text
stringlengths
100
9.93M
category
stringclasses
11 values
Sk3wlDbg: Emulating all (well many) of the things with Ida Chris Eagle Sk3wl 0f r00t Disclaimer – Everything I say today is my own opinion and not necessarily the opinion of my employer and certainly not the opinion of DARPA Who am I? – Senior lecturer of computer science – Computer security researcher – Reverse eng...
pdf
I Hunt Penetration Testers:
 More Weaknesses in Tools and Procedures Wesley McGrew, Ph.D. wesley@mcgrewsecurity.com
 Page ! of ! 1 21 DRAFT Final paper and slide release during 
 DEF CON 23 at mcgrewsecurity.com and available on defcon.org shortly afterwards. Trust me, you’ll want the final copy. ABSTRACT Whe...
pdf
Drinking From the Caffeine Firehose We call SHODAN. By Viss! Prepared for Defcon 20 Thursday, July 12, 12 This is not just another shodan talk. Today we turn shodan into a gateway drug. Thursday, July 12, 12 What do people put on the internet? Routers, switches, servers, printers.. Meh. seen it. Show me something...
pdf
Smart Contract Hacking Konstantinos Karagiannis CTO, Security Consulting, BT Americas @KonstantHacker when transactions aren’t enough • “The key component is this idea of a Turing- complete blockchain” • --Vitalik Buterin meow—putting that computing to use smart contracts billions, or just millions, of reasons probl...
pdf
Submitted in Defcon 18 2010 WPA Too! Md Sohail Ahmad, AirTight Networks md.ahmad@airtightnetworks.com Abstract WPA2 is considered as the most secure configuration for WiFi networks. It is widely used to secure enterprise and private WiFi networks. Interestingly, it is also being used to secure guest, municipal a...
pdf
Introduction DNS Security Issues Passive DNS hardening DNSDB Passive DNS Hardening Robert Edmonds Internet Systems Consortium, Inc. Robert Edmonds Passive DNS Hardening Introduction DNS Security Issues Passive DNS hardening DNSDB DNS Passive DNS ISC SIE Structure of this talk ▶ Introduction ▶ DNS ▶ Passive DNS ▶ ISC SI...
pdf
0x00 前⾔ 有技术交流或渗透测试培训需求的朋友欢迎联系QQ/VX-547006660, 需要代码审计、渗透测试、红蓝对抗⽹络安全相关业务可以联系我司 2000⼈⽹络安全交流群,欢迎⼤佬们来交流 群号820783253 最近BugBounty挖了不少,但⼤多数都是有⼿就⾏的漏洞,需要动脑⼦的实属罕⻅ ⽽今天就遇到了⼀个⾮常好的案例,故作此⽂ 0x01 对⽬录批量FUZZ,发现⼀处隐蔽接⼝ 挖某⼤⼚已经挖了快两个周了,期间因为公司业务⽐较繁忙,最近⼀直没挖。 但是⼀直在⽤ffuf挂着字典对⼚商资产进⾏批量⽬录扫描,今天上服务器看了下扫描结果,就出货了 接⼝地址为:https://xxx.xxxx.com/xxxx/start 我们直...
pdf
Drinking from LETHE: New methods of exploiting and mitigating memory corruption vulnerabilities Daniel Selifonov DEF CON 23 August 7, 2015 Show of Hands 1. Have you written programs in C or C++? 2. Have you implemented a classic stack smash exploit? 3. … a return-to-libc or return-oriented- programming exploit? 4. … ...
pdf
How to hack your way out of home detention About me • William “@Amm0nRa” Turner • @Assurance Disclaimer: • I own this system (and 0wn it) • The following information is for academic purposes only • Don’t use this for evil • If you do, you may go to jail Home Detention Systems • I own this system (and 0wn it) • Used t...
pdf
Marina Simakov Yaron Zinar ABOUT US <RELAYING CREDENTIALS HAS NEVER BEEN EASIER. MARINA SIMAKOV & YARON ZINAR. DEFCON 2019> • Senior Security Researcher @Preempt • M.Sc. in computer science, with several published articles, with a main area of expertise in graph theory • Previously worked as a Security Researcher @Mic...
pdf
What we'll cover How online intelligence gathering differs from traditional intelligence gathering The difference between intelligence and espionage Corporate “Dash boards” Tips from the field Opportunities for the community Who am I? MikeSchrenk@yahoo.com Minneapolis-based consultancy: Michael Schren...
pdf
DEF CON 18 Malware Freakshow 2 Nicholas J. Percoco & Jibran Ilyas Copyright Trustwave 2010 Agenda •  About Us •  Introduction •  What’s a Malware Freakshow? •  Anatomy of a Successful Malware Attack •  Sample Analysis + Victim + Demo •  Sample SL2009-127 – Memory Rootkit Malware •  Sample SL2010-018 – Window...
pdf
NIST Special Publication NIST SP 800-161r1 Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations Jon Boyens Angela Smith Nadya Bartol Kris Winkler Alex Holbrook Matthew Fallon This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-161r1 NIST ...
pdf
从SSRF 到 RCE —— 对 Spring Cloud Gateway RCE漏洞的分析 0x01 写在前⾯ 本周⼆(3.1)的时候Spring官⽅发布了 Spring Cloud Gateway CVE 报告 其中编号为 CVE-2022-22947 Spring Cloud Gateway 代码注⼊漏洞的严重性为危急,周三周四的时候就有不少圈 内的朋友发了分析和复现过程,由于在⼯作和写论⽂,就⼀直没去跟踪看看,周末抽了点时间对这个漏洞进⾏复现 分析了⼀下。还是挺有意思的。 0x02 从SSRF说起 看到这个漏洞利⽤流程的时候,就有⼀种熟悉的既视感,回去翻了翻陈师傅的星球,果然: 去年12⽉的时候,陈师傅提了⼀个 actuat...
