text
stringlengths
100
9.93M
category
stringclasses
11 values
1 CVE-OLON-QLPQ pkexec本身是⽤来授权⽤户以其他身份执⾏程序,他具备suid属性,但由于常规功能下不⽀持直接执⾏ 命令,⽆法利⽤于suid提权。 pkexec是polkit (默认安装的系统服务)这个套件的程序。 CVE-2021-3560 利⽤的dbus-send,这次是 CVE-2021-4034 利⽤的 pkexec,上次影响的<=0.113 版本,这次影响全部版本。 Ubuntu、Debian、Fedora 和 CentOS 等默认安装pkexec,均受影响 暂时⽆吧 pkexec --version查看版本 https://github.com/wingo/polkit/blob/mast...
pdf
Injecting RDS-TMC Traffic Information Signals Injecting RDS-TMC Traffic Information Signals Copyright 2007 Inverse Path Ltd. DEFCON 15 Las Vegas, August 3-5 2007 Andrea Barisani Chief Security Engineer <andrea@inversepath.com> http://www.inversepath.com Daniele Bianco Hardware Hacker <daniele@inversepath.com> Introd...
pdf
Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared DeMott Dr. Richard Enbody @msu.edu Dr. William Punch DEFCON 2007 VDA Labs, LLC www.vdalabs.com Agenda Goals and previous works (1) Background Software, fuzzing, and evolutionary testing (2) Describe EFS in detail GPF &&...
pdf
1 MSNV-LNL LxLL 简介 LxLN 漏洞检测 N)msf O)⼯具 LxLO 漏洞利⽤ N)msf exploit/windows/smb/msNV_LNL_eternalblue auxiliary/admin/smb/msNV_LNL_command O)原⽣py P)其他⼯具 EternalPulse 界⾯化⼯具 永恒之蓝漏洞是⽅程式组织在其漏洞利⽤框架中⼀个针对 SMB服务 进⾏攻击的漏洞,该漏洞导致攻击者 在⽬标系统上可以执⾏任意代码。 内⽹中常遇⻅,懂得都懂,本⽂总结了⼀些检测和利⽤的⽅法。 msf ⾥有个模块 auxiliary/scanner/smb/smb_ms17_010 可以进⾏ 单IP / I...
pdf
#BHUSA @BlackHatEvents Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices Haoqi Shan1, Boyi Zhang1, Zihao Zhan1, Dean Sullivan2, Shuo Wang1, Yier Jin1 1: University of Florida 2. University of New Hampshire #BHUSA @BlackHatEvents Information Classification: General ...
pdf
Introduce LLVM from a hacker's view. Loda chou. hlchou@mail2000.com.tw 2012/07/02 1  I am Loda.  Work for 豬屎屋 (DeSign House).  Be familiar for MS-Windows System and Android/Linux Kernel.  Sometimes…also do some software crack job.  Like to dig-in new technology and share technical articles to promote t...
pdf
DEFCON CHINA 1.0 BADGE hacking workshop joe Grand aka kingpin •informal environment •a deeper look into the badge •setup development environment •modify/recompile CODE •open lab workshop goals •complete tasks, get rewarded •4 roots and 4 branches, each with 4 leds •when task is complete, badge inserted into programme...
pdf
SQL – Injection & OOB – channels Patrik Karlsson, Inspect it For an updated version of this presentation check http://www.inspectit.se/dc15.html Introduction • Who am I – Patrik Karlsson – Information Security Consultant – Owner of Inspect it – Founder of cqure.net Introduction • What do I do? – Penetration testing –...
pdf
WEAPONIZING THE BBC MICRO:BIT DAMIEN " " CAUQUIL VIRTUALABS DEF CON 25 - JULY 28, 2017 /ME Head of R&D, Econocom Digital Security Senior security researcher HW/SW Reverse-engineer AGENDA BBC Micro:Bit Features & Capabilities Hacking ideas Hacking into the Micro:Bit Turning the Micro:Bit into a sniffer Hacking various 2....
pdf
BCTF2017-Writeup By Nu1L Misc 签到: Nc 连上去输入 token,得到 flag。 foolme 关键点 1:哈希碰撞得到 md5 值结尾相同的 key.使用穷举方法即可。 关键点 2:发送满足条件的 jpg 图片的数据。校验函数是 check。 直接修改可以影响 diff 值的数据即可,即 input_x,input_y,input_z 的值。不断修改像素值,将 diff 值调高,但是不可以大于 2,并且被识别引擎识别为与原图不同的图片。 Web: signature Github 搜索源码。很容易搜到源码,下载后进行分析: 很容易看出是 CI 写的一个 Demo 站点。 在 blog_backup...
pdf
我的⽩白帽学习路路线 @ringzero 2017/03/25 • 阿⾥里里云 — ⾼高级安全专家 • ⼗十年年信息安全从业经历 • 信息安全领域爱好者 • ⾃自动化安全测试 • 数据挖掘 • 微博:@ringzero 关于我 进⾕谷歌 找记录 没记录 就旁注 没旁注 猜⽬目录 没⽬目录 就嗅探 找后台 穷枚举 传⼩小⻢马 放⼤大⻢马 偷密码 挂⻚页⾯面 提权限 扫内⽹网 啊D-SQL注⼊入 NBSI 明⼩小⼦子 桂林林⽼老老兵 引⽤用 : 《⾃自动化攻击背景下的过去、现在与未来》 — 2014年年 回到⼗十三年年前 — 2004年年的套路路 架设了了⼀一个PHPWind论坛 CentOS 编译安装LAMP环境 DVB...
pdf
Compression Oracle Attacks on VPN Networks Nafeez
 Defcon 26 About Nafeez - @sketpic_fx Interested in AppSec and writing software Maker @ assetwatch.io, Attacker Surface Discovery as a Service Overview Compression Side Channel and Encryption History of attacks VPNs and how they use compression Demo - Voracle Tool Ho...
