text
stringlengths
100
9.93M
category
stringclasses
11 values
Sysmon简介 Sysmon是⼀个Windows系统服务和设备驱动程序,安装后,会在系统启动时保持驻留状态,实时监视和记录系统 活动,并记录在Windows事件⽇志中。它提供有关进程创建,⽹络连接,⽂件创建时间更改等详细信息。 我们可以通过对Sysmon记录的事件⽇志进⾏分析,并了解⼊侵者和恶意软件如何在⽤⼾⽹络上运⾏。 Sysmon功能概述 (1)使⽤完整的命令⾏记录当前⾏为的⽗进程的进程创建; (2)使⽤SHA1(默认值),MD5,SHA256或IMPHASH记录过程映像⽂件的哈希; (3)可以同时使⽤多个哈希; (4)在进程创建事件中包含进程GUID,即使Windows重⽤进程ID时也可以使事件相关; (5)在每个事件中都包...
pdf
BLIND XSS @adam_baldwin HI, I’M ADAM BALDWIN NOT THAT ADAM BALDWIN THIS ADAM BALDWIN • Chief Security Officer at &yet • Security Lead for ^Lift Security • @adam_baldwin + @liftsecurity • What is it? • Using it in penetration tests • Challenges • xss.io LET’S TALK BLIND XSS BLIND XSS WTF IS BLIND XSS WTF IS • Reflected • ...
pdf
1 How To Shot Web (Better hacking in 2015) 2 Jason Haddix ● Bugcrowd ● Director of Technical Ops ● Hacker & Bug hunter ● #1 on all-time leaderboard bugcrowd 2014 whoami @jhaddix 3 Hack Stuff Better (and practically) What this talk’s about... And…LOTS of memes…. only some are funny 4 Step 1: Cut a hole in a box... j/k S...
pdf
Technical Service Bulletin: FXR-08 Modifying GE/MACOM MASTR-III Group 2 (150.8 MHz – 174 MHz) for Amateur Radio Applications (144 – 148 MHz) A FluX Research project in several phases Release Date: 04-01-2008 Last Update: v1.0 03-31-2008 By: Matt Krick, K3MK matt@kgmn.net Radio Model #: GE/MACOM MASTR-III Group 2 ...
pdf
TRACKING SPIES IN THE SKIES FBI CESSNA N496WW. PHOTO BY CHRIS KENNEDY ABOUT THE TALK LAW ENFORCEMENT AND AERIAL SURVEILLANCE History of aerial surveillance (Sam Richards) Technology on spy planes (Jerod MacDonald-Evoy) Detecting surveillance aircraft (Jason Hernandez) @minneapolisam @jerodmacevoy @jason_nstar HISTORY...
pdf
07/04/2008 1 Speakers: Chema Alonso José Parada Informática64 Microsoft MS MVP Windows Security IT Pro Evangelist chema@informatica64.com jparada@microsoft.com Agenda Code Injections What are Blind Attacks? Blind SQL Injection Attacks Tools Time-Based Blind SQL Injection Tools Time-Based Blind SQL Injection usi...
pdf
CVE-2022-22965: Spring Framework RCE via Data Binding on JDK 9+ 20W Bug Bounty - 360 Spring20102010Spring review classclassloaderprotectionDomain class.classloaderclassloader jdk8jdk9 oracle/sun delayjdk9module.classloader class.module.classLoader2010Spring Moduleclassloader Moduleclass classloader2018Tomcat classclas...
pdf
An Introduction to Network Security Data Visualization Greg Conti 1. Introduction The Internet is teeming with network traffic, usually benign, but occasionally malicious. A recent study by the University of California at Berkeley estimated that 532,897 terabytes of information flowed across the Internet in...
pdf
Author: Recar github: https://github.com/Ciyfly w13scan浅析 w13scan 是一款由w8ay开发的python3的主被动扫描器 被动代理基于 baseproxy.py 作者是 qiye 主动扫描默认是没有爬虫的 这里分析将分为几个部分 基础模块 主动扫描 被动扫描 扫描模块 学习的地方 w13scan浅析 简单的流程图 基础模块 一些环境检测和补丁 version_check() modulePath() patch_all()补丁 初始化 主动扫描 FakeReq FakeResp 解析响应 被动扫描 扫描模块 什么时候启动扫描模块 start方法 run_thre...
pdf
Your Mind: Legal Status, Rights and Securing Yourself Tiffany Rad and James Arlen DEFCON17 August 2nd, 2009 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself - DEFCON17 2 We’re going to make your brain hurt. In a good way. The hurt might even save your brain. Disclaimer: Neither of us are speaking for...
pdf
DOM Clobbering攻击学习 DOM Clobbering攻击其实算是比较老的攻击手法了,只是之前只知道最基本的dom-xss,没有去深入 了解过,今天看到相关文章觉得挺有意思,所以学习记录一下 概念 DOM破坏是一种将构造的特殊HTML代码注入到页面中以操纵DOM并最终更改页面上JavaScript行为的 技术。在无法使用XSS的情况下,DOM破坏尤其有用,可以在属性id或name被HTML过滤器列入白名单 的页面上控制某些HTML 。DOM破坏的最常见形式是使用锚元素覆盖全局变量,然后该全局变量将被应 用程序以不安全的方式使用,例如生成动态脚本URL。 相关知识 dom对windows对象的影响 首先下面这是个正常的弹窗...