pdf
M A N N I N G Neil Madden API security Authorization Audit logging Authentication Encryption Rate-limiting Passwords Token-based Cookies Macaroons JWTs Certificates End-to-end Identity-based ACLs Roles ABAC Capabilities OAuth2 Security mechanisms Mechanism Chapter Audit logging 3 Rate-limiting 3 Passwords 3 Cookies 4 To...
pdf
Download from finelybook 7450911@qq.com 2 Microsoft Visual C# Step by Step Ninth Edition John Sharp Download from finelybook 7450911@qq.com 3 Microsoft Visual C# Step by Step, Ninth Edition Published with the authorization of Microsoft Corporation by: Pearson Education, Inc. Copyright © 2018 by Pearson Education, Inc. ...
pdf
滴水逆向课程笔记  –  Win32 Win32课程介绍  –  1 1 Win32课程介绍 很多人对Win32的认识是错误的,他们认为Win32就是画界面,都已经学MFC了还学什么Win32? Win32不是用来画界面的,如果你以后要在Windows写好程序,是必须要学Win32的;摆正学习态度。 滴水逆向课程笔记  –  Win32 字符编码  –  2 2 字符编码 我们会经常接触到各种各样的字符编码,本章节就来讲解一下常见的编码。 2.1 原始的ASCII编码 计算机是由美国人发明的,所以一开始设计编码的时候只会考虑到自身的元素,采用ASCII编码完全可以满足其 需求,但是计算机普及之后,很多国家的文字是象形文字,所以我们使...
pdf
Stephen Hilt, miaoski 2015/8/26-27 Building Automation and Control – Hacking Subsidized Energy Saving System 1 $ whoami • miaoski (@miaoski) • Staff engineer in Trend Micro • BACnet newbie 2 $ whoami • Stephen Hilt (@tothehilt) • Senior threat researcher, Trend Micro • 10 years ICS security exp 3 Disclai...
pdf
1 RAT Development 06/01/2022 Develop your own RAT EDR & AV Defense Dobin Rutishauser @dobinrutis https://bit.ly/3Qg219P 2 RAT Development 06/01/2022 Developer // TerreActive Pentester // Compass Security Developer // UZH SOC Analyst // Infoguard RedTeam Lead // Raiffeisen About SSL/TLS Recommendations // OWASP Switz...
pdf
Blinkie Lights! Network Monitoring with Arduino Steve Ocepek Copyright Trustwave 2010 Confidential Disclaimer Due to legal concerns, slides containing one or more of the following have been removed: •  Depictions of violence •  Dancing animals •  Transvestites •  Questionable remains of biological origin • ...
pdf
DefCON 27, Pedro Cabrera SDR Against Smart TVs; URL and channel injection attacks DefCON 27, Pedro Cabrera @PCabreraCamara DefCON 27, Pedro Cabrera Industrial engineer, UAV professional pilot, Radio Ham (EA4HCF) Ethon Shield, Founder 2018 RSA: “Parrot Drones Hijacking” 2017 BH Asia Trainings (+ Simon Roses): “Attack...
pdf
security when nanoseconds count James Arlen, CISA DEF CON 19 disclaimer I am employed in the Infosec industry, but not authorized to speak on behalf of my employer or clients. Everything I say can be blamed on the voices in your head. 2 credentials • 15+ years information security specialist • staff operations, con...
pdf
CHINESE STATE-SPONSORED GROUP ‘REDDELTA’ TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS CTA-CN-2020-0728 By Insikt Group ® CYBER THREAT ANALYSIS CHINA Recorded Future® | www.recordedfuture.com CTA-CN-2020-0728 1 Insikt Group® researchers used proprietary Recorded Future Network Traffic Analysis and RAT controll...
pdf
Custom Processing Unit: Tracing and Patching Intel Atom Microcode Black Hat USA 2022 Pietro Borrello Sapienza University of Rome Martin Schwarzl Graz University of Technology Michael Schwarz CISPA Helmholtz Center for Information Security Daniel Gruss Graz University of Technology Outline 1. Deep dive on CPU µcode 1 Pi...
pdf
© 2021 Akamai | Confidential 1 解码API安全 威胁、挑战和最佳实践 无处不在的API API是数字化体验的中⼼ • 移动应⽤ • ⽹站和应⽤程序依赖于 API 来实现核⼼功(例 如登录) • 基于微服务的现代架构 • API使得多⽤户体验更强⼤ • 法规要求使⽤Web API (如PSD2 / Open Banking) API WEB应用攻击的 演进 Time Complexity Web应用攻击 • DoS • Unvalidated Input • Authentication • Code execution 对Web应用和基 础设施的攻击 • Buffer overflow • DoS/DD...
pdf
DefCon 27, Las Vegas 2019 Breaking the back end! Gregory Pickett, CISSP, GCIA, GPEN Chicago, Illinois gregory.pickett@hellfiresecurity.com Hellfire Security Overview Transit System Reverse Engineering My Discoveries The Exploit The Lessons How This Is Different This is not illegal We aren’t sneaking into the station We...
