text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
1
Hacking Iraq
Hacking Iraq
Michael Schearer (
Michael Schearer (““theprez98
theprez98””))
presents
2
Plan of Attack
Plan of Attack
Introduction
Disclaimers
My Background
Why is the Navy in Iraq?
Iraqi Communications Infrastructure
IEDs
Composition, Typology, Counter-IED Strategy
The Future
3
Introduction
Introduction
... | pdf |
Smile for the Grenade!
“Camera go BANG!”
Vlad Gostomelsky
Joshua A. Marpet
Who are we?
•
Vlad Gostom @recompiler -
Years of model rocketry and
high power model rocketry
•
DARPA researcher – including
future warrior combat system
•
Penetration Testing – Web
Apps, networks, physical
security (including banks)
•
Air F... | pdf |
Porosity
Decompiling Ethereum Smart-Contracts
Matt Suiche (@msuiche)
Founder, Comae Technologies
m@comae.io
Whoami
@msuiche
Comae Technologies
OPCDE - www.opcde.com
First time in Vegas since BlackHat 2011
Mainly Windows-related stuff
CloudVolumes (VMware App Volumes)
Memory Forensics for DFIR (Hibr2Bin, DumpIt... | pdf |
© NCC Group 2021. All rights reserved
Sleight of ARM:
Demystifying Intel Houdini
Brian Hong
@im_eningeer
whoami
© NCC Group 2021. All rights reserved
Brian S. Hong (@im_eningeer)
• Hardware Enthusiast
• Forward Reverse Engineer
• Like to reverse low-level stuff and break embedded systems
• Android Penetration Testing
•... | pdf |
How to get good seats in the
security theater?
Hacking boarding passes for fun and profit
Przemek Jaroszewski
przemj+defcon24@gmail.com
$ whoami
• head of the Polish national CSIRT (CERT Polska)
• 10+ years of education in programming
• Master’s degree in social psychology
• 15 years of experience in IT security
• avi... | pdf |
Hacking the Cloud
Gerald Steere – Microsoft C+E Red Team (@Darkpawh)
Sean Metcalf – CTO Trimarc (@pyrotek3)
Gerald Steere - @darkpawh
10+ years experience as a penetration tester and red team operator
Member of C+E Red Team since 2014
Speaker at BlueHat and Bsides Seattle
Spends work days happily smashing atoms in Az... | pdf |
Using a Malicious Proxy to Pilfer Data &
Wreak Havoc
Edward J. Zaborowski
ed@thezees.net
Abstract .................................................................................................................3
Malicious Web Proxy .......................................................................................... | pdf |
Nginx_lua 100参数绕过原理详解
一、环境搭建
Nginx_lua 安装
https://github.com/openresty/lua-nginx-module#installation
安装完之后可以在nginx.conf 写入配置。可以动态在Nginx 层面进行过滤和调度
这里使用一个很简单的方式来展示绕过的原理
wget 'https://openresty.org/download/nginx-1.19.3.tar.gz'
tar -xzvf nginx-1.19.3.tar.gz
cd nginx-1.19.3/
# tell nginx's build system where to find Lua... | pdf |
HCTF 2018
HCTF 2018
PWN
the end
babyprintf_ver2
easyexp
christmas
Reverse
LuckyStar
Seven
PolishDuck
Web
kzone
admin
bottle | open | working:
hide and seek
Game | solved | working:
Crypto
xor game
rsa?xor
BlockChain
Re:Ethereum from zero
ez2win
MISC
freq game
eazy dump
Difficult programming language
Guess My Key
https://... | pdf |
““SHADOW WALKER
SHADOW WALKER””
Raising The Bar For Rootkit Detection
Raising The Bar For Rootkit Detection
by Sherri Sparks & Jamie Butler
What Is A Rootkit?
What Is A Rootkit?
• Defining characteristic is stealth.
– Viruses reproduce, but rootkits hide!
• Greg Hoglund, author of NT Rootkit
defines a rootkit as “a se... | pdf |
Aaron Bayles
DC101 @ DEF CON 22
19 years in IT/Infosec
Worked in Oil & Gas (O&G) last 8 years
Along the way
Penetration testing
Vulnerability assessment
Network architecture, design &
implementation
Risk assessment
Legacy equipment/comms
Remote (geographic) connectivity
Long lifecycle
Power/spac... | pdf |
www.quintessencelabs.com
Are Quantum Computers Really A Threat
To Cryptography?
A Practical Overview Of Current State-Of-The-Art
Techniques With Some Interesting Surprises
©2018 QuintessenceLabs. All rights reserved. Commercial in Confidence.
Data Uncompromised
• Cryptography & Malware Researcher at TrustDefender
•... | pdf |
One-Man Shop
How to build a functional security
program with limited resources
DEF CON 22
One-Man Shop – Agenda
• Caveats & Considerations
• People and Processes
• Network Architecture
• System Design
• Continuous Monitoring
• External Validation
• Compliance
Security Program Hierarchy of Needs
Compliance
External
Va... | pdf |
Raspberry)MoCA)
A)recipe)for)compromise)
Andrew Hunt
George Mason University
ahunt5@gmu.edu
Media over Coaxial Alliance
• 8)–)12)large)companies)
• How)to)make)use)of)widely)deployed)coaxial)cabling)to)deliver)
content?)
