text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
E nhance S ecurity A w areness w ith D ata M ining
Data-driven Intrusion Detection Solutions in Alibaba Cloud
Yue Xu (cdxy)
Security Engineer @ A lib ab a C loud
H an Zheng (LittleH ann)
Security Engineer @ A lib ab a C loud
M ay 29, 2019
Enhance Security Awareness with Data Mining
Data-driven Intrusion Detection Solu... | pdf |
RCE
0x00
NO
p
“java0day”
https://t.zsxq.com/EAMb2V3
https://t.zsxq.com/3jQ7Y3B
checklist
0x01
1.
2.
3. payload
4. rce
5.
1.
2.
3.
0x02
1. xxxxxx
2. payload
3.
F8
0x03
1. source
2. sink
3.
4. trick
111RCE
1312
4513
trick
0x04
SQL
SQL
XSS
Javascriptcookie
javagadget
SSRF
owasp
RCEcombo
1. +
2. +
3. ++P... | pdf |
title: 蚁剑改造计划之支持内存马
author: yzddmr6
blog: yzddmr6.tk
前言
最近因为各种事情太忙了,博客也很久没有更新了。今天暂且先水一篇。
前几天发了一版新的蚁剑JSP一句话的payload,这篇文章记录一下更新的细节。
1. 兼容高版本JDK
这个没啥好说的,就是base64解码的问题。在jdk9开始移除了sun.misc这个包,导致原有的
sun.misc.BASE64Decoder 没法继续使用,取而代之的是 java.util.Base64 这个类。
解决办法就是两个都试一下,看哪个能解码成功,核心代码如下
2. 兼容Tomcat内存马
这个问题可以掰扯一下。很多文章都提到了冰蝎或者蚁剑... | pdf |
Hardware Hacking for us dumb software guys
My Story
Done software since 1999
Degree in Computer Science
Done a little hardware over the years
About five years ago bought a Microchip
PIC Kit
The labs were cool and easy to get working
Anything practical was difficult (low level
assembly)
Defcon 17
Bought ... | pdf |
Phreaking Elevators
Who am I?
● Car hacking things
● High voltage projects
● CTFs (lifetime badge winner for Cyphercon)
● Infosec is a hobby ( I might be looking for a job)
● I am new to the infosec world (3 years)
● Car hacking things
● High voltage projects
● CTFs (lifetime badge winner for Cyphercon)
● Infosec is a ... | pdf |
Bugged&Files&
Is#Your#Document#Telling#on#You?#
Daniel#Crowley,#Damon#Smith#
• Damon&Smith&
Who&are&we?&
• Daniel&Crowley&
Files&that&trigger&outbound&traffic&when&parsed&
&
&Without&being&an&executable&format&
&Regardless&of&format&complexity&
&&&&&&Without&the&use&of&exploits&
&
&…and&the&implications&of&all&that&
Wh... | pdf |
SHODAN for
Penetration Testers
Michael “theprez98” Schearer
SHODAN for Penetration Testers
What is SHODAN?
Basic Operations
Penetration Testing
Case Study 1: Cisco Devices
Case Study 2: Default Passwords
Case Study 3: Infrastructure Exploitation
Other Examples
The Future
Conclusions
By pen testing, I... | pdf |
《PHP 安全基础详解》 www.528163.cn 提供
《
《
《
《PHP 安全基础
安全基础
安全基础
安全基础详解
详解
详解
详解》
》
》
》
www.528163.cn 提供
《PHP 安全基础详解》 www.528163.cn 提供
第一章
第一章
第一章
第一章 简介
简介
简介
简介
PHP 已经由一个制作个人网页的工具发展成为了世界上最流行的网络编程
语言。它保证了许多网络上最繁忙的站点的运行。这一转变带来了亟待关注的问
题,那就是性能、可维护性、可测性、可靠性以及最重要的一点—安全性。
与语言的一些功能如条件表达式、循环结构等相比,安全性更为抽象。事实
上,安全性更像... | pdf |
WhiteSpace:
A Different Approach to
JavaScript Obfuscation
DEFCON 16
August, 2008
Kolisar
1
Introduction
• What led to WhiteSpace?
2
Agenda
• What is “WhiteSpace”?
• A Brief Survey of Current JavaScript
Obfuscation Methods
• The Telltale Indicators of Obfuscation
• The Components of this Approach
• Demo
3
What is “Wh... | pdf |
Hardware Backdooring is practical
Jonathan Brossard (Toucan System)
DISCLAIMER
We are not « terrorists ». We won't release our
PoC backdoor.
The x86 architecture is plagued by legacy.
Governments know. The rest of the industry :
not so much.
There is a need to discuss the problems in
order to find solutions...... | pdf |
Steal Everything, Kill Everyone, Cause Total
Financial Ruin!
(or how I walked in & Misbehaved!)
Jayson E. Street, C|EH, CISSP,
GSEC, GCIH, C|IH,
IEM, IAM, ETC…
Let go of my EGO
Who Am I?
@jaysonstreet
Let go of my EGO
Who Am I?
@jaysonstreet
Hacker/Social Eng... | pdf |
CVE-2022-34916 JNDI命令执
⾏执⾏漏洞
H1
H2 项⽬介绍
Flume 是⼀种分布式、可靠且可⽤的服务,⽤于⾼效收集、聚合和移动⼤量⽇志数据。它具
有基于流数据流的简单灵活的架构。它具有可调整的可靠性机制以及许多故障转移和恢复机
制,具有健壮性和容错性。它使⽤允许在线分析应⽤程序的简单可扩展数据模型。
H2 项⽬地址
https://flume.apache.org/
H2 漏洞概述
当攻击者控制⽬标 LDAP 服务器时,如果配置使⽤带有 JNDI LDAP 数据源 URI 的 JMS 源,
Apache Flume 版本 1.4.0 到 1.10.0 很容易受到远程代码执⾏ (RCE) 攻击。通过将 JNDI ... | pdf |
Writeup - Nu1L
Writeup - Nu1L
WEB
laravel
do you know
zzm's blog
hate-php
MISC
run
loop
mc
philosopher
Welcome to 5space
CRYPTO
tinysocks
rosb
PWN
pwnme
twice
of
REVERSE
nop
ManageCode
rev
WEB
lib/webuploader/0.1.5/server/preview.php
curl http://119.3.183.154/daochu.php\?
