text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
红蓝攻防:构建实战化网络安全防御体系
奇安信安服团队 著
ISBN:978-7-111-70640-3
本书由机械工业出版社华章分社授权北京世纪卓越信息技术有限公司
在全球范围内制作与发行。
版权所有,侵权必究
目录
作者简介
作者名单
前言
第一部分 红蓝对抗基础
第1章 认识红蓝紫
1.1 实战攻防演练
1.1.1 为什么要进行实战攻防演练
1.1.2 实战攻防演练的发展现状
1.2 蓝队
1.2.1 什么是蓝队
1.2.2 蓝队演变趋势
1.3 红队
1.3.1 什么是红队
1.3.2 红队演变趋势
1.4 紫队
1.4.1 什么是紫队
1.4.2 紫队演变趋势
1.5 实战攻防演练中暴露的薄弱环节
1.6 建立实战化的安全体... | pdf |
Porosity: A Decompiler For Blockchain-Based
Smart Contracts Bytecode
Matt Suiche
Comae Technologies
m@comae.io
July 7, 2017
Abstract
Ethereum is gaining a significant popularity in the blockchain com-
munity, mainly due to fact that it is design in a way that enables devel-
opers to write decentralized applications (Dap... | pdf |
A New Approach to Digital
Forensic Methodology
And !!BUSTED!! Case studies
David C. Smith
Samuel Petreski
Introductions
• David C. Smith, Georgetown University, & HCP
Forensic Services
– David works as the CSO for Georgetown University and a co-owner of HCP Forensic
Services providing information security programs, ... | pdf |
1
sAMAccountName欺骗分析和复现
CVE-OLON-QOOVW - Name impersonation
分析
SamAccountName
SAM-Account-Type
userAccountControl
UF_WORKSTATION_TRUST_ACCOUNT ( QLXT )
UF_SERVER_TRUST_ACCOUNT ( WNXO )
UF_NORMAL_ACCOUNT ( SNO )
UF_INTERDOMAIN_TRUST_ACCOUNT ( OLQW )
利⽤
创建机器账号
修改samAccountName
检测
总结
拓展
CVE-OLON-QOOWV - KDC bamboozling
Ke... | pdf |
HVV⾏动之某OA流量应急(⼀): https://www.anquanke.com/post/id/239865
蹭⼀波⽔哥的热度 OA还得看⽔系群友。
⼚商已发布版本补丁完成修复,建议⽤户尽快更新⾄最新版本
某凌OA任意代码执⾏
先看⼀下捕获到的POC:
/sys/common/dataxml.jsp?s_bean=sysFormulaValidate&script=
<payload>&type=int&modelName=test
漏洞出现在 /sys/common/dataxml.jsp 下。
同样类型还有⼀个 sys/common/datajson.jsp
代码:
<%@ page language="java" con... | pdf |
Rocking the pocket book:
Hacking chemical plants
for competition and
extortion
Marina Krotofil
Jason Larsen
WHITE PAPER, DEFCON 23
FURTHER CO-AUTHORS AND CONTRIBUTORS:
Alexander Isakov • Alexander Winnicki • Dieter Gollmann • Pavel Gurikov
DAMN VULNERABLE CHEMICAL PROCESS
https://github.com/satejnik/DVCP-VAC • https://g... | pdf |
Hacking Internet Kiosk’s
Paul Craig
Defcon 16 – Las Vegas
Who am I?
Paul Craig
Principal Security Consultant.
Security-Assessment.com, Auckland, NEW ZEALAND!
Application Penetration Tester.
Devoted Hacker
Shameless Alcoholic
Email: paul.craig@security-assessment.com
www: http://www.security-assessment... | pdf |
1
Humor – Your Adversaries
2
This is how your adversaries envision their DDoS attacks on your webserver:
Humor – Your Webserver
3
This is how your webserver will respond after implementing some of the
defensive strategies that this talk will cover:
Background
• Personal
– Blake currently works as a principa... | pdf |
GadgetInspector源码分析
前置废话
我不想搞介绍,就这样吧,写这个主要是⽹上的对我很晦涩,很多别⼈觉得简单的我不会,
包括⼀些汇编指令等,当然本篇也是站在很多前辈的肩膀上进⾏学习,属实是少花了很多功
夫
在分析gadgetinspector源码的时候,⼤概会对各个核⼼类讲解,并简单分析ASM部分,btw本
篇基于jdk8进⾏分析
当然既然是学习,那么我们肯定是需要跟踪代码的,⽽GI这款⼯具属实头疼,本⾝不仅引⼊
了jdk的⼀些依赖如rt.jar,在调试的过程当中也出现了gadgetinspector当中的类,属实不适合学
习时使⽤,为了解决这个问题,我
在 gadgetinspector.ClassResourceEn... | pdf |
Calculating Risk in the Era of Obscurity
Reading Between the Lines of Security Advisories
Brian Gorenc, Director of Vulnerability Research
Dustin Childs, Sr. Communications Manager
#BHUSA @BlackHatEvents
August 10-11, 2022
BRIEFINGS
#BHUSA @BlackHatEvents
Who we are and why we’re here
#BHUSA @BlackHatEvents
(Mis)... | pdf |
Black Ops 2007:
Design Reviewing The Web
Dan Kaminsky
Director of Penetration Testing
IOActive Inc.
Three Interesting Things
• Slirpie: Come to my website, be my VPN
• P0wf: Automagically discovering the
toolkits behind the web
• LudiVu: Pretty
Intro to Slirpie: Dependence And
Otherwise
• The fundamental design... | pdf |
log4jdetect 被动检测、专项被动检测脚本
安依依赖:
source file: https://gist.github.com/n00BToT/5592eb2255d62660ef1553819249c238
被动代理:https://github.com/qiyeboy/BaseProxy
在 https://github.com/fullhunt/log4j-scan 上面改:
思路:
被动扫描方式
监听流量
hook 请求方法
过滤 png、jpg 等等图片的黑名单
根据 dnslog 平台 制作 payload
根据 payload 变形 url参数、post data参数 、headers
发包
不足:
扫描... | pdf |
The Six Year Old Hacker:
The Six Year Old Hacker:
No More Script Kiddies?
No More Script Kiddies?