pdf
群精华总结 2021-08-26 @只要ID够长,别人就不能看到我,问: 师傅们,复现printnightmare本地提权发现了一个问题,普通用户权限没法提权,也就是没法加载dll, 只有管理员权限才能加载dll提权到system,理论上不应该是user -> system吗? @wolvez,答: 看看补丁是否打了,dll 放能访问位置,高版本系统自动补丁。 解决:貌似真的是月度补丁的问题,8.10号偷偷更新的。 @王半仙,问: msf使用exploit/windows/local/persistence生成了权限维持后门,在windows 2008r2中,注销后,注 册表在,文件不见了,各位大佬有遇到的么。 @skrtskrt ...
pdf
Comparison Of File Infection On The Windows And Linux lclee_vx / F-13 Labs, lychan25/F-13 Labs [www.f13-labs.net] 2 Overview • Introduction • What is Win32 and ELF32 ? • The PE File Format and ELF File Format • Win32 File Infection (Windows Platform) and ELF File Infection (Linux Platform) • Demo • Comments • Refe...
pdf
Paul Marrapese <paul@redprocyon.com> DEF CON 28 Abusing P2P to Hack 3 Million Cameras What is this talk? • Overview of "convenience" feature found in millions of IoT devices • P2P is found in cameras, baby monitors, smart doorbells, DVRs, NASes, alarm systems… • Hundreds of different brands impacted (supply chain issu...
pdf
1 IceRiver⾼版本Q.V⼆开记录 特性清单 详细信息 修改默认登录认证的header标志位数据和验证成功的返回数据头部标志数据,规避爆破脚本扫描 修改beacon配置信息的默认XOR密钥,⼀定程度上规避⾃动化提取CO配置信息 修改配置数据所在堆块的默认值,规避beaconEye扫描 修改HTTP ua头,⼀定程度上规避全流量检测 增加beacon数量统计,⽅便统计战果 self inject模式 客户端内置winvnc,避免在TeamServer端上传winvnc dll,⽅便使⽤ 修改默认保存的客户端配置⽂件名,加密保存登录密码,避免被明⽂读取 Change Log 修改默认登录认证的header标志位数据和验证成功的返回...
pdf
Bluehat Shanghai 2019 | David “dwizzzle” Weston | Microsoft OS Security Group Manager Advancing Windows Security 早上好 上海! Windows for PCs Familiar desktop experience Broad hardware ecosystem Desktop app compat One Core OS Base OS App and Device Platform Runtimes and Frameworks Windows on XBOX 10 Shell experience Uniqu...
pdf
漏洞响应的六思 如何在归档漏洞 如何运营漏洞 如何跟踪漏洞 如何在洞海茫茫中搜集漏洞 如何在漏洞中识别水洞 如何在漏洞响应阶段处理漏洞 61.42% 共收录1209个漏洞,其中: 高可利用性漏洞:238个 非高可利用的高危漏洞:267个 影响一般的中危漏洞:742个 影响很小的低危漏洞:66个 影响一般的中危漏洞 10.97% 22.12% 5.49% 影响很小的低危漏洞 非高可利用的高危漏洞 高可利用性漏洞 标准化的重要性 漏洞搜集 漏洞响应 漏洞运营 漏洞定级分发 漏洞跟踪 漏洞归档 自动化收集 + 人工筛选 = 录入平台 定级金字塔模型 + 漏洞专家培养方案 响应流程标准化 (漏洞预警+漏洞复现+漏洞检测+漏洞防御) 跟踪流程...
pdf
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide 1 Changing the Mindset of Cyber Defense Detecting the Intent, Not just the Technique Vadim Pogulievsky Director of Cyber Research, Verint Confidential and proprietary information of Verint Systems Inc. © All rights res...
pdf
● ● ● ● ○ ○ ○ ● MikroTik Complete Solution for ISP ● Building and Running a Successful WISP ● MikroTik in Real Life, Full and Low Budget ISP ● X2com and MikroTik: New Core Network Case Study ● How to Build an ISP Business with Mikrotik Only ● Basic Mistakes by ISP's on Network Setup & BGP ● ISP Design – Using MikroTik...
pdf
Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock David Lawrence Robert Johnson Gabriel Karpman locks@mit.edu DEF CON 21 August 3, 2013 dlaw, robj, gdkar (DEF CON 21) Attacking the Schlage Primus August 3, 2013 1 / 30 Standard pin-tumbler locks Photo credit: user pbroks13 on Wikimedia Commo...
pdf
Sticky Keys to the Kingdom PRE-AUTH SYSTEM RCE ON WINDOWS IS MORE COMMON THAN YOU THINK DENNIS MALDONADO & TIM MCGUFFIN LARES Agenda • About Us • Problem Background • Our Solution • Statistics • Prevention / Remediation • Summary www.lares.com About Us • Dennis Maldonado • Adversarial Engineer – LARES Consulting • F...
pdf
RCTF WriteUp By Nu1L Author:Nu1L RCTF WriteUp By Nu1L Pwn Pokemon game sharing musl ezheap catch_the_frog unistruct warmnote Web ns_shaft_sql CandyShop VerySafe hiphop Easyphp xss it? EasySQLi Reverse sakuretsu Program Logic: Reverse Engineering Techniques Used: Solving: LoongArch Valgrind Hi!Harmony! dht two_shortest ...
pdf
Antenna comparison 20 antennas were tested to see which ones were the best for receiving. All the antennas are 3/4" Motorola TAD/TAE mount (aka "NMO"). The following lists are ordered as per what you see in the picture (left to right). General information: Manufacturer Model Type ...
pdf
Eric Sesterhenn <eric.sesterhenn@x41-dsec.de> 2018 X41 D-SEC GmbH https://www.x41-dsec.de/ 1 / 30 whoami • Eric Sesterhenn • Principal Security Consultant • Pentesting/Code Auditing at X41 https://www.x41-dsec.de/ 2 / 30 Disclaimer • The issues presented here have been reported and fixed! • These are open source project...
