿里云安全工程师 ØAntSword开发组核心成员,开源工具As-Exploits、WebCrack、webshell-venom作者 Ø目前主要从事Webshell攻防研究,以及阿里云恶意文本检测引擎的建设 ØGithub: yzddMr6 ØBlog: yzddmr6.com ØCTF: L3H_Sec • Webshell通常是打开权限大门的第一块“破门砖” • Java Webshell在攻防演练中占据着重要的地位 • 随着各类防护设备不断升级,如何逃避检测成为攻击者最关心的问题 l Tomcat解析篇 l 危险类篇 l 流量对抗篇 令人头疼的编码 Tomcat解析篇 • Jsp中可以⽤Unicod...
pdf
客户端 Web 漏洞案例浅析 2021/6/26 成都站 周智 深信服安全 技术沙⻰ ⼤纲 • 总结⼀些难以归类的客户端混合漏洞案例 • CEF DNS rebinding 通⽤漏洞 • CVE-2020-9860: macOS HelpViewer XSS • 某 iOS 应⽤跨 App 获取 cookie • iOS WebView UXSS • 某 Windows 视频客户端远程 DLL 注⼊ CEF DNS rebinding 通⽤漏洞 CEF • CEF 全称 Chromium Embedded Framework • 在桌⾯应⽤中嵌⼊ Chromium 内 核的 WebView 控件 DNS rebind...
pdf
Session Donation Alek Amrani DEF CON 17 About me • Alek Amrani • Longhorn Lockpicking Club • UT Austin CS Undergrad • UT Austin ISO • Alek Amrani • Longhorn Lockpicking Club • UT Austin CS Undergrad • UT Austin ISO This Talk • TURBO TRAC • Not a lot of time, so brevity is the name of the game • Presenting an Idea...
pdf
5/10/2007 DEFCON 15 1 GeoLocation of Wireless Access Points & “Wireless GeoCaching” Presented By: Rick Hill 7/6/2007 DEFCON 15 2 The Problem: 802.11b Geo-Location • Researchers have documented at least 4 Techniques for Geo-Location of Wireless Access Points (APs)1 • Netstumbler doesn’t Geo-Locate –> It simply g...
pdf
Business logic flaws in mobile operators services B o g d a n A l e c u Bogdan ALECU About me Independent security researcher Sysadmin Passionate about security, specially when it’s related to mobile devices; started with NetMonitor (thanks Cosconor), continued with VoIP and finally GSM networks / mobile phones @mse...
pdf
D.I.Y. NUKEPROOFING A NEW “DIG” AT “DATA-MINING” D.I.Y. NUKEPROOFING A NEW “DIG” AT “DATA-MINING” @3ALARMLAMPSCOOT DEFCON 24 @3ALARMLAMPSCOOT DEFCON 24 BACKGROUND (RADIATION?) (why?) didn't we do this last year? BACKGROUND (RADIATION?) (why?) didn't we do this last year? @3ALARMLAMPSCOOT D.I.Y. NUKEPR...
pdf
About Us • Li Yuxiang @Xbalien29 Security researcher, found several vulnerabilities in Android, Former ROIS CTF team member, speaker of HITB 2018 AMS. • Qian Wenxiang @leonwxqian Security Researcher, Top 100 of MSRC list ( 2016 & 2017 ), Author of "WhiteHat to talk about web browser security ". • Wu Huiyu @DroidSec_c...
pdf
Richard Thieme - DefCon 29 - August 6, 2021 UFOs Misinformation, Disinformation, and the Basic Truth Date: September 25, 1947 From: Lt. General Nathan Twining To: Commanding General of the Army Air Forces; Brig. General George Schulgen Subject: Air Materiel Command Opinion Concerning "Flying Discs" ... It is the o...
pdf
统计时间:2021-11-08-2021-11-15 技术节点 [360安全客] Apache httpd Server CVE-2021-41773 漏洞分析 Apache httpd Server 2.4.49 版本引⼊了⼀个具有路径穿越漏洞的新函数,但需要配合穿越的⽬录配置 Require all granted,攻击者可利⽤该漏洞实现路径穿越从⽽读取任意⽂件,或者在配置了cgi的httpd程序 中执⾏bash指令,从⽽有机会控制服务器。 [360安全客] OMIGOD:CVE-2021-38647 OMI远程代码执⾏漏洞分析 微软在2021年9⽉的补丁更新中,修复了其Open Management Infrastructur...
pdf
How we recovered $XXX,000 of Bitcoin from an encrypted zip file Michael Stay, PhD CTO, Pyrofex Corp. DEF CON 2020 Technion - Computer Science Department - Technical Report CS0842 - 1994 ZIP Attacks with Reduced Known Plaintext Michael Stay AccessData Corporation 2500 N. University Ave. Ste. 200 Provo, UT 84606 s...