pdf
Koalrの沉思录 Posts About xray 终极反制实践 November 26, 2021 阅读时间:9 分钟 xray 得益于 Go 语言本身的优势,没有那么多不安全的动态特性,唯一动态是一个表达式引擎 (CEL),用的时候也加了各种类型校验,和静态代码没有什么区别了,因此基本不可能实现 RCE 之类的反制效果。那么我们换个思路,有没有办法让 xray 直接无法使用呢。 无法使用有两个表现,一个是让其直接崩溃掉,效果就是如果用 xray 扫描一个恶意 server, xray 直接 panic 退出。xray 0.x.x 之前的某些版本确实有这种 bug,我当时耗费了很大的精力去 这个定位问题然后开心的修掉了,这里就不...
pdf
Needle in A Haystack: Catch Multiple Zero-days Using Sandbox Qi Li Security Development Engineer Quan Jin Vulnerability Mining and Exploiting Engineer 2019-5-30 About Us Qi Li (@leeqwind) 360 Core Security Advanced Threat Automation Team Security Development Engineer Quan Jin (@jq0904) 360 Core Security Advanced Thre...
pdf
Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance Dr. Phil @ppolstra http://philpolstra.com What this talk is about ● Determining if you are a victim of spying – Video surveillance – Tailing – Audio eavesdropping – Devices embedded in your computer, tablet, or smart phone Why you should care ● Go...
pdf
© NCC Group 2021. All rights reserved Sleight of ARM: Demystifying Intel Houdini Brian Hong @im_eningeer whoami © NCC Group 2021. All rights reserved Brian S. Hong (@im_eningeer) • Hardware Enthusiast • Forward Reverse Engineer • Like to reverse low-level stuff and break embedded systems • Android Penetration Testing •...
pdf
Samsung Pay Tokenized Numbers, Flaws and Issues About Me Salvador Mendoza (Twitter: @Netxing) ● Researcher o Android apps and tokenization mechanisms. ● College student o A. S. Computer Science o Computer Network Administration Certificate o Computer Programming Specialist Certificate Agenda ● Terminology ● Tokenized ...
pdf
2022MRCTF-Java部分 2022MRCTF-Java部分 总结 Springcoffee -- Kryo反序列化、绕Rasp 思路分析 具体利⽤过程(Payload构造过程) 绕Rasp EzJava -- Bypass Serialkiller 解读环境 Bypass FactoryTransformer Java_mem_shell_Filter Java_mem_shell_Basic 总结 总的来说是⼀次⾮常不错的⽐赛,这⾥也会简单列出考点⽅便查阅学习,不难有点引导性质 Ps:此次⽐赛都是不出⽹,所以都需要内存马,内存马部分不做讲解很简单百度搜搜 下⾯这两题挺不错的也学到了东西,题⽬做了备份,核⼼代码(exp)也放...
pdf
在v2ex看到一个项目《给女朋友生成一个聊天年度报告》 https://github.com/myth984/wechat-report ,尝试做了一个后觉得挺好玩,想到之前做的小8机器人加了很多安全群,能否给这些群统计一下做个报 告呢? 数据提取 说干就干,原项目使用ios导出数据的功能获取数据,感觉有点麻烦,小8机器人运行在windows的Pc微 信上,直接从Pc微信把数据脱出来就行了。 PC微信的数据库是sqlite,但是加密了,参考 https://bbs.pediy.com/thread-251303.htm 从内存中提 取 key 进行解密,就能得到数据库了。 微信群摸鱼报告 把开源项目的前端简单修改了一下,为小8加的...
pdf
Specifications Defcon 21 Development Debian v6, RCP100, and Kernel Module Software Deployment RouterBoard (RB450G) with case Hardware - Open-WRT Operating System - idguard Kernel Module
pdf
Attacking .Net at Runtime By Jonathan McCoy Abstract This paper will introduce a high level attack that can control a live .NET program. This attack is a payload to be deployed after opening a backdoor inside of a target .NET application. Also basic information on delivery methods is included. This pape...
pdf
大可(Dark) iOS軟體逆向工程應用 & 手機遠程監控技術 經歷  PHATE Security- 創辦人  Zuso Security - 成員  Chroot - 成員  吉瑞科技 - R&D  網駭科技 - R&D  某警調單位 - 外聘顧問  資策會 - 教育訓練講師  中科院 - 教育訓練講師 內容簡介  iOS 軟體逆向工程應用  IAP (In-App-Purchases) 破解技術  遊戲作弊引擎設計  iOS遠程控制軟體設計 謹以此紀念Steve Jobs iOS 軟體逆向工程技巧 iOS APP簡介  執行檔格式  Mach-O  組合語...
pdf
Practical Aerial Hacking & Surveillance Glenn Wilkinson SensePost DefCon 2014 @glennzw Glenn Wilkinson @glennzw SensePost.com @glennzw @glennzw @glennzw Practical Aerial Hacking & Surveillance? @glennzw Hacking? @glennzw Aerial? @glennzw Surveillance? @glennzw Practical? @glennzw Why oh why bring “drones” into ? @gl...
pdf
Automated PIN Cracking Justin Engler Paul Vines Senior Security Engineer Security Engineering Intern iSEC Partners iSEC Partners • Current PIN Cracking Methods • Cracking with Robots • R2B2 • C3BO • Defeating the Robots Agenda • One of the most popular ways to lock mobile devices • Commonly still only 4-...
pdf
Inside  Flash:  Flash  Exploit   Detec4on  Uncovered Ga1ois  &  Bo  Qu About  us •  Security  Researchers  in  PANW •  Work •  IPS •  APT  Detec=on •  A>er  work •  Vulnerability  discovery •  Exploit  technique  researching Agenda •  Iden=fy  (Possible)  Exploit •  Stop  Exploit...
pdf
Steinthor Bjarnason Jason Jones Arbor Networks The call is coming from inside the house! Are you ready for the next evolution in DDoS attacks? 2 The Promises of IoT • The Promise of IoT • More personalized, automated services • Better understanding of customer needs • Optimized availability and use of resources •...
