text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Click Fraud Detection using
Practical Memetics
Defcon 15, Aug 3-5, 2007
Broward Horne
http://www.realmeme.com
Overview
• Advertising Click Fraud
• Botnets (Agents Of Click Fraud)
• S-Curve
• Original Meme Theory (Dawkins)
• Empirical Meme Theory (Me! Ho!)
• Expanded Meme Mining Model
• MySpace Example
• IAFF.com Exa... | pdf |
Cheating in eSports
How to cheat at virtual cycling using USB hacks
Brad Dixon, Carve Systems
Photo by Markus Spiske on Unsplash
Sweaty eSports
EGVsOG
CVRWorldCup
Virtual Cycling is Part of Cycling
Cycling: Over 100 Years of Cheating Innovation
1903, 1904: Hippolyte Aucouturier
1904: Maurice Garin
1947: Jean Robic
Will... | pdf |
BSD Security
Fundamentals
Sean Lewis
sml@subterrain.net
http://www.subterrain.net
Scope and Scale
• Focus: FreeBSD - enterprise hardware
support and most 'mainstream' of the open
source BSD trees.
• Security refresher and some new and
interesting BSD security information.
• Emphasis on host-based security, one of t... | pdf |
Live Hacking like a MVH –
A walkthrough on methodology
and strategies to win big
Frans Rosén – @fransrosen
Frans Rosén – @fransrosen
Frans Rosén @fransrosen
Security Advisor at Detectify
#6 on HackerOne leaderboard/all-time
Blogs at labs.detectify.com
Frans Rosén – @fransrosen
Frans Rosén @fransrosen
H1-702 2017: Wi... | pdf |
Practical Foxhunting
101
Adam Wirth - SimonJ
@SimonJ_DC
Overview
‣ About me
‣ About Foxhunting
‣ Equipment Overview & Selection
‣ Preparation
‣ Techniques
2
Who Am I?
‣ More than 15 years professional experience
as a software & systems engineer
‣ Most of my career has been spent working
on wireless communicati... | pdf |
macterminalrce
0x00
https://mp.weixin.qq.com/s/xqoylh0j0Ny_FL4PlkwH-Q
terminal
terminal
0x01
mac
/System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/LaunchServices.framework/Versions/A/Support/
lsregister -dump > dumpfile
dumpfile
commandtoolterminal
terminalterminalterminalsetting
pocterminals... | pdf |
43
43
00205!
w
7
!
日程
1SQZPM
w
• uu
•
•
• o
• o
<D57klo
• o
q&7
1U9ZQRMOQ6aeeUZS
• o
BQVQO
s3Ma_Qmsmm
& 9[Dmm
• BB3o
n
x
<D57klo
• xo
nm
m
• o
n
• o
n
nC9=
• no
xtn
qs
• o
• o
kl
• 3o
•
• 9ZQX
• EC2&
• o
• C4BoECB2UZU<UQC4B
•
•
• o
•
•
kl
• o
• <D5oQZ1U9ZQRMOQ
• 7C=oQZ2C3
• o
• ENaZa)<DC
• o
•
7kl
• MZS... | pdf |
•
研究背景
•
研究内容
•
总结
Part. 01
研究背景
2
3
探索⼀切、攻破⼀切
近年有关网络设备的安全事件
时间
事件
2014-04
思科(cisco)和瞻博(juniper)发现存在heartbleed漏洞
2014-11
卡巴斯基实验室发布报告披露黑暗能量(BlackEnergy)可
以攻击思科(cisco)路由器
2015-09
火眼(fireeye)发布了有关思科(cisco)路由器SYNful
Knock后门的报告
2015-10
安全公司volexity的Steven Adair发现了攻击思科(cisco)
web vpn的案例
2015-12
瞻博(juniper)发现漏洞: 万能密码登录设备(CVE-... | pdf |
19.07.2013
DEX EDUCATION 201
ANTI-EMULATION
TIM STRAZZERE - HITCON 2013
Friday, July 19, 13
WHOAMI
• Lead Research & Response Engineer @
Lookout Mobile Security (yes.. an av)
• Reversed the Android Market/Google Play
Protocol
• Always enjoyed reversing “exotic”
platforms, writing tools to automate the
mundane
• Jun... | pdf |
Exploiting Digital Cameras
Oren Isacson - oren]at[coresecurity.com
Alfredo Ortega - aortega]at[coresecurity.com
Exploit Writers Team
Core Security Technologies
August 1, 2010
Exploiting Digital Cameras
August 1, 2010
1 / 27
Introduction
This talk is about:
• How to script Canon Powershot cameras.
• How we reversed the ... | pdf |
0x00 前⾔
如有技术交流或渗透测试/代码审计/红队⽅向培训/红蓝对抗评估需求的朋友
欢迎联系QQ/VX-547006660
0x01 起因
某项⽬靶标,是⼀个⼈员管理系统,通过webpack暴露的接⼝
我们成功找到了⼀个未鉴权的密码修改接⼝,通过fuzz
我们获取到了该接⼝的参数username与password,并成功修改了admin账号密码进⼊后台
在⼀个任意上传的后台功能点,我们遇到了⻜塔WAF+流量检测设备,于是便有了本⽂
0x02 摸清检测规则
众所周知,⻜塔公司的WAF+流量检测设备还是⽐较⽜逼的,我直接尝试上传⼀个免杀webshell,毫⽆疑问直接
GG了
经过测试,上传⽆害内容1111但⽂件名为XXX.aspx也... | pdf |
Verisign CONFIDENTIAL
Verisign CONFIDENTIAL
Verisign® iDefense®
Cyber Security Trends
Rick Howard, iDefense General Manager
June 22, 2011
2
How Technical Are You?
3
Agenda
Operation Aurora Impact
Stuxnet Impact
Cyber Security Disruptors
4
Learning Points
Theory Fact
5
Operation Aurora Impact
6
The Aurora Attacks – 5 U... | pdf |
根据网上公开内容编写,漏洞通告:
https://mp.weixin.qq.com/s/OGBP0OkVdC2bZ0lzK2ZdjA
工具效果:
漏洞无损检测:
命令执行:
数据库文件读取:
文件上传:
代码加密:
流量解密:
命令执行流量特征(Base65): | pdf |
Aura
A peer-to-peer reputation system
Cat Okita, 2003
Reputation Systems
• What is a Reputation System?