Kevin McCarthy
Kevin McCarthy
DefCon 13 30/Jul/2005
DefCon 13 30/Jul/2005
A Need Born of Frustration.
A Need Born of Frustration.
●● ““So what did you do at school today
So what did you do at school today””??
●● The proble... | pdf |
Ghost in the Droid
Possessing Android Applications with ParaSpectre
Jeff Dileo (chaosdata)
DEFCON 25
Hi!
I’m Jeff, and I have a problem.
I like to do bad things to worse programming languages.
*audience says*
Hiiiiiiiiiiiiiiiiii Jeff
Outline
• Introduction
• Motivation
• Original Plan
• Android Function Hooking 102
• Para... | pdf |
1
Cryptanalysis in real
life
周立平 等研究團隊
Do u understand real hackers ?
第3頁
綱目
第一章
緒論
第二章
Mifare Classic Card介紹
第三章
Mifare Classic Card現有
攻擊方式
第四章
二代卡的特性
第五章
自然人憑證
第4頁
RFID
RFID
非接觸式
Smart Card
第一章
緒論
攻擊背景
Reader
Tag
010101
YoYo卡
一卡通
i-cash
第5頁
第一章
緒論
攻擊手段
Reader
Tag
加密
解密
竊聽
第6頁
第一章
緒論
現狀
新/舊卡
改良方式
新卡
用3DES etc
舊卡
改善弱點... | pdf |
HTTP/2
The Sequel is Always Worse
James Kettle
Intro
2019-08: HTTP Desync Attacks
2020-09: The Bitbucket mystery
2021-01: Bitbucket confirmed… but unexploitable
2021-03: Research collision
2021-03: Bitbucket breakthrough cascade
- New, more powerful type of desync
- Entire issue class becoming exploitable
- Atlassian l... | pdf |
ⓒ Copyright 2016, blackfort security all rights
reserved.
Malware is In the Memory
Real Time Malware Memory Analysis System
2016 HITCON
YoungJin Sim / BLACKFORT Security / Senior Researcher
<jine@blackfortsec.com>
YoungHak Lee / BLACKFORT Security / Senior Researcher
<vstherock@blackfortsec.com>
Who we are
ⓒ Copyrigh... | pdf |
前言:
最近正在写自动化的扫描器,但是老是容易过快被ban,代理ip和分布式成本可能也比较高 或者出现
不稳定(都是假的,只是因为我是学生,没收入,买不起服务器)
那么如何优化现有的扫描过程,即不降低速度 又不给ban呢。
我把这个扫描 叫 华莱士喷射目录扫描。
原来的扫描过程:
华莱士喷射扫描
title: 目录扫描的小tips
就是把扫描顺序改变。这样子目标越多的情况下,同一个域名的扫描间隔时间越长,被ban的可能性也
越低。但是效率不会降低。
在这个基础上 再加上分布式,多线程,随机代理等方法 更加稳健。
工具
找了一圈没找到想要的这样子的工具,同时又比较喜爱dirsearch。一开始想魔改dirsearch的,但是他... | pdf |
The Information Security Experts
Copyright © 2008 SecureWorks, Inc. All rights reserved.
The Wide World of WAFs
Ben Feinstein, CISSP GCFA
SecureWorks Counter Threat Unit™
DEFCON 16
August 8, 2008
The Information Security Experts
Copyright © 2008 SecureWorks, Inc. All rights reserved.
•
Web Application Firewalls (WAFs)
... | pdf |
Off
Grid
communica.ons
with
Android
m0nk
and
stoker
have
fun
@
DefCon
20
-‐
Meshing
the
mobile
world
Who
are
you
guys?
• m0nk
–
Josh
Thomas
– jbthomas@mitre.org
– m0nk.omg.pwnies@gmail.com
• Stoker
–
Jeff
Robble
– jrobble@mitre.org
– ... | pdf |
Fear the Evil FOCA
Attacking Internet Connections
with IPv6
Chema Alonso
@chemaAlonso
chema@11paths.com
Spain is different
Spain is different
Spain is different
Spain is different
ipconfig
IPv6 is on your box!
And it works!: route print
And it works!: ping
And it works!: ping
LLMNR
ICMPv6 (NDP)
• N... | pdf |
Technical Service Bulletin:
FXR-10
Modifying GE/MACOM MASTR-III Group 6
(403 MHz – 430 MHz)
for
Amateur Radio Applications
(440 – 450 MHz)
A FluX Research project in several
phases
Release Date: 08-01-2008
Last Update: v1.4 08-01-2008
By: Matt Krick, K3MK
DCFluX@yahoo.com
Radio Model #:
GE/MACOM MASTR-III Group 6... | pdf |
Shellcodes
for ARM:
Your Pills Don’t
Work on Me, x86
Svetlana Gaivoronski @SadieSv
Ivan Petrov @_IvanPetrov_
Why it’s important
q
Increasing
number
of
ARM-‐based
devices
q
Significant
number
of
vulnerable
so:ware
and
huge
base
of
reu... | pdf |
BLACK OPS OF TCP/IP
Spliced NAT2NAT And Other
Packet-Level Misadventures
Dan Kaminsky, CISSP
DoxPara Research
www.doxpara.com
Where I‟m Coming From…
Black Hat 2001
Impossible Tunnels through Improbable Networks