pdf
Untrustworthy Hardware And How to Fix It PRESENT DAY. PRESENT TIME ⌷ - ##FPGA, ##crypto and #openRISC on Freenode - Shorne and Olofk from #openRISC (hardware and cross-compilation help) - PropellerGuy (Parallax Propeller open-source IO interface) - Briel Computers’ PockeTerm project - Maitimo, International...
pdf
1 内存取证 在HW排查发现可疑进程 python 使⽤find命令进⾏全盘搜索并没有发现相关⽂件," python "应该是运⾏在内存之中,但是我 们没有原⽂件,我们如何进⾏分析 使⽤ cat /proc/pid/maps 命令查看⽂件在内存之中的情况,可以看到⽂件被删除之前存 在与路径: /tmp/.ICE-unix/python 发现 /tmp/.ICE-unix/python 有nohup⽂件,查看nohup.out⽂件并没有发现什么线索 现在没有原⽂件,只有⼀个进程,我们可以通过使⽤gdb把内存dump出来进⾏分析 然后就是gdb命令(我也不知道该dump多少,dump⼀⼤块内存) Bash 复制代码 ...
pdf
1 Julian Grizzard DEFCON 13 Surgical Recovery from Kernel-Level Rootkit Installations Linux Based Systems Julian Grizzard July 2005 DEFCON THIRTEEN 2 Julian Grizzard DEFCON 13 Latest Slides and Tools PLEASE DOWNLOAD THE LATEST SLIDES AND TOOLS [ Latest slides available ] http://www.ece.gatech.edu/research/labs/nsa/pres...
pdf
【漏洞⽇记】深X服还没完,通达OA⼜搞RCE漏洞【OA V11.6】 Agan ' 338 收藏 1 原⼒计划 分类专栏: Web常⻅漏洞篇【免费】 ⽂章标签: 通达OA RCE 2020-08-19 02:47:07 版权 当你的才华 还撑不起你的野⼼时 那你就应该静下⼼来学习 ⽬录 0x01 通达OA V11.6 源码下载与安装 0x02 前⾔ 0x03 复现漏洞 EXP 脚本 0x04 通达OA V11.5和V11.7 版本⽆法复现该漏洞过程 本次漏洞复现,只测试了三个版本: 通达 OA V11.7 (最新) 通达 OA V11.6 通达 OA V11.5 订阅博主 关注 点赞 3 评论 2 分享 收藏 1 ⼿机看 打...
pdf
{Anthony Lai, Benson Wu, Jeremy Chiu}, Founder and Security Researcher, Xecure Lab anthony.lai@xecure-lab.com benson.wu@xecure-lab.com jeremy.chiu@xecure-lab.com http://blog.xecure-lab.com Chroot Security Group http://www.chroot.org/  CHROOT 成立於西元2004年,是台灣一群專 業、優質又玉樹臨風的好孩子組成的。 (會員招募中,目前團報另有優惠) Xecure L...
pdf
NCC Group Whitepaper Secure Messaging for Normal People July 20, 2015 – Version 1.0 Prepared by Justin Engler — Principal Security Consultant Cara Marie — Senior Security Consultant (Diagrams) Abstract "Secure" messaging programs and protocols continue to proliferate, and crypto ex- perts can debate their minutiae, but...
pdf
UFOs and Government: A Historical Inquiry What a UFO is not. What a UFO ... is. The modern era of UFOs begins in the 1940s. It begins with "foo fighters" over Germany and Japan in 1944. Military pilots reported objects like these: Date: September 25, 1947 From: Lt. General Nathan Twining To: Commanding General ...
pdf
Spectra New Wireless Escalation Targets Jiska Classen Secure Mobile Networking Lab - SEEMOO Technische Universität Darmstadt, Germany Francesco Gringoli Dept. of Information Engineering University of Brescia, Italy 2 Motivation 3 When you got Bluetooth on-chip RCE... 35C3 Talk: https://media.ccc.de/v/35c3-9498-dissec...
pdf
Microservices and FaaS for Offensive Security Ryan Baxendale $ whoami Ryan Baxendale Penetration Tester Centurion Information Security Pte Ltd - www.centurioninfosec.sg Singapore twitter.com/ryancancomputer github.com/ryanbaxendale linkedin.com/in/ryanbaxendale Servers are dead... “Serverless” Jan 2015 - AWS Lambda P...
pdf
程聪 阿里云安全-系统安全专家 基 于 硬 件 虚 拟 化 技 术 的 新 一 代 二 进 制 分 析 利 器 自我介绍 现就职于阿里云安全-系统安全团队 主要研究方向: • 病毒检测 • 主机安全 • 内核安全 • 虚拟化安全 • 二进制攻防 演讲内容 • 背景介绍 • QEMU/KVM简介 • 无影子页ept hook • 虚拟化调试器 • 内核级trace • 总结 背景介绍 大家先来看下左边这张图片,搞内核安全的应该不陌 生。windows x64内核引入patchguard后,对内核 敏感部分,进行patch、hook,修改msr、IDT表等 操作,都会触发蓝屏 从PatchGuard谈起 但是有很多场景还是需要对内核进行...
pdf
Blog HTTP请求走私 2020-07-22 · Web漏洞 聊HTTP请求走私之前,需要先思考一个问题:HTTP请求如何标识一个请求的结束(尤其是POST请求) 一种是通过 Content-Length 请求头 的值界定请求体的长度,另一种是在分块传输时,通过 Transfer- Encoding: chunked 请求头与请求体最后一行的 0\r\n\r\n 来标识该请求的结束(不计入请求体长度) 按照HTTP/1.1规范标准,这两种请求头同时存在时应该忽略 Content-Length 而以分块传输为准,但是对于 反代链中的多个服务器而言,可能有些并不支持分块传输请求头、有些对于标准规范的实现并未足够精细, 在处理...
