text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
1
The Tor Project
Our mission is to be the global resource for
technology, advocacy, research and
education in the ongoing pursuit of freedom
of speech, privacy rights online, and
censorship circumvention.
2
● Online Anonymity
– Open Source
– Open Network
● Community of
researchers,
developers, users and
relay ... | pdf |
#BHUSA @BlackHatEvents
New Memory Forensics Techniques to Defeat
Device Monitoring Malware
Andrew Case, Gustavo Moreira, Austin Sellers, Golden Richard
#BHUSA @BlackHatEvents
Information Classification: General
Motivation
• Malware that is capable of monitoring hardware devices (keyboards, microphones, web
cameras, e... | pdf |
AirPods客户端异构附件名分析
前⾔
嘶吼发了⼀篇⾏业资讯( https://www.4hou.com/posts/jJAP ),⾥⾯提到AirPods客户端特定附件
名显示不正确问题,攻击者可以让客户端对异常构造的附件名称显示不正确,这种不正确显示会导
致客户端⽤户误打开恶意附件内容。
⽂中也提到影响版本:AirPods客户端3.0.5以上(含),3.1.0.303(不含)以下版本。
所以我们就根据披露的这点⽂字信息,来分析下该问题吧。
漏洞分析
在下载站找到了⼀个历史版本的安装包(cmclient_3.0.7-155_amd64.exe),安装⼀下即可。
根据已有信息,我们⾸先要明⽩怎样的⽂件名会让⽤户端打开触发,我们... | pdf |
Mac OS X Server
System Image
Administration
For Version 10.3 or Later
034-2348_Cvr 9/12/03 10:21 AM Page 1
Apple Computer, Inc.
© 2003 Apple Computer, Inc. All rights reserved.
The owner or authorized user of a valid copy of
Mac OS X Server software may reproduce this
publication for the purpose of learning to... | pdf |
User Privacy for ISPs and Accidental ISPs
For latest version, please see http://www.eff.org/
User Privacy for ISPs and Accidental ISPs.
The Digital Millennium Copyright Act gives people who claim to own copyrights
tremendous power to invade the privacy of Internet users. With only a clerk’s stamp on a
form, almost any... | pdf |
中通自动化安全运营
演讲人:中通快递 马 辰
Title :中通安全运营负责人
中通安全运营介绍
中通自动化安全运营 - DevSecOps
中通安全赋能
中通安全运营的未来
目录
中通安全运营介绍
中通安全运营介绍
安全合规
中通安全
安全运营
安全测试
安全开发
安全运维
主动防御型,完成体系
建设后开始搭建安全自
动化平台,安全可视化
后,可以快速准确地感
知安全威胁并进行自动
响应和处理,对安全威
胁主动出击。
安全自动化平台建设
需求驱动型,经历过
不断的救火后,从基
础安全开始重点解决
安全需求中优先级最
高的安全问题。
基础安全建设
主动建设型,完成基
础安全建设后开始建
设完整的安全体系,
主要是为了最大化地
发... | pdf |
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Getting the goods with smbexec
Eric Milam – Brav0hax
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights R... | pdf |
The Darknet of Things
Building Sensor Networks to do our bidding.
Introductions
Anch - anch@subba.net @boneheadsanon
Omega - omega@omegacs.net
The Internet of Things
Things...
No, Not your fridge.
An Internet of things, not things on the Internet.
Sensor Networks
What are they
What they (are supposed to) do
What they a... | pdf |
PHISHING WITHOUT FAILURE AND
FRUSTRATION
or “How I learned to stop worrying and love the layer 8”
Unabridged Version
Jay Beale
CTO, InGuardians
1
Larry Pesce
Director of Research, InGuardians
"""
▪ As white hats, phishing should be just as easy as for black hats, right?
• Write a crafty e-mail that directs readers t... | pdf |
某付宝登录js分析
收录于合集
#JS逆向
4个
aHR0cHM6Ly93d3cuYWxpcGF5LmNvbS8=
f12 network
Ctrl+Shift +F 局搜索需要解密的password关键字
2021-09-18 19:22
原创
不愿透露姓名的热⼼⽹友 ⼀位不愿透露姓名的热⼼⽹友
多次调试后最终在index.js中的393⾏找到getPassword的⽅法,转⽽搜索getPassword声明
位置;在index.js中4979⾏地⽅找到声明信息。
然后下断点,对⽐发包请求内容,发现n的内容password字段信息内容⼀⾄,⽽n是
e.alipayEncrypt(2,i,t)传过来的,所以只需要
由此可得:
1
r... | pdf |
________________________________________________________________________
14 March 2008
Comparison of File
Infection on the Windows
and Linux
Disclaimer:
The author of this document is not responsible of any kind of damage that could be
made with the bad use of this information. The objective of this paper is for
ed... | pdf |
Konstantinos Karagiannis
CTO, Security Consulting
@konstanthacker
ethereum is not bitcoin
“The key component
is this idea of a
Turing-complete
blockchain”
--Vitalik Buterin
smart contracts
literally a billion reasons
30 million reasons will do
caveats
solidity
dev tools
• .sol files > bytecode > blockchain
• Atom w... | pdf |
在ADCS中,错误配置会导致普通域用户到域管理员的提权。主要体现在证书模板这里,在
证书模板中,我们可以设置应用程序的策略。
我们比较关心的如下:
1
Client Authentication (OID 1.3.6.1.5.5.7.3.2)
2
PKINIT Client Authentication (1.3.6.1.5.2.3.4)
3
Smart Card Logon (OID 1.3.6.1.4.1.311.20.2.2)
4
Any Purpose (OID 2.5.29.37.0)
这些可以使得我们拥有请求票据的功能,然后就是SAN的模拟,SAN允许我们使用UPN来
指定用户,来达到用户模拟的目的。
其LDAP查询语句... | pdf |
MoreFind
⼀款⽤于快速导出URL、Domain和IP的⼩⼯具
快速安装
⽅式⼀: 通过Go包管理安装
⽅式⼆: 直接安装⼆进制⽂件
⽅式三: 本地编译
⽤法说明
1)帮助信息
go install github.com/mstxq17/MoreFind@latest
wget --no-check-certificate
https://ghproxy.com/https://github.com/mstxq17/MoreFind/releases/download/v1.0.2/MoreFi
nd_1.0.2_`uname -s`_`uname -m`.tar.gz
tar -xzvf MoreFind_1.0.2_... | pdf |
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits
Involving Redirection of the System Call Table
John Levine, Julian Grizzard, Henry Owen
School of Electrical and Computer Engineering
Georgia Institute of Technology
E-mail: levine@ece.gatech.edu
Abstract
There is no standardized methodology... | pdf |
Project “The Interceptor”
Avoiding counter-drone systems with nanodrones
David Melendez Cano
R&D Embedded Software Engineer
Introduction
With massive drone industry growth, comes antidrone systems industry. Due to multiple and even
classic vulnerabilities of communications now used by drones, antidrone industry can ta... | pdf |
Cryptanalysis in real life II
研究團隊 王昶凱 邱弈豪 周立平 鄭振牟
演講者 周立平
1
Total page : 46
綱要
1. Mifare Classic(Crypto1)與Hitag2的介紹
YoYo card in Taipei
2. 攻擊手法和結果概述
3. Extra: Non-NIST ciphers
4. Q&A
2
Crypto1與Hitag2的介紹
NXP 公司所發售的產品 (Mifare Series &
hitag2)
Mifare Classic 系列的智慧卡使用
Crypto1,已售5000萬個MIFARE讀卡機,
50億個tag,使用範圍相當廣泛(地鐵等... | pdf |
#BHUSA @BlackHatEvents
UWB Real Time Locating Systems
Andrea Palanca
Luca Cremona
Roya Gordon
labs@nozominetworks.com
How Secure Radio Communications May Fail in Practice
© 2022 Nozomi Networks Inc.