with OpenSSH
Getting Out:
ProxyCommands for Non-TCP comm layers
HTTP, SOCKS, UDP, Packet Radio*, AI... | pdf |
macOS 上的逻辑提权漏漏洞洞
菜丝 @蚂蚁⾦金金服光年年实验室
关于我
• 花名菜丝,就职于蚂蚁⾦金金服光年年安全实验室
• 从事桌⾯面端和移动端、IoT 设备安全漏漏洞洞的攻防,安全⼯工具开发。从移动应
⽤用安全到智能设备均有涉猎
• BlackHat, Xdef 等国内外会议演讲者
• 开源了了 iOS 应⽤用分析⼯工具 Passionfruit,了了解⼀一下
逻辑漏漏洞洞的特点
粗暴暴简单
很少需要涉及底层细节,对
新⼿手更更友好
fuzz 不不友好
较难通过⾃自动化模糊测试
利利⽤用稳定
不不破坏内存,相对更更稳定
脑洞洞
条件的串串联,跨组件甚⾄至跨
编程语⾔言的组合
逻辑漏漏洞洞
• 滥⽤用软件既有的特性
• 开发者... | pdf |
前⾔
常规的shellcode注⼊⼀般是通过 VirtualAllocEx , WriteProcessMemory 和
CreateRemoteThread 来实现的,但是这种⽅式是被安全软件重点监控的,同时微软提供的
ETW接⼝也是可以轻易检测出上述⽅式进⾏代码注⼊的痕迹。本⽂的核⼼是讲解怎么利⽤具
备 RWX-S 权限且⾃身有签名的⽩DLL进⾏⼀种⽐较隐蔽的shellcode注⼊,
并讲解具体的代码实现以及在写代码实现的过程中遇到的坑。本⽅法是由⽂章提出的:https:
//billdemirkapi.me/sharing-is-caring-abusing-shared-sections-for-code-inject... | pdf |
xbeark-javaopenrasp源码阅读
项⽬地址
https://github.com/xbeark/javaopenrasp
简介
随便看了下,这个算是不太难,并且适合我这种初学者啰,简单看看ReadMe可以发现实现
了⼀些基本功能,这⾥我们了解他的基本实现思路即可
阅读本项⽬⽤到的ASM相关前置知识
btw,只搞⼀些⽐较重要的点,⾸先我们知道在ASM CORE API当中有⼏个⽐较重要的点是
ClassReader、ClassVisitor、ClassWriter以及AdviceAdapter,这⾥不会讲代码怎么写,只是告诉
这是⼲嘛的便于对代码架构的理解
ClassReader/ClassWriter
稍微不是那么重要... | pdf |
国 产 智 能 网 联 汽 车 漏 洞 挖 掘 中 的 几 个 突 破 点
马良 绿盟科技 格物实验室 安全研究员
自我介绍
马良 绿盟科技 格物实验室 安全研究员
十多年嵌入式软、硬件开发经验, 喜欢DIY一些东西
2016 - Xpwn:西门子PLC蠕虫演示
2018 - 看雪开发者大会:智能设备固件提取的十种方法
2018 - 极棒:机器特工挑战赛,关闭激光报警器电源、窃听器放置、气球遮挡摄像头等
2018 - JD-HITB:介绍Vocore2模块在安全研究中的应用,提出一种工控设备攻击模型
2021 - 极棒《我是极客》:改装电源插座, 通过4G用电力猫安全缺陷远程控制内... | pdf |
2013 Trend Micro
25th Anniversary
--Fuzzing with context enlightenment and exploit
OSX IOKit vulnerabilities for fun and profit
(P)FACE into the Apple core
and exploit to root
2013 Trend Micro
25th Anniversary
Agenda
• Who we are
• Passive fuzzing framework
• Context enlightenment
• Exploit to root
2013 Trend Micro... | pdf |
Is This Your Pipe?
Hijacking the Build Pipeline
Last login: Aug 7 2011 from DEFCON 19
dc101$ whoami
@rgbkrk
dc101$ █
Last login: Aug 7 2011 from DEFCON 19
dc101$ whoami
@rgbkrk
dc101$ su greg
dc101$ whoami
@_GRRegg
dc101$ █
Last login: Aug 7 2011 from DEFCON 19
dc101$ whoami
@rgbkrk
dc101$ su greg
dc101$ w... | pdf |
Your Peripheral Has Planted Malware
—An Exploit of NXP SOCs Vulnerability
Yuwei ZHENG, Shaokun CAO, Yunding JIAN, Mingchuang QIN
UnicornTeam, 360 Technology
Defcon 26
About us
• 360 Technology is a leading Internet security company in China. Our
core products are anti-virus security software for PC and cellphones.
• Un... | pdf |
Vulnerabilities 101:
How to Launch or Improve Your
Vulnerability Research Game
Joshua Drake, Zimperium
Steve Christey Coley, MITRE
DEF CON 24
Aug 7, 2016
Introductions
• About Josh
– 20-years of VR, Ran iDefense VCP
• About Steve
– CVE co-founder, “Responsible Disclosure” (sorry), CVSS,
CWE, ...
• Why we are doing th... | pdf |
Objective
We have to defeat the enemies
and save the earth!!
Our contributions
● Introduce a new concept of analysis
framework to use easily
o perform analysis of normal application by using web
proxy
● Introduce methodologies for implementing
our concept
o pros and cons of the methodol... | pdf |
nmap -sS -A 10.10.10.28
hack the box——-Oopsie
0x00
MEGACORP_4dm1n!!
msfvenom -p php/meterpreter/reverse_tcp LHOST=10.10.16.3 LPORT=4444 > test.php
use exploit/multi/handler
set payload php/meterpreter/reverse_tcp
set LHOST 10.10.16.3
set LPORT 4444
run -j
0x01 shell
git clone https://github.com/maurosoria/dir... | pdf |
DefCon 22, Las Vegas 2014
Abusing Software Defined Networks
Gregory Pickett, CISSP, GCIA, GPEN
Chicago, Illinois
gregory.pickett@hellfiresecurity.com
Hellfire Security
Overview
What is it?
Exploiting it!
Fixing it!