pdf
MySQL高交互反制蜜罐实践 0x00 背景 MySQL客户端任意文件读取“漏洞”由来已久,近年来由于护网的兴起,基于该漏洞的MySQL反制蜜罐 也频繁出现。然而很多商业蜜罐都是基于一些开源的验证性脚本进行开发(见参考链接),以这个完成 度来钓红队简直是在侮辱红队的智商。那么MySQL反制蜜罐从PoC到工程化实践中要解决哪些坑呢?咱 们今天来一一介绍。 0x01 PoC的局限 MySQL读文件漏洞的原理网上有一大把分析文章,这里就不再赘述了。先来简单看一个典型的PoC 的执行流程,如下图。客户端登录后向服务端发送查询请求之后,服务端返回了读文件的响应,客户端 乖乖就范,把文件发给了服务端。此时一般情况下服务端应该返回一...
pdf
Nathan Seidle Joel Bartlett Rob Reynolds Combos in 45 minutes or less!* *Totes Guaranteed 2002 Credit: Me Credit: Benjamin Rasmussen Credit: Make Magazine Credit: SparkFun Credit: SparkFun Credit: xkcd Credit: SentrySafe / Liberty Safes Power! Motor with 8400 tick encoder Servo with feedback Arduino Handle puller Ma...
pdf
Cloud Security in Map/Reduce An Analysis July 31, 2009 Jason Schlesinger ropyrusk@gmail.com Presentation Overview Contents: 1. Define Cloud Computing 2. Introduce and Describe Map/Reduce 3. Introduce Hadoop 4. Introduce Security Issues with Hadoop 5. Discuss Possible Solutions and Workarounds 6. Final Thoughts Goal...
pdf
COPYRIGHT ©2006 McAfee Inc. » What’s Next? Hacks-In-Taiwan 2006 Keynote Yen-Ming Chen Senior Principal Consultant Foundstone, A Division of McAfee 2 COPYRIGHT ©2006 McAfee Inc. Agenda » Introduction » Security Ecosystem » Security Trends » Security Technology » Conclusion 3 COPYRIGHT ©2006 McAfee Inc. Introduction Yen-...
pdf
玩转攻击检测 ID: tang3 ⽤用机器学习 绿盟科技 申军利 WHOAMI • ID:tang3 • 绿盟科技安全研究员 • WEB🐶——Java Web相关、 PHP代码审计、渗透攻防技术 研究 • 机器学习围观⼈人员 • 健⾝身爱好&研究者 • 棋臭瘾⼤大围棋渣 ⺫⽬目的:思路分享 思路、⼼心得、实践 常⻅见机器学习⽅方向 • 预测 • 分类 • 聚类 机器学习是 将现实问题转换为数学问题求解的过程 思考步骤 • 确认待解决问题是哪⼀一类的问题 • 先正则后机器学习(量→质) 没⾜足够数量级的样本说个P 思考步骤 • 确认待解决问题是哪⼀一类的问题分类 • 先正则后机器学习(量→质) • 特征量如何数字化(数据预处理) 数...
pdf
log4shell 0x00 log4shell anyway 0x01 waf rasp 1. wafrasphidssoc 2. rasp log4j 0x02 1. nolookupstrue 2. key 3. jdkrce 1nolookups nolookupstruelookup log4jXMLlookup log.error("${sys:java.version}"+"xxxxx") lookup java version lookup 1. 2. lookup 3. lookupGitHub 2 1. jvm -Dlog4j2.formatMsgNoLookups=true 2. cla...
pdf
0x01 前⾔ 如有技术交流或渗透测试/代码审计/SRC漏洞挖掘/红队⽅向综合培训 或 红蓝对抗评估/安全产品研发/安全服务需 求的朋友 欢迎联系QQ/VX 547006660 https://github.com/J0o1ey/BountyHunterInChina 重⽣之我是赏⾦猎⼈系列,欢迎⼤家点个star 0x02 缘起 早上打开微信⽆聊⽔群,偶然间发现新上了家SRC 新上的SRC⼀般都是细⽪嫩⾁的处⼦,未经万⼈骑,得⼿也更加容易,我们来⼀探究竟 0x03 资产搜集到默认秘钥被改 ⼭穷⽔尽 简单⽤⽬标的cert信息收集了⼀下⽹络空间的资产 发现了⽬标不少的域名都采⽤“短横线命名法”,⼀般来说⼤⼚⽤这种命名法便于分辨开发、测...
pdf
众所周知,Cobalt Strike的一些功能模块都是用spawn的方法实现,其原理就是启动一个进程,然后对该 进程进行功能模块dll反射注入,默认profile下是启动rundll32.exe这个进程,这种行为在数字的核晶模式 下是会被拦截的。前两天刚好在吐司看到一篇文章有讲到,修改Cobalt Strike的源码将spawn的方式修改 为inject的方法是可以bypass数字核晶的,因为将Cobalt Strike内置的功能模块dll注入到当前进程就没有 新启进程的行为。本文结合上述文章并在@wonderkun师傅的帮助下得到了一个更好的修改方案。 功能模块分析 Cobalt Strike常见的功能如:logonpasswor...
pdf
They took my laptop! The Fourth Amendment explained Disclaimer  It is vitally important for you to understand that while I am an attorney, I am not your attorney.  In no way, shape, or form is this presentation intended to provide you with legal advice.  Before relying or acting upon any information learned...
