text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
这今天绕了很多 waf,很多人想看,其实很简单。
只测试了 SQL 注入和文件上传,其他的变化都太小了,比如 SSRF,一般拦的都很死,比如
XXE,UTF-7/UTF-16 试一下就行了。
文件上传的绕过方式,安全客有篇文章已经介绍的非常非常详细了。
https://www.anquanke.com/post/id/241265
SQL 注入的绕过方式呢,你们可以看我写的几个弱点。
先看 WAF 是否完全拦截了/**/,/*!*/,--,%23 这四种注释,一般只会拦截前两个。然后
在注释中塞足够多的脏数据。一部分 WAF 很吃这一招。
然后可以试一试分块传输,一部分 WAF 不拦截这个。
再然后,WAF 主要拦截 ... | pdf |
25 Years of Program Analysis
Zardus
Program Analysis
Specification
What should hold about
the program?
Technique
How will we achieve the
goal?
Goal
What do we want to
achieve regarding the
specification?
Dawn of Computing
1830s
1842
1842
1947
Manual Program Analysis
1949
Alan Turing.
"Checking a large routine."
EDS... | pdf |
MesaTEE SGX: Redefining AI and
Big Data Analysis with Intel SGX
Yu Ding
Staff Security Scientist, Baidu X-Lab
May-29-2019
About me
• https://dingelish.com
• https://github.com/dingelish
• https://github.com/baidu/rust-sgx-sdk
•
Security Scientist @Baidu X-Lab
•
Rust Fans
•
Ph.D on Exploit/Mitigation
•
Works on Rust-SG... | pdf |
Bug Bounty 獎金獵人甘苦談
那些年我回報過的漏洞
orange@chroot.org
#Orange Tsai
#CHROOT #DEVCORE
#電競選手 #CTFer
#Web
#汪
My RCE Checklists
√ Facebook
√ Apple
√ Yahoo
√ Uber
? Google
什麼是 Bug Bounty Program ?
• 在官方所提供的規則及範圍下, 讓獨立的研究人員可自由尋找系
統漏洞, 並提供對等的獎勵
小禮物
獎金
名譽(Hall of Fame)
Bug Bounty 好處?
防止漏洞流入地下市場
架構大難顧及網路邊界
企業對外形象宣傳
改善社會不良風氣
How do y... | pdf |
Breaking Parser Logic!
Take Your Path Normalization Off and Pop 0days Out
Orange Tsai
Orange Tsai
• Security researcher at DEVCORE
• Hacks in Taiwan member
orange_8361
Agenda
1.
Introduce the difficulty
2. In-depthly review existing implementations
3. New multi-layered architecture attack surface
Normalize
To make stan... | pdf |
#BHUSA @BlackHatEvents
The Battle Against the Billion-Scale Internet
Underground Industry: Advertising Fraud Detection
and Defense
Zheng Huang | Chief Architect of Security Department, Baidu
Shupeng Gao | Senior Security Researcher, Baidu
Yakun Zhang | Senior Security Researcher, Baidu
Hai Yang | Senior Security Res... | pdf |
1
Java注⼊ShellCode踩坑
前⾔
三种⽅法简介
JNI
JNA
JVM
踩坑
放弃JNA
JVM的坑
正确操作
测试
实现代码
最后
@yzddmr6
@zsxq: websafe
在做As-Exploits的Java Shellcode加载模块的时候遇到了很多的坑,在这⾥跟⼤家分享⼀下。
宽字节的这篇⽂章写的很好,java执⾏shellcode的⼏种⽅法,主要也是根据这篇⽂章来实现的。这⾥简单
总结⼀下
由于Java屏蔽了很多底层的细节,所以没办法直接⽤原⽣Java去注⼊shellcode。但是Java提供了加载
C++动态链接库的⽅法,所以我们可以把加载Shellcode的代码写在dll⾥,然后⽤Java去调⽤dll... | pdf |
A FAILURE OF IMAGINATION:
Kwikset Smartkey® and Insecurity
Engineering
ONE OF THE MOST SECURE and
INSECURE LOCKS IN AMERICA
KWIKSET SMARTKEY
#1: IS SMARTKEY SECURE?
Brian: 06/25/2013 1105 A.M.
#2: IS SMARTKEY SECURE?
Satima: 06/24/2013 4:26 P.M.
#3: IS SMARTKEY SECURE?
Raymond: 06/25/2013 3:58 P.M.
KWIKSET LOCKS
A Sp... | pdf |
Sources
of EMR
Sources
of EMR
Human
Brain
Power
Lines
(50,60Hz)
Induction
Heating
Cell
phone
Micro-
wave
oven
Radar
Light
bulb
People
Radio
tower
X-Ray
machines
Radioac-
tive
elements
Sizes of
EMR
Sizes of
EMR
Earth
12,756
km
Football
Field
100m
House
12m
Football
308mm
People
1.8m
Honey
Bee
1.2cm
Single
Cell
10µm
Wate... | pdf |
Defcon Comedy Jam 2
The FAIL Strikes Back
We are:
David Mortman aka Arthur
Rich Mogull aka Crash
Chris Hoff aka FAIL
Robert "RSnake" Hansen aka RSnake
Larry Pesce aka HaxorTheMatrix
David Maynor aka Goat? What Goat? | pdf |
#BHUSA @BlackHatEvents
eBPF ELFs JMPing Through the
Windows
Richard Johnson
Trellix
#BHUSA @BlackHatEvents
Information Classification: General
Whoami
Richard Johnson
Senior Principal Security Researcher, Trellix
Vulnerability Research & Reverse Engineering
Owner, Fuzzing IO
Advanced Fuzzing and Crash Analysis Training... | pdf |
1
TEMPEST radio station
Paz Hameiri
https://il.linkedin.com/in/paz-hameiri-251b11143
Abstract
TEMPEST is a cyber security term that refers to the use of electromagnetic energy emissions
generated by electronic devices to leak data out of a target device. The attacks may be passive
(where the attacker receives th... | pdf |
Mobile Hacker Spaces
Thomas Wilhelm
About the Talk
• Concept behind Hacker Spaces
• (Dis)Advantages of Mobile Hacker
Spaces
• Real-World Example
About the Talker
• Thomas Wilhelm
–Contributing Author:
About the Talker
• Thomas Wilhelm
– Certifications: ISSMP CISSP SCSECA…
– Work:
• Fortune 50 Company
– Penetration Tes... | pdf |
了解完基本流程后,为了更加了解TP框架,还需要了解下数据的传递。主要涉及的类为Db
Query Connection等
我们借助一句原生查询来了解数据库传递的过程,在index Controller中写入这样一句
Db::query("select * from think_user where status=1");
当我第一次去Db类中看时,没有找到query方法,只找到了一大段注释
这时我们可以下断点来分析
首先我们进入了Db类的__callStatic方法,当一个控制器调用了不存在的方法时,这个魔术
方法就会被调用
里面调用了call_user_func_array方法 可以很明显的看到,第一个参数是一个数组,那么也
就是... | pdf |
PDA insecurity
Insecurity in a mobile world
Bryan Glancey
Agenda
• PocketPC Overview
– Registry
– Synchronization
– HP 5455 Biometric
issue
• Palm Overview
• General Issues
• Conclusion
PocketPC
• ActiveSync
–USB/Serial
–BlueTooth
–TCP/IP
PocketPC Toolkit
• Registry Editors
– www.pocketpcdn.com/articles/registry.html
... | pdf |
1
Your Bank’s Digital Side Door
@sdanndev
2
“Because that’s where the money is.”