Moving Forward
Wrapping Up
Modern Day Networks
Vendor Dependent
Difficult to scale
Complex and Prone to B... | pdf |
Developing Multi-Agency
Interoperability
Communications Systems:
User's Handbook
Applicable To:
ACU-1000 Modular
Interface/Interconnect System
And
TRP-1000 Transportable Radio
Interconnect System
ACU/TRP-1000 Handbook
Page ii
Developing Multi-Agency Interoperability Communication
Systems: User’s Handbook
ACU-1000 M... | pdf |
以攻促防
——
企业红蓝对抗体系建设
关于我
胡珀 / lake2
腾讯 - 技术工程事业群(TEG)- 安全平台部
应用运维安全总监,基础安全负责人,资深专家工程师
腾讯安全应急响应中心(TSRC)
Tencent Blade Team 安全研究团队
腾讯蓝军及“倚天”蓝军自动化平台
主导
逾十五年网络安全经验
2007年加入腾讯,一直从事基础安全相关工作
安全组织80SEC/蓝星群/企业蓝军联盟(COS)成员
企业安全体系建设思路 - SDL
• 安全技术培训
• 安全意识培训
• 安全规范
• 安全技术培训
• 安全意识培训
• 安全规范
• 代码审计
• 渗透测试
• 应急响应执行
• 人工巡查
• 漏洞扫描系统
• 安全情... | pdf |
Hellaphone
John Floren
Introduction
Android
Inferno
Bibliography
Hellaphone: Replacing the Java in Android
John Floren
Sandia National Labs
July 2012
Collaborators: Joshua Landgraf, Joel Armstrong
Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsi... | pdf |
Bypass Credential Guard
0x01 Credential Guard
1
Windows Defender Credential Guard (WDCG) Windows 10
WDCG LSASS (LSAISO) ,
(trusted)
administrator / System LSASS/LSAISO
WDCG NTLM Kerberos (Kerberos derived credentials)
(domain credentials)
Credential Guard lsass 2LSALSAVSM
2 Gredential Guard
Microsoft Powersh... | pdf |
DIY Hardware implant over I2C
Part of the NSA Playset
Josh Datko and Teddy Reed
DEF CON 2
2
August 10, 2014
Josh Datko and Teddy Reed (DEF CON 2
2
)
DIY Hardware implant over I2C
August 10, 2014
1 / 60
Outline
1
Introduction
NSA Playset DEF CON Series
2
Deconstruction
I2C Attack Surfaces
3
Reconstruction
I2C Module
Con... | pdf |
PentesterAcademy.com
©PentesterAcademy.com
VoIPShark: Open Source VoIP Analysis
Platform
Nishant Sharma
Jeswin Mathai
Ashish Bhangale
PentesterAcademy.com & AttackDefense.com
PentesterAcademy.com
©PentesterAcademy.com
PentesterAcademy.com
About Us
Me, Nishant Sharma
• R&D Manager and Lead Trainer, Pentester Academy
• ... | pdf |
信息流上线了一个CS上线器 https://i.hacking8.com/cobaltspam
我是照着 https://github.com/hariomenkel/CobaltSpam 来改的,而CobaltSpam是https://github.co
m/Sentinel-One/CobaltStrikeParser fork修改的,后者是用于解析beacon配置的仓库,从中可以学到
一些原理 - =
介绍
CS为了兼容MSF,默认配置将stage下载的uri硬编码了 ,
所以访问
就能得到beacon,从中能够解析到C2的各种配置信息。
接着就是定位到数据,具体怎么找的可以看 https://blog.xpnsec.co... | pdf |
端到端流水线驱动DevOps落地
DevOps时代社区
景韵
无关趋势,关乎生死
DevOps 2017 年度报告
Continuous Delivery
Continuous
Integration
DevOps
Continuous Deployment
Lean
(End to End Flow)
Principles
Practices
Running Lean Product/Market Fit
(Finding&Validating Ideas)
Scrum/Kanban
(Process)
XP
(Engineering)
Operations
Business
Software
Service
Agile(Dev... | pdf |
赛博回忆录星球出品,仅供小范围技术交流,请勿随意转发进行攻击
赛博回忆录星球出品,仅供小范围技术交流,请勿随意转发进行攻击
欢迎关注公众号:赛博回忆录
赛博 exp 如下:
POST /alarmConfig HTTP/1.1
Host: xxx.xxx.xxx.xxx:8443
Connection: close
Content-Length: 55
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (cybermemory NT 10.0; Win64; x... | pdf |
Caffeine Monkey:
Automated Collection, Detection and
nalysis of Malicious JavaScript
A
Ben Feinstein, CISSP
Daniel Peck
{bfeinstein, dpeck}@secureworks.com
SecureWorks, Inc.
Introduction
In recent years, the web browser has likely become the single most ubiquitous computing
application. Web browsers can be fou... | pdf |
1SDL
28Web
3RedHatApacheAmazonWeblogicRCE
Weblogic
42015PyconPython2016
VIP2017Java Json
;2018Java
PART 01
CONTENTS
PART 02
PART 03
PART 04
01
02
03
04
PART
01
1
2
3
1SecurityManager
2
3
SecurityManager
PART
02
SecurityMemberAccess
<constant name="struts.excludedClasses"
value="
java.lang.Object,java.lang.Runtime,ja... | pdf |
Torturing Open Government
Systems for Fun, Profit and
Time Travel
Dr. Tom Keenan FCIPS, I.S.P., ITCP, Professor
Faculty of Environmental Design & Dept. of Computer Science
keenan@ucalgary.ca
@drfuture
decreeping.wordpress.com
DEF CON 21
Las Vegas, NV
August 1-4, 2013
Disclaimers
These views are mine, not ... | pdf |
You Can
You Can’’t See Me
t See Me!!
!!
看不見的網站攻擊
看不見的網站攻擊
Unohope / Trueman
PDF created with pdfFactory Pro trial version www.pdffactory.com
講者簡介
講者簡介
u Trueman
u http://roamer.cc
u 網駭科技技術顧問,曾任職於入口網站、
金融業、資安原廠與專業資安服務廠商;
專長於網路滲透測試、駭客攻擊手法研
究。並曾擔任多場資安研討與發表會主講
人。
PDF created with pdfFactory Pro trial version www.pdffactory... | pdf |
August 4-7, 2016
1
2
3
4
5
6
7
8
9
10
11
12
Exploit Mitigation
Techniques
on iOS
Max Bazaliy
A Journey Through
August 4-7, 2016
About me
1
2
3
4
5
6
7
8
9
10
11
12
o From Kiev, Ukraine
o Staff Engineer at Lookout
o Focused on XNU, Linux and LLVM internals
o Interested in jailbreak... | pdf |
Air Traffic Control:
Insecurity and ADS-B
Righter Kunkel, CISSP, CISA
Security Researcher
defcon 17
defcon 17
Righter Kunkel
2
Agenda
Who am I?
ATC Background
DOS on a Tower
State of Airline Security
Where are we going?
ADS-B
defcon 17
Righter Kunkel
3
Who am I?
Security Field for >12 years
Worked with secure o... | pdf |
While other books have tackled the military-internet complex, tech-enabled intelligence
gathering, and cyberwarfare, together with WikiLeaks, Edward Snowden, and the 2016 US
election, there is a crucial element to the stories missing in all of
them. In his revelatory new book, CULT OF THE DEAD COW: How
the Original... | pdf |
Achieve More.