pdf
从服务创建拦截看端上主防软件的工作原理和 绕过方法 前言 书接上文,在上一篇中我们详细讲解了服务的工作原理和隐藏方法,但是如果我们的服务根本就无法直 接注册到系统中,那上一节的内容就是白扯。所以怎么能够绕过端上类似于360主动防御类型的软件, 将我们的服务注册进系统,是一个棘手的问题,我们本节就着重研究这个问题,看怎么绕过。 从端上主防软件的工作原理讲起 本文把在客户端上利用行为进行拦截的软件成为端上主防软件,简称为hips,360的主动防御模块就是 典型的端上主防软件。这类软件复杂的会有用户态监控和内态监控,例如crowdstrike的Falcon,简单的 只有内核态监控,例如火绒hips,360的主动防御。 1. 用户态监控一般...
pdf
Routing in the Dark: Pitch Black Anonymous Abstract. In many networks, such as mobile ad-hoc networks and friend- to-friend overlay networks (darknets), direct communication between nodes is limited to specific neighbors. Often these networks have a small- world topology; while short paths exist between any pair of node...
pdf
mod_proxy_balancermanager 0x00 mod_proxybalanceapache proxy balancer apachebalancermanagerbalancerworker <Location "/balancer-manager"> SetHandler balancer-manager Require host example.com </Location> hostexample.commanagerrequire balancerworkerworkerbalancer 0x01 manageworker managerssrf registerhookap_ho...
pdf
上午发了⼀篇,致远OA的漏洞分析。 有⼏位师傅说有坑。确实,这个坑还能影响不少⼈。 问题在哪? ZipUtil.unzip(zipFile, unzipDirectory); 就在于这个ZipUtil。有⼏位师傅可能也尝试跟我⼀样写demo去复现。会发现⼀个错 误。 Entry is outside of the target dir 这样需要注意⼀下。版本问题。版本问题。版本问题。重要的事情说三遍。 只有 seeyon-ctp-core.jar 的修改时间为 2018-05-24 才能使⽤../去跨随机⽣成的 uuid⽬录。 ⾼于此修改时间就会爆出上⾯的错误。 然后最终的解压为: /seeyon/common/designer/p...
pdf
“探索、学习并使用 Go 语言的简洁 而全面的指导手册。” ——摘自 Hugo 创立者 Steven Francia 为本书写的序 “这本权威的书为所有想要开始学习 Go 语言的人提供了一站式的指引。” ——Sam Zaydel,RackTop Systems “写得太好了!完整介绍了Go语言。 强烈推荐。” ——Adam McKay,SUEZ “这本书把 Go 语言不寻常的部分讲 得通俗易懂。” ——Alex Vidal,Atlassian 的 HipChat 团队 Go 语言实战 语言实战 Go 分类建议:计算机/程序设计/ Go 语言 人民邮电出版社网址:www.ptpress.com.cn 美术编辑:董志桢 Go Go I...
pdf
Strategic Cyber Security An Evaluation of Nation-State Cyber Attack Mitigation Strategies Kenneth Geers NCIS Cyber SME Free download: ccdcoe.org/278.html About me ✴ 2011-: NCIS Cyber Subject Matter Expert ✴ 2007-2011: NATO Cyber Centre, Estonia ✴ 2001-2007: NCIS Cyber Analysis (Div Chief) ✴ 1999–2001: SAIC Security Stu...
pdf
KCon KCon Powershell攻击与防御 360天马安全团队 王永涛(@sanr) Get-Host  360天马安全研究员 WIFI安全 渗透测试 入侵检测  联系方式: weibo.com/0xls ssssanr@gmail.com github.com/ssssanr CONTENTS PowerShell概述 传统的powershell防御 Powershell攻击 PowerShell检测不防御 %95 Powershell脚本为恶意 PowerShell概述 PowerShell概...
pdf
大白话解释拟态安全 一、前言 一千个读者有一千个哈姆雷特,可能我有一些地方没有理解透彻和没有彻底明白,所以对于我讲的 东西存在偏面或者不好地方,欢迎指正但是不要骂我。 各位师傅可能这几年都听过一些特别高大上的词语,拟态安全,内生安全...在我看来,一开始,可能以 为这是什么全新的技术,全新的理念。其实都是一些旧概念,旧技术的衍生。我们今天主要来讲的就是 拟态安全,究竟是什么东西,尽量使用能听得懂的话语,来进行通俗易懂的解释。 此外,要注意的是,拟态安全并没有开源或公开的设备,或者说我这种菜鸡接触不到。所以我只能根据 网上的公开的文章,论文等资料进行阅读和理解,进行云解答。所以一定会存在理解误差的情况。我会 把看到的文献论文 以caj...
pdf
Letting the Air Out of Tire Pressure Monitoring Systems Mike Metzger - Flexible Creations mike@flexiblecreations.com 1 History • Porsche - First implemented on the 959 in 1986 (Thanks Wikipedia) • A bunch of various styles used in luxury cars • TREAD act - Basically, the Firestone / Ford Explorer problems in the 90...
pdf
Exploring Layer 2 Network Security in Virtualized Environments Ronny L. Bull, Jeanna N. Matthews Wallace H. Coulter School of Engineering Clarkson University Potsdam, NY 13699 Email: {bullrl, jnm}@clarkson.edu Abstract—Cloud service providers offer their customers the ability to deploy virtual machines in a multi-tenan...
pdf
2/25/2007 Slide 1 Offensive Computing Malware Secrets Valsmith (Valsmith@offensivecomputing.net) Delchi (delchi@offensivecomputing.net) 2/25/2007 Slide 2 Offensive Computing – Malware Secrets Valsmith BACKGROUND: Malware analyst Penetration tester Exploit developer Reverse Engineer AFFILIATIONS: OffensiveComputing M...
