text
stringlengths
100
9.93M
category
stringclasses
11 values
1 Hacking Iraq Hacking Iraq Michael Schearer ( Michael Schearer (““theprez98 theprez98””)) presents 2 Plan of Attack Plan of Attack Introduction Disclaimers My Background Why is the Navy in Iraq? Iraqi Communications Infrastructure IEDs Composition, Typology, Counter-IED Strategy The Future 3 Introduction Introduction ...
pdf
Smile for the Grenade! “Camera go BANG!” Vlad Gostomelsky Joshua A. Marpet Who are we? • Vlad Gostom @recompiler - Years of model rocketry and high power model rocketry • DARPA researcher – including future warrior combat system • Penetration Testing – Web Apps, networks, physical security (including banks) • Air F...
pdf
Porosity Decompiling Ethereum Smart-Contracts Matt Suiche (@msuiche) Founder, Comae Technologies m@comae.io Whoami @msuiche Comae Technologies OPCDE - www.opcde.com First time in Vegas since BlackHat 2011 Mainly Windows-related stuff CloudVolumes (VMware App Volumes) Memory Forensics for DFIR (Hibr2Bin, DumpIt...
pdf
© NCC Group 2021. All rights reserved Sleight of ARM: Demystifying Intel Houdini Brian Hong @im_eningeer whoami © NCC Group 2021. All rights reserved Brian S. Hong (@im_eningeer) • Hardware Enthusiast • Forward Reverse Engineer • Like to reverse low-level stuff and break embedded systems • Android Penetration Testing •...
pdf
How to get good seats in the security theater? Hacking boarding passes for fun and profit Przemek Jaroszewski przemj+defcon24@gmail.com $ whoami • head of the Polish national CSIRT (CERT Polska) • 10+ years of education in programming • Master’s degree in social psychology • 15 years of experience in IT security • avi...
pdf
Hacking the Cloud Gerald Steere – Microsoft C+E Red Team (@Darkpawh) Sean Metcalf – CTO Trimarc (@pyrotek3) Gerald Steere - @darkpawh 10+ years experience as a penetration tester and red team operator​ Member of C+E Red Team since 2014​ Speaker at BlueHat and Bsides Seattle Spends work days happily smashing atoms in Az...
pdf
Using a Malicious Proxy to Pilfer Data & Wreak Havoc Edward J. Zaborowski ed@thezees.net Abstract .................................................................................................................3 Malicious Web Proxy ..........................................................................................
pdf
Nginx_lua 100参数绕过原理详解 一、环境搭建 Nginx_lua 安装 https://github.com/openresty/lua-nginx-module#installation 安装完之后可以在nginx.conf 写入配置。可以动态在Nginx 层面进行过滤和调度 这里使用一个很简单的方式来展示绕过的原理 wget 'https://openresty.org/download/nginx-1.19.3.tar.gz' tar -xzvf nginx-1.19.3.tar.gz cd nginx-1.19.3/ # tell nginx's build system where to find Lua...
pdf
HCTF 2018 HCTF 2018 PWN the end babyprintf_ver2 easyexp christmas Reverse LuckyStar Seven PolishDuck Web kzone admin bottle | open | working: hide and seek Game | solved | working: Crypto xor game rsa?xor BlockChain Re:Ethereum from zero ez2win MISC freq game eazy dump Difficult programming language Guess My Key https://...
pdf
““SHADOW WALKER SHADOW WALKER”” Raising The Bar For Rootkit Detection Raising The Bar For Rootkit Detection by Sherri Sparks & Jamie Butler What Is A Rootkit? What Is A Rootkit? • Defining characteristic is stealth. – Viruses reproduce, but rootkits hide! • Greg Hoglund, author of NT Rootkit defines a rootkit as “a se...
pdf
Aaron Bayles DC101 @ DEF CON 22 19 years in IT/Infosec Worked in Oil & Gas (O&G) last 8 years Along the way Penetration testing Vulnerability assessment Network architecture, design & implementation Risk assessment Legacy equipment/comms Remote (geographic) connectivity Long lifecycle Power/spac...
pdf
www.quintessencelabs.com Are Quantum Computers Really A Threat To Cryptography? A Practical Overview Of Current State-Of-The-Art Techniques With Some Interesting Surprises ©2018 QuintessenceLabs. All rights reserved. Commercial in Confidence. Data Uncompromised • Cryptography & Malware Researcher at TrustDefender •...
pdf
One-Man Shop How to build a functional security program with limited resources DEF CON 22 One-Man Shop – Agenda • Caveats & Considerations • People and Processes • Network Architecture • System Design • Continuous Monitoring • External Validation • Compliance Security Program Hierarchy of Needs Compliance External Va...
pdf
Raspberry)MoCA) A)recipe)for)compromise) Andrew Hunt George Mason University ahunt5@gmu.edu Media over Coaxial Alliance •  8)–)12)large)companies) •  How)to)make)use)of)widely)deployed)coaxial)cabling)to)deliver) content?) –  Shielded) –  Lots)of)frequency)bandwidth) –  Carries)signal)500)feet) •  PHY/MAC)specificaL...
pdf
Overwri'ng  the  Excep'on  Handling Cache  Pointer  -­‐  Dwarf  Oriented Programming James  Oakley  (Electron) Electron100  *noSPAM*  gmail.com Rodrigo  Rubira  Branco  (@BSDaemon) rodrigo  *noSPAM*  kernelhacking.com Sergey  Bratus  (Sbratus) Sergey  *noSPAM*  cs.dartmou...
