text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
1
CVE-OLON-QLPQ
pkexec本身是⽤来授权⽤户以其他身份执⾏程序,他具备suid属性,但由于常规功能下不⽀持直接执⾏
命令,⽆法利⽤于suid提权。
pkexec是polkit (默认安装的系统服务)这个套件的程序。
CVE-2021-3560 利⽤的dbus-send,这次是 CVE-2021-4034 利⽤的 pkexec,上次影响的<=0.113
版本,这次影响全部版本。
Ubuntu、Debian、Fedora 和 CentOS 等默认安装pkexec,均受影响
暂时⽆吧
pkexec --version查看版本
https://github.com/wingo/polkit/blob/mast... | pdf |
Injecting RDS-TMC Traffic Information Signals
Injecting RDS-TMC Traffic
Information Signals
Copyright 2007 Inverse Path Ltd.
DEFCON 15
Las Vegas, August 3-5 2007
Andrea Barisani
Chief Security Engineer
<andrea@inversepath.com>
http://www.inversepath.com
Daniele Bianco
Hardware Hacker
<daniele@inversepath.com>
Introd... | pdf |
Revolutionizing the Field of Grey-box
Attack Surface Testing with Evolutionary
Fuzzing
Jared DeMott
Dr. Richard Enbody @msu.edu
Dr. William Punch
DEFCON 2007
VDA Labs, LLC
www.vdalabs.com
Agenda
Goals and previous works
(1) Background
Software, fuzzing, and evolutionary testing
(2) Describe EFS in detail
GPF &&... | pdf |
1
MSNV-LNL
LxLL 简介
LxLN 漏洞检测
N)msf
O)⼯具
LxLO 漏洞利⽤
N)msf
exploit/windows/smb/msNV_LNL_eternalblue
auxiliary/admin/smb/msNV_LNL_command
O)原⽣py
P)其他⼯具
EternalPulse
界⾯化⼯具
永恒之蓝漏洞是⽅程式组织在其漏洞利⽤框架中⼀个针对 SMB服务 进⾏攻击的漏洞,该漏洞导致攻击者
在⽬标系统上可以执⾏任意代码。
内⽹中常遇⻅,懂得都懂,本⽂总结了⼀些检测和利⽤的⽅法。
msf ⾥有个模块 auxiliary/scanner/smb/smb_ms17_010 可以进⾏ 单IP / I... | pdf |
#BHUSA @BlackHatEvents
Invisible Finger:
Practical Electromagnetic Interference Attack on
Touchscreen-based Electronic Devices
Haoqi Shan1, Boyi Zhang1, Zihao Zhan1,
Dean Sullivan2, Shuo Wang1, Yier Jin1
1: University of Florida
2. University of New Hampshire
#BHUSA @BlackHatEvents
Information Classification: General
... | pdf |
Introduce LLVM from
a hacker's view.
Loda chou.
hlchou@mail2000.com.tw
2012/07/02
1
I am Loda.
Work for 豬屎屋 (DeSign House).
Be familiar for MS-Windows System and
Android/Linux Kernel.
Sometimes…also do some software crack job.
Like to dig-in new technology and share technical
articles to promote t... | pdf |
DEFCON CHINA 1.0 BADGE hacking
workshop
joe Grand aka kingpin
•informal environment
•a deeper look into the badge
•setup development environment
•modify/recompile CODE
•open lab
workshop goals
•complete tasks, get rewarded
•4 roots and 4 branches, each with 4 leds
•when task is complete, badge inserted into
programme... | pdf |
SQL – Injection &
OOB – channels
Patrik Karlsson, Inspect it
For an updated version of this presentation check
http://www.inspectit.se/dc15.html
Introduction
• Who am I
– Patrik Karlsson
– Information Security Consultant
– Owner of Inspect it
– Founder of cqure.net
Introduction
• What do I do?
– Penetration testing
–... | pdf |
WEAPONIZING THE
BBC MICRO:BIT
DAMIEN "
" CAUQUIL
VIRTUALABS
DEF CON 25 - JULY 28, 2017
/ME
Head of R&D, Econocom Digital Security
Senior security researcher
HW/SW Reverse-engineer
AGENDA
BBC Micro:Bit
Features & Capabilities
Hacking ideas
Hacking into the Micro:Bit
Turning the Micro:Bit into a sniffer
Hacking various 2.... | pdf |
BCTF2017-Writeup
By Nu1L
Misc
签到:
Nc 连上去输入 token,得到 flag。
foolme
关键点 1:哈希碰撞得到 md5 值结尾相同的 key.使用穷举方法即可。
关键点 2:发送满足条件的 jpg 图片的数据。校验函数是 check。
直接修改可以影响 diff 值的数据即可,即 input_x,input_y,input_z 的值。不断修改像素值,将
diff 值调高,但是不可以大于 2,并且被识别引擎识别为与原图不同的图片。
Web:
signature
Github 搜索源码。很容易搜到源码,下载后进行分析:
很容易看出是 CI 写的一个 Demo 站点。
在 blog_backup... | pdf |
我的⽩白帽学习路路线
@ringzero 2017/03/25
• 阿⾥里里云 — ⾼高级安全专家
• ⼗十年年信息安全从业经历
• 信息安全领域爱好者
• ⾃自动化安全测试
• 数据挖掘
• 微博:@ringzero
关于我
进⾕谷歌 找记录
没记录 就旁注
没旁注 猜⽬目录
没⽬目录 就嗅探
找后台 穷枚举
传⼩小⻢马 放⼤大⻢马
偷密码 挂⻚页⾯面
提权限 扫内⽹网
啊D-SQL注⼊入
NBSI
明⼩小⼦子
桂林林⽼老老兵
引⽤用 : 《⾃自动化攻击背景下的过去、现在与未来》 — 2014年年
回到⼗十三年年前 — 2004年年的套路路
架设了了⼀一个PHPWind论坛
CentOS 编译安装LAMP环境
DVB... | pdf |
Compression Oracle
Attacks on VPN
Networks
Nafeez
Defcon 26
About
Nafeez - @sketpic_fx
Interested in AppSec and writing software
Maker @ assetwatch.io, Attacker Surface Discovery as a
Service
Overview
Compression Side Channel and Encryption
History of attacks
VPNs and how they use compression
Demo - Voracle Tool
Ho... | pdf |
从服务创建拦截看端上主防软件的工作原理和
绕过方法
前言
书接上文,在上一篇中我们详细讲解了服务的工作原理和隐藏方法,但是如果我们的服务根本就无法直
接注册到系统中,那上一节的内容就是白扯。所以怎么能够绕过端上类似于360主动防御类型的软件,
将我们的服务注册进系统,是一个棘手的问题,我们本节就着重研究这个问题,看怎么绕过。
从端上主防软件的工作原理讲起
本文把在客户端上利用行为进行拦截的软件成为端上主防软件,简称为hips,360的主动防御模块就是
典型的端上主防软件。这类软件复杂的会有用户态监控和内态监控,例如crowdstrike的Falcon,简单的
只有内核态监控,例如火绒hips,360的主动防御。
1. 用户态监控一般... | pdf |
Routing in the Dark: Pitch Black
Anonymous
Abstract. In many networks, such as mobile ad-hoc networks and friend-
to-friend overlay networks (darknets), direct communication between
nodes is limited to specific neighbors. Often these networks have a small-
world topology; while short paths exist between any pair of node... | pdf |
mod_proxy_balancermanager
0x00
mod_proxybalanceapache proxy balancer
apachebalancermanagerbalancerworker
<Location "/balancer-manager">
SetHandler balancer-manager
Require host example.com
</Location>
hostexample.commanagerrequire
balancerworkerworkerbalancer
0x01
manageworker
managerssrf
registerhookap_ho... | pdf |
上午发了⼀篇,致远OA的漏洞分析。
有⼏位师傅说有坑。确实,这个坑还能影响不少⼈。
问题在哪?