– Livejournal/Friendster, eBay, Advogato,
Slashcode
• Why do you care?
• What could you use this for?
– Establishing trust, performance metrics, meme
propagation, spam filtering
Challenges
• Authentication
• Trust
• ... | pdf |
0x00
0x01
cd /Users/miku/Documents/hack/attack-tools/burpsuite/Burp2020.91
xxx/xxx/xx/jdk14/bin/java -jar Loader.jar
export JAVA_HOME=xxxx/xxx/xxx/jdk14
export PATH=xxxx/xxx/xxxx/bin:$PATH
cd /Users/miku/Documents/hack/attack-tools/burpsuite/Burp2020.91
xxx/xxx/xx/jdk14/bin/java -jar Loader.jar
/Library/Java/JavaV... | pdf |
0x01 起因
前两天和朋友聊天,他发现了⼀家在hackerone上赏⾦颇⾼的Program,并且发现了其中的漏洞
让⽼夫羡慕不已
去hackerone看了看⼚商信息,漏洞奖励确实是⾮常诱⼈的
⽽且BugBounty Program Launched on Apr 2015....
8年hackerone的⽼⼚商了,业务点本来就不多,⼜被世界各国⽜逼的⿊客们挖了⼋年,难度可想⽽知
但是为了赏⾦迎难⽽上,才应该是真正的漏洞猎⼈该有的⻛格。
0x03 ⾛业务点万念俱灰到发现敏感请求
从Hackerone的Program scope中搜集了⼀下业务信息,虽然展开测试
测试了常规的⼀些WEB漏洞,IDOR等漏洞,发现完全没有⼀点机会,Fil... | pdf |
08.10.2014
ANDROID HACKER
PROTECTION LEVEL 0
TIM “DIFF” STRAZZERE - JON “JUSTIN CASE” SAWYER
Defcon 22
+ some blackphone stuff
• CTO of Applied
Cybersecurity LLC
• Professional Exploit Troll
• Has big mouth
• @TeamAndIRC
• github.com/CunningLogic
!
• Research & Response
Engineer @ Lookout
• Obfuscation Junkie ... | pdf |
刘镇东(yzddMr6),阿里云安全工程师
ØAntSword开发组核心成员,开源工具As-Exploits、WebCrack、webshell-venom作者
Ø目前主要从事Webshell攻防研究,以及阿里云恶意文本检测引擎的建设
ØGithub: yzddMr6
ØBlog: yzddmr6.com
ØCTF: L3H_Sec
• Webshell通常是打开权限大门的第一块“破门砖”
• Java Webshell在攻防演练中占据着重要的地位
• 随着各类防护设备不断升级,如何逃避检测成为攻击者最关心的问题
l Tomcat解析篇
l 危险类篇
l 流量对抗篇
令人头疼的编码
Tomcat解析篇
• Jsp中可以⽤Unicod... | pdf |
客户端 Web 漏洞案例浅析
2021/6/26 成都站
周智
深信服安全
技术沙⻰
⼤纲
• 总结⼀些难以归类的客户端混合漏洞案例
• CEF DNS rebinding 通⽤漏洞
• CVE-2020-9860: macOS HelpViewer XSS
• 某 iOS 应⽤跨 App 获取 cookie
• iOS WebView UXSS
• 某 Windows 视频客户端远程 DLL 注⼊
CEF DNS rebinding 通⽤漏洞
CEF
• CEF 全称 Chromium Embedded
Framework
• 在桌⾯应⽤中嵌⼊ Chromium 内
核的 WebView 控件
DNS rebind... | pdf |
Session Donation
Alek Amrani
DEF CON 17
About me
• Alek Amrani
• Longhorn Lockpicking
Club
• UT Austin CS
Undergrad
• UT Austin ISO
• Alek Amrani
• Longhorn Lockpicking
Club
• UT Austin CS
Undergrad
• UT Austin ISO
This Talk
• TURBO TRAC
• Not a lot of time, so
brevity is the name of
the game
• Presenting an Idea... | pdf |
5/10/2007
DEFCON 15
1
GeoLocation of Wireless
Access Points &
“Wireless GeoCaching”
Presented By: Rick Hill
7/6/2007
DEFCON 15
2
The Problem: 802.11b Geo-Location
•
Researchers have documented at least 4 Techniques for
Geo-Location of Wireless Access Points (APs)1
•
Netstumbler doesn’t Geo-Locate –> It simply g... | pdf |
Business logic flaws in
mobile operators services
B o g d a n A l e c u
Bogdan ALECU
About me
Independent security researcher
Sysadmin
Passionate about security, specially when it’s
related to mobile devices; started with NetMonitor
(thanks Cosconor), continued with VoIP and finally
GSM networks / mobile phones
@mse... | pdf |
D.I.Y. NUKEPROOFING
A NEW “DIG” AT “DATA-MINING”
D.I.Y. NUKEPROOFING
A NEW “DIG” AT “DATA-MINING”
@3ALARMLAMPSCOOT DEFCON 24
@3ALARMLAMPSCOOT DEFCON 24
BACKGROUND (RADIATION?)
(why?) didn't we do this last year?
BACKGROUND (RADIATION?)
(why?) didn't we do this last year?
@3ALARMLAMPSCOOT D.I.Y. NUKEPR... | pdf |
About Us
• Li Yuxiang @Xbalien29
Security researcher, found several vulnerabilities in Android, Former ROIS CTF
team member, speaker of HITB 2018 AMS.
• Qian Wenxiang @leonwxqian
Security Researcher, Top 100 of MSRC list ( 2016 & 2017 ), Author of
"WhiteHat to talk about web browser security ".