Willie Sutton, Bank Robber
3
Why does my bank website
require my 2-factor token, but
pulling my transactions into
Quicken does not?
4
Personal Financial Management
PFM
5
Personal Financial Management (PFM)
7
8
9
10
11
12
13
Quicken/Quic... | pdf |
nat smash
0x00
get
wendell
0x01 nf_conntrack_ftp
nf_conntrack_ftp
ftp
1. ESTABLISHED
2.
3. TCP PAYLOAD
4. PORTEPRT
5.
6. 21
1. ESTABLISHED
2. tcp payload\n
3.
4. 21
\n
helpfind_pattern
seq\nseqseq
flagfind_pattern
seqmsstcp
payloadseq
tcp
seqseq1lenpayloadack
nf_contrack_ftpseqlen(payload)seq1len
payloadseq
0x03... | pdf |
Asymmetric Defense
Asymmetric Defense
How to Fight Off the NSA Red Team with Five People or
Less
Efstratios L. Gavas
Department of Marine Transportation
United States Merchant Marine Academy
DEFCON 17
Asymmetric Defense
Outline
Introduction
What is the Point?
About the USMMA
About the CDX
Network Design
Overview of Net... | pdf |
Dark Data
Svea Eckert – Andreas Dewes
Who we are
Svea Eckert
Journalist NDR/ ARD
@sveckert
@japh44
Andreas Dewes
(data) scientist
Why we are here
“US Senate voted to eliminate broadband privacy rules
that would have required ISPs to get consumers' explicit
consent before selling or sharing Web browsing data (...)“
3... | pdf |
副本 Apache Solr 组件安全概览
⼀、组件概述
1.关键词
企业级全⽂检索服务器、基于Lucene
2.⼀些名词
(1) 数据
结构化数据,与非结构化数据
结构化数据: 用表、字段表示的数据 数据库适合结构化数据的精确查询
半结构化数据: xml 、html
非结构化数据: 文本、文档、图片、音频、视频等
(2) Document
被索引的对象,索引、搜索的基本单元,⼀个Document由多个字段Field构成
Field
字段名name
字段值value
字段类型type FieldType(这个fieldtype也有很多属性主要两个是name 以及 class ⽤来存放该
类型值的类名),Field中包含分析... | pdf |
Laboratory for Dependable Distributed Systems • RWTH Aachen University
NoSEBrEaK -
Defeating Honeynets
Maximillian Dornseif, Thorsten Holz, Christian N. Klein
at
Laboratory for Dependable Distributed Systems • RWTH Aachen University
Who and Why
Laboratory for Dependable Distributed Systems • RWTH Aachen University
Ho... | pdf |
WHITE PAPER
© 2015 IOActive, Inc. All Rights Reserved
Abusing XSLT for Practical Attacks
White Paper
Fernando Arnaboldi
IOActive Senior Security Consultant
Abstract
Over the years, XML has been a rich target for attackers due to flaws in its design as well as
implementations. It is a tempting target because it ... | pdf |
2022/9/14 上午1:41
开发shiro蜜罐遇到的⼀些问题 - depy
https://rce.ink/index/view/406.go
1/9
depy
It is a long and beautiful life.
首页
关于
友链
开发shiro蜜罐遇到的一些问题
2022年09月14日 / 网络安全
前情概要
我曾经写过一篇文章是帮助freebuf实现php网站拥有shiro的:https://rce.ink/i
ndex/view/366.go
之前的蜜罐一直写到可以根据指定key让工具实现逼真的爆破效果,如图所示:
^
2022/9/14 上午1:41
开发shiro蜜罐遇到的⼀些问题 - depy
h... | pdf |
HCTF2016-Writeup
--by Nu1L
目 录
HCTF2016-Writeup.....................................................................................................1
Level1............................................................................................................................2
1.
Reverse-Web........................... | pdf |
©2016 Check Point Software Technologies Ltd.
PHP7 Memory Internals
for Security Researchers
Yannay Livneh | Security Researcher
TEACHING THE NEW
DOG OLD TRICKS
About Me
• Yannay Livneh
• Security Researcher @ CheckPoint
• Play w/
– Networks
– Embedded
– Linux
– Memory Corruptions
– and stuff
.