pdf
Room for Escape: Scribbling Outside the Lines of Template Security 1 Alvaro Muñoz @pwntester Staff Security Researcher Oleksandr Mirosh @olekmirosh Security Researcher 2 Content Management Systems (CMS) ● A CMS is an application that is used to manage web content ● Allows multiple contributors to create, edit an...
pdf
Rep.%Jim%Langevin D-Rhode(Island,(2nd District US%House%of%Representatives @JimLangevin Rep.%William%Hurd R-Texas,(23rd District US%House%of%Representatives @HurdOnTheHill Bridging'the'Gap'Between'DC'and'DEF'CON #DC2DEFCON Joshua%Corman Founder,(I(Am(The(Cavalry Director,(Cyber(Statecraft(Initiative Atlantic%Council @j...
pdf
Marina Krotofil, Jason Larsen DefCon 23, Las Vegas, USA 07.08.2015 Rocking the Pocket Book: Hacking Chemical Plants for Competition and Extortion Who we are Hacker (Ex)Academic Got hooked on cyber- physical hacking Dragged into academic world against own will Motivation Industrial Control Systems Industrial Control ...
pdf
How  to  Train  Your  RFID  Tools Craig  Young Security  Researcher  @  Tripwire  VERT About  Craig   Security  Researcher  in  Tripwire  VERT   Author  of  IP360  content  and  original  research   Identified  100+  CVEs  over  2013  &  2014   Won  1st  S...
pdf
Hacking The Future: Weaponizing the Next Generation James Arlen, Leigh Honeywell, James Costello, Tiffany Rad, Tim Krabec DEF CON 18 - Las Vegas Disclaimer We've got jobs and stuff. This is not our job. Mostly, the lovely people we work for don't talk like this. We do sometimes because it's the right thing to do...
pdf
August 4-7, 2016 1 2 3 4 5 6 7 8 9 10 11 12 Exploit Mitigation Techniques on iOS Max Bazaliy A Journey Through August 4-7, 2016 About me 1 2 3 4 5 6 7 8 9 10 11 12 o  From Kiev, Ukraine o  Staff Engineer at Lookout o  Focused on XNU, Linux and LLVM internals o  Interested in jailbreak...
pdf
主办方 赞助商 “双传统”物流安全成长分享 张天宇 目录 01 观现状 02 看成果 03 搞事情 04 干正事 安全行业现状: 金融、党政公检法 区块链、互联网 文化、食品等 传统物流、制造、医疗 业务型 监管型 低迷型 传统型 监管强 投入高 上汽安吉物流: 汽车及装备 供应链 解决方案 社会化快运 智能与信息 国际物流 供应链金融 ¥ 整车物流 装备物流 航运物流 口岸物流 零部件物流 非汽车物流 零部件预装 双传统面临的困局: 1、业务没有安全压力 (无驱动,无监管) 2、领导层不关心安全 (无投入、没资源) 3、国企老员工 (不支持、不配合、别麻烦、没好处免谈) 目录 观现状 02 看成果 03 搞事情 04 干正事 01...
pdf
IP Law Copyright DMCA Trademark Patent Trade Secret Copyright - Definition Copyright protects "original works of authorship, fixed in a tangible medium of expression". In the following categories: literary, musical, dramatic, choreographic, pictorial, sculptural, audiovisual, sound, architectural. Not in ...
pdf
Open Data Source Analysis Daniel “whopis” Burroughs daniel.burroughs@gmail.com About me... ● Research Professor ● University of Central Florida ● College of Engineering ● College of Health and Public Affairs ● Associate Technology Director ● Center for Law Enforcement Technology, Training & Research (LETTR) Related ...
pdf
Greg Conti Interface Design for Hacking Tools original image: http://www.daveyandgoliath.org/ Disclaimer The views expressed in this article are those of the author and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defens...
pdf
file:///D|/Work%20Related/DEFCON/presentations/dc-17-presentations/defcon-17-cough-references.txt Confidence Game Theater References Puzzlers' Tribute edited by David Wolfe and Tom Rodgers (2002) containes a chapter by William Kalush called Sleight of Hand with Playing Cards prior to Scot's Discoverie. This chapter in...
pdf
dalfox源码学习 在信息流上看到有人star这个项目,dalfox是一个基于golang的xss扫描器,介绍说基于golang/DOM parser。 好像以前就看过这个项目,但是忘了大概,今天看到有人star了这个项目,于是好奇的又看了看,看到 它的简介,基于DOM parser以为很厉害,看了源码才发现,当初忘了这个项目,就是因为它很一般, 还是用的批量payload打,从返回页面找payload那一套,虽然找的方法改进了一下,每个payload都包 含一个class,直接用css语法找 .dalfox 的标签判断,但检测一个参数还是要发很多payload,不符合 现在的xss扫描逻辑了。 但我还是写一下它的源码学习,说说...
pdf
1 route分析 2022年5⽉21⽇15:07:15 最近在重构优化stowaway的代码,之前没有细看的header结构体的route字段的作⽤,实际上这个字段 就是⽤以实现多级代理中,和每个节点的通信的重要参数。 ⼀般来说,不管是哪个node,发送消息给admin,Route⼀般只要设置成TEMP_ROUTE。当然Sender和 Accepter是⽤来判断发送者和接收者的UUID。 ⽽这⾥不需要Route,是因为每个node只会有⼀个上游node和多个下游node,所以你发送给上游node 的时候,并不会迷路,只有⼀条路通往admin 2 ⽽admin发送消息给某个多级node的时候,就需要路由帮忙了,虽然Sender...