type\=1\&imei\=aaa\&imei2\=ttt%22union%20se... | pdf |
1
反序列化脏数据
Java反序列化数据绕WAF之加⼤量脏数据
https://mp.weixin.qq.com/s/wvKfe4xxNXWEgtQE4PdTaQ
其实就是再最外层封装⼀层,只要该类有对象属性,⼀般来说在反序列化的时候都会试着调⽤该属性的
readObject去还原他。所以我们要找的class,第⼀需要实现java.io.Serializable接⼝,第⼆可以存储任
意对象。这么看来集合类型就⾮常符合我们的需求。
如
1. ArrayList
2. LinkedList
3. HashMap
4. LinkedHashMap
5. TreeMap
这个思路是基于@Y4tacker师傅做的扩展,源头总... | pdf |
CMS
0x00
CMS assign_resume_tpl
http://www.74cms.com/news/show-2497.html
/Application/Common/Controller/BaseController.class.php assign_resume_tpl
0x01
CMS Thinkphp 3.2.3 3.2.3 URL
CMS GET
Home User login
mca/GET
http://serverName/index.php///
http://localhost/?m=home&c=user&a=login&var=value
'VAR_MODU... | pdf |
WMI + MSI Lateral Movement
NO WIN32_PROCESS NEEDED – EXPANDING THE WMI LATERAL MOVEMENT ARSENAL
原文很棒,建议阅读,本质上仍然是对wmi的利用
如标题所说,利用的WMI执行MSI包,一般我们用的 WIN32_PROCESS 类,但这里不是
WIN32_PROCESS 类。
Execution
使用msfvenom生成一个payload:
wmic 对 - 敏感,这里使用了双引号避免出现问题
这里的用户前面加了一个 . ,不加 . 会导致拒绝访问,另外要求目标机器本地管理,如果是域
环境,域管也可。
WMIC 任然是通过 rpc ... | pdf |
Machine Duping
Pwning Deep Learning Systems
CLARENCE CHIO
MLHACKER
@cchio
adapted from
Dave Conway
HACKING
MATH & STATS
MACHINE
LEARNING
1337
HAX0R
ACADEMIC
RESEARCH
Deep Learning
deep neural networks (DNN)
•
Not a new toy - history goes back to 1943
•
MUCH MORE DATA EVERYWHERE
•
Revived due to improvements i... | pdf |
VoIPhreaking
How to make free phone calls and
influence people
by
the grugq
Agenda
● Introduction
● VoIP Overview
● Security
● Conclusion
Voice over IP (VoIP)
Good News
● Cheap phone
calls
● Explosive growth
in recent years
● Internet
telephony
converging with
the PSTN
Other News
● Immature
security best
practi... | pdf |
Pwned by the Owner
Zoz
Months!
Fuck!
Fuck!
...time passes...
WTF!
% nslookup 72.193.81.105
Server:127.0.0.1
Address:127.0.0.1#53
Non-authoritative answer:
105.81.193.72.in-addr.arpaname = ip72-193-81-105.lv.lv.cox.net.
Authoritative answers can be found from:
81.193.72.in-addr.arpanameserver = ns.cox.net.
81.193.72.in-... | pdf |
Vulnerability Exchange:
One Domain Account for More Than Exchange Server RCE
Tianze Ding (@D1iv3)
> whoami
•
Tianze Ding (@D1iv3)
–
Senior security researcher at Tencent Security Xuanwu Lab
–
Focusing on Active Directory Security / Red Team / Web Security
–
Reported some vulnerabilities to Microsoft, Apple, Google, et... | pdf |
泛微审计小结
0x00:起因是群里周末发了一个 cnvd 收录泛微注入的截图。。然后找泛微要了一份补丁
发现漏洞位置在/upgrade/detail.jsp
登陆后的注入,,没啥卵子用。。遂自己扒了套代码自己审计
0x01:未授权的 sql 注入
漏洞位置:/clusterupgrade/getProcessInfo.jsp
跟进去
注入点发生在上图 408 行
实际测试中发现泛微全局的 filter。。。黑盒绕的。。比较迷。。。简单 fuzz 了下 得到了如
下 poc
这时候发现这个 poc 的字段位置。。只要填入非数字型字符。。union 就被转成乱码。。
这里实在不想再饶了。。留个坑。。
然后又碰到了另一个坑(mmp 的泛微... | pdf |
OTP circumventing in MIFARE
ULTRALIGHT:
Who says free rides?
bughardy
bughardy@cryptolab.net
Eagle1753
eagle1753@onenetbeyond.org
Introduction
RFID technologies are becoming more and more prevalent in our lives.
This motivated us to study them, and in particular to study the MIFARE
ULTRALIGHT chips, which are widel... | pdf |
REDNAGA
ANDROID COMPILER
FINGERPRINTING
CALEB FENTON - TIM “DIFF” STRAZZERE
07.22.2016
HITCON COMMUNITY 2016
WHO ARE WE
• Banded together by the love of 0days and
hot sauces
• Random out of work collaboration and
pursuit of up-leveling the community
• Disclosures / Code / Lessons available
on GitHub
• rednaga.i... | pdf |
The Black Art of Wireless
Post-Exploitation:
Bypassing Port-Based Access Controls Using
Indirect Wireless Pivots
DEF CON
Gabriel “solstice” Ryan
net user author /domain
Gabriel Ryan
Security Engineer @ Gotham Digital Science
Appsec | Infrastructure Testing | Red Team | Research
@s0lst1c3
gryan@gdssecurity.com
labs@gd... | pdf |
•
•
•
•
•
•
•
•
•
•
REVIEW THE POST AT: HTTPS://DEFCONGROUPS.ORG/DCGSTART.HTML
•
•
IT'S BASED ON LOCAL PHONE CODES FROM
•
YOU CANNOT BE DC042 OR DC666 OR DC11010100011
•
•
BASED ON DIALING CODES AND AREA CODE *FROM THE USA*
•
E.G. EDMONTON, CANADA = DC780 BECAUSE OF NORTH AMERICA, BILDA,
ALGERIA = DC11213 (21 IS COUNT... | pdf |
Xploiting Google Gadgets: Gmalware
and Beyond
Robert Hansen
Tom Stracener
DRAFT: Complete slides will be made available after our talk.