pdf
#BHUSA   @BlackHatEvents Crashing Your Way to Medium-IL: Exploiting the PDB Parser for Privilege Escalation Gal De Leon (@galdeleon) Palo Alto Networks Who am I? ● Gal De Leon (@galdeleon) ● Principal security researcher at Palo Alto Networks ● Interested in fuzzing, vulnerabilities, exploits and mitigations ● Micro...
pdf
All your Sploits (and Servers) are belong to us. Echelon One Executive Security Intelligence We are: David Mortman CSO in Residence, Echelon One Rich Mogull Securosis Chris Hoff Unisys Robert "RSnake" Hansen CTO, SecTheory Robert Graham CTO, Errata Security ...
pdf
想要理解整个认证过程,必须要动手走一轮代码。 想要理解整个认证过程,必须要动手走一轮代码。 想要理解整个认证过程,必须要动手走一轮代码。 想要理解整个认证过程,必须要动手走一轮代码。 想要理解整个认证过程,必须要动手走一轮代码。 想要理解整个认证过程,必须要动手走一轮代码。 0x00 前言 前几天搞好了 CS 4.1 的 key 填充,但是文章一直没有捋出来,周末抓了个时间,捋了一捋,勉强可以通 过。 这里提供了 CS 4.0 的认证过程,个人认为非常详细,文中配备认证的流程图,可以结合文中的代码注 释,外加自己的 IDEA 调试,可以完整理解整个过程。因为 4.0 与 4.1 差了一个关键 key(前期的处理方 式也多了一个步骤)...
pdf
Exploring the NFC Attack Surface Charlie Miller Managing Principal Accuvant Labs charlie.miller@accuvant.com July 13, 2012 Charlie Miller: Exploring the NFC Attack Surface Introduction 4 NFC protocols 5 Physical and RF layer 6 Initialization, Anti-Collision, and Protocol Activation layer 7 Protocol layer 7 Application...
pdf
Credit Card Networks 101 What they are, and how to secure them by Robert Imhoff-Dousharm About this document While this serves as a simi-detailed account of said speech at Def-Con 11, it does leave holes in material to be presented. Some things are better spoken out, and better interpreted by mannerisms and body lan...
pdf
White Paper: Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol Author: Magnus Bråding Version: 0.7 2008-08-04 1(68) Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol White Paper: Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol Author: Magnus Bråding Version: 0.7 2...
pdf
应用程序接口(API) 数据安全研究报告 (2020 年) 中国信息通信研究院安全研究所 2020 年 7 月 版权声明 本报告版权属于中国信息通信研究院安全研究所,并受 法律保护。转载、摘编或利用其它方式使用本报告文字或者 观点的,应注明“来源:中国信息通信研究院安全研究所”。 违反上述声明者,本院将追究其相关法律责任。 前 言 伴随着云计算、大数据、人工智能等技术的蓬勃发展,移动互 联网、物联网产业加速创新,移动设备持有量不断增加,Web 应用、 移动应用已融入生产生活的各个领域。这一过程中,应用程序接口 (Application Programming Interface,API)作为数据传输流转 的重要通道发挥着举足轻重的作...
pdf
Welcome to BlueHat Shanghai Eric Doerr General Manager, Microsoft Security Response Center @edoerr May 30, 2019 Chinese researchers were the most prolific and high-impact contributors to the Microsoft Bounty Program in 2019 Growth 57% China-based bounty participants 46% China-based bounty submissions 2018 vs 201...
pdf
@patrickwardle OFFENSIVE MALWARE ANALYSIS dissecting osx/fruitfly via a custom c&c server WHOIS “leverages the best combination of humans and technology to discover security vulnerabilities in our customers’ web apps, mobile apps, IoT devices and infrastructure endpoints” security for the 21st century @patrickwardle...
pdf
Trolling with Math base26_t YOU = 0x038C2767; Trolling with Math wat? • frank^2 • pronounced “frank 2” (the carat is ~flare~) • “that guy with the hat” • DC949 • DC310 Trolling with Math When we last left our heroes... • “I have no idea what the fuck frank^2 is talking about, but its awesome.” • “More content, less bul...
pdf
Application Report SPRAAO8–April 2009 Common Object File Format ..................................................................................................................................................... ABSTRACT The assembler and link step create object files in common object file format (COFF). COFF is an i...
pdf
konga {"user":{"createdUser":null,"updatedUser":1,"node":{"id":6,"name":"kong","type":"default","kong_admin_url":"http://172.30.0.3:800 1","netdata_url":null,"kong_api_key":"","jwt_algorithm":"HS256","jwt_key":null,"jwt_secret":null,"username":"","password":"","kon g_version":"2.5.0","health_checks":false,"health_chec...