ZipUtil.unzip(zipFile, unzipDirectory);
就在于这个ZipUtil。有⼏位师傅可能也尝试跟我⼀样写demo去复现。会发现⼀个错
误。
Entry is outside of the target dir
这样需要注意⼀下。版本问题。版本问题。版本问题。重要的事情说三遍。
只有 seeyon-ctp-core.jar 的修改时间为 2018-05-24 才能使⽤../去跨随机⽣成的
uuid⽬录。
⾼于此修改时间就会爆出上⾯的错误。
然后最终的解压为: /seeyon/common/designer/p... | pdf |
“探索、学习并使用 Go 语言的简洁
而全面的指导手册。”
——摘自 Hugo 创立者 Steven Francia
为本书写的序
“这本权威的书为所有想要开始学习
Go 语言的人提供了一站式的指引。”
——Sam Zaydel,RackTop Systems
“写得太好了!完整介绍了Go语言。
强烈推荐。”
——Adam McKay,SUEZ
“这本书把 Go 语言不寻常的部分讲
得通俗易懂。”
——Alex Vidal,Atlassian 的 HipChat 团队
Go 语言实战
语言实战
Go
分类建议:计算机/程序设计/ Go 语言
人民邮电出版社网址:www.ptpress.com.cn
美术编辑:董志桢
Go
Go
I... | pdf |
Strategic
Cyber Security
An Evaluation of Nation-State
Cyber Attack Mitigation Strategies
Kenneth Geers
NCIS Cyber SME
Free download:
ccdcoe.org/278.html
About me
✴ 2011-: NCIS Cyber Subject Matter Expert
✴ 2007-2011: NATO Cyber Centre, Estonia
✴ 2001-2007: NCIS Cyber Analysis (Div Chief)
✴ 1999–2001: SAIC Security Stu... | pdf |
KCon
KCon
Powershell攻击与防御
360天马安全团队 王永涛(@sanr)
Get-Host
360天马安全研究员
WIFI安全
渗透测试
入侵检测
联系方式:
weibo.com/0xls
ssssanr@gmail.com
github.com/ssssanr
CONTENTS
PowerShell概述
传统的powershell防御
Powershell攻击
PowerShell检测不防御
%95 Powershell脚本为恶意
PowerShell概述
PowerShell概... | pdf |
大白话解释拟态安全
一、前言
一千个读者有一千个哈姆雷特,可能我有一些地方没有理解透彻和没有彻底明白,所以对于我讲的
东西存在偏面或者不好地方,欢迎指正但是不要骂我。
各位师傅可能这几年都听过一些特别高大上的词语,拟态安全,内生安全...在我看来,一开始,可能以
为这是什么全新的技术,全新的理念。其实都是一些旧概念,旧技术的衍生。我们今天主要来讲的就是
拟态安全,究竟是什么东西,尽量使用能听得懂的话语,来进行通俗易懂的解释。
此外,要注意的是,拟态安全并没有开源或公开的设备,或者说我这种菜鸡接触不到。所以我只能根据
网上的公开的文章,论文等资料进行阅读和理解,进行云解答。所以一定会存在理解误差的情况。我会
把看到的文献论文 以caj... | pdf |
Letting the Air Out of
Tire Pressure
Monitoring Systems
Mike Metzger - Flexible Creations
mike@flexiblecreations.com
1
History
• Porsche - First implemented on the 959 in
1986 (Thanks Wikipedia)
• A bunch of various styles used in luxury
cars
• TREAD act - Basically, the Firestone / Ford
Explorer problems in the 90... | pdf |
Exploring Layer 2 Network Security in
Virtualized Environments
Ronny L. Bull, Jeanna N. Matthews
Wallace H. Coulter School of Engineering
Clarkson University
Potsdam, NY 13699
Email: {bullrl, jnm}@clarkson.edu
Abstract—Cloud service providers offer their customers the
ability to deploy virtual machines in a multi-tenan... | pdf |
2/25/2007 Slide 1
Offensive Computing
Malware Secrets
Valsmith (Valsmith@offensivecomputing.net)
Delchi (delchi@offensivecomputing.net)
2/25/2007 Slide 2
Offensive Computing – Malware Secrets
Valsmith
BACKGROUND:
Malware analyst
Penetration tester
Exploit developer
Reverse Engineer
AFFILIATIONS:
OffensiveComputing
M... | pdf |
Time Line and Nodal Analysis of PLA IW
Development
Ming Zhou
iDefense Security Intelligence Services
19 February , 2009
2
Agenda
+ What Have Western Seen?