The Dark Side of Gadgets
Complete slides will be made available after the our talk
on August 8th.
Xploiting Google Gadgets: Gmalware and Beyond
Tom Stracener & Robert Hansen (... | pdf |
Beacon、Payload、Shellcode我傻傻分不清
1. 前言
有一段时间我发现好多安全从业者,也包括我,分不清楚C2工具中的一些名词,包括:Beacon、
Payload、Shellcode、Loader、Stager、Stagerless等。没办法都是舶来品,洋大人的文章中有时候也
是乱用的,更不要说国内的相关文章,导致大家对以上词汇的理解出现了分歧。然后就出现了相互交流
的时候鸡同鸭讲的情况,以下是我对这些词汇的理解,有分歧欢迎讨论。
2. Beacon和Payload
前段时间看见这么一段话:
没有任何贬低和攻击的意思,我私信作者讨论了下,关于什么是Beacon。
Beacon字面意思是信标,主要功能有:心跳和执行... | pdf |
1
Linux下echo计算哈希的坑
因为遇到好⼏次了,每次都忘记,搞得要怀疑⼈⽣⼏分钟,故简单记录下避免下次⼜⼊坑。
linux下常⽤的计算的哈希命令:
md5sum
sha256sum
但是这两个命令读取的是参数指定的⽂件名,或者是标准的输⼊。
那么如果我们想加密单个字符串的时候,⼀般会这样利⽤管道符来使⽤:
1. echo '123' |md5sum
2. echo '123'|sha256sum
得到的是:
123 -> md5 -> ba1f2511fc30423bdbb183fe33f3dd0f
123 -> sha256 -> 181210f8f9c779c26da1d9b2075bde0... | pdf |
Android weblogin:
Google's Skeleton Key
Craig Young, Tripwire VERT
# whoami
I research, identify, and disclose vulnerabilities
as a senior researcher in Tripwire VERT.
I enjoy long bike rides, breaking things which
fail to sanitize input, and building furniture
with my wife on the weekend.
DISCLAIMER: I am definitel... | pdf |
[root@sslvpn /]# netstat -tulnp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:9990 0.0.0.0:* LISTEN 25124/node
tcp 0 0 0.0.0.0:51111 0.0.0.0:* ... | pdf |
《PHP 安全基础详解》 www.528163.cn 提供
《
《
《
《PHP 安全基础
安全基础
安全基础
安全基础详解
详解
详解
详解》
》
》
》
www.528163.cn 提供
《PHP 安全基础详解》 www.528163.cn 提供
第一章
第一章
第一章
第一章 简介
简介
简介
简介
PHP 已经由一个制作个人网页的工具发展成为了世界上最流行的网络编程
语言。它保证了许多网络上最繁忙的站点的运行。这一转变带来了亟待关注的问
题,那就是性能、可维护性、可测性、可靠性以及最重要的一点—安全性。
与语言的一些功能如条件表达式、循环结构等相比,安全性更为抽象。事实
上,安全性更像... | pdf |
高级攻防下的WEBSHELL
About Me
0 1
•"张一臣 BeichenDream;
•"360政企安全-高级攻防实验室-安全研究资深工程师
•"JVM安全研究者
•"哥斯拉作者
目录
CONTENTS
0 1
01
PART"01
流量对抗
02
PART"02
武器化
03
PART"03
内存马
05
PART"05
Agent对抗
06
PART"06
正向代理
07
PART"07
哥斯拉插件扩展
04
PART"04
Java反射绕过
PART.01"
0 2
对抗流量审查
•" 伪装正常业务的流量
为什么要对抗流量审查
0 1
蚁剑
•"防止流量被他人窃取分析
•"不想被人发现异常流量
•"防止被WAF拦截
... | pdf |
Stolen Data Markets: An Economic and
Organizational Assessment
This project was supported by Award No. 2010-IJ-CX-1676, awarded by the National
Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The
opinions, findings, and conclusions or recommendations expressed in this publication
are... | pdf |
Attacking Autonomic Networks
2
#sh run
o
o
o
3
Agenda
o
o
o
o
4
Autonomic Systems
o
o
5
Autonomic Network
o
o
o
o
Autonomic Network logo as shown by Cisco
in their presentations here and here
6
Live Demo
7
Demo Results
o
o
o
8
Cisco Deployment
o
o
o
o
9
Channel Discovery
o
o
10
Adjacency Discovery
o
o
o
o
o
11
Adjace... | pdf |
Golang红队开发指南
目录
1
2
3
ProjectDiscovery
Golang 植入端对抗方案
Golang C2 Sliver
1. 像Python一样简单,代码可读性好
2. 简单的多架构交叉编译支持
3. 语法层面的并发支持
4. 易用的包管理 & 很多红队生态
前言
为什么是Go
Par t1:ProjectDiscover y
域名收集
Subfinder:通过各种api接口被动收集子域名
Uncover:整合各种网络空间引擎api接口
Dnsx:dns验证
资产探测
Httpx:web信息探测
Naabu:端口扫描
PoC
Nuclei:Poc批量探测
通知
Notify:整合第三方结果通知
ProjectD... | pdf |
在WAF⼦子
Who am I
IdMayIKissYou
01
WAF
Nginx-lua-waf
Modsecurity
web的WAF这
02
WAF
多只http://www.miku.com/
1.php?id=1%20and1=1
⽤用多情情
只TCP/IP⽤用到
情WAF下情
WAF bypass
Know It Then Bypass It
03
WAF BYPASS
上BYPASS WAFWAF
/这WAF上
你上个这
上上
上这
上WAF上bypassWAF
这
04
WAF BYPASS
Puzzle到
bypass
到对发WAF情到对mysql情sqlserve... | pdf |
ASM in .NET: The old is new again
by Jon McCoy(DigitalBodyGuard)
Abstract:
This paper will cover running raw Machine Code(ASM) from within .NET. As we all know .NET runs
on IL(Intermediate Language) also known as “Managed byte code”. A program can declare an unsafe
section of code and drop out from the managed area t... | pdf |
PROXY
PRANK-O-MATIC
starring
charlie vedaa, ccie #7502
and
anonymous speaker
A messAGE fROM Jules
A messAGE fROM Jules
If you’re easily offended…
A messAGE fROM Jules
If you’re easily offended…
now would be a good time to
go fuck yourself.
