text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Sk3wlDbg:
Emulating all (well many)
of the things with Ida
Chris Eagle
Sk3wl 0f r00t
Disclaimer
– Everything I say today is my own
opinion and not necessarily the
opinion of my employer and certainly
not the opinion of DARPA
Who am I?
– Senior lecturer of computer science
– Computer security researcher
– Reverse eng... | pdf |
I Hunt Penetration Testers:
More Weaknesses in Tools and
Procedures
Wesley McGrew, Ph.D.
wesley@mcgrewsecurity.com
Page ! of !
1
21
DRAFT
Final paper and slide release during
DEF CON 23 at mcgrewsecurity.com and
available on defcon.org shortly
afterwards. Trust me, you’ll want the
final copy.
ABSTRACT
Whe... | pdf |
Drinking From the
Caffeine Firehose
We call SHODAN.
By Viss!
Prepared for Defcon 20
Thursday, July 12, 12
This is not just another
shodan talk.
Today we turn shodan into a gateway
drug.
Thursday, July 12, 12
What do people put on
the internet?
Routers, switches, servers, printers..
Meh. seen it.
Show me something... | pdf |
Smart Contract Hacking
Konstantinos Karagiannis
CTO, Security Consulting, BT Americas
@KonstantHacker
when transactions aren’t enough
• “The key
component is this
idea of a Turing-
complete
blockchain”
• --Vitalik Buterin
meow—putting that computing to use
smart contracts
billions, or just millions, of reasons
probl... | pdf |
Submitted in Defcon 18 2010
WPA Too!
Md Sohail Ahmad, AirTight Networks
md.ahmad@airtightnetworks.com
Abstract
WPA2 is considered as the most secure configuration for WiFi networks. It is widely used to
secure enterprise and private WiFi networks. Interestingly, it is also being used to secure guest,
municipal a... | pdf |
Introduction
DNS Security Issues
Passive DNS hardening
DNSDB
Passive DNS Hardening
Robert Edmonds
Internet Systems Consortium, Inc.
Robert Edmonds
Passive DNS Hardening
Introduction
DNS Security Issues
Passive DNS hardening
DNSDB
DNS
Passive DNS
ISC SIE
Structure of this talk
▶ Introduction
▶ DNS
▶ Passive DNS
▶ ISC SI... | pdf |
0x00 前⾔
有技术交流或渗透测试培训需求的朋友欢迎联系QQ/VX-547006660,
需要代码审计、渗透测试、红蓝对抗⽹络安全相关业务可以联系我司
2000⼈⽹络安全交流群,欢迎⼤佬们来交流 群号820783253
最近BugBounty挖了不少,但⼤多数都是有⼿就⾏的漏洞,需要动脑⼦的实属罕⻅
⽽今天就遇到了⼀个⾮常好的案例,故作此⽂
0x01 对⽬录批量FUZZ,发现⼀处隐蔽接⼝
挖某⼤⼚已经挖了快两个周了,期间因为公司业务⽐较繁忙,最近⼀直没挖。
但是⼀直在⽤ffuf挂着字典对⼚商资产进⾏批量⽬录扫描,今天上服务器看了下扫描结果,就出货了
接⼝地址为:https://xxx.xxxx.com/xxxx/start
我们直... | pdf |
Drinking from LETHE:
New methods of exploiting and mitigating
memory corruption vulnerabilities
Daniel Selifonov
DEF CON 23
August 7, 2015
Show of Hands
1. Have you written programs in C or C++?
2. Have you implemented a classic stack smash
exploit?
3. … a return-to-libc or return-oriented-
programming exploit?
4. … ... | pdf |
How to hack your way
out of home detention
About me
• William “@Amm0nRa” Turner
• @Assurance
Disclaimer:
• I own this system (and 0wn it)
• The following information is for academic
purposes only
• Don’t use this for evil
• If you do, you may go to jail
Home Detention Systems
•
I own this system (and 0wn it)
• Used t... | pdf |
Marina Simakov
Yaron Zinar
ABOUT US
<RELAYING CREDENTIALS HAS NEVER BEEN EASIER. MARINA SIMAKOV & YARON ZINAR. DEFCON 2019>
• Senior Security Researcher @Preempt
• M.Sc. in computer science, with several published articles, with a main area of
expertise in graph theory
• Previously worked as a Security Researcher @Mic... | pdf |
What we'll cover
How online intelligence gathering differs from
traditional intelligence gathering
The difference between intelligence and
espionage
Corporate “Dash boards”
Tips from the field
Opportunities for the community
Who am I?
MikeSchrenk@yahoo.com
Minneapolis-based consultancy:
Michael Schren... | pdf |
DEF CON 18
Malware Freakshow 2
Nicholas J. Percoco & Jibran Ilyas
Copyright Trustwave 2010
Agenda
• About Us
• Introduction
• What’s a Malware Freakshow?
• Anatomy of a Successful Malware Attack
• Sample Analysis + Victim + Demo
• Sample SL2009-127 – Memory Rootkit Malware
• Sample SL2010-018 – Window... | pdf |
NIST Special Publication
NIST SP 800-161r1
Cybersecurity Supply Chain Risk
Management Practices for Systems
and Organizations
Jon Boyens
Angela Smith
Nadya Bartol
Kris Winkler
Alex Holbrook
Matthew Fallon
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-161r1
NIST ... | pdf |
从SSRF 到 RCE —— 对 Spring Cloud Gateway
RCE漏洞的分析
0x01 写在前⾯
本周⼆(3.1)的时候Spring官⽅发布了 Spring Cloud Gateway CVE 报告
其中编号为 CVE-2022-22947 Spring Cloud Gateway 代码注⼊漏洞的严重性为危急,周三周四的时候就有不少圈
内的朋友发了分析和复现过程,由于在⼯作和写论⽂,就⼀直没去跟踪看看,周末抽了点时间对这个漏洞进⾏复现
分析了⼀下。还是挺有意思的。
0x02 从SSRF说起
看到这个漏洞利⽤流程的时候,就有⼀种熟悉的既视感,回去翻了翻陈师傅的星球,果然:
去年12⽉的时候,陈师傅提了⼀个 actuat... | pdf |
M A N N I N G
Neil Madden
API security
Authorization
Audit logging
Authentication
Encryption
Rate-limiting
Passwords
Token-based
Cookies
Macaroons
JWTs
Certificates
End-to-end
Identity-based
ACLs
Roles
ABAC
Capabilities
OAuth2
Security mechanisms
Mechanism
Chapter
Audit logging
3
Rate-limiting
3
Passwords
3
Cookies
4
To... | pdf |
Download from finelybook 7450911@qq.com
2
Microsoft Visual C# Step by Step
Ninth Edition
John Sharp
Download from finelybook 7450911@qq.com
3
Microsoft Visual C# Step by Step, Ninth Edition
Published with the authorization of Microsoft Corporation by: Pearson
Education, Inc.