– Shielded)
– Lots)of)frequency)bandwidth)
– Carries)signal)500)feet)
• PHY/MAC)specificaL... | pdf |
Overwri'ng
the
Excep'on
Handling
Cache
Pointer
-‐
Dwarf
Oriented
Programming
James
Oakley
(Electron)
Electron100
*noSPAM*
gmail.com
Rodrigo
Rubira
Branco
(@BSDaemon)
rodrigo
*noSPAM*
kernelhacking.com
Sergey
Bratus
(Sbratus)
Sergey
*noSPAM*
cs.dartmou... | pdf |
Advanced Inter-Process
Desynchronization in SAP’s HTTP
Server
Martin Doyhenard
Onapsis
mdoyhenard@onapsis.com
Abstract
This paper will demonstrate how to leverage two memory corruption vulnerabilities found in
SAP's proprietary HTTP Server, using high level protocol exploitation techniques. Both,
CVE-2022-22536 and CVE... | pdf |
Breaking the
Chrome Sandbox
with Mojo
_tsuro@, 2022
No memory was corrupted in the
making of this presentation
Kernel
Browser Process
Renderer
Renderer
Renderer
Renderer
Network
GPU
Renderer
Browser Process
Network
URLLoader
NetworkService
NetworkContext
...
RendererHost
BlobRegistry
GpuHost
...
Renderer
Browser Pro... | pdf |
编号:APP-YJBG-2019-001
App 申请安卓系统权限机制
分析与建议
(V1.0 版)
App 专项治理工作组
2019-05
目 录
一、前言............................................................ 1
二、安卓系统简介.................................................... 2
三、安卓系统权限分类................................................ 3
四、收集使用个人信息相关权限................................. | pdf |
HAM FOR HACKERS
TAKE BACK THE AIRWAVES
JonM – DEFCON 16
JonM
Licensed Amateur Extra—the highest class of license
in the US
Operating since 2000
Radio is just one of my hobbies…software security
consulting is the most lucrative
You want to play with wireless…
Remote control
Data links
Personal communicatio... | pdf |
The ABC of Next-Gen Shellcoding @ DEF CON 27
11 Aug 2019
1 / 42
The ABC of Next-Gen
Shellcoding
Hadrien Barral,
R´emi G´eraud-Stewart,
Georges-Axel Jaloyan,
David Naccache
´Ecole normale sup´erieure, PSL Research University
What we’re interested in today
⌅ Embedded devices, especially
smartphones.
⌅ Many people have ph... | pdf |
1"
MODERN MALWARE:
OBFUSCATION AND EMULATION
DEF"CON"CHINA"1.0"(2019)"
DEF CON CHINA 1.0 (2019)
by Alexandre Borges
ALEXANDRE"BORGES"–"MALWARE"AND"SECURITY"RESEARCHER"
DEF"CON"CHINA"1.0"(2019)"
2"
ü Malware and Security
Researcher. "
ü Speaker at DEFCON USA 2018
ü Speaker at HITB 2019
Amsterdam
ü Speaker at... | pdf |
0x01
/apisix/admin/migrate/export /apisix/admin/migrate/import
RCE
Author: TheKingOfDuck@JJ Group
1
https://github.com/apache/apisix-docker
1
0x02
0x03 | pdf |
#BHUSA @BlackHatEvents
Dragon Tails: Preserving Supply-
Side Vulnerability Disclosure
Stewart Scott, Trey Herr
Sara Ann Brackett, Yumi Gambrill, Emmeline Nettles
#BHUSA @BlackHatEvents
Information Classification: General
Supply-Side
Vulnerability
Research
▪ What are sources of security?
▪ Global bug-bounty market si... | pdf |
Smashing
The
Browser:
From
Vulnerability
Discovery
To
Exploit
Chen
Zhang
(@demi6od)
NSFOCUS
Security
Team
demi6d@gmail.com
h>ps://github.com/demi6od
Date:
2014
August
19th
Agenda
• Who
am
I
• Stage1
-‐
Browser
Fuzzing
Technology
• Stage
2
-‐ ... | pdf |
!
"
#
$
%
&
&
&
'
!
"
#
$%&
'
%&
!
"
(
(
'$))
*+%&
$,%-
!
Æ
"
.
(
"
.
,
/
'
0
1
0
,
2
"
.
"
0
"
'
.
$%&
'
%&
!
3
.
'
4
'
"
5
,
.
'
6
7
8
4
8
(
(
.
'
.
5
'
5
8
0
0
.
"
#
.
9
8
0
.
:
:
;
0
.
.
.
0
"
Æ
8
"
.
<
:
.
2
.
0
$
0
.
.
.
.
:
.
&
4
9
-
.
,
'
0
:
-
.
.
=
4
>
.
>
?
@
5
A>
!
8
2
'
#
'
05
'
B
"
'
Æ
"
8
25
8
2
,
0
.
4... | pdf |
深入浅出云计算安全
吴翰清
2012-07
Who am I?
• Alibaba security
(7 years)
(3个月,1w册)
icloud是云吗?
互联网未来的入口
随时随地上网
改变了使用互联网的方式
但这不是传统意义的云计算
云计算的前世今生
电厂模式
Utility Computing
网格计算
云计算
云计算的使命
Computing as Utility
两种云计算
弹性计算
海量数据计算
弹性计算改变建站方式
按需使用,按需付费
专业运维服务化
快速部署,自助开通
互联网的长尾用户
中小站长、创业者
运营商、政府、公安、金融
“奢侈... | pdf |
PINATA
//PIN Automatic Try Attack
Salvador Mendoza
Security Researcher
Ocelot Offensive Security Team
Esta información es propiedad de Metabase Q, Inc., ©Todos los Derechos Reservados
metabaseq.com contact@metabaseq.com
03
02
01
Agenda
Introduction to terminology
EMV Transaction Flow
Inadequat... | pdf |
beholder
DefCon 16
Beholder
Nelson Murilo
nelson(at)pangeia.com.br
Luiz Eduardo
le (at) atelophobia.net
beholder
DefCon 16
Agenda
Who are we?
Evolution of WiFi attacks
Attack tools
Threats
Solutions
The inner of Beholder?
What does Beholder detect?