SanDisk Confidential
1
June 23, 2011
Economics of
Password
Cracking in the
GPU Era
8/3/2011
Robert Imhoff-
Dousharm
SanDisk Confidential
2
2
June 23, 2011
Overview
Introduction
GPU Cracking
Economics
Deployment Explained
Lessons Learned
Conclusion
Q/A
SanDisk Confidential
3 ... | pdf |
Hacking Web Apps
Def Con 11 version
Copyright 2002-2003 - David Rhoades
slide 2
Warning – Hazards to your Freedom
• Unauthorized access to
systems & data is illegal in
most places.
– Get permission in writing before
performing scans, audits,
assessments, etc!
– For details see
http://www.lightlink.com/
spacenka/fo... | pdf |
Java安全之Cas反序列化漏洞分析
0x00 前言
某次项目中遇到Cas,以前没接触过,借此机会学习一波。
0x01 Cas 简介
CAS 是 Yale 大学发起的一个开源项目,旨在为 Web 应用系统提供一种可靠的单点登录方法,CAS 在
2004 年 12 月正式成为 JA-SIG 的一个项目,开源的企业级单点登录解决方案。
0x02 远程调试环境搭建
下载地址,将环境war包下载,部署到tomcat即可
tomcat目录bin文件下, startup_debug.bat
call %EXECUTABLE%" start %CMD_LINE_ARGS%
改为
IDEA中设置Remote远程调试5005即可完成。
0x03 漏... | pdf |
#BHUSA @BlackHatEvents
The Journey Of Hunting In-The-Wild
Windows LPE 0day
Quan Jin
DBAPPSecurity
#BHUSA @BlackHatEvents
Information Classification: General
Who am I
⚫ Quan Jin (@jq0904)
• Security Researcher at DBAPPSecurity
• Member of
➢ DBAPPSecurity Lieying Lab
➢ DBAPPSecurity WeBin Lab
• Interested in
➢ Vulnera... | pdf |
1
EL表达式注⼊的进阶利⽤
前⾔
环境搭建
正⽂
⽆回显执⾏命令
有回显执⾏命令
任意代码执⾏
直接连接蚁剑
思路扩展
@yzddMr6
表达式注⼊是Java安全从业者会经常碰到的⼀类漏洞。Struct2的ognl表达式注⼊,Nexus3的EL表
达式注⼊,前⼀段时间爆出的Spring Cloud gateway的Spel表达式注⼊等等,重要性不需要多说。
前⼀段时间徐师在Make JDBC Attacks Brilliant Again 番外篇⾥也提到了postgresql+EL表达式来
写⼊Weblogic⼀句话的场景,所以今天想借此机会分享⼀些进阶利⽤的payload。
Tomcat 8.5+jdk8
这⾥模拟了⼀个... | pdf |
©SecurityTube.net
Chellam – a Wi-Fi IDS/Firewall for Windows
©SecurityTube.net
Vivek Ramachandran
WEP Cloaking
Defcon 19
Caffe Latte Attack
Toorcon 9
Microsoft
Security Shootout
Wi-Fi Malware, 2011
802.1x, Cat65k
Cisco Systems
B.Tech, ECE
IIT Guwahati
Media Coverage
CBS5, BBC
Trainer, 2011
©SecurityT... | pdf |
BITSQUATTING
DNS
HIJACKING
WITHOUT
EXPLOITATION
ARTEM
DINABURG
DEFCON
19
About
Me
J
The
Problem
Affected
PlaHorms
Low
Skill
Cheap
Bitsquatting
Like
typosquaPng,
but
for
bits
TyposquaPng
There
are
1500
daily
DNS
requests
per
person.
Humans
type
... | pdf |
准备工作:
找到网站名
JS payload
复现过程:
此时的 wwwroot 目录下面是没有文件的
发包
User-Agent: </tExtArEa>"><script src=http://URL/1.js></script>
点击网站日志
成功 RCE
原理分析
这里我用的环境是 7.9.1 版
目前的官网最新版也是 7.9.1 版本
复现流程可以看出来是 xss+后台 RCE 的组合拳
首先是 xss,我们可以看到日志可以成功用</textarea>闭合,然后就是经典的 script src
分析源码,看看宝塔是如何读取日志的
这里有一个 getsitelogs 函数,其中获取了网站的日志路... | pdf |
C0RE Team
Challenge Impossible
-- Multiple Exploit On Android
Hanxiang Wen, Xiaodong Wang
About us & C0RE Team
–
Hanxiang Wen, 温瀚翔
•
Security researcher @ C0RE Team
•
Focus on Android vulnerability research and exploit development
–
Xiaodong Wang, 王晓东
•... | pdf |
An Open Guide
To Evaluating
Software Composition
Analysis Tools
By Ibrahim Haddad, PhD.
November 2020
www.linuxfoundation.org
The Linux Foundation 2
An Open Guide To Evaluating Software Composition Analysis Tools
Introduction
With the help of software composition analysis (SCA)
tools, software development teams... | pdf |
Triton
and
Symbolic
execution
on
GDB
bananaappletw @
HITCON
2017/08/26
$whoami
• 陳威伯(bananaappletw)
• Master
of
National
Chiao Tung
University
• Organizations:
• Software
Quality
Laboratory
• Bamboofox member
• Vice
president
of
NCTUCSC
• Specialize
in:
• symbolic
executio... | pdf |
跟IE簽約成為XSS少⼥吧
Make a contract with IE and become a XSS girl!
Yosuke HASEGAWA
http://utf-8.jp/
歉意 I'm sorry 謝罪
我從來沒有看過動畫作品
"魔法少⼥⼩圓☆魔⼒"
I've never watched the anime "Puella Magi
Madoka Magica"
「まどか☆マギカ」⾒てません
自我介紹 Who am I? 自己紹介
Yosuke HASEGAWA
• NetAgent Co.,Ltd. R&D dept.
• Secure Sky Technology Inc. technical adviser... | pdf |
KERNEL WARS:
KERNEL-EXPLOITATION
DEMYSTIFIED
Introduction to kernel-mode
vulnerabilities and exploitation
•
Why exploit kernel level vulnerabilities?
– It's fun!