Copyright © 2018 by Pearson Education, Inc.
... | pdf |
滴水逆向课程笔记 – Win32
Win32课程介绍 – 1
1 Win32课程介绍
很多人对Win32的认识是错误的,他们认为Win32就是画界面,都已经学MFC了还学什么Win32?
Win32不是用来画界面的,如果你以后要在Windows写好程序,是必须要学Win32的;摆正学习态度。
滴水逆向课程笔记 – Win32
字符编码 – 2
2 字符编码
我们会经常接触到各种各样的字符编码,本章节就来讲解一下常见的编码。
2.1 原始的ASCII编码
计算机是由美国人发明的,所以一开始设计编码的时候只会考虑到自身的元素,采用ASCII编码完全可以满足其
需求,但是计算机普及之后,很多国家的文字是象形文字,所以我们使... | pdf |
Stephen Hilt, miaoski
2015/8/26-27
Building Automation and Control –
Hacking Subsidized Energy Saving System
1
$ whoami
• miaoski (@miaoski)
• Staff engineer in Trend Micro
• BACnet newbie
2
$ whoami
• Stephen Hilt (@tothehilt)
• Senior threat researcher, Trend Micro
• 10 years ICS security exp
3
Disclai... | pdf |
1
RAT Development
06/01/2022
Develop
your own
RAT
EDR & AV Defense
Dobin Rutishauser
@dobinrutis
https://bit.ly/3Qg219P
2
RAT Development
06/01/2022
Developer // TerreActive
Pentester // Compass Security
Developer // UZH
SOC Analyst // Infoguard
RedTeam Lead // Raiffeisen
About
SSL/TLS Recommendations
// OWASP Switz... | pdf |
Blinkie Lights!
Network Monitoring with Arduino
Steve Ocepek
Copyright Trustwave 2010
Confidential
Disclaimer
Due to legal concerns, slides containing one or more of the
following have been removed:
•
Depictions of violence
•
Dancing animals
•
Transvestites
•
Questionable remains of biological origin
• ... | pdf |
DefCON 27, Pedro Cabrera
SDR Against Smart TVs;
URL and channel injection
attacks
DefCON 27, Pedro Cabrera
@PCabreraCamara
DefCON 27, Pedro Cabrera
Industrial engineer, UAV professional pilot, Radio Ham (EA4HCF)
Ethon Shield, Founder
2018 RSA: “Parrot Drones Hijacking”
2017 BH Asia Trainings (+ Simon Roses):
“Attack... | pdf |
security when
nanoseconds count
James Arlen, CISA
DEF CON 19
disclaimer
I am employed in the Infosec industry,
but not authorized to speak on behalf
of my employer or clients.
Everything I say can be blamed on
the voices in your head.
2
credentials
•
15+ years information security specialist
•
staff operations, con... | pdf |
CHINESE STATE-SPONSORED
GROUP ‘REDDELTA’ TARGETS
THE VATICAN AND CATHOLIC
ORGANIZATIONS
CTA-CN-2020-0728
By Insikt Group
®
CYBER
THREAT
ANALYSIS
CHINA
Recorded Future® | www.recordedfuture.com
CTA-CN-2020-0728
1
Insikt Group® researchers used proprietary Recorded Future Network Traffic
Analysis and RAT controll... | pdf |
Custom Processing Unit:
Tracing and Patching Intel Atom Microcode
Black Hat USA 2022
Pietro Borrello
Sapienza University of Rome
Martin Schwarzl
Graz University of Technology
Michael Schwarz
CISPA Helmholtz Center for Information Security
Daniel Gruss
Graz University of Technology
Outline
1. Deep dive on CPU µcode
1
Pi... | pdf |
© 2021 Akamai | Confidential
1
解码API安全
威胁、挑战和最佳实践
无处不在的API
API是数字化体验的中⼼
•
移动应⽤
•
⽹站和应⽤程序依赖于 API 来实现核⼼功(例
如登录)
•
基于微服务的现代架构
•
API使得多⽤户体验更强⼤
•
法规要求使⽤Web API
(如PSD2 / Open Banking)
API
WEB应用攻击的 演进
Time
Complexity
Web应用攻击
•
DoS
•
Unvalidated Input
•
Authentication
•
Code execution
对Web应用和基
础设施的攻击
•
Buffer overflow
•
DoS/DD... | pdf |
DefCon 27, Las Vegas 2019
Breaking the back end!
Gregory Pickett, CISSP, GCIA, GPEN
Chicago, Illinois
gregory.pickett@hellfiresecurity.com
Hellfire Security
Overview
Transit System
Reverse Engineering
My Discoveries
The Exploit
The Lessons
How This Is Different
This is not illegal
We aren’t sneaking into the station
We... | pdf |
群精华总结 2021-08-26
@只要ID够长,别人就不能看到我,问:
师傅们,复现printnightmare本地提权发现了一个问题,普通用户权限没法提权,也就是没法加载dll,
只有管理员权限才能加载dll提权到system,理论上不应该是user -> system吗?