AGENDA ... | pdf |
RealWorld CTF WriteUp By Nu1L
RealWorld CTF WriteUp By Nu1L
Pwn
QLaaS
Who Moved My Block
SVME
Crypto
Treasure Hunter
WEB
RWDN
Hack into Skynet
Pwn
QLaaS
可以修改/proc/self/mem
#include <sys/types.h>
#include <dirent.h>
#include <sys/types.h>
#include<stdio.h>
#include<fcntl.h>
#include<unistd.h>
typedef unsigned lon... | pdf |
POC分析:
分析POC可得到以下信息:
1. 漏洞点由Cookie触发,Cookie值为 keys
2. Payload像是一个if标签,猜测可能为模板注入
3. 请求参数为 ?location=search,猜测可能是个路由
漏洞分析
复现环境为:zzzphp v2.0.3
从 /index.php 找起,跟踪到 inc/zzz_client.php 。搜索 location 关键字。接着找到这么一段代
码:
查看模板文件 /template/pc/cn2016/html/search.html 。发现了Poc中的 keys
curl -b 'keys={if:=`curl http://attacker.tld/poc.s... | pdf |
EDS: Exploitation Detection System
By Amr Thabet
Q-CERT
About The Author
v Amr Thabet (@Amr_Thabet)
v Malware Researcher at Q-CERT
v The Author of:
§ Security Research and Development
Framework (SRDF)
§ Pokas x86 Emulator
v Wrote a Malware Analysis Paper for
Stuxnet
Company Logo
Introduction
v N... | pdf |
It’s assembler,
Jim, but not as
we know it!
Morgan Gangwere
DEF CON 26
Dedication
Never forget the
shoulders you stand on.
Thanks, Dad
whoami
Hoopy Frood
Been fiddling with Linux SOCs since I
fiddled with an old TS-7200
EmbeddedARM board
I’ve used ARM for a lot of services:
IRC, web hosting, etc.
I’ve built Cyano... | pdf |
1 . 1
One Gadget RCE
david942j @ HITCON CMT 2017
2 . 1
Before Start
2 . 2
Q:
1.
2.
3.
2 . 3
3 . 1
Who Am I
david942j
CTF
4 . 1
Introduction
4 . 2
Hacker
4 . 3
4 . 4
Binary Services (PE / ELF)
PE - Windows
ELF - Linux
Web Browser
OS Kernel (privilege escalation)
VM (VM escape)
CTF
4 . 5
Binary Exploitation in CTF
... | pdf |
Nir Valtman, CISSP
Blog: www.valtman.org
Twitter: @ValtmaNir
Bug Bounty Programs Evolution
2
I’m an architect
Zombies!!!
5
Defacement
6
AntiDef
OPEN SOURCE
Memory Scraper
Secure TDD
Research Bug Bounty
Programs Since 2011
Academy
Final Project
If you can’t beat them, join them!
Not cost-effective
Virtual
Environme... | pdf |
EXPLOITING URL
PARSERS: THE GOOD,
BAD, AND INCONSISTENT
By Noam Moshe and Sharon Brizinov of Claroty Team82,
and Raul Onitza-Klugman and Kirill Efimov of Snyk
claroty.com
2
Copyright © 2021 Claroty Ltd. All rights reserved
03 Introduction
03 Recent Example: Log4j allowedLdapHost bypass
03 Findings
06 URLs and ... | pdf |
访问地址直接给出了源码: http://101.32.205.189
<?php
class ip {
public $ip;
public function waf($info){
}
public function __construct() {
if(isset($_SERVER['HTTP_X_FORWARDED_FOR'])){
$this->ip = $this->waf($_SERVER['HTTP_X_FORWARDED_FOR']);
}else{
$this->ip =$_SERV... | pdf |
IDA Pro
Hex-Rays Decompiler
Simple Tricks
Hello!
aaaddress1(ADR)
1. Reverse Engineering Skills
a. Windows
b. Android
2. TDoHacker Core Member
3. Hack Bot
a. CrackShield / MapleHack
b. Tower Of Savior
c. Facebook
4. CSharp,C/C++,Assembly x86
Python,Smali,Pascal,VB.NET
Outline
➢ 動機
➢ IDA Pro Hex-Rays Decompiler是什麼
➢ 如何理... | pdf |
Submitted to DefCon16
Autoimmunity
Disorder in
Wireless LANs
By
Md Sohail Ahmad
J V R Murthy, Amit Vartak
AirTight Networks
Submitted to DefCon16
Disclaimer & About Us
We are no medical doctors – our only
competency is coffee drinking. The last year
we brought to you ‘Café Latte with free
topping of cracked WEP’.... | pdf |
O P E N S O U R C E FA I R Y D U S T
JOHN MENERICK
S E C U R I T Y
D R A G O N @
N E T S U I T E
T H E V I E W S A N D O P I N I O N S E X P R E S S E D H E R E A R E M Y O W N O N LY A N D I N N O WAY R E P R E S E N T T H E V I E W S ,
P O S I T I O N S O R O P I N I O N S - E X P R E S ... | pdf |
Using GPS Spoofing to Control Time
Dave/Karit (@nzkarit) – ZX Security
Defcon 2017
www.zxsecurity.co.nz
@nzkarit
Dave, Karit, @nzkarit
Security Consultant at ZX Security in
Wellington, NZ
Enjoy radio stuff
Pick Locks and other physical stuff at
