text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Sysmon简介
Sysmon是⼀个Windows系统服务和设备驱动程序,安装后,会在系统启动时保持驻留状态,实时监视和记录系统
活动,并记录在Windows事件⽇志中。它提供有关进程创建,⽹络连接,⽂件创建时间更改等详细信息。
我们可以通过对Sysmon记录的事件⽇志进⾏分析,并了解⼊侵者和恶意软件如何在⽤⼾⽹络上运⾏。
Sysmon功能概述
(1)使⽤完整的命令⾏记录当前⾏为的⽗进程的进程创建;
(2)使⽤SHA1(默认值),MD5,SHA256或IMPHASH记录过程映像⽂件的哈希;
(3)可以同时使⽤多个哈希;
(4)在进程创建事件中包含进程GUID,即使Windows重⽤进程ID时也可以使事件相关;
(5)在每个事件中都包... | pdf |
BLIND XSS
@adam_baldwin
HI, I’M ADAM BALDWIN
NOT THAT ADAM BALDWIN
THIS ADAM BALDWIN
• Chief Security Officer at &yet
• Security Lead for ^Lift Security
• @adam_baldwin + @liftsecurity
• What is it?
• Using it in penetration tests
• Challenges
• xss.io
LET’S TALK BLIND XSS
BLIND XSS
WTF IS
BLIND XSS
WTF IS
• Reflected
• ... | pdf |
1
How To Shot Web
(Better hacking in 2015)
2
Jason Haddix
●
Bugcrowd
●
Director of Technical Ops
●
Hacker & Bug hunter
●
#1 on all-time leaderboard bugcrowd 2014
whoami
@jhaddix
3
Hack
Stuff
Better
(and practically)
What this talk’s about...
And…LOTS of memes…. only some are funny
4
Step 1: Cut a hole in a box... j/k
S... | pdf |
Technical Service Bulletin:
FXR-08
Modifying GE/MACOM MASTR-III Group 2
(150.8 MHz – 174 MHz)
for
Amateur Radio Applications
(144 – 148 MHz)
A FluX Research project in several
phases
Release Date: 04-01-2008
Last Update: v1.0 03-31-2008
By: Matt Krick, K3MK
matt@kgmn.net
Radio Model #:
GE/MACOM MASTR-III Group 2 ... | pdf |
TRACKING SPIES IN THE SKIES
FBI CESSNA N496WW. PHOTO BY CHRIS KENNEDY
ABOUT THE TALK
LAW ENFORCEMENT AND AERIAL SURVEILLANCE
History of aerial surveillance (Sam Richards)
Technology on spy planes (Jerod MacDonald-Evoy)
Detecting surveillance aircraft (Jason Hernandez)
@minneapolisam
@jerodmacevoy
@jason_nstar
HISTORY... | pdf |
07/04/2008
1
Speakers:
Chema Alonso
José Parada
Informática64
Microsoft
MS MVP Windows Security
IT Pro Evangelist
chema@informatica64.com
jparada@microsoft.com
Agenda
Code Injections
What are Blind Attacks?
Blind SQL Injection Attacks
Tools
Time-Based Blind SQL Injection
Tools
Time-Based Blind SQL Injection usi... | pdf |
CVE-2022-22965: Spring Framework RCE via
Data Binding on JDK 9+
20W Bug Bounty - 360
Spring20102010Spring
review
classclassloaderprotectionDomain
class.classloaderclassloader
jdk8jdk9
oracle/sun delayjdk9module.classloader
class.module.classLoader2010Spring
Moduleclassloader
Moduleclass
classloader2018Tomcat
classclas... | pdf |
An Introduction to Network Security Data Visualization
Greg Conti
1. Introduction
The Internet is teeming with network traffic, usually benign, but occasionally
malicious. A recent study by the University of California at Berkeley estimated that
532,897 terabytes of information flowed across the Internet in... | pdf |
Author: Recar
github: https://github.com/Ciyfly
w13scan浅析
w13scan 是一款由w8ay开发的python3的主被动扫描器
被动代理基于 baseproxy.py 作者是 qiye
主动扫描默认是没有爬虫的
这里分析将分为几个部分 基础模块 主动扫描 被动扫描 扫描模块 学习的地方
w13scan浅析
简单的流程图
基础模块
一些环境检测和补丁
version_check()
modulePath()
patch_all()补丁
初始化
主动扫描
FakeReq
FakeResp 解析响应
被动扫描
扫描模块
什么时候启动扫描模块
start方法
run_thre... | pdf |
Your Mind: Legal Status,
Rights and Securing
Yourself
Tiffany Rad and James Arlen
DEFCON17
August 2nd, 2009
2009-08-02
Your Mind: Legal Status, Rights and Securing Yourself - DEFCON17
2
We’re going to make your brain hurt.
In a good way.
The hurt might even save your brain.
Disclaimer: Neither of us are speaking
for... | pdf |
DOM Clobbering攻击学习
DOM Clobbering攻击其实算是比较老的攻击手法了,只是之前只知道最基本的dom-xss,没有去深入
了解过,今天看到相关文章觉得挺有意思,所以学习记录一下
概念
DOM破坏是一种将构造的特殊HTML代码注入到页面中以操纵DOM并最终更改页面上JavaScript行为的
技术。在无法使用XSS的情况下,DOM破坏尤其有用,可以在属性id或name被HTML过滤器列入白名单
的页面上控制某些HTML 。DOM破坏的最常见形式是使用锚元素覆盖全局变量,然后该全局变量将被应
用程序以不安全的方式使用,例如生成动态脚本URL。
相关知识
dom对windows对象的影响
首先下面这是个正常的弹窗... | pdf |
Koalrの沉思录
Posts
About
xray 终极反制实践
November 26, 2021 阅读时间:9 分钟
xray 得益于 Go 语言本身的优势,没有那么多不安全的动态特性,唯一动态是一个表达式引擎
(CEL),用的时候也加了各种类型校验,和静态代码没有什么区别了,因此基本不可能实现 RCE
之类的反制效果。那么我们换个思路,有没有办法让 xray 直接无法使用呢。
无法使用有两个表现,一个是让其直接崩溃掉,效果就是如果用 xray 扫描一个恶意 server,
xray 直接 panic 退出。xray 0.x.x 之前的某些版本确实有这种 bug,我当时耗费了很大的精力去
这个定位问题然后开心的修掉了,这里就不... | pdf |
Needle in A Haystack:
Catch Multiple Zero-days Using
Sandbox
Qi Li
Security Development Engineer
Quan Jin
Vulnerability Mining and Exploiting Engineer
2019-5-30
About Us
Qi Li (@leeqwind)
360 Core Security Advanced Threat
Automation Team
Security Development Engineer
Quan Jin (@jq0904)
360 Core Security Advanced Thre... | pdf |
Am I Being Spied On?