A messAGE fROM Jules
If you’re easily offended…
now would be a good time to
go... | pdf |
An Analysis of the State of
Electron Security in the
Wild
Bachelor’s Thesis
Benjamin Altpeter
August 1, 2020
supervised by Prof. Dr. Martin Johns
Declaration of Authorship
I hereby declare that the thesis submitted is my own unaided work. All direct or indirect sources used
are acknowledged as references. I am aware th... | pdf |
序
推荐序
随着远程办公等应用的爆发,零信任安全理念得到迅速发展。中国产业互联网发展联盟零信任产业标准工
作组集结业界优势机构,基于实战经验和研究积累,研制和推出本白皮书,希望能为零信任产业发展带来新动
能。——中国产业互联网发展联盟秘书长 雷晓斌
本白皮书基于产业实践,给出了详细的技术实现和应用案例,为安全从业者提供了很好的借鉴。随着零信
任理念在国内的快速普及和落地,相关产品和解决方案要更加重视合规要求,这是安全管理的需要也是能被市
场认可的基础。——公安部第三研究所(国家网络与信息系统安全产品质量监督检验中心)副主任 顾健
零信任实战白皮书的发布,期待能为企业安全管理者、技术研发和运维等人员提供有价值的参考。腾讯基
于超大型企... | pdf |
DEF CON 101
FIRST – A BRIEF MOMENT
OF SILENCE
DevNull
KingTuna
WELCOME TO DEF CON
HighWiz @highwiz
Will @bsummerz
Niki7a @Niki7a
Magen Wu @magen_wu
SecBarbie @SecBarbie
Shaggy @ShaggyMcG
n00bz @n00bznet
MEET THE PANEL
WELCOME TO LAS VEGAS
Pace Yourself
THIS IS DEF CON
DGAF
Everyone was a
n00b once.
All of us are stil... | pdf |
Winnti is Coming - Evolution after Prosecution
TeamT5
2
研究員
UCCU 成員
工程師
Peter Syu
001
“Twice 推廣社” 社長
工程師
Tom Lai
456
研究員
Aragorn Tseng
首席分析師
Charles Li
Who we are
AGENDA
01
02
03
04
05
Initial Access
Cobalt Strike Loader
APT41’s Backdoor
C2 Hiding Technique
Relation to other operations
06
Takeaway
Who is Winnti?
4
Winn... | pdf |
Lockpicking
Forensics
datagram
datagram.layerone@gmail.com
Defcon 17, 2009
Agenda
How locks/picks work
Normal wear
Lock Analysis
Key Analysis
Investigative process
Destructive entry still #1!
How Locks Work
How Locks Work
How Locks Work
How Locks Work
Pin Binding
Pin Binding
Picking a Lock
Apply tension
Fi... | pdf |
Drones Hijacking
Aaron Luo
Cyber Safety Solution
multi-dimensional attack vectors
and
countermeasures
Agenda
• Introduce the drone architecture
• Vulnerabilities on which component?
• Demo
• Provide the prevention solution
• Release attack/defense tools on GitHub.
Today, our target is…
DJI-Phantom 3 Advanced
DJI Pha... | pdf |
第一章 概论 ..................................................................................................................1
1.1 网络的历史.......................................................................................................1
1.2 OSI 模型......................................................................... | pdf |
Technical Service Bulletin:
FXR-13
Modifying Motorola Maxtrac VHF
136 – 174 MHz for
Amateur Radio Applications
in the 222 – 225 MHz Band
A FluX Research project in several
phases
Release Date: 07-01-2010
Last Update: v1.0 07-01-2010
By: Matt Krick, K3MK
matt@kgmn.net
Radio Model #:
Motorola Maxtrac 100
Motorola Max... | pdf |
Module 1
A journey from high level languages, through
assembly, to the running process
https://github.com/hasherezade/malware_training_vol1
Wow64: 32 bit PE on 64 bit
Windows
WoW64: basics
• Backward compatibility: running 32 bit applications on 64 bit Windows
• 32 bit application must be isolated from the 64 bit evi... | pdf |
11
Dark.Net
Dark.Net
gasgas
gasgas
22
簡介
簡介
Malware
Malware
Dot Net Framework
Dot Net Framework
.net
.net rootkit
rootkit
Anti tech
Anti tech
Q & A
Q & A
33
Malware
Malware
44
Malware
Malware
Virus
Virus
Backdoor
Backdoor
Trojan horse
Trojan horse
Rootkit
Rootkit
Scareware
Scareware
Adware
Adware
Worm
Worm... | pdf |
By Alon Weinberg
Please inject-me, a x64 code injection
August 2019
I’m a Security researcher!