pdf
Physical Security (You’re Doing It Wrong) A.P. Delchi Saturday, July 3, 2010 # whois delchi ‣ Infosec Rasputin ‣ Defcon, HOPE, Pumpcon, Skytalks ‣ Minister of Propaganda & Revenge, Attack Research Saturday, July 3, 2010 # whois delchi $DIETY Grant me the serenity to accept people who will not secure their network...
pdf
勿忘初⼼ - Ch1ng's Blog Thinking and Acting ⾸⻚ Links About me Rss 记⼀次 Tomcat 部署 WAR 包拦截绕过的深究 作者: admin 时间: 2022-05-25 分类: 随便写写,开发 项⽬遇到的好玩技巧 0x01 前⾔ 在⼀次项⽬中进⼊ Tomcat 后台,但是部署 WAR 包的时候被拦截,从⽽引发的⼀些列源码审计 0x02 分析过程 在 filename 参数添加 \ 字符的时候发现成功部署了应⽤并且绕过了 WAF 拦截,按照正常逻辑来说,这样的包不应该 被成功部署的。 定位到 Tomcat 的上传应⽤包的 Servlet - HTMLManagerS...
pdf
XStream 安全研究笔记 1 XStream 安全研究笔记 Created Tags ⼀、简介 近期,XStream组件频繁爆出安全漏洞,本来打算是⼀年前看XStream组件的,后来因为种种原因⼀直没有看,现在分别爆出了: CVE-2020-26217、CVE-2020-26258、CVE-2020-26259,打算重新回过头再看看XStream的代码。 XStream的架构主要由四个模块组成,分别是: Converters Drivers Context Facade 其中Converters是XStream中的核⼼模块,主要是负责XML到Java对象的转换,Java对象到XML数据格式的转换,XStream内...
pdf
FluX on: E.A.S. (Emergency Alert System) Presented By: Matt Krick, “DCFluX” Chief Engineer, New West Broadcasting Systems, Inc. DEF CON 16 Las Vegas, NV Track 2, 12:00-12:50, Saturday, August 9, 2008 WARNING: Shut down all transmitters with active microphones in the room. Do not re-transmit ‘Hot’ audio. Saturday Nigh...
pdf
The Anatomy of Drug Testing Legal Stuffs ● Scheduling The purpose ● Schedule I No medical use/Highly addictive ● Schedule II Some medical application/Highly addictive ● Schedules III / IV Legal Stuffs (cont.) ● The DOT ● COC ● Securing the location ● BAT ● COC ● Police vs. Hospitals/Collection sites Methodologies ● EIA...
pdf
Author: 远海@websecuritys.cn 0x01:前言 最近忙着复习,所以很少关注安全这块了。本次是针对自己学校某系统的渗透记录,已获得相应授 权。通用漏洞涉及影响单位早前已提交至SRC平台,厂商以发布对应补丁。 0x02:信息收集 目标系统主要是一个支付平台,是近期刚上线的系统,向学校老师取得相应授权后开始测试。 软件开发商:`xx软件开发有限公司/xxsoft/xxxx.com.cn` 开发语言: `Java` 框架: `St2` 因为是近期刚上线的系统,单点认证还没有接入。无法通过单点认证登录此系统,在尝试爆破 admin 密码后无果. 开始转向源码的收集。毕竟白盒才是最直接的手段。源码的收集大致有以下几个...
pdf
⾃动化通⽤DLL劫持 - 1 ⾃动化通⽤DLL劫持 之前写过⼀篇 使⽤⽩加⿊的⽅式⽣成"冲锋⻢",使⽤到部分 dll 劫持的技术。但是它的场景是劫持后阻断正常⽩⽂件的运⾏,程序的控制权交到“⿊⽂ 件”中。 这篇⽂章是对通⽤ DLL 劫持的研究,期望能制作⼀个通⽤的 DLL,劫持程序原有的 dll 但保留原 dll 的功能,同时执⾏⾃⼰的代码,这个 dll 最好能⾃动⽣成(不要⼿动编译),主要⽤于维权场景。 已有研究 Aheadlib 著名的⼯具 Aheadlib 能直接⽣成转发形式的 dll 劫持源码,通过 #pragma comment(linker,"/EXPORT:") 来指定导出表的转发。 转发模式⽣成的源码: 红队开发 -...
pdf
The Google Hacker’s Guide johnny@ihackstuff.com http://johnny.ihackstuff.com - Page 1 - The Google Hacker’s Guide Understanding and Defending Against the Google Hacker by Johnny Long johnny@ihackstuff.com http://johnny.ihackstuff.com The Google Hacker’s Guide johnny@ihackstuff.com http://johnny.ihackstuff.com - Page 2 ...
pdf
Hacking the Hybrid Cloud Sean Metcalf (@PyroTek3) s e a n @ Trimarc Security . com TrimarcSecurity.com ABOUT • Founder Trimarc (Trimarc.io), a professional services company that helps organizations better secure their Microsoft platform, including the Microsoft Cloud and VMWare Infrastructure. • Microsoft Certifie...
pdf
The Six Year Old Hacker: References and resources: Educational Theory, Piaget, Montessori, Papert and others: http://education.indiana.edu/~p540/webcourse/develop.html http://www.ship.edu/~cgboeree/piaget.html http://www.montessori.edu/ http://www.montessori.org/ Stoll Lillard, Angeline; Montessori: The Science Behind ...