What Beholder doesn't do
Scenarios
Futures
beholder... | pdf |
Oh Sieng Chye, Researcher
ESET ASIA (Singapore)
ESET Researchers Acknowledgement
2
Partners Acknowledgement
3
Introduction
ESET research team published a paper titled "Operation Windigo", detailing how thousands
of Linux and Unix servers were compromised, and used to steal SSH credentials, and
redirect web visitors t... | pdf |
© 2021 TXOne Networks Inc.
Taking Apart and Taking Over ICS-SCADA Ecosystems
A Case Study of Mitsubishi Electric
Mars Cheng
Selmon Yang
August, 2021
@DEF CON 29
© 2021 TXOne Networks Inc.
Who are we?
A subsidiary company under
Keep the Operation Running
Threat
Defense
Expertise
Industry
Adaptive
Solution
OT-Focused... | pdf |
!"#$%&%'
()*+'",'$-+''
./$"0%$+1'(+1'2+%0'
!"#$"%&'()*+%'
,"-./0"+%$"12%-'
!"#$"%#&'
! !"#$%&'()*+
! ,'&-")"+
! ./0-&/1(-2*+!'-0+
! 3'0-42567'/-"-/')+
! !28"9/'&+:'*/;#"-/')+
! <02&+=)-2&>"#2+
?8/0+@'&$+@"0+A"*2+6'00/172+-8&'(%8+.BC3BD0+
,E12&+F"0-+?&"#$+6&'%&"AG+
()*+'+)%,'+*-.'%,'/0+'
! H'-+"+,'&-")"+-(-'&/"7+... | pdf |
DesperateCat
题⽬环境
JDK8u311
Tomcat9.0.56
分析
⾸先拿到这个源码我们看什么
看web.xml,从这⾥我们发现只有⼀个类,简简单单⼏秒看完这个函数
不想贴代码了,占地⽅,总结说来提供了⼀个POST⽅法,这⾥能让我们去上传任意⽂件,配
合部分的任意内容,为什么是部分呢,请看下⾯
<servlet>
<servlet-name>ExportServlet</servlet-name>
<servlet-class>org.rwctf.servlets.ExportServlet</servlet-class>
</servlet>
<servlet-mapp... | pdf |
实战攻防演习之
蓝队视角下的防御体系构建
1
实战攻防演习之
蓝队视角下的防御体系构建
3
前 言
网络实战攻防演习,是新形势下关键信息系统网络
安全保护工作的重要组成部分。演习通常是以实际运
行的信息系统为保护目标,通过有监督的攻防对抗,
最大限度地模拟真实的网络攻击,以此来检验信息系
统的实际安全性和运维保障的实际有效性。
2016年以来,在国家监管机构的有力推动下,网
络实战攻防演习日益得到重视,演习范围越来越广,
演习周期越来越长,演习规模越来越大。国家有关部
门组织的全国性网络实战攻防演习从2016年仅有几家
参演单位,到2019年已扩展到上百家参演单位;同时
各省、各市、各行业的监管机构,也都在积极地筹备
和组织各... | pdf |
So You Got Arrested at DefCon...
Thursday, July 30
DefCon 17
Jim Rennie
Disclaimer
This is not legal advice.
The presenter is not your lawyer (yet).
This talk is not a substitute for legal advice.
This is for edutainment purposes only.
If you really get arrested, consult your attorney.
Crimes you migh... | pdf |
Java代码审计之基础开发
1
Java代码审计之基础开发
Author
Catsay
Type
审计
完成
感悟
啥都不会
时间
数据类型与运算符
Java和PHP不同,他不是⼀个弱类型的语⾔。
编写主⽅法
main()⽅法是类体中的主⽅法,该⽅法从{开始到}结束。Public、Static和void分别是main()⽅法的权限修饰符、静态修饰符和
返回值修饰符,Java程序中的main()⽅法必须声明为:public static void ,其中String[] args是⼀个字符串类型的数组,它是
main()⽅法的参数
创建项⽬
我们这⾥使⽤的是IDEA,⾸先去创建⼀个Java项⽬,然后创建⼀个包
然后在包... | pdf |
如何去挖掘物联网环境中的高级恶意软件威胁
叶根深
360网络安全研究院研究员
$ whoami
Email:yegenshen@360.cn
Twitter/WeChat:@zom3y3
Network Security Researcher @360Netlab
TO BE A MALWARE HUNTER!
#Botnet #Pentest #Honeypot #Sandbox
PART 01
背景介绍
目录
CONTENTS
PART 02
IoT安全现状
PART 03
挖掘未知的IoT Exploit
PART 04
挖掘未知的IoT Botnet
01
03
04
02
PART 05
总结
05
PART
01
背... | pdf |
Stalking a City for Fun
and Frivolity
“Pull pin, point toward privacy insurance claimant”
DRAFT SLIDES
Please go to http://www.maliceafterthought.com for
updated slides
Brendan O’Connor
Malice Afterthought, Inc.
Hi! I’m Brendan
• CTO/DSS, Malice Afterthought
• Law Student: IANAL(Y)
• Anything you hear in this present... | pdf |
Through the Looking-Glass, and What Eve Found There
Luca Bruno, Mariano Graziano, Davide Balzarotti, Aur´elien Francillon
EURECOM
{firstname.lastname}@eurecom.fr
Abstract
Looking-glasses are web applications commonly de-
ployed by Autonomous Systems to offer restricted web
access to their routing infrastructure, in orde... | pdf |
做红队你需要学习“如何挖掘战壕”(一)
0x00 前言
看到红队和战壕,相信做红队或者蓝军的同学应该知道我想聊什么了?今天和大家聊一聊红队的基础设
施。
19年的时候为了准备一个PPT,系统的梳理了下红队的基础设施,现在写出来算是抄冷饭了,希望对大
家依旧有用。我曾经大言不惭的说过一句话“在红队行动中,完善的基础设施是成功的一半”。虽有夸
张,却无不当。在这儿做个形象的比喻,搭建基础设施,类似于打仗前挖的战壕。战壕不仅是个人掩
体,还是部队作战、输送和补给的场地。战壕置于战争的作用,就是基础设施置于红队行动的作用。对
军事有兴趣的同学可以百度“如何挖掘战壕”。回归正题,所谓的红队的基础设施具体的是什么?下文中
红队的基础设施,全部以... | pdf |
4.2
Manual
Strategic Cyber LLC (A HelpSystems Company)
www.cobaltstrike.com/
/
2/
Table of Contents
Table&of&Contents&..................................................................................................................................&2/
1.&Welcome&to&Cobalt&Strike&....................................... | pdf |
Top Ten Legal Questions*
DEFCON 13
Jennifer S. Granick
1. Is it legal to sniff wireless networks?
2. What are the state and federal laws regulating access to
computer systems?