I’ve been working at Deep Instinct, Since 2017
And I was in the IDF Cyber Unit for 4.5 years
Alon Weinberg
Please inject-me
a x64 code injection
Intro
▪ Code injection and its
importance
▪ Introducing Inject-Me
Technical bac... | pdf |
从S-SDLC视角看API安全
【API威胁检测防御】专题研讨会
Silver Zhang
为何将API安全拧出来说
为何将API安全拧出来说
感冒 VS. 禽流感
感冒 VS. 禽流感
应用安全 VS. 移动安全
应用安全 VS. 移动安全
新业态
新业态
API历史沿革及风险评估
API面临的安全挑战
传输
存储
认证
授权
输入
输出
➢
客
户
端
不
支
持
加
密
传
输
协
议
怎
么
办
➢
客
户
需
要
走
非
加
密
支
持
代
理
➢
客
户
端
未
做
服
务
端
证
书
合
法
有
效
性
校
验
怎
么
办
➢
服
务
端
加
密
数
据
如
何
让
客
户
端
解
密
➢
客
户
的
服
务
端
与
... | pdf |
TC260-PG-20212A
网络安全标准实践指南
—网络数据分类分级指引
(v1.0-202112)
全国信息安全标准化技术委员会秘书处
2021 年 12 月
本文档可从以下网址获得:
www.tc260.org.cn/
I
前 言
《网络安全标准实践指南》(以下简称《实践指南》)
是全国信息安全标准化技术委员会(以下简称“信安标委”)
秘书处组织制定和发布的标准相关技术文件,旨在围绕网络
安全法律法规政策、标准、网络安全热点和事件等主题,宣
传网络安全相关标准及知识,提供标准化实践指引。
II
声 明
本《实践指南》版权属于信安标委秘书处,未经秘书处
书面授权,不得以任何方式抄袭、翻译《实践指南... | pdf |
android appios
iosios
iphone6
12.4.5
12.4.5CheckRa1n
CheckRa1n
--CheckRa1n
Welcome to checkra1nstart
next
start
1.start
2.sidehome
3.sidehome
checkra1n cydia
frida
python3
python3.7
frida
cydiafrida
https://build.frida.re
cydia---
cydiafridafrida,iOSfrida
frida for pre-A12iPhone6sA9
pip install frida
pip install fri... | pdf |
KUBERNETES中的异常活动检测
About me
0 1
@9ian1i
朱思宇
blue teamer,入侵对抗,业余安全开发,阿里云融媒体安全。
DEFCON Blue Team Village,Black Hat Arsenal 演讲者。
WatchAD – AD Security Intrusion Detection System
crawlergo – A powerful browser crawler for web vulnerability scanners
??? - kubernetes abnormal activity detection and blocking system
开源安全项目:
安全... | pdf |
Red vs. Blue:
Modern Active Directory
Attacks & Defense
Sean Metcalf
CTO
DAn Solutions
sean [@] dansolutions . com
http://DAnSolutions.com
http://www.ADSecurity.org
Photo by Ed Speir IV.
All Rights Reserved. Used with Permission.
ABOUT
Chief Technology Officer - DAn Solutions
Microsoft Certified Master (MCM) Direct... | pdf |
ITDR 介绍
A
ITDR 之 vSphere
B
ITDR 之 vSphere
赛博昆仑 昆仑实验室负责人-古河 (Yuki Chen)
vSphere 作为基础计算平台在如今企业环境中被广泛应用 , 同时对其的攻击和漏洞挖掘一直是非常热门的话
题 , 本书深入浅出地讲解了 vCenter 的攻防两面 , 对企业进行 vSphere 安全建设起到了重要的参考和指导意义。
奇安信 观星实验室负责人-龚玉山(ISWIN)
vCenter 作为 vSphere 的核心控制节点,一直是攻击者的首选目标,本书总结了针对 vCenter 各个阶段的
攻击手法和实际案例以及对应的检测和加固方案,方便企业安全管理者快速了解 vSphere 攻击... | pdf |
1
© Ofir Arkin, 2000-2005
Ofir Arkin, On the Current State of Remote Active OS Fingerprinting Tools
On the Current State of
Remote Active OS
Fingerprinting Tools
Ofir Arkin
CTO
ofir.arkin@insightix.com
Defcon 13
2
© Ofir Arkin, 2000-2005
Ofir Arkin, On the Current State of Remote Active OS Fingerprinting Tools
... | pdf |
Bypass AMSI的前世今生(3) - 脚本混淆和一行命令关闭AMSI
0x00 前言
本文的主要讲解[BA2-3],也就是脚本混淆和一行命令关闭AMSI的原理,而不是具体的脚本混淆方法。
混淆方法其实就是对脚本语法的理解,然后加入各种额外字符或换一种表示方法。混淆姿势细致繁复,
并且在网上已有比较全面的脑图和总结文章,在此就没必要重复了,相关推荐资料会在文末贴出。本文
主要分为以下几个部分:
为什么脚本混淆能够过AMSI
一行命令关闭AMSI原理
[BA2]和[BA3]配合达到关闭AMSI的作用
学习建议,工具和相关资料推荐
0x01 为什么脚本混淆能够过AMSI
“脚本混淆能够过AMSI”,这句话其实是不正确的,本系列第一篇... | pdf |
fastjson net.sf.json-lib org.json
JSON-lib org.json Java Jacksongson
fastjson json-lib/org.json
SSRF
fastjson URL
fastjson Java autotype
java.net.URL
java.net.URL URL
get URL
URL getContent()
fastjson getContent() fastjson 1.2.76 SSRF
new URL(...).getContent();
new URL(...).openStream();... | pdf |
Bugscan
基于插件众筹的分布式
漏洞扫描平台
契机
团队
功能
特点
契机
团队成员
BugScan和圈子成员
马坤(cnfjhh)
公司&团队负责人
12年信息安全领域专家
专注于网络安全前沿研
究
陈震国(Zero)
BugScan扫描引擎研发
10年全栈工程师经验
玩转各种编程语言
著名的Hijack、Gh0st、
Arpspoof作品的作者
赵培源(半块西瓜
皮)
BugScan扫描框架研发
7年以上python功底
熟悉各种漏洞原理
漏洞圈子的作者
贾林杰(不流畅)
BugScan插件审核
5年以上底层固件研发
经历
圈子插件审核员
武成军
BugScan开发... | pdf |
Tim Hsu
CHROOT.ORG
PDF created with pdfFactory Pro trial version www.pdffactory.com
2008/7/25
2
¤ HIT(Hacks In Taiwan)主辦人
¤ 網駭科技創辦人
¤ 資訊安全技術研究者,同時也是 Linux 愛好者。
¤ 專長於網路程式設計、網路滲透測試、駭客攻擊手法研究、惡意程
式分析及嵌入式系統等。
¤ 著作
¡ Linux C 函式庫詳解辭典 (旗標)
¡ The Wargame 駭客訓練基地 - 決戰台灣版(旗標) (與曾信田、莊明
躍、何弈甫等人合著)
2
PDF created with pdfFactory Pro t... | pdf |
Violent(Python(
!