pdf
2022/2/22 17:19 1.md file:///Users/s3gundo/Documents/markdown/vulns/java/jira/1.md 1/18 jira环境搭建及受限⽂件读取原理和深思CVE- 2021-26086 ⼀、踩坑 坑太多了 装了差不多七⼋个⼩时才装好 也是给⾃⼰找⼀些经验。不过不得不说在装软件的同时 也学到了⾮常多的东⻄,实战的项⽬感觉就是会有不⼀样的感觉。多动⼿总是会有好处的。 我先发⼏个步骤 然后罗列⼀下我猜到的⼀些坑的点,算是把这个环境给装好了。因为我是mac系 统,参照着⼀个步骤来的,但是中间夹在的另外的,因为不是通⽤的破解插件,怕踩坑了。 ⼀、安装步骤 https://blog.c...
pdf
RADIO EXPLOITATION 101 MATT KNIGHT // MARC NEWLIN // BASTILLE NETWORKS CHARACTERIZING//CONTEXTUALIZING//CLASSIFYING RF ATTACKS RADIO EXPLOITATION 101 // BASTILLE NETWORKS WHO ARE THESE GUYS ▸ Matt Knight ▸ Software Engineer and Security Researcher @ ▸ Reverse engineered the LoRa wireless protocol in 2016 ▸ BE & BA f...
pdf
Friday'the'13th:'JSON'Attacks Alvaro'Muñoz'(@pwntester) Oleksandr Mirosh HPE'Security >"whoarewe • Alvaro'Muñoz • Security'Research'with'HPE • @pwntester • Oleksandr Mirosh • Security'Research'with'HPE Introduction • 2016'was'the'year'of'Java'Deserialization'apocalypse • Known'vector'since'2011 • Previous'lack'of'good'...
pdf
红蓝对抗中的溯源反制实战 The practise of trace and retaliation in red team/blue team exercises 深圳证券交易所 网络安全主管 郭威 目录 战前准备 1 战中对抗 2 战后反思 3 总结 4 战前准备 组织工作 技术工作 4 引子 > 案例1:社工 找到技术支持 QQ群 伪造成基金公 司人员 通过之后修改 姓名+头像 2天 关于XX网络安 全整改事项说明 T 出群聊 重新添加好友 分析链接 确定身份 IP定位 提交报告 5 引子 > 案例2:钓鱼邮件 钓鱼邮件 控制邮箱 《东莞深圳通技术有限公司》 标题 发送 董事长A<xxxx@163.com> 接收 员工B...
pdf
Metasploit vSploit Modules 1 Marcus J. Carey David “bannedit” Rude Will Vandevanter Outline • Objective of vSploit Modules • Metasploit Framework architecture • What are Metasploit modules? • vSploit modules • vSploit and Intrusion Kill Chains • vSploit and Intrusion Kill Chains • Writing Metasploit Modules • Live Demo...
pdf
Soft7: Revealing Siemens’ S7 PLCs secrets | #BHUSA @BlackHatEvents sOfT7: Revealing the Secrets of the Siemens S7 PLCs Sara Bitan | Alon Dankner Joint work with Professor Eli Biham, Maxim Barsky and Idan Raz Faculty of Computer Science, Technion – Israel Institute of Technology Soft7: Revealing Siemens’ S7 PLCs secre...
pdf
Veil%Pillage:** Post%Exploitation*2.0* Will$$ @harmj0y* Veris$Group$–$Adaptive$Threat$Division$ $*whoami* ▪  Security$researcher$and$pentester/red$teamer$ for$Veris$Group’s$Adaptive$Threat$Division$$ ▪  Co?founder$of$the$Veil?Framework$#avlol$ – www.veil?framework.com$ – Shmoocon'‘14:'AV$Evasion$with$the$Veil$ Framewor...
pdf
​ ​ ​ ​ ​ ​ ​ tips 0x00 0x01 string ​ ​ ​ ​ ​ 0x02 0x03 this ​ ​ ​ ​ int (*)(Params const&,std::string&) 0x04 vectormap 0x05
pdf
晶片卡弱點分析 MIFARE, ATM Card & 花博門票 Anderson Ni 倪萬昇 2010/07/01 Agenda  MIFARE 安全漏洞探討  ATM Card與網路ATM安全漏洞探討  台北國際花博覽會門票安全漏洞探討 Sector (64 bytes) Sector (64 bytes) Sector (64 bytes) Introduction of MIFARE  RF ID (ISO 14443-3 Type A with MIFARE,13.56 MHz, Distance 10 cm)  Memory Card (S50 1K bytes, S70 4K bytes) Sector (...
pdf
@Y4tacker SnakeYAML实现Gadget探测 思路来源 今天在学习SnakeYAML的反序列化的时候,想到⼀个新的探测payload,⽹上之前有⼀个SPI 那个链⼦可以有通过URLClassloader检测 这个的话主要是因为SnakeYAML在解析带键值对的集合的时候会对键调⽤hashCode⽅法因此 会触发DNS解析, 因此通过构造URL对象后⾯简单加个: 1让他成为⼀个mapping ,不过会触发多次 String poc = "!!java.net.URL [null, \"[http://osrwbf.dnslog.cn] (http://osrwbf.dnslog.cn/)\"]: 1"; 实现探测Ga...