3. How did the USA PATRIOT Act change computer crime
investigation and prosecution?
4. Under what circumstances can the government collect
infor... | pdf |
Code:
http://msdn.microsoft.com/library/default.asp?url=/library/en-
us/winui/winui/windowsuserinterface/windowing/windows/windowreference/windowfun
ctions/winmain.asp
http://msdn.microsoft.com/library/default.asp?url=/library/en-
us/dllproc/base/createprocess.asp
http://msdn.microsoft.com/library/default.asp?url=/libr... | pdf |
Make JDBC Attack Brilliant Again
Xu Yuanzhen( @pyn3rd)
Chen Hongkun( @Litch1)
1.The derivation of JDBC attacking
2.In-depth analysis of occurred implementations
3.Set fire on JDBC of diverse applications
Agenda
Agenda
1.The derivation of JDBC attacking
2.In-depth analysis of occurred implementations
3.Set fire ... | pdf |
--send-ip
-Pn -sn
--disable-arp-ping --send-ip
nmap-
0x00 -sL
0x01 -sn(-sP)
0x02 -Pn
-PS22,80,113 -PS22-50
-PS -PA
ping -M time
ping -M mask
0x03 -PS
0x04 -PA
0x05 -PU
0x06 -PY
0x07 -PE; -PP; -PM (ICMP Ping Types)
0x08 -PO
0x09
0x10 | pdf |
How Hackers Won the
Zombie Apocalypse
Quahogcon - Providence, RI - April 23-25 2010
Dennis Brown
QuahogCon
July 2010
Introduction
● What is Quahogcon
● New regional con in Rhode Island
● Focusing on Infosec and Maker Culture
● Who am I?
● Dennis Brown – Quahogcon Organizer
– DC401 – Rhode Island Defcon Group
– Day Job... | pdf |
假期看了下linux rootkit的资料,想⾃⼰实现⼀个来着,整理了⼀些参考资料和代码。我的想法是rootkit主要作为
后渗透维权的⼀种⽅式,能主要⽤于隐蔽⾃⼰以及能够⽅便触发,想实现的功能也很简单,就是类似发送⼀个特定
的tcp/udp/icmp包就能触发后⻔,反弹⼀个shell或者返回⼀段加密的内容。
⼀些历史
1. 先是 LD_PRELOAD ,⽤户态,使⽤劫持动态链接库的⼿段可以⽅便hook⼀些函数以达到隐藏的⽬的。
2. Kernel Module ,即编译linux内核,修改⾥⾯的代码达到⽬的,但编译内核不太现实,linux提供了⼀个插
件化的⽅式,通过编译⼀个 .ko ⽂件动态加载⾃定义的内核功能,在内核态,就是操... | pdf |
http://
toool us
Lockpicking
Next Lesson…
3:30
http:// .us .
http://
toool us
Is Everyone Ready to Learn?
http://
toool us
Is Everyone Ready to Learn… About
Lockpicking?
http://
toool us
Lockpicking is Fun, Fun, Fun!
http://
toool us
First, a word about rules…
Yes, we have rules. J
1. Do not pick som... | pdf |
Hacking JSON
CONTENTS
目录
1
3
4
JSON 介绍
Gadgets
JSON 反序
列化
2
tricks
fastjson 在
GitHub 上有着 24.9K+ 的 star,
是一个深
受 Java 开发者
欢迎
的开源
JSON 解析
器
,
它
可以解析
JSON格式
的字符串,
支持将
Java Bean转
为JSON字符串,
也可以从JSON字符串反序
列化到JavaBean,
或是将字符串解析
为 JSON 对象 。
fastjson 介绍
JSON 要转
为 JavaBean 通
常
必须开启
autotype,
而 autotype 默
认情
况下是关闭状
态,
所
以不
能
够在... | pdf |
Go默认编译会自带一堆信息,通过这些信息基本可以还原Go的源码架构,
本文就是研究如何消除或者混淆这些信息,记录了这个研究过程,如果不想看可以直接跳到文章末尾,
文章末尾提供了一款工具,可以一键消除Go二进制中的这些敏感信息。
但还是推荐看看研究过程,可以明白这个工具的运行原理。
从逆向Go开始
先写一个简单的程序
我的go版本是
编译
它运行后会如下输出
go version go1.16.2 windows/amd64
package main
import (
"fmt"
"log"
"math/rand"
)
func main() {
fmt.Println("hello world!")
... | pdf |
Unboxing Android
Everything you wanted to know about Android packers
Slava Makkaveev
Avi Bashan
Who Are We?
@Avi
R&D Team Leader at Check Point, former security
researcher at Lacoon Mobile Security.
Experienced in OS Internal research, mobile security, linux
kernel.