DEF(CON(23!
Fri.,(Aug(8,(2015,(9?1!
Sam(Bowne(
City(College(San(Francisco!
Slides(and(projects(at(samsclass.info(
Bio$
CNIT$124$
Advanced$Ethical$Hacking$
Violent$Python$
• Good$coding$principles$
– ExcepBon$handling$
– Modular$design$
– OpBmizaBon$
– CommenBng$
– Flow$charts$
• FORGET$THEM$ALL$
Vio... | pdf |
F.O.E.
http://code.google.com/p/foe-project/
Feed Over Email
A Proxy-less RSS Reader For
Users in Internet Censored Countries
By
Sho Ho
Broadcasting Board of Governors
F.O.E.
Who am I?
Name:
Sho Ho
Job Title:
Telecommunications Specialist
Employer: Broadcasting Board of Governors
The Federal Government agency that ov... | pdf |
Aylin Caliskan
@aylin_cim
Assistant Professor
George Washington University
Rachel Greenstadt
@ragreens
Associate Professor
Drexel University
De-anonymizing Programmers from Source Code and Binaries
August 10, 2018
1
Stylometry
Natural language
English
English as a second language
Translated text
Underground... | pdf |
Tesla released the P85D in 2014. At that time the vehicle came with "insane mode"
acceleration with a 0-60 time of 3.2 seconds. Later in July of 2015, Tesla announced "Ludicrous
mode" that cut the 0-60 time down to 2.8 seconds. This upgrade was offered both new and as a
hardware and firmware change to the existing f... | pdf |
Interview with Edgar Mitchell, ScD., Captain USN (Ret)
by
Richard Thieme
RT: You’ve been involved with consciousness studies, including the exploration of
UFOs, for some time. What’s your primary focus?
EM: My focus has never been primarily on UFOs. My focus has been consciousness
studies for thirty years. I kind of... | pdf |
Art by Francesco Ciccolella
www.francescociccolella.com
Inside the Fake Science Factory
Svea, Chris & Till
Presented at DEF CON 26. Las Vegas 11th August 2018.
Talk
questions
+ answers
16.45
This talk
Documentary
Longer
questions
+ answers
17.45
16.00
Design
Conduct
experiments
Preliminary
results
Writing paper
Feb... | pdf |
Eternal Exploits
Reverse Engineering of FuzzBunch and MS17-010
zerosum0x0
August 1983
Warning!
Presentation may contain classified information.
Those with active security clearances are forewarned.
TOP SECRET//SI/TK//NOFORN//ICATION//4201337//REL TO DEF CON
Spot The Fed
Champ 2018
Agenda
●
Recap
(~2 mins)
○
Equation G... | pdf |
业务漏洞挖掘
案例与思考分享
微博安全高级工程师 唐茂凡
现状
01
01 现状
分类
常 规
注入、XSS、XXE、CSRF、SSRF、文件包含、命令执行、
URL重定向、点击劫持等
其 他
网络层漏洞、系统层漏洞、
组件套件中间件漏洞等
业 务
登录认证、业务办理、业务数据、业务流
程逻辑、业务授权访问、业务接口调用、验
证码、输入\输出、回退、密码找回、密码
重置、实名认证、设置个人信息、绑定银行
卡、红包优惠券、订单CURD、充值、支付、
提现......
01 现状
不同
01
04
02
03
漏洞成因
复杂度
场景流
程变化
多端
通用性
风险点
隐蔽
不 同
01 现状
为什么业务安全越来越受重视... | pdf |
FOR THE LOVE OF MONEY
Finding and exploiting vulnerabilities in mobile point of sales
systems
LEIGH-ANNE GALLOWAY & TIM YUNUSOV
MPOS GROWTH
2010
Single vendor
2018
Four leading vendors
shipping thousands of units per day
Motivations
Motivations
MWR Labs “Mission mPOSsible” 2014
Related Work
Mellen, Moore and Losev ... | pdf |
The Remote Metamorphic Engine
Detecting, Evading, Attacking the AI and Reverse Engineering
Amro Abdelgawad / DEFCON 24
line46_1:
mov ecx, [esp]
nop
nop
mov dl, 0xe9
test edx, edx
mov byte [ecx], dl
xor eax, 0
mov edx, 0x00000067
mov dword [ecx+1], edx
ret
line95:
pushad
p... | pdf |
Theft Of Service
Attacks
Subscription Service &
Website Vulnerabilities
Presented at Defcon 11 by:
Robert Sheehy
rjs@zendtech.com
Zendtech Services
www.zendtech.com
Presentation updates are available at:
http://www.zendtech.com/defcon11/tos
Theft Of Service Attacks
What Are Theft Of Service Attacks?