2
Overview
01
02
03
04
Methodology of Research
Attack Demos
Remediations
05
Summary & Key Takeaways
Introduction
Intro... | pdf |
Adventures in MitM-land
Using MITM to Attack Active Directory Authentication Schemes
About Us
• Senior Engineer @CrowdStrike (Former @Preempt)
• Extensive background as a security researcher
Sagi Sheinfeld (@sagish1233)
• Senior Engineer @CrowdStrike (Former @Preempt)
• Previously presented on Black Hat
Eyal Karni (@ey... | pdf |
Hacking Driverless
Vehicles
Zoz
Origins
Germany
1986
Ernst Dickmanns, VaMoRs
1995: Munich to Copenhagen in regular traffc, up to 175kph, vision only!
Asia
• Singapore: Autonomous bus services scheduled by 2022
• Shanghai: Autonomous bus testing
• Guangzhou: Public road testing since 2018
• Beijing: Baidu testing on 105... | pdf |
HORNECYBER.COM
SECURE PENETRATION
TESTING OPERATIONS:
DEMONSTRATED
WEAKNESSES IN LEARNING
MATERIAL AND TOOLS
PRE-PUBLICATION VERSION FOR CONFERENCE RELEASE | FOR THE FINAL REPORT, INCLUDING CODE AND
DETAILED DESCRIPTION OF THE DEMONSTRATED TOOL, VISIT HORNECYBER.COM
ABSTRACT
Following previous presentations on the... | pdf |
你怎么知道Wappalyzer是不是在骗你?
Wappalyzer插件检测原理
插件是开源的 https://github.com/wappalyzer/wappalyzer
readme中提到会收集cookie,dom,js,css,header等数据,通过既定规则匹配,实现获取信息并匹
配版本
其中js和dom比较特别,这里以js为例分析
https://github.com/wappalyzer/wappalyzer/blob/v6.10.18/src/drivers/webextension/js/content.js
#L36-L42
会插入一个 js/js.js 到前端去执行
https://github.com/wap... | pdf |
©
2012
The
MITRE
Corpora2on.
All
rights
reserved.
No
More
Hooks:
Trustworthy
Detec2on
of
Code
Integrity
AGacks
Xeno
Kovah,
Corey
Kallenberg,
Chris
Weathers,
Amy
Herzog,
MaGhew
Albin,
John
BuGerworth
© 2012 The MITRE Corporation. All rights reserve... | pdf |
Copyright© 2003 Avaya Inc. All rights reserved
Avaya - Proprietary (Restricted) Solely for authorized persons having a need to know pursuant to Company instructions
Stack Black Ops
Black Hat USA 2003
New Concepts for Network Manipulation
Dan Kaminsky, CISSP
Copyright© 2003 Avaya Inc. All rights reserved
2
Avaya - Pr... | pdf |
Goto Payload for Windows
DLL, compiled C
Usually injected into process
memory
Enhanced CMD shell
Provides basic post-
exploitation API
Often run with SYSTEM Privs
Can be migrated into a user’s
process
Railgun is an extension
to the Meterpreter
STDAPI
Allows Arbitrary Loading
of DLLs
A... | pdf |
Warping Reality
Creating and countering
the next generation of
Linux rootkits using eBPF
Pat Hogan
@PathToFile
Overview
●
What are Linux kernel rootkits
●
Why writing and using rootkits is hard
●
How eBPF solves these problems and more
●
How to detect and prevent malicious eBPF usage
@pathtofile
What are kernel rootki... | pdf |
DEFCON 22
Joe FitzPatrick
Miles Crabill
Stupid PCIe Tricks
featuring
NSA Playset: PCIe
● Electrical Engineering education
with focus on CS and Infosec
● 8 years doing security research,
speed debug, and tool
development for CPUs
● Hardware Pen Testing of CPUs
● Security training for functional
validat... | pdf |
Phantom Attack:
Evading System Call Monitoring
Rex Guo, Ph.D.
Junyuan Zeng, Ph.D.