Locksport
whoami
2
www.zxsecurity.co.nz
@nzkarit
3
www.zxsecurity.co.nz
@... | pdf |
1
记次审计时遇到的加密分区解密
前⾔
⽂件系统分析
⽂件系统解密
最近拿到了⼀个商业产品的qcow2 镜像 准备试⼀试代码审计
⾸先⽤qemu-img 转换成vmdk 镜像
转换遇到错误 ⽹上搜索只有⼀个其他项⽬的issue 没有解决⽅案
阅读qemu源代码 发现是在2017-02-15版本引⼊了这个特性
https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg03173.html
发现可以使⽤2016年的旧版qemu完成转换
https://qemu.weilnetz.de/w64/2016/
转换完成使⽤vm启动 准备进⼊grub修改root密码
发... | pdf |
PLEAD
The
Phantom
of
routers
Who
we
are
• Charles
&
Zha0
• APT
Research
@
Team
T5
• Malware
analysis,
Cyber
Threat
Tracking
Agenda
• IntroducGon
• PLEAD
began
• PLEAD
malware
analysis
• PLEAD
lateral
movement
• GD
Rat:
Hiding
behind
... | pdf |
BeaconEye的技术原理
0x00 前言
刚开始,群里小伙伴讨论BeaconEye的时候,我不以为然,无外乎就是内存扫描嘛,对抗手法一大堆,
分分钟给他搞搞失效。
最后呢,在我仔细研究之后,以后再也不敢装逼了。
0x01 前置知识
由于我二进制也是个菜逼,搞清楚BeaconEye需要掌握一些前置知识:
windows内存管理API
通过这个图我们知道,我们经常使用malloc等c库函数实际操作的是堆内存,而堆内存来源于虚拟内存。
这儿重点就在于堆内存的管理。在windows种堆内存是共享资源,是被所有线程共享的资源,因此不管
是主线程还是子线程,使用malloc等函数分配的内存都是在堆内存里面划出的一块儿区域,这个区域还
能被多... | pdf |
Aug 2017
Senior Malware Scientist ,Trend Micro
spark@trendmicro.com
HITCON
Source: https://ransomwaretracker.abuse.ch/tracker/cerber/
booster[0]:
0:[f1<127.5] yes=1,no=2,missing=1
1:[f7<28.5] yes=3,no=4,missing=3
3:[f5<30.95] yes=7,no=8,missing=7
7:[f0<5.5] yes=15,no=16,missing=15
15:leaf=-1.89091
16:leaf=-0.5
8:[f6<0.... | pdf |
Hack Mobile Games For Fun
HITCON 2015
ChienWei Hung (winest)
2
四年前被騙入趨勢當研替
遊戲資歷22年
• 永遠的β測試玩家
你哪位?
3
四年前被騙入趨勢當研替至今
遊戲資歷22年
• 永遠的β測試玩家
4
來聊聊手機遊戲破解
5
2014年營收
6
Rank
1
2
3
4
5
6
7
8
9
10
from App Annie
Rank
10
9
8
7
6
5
4
3
2
1
iOS App Store
Taiwan
Russia
France
Germany
Canada
Australia
United Kingdom
China
Japan
Unit... | pdf |
Approved for Public Release, Distribution Unlimited
1
Approved for Public Release, Distribution Unlimited
2
Approved for Public Release, Distribution Unlimited
3
Approved for Public Release, Distribution Unlimited
4
Approved for Public Release, Distribution Unlimited
5
Approved for Public Release, Distribution Unlimite... | pdf |
CTF培训—PWN(漏洞挖掘与利用)
报告人: 360政企安服-胡晓梦
时间:2019年9月X日
CONTENT
团队介绍和自我介绍
1
PWN介绍
2
PWN基础入门
3
PWN实例讲解与演示
4
PWN解题总结
5
团队介绍和自我介绍
第一部分
团队介绍&自我介绍
待完善优化
讲在前面的话
师傅领进门,修行在个人。
虽然大部分培训只是入门的引领,但这里我们传授的是核心知识体系!
PWN介绍
第二部分
CTF-PWN介绍
Ø 什么是PWN?
PWN 题目主要考察二进制漏洞的挖掘和利用,需要对计算机操作系统底层有一
定的了解。在 CTF 竞赛中,PWN 题目主要出现在 Linux 平台上。
Ø PWN题目形式?
•
一个ip地址和端... | pdf |
DefCon 15 , August 3-5, 2007, Las Vegas, NV, USA
Fighting
Fighting malware
malware on your own
on your own
Vitaliy Kamlyuk
Senior Virus Analyst
Kaspersky Lab
Vitaly.Kamluk@kaspersky.com
DefCon 15 , August 3-5, 2007, Las Vegas, NV, USA
Why fight malware on your own?
Why fight malware on your own?
5 reasons:
1. Touch 10... | pdf |
Separating Bots from
Humans
Ryan Mitchell
@kludgist
DEF CON 23 August 8th, 2015
Who am I?
● Software Engineer
● Author of two books:
○ Web Scraping with Python (O’Reilly, 2015)
○ Instant Web Scraping with Java (Packt, 2013)
● Engineering grad from Olin College
● Masters student at Harvard University School of
Extensi... | pdf |
2015.11 by phithon
被Git打破的
企業安全大門
Who am I
• phith0n
• 乌云核⼼心⽩白帽⼦子/XDSEC成员
• 从事Web安全/运维安全研究
What is GIT
刪除
增加
增加
phithon@fake-demo:~$ git add .
phithon@fake-demo:~$ git commit
Finish
Git是⼀一个分布式版本控制软件
在开发中运⽤用git可以⽅方便地进⾏行团队协作、敏捷开发
GIT与信息安全
• Github造成的企业敏感信息泄露
• web⺫⽬目录/.git/访问造成的源码泄露
• 内⺴⽹网Git未授权访问造成敏感信息泄露
• Github造成... | pdf |
An Introduction to Backdooring
Operating Systems
Lance Buttars Aka Nemus
DC801
www.dc801.org
www.introtobackdoors.com - Updated Slides
Special Thanks to Natedmac , Metacortex, Grifter,
D3c4f and everyone at DC801
Disclaimer
• The information provided in this presentation is to be
used for educational purposes only... | pdf |
Trust Transience:
Post Intrusion SSH Hijacking
July 2k5 Blackhat USA 05 &
Defcon 0x0D
So you're a sneaky Blackhat...