@wolvez,答:
看看补丁是否打了,dll 放能访问位置,高版本系统自动补丁。
解决:貌似真的是月度补丁的问题,8.10号偷偷更新的。
@王半仙,问:
msf使用exploit/windows/local/persistence生成了权限维持后门,在windows 2008r2中,注销后,注
册表在,文件不见了,各位大佬有遇到的么。
@skrtskrt ... | pdf |
Comparison Of File Infection On The
Windows And Linux
lclee_vx / F-13 Labs, lychan25/F-13 Labs
[www.f13-labs.net]
2
Overview
• Introduction
• What is Win32 and ELF32 ?
• The PE File Format and ELF File Format
• Win32 File Infection (Windows Platform) and ELF File Infection (Linux
Platform)
• Demo
• Comments
• Refe... | pdf |
Paul Marrapese <paul@redprocyon.com>
DEF CON 28
Abusing P2P to Hack
3 Million Cameras
What is this talk?
• Overview of "convenience" feature found in millions of IoT devices
• P2P is found in cameras, baby monitors, smart doorbells, DVRs, NASes, alarm systems…
• Hundreds of different brands impacted (supply chain issu... | pdf |
1
IceRiver⾼版本Q.V⼆开记录
特性清单
详细信息
修改默认登录认证的header标志位数据和验证成功的返回数据头部标志数据,规避爆破脚本扫描
修改beacon配置信息的默认XOR密钥,⼀定程度上规避⾃动化提取CO配置信息
修改配置数据所在堆块的默认值,规避beaconEye扫描
修改HTTP ua头,⼀定程度上规避全流量检测
增加beacon数量统计,⽅便统计战果
self inject模式
客户端内置winvnc,避免在TeamServer端上传winvnc dll,⽅便使⽤
修改默认保存的客户端配置⽂件名,加密保存登录密码,避免被明⽂读取
Change Log
修改默认登录认证的header标志位数据和验证成功的返回... | pdf |
Bluehat Shanghai 2019 |
David “dwizzzle” Weston |
Microsoft OS Security Group Manager
Advancing Windows Security
早上好 上海!
Windows for PCs
Familiar desktop experience
Broad hardware ecosystem
Desktop app compat
One Core OS
Base OS
App and Device Platform
Runtimes and Frameworks
Windows on XBOX
10 Shell experience
Uniqu... | pdf |
漏洞响应的六思
如何在归档漏洞
如何运营漏洞
如何跟踪漏洞
如何在洞海茫茫中搜集漏洞
如何在漏洞中识别水洞
如何在漏洞响应阶段处理漏洞
61.42%
共收录1209个漏洞,其中:
高可利用性漏洞:238个
非高可利用的高危漏洞:267个
影响一般的中危漏洞:742个
影响很小的低危漏洞:66个
影响一般的中危漏洞
10.97%
22.12%
5.49%
影响很小的低危漏洞
非高可利用的高危漏洞
高可利用性漏洞
标准化的重要性
漏洞搜集
漏洞响应
漏洞运营
漏洞定级分发
漏洞跟踪
漏洞归档
自动化收集 + 人工筛选 = 录入平台
定级金字塔模型 + 漏洞专家培养方案
响应流程标准化
(漏洞预警+漏洞复现+漏洞检测+漏洞防御)
跟踪流程... | pdf |
Confidential and proprietary information of Verint Systems Inc. © All rights reserved worldwide
1
Changing the Mindset of Cyber Defense
Detecting the Intent, Not just the Technique
Vadim Pogulievsky
Director of Cyber Research, Verint
Confidential and proprietary information of Verint Systems Inc. © All rights res... | pdf |
●
●
●
●
○
○
○
●
MikroTik Complete Solution for ISP
●
Building and Running a Successful WISP
●
MikroTik in Real Life, Full and Low Budget ISP
●
X2com and MikroTik: New Core Network Case Study
●
How to Build an ISP Business with Mikrotik Only
●
Basic Mistakes by ISP's on Network Setup & BGP
●
ISP Design – Using MikroTik... | pdf |
Key Decoding and Duplication Attacks for the
Schlage Primus High-Security Lock
David Lawrence
Robert Johnson
Gabriel Karpman
locks@mit.edu
DEF CON 21
August 3, 2013
dlaw, robj, gdkar (DEF CON 21)
Attacking the Schlage Primus
August 3, 2013
1 / 30
Standard pin-tumbler locks
Photo credit: user pbroks13 on Wikimedia Commo... | pdf |
Sticky Keys to the
Kingdom
PRE-AUTH SYSTEM RCE ON WINDOWS IS MORE COMMON
THAN YOU THINK
DENNIS MALDONADO & TIM MCGUFFIN
LARES
Agenda
• About Us
• Problem Background
• Our Solution
• Statistics
• Prevention / Remediation
• Summary
www.lares.com
About Us
• Dennis Maldonado
• Adversarial Engineer – LARES Consulting
• F... | pdf |
RCTF WriteUp By Nu1L
Author:Nu1L
RCTF WriteUp By Nu1L
Pwn
Pokemon
game
sharing
musl
ezheap
catch_the_frog
unistruct
warmnote
Web
ns_shaft_sql
CandyShop
VerySafe
hiphop
Easyphp
xss it?
EasySQLi
Reverse
sakuretsu
Program Logic:
Reverse Engineering Techniques Used:
Solving:
LoongArch
Valgrind
Hi!Harmony!
dht
two_shortest
... | pdf |
Antenna comparison
20 antennas were tested to see which ones were the best for receiving.
All the antennas are 3/4" Motorola TAD/TAE mount (aka "NMO").
The following lists are ordered as per what you see in the picture (left to right).