@Xiaofei_Rex
jzeng04 *NOSPAM* gmail DOT com
web app RCE on
joe-box and
executed a reverse
shell
An Incident - An Attacker’s View
web app RCE on
joe-box and
executed a reverse
shell
An Incident - An Attacker’s View
Privilege escala... | pdf |
笔记本:
企业安全建设
创建时间:
2022/10/2 10:51
更新时间:
2022/10/2 13:31
作者:
Aim High
URL:
https://www.cnblogs.com/xinxin999/p/15874533.html
regsvr32 && rundll32的研究
一.前言
关于在终端对抗上,regsvr32 && rundll32师傅们常用的2种方式
regsvr32 /s /u /i:http://xx.xx.xx.xx:6007/test.sct scrobj.dll //执行恶意sct文件
rundll32 cs.dll start ... | pdf |
Automating Vulnerability Assessments with Vuls | HITCON CMT 2017
Automating Vulnerability Assessments
with Vuls
Kota KANBE & Teppei FUKUDA
HITCON CMT 2017
2
Automating Vulnerability Assessments with Vuls | HITCON CMT 2017
Vuls
open-source, agent-less vulnerability scanner
(based on information from NVD, OVAL, etc.)
Ma... | pdf |
KCon
KCon
智能门锁的“天灾人祸”
Bluetooth smart locks安全攻防研究
关于作者
• 启明星辰ADlab安全研究员
• 研究方向:智能设备安全研究与漏洞挖掘
• 邮箱:butterflyhuangxx@gmail.com
• 看雪ID:ID蝴蝶
PART 01
浅谈蓝牙低能耗
PART 02
智能门锁的安全问题
PART 03
研究案例分享
PART 04
改进方案
PART 05
写在最后
目录
CONTENTS
01 浅谈蓝牙低能耗
蓝牙低能耗应用场景
蓝牙低能耗特点
• 低能耗,可变连接时间
• 传输距离远
• 采用128bitAES加密
• 低延时
蓝牙低能耗协议栈
• 蓝牙应用层
• Host层... | pdf |
Beyond Security
Put something on the internet -
Get hacked
1
Beyond Security
Agenda
• About me
• IoT
• IoT core problems
• Software
• Hardware
• Vulnerabilities
• What should I do?
Beyond Security
• Been interested in the field of security since
childhood
• Doing network analysis, forensics, dark web
... | pdf |
JVM类加载器与双亲委派
学习视频:学习视频
类的生命周期
一个类从加载到jvm内存,到从jvm内存卸载,生命周期可分为七个阶段。
1. 加载(Loading):classpath,jar包,网络,磁盘位置下的类的class以二进制字节流读进来,在内存
中生成一个代表这个类的Class类对象放入元空间。可以自定义类加载器。
2. 验证(Verification):验证Class文件的字节流中包含的信息是否符合java虚拟机规范
3. 准备(Preparation):类变量赋默认初始值
4. 解析(Resolution):把符合引用翻译为直接引用
5. 初始化(Initialization)
6. 使用(Using)
7. 卸载(Un... | pdf |
802.11 Massive Monitoring
Andrés Blanco - Andrés Gazzoli
Outline
• Introduction
• Approaches
• The USB Dilemma
• Distributed System
• WiWo
• Questions
Introduction [ Who is this talk for? ]
Introduction [ Who is this talk for? ]
Introduction [ Who is this talk for? ]
Introduction [ Who is this talk for? ]
... | pdf |
One bite and all your dreams will come true:
Analyzing and Attacking Apple Kernel Drivers
X(aolon& Ba( & M(n Spar)) Zhen&
1
Xiaolong Bai
Alibaba Security Engineer
Ph.D. graduated from Tsinghua
University
Published papers on the top 4: S&P,
Usenix Security, CCS, NDSS
Twitter, Weibo, Github: bxl1989
Min (Spark) Zhe... | pdf |
Observed
Answers
Record
Type
Usage
Sources
Ports
_afpovertcp._tcp.local
PTR
Hosts (Apple)
N/A
_axis-video._tcp.local
PTR
Cameras (Axis)
N/A
_blackarmor4dconfig._tcp.local
PTR
Network Attached Storage (Seagate)
N/A
_blackarmor4dinfo._udp.local
PTR
Network Attached Storage (Seagate)
N/A
_ftp._tcp.local
PTR
Printers (HP)
... | pdf |
How I Learned to Stop Fuzzing
and Find More Bugs
Jacob West
Fortify Software
August 3-5, 2007
Las Vegas
Agenda
Introduction to fuzzing
What we mean by fuzzing
Challenges with fuzzing
Introduction to static analysis
How static analysis works
Examples of bugs static analysis is good at finding
Untapped potential: Cust... | pdf |
2022/3/28 10:36
PHP filter_var 恶作剧 :: pwning.systems
https://pwning.systems/posts/php_filter_var_shenanigans/
1/7
222326 乔迪·佐默
很可能我们都⻅过可以防⽌我们遇到漏洞的 PHP 过滤器。在这篇博⽂中,我将通过在过滤器本
身中查找错误以找到错误来引导您完成绕过过滤器的思考过程!
假设我们有以下代码,它将⼀些⽤户输⼊传递给 filter_var() 并使⽤
FILTER_VALIDATE_DOMAIN or FILTER FLAG HOSTNAME 标志。这增加了根据每个主机原理
验证主机名的功能(这意味着它们必须以... | pdf |
001
Speaker@YongShao
•
•
•
•
Whoami
Oauth2.0
•
•
•
()!
•
•
•
Web
https://facebook.com/dialog/oa
uth?response_type=code&clien
t_id=CLIENT_ID&redirect_uri=R
EDIRECT_URI&scope=email&sta
te=1234zyx
•
•
https://open.weixin.qq.com/connect/oauth
2/authorize?appid=wxc43*******&respon
se_type=code&scope=snsapi_... | pdf |
1
精简JRE打造⽆依赖的Java-ShellCode-Loader
前⾔
jre⽬录结构
lib⽬录
bin⽬录
精简rt.jar
精简dll
⾃解压捆绑执⾏
EnigmaVirtualBox打包全部⽂件
EnigmaVirtualBox打包jre
最后
@yzddMr6
利⽤⼩众语⾔进⾏免杀⼀直是⼀个屡试不爽的⽅法,从python到go再到现在的nim免杀,⽤的⼈越
多杀软的检测也就越来越严格。现在⾃⼰写的go程序基本只要涉及到⽹络通信360就⼲掉了。那么还有没
有什么新的姿势呢?