pdf
Advanced Inter-Process Desynchronization in SAP’s HTTP Server Martin Doyhenard Onapsis mdoyhenard@onapsis.com Abstract This paper will demonstrate how to leverage two memory corruption vulnerabilities found in SAP's proprietary HTTP Server, using high level protocol exploitation techniques. Both, CVE-2022-22536 and CVE...
pdf
Breaking the Chrome Sandbox with Mojo _tsuro@, 2022 No memory was corrupted in the making of this presentation Kernel Browser Process Renderer Renderer Renderer Renderer Network GPU Renderer Browser Process Network URLLoader NetworkService NetworkContext ... RendererHost BlobRegistry GpuHost ... Renderer Browser Pro...
pdf
编号:APP-YJBG-2019-001 App 申请安卓系统权限机制 分析与建议 (V1.0 版) App 专项治理工作组 2019-05 目 录 一、前言............................................................ 1 二、安卓系统简介.................................................... 2 三、安卓系统权限分类................................................ 3 四、收集使用个人信息相关权限.................................
pdf
HAM FOR HACKERS TAKE BACK THE AIRWAVES JonM – DEFCON 16 JonM  Licensed Amateur Extra—the highest class of license in the US  Operating since 2000  Radio is just one of my hobbies…software security consulting is the most lucrative You want to play with wireless…  Remote control  Data links  Personal communicatio...
pdf
The ABC of Next-Gen Shellcoding @ DEF CON 27 11 Aug 2019 1 / 42 The ABC of Next-Gen Shellcoding Hadrien Barral, R´emi G´eraud-Stewart, Georges-Axel Jaloyan, David Naccache ´Ecole normale sup´erieure, PSL Research University What we’re interested in today ⌅ Embedded devices, especially smartphones. ⌅ Many people have ph...
pdf
1" MODERN MALWARE: OBFUSCATION AND EMULATION DEF"CON"CHINA"1.0"(2019)" DEF CON CHINA 1.0 (2019) by Alexandre Borges ALEXANDRE"BORGES"–"MALWARE"AND"SECURITY"RESEARCHER" DEF"CON"CHINA"1.0"(2019)" 2" ü  Malware and Security Researcher. " ü  Speaker at DEFCON USA 2018 ü  Speaker at HITB 2019 Amsterdam ü  Speaker at...
pdf
0x01 /apisix/admin/migrate/export /apisix/admin/migrate/import RCE Author: TheKingOfDuck@JJ Group 1 https://github.com/apache/apisix-docker 1 0x02 ​ 0x03
pdf
#BHUSA @BlackHatEvents Dragon Tails: Preserving Supply- Side Vulnerability Disclosure Stewart Scott, Trey Herr Sara Ann Brackett, Yumi Gambrill, Emmeline Nettles #BHUSA @BlackHatEvents Information Classification: General Supply-Side Vulnerability Research ▪ What are sources of security? ▪ Global bug-bounty market si...
pdf
Smashing  The  Browser: From  Vulnerability  Discovery  To  Exploit Chen  Zhang  (@demi6od) NSFOCUS  Security  Team demi6d@gmail.com h>ps://github.com/demi6od Date:  2014  August  19th Agenda •  Who  am  I •  Stage1  -­‐  Browser  Fuzzing  Technology •  Stage  2  -­‐ ...
pdf
! " # $ % & & & ' ! " # $%& ' %& ! " ( ( '$)) *+%& $,%- ! Æ " . ( " . , / ' 0 1 0 , 2 " . " 0 " ' . $%& ' %& ! 3 . ' 4 ' " 5 , . ' 6 7 8 4 8 ( ( . ' . 5 ' 5 8 0 0 . " # . 9 8 0 . : : ; 0 . . . 0 " Æ 8 " . < : . 2 . 0 $ 0 . . . . : . & 4 9 - . , ' 0 : - . . = 4 > . > ? @ 5 A> ! 8 2 ' # ' 05 ' B " ' Æ " 8 25 8 2 , 0 . 4...
pdf
深入浅出云计算安全 吴翰清 2012-07 Who am I? •  Alibaba security (7 years) (3个月,1w册) icloud是云吗? 互联网未来的入口 随时随地上网 改变了使用互联网的方式 但这不是传统意义的云计算 云计算的前世今生 电厂模式 Utility Computing 网格计算 云计算 云计算的使命 Computing as Utility 两种云计算 弹性计算 海量数据计算 弹性计算改变建站方式 按需使用,按需付费 专业运维服务化 快速部署,自助开通 互联网的长尾用户 中小站长、创业者 运营商、政府、公安、金融 “奢侈...
pdf
PINATA //PIN Automatic Try Attack Salvador Mendoza Security Researcher Ocelot Offensive Security Team Esta información es propiedad de Metabase Q, Inc., ©Todos los Derechos Reservados metabaseq.com contact@metabaseq.com 03 02 01 Agenda Introduction to terminology EMV Transaction Flow Inadequat...
pdf
beholder DefCon 16 Beholder Nelson Murilo nelson(at)pangeia.com.br Luiz Eduardo le (at) atelophobia.net beholder DefCon 16 Agenda  Who are we?  Evolution of WiFi attacks  Attack tools  Threats  Solutions  The inner of Beholder?  What does Beholder detect?  What Beholder doesn't do  Scenarios  Futures beholder...
pdf
Oh Sieng Chye, Researcher ESET ASIA (Singapore) ESET Researchers Acknowledgement 2 Partners Acknowledgement 3 Introduction ESET research team published a paper titled "Operation Windigo", detailing how thousands of Linux and Unix servers were compromised, and used to steal SSH credentials, and redirect web visitors t...