General information:
Manufacturer Model Type ... | pdf |
Eric Sesterhenn <eric.sesterhenn@x41-dsec.de>
2018
X41 D-SEC GmbH
https://www.x41-dsec.de/
1 / 30
whoami
• Eric Sesterhenn
• Principal Security Consultant
• Pentesting/Code Auditing at X41
https://www.x41-dsec.de/
2 / 30
Disclaimer
• The issues presented here have been
reported and fixed!
• These are open source project... | pdf |
MySQL高交互反制蜜罐实践
0x00 背景
MySQL客户端任意文件读取“漏洞”由来已久,近年来由于护网的兴起,基于该漏洞的MySQL反制蜜罐
也频繁出现。然而很多商业蜜罐都是基于一些开源的验证性脚本进行开发(见参考链接),以这个完成
度来钓红队简直是在侮辱红队的智商。那么MySQL反制蜜罐从PoC到工程化实践中要解决哪些坑呢?咱
们今天来一一介绍。
0x01 PoC的局限
MySQL读文件漏洞的原理网上有一大把分析文章,这里就不再赘述了。先来简单看一个典型的PoC
的执行流程,如下图。客户端登录后向服务端发送查询请求之后,服务端返回了读文件的响应,客户端
乖乖就范,把文件发给了服务端。此时一般情况下服务端应该返回一... | pdf |
Nathan Seidle
Joel Bartlett
Rob Reynolds
Combos in 45
minutes or less!*
*Totes Guaranteed
2002
Credit: Me
Credit: Benjamin Rasmussen
Credit: Make Magazine
Credit: SparkFun
Credit: SparkFun
Credit: xkcd
Credit: SentrySafe / Liberty Safes
Power!
Motor with 8400
tick encoder
Servo with
feedback
Arduino
Handle puller
Ma... | pdf |
Cloud Security in Map/Reduce
An Analysis
July 31, 2009
Jason Schlesinger
ropyrusk@gmail.com
Presentation Overview
Contents:
1. Define Cloud Computing
2. Introduce and Describe Map/Reduce
3. Introduce Hadoop
4. Introduce Security Issues with Hadoop
5. Discuss Possible Solutions and Workarounds
6. Final Thoughts
Goal... | pdf |
COPYRIGHT ©2006 McAfee Inc.
» What’s Next?
Hacks-In-Taiwan 2006 Keynote
Yen-Ming Chen
Senior Principal Consultant
Foundstone, A Division of McAfee
2
COPYRIGHT ©2006 McAfee Inc.
Agenda
»
Introduction
»
Security Ecosystem
»
Security Trends
»
Security Technology
»
Conclusion
3
COPYRIGHT ©2006 McAfee Inc.
Introduction
Yen-... | pdf |
玩转攻击检测
ID: tang3
⽤用机器学习
绿盟科技
申军利
WHOAMI
•
ID:tang3
•
绿盟科技安全研究员
•
WEB🐶——Java Web相关、
PHP代码审计、渗透攻防技术
研究
•
机器学习围观⼈人员
•
健⾝身爱好&研究者
•
棋臭瘾⼤大围棋渣
⺫⽬目的:思路分享
思路、⼼心得、实践
常⻅见机器学习⽅方向
• 预测
• 分类
• 聚类
机器学习是
将现实问题转换为数学问题求解的过程
思考步骤
• 确认待解决问题是哪⼀一类的问题
• 先正则后机器学习(量→质)
没⾜足够数量级的样本说个P
思考步骤
• 确认待解决问题是哪⼀一类的问题分类
• 先正则后机器学习(量→质)
• 特征量如何数字化(数据预处理)
数... | pdf |
log4shell
0x00
log4shell
anyway
0x01
waf
rasp
1. wafrasphidssoc
2. rasp
log4j
0x02
1. nolookupstrue
2. key
3. jdkrce
1nolookups
nolookupstruelookup
log4jXMLlookup
log.error("${sys:java.version}"+"xxxxx") lookup
java version
lookup
1.
2. lookup
3.
lookupGitHub
2
1. jvm -Dlog4j2.formatMsgNoLookups=true
2. cla... | pdf |
0x01 前⾔
如有技术交流或渗透测试/代码审计/SRC漏洞挖掘/红队⽅向综合培训 或 红蓝对抗评估/安全产品研发/安全服务需
求的朋友
欢迎联系QQ/VX 547006660
https://github.com/J0o1ey/BountyHunterInChina
重⽣之我是赏⾦猎⼈系列,欢迎⼤家点个star
0x02 缘起
早上打开微信⽆聊⽔群,偶然间发现新上了家SRC
新上的SRC⼀般都是细⽪嫩⾁的处⼦,未经万⼈骑,得⼿也更加容易,我们来⼀探究竟
0x03 资产搜集到默认秘钥被改 ⼭穷⽔尽
简单⽤⽬标的cert信息收集了⼀下⽹络空间的资产
发现了⽬标不少的域名都采⽤“短横线命名法”,⼀般来说⼤⼚⽤这种命名法便于分辨开发、测... | pdf |
众所周知,Cobalt Strike的一些功能模块都是用spawn的方法实现,其原理就是启动一个进程,然后对该
进程进行功能模块dll反射注入,默认profile下是启动rundll32.exe这个进程,这种行为在数字的核晶模式
下是会被拦截的。前两天刚好在吐司看到一篇文章有讲到,修改Cobalt Strike的源码将spawn的方式修改
为inject的方法是可以bypass数字核晶的,因为将Cobalt Strike内置的功能模块dll注入到当前进程就没有
新启进程的行为。本文结合上述文章并在@wonderkun师傅的帮助下得到了一个更好的修改方案。
功能模块分析
Cobalt Strike常见的功能如:logonpasswor... | pdf |
They took my laptop!
The Fourth Amendment explained
Disclaimer
It is vitally important for you to
understand that while I am an
attorney, I am not your attorney.
In no way, shape, or form is this
presentation intended to provide you
with legal advice.