•
Wu Huiyu @DroidSec_c... | pdf |
Richard Thieme - DefCon 29 - August 6, 2021
UFOs
Misinformation, Disinformation, and the Basic Truth
Date: September 25, 1947
From: Lt. General Nathan Twining
To: Commanding General of the Army Air Forces; Brig. General George Schulgen
Subject: Air Materiel Command Opinion Concerning "Flying Discs"
... It is the o... | pdf |
统计时间:2021-11-08-2021-11-15
技术节点
[360安全客] Apache httpd Server CVE-2021-41773 漏洞分析
Apache httpd Server 2.4.49 版本引⼊了⼀个具有路径穿越漏洞的新函数,但需要配合穿越的⽬录配置
Require all granted,攻击者可利⽤该漏洞实现路径穿越从⽽读取任意⽂件,或者在配置了cgi的httpd程序
中执⾏bash指令,从⽽有机会控制服务器。
[360安全客] OMIGOD:CVE-2021-38647 OMI远程代码执⾏漏洞分析
微软在2021年9⽉的补丁更新中,修复了其Open Management Infrastructur... | pdf |
How we recovered
$XXX,000 of Bitcoin from an
encrypted zip file
Michael Stay, PhD
CTO, Pyrofex Corp.
DEF CON 2020
Technion - Computer Science Department - Technical Report CS0842 - 1994
ZIP Attacks with Reduced Known Plaintext
Michael Stay
AccessData Corporation
2500 N. University Ave. Ste. 200
Provo, UT 84606
s... | pdf |
#BHUSA @BlackHatEvents
Crashing Your Way to
Medium-IL: Exploiting the PDB
Parser for Privilege Escalation
Gal De Leon (@galdeleon)
Palo Alto Networks
Who am I?
●
Gal De Leon (@galdeleon)
●
Principal security researcher at Palo Alto Networks
●
Interested in fuzzing, vulnerabilities, exploits and mitigations
●
Micro... | pdf |
All your Sploits (and Servers)
are belong to us.
Echelon One
Executive Security Intelligence
We are:
David Mortman CSO in Residence, Echelon One
Rich Mogull Securosis
Chris Hoff Unisys
Robert "RSnake" Hansen CTO, SecTheory
Robert Graham CTO, Errata Security
... | pdf |
想要理解整个认证过程,必须要动手走一轮代码。
想要理解整个认证过程,必须要动手走一轮代码。
想要理解整个认证过程,必须要动手走一轮代码。
想要理解整个认证过程,必须要动手走一轮代码。
想要理解整个认证过程,必须要动手走一轮代码。
想要理解整个认证过程,必须要动手走一轮代码。
0x00 前言
前几天搞好了 CS 4.1 的 key 填充,但是文章一直没有捋出来,周末抓了个时间,捋了一捋,勉强可以通
过。
这里提供了 CS 4.0 的认证过程,个人认为非常详细,文中配备认证的流程图,可以结合文中的代码注
释,外加自己的 IDEA 调试,可以完整理解整个过程。因为 4.0 与 4.1 差了一个关键 key(前期的处理方
式也多了一个步骤)... | pdf |
Exploring the NFC Attack Surface
Charlie Miller
Managing Principal
Accuvant Labs
charlie.miller@accuvant.com
July 13, 2012
Charlie Miller: Exploring the NFC Attack Surface
Introduction
4
NFC protocols
5
Physical and RF layer
6
Initialization, Anti-Collision, and Protocol Activation layer
7
Protocol layer
7
Application... | pdf |
Credit Card Networks 101 What they are, and how to secure them
by Robert Imhoff-Dousharm
About this document
While this serves as a simi-detailed account of said speech at Def-Con 11, it does leave holes in material to
be presented. Some things are better spoken out, and better interpreted by mannerisms and body lan... | pdf |
White Paper:
Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol
Author:
Magnus Bråding
Version: 0.7
2008-08-04
1(68)
Generic, Decentralized, Unstoppable Anonymity:
The Phantom Protocol
White Paper:
Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol
Author:
Magnus Bråding
Version: 0.7
2... | pdf |
应用程序接口(API)
数据安全研究报告
(2020 年)
中国信息通信研究院安全研究所
2020 年 7 月
版权声明
本报告版权属于中国信息通信研究院安全研究所,并受
法律保护。转载、摘编或利用其它方式使用本报告文字或者
观点的,应注明“来源:中国信息通信研究院安全研究所”。
违反上述声明者,本院将追究其相关法律责任。
前
言
伴随着云计算、大数据、人工智能等技术的蓬勃发展,移动互
联网、物联网产业加速创新,移动设备持有量不断增加,Web 应用、
移动应用已融入生产生活的各个领域。这一过程中,应用程序接口
(Application Programming Interface,API)作为数据传输流转
的重要通道发挥着举足轻重的作... | pdf |
Welcome to BlueHat Shanghai
Eric Doerr
General Manager, Microsoft Security Response Center
@edoerr
May 30, 2019
Chinese researchers were the most
prolific and high-impact contributors to
the Microsoft Bounty Program in 2019
Growth
57%
China-based
bounty
participants
46%
China-based
bounty
submissions
2018 vs 201... | pdf |
@patrickwardle
OFFENSIVE MALWARE ANALYSIS
dissecting osx/fruitfly via a custom c&c server
WHOIS
“leverages the best combination of humans and technology to discover
security vulnerabilities in our customers’ web apps, mobile apps, IoT
devices and infrastructure endpoints”
security for the
21st century
@patrickwardle... | pdf |
Trolling with Math
base26_t YOU = 0x038C2767;
Trolling with Math
wat?
• frank^2
• pronounced “frank 2” (the carat is ~flare~)
• “that guy with the hat”
• DC949
• DC310
Trolling with Math
When we last left our heroes...
• “I have no idea what the fuck frank^2 is
talking about, but its awesome.”
• “More content, less bul... | pdf |
Application Report
SPRAAO8–April 2009
Common Object File Format
.....................................................................................................................................................
ABSTRACT
The assembler and link step create object files in common object file format (COFF).