The Target
Recon
● Mail headers say MUA
is PINE
● .sig says Debian Sarge,
kernel 2.4.22
● Web logs suggest egress
HTTPS traffic doesn't go
via a proxy (source
address is their NAT
router, not HT... | pdf |
PowerPreter:
Post Exploitation like a boss
Nikhil Mittal
Get-Host
• Hacker who goes by the handle SamratAshok
• Twitter - @nikhil_mitt
• Blog –
http://labofapenetrationtester.blogspot.com
• Creator of Kautilya and Nishang
• Interested in Offensive Information Security, new
attack vectors and methodologies to... | pdf |
Breaking Bluetooth
By Being Bored
JP Dunning
DefCon 2010
© Shadow Cave LLC
JP Dunning
Graduate Student:
Computer Science, Virginia Tech
Research Focus:
Wireless and Portable Security
Website:
www.hackfromacave.com
© Shadow Cave LLC
© Shadow Cave LLC
Bluetooth
● IEEE 802.15.1
● Low Power / Short Range
● Ad-Hoc (Picone... | pdf |
Defcon Comedy Jam 3
3D Or Not 3D?
We are:
David Mortman aka Arthur
Rich Mogull aka Crash
Chris Hoff aka Hoff
Larry Pesce aka HaxorTheMatrix
David Maynor aka No Pie But Apple Pie | pdf |
Starting the Avalanche:
Application DoS In Microservice Architectures
Scott Behrens
Jeremy Heffner
Jeremy Heffner
● Senior Security Software
Engineer
● Developing and securing
things for 20+ years
Introductions
Scott Behrens
● Netflix senior application
security engineer
● Breaking and building for
8+ years
● Cont... | pdf |
No Key? No PIN? No Combo?
No Problem!
P0wning ATMs For Fun and Profit
Roy Davis
roydavis@roydavis.org
@hack_all_things
/in/roy-davis
Why ATMs?
https://www.youtube.com/watch?v=ZO956U10Zlc
https://www.statista.com/statistics/741708/number-of-atms-worldwide/
https://bit.ly/3ySNvey
Better
World
Through
Hacking
Barnaby... | pdf |
微信⼩程序开发总结 - 1
微信⼩程序开发总结
背景是⼩程序《⽺了个⽺》⼤⽕,依靠⼴告就能被动赚钱。⽬前各⼤头部⼚商阿⾥、百
度、头条也都推出了⾃⼰的⼩程序。
它们之间应该都⼤同⼩异,所以我也花⼀个星期研究了下⼩程序开发,做了⼀个微信⼩
程序 《画⼏个画》。这篇是⼩程序开发总结,开发过程中有些坑还是要记录⼀下的,最
后也说⼀下我的⼩程序的总结。
开发
有个 uni-app,说是⼀套代码可以编译到 14 个平台。说明⼩程序间的规则都⼤同⼩
异。我还是选择按照微信官⽅的⽂档开发。
官⽅⽂档:
⼩程序的主要开发语⾔是 JavaScript,类似 vue 和 react 的写法,之前有过前端的开发
经历,学起来也⽐较块。
开发者⼯具
第⼀步... | pdf |
浅谈Fastjson绕waf
写在前⾯
关键时期换个⼜味,虽然是炒陈饭,但个⼈认为有⼲货的慢慢看,从最简单到⼀些个⼈认
为⽐较骚的,本⼈垃圾代码狗,没有实战经验,因⽽更多是从fastjson的词法解析部分构造混
淆
初级篇
添加空⽩字符
在 com.alibaba.fastjson.parser.JSONLexerBase#skipWhitespace
public final void skipWhitespace() {
while(true) {
while(true) {
if (this.ch <= '/') {
... | pdf |
MacOS Big)Sur内核漏洞挖掘和利用
Bio
0 1
Twitter(@peterpan980927)
阿里安全潘多拉实验室
高级安全工程师
iOS/macOS 安全研究&开发
KCon 2019 PPT 放映员&乐透操作手
Agenda
0 2
1.
Backgrounds
2.
Some case studies
3.
Mitigations overview & new features
4.
Attack macOS Big Sur
5.
Summary & Credit
Backgrounds
AppleOS Kernel
0 3
XNU: X is not Unix(Hybrid Kernel)
1.
Mach-... | pdf |
我是如R挖各SRC漏洞的
目 录
一、S为外行对信息安全的理解和看法
二、为什么会喜欢挖漏洞
三、对此事定位、布局
四、了解游戏规则
C、了解自己想做的和能做的
目 录
六、情报收集,从远处看细节
七、选择容易忽视的问题,避开高手
八、了解(开发、实施、安全 人员的细微关系和情绪
九、一个有意思的漏洞
p、一个有意义的漏洞
一、S为外行对信息安全的理解和看法
由于之前不知道什么是信息安全,一开始的想法
就是:信息安全=黑客 ,然后就是下面这样的。
二、为什么喜欢挖漏洞
如果说追女朋友是h(m太旺盛,那么挖漏洞可
能就是因为女朋友不在家。。。
... | pdf |
intigriti-0422-XSS-Challenge-Write-up
1
intigriti-0422-XSS-Challenge-
Write-up
前⾔
intigriti新出的challenge,猜到是原型链污染的题,但是许多点(因为菜)没有反应过
来,同时学到了⼀点新知识,应各位师傅要求分享⼀下。
不了解JavaScript原型链污染攻击的,可以先去P师傅博客预习⼀下。
https://www.leavesongs.com/PENETRATION/javascript-prototype-pollution-attack.html
原题地址
https://challenge-0422.intigriti.io/
解题... | pdf |
Presenter
Tony Flick
Principal, FYRM Associates
Over 6 Years in Information Assurance
Many DEFCONs / First presentation
Agenda
What is the smart grid?
What makes up the smart grid?
Known problems
Security initiatives
Timeline
History repeating
Recommendations
What is the Smart Grid?
Current infrastructure
Future infras... | pdf |
Robot Shark Laser!
What Hackerspaces do
What is a Hackerspace?
• Physical Forum
• Collaborative Projects
• Community: Friends, Hackers,
Countrygeeks!
• DIY exchange skills, info
• See: CCC, Makezine, DIY, dorkbot, HackLab
Panel Introduction
Noid
The Black Lodge
Seattle, WA. US
Leigh Honeywell
Hacklab.TO
Toronto, Canad... | pdf |
S-SDL企业应用实践
关于漏洞、风险、成本
1. 为什么软件总会有漏洞?漏洞是怎么引入的?