Application Lev... | pdf |
Atlassian Confluence(简称Confluence)是⼀个专业的wiki程序。它是⼀个知识管理的⼯具,通过它
可以实现团队成员之间的协作和知识共享。本次漏洞为 Ognl 表达式注⼊,攻击者可未授权通过 Ognl
表达式在服务器上执⾏任意代码。
影响版本:
version < 6.13.23
6.14.0 ≤ version < 7.4.11
7.5.0 ≤ version < 7.11.5
7.12.0 ≤ version < 7.12.5
环境搭建
执⾏下载的 bin ⽂件后,选择⼿动安装,并指定安装路径和服务运⾏端口,安装完成后执⾏
/atlassian/jira/atlassian-jira-8132/ji... | pdf |
Get-$pwnd
Attacking Battle-Hardened Windows Server
Lee Holmes | @Lee_Holmes
Lead Security Architect, Azure Management | pdf |
快手应用安全演进之路
讲师介绍
• 廖新喜
•
大连理工大学毕业
•
快手Web安全负责人,原绿盟科技安全研究经理,8年安全攻防经验和2年
甲方安全建设经验
•
2011-2014,三年安全开发经验,担任绿盟科技极光扫描器开发
•
2014-2019,五年安全攻防经验,国内各大安全峰会演讲嘉宾;专注于
Web漏洞挖掘,尤其是Java反序列化漏洞,曾向RedHat、Apache、
Amazon,Weblogic和阿里提交10余份RCE级别漏洞报告,被誉为国内
Weblogic漏洞挖掘和反序列化漏洞挖掘的领导者
•
2019-现在,快手Web安全负责人,专注于甲方应用安全建设,对于漏洞
收敛有独到的见解,所带领的项目《Java代码安全漏... | pdf |
A"Hacker’s"Guide"to"Risk
Bruce"Potter
DefCon
gdead@shmoo.com ||"bpotter@keywcorp.com
Don’t"believe"anything"I"Say
• Also,"hold"those"around"you"accountable
Failures"in"Understanding"Risk
• Fukushima
• BP"Oil"Spill
The"other"side"of"the"coin…
• Takata airbag"recall
– Airbag"inflator"may"rupture"shoot"shrapnel"onto"
pass... | pdf |
#BHUSA @BlackHatEvents
Living Off the Walled Garden:
Abusing the Features of the Early Launch
Antimalware Ecosystem
Matt Graeber
Director, Threat Research @ Red Canary
#BHUSA @BlackHatEvents
Information Classification: General
Who protects the protector?
Introduction to ELAM and PPL
#BHUSA @BlackHatEvents
Information... | pdf |
Apache Struts2 RCE via Log4j2 CVE-2021-44228
环境搭建
首先搭建环境
下载源码:https://dlcdn.apache.org/struts/2.5.27/struts-2.5.27-all.zip,解压
复制struts-2.5.27\src\apps\showcase文件夹到自己的测试目录,右键用IDEA打开
配置tomcat,启动即可
注:确认是否使用log4j2组件
漏洞分析
根据流传的payload中携带的HTTP头字段 If-Modified-Since 找到对应的源码位置,下断点
org.apache.struts2.dispatcher.DefaultStaticCont... | pdf |
1
NetRipper
Smart traffic sniffing for penetration testers
Ionut Popescu
KPMG
Bucharest, Romania
ionut.popescu@outlook.com
April 2015
Abstract — The post-exploitation activities in a penetration test can be challenging if the tester has low-
privileges on a fully patched, well configured Windows machine. This w... | pdf |
Jennifer Stisa Granick, Esq.
Exec. Director, Center for Internet & Society
Stanford Law School
Stanford, California USA
http://cyberlaw.stanford.edu
Black Hat Briefings 2007
Intellectual Property Law and Vulnerability
Reporting
Cisco and ISS v. Lynn (2005)
• http://www.granick.com/blog/
• http://www.wired.com/science/d... | pdf |
Intranet Invasion
Through Anti-DNS Pinning
David Byrne, CISSP, MCSE
Security Architect
EchoStar Satellite L.L.C. / DISH Network
DavidRiByrne@yahoo.com
Introduction
DNS pinning was introduced by web browsers to avoid DNS-spoofing attacks
facilitated by client-side code execution. A number of factors including i... | pdf |
HITCON GIRLS 的第一個軟體
破解課程
Charles
課程內容
• 逆向工程與軟體破解概念簡介
• Lab 0
• 軟體破解前你必須知道的二三事
• Lab 1
• 通往破解點的道路 – Strings 與 API
• Lab 2
• 軟體破解實戰Demo – 010 Editor
逆向工程與軟體破解
• 何謂逆向工程 – 從宅仔和小P的愛情故事說
起
逆向工程與軟體破解
• 何謂逆向工程 – 宅仔深愛著小 p,卻發現自
己聽不懂她說的話
!@#$%^&*
()_+
int main(){
printf(“I love you\n!!”);
}
817C24 08 1101>... | pdf |
The cookie monster
in your browsers
@filedescriptor
HITCON 2019
@filedescriptor
• From Hong Kong
• Pentester for Cure53
• Love WebApp Sec & Browser Sec
• Bug Bounty Hunter (#1 on Twitter's program)
Motivation
Motivation
Motivation
History
1966
The Dark Age
1994
1997
2000
Netscape's cookie_spec
RFC 2109
RFC 2965
Basic ... | pdf |
Malicious Proxies
The Web’s Evil Twin
Introducing Doppelganger
Introduction
• Who am I?
• Security field since 1998
–IDS
–Pen testing
–Malicious logic analysis
–Incident response
(c) 2009 Edward J. Zaborowski
4
• Focusing on HTTP proxies
• Plenty of reasons to legitimately deploy a
proxy
– Save bandwidth
– Filtering o... | pdf |
0x01 前言
这种反制也只能钓 "涉世未深" 的攻击方,和一些脚本小子,算是蚁剑插件编写不规范造成的RCE
0x02 DHTMLX
在 \source\app.entry.js : 行28-57 可以看得见蚁剑在新版加载器中设置了替换函数,将对应的特殊
字符替换成实体编码!
它调用了dhtmlx框架,所以只要是UI渲染的页面都可能存在 XSS->RCE
我把目标盯向了其他插件
0x03 AS_Plug-in
从自带的插件实例的代码开始看: phpinfo
在 行14-22 当中,渲染UI框架的时候,调用了 unxss 可以知道这个地方不存在XSS漏洞
noxss: (html = '', wrap = true) => {
... | pdf |
Hacking mobile network via SS7:
interception, shadowing and more
Dmitry Kurbatov
Vladimir Kropotov
Positive Research
Agenda
• Intro
• Attacks prerequisites, costs and case studies
• Official and underground market brief
• Possible Security measures
• Forecasts
In Service LTE Networks
VoLTE Networks
http:... | pdf |
Suicide Risk Assessment
and Intervention Tactics
and Intervention Tactics
Amber Baldet
This won't be
depressing.