pdf
Time Line and Nodal Analysis of PLA IW Development Ming Zhou iDefense Security Intelligence Services 19 February , 2009 2 Agenda + What Have Western Seen? + iDefense Research Methodology + PLA IW Timeline + Deduction and Facts + My One Step Leap Time Line 3 What Western Have Seen + Titan Rain + Western governments...
pdf
2018 0CTF Author: Nu1L 2018 0CTF Author: Nu1L Misc hidden message Welcome MathGame Baby VM 2 Web ezDoor (Done) h4x0rs.club 1 (Done) h4x0rs.club 2 (Done) LoginMe (Done) Reverse g0g0g0 (Done) babyvm (solved) udp (Done) Pwnable Baby Stack 2018 Baby heap 2018 (solved) Zer0 FS (solved) Black Hole Theory Misc hidden message ...
pdf
© NCC Group 2021. All rights reserved Instrument and Find Out Writing Parasitic Tracers for High(-Level) Languages Jeff Dileo @chaosdatumz DEF CON 29 call_usermodehelper("/bin/sh",(char*[]){"/bin/sh","-c","whoami",NULL},NULL,5) © NCC Group 2021. All rights reserved • @chaosdatumz • Agent of chaos • Unix aficionado • Te...
pdf
短网址攻击与防御 演讲人:彦修 2 0 1 8 About Me • 腾讯安全工程师 • 微博:@彦修_ • 喜美食、好读书,不求甚解 • Tencent Blade Team • 由腾讯安全平台部创立。 • 专注于AI、移动互联网、IoT、无线电等前沿技术领域安全研究。 • 报告了谷歌、苹果、亚马逊等多个国际知名厂商70+安全漏洞。 PART 01 短网址猜想 目录 CONTENTS PART 02 何谓短网址 PART 03 短网址攻击实战 PART 04 扩展短网址攻击面 01 02 03 04 PART 05 短网址防御实践 05 PART 01 短网址猜想 某个惠风和畅的下午收到这么一封邮件…… 改变短网址后缀,是否可以...
pdf
You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial Testing of Software Used in the Criminal Justice System August 11, 2018 - DEF CON 26 Jeanna Matthews, PhD - Clarkson University/Data and Society Nathan Adams - Forensic Bioinformatic Services Jerome D. Greco, Esq. - Legal Aid Society of NYC...
pdf
Blitzableiter – BETA Release Countering Flash Exploits Felix ‘FX’ Lindner DEFCON XVIII Agenda Motivation RIA Basics Flash (in)Security Flash Malware Flash Internals Defending the Poor Defense approach Implementation Current functionality Measurements & Results Next steps Motivation Project initiated in late 2...
pdf
对 log4j2 漏洞的后续研究中,发现⼀些有趣的东⻄,记录分享⼀下 ⾸先提出⼀个问题,log4j 真的在任何情况不存在 JNDI注⼊吗? 答案是否定的。 翻阅 Log4j2 的 pull request 发现⼀个有意思的对话: 有⼈提出实际上 log4j 和 log4j2 ⼀样易受攻击的,只不过与 log4j2 相⽐,Log4j 的攻击向量“更安全” 因为 Log4j 的攻击⼊⼝点是其配置⽂件,⽽ log4j2 的攻击⼊⼝点是⽤户的输⼊ 那么实际上如何呢?经过我简单测试,发现修改 log4j 的配置⽂件确实会导致漏洞的产⽣,但要求要⽐pull reques中所说的更苛刻。 ⾸先在 maven 中添加以下依赖: 001 写在前⾯ ...
pdf
Octopus v1.0 stable: Cobalt Strike deployment 原文: https://shells.systems/octopus-v1-0-stable-cobalt-strike-deployment-much-more/ 使用教程: https://shells.systems/unveiling-octopus-the-pre-operation-c2-for-red-teamers/ stable版本发布: https://github.com/mhaskar/Octopus/releases/tag/v1.0 一.Intorduction 很早之前就是用过Octopus be...
pdf
Let’s Get Physical Network Attacks Against Physical Security Systems Ricky “HeadlessZeke” Lawshae – Defcon24 – 2016 Intro Let's Get Physical 3 Intro Who am I? • Security Researcher at TippingPoint • IoT (drink!) hacking enthusiast • Occasional conference presenter • Used to install physical security systems for a livin...
pdf
Smartfuzzing the Web Carpe Vestra Foramina Friday, June 24, 2011 Out of Date • This presentation is out of date. – Grab an updated copy from our Google Code Page • http://code.google.com/p/raft 2 Friday, June 24, 2011 Who are we? • Nathan "Nate Dawg" Hamiel • Gregory "G-Fresh" Fleischer • Seth "The Law" Law • Justin ...
pdf
Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network Svetlana Gaivoronski, PhD Student, Moscow State University Dennis Gamayunov, Senior Researcher, Moscow State University Memory corruption, 0-days, shellcodes… Why should anyone care about shellcodes in 2012? CONS: • Old exploitation techniq...
pdf
Module 1 A journey from high level languages, through assembly, to the running process https://github.com/hasherezade/malware_training_vol1 Basics of PE (Portable Executable) Basics of a PE file • PE (Portable Executable) is a native executable format on Windows • PE files: • user mode: EXE, DLL • kernel mode: drive...
pdf
{ Breaking the x86 ISA domas / @xoreaxeaxeax / DEF CON 2017 Christopher Domas Cyber Security Researcher @ Battelle Memorial Institute ./bio 8086: 1978 A long, tortured history… The x86 ISA Modes: Real (Unreal) Protected mode (Virtual 8086, SMM) Long mode (Compatibility, PAE) x86: evolution Instruction sets x86...