◦ 业务需求引入
◦ 产品设计引入
◦ 编码引入
2. 如何应对风险
◦ 缓解风险
◦ 转移风险
◦ 接受风险
3. 安全成本
◦ 对于企业来说,安全投入多少是合适的?
什么是S-SDL
不是一种安全技术,而是E2E的安全工程能力
也是一种Security Built In的解决方案
目标:交付更安全的系统
S-SDL架构
安全策略/安全治理
组
织
架
构
培
训
体
系
研
发
流
程
度
量
体
系
工
具
平
台
安全标准、规范、过程、知识库
人
工具
方法
质量
管理
安全是质量属性的一部分,将安全融入到质量管理是构建S-SDL的... | pdf |
KNOCK? KNOCK? WHOIS THERE?
APT ATTRIBUTION AND DNS PROFILING
Frankie Li
ranerwang@gmail.com
Twitter: @espionageware
•
APT Attribution: Who wrote these codes?
•
Tactics, Techniques and Procedures (TTP)
•
Behavior of APT adversary
•
HUMINT extracted from DNS
•
Gather intelligence from open source (aka OSINT... | pdf |
绿盟科技 NSFOCUS
WASM双刃剑—机制剖析与逆向
演讲人:赵光远
2 0 1 8
PART 01
WASM
目录
CONTENTS
PART 02
Compile
PART 03
挖矿实例
PART 04
探索方向
01
02
03
04
PART
01
WASM
• 前端编程无法解决的问题
• 传统的js脚本运行缓慢
• 在浏览器中无法实现复杂功能(效率不足,影响体验)
• 很低的渲染能力,却拥有CPU、GPU极高的占用率
• 应用场景
• 浏览器页面3D环境渲染
• 数据压缩
• 图像/音频/视频的处理
• 挖矿(本身就是计算的一种)
• ….
• 支持度
• WebAssembly(WASM)
• 基于栈的二进制格式... | pdf |
1
They’re Hacking Our Clients!
Introducing Free Client-side Intrusion Prevention
Jay Beale
Creator - Bastille UNIX
Co-Founder - Intelguardians, Inc.
Copyright 2008 Jay Beale
Intelguardians, Inc
2
Copyright 2008 Jay Beale
Intelguardians, Inc.
Penetration Testing
I work for Intelguardians, a security consulting firm. I... | pdf |
读读 fingerprintx ,⼀个端⼝指纹识别⼯具
GitHub:https://github.com/praetorian-inc/fingerprintx
fingerprintx是⼀个类似于httpx的实⽤程序,它还⽀持 RDP、SSH、MySQL、PostgreSQL、Kafka 等指纹识
别服务。fingerprintx可以与Naabu等端⼝扫描仪⼀起使⽤,对端⼝扫描期间识别的⼀组端⼝进⾏指纹识别。
例如,⼯程师可能希望扫描 IP 范围,然后快速识别在所有发现的端⼝上运⾏的服务。
输⼊ip+端⼝,就能输出端⼝服务指纹相关的信息
⽀持的协议:
SERVICE
TRANSPORT
SERVICE
TRANSPORT
HTT... | pdf |
Outsmarting the Smart City
DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUNS
MODERN CITIES
&
2
Page
Researcher Bios
• Daniel Crowley (@dan_crowley)
• Research Baron at IBM X-Force Red
• Pen tester since 2004
• Locksport enthusiast and past competition winner
• Actually holds the title of Baron (in Sealand)
3
Page
Res... | pdf |
SCADA & PLCs in
Correctional Facilities:
The Nightmare Before Christmas
John Strauchs
Tiffany Rad
Teague Newman
Defcon 19
Analyze SCADA systems and PLC
vulnerabilities in correctional and
government secured facilities
Discuss modern prison design
Theorize possible attack vectors and
routes of ma... | pdf |
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Getting the goods with smbexec
Eric Milam – Brav0hax
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Righ... | pdf |
CANSPY: a Platform for Auditing CAN Devices
Arnaud Lebrun
Airbus Defence and Space
arnaud.lebrun@airbus.com
Jonathan-Christofer Demay
Airbus Defence and Space
jcdemay@airbus.com
ABSTRACT
In the past few years, several tools have been released allowing hobbyists to connect to CAN buses found in cars. This is wel... | pdf |
●
●
●
●
😮
😉
😊
💥
System.Web.UI.Control.OpenFile
System.Web.UI.WebControls.MailDefinition.CreateMailMessage
System.Web.UI.WebControls.LoginUtil.CreateMailMessage
System.Web.UI.WebControls.LoginUtil.SendPasswordMail
✗
ChangePassword.PerformSuccessAction
✗
CreateUserWizard.AttemptCreateUser
✓
PasswordRecovery.AttemptSe... | pdf |
The Growth of Global Election Disinformation: The
Role and Methodology of Government-linked
Cyber Actors
Sandra Quincoses
Intelligence Analyst - Nisos
About Dr. Sandra Quincoses
Current:
●
Senior Intelligence Analyst at Nisos
●
Adjunct professor at Florida International University (FIU)-
Intelligence Fellowship Pro... | pdf |
JTAGulator
JTAGulator
Bill-of-Materials
Bill-of-Materials
Bill-of-Materials
HW B, Document 1.0, April 19, 2013
HW B, Document 1.0, April 19, 2013
HW B, Document 1.0, April 19, 2013
Build Quantity
Build Quantity 1
Item
Quantity
Reference
Manufacturer
Manuf. Part #
Distributor
Distrib. Part #
Description
Unit Price
Per B... | pdf |
駭客如何弄垮企業?