@Slava
Senior Security Researcher at Check Point, ... | pdf |
1
Cobalt Strike快乐星球
前⾔
快乐星球
Patch CVE-2021-36798
漏洞描述
漏洞影响范围
漏洞成因分析
漏洞缓解⽅案
修复效果验证
Patch CVE-2022-23317
漏洞描述
漏洞影响范围
漏洞复现
漏洞缓解⽅案
修复效果验证
Bypass beacon-eye
绕过原理
绕过BeaconEye
测试效果
Modify xor key
Modify team server authentication header
Beauty UI
Bypass 360
Setchar
出现问题
修复过程
实现效果
破解补丁
使⽤⽅法
2
下个版本
参考资料
感谢<<安全的⽭与盾>>星球⼤佬让我⽩嫖了许多东... | pdf |
LEARN HOW TO CONTROL EVERY ROOM
AT A LUXURY HOTEL REMOTELY: THE
DANGERS OF INSECURE HOME
AUTOMATION DEPLOYMENT
Jesus Molina
@verifythentrust
security@nomeames.com
1
Abstract
The St. Regis ShenZhen, a gorgeous luxury hotel occupying the top 28 floors of a 100
story skyscraper, o↵ers guests a unique feature: a room remote... | pdf |
Mouse Jiggler Offense & Defense
Dr. Phil
@ppolstra
Why this talk?
● Mouse jigglers now standard for LEOs
● Full disk encryption is worthless if logged in
● Building your own jiggler can be fun
What is a mouse jiggler?
● Used to keep computer awake & unlocked
● Can be used as a prank
● Types
– Software
● Not what this t... | pdf |
http://Irongeek.com
Adrian Crenshaw
http://Irongeek.com
I run Irongeek.com
I have an interest in InfoSec
education
I don’t know everything - I’m just a
geek with time on my hands
Sr. Information Security Consultant
at TrustedSec
Co-Founder of Derbycon
http://www.derbycon.com
Twitter: @Irongeek_ADC
http:/... | pdf |
1
2
We all hear about
anti-phishing gadgets
that cost an arm and a
leg.
I’m here to tell you
why you’ll pay for it,
even though it
doesn’t work.
Because you’re going to
fall into the trap, just
like everyone else. Plan
to fail now.
Let’s get on with it.
3
"Please mail us your
username, password
an... | pdf |
Recurity Labs GmbH
http://www.recurity-labs.com
July 26, 2009
Cisco IOS Router Exploitation
A map of the problem space
Abstract
This paper describes the challenges with the exploitation of memory corruption software vulnerabilities
in Cisco IOS. The goal is to map out the problem space in order to allow for the an... | pdf |
Hacking SQL Injection for Remote
Code Execution on a LAMP stack.
Lance Buttars aka Nemus
Updated Slides @
https://www.introtobackdoors.com
Who am I?
Just some guy who likes computer security.
Twitter @Nemus801
I work as a PHP/Python application programmer.
I am a member of the local
Defcon Group www.dc801.org
Freen... | pdf |
1
The Journey Of Hunting ITW Windows LPE 0day
Quan Jin <twitter: @jq0904>
DBAPPSecurity
Black Hat USA 2022
Contents
The Journey Of Hunting ITW Windows LPE 0day ....................................................................................1
Abstract.............................................................. | pdf |
DNS Data Exfiltration
Using SQL Injection
Bob Ricks
G2, Inc.
SQL Injection
• We assume knowledge of how it
works
• Basic types of data exfiltration
• Verbose
• Displayed on page
• Error based
• Blind
• Timing
• HTTP Request
• Change in page
• DNS Exfiltration
Related Work on DNS
Exfiltration
• http://pentestmonkey.net/... | pdf |
做为攻击者那些年的一些想法
今年职业上有了一点小变动,从一个攻击者变成了一个防御者。于是想把作为攻击者的一些想法写下来
和大家交流。
某大型攻防演练暂告段落,攻击者们在弹冠相庆之后纷纷借着五一休假了。攻击方投入越来越大,攻击
模式的体系化、流程化;攻击工具工程化、实战化,以肉眼可见的速度发展着。作为一个曾经的攻击
者,内心是非常激动的。虽然已是局外人,但每每听到攻击方的故事,还是会热血沸腾。
我眼中的红队
曾经和朋友聊什么是红队?怎么做一只符合国情的红队?也阅读过很多国外红队报告,一度被各种高超
的红队技巧迷花了眼。都说红队是在模仿APT攻击,但在前公司有幸参加“金链熊”分析后。我意识到红队
如果是以模仿APT的路子走是不对的。红队... | pdf |
Java安全之反序列化回显研究
0x00 前言
续上文反序列化回显与内存马,继续来看看反序列化回显的方式。上篇文中其实是利用中间件中存储的
Request 和 Response 对象来进行回显。但并不止这么一种方式。
0x01 回显方式
1. 中间件回显
2. defineClass
3. Linux描述符回显
4. RMI绑定实例
5. URLClassLoader抛出异常
6. 写文件css、js
7. dnslog
defineClass异常回显
异常类:
package com.nice0e3;
import java.io.BufferedReader;
import java.io.InputStream;
impor... | pdf |
Bitcoin Security
陳君明 Jimmy Chen
林志宏 Chris Lin
jmchen@chroot.org
meconin@gmail.com
August 19, 2014
InfoKeyVault Technology
Agenda
• Introduction to Bitcoin
• Security of Bitcoin
• Hardware Wallet
2
Agenda
• Introduction to Bitcoin
- Expanding Economy
- Birth of Bitcoin
- Cryptographic ... | pdf |
CastGuard
Joe Bialek – Microsoft Offensive Research &
Security Engineering (MORSE)
Twitter: @JosephBialek
Problem Space
Killing Bugs vs. Killing Exploit Techniques
Mitigating exploit techniques has ambiguous long-term value.