pdf
© 2021 TXOne Networks Inc. Taking Apart and Taking Over ICS-SCADA Ecosystems A Case Study of Mitsubishi Electric Mars Cheng Selmon Yang August, 2021 @DEF CON 29 © 2021 TXOne Networks Inc. Who are we? A subsidiary company under Keep the Operation Running Threat Defense Expertise Industry Adaptive Solution OT-Focused...
pdf
!"#$%&%' ()*+'",'$-+'' ./$"0%$+1'(+1'2+%0' !"#$"%&'()*+%' ,"-./0"+%$"12%-' !"#$"%#&' !  !"#$%&'()*+ !  ,'&-")"+ !  ./0-&/1(-2*+!'-0+ !  3'0-42567'/-"-/')+ !  !28"9/'&+:'*/;#"-/')+ !  <02&+=)-2&>"#2+ ?8/0+@'&$+@"0+A"*2+6'00/172+-8&'(%8+.BC3BD0+ ,E12&+F"0-+?&"#$+6&'%&"AG+ ()*+'+)%,'+*-.'%,'/0+' !  H'-+"+,'&-")"+-(-'&/"7+...
pdf
DesperateCat 题⽬环境 JDK8u311 Tomcat9.0.56 分析 ⾸先拿到这个源码我们看什么 看web.xml,从这⾥我们发现只有⼀个类,简简单单⼏秒看完这个函数 不想贴代码了,占地⽅,总结说来提供了⼀个POST⽅法,这⾥能让我们去上传任意⽂件,配 合部分的任意内容,为什么是部分呢,请看下⾯ <servlet> <servlet-name>ExportServlet</servlet-name> <servlet-class>org.rwctf.servlets.ExportServlet</servlet-class> </servlet> <servlet-mapp...
pdf
实战攻防演习之 蓝队视角下的防御体系构建 1 实战攻防演习之 蓝队视角下的防御体系构建 3 前 言 网络实战攻防演习,是新形势下关键信息系统网络 安全保护工作的重要组成部分。演习通常是以实际运 行的信息系统为保护目标,通过有监督的攻防对抗, 最大限度地模拟真实的网络攻击,以此来检验信息系 统的实际安全性和运维保障的实际有效性。 2016年以来,在国家监管机构的有力推动下,网 络实战攻防演习日益得到重视,演习范围越来越广, 演习周期越来越长,演习规模越来越大。国家有关部 门组织的全国性网络实战攻防演习从2016年仅有几家 参演单位,到2019年已扩展到上百家参演单位;同时 各省、各市、各行业的监管机构,也都在积极地筹备 和组织各...
pdf
So You Got Arrested at DefCon... Thursday, July 30 DefCon 17 Jim Rennie Disclaimer This is not legal advice. The presenter is not your lawyer (yet). This talk is not a substitute for legal advice. This is for edutainment purposes only. If you really get arrested, consult your attorney. Crimes you migh...
pdf
Java代码审计之基础开发 1 Java代码审计之基础开发 Author Catsay Type 审计 完成 感悟 啥都不会 时间 数据类型与运算符 Java和PHP不同,他不是⼀个弱类型的语⾔。 编写主⽅法 main()⽅法是类体中的主⽅法,该⽅法从{开始到}结束。Public、Static和void分别是main()⽅法的权限修饰符、静态修饰符和 返回值修饰符,Java程序中的main()⽅法必须声明为:public static void ,其中String[] args是⼀个字符串类型的数组,它是 main()⽅法的参数 创建项⽬ 我们这⾥使⽤的是IDEA,⾸先去创建⼀个Java项⽬,然后创建⼀个包 然后在包...
pdf
如何去挖掘物联网环境中的高级恶意软件威胁 叶根深 360网络安全研究院研究员 $ whoami Email:yegenshen@360.cn Twitter/WeChat:@zom3y3 Network Security Researcher @360Netlab TO BE A MALWARE HUNTER! #Botnet #Pentest #Honeypot #Sandbox PART 01 背景介绍 目录 CONTENTS PART 02 IoT安全现状 PART 03 挖掘未知的IoT Exploit PART 04 挖掘未知的IoT Botnet 01 03 04 02 PART 05 总结 05 PART 01 背...
pdf
Stalking a City for Fun and Frivolity “Pull pin, point toward privacy insurance claimant” DRAFT SLIDES Please go to http://www.maliceafterthought.com for updated slides Brendan O’Connor Malice Afterthought, Inc. Hi! I’m Brendan • CTO/DSS, Malice Afterthought • Law Student: IANAL(Y) • Anything you hear in this present...
pdf
Through the Looking-Glass, and What Eve Found There Luca Bruno, Mariano Graziano, Davide Balzarotti, Aur´elien Francillon EURECOM {firstname.lastname}@eurecom.fr Abstract Looking-glasses are web applications commonly de- ployed by Autonomous Systems to offer restricted web access to their routing infrastructure, in orde...
pdf
做红队你需要学习“如何挖掘战壕”(一) 0x00 前言 看到红队和战壕,相信做红队或者蓝军的同学应该知道我想聊什么了?今天和大家聊一聊红队的基础设 施。 19年的时候为了准备一个PPT,系统的梳理了下红队的基础设施,现在写出来算是抄冷饭了,希望对大 家依旧有用。我曾经大言不惭的说过一句话“在红队行动中,完善的基础设施是成功的一半”。虽有夸 张,却无不当。在这儿做个形象的比喻,搭建基础设施,类似于打仗前挖的战壕。战壕不仅是个人掩 体,还是部队作战、输送和补给的场地。战壕置于战争的作用,就是基础设施置于红队行动的作用。对 军事有兴趣的同学可以百度“如何挖掘战壕”。回归正题,所谓的红队的基础设施具体的是什么?下文中 红队的基础设施,全部以...