從索尼影業與南韓核電廠事件說起
gasgas@chroot.org
ziv_chang@trendmicro.com
2015.01.09
HITCON
Freetalk
索尼影業被害事件
• iThome
2014
12
05
報導
•
索尼影業(Sony
Pictures)在上周⼀一(11/24)遭到駭客⼊入侵,導致內部
網路及電腦全數停擺,除影⽚片及員⼯工資料外流,並傳出內部電腦資料
全數遭刪除。介⼊入調查的FBI隨後緊急警告美國業者應留意⼀一款可執⾏行
毀滅性網路攻擊的惡意程式,資安業者對該惡意程式研究發現,駭客
在正式展開攻擊的48⼩小時前才編... | pdf |
pin2pwn: How to Root
an Embedded Linux
Box with a Sewing
Needle
Brad Dixon - Carve Systems
DEF CON 24
• It works
• Easy
• Teachable
• Dramatic
“USEFUL NOVELTY”
• Risky
• Crude
• Perhaps redundant
Demo
Prior Art
• Significant body of work around fault injection
and glitching at the IC level for secure
process... | pdf |
The Making Of Second SQL
Injection Worm (Oracle
Edition)
Sumit Siddharth
SID@notsosecure.com
www.notsosecure.com
Defcon 17
Las Vegas –2009
2
Defcon 17, Las Vegas, July 2009
About Me:
Senior IT Security Consultant
More than 4 years of Penetration Testing
Not an Oracle Geek :(
My Blog: www.notsosecure.com
10 s... | pdf |
State Interoperable Communications:
DHS Funded Activities
Fiscal Years 2003 - 2005
May 2006
Office of Grants and Training
Preparedness Directorate
U.S. Department of Homeland Security
ii
State Interoperable Communications: DHS Funded Activities
May 2006
Table of Contents
May 2006
State Interoperable Communi... | pdf |
写了好久的文章,放出来吧
前言
注入内存马借助当前的webshell工具而言,冰蝎可以通过创建hashmap放入request、response、
session替换pagecontext来解决
HttpSession session = lastRequest.getSession();
pageContext.put("request", lastRequest);
pageContext.put("response", lastResponse);
pageContext.put("session", session);
能这么写的原因是因为冰蝎做了处理
会从传入的obj中分别取到request、response、ses... | pdf |
Radio Exploitation 101
Characterizing, Contextualizing, and Applying Wireless Attack Methods
Matt Knight
Bastille Networks
San Francisco, CA
matt@bastille.net
Marc Newlin
Bastille Networks
Atlanta, GA
marc@bastille.net
Abstract—Reverse engineering wireless physical layers has never
been easier, thanks to the commoditiz... | pdf |
TCP/IP Fundamentals for Microsoft Windows
Microsoft Corporation
Published: May 21, 2006
Updated: Jan 9, 2012
Author: Joseph Davies
Editor: Anne Taussig
Abstract
This online book is a structured, introductory approach to the basic concepts and principles of the
Transmission Control Protocol/Internet Protocol (TC... | pdf |
Extreme Privilege Escalation On Windows 8/UEFI Systems
Corey Kallenberg
Xeno Kovah
John Butterworth
Sam Cornwell
ckallenberg@mitre.org, xkovah@mitre.org
jbutterworth@mitre.org, scornwell@mitre.org
The MITRE Corporation
Approved for Public Release
Distribution Unlimited. Case Number 14-2221
Abstract
The UEFI specificatio... | pdf |
1
UPnProxyPot:
fake the funk, become a blackhat proxy,
MITM their TLS, and scrape the wire.
2
d1rt
Chad Seaman
3
Akamai SIRT
Team Lead &
Senior Engineer
4
5
First things first
INTERNET OF THINGS
What is IoT?
6
First things first
INTERNET OF THINGS
What is IoT?
TRASH
7
Your abstract sucked, what is this about?
SSDP & ... | pdf |
FORENSICS IS ONLY FOR
PRIVATE INVESTIGATORS NOW!
OR
WHO NEEDS CERTIFICATIONS?
Scott A. Moulton
Forensic Strategy Services, LLC.
www.ForensicStrategy.com
DISCLAIMER
This is NOT Animated!
Everything I state is my opinion and is
based on my research and experiences.
I am not A lawyer!
I am not YOU... | pdf |
Response Smuggling
Pwning HTTP/1.1 Connections
Agenda
-
HTTP Request Smuggling
-
Desynchronization Variants
-
Response Smuggling
-
Response Concatenation
-
Arbitrary Proxy Cache Poisoning/Deception
-
Response Scripting
HTTP Request Smuggling
HTTP Request Smuggling
-
Attack introduced in 2005 by Watchfire
-
Abuse discre... | pdf |
The$newest$version$of$this$slide$deck$and$other$
related$stuff$can$be$found$at$
http://truckhacking.github.io/
Cheap$Tools$for$Hacking$
Heavy$Truck
By#Haystack#and#Six#Volts
What$we$are$going$to$talk$about
• Heavy#Trucks:#similarities#and#differences#from#cars
• R&D#Problems:#Trucks#are#expensive#and#the#workaround
• N... | pdf |
UTILIZING POPULAR WEBSITES FOR
MALICIOUS PURPOSES USING RDI
Daniel Chechik, Anat (Fox) Davidi
Security Web Scanners
What is RDI?
3
Reflected DOM Injection
Legit
Legit
Malicious
A Recipe for Disaster
4
§ 1 simple web page
§ 1 trustworthy web utility
§ 1 script that behaves differently within a certa... | pdf |
浅析Apache Commons Jxpath命令执⾏分
析(CVE-2022-41852)
影响版本
commons-jxpath:commons-jxpath <= 1.3
⼀直到最新版本,官⽅也不打算修了
利⽤探索
测试环境:jxpath1.3
JXPath⽀持标准的XPath函数,开箱即⽤。它还⽀持 "标准 "扩展函数,这些函数基本上是通往
Java的桥梁,以及完全⾃定义的扩展函数。
简单从漏洞描述可以看出由于解析xpath表达式的问题造成的漏洞
其实这来源官⽅的⼀个feature,如图看起来它赋予了我们⼀种动态执⾏代码的能⼒
这时候我们就会想为什么会有这种奇怪的需求,毕竟从平时经验来讲xpath,作为⼀种路径语
⾔,它的功... | pdf |
1"
2"
3"
7"
8"
9"
10"
11"
12"
This"is"how"networks"show"up"in"your"network"list"when"searching"for"wifi"networks"
on"your"device."