– Relatively few are doing it
– Bypasses defense mechanisms and restrictions
– Attacks at the lowest level
• Does not rely on any particular application b... | pdf |
XMLDecoder反序列化
XMLEncode序列化
package com.example;
import java.io.IOException;
import java.util.ArrayList;
import java.util.HashMap;
public class XMLEncoder {
public static void main(String[] args) throws IOException {
HashMap<Object, Object> hashMap = new HashMap<>();
ArrayList<Object> arrayList = ne... | pdf |
返璞归真
重识物理安全与近源渗透
返璞归真
重识物理安全与近源渗透
PushEAX
CONTENTS
目录
01
02
03
第一章 :近源威胁面分析
第三章 : ANT Tools工具包介绍
第二章 :近源渗透手段
近源威胁面分析
——虽然只有极少黑客选择在真实世界发起进攻, 但我们面对的威胁远不止与此。
01
谁会选择在现实世界发起攻击?
2007年,网络托管商CI Host的数据中心遭到两名蒙面男子抢劫。
劫匪在持枪劫持了一名IT员工后,盗窃了20台服务器。
黑客攻击(物理)
攻击者通过贿赂内部员工,在厂区内安装无线路由器。利用无线
信号直接连入企业内网,侵入内网中的信息系统。
通过为他人“改机、解锁”手机共9000余部,五个... | pdf |
Vladimir
Katalov
ElcomSo0
Ltd.
www.elcomso0.com
What
Google
knows
about
you
and
your
devices
(and
how
to
get
it)
Academia
Sinica,
Nankang,
Taipei
AUG
28-‐29,
2015
www.elcomso0.com
•
Curiosity
•
Privacy
•
The
right
to
know
•
Government
s... | pdf |
Tuning Your Brain
Tuning Your Brain
Why does certain music get you out of a black
hole?
Often when we're stuck in a black hole, or just can't
figure the problem out - the right music will get us out
of it. Why does this work? It seems motivating, and it
seems like we solve problems easier, and it seems to
c... | pdf |
Attacks against 2wire Residential Gateways
Attacks against 2wire Residential Gateways
WHO AM I?
hkm
Born in Cozumel island.
Have worked as:
Forensic investigator
Malware analyst
Incident response
Personal webpage:
http://www.hakim.ws
Forum:
https://underground.org.mx
My current research is
focused on residential
r... | pdf |
Book Review:
A Tale of Two Sciences: Memoirs of a Dissident Scientist
by Peter A. Sturrock
(Exoscience: Palo Alto) 2009.
by Richard Thieme
“A Tale of Two Sciences: Memoirs of a Dissident Scientist,” by Dr. Peter A. Sturrock, is
a personal work by the well-known Stanford physicist and astrophysicist, reflecting on
the ... | pdf |
数据挖掘赋能安全感知:
阿里云大数据入侵检测实践
Han Zheng
资深安全工程师
2019年5月29日
Yue Xu
安全工程师
团队成员
任职于阿里巴巴云安全中心,负责算法实现和入侵检测与威胁情
报的研发团队。
Han Zheng、Yue Xu、Wei He
云 + 安全性
优势
•
数据计算能力
•
丰富的安全日志
•
从上帝视角来看数据
挑战
•
庞大的业务环境
•
从“脚本小子”到国家,多方遇敌
•
精确率和召回率都让人担忧
数据流
威胁建模案例表
•
暴力攻击
•
恶意行为链
•
恶意 Web 脚本(即 Webshell)
•
攻击载荷回溯
威胁建模案例表
•
暴力攻击
•
恶意行为链
•
恶意 Web 脚本(即 We... | pdf |
1
pingOrce出题⼈writeup ---种环境变量注⼊劫
持bash的实际利⽤场景
前⾔
GoAhead
GoAhead + bash
参考
前不久p⽜分享了⼀个利⽤环境变量注⼊劫持bash的技巧.
当时我就在想这种环境变量的注⼊有没有什么⽐较通⽤的场景。⼀般遇到的环境变量注⼊基本上都是直
接使⽤ld_preload解决问题。p⽜的这种新的环境变量注⼊的利⽤技巧,有没有什么特殊的利⽤⾯呢。
嵌⼊式设备常⽤的Web服务器 GoAhead 出现过环境变量注⼊漏洞 CVE-2017-17562 和 CVE-2021-
42342。
漏洞的原理很简单:服务器会把收到的CGI请求参数直接写⼊到环境变量中。
CVE-201... | pdf |
Mimikatz那些鲜为⼈知的功能(⼀)
#.内⽹渗透/mimikatz
author: haya
作为Windows的神兵利器, sekurlsa::logonpasswords 、 lsadump::dcsync 可能是
Mimikatz使⽤频率⽐较⾼的两个功能了。⽽实际上,Mimikatz还有很多有意思的功能,可以通
过阅读源码进⼀步去了解。
本⽂主要是盘点Mimikatz的⼀些冷⻔功能,以及这些功能在实战中的具体使⽤场景。
1. rpc::server
这个功能主要是启动⼀个rpcserver,允许使⽤Windows rpc远程调⽤mimikatz。
通过这个RPC远程调⽤功能,可以绕过⼀些本地的基于字符串的特征查杀。⽐如
... | pdf |
Java反序列化实战
绿盟科技安全研究经理
廖新喜(@xxlegend)
绿盟科技攻防实验室招人
• 研究方向:webshell检测,安全大数据分析
• 联系邮箱:liaoxinxi[@]nsfocus.com或者
liwenjin[@]nsfocus.com
•
绿盟科技 安全研究经理
•
看雪大会讲师,Pycon大会讲师,央视
专访嘉宾
•
向RedHat、Apache、Amazon,
Weblogic,阿里提交多份RCE漏洞报告
•
博客:xxlegend.com
个人介绍
反序列化入门
Fastjson
Weblogic
反序列化防御
反序列化入门
• 序列化是用于将对象转换成二进制串存储,对应着writeObject
• ... | pdf |
PSWN
PSWN
Public Safety Wireless Network
Comparisons of Conventional and
Trunked Systems
May 1999
Comparisons of Conventional and Trunked Systems
May 1999
ii
FOREWORD
Land mobile radio (LMR) networks are critical for public safety communications. In
support of the Public Safety Wireless Network (PSWN) Program Manageme... | pdf |
做红队你需要学习“如何挖掘战壕”(二)
0x00 前言
在这个系列的上一篇文章中,我们主要讲了什么是红队基础设施以及红队基础设施的架构与设计思路。
最后我们分析了构成红队基础设施的几个元素:ip和域名、C2工具、前置器。今天我们主要分析的是IP
和域名,也就是如何选择域名和IP,在攻防对抗中域名和IP是非常重要的元素,在防御上基于域名和IP
数据来追踪攻击是非常重要的手段。因此作为公鸡队一定要选好域名和IP,这样会事半功倍。
0x01 域名的选择
抢注过期域名
这个方法公鸡队小伙伴应该都知道,主要利用的是https://www.expireddomains.net/expired-domain
s/ 的数据。这个网站实时更新着快要过... | pdf |
Blowing up the Celly
Building Your Own SMS/MMS Fuzzer
Brian Gorenc, Manager, Vulnerability Research
Matt Molinyawe, Security Researcher
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
2
Agenda
• Introduction
• Bug Hunting
• Te... | pdf |
The Science of Social Engineering
Mike Murray / Anton Chuvakin
mmurray@episteme.ca anton@chuvakin.org
NLP, Hypnosis and The Science of Persuasion
Outline
✴ The Basics
✴ Social Engineering and Persuasion
✴ The Language of Influence
✴ Framing - Context over Content
✴ Hypnosis
✴ The art of communication
✴ Putting it a... | pdf |
Hacking E.S.P.