Mitigations are typically far enough away from actual bug that bugs
are still exploitable usi... | pdf |
针对域证书服务的攻击(4)- ESC4
0x00 前言
ESC4叫做“Vulnerable Certificate Template Access Control”,其实是弱ACL的证书模板会导致域提权。
写完ESC1-ESC3,ESC4由于白皮书没有比较详细的过程,并且我本地域环境出了点问题,就搁置到现
在。但是国庆的时候,看见国外的研究员发布了一篇关于ESC4的文章:https://github.com/daem0nc0
re/Abusing_Weak_ACL_on_Certificate_Templates,减少了我很多工作量。我们知道每个模板都有自己
的权限控制策略,ESC4利用的就是这个权限控制不严格,例如:domain ... | pdf |
/sf/app/apache_portal/bin/httpd
/etc/profile/root/.bash_profile
/etc/bashrc/root/.bashrc
/etc/profile.d/*.sh/etc/profile.d/lang.sh
/etc/sysconfig/i18n/etc/rc.local/etc/rc.d/rc.local
/etc/rc.local
/etc/rc.d/rc.local
/etc/profile.d/
/etc/init.d
systemctl
systemctl list-units --type=service
/usr/lib/systemd/system
cron... | pdf |
BRAIN GAMES
Make your own Biofeedback Video Game
Ne0nRa1n
That Strange Little 'Brain Girl'
Joe Grand aka Kingpin
www.kingpinempire.com
Biofeedback
The definition of biofeedback
The technique of using monitoring devices to
obtain information about an involuntary function of
the central or autonomic nervous system, suc... | pdf |
常規攻擊的
實時檢測 ( WEB APP )
amxku
攜程安全 // sec.ctrip.com
# About me
- Security Architect at Ctrip
- @amxku
- sebug.net // sec.ctrip.com
OWASP Top10
• Scanner(vul/info)
• Spam(info/login/register)
• Trojan(gh0st RAT)
• On-line/Off-line
On-line
WEB APP LOG
Real-time // Analysis // Dashboard
任务I度
applog
... | pdf |
Technical Service Bulletin:
FXR-16
Modifying GE PCS VHF Group 2
150 – 174 MHz for
Amateur Radio Applications
in the 219 – 220 & 222 – 225 MHz Band
A FluX Research project in several
phases
Release Date: 04-01-2011
Last Update: v1.2 03-01-2011
By: Matt Krick, K3MK
matt@kgmn.net
Radio Model #:
GE PCS - PC1H3A02
PC2H... | pdf |
The good and bad about
Streaming media
How streaming media can be
stolen and how to protect it.
Who are you?
tommEE pickles
Crazy clown from
NYC
Lives in LA
Single
Arrested, Jailed…
Media Whored…
Likes to drink
Qualifications
Over 12 years of commercial computer
experience
Worked on Computer Radar Controlled
Weap... | pdf |
Impostor
Polluting Tor Metadata
Mike Larsen
Charlie Vedaa
tl;dr
example Snort rule-
alert tcp $HOME_NET any -> $EXTERNAL_NET 9030:9031
(msg:"POLICY-OTHER TOR traffic anonymizer server
request"; flow:established,to_server; content:"GET
/tor/server"; fast_pattern:only; classtype:policy-violation;
sid:9324; rev:... | pdf |
Nu1L-Writeup
Web
Time, grasp is gold, catch up is running water.
查看源码可以得到管理员邮箱,重置密码时候大小写过滤不严,导致可以拿到
重置密码的连接,然后发现 token 参数是 md5(time()),并且提示 ip 不符合,猜
测 xff,但服务器时间与 token 的时间相差 8h,于是遍历,然后重置密码。
进入后台,存在 XXE 漏洞,blindxxe,然后最后拿到 flag:
简陋的博客
变量覆盖,只过滤 get,没过滤 post,经过测试,发现是参数是拼接到反引号,
于是就很容易了:
山水集团
打开商品列表,看到页面里那个分享里有个能转换 ... | pdf |
BlindElephant:
Web Application Fingerprinting
With Static Files
Patrick Thomas
7/28/10
Outline
• Web Apps & Security
• Intro to Fingerprinting
• Static File Approach
• Observations From A Net Survey
• Q & A
2
Well-Known Web Applications
• Every conceivable use…
• Content Management/Blogging
• Forums
• Email
• E-Commer... | pdf |
攻击内⽹的另类⽅式——host碰撞实践指南
清⽔川崎@滴滴SSTG
0x00.前⾔
在当前的攻防实战当中,想要突破⽬标边界进入内⽹的⽅式无非有以下⼏种⽅式:
1.RCE/RCI(远程代码执⾏/远程命令注入)
2.VPN弱⼝令
3.SSRF漏洞
4.SQLI
5.⽂件上传
6.物理攻击/社⼯钓⻥
但是有⼀种依靠⻓期信息收集才能提升攻击成功率的⽅式往往被忽略,那就是host
碰撞。
0x01.本质
host碰撞这种攻击⽅式本质上是nginx配置不当容易产⽣的安全问题。 nginx⼀般⽤
于做外⽹代理,配置也比较⽅便,但是配置不当的时候会产⽣⼀些安全问题。其中
包括各个⼤⼚也都出现过(这⾥我就不点名是哪些互联⽹⼤⼚了)。 外⽹部署服务⼀
... | pdf |
Over the Air Remote Code
Execution on the
DEF CON 27 Badge via NFMI
World’s first NFMI exploitation, sorta
or
OTARCEDC27NFMIOMGWTFBBQ
Agenda
1.
Introduction
2.
Intro to the Badge
3.
Buffer Overflow and Proof of Concept
4.
NFMI Specs
5.
Convert Analog Signal into Symbols
6.
Convert Symbols to Bytes
7.
Reverse Engineer... | pdf |
Hacking the Cloud
Gerald Steere – Microsoft C+E Red Team (@Darkpawh)
Sean Metcalf – CTO Trimarc (@pyrotek3)
Gerald Steere - @darkpawh
10+ years experience as a penetration tester and red team operator
Member of C+E Red Team since 2014
Speaker at BlueHat and Bsides Seattle
Spends work days happily smashing atoms in Az... | pdf |
SSD
Data
Evapora+on
DEF
CON
21
August
2,
2013
Bio
Data
Remanence
Deleted
Data
• On
magne+c
hard
disks,
data
remains
+ll
it
is
overwriEen
•
Image
from
www.howstuffworks.com
DEMO
on
Windows
• Observing
data
on
a
magne+c
hard
disk
aMe... | pdf |
Mimicry: An
Introduction
By Mystic
What is Mimicry?