pdf
In Need of 'Pair' Review - @kiwihammond, @ichthys101, and @moyix et al. Presenters: Hammond Pearce (@kiwihammond) Benjamin Tan (@ichthys101) In collaboration with: Baleegh Ahmad, Brendan Dolan-Gavitt (@moyix), and Ramesh Karri In Need of 'Pair' Review: Vulnerable Code Contributions by GitHub Copilot #BHUSA @Bla...
pdf
Want strong isolation? Just reset your processor. How we can build more secure systems by applying the age-old wisdom of “turning it off and on again” Anish Athalye, Adam Belay, Frans Kaashoek, Robert Morris, Nickolai Zeldovich Security devices are increasingly common Smartphone apps Custom hardware 2 They are getting...
pdf
Hacking the Smart Grid Tony Flick FYRM Associates tony.flick@fyrmassociates.com Abstract The city of Miami and several commercial partners plan to rollout a “smart grid” citywide electrical infrastructure by the year 2011. This rollout was announced on the heels of news that foreign agents have infiltrated our ...
pdf
Philips Hue Bridge2.1 获取设备 root 权限 基础信息收集 设备介绍 Philips HUE Bridge 桥接器在现有 HUE Bridge 桥接器的基础上升级为支持 HomeKit。这款 HUE Bridge 桥接器让你可在 iPhone、iPad 或 iPod touch 上 通过 Hue app 控制自己的各种 Hue 产品。只需安装好 HUE Bridge 桥接器, 并将 app 下载到 iOS 设备上,便可开始打造定制化的照明系统。 (参考: https://www.apple.com.cn/shop/product/HPY82CH/A) 设备版本 philips Hue Bridg...
pdf
The Internet’s Private Cops Wendy Seltzer EFF Staff Attorney wendy@eff.org <http://www.eff.org> DEFCON 11, August 2, 2003 11/23/2009 2 The Internet’s Private Cops  Early view: The Internet can “route around” law  Later view: Maybe it can’t. We need to work with the law itself. 11/23/2009 3 RIAA v. Verizon  subpoe...
pdf
0 Presented by: Dondi West, M.Sc., J.D. Associate, Booz Allen Hamilton Def Con 18 July 30th – August 1st 2010 Las Vegas, Nevada A paper arguing that the current rules of war can address the emerging issues raised by cyber warfare A Survey and Examination of the Adequacy of the Laws Related to Cyber Warfare 1 Discl...
pdf
CVE-2022-22972 VMware Workspace ONE Access Authentication Bypass RCE author:Y4er 补丁对比 HW-156875-Appliance-21.08.0.1/frontend-0.1.war中增加了一个HostHeaderFilter,匹配全路由 然后删除了DBConnectionCheckController,这个地方有jdbc attack。 权限绕过 查看HostHeaderFilter代码 package ; import VisibleForTesting; import GlobalConfigService; import Hori...
pdf
LABS Back to the Future Our journey back to the future of Windows vulnerabilities and the 0-days we brought back with us ● 15+ years in Cyber Security ● Director of Security Research @ SafeBreach ● Main focus in APT and vulnerability research 2 Tomer Bar Director of Security Research LABS ● 7+ years in Cyber Security ...
pdf
1" Breaking WingOS IOActive, Inc. Copyright ©2018. All Rights Reserved. Index •  Intro to WingOS. •  Scenarios & Attack surface. •  Vulnerabilities. •  Exploitation & Demo. •  Conclusions IOActive, Inc. Copyright ©2018. All Rights Reserved. Intro to WingOS •  Embedded Linux OS with proprietary modifications...
pdf
《智能家居安全——身份劫持》 ——作者:挽秋(daizy) 1、概要 本文以如何劫持(窃取)智能家居时代设备的身份“安全凭证”为出发点,调研并分析了目 前国内市场的主流产品和设备交互协议,及其所依赖身份凭证,通过介绍、分析和发现设备 交互控制协议安全性,最终通过身份劫持,实现相关设备和产品的任意远程控制。 2、智能家居身份和劫持危害 先通过一张简图来了解一下应用、智能设备和云端三者交互时携带的身份标识,如图 2.1 所示: 图 2.1:智能家居设备交互时携带的身份标识 从上图了解到,智能家居身份标识通常是以下几种情况: 1)账号 cookie 相关,如身份 Token; 2)用户 id:userid 3)设备 i...
pdf
{ domas / @xoreaxeaxeax / DEF CON 2018 The ring 0 facade: awakening the processor's inner demons  Christopher Domas  Cyber Security Researcher ./bio disclaimer: The research presented herein was conducted and completed as an independent consultant. None of the research presented herein was conducted under the ausp...
pdf
探寻Java⽂件上传流量层⾯waf绕过姿势系 列⼆ 探寻Java⽂件上传流量层⾯waf绕过姿势系列⼆ 写在前⾯ 正⽂ tomcat 灵活的parseQuotedToken 变形之双写filename*与filename 变形之编码误⽤ Spring4 猜猜我在第⼏层 Spring5 "双写"绕过 写在前⾯ 这篇和上篇不同的是上篇更多关注于RFC⽂档规范的部分,⽽这篇更关注于如何从代码层⾯ 上的利⽤来绕过,具体内容请接着往下看 正⽂ tomcat 灵活的parseQuotedToken 继续看看这个解析value的函数,它有两个终⽌条件,⼀个是⾛到最后⼀个字符,另⼀个是遇 到 ; 如果我们能灵活控制终⽌条件,那么waf引擎在此基础...
pdf
building the @shortxstack @sethlaw intros · whitney champion · senior systems engineer · https://unicorns.lol · @shortxstack · seth law · appsec consultant · https://redpointsecurity.com · @sethlaw inception what had happened was... android v1.0 iOS v1.0 it’s official pain points scheduling don’t trust hax0rs bug fix...