pdf
Module 2 Typical goals of malware and their implementations https://github.com/hasherezade/malware_training_vol1 Persistence Basics of Persistence • WHO? • Most of the malware needs it (except some ransomware) • WHY? •To start the application after each reboot • HOW? •Using legitimate persistence methods •Using cust...
pdf
精简版 SDL 落地实践 Author:@好好学习英语的 abc 前言 一般安全都属于运维部下面,和上家公司的运维总监聊过几次一些日常安全工 作能不能融入到 DevOps 中,没多久因为各种原因离职。18 年入职 5 月一家第 三方支付公司,前半年在各种检查中度过,监管形势严峻加上大领导对安全的 重视(主要还是监管),所有部门 19 年的目标都和安全挂钩。由于支付公司需要 面对各种监管机构的检查,部分安全做的比较完善,经过近一年对公司的熟悉 发现应用安全方面比较薄弱。这部分业内比较好的解决方案就是 SDL,和各厂 商交流过之后决定自己照葫芦画瓢在公司一点一点推广。 一、精简版 SDL 上图为标准版的 SDL,由于运维采用 ...
pdf
Fast verified post-quantum software Daniel J. Bernstein SymCrypt: failures for rare inputs It’s actually a bug within SymCrypt, the core cryptographic library responsible for implementing asymmetric crypto algorithms in Windows 10 and symmetric crypto algorithms in Windows 8. —“Warning: Google Researcher Drops Windows 1...
pdf
OGeekWrite Up - Nu1L OGeekWrite Up - Nu1L catch fun babyrop book manager Pybox 2019 Upgrade LookAround render Easy Realworld Challenge mblockchain Hub 8v Babycry catch fun flag{Reno} babyrop ROP #!python #-*- coding: utf-8 -*- #@Date: 2019-08-24 11:39:14 from pwn import * context.log_level = 'debug' # p = process("./...
pdf
0CTF WP Author:Nu1L Team 0CTF WP WEB amp2020 easyphp noeasyphp lottery Wechat Generator Pwn eeeeeemoji simple echoserver Chromium RCE Re babymips Happy Tree J w flash-1 Misc eeemoji Cloud Computing Cloud Computing v2 Crypto babyring WEB amp2020 dockerflagenvcouchDBcouchDBHTTP RCE/SSRF axios SSRFWAFWAF SSRFcouchDB flag cur...
pdf
Betrayal of Reputation Trusting the Untrustable Hardware and Software with Reputation Seunghun Han Senior Security Researcher at National Security Research Institute 29 May 2019 - Senior security researcher at NSR (National Security Research Institute of South Korea) - Influencer Member of Black Hat Asia 2019 - Review...
pdf
0x01 前⾔ 有技术交流或渗透测试培训需求的朋友欢迎联系QQ/VX-547006660 0x02 资产收集到脆弱系统 在某src挖掘过程中,本⼈通过ssl证书对域名资产进⾏了收集,通过计算域名对应ip段的权重 整理出其C段资产,进⾏了批量⽬录扫描 查看⽬录扫描结果后,发现了⼀个有趣的⽂件 http://36...*/upload_image.php 对于这种⻚⾯,毫⽆疑问,要对参数进⾏FUZZ 0x03 FUZZ参数+表单上传 使⽤arjun⼯具对其参数进⾏fuzz,发现了⼀个参数字段为do 随后在burpsuite中对do的参数值进⾏fuzz 成功fuzz出⼀个do的参数值,upload 构造url http://36...*/...
pdf
Who invented the first Prox Card? − a: Charles Walton & Thomas Milheiser − b: Gary Carroll − c: Someone else What security company dismissed it as a mere magicians trick? − a: Wells Fargo − b: Securitas − c: ADT What does this have to do with gold fish? − a: The fish were used like canaries in the mines to detect ha...
pdf
如何仅使用 curl 利用 LDAP 协议进行 Windows 域的渗透测试 1、简介 Lightweight Directory Access Protocol(LDAP),轻量级目录访问协议,基于 X.500 标准。 那么好,X.500 标准是什么? X.500 基本上是用来查询有关人员的信息(如邮政地址、电话号码、电子邮件地址等) 的一种服务。可以有:所在机构的部门名称以及国家名称。X.500 目录服务是一种用于开发 一个单位(或组织)内部人员电子目录的标准方法,这个目录可以成为全球目录的一部分, 世界上的任何人都可以访问因特网查询到该目录。这个目录有时称全球用户信息数据库目 录,其思路为以用户界面友好的方式通...