Low-tech Ways Of Detecting High-tech
Surveillance
Dr. Phil
@ppolstra
http://philpolstra.com
What this talk is about
● Determining if you are a victim of spying
– Video surveillance
– Tailing
– Audio eavesdropping
– Devices embedded in your computer,
tablet, or smart phone
Why you should care
● Go... | pdf |
© NCC Group 2021. All rights reserved
Sleight of ARM:
Demystifying Intel Houdini
Brian Hong
@im_eningeer
whoami
© NCC Group 2021. All rights reserved
Brian S. Hong (@im_eningeer)
• Hardware Enthusiast
• Forward Reverse Engineer
• Like to reverse low-level stuff and break embedded systems
• Android Penetration Testing
•... | pdf |
Samsung Pay
Tokenized Numbers,
Flaws and Issues
About Me
Salvador Mendoza (Twitter: @Netxing)
● Researcher
o
Android apps and tokenization mechanisms.
● College student
o
A. S. Computer Science
o
Computer Network Administration Certificate
o
Computer Programming Specialist Certificate
Agenda
● Terminology
● Tokenized ... | pdf |
2022MRCTF-Java部分
2022MRCTF-Java部分
总结
Springcoffee -- Kryo反序列化、绕Rasp
思路分析
具体利⽤过程(Payload构造过程)
绕Rasp
EzJava -- Bypass Serialkiller
解读环境
Bypass
FactoryTransformer
Java_mem_shell_Filter
Java_mem_shell_Basic
总结
总的来说是⼀次⾮常不错的⽐赛,这⾥也会简单列出考点⽅便查阅学习,不难有点引导性质
Ps:此次⽐赛都是不出⽹,所以都需要内存马,内存马部分不做讲解很简单百度搜搜
下⾯这两题挺不错的也学到了东西,题⽬做了备份,核⼼代码(exp)也放... | pdf |
在v2ex看到一个项目《给女朋友生成一个聊天年度报告》 https://github.com/myth984/wechat-report
,尝试做了一个后觉得挺好玩,想到之前做的小8机器人加了很多安全群,能否给这些群统计一下做个报
告呢?
数据提取
说干就干,原项目使用ios导出数据的功能获取数据,感觉有点麻烦,小8机器人运行在windows的Pc微
信上,直接从Pc微信把数据脱出来就行了。
PC微信的数据库是sqlite,但是加密了,参考 https://bbs.pediy.com/thread-251303.htm 从内存中提
取 key 进行解密,就能得到数据库了。
微信群摸鱼报告
把开源项目的前端简单修改了一下,为小8加的... | pdf |
Specifications
Defcon
21
Development
Debian v6, RCP100, and Kernel Module
Software
Deployment
RouterBoard (RB450G) with case
Hardware
-
Open-WRT Operating System
-
idguard Kernel Module | pdf |
Attacking .Net at Runtime
By
Jonathan McCoy
Abstract
This paper will introduce a high level attack
that can control a live .NET program. This
attack is a payload to be deployed after
opening a backdoor inside of a target .NET
application. Also basic information on
delivery methods is included.
This pape... | pdf |
大可(Dark)
iOS軟體逆向工程應用 & 手機遠程監控技術
經歷
PHATE Security- 創辦人
Zuso Security - 成員
Chroot - 成員
吉瑞科技 - R&D
網駭科技 - R&D
某警調單位 - 外聘顧問
資策會 - 教育訓練講師
中科院 - 教育訓練講師
內容簡介
iOS 軟體逆向工程應用
IAP (In-App-Purchases) 破解技術
遊戲作弊引擎設計
iOS遠程控制軟體設計
謹以此紀念Steve Jobs
iOS 軟體逆向工程技巧
iOS APP簡介
執行檔格式
Mach-O
組合語... | pdf |
Practical Aerial Hacking &
Surveillance
Glenn Wilkinson
SensePost
DefCon 2014
@glennzw
Glenn Wilkinson
@glennzw
SensePost.com
@glennzw
@glennzw
@glennzw
Practical Aerial Hacking &
Surveillance?
@glennzw
Hacking?
@glennzw
Aerial?
@glennzw
Surveillance?
@glennzw
Practical?
@glennzw
Why oh why bring
“drones” into ?
@gl... | pdf |
Automated PIN Cracking
Justin Engler
Paul Vines
Senior Security Engineer
Security Engineering Intern
iSEC Partners
iSEC Partners
• Current PIN Cracking Methods
• Cracking with Robots
• R2B2
• C3BO
• Defeating the Robots
Agenda
• One of the most popular ways to lock
mobile devices
• Commonly still only 4-... | pdf |
Inside Flash: Flash Exploit
Detec4on Uncovered
Ga1ois
&
Bo
Qu
About us
• Security
Researchers
in
PANW
• Work
• IPS
• APT
Detec=on
• A>er
work
• Vulnerability
discovery
• Exploit
technique
researching
Agenda
• Iden=fy
(Possible)
Exploit
• Stop
Exploit... | pdf |
Steinthor Bjarnason
Jason Jones
Arbor Networks
The call is coming from inside the
house!