COFF is an i... | pdf |
konga
{"user":{"createdUser":null,"updatedUser":1,"node":{"id":6,"name":"kong","type":"default","kong_admin_url":"http://172.30.0.3:800
1","netdata_url":null,"kong_api_key":"","jwt_algorithm":"HS256","jwt_key":null,"jwt_secret":null,"username":"","password":"","kon
g_version":"2.5.0","health_checks":false,"health_chec... | pdf |
2022/2/22 17:19
1.md
file:///Users/s3gundo/Documents/markdown/vulns/java/jira/1.md
1/18
jira环境搭建及受限⽂件读取原理和深思CVE-
2021-26086
⼀、踩坑
坑太多了 装了差不多七⼋个⼩时才装好 也是给⾃⼰找⼀些经验。不过不得不说在装软件的同时
也学到了⾮常多的东⻄,实战的项⽬感觉就是会有不⼀样的感觉。多动⼿总是会有好处的。
我先发⼏个步骤 然后罗列⼀下我猜到的⼀些坑的点,算是把这个环境给装好了。因为我是mac系
统,参照着⼀个步骤来的,但是中间夹在的另外的,因为不是通⽤的破解插件,怕踩坑了。
⼀、安装步骤
https://blog.c... | pdf |
RADIO EXPLOITATION 101
MATT KNIGHT // MARC NEWLIN // BASTILLE NETWORKS
CHARACTERIZING//CONTEXTUALIZING//CLASSIFYING RF ATTACKS
RADIO EXPLOITATION 101 // BASTILLE NETWORKS
WHO ARE THESE GUYS
▸ Matt Knight
▸ Software Engineer and Security Researcher @
▸ Reverse engineered the LoRa wireless protocol in 2016
▸ BE & BA f... | pdf |
Friday'the'13th:'JSON'Attacks
Alvaro'Muñoz'(@pwntester)
Oleksandr Mirosh
HPE'Security
>"whoarewe
• Alvaro'Muñoz
• Security'Research'with'HPE
• @pwntester
• Oleksandr Mirosh
• Security'Research'with'HPE
Introduction
• 2016'was'the'year'of'Java'Deserialization'apocalypse
• Known'vector'since'2011
• Previous'lack'of'good'... | pdf |
红蓝对抗中的溯源反制实战
The practise of trace and retaliation in red team/blue team exercises
深圳证券交易所 网络安全主管 郭威
目录
战前准备
1
战中对抗
2
战后反思
3
总结
4
战前准备
组织工作
技术工作
4
引子 > 案例1:社工
找到技术支持
QQ群
伪造成基金公
司人员
通过之后修改
姓名+头像
2天
关于XX网络安
全整改事项说明
T 出群聊
重新添加好友
分析链接
确定身份
IP定位
提交报告
5
引子 > 案例2:钓鱼邮件
钓鱼邮件
控制邮箱
《东莞深圳通技术有限公司》
标题
发送
董事长A<xxxx@163.com>
接收
员工B... | pdf |
Metasploit vSploit Modules
1
Marcus J. Carey
David “bannedit” Rude
Will Vandevanter
Outline
• Objective of vSploit Modules
• Metasploit Framework architecture
• What are Metasploit modules?
• vSploit modules
• vSploit and Intrusion Kill Chains
• vSploit and Intrusion Kill Chains
• Writing Metasploit Modules
• Live Demo... | pdf |
Soft7: Revealing Siemens’ S7 PLCs secrets | #BHUSA @BlackHatEvents
sOfT7: Revealing the Secrets
of the
Siemens S7 PLCs
Sara Bitan | Alon Dankner
Joint work with Professor Eli Biham, Maxim Barsky and Idan Raz
Faculty of Computer Science, Technion – Israel Institute of Technology
Soft7: Revealing Siemens’ S7 PLCs secre... | pdf |
Veil%Pillage:**
Post%Exploitation*2.0*
Will$$
@harmj0y*
Veris$Group$–$Adaptive$Threat$Division$
$*whoami*
▪ Security$researcher$and$pentester/red$teamer$
for$Veris$Group’s$Adaptive$Threat$Division$$
▪ Co?founder$of$the$Veil?Framework$#avlol$
– www.veil?framework.com$
– Shmoocon'‘14:'AV$Evasion$with$the$Veil$
Framewor... | pdf |
tips
0x00
0x01 string
0x02
0x03 this
int (*)(Params const&,std::string&)
0x04 vectormap
0x05 | pdf |
晶片卡弱點分析
MIFARE, ATM Card & 花博門票
Anderson Ni 倪萬昇
2010/07/01
Agenda
MIFARE 安全漏洞探討
ATM Card與網路ATM安全漏洞探討
台北國際花博覽會門票安全漏洞探討
Sector (64 bytes)
Sector (64 bytes)
Sector (64 bytes)
Introduction of MIFARE
RF ID (ISO 14443-3 Type A with MIFARE,13.56 MHz,
Distance 10 cm)
Memory Card (S50 1K bytes, S70 4K bytes)
Sector (... | pdf |
@Y4tacker
SnakeYAML实现Gadget探测
思路来源
今天在学习SnakeYAML的反序列化的时候,想到⼀个新的探测payload,⽹上之前有⼀个SPI
那个链⼦可以有通过URLClassloader检测
这个的话主要是因为SnakeYAML在解析带键值对的集合的时候会对键调⽤hashCode⽅法因此
会触发DNS解析,
因此通过构造URL对象后⾯简单加个: 1让他成为⼀个mapping ,不过会触发多次
String poc = "!!java.net.URL [null, \"[http://osrwbf.dnslog.cn]
(http://osrwbf.dnslog.cn/)\"]: 1";
实现探测Ga... | pdf |
Module 2
Typical goals of malware and their
implementations
https://github.com/hasherezade/malware_training_vol1
Persistence
Basics of Persistence
• WHO?
• Most of the malware needs it (except some ransomware)
• WHY?
•To start the application after each reboot
• HOW?