pdf
HTTP认证方案 Author:h0ld1rs,Reclu3e 前言 因为HTTP协议是开放的,可以任人调用。所以,如果接口不希望被随意调用,就需要做访问权限的控 制,认证好的用户,才允许调用API。 本篇文章在郁离歌师傅的指导下,参考RFC对HTTP常用的认证方案做了归纳总结 Form认证 最常见的一种认证方式,即表单认证,表单认证一般都会配合cookie+sessiond的使用,现在绝大多数 的Web站点都是使用此认证方式。用户在登录页中填写用户名和密码,服务端认证通过后会将sessionId 返回给浏览器端,浏览器会保存sessionId到浏览器的Cookie中。因为Http是无状态的,所以浏览器使用 Cookie来保存ses...
pdf
bypass NAT tcp #!/usr/bin/env python # -*- coding: utf-8 -*- # # Fake ftp server code for conntrack exploit # # This software is in the public domain, furnished "as is", without technical # support, and with no warranty, express or implied, as to its usefulness for # any purpose. # # Author: Roman Tsisyk # # Please r...
pdf
David Rook The Security Risks of Web 2.0 DefCon 17, Las Vegas Agenda • A quick Web 2.0 definition • The differences between Web 1.0 and Web 2.0 • Common Web 2.0 security vulnerabilities • The differences between Web 1.0 and Web 2.0 vulnerabilities • Security analysis difficulties with Web 2.0 • How to prevent these vul...
pdf
PUBLIC 3/2/2022 Controlling the Source: Abusing Source Code Management Systems Brett Hawkins Adversary Simulation, IBM X-Force Red X-Force Red | 3/2/2022 2 Document Tracking Data Classification: PUBLIC Version Date Author Notes 1.0 3/2/2022 Brett Hawkins Release X-Force Red | 3/2/2022 3 TABLE OF CO...
pdf
School of Computer & Security Science Edith Cowan University Exchanging Demands Peter Hannay peter@hannay.id.au School of Computer & Security Science Edith Cowan University The Introduction School of Computer & Security Science Edith Cowan University Who am I? •  Lecturer •  Researcher •  Hacker •  Pentes...
pdf
KCon KCon Breaking iOS Mitigation Jails to Achieve Your Own Private Jailbreak Min(Spark) Zheng @ Alibaba Mobile Security ONLY AVAILABLE AT THE SCENE iOS status • Apple sold more than 1 billion iOS devices. More than 380,000 registered iOS developers in the U.S. • It was reported that iOS is more secure than Android...
pdf
Dirty Little Secrets of Information Security Why we might not be doing as well as you would hope. Bruce Potter (gdead@shmoo.com) 1 Don’t Believe Anything I Say • “Every person who has mastered a profession is a skeptic concerning it.” - George Bernard Shaw • “Authority has every reason to fear the skeptic, for author...
pdf
TCTF WriteUp By Nu1L TCTF WriteUp By Nu1L WEB soracon 1linephp worldcup Reverse vp FEA lalamblambdadambda Crypto zer0lfsr- checkin PWN listbook how2mutate uc_masteeer Babyheap 2021 MISC uc_baaaby GutHib welcome singer Survey WEB soracon phpsolrint pop chain <?php namespace Phalcon\Logger { class Item { ...
pdf
See no evil, hear no evil Hacking invisibly and silently with light and sound www.pwc.co.uk July 2017 Matt Wixey – PwC UK PwC Intro • Matt Wixey • Lead the research function on PwC’s UK pentesting team • Run The Dark Art Lab research blog • Previously worked in LEA, leading R&D team PwC Agenda • Part I: Jumping air-gap...
pdf
Fuzzing'Android'OMX Mingjian Zhou'and'Chiachih Wu C0RE'Team About'Us • Mingjian Zhou,'周明建 – Security'researcher'@'360'C0RE'team – Focused'on'Android'vulnerability'research'and'exploit' development • Chiachih Wu,'吳家志 (@chiachih_wu) – Security'researcher'@'360'C0RE'team – Android/Linuxsystem'security'research – C0RE'team...
pdf
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic Saif Al-mashhadi1,2, Mohammed Anbar1, Iznan Hasbullah1 and Taief Alaa Alamiedy1,3 1 National Advanced IPv6 Centre, Universiti Sains Malaysia, Penang, Malaysia 2 Electrical Engineering, University of Baghdad, Baghdad, Baghdad, Ir...
pdf
Cyber [Crime|War] Connecting the dots Iftach Ian Amit Managing Partner, Security & Innovation Agenda Who am I? CyberWar [Attack | Defense] CyberCrime [Attack | Defense] Past events revisited... Connecting the dots Future Who Am I This is NOT going to be Picking up where we left off At least as far as last year’s resear...
pdf
#BHUSA @BlackHatEvents Stalloris: RPKI Downgrade Attack Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman and Michael Waidner #BHUSA @BlackHatEvents Information Classification: General Team • Tomas Hlavacek • Donika Mirdita • Haya Shulman • Michael Waidner Cybersecurity Analytics and Defences departement •...
pdf
展望NEW GEN SOC Elaine Ma| Cybersecurity Head CHN-Region Security 简述SOC SOC的趋势 不仅仅是运维云即是未来的终端安全 展望AI 赋能 SOC 即是云运维 角色 流程 管理 技术 SOC平台目标功能架构 • 数据发布层:对SOC平台采集分析的数据进行统一呈 现,同时对专业安全子系统以B/S方式统一纳入SOC平 台进行管理,并通过统一门户和统一认证实现多个专 业安全子系统的单点登录和集中授权管理。 • 安全事件处理层:主要包括对安全对象的管理、安 全风险的呈现和处理、安全事件和脆弱性的关联以 及对事件、脆弱性、完整性等安全信息的处理功能; 同时提供策略库统一规划网络...