之前介绍过在As-Exploits中⽤到的基于JNA实现的
ShellCodeLoader(https://t.zsxq.com/022FQrFA... | pdf |
apk-message
0x00
appandroidmessage
0x01 message
message messagedemo
appA
Bandroid
1. message
Message message= new Message()
Message message= Message.obtain()
Messager message= handler.obtaionMessager()
obtain
2.
Message message = Message.obtain(); //
message.what = 0; //whatmessage code
message.arg1 = 1; //int
... | pdf |
重装上阵:Office攻击来袭
朱季峰 杨军锋
议程:
• ⼀一 2017年年Office威胁分析与回顾
• ⼆二 如何建⽴立终端Office威胁防护机制
• 三 2017年年Office ITW 0day原因分析
• 四 关于2018年年Office威胁趋势的预测
2017年年Office威胁分析与回顾
• Case study 1:定向攻击中使⽤用Office作为攻击武器器
• 样本⾸首现时间:2016-12-26
• 攻击跨度时间:2016-12-27 ~ 2017-02
• 事件背景:北北约-俄罗斯理理事会举⾏行行年年内第三次⼤大使级会议,2016-12-19⽇日
• 攻击事件信息披露露:《Matryoshka Doll R... | pdf |
Stamp Out Hash Corruption,
Crack All the Things!
RyanReynolds,Manager,CroweHorwath,LLP
JonathanClaudius,SpiderLabsSecurityResearcher,Trustwave
July2012
Abstract
ThiswhitepaperistoserveasasupportingreferencetotheDEFCON20talk,“Stamp
OutHashCorruption,CrackAlltheThings!”.Thefocusofboththepaperand
presentationistoshowho... | pdf |
前言
Coherence 组件是 WebLogic 中的一个核心组件,内置在 WebLogic 中。关于 Coherence 组件的官方
介绍:https://www.oracle.com/cn/java/coherence/
近些年,weblogic Coherence 组件反序列化漏洞被频繁爆出,苦于网上没有公开对 weblogic
Coherence 组件历史反序列化漏洞的总结,导致很多想入门或者了解 weblogic Coherence 组件反序列
化漏洞的朋友不知道该怎么下手,于是本文便对 weblogic Coherence 组件历史反序列化漏洞做出了一
个总结和分析。
关于 Coherence 组件反序列化漏洞利用... | pdf |
Hacking Windows CE
san@nsfocus.com
san@xfocus.org
Structure Overview
• Windows CE Overview
• Windows CE Memory Management
• Windows CE Processes and Threads
• Windows CE API Address Search Technology
• The Shellcode for Windows CE
• Windows CE Buffer Overflow Demonstration
• About Decoding Shellcode
• Conclusion
• Refe... | pdf |
逃离安卓动态检测
目录
• 沙盒检测
• 延时触发
• Taintdroid与反隐私检测
• 自校验与SmaliHook
• 条件触发
• 公开沙盒与私有沙盒
沙盒检测
• 通过手机号码来检测
沙盒检测
• 通过NetworkOperator名检测
沙盒检测
• 通过设备ID检测
沙盒检测
• 通过语言信箱号码检测
沙盒检测
• 通过ROM编译文件build.prop的信息检测
沙盒检测
• 通过模拟器没有WIFI支持这个特性来检测
沙盒检测
• 特定沙盒的检测
• 写嗅探程序上传到在线分析网站
• 获取对应的信息(例如手机号)
• 判断该信息是否为特定沙盒独有的
沙箱的环境特征
• bouncer
• anubis
检测QEMU
... | pdf |
通过gitlab RCE后,可以拿数据库密码,⽬录⼀般在gitlab config/database.yml⽂件中
先获取root的密⽂,弄完还原回去
cat config/database.yml
#
# PRODUCTION
#
production:
adapter: postgresql
encoding: unicode
database: gitlabhq_production
host: postgresql
port: 5432
username: gitlab
password: "password"
pool: 10
prepared_statements: true
sele... | pdf |
测试环境安装了bitdefender,方便查看Hook情况,使用x64debug进行进程调试,运行notepad
进程,然后使用x64debug附加到进程,x64debug中断
在Symbols标签搜索Token类函数可以看到与Token类相关的函数。
我们选择NtAdjustGroupsToken,双击,便可以进入到该函数的调用流程
也就是我们常见的形式:
但如果我们选择NtAdjustPrivilegeToken:
可以看到直接进入了一个jmp的跳转。我们跟进去:
mov r10,rcx
1
mov eax,xx
2
syscall
3
里面是一些mov语句然后push rax,然后ret执行,我们可以使用Ctrl+G进跟踪
跟... | pdf |
Secure&Because&Math:&A&Deep1Dive&on&
Machine&Learning1Based&Monitoring&
(#SecureBecauseMath)&
Alex%Pinto%
Chief%Data%Scien2st%|%MLSec%Project%%
@alexcpsec%
@MLSecProject!
Alex%Pinto%
• Chief%Data%Scien2st%at%MLSec%Project%
• Machine%Learning%Researcher%and%Trainer%
• Network%security%and%incident%response%aficionado%... | pdf |
DNS - Devious Name
Services
Destroying Privacy &
Anonymity Without Your
Consent
Jim Nitterauer
Senior Security Specialist
Disclaimer
Information disclosed in this presentation is intended to
help improve your security & privacy posture and should
not be used for unethical purposes
The concepts presented are in no ... | pdf |
第 1页 共 12页
SDL-软件安全设计初窥
— safer applications begin with secure design
— Cryin@insight-labs.org
摘要:本文详细介绍微软软件安全开发生命周期(SDL)相关概念,并讨论要遵循 SDL 过
程所应执行的各种安全活动,其中着重对软件安全设计的原则进行探讨。并对 STRIDE 威胁
建模方法进行深入介绍。
安全开发生命周期(SDL)是一个帮助开发人员构建更安全的软件和解决安全合规要求
的同时降低开发成本的软件开发过程。 安全应用从安全设计开始,软件的安全问题很大一
部分是由于不安全的设计而引入的,微软用多年的经验总结出了安全开发生命周期(SDL),
... | pdf |
Tencent Blade Team
公有云SDN的安全风险与加固
演讲人:杨韬
2019
About Me
•
安全平台部高级工程师
•
Tencent Blade Team
•
安全预研,SDN、BIOS、TEE
About Tencent Blade Team
受邀参加Blackhat USA、DEFCON、HITB、
CanSecWest、CSS、KCon、XCon等多个海内外
顶级安全会议
多次受邀参加
海内外顶级安全会议
Amazon、小米、华为等多个品牌官方认可,
获小米安全年度最佳守护者,荣获华为漏洞
奖励计划官方认可
获Amazon、小米、华
为等多个品牌官方认可
为腾讯Tday、腾讯首... | pdf |
Mac OS X Server
Open Directory
Administration
For Version 10.3 or Later
034-2352_Cvr 9/12/03 10:29 AM Page 1
Apple Computer, Inc.