Hacking E.S.P.
Disclaimer
Disclaimer
The views and opinions expressed in this
The views and opinions expressed in this
presentation are solely those of the
presentation are solely those of the
speakers and do not necessarily reflect
speakers and do not necessarily reflect
opinions of their employ... | pdf |
數位鑑識與資料救援前瞻性研究
主講人: thx (張道弘)
1
什麼是數位鑑識?
數位鑑識也稱為電腦鑑識,是一門有效解
決資通安全與電腦犯罪難題的科學。
其定義為:以一定程序保存、識別、抽
取、記載及解讀電腦或網路媒體 ...。
數位鑑識以及偵查的方式,在案件的偵
查,透過軟體並有流程,拿取一些儲存於
儲存裝置,可有助於案情釐清以及曝光。
2
司法單位所用的儲存媒體鑑識技術
使用:Encase,Winhex,R-Studio,
FTK imager ,Helix Live CD純軟體
做邏輯區分析處理。
資料讀取出來,純做數值運算,撈取資料
如果是主流 File System 現行商用軟體已
非... | pdf |
Instrumenting Point-of-Sale Malware
A Case Study in Communicating Malware Analysis More Effectively
Robert Wesley McGrew, Ph.D.
Assistant Research Professor
Department of Computer Science and Engineering
Distributed Analytics & Security Institute (DASI)
Mississippi State University
July 13, 2014
!
ABSTRACT
!
T... | pdf |
DevSecOps
2020
Dev
Sec
Ops
FreeBuf 咨询荣誉出品
D e v S e c O p s 企 业 实 践 白 皮 书
关于安全聚合力系列
独行难、众行远。安全聚合力系列报告旨在凝聚网络安全业内甲方安全专家,共同产出指导性、前瞻性的技术及行业实践
研究报告,为企业提供更详实、更易落地的同行业安全建设参考。
关于报告
DevSecOps作为安全领域中逐渐步入成熟期的技术体系,从最初的理念到如今少量的成功实践案例,中间经历了大量的
探索与发展。如今,很多企业已经意识到DevSecOps的重要性并想要有所实践,但仍然面临大量挑战。
本次FreeBuf咨询邀请《研发运营一体化(DevOps)能力成熟度模型》部... | pdf |
© Caendra Inc. 2020
All Rights Reserved
Web Application
Penetration Testing
eXtreme
Encod%69ng and
/^Filtering$/
S e c t i o n 0 1 | M o d u l e 0 1
WAPTXv2: Section 1, Module 1 - Caendra Inc. © 2020
Table of Contents
MODULE 01 | ENCOD%69NG AND /^FILTERING$/
1.1 Data Encoding Basics
1.2 Filtering Basics
| p.2
... | pdf |
准备工作:
找到网站名
JS payload
复现过程:
此时的 wwwroot 目录下面是没有文件的
发包
User-Agent: </tExtArEa>"><script src=http://URL/1.js></script>
点击网站日志
成功 RCE
原理分析
这里我用的环境是 7.9.1 版
目前的官网最新版也是 7.9.1 版本
复现流程可以看出来是 xss+后台 RCE 的组合拳
首先是 xss,我们可以看到日志可以成功用</textarea>闭合,然后就是经典的 script src
分析源码,看看宝塔是如何读取日志的
这里有一个 getsitelogs 函数,其中获取了网站的日志路... | pdf |
一、判断是否在docker容器里
首先,我们需要先判断是否在docker环境里,常用的两个检测方式:
目前来说,这两种检测方式还是比较有效的,其他检测方式,如检测mount、fdisk -l查看硬盘 、判断PID 1的进程名
等也可用来辅助判断。
二、配置不当引发的docker逃逸
2.1 docker remote api未授权访问
漏洞简述:docker remote api可以执行docker命令,docker守护进程监听在0.0.0.0,可直接调用API来操作
docker。
通过docker daemon api 执行docker命令。
漏洞利用:
A、新运行一个容器,挂载点设置为服务器的根目录挂载至/mnt目录下。
B、... | pdf |
Vmware CB Workload
360 政企安全
Skay-2021.9.14
2
Vmware CB workload
3
查看分别监听了哪些端口
端口的启动文件
全局搜索jar class
确定工作目录
Vmware CB worktaion
4
Vmware CB workload 拿到手后是一个ova文件,直接导入vmware
改ssh配置文件root登录,/opt/vmware 为工作目录,配置及启动文件也在这里
调试:三个springboot jar包 分别配置远程调试
Vmware CB workload
5
工作目录打包扒下来,对jar包配置远程调试 tar czvf test.tar.gz * ... | pdf |
Hacking Sleep:
How to Build Your Very Own Sleep Lab
Ne0nRa1n & Keith Biddulph present...
Human Sleep
Sleep is a normal state of rest that is
characterized by unconsciousness, reduced
activity, and limited sensory responsiveness
Sleep differs from other states of reduced
consciousness such as drug intoxication or
co... | pdf |
SOCIAL ZOMBIES
Your Friends Want to Eat Your Brains
STARRING...