pdf
4.2 Manual Strategic Cyber LLC (A HelpSystems Company) www.cobaltstrike.com/ / 2/ Table of Contents Table&of&Contents&..................................................................................................................................&2/ 1.&Welcome&to&Cobalt&Strike&.......................................
pdf
Top Ten Legal Questions* DEFCON 13 Jennifer S. Granick 1. Is it legal to sniff wireless networks? 2. What are the state and federal laws regulating access to computer systems? 3. How did the USA PATRIOT Act change computer crime investigation and prosecution? 4. Under what circumstances can the government collect infor...
pdf
Code: http://msdn.microsoft.com/library/default.asp?url=/library/en- us/winui/winui/windowsuserinterface/windowing/windows/windowreference/windowfun ctions/winmain.asp http://msdn.microsoft.com/library/default.asp?url=/library/en- us/dllproc/base/createprocess.asp http://msdn.microsoft.com/library/default.asp?url=/libr...
pdf
Make JDBC Attack Brilliant Again Xu Yuanzhen( @pyn3rd) Chen Hongkun( @Litch1) 1.The derivation of JDBC attacking 2.In-depth analysis of occurred implementations 3.Set fire on JDBC of diverse applications Agenda Agenda 1.The derivation of JDBC attacking 2.In-depth analysis of occurred implementations 3.Set fire ...
pdf
​ --send-ip ​ -Pn -sn --disable-arp-ping --send-ip nmap- 0x00 -sL 0x01 -sn(-sP) 0x02 -Pn -PS22,80,113 -PS22-50 -PS -PA ping -M time ping -M mask 0x03 -PS 0x04 -PA 0x05 -PU 0x06 -PY 0x07 -PE; -PP; -PM (ICMP Ping Types) ​ ​ ​ ​ 0x08 -PO 0x09 0x10
pdf
How Hackers Won the Zombie Apocalypse Quahogcon - Providence, RI - April 23-25 2010 Dennis Brown QuahogCon July 2010 Introduction ● What is Quahogcon ● New regional con in Rhode Island ● Focusing on Infosec and Maker Culture ● Who am I? ● Dennis Brown – Quahogcon Organizer – DC401 – Rhode Island Defcon Group – Day Job...
pdf
假期看了下linux rootkit的资料,想⾃⼰实现⼀个来着,整理了⼀些参考资料和代码。我的想法是rootkit主要作为 后渗透维权的⼀种⽅式,能主要⽤于隐蔽⾃⼰以及能够⽅便触发,想实现的功能也很简单,就是类似发送⼀个特定 的tcp/udp/icmp包就能触发后⻔,反弹⼀个shell或者返回⼀段加密的内容。 ⼀些历史 1. 先是 LD_PRELOAD ,⽤户态,使⽤劫持动态链接库的⼿段可以⽅便hook⼀些函数以达到隐藏的⽬的。 2. Kernel Module ,即编译linux内核,修改⾥⾯的代码达到⽬的,但编译内核不太现实,linux提供了⼀个插 件化的⽅式,通过编译⼀个 .ko ⽂件动态加载⾃定义的内核功能,在内核态,就是操...
pdf
http:// toool us Lockpicking Next Lesson… 3:30 http:// .us . http:// toool us Is Everyone Ready to Learn? http:// toool us Is Everyone Ready to Learn… About Lockpicking? http:// toool us Lockpicking is Fun, Fun, Fun! http:// toool us First, a word about rules… Yes, we have rules. J 1. Do not pick som...
pdf
Hacking JSON CONTENTS 目录 1 3 4 JSON 介绍 Gadgets JSON 反序 列化 2 tricks fastjson 在 GitHub 上有着 24.9K+ 的 star, 是一个深 受 Java 开发者 欢迎 的开源 JSON 解析 器 , 它 可以解析 JSON格式 的字符串, 支持将 Java Bean转 为JSON字符串, 也可以从JSON字符串反序 列化到JavaBean, 或是将字符串解析 为 JSON 对象 。 fastjson 介绍 JSON 要转 为 JavaBean 通 常 必须开启 autotype, 而 autotype 默 认情 况下是关闭状 态, 所 以不 能 够在...
pdf
Go默认编译会自带一堆信息,通过这些信息基本可以还原Go的源码架构, 本文就是研究如何消除或者混淆这些信息,记录了这个研究过程,如果不想看可以直接跳到文章末尾, 文章末尾提供了一款工具,可以一键消除Go二进制中的这些敏感信息。 但还是推荐看看研究过程,可以明白这个工具的运行原理。 从逆向Go开始 先写一个简单的程序 我的go版本是 编译 它运行后会如下输出 go version go1.16.2 windows/amd64 package main import ( "fmt" "log" "math/rand" ) func main() { fmt.Println("hello world!") ...
pdf
Unboxing Android Everything you wanted to know about Android packers Slava Makkaveev Avi Bashan Who Are We? @Avi R&D Team Leader at Check Point, former security researcher at Lacoon Mobile Security. Experienced in OS Internal research, mobile security, linux kernel. @Slava Senior Security Researcher at Check Point, ...