pdf
DEF CON 24 4 August Las Vegas, USA ME & VULNEX Simon Roses Femerling • Founder & CEO, VULNEX www.vulnex.com • @simonroses • Former Microsoft, PwC, @Stake • US DARPA award to research on software security • Speaker: Black Hat, RSA, HITB, OWASP, SOURCE, AppSec, DeepSec, TECHNET • Blog: http://www.simon...
pdf
!!!!Replay!Attacks!on!Ethereum!Smart!Contracts Zhenxuan!Bai,!Yuwei!Zheng,!!Kunzhe!ChaiSenhua!Wang About!us •  360!Technology!is!a!leading!Internet!security!company!in!China.!Our!core! products!are!anti-virus!security!software!for!PC!and!cellphones.! •  UnicornTeam!(https://unicorn.360.com/)!was!built!in!2014.!This!is!a...
pdf
WiMAX Hacking 2010 pierce goldy aSmig DEFCON 18 updated slides, code, and discussion at https://groups.google.com/group/wimax-hacking The Technology Service and Deployment Reseller Access Echo Peak Clearspot Hacking the Home Device HTC EVO Captive Portal Bypass Location Based Services Google Group https://groups.go...
pdf
Kill 'em All -- DDoS Protection Total Annihilation! Tony T.N. Miu1, W.L. Lee2, Alan K.L. Chung2, Daniel X.P. Luo2, Albert K.T. Hui2, and Judy W.S. Wong2 1Nexusguard Limited tony.miu@nexusguard.com 2Network Threats Information Sharing and Analysis Center (NT-ISAC) Bloodspear Labs {leng,alan,daniel,albert,judy}@bl...
pdf
Slide 1 Replacing TripWire with SNMPv3 Matthew G. Marsh Chief Scientist of the NEbraskaCERT Slide 2 Scope Quick Overview & History of SNMP Definitions & Terminology SNMPv3 will be implicit in the rest of the sections RFC(s) that define v3 Highlights - why use v3 Authentication Privacy Security Scope General Usage Net-S...
pdf
Wesley McGrew, Ph.D. Director of Cyber Operations wesley.mcgrew@hornecyber.com @McGrewSecurity Secure Penetration Testing Operations Demonstrated Weaknesses in Learning Material and Tools Bio • Co-Founder of HORNE Cyber, previously Halberd Group • Directs and participates • Penetration testing engagement...
pdf
Hackers + Airplanes No Good Can Come Of This Defcon 20 Brad “RenderMan” Haines, CISSP www.renderlab.net render@renderlab.net Twitter: @IhackedWhat + = Who Am I? Who Am I? Consultant – Wireless, Physical, General Security, CISSP Author – 7 Deadliest Wireless Attacks, Kismet Hacking, RFID Security Trainer – Wireless...
pdf
                       ! " # $ % " & ' $ ( % ' % " ) * ) & # " # + * , ) # ' # ) & - % . # ' ' , " & . * ) & # " * " / / & * 0 " # 1 ) & . $ 2 # ) # . # ( 1 3 4 5 % 0 # * ( # + ) 5 % 6 $ % " 6 ) ) # 7 2 # 8 % . ) & 1 ) # $ 2 # - & / % . # ' $ ( % ) % + 2 % % * " / # $ % " * . . % 1 1 ) # ) 5 % "...
pdf
Correlation Power Analysis of AES-256 on ATmega328P 1 游世群 JPChen 許遠哲 Outlines • SCA/DPA/CPA • Hardware Implementation • Demo Video • CPA Implementation on AES Rounds • Countermeasures • Conclusion 2 hidden in an encryption algorithm. Hardware key Side-Channel Analysis Plaintext Cipherte...
pdf
0x00 前⾔ 如有技术交流或渗透测试/代码审计/红队⽅向培训/红蓝对抗评估需求的朋友 欢迎联系QQ/VX-547006660 前两天在国企的朋友遇到了⼀个棘⼿的靶标,听说之前没⼈能从外⽹打点进去,只能靠万⾥防⽕墙取证 我⼀听来了兴趣,在梦中臆造了⼀个靶场进⾏渗透,并且该梦境已获得相关授权 还请各位看官请勿对号⼊座,如有雷同,纯属巧合 0x01 钓⻥打点 官⽹发现了客服联系⽅式 通过修改 shellcode特征的CS + 免杀加载器,直接做出免杀 。 改后缀名为⾮exe(懂的都懂),直接⽤话术钓⻥客服(现在客服都聪明了,直接exe是肯定钓不到的),获得其桌⾯记 事本 记事本中翻出来了后台地址,但是并没有账号密码(有也没有⽤,因为有G...
pdf
Locksport An Emerging Subculture Intro and History • Locks • Lockpickers Locks • Egyptian Pin Tumbler • Medieval Artistry • Puzzle Locks • Modern Advances – Pin Tumbler Sidebar – Wafer Lock – Disc Lock – Lever Lock Lockpickers • Pre-locks (the thief knot) • Wax pad attack • Similarity of keys • Brahma Vs. Hobbs – Great...
pdf
Athena A user’s guide By Steve Lord (A friend of Dave’s) steve@buyukada.co.uk ”You are no longer a child: you must put childish thoughts away." [Athena to Telemachus. Homer, Odyssey 1.296] Background Athena was the Greek goddess of wisdom, war, the arts, industry, justice and skill. She was the strongest suppo...
pdf
Dark Data Svea Eckert – Andreas Dewes Who we are Svea Eckert Journalist (NDR/ ARD) @sveckert @japh44 Andreas Dewes Data Scientist (DCSO & 7scientists) Why we are here “US Senate voted to eliminate broadband privacy rules that would have required ISPs to get consumers' explicit consent before selling or sharing Web b...