Before relying or acting upon any
information learned... | pdf |
Physical
Security
(You’re Doing It Wrong)
A.P. Delchi
Saturday, July 3, 2010
# whois delchi
‣ Infosec Rasputin
‣ Defcon, HOPE, Pumpcon,
Skytalks
‣ Minister of Propaganda &
Revenge, Attack Research
Saturday, July 3, 2010
# whois delchi
$DIETY
Grant me the serenity to accept
people who will not secure their
network... | pdf |
勿忘初⼼ - Ch1ng's Blog
Thinking and Acting
⾸⻚
Links
About me
Rss
记⼀次 Tomcat 部署 WAR 包拦截绕过的深究
作者: admin
时间: 2022-05-25
分类: 随便写写,开发
项⽬遇到的好玩技巧
0x01 前⾔
在⼀次项⽬中进⼊ Tomcat 后台,但是部署 WAR 包的时候被拦截,从⽽引发的⼀些列源码审计
0x02 分析过程
在 filename 参数添加 \ 字符的时候发现成功部署了应⽤并且绕过了 WAF 拦截,按照正常逻辑来说,这样的包不应该
被成功部署的。
定位到 Tomcat 的上传应⽤包的 Servlet - HTMLManagerS... | pdf |
XStream 安全研究笔记
1
XStream 安全研究笔记
Created
Tags
⼀、简介
近期,XStream组件频繁爆出安全漏洞,本来打算是⼀年前看XStream组件的,后来因为种种原因⼀直没有看,现在分别爆出了:
CVE-2020-26217、CVE-2020-26258、CVE-2020-26259,打算重新回过头再看看XStream的代码。
XStream的架构主要由四个模块组成,分别是:
Converters
Drivers
Context
Facade
其中Converters是XStream中的核⼼模块,主要是负责XML到Java对象的转换,Java对象到XML数据格式的转换,XStream内... | pdf |
FluX on: E.A.S.
(Emergency Alert System)
Presented By:
Matt Krick, “DCFluX”
Chief Engineer, New West Broadcasting Systems, Inc.
DEF CON 16
Las Vegas, NV
Track 2, 12:00-12:50, Saturday, August 9, 2008
WARNING:
Shut down all transmitters with active
microphones in the room.
Do not re-transmit ‘Hot’ audio.
Saturday Nigh... | pdf |
The Anatomy of Drug Testing
Legal Stuffs
● Scheduling
The purpose
● Schedule I
No medical use/Highly addictive
● Schedule II
Some medical application/Highly addictive
● Schedules III / IV
Legal Stuffs (cont.)
● The DOT
● COC
● Securing the location
● BAT
● COC
● Police vs. Hospitals/Collection sites
Methodologies
● EIA... | pdf |
Author: 远海@websecuritys.cn
0x01:前言 最近忙着复习,所以很少关注安全这块了。本次是针对自己学校某系统的渗透记录,已获得相应授
权。通用漏洞涉及影响单位早前已提交至SRC平台,厂商以发布对应补丁。
0x02:信息收集 目标系统主要是一个支付平台,是近期刚上线的系统,向学校老师取得相应授权后开始测试。
软件开发商:`xx软件开发有限公司/xxsoft/xxxx.com.cn`
开发语言: `Java`
框架: `St2`
因为是近期刚上线的系统,单点认证还没有接入。无法通过单点认证登录此系统,在尝试爆破 admin 密码后无果.
开始转向源码的收集。毕竟白盒才是最直接的手段。源码的收集大致有以下几个... | pdf |
⾃动化通⽤DLL劫持 - 1
⾃动化通⽤DLL劫持
之前写过⼀篇
使⽤⽩加⿊的⽅式⽣成"冲锋⻢",使⽤到部分 dll 劫持的技术。但是它的场景是劫持后阻断正常⽩⽂件的运⾏,程序的控制权交到“⿊⽂
件”中。
这篇⽂章是对通⽤ DLL 劫持的研究,期望能制作⼀个通⽤的 DLL,劫持程序原有的 dll 但保留原 dll 的功能,同时执⾏⾃⼰的代码,这个 dll
最好能⾃动⽣成(不要⼿动编译),主要⽤于维权场景。
已有研究
Aheadlib
著名的⼯具 Aheadlib 能直接⽣成转发形式的 dll 劫持源码,通过 #pragma comment(linker,"/EXPORT:") 来指定导出表的转发。
转发模式⽣成的源码:
红队开发 -... | pdf |
The Google Hacker’s Guide
johnny@ihackstuff.com
http://johnny.ihackstuff.com
- Page 1 -
The Google Hacker’s Guide
Understanding and Defending Against
the Google Hacker
by Johnny Long
johnny@ihackstuff.com
http://johnny.ihackstuff.com
The Google Hacker’s Guide
johnny@ihackstuff.com
http://johnny.ihackstuff.com
- Page 2 ... | pdf |
Hacking the Hybrid Cloud
Sean Metcalf (@PyroTek3)
s e a n @ Trimarc Security . com
TrimarcSecurity.com
ABOUT
• Founder Trimarc (Trimarc.io), a professional services company that
helps organizations better secure their Microsoft platform, including
the Microsoft Cloud and VMWare Infrastructure.
• Microsoft Certifie... | pdf |
The Six Year Old Hacker: References and resources:
Educational Theory, Piaget, Montessori, Papert and others:
http://education.indiana.edu/~p540/webcourse/develop.html
http://www.ship.edu/~cgboeree/piaget.html
http://www.montessori.edu/
http://www.montessori.org/
Stoll Lillard, Angeline; Montessori: The Science Behind ... | pdf |
DEF CON 24
4 August
Las Vegas, USA
ME & VULNEX
Simon Roses Femerling
•
Founder & CEO, VULNEX www.vulnex.com
•
@simonroses
•
Former Microsoft, PwC, @Stake
•
US DARPA award to research on software security
•
Speaker: Black Hat, RSA, HITB, OWASP, SOURCE, AppSec,
DeepSec, TECHNET
•
Blog: http://www.simon... | pdf |
!!!!Replay!Attacks!on!Ethereum!Smart!Contracts
Zhenxuan!Bai,!Yuwei!Zheng,!!Kunzhe!ChaiSenhua!Wang
About!us
•
360!Technology!is!a!leading!Internet!security!company!in!China.!Our!core!
products!are!anti-virus!security!software!for!PC!and!cellphones.!