+ iDefense Research Methodology
+ PLA IW Timeline
+ Deduction and Facts
+ My One Step Leap
Time Line
3
What Western Have Seen
+ Titan Rain
+ Western governments... | pdf |
2018 0CTF
Author: Nu1L
2018 0CTF
Author: Nu1L
Misc
hidden message
Welcome
MathGame
Baby VM 2
Web
ezDoor (Done)
h4x0rs.club 1 (Done)
h4x0rs.club 2 (Done)
LoginMe (Done)
Reverse
g0g0g0 (Done)
babyvm (solved)
udp (Done)
Pwnable
Baby Stack 2018
Baby heap 2018 (solved)
Zer0 FS (solved)
Black Hole Theory
Misc
hidden message
... | pdf |
© NCC Group 2021. All rights reserved
Instrument and Find Out
Writing Parasitic Tracers for High(-Level) Languages
Jeff Dileo
@chaosdatumz
DEF CON 29
call_usermodehelper("/bin/sh",(char*[]){"/bin/sh","-c","whoami",NULL},NULL,5)
© NCC Group 2021. All rights reserved
• @chaosdatumz
• Agent of chaos
• Unix aficionado
• Te... | pdf |
短网址攻击与防御
演讲人:彦修
2 0 1 8
About Me
• 腾讯安全工程师
• 微博:@彦修_
• 喜美食、好读书,不求甚解
• Tencent Blade Team
• 由腾讯安全平台部创立。
• 专注于AI、移动互联网、IoT、无线电等前沿技术领域安全研究。
• 报告了谷歌、苹果、亚马逊等多个国际知名厂商70+安全漏洞。
PART 01
短网址猜想
目录
CONTENTS
PART 02
何谓短网址
PART 03
短网址攻击实战
PART 04
扩展短网址攻击面
01
02
03
04
PART 05
短网址防御实践
05
PART 01
短网址猜想
某个惠风和畅的下午收到这么一封邮件……
改变短网址后缀,是否可以... | pdf |
You’re Just Complaining
Because You’re Guilty:
A DEF CON Guide to Adversarial Testing of
Software Used in the Criminal Justice System
August 11, 2018 - DEF CON 26
Jeanna Matthews, PhD - Clarkson University/Data and Society
Nathan Adams - Forensic Bioinformatic Services
Jerome D. Greco, Esq. - Legal Aid Society of NYC... | pdf |
Blitzableiter –
BETA Release
Countering Flash Exploits
Felix ‘FX’ Lindner
DEFCON XVIII
Agenda
Motivation
RIA Basics
Flash (in)Security
Flash Malware
Flash Internals
Defending the Poor
Defense approach
Implementation
Current functionality
Measurements & Results
Next steps
Motivation
Project initiated in late 2... | pdf |
对 log4j2 漏洞的后续研究中,发现⼀些有趣的东⻄,记录分享⼀下
⾸先提出⼀个问题,log4j 真的在任何情况不存在 JNDI注⼊吗?
答案是否定的。
翻阅 Log4j2 的 pull request 发现⼀个有意思的对话:
有⼈提出实际上 log4j 和 log4j2 ⼀样易受攻击的,只不过与 log4j2 相⽐,Log4j 的攻击向量“更安全”
因为 Log4j 的攻击⼊⼝点是其配置⽂件,⽽ log4j2 的攻击⼊⼝点是⽤户的输⼊
那么实际上如何呢?经过我简单测试,发现修改 log4j 的配置⽂件确实会导致漏洞的产⽣,但要求要⽐pull
reques中所说的更苛刻。
⾸先在 maven 中添加以下依赖:
001 写在前⾯
... | pdf |
Octopus v1.0 stable: Cobalt Strike
deployment
原文:
https://shells.systems/octopus-v1-0-stable-cobalt-strike-deployment-much-more/
使用教程:
https://shells.systems/unveiling-octopus-the-pre-operation-c2-for-red-teamers/
stable版本发布:
https://github.com/mhaskar/Octopus/releases/tag/v1.0
一.Intorduction
很早之前就是用过Octopus be... | pdf |
Let’s Get Physical
Network Attacks Against Physical Security Systems
Ricky “HeadlessZeke” Lawshae – Defcon24 – 2016
Intro
Let's Get Physical
3
Intro
Who am I?
• Security Researcher at TippingPoint
• IoT (drink!) hacking enthusiast
• Occasional conference presenter
• Used to install physical security systems for a livin... | pdf |
Smartfuzzing the Web
Carpe Vestra Foramina
Friday, June 24, 2011
Out of Date
• This presentation is out of date.
– Grab an updated copy from our Google Code
Page
• http://code.google.com/p/raft
2
Friday, June 24, 2011
Who are we?
• Nathan "Nate Dawg" Hamiel
• Gregory "G-Fresh" Fleischer
• Seth "The Law" Law
• Justin ... | pdf |
Demorpheus: Getting Rid Of
Polymorphic Shellcodes In Your
Network
Svetlana Gaivoronski,
PhD Student, Moscow State University
Dennis Gamayunov,
Senior Researcher, Moscow State University
Memory corruption, 0-days, shellcodes…
Why should anyone care about
shellcodes in 2012?
CONS:
•
Old exploitation techniq... | pdf |
Module 1
A journey from high level languages, through
assembly, to the running process
https://github.com/hasherezade/malware_training_vol1
Basics of PE (Portable
Executable)
Basics of a PE file
• PE (Portable Executable) is a native executable format on Windows
• PE files:
• user mode: EXE, DLL
• kernel mode: drive... | pdf |
{
Breaking the x86 ISA
domas / @xoreaxeaxeax / DEF CON 2017
Christopher Domas
Cyber Security Researcher @
Battelle Memorial Institute
./bio
8086: 1978
A long, tortured history…
The x86 ISA
Modes:
Real (Unreal)
Protected mode (Virtual 8086, SMM)
Long mode (Compatibility, PAE)
x86: evolution
Instruction sets
x86... | pdf |
In Need of 'Pair' Review - @kiwihammond, @ichthys101, and @moyix et al.