13"
When"you"join"a"network,"this"interacCon"happens."
14"
15"
16"
KARMA"aKacks"do"exactly"the"same"thing"as"a"normal"associaCon,"it’s"just"an"evil"AP"
instead"of"the"actual"AP"doing"it."
17... | pdf |
The future is present, here and now. But to see it, you must fly. Richard Thieme
leads you to the edge of a cliff... and gives you a push.
New ways of thinking emerge during free fall. Identities diverge, shapes
change, and questions linger long after you put down this astonishing book.
Mind Games provides wings. Risk... | pdf |
云安全体系下的安全技术对抗
演讲人: 张文君(Junzz)
关于演讲者
张文君 (Junzz)
金山网络安全研究员
负责金山毒霸内核驱动和顽固病毒查杀相关开发
对严重安全事件快速分析和回应有丰富经验
曾处理过众多大陆知名流行病毒:极虎,鬼影,杀破网,淘宝大盗,极光,超级
工厂,AV 终结者等.
云对抗-手法
•断网
-切断和云端服务器的联络
-修改查询结果
•变形
-MD5变形
-膨胀自身
•Misc
-BootKit
-Bat、Vbs、Msi
客户端
批处理/脚本
修改DNS
本地路由表
IP组策略
修改TcpEntry
LSP劫持
Hook TCPIP
云端
NDIS中间层
断网
阻断交互
本地添加IP地址
修改查询
结果
M... | pdf |
This document and its content is the property of Airbus Defence and Space.
It shall not be communicated to any third party without the owner’s written consent | [Airbus Defence and Space Company name]. All rights reserved.
CANSPY
A Platform for Auditing CAN Devices
Arnaud Lebrun
Jonathan-Christofer Demay
2
Arnau... | pdf |
Securing the Tor Network
Black Hat USA 2007 Supplementary Handout
Mike Perry
This handout is not a standalone document. It is intended to be used in conjunction with the
presentation slides, and together the two documents should be sufficient to serve as a comprehensive
artifact of the presentation. The sp... | pdf |
whoami
Maggie Jauregui
@magsjauregui
Ideas/research
my own…
Story time!
Supply Acquisition
Circuit Interrupts around the house
≠ Purposes
GFCI: Intends to
prevent Electric Shock
AFCI: Intends to
prevent fires
Code Requirements
GFCI’s
•
Bathrooms/Indoor wet
locations
•
Garages/storage areas/non
habi... | pdf |
Backdooring the
Front Door
About me
●
Software Engineer by trade
●
Hacker by passion
●
Lock picker for fun
●
The best puzzles are not meant to be solved
●
All opinions are my own, and may not reflect those of my past, present, or
future employers
●
Twitter: @jmaxxz
Internet of things
August smart lock
August's market... | pdf |
From
Raxacoricofallapatorius
With Love
Case Studies in Insider Threat
AGENDA
•
Introduction & Curriculum Vitae
•
History & Current Events
•
Definitions
•
Case Studies
•
Current Research
•
Sources
FAMOUS
(Infamous?)
INSIDER
THREATS
Cost to pay Insider Dr. Ten Hong Lee
to turn over highly sensitive and... | pdf |
本书由Meji制作,于广州,2002年11月.
注意,本书的一切所有权及版权归译者,著者及中国电力出版社所有,一切由本电子版引发之民事刑事纠纷与本人
无关.本电子书的制作纯粹处于传播知识之目的,禁止将本电子书用作盈利之目的,若有恣意妄为者后果自负.
PDF 文件以 "FinePrint pdfFactory Pro" 试用版创建 http://www.pdffactory.com | pdf |
Machine Duping
Pwning Deep Learning Systems
CLARENCE CHIO
MLHACKER
@cchio
adapted from
Dave Conway
HACKING
SKILLS
MATH & STATS
SECURITY
RESEARCHER
HAX0R
DATA
SCIENTIST
DOING IT
ImageNet
Google Inc.
Google DeepMind
UMass, Facial Recognition
Nvidia DRIVE
Nvidia
Invincea Malware Detection System
Deep Learning
why ... | pdf |
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
GoPro or GTFO
A Tale of Reversing an Embedded System
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Righ... | pdf |
@Y4tacker
Java⽂件上传⼤杀器-绕waf(针对commons-
fileupload组件)
来个中⼆的标题,哈哈哈,灵感来源于昨晚赛博群有个师傅@我是killer发了篇新⽂章,在那
篇⽂章当中提到了在 filename="1.jsp" 的filename字符左右可以加上⼀些空⽩字符 %20
%09 %0a %0b %0c %0d %1c %1d %1e %1f ,⽐如 %20filename%0a="1.jsp"(直接⽤
url编码为了区别) 这样导致waf匹配不到我们上传⽂件 名,⽽我们上传依然可以解析,我对
次进⾏了更深⼊的研究,也是对师傅⽂章对⼀次补充,下⾯为了衔接还是先梳理⼀遍,看过
赛博群的师傅可以先跳过前⾯... | pdf |
最近有一些代码审计需要,研究了一下自动化审计工具
考虑了一些备选工具
1. Kunlun-M
LoRexxar大佬的审计工具,文档似乎比较老旧,学习成本比较高,试用了一下就放着了
2. CodeQL
GitHub搞得审计工具,QL逐渐流行起来,很多师傅写过文章
3. Semgrep
很早之前看过介绍文章,简单的规则编写让我印象非常深刻
刚好有需求,决定研究学习一下Semgrep
官方提供了非常棒的教程,强烈推荐学习一下 https://semgrep.dev/learn
本文是在学习和尝试实践后,个人的一些体验分享(基于 Semgrep 0.88.0 )
ltdr
可以学习,暂时不推荐使用,但未来可期 跳到总结部分
像写代码一样写... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.