pdf
环境搭建 https://archives2.manageengine.com/active-directory-audit/7055/ManageEngine_ADAudit_Plus_x 64.exe 需要搭建一个域环境,直接把安装adaudit的机器提升为域控就行。 分析 这个洞用了两个点串起来成了一个rce,分别是xxe和一个readObject的点。 Cewolf readObject readObject是steventseeley挖掘的Cewolf反序列化,ADAudit仍然有这个servlet,并且init参数为 FileStorage。 de.laures.cewolf.storage.FileStorage#ge...
pdf
推荐序 ┃ IV 点击京东购买 点击当当购买 推荐序 近年来,在党和国家的高度重视下,网络安全行业发展迅猛,吸引了大批年轻学子和有志青年 投身其中。2015 年,“网络空间安全”正式成为“工学”门类下的一级学科,与此同时,不论是在 高校、还是企事业单位中,CTF 等类型的信息安全竞赛也开始蓬勃发展,通过竞赛涌现出了一大批 高手、能手。但是竞赛中各个模块间的发展程度却参差不齐。相对而言,Web、Misc 等模块发展较 快,参与的选手也较多;二进制安全相关模块,如 Reverse(逆向)、Mobile(此处指移动安全)等 模块的选手相对就少些,而其中的 Pwn 模块,则参赛选手最少。究其原因,主要是因为相对其他模 块,二进制安全相关模块...
pdf
HITCON GIRLS Wargame 2014/12/07 Allen Own allenown@devco.re GET / HTTP/1.1 Host: devco.re User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:33.0) Gecko/ 20100101 Firefox/33.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-tw,zh;q=0.8,en-us;q=0.5,en;q=0.3 Acce...
pdf
2015-­‐8  汪涛 ¡ 汪涛 of  BaiduX-­‐Team,ID  neobyte ¡ 多年安全评估经验,涉及⽅方向较杂,web安全、java安全、android安 全、前端安全… 3 parseUri注入 PendingIntent误用 Action/Component/Data注入 Intent转换与复制 Intent注⼊入的概念 ¡ Android提供的⼀一种java环境下IPC的形式。Intent是⼀一种 IPC消息对象,用于向APP的组件请求⼀一次操作 § 发送与接收组件可能运⾏行在同⼀一个APP或不同的APP(进程)中 § 请求的操作可以是启动⼀一个Activity,Service或处理Broadc...
pdf
從初出茅廬到破解大師 我的 14 年駭客生涯回顧 Orange Tsai Orange Tsai • Principal security researcher at and captain of HITCON CTF team, focusing on Web/App 0-day research • Speaker of top hacker conferences: Black Hat USA, DEFCON, HITB, HITCON • 2019 Pwnie Awards, "Best Server-Side Bug" winner • 2021...
pdf
TAKBOO 深度解析BOOTLOADER攻击面 WHO AM I? takboo THIS IS A QUESTION! ABOUT ME ▸ Sec·Ret 团队成员 ▸ Android 漏洞研究 ▸ Linux 内核漏洞研究 联系方式:takboosf@gmail.com PART 01 Bootloader 背景 PART 02 主流厂商 Bootloader 对比 PART 03 Qualcomm aboot PART 04 Bootloader 漏洞挖掘 PART 05 Bootloader 漏洞分析 目录 CONTENTS 01 bootloader 背景 Bootloader 背景 PC 端 BOOTLOADER ▸...
pdf
2022/5/26 22:55 2022-5-26-Jhsoft-OA-SQL file:///C:/Users/ASUS/AppData/Local/Temp/mume2022426-24848-1h4aa2u.w9xa.html 1/4 金和OA C6代码审计 SQL注入 金和版本C6V3.0的n day,年前同事透露了金和OA这个n day,我眼疾手快截了图下来并记了路径。 由于当时还在实习太菜了,未学习C#的代码审计,因此没有深究漏洞成因。这几天整理去年的材料时 发现手上正好有新版的金和OA备份文件,就简单来审计利用链。 漏洞在jhsoft.mobileapp/AndroidSevices/HomeService.asmx/...
pdf
ATTACKING NETWORK INFRASTRUCTURE TO GENERATE A 4 TB/S DDOS FOR $5 by Luke Young $ WHOAMI ➤ Undergraduate Student - Junior ➤ 2nd year at DEF CON ➤ Website: bored.engineer ➤ Email: me@bored.engineer ➤ LinkedIn: https://www.linkedin.com/in/bored-engineer ➤ Twitter: @TheBoredEng DISCLAIMER ➤ The views and opinions e...
pdf
Hijacking the Outdoor Digital Billboard Tottenkoph ~ Rev ~ Philosopher Who are we? Tottenkoph tottenkoph@gmail.com Member; Hackers for Charities Rev Host; Denver, CO 2600 Philosopher Member; Denver, CO 2600 What do we cover? • Tools and Information Needed In case you wanted to try hacking the billboard, here’s some ...