Presenters:
Hammond Pearce (@kiwihammond)
Benjamin Tan (@ichthys101)
In collaboration with:
Baleegh Ahmad, Brendan Dolan-Gavitt (@moyix), and
Ramesh Karri
In Need of 'Pair' Review:
Vulnerable Code Contributions
by GitHub Copilot
#BHUSA @Bla... | pdf |
Want strong isolation?
Just reset your processor.
How we can build more secure systems by applying
the age-old wisdom of “turning it off and on again”
Anish Athalye, Adam Belay, Frans Kaashoek, Robert Morris, Nickolai Zeldovich
Security devices are increasingly common
Smartphone apps
Custom hardware
2
They are getting... | pdf |
Hacking the Smart Grid
Tony Flick
FYRM Associates
tony.flick@fyrmassociates.com
Abstract
The city of Miami and several commercial partners plan to rollout a “smart
grid” citywide electrical infrastructure by the year 2011. This rollout was
announced on the heels of news that foreign agents have infiltrated our
... | pdf |
Philips Hue Bridge2.1 获取设备 root 权限
基础信息收集
设备介绍
Philips HUE Bridge 桥接器在现有 HUE Bridge 桥接器的基础上升级为支持
HomeKit。这款 HUE Bridge 桥接器让你可在 iPhone、iPad 或 iPod touch 上
通过 Hue app 控制自己的各种 Hue 产品。只需安装好 HUE Bridge 桥接器,
并将 app 下载到 iOS 设备上,便可开始打造定制化的照明系统。
(参考: https://www.apple.com.cn/shop/product/HPY82CH/A)
设备版本
philips Hue Bridg... | pdf |
The Internet’s Private Cops
Wendy Seltzer
EFF Staff Attorney
wendy@eff.org
<http://www.eff.org>
DEFCON 11, August 2, 2003
11/23/2009
2
The Internet’s Private Cops
Early view: The Internet can “route around” law
Later view: Maybe it can’t. We need to work
with the law itself.
11/23/2009
3
RIAA v. Verizon
subpoe... | pdf |
0
Presented by:
Dondi West, M.Sc., J.D.
Associate, Booz Allen Hamilton
Def Con 18
July 30th – August 1st 2010
Las Vegas, Nevada
A paper arguing that the current rules of war can address the emerging issues
raised by cyber warfare
A Survey and Examination of the
Adequacy of the Laws Related to
Cyber Warfare
1
Discl... | pdf |
CVE-2022-22972 VMware Workspace ONE
Access Authentication Bypass RCE
author:Y4er
补丁对比
HW-156875-Appliance-21.08.0.1/frontend-0.1.war中增加了一个HostHeaderFilter,匹配全路由
然后删除了DBConnectionCheckController,这个地方有jdbc attack。
权限绕过
查看HostHeaderFilter代码
package
;
import
VisibleForTesting;
import
GlobalConfigService;
import
Hori... | pdf |
LABS
Back to the Future
Our journey back to the future of Windows vulnerabilities
and the 0-days we brought back with us
●
15+ years in Cyber Security
●
Director of Security Research @ SafeBreach
●
Main focus in APT and vulnerability research
2
Tomer Bar
Director of Security Research
LABS
●
7+ years in Cyber Security
... | pdf |
1"
Breaking WingOS
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Index
• Intro to WingOS.
• Scenarios & Attack surface.
• Vulnerabilities.
• Exploitation & Demo.
• Conclusions
IOActive, Inc. Copyright ©2018. All Rights Reserved.
Intro to WingOS
• Embedded Linux OS with proprietary modifications... | pdf |
《智能家居安全——身份劫持》
——作者:挽秋(daizy)
1、概要
本文以如何劫持(窃取)智能家居时代设备的身份“安全凭证”为出发点,调研并分析了目
前国内市场的主流产品和设备交互协议,及其所依赖身份凭证,通过介绍、分析和发现设备
交互控制协议安全性,最终通过身份劫持,实现相关设备和产品的任意远程控制。
2、智能家居身份和劫持危害
先通过一张简图来了解一下应用、智能设备和云端三者交互时携带的身份标识,如图 2.1
所示:
图 2.1:智能家居设备交互时携带的身份标识
从上图了解到,智能家居身份标识通常是以下几种情况:
1)账号 cookie 相关,如身份 Token;
2)用户 id:userid
3)设备 i... | pdf |
{ domas / @xoreaxeaxeax / DEF CON 2018
The ring 0 facade:
awakening the processor's inner demons
Christopher Domas
Cyber Security Researcher
./bio
disclaimer:
The research presented herein was conducted and
completed as an independent consultant. None of the
research presented herein was conducted under the
ausp... | pdf |
探寻Java⽂件上传流量层⾯waf绕过姿势系
列⼆
探寻Java⽂件上传流量层⾯waf绕过姿势系列⼆
写在前⾯
正⽂
tomcat
灵活的parseQuotedToken
变形之双写filename*与filename
变形之编码误⽤
Spring4
猜猜我在第⼏层
Spring5
"双写"绕过
写在前⾯
这篇和上篇不同的是上篇更多关注于RFC⽂档规范的部分,⽽这篇更关注于如何从代码层⾯
上的利⽤来绕过,具体内容请接着往下看
正⽂
tomcat
灵活的parseQuotedToken
继续看看这个解析value的函数,它有两个终⽌条件,⼀个是⾛到最后⼀个字符,另⼀个是遇
到 ;
如果我们能灵活控制终⽌条件,那么waf引擎在此基础... | pdf |
building the
@shortxstack
@sethlaw
intros
·
whitney champion
·
senior systems engineer
·
https://unicorns.lol
·
@shortxstack
·
seth law
·
appsec consultant
·
https://redpointsecurity.com
·
@sethlaw
inception
what had
happened was...