© 2003 Apple Computer, Inc. All rights reserved.
The owner or authorized user of a valid copy of
Mac OS X Server software may reproduce this
publication for the purpose of learning ... | pdf |
怎样用 Cobalt Strike 生成具有代码签名的 payload
——— By Digg3r
转换证书格式和转换过程中遇到的坑
可以看 CS 官方文档或者作者的 youtube 视频,profile 中配置签名是 jks 格式,而
windows 是 pfx 结尾的默认是 pkcs12 格式,所以需要转换成 JAVA 的 jks 格式,
一个 profile 代码签名的配置示例如下:
code-signer {
set keystore "codesign.jks";
set password "123456";
set alias "server";
}
不想配置 porfile 也可以不转换,因为有点小麻烦,完全可以在生成... | pdf |
SENSEPOST
Demystifying+Windows+Kernel+Exploitation+by+Abusing+GDI+
Objects.
Saif El-Sherei
SENSEPOST
#Whoami
SENSEPOST
Why?
SENSEPOST
What?
SENSEPOST
• Abusing two types of GDI Objects, to gain
ring0 exploit primitives.
• Analysing two+N-Days+(MS16-098,+MS17-
017??),+by+using+these+techniques.
SENSEPOST
Introduction
h... | pdf |
A New Era of SSRF - Exploiting URL Parser in
Trending Programming Languages!
Orange Tsai
Taiwan No.1
About Orange Tsai
The most professional red team in Taiwan
About Orange Tsai
The largest hacker conference in Taiwan
founded by chrO.ot
About Orange Tsai
Speaker - Speaker at several security conferences
HITCON, WooYun... | pdf |
Stalking a City for Fun
and Frivolity
“Pull pin, point toward privacy insurance claimant”
Brendan O’Connor
Malice Afterthought, Inc.
http://www.maliceafterthought.com
Everything leaks too
much data.
At every level, we’ve forgotten that privacy, not just
security, should be a goal.
It is no longer possible to
“blend... | pdf |
S-behinder源码学习
PHP类型
入口
net.rebeyond.behinder.ui.controller.MainController.java
openshell() 打开一个shell,会创建一个新的线程去管理这个shell,下一步是进入到新的线程当
中 mainWindowController
net.rebeyond.behinder.ui.controller.MainWindowController.java
这里就是获取一个正常shell的连接,重要的是执行这个 this.doConnect() 方法。而这个方法最
后指向的是 this.currentShellService.doConnect(... | pdf |
王大寶, PK
虛擬機 - 惡意程式攻防的新戰場
講師簡介
王大寶, 小時候大家叫他王小寶,長大後就稱王大寶,目前隸
屬一神祕單位. 雖然佯稱興趣在看書與聽音樂, 但是其實晚
上都在打Game. 長期於系統最底層打滾,熟悉ASM,C/C++,
對於資安毫無任何興趣,也無經驗,純粹是被某壞人騙上台,
可以說是不可多得的素人講師!!
議程大綱:
現今的 CPU 都支援虛擬化專用指令集, 讓 VM 獲得硬體的
支援. 在這個場次中,我們將詳細地介紹 Intel 的 VT指令集
與其 Hypervisor 運作的機制. 此外我們將並介紹在惡意軟
體研究領域中在 Hypervisor 模式下能有哪些應用,包含惡意
程式技術與偵防分... | pdf |
PEB、TEB详解
PEB
PEB中文名为进程环境块,里面存储了像映像加载程序、堆管理器以及其他windows组件需要从用户
模式访问的信息。在介绍PEB之前我们先来看一下进程内部的结构,以此来更好的了解PEB。
每个windows进程都可以用一种执行体进程(EPROCESS)进程来表示。EPROCESS及其大部分相关数据
结构都位于系统地址空间中。唯一的例外就是PEB,它位于用户地址空间中。对于每个执行了的
windows程序的进程,windows子系统进程(Csrss)维护了名为CSR_PROCESS的平行结构,另外
windows子系统(win32k.sys)的内核模式部分还为每个进程维护了名为W32PROCESS的数据结... | pdf |
Defeating static signatures in
blackbox antivirus engines
Insomni’hack 2022
Vladimir Meier
# whoami
#Security researcher @ SCRT
#Working on antivirus software since 2015
#Author of https://github.com/scrt/avcleaner
#https://blog.scrt.ch «Antivirus Bypass» category
1 / 52
Contents
#Demo
#13 reasons why antivirus bypas... | pdf |
Transparent Malware Debugging on x86 and
ARM
Zhenyu Ning and Fengwei Zhang
COMPASS Lab
Wayne State University
April 27, 2018
1
Outline
I Introduction
I Background
I Towards Transparent Malware Analysis
I MalT on x86 Architecture
I Ninja on ARM Architecture
I Conclusions
2
Outline
I Introduction
I Background
I Towards T... | pdf |
A"GTVHACKER"PRODUCTION"
GTVHACKER"PRESENTS:
GTVHacker"
• Formed'to'root'the'original'
Google'TV'in'2010'
• Released'exploits'for'every'
Google'TV'device'
• Plus'some'others:'
Chromecast,'Roku,'Nest'
• Many'more'to'come!''
