text
stringlengths
100
9.93M
category
stringclasses
11 values
E nhance S ecurity A w areness w ith D ata M ining Data-driven Intrusion Detection Solutions in Alibaba Cloud Yue Xu (cdxy) Security Engineer @ A lib