android
v1.0
iOS
v1.0
it’s
official
pain points
scheduling
don’t trust
hax0rs
bug fix... | pdf |
HTTP认证方案
Author:h0ld1rs,Reclu3e
前言
因为HTTP协议是开放的,可以任人调用。所以,如果接口不希望被随意调用,就需要做访问权限的控
制,认证好的用户,才允许调用API。
本篇文章在郁离歌师傅的指导下,参考RFC对HTTP常用的认证方案做了归纳总结
Form认证
最常见的一种认证方式,即表单认证,表单认证一般都会配合cookie+sessiond的使用,现在绝大多数
的Web站点都是使用此认证方式。用户在登录页中填写用户名和密码,服务端认证通过后会将sessionId
返回给浏览器端,浏览器会保存sessionId到浏览器的Cookie中。因为Http是无状态的,所以浏览器使用
Cookie来保存ses... | pdf |
bypass NAT
tcp
#!/usr/bin/env python
# -*- coding: utf-8 -*-
#
# Fake ftp server code for conntrack exploit
#
# This software is in the public domain, furnished "as is", without technical
# support, and with no warranty, express or implied, as to its usefulness for
# any purpose.
#
# Author: Roman Tsisyk
#
# Please r... | pdf |
David Rook
The Security Risks of Web 2.0
DefCon 17, Las Vegas
Agenda
• A quick Web 2.0 definition
• The differences between Web 1.0 and Web 2.0
• Common Web 2.0 security vulnerabilities
• The differences between Web 1.0 and Web 2.0 vulnerabilities
• Security analysis difficulties with Web 2.0
• How to prevent these vul... | pdf |
PUBLIC
3/2/2022
Controlling the Source:
Abusing Source Code Management
Systems
Brett Hawkins
Adversary Simulation, IBM X-Force Red
X-Force Red | 3/2/2022
2
Document Tracking
Data Classification: PUBLIC
Version
Date
Author
Notes
1.0
3/2/2022
Brett Hawkins
Release
X-Force Red | 3/2/2022
3
TABLE OF CO... | pdf |
School of Computer & Security Science
Edith Cowan University
Exchanging Demands
Peter Hannay
peter@hannay.id.au
School of Computer & Security Science
Edith Cowan University
The Introduction
School of Computer & Security Science
Edith Cowan University
Who am I?
• Lecturer
• Researcher
• Hacker
• Pentes... | pdf |
KCon
KCon
Breaking iOS Mitigation Jails to Achieve Your Own
Private Jailbreak
Min(Spark) Zheng @ Alibaba Mobile Security
ONLY AVAILABLE AT THE SCENE
iOS status
• Apple sold more than 1 billion iOS devices.
More than 380,000 registered iOS developers
in the U.S.
• It was reported that iOS is more secure than
Android... | pdf |
Dirty Little Secrets of
Information Security
Why we might not be doing as well as you would hope.
Bruce Potter (gdead@shmoo.com)
1
Don’t Believe Anything I Say
• “Every person who has mastered a profession is a skeptic
concerning it.” - George Bernard Shaw
• “Authority has every reason to fear the skeptic, for author... | pdf |
TCTF WriteUp By Nu1L
TCTF WriteUp By Nu1L
WEB
soracon
1linephp
worldcup
Reverse
vp
FEA
lalamblambdadambda
Crypto
zer0lfsr-
checkin
PWN
listbook
how2mutate
uc_masteeer
Babyheap 2021
MISC
uc_baaaby
GutHib
welcome
singer
Survey
WEB
soracon
phpsolrint
pop chain
<?php
namespace Phalcon\Logger {
class Item {
... | pdf |
See no evil, hear no evil
Hacking invisibly and silently with light and sound
www.pwc.co.uk
July 2017
Matt Wixey – PwC UK
PwC
Intro
• Matt Wixey
• Lead the research function on PwC’s UK pentesting team
• Run The Dark Art Lab research blog
• Previously worked in LEA, leading R&D team
PwC
Agenda
• Part I: Jumping air-gap... | pdf |
Fuzzing'Android'OMX
Mingjian Zhou'and'Chiachih Wu
C0RE'Team
About'Us
• Mingjian Zhou,'周明建
– Security'researcher'@'360'C0RE'team
– Focused'on'Android'vulnerability'research'and'exploit'
development
• Chiachih Wu,'吳家志 (@chiachih_wu)
– Security'researcher'@'360'C0RE'team
– Android/Linuxsystem'security'research
– C0RE'team... | pdf |
Hybrid rule-based botnet detection
approach using machine learning for
analysing DNS traffic
Saif Al-mashhadi1,2, Mohammed Anbar1, Iznan Hasbullah1 and
Taief Alaa Alamiedy1,3
1 National Advanced IPv6 Centre, Universiti Sains Malaysia, Penang, Malaysia
2 Electrical Engineering, University of Baghdad, Baghdad, Baghdad, Ir... | pdf |
Cyber [Crime|War]
Connecting the dots
Iftach Ian Amit
Managing Partner, Security & Innovation
Agenda
Who am I?
CyberWar [Attack | Defense]
CyberCrime [Attack | Defense]
Past events revisited...