Are you ready for the next
evolution in DDoS attacks?
2
The Promises of IoT
• The Promise of IoT
• More personalized, automated
services
• Better understanding of customer
needs
• Optimized availability and use
of resources
•... | pdf |
Untrustworthy
Hardware
And How to Fix It
PRESENT DAY.
PRESENT TIME ⌷
- ##FPGA, ##crypto and #openRISC on Freenode
- Shorne and Olofk from #openRISC (hardware and
cross-compilation help)
- PropellerGuy (Parallax Propeller open-source IO
interface)
- Briel Computers’ PockeTerm project
- Maitimo, International... | pdf |
1
内存取证
在HW排查发现可疑进程 python
使⽤find命令进⾏全盘搜索并没有发现相关⽂件," python "应该是运⾏在内存之中,但是我
们没有原⽂件,我们如何进⾏分析
使⽤ cat /proc/pid/maps 命令查看⽂件在内存之中的情况,可以看到⽂件被删除之前存
在与路径: /tmp/.ICE-unix/python
发现 /tmp/.ICE-unix/python 有nohup⽂件,查看nohup.out⽂件并没有发现什么线索
现在没有原⽂件,只有⼀个进程,我们可以通过使⽤gdb把内存dump出来进⾏分析
然后就是gdb命令(我也不知道该dump多少,dump⼀⼤块内存)
Bash
复制代码
... | pdf |
1
Julian Grizzard
DEFCON 13
Surgical Recovery from
Kernel-Level Rootkit Installations
Linux Based Systems
Julian Grizzard
July 2005
DEFCON THIRTEEN
2
Julian Grizzard
DEFCON 13
Latest Slides and Tools
PLEASE DOWNLOAD THE LATEST SLIDES AND TOOLS
[ Latest slides available ]
http://www.ece.gatech.edu/research/labs/nsa/pres... | pdf |
【漏洞⽇记】深X服还没完,通达OA⼜搞RCE漏洞【OA V11.6】
Agan '
338
收藏 1
原⼒计划
分类专栏: Web常⻅漏洞篇【免费】
⽂章标签: 通达OA RCE
2020-08-19 02:47:07
版权
当你的才华
还撑不起你的野⼼时
那你就应该静下⼼来学习
⽬录
0x01 通达OA V11.6 源码下载与安装
0x02 前⾔
0x03 复现漏洞
EXP 脚本
0x04 通达OA V11.5和V11.7 版本⽆法复现该漏洞过程
本次漏洞复现,只测试了三个版本:
通达 OA V11.7 (最新)
通达 OA V11.6
通达 OA V11.5
订阅博主
关注
点赞 3
评论 2
分享
收藏 1
⼿机看
打... | pdf |
{Anthony Lai, Benson Wu, Jeremy Chiu},
Founder and Security Researcher, Xecure Lab
anthony.lai@xecure-lab.com
benson.wu@xecure-lab.com
jeremy.chiu@xecure-lab.com
http://blog.xecure-lab.com
Chroot Security Group
http://www.chroot.org/
CHROOT 成立於西元2004年,是台灣一群專
業、優質又玉樹臨風的好孩子組成的。
(會員招募中,目前團報另有優惠)
Xecure L... | pdf |
NCC Group Whitepaper
Secure Messaging for Normal People
July 20, 2015 – Version 1.0
Prepared by
Justin Engler — Principal Security Consultant
Cara Marie — Senior Security Consultant (Diagrams)
Abstract
"Secure" messaging programs and protocols continue to proliferate, and crypto ex-
perts can debate their minutiae, but... | pdf |
UFOs and Government:
A Historical Inquiry
What a UFO is not.
What a UFO ... is.
The modern era of UFOs begins in the 1940s.
It begins with "foo fighters" over Germany and
Japan in 1944.
Military pilots reported objects like these:
Date: September 25, 1947
From: Lt. General Nathan Twining
To: Commanding General ... | pdf |
Spectra
New Wireless Escalation Targets
Jiska Classen
Secure Mobile Networking Lab - SEEMOO
Technische Universität Darmstadt, Germany
Francesco Gringoli
Dept. of Information Engineering
University of Brescia, Italy
2
Motivation
3
When you got Bluetooth on-chip RCE...
35C3 Talk: https://media.ccc.de/v/35c3-9498-dissec... | pdf |
Microservices and FaaS
for Offensive Security
Ryan Baxendale
$ whoami
Ryan Baxendale
Penetration Tester
Centurion Information Security Pte Ltd - www.centurioninfosec.sg
Singapore
twitter.com/ryancancomputer
github.com/ryanbaxendale
linkedin.com/in/ryanbaxendale
Servers are dead...