pdf
HIT2006 HIT2006 Spyware Detection : Spyware Detection : Automated Behavior Analysis System Automated Behavior Analysis System Birdman Birdman 2006 2006--07 07--16 16 XX--Solve Solve Automated Behavior Analysis Approach, Birdman, HIT2006 Automated Behavior Analysis Approach, Birdman, HIT2006 2 Abstract Abstract ...
pdf
Prisma by Palo Alto Networks | Kubernetes Privilege Escalation: Excessive Permissions in Popular Platforms | White Paper 1 Kubernetes Privilege Escalation: Excessive Permissions in Popular Platforms 2 Prisma by Palo Alto Networks | Kubernetes Privilege Escalation: Excessive Permissions in Popular Platforms | White...
pdf
1 dradis Framework dradis Framework sharing information will get you root http://dradisframework.org/ Daniel Martín Gómez etd@ngssoftware.com august 2009 2 dradis Framework dradis Framework sharing information will get you root Daniel Martín Gómez etd@ngssoftware.com august 2009 http://dradisframework.org/ ...
pdf
10505 Judicial Drive, Suite 201 | Fairfax, VA 22030 | V: 703.352.2982 | F: 203.286.2533 | sales@kryptowire.com Vulnerable Out of the Box: An Evaluation of Android Carrier Devices Abstract Pre-installed apps and firmware pose a risk due to vulnerabilities that can be pre-positioned on a device, rendering the devi...
pdf
Internal Server Error: Exploiting Inter-Process Communication in SAP's HTTP Server Martin Doyhenard Security Researcher @ Onapsis ● Business Processes software ○ Operations ○ Financials ○ Human Capital ○ Customer Relationship ○ Supply Chain ● Over 400,000+ Customers (90% Fortune-500) ● Based on Web Services through...
pdf
Mobile privacy: Tor on the iPhone and other unusual devices Marco Bonetti <mbonetti@cutaway.it> May 2, 2010 Abstract Tor is a software project that helps you defend against traffic analy- sis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, an...
pdf
@Y4tacker 对Java反序列化脏数据绕WAF新姿势的补 充 引⾔ 相信⼤家都看过回忆飘如雪⼤师傅的⼀篇⽂章,Java反序列化数据绕WAF之加⼤量脏数据, 在这篇⽂章当中⼤师傅提出了通过将gadget加⼊到集合类型从⽽可以实现添加脏数据,这⾥我 发现了⼀个新姿势 灵感也是来源于回忆飘如雪⼤师傅的另⼀篇⽂章的⼀个⼀笔带过的问题上 这原本是⼤师傅想来搞gadget探测的⽅案,但是却失败了,但本着专研的⼯匠精神,我对这个 问题进⾏了深⼊的研究,这⾥顺便对这个问题解读 为什么这⾥第⼀个属性反序列化失败,仍然触发了URLDNS的整个 过程 顺便这⾥多提⼀嘴,为什么之后⼤师傅提出的直接将URLDNS中的HashMap的键值对中将key 或...
pdf
Estimates of Optical Power Output in Six Cases of Unexplained Aerial Objects with De®ned Luminosity Characteristics1 JACQUES F. VALLEE 1550 California St. #6L, San Francisco, CA 94109 Abstract Ð An analysis of six cases of unexplained aerial phenomena ob- served by qualified observers over a twenty-year period in vario...
pdf
CAPTCHAs: Are they really hopeless? ( Yes ) Completely Automated Public Test to tell Computers and Humans Apart Why? Protect from automated abuse. Examples The Problem • Really hard for a computer • Hard for a person • So they can’t be too hard CAPTCHA Breaking • Is it worth it? • $$ value per CAPTCHA solved • Retool...
pdf
One Step Before Game Hackers -- Instrumenting Android Emulators  Defcon 26 nevermoe © DeNA Co., Ltd. Self Introduction • nevermoe (@n3v3rm03, i [at] nevermoe.com) • Chinese in Japan • Security engineer in DeNA Co., Ltd. • Love playing / hacking games ...
pdf
Security Art | August 2011 www.security-art.com Itzik Kotler, Chief Technology Officer Iftach Ian Amit, VP Consulting Sounds Like Botnet Intro to VoIP • It’s everywhere – Home (Vonage, Skype, TeamSpeak, Comcast, etc…) – Office (Cisco, Avaya, Lucent, Asterisk, etc…) • Easy to deploy – Most are “plug and talk”...
pdf
#BHUSA @BlackHatEvents Better Privacy Through Offense: How To Build a Privacy Red Team Scott Tenaglia Engineering Manager, Privacy Red Team, Meta #BHUSA @BlackHatEvents Information Classification: General Agenda 01 The Case for Offensive Privacy 02 Security and Privacy 03 Meta’s Privacy Red Team 04 Operations Ideas 0...
pdf
1 F5C web 0x00 0x01 0x02 ​ 2 string ​ ​ ​ ​ ​ 3 ​ ​ ​ ​ 4 ​ ​ ​ ​ ​ ​ 0x03 ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ 0x04
pdf
HiveNightmare/SeriousSAM本地权限提升 0x00 背景介绍 微软发布一个CVE-2021-36934的问题,在Twitter上有点火,不长的时间github就出现了很多poc项目, 我想原因是原理简单,操作方便,危害严重,极具实用性。 同时在朋友圈看见@daiker同学,结合他们小伙伴对setntml和changentml的分析文章,使得这个小小 的acl问题发挥出巨大价值。 闲话不多说,直接上操作(想读原理的同学,可以跳到0x02,只想知道怎么操作的同学,接着读) 0x01 工具操作 据老外研究显示影响版本:(这个我没有验证) WIN 10 1809 及以上有危害 WIN 10 1803 及以下无危害 工具1...