pdf
Overview Key Findings Recommendations Software engineering leaders focused on software engineering strategies should work with their security and risk counterparts to: Licensed for Distribution How Software Engineering Leaders Can Mitigate Software Supply Chain Security Risks Published 15 July 2021 - ID G00752454 - 19 ...
pdf
Examining the Internet’s Pollution! Karyn Benson! kbenson@cs.ucsd.edu! 2 https://www.reddit.com/r/AskReddit/comments/2pjsf9/garbage_men_of_reddit_whats_the_most_illegal/ 3 http://www.owensworld.com/funny-pictures/vehicles/2-cars-dumpster People throw out interesting and valuable items 4 This talk: what sort of interes...
pdf
萬⽤劫持 本地提权 情報滲透 越級注入 PS C:\> [System.Convert]::ToBase64String([System ext.Encoding]::UTF8.GetBytes("PS cmd.exe /c "dir" 141414141414141414141 AAAAAAAAAAAAAAAAAAAAAAA aaaddress1@chroot.org 遠程後⾨ 網軍⾏動 Duplicate Paths Attack: Get Elevated Privilege from Forged Identities $_whoami #Windows #Reversing #Pwn #Exploit • Maste...
pdf
When tapes go missing..... Robert Stoudt IBM-ISS RStoudt@us.ibm.com “It is important for customers to note that these tapes cannot be read without specific computer equipment and software.” “The missing tapes require a tape drive to be read, and cannot be viewed from a PC” “The administration continues to maintain th...
pdf
FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT  MDY INDUSTRIES, LLC, Plaintiff-counter-defendant- Appellant, v. No. 09-15932 BLIZZARD ENTERTAINMENT, INC. and VIVENDI GAMES, INC., D.C. No. Defendants-third-party-plaintiffs-  2:06-CV-02555- Appellees, DGC v. MICHAEL DONNELLY, Third-party-defendant...
pdf
Playing with Web Application Firewalls DEFCON 16, August 8-10, 2008, Las Vegas, NV, USA http://ws.hackaholic.org Playing with Web Application Firewalls Who is Wendel Guglielmetti Henrique ? ● Penetration Test analyst at SecurityLabs - Intruders Tiger Team Security division (http://www.intruders.com.br) - One o...
pdf
2020 4141414141414141414 AAAAAAAAAAA HITCON aaaddress1@chroot.org Reversing In Wonderland Neural Network Based Malware Detection Techniques • Master degree at CSIE, NTUST • Security Researcher - chrO.ot • Speaker - BlackHat, DEFCON, HITCON, CYBERSEC • aaaddress1@chroot.org • 30cm.tw & Hao's Arsenal #Windows #Rever...
pdf
Hacker Law School "We went to law school so you don't have to" 2013 Summer Quarter D E F C O N Faculty Bio Marcia Hofmann •  Currently solo digital rights attorney •  7 Years at the EFF •  3 Years at EPIC •  Adjunct faculty at the University of California Hastings College of Law in San Francisco •  Licensed ...
pdf
Page 1 of 1 © 2003 Airscanner™ Corp. http://www.Airscanner.com Embedded Reverse Engineering: Cracking Mobile Binaries 1. Overview Reverse-engineering has long been one of the most popular trouble shooting techniques. In fact, long before the first hacker ever laid eyes on a computer...
pdf
Mission Impossible Steal Kernel Data from User Space Yueqiang)Cheng,)Zhaofeng)Chen,)Yulong)Zhang,)Yu)Ding,)Tao)Wei) Baidu)Security) About Speakers Dr.$Tao$Wei$ Dr.$Yueqiang$Cheng$ Mr.$Zhaofeng$Chen$ Mr.$Yulong$Zhang$ Dr.$Yu$Ding$ Our)Security)Projects:) How to Read Unauthorized Kernel Data  From User Space? $$ St...
pdf
Exploiting Continuous Integration (CI) and Automated Build Systems And introducing CIDER Whoami • SpaceB0x • Sr.+Security+Engineer+at+LeanKit • Application+and+network+security+(offense+and+defense) • I+like+breaking+in+to+systems,+building+systems,+and+learning • Security+consultant ./agenda.sh • Overview+of+Continu...
pdf
Hacking from the Palm of your Hand Paul Clip DEFCON - August 01, 2003 P R O P R I E T A R Y B U T N O T C O N F I D E N T I A L © 2 0 0 3 @ S T A K E , I N C . Agenda Goals Past – Overview of the Palm Platform – Hacker Tools on the Palm Present – AUSTIN - A Palm OS Vulnerability Scanner – Archite...
pdf
A COUP D'ETAT BY A GROUP OF MERCENARY HACKERS Paper by: C Rock and S Mann: Winston Churchill famously said - when the Germans were about to overrun France on one or other of their invasions - "Gentlemen, do not forget, this is not just about France ... this is about champagne." A 'Coup' in France can mean a gla...
pdf
Sean Kanuck DEF CON 25 Hacking Democracy : A Socratic Dialogue How do you know if your vote was recorded correctly Which is more important to you : secrecy or verification How much error is too much for legitimacy Were you on the right list Were you in the right place Does the proc...
pdf
KinectASploit What if you took a kinect, used it's skeleton tracking features KinectASploit Sprinkled in some hacking tools: Wait a minute!... we did that already. Lets find out! Come see the Demo at Defcon20 and look for the tool source at: http://p0wnlabs.com/defcon20 jeff bryner p0wnlabs.com Use @ your own ri...