pdf
資安攻防遊戲 觀念名詞解釋 GD & Desnet Platfor m 運作 平台 Social 社交互動 Platform 系統平台 軟體服務 Service Crypto 加密算法 資安 攻防 層級 CTF 資安攻防遊戲 (Capture The Flag) • 模擬真實世界的駭客攻防 • 現場 4~8 人組隊、共 8~20 隊伍 • 封閉網路 每隊一台主機 若干服務 • 購物網站 (flag 在會員資料庫中) • 電子郵件 (flag 在機密信件中) • 線上遊戲 (flag 在任務關卡寶物中) • 防守:維持服務在線 阻止flag被偷 • 五分鐘一個 round 計算 flag 數量 • 攻擊:設法偷取其他隊伍服務 flag...
pdf
Multipot: A More Potent Variant of Evil Twin K. N. Gopinath Senior Wireless Security Researcher and Senior Engineering Manager AirTight Networks This presentation pertains to a discovery of a more potent variant of Evil Twin. We call it ‘Multipot’. What is unique about Multipot is that the prevalent defenses again...
pdf
An Insider’s Options Michael Rich mike@tofet.net The Challenge The Tools Available Phase 0 – Set up Phase 1 – Hex Attack Phase 2 – Attack of the Big Barcode Bringing it all Together Future/Branch Research Paths Conclusion There I was, hacking the collaboration portal.. How could I intercept the POST call to m...
pdf
本文翻译自:Offensive WMI - Interacting with Windows Registry (Part 3) :: 0xInfection's Blog — Random ramblings of an Infected Geek. 这是 WMI 攻击手法研究系列第三篇,本文将重点介绍与 Windows 注册表的交互。在开始之前需要了解 的一件事情是:MITRE ATT&CK 对查询注册表 (Query Registry) 归类于 T1012 以及它的修改 (Modify Registry) 归类于 T1112。 一、Windows 注册表是什么 简单来说,注册表是一个存储操作系统配置设置的数据库:内核、设备...
pdf
Virus Impossible Virus Impossible CIH<Software Magician> CIH<Software Magician> EMAIL: EMAIL:IamCIH IamCIH(AT) (AT)gmail gmail(DOT) (DOT)com com GIGA GIGA--BYTE TECHNOLOGY CO., LTD. BYTE TECHNOLOGY CO., LTD. 2009/07/18 2009/07/18 PDF created with pdfFactory Pro trial version www.pdffactory.com 這一天 這一天 『 『怎會這樣?我的電腦被駭客入侵...
pdf
• XMPP/Jabber • Transports • Short mail • Internet to mobile communications www.g2-inc.com 2 • Number + Carrier = Victim • Users get email message with subscription (texting) • Received as a text message and not an email • Cost equivalent to standard text message www.g2-inc.com 3 • Conventional spamming techniques • M...
pdf
1 P/Invoke和D/Invoke的区别 解释unmanaged code P/Invoke D/Invoke D/Invoke的⼀些应⽤ Interoperating with unmanaged code https://docs.microsoft.com/en-us/dotnet/framework/interop/ p/Invoke是⼀项允许您从托管代码访问⾮托管库中的结构,回调和函数的技术。 ⼤多数P/Invoke API包含在以下两个名称空间中: System System.Runtime.InteropServices 这两个名称空间为您提供了很多⼯具,帮助你⽅便快捷地本机组件进⾏通信。 解释unmanaged...
pdf
加密勒索軟體行為偵測 (以Mac OS X為例) Henry HITCON 2016 About Me • 黃禹程 (Henry) • Developer at Verint • 專長: Web Development • 資安是興趣 • Chroot成員 大綱 • 偵測模型 • Mac OS X上用FUSE實作成果演示 • 實作說明 • 問題與討論 • 新專案:RansomCare • 結論 偵測模型 與平台無關 對勒索軟體的假設 • 世上只有兩種勒索軟體 – 覆寫型 (OVERWRITE): 加密並覆寫原檔 – 開檔型 (NEW_FILE): 產生新加密檔並刪除原檔 • 一定會保留檔案全部內容 • 只具一般使用者權限 • [op...
pdf
Ken Lee @echain A Brain-Friendly Guide Head First CVE + Who is Ken? * Former Product Developer * Chief Security Officer (WIP) * Head of Synology SIRT https://www.synology.com/security + 2013 The Phantom Menace * Started working in 2013/01 * No developer to respond to vulnerabilities * Lacked a sense of cybersecurity * ...
pdf
#BHUSA @BlackHatEvents AAD Joined Machines - The New Lateral Movement Mor Rubin #BHUSA @BlackHatEvents Who am I? • Mor Rubin (@rubin_mor) • Senior security researcher at Microsoft • Interested in networking, cloud and On-Prem attacks, mitigations and detections #BHUSA @BlackHatEvents Agenda • Introduction to key terms...
pdf
BURPKIT Using WebKit to Own the Web 1 2015-07-15 Presented by: Nadeem Douba INTRODUCTION • Nadeem Douba • Founder of Red Canari, Inc. • Based out of Ottawa, ON. • Hacker • Interests: • Exploiting stuff • Building hacking tools • Prior work: • Sploitego (presented at DEF CON XX) • Canari (used by Fortune 100s) • PyMiPr...
pdf
祥云杯 Nu1L MISC 进制反转 RAR 伪加密,改一下 header,解压得到一个音频,根据提示对 bit 进行翻转 with open('flag.wav','rb') as f: content = f.read() res = [] for c in content: res.append((~c)&0xff) with open('output.wav','wb') as f: f.write(bytes(res)) 音频翻转:https://audioalter.com/reverse/ 在线识别:https://www.acrcloud.com/identify-songs-music-re...
pdf
I'LL SEE YOUR MISSLE AND RAISE YOU A MIRV: DEFCON 26 01 02 04 03 AGENDA PRESENTERS STAGERS, CCDC, & HISTORY Trampoline Malware(s) Exploit Payload Dropper Empire Pupy Meterpreter Professional offensive engagements (CCDC) Context aware implant solutions As a form of “packing” 3rd party crimeware. Now we're ready to ...