The ability to survive by mimicking surroundings
What is Mimicry?
The ability to survive by mimicking surroundings
Visibility of encryption
What is Mimicry?
The ability to survive by mimicking surroundings
Visibility of encryption
Grammar filtering to fin... | pdf |
July 27-30, 2017
1
2
3
4
5
6
7
8
9
10
11
12
Max Bazaliy
Jailbreaking
Apple Watch
July 27-30, 2017
whoami
1
2
3
4
5
6
7
8
9
10
11
12
o Security researcher at Lookout
o Lead researcher on Pegasus exploit chain
o Focused on advanced exploitation techniques
o Fried Apple team co-found... | pdf |
黃建忠 (from TAIWAN)
whoami
● 現任研究生
● Linux 愛好者,關注系統安全領域
● 不是哪個資 ( ㄏㄞ ˋ) 安 ( ㄎㄜ ˋ) 組織或
公司的成員
● 簡單說就是一個路人 QQ
今天講什麼?
● 一點點的除錯器 (debugger) 實現原理
● Memory search
● Code injection
● Dynamic library function hooking
易
一點點難
題目有點簡單 ......
今天的目標
●本投影片提供足夠的資
訊,希望讓各位看完後,
都有能力自己實作相關技
術
我們需要的東西
● 一台 Linux 機器 (64 位元 ) Linux Mint 17
● Py... | pdf |
||||||||||||||||||||
||||||||||||||||||||
ATTACKING NETWORK PROTOCOLS
A Hacker’s Guide to Capture, Analysis, and Exploitation
by James Forshaw
San Francisco
||||||||||||||||||||
||||||||||||||||||||
ATTACKING NETWORK PROTOCOLS. Copyright © 2018 by James Forshaw.
All rights reserved. No part of this work may be reproduc... | pdf |
REVIEW OF WEB APPLICATIONS SECURITY
AND INTRUSION DETECTION
IN AIR TRAFFIC CONTROL SYSTEMS
Federal Aviation Administration
Report Number: FI-2009-049
Date Issued: May 4, 2009
Memorandum
U.S. Department of
Transportation
Office of the Secretary
of Transportation
Office of Inspector General
Subject:
ACTION... | pdf |
THE EVOLUTION OF ANDROID APP PACKING
AND UNPACKING TECHNIQUES
THIS IS NOT GOING TO END
YAJIN ZHOU
HITCON2016
ABOUT ME
▸ Earned P.h.D. in Computer Science from NC State
University
▸ Research mainly focuses on smartphone and system
security
▸ Now involving in C0RE Team
▸ More information: http://yajin.org
2
HITCON2... | pdf |
云虚拟化安全:QEMU的安全探索
和防御
0 1
钱文祥
(@leonwxqian) Tencent Blade Team高级安全研究员
•
云虚拟化、IoT、浏览器等安全研究
•
发现NVIDIA vGPU等逃逸漏洞、Amazon Echo、Google Home音箱、浏览器中“麦哲伦”
(SQLite)、Curl的多个远程代码执行漏洞等
•
多次在著名会议上参讲
0 2
n
Tencent Blade Team由腾讯安全平台部在2017年底成立
n
专注于AIoT,移动互联网,云虚拟化技术,可信计算等前沿领域的安全技术研究
n
向Google、Microsoft、 Apple、Amazon、Huawei等诸多国际知名公司报告过2... | pdf |
Anton “Bo0oM” Lopanitsyn
FTP2RCE
FTP - Active mode
Command channel
Data channel
Port 21
Client’s port
Client’s port
PORT 95,213,200,115,31,144
31*256+144
95.213.200.115
127.0.0.1:8080, OK
What about redis?
https://medium.com/@knownsec404team/rce-exploits-of-redis-based-on-master-slave-replication-ef7a664ce1d0
https://2... | pdf |
漫 谈 A O S P 蓝 牙 漏 洞 挖 掘 技 术
韩子诺 OPPO安珀实验室
关于我
•
韩子诺(ele7enxxh),OPPO安珀实验室高级安全专家,主要研究领域为Android安全,IoT
安全和车联网安全。在二进制漏洞挖掘与利用方面拥有6年以上相关经验;
•
曾在Ruxcon,Zer0Con和Pacsec等多个国际知名会议进行技术演讲;
•
截至目前,累计独立获得Android数百个CVE编号,Google Bug Hunters排行榜第8,
Hackerone高通致谢榜2022年度第1;
•
联系我:ele7enxxh(weibo | weixin | github);
议程
•
背景
•
Android蓝牙协议栈发展... | pdf |
OpenBSD Remote Exploit
”Only two remote holes in the default install”
Alfredo A. Ortega
July 5, 2007
Mbuf buffer overflow
Buffer overflow
Researching the “OpenBSD 008: RELIABILITY FIX” a new vulnerability was found: The m dup1() function causes
an overflow on the mbuf structure, used by the kernel to store network packets.
... | pdf |
Douglas Bienstock and Austin Baker
I AM AD FS AND SO CAN YOU
©2019 FireEye
©2019 FireEye
§ Whoami
§ What is AD FS and how does it work?
§ How do we find AD FS servers?
§ How can we attack AD FS?
§ How can we become (takeover) AD FS?