“Serverless”
Jan 2015 - AWS Lambda P... | pdf |
程聪 阿里云安全-系统安全专家
基 于 硬 件 虚 拟 化 技 术 的 新 一 代 二 进 制 分 析 利 器
自我介绍
现就职于阿里云安全-系统安全团队
主要研究方向:
•
病毒检测
•
主机安全
•
内核安全
•
虚拟化安全
•
二进制攻防
演讲内容
•
背景介绍
•
QEMU/KVM简介
•
无影子页ept hook
•
虚拟化调试器
•
内核级trace
•
总结
背景介绍
大家先来看下左边这张图片,搞内核安全的应该不陌
生。windows x64内核引入patchguard后,对内核
敏感部分,进行patch、hook,修改msr、IDT表等
操作,都会触发蓝屏
从PatchGuard谈起
但是有很多场景还是需要对内核进行... | pdf |
Blog
HTTP请求走私
2020-07-22 · Web漏洞
聊HTTP请求走私之前,需要先思考一个问题:HTTP请求如何标识一个请求的结束(尤其是POST请求)
一种是通过 Content-Length 请求头 的值界定请求体的长度,另一种是在分块传输时,通过 Transfer-
Encoding: chunked 请求头与请求体最后一行的 0\r\n\r\n 来标识该请求的结束(不计入请求体长度)
按照HTTP/1.1规范标准,这两种请求头同时存在时应该忽略 Content-Length 而以分块传输为准,但是对于
反代链中的多个服务器而言,可能有些并不支持分块传输请求头、有些对于标准规范的实现并未足够精细,
在处理... | pdf |
Room for Escape:
Scribbling Outside the
Lines of Template Security
1
Alvaro Muñoz @pwntester
Staff Security Researcher
Oleksandr Mirosh @olekmirosh
Security Researcher
2
Content Management Systems (CMS)
●
A CMS is an application that is used to manage
web content
●
Allows multiple contributors to create, edit an... | pdf |
Rep.%Jim%Langevin
D-Rhode(Island,(2nd District
US%House%of%Representatives
@JimLangevin
Rep.%William%Hurd
R-Texas,(23rd District
US%House%of%Representatives
@HurdOnTheHill
Bridging'the'Gap'Between'DC'and'DEF'CON
#DC2DEFCON
Joshua%Corman
Founder,(I(Am(The(Cavalry
Director,(Cyber(Statecraft(Initiative
Atlantic%Council
@j... | pdf |
Marina Krotofil, Jason Larsen
DefCon 23, Las Vegas, USA
07.08.2015
Rocking the Pocket Book: Hacking Chemical
Plants for Competition and Extortion
Who we are
Hacker
(Ex)Academic
Got hooked on cyber-
physical hacking
Dragged into academic world
against own will
Motivation
Industrial Control Systems
Industrial Control ... | pdf |
How
to
Train
Your
RFID
Tools
Craig
Young
Security
Researcher
@
Tripwire
VERT
About
Craig
Security
Researcher
in
Tripwire
VERT
Author
of
IP360
content
and
original
research
Identified
100+
CVEs
over
2013
&
2014
Won
1st
S... | pdf |
Hacking The Future:
Weaponizing the Next
Generation
James Arlen, Leigh Honeywell,
James Costello, Tiffany Rad, Tim
Krabec
DEF CON 18 - Las Vegas
Disclaimer
We've got jobs and stuff. This is not our job.
Mostly, the lovely people we work for don't
talk like this. We do sometimes because it's
the right thing to do... | pdf |
August 4-7, 2016
1
2
3
4
5
6
7
8
9
10
11
12
Exploit Mitigation
Techniques
on iOS
Max Bazaliy
A Journey Through
August 4-7, 2016
About me
1
2
3
4
5
6
7
8
9
10
11
12
o From Kiev, Ukraine
o Staff Engineer at Lookout
o Focused on XNU, Linux and LLVM internals
o Interested in jailbreak... | pdf |
主办方
赞助商
“双传统”物流安全成长分享
张天宇
目录
01
观现状
02
看成果
03
搞事情
04
干正事
安全行业现状:
金融、党政公检法
区块链、互联网
文化、食品等
传统物流、制造、医疗
业务型
监管型
低迷型
传统型
监管强
投入高
上汽安吉物流:
汽车及装备
供应链
解决方案
社会化快运
智能与信息
国际物流
供应链金融
¥
整车物流
装备物流
航运物流
口岸物流
零部件物流
非汽车物流
零部件预装
双传统面临的困局:
1、业务没有安全压力
(无驱动,无监管)
2、领导层不关心安全
(无投入、没资源)
3、国企老员工
(不支持、不配合、别麻烦、没好处免谈)
目录
观现状
02
看成果
03
搞事情
04
干正事
01... | pdf |
IP Law
Copyright
DMCA
Trademark
Patent
Trade Secret
Copyright - Definition
Copyright protects "original works of authorship, fixed
in a tangible medium of expression".
In the following categories: literary, musical, dramatic,
choreographic, pictorial, sculptural, audiovisual,
sound, architectural.
Not in ... | pdf |
Open Data Source Analysis
Daniel “whopis” Burroughs
daniel.burroughs@gmail.com
About me...
● Research Professor
● University of Central Florida
● College of Engineering
● College of Health and Public Affairs
● Associate Technology Director
● Center for Law Enforcement Technology,
Training & Research (LETTR)
Related ... | pdf |
Greg Conti
Interface Design
for
Hacking Tools
original image: http://www.daveyandgoliath.org/
Disclaimer
The views expressed
in this article are
those of the author
and do not reflect
the official policy or
position of the
United States
Military Academy,
the Department of
the Army, the
Department of
Defens... | pdf |
file:///D|/Work%20Related/DEFCON/presentations/dc-17-presentations/defcon-17-cough-references.txt
Confidence Game Theater References
Puzzlers' Tribute edited by David Wolfe and Tom Rodgers (2002) containes a chapter by William
Kalush called Sleight of Hand with Playing Cards prior to Scot's Discoverie. This chapter in... | pdf |
dalfox源码学习
在信息流上看到有人star这个项目,dalfox是一个基于golang的xss扫描器,介绍说基于golang/DOM
parser。
好像以前就看过这个项目,但是忘了大概,今天看到有人star了这个项目,于是好奇的又看了看,看到
它的简介,基于DOM parser以为很厉害,看了源码才发现,当初忘了这个项目,就是因为它很一般,
还是用的批量payload打,从返回页面找payload那一套,虽然找的方法改进了一下,每个payload都包
含一个class,直接用css语法找 .dalfox 的标签判断,但检测一个参数还是要发很多payload,不符合
现在的xss扫描逻辑了。
但我还是写一下它的源码学习,说说... | pdf |
1
route分析
2022年5⽉21⽇15:07:15
最近在重构优化stowaway的代码,之前没有细看的header结构体的route字段的作⽤,实际上这个字段
就是⽤以实现多级代理中,和每个节点的通信的重要参数。