pdf
1 Cobalt Strike快乐星球 前⾔ 快乐星球 Patch CVE-2021-36798 漏洞描述 漏洞影响范围 漏洞成因分析 漏洞缓解⽅案 修复效果验证 Patch CVE-2022-23317 漏洞描述 漏洞影响范围 漏洞复现 漏洞缓解⽅案 修复效果验证 Bypass beacon-eye 绕过原理 绕过BeaconEye 测试效果 Modify xor key Modify team server authentication header Beauty UI Bypass 360 Setchar 出现问题 修复过程 实现效果 破解补丁 使⽤⽅法 2 下个版本 参考资料 感谢<<安全的⽭与盾>>星球⼤佬让我⽩嫖了许多东...
pdf
LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT Jesus Molina @verifythentrust security@nomeames.com 1 Abstract The St. Regis ShenZhen, a gorgeous luxury hotel occupying the top 28 floors of a 100 story skyscraper, o↵ers guests a unique feature: a room remote...
pdf
Mouse Jiggler Offense & Defense Dr. Phil @ppolstra Why this talk? ● Mouse jigglers now standard for LEOs ● Full disk encryption is worthless if logged in ● Building your own jiggler can be fun What is a mouse jiggler? ● Used to keep computer awake & unlocked ● Can be used as a prank ● Types – Software ● Not what this t...
pdf
http://Irongeek.com Adrian Crenshaw http://Irongeek.com I run Irongeek.com I have an interest in InfoSec education I  don’t  know  everything  - I’m  just  a   geek with time on my hands Sr. Information Security Consultant at TrustedSec Co-Founder of Derbycon http://www.derbycon.com Twitter: @Irongeek_ADC http:/...
pdf
1 2  We all hear about anti-phishing gadgets that cost an arm and a leg.  I’m here to tell you why you’ll pay for it, even though it doesn’t work.  Because you’re going to fall into the trap, just like everyone else. Plan to fail now.  Let’s get on with it. 3  "Please mail us your username, password an...
pdf
Recurity Labs GmbH http://www.recurity-labs.com July 26, 2009 Cisco IOS Router Exploitation A map of the problem space Abstract This paper describes the challenges with the exploitation of memory corruption software vulnerabilities in Cisco IOS. The goal is to map out the problem space in order to allow for the an...
pdf
Hacking SQL Injection for Remote Code Execution on a LAMP stack. Lance Buttars aka Nemus Updated Slides @ https://www.introtobackdoors.com Who am I? Just some guy who likes computer security. Twitter @Nemus801 I work as a PHP/Python application programmer. I am a member of the local Defcon Group www.dc801.org Freen...
pdf
1 The Journey Of Hunting ITW Windows LPE 0day Quan Jin <twitter: @jq0904> DBAPPSecurity Black Hat USA 2022 Contents The Journey Of Hunting ITW Windows LPE 0day ....................................................................................1 Abstract..............................................................
pdf
DNS Data Exfiltration Using SQL Injection Bob Ricks G2, Inc. SQL Injection • We assume knowledge of how it works • Basic types of data exfiltration • Verbose • Displayed on page • Error based • Blind • Timing • HTTP Request • Change in page • DNS Exfiltration Related Work on DNS Exfiltration • http://pentestmonkey.net/...
pdf
做为攻击者那些年的一些想法 今年职业上有了一点小变动,从一个攻击者变成了一个防御者。于是想把作为攻击者的一些想法写下来 和大家交流。 某大型攻防演练暂告段落,攻击者们在弹冠相庆之后纷纷借着五一休假了。攻击方投入越来越大,攻击 模式的体系化、流程化;攻击工具工程化、实战化,以肉眼可见的速度发展着。作为一个曾经的攻击 者,内心是非常激动的。虽然已是局外人,但每每听到攻击方的故事,还是会热血沸腾。 我眼中的红队 曾经和朋友聊什么是红队?怎么做一只符合国情的红队?也阅读过很多国外红队报告,一度被各种高超 的红队技巧迷花了眼。都说红队是在模仿APT攻击,但在前公司有幸参加“金链熊”分析后。我意识到红队 如果是以模仿APT的路子走是不对的。红队...
pdf
Java安全之反序列化回显研究 0x00 前言 续上文反序列化回显与内存马,继续来看看反序列化回显的方式。上篇文中其实是利用中间件中存储的 Request 和 Response 对象来进行回显。但并不止这么一种方式。 0x01 回显方式 1. 中间件回显 2. defineClass 3. Linux描述符回显 4. RMI绑定实例 5. URLClassLoader抛出异常 6. 写文件css、js 7. dnslog defineClass异常回显 异常类: package com.nice0e3; import java.io.BufferedReader; import java.io.InputStream; impor...
pdf
Bitcoin Security 陳君明 Jimmy Chen 林志宏 Chris Lin jmchen@chroot.org meconin@gmail.com August 19, 2014 InfoKeyVault Technology Agenda • Introduction to Bitcoin • Security of Bitcoin • Hardware Wallet 2 Agenda • Introduction to Bitcoin - Expanding Economy - Birth of Bitcoin - Cryptographic ...
pdf
CastGuard Joe Bialek – Microsoft Offensive Research & Security Engineering (MORSE) Twitter: @JosephBialek Problem Space Killing Bugs vs. Killing Exploit Techniques Mitigating exploit techniques has ambiguous long-term value. Mitigations are typically far enough away from actual bug that bugs are still exploitable usi...