pdf
“Intelligence” by Susan Hasler (Thomas Dunne Books. St. Martin’s Press: New York 2010) A review by Richard Thieme There is enough white-hot rage in this book to steam a skunk. Take that as a compliment. Twenty-one years at the CIA in diverse capacities would generate post-traumatic stress in anyone, but not many c...
pdf
1 Looking Into The Eye Of The Meter Don C. Weber InGuardians, Inc. Copyright 2012 InGuardians, Inc. 2 Copyright 2012 InGuardians, Inc. Cutaway and InGuardians http://www.linkedin.com/in/cutaway http://inguardians.com/info 3 Copyright 2012 InGuardians, Inc. Smart Meter Research Findings REDACTED ...
pdf
Trust Dies in Darkness: Shedding Light on Samsung’s TrustZone Cryptographic Design Alon Shakevsky, Eyal Ronen, Avishai Wool Extended paper: https://eprint.iacr.org/2022/208.pdf Tool + PoC: https://github.com/shakevsky/keybuster @shakevsky @eyalr0 yash@eng.tau.ac.il 3 academic researchers The leading Android Vendor Wha...
pdf
LionBug @ HITCON-CMT About Me ● a.k.aLionBug ● Co-founder of UCCU ● Know a little ● Web Security LinkedIn http://thehackernews.com/2016/05/linkedin-account- hack.html LinkedIn 17 wooyun /show.php?id=xxxxx A B C D Admin ASUS Cloud (0day?) /webrelay/directdownload/xxxxxxxx/? dis=xxxx&fi=2040452 ASUS Cloud (0day?) XSS Ha...
pdf
CONTAINER ESCAPE IN 2021 关于我 l 基础设施安全工程师 @蚂蚁集团 l 安全研究与研发 l Linux 内核/虚拟化/容器/底层安全 l HITB, CanSecWest, Syscan360… 目录 l 容器逃逸简介 l 新的容器逃逸方法 l 防御方法 1. 容器逃逸简介 容器简介 l Docker诞生于2013年,OS层的虚拟化技术 l 应用级别的抽象 l 轻量,标准,隔离 Docker简介 l namespaces:隔离 l cgroups: 资源控制 l UnionFS:镜像共享与分发 容器安全 l 天下没有免费的午餐:性能 vs 安全 l 容器与宿主机弱隔离 l 共享同一个内核 容器逃逸类型 l ...
pdf
关于Xdebug3的一些记录 因为周末升级了下phpstorm,发现最新版的phpstorm支持的是xdebug3,所以记录了一下调试 xdebug3的一些东西。 环境 windows phpstorm 2020.3 xdebug3 配置 1. 去xdebug官网下载对应的版本:https://xdebug.org/download,并把dll文件复制到php的ext文 件夹下 2. 接着在php.ini下添加以下配置: 这里就是一个踩坑点,以上是xdebug3的配置语法。因为xdebug3和xdebug2配置的语法有改进,并且 默认端口从9000变成了9003,网上大多都是xdebug2的配置: 如果按xdebug2的配置的话会报...
pdf
1 Weaponizing Unicode: Homographs Beyond IDNs 2 Who Am I The Tarquin (aka Aaron M Brown) Senior Security Engineer Amazon.com 3 Disclaimers 4 5 WTF, Why? “The human race will begin solving its problems on the day that it ceases taking itself so seriously.” - Malaclypse the Younger 6 Scope, Context, and Prior Art http...
pdf
安卓APP在各种场景下的调试总结 前言 做此项工作的原因在于笔者之前在CTF比赛中遇到Android逆向类型的题目时,因为只有一个安卓手机作 为主力机,出于安全考虑以及手机厂商限制通常很难获得root权限,再比如使用模拟器则通常面临x86 环境下调试arm native模块的困难,常常因为调试问题困扰很久,于是下定决心折腾一番,希望能对各 位在各种不同限制条件下能够对安卓APP进行调试有所帮助,其中难免遗漏或错误之处也欢迎各位师傅 指正。 如何动态运行待调试的APP 想要调试一个安卓APP,首先最基本的就是要具备一个可以将其动态运行起来的环境,这个环境整体上 可以分为模拟器环境和真机环境。 模拟器 模拟器方面大致是有三种不同的选择,...
pdf
目 录 版权信息 版权 内容提要 历史回眸 第2版前言 第1版前言 资源与支持 第一篇 绪 论 第1章 软件调试基础 1.1 简介 1.1.1 定义 1.1.2 基本过程 1.2 基本特征 1.2.1 难度大 1.2.2 难以估计完成时间 1.2.3 广泛的关联性 1.3 简要历史 1.3.1 单步执行 1.3.2 断点指令 1.3.3 分支监视 1.4 分类 1.4.1 按调试目标的系统环境分类 1.4.2 按目标代码的执行方式分类 1.4.3 按目标代码的执行模式分类 1.4.4 按软件所处的阶段分类 1.4.5 按调试器与调试目标的相对位置分类 1.4.6 按调试目标的活动性分类 1.4.7 按调试工具分类 1.5 ...
pdf
Hackerspaces: The Legal Bases nicolle neulist (rogueclown) DEFCON 17 August 2, 2009 a little about me ● attorney in Illinois ● founding member of Pumping Station: One in Chicago ● attorney for Pumping Station: One topics for this talk ● making your hackerspace a real legal entity ● special considerations for nonpro...