⼀般来说,不管是哪个node,发送消息给admin,Route⼀般只要设置成TEMP_ROUTE。当然Sender和
Accepter是⽤来判断发送者和接收者的UUID。
⽽这⾥不需要Route,是因为每个node只会有⼀个上游node和多个下游node,所以你发送给上游node
的时候,并不会迷路,只有⼀条路通往admin
2
⽽admin发送消息给某个多级node的时候,就需要路由帮忙了,虽然Sender... | pdf |
HIT2006
HIT2006
Spyware Detection :
Spyware Detection :
Automated Behavior Analysis System
Automated Behavior Analysis System
Birdman
Birdman
2006
2006--07
07--16
16
XX--Solve
Solve
Automated Behavior Analysis Approach, Birdman, HIT2006
Automated Behavior Analysis Approach, Birdman, HIT2006
2
Abstract
Abstract
... | pdf |
Prisma by Palo Alto Networks | Kubernetes Privilege Escalation: Excessive Permissions in Popular Platforms | White Paper
1
Kubernetes Privilege
Escalation: Excessive
Permissions in
Popular Platforms
2
Prisma by Palo Alto Networks | Kubernetes Privilege Escalation: Excessive Permissions in Popular Platforms | White... | pdf |
1
dradis Framework
dradis Framework
sharing information will get you root
http://dradisframework.org/
Daniel Martín Gómez
etd@ngssoftware.com
august 2009
2
dradis Framework
dradis Framework
sharing information will get you root
Daniel Martín Gómez
etd@ngssoftware.com
august 2009
http://dradisframework.org/
... | pdf |
10505 Judicial Drive, Suite 201 | Fairfax, VA 22030 | V: 703.352.2982 | F: 203.286.2533 | sales@kryptowire.com
Vulnerable Out of the Box:
An Evaluation of Android Carrier Devices
Abstract
Pre-installed apps and firmware pose a risk due to vulnerabilities that can be pre-positioned on a device,
rendering the devi... | pdf |
Internal Server Error:
Exploiting Inter-Process Communication in
SAP's HTTP Server
Martin Doyhenard
Security Researcher @
Onapsis
●
Business Processes software
○
Operations
○
Financials
○
Human Capital
○
Customer Relationship
○
Supply Chain
●
Over 400,000+ Customers (90% Fortune-500)
●
Based on Web Services through... | pdf |
Mobile privacy: Tor on the iPhone and other
unusual devices
Marco Bonetti
<mbonetti@cutaway.it>
May 2, 2010
Abstract
Tor is a software project that helps you defend against traffic analy-
sis, a form of network surveillance that threatens personal freedom and
privacy, confidential business activities and relationships, an... | pdf |
@Y4tacker
对Java反序列化脏数据绕WAF新姿势的补
充
引⾔
相信⼤家都看过回忆飘如雪⼤师傅的⼀篇⽂章,Java反序列化数据绕WAF之加⼤量脏数据,
在这篇⽂章当中⼤师傅提出了通过将gadget加⼊到集合类型从⽽可以实现添加脏数据,这⾥我
发现了⼀个新姿势
灵感也是来源于回忆飘如雪⼤师傅的另⼀篇⽂章的⼀个⼀笔带过的问题上
这原本是⼤师傅想来搞gadget探测的⽅案,但是却失败了,但本着专研的⼯匠精神,我对这个
问题进⾏了深⼊的研究,这⾥顺便对这个问题解读
为什么这⾥第⼀个属性反序列化失败,仍然触发了URLDNS的整个
过程
顺便这⾥多提⼀嘴,为什么之后⼤师傅提出的直接将URLDNS中的HashMap的键值对中将key
或... | pdf |
Estimates of Optical Power Output in Six Cases of Unexplained
Aerial Objects with De®ned Luminosity Characteristics1
JACQUES F. VALLEE
1550 California St. #6L, San Francisco, CA 94109
Abstract Ð An analysis of six cases of unexplained aerial phenomena ob-
served by qualified observers over a twenty-year period in vario... | pdf |
CAPTCHAs:
Are they really
hopeless?
( Yes )
Completely
Automated
Public
Test to tell
Computers and
Humans
Apart
Why? Protect from automated abuse.
Examples
The Problem
• Really hard for a computer
• Hard for a person
• So they can’t be too hard
CAPTCHA Breaking
• Is it worth it?
• $$ value per CAPTCHA solved
• Retool... | pdf |
One Step Before Game Hackers
-- Instrumenting Android Emulators
Defcon 26
nevermoe
© DeNA Co., Ltd.
Self Introduction
• nevermoe (@n3v3rm03, i [at] nevermoe.com)
• Chinese in Japan
• Security engineer in DeNA Co., Ltd.
• Love playing / hacking games
... | pdf |
Security Art | August 2011
www.security-art.com
Itzik Kotler, Chief Technology Officer
Iftach Ian Amit, VP Consulting
Sounds Like Botnet
Intro to VoIP
• It’s everywhere
– Home (Vonage, Skype, TeamSpeak, Comcast,
etc…)
– Office (Cisco, Avaya, Lucent, Asterisk, etc…)
• Easy to deploy
– Most are “plug and talk”... | pdf |
#BHUSA @BlackHatEvents
Better Privacy Through Offense:
How To Build a Privacy Red Team
Scott Tenaglia
Engineering Manager, Privacy Red Team, Meta
#BHUSA @BlackHatEvents
Information Classification: General
Agenda
01
The Case for Offensive
Privacy
02
Security and Privacy
03
Meta’s Privacy Red Team
04
Operations Ideas
0... | pdf |
1 F5C
web
0x00
0x01
0x02
2 string
3
4
0x03
0x04 | pdf |
HiveNightmare/SeriousSAM本地权限提升
0x00 背景介绍
微软发布一个CVE-2021-36934的问题,在Twitter上有点火,不长的时间github就出现了很多poc项目,
我想原因是原理简单,操作方便,危害严重,极具实用性。
同时在朋友圈看见@daiker同学,结合他们小伙伴对setntml和changentml的分析文章,使得这个小小
的acl问题发挥出巨大价值。
闲话不多说,直接上操作(想读原理的同学,可以跳到0x02,只想知道怎么操作的同学,接着读)
0x01 工具操作
据老外研究显示影响版本:(这个我没有验证)
WIN 10 1809 及以上有危害
WIN 10 1803 及以下无危害
工具1... | pdf |
“Intelligence” by Susan Hasler (Thomas Dunne Books. St. Martin’s Press: New York
2010)
A review by Richard Thieme
There is enough white-hot rage in this book to steam a skunk.