•Using legitimate persistence methods
•Using cust... | pdf |
精简版 SDL 落地实践
Author:@好好学习英语的 abc
前言
一般安全都属于运维部下面,和上家公司的运维总监聊过几次一些日常安全工
作能不能融入到 DevOps 中,没多久因为各种原因离职。18 年入职 5 月一家第
三方支付公司,前半年在各种检查中度过,监管形势严峻加上大领导对安全的
重视(主要还是监管),所有部门 19 年的目标都和安全挂钩。由于支付公司需要
面对各种监管机构的检查,部分安全做的比较完善,经过近一年对公司的熟悉
发现应用安全方面比较薄弱。这部分业内比较好的解决方案就是 SDL,和各厂
商交流过之后决定自己照葫芦画瓢在公司一点一点推广。
一、精简版 SDL
上图为标准版的 SDL,由于运维采用 ... | pdf |
Fast verified
post-quantum software
Daniel J. Bernstein
SymCrypt: failures for rare inputs
It’s actually a bug within SymCrypt, the core
cryptographic library responsible for implementing
asymmetric crypto algorithms in Windows 10 and
symmetric crypto algorithms in Windows 8.
—“Warning: Google Researcher Drops
Windows 1... | pdf |
OGeekWrite Up - Nu1L
OGeekWrite Up - Nu1L
catch fun
babyrop
book manager
Pybox
2019
Upgrade
LookAround
render
Easy Realworld Challenge
mblockchain
Hub
8v
Babycry
catch fun
flag{Reno}
babyrop
ROP
#!python
#-*- coding: utf-8 -*-
#@Date: 2019-08-24 11:39:14
from pwn import *
context.log_level = 'debug'
# p = process("./... | pdf |
0CTF WP
Author:Nu1L Team
0CTF WP
WEB
amp2020
easyphp
noeasyphp
lottery
Wechat Generator
Pwn
eeeeeemoji
simple echoserver
Chromium RCE
Re
babymips
Happy Tree
J
w
flash-1
Misc
eeemoji
Cloud Computing
Cloud Computing v2
Crypto
babyring
WEB
amp2020
dockerflagenvcouchDBcouchDBHTTP
RCE/SSRF
axios
SSRFWAFWAF SSRFcouchDB
flag
cur... | pdf |
Betrayal of Reputation
Trusting the Untrustable Hardware and Software with Reputation
Seunghun Han
Senior Security Researcher at National Security Research Institute
29 May 2019
- Senior security researcher at NSR (National Security
Research Institute of South Korea)
- Influencer Member of Black Hat Asia 2019
- Review... | pdf |
0x01 前⾔
有技术交流或渗透测试培训需求的朋友欢迎联系QQ/VX-547006660
0x02 资产收集到脆弱系统
在某src挖掘过程中,本⼈通过ssl证书对域名资产进⾏了收集,通过计算域名对应ip段的权重
整理出其C段资产,进⾏了批量⽬录扫描
查看⽬录扫描结果后,发现了⼀个有趣的⽂件
http://36...*/upload_image.php
对于这种⻚⾯,毫⽆疑问,要对参数进⾏FUZZ
0x03 FUZZ参数+表单上传
使⽤arjun⼯具对其参数进⾏fuzz,发现了⼀个参数字段为do
随后在burpsuite中对do的参数值进⾏fuzz
成功fuzz出⼀个do的参数值,upload
构造url
http://36...*/... | pdf |
Who invented the first Prox Card?
− a: Charles Walton & Thomas Milheiser
− b: Gary Carroll
− c: Someone else
What security company dismissed it as a mere magicians
trick?
− a: Wells Fargo
− b: Securitas
− c: ADT
What does this have to do with gold fish?
− a: The fish were used like canaries in the mines
to detect ha... | pdf |
如何仅使用 curl 利用 LDAP 协议进行 Windows 域的渗透测试
1、简介
Lightweight Directory Access Protocol(LDAP),轻量级目录访问协议,基于 X.500 标准。
那么好,X.500 标准是什么?
X.500 基本上是用来查询有关人员的信息(如邮政地址、电话号码、电子邮件地址等)
的一种服务。可以有:所在机构的部门名称以及国家名称。X.500 目录服务是一种用于开发
一个单位(或组织)内部人员电子目录的标准方法,这个目录可以成为全球目录的一部分,
世界上的任何人都可以访问因特网查询到该目录。这个目录有时称全球用户信息数据库目
录,其思路为以用户界面友好的方式通... | pdf |
环境搭建
https://archives2.manageengine.com/active-directory-audit/7055/ManageEngine_ADAudit_Plus_x
64.exe
需要搭建一个域环境,直接把安装adaudit的机器提升为域控就行。
分析
这个洞用了两个点串起来成了一个rce,分别是xxe和一个readObject的点。
Cewolf readObject
readObject是steventseeley挖掘的Cewolf反序列化,ADAudit仍然有这个servlet,并且init参数为
FileStorage。
de.laures.cewolf.storage.FileStorage#ge... | pdf |
推荐序 ┃ IV
点击京东购买 点击当当购买
推荐序
近年来,在党和国家的高度重视下,网络安全行业发展迅猛,吸引了大批年轻学子和有志青年
投身其中。2015 年,“网络空间安全”正式成为“工学”门类下的一级学科,与此同时,不论是在
高校、还是企事业单位中,CTF 等类型的信息安全竞赛也开始蓬勃发展,通过竞赛涌现出了一大批
高手、能手。但是竞赛中各个模块间的发展程度却参差不齐。相对而言,Web、Misc 等模块发展较
快,参与的选手也较多;二进制安全相关模块,如 Reverse(逆向)、Mobile(此处指移动安全)等
模块的选手相对就少些,而其中的 Pwn 模块,则参赛选手最少。究其原因,主要是因为相对其他模
块,二进制安全相关模块... | pdf |
HITCON GIRLS
Wargame
2014/12/07
Allen Own
allenown@devco.re
GET / HTTP/1.1
Host: devco.re
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:33.0) Gecko/
20100101 Firefox/33.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-tw,zh;q=0.8,en-us;q=0.5,en;q=0.3
Acce... | pdf |
2015-‐8 汪涛
¡
汪涛 of BaiduX-‐Team,ID neobyte
¡
多年安全评估经验,涉及⽅方向较杂,web安全、java安全、android安
全、前端安全…
3
parseUri注入
PendingIntent误用
Action/Component/Data注入
Intent转换与复制
Intent注⼊入的概念
¡ Android提供的⼀一种java环境下IPC的形式。Intent是⼀一种
IPC消息对象,用于向APP的组件请求⼀一次操作
§ 发送与接收组件可能运⾏行在同⼀一个APP或不同的APP(进程)中
§ 请求的操作可以是启动⼀一个Activity,Service或处理Broadc... | pdf |
從初出茅廬到破解大師
我的 14 年駭客生涯回顧
Orange Tsai
Orange Tsai
• Principal security researcher at
and captain of
HITCON CTF team, focusing on Web/App 0-day research
• Speaker of top hacker conferences:
Black Hat USA, DEFCON, HITB, HITCON
• 2019 Pwnie Awards, "Best Server-Side Bug"
winner
• 2021... | pdf |
TAKBOO
深度解析BOOTLOADER攻击面
WHO AM I?
takboo
THIS IS A QUESTION!