Connecting the dots
Future
Who Am I
This is NOT going to be
Picking up where we left off
At least as far as last year’s resear... | pdf |
#BHUSA @BlackHatEvents
Stalloris:
RPKI Downgrade Attack
Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman and Michael Waidner
#BHUSA @BlackHatEvents
Information Classification: General
Team
• Tomas Hlavacek
• Donika Mirdita
• Haya Shulman
• Michael Waidner
Cybersecurity Analytics and Defences
departement
•... | pdf |
展望NEW GEN SOC
Elaine Ma| Cybersecurity Head CHN-Region
Security
简述SOC
SOC的趋势
不仅仅是运维云即是未来的终端安全
展望AI 赋能
SOC 即是云运维
角色
流程
管理
技术
SOC平台目标功能架构
• 数据发布层:对SOC平台采集分析的数据进行统一呈
现,同时对专业安全子系统以B/S方式统一纳入SOC平
台进行管理,并通过统一门户和统一认证实现多个专
业安全子系统的单点登录和集中授权管理。
•
安全事件处理层:主要包括对安全对象的管理、安
全风险的呈现和处理、安全事件和脆弱性的关联以
及对事件、脆弱性、完整性等安全信息的处理功能;
同时提供策略库统一规划网络... | pdf |
資安攻防遊戲
觀念名詞解釋
GD & Desnet
Platfor
m
運作
平台
Social
社交互動
Platform
系統平台
軟體服務
Service
Crypto
加密算法
資安
攻防
層級
CTF 資安攻防遊戲 (Capture The Flag)
• 模擬真實世界的駭客攻防
• 現場 4~8 人組隊、共 8~20 隊伍
• 封閉網路 每隊一台主機 若干服務
• 購物網站 (flag 在會員資料庫中)
• 電子郵件 (flag 在機密信件中)
• 線上遊戲 (flag 在任務關卡寶物中)
• 防守:維持服務在線 阻止flag被偷
• 五分鐘一個 round 計算 flag 數量
• 攻擊:設法偷取其他隊伍服務 flag... | pdf |
Multipot: A More Potent Variant of Evil Twin
K. N. Gopinath
Senior Wireless Security Researcher and Senior Engineering Manager
AirTight Networks
This presentation pertains to a discovery of a more potent variant of Evil Twin. We call it
‘Multipot’. What is unique about Multipot is that the prevalent defenses again... | pdf |
An Insider’s Options
Michael Rich
mike@tofet.net
The Challenge
The Tools Available
Phase 0 – Set up
Phase 1 – Hex Attack
Phase 2 – Attack of the Big Barcode
Bringing it all Together
Future/Branch Research Paths
Conclusion
There I was, hacking the collaboration portal..
How could I intercept the POST call to m... | pdf |
本文翻译自:Offensive WMI - Interacting with Windows Registry (Part 3) :: 0xInfection's Blog
— Random ramblings of an Infected Geek.
这是 WMI 攻击手法研究系列第三篇,本文将重点介绍与 Windows 注册表的交互。在开始之前需要了解
的一件事情是:MITRE ATT&CK 对查询注册表 (Query Registry) 归类于 T1012 以及它的修改 (Modify
Registry) 归类于 T1112。
一、Windows 注册表是什么
简单来说,注册表是一个存储操作系统配置设置的数据库:内核、设备... | pdf |
Virus Impossible
Virus Impossible
CIH<Software Magician>
CIH<Software Magician>
EMAIL:
EMAIL:IamCIH
IamCIH(AT)
(AT)gmail
gmail(DOT)
(DOT)com
com
GIGA
GIGA--BYTE TECHNOLOGY CO., LTD.
BYTE TECHNOLOGY CO., LTD.
2009/07/18
2009/07/18
PDF created with pdfFactory Pro trial version www.pdffactory.com
這一天
這一天
『
『怎會這樣?我的電腦被駭客入侵... | pdf |
• XMPP/Jabber
• Transports
• Short mail
• Internet to mobile communications
www.g2-inc.com
2
• Number + Carrier = Victim
• Users get email message with subscription
(texting)
• Received as a text message and not an email
• Cost equivalent to standard text message
www.g2-inc.com
3
• Conventional spamming techniques
• M... | pdf |
1
P/Invoke和D/Invoke的区别
解释unmanaged code
P/Invoke
D/Invoke
D/Invoke的⼀些应⽤
Interoperating with unmanaged code
https://docs.microsoft.com/en-us/dotnet/framework/interop/
p/Invoke是⼀项允许您从托管代码访问⾮托管库中的结构,回调和函数的技术。
⼤多数P/Invoke API包含在以下两个名称空间中:
System
System.Runtime.InteropServices
这两个名称空间为您提供了很多⼯具,帮助你⽅便快捷地本机组件进⾏通信。
解释unmanaged... | pdf |
加密勒索軟體行為偵測
(以Mac OS X為例)
Henry
HITCON 2016
About Me
• 黃禹程 (Henry)
• Developer at Verint
• 專長: Web Development
• 資安是興趣
• Chroot成員
大綱
• 偵測模型
• Mac OS X上用FUSE實作成果演示
• 實作說明
• 問題與討論
• 新專案:RansomCare
• 結論
偵測模型
與平台無關
對勒索軟體的假設
• 世上只有兩種勒索軟體
– 覆寫型 (OVERWRITE): 加密並覆寫原檔
– 開檔型 (NEW_FILE): 產生新加密檔並刪除原檔
• 一定會保留檔案全部內容
• 只具一般使用者權限
• [op... | pdf |
Ken Lee @echain
A Brain-Friendly Guide
Head First CVE
+ Who is Ken?
* Former Product Developer
* Chief Security Officer (WIP)
* Head of Synology SIRT
https://www.synology.com/security
+ 2013 The Phantom Menace
* Started working in 2013/01
* No developer to respond to vulnerabilities
* Lacked a sense of cybersecurity
* ... | pdf |
#BHUSA @BlackHatEvents
AAD Joined Machines - The New
Lateral Movement
Mor Rubin
#BHUSA @BlackHatEvents
Who am I?
• Mor Rubin (@rubin_mor)
• Senior security researcher at Microsoft
• Interested in networking, cloud and On-Prem attacks, mitigations and detections
#BHUSA @BlackHatEvents
Agenda
• Introduction to key terms... | pdf |
BURPKIT
Using WebKit to Own the Web
1
2015-07-15
Presented by:
Nadeem Douba
INTRODUCTION
• Nadeem Douba
• Founder of Red Canari, Inc.
• Based out of Ottawa, ON.
• Hacker
• Interests:
• Exploiting stuff
• Building hacking tools
• Prior work:
• Sploitego (presented at DEF CON XX)
• Canari (used by Fortune 100s)
• PyMiPr... | pdf |
祥云杯 Nu1L
MISC
进制反转
RAR 伪加密,改一下 header,解压得到一个音频,根据提示对 bit 进行翻转
with open('flag.wav','rb') as f:
content = f.read()
res = []
for c in content:
res.append((~c)&0xff)
with open('output.wav','wb') as f:
f.write(bytes(res))
音频翻转:https://audioalter.com/reverse/
在线识别:https://www.acrcloud.com/identify-songs-music-re... | pdf |
I'LL SEE YOUR MISSLE AND RAISE YOU A MIRV:
DEFCON 26
01
02
04
03
AGENDA
PRESENTERS
STAGERS, CCDC, &
HISTORY
Trampoline
Malware(s)
Exploit
Payload
Dropper
Empire
Pupy
Meterpreter
Professional offensive
engagements (CCDC)
Context aware implant
solutions
As a form of “packing”
3rd party crimeware.