Take that as a compliment. Twenty-one years at the CIA in diverse capacities would
generate post-traumatic stress in anyone, but not many c... | pdf |
1
Looking Into
The Eye
Of The Meter
Don C. Weber
InGuardians, Inc.
Copyright 2012 InGuardians, Inc.
2
Copyright 2012 InGuardians, Inc.
Cutaway and InGuardians
http://www.linkedin.com/in/cutaway http://inguardians.com/info
3
Copyright 2012 InGuardians, Inc.
Smart Meter Research Findings
REDACTED ... | pdf |
Trust Dies in Darkness: Shedding Light on
Samsung’s TrustZone Cryptographic Design
Alon Shakevsky, Eyal Ronen, Avishai Wool
Extended paper: https://eprint.iacr.org/2022/208.pdf
Tool + PoC: https://github.com/shakevsky/keybuster
@shakevsky
@eyalr0
yash@eng.tau.ac.il
3 academic researchers
The leading Android Vendor
Wha... | pdf |
LionBug @ HITCON-CMT
About Me
● a.k.aLionBug
● Co-founder of UCCU
● Know a little
● Web Security
LinkedIn
http://thehackernews.com/2016/05/linkedin-account-
hack.html
LinkedIn
17
wooyun
/show.php?id=xxxxx
A
B
C
D
Admin
ASUS Cloud (0day?)
/webrelay/directdownload/xxxxxxxx/?
dis=xxxx&fi=2040452
ASUS Cloud (0day?)
XSS
Ha... | pdf |
CONTAINER ESCAPE IN 2021
关于我
l 基础设施安全工程师 @蚂蚁集团
l 安全研究与研发
l Linux 内核/虚拟化/容器/底层安全
l HITB, CanSecWest, Syscan360…
目录
l 容器逃逸简介
l 新的容器逃逸方法
l 防御方法
1. 容器逃逸简介
容器简介
l Docker诞生于2013年,OS层的虚拟化技术
l 应用级别的抽象
l 轻量,标准,隔离
Docker简介
l namespaces:隔离
l cgroups: 资源控制
l UnionFS:镜像共享与分发
容器安全
l 天下没有免费的午餐:性能 vs 安全
l 容器与宿主机弱隔离
l 共享同一个内核
容器逃逸类型
l ... | pdf |
关于Xdebug3的一些记录
因为周末升级了下phpstorm,发现最新版的phpstorm支持的是xdebug3,所以记录了一下调试
xdebug3的一些东西。
环境
windows
phpstorm 2020.3
xdebug3
配置
1. 去xdebug官网下载对应的版本:https://xdebug.org/download,并把dll文件复制到php的ext文
件夹下
2. 接着在php.ini下添加以下配置:
这里就是一个踩坑点,以上是xdebug3的配置语法。因为xdebug3和xdebug2配置的语法有改进,并且
默认端口从9000变成了9003,网上大多都是xdebug2的配置:
如果按xdebug2的配置的话会报... | pdf |
1
Weaponizing Unicode: Homographs
Beyond IDNs
2
Who Am I
The Tarquin (aka Aaron M Brown)
Senior Security Engineer
Amazon.com
3
Disclaimers
4
5
WTF, Why?
“The human race will begin solving its problems on the day
that it ceases taking itself so seriously.” - Malaclypse the
Younger
6
Scope, Context, and Prior Art
http... | pdf |
安卓APP在各种场景下的调试总结
前言
做此项工作的原因在于笔者之前在CTF比赛中遇到Android逆向类型的题目时,因为只有一个安卓手机作
为主力机,出于安全考虑以及手机厂商限制通常很难获得root权限,再比如使用模拟器则通常面临x86
环境下调试arm native模块的困难,常常因为调试问题困扰很久,于是下定决心折腾一番,希望能对各
位在各种不同限制条件下能够对安卓APP进行调试有所帮助,其中难免遗漏或错误之处也欢迎各位师傅
指正。
如何动态运行待调试的APP
想要调试一个安卓APP,首先最基本的就是要具备一个可以将其动态运行起来的环境,这个环境整体上
可以分为模拟器环境和真机环境。
模拟器
模拟器方面大致是有三种不同的选择,... | pdf |
目 录
版权信息
版权
内容提要
历史回眸
第2版前言
第1版前言
资源与支持
第一篇 绪 论
第1章 软件调试基础
1.1 简介
1.1.1 定义
1.1.2 基本过程
1.2 基本特征
1.2.1 难度大
1.2.2 难以估计完成时间
1.2.3 广泛的关联性
1.3 简要历史
1.3.1 单步执行
1.3.2 断点指令
1.3.3 分支监视
1.4 分类
1.4.1 按调试目标的系统环境分类
1.4.2 按目标代码的执行方式分类
1.4.3 按目标代码的执行模式分类
1.4.4 按软件所处的阶段分类
1.4.5 按调试器与调试目标的相对位置分类
1.4.6 按调试目标的活动性分类
1.4.7 按调试工具分类
1.5 ... | pdf |
Hackerspaces: The Legal Bases
nicolle neulist
(rogueclown)
DEFCON 17
August 2, 2009
a little about me
● attorney in Illinois
● founding member of
Pumping Station: One
in Chicago
● attorney for Pumping
Station: One
topics for this talk
● making your hackerspace a real legal entity
● special considerations for nonpro... | pdf |
"!#%$'&)(*
!+-,.$/(0$/21
3452,.16)78!#%$'&9(:<;#(-
=?>@$/(01A1@BC>D-
1A3"FE?*
GIHKJ%LNM=OQPQRSUTVRXWZYU[\PI]_^`[a[\JUb`cdRXecfS:ghRfiFOQekjkHXPQJ*RX^
lRm^`imRX^ne#oVJUOpiX[a^nb`Opc.L
qsrXtvuxwyrUz{\r}|Z~QXdZ*u'mzZZ
Z|Z~'X}w2rX}z*
Z|syrXt}rXn%... | pdf |
DEF CON 19
Malware Freakshow 3:
They're pwning er'body out there!