ABOUT ME
▸ Sec·Ret 团队成员
▸ Android 漏洞研究
▸ Linux 内核漏洞研究
联系方式:takboosf@gmail.com
PART 01 Bootloader 背景
PART 02 主流厂商 Bootloader 对比
PART 03 Qualcomm aboot
PART 04 Bootloader 漏洞挖掘
PART 05 Bootloader 漏洞分析
目录
CONTENTS
01 bootloader 背景
Bootloader 背景
PC 端 BOOTLOADER
▸... | pdf |
2022/5/26 22:55
2022-5-26-Jhsoft-OA-SQL
file:///C:/Users/ASUS/AppData/Local/Temp/mume2022426-24848-1h4aa2u.w9xa.html
1/4
金和OA C6代码审计
SQL注入
金和版本C6V3.0的n day,年前同事透露了金和OA这个n day,我眼疾手快截了图下来并记了路径。
由于当时还在实习太菜了,未学习C#的代码审计,因此没有深究漏洞成因。这几天整理去年的材料时
发现手上正好有新版的金和OA备份文件,就简单来审计利用链。
漏洞在jhsoft.mobileapp/AndroidSevices/HomeService.asmx/... | pdf |
ATTACKING NETWORK
INFRASTRUCTURE TO GENERATE A
4 TB/S DDOS FOR $5
by Luke Young
$ WHOAMI
➤ Undergraduate Student - Junior
➤ 2nd year at DEF CON
➤ Website: bored.engineer
➤ Email: me@bored.engineer
➤ LinkedIn: https://www.linkedin.com/in/bored-engineer
➤ Twitter: @TheBoredEng
DISCLAIMER
➤ The views and opinions e... | pdf |
Hijacking the Outdoor
Digital Billboard
Tottenkoph ~ Rev ~ Philosopher
Who are we?
Tottenkoph
tottenkoph@gmail.com
Member; Hackers for Charities
Rev
Host; Denver, CO 2600
Philosopher
Member; Denver, CO 2600
What do we cover?
• Tools and Information Needed
In case you wanted to try hacking the billboard, here’s
some ... | pdf |
Locking Down Apache
Locking Down Apache
Jay Beale
Senior Security Consultant, Intelguardians
jay@bastille-linux.org
(Def Con 12)
Contents
Configuration Modification
Chroot-ing Apache
Removing Modules
Using Security-focused Apache Modules
httpd.conf
We harden recent releases of Apache entirely
through the httpd... | pdf |
Slouching*Towards*Utopia:**
The*State*of*the*Internet*Dream*
*
*
Jennifer*S;sa*Granick*
DEF*CON*24*
centraliza;on*
*
regula;on*
*
globaliza;on*
• Things'will'happen'no'one'will'really'know'
why. **
• The'Internet'is'TV'
• Security'haves'and'have'nots'
• Surveillance,'censorship'&'control''
*
Declara;on*of*Independe... | pdf |
BUGS IN MULTIPLAYER GAME ENGINES
FINDING + EXPLOITING
BACKGROUND
> Over a few months I found 10+ remotely
exploitable bugs in 2 game engines
> I’m going to talk about 4 of these bugs (2 per
engine)
GAME
ENGINES
> The term Game Engine refers to the base
software on which most video games are created
> The popularity... | pdf |
1
tls指纹
具体可参考这个
go默认使⽤的client hello配置是固定不变的,导致特征也是固定的,所以需要做改动。
go默认ja3指纹89be98bbd4f065fe510fca4893cf8d9b
chromeja3指纹cd08e31494f9531f560d64c695473da9
⼀共分为五个部分
SSLVersion,Cipher-Suites,SSLExtension,EllipticCurve,EllipticCurvePointFormat
为了尽量模拟浏览器的client hello,我们先⽐下go和chrome的tls指纹组成
go:
chrome:
SSLVersion⼀致
可以修改C... | pdf |
Malicious Code & wireless networks
By: Brett Neilson
7/13/2002
Slide 2
Defcon 11
Overview
•
Wireless technology, networks & devices
•
Defining wireless threats
•
Why malicious code will spread on wireless networks
•
Economic impact & potential damages
•
Protecting against malicious threats
Wireless technology & networ... | pdf |
Persona Not
Validated -
1362589322691
Digitally signed by Persona Not Validated -
1362589322691
DN: cn=Persona Not Validated - 1362589322691,
email=jdenaro@cipherlawgroup.com, ou=S/
MIME, ou=Persona Not Validated, ou=Symantec
Trust Network, o=Symantec Corporation
Date: 2013.08.08 21:25:51 -04'00'
This presentati... | pdf |
FingerBank - open DHCP fingerprints
database
no it's not about a bank of fingers...
Presentation Plan
Device fingerprinting, passive fingerprinting, DHCP fingerprinting
Defensive use cases
Offensive use cases
FingerBank announcement
FingerBank's future
Who I am
Olivier Bilodeau
System architect working at Inverse inc
P... | pdf |
subscribe to the AltStore Patreon
IOSLinux——ish
0x00
0x01
0x02
https://ish.app/altstore.json
apk update
apk upgrade
apk add python3
0x03
apk add git
pip3 install sqlmap
sqlmap -h
apk add nmap
0x04 | pdf |
DEFCON 15
Multiplatform malware within the .NET-Framework
Multiplatform malware
within the .NET-Framework
DEFCON 0x0f
August 3rd – August 5th
Paul Sebastian Ziegler
psz@observed.de
DEFCON 15
Multiplatform malware within the .NET-Framework
What exactly is multiplatform malware?