•
UnicornTeam!(https://unicorn.360.com/)!was!built!in!2014.!This!is!a... | pdf |
WiMAX Hacking 2010
pierce goldy aSmig
DEFCON 18
updated slides, code, and discussion at
https://groups.google.com/group/wimax-hacking
The Technology
Service and Deployment
Reseller Access
Echo Peak
Clearspot
Hacking the Home Device
HTC EVO
Captive Portal Bypass
Location Based Services
Google Group
https://groups.go... | pdf |
Kill 'em All -- DDoS Protection Total Annihilation!
Tony T.N. Miu1, W.L. Lee2, Alan K.L. Chung2, Daniel X.P. Luo2, Albert K.T. Hui2,
and Judy W.S. Wong2
1Nexusguard Limited
tony.miu@nexusguard.com
2Network Threats Information Sharing and Analysis Center (NT-ISAC)
Bloodspear Labs
{leng,alan,daniel,albert,judy}@bl... | pdf |
Slide 1
Replacing TripWire with SNMPv3
Matthew G. Marsh
Chief Scientist of the NEbraskaCERT
Slide 2
Scope
Quick Overview & History of SNMP
Definitions & Terminology
SNMPv3 will be implicit in the rest of the sections
RFC(s) that define v3
Highlights - why use v3
Authentication
Privacy
Security Scope
General Usage
Net-S... | pdf |
Wesley McGrew, Ph.D.
Director of Cyber Operations
wesley.mcgrew@hornecyber.com
@McGrewSecurity
Secure Penetration
Testing Operations
Demonstrated Weaknesses in
Learning Material and Tools
Bio
• Co-Founder of HORNE Cyber, previously
Halberd Group
• Directs and participates
• Penetration testing engagement... | pdf |
Hackers +
Airplanes
No Good Can Come Of This
Defcon 20
Brad “RenderMan” Haines, CISSP
www.renderlab.net
render@renderlab.net
Twitter: @IhackedWhat
+
=
Who Am I?
Who Am I?
Consultant – Wireless, Physical,
General Security, CISSP
Author – 7 Deadliest Wireless
Attacks, Kismet Hacking, RFID
Security
Trainer – Wireless... | pdf |
!
"
#
$
%
"
&
'
$
(
%
'
%
"
)
*
)
&
#
"
#
+
*
,
)
#
'
#
)
&
-
%
.
#
'
'
,
"
&
.
*
)
&
#
"
*
"
/
/
&
*
0
"
#
1
)
&
.
$
2
#
)
#
.
#
(
1
3
4
5
%
0
#
*
(
#
+
)
5
%
6
$
%
"
6
)
)
#
7
2
#
8
%
.
)
&
1
)
#
$
2
#
-
&
/
%
.
#
'
$
(
%
)
%
+
2
%
%
*
"
/
#
$
%
"
*
.
.
%
1
1
)
#
)
5
%
"... | pdf |
Correlation Power Analysis
of AES-256 on ATmega328P
1
游世群 JPChen 許遠哲
Outlines
• SCA/DPA/CPA
• Hardware Implementation
• Demo Video
• CPA Implementation on AES Rounds
• Countermeasures
• Conclusion
2
hidden in an
encryption algorithm.
Hardware
key
Side-Channel Analysis
Plaintext
Cipherte... | pdf |
0x00 前⾔
如有技术交流或渗透测试/代码审计/红队⽅向培训/红蓝对抗评估需求的朋友
欢迎联系QQ/VX-547006660
前两天在国企的朋友遇到了⼀个棘⼿的靶标,听说之前没⼈能从外⽹打点进去,只能靠万⾥防⽕墙取证
我⼀听来了兴趣,在梦中臆造了⼀个靶场进⾏渗透,并且该梦境已获得相关授权
还请各位看官请勿对号⼊座,如有雷同,纯属巧合
0x01 钓⻥打点
官⽹发现了客服联系⽅式
通过修改 shellcode特征的CS + 免杀加载器,直接做出免杀
。
改后缀名为⾮exe(懂的都懂),直接⽤话术钓⻥客服(现在客服都聪明了,直接exe是肯定钓不到的),获得其桌⾯记
事本
记事本中翻出来了后台地址,但是并没有账号密码(有也没有⽤,因为有G... | pdf |
Locksport
An Emerging Subculture
Intro and History
• Locks
• Lockpickers
Locks
• Egyptian Pin Tumbler
• Medieval Artistry
• Puzzle Locks
• Modern Advances
– Pin Tumbler Sidebar
– Wafer Lock
– Disc Lock
– Lever Lock
Lockpickers
• Pre-locks (the thief knot)
• Wax pad attack
• Similarity of keys
• Brahma Vs. Hobbs
– Great... | pdf |
Athena
A user’s guide
By Steve Lord
(A friend of Dave’s)
steve@buyukada.co.uk
”You are no longer a child: you must put childish thoughts away."
[Athena to Telemachus. Homer, Odyssey 1.296]
Background
Athena was the Greek goddess of wisdom, war, the arts, industry,
justice and skill. She was the strongest suppo... | pdf |
Dark Data
Svea Eckert – Andreas Dewes
Who we are
Svea Eckert
Journalist (NDR/ ARD)
@sveckert
@japh44
Andreas Dewes
Data Scientist (DCSO & 7scientists)
Why we are here
“US Senate voted to eliminate broadband privacy rules
that would have required ISPs to get consumers' explicit
consent before selling or sharing Web b... | pdf |
Overview
Key Findings
Recommendations
Software engineering leaders focused on software engineering strategies should work with their
security and risk counterparts to:
Licensed for Distribution
How Software Engineering Leaders Can Mitigate
Software Supply Chain Security Risks
Published 15 July 2021 - ID G00752454 - 19 ... | pdf |
Examining the
Internet’s Pollution!