§ Tools and Demos
§ Best practices and mitigations
§ Goal: Understand AD FS, how we can... | pdf |
The Terminator to Android
Hardening Services
Yueqian Zhang, Xiapu Luo, Haoyang Yin
Department of Computing
The Hong Kong Polytechnic University
1
2
Source: Trend Micro
Percentage of top 10 apps in each category which have repacked version:
•100% of the apps of Widgets, Media & Video, etc.
•90% of the apps of ... | pdf |
HITB Write Up
CTYPTO
HASHINATOR
python脚本:
#! /usr/bin/env python3
# -*- coding: utf-8 -*-
import re
import os
import hashlib
import struct
import time
from base64 import b64encode
from pwn import *
context.log_level = "debug"
def md5(bytestring):
return hashlib.md5(bytestring).digest()
def sha(bytestrin... | pdf |
Cover Your APIs: Securing Your Hidden Web Attack Surface
WHITE PAPER
Securing Your
Hidden Web
Attack Surface
Cover Your APIs
</>
Cover Your APIs: Securing Your Hidden Web Attack Surface
+ The importance of web APIs and web services in
software development
+ The challenges of including APIs in application security
t... | pdf |
CAN I haz car secret plz?
Javier Vazquez Vidal
Henrik Ferdinand Nölscher
Who are we?
• Javier is a Hardware Security
Specialist
• Works at Code White as a
Product Security Engineer
• He is from Cadiz (Spain)
• Enjoys reversing products that
are interesting, or could
potentially be more fun
• Likes ake hen ... | pdf |
Fuzzing Malware for Fun & Profit. Applying Coverage-Guided
Fuzzing to Find Bugs in Modern Malware
Maksim Shudrak
DEF CON 26
About Me
BIO
2018 – present: Senior Offensive Security Researcher
2016: Defended PhD (Vulns Hunting) in Tomsk, Russia
2015-2017: Researcher, IBM Research, Haifa, Israel
2011-2015: Securit... | pdf |
1
2
● Who are we
● Background
● Picking our battles
● The web vuln
● Intermission
● Telematics
○ What is it
○ Local vulnerabilities discovered
○ Writing a blind exploit
○ Remote vulnerability
● Conclusion
● Questions
Jesse @jessemichael
Mickey @HackingThings
Alex @ABazhani... | pdf |
Asp 安全审计
http://hi.baidu.com/micropoor
1
ASP
ASP
ASP
ASP 代码安全审计
------PHP
------PHP
------PHP
------PHP 安全新闻早 8888 点特别篇
2012/3/20
注入漏洞:
1.Request.QueryString:获取地址栏参数(以及以 GET 方式提交的数据)
如:Request.QueryString("id")
2.Request.Form:
获取以 POST 方式提交的数据(接收 Form 提交来的数据)
如:Request.Form("id")
3.Request.Cookies:
获取浏览器 Cookier 信息。
4.... | pdf |
@glennzw // DefCon 22 August 2014
Digital Terrestrial Tracking: The Future of Surveillance
Glenn Wilkinson
SensePost
@glennzw
glenn@sensepost.com
ABSTRACT
In this paper, the terms Digital Terrestrial Tracking (DTT) and
Digital Terrestrial Footprint (DTF) are introduced. The DTF
defines the uniquely identifia... | pdf |
Behind the Scenes:
The Industry of Social Media Manipulation Driven by Malware
GoSecure Research
Masarah Paquet-Clouston, Olivier Bilodeau
Back in 2015-2016
Linux/Moose ?
Linux/Moose
An IoT botnet that
conducts social
media
manipulation
Social Media Manipulation
The Ecosystem of Social
Media Manipulation
Presenta... | pdf |
© 2012 @IDF.cn
安全改變未來 網絡使生活更美好
萬濤 ChinaEagle
IDF互聯網威懾防禦實驗室
中國電子學會計算機取證專家委員會
1
© 2012 @IDF.cn
雲計算模式下的安全和駭客經濟威脅趨勢
智慧的地球對安全的需求
這個星球變得越來越...
機械化,,,,
互聯 化
智能....化
““““我們在過去十年中看
到的變化比再之前90
90
90
90
年的總和都要多””””
Ad J. Scheepbouwer,
CEO, KPN Telecom
Privacy and identity
controls
Information protection
... | pdf |
智能合约消息调用攻防
隐形人真忙 [at] 百度安全
关于作者
ID:隐形人真忙
Title:百度安全工程师
Work:从事攻防技术研究 & 安全产品研发
Weibo:https://weibo.com/alivexploitcat
微博关注
以太坊架构与
攻击面介绍
EVM消息调
用原理剖析
消息调用攻防
议题总结
以太坊架构与攻击面介绍
以太坊架构以各个攻击面
Web3.js
传统Web安全漏洞
去中心化应用
智能合约层
EVM虚拟机
RPC层
Block Chain
Block
共
识
算
法
PoW
PoS
Miner
Network
P2P
Crypto
Solidity
…
Transaction
Database
Ag... | pdf |
Revolting Radios
Get it? It’s a pun!
Thanks
Mike Walters
Ang Cui
Schuyler St. Leger
Taylor Streetman
Sergey Bratus
Travis Goodspeed
A little background
“One of the things that makes Orwell's '1984' scary is the way it uses technology.
In Orwell’s dystopia, tech is a one-sided means of control. The powers that be
use ... | pdf |
Windows 安全 - 服务篇(2)
0x00 前言
上一篇主要是Windows服务的基础架构,这一篇主要记录服务账户。账户和安全的关系非常紧密,熟练
掌握服务账户的知识,对理解很多服务相关的安全问题是非常重要的。
服务账户涉及的知识非常多,除了基础的4类:Local System、Network Service、Local Service、
Service Account以外,还有服务隔离、虚拟服务账户、交互式服务检测、Session 0隔离。
0x01 服务账户
在早期的windows系统中,服务是运行在本地系统账户权限下的,例如:SYSTEM、LocalSystem。这个
权限是非常大的,后面慢慢出现了网络服务账户和本地服务... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.