Nicholas J. Percoco & Jibran Ilyas
Copyright Trustwave 2011
Agenda
• Introduction
• Evolution of Malware
• Sample Analysis + Victim + Demo
• Sample SL2010-161 – Kameo (Grocery Store)
• Sample SL2011-014 – Memory Dumper (Bar)
• Sample SL... | pdf |
Attacking Oracle
with the
Metasploit Framework
defcon 17
Who Are We?
Chris Gates
<cg [@] metasploit.com>
What pays the bills
Pentester for
Security Blogger
http://carnal0wnage.attackresearch.com
Security Twit
Carnal0wnage
Want more?
Chris Gates + carnal0wnage + maltego
Who Are We?
Mario Ceballos
<mc [@... | pdf |
Triton and Symbolic
execution on GDB
bananaappletw)@)DEF)CON)China)
2018/05/11)
$whoami
• Wei-Bo)Chen(@bananaappletw))
• MS)major)in)CSE,)Chiao)Tung)
University,)Hsinchu)
• Organizations:)
• Software)Quality)Laboratory)
• Co-founder)of)NCTUCSC)
• Bamboofox)member)
• Specialize)in:)
• symbolic)execution)
• bi... | pdf |
1 / 111
DAVIX
The Data Analysis and Visualization Linux®
Version 0.5.0
Authors:
Jan P. Monsch, jan döt monsch ät iplosion döt com
Raffael Marty, raffy ät secviz döt org
2 / 111
Contents
1.
DAVIX - Visualize Your Logs!..........................................................................4
1.1.
Introduct... | pdf |
Digital Active
Digital Active
Self Defense
Self Defense
DEFCON 12
DEFCON 12
OUDOT Laurent
OUDOT Laurent
oudot
oudot@
@rstack
rstack.org
.org
http://www.
http://www.rstack
rstack.org/
.org/oudot
oudot//
Some references
•
Active Defense research project, Dittrich
– http://staff.washington.edu/dittrich/ad/
•
Defending you... | pdf |
The mechanics of compromising
low entropy RSA keys
Austin Allshouse
This talk is about...
Nominally:
Recovering private keys from a subset of vulnerable RSA certificates
Functionally:
Calculating shared factors across large batches of integers
“...using our scalable GCD algorithm for shared factors...”
“...batch GCD... | pdf |
优雅的使⽤Dnslog平台
0x01 强迫症难受的需求点
在可⽤的 dnslog 平台越来越多之后,各种 burpsuite 插件、主动被动扫描满天⻜,去公开的的 dnslog 平台把信息
填过来就没美滋滋的刷洞,但是⼜有⼏个问题:
公开的 dnslog 地址容易被 ban
⼄⽅公司⾃建的 dnslog ⼜不让我⽤
⾃建的⼜可能被溯源
0x02 癞蛤蟆想吃天鹅⾁
就没有可能⼜稳定、⼜不怕溯源、⼜不被 ban 吗,接着这个想法找到了⼀种⽩嫖别⼈的 dnslog 服务器的可能性
Github 上已经有了很多师傅们开发的各种⼀键 dnslog 平台,观摩了⼏个后发现⼤部分的⾯板加上了token或者密
码验证,找到了也没办法嫖
摸了⼀圈之后... | pdf |
1
Attacking BaseStations
Hendrik Schmidt <hschmidt@ernw.de>
Brian Butterly <bbutterly@ernw.de>
2
Who we are
o
Old-school network geeks,
working as security researchers for
o
Germany based ERNW GmbH
o
Independent
o
Deep technical knowledge
o
Structured (assessment) approach
o
Business reasonable recommendations
o
We und... | pdf |
云影实验室
1 / 11
.NET 高级代码审计(第四课) JavaScriptSerializer 反序列化漏洞
Ivan1ee@360 云影实验室
2019 年 03 月 01 日
云影实验室
2 / 11
0X00 前言
在.NET 处理 Ajax 应用的时候,通常序列化功能由 JavaScriptSerializer 类提供,它
是.NET2.0 之后内部实现的序列化功能的类,位于命名空间
System.Web.Script.Serialization、通过 System.Web.Extensions 引用,让开发者轻
松实现.Net 中所有类型和 Json 数据之间的转换,但在某些场景下开发者使用
D... | pdf |
Edge Side Include Injection
Abusing Caching Servers into SSRF and Transparent Session
Hijacking
By Louis Dion-Marcil
GoSecure
Edge Side Includes (ESI)… what is it?
Edge Side Includes (ESI)… what is it?
Edge Side Includes (ESI)… what is it?
The Weather Website
Forecast for
Monday
Tuesday
Wednesday
Montréal
27°C
23°C
31... | pdf |
Identifying, Exploring, and
Predicting Threats in the
Russian Hacker Community
Dr. Thomas J. Holt
Michigan State University
holtt@msu.edu
Dr. Max Kilger, Spartan Devils Honeynet Project
Dr. Deborah Strumsky, UNC-Charlotte
Dr. Olga Smirnova, Eastern Carolina University
Copyright 2009, all references to this work must... | pdf |
Evading next-gen AV using A.I.
Hyrum Anderson
hyrum@endgame.com
@drhyrum
/in/hyrumanderson
https://github.com/endgameinc/gym-malware
Rules for static analysis
x1
rule malware {
strings:
$reg = “\\CurrentVersion\\Internet Settings”
condition:
filesize < 203K and #reg > 3 }
filesize
count(-registry-prefix)
Next-gen AV ... | pdf |
⾸⻚
⽹络安全
移动安全
招聘信息
English
«NSA和FBI联合曝光俄罗斯开发的Lin...