Trigger Warning:
Discussion of mental health, self-harm,
substance use/abuse, trauma, suicide
depressing.
amberella@attrition.org
@amberbaldet
The Numbers
Leading Causes of Death in the United St... | pdf |
Jon Rose
Trustwave’s SpiderLabs
Flash Remoting Technologies
Flex Data Services
• Data Management
– Update client and/or server when data changes
• Messaging
– Real Time Messaging protocol (RTMP)
– Pub-sub model
– Real-time data streaming
• Remoting
– HTTP, SOAP, AMF
– Automatic data marshalling ... | pdf |
Forensic Data Recovery – MyHardDriveDied.com © 2009
1
RAID by Sight and Sound
By Scott A. Moulton
Of
My Hard Drive Died &
Forensic Strategy Services LLC
Forensic Data Recovery – MyHardDriveDied.com © 2009
2
Topics for Talk
• Brief Coverage of NOT RAID
• Brief Intro to RAID
• RAID 0
• RAID 5
• Demo o... | pdf |
Upload
Upload
Upload
Upload Attack
Attack
Attack
Attack Framework
Framework
Framework
Framework
Version
Version
Version
Version 1.0
1.0
1.0
1.0
CasperKid [Syclover][Insight-Labs]
2011/10/6
[*] Team : Syclover Security Team & Insight Labs
[*] Web : www.myclover.org & www.insight-labs.org
[*] Blog : hi.baidu.com/hackerca... | pdf |
PCI 2.0:
Still
Compromising Controls
and
Compromising Security
PCI? At DefCon? Again?
Use the hashtag #DefconPCI to rant on the
Twitterz during this talk. We damn sure will!
Use @defconPCIpanel for
comments or Twitter-heckling
Who are we?
• Dave Shackleford @daveshackleford
• Joshua Corman @joshcorman
• J... | pdf |
Routing in The Dark
Scalable Searches in Dark P2P Networks
Ian Clarke and Oskar Sandberg
The Freenet Project
Ian Clarke & Oskar Sandberg - 2005 – p.1/33
Introduction
• We have long been interested in decentralised
“Peer to Peer” networks. Especially Freenet.
Ian Clarke & Oskar Sandberg - 2005 – p.2/33
Introduction
• We... | pdf |
Criminal charges are not pursued:
Hacking PKI
Mike Zusman
Principal Consultant
mike.zusman@intrepidusgroup.com
About the Title
From StartCom Critical Event Report
https://blog.startcom.org/?p=161
Thanks to StartCom for quickly fixing
the bug I found
These guys care about PKI!
Intrepidus Group, Inc. © 2008
2
O... | pdf |
Trusted Computing, Peer-To-Peer Distribution,
and the Economics of Pirated Entertainment
Stuart E. Schechter, Rachel A. Greenstadt, and Michael D. Smith
Harvard University
{stuart,greenie,smith}@eecs.harvard.edu
May 16, 2003
Abstract
The entertainment industry, facing a formidable threat from peer-to-
peer piracy netwo... | pdf |
Browser Based Defenses - (c) 2010 All Rights Reserved
1
Browser Based Defenses
Introducing x06d
james@bluenotch.com
Browser Based Defenses - (c) 2010 All Rights Reserved
2
The Problem:
Re-Anonymizing You!
• Overall State of the Web
– Client/Browser issues
• Hard to make public browsers secure
• …at least enough to ke... | pdf |
Satellite's Gone...
Works in progress
Major Malfunction
aka
Adam Laurie
adam@algroup.co.uk
http://rfidiot.org
Who Am I?
● CoPublisher APACHESSL
● DEFCON 'goon'
● Open Source developer / researcher
– Bluetooth
– RFID
– Full Disclosure / White Hat!
● Freelance research / training / lecturing
Feed Hunting
● Look for 'i... | pdf |
Bundles of Joy
breaking macOS via subverted application bundles
@patrickwardle
WHOIS
@patrickwardle
tools, blog, & malware collection
"Objective by the Sea"
(macOS security conference)
Book(s):
"The Art of Mac Malware"
In the wild?
OUTLINE
Background
Protection
& detection
The flaw
Patch
Topics covered: os int... | pdf |
Through the Looking-Glass,
and what Eve found there
http://www.s3.eurecom.fr/lg/
Luca 'kaeso' Bruno <lucab@debian.org>,
Mariano 'emdel' Graziano <graziano@eurecom.fr>
2
10/08/2014
About us
• S3 group at Eurecom (FR) - System security
– Embedded systems
– Networking devices
– Critical infrastructures
– Memory forensics ... | pdf |
本篇文章翻译自:Offensive WMI - The Basics (Part 1) :: 0xInfection's Blog — Random
ramblings of an Infected Geek.
这篇文章是有关 WMI 的多篇系列文章中的第一篇,如果读者对 PowerShell 有个基本的了解,那么对阅
读本篇文章会有所帮助,但这不是必需的。
一、介绍
1.1 为何是 WMI
WMI 是 Microsoft 的一组规范,旨在对 Windows 系统进行快速高效的管理。正如你可能知道的那样,
一项安全规则表明任何对管理有用的东西也很容易被不法分子滥用,WMI 确实可以做很多事情 —— 从
收集计算机状态和配置设置到运... | pdf |
Aura
A peer-to-peer reputation system
Cat Okita
Copyright 2003
2
INDEX
INDEX ................................................................................................................................................................... 2
ABSTRACT ....................................................................... | pdf |
2018年浏览器脚本引擎零日漏洞
Elliot Cao
Trend Micro
2019-05-30
Whoami
• 入行之前是电气工程师
• 2017年加入趋势科技
• 沙箱开发人员
• 2018年开始研究浏览器漏洞
• 专注于浏览器脚本引擎
• Lei Cao (@elli0tn0phacker)
目录
• 2018年的浏览器零日漏洞
• VBSEmulator
• Chakra
2018年的浏览器零日漏洞
2018年的浏览器零日漏洞
• Flash: CVE-2018-4878 CVE-2018-15982
• VBScript: CVE-2018-8174 CVE-2018-8373
• JScript: ... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.