pdf
协议版本 使用该协议的Windows 版本 SMB1.0 Windows 2000、Windows XP、Windows Server 2003 和Windows Server 2003 R2 SMB2.0 Windows Vista 和Windows Server 2008 SMB2.1 Windows 7 和Windows Server 2008 R2 SMB3.0 Windows 8 和Windows Server 2012 SMB.3.02 Windows 8.1 和Windows Server 2012 R2 SMB 3.1.1 Windows 10 和Windows Server 2016 T1051: Shared W...
pdf
Defending Networks with Incomplete Information: A Machine Learning Approach Alexandre Pinto alexcp@mlsecproject.org @alexcpsec @MLSecProject • Security Monitoring: We are doing it wrong • Machine Learning and the Robot Uprising • More attacks = more data = better defenses • Case study: Model to detect malici...
pdf
Maelstrom: Are you playing with a full deck? Using an Attack Life Cycle Game to Educate, Demonstrate and Evangelize DEF CON 24 #cybermaelstrom Shane Steiger, Esq. CISSP © 2016 $ whoami ~messing with computers since 1989 - TIN, PINE, yTalk, Lynx, MUDs, etc. ~8 years in a large food manufacturer helping to build an...
pdf
Exploiting Active Directory Administrator Insecurities Sean Metcalf @Pyrotek3 ABOUT • Founder Trimarc (Trimarc.io), a professional services company that helps organizations better secure their Microsoft platform, including the Microsoft Cloud. • Microsoft Certified Master (MCM) Directory Services • Speaker: Black ...
pdf
2021/12/15 下午2:02 记⼀次SSRF漏洞挖掘 - depy https://blog.happysec.cn/index/view/375.go 1/3 depy 记一次SSRF漏洞挖掘 2021年12月15日 / 网络安全 入口点发现 找到一处接口,结构如下 各参数组成 1.src 文件地址 2.type 文件类型 3.access_key 请求密钥(这里默认) 4.src_sig 文件签名 5.expire 有效期(这里默认为0 永久有效) 通过参数fuzz可知,文件签名与其他四要素有关。如果没有五要素匹配,则无法访 问文件。 分析 文件签名长40位,推测是sha1加密。且与四要素有关联性,故无需碰撞。 所以任务是...
pdf
Operating System Fingerprinting for Virtual Machines Nguyen Anh Quynh Email: aquynh@gmail.com Abstract In computer security field, Operating System fingerprint- ing (OSF) is the process of identifying the OS variant and version. OSF is considered an important stage to decide security policy enforced on protected Virtual ...
pdf
SSCTF Writeup by Nu1L (本报告包含了 SSCTF 所有的题目,包括比赛时为做出来的题目) 逆向部分(Reverse) Re100 这题很简单,首先判断用户名是否等于 secl-007 然后调用动态链接库中的 getpl 函数验证 password,由于在函数中没有对 password 做处理, 因此可以忽略中间的 DES 加密,输入 39 个字符或者修改寄存器的值,在最后判断的时候下 断,动态调试下就能得到 flag flag 为 oty3eaP$g986iwhw32j%OJ)g0o7J.CG: Re200 拿到程序打开运行,输入任意字符串后,发现一段 Bad Apple 的 MV... 动画结...
pdf
All your family secrets belong to us - Worrisome security issues in tracker apps Siegfried Rasthofer | Fraunhofer SIT, Germany Stephan Huber | Fraunhofer SIT, Germany DefCon26, August 11th 2018 Who are we? § Head of department Secure Software Engineering § PhD, M.Sc., B.Sc. in computer science § Static and dynamic c...
pdf
DDoS Protecion Total AnnihilationD DDoS Mitigation Lab A DDoS Mitigation Lab Independent academic R&D division of Nexusguard building next generation DDoS mitigation knowledge and collaborate with defense community. Industry body formed to foster synergy among stakeholders to promote advancement in DDoS defense know...
pdf
How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain Ronny Xing & Zekai Wu • Tencent Security Xuanwu Lab • Applied and real world security research • Ronny Xing( @RonnyX2017) • Zekai Wu( @hellowuzekai) > Whoami 1. What is Fastjson 2. Fastjson Deserialize and Vulnerability 3. Find G...
pdf
|=-----------------------------------------------------------------------=| |=----------------------=[ Sniffing Keystrokes With ]=------------------=| |=----------------------=[ Lasers and Voltmeters ]=------------------=| |=-----------------------------------------------------------------------=| |=--------------...
pdf
Host-based Intrusion Prevention on Windows and UNIX Dr. Rich Murphey White Oak Labs WHITE OAK LABS 2 DEFCON XI 8/3/2003 Acknowledgements • Niels Provos – OpenBSD’s systrace • DT – suggested this thread last year • Greg Hoglund – insights • md5 at da ghettohackers – reviews WHITE OAK LABS 3 DEFCON XI 8/3/2003 What is ...
pdf
1 CATCHING MALWARE EN MASSE: DNS AND IP STYLE Dhia Mahjoub (@DhiaLite) dhia@opendns.com Thibault Reuille (@ThibaultReuille) thibault@opendns.com Andree Toonk (@atoonk) andree@opendns.com Abstract The Internet is constantly growing, providing a myriad of new services, both legitimate and malicious. Criminals take ...
pdf
POS SYSTEMSED Romantically available Hacker Outdoor day drinker Sort of an adrenaline junkie Our Target Motivation Very common high security device Companies often use on terminal encryption to justify
 weak security elsewhere. The companies that do care often don’t have the resources 
 to valid...