pdf
0x01bettercap 0x02ssh rm /etc/dropbear/* dropbearkey -t rsa -f /etc/dropbear/dropbear_rsa_host_key dropbear -r /etc/dropbear/dropbear_rsa_host_key 0x03root 1. /usr/share/mico/messaging/messaging.conf 0x04https 2. /usr/share/mico/messaging/mediaplayer.cfg CA 3. pub openssl rsa -inform DER -in priburp -pubout -o...
pdf
Mac OS X Server Web Technologies Administration For Version 10.3 or Later 034-2350_Cvr 9/12/03 7:31 AM Page 1  Apple Computer, Inc. © 2003 Apple Computer, Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication for the purpose of learning...
pdf
Christopher  M.  Shields  r00t0v3rr1d3 Ma1hew  M.  Toussain  0sm0s1z Chris – Custom Attack Tools and Project Management Matt – Interface Design and Framework Development Basic ARP Poison Heavy Network Traffic Periods of MITM Loss Python Tool With Scapy Intelligent Network Poison Dynamic P...
pdf
2017/12/07 HITCON PACIFIC 1 KRACK & ROCA 吳忠憲 1,3 陳君明 1,2,3 J.-S. Wu Jimmy Chen 1. NTU, National Taiwan University 2. IKV, InfoKeyVault Technology 3. CHROOT & HITCON Agenda  KRACK  Key Reinstallation Attacks – Serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks  ROCA...
pdf
Breaking Bitcoin Hardware Wallets Glitches cause stitches! Josh Datko Chris Quartier Kirill Belyayev Updated: 2017/07/07 Link Drop! All updated references, notes, links, can be found here: https://www.cryptotronix.com/breakingbitcoin The bug that started it all 1 bool storage_is_pin_correct(const char *pin) 2 { 3 retur...
pdf
DDoS Black and White “Kungfu” Revealed (DEF CON 20 Edition) {Tony Miu (aka MT), Anthony Lai (aka Darkfloyd), Alan Chung (aka Avenir), Kelvin Wong (aka Captain)} Valkyrie-X Security Research Group (VXRL) Disclaimer • There is no national secrets leaked here. • Welcome to all national spies  • No real attacks are la...
pdf
Central bank digital currency Threats and vulnerabilities Defcon 29 Ian Vitek CBDC Security Central bank of Sweden, Sveriges Riksbank Central bank digital currency Threats and vulnerabilities Presentation Background Detailed system description of the prototype Vulnerabilities in the retail central bank digital currency...
pdf
本人可以提供各种PDF电子书资料,计算机类,文学,艺术,设计,医学,理 学,经济,金融,等等。质量都很清晰,而且每本100%都带书签和目录,方便 读者阅读观看,只要您提供给我书的相关信息,一般我都能找到,如果您有需 求,请联系我 QQ: 461573687, 或者 QQ: 2404062482。 本人已经帮助了上万人找到了他们需要的PDF,其实网上有很多PDF,大家如果 在网上不到的话,可以联系我QQ。因PDF电子书都有版权,请不要随意传播, 最近pdf也越来越难做了,希望大家尊重下个人劳动,谢谢! ___________________________________________________________________...
pdf
Tineola: Taking A Bite Out of Enterprise Blockchain Attacking HyperLedger Fabric Parsia Hakimian, Stark Riedesel Defcon 26 – Aug 11, 2018 © 2018 Synopsys, Inc. 2 5 Courses Our Team Enterprise Blockchains A Use Case The Target – HyperLedger Fabric Tineola © 2018 Synopsys, Inc. 3 HyperLedger Fabric – Core Research Grou...
pdf
前言 继续分享一些 Webshell 的小tricks,在正文开始之前先留2个问题,可以先不看 pdf ,也不要把代码拿 去运行,用肉眼判断下面这2个 php 代码会输出什么,原理以及在 Webshell 中运用写在 PDF 里面了。 代码1: 代码2: 正文 这里应该也不用我揭晓答案了,拿去运行一下应该都一目了然了,上面提出的那2个代码均来自 php bug ,我相信绝大部分人如果没遇到过此问题的话很有可能会判断错误。 判断错误的人想法可能如下: 问题一:为什么代码一中变量 $a 只是将值拷贝给 $c ,并没有进行引用传值,但是 $c[0]="c" 还是改 变了 $a[0] 。 问题二:为什么代码二中 theFunction 参...
pdf
PacketFence, the Open Source NAC: What we've done in the last two years Salivating on NAC secret sauce Presentation Plan What's Network Access Control (NAC) The secret sauce The Open Source differentiator The good and the bad of 2 years as lead developer The Future of PacketFence (aka World Domination Roadmap) Communit...
pdf
Teal Rogers and Alejandro Caceres • Teal has experience with 3D visualizations and organizing massive amounts of data. • Alex has a background in distributed computing, network reconnaissance, and vulnerability detection. • The internet contains a massive amount of data that is extremely interconnected, however...
pdf
Abstract This  paper  details  an  approach  by  which  SQL  injection  is  used  to  gain  remote  access  to  arbitrary  files  from  the file  systems  of  Netgear  wireless  routers.  It  also  leverages  the  same  SQL  injection  to  exploit  a...
pdf
Timing Attacks in Low-Latency Mix Systems (Extended Abstract) Brian N. Levine1, Michael K. Reiter2, Chenxi Wang2, and Matthew Wright1 1 University of Massachusetts, Amherst, MA, USA; {brian,mwright}@cs.umass.edu 2 Carnegie Mellon University, Pittsburgh, PA, USA; {reiter,chenxi}@cmu.edu Abstract. A mix is a communicatio...
pdf