pdf
 "!#%$'&)(* !+-,.$/(0$/21 3452,.16)78!#%$'&9(:<;#(- =?>@$/(01A 1@BC>D- 1A3"FE?* GIHKJ%LNM=OQPQRSUTVRXWZYU[\PI]_^`[a[\JUb`cdRXecfS:ghRfiFOQekjkHXPQJ*RX^ lRm^`imRX^ne#oVJUOpiX[a^nb`Opc.L qsrXtvuxwyrUz{\r}|Z~QX€dZƒ‚*u'mz„ZZ…Z|Z~'†X‡‰ˆ}wŠ‚2rX€}z‹*…Z|ŒsŽy‹rX€t}rX€n†%...
pdf
DEF CON 19 Malware Freakshow 3: They're pwning er'body out there! Nicholas J. Percoco & Jibran Ilyas Copyright Trustwave 2011 Agenda •  Introduction •  Evolution of Malware •  Sample Analysis + Victim + Demo •  Sample SL2010-161 – Kameo (Grocery Store) •  Sample SL2011-014 – Memory Dumper (Bar) •  Sample SL...
pdf
Attacking Oracle with the Metasploit Framework defcon 17 Who Are We? Chris Gates <cg [@] metasploit.com> What pays the bills Pentester for Security Blogger http://carnal0wnage.attackresearch.com Security Twit Carnal0wnage Want more? Chris Gates + carnal0wnage + maltego  Who Are We? Mario Ceballos <mc [@...
pdf
Triton and Symbolic execution on GDB bananaappletw)@)DEF)CON)China) 2018/05/11) $whoami •  Wei-Bo)Chen(@bananaappletw)) •  MS)major)in)CSE,)Chiao)Tung) University,)Hsinchu) •  Organizations:) •  Software)Quality)Laboratory) •  Co-founder)of)NCTUCSC) •  Bamboofox)member) •  Specialize)in:) •  symbolic)execution) •  bi...
pdf
1 / 111 DAVIX The Data Analysis and Visualization Linux® Version 0.5.0 Authors: Jan P. Monsch, jan döt monsch ät iplosion döt com Raffael Marty, raffy ät secviz döt org 2 / 111 Contents 1. DAVIX - Visualize Your Logs!..........................................................................4 1.1. Introduct...
pdf
Digital Active Digital Active Self Defense Self Defense DEFCON 12 DEFCON 12 OUDOT Laurent OUDOT Laurent oudot oudot@ @rstack rstack.org .org http://www. http://www.rstack rstack.org/ .org/oudot oudot// Some references • Active Defense research project, Dittrich – http://staff.washington.edu/dittrich/ad/ • Defending you...
pdf
The mechanics of compromising low entropy RSA keys Austin Allshouse This talk is about... Nominally: Recovering private keys from a subset of vulnerable RSA certificates Functionally: Calculating shared factors across large batches of integers “...using our scalable GCD algorithm for shared factors...” “...batch GCD...
pdf
优雅的使⽤Dnslog平台 0x01 强迫症难受的需求点 在可⽤的 dnslog 平台越来越多之后,各种 burpsuite 插件、主动被动扫描满天⻜,去公开的的 dnslog 平台把信息 填过来就没美滋滋的刷洞,但是⼜有⼏个问题: 公开的 dnslog 地址容易被 ban ⼄⽅公司⾃建的 dnslog ⼜不让我⽤ ⾃建的⼜可能被溯源 0x02 癞蛤蟆想吃天鹅⾁ 就没有可能⼜稳定、⼜不怕溯源、⼜不被 ban 吗,接着这个想法找到了⼀种⽩嫖别⼈的 dnslog 服务器的可能性 Github 上已经有了很多师傅们开发的各种⼀键 dnslog 平台,观摩了⼏个后发现⼤部分的⾯板加上了token或者密 码验证,找到了也没办法嫖 摸了⼀圈之后...
pdf
1 Attacking BaseStations Hendrik Schmidt <hschmidt@ernw.de> Brian Butterly <bbutterly@ernw.de> 2 Who we are o Old-school network geeks, working as security researchers for o Germany based ERNW GmbH o Independent o Deep technical knowledge o Structured (assessment) approach o Business reasonable recommendations o We und...
pdf
云影实验室 1 / 11 .NET 高级代码审计(第四课) JavaScriptSerializer 反序列化漏洞 Ivan1ee@360 云影实验室 2019 年 03 月 01 日 云影实验室 2 / 11 0X00 前言 在.NET 处理 Ajax 应用的时候,通常序列化功能由 JavaScriptSerializer 类提供,它 是.NET2.0 之后内部实现的序列化功能的类,位于命名空间 System.Web.Script.Serialization、通过 System.Web.Extensions 引用,让开发者轻 松实现.Net 中所有类型和 Json 数据之间的转换,但在某些场景下开发者使用 D...
pdf
Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking By Louis Dion-Marcil GoSecure Edge Side Includes (ESI)… what is it? Edge Side Includes (ESI)… what is it? Edge Side Includes (ESI)… what is it? The Weather Website Forecast for Monday Tuesday Wednesday Montréal 27°C 23°C 31...
pdf
Identifying, Exploring, and Predicting Threats in the Russian Hacker Community Dr. Thomas J. Holt Michigan State University holtt@msu.edu Dr. Max Kilger, Spartan Devils Honeynet Project Dr. Deborah Strumsky, UNC-Charlotte Dr. Olga Smirnova, Eastern Carolina University Copyright 2009, all references to this work must...
pdf
Evading next-gen AV using A.I. Hyrum Anderson hyrum@endgame.com @drhyrum /in/hyrumanderson https://github.com/endgameinc/gym-malware Rules for static analysis x1 rule malware { strings: $reg = “\\CurrentVersion\\Internet Settings” condition: filesize < 203K and #reg > 3 } filesize count(-registry-prefix) Next-gen AV ...