pdf
信息收集 自定义 pipeline 命令(需要 httpx、subfinder): 输出 out 文件: python3 icp.py 中国商用飞机有限责任公司 | ./Alive/bin/subfinder -silent | ./Alive/bin/httpx -status-code -title -follow-redire cts -silent -no-color -content-length > out https://cis.comac.cc [200] [796] [] https://fangke.sadri.cn [404] [1497] [404-对不起!您访问的页面不存在] https://im.co...
pdf
• 蔡政達 a.k.a Orange • CHROOT 成員 / HITCON 成員 / DEVCORE 資安顧問 • 國內外研討會 HITCON, AVTokyo, WooYun 等講師 • 國內外駭客競賽 Capture the Flag 冠軍 • 揭露過 Microsoft, Django, Yahoo, Facebook, Google 等弱 點漏洞 • 專精於駭客⼿手法、Web Security 與網路滲透 #90後 #賽棍 #電競選⼿手 #滲透師 #Web狗 #🐶 – 講 Web 可以講到你們聽不懂就贏了 – 「⿊黑了你,從不是在你知道的那個點上」 – 擺在你眼前是 Feature、擺在駭客眼前就是漏洞 -...
pdf
环境搭建 ubuntu docker 8g docker pull apachekylin/apache-kylin-standalone:4.0.0 docker run -d \ -m 8G \ -p 7070:7070 \ -p 8088:8088 \ -p 50070:50070 \ -p 8032:8032 \ -p 8042:8042 \ -p 2181:2181 \ -p 5005:5005 \ apachekylin/apache-kylin-standalone:4.0.0 5005是远程调试端口 Kylin 页面:http://127.0.0.1:7070/kylin/login admin ...
pdf
1.无凭证情况下 网络扫描 漏洞快速探测 扫描后可以去先用已知漏洞打 提权 低权限可以做的事情 拥有本地管理员权限 cme smb <ip_range> # SMB 扫描存活主机 nmap -sP -p <ip> # ping 扫描 nmap -PN -sV --top-ports 50 --open <ip> # 快速扫描 nmap -PN --script smb-vuln* -p139,445 <ip> # 检测 SMB 漏洞 nmap -PN -sC -sV <ip> ...
pdf
HiveNightmare /SeriousSAM 利用补充 这https://t.zsxq.com/2R7mY3J中,有部门利用不够完善,在这儿补充下。 mimiktz利用 mimiktz的作者本杰明的更新速度是真的快,windows上的实时利用,基本不出3天就更新出来。闲话不 多说。当我们有了hash以后我们怎么提权呢。上次说了使用setntml或者changentml,这个mimiktz也 是有的,因此可以直接使用mimiktz(照顾新手同学,我想了想还是补充下)。 不只是SAM可读 SECURITY、SYSTEM文件中还有其他很多密钥,有了这些我们能够做什么需要大家一起想想了。 DPAPI computer keys 机器账...
pdf
RF-ID and Smart-Labels: Myth, Technology and Attacks DefCon 2004 July 30 - August 1, Alexis Park, Las Vegas, NV Lukas Grunwald DefCon 2004 RF-ID and Smart-Labels: Myth, Technology and Attacks – p. 1 Agenda What is RF-ID ? What is RF-ID and what are Smart-Labels Risks and dangers with them Fun with them, how to protect ...
pdf
流量宝藏 01 目录 •解决数据孤岛 •时效性 背景介绍 •反入侵,防漏洞 •态势感知,主动对抗高级威胁 重点目标 •主机和应用层漏洞发现 实践探索 •挖矿,DN S安全,协议层面的分析 背景介绍 核心思想 • 多层防御体系 • 网络流量雁过留痕 流量安全分析 应用层 主机层 网络层 重点目标 02 重点目标 信息搜集 漏洞探测 漏洞利用 权限维持 持续渗透 网络流量数据 算法层 应用场景 处理层 逻辑架构 • 覆盖多种场景 • 不同的算法适配 重点目标 • 高危行为 • 高危组件覆盖 防漏洞 重点目标 • 木马流量 • 隧道流量 反入侵 实践尝试 03 实践尝试 传统主机安全检测响应EDR系 统,通过Agent方式采集主机日 志、...
pdf
Hack your car for Boost and Power By Aaron Higbee Aaron.higbee@intrepidusgroup.com http://blog.phishme.com http://intrepidusgroup.com • This slide intentionally left blank. • Video clips Who Am I? • ASE certified mechanic? – Nope • CISSP – Not anymore, I spent my dues on  something useful, car parts. • I’m just a geek ...
pdf
记⼀次渗透测试中的攻击路径,本⽂只对从zabbix权限到拿下内⽹jumpserver堡垒机权限的过 程进⾏介绍。 0x01 获取zabbix权限 内⽹扫描,发现了⼀个⾃研的资产监控平台,通过Django进⾏开发,且开了debug模式,在报 错的信息中,成功泄露了zabbix服务器和账号密码。 通过该zabbix账号密码,成功进⼊到zabbix的后台,且当前⽤户为管理员权限。 对zabbix系统上监控的主机进⾏观察,发现jumpserver服务器在zabbix监控主机中。想到wfox 关于zabbix权限利⽤的⽂章http://noahblog.360.cn/zabbixgong-ji-mian-wa-jue-yu-li- yong/...
pdf
!"#$%&'() 360高级攻防-灵腾实验室 – 赖志活 Wfox 0 !"#$%&'( 1 针对外网开放资产进行探测,定位远程办公类系统并进行攻击,以达到突破网络边界、窃取数 据的目的。 • VPN系统(深信服VPN、思科VPN) • 办公云桌面(Vmware Horizon、Citrix、深信服VDI) • 办公OA(泛微、致远、蓝凌、通达) • 邮件系统(Exchange、coremail、亿邮) !"#$%&'( – )*+'( 2 1. 收集用户名、密码规律 1) 用户名规律 • 常见用户名、姓名全拼zhangsan、名字缩写wangsm、姓名倒序sanzhang、工号01111 • 已有通讯录、top500、top10...
pdf