Speaking"Members"
Amir"Etemadieh"(@Zenofex)"–'Research'ScienHst'at'Accuvant'
LABS,'founded'GTV... | pdf |
Protecting your IT infrastructure from Legal attacks:
Subpoenas, Warrants and Transitive Attacks
Alexander Muentz, Esq.
Defcon 15
Disclaimer
•
I am a lawyer, but not your lawyer
•
The topics presented reflect my personal views and are not
necessarily those of ONSITE3
•
This talk is not legal advice, but for educationa... | pdf |
1 10.10.6.188后台模版注⼊getshell-z3r0ne
10.10.6.188 群⾥的师⽗z3r0ne师傅 跑出的admin/admin 后台模版getshell
这⾥抓取密码的时候其实有很多同学会喜欢⽤mimi直接抓hashdump和logpasswords 却忽略了
cached domain logon
⽐如这⾥就抓到了历史域管⽤户登陆虽然密码不对
抓到域⽤户shirts\ehahn的密码 尝试查看当前域⽤户的sid和当前⽤户登陆的机器 以及获取域机器和
ms-ds-creatorsid⽤来寻找ehahn能完全控制的主机,结果没得这⾥也可以⽤
adfind收集当前域⽤户信息和域全部电脑信息
1
beacon> sh... | pdf |
0x00 起因
原本不想炒冷饭的,有一天看到师傅们再说IDEA里面Debug获取的时候会默认调用ToString
方法,然后就去google了一下相关的后反序列化知识,因为提前跑路却沦落在家隔离没事可做
就多搜索了一点,感觉Dubbo的三个洞还是蛮有代表性的,就调试分析学习下。
漏洞列表:
CVE-2019-17564
CVE-2020-1948
CVE-2021-25641
0x01 Dubbo介绍
Apache Dubbo 是一款高性能Java RPC框架。漏洞存在于 Apache Dubbo默认使用的反序列
化工具 hessian 中,攻击者可能会通过发送恶意 RPC 请求来触发漏洞,这类 RPC 请求中通常
会带有无法识别的... | pdf |
SCOTT MOULTON’S SPEECH RESEARCH MATERIAL AND NOTES ON DATA RECOVERY
www.ForensicStrategy.com|www.MyHardDriveDied.com
Copyright © June 2007 by Scott A. Moulton @ Forensic Strategy Services, LLC. All rights reserved.
Data Recovery Whitepaper – Rev 17 ... | pdf |
1
spring beans RCE
Spring MVC 框架的参数绑定功能提供了将请求中的参数绑定控制器⽅法中参数对象的成员变量,攻击
者通过构造恶意请求获取AccessLogValve 对象并注⼊恶意字段值触发 pipeline 机制可写⼊任意路径下
的⽂件。
简答来说就是参数绑定造成的变量覆盖漏洞,漏洞点spring-beans包中。
⽆
JDK>=9
springMVC 全版本
根据之前的漏洞分析
http://rui0.cn/archives/1158,其中⼀个点在于获取BeanInfo,位置在CachedIntrospectionResults
构造⽅法,下个断点,发送请求断下
漏洞介绍
漏洞编号
影... | pdf |
Network Nightmare
Ruling the nightlife between
shutdown and boot with pxesploit
#whoami
• Matt Weeks
• Scriptjunkie if you hang out on irc
• I have a twitter but I don’t use it
• http://www.scriptjunkie.us/
• scriptjunkie {shift+2} scriptjunkie.us
What’s going on here
• Want to compromise another system on t... | pdf |
w
waarrddrriivviinngg tthhee ssm
maarrtt ggrriidd
:::: pprraaccttiiccaall aapppprrooaacchheess
ttoo aattttaacckkiinngg uuttiilliittyy ppaacckkeett rraaddiiooss ::::
sshhaawwnn m
mooyyeerr
aanndd
nnaatthhaann kkeellttnneerr
D
DeeffC
Coonn 0000001100001100
DEF CON 00010010
Moyer / Keltner :: Wardriv... | pdf |
Gone in 60 Minutes:
Stealing Sensitive Data from
Thousands of Systems
Simultaneously with OpenDLP
Andrew Gavin
Verizon Business
Standard Disclaimer
• I am representing myself, not my
employer, with OpenDLP and this talk
• If you get in trouble for using OpenDLP, it
is your fault and not mine
is your fault and not m... | pdf |
Information Security Partners, LLC
iSECPartners.com
Attacking Web Services
Alex Stamos
alex@isecpartners.com
Defcon XIII
Scott Stender
scott@isecpartners.com
www.isecpartners.com
Information Security Partners, LLC
2
Introduction
•
Who are we?
–
Founding Partners of Information Security Partners, LLC (iSEC Partners)
–
A... | pdf |
N1CTF2020 Writeup
Author:Nu1L Team
WEB
signin
GinDriver
Design
Information Gathering
Webauthn
Reverse Engineering
Identity Forgery
Arbitrary File Uploading
Arbitrary File Reading
Get Shell
Easy_tp5
Expected solution
Unexpected 1
Unexpected 2
Unexpected 3
Unexpected 4
It's half expected 5
Zabbix_fun
Docker_manager
The K... | pdf |
Canaan Kao, Chuang Wang, I-Ju Liao
canaan@totoro.cs.nthu.edu.tw
canaan_kao@trend.com.tw
SOME THINGS BEFORE NETWORK ATTACK
(A LONG TIME OBSERVATION)
網路攻擊之前的二三事
AGENDA
• The Motivation
• Port Scan 101
• IDS/IDP-based Port Scan Detection
• Honeypot-based Port Scan Detection
• Play with SDN switch
• A Long Time Observation... | pdf |
The Neuronumerous Group
Presents:
Build a Lie Detector / Beat a Lie Detector
With your hosts
Rain
And
J03b34r
Introduction by:
Int80
Start to Finish
● History of Deception Detection
● The History of the Polygraph
● How We Built our DIY Polygraph
● Trying to Beat the DIY Polygraph
● The Data Aftermath
History of Decep... | pdf |
Digital Leviathan
Nation-State Big Brothers
(from huge to little ones)
Eduardo Izycki & Rodrigo Colli
Las Vegas, August 11th 2018
AGENDA
INTRO
SOURCES
OUTCOMES
CONCLUSION
INTRO
INTRO
“We should give our obedience to an unaccountable
sovereign otherwise what awaits us is a ‘state of
nature’ that closely resembles civ... | pdf |
Jon McCoy
www.DigitalBodyGuard.com
Hacking.NET Applications:
The Black Arts
Why .NET
Countermeasures
Skill Level Needed
Will this work on every
.NET application
BACKGROUND
How-To Attack .NET Applications
Tools and Methodology of Attacking
Overcome “secure” .NET Applications
Building KeyGen/Crack/Hacks/Malware
Reverse... | pdf |
1
Advanced MySQL Exploitation
Muhaimin Dzulfakar
muhaimindz@gmail.com
2
Contents
1 Abstract............................................................................................................................................3
2 Introduction .......................................................................... | pdf |
Bypassing
pre-b
o
ot
authen
tication
passw
ords
b
y
instrumen
ting
the
BIOS
k
eyb
oard
buer
(practical
lo
w
lev
el
attac
ks
against
x86
pre-b
o
ot
authen
tication
soft
w
are)
Jonathan
Brossard
-
jonathan@ivizindia.com
Iviz
T
ec
hnosolutions
Pvt.