pdf
⾸⻚ ⽹络安全 移动安全 招聘信息 English «NSA和FBI联合曝光俄罗斯开发的Lin... HW防守 | 如何做⼀名优秀的监控/研判... » HW前的礼盒:通达OA 0day请查收 2020-08-16 22:08 即将迎来安全圈内的⼀场博弈,由于2015以及2017版本已不在更新且在补天平台通 达专属⼚商也不再收低版本的漏洞,我决定在正式开始之前公布通达OA⼀些历史遗 留问题,下⾯公布的"0day"在官⽹最新版本(2019)中已经修复。⼀些官⽅还未审 核、未在最新版中修复的漏洞,会在后续修复后持续更新检测⼯具。 ADS 随机推荐 四川省某市政府信息公开系统漏洞导致 敏感内容泄露(影响⼏⼗个部⻔) 知道创宇为“湖湘杯”安...
pdf
ICS 点击此处添加中国标准文献分类号 备案号: 中 华 人 民 共 和 国 行 业 标 准 XX/T XXXXX—XXXX 研发运营一体化(DevOps)能力成熟度模 型 第 5 部分:应用设计 The capability maturity model of DevOps Part 5: Application Design 点击此处添加与国际标准一致性程度的标识 (征求意见稿) - XX - XX 发布 XXXX - XX - XX 发 布 XX/T XXXXX—XXXX I 目录! 前言.................................
pdf
MASTER THESIS Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Engineering at the University of Applied Sciences Technikum Wien – Degree Program IT-Security Variation analysis of exploitable browser vulnerabilities By: René Freingruber, BSc Student number: 1...
pdf
This document and its content is the property of Airbus Defence and Space. It shall not be communicated to any third party without the owner’s written consent | [Airbus Defence and Space Company name]. All rights reserved. Auditing 6LoWPAN networks Using Standard Penetration Testing Tools Adam Reziouk Arnaud Lebru...
pdf
Confidential to SEWORKS Copyright ©2013 SEWORKS Inc. All rights reserved. Android Hooking Attack SEworks Hong Brothers Minpyo Hong, Dongcheol Hong hinehong@seworks.co.kr 2 • SEWORKS Co., Ltd – SEworks is a company created by a hacker. – Main areas of mobile security, and Android, Windows App protected areas,...
pdf
Taking Kerberos To The Next Level James Forshaw | @tiraniddo ● Researcher @ Google Project Zero ● Specialize in Windows ○ Local Privilege Escalation ○ RPC/COM Internals ○ Token manipulation ● NtApiDotNet | D2J | OleViewDotNet “Never met a logical vulnerability I didn’t like.” Nick Landers | @monoxgas ● Adversarial R&...
pdf
Watching the Watchers Target Exploitation via Public Search Engines mail://johnny@ihackstuff.com http://johnny.ihackstuff.com what’s this about?  using search engines to do interesting (sometimes unintended) stuff  sp3ak l1ke l33to hax0rs  act as transparent proxy servers  sneak past security  find development ...
pdf
Personal Survival Preparedness Copyright 2009 Steve Dunker Las Vegas Survival Scenario • Aug 1st 2009 -- 2 Million People • Dec 1st 2009 – 100,000 people • Can you Survive? Basic Survival Needs •Air •Water •Food •Enviroment Detailed Basic Needs • “The physiological needs include the needs we have for oxygen, water, pr...
pdf
Traps  of  Gold Michael  Brooks  &  Andrew  Wilson Cau.on.  Please  vet  anything discussed  with  legal  and management. FRUSTRATION http://www.flickr.com/photos/14511253@N04/4411497087/sizes/o/in/photostream/ Our  en.re  defense  strategy  is REACTIVE… AKA,  losing Fixes  ...
pdf
CTF WriteUp By Nu1L Author:Nu1L CTF WriteUp By Nu1L PWN harmoshell harmoshell2 pwn1 RE crash re123 ARM puzzle WEB ezlogin HCIE RW harmofs01 luaplayground01 && luaplayground02 MISC RSP PWN harmoshell echoshellcode from pwn import * import fuckpy3 context.log_level = 'debug' # p = process('./qemu-riscv64 -L ./libs/ ./har...
pdf
0 KaiSong (exp-sky) Tencent Security Xuanwu Lab WHO AM I CONTENTS 1Chakra vulnerability 2Bypass ASLR & DEP 3Bypass CFG 4Bypass CIG 5Bypass ACG 6Exploit 7Q&A The vulnerability was discovered on May 31, 2016. The vulnerability was fixed in February 2017. NativeIntArray struct : NativeIntArrayHead Segment : left length s...
pdf
Exploitation Of Windows .NET Framework Nanika nanika_pan@trend.com.tw 1 I am Nanika 2 • APT ? • No Exploit in .NET? • Only EXE Attack? • always Finds the New Attack TREND • 趨勢始終來自於弱點 .NET Framework 3 .Net framework Security Improvements 4 .NET Architecture 5 WPF • Windows Presentation Fou...
pdf
Don’t Red Team AI like a Chump Ariel Herbert-Voss @adversariel Intro • Who am I? • What is this talk? A story about hacking an AI system IRL + + Key points in this talk (in case you zone out) • Focus on the threat model • Go for the jugular feature extraction process • Think about the data supply chain What is an AI s...
pdf
Steinthor)Bjarnason Jason)Jones Arbor)Networks The$call$is$coming$from$inside$the$house!$ Are$you$ready$for$the$next$evolution$in$ DDoS$attacks?$ • The)Promise)of)IoT • More)personalized,)automated)services • Better)understanding)of)customer)needs • Optimized)availability)and)use)of) resources) • Resulting)in: • Lower)...
pdf