TOM ESTON
KEVIN JOHNSON
Social Networks
“The New Hotness”
225 Million Users
110 Million Users
Grew 752% in 2008!
8 million visitors
in march 2009
“Social networks & Blogs are
now the 4th most popular online
activity, ahead of personal
email.”
-Nielsen ... | pdf |
1
OLONNONS-我⽤NL年前的技巧拿了⼀个shell
在分析完 log4shell 对于struts2的影响后,感觉struts2框架写的有点xxx,由于⼿上正好有⼏个
struts2打 log4shell 不成功,于是准备先看看其历史漏洞然后在挖挖看。
在看struts2历史漏洞时发现空虚浪⼦⼼前辈以前挖过不少struts2的漏洞于是在他博客看了他的很多⽂章
博客(看⾃闭了),发现他提到的⼀个判断struts2的⽅法。
通过在正常的Action后添加参数 ?ActionErrors=xxx 会返回404⻚⾯。
Struts2⾥的Action都继承⾃ ActionSupport
0x01 前⾔
0x01 判断st... | pdf |
/
register_argc_argv
boolean
Tells PHP whether to declare the argv & argc variables
(that would contain the GET information). See also
command line.
register_argc_argv
TRUE
Setting this to TRUE means that scripts executed via the
CLI SAPI always have access to argc (number of arguments
passed to the application) and a... | pdf |
老司机独家代码审计姿势
--色豹
目录
代码审计介绍
代码审计流程思路
web应用代码审计
IOT固件代码审计
1
2
3
4
代码审计介绍
代码审计(Code audit)是一种以发
现程序错误,安全漏洞和违反程序规
范为目标的源代码分析。
什么是代码审计?
代码审计工具
Fortify SCA
Checkmarx CxSuite
RIPS
厂商
Fortify Software
Checkmarx
rips
支持语言
Java,JSP,ASP.NET,C#,
VB.NET,C,C++,COB
OL,
ColdFusion,Transac
t-... | pdf |
Let’s Sink The Phishermen’s Boat!
Teo Sze Siong, <teo.sze.siong@f-secure.com>
F-Secure Corporation
Sunday, June 29, 2008 Page 2
Why this topic?
• Internet banking has become more and
more preferred choice
• Yet, many people don't understand the
risk they are facing in online banking
• Keep antivirus software updated
... | pdf |
DEFCON30 | 拯救环境变量
收录于合集
#红队
18个
通过在进程级别操纵环境变量,可以让受信任的应⽤程序加载任意 DLL 并执⾏恶意代
码。这篇⽂章列出了近 100 个在 Windows 11 (21H2) 上易受此类 DLL 劫持的可执⾏⽂
件;它演示了如何仅⽤三⾏ VBScript 就可以实现这⼀点。
环境变量
环境变量是在 1970 年代后期在 Unix V7 [ 1 , p.99-101 ] 中引⼊的,作为将信息传递给进程的
⼀种简单⽅法。事实证明它很受欢迎:⼏年后它也被 PC DOS 2.0 [ 2 , p.477 ] 采⽤,最终演
变成 Windows 操作系统。⼤约四⼗年后,环境变量仍然存在于 Windows... | pdf |
Information Classification: General
Scaling the Security Researcher
to
Eliminate OSS Vulnerabilities
Once and for All
- Jonathan Leitschuh -
- Patrick Way -
Information Classification: General
- Jonathan Leitschuh -
Software Engineer & Security Researcher
Dan Kaminsky Fellowship @ HUMAN Security
GitHub Star & GitHub Se... | pdf |
A
Atttt
SSaattaann
m
myy FFrriieenn
ttttaacckkiinngg SSoocc
:::: D
DeeffCCoonn SSiixxtteeee
SShhaaw
wnn M
M
aanndd
N
Naatthhaann H
H
n iiss oonn
nnddss LLiisstt ::
cciiaall N
Neettw
woorrkk
eenn ((FFTTM
MFFW
W)) ::::
M
Mooyyeerr
dd
H
Haam
miieell
kkss
"Has what we've learned about writin... | pdf |
@EyalItkin
Mystery
Callback
No size check:
Classic Buffer Overflow
0x000022B6
0x000022B6
Compromised
Camera
Firmware
Update
Compromised
Camera
Firmware
Update
Compromised
Camera
Firmware
Update
Plain
Firmware
Compromised
Camera
Firmware
Update
Plain
Firmware
Malicious
Firmware
Compromised
Camera
Firmware
Update... | pdf |
1
BRING YOUR OWN PRINT DRIVER VULNERABILITY
Jacob Baines
7 August 2021
2
AGENDA
Background
Research
Print Driver
Installation
BYOPD
Exploitation
Detection &
Mitigations
3
SLIDES & CODE AVAILABLE
https://github.com/jacob-baines/concealed_position
4
SPEAKER INTRODUCTION
Jacob Baines
Vulnerability Researcher
@Juni... | pdf |
An Inside Look Into Defense
Industrial Base (DIB) Technical
Security Controls:
How Private Industry Protects Our Country's Secrets
James Kirk
Outline
• Background
• DOD Agency Responsible for Interpretation and
Enforcement
• Security Control Development
• Document Drafting and Approval
• Testing of Security... | pdf |
Fun with SOHO Router
101
by Jhe@HITCON-CMT
Who am I ?
● Jhe
● Co-founder of UCCU
● know a little
○ Web security
○ Binary exploitation
○ Parseltongue (python)
Firmware overview
Reversing engineering
Common vulnerabilities
Real world case
UCCU
What is SOHO Router
Firmware overview
Reversing engineering
Common vulnerabi... | pdf |
一个很有意思的shellcode执行方式
前言
好久没更文了,最近事情比较多.在日常看样本的时候看到了一个Lazarus所使用的新型Macro植入物.其还
是该组织第一次使用的相关技术感觉比较少见而且很有意思。虽然技术不是一个很先进的技术但是在宏
的利用中却有一定的可能.还是可以多多学习用于RedTeam的工作中的
Macro宏分析
前面的导出声明部分:
Private Declare PtrSafe Function WMCreateBackupRestorer Lib "Crypt32" _
Alias "CryptStringToBinaryW" (ByVal WmBckupParam1 As LongPtr, ByV... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.