Now we're ready to ... | pdf |
协议版本
使用该协议的Windows 版本
SMB1.0
Windows 2000、Windows XP、Windows Server 2003 和Windows Server 2003
R2
SMB2.0
Windows Vista 和Windows Server 2008
SMB2.1
Windows 7 和Windows Server 2008 R2
SMB3.0
Windows 8 和Windows Server 2012
SMB.3.02
Windows 8.1 和Windows Server 2012 R2
SMB
3.1.1
Windows 10 和Windows Server 2016
T1051: Shared W... | pdf |
Defending Networks with Incomplete
Information: A Machine Learning
Approach
Alexandre Pinto
alexcp@mlsecproject.org
@alexcpsec
@MLSecProject
• Security Monitoring: We are doing it wrong
• Machine Learning and the Robot Uprising
• More attacks = more data = better defenses
• Case study: Model to detect malici... | pdf |
Maelstrom: Are you
playing with a full deck?
Using an Attack Life Cycle Game to
Educate, Demonstrate and Evangelize
DEF CON 24 #cybermaelstrom
Shane Steiger, Esq. CISSP
© 2016
$ whoami
~messing with computers since 1989 - TIN, PINE, yTalk, Lynx, MUDs,
etc.
~8 years in a large food manufacturer helping to build an... | pdf |
Exploiting Active Directory
Administrator Insecurities
Sean Metcalf
@Pyrotek3
ABOUT
• Founder Trimarc (Trimarc.io), a professional services company that
helps organizations better secure their Microsoft platform, including
the Microsoft Cloud.
• Microsoft Certified Master (MCM) Directory Services
• Speaker: Black ... | pdf |
2021/12/15 下午2:02
记⼀次SSRF漏洞挖掘 - depy
https://blog.happysec.cn/index/view/375.go
1/3
depy
记一次SSRF漏洞挖掘
2021年12月15日 / 网络安全
入口点发现
找到一处接口,结构如下
各参数组成
1.src 文件地址
2.type 文件类型
3.access_key 请求密钥(这里默认)
4.src_sig 文件签名
5.expire 有效期(这里默认为0 永久有效)
通过参数fuzz可知,文件签名与其他四要素有关。如果没有五要素匹配,则无法访
问文件。
分析
文件签名长40位,推测是sha1加密。且与四要素有关联性,故无需碰撞。
所以任务是... | pdf |
Operating System Fingerprinting for Virtual Machines
Nguyen Anh Quynh
Email: aquynh@gmail.com
Abstract
In computer security field, Operating System fingerprint-
ing (OSF) is the process of identifying the OS variant and
version. OSF is considered an important stage to decide
security policy enforced on protected Virtual ... | pdf |
SSCTF Writeup by Nu1L
(本报告包含了 SSCTF 所有的题目,包括比赛时为做出来的题目)
逆向部分(Reverse)
Re100
这题很简单,首先判断用户名是否等于 secl-007
然后调用动态链接库中的 getpl 函数验证 password,由于在函数中没有对 password 做处理,
因此可以忽略中间的 DES 加密,输入 39 个字符或者修改寄存器的值,在最后判断的时候下
断,动态调试下就能得到 flag
flag 为 oty3eaP$g986iwhw32j%OJ)g0o7J.CG:
Re200
拿到程序打开运行,输入任意字符串后,发现一段 Bad Apple 的 MV... 动画结... | pdf |
All your family secrets belong to us -
Worrisome security issues in tracker apps
Siegfried Rasthofer | Fraunhofer SIT, Germany
Stephan Huber | Fraunhofer SIT, Germany
DefCon26, August 11th 2018
Who are we?
§ Head of department Secure Software
Engineering
§ PhD, M.Sc., B.Sc. in computer science
§ Static and dynamic c... | pdf |
DDoS Protecion Total AnnihilationD
DDoS Mitigation Lab
A
DDoS Mitigation Lab
Independent academic R&D division of
Nexusguard building next generation DDoS
mitigation knowledge and collaborate with
defense community.
Industry body formed to foster synergy among
stakeholders to promote advancement in DDoS
defense know... | pdf |
How I use a JSON Deserialization 0day to
Steal Your Money On The Blockchain
Ronny Xing & Zekai Wu
• Tencent Security Xuanwu Lab
• Applied and real world security research
•
Ronny Xing( @RonnyX2017)
•
Zekai Wu( @hellowuzekai)
> Whoami
1. What is Fastjson
2. Fastjson Deserialize and Vulnerability
3. Find G... | pdf |
|=-----------------------------------------------------------------------=|
|=----------------------=[ Sniffing Keystrokes With ]=------------------=|
|=----------------------=[ Lasers and Voltmeters ]=------------------=|
|=-----------------------------------------------------------------------=|
|=--------------... | pdf |
Host-based
Intrusion Prevention
on Windows and UNIX
Dr. Rich Murphey
White Oak Labs
WHITE OAK LABS
2
DEFCON XI
8/3/2003
Acknowledgements
• Niels Provos – OpenBSD’s systrace
• DT – suggested this thread last year
• Greg Hoglund – insights
• md5 at da ghettohackers – reviews
WHITE OAK LABS
3
DEFCON XI
8/3/2003
What is ... | pdf |
1
CATCHING MALWARE EN MASSE: DNS AND IP STYLE
Dhia Mahjoub (@DhiaLite) dhia@opendns.com
Thibault Reuille (@ThibaultReuille) thibault@opendns.com
Andree Toonk (@atoonk) andree@opendns.com
Abstract
The Internet is constantly growing, providing a myriad of new services, both legitimate and malicious. Criminals take ... | pdf |
POS SYSTEMSED
Romantically available
Hacker
Outdoor day drinker
Sort of an adrenaline junkie
Our Target
Motivation
Very common high security device
Companies often use on terminal encryption to justify
weak security elsewhere.