Ltd.
,
K
olk
ata,
India
The
wal
ls
b
etwe
en
art
and
engine
ering
exist
on... | pdf |
The Information Security Experts
Copyright © 2008 SecureWorks, Inc. All rights reserved.
Snort Plug-in Development:
Teaching an Old Pig New Tricks
Ben Feinstein, CISSP GCFA
SecureWorks Counter Threat Unit™
DEFCON 16
August 8, 2008
The Information Security Experts
Copyright © 2008 SecureWorks, Inc. All rights reserved.
... | pdf |
权限维持
简介
Logon Scripts是系统的登录脚本,这⾥说⼀个特别⽤法, Logon Scripts能够优先于安全软件执⾏,
绕过安全软件对敏感操作的拦截,本⽂将具体介绍这个技巧。
Logon Scripts⽤法
拦截测试
实际 360 创建会被拦截
wmic ENVIRONMENT create name="AnonySec",username="%username%",VariableValue="Logon
Scripts!"
但是 测试 并未拦截
启⽤Logon Scripts
注册表路径:HKCU\Environment
创建字符串键值: UserInitMprLogonScript
键值设置为bat的绝对路径:... | pdf |
1
SPARR W: A Novel Covert Communication
Scheme Exploiting Broadcast Signals in
LTE, 5G & Beyond
Reza Soosahabi, Chuck McAuley
Application & Threat Intelligence Research Center
2
WHO
3
4
MOTIVATION
5
Motivation
• Past research experience in wireless security
• Worked with US operators before joining Keysight in 201... | pdf |
Internet Kiosk Terminals
The Redux
Paul Craig – Security-Assessment.com
Defcon 19 – Las Vegas
Hello Defcon 19
My name is Paul Craig
I work at Security-Assessment.com as a penetration tester.
I love to hack stuff, its my life, and my profession.
If you have any questions or comments – Please email me... | pdf |
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.10
1.11
1.12
1.13
1.14
1.15
1.16
1.17
1.18
1.19
1.20
1.21
TableofContents
引子
第一章BurpSuite安装和环境配置
第二章BurpSuite代理和浏览器设置
第三章如何使用BurpSuite代理
第四章SSL和Proxy高级选项
第五章如何使用BurpTarget
第六章如何使用BurpSpider
第七章如何使用BurpScanner
第八章如何使用BurpIntruder
第九章如何使用BurpRepeater
第十章如何使用BurpSequencer
第十一章如何使用Burp... | pdf |
BITSInject
Using the BITS service to execute a program in the
“NT AUTHORITY/SYSTEM” session.
Summary
BITS Background
Details
How We Got There - Research Flow
First Naive Try
Taking Inspiration From Windows Update Service (wuaueng)
Imitating Wuaueng
The State File is the Supervisor
Interactive or not?
Migrat... | pdf |
FreeCulture.org
Student movement for free culture
free speech
free software
free culture
FreeCulture.org, Inc.
P.O. Box 140657
Gainesville, FL 32614-0657
U.S.A.
freedom@freeculture.org
http://freeculture.org/
FreeCulture.org is a non-profit
organization dedicated to promoting
and facilitating student invol... | pdf |
Owning Bad Guys {& Mafia} with JavaScript Botnets
Chema Alonso (chema@informatica64.com @chemaalonso) and Manu “The Sur” (mfernandez@informatica64.com)
Informatica 64 (http://www.informatica64.com)
Abstract: “Man in the middle” attacks are common and dangerous. Using a TOR
connection or an Anonymous Proxy Server i... | pdf |
1
些malware-dev开源项⽬介绍-nim
项⽬列表
OffensiveNim
pop_bin.nim
作⽤
编译
运⾏
pop_winim_bin.nim
作⽤
编译
运⾏
pop_winim_lib.nim
作⽤
编译
运⾏
execute_assembly_bin.nim
作⽤
编译
运⾏
clr_host_cpp_embed_bin.nim
作⽤
编译
运⾏
scshell_c_embed_bin.nim
作⽤
编译
运⾏
fltmc_bin.nim
作⽤
2
编译
运⾏
blockdlls_acg_ppid_spoof_bin.nim
作⽤
编译
运⾏
named_pipe_client_bin.nim && nam... | pdf |
这次的案件源自于很久以前外部 HC 单位对某司的钓鱼攻击。文章中的源
码是 ASP 版本的钓鱼框架紫缘,但是 ASP 源码中存在越权访问漏洞所以可以才
得以打到攻击者的后台。在同段 IP 的扫描中根据中间件的版权信息可以获取同
类型的钓鱼管理后台。详细内容在后续章节逐一介绍攻破思路和方法。
一、事件背景
企业邮箱收到了仿造 Outlook Web App 界面的钓鱼邮件。应该是想要钓鱼
我们公司员工的邮箱账户。攻击者 Outlook 钓鱼页面:
二、反制过程
渗透测试是红队人员对目标单位的攻击,反制是目标单位的蓝队人员对红
队人员的反向渗透测试。所以把这个反红队过程也叫做反制。反制和渗透测试
一个正常网站没有差别。除了对目标... | pdf |
USB Attacks:
Fun with Plug and 0wn
Defcon 17
Rafael Dominguez Vega
2nd August 2009
A little about me ...