pdf
针对域证书服务的攻击(4)- ESC4 0x00 前言 ESC4叫做“Vulnerable Certificate Template Access Control”,其实是弱ACL的证书模板会导致域提权。 写完ESC1-ESC3,ESC4由于白皮书没有比较详细的过程,并且我本地域环境出了点问题,就搁置到现 在。但是国庆的时候,看见国外的研究员发布了一篇关于ESC4的文章:https://github.com/daem0nc0 re/Abusing_Weak_ACL_on_Certificate_Templates,减少了我很多工作量。我们知道每个模板都有自己 的权限控制策略,ESC4利用的就是这个权限控制不严格,例如:domain ...
pdf
/sf/app/apache_portal/bin/httpd /etc/profile/root/.bash_profile /etc/bashrc/root/.bashrc /etc/profile.d/*.sh/etc/profile.d/lang.sh /etc/sysconfig/i18n/etc/rc.local/etc/rc.d/rc.local /etc/rc.local /etc/rc.d/rc.local /etc/profile.d/ /etc/init.d systemctl systemctl list-units --type=service /usr/lib/systemd/system cron...
pdf
BRAIN GAMES Make your own Biofeedback Video Game Ne0nRa1n That Strange Little 'Brain Girl' Joe Grand aka Kingpin www.kingpinempire.com Biofeedback The definition of biofeedback The technique of using monitoring devices to obtain information about an involuntary function of the central or autonomic nervous system, suc...
pdf
常規攻擊的 實時檢測 ( WEB APP ) amxku 攜程安全 // sec.ctrip.com # About me - Security Architect at Ctrip - @amxku - sebug.net // sec.ctrip.com OWASP  Top10 • Scanner(vul/info) • Spam(info/login/register) • Trojan(gh0st RAT) • On-line/Off-line On-line WEB  APP  LOG Real-time // Analysis // Dashboard 任务I度 applog   ...
pdf
Technical Service Bulletin: FXR-16 Modifying GE PCS VHF Group 2 150 – 174 MHz for Amateur Radio Applications in the 219 – 220 & 222 – 225 MHz Band A FluX Research project in several phases Release Date: 04-01-2011 Last Update: v1.2 03-01-2011 By: Matt Krick, K3MK matt@kgmn.net Radio Model #: GE PCS - PC1H3A02 PC2H...
pdf
The good and bad about Streaming media How streaming media can be stolen and how to protect it. Who are you? tommEE pickles Crazy clown from NYC Lives in LA Single Arrested, Jailed… Media Whored… Likes to drink Qualifications Over 12 years of commercial computer experience Worked on Computer Radar Controlled Weap...
pdf
Impostor Polluting Tor Metadata Mike Larsen Charlie Vedaa tl;dr example Snort rule- alert tcp $HOME_NET any -> $EXTERNAL_NET 9030:9031 (msg:"POLICY-OTHER TOR traffic anonymizer server request"; flow:established,to_server; content:"GET /tor/server"; fast_pattern:only; classtype:policy-violation; sid:9324; rev:...
pdf
Nu1L-Writeup Web Time, grasp is gold, catch up is running water. 查看源码可以得到管理员邮箱,重置密码时候大小写过滤不严,导致可以拿到 重置密码的连接,然后发现 token 参数是 md5(time()),并且提示 ip 不符合,猜 测 xff,但服务器时间与 token 的时间相差 8h,于是遍历,然后重置密码。 进入后台,存在 XXE 漏洞,blindxxe,然后最后拿到 flag: 简陋的博客 变量覆盖,只过滤 get,没过滤 post,经过测试,发现是参数是拼接到反引号, 于是就很容易了: 山水集团 打开商品列表,看到页面里那个分享里有个能转换 ...
pdf
BlindElephant: Web Application Fingerprinting With Static Files Patrick Thomas 7/28/10 Outline • Web Apps & Security • Intro to Fingerprinting • Static File Approach • Observations From A Net Survey • Q & A 2 Well-Known Web Applications • Every conceivable use… • Content Management/Blogging • Forums • Email • E-Commer...
pdf
攻击内⽹的另类⽅式——host碰撞实践指南 清⽔川崎@滴滴SSTG 0x00.前⾔ 在当前的攻防实战当中,想要突破⽬标边界进入内⽹的⽅式无非有以下⼏种⽅式: 1.RCE/RCI(远程代码执⾏/远程命令注入) 2.VPN弱⼝令 3.SSRF漏洞 4.SQLI 5.⽂件上传 6.物理攻击/社⼯钓⻥ 但是有⼀种依靠⻓期信息收集才能提升攻击成功率的⽅式往往被忽略,那就是host 碰撞。 0x01.本质 host碰撞这种攻击⽅式本质上是nginx配置不当容易产⽣的安全问题。 nginx⼀般⽤ 于做外⽹代理,配置也比较⽅便,但是配置不当的时候会产⽣⼀些安全问题。其中 包括各个⼤⼚也都出现过(这⾥我就不点名是哪些互联⽹⼤⼚了)。 外⽹部署服务⼀ ...
pdf
Over the Air Remote Code Execution on the DEF CON 27 Badge via NFMI World’s first NFMI exploitation, sorta or OTARCEDC27NFMIOMGWTFBBQ Agenda 1. Introduction 2. Intro to the Badge 3. Buffer Overflow and Proof of Concept 4. NFMI Specs 5. Convert Analog Signal into Symbols 6. Convert Symbols to Bytes 7. Reverse Engineer...
pdf
Hacking the Cloud Gerald Steere – Microsoft C+E Red Team (@Darkpawh) Sean Metcalf – CTO Trimarc (@pyrotek3) Gerald Steere - @darkpawh 10+ years experience as a penetration tester and red team operator​ Member of C+E Red Team since 2014​ Speaker at BlueHat and Bsides Seattle Spends work days happily smashing atoms in Az...