DEFCON 15
Multiplatform malware within th... | pdf |
XCTF-“”WP
AuthorNu1L Team
XCTF-“”WP
WEB
easy_trick_gzmtu
webct
webtmp
hackme
baby_java
fmkq
dooog
nweb
PHP-UAF
sqlcheckin
nothardweb
happyvacation
GuessGame
hardphp
Crypto
NHP
lancet
Misc
ez_mem&usb
MISC
Apk
GetFlag
Pwn
Shotest_Path_v2
twochunk
musl
lgd
easyheap
woodenbox
easy_unicorn
bjut
Kernoob
EasyVM
babyhacker
bab... | pdf |
John E. Benson, J.D.
Bridging the
Gap Between
Technology and
the Law
‣
Fundamental differences
‣
Perceptions and adoption
‣
Trial Issues
‣
Julie Amero
‣
Torrentspy
A Look Ahead
‣
jur1st
‣
Attorney
‣
Professor
‣
See me afterwards for more details
Introduction
Technology v.
The Law
‣
Becomes more advanced
‣
Changes ... | pdf |
华山杯 writeup
队伍名:Nu1L
Web 题目:
Web1 怎么在 Web 上 Ping 呢
进去发现 flag.php,访问不到直接抓包访问,之后发现在 flag.php 中存
在提示 key:DDoS。。。研究一下午不懂,后来在 freebuf 找到一篇文章
http://www.freebuf.com/articles/network/74173.html
构造
html 访问,fiddler 抓包
Flag : cCFVY1Yjs5VQ9X2GCG4v6IdpkaKBEsbM
Web2 社工库查询
放西瓜大神好吗。。。。。。天真的以为真的是社工 QQ。
Burp 爆破到 10000,发现出来了提示: ... | pdf |
2021/7/31
红队必备技能之隐蔽的技巧
https://mp.weixin.qq.com/s/428TFr-dyK61y5dZSzGDUw
1/19
红队必备技能之隐蔽的技巧
收录于话题
#技术备存 11
#漏洞 13
#僵尸网络 9
#CTF 9
#AWD 7
正文共:4951字 27图
预计阅读时间:13分钟
(1)平时在做安全测试时,相信很多小伙伴在建立Cobalt Strike服务端时都是直接使用IP地址
后进行直连。之前也爆出过Cobalt Strike“空格”特征,可以通过构造规则,针对全球的具有这类
特征的HTTP响应进行服务器抓取,难道要频繁更换IP吗?更新版本就不会出现新的特征吗?
相关信息:https:/... | pdf |
Defcon15 August 3-5, 2007 at the Riviera in Las Vegas
A Journalist
A Journalist’’s Perspective on Security
s Perspective on Security
Research
Research
Peter Berghammer
Peter Berghammer
Defcon 15; Riviera, Las Vegas
Defcon 15; Riviera, Las Vegas
Friday August 3, 2007
Friday August 3, 2007
Day 1, Track 4
Day 1, Track 4... | pdf |
TAKING WINDOWS 10 KERNEL
EXPLOITATION TO THE NEXT
LEVEL – LEVERAING WRITE-
WHAT-WHERE VULNERABILITIES
IN CREATORS UPDATE
Whoami
• Morten Schenk
• Security Advisor, Improsec ApS
• Twitter - @blomster81
• Blog: https://improsec.com/blog/
• GitHub: https://github.com/MortenSchenk
• What to expect from this talk
• Windo... | pdf |
Token
Kidnapping's
Revenge
Cesar Cerrudo
Argeniss
Who am I?
• Argeniss Founder and CEO
• I have been working on security for +8 years
• I have found and helped to fix hundreds of
vulnerabilities in software such as MS Windows,
MS SQL Server, Oracle Database Server, IBM
DB2, and many more...
• +50 vulnerabilities found ... | pdf |
Hardware Black Magic:
Designing Printed Circuit Boards
Dr. Fouad (Dr. K) Kiamilev
Corey (c0re) Lange
Stephen (afterburn) Janansky
Who are we?
• University of Delaware
• Department of Electrical and
Computer Engineering
• CVORG
Who are we?
• Dr. Fouad Kiamilev
• Professor
• Fearless Leader
• Procurer of
Funding
Who ar... | pdf |
MJ0011
th_decoder@126.com
逆向Windows 8:
内核安全特性拾趣
1
目的:
逆向Windows 8 Release Preview版本
发现一些新的用于防御或缓和内核漏洞攻击的安全特性
目标:
主要关注ntoskrnl
工具: IDA Pro/Hex-rays/windbg
议程
2
– 禁止零页内存分配
– 禁止Win32k系统调用
– 安全性故障中断
– 不可执行的非分页池
– 使用Intel® Secure Key 技术
– 使用Intel® SMEP 技术
Windows8对抗内核漏洞利用的安全特性
3
– 零页内存:Windows上供 16位虚拟机NTVD... | pdf |
DEFCON 22
Eric Smith & Joshua Perrymon
LARES
ALL YOUR BADGES ARE BELONG TO US
AGENDA
INTRO
WHAT IS RED TEAMING
TRADITIONAL ATTACKS/TECHNIQUES
RFID OVERVIEW
ADVANCED ATTACKS
REMEDIATION/RISK MITIGATION
ABOUT: LARES CORP
• Minimum of 15 years InfoSec Experience per consultant (90+ combined)
• Penetration Tes... | pdf |
中国.北京 KCon黑客大会
工业PLC远程控制实现
演讲人:剑思庭
2 0 1 8
PART 01
个人介绍
目录
CONTENTS
PART 02
架构/工具
PART 03
远控渗透
01
02
03
PART
01
个人介绍
剑思庭
工业网络安
全技术顾问
Rockwell
Automation
工控安全
渗透和防御
PART
02
构架/工具
VPS Kali
边界路由器
核心防火墙
工业交换机
P-NAT
关闭102端口
STEP7 工程师站
S7-315-PN/DP
互联网
企业边缘网络
企业内网网络 企业工厂网络
http://snap7.sourceforge.net/
$ sudo add-apt-rep... | pdf |
All Our Powers Combined
Connecting Academics, Engineers, and Hackers
Security
Centered around conferences (DEFCON, HITCON, etc), CTF, and open-source
projects.