pdf
Locking Down Apache Locking Down Apache Jay Beale Senior Security Consultant, Intelguardians jay@bastille-linux.org (Def Con 12) Contents Configuration Modification Chroot-ing Apache Removing Modules Using Security-focused Apache Modules httpd.conf We harden recent releases of Apache entirely through the httpd...
pdf
Slouching*Towards*Utopia:** The*State*of*the*Internet*Dream* * * Jennifer*S;sa*Granick* DEF*CON*24* centraliza;on* * regula;on* * globaliza;on* •  Things'will'happen'no'one'will'really'know' why. ** •  The'Internet'is'TV' •  Security'haves'and'have'nots' •  Surveillance,'censorship'&'control'' * Declara;on*of*Independe...
pdf
BUGS IN MULTIPLAYER GAME ENGINES FINDING + EXPLOITING BACKGROUND > Over a few months I found 10+ remotely exploitable bugs in 2 game engines > I’m going to talk about 4 of these bugs (2 per engine) GAME ENGINES > The term Game Engine refers to the base software on which most video games are created > The popularity...
pdf
1 tls指纹 具体可参考这个 go默认使⽤的client hello配置是固定不变的,导致特征也是固定的,所以需要做改动。 go默认ja3指纹89be98bbd4f065fe510fca4893cf8d9b chromeja3指纹cd08e31494f9531f560d64c695473da9 ⼀共分为五个部分 SSLVersion,Cipher-Suites,SSLExtension,EllipticCurve,EllipticCurvePointFormat 为了尽量模拟浏览器的client hello,我们先⽐下go和chrome的tls指纹组成 go: chrome: SSLVersion⼀致 可以修改C...
pdf
Malicious Code & wireless networks By: Brett Neilson 7/13/2002 Slide 2 Defcon 11 Overview • Wireless technology, networks & devices • Defining wireless threats • Why malicious code will spread on wireless networks • Economic impact & potential damages • Protecting against malicious threats Wireless technology & networ...
pdf
Persona Not Validated - 1362589322691 Digitally signed by Persona Not Validated - 1362589322691 DN: cn=Persona Not Validated - 1362589322691, email=jdenaro@cipherlawgroup.com, ou=S/ MIME, ou=Persona Not Validated, ou=Symantec Trust Network, o=Symantec Corporation Date: 2013.08.08 21:25:51 -04'00' This presentati...
pdf
FingerBank - open DHCP fingerprints database no it's not about a bank of fingers... Presentation Plan Device fingerprinting, passive fingerprinting, DHCP fingerprinting Defensive use cases Offensive use cases FingerBank announcement FingerBank's future Who I am Olivier Bilodeau System architect working at Inverse inc P...
pdf
​ ​ subscribe to the AltStore Patreon IOSLinux——ish 0x00 0x01 0x02 ​ ​ ​ https://ish.app/altstore.json apk update apk upgrade apk add python3 0x03 apk add git pip3 install sqlmap sqlmap -h apk add nmap ​ 0x04
pdf
DEFCON 15 Multiplatform malware within the .NET-Framework Multiplatform malware within the .NET-Framework DEFCON 0x0f August 3rd – August 5th Paul Sebastian Ziegler psz@observed.de DEFCON 15 Multiplatform malware within the .NET-Framework What exactly is multiplatform malware? DEFCON 15 Multiplatform malware within th...
pdf
XCTF-“”WP AuthorNu1L Team XCTF-“”WP WEB easy_trick_gzmtu webct webtmp hackme baby_java fmkq dooog nweb PHP-UAF sqlcheckin nothardweb happyvacation GuessGame hardphp Crypto NHP lancet Misc ez_mem&usb MISC Apk GetFlag Pwn Shotest_Path_v2 twochunk musl lgd easyheap woodenbox easy_unicorn bjut Kernoob EasyVM babyhacker bab...
pdf
John E. Benson, J.D. Bridging the Gap Between Technology and the Law ‣ Fundamental differences ‣ Perceptions and adoption ‣ Trial Issues ‣ Julie Amero ‣ Torrentspy A Look Ahead ‣ jur1st ‣ Attorney ‣ Professor ‣ See me afterwards for more details Introduction Technology v. The Law ‣ Becomes more advanced ‣ Changes ...
pdf
华山杯 writeup 队伍名:Nu1L Web 题目: Web1 怎么在 Web 上 Ping 呢 进去发现 flag.php,访问不到直接抓包访问,之后发现在 flag.php 中存 在提示 key:DDoS。。。研究一下午不懂,后来在 freebuf 找到一篇文章 http://www.freebuf.com/articles/network/74173.html 构造 html 访问,fiddler 抓包 Flag : cCFVY1Yjs5VQ9X2GCG4v6IdpkaKBEsbM Web2 社工库查询 放西瓜大神好吗。。。。。。天真的以为真的是社工 QQ。 Burp 爆破到 10000,发现出来了提示: ...