2
rafael.dominguezvega[at]mwrinfosecurity[dot]com
http://labs.mwrinfosecurity.com
Main Objectives
• Attacks & Impact
• Bug Discovery
• Driver Exploitation
3
What this talk will cover
• USB for fun and profit
• Fuz... | pdf |
Antivirus Event Analysis Cheat Sheet
Version 1.8.1, Florian Roth @cyb3rops!
!
Attribute
Less Relevant
Relevant
Highly Relevant
Virus Type
HTML
Iframe
Keygen
Joke
Adware
Clickjacking
Crypto
FakeAV
Trojan
Backdoor
Agent
Malware
JS
Creds
PS
PowerShell
Exploit
Ransom
PassView
Tool-Netcat
Tool-N... | pdf |
Mobile Application Web API Reconnaissance:
Web-to-Mobile Inconsistencies & Vulnerabilities
Abner Mendoza, Guofei Gu
Texas A&M University
abmendoza@tamu.edu, guofei@cse.tamu.edu
Abstract—Modern mobile apps use cloud-hosted HTTP-based
API services and heavily rely on the Internet infrastructure
for data communication and... | pdf |
我的CS笔记之- In-memory Evasion 4-5
0x00 前言
In-memory Evasion 4-5其中包含了威胁模拟的介绍,大致意思就是通过修改c2profile模仿真实APT的样
本会产生的特征行为等,也不是百分百模拟,就是模拟了一下yara规则中的静态特征,感兴趣的小伙伴
自行学习,我就不做笔记了。除了威胁模拟,视频中还介绍了cs3.11引入 的一些内存对抗新功能主要是
Module Stomping和cleanup这2个功能。这里不由感叹一句,自从CS被卖了以后的,更换了老大以
后,更新越来越不行了,还开始搞java代码混淆,class完整性校验。多把精力花在怎么进化CS上吧,
@Joe Vest @Gr... | pdf |
Ericsson's EDACS Trunking
http://www.signalharbor.com/ttt/00apr/index.html
1 of 7
6/18/2007 14:07
This article first appeared in the April 2000 issue of Monitoring Times.
Ericsson's EDACS Trunking
Motorola has several competitors in the trunked public safety radio system marketplace. One
popular alternative is the Er... | pdf |
An#$Forensics,AF,
@dualcoremusic,
mov$eax,$0x6b;$int$0x80$
• Rapper,
• Some,other,stuff,idk,
Overview,
• Memory,Forensics,vs,SMC*,
– Windows,
– Linux,
• Android,(An#$)Forensics,
• Fun,with,SD,cards,
Disclaimers,
• !Professional,
• TROLOLOLOL,
• !Expert,/,YMMV,
• DO,ILLEGAL,THINGS,
,
Memory,Forensics,
• Focus,o... | pdf |
ContentsinDetail
1. CoverPage
2. TitlePage
3. CopyrightPage
4. AbouttheAuthors
5. BRIEFCONTENTS
6. CONTENTSINDETAIL
7. FOREWORD
8. ACKNOWLEDGMENTS
9. INTRODUCTION
1. WhoThisBookIsFor
2. WhatThisBookIsn’t
3. WhyUseGoforHacking?
4. WhyYouMightNotLoveGo
5. ChapterOverview
10. 1GOFUNDAMENTALS
1. SettingUpaDevelopmentEnviro... | pdf |
Hiding Wookiees in HTTP
@regilero
HTTP smuggling is a thing we should
know better and care about.
DEFCON 24
Why wookiees?
● It's all about smugglers,
wookiee requests and
responses
● Wookiee language is a
thing
– hard to speak
– Easy to misinterpret
Outline
● The minimum required on HTTP (Keep-alive, pipelining)
● ... | pdf |
源代码安全测试云平台服务商
Secure Your Code Trust Your Software www.haodahengye.com.cn 18910080395
Fortify SCA 支持 Android 源码安全漏洞检测类别
1. Access Control: Android Provider
2. Access Control: Database
3. Android Bad Practices: Missing Broadcaster Permission
4. Android Bad Practices: Missing Receiver Permission
5. Android... | pdf |
[ ysuserial ]
某⾏动在即,为助⼒在⼀线防守的伙伴,特发此⾃⽤项⽬,帮助伙伴们更⾼效、更快速的针对 Java 反序列化漏洞进⾏⾃检及安全修复。
本项⽬为 ysoserial [su18] 专版,取名为 ysuserial ,在原项⽬ ysoserial 基础上魔改⽽来,主要有以下新添加功能:
1. 基础链版本的覆盖:原版反序列化链可能仅限于某⼏个版本,本项⽬添加了如 CB/C3P0 等链的低版本,可⼀键 getshell 的版本
覆盖更⼴;
2. 利⽤链的扩充和丰富:在原版基础上添加了多条利⽤链,扩展利⽤⽅式,更够在依赖不确定、利⽤⽅式有限制的情况扩展更多的攻击
路径;
3. 利⽤⽅式的填充:原版的利⽤链的利⽤⽅式仅使⽤... | pdf |
软件安全分论坛
自我介绍
ID:仙果
清华大学网络行为研究所
安全研究员
兴华永恒(北京)
高级安全工程师
7年安全工作经验,专注于漏洞分析,漏洞防护
浏览器
用户接入互联网的门户
2015年8月份全球主流浏览器市场份额排行榜
浏览器漏洞攻防的参与者
时间线
*~2008
2009-2010
2011-2012
2013-2014
2015
Win 7
NO_ASLR&堆填充
ActiveX
Java
Flash Plyaer象混淆
CVE-2011-2110
IE器UAF
CVE-2013-2551
CVE-2014-032... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.