Full of students, hackers, etc.
Labor of love.
Striving for fulfillment.
Enthusiast Community
Enthusiasts
Operates primarily out of university research labs.
F... | pdf |
从S-SDLC视角看API安全
【API威胁检测防御】专题研讨会
Silver Zhang
为何将API安全拧出来说
为何将API安全拧出来说
感冒 VS. 禽流感
感冒 VS. 禽流感
应用安全 VS. 移动安全
应用安全 VS. 移动安全
新业态
新业态
API历史沿革及风险评估
API面临的安全挑战
传输
存储
认证
授权
输入
输出
➢
客
户
端
不
支
持
加
密
传
输
协
议
怎
么
办
➢
客
户
需
要
走
非
加
密
支
持
代
理
➢
客
户
端
未
做
服
务
端
证
书
合
法
有
效
性
校
验
怎
么
办
➢
服
务
端
加
密
数
据
如
何
让
客
户
端
解
密
➢
客
户
的
服
务
端
与
... | pdf |
SQLITE
44310
sqlite
sqlitesql
sqlite
1. sqlite3_snprintf(size,sqlstr,fmt,args...)
2. sqlite3_exec()
sqlite3_snprintfcsnprintffmt
sqlite3_snprintf(100,sqlstr,"select * from table where name = '%s';",name);
name'pikaqiu'sqlstr "select * from table where name = 'pikaqiu';" sqlsqlite3_exec()
sqlite
sqlite3_snprintffmt'%... | pdf |
The Remote Metamorphic Engine
Detecting, Evading, Attacking the AI and Reverse Engineering
Amro Abdelgawad / DEFCON 24
line46_1:
mov ecx, [esp]
nop
nop
mov dl, 0xe9
test edx, edx
mov byte [ecx], dl
xor eax, 0
mov edx, 0x00000067
mov dword [ecx+1], edx
ret
line95:
pushad
p... | pdf |
NetRipper
SMART TRAFFIC SNIFFING FOR PENETRATION TESTERS
Ionut Popescu – Senior Security Consultant @ KPMG Romania
Who am I?
• Ionut Popescu
• Senior Security Consultant @ KPMG Romania
• Blogger @ securitycafe.ro
• Administrator @ rstforums.com
Romania
1.
Introduction
2.
When it is useful
3.
How it works
4.
Reflective ... | pdf |
I’m Not A Doctor But I Play
One On Your Network
Tim Elrod and Stefan Morris
About Us
Tim Elrod –
Penetration Tester for Fishnet Security
Over 7 years pentesting healthcare systems
Stefan Morris –
Penetration Test for Fishnet Security
Over 4 years Pentesting healthcare systems
Technology Redux
Common Health... | pdf |
Safety of the Tor network
A look at network diversity, relay operators, and malicious relays
Runa A. Sandvik
• Developer for the Tor Project
• Worked with/for Tor since GSoC 2009
• Frequent traveler
What this talk is about
• Is the Tor network a CIA honeypot?
• Are all relays malicious?
• Looked at all consensus files c... | pdf |
!
"
#
$
%
&'
(
)
*
*
*
+
,
-
-
.
/
0
!
"
1
2
3
0
4
5
$
"
2
6
7
8
"
2
0
!
%
9
%
$
8
:
8
;
:
%
%
!
<
8
'
%
=
:
8
;
:
%
%
"
2
9
!
8
8
2
9
%
>
0
!
8
?
1
'
0
;
!
8
4
"
2
%
!
"
@
1
%
8
"
%
0
;
4
A
!
B
4
"
9
"
%
1
;
4
8
!
%
$
8
%
8
!
B
2
9
%
$
8
C
D
E
C
8
;
8
!
0
7
F
1
@
7
"
'
G
"
'
... | pdf |
CATCHING
MALWARE
EN
MASSE
:
DNS
&
IP
STYLE
Dhia
Mahjoub
@DhiaLite
dhia@opendns.com
Thibault
Reuille
@ThibaultReuille
thibault@opendns.com
Andree
Toonk
@atoonk
andree@opendns.com
DHIA
MAHJOUB
2
• Senior
Security
Researcher
at
OpenDNS
• PhD
graph
... | pdf |
Black Badge Uber Alles
????
Agenda
1. Who are we
2. Why do this
3. Dc 22
4. Dc 14
5. Dc 23
6. Thank you
7. QA
8. Fin
Who are these hackers on stage
DC503 members
Jesse - human computer
Kenny - human pick and place machine
Mike - Senior Trouble Maker
Mickey - least israeli israeli person mike knows
Joe ... | pdf |
SHELL Hacking
阿里云 - wzt
•
When control a unix-like system, Than?
[root@localhost fucking_rootkit]# ls
Makefile furootkit.c
[root@localhost fucking_rootkit]# make
make -C /lib/modules/2.6.32/build M=/root/lkm/fucking_rootkit modules
make: *** /lib/modules/2.6.32/build: No such fil... | pdf |
Preface
%\ :LOOLDP 5XELQ DQG
0DUVKDOO %UDLQ
Copyright 1999 by Prentice Hall PTR
Prentice-Hall, Inc.
A Simon & Schuster Company
Upper Saddle River, NJ 07458
Prentice Hall books are widely used by corporations and govern-
ment agencies for training, marketing and resale.
The publisher offers discounts on this book when o... | pdf |
Social-Engineering
Pentesting over Power lines
Dave Kennedy (@Dave_ReL1K)
Rob Simon (@KickenChicken57)
http://www.secmaniac.com
About Rob
• Application Security Engineer, Fortune 1000
• Penetration Tester
• Source Code Analysis
• Spare time plays with home automation gear
• C/C++/C#
• Also hugs..
Abou... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.