Karyn Benson!
kbenson@cs.ucsd.edu!
2
https://www.reddit.com/r/AskReddit/comments/2pjsf9/garbage_men_of_reddit_whats_the_most_illegal/
3
http://www.owensworld.com/funny-pictures/vehicles/2-cars-dumpster
People throw out interesting and valuable items
4
This talk: what sort of interes... | pdf |
萬⽤劫持
本地提权
情報滲透
越級注入
PS C:\>
[System.Convert]::ToBase64String([System
ext.Encoding]::UTF8.GetBytes("PS
cmd.exe /c "dir"
141414141414141414141
AAAAAAAAAAAAAAAAAAAAAAA
aaaddress1@chroot.org
遠程後⾨
網軍⾏動
Duplicate Paths Attack:
Get Elevated Privilege from Forged Identities
$_whoami
#Windows #Reversing #Pwn #Exploit
• Maste... | pdf |
When tapes go missing.....
Robert Stoudt
IBM-ISS
RStoudt@us.ibm.com
“It is important for customers to note that these tapes cannot
be read without specific computer equipment and software.”
“The missing tapes require a tape drive to be read, and cannot
be viewed from a PC”
“The administration continues to maintain th... | pdf |
FOR PUBLICATION
UNITED STATES COURT OF APPEALS
FOR THE NINTH CIRCUIT
MDY INDUSTRIES, LLC,
Plaintiff-counter-defendant-
Appellant,
v.
No. 09-15932
BLIZZARD ENTERTAINMENT, INC. and
VIVENDI GAMES, INC.,
D.C. No.
Defendants-third-party-plaintiffs-
2:06-CV-02555-
Appellees,
DGC
v.
MICHAEL DONNELLY,
Third-party-defendant... | pdf |
Playing with Web Application Firewalls
DEFCON 16, August 8-10, 2008, Las Vegas, NV, USA
http://ws.hackaholic.org
Playing with Web Application Firewalls
Who is Wendel Guglielmetti Henrique ?
● Penetration Test analyst at SecurityLabs - Intruders Tiger Team Security division
(http://www.intruders.com.br) - One o... | pdf |
2020
4141414141414141414
AAAAAAAAAAA
HITCON
aaaddress1@chroot.org
Reversing In Wonderland
Neural Network Based Malware Detection Techniques
• Master degree at CSIE, NTUST
• Security Researcher - chrO.ot
• Speaker - BlackHat, DEFCON, HITCON, CYBERSEC
• aaaddress1@chroot.org
• 30cm.tw & Hao's Arsenal
#Windows #Rever... | pdf |
Hacker Law School
"We went to law school so you don't have to"
2013 Summer Quarter
D E F C O N
Faculty Bio
Marcia Hofmann
• Currently solo digital rights attorney
• 7 Years at the EFF
• 3 Years at EPIC
• Adjunct faculty at the University of California
Hastings College of Law in San Francisco
• Licensed ... | pdf |
Page 1 of 1 © 2003 Airscanner™ Corp. http://www.Airscanner.com
Embedded Reverse Engineering:
Cracking Mobile Binaries
1. Overview
Reverse-engineering has long been one of the most popular trouble shooting techniques.
In fact, long before the first hacker ever laid eyes on a computer... | pdf |
Mission Impossible
Steal Kernel Data from User Space
Yueqiang)Cheng,)Zhaofeng)Chen,)Yulong)Zhang,)Yu)Ding,)Tao)Wei)
Baidu)Security)
About Speakers
Dr.$Tao$Wei$
Dr.$Yueqiang$Cheng$
Mr.$Zhaofeng$Chen$
Mr.$Yulong$Zhang$
Dr.$Yu$Ding$
Our)Security)Projects:)
How to Read Unauthorized Kernel Data
From User Space?
$$
St... | pdf |
Exploiting Continuous
Integration (CI) and
Automated Build Systems
And introducing CIDER
Whoami
• SpaceB0x
• Sr.+Security+Engineer+at+LeanKit
• Application+and+network+security+(offense+and+defense)
• I+like+breaking+in+to+systems,+building+systems,+and+learning
• Security+consultant
./agenda.sh
• Overview+of+Continu... | pdf |
Hacking from the
Palm of your Hand
Paul Clip
DEFCON - August 01, 2003
P R O P R I E T A R Y B U T N O T C O N F I D E N T I A L
© 2 0 0 3 @ S T A K E , I N C .
Agenda
Goals
Past
–
Overview of the Palm Platform
–
Hacker Tools on the Palm
Present
–
AUSTIN - A Palm OS Vulnerability Scanner
–
Archite... | pdf |
A COUP D'ETAT BY A GROUP OF MERCENARY HACKERS
Paper by: C Rock and S Mann:
Winston Churchill famously said - when the Germans were about to
overrun France on one or other of their invasions - "Gentlemen, do
not forget, this is not just about France ... this is about
champagne."
A 'Coup' in France can mean a gla... | pdf |
Sean Kanuck
DEF CON 25
Hacking Democracy :
A Socratic Dialogue
How do you know
if your vote was
recorded correctly
Which is more
important to you :
secrecy or verification
How much error
is too much for
legitimacy
Were you on the
right list
Were you in the
right place
Does the proc... | pdf |
KinectASploit
What if you took a
kinect,
used it's skeleton
tracking features
KinectASploit
Sprinkled in some
hacking tools:
Wait a minute!... we did
that already.
Lets find out!