pdf
2021/7/31 红队必备技能之隐蔽的技巧 https://mp.weixin.qq.com/s/428TFr-dyK61y5dZSzGDUw 1/19 红队必备技能之隐蔽的技巧 收录于话题 #技术备存 11 #漏洞 13 #僵尸网络 9 #CTF 9 #AWD 7 正文共:4951字 27图 预计阅读时间:13分钟 (1)平时在做安全测试时,相信很多小伙伴在建立Cobalt Strike服务端时都是直接使用IP地址 后进行直连。之前也爆出过Cobalt Strike“空格”特征,可以通过构造规则,针对全球的具有这类 特征的HTTP响应进行服务器抓取,难道要频繁更换IP吗?更新版本就不会出现新的特征吗? 相关信息:https:/...
pdf
Defcon15 August 3-5, 2007 at the Riviera in Las Vegas A Journalist A Journalist’’s Perspective on Security s Perspective on Security Research Research Peter Berghammer Peter Berghammer Defcon 15; Riviera, Las Vegas Defcon 15; Riviera, Las Vegas Friday August 3, 2007 Friday August 3, 2007 Day 1, Track 4 Day 1, Track 4...
pdf
TAKING WINDOWS 10 KERNEL EXPLOITATION TO THE NEXT LEVEL – LEVERAING WRITE- WHAT-WHERE VULNERABILITIES IN CREATORS UPDATE Whoami • Morten Schenk • Security Advisor, Improsec ApS • Twitter - @blomster81 • Blog: https://improsec.com/blog/ • GitHub: https://github.com/MortenSchenk • What to expect from this talk • Windo...
pdf
Token Kidnapping's Revenge Cesar Cerrudo Argeniss Who am I? • Argeniss Founder and CEO • I have been working on security for +8 years • I have found and helped to fix hundreds of vulnerabilities in software such as MS Windows, MS SQL Server, Oracle Database Server, IBM DB2, and many more... • +50 vulnerabilities found ...
pdf
Hardware Black Magic: Designing Printed Circuit Boards Dr. Fouad (Dr. K) Kiamilev Corey (c0re) Lange Stephen (afterburn) Janansky Who are we? • University of Delaware • Department of Electrical and Computer Engineering • CVORG Who are we? • Dr. Fouad Kiamilev • Professor • Fearless Leader • Procurer of Funding Who ar...
pdf
MJ0011 th_decoder@126.com 逆向Windows 8: 内核安全特性拾趣 1 目的: 逆向Windows 8 Release Preview版本 发现一些新的用于防御或缓和内核漏洞攻击的安全特性 目标: 主要关注ntoskrnl 工具: IDA Pro/Hex-rays/windbg 议程 2 – 禁止零页内存分配 – 禁止Win32k系统调用 – 安全性故障中断 – 不可执行的非分页池 – 使用Intel® Secure Key 技术 – 使用Intel® SMEP 技术 Windows8对抗内核漏洞利用的安全特性 3 – 零页内存:Windows上供 16位虚拟机NTVD...
pdf
DEFCON 22 Eric Smith & Joshua Perrymon LARES ALL YOUR BADGES ARE BELONG TO US AGENDA INTRO WHAT IS RED TEAMING TRADITIONAL ATTACKS/TECHNIQUES RFID OVERVIEW ADVANCED ATTACKS REMEDIATION/RISK MITIGATION ABOUT: LARES CORP • Minimum of 15 years InfoSec Experience per consultant (90+ combined) • Penetration Tes...
pdf
中国.北京 KCon黑客大会 工业PLC远程控制实现 演讲人:剑思庭 2 0 1 8 PART 01 个人介绍 目录 CONTENTS PART 02 架构/工具 PART 03 远控渗透 01 02 03 PART 01 个人介绍 剑思庭 工业网络安 全技术顾问 Rockwell Automation 工控安全 渗透和防御 PART 02 构架/工具 VPS Kali 边界路由器 核心防火墙 工业交换机 P-NAT 关闭102端口 STEP7 工程师站 S7-315-PN/DP 互联网 企业边缘网络 企业内网网络 企业工厂网络 http://snap7.sourceforge.net/ $ sudo add-apt-rep...
pdf
All Our Powers Combined Connecting Academics, Engineers, and Hackers Security Centered around conferences (DEFCON, HITCON, etc), CTF, and open-source projects. Full of students, hackers, etc. Labor of love. Striving for fulfillment. Enthusiast Community Enthusiasts Operates primarily out of university research labs. F...
pdf
从S-SDLC视角看API安全 【API威胁检测防御】专题研讨会 Silver Zhang 为何将API安全拧出来说 为何将API安全拧出来说 感冒 VS. 禽流感 感冒 VS. 禽流感 应用安全 VS. 移动安全 应用安全 VS. 移动安全 新业态 新业态 API历史沿革及风险评估 API面临的安全挑战 传输 存储 认证 授权 输入 输出 ➢ 客 户 端 不 支 持 加 密 传 输 协 议 怎 么 办 ➢ 客 户 需 要 走 非 加 密 支 持 代 理 ➢ 客 户 端 未 做 服 务 端 证 书 合 法 有 效 性 校 验 怎 么 办 ➢ 服 务 端 加 密 数 据 如 何 让 客 户 端 解 密 ➢ 客 户 的 服 务 端 与 ...