pdf
SSD  Data  Evapora+on DEF  CON  21 August  2,  2013 Bio Data  Remanence Deleted  Data •  On  magne+c  hard disks,  data  remains +ll  it  is  overwriEen •  Image  from www.howstuffworks.com DEMO  on  Windows •  Observing  data  on  a  magne+c  hard  disk  aMe...
pdf
Mimicry: An Introduction By Mystic What is Mimicry?  The ability to survive by mimicking surroundings What is Mimicry?  The ability to survive by mimicking surroundings  Visibility of encryption What is Mimicry?  The ability to survive by mimicking surroundings  Visibility of encryption  Grammar filtering to fin...
pdf
July 27-30, 2017 1 2 3 4 5 6 7 8 9 10 11 12 Max Bazaliy Jailbreaking Apple Watch July 27-30, 2017 whoami 1 2 3 4 5 6 7 8 9 10 11 12 o  Security researcher at Lookout o  Lead researcher on Pegasus exploit chain o  Focused on advanced exploitation techniques o  Fried Apple team co-found...
pdf
黃建忠 (from TAIWAN) whoami ● 現任研究生 ● Linux 愛好者,關注系統安全領域 ● 不是哪個資 ( ㄏㄞ ˋ) 安 ( ㄎㄜ ˋ) 組織或 公司的成員 ● 簡單說就是一個路人 QQ 今天講什麼? ● 一點點的除錯器 (debugger) 實現原理 ● Memory search ● Code injection ● Dynamic library function hooking 易 一點點難 題目有點簡單 ...... 今天的目標 ●本投影片提供足夠的資 訊,希望讓各位看完後, 都有能力自己實作相關技 術 我們需要的東西 ● 一台 Linux 機器 (64 位元 ) Linux Mint 17 ● Py...
pdf
|||||||||||||||||||| |||||||||||||||||||| ATTACKING NETWORK PROTOCOLS A Hacker’s Guide to Capture, Analysis, and Exploitation by James Forshaw San Francisco |||||||||||||||||||| |||||||||||||||||||| ATTACKING NETWORK PROTOCOLS. Copyright © 2018 by James Forshaw. All rights reserved. No part of this work may be reproduc...
pdf
REVIEW OF WEB APPLICATIONS SECURITY AND INTRUSION DETECTION IN AIR TRAFFIC CONTROL SYSTEMS Federal Aviation Administration Report Number: FI-2009-049 Date Issued: May 4, 2009 Memorandum U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Subject: ACTION...
pdf
THE EVOLUTION OF ANDROID APP PACKING AND UNPACKING TECHNIQUES THIS IS NOT GOING TO END YAJIN ZHOU HITCON2016 ABOUT ME ▸ Earned P.h.D. in Computer Science from NC State University ▸ Research mainly focuses on smartphone and system security ▸ Now involving in C0RE Team ▸ More information: http://yajin.org 2 HITCON2...
pdf
云虚拟化安全:QEMU的安全探索 和防御 0 1 钱文祥 (@leonwxqian) Tencent Blade Team高级安全研究员 • 云虚拟化、IoT、浏览器等安全研究 • 发现NVIDIA vGPU等逃逸漏洞、Amazon Echo、Google Home音箱、浏览器中“麦哲伦” (SQLite)、Curl的多个远程代码执行漏洞等 • 多次在著名会议上参讲 0 2 n Tencent Blade Team由腾讯安全平台部在2017年底成立 n 专注于AIoT,移动互联网,云虚拟化技术,可信计算等前沿领域的安全技术研究 n 向Google、Microsoft、 Apple、Amazon、Huawei等诸多国际知名公司报告过2...
pdf
Anton “Bo0oM” Lopanitsyn FTP2RCE FTP - Active mode Command channel Data channel Port 21 Client’s port Client’s port PORT 95,213,200,115,31,144 31*256+144 95.213.200.115 127.0.0.1:8080, OK What about redis? https://medium.com/@knownsec404team/rce-exploits-of-redis-based-on-master-slave-replication-ef7a664ce1d0 https://2...
pdf
漫 谈 A O S P 蓝 牙 漏 洞 挖 掘 技 术 韩子诺 OPPO安珀实验室 关于我 • 韩子诺(ele7enxxh),OPPO安珀实验室高级安全专家,主要研究领域为Android安全,IoT 安全和车联网安全。在二进制漏洞挖掘与利用方面拥有6年以上相关经验; • 曾在Ruxcon,Zer0Con和Pacsec等多个国际知名会议进行技术演讲; • 截至目前,累计独立获得Android数百个CVE编号,Google Bug Hunters排行榜第8, Hackerone高通致谢榜2022年度第1; • 联系我:ele7enxxh(weibo | weixin | github); 议程 • 背景 • Android蓝牙协议栈发展...
pdf
OpenBSD Remote Exploit ”Only two remote holes in the default install” Alfredo A. Ortega July 5, 2007 Mbuf buffer overflow Buffer overflow Researching the “OpenBSD 008: RELIABILITY FIX” a new vulnerability was found: The m dup1() function causes an overflow on the mbuf structure, used by the kernel to store network packets. ...
pdf
Douglas Bienstock and Austin Baker I AM AD FS AND SO CAN YOU ©2019 FireEye ©2019 FireEye § Whoami § What is AD FS and how does it work? § How do we find AD FS servers? § How can we attack AD FS? § How can we become (takeover) AD FS? § Tools and Demos § Best practices and mitigations § Goal: Understand AD FS, how we can...