Come see the Demo at
Defcon20 and look for the tool
source at:
http://p0wnlabs.com/defcon20
jeff bryner
p0wnlabs.com
Use @ your own ri... | pdf |
0x01bettercap
0x02ssh
rm /etc/dropbear/*
dropbearkey -t rsa -f /etc/dropbear/dropbear_rsa_host_key
dropbear -r /etc/dropbear/dropbear_rsa_host_key
0x03root
1. /usr/share/mico/messaging/messaging.conf
0x04https
2. /usr/share/mico/messaging/mediaplayer.cfg CA
3. pub
openssl rsa -inform DER -in priburp -pubout -o... | pdf |
Mac OS X Server
Web Technologies
Administration
For Version 10.3 or Later
034-2350_Cvr 9/12/03 7:31 AM Page 1
Apple Computer, Inc.
© 2003 Apple Computer, Inc. All rights reserved.
The owner or authorized user of a valid copy of
Mac OS X Server software may reproduce this
publication for the purpose of learning... | pdf |
Christopher
M.
Shields
r00t0v3rr1d3
Ma1hew
M.
Toussain
0sm0s1z
Chris –
Custom Attack Tools and Project
Management
Matt –
Interface Design and Framework
Development
Basic ARP Poison
Heavy Network Traffic
Periods of MITM Loss
Python Tool With
Scapy
Intelligent Network
Poison
Dynamic P... | pdf |
2017/12/07
HITCON PACIFIC
1
KRACK & ROCA
吳忠憲 1,3
陳君明 1,2,3
J.-S. Wu Jimmy Chen
1.
NTU, National Taiwan University
2.
IKV, InfoKeyVault Technology
3.
CHROOT & HITCON
Agenda
KRACK Key Reinstallation Attacks
– Serious weaknesses in WPA2, a protocol that
secures all modern protected Wi-Fi networks
ROCA... | pdf |
Breaking Bitcoin Hardware Wallets
Glitches cause stitches!
Josh Datko
Chris Quartier
Kirill Belyayev
Updated: 2017/07/07
Link Drop!
All updated references, notes, links, can be found here:
https://www.cryptotronix.com/breakingbitcoin
The bug that started it all
1
bool storage_is_pin_correct(const char *pin)
2
{
3
retur... | pdf |
DDoS Black and White
“Kungfu” Revealed
(DEF CON 20 Edition)
{Tony Miu (aka MT),
Anthony Lai (aka Darkfloyd),
Alan Chung (aka Avenir),
Kelvin Wong (aka Captain)}
Valkyrie-X Security Research Group
(VXRL)
Disclaimer
• There is no national secrets leaked here.
• Welcome to all national spies
• No real attacks are la... | pdf |
Central bank digital currency
Threats and vulnerabilities
Defcon 29
Ian Vitek
CBDC Security
Central bank of Sweden, Sveriges Riksbank
Central bank digital currency
Threats and vulnerabilities
Presentation
Background
Detailed system description of the prototype
Vulnerabilities in the retail central bank digital currency... | pdf |
本人可以提供各种PDF电子书资料,计算机类,文学,艺术,设计,医学,理
学,经济,金融,等等。质量都很清晰,而且每本100%都带书签和目录,方便
读者阅读观看,只要您提供给我书的相关信息,一般我都能找到,如果您有需
求,请联系我 QQ: 461573687, 或者 QQ: 2404062482。
本人已经帮助了上万人找到了他们需要的PDF,其实网上有很多PDF,大家如果
在网上不到的话,可以联系我QQ。因PDF电子书都有版权,请不要随意传播,
最近pdf也越来越难做了,希望大家尊重下个人劳动,谢谢!
___________________________________________________________________... | pdf |
Tineola: Taking A Bite Out of Enterprise Blockchain
Attacking HyperLedger Fabric
Parsia Hakimian, Stark Riedesel
Defcon 26 – Aug 11, 2018
© 2018 Synopsys, Inc.
2
5 Courses
Our Team
Enterprise Blockchains
A Use Case
The Target – HyperLedger Fabric
Tineola
© 2018 Synopsys, Inc.
3
HyperLedger Fabric – Core Research Grou... | pdf |
前言
继续分享一些 Webshell 的小tricks,在正文开始之前先留2个问题,可以先不看 pdf ,也不要把代码拿
去运行,用肉眼判断下面这2个 php 代码会输出什么,原理以及在 Webshell 中运用写在 PDF 里面了。
代码1:
代码2:
正文
这里应该也不用我揭晓答案了,拿去运行一下应该都一目了然了,上面提出的那2个代码均来自 php
bug ,我相信绝大部分人如果没遇到过此问题的话很有可能会判断错误。
判断错误的人想法可能如下:
问题一:为什么代码一中变量 $a 只是将值拷贝给 $c ,并没有进行引用传值,但是 $c[0]="c" 还是改
变了 $a[0] 。
问题二:为什么代码二中 theFunction 参... | pdf |
PacketFence, the Open Source NAC:
What we've done in the last two years
Salivating on NAC secret sauce
Presentation Plan
What's Network Access Control (NAC)
The secret sauce
The Open Source differentiator
The good and the bad of 2 years as lead developer
The Future of PacketFence (aka World Domination Roadmap)
Communit... | pdf |
Teal Rogers and Alejandro Caceres
• Teal has experience with 3D
visualizations and organizing massive
amounts of data.
• Alex has a background in distributed
computing, network reconnaissance,
and vulnerability detection.
• The internet contains a massive amount of data that is
extremely interconnected, however... | pdf |
Abstract
This
paper
details
an
approach
by
which
SQL
injection
is
used
to
gain
remote
access
to
arbitrary
files
from
the
file
systems
of
Netgear
wireless
routers.
It
also
leverages
the
same
SQL
injection
to
exploit
a... | pdf |
Timing Attacks in Low-Latency Mix Systems
(Extended Abstract)
Brian N. Levine1, Michael K. Reiter2, Chenxi Wang2, and Matthew Wright1
1 University of Massachusetts, Amherst, MA, USA; {brian,mwright}@cs.umass.edu
2 Carnegie Mellon University, Pittsburgh, PA, USA; {reiter,chenxi}@cmu.edu
Abstract. A mix is a communicatio... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.