pdf
SQLITE 44310 sqlite sqlitesql sqlite 1. sqlite3_snprintf(size,sqlstr,fmt,args...) 2. sqlite3_exec() sqlite3_snprintfcsnprintffmt sqlite3_snprintf(100,sqlstr,"select * from table where name = '%s';",name); name'pikaqiu'sqlstr "select * from table where name = 'pikaqiu';" sqlsqlite3_exec() sqlite sqlite3_snprintffmt'%...
pdf
The Remote Metamorphic Engine Detecting, Evading, Attacking the AI and Reverse Engineering Amro Abdelgawad / DEFCON 24 line46_1: mov ecx, [esp] nop nop mov dl, 0xe9 test edx, edx mov byte [ecx], dl xor eax, 0 mov edx, 0x00000067 mov dword [ecx+1], edx ret line95: pushad p...
pdf
NetRipper SMART TRAFFIC SNIFFING FOR PENETRATION TESTERS Ionut Popescu – Senior Security Consultant @ KPMG Romania Who am I? • Ionut Popescu • Senior Security Consultant @ KPMG Romania • Blogger @ securitycafe.ro • Administrator @ rstforums.com Romania 1. Introduction 2. When it is useful 3. How it works 4. Reflective ...
pdf
I’m Not A Doctor But I Play One On Your Network Tim Elrod and Stefan Morris About Us Tim Elrod – Penetration Tester for Fishnet Security Over 7 years pentesting healthcare systems Stefan Morris – Penetration Test for Fishnet Security Over 4 years Pentesting healthcare systems Technology Redux Common Health...
pdf
Safety of the Tor network A look at network diversity, relay operators, and malicious relays Runa A. Sandvik • Developer for the Tor Project • Worked with/for Tor since GSoC 2009 • Frequent traveler What this talk is about • Is the Tor network a CIA honeypot? • Are all relays malicious? • Looked at all consensus files c...
pdf
                     ! " # $ % &' ( ) * * * + , - - . / 0 ! " 1 2 3 0 4 5 $ " 2 6 7 8 " 2 0 ! % 9 % $ 8 : 8 ; : % % ! < 8 ' % = : 8 ; : % % " 2 9 ! 8 8 2 9 % > 0 ! 8 ? 1 ' 0 ; ! 8 4 " 2 % ! " @ 1 % 8 " % 0 ; 4 A ! B 4 " 9 " % 1 ; 4 8 ! % $ 8 % 8 ! B 2 9 % $ 8 C D E C 8 ; 8 ! 0 7 F 1 @ 7 " ' G " ' ...
pdf
CATCHING  MALWARE  EN  MASSE  :  DNS  &  IP  STYLE Dhia  Mahjoub @DhiaLite dhia@opendns.com Thibault  Reuille   @ThibaultReuille   thibault@opendns.com Andree  Toonk @atoonk andree@opendns.com DHIA  MAHJOUB 2 •  Senior  Security  Researcher  at  OpenDNS •  PhD  graph  ...
pdf
Black Badge Uber Alles ???? Agenda 1. Who are we 2. Why do this 3. Dc 22 4. Dc 14 5. Dc 23 6. Thank you 7. QA 8. Fin Who are these hackers on stage DC503 members Jesse - human computer Kenny - human pick and place machine Mike - Senior Trouble Maker Mickey - least israeli israeli person mike knows Joe ...
pdf
SHELL Hacking 阿里云 - wzt • When  control  a  unix-like  system,    Than?     [root@localhost fucking_rootkit]#  ls Makefile furootkit.c [root@localhost fucking_rootkit]#  make make   -C  /lib/modules/2.6.32/build  M=/root/lkm/fucking_rootkit modules make:  ***  /lib/modules/2.6.32/build:  No  such  fil...
pdf
Preface %\ :LOOLDP 5XELQ DQG 0DUVKDOO %UDLQ Copyright 1999 by Prentice Hall PTR Prentice-Hall, Inc. A Simon & Schuster Company Upper Saddle River, NJ 07458 Prentice Hall books are widely used by corporations and govern- ment agencies for training, marketing and resale. The publisher offers discounts on this book when o...
pdf
Social-Engineering Pentesting over Power lines Dave Kennedy (@Dave_ReL1K) Rob Simon (@KickenChicken57) http://www.secmaniac.com About Rob •  Application Security Engineer, Fortune 1000 •  Penetration Tester •  Source Code Analysis •  Spare time plays with home automation gear •  C/C++/C# •  Also hugs.. Abou...
pdf