HW防守 | 如何做⼀名优秀的监控/研判... »
HW前的礼盒:通达OA 0day请查收
2020-08-16 22:08
即将迎来安全圈内的⼀场博弈,由于2015以及2017版本已不在更新且在补天平台通
达专属⼚商也不再收低版本的漏洞,我决定在正式开始之前公布通达OA⼀些历史遗
留问题,下⾯公布的"0day"在官⽹最新版本(2019)中已经修复。⼀些官⽅还未审
核、未在最新版中修复的漏洞,会在后续修复后持续更新检测⼯具。
ADS
随机推荐
四川省某市政府信息公开系统漏洞导致
敏感内容泄露(影响⼏⼗个部⻔)
知道创宇为“湖湘杯”安... | pdf |
ICS
点击此处添加中国标准文献分类号
备案号:
中 华 人 民 共 和 国 行 业 标 准
XX/T XXXXX—XXXX
研发运营一体化(DevOps)能力成熟度模
型
第 5 部分:应用设计
The capability maturity model of DevOps
Part 5: Application Design
点击此处添加与国际标准一致性程度的标识
(征求意见稿)
- XX - XX 发布
XXXX - XX - XX
发 布
XX/T XXXXX—XXXX
I
目录!
前言................................. | pdf |
MASTER THESIS
Thesis submitted in partial fulfillment of the requirements
for the degree of Master of Science in Engineering at the
University of Applied Sciences Technikum Wien –
Degree Program IT-Security
Variation analysis of exploitable
browser vulnerabilities
By: René Freingruber, BSc
Student number: 1... | pdf |
This document and its content is the property of Airbus Defence and Space.
It shall not be communicated to any third party without the owner’s written consent | [Airbus Defence and Space Company name]. All rights reserved.
Auditing 6LoWPAN networks
Using Standard Penetration Testing Tools
Adam Reziouk
Arnaud Lebru... | pdf |
Confidential to SEWORKS
Copyright ©2013 SEWORKS Inc. All rights reserved.
Android Hooking Attack
SEworks
Hong Brothers
Minpyo Hong, Dongcheol Hong
hinehong@seworks.co.kr
2
•
SEWORKS Co., Ltd
– SEworks is a company created by a hacker.
– Main areas of mobile security, and Android, Windows App
protected areas,... | pdf |
Taking Kerberos To
The Next Level
James Forshaw | @tiraniddo
●
Researcher @ Google Project Zero
●
Specialize in Windows
○
Local Privilege Escalation
○
RPC/COM Internals
○
Token manipulation
●
NtApiDotNet | D2J | OleViewDotNet
“Never met a logical vulnerability I didn’t like.”
Nick Landers | @monoxgas
●
Adversarial R&... | pdf |
Watching the
Watchers
Target Exploitation via Public
Search Engines
mail://johnny@ihackstuff.com
http://johnny.ihackstuff.com
what’s this about?
using search engines to do interesting
(sometimes unintended) stuff
sp3ak l1ke l33to hax0rs
act as transparent proxy servers
sneak past security
find development ... | pdf |
Personal Survival Preparedness
Copyright 2009
Steve Dunker
Las Vegas Survival Scenario
• Aug 1st 2009 -- 2 Million People
• Dec 1st 2009 – 100,000 people
• Can you Survive?
Basic Survival Needs
•Air
•Water
•Food
•Enviroment
Detailed Basic Needs
• “The physiological needs include the needs we
have for oxygen, water, pr... | pdf |
Traps
of
Gold
Michael
Brooks
&
Andrew
Wilson
Cau.on.
Please
vet
anything
discussed
with
legal
and
management.
FRUSTRATION
http://www.flickr.com/photos/14511253@N04/4411497087/sizes/o/in/photostream/
Our
en.re
defense
strategy
is
REACTIVE…
AKA,
losing
Fixes
... | pdf |
CTF WriteUp By Nu1L
Author:Nu1L
CTF WriteUp By Nu1L
PWN
harmoshell
harmoshell2
pwn1
RE
crash
re123
ARM
puzzle
WEB
ezlogin
HCIE
RW
harmofs01
luaplayground01 && luaplayground02
MISC
RSP
PWN
harmoshell
echoshellcode
from pwn import *
import fuckpy3
context.log_level = 'debug'
# p = process('./qemu-riscv64 -L ./libs/ ./har... | pdf |
0
KaiSong (exp-sky)
Tencent Security Xuanwu Lab
WHO AM I
CONTENTS
1Chakra vulnerability
2Bypass ASLR & DEP
3Bypass CFG
4Bypass CIG
5Bypass ACG
6Exploit
7Q&A
The vulnerability was discovered on May 31, 2016.
The vulnerability was fixed in February 2017.
NativeIntArray struct :
NativeIntArrayHead
Segment :
left
length
s... | pdf |
Exploitation Of Windows .NET
Framework
Nanika
nanika_pan@trend.com.tw
1
I am Nanika
2
• APT ?
• No Exploit in .NET?
• Only EXE Attack?
• always Finds the New Attack TREND
• 趨勢始終來自於弱點
.NET Framework
3
.Net framework Security
Improvements
4
.NET Architecture
5
WPF
• Windows Presentation Fou... | pdf |
Don’t Red Team AI like a
Chump
Ariel Herbert-Voss
@adversariel
Intro
• Who am I?
• What is this talk?
A story about hacking an AI system IRL
+
+
Key points in this talk (in case you zone out)
• Focus on the threat model
• Go for the jugular feature extraction process
• Think about the data supply chain
What is an AI s... | pdf |
Steinthor)Bjarnason
Jason)Jones
Arbor)Networks
The$call$is$coming$from$inside$the$house!$
Are$you$ready$for$the$next$evolution$in$
DDoS$attacks?$
• The)Promise)of)IoT
• More)personalized,)automated)services
• Better)understanding)of)customer)needs
• Optimized)availability)and)use)of)
resources)
• Resulting)in:
• Lower)... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.