pdf
The Terminator to Android Hardening Services Yueqian Zhang, Xiapu Luo, Haoyang Yin Department of Computing The Hong Kong Polytechnic University 1 2 Source: Trend Micro Percentage of top 10 apps in each category which have repacked version: •100% of the apps of Widgets, Media & Video, etc. •90% of the apps of ...
pdf
HITB Write Up CTYPTO HASHINATOR python脚本: #! /usr/bin/env python3 # -*- coding: utf-8 -*- import re import os import hashlib import struct import time from base64 import b64encode from pwn import * context.log_level = "debug" def md5(bytestring): return hashlib.md5(bytestring).digest() def sha(bytestrin...
pdf
Cover Your APIs: Securing Your Hidden Web Attack Surface WHITE PAPER Securing Your Hidden Web Attack Surface Cover Your APIs </> Cover Your APIs: Securing Your Hidden Web Attack Surface + The importance of web APIs and web services in software development + The challenges of including APIs in application security t...
pdf
CAN I haz car secret plz? Javier Vazquez Vidal Henrik Ferdinand Nölscher Who are we? • Javier is a Hardware Security Specialist • Works at Code White as a Product Security Engineer • He is from Cadiz (Spain) • Enjoys reversing products that are interesting, or could potentially be more fun • Likes ake hen ...
pdf
Fuzzing Malware for Fun & Profit. Applying Coverage-Guided Fuzzing to Find Bugs in Modern Malware Maksim Shudrak DEF CON 26 About Me BIO 2018 – present: Senior Offensive Security Researcher 2016: Defended PhD (Vulns Hunting) in Tomsk, Russia 2015-2017: Researcher, IBM Research, Haifa, Israel 2011-2015: Securit...
pdf
1 2 ● Who are we ● Background ● Picking our battles ● The web vuln ● Intermission ● Telematics ○ What is it ○ Local vulnerabilities discovered ○ Writing a blind exploit ○ Remote vulnerability ● Conclusion ● Questions Jesse @jessemichael Mickey @HackingThings Alex @ABazhani...
pdf
Asp 安全审计 http://hi.baidu.com/micropoor 1 ASP ASP ASP ASP 代码安全审计 ------PHP ------PHP ------PHP ------PHP 安全新闻早 8888 点特别篇 2012/3/20 注入漏洞: 1.Request.QueryString:获取地址栏参数(以及以 GET 方式提交的数据) 如:Request.QueryString("id") 2.Request.Form: 获取以 POST 方式提交的数据(接收 Form 提交来的数据) 如:Request.Form("id") 3.Request.Cookies: 获取浏览器 Cookier 信息。 4....
pdf
@glennzw // DefCon 22 August 2014 Digital Terrestrial Tracking: The Future of Surveillance Glenn Wilkinson SensePost @glennzw glenn@sensepost.com ABSTRACT In this paper, the terms Digital Terrestrial Tracking (DTT) and Digital Terrestrial Footprint (DTF) are introduced. The DTF defines the uniquely identifia...
pdf
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware GoSecure Research Masarah Paquet-Clouston, Olivier Bilodeau Back in 2015-2016 Linux/Moose ? Linux/Moose An IoT botnet that conducts social media manipulation Social Media Manipulation The Ecosystem of Social Media Manipulation Presenta...
pdf
© 2012 @IDF.cn 安全改變未來 網絡使生活更美好 萬濤 ChinaEagle IDF互聯網威懾防禦實驗室 中國電子學會計算機取證專家委員會 1 © 2012 @IDF.cn 雲計算模式下的安全和駭客經濟威脅趨勢 智慧的地球對安全的需求 這個星球變得越來越... 機械化,,,, 互聯 化 智能....化 ““““我們在過去十年中看 到的變化比再之前90 90 90 90 年的總和都要多”””” Ad J. Scheepbouwer, CEO, KPN Telecom Privacy and identity controls Information protection ...
pdf
智能合约消息调用攻防 隐形人真忙 [at] 百度安全 关于作者 ID:隐形人真忙 Title:百度安全工程师 Work:从事攻防技术研究 & 安全产品研发 Weibo:https://weibo.com/alivexploitcat 微博关注 以太坊架构与 攻击面介绍 EVM消息调 用原理剖析 消息调用攻防 议题总结 以太坊架构与攻击面介绍 以太坊架构以各个攻击面 Web3.js 传统Web安全漏洞 去中心化应用 智能合约层 EVM虚拟机 RPC层 Block Chain Block 共 识 算 法 PoW PoS Miner Network P2P Crypto Solidity … Transaction Database Ag...
pdf
Revolting Radios Get it? It’s a pun! Thanks Mike Walters Ang Cui Schuyler St. Leger Taylor Streetman Sergey Bratus Travis Goodspeed A little background “One of the things that makes Orwell's '1984' scary is the way it uses technology. In Orwell’s dystopia, tech is a one-sided means of control. The powers that be use ...
pdf
Windows 安全 - 服务篇(2) 0x00 前言 上一篇主要是Windows服务的基础架构,这一篇主要记录服务账户。账户和安全的关系非常紧密,熟练 掌握服务账户的知识,对理解很多服务相关的安全问题是非常重要的。 服务账户涉及的知识非常多,除了基础的4类:Local System、Network Service、Local Service、 Service Account以外,还有服务隔离、虚拟服务账户、交互式服务检测、Session 0隔离。 0x01 服务账户 在早期的windows系统中,服务是运行在本地系统账户权限下的,例如:SYSTEM、LocalSystem。这个 权限是非常大的,后面慢慢出现了网络服务账户和本地服务...
pdf