The companies that do care often don’t have the resources
to valid... | pdf |
信息收集 自定义 pipeline
命令(需要 httpx、subfinder):
输出 out 文件:
python3 icp.py 中国商用飞机有限责任公司 | ./Alive/bin/subfinder -silent |
./Alive/bin/httpx -status-code -title -follow-redire
cts -silent -no-color -content-length > out
https://cis.comac.cc [200] [796] []
https://fangke.sadri.cn [404] [1497] [404-对不起!您访问的页面不存在]
https://im.co... | pdf |
• 蔡政達 a.k.a Orange
• CHROOT 成員 / HITCON 成員 / DEVCORE 資安顧問
• 國內外研討會 HITCON, AVTokyo, WooYun 等講師
• 國內外駭客競賽 Capture the Flag 冠軍
• 揭露過 Microsoft, Django, Yahoo, Facebook, Google 等弱
點漏洞
• 專精於駭客⼿手法、Web Security 與網路滲透
#90後 #賽棍 #電競選⼿手 #滲透師 #Web狗 #🐶
– 講 Web 可以講到你們聽不懂就贏了
– 「⿊黑了你,從不是在你知道的那個點上」
– 擺在你眼前是 Feature、擺在駭客眼前就是漏洞
-... | pdf |
环境搭建
ubuntu docker 8g
docker pull apachekylin/apache-kylin-standalone:4.0.0
docker run -d \
-m 8G \
-p 7070:7070 \
-p 8088:8088 \
-p 50070:50070 \
-p 8032:8032 \
-p 8042:8042 \
-p 2181:2181 \
-p 5005:5005 \
apachekylin/apache-kylin-standalone:4.0.0
5005是远程调试端口
Kylin 页面:http://127.0.0.1:7070/kylin/login admin ... | pdf |
1.无凭证情况下
网络扫描
漏洞快速探测
扫描后可以去先用已知漏洞打
提权
低权限可以做的事情
拥有本地管理员权限
cme smb <ip_range> # SMB 扫描存活主机
nmap -sP -p <ip> # ping 扫描
nmap -PN -sV --top-ports 50 --open <ip> # 快速扫描
nmap -PN --script smb-vuln* -p139,445 <ip> # 检测 SMB 漏洞
nmap -PN -sC -sV <ip> ... | pdf |
HiveNightmare /SeriousSAM 利用补充
这https://t.zsxq.com/2R7mY3J中,有部门利用不够完善,在这儿补充下。
mimiktz利用
mimiktz的作者本杰明的更新速度是真的快,windows上的实时利用,基本不出3天就更新出来。闲话不
多说。当我们有了hash以后我们怎么提权呢。上次说了使用setntml或者changentml,这个mimiktz也
是有的,因此可以直接使用mimiktz(照顾新手同学,我想了想还是补充下)。
不只是SAM可读
SECURITY、SYSTEM文件中还有其他很多密钥,有了这些我们能够做什么需要大家一起想想了。
DPAPI computer keys
机器账... | pdf |
RF-ID and Smart-Labels: Myth,
Technology and Attacks
DefCon 2004
July 30 - August 1, Alexis Park, Las Vegas,
NV
Lukas Grunwald
DefCon 2004
RF-ID and Smart-Labels: Myth, Technology and Attacks – p. 1
Agenda
What is RF-ID ?
What is RF-ID and what are Smart-Labels
Risks and dangers with them
Fun with them, how to protect ... | pdf |
流量宝藏
01
目录
•解决数据孤岛
•时效性
背景介绍
•反入侵,防漏洞
•态势感知,主动对抗高级威胁
重点目标
•主机和应用层漏洞发现
实践探索 •挖矿,DN S安全,协议层面的分析
背景介绍
核心思想
•
多层防御体系
•
网络流量雁过留痕
流量安全分析
应用层
主机层
网络层
重点目标
02
重点目标
信息搜集
漏洞探测
漏洞利用
权限维持
持续渗透
网络流量数据
算法层
应用场景
处理层
逻辑架构
•
覆盖多种场景
•
不同的算法适配
重点目标
•
高危行为
•
高危组件覆盖
防漏洞
重点目标
•
木马流量
•
隧道流量
反入侵
实践尝试
03
实践尝试
传统主机安全检测响应EDR系
统,通过Agent方式采集主机日
志、... | pdf |
Hack your car for Boost and Power
By Aaron Higbee
Aaron.higbee@intrepidusgroup.com
http://blog.phishme.com
http://intrepidusgroup.com
• This slide intentionally left blank.
• Video clips
Who Am I?
• ASE certified mechanic? –
Nope
• CISSP –
Not anymore, I spent my dues on
something useful, car parts.
• I’m just a geek ... | pdf |
记⼀次渗透测试中的攻击路径,本⽂只对从zabbix权限到拿下内⽹jumpserver堡垒机权限的过
程进⾏介绍。
0x01 获取zabbix权限
内⽹扫描,发现了⼀个⾃研的资产监控平台,通过Django进⾏开发,且开了debug模式,在报
错的信息中,成功泄露了zabbix服务器和账号密码。
通过该zabbix账号密码,成功进⼊到zabbix的后台,且当前⽤户为管理员权限。
对zabbix系统上监控的主机进⾏观察,发现jumpserver服务器在zabbix监控主机中。想到wfox
关于zabbix权限利⽤的⽂章http://noahblog.360.cn/zabbixgong-ji-mian-wa-jue-yu-li-
yong/... | pdf |
!"#$%&'()
360高级攻防-灵腾实验室 – 赖志活 Wfox
0
!"#$%&'(
1
针对外网开放资产进行探测,定位远程办公类系统并进行攻击,以达到突破网络边界、窃取数
据的目的。
•
VPN系统(深信服VPN、思科VPN)
•
办公云桌面(Vmware Horizon、Citrix、深信服VDI)
•
办公OA(泛微、致远、蓝凌、通达)
•
邮件系统(Exchange、coremail、亿邮)
!"#$%&'( – )*+'(
2
1. 收集用户名、密码规律
1)
用户名规律
•
常见用户名、姓名全拼zhangsan、名字缩写wangsm、姓名倒序sanzhang、工号01111
•
已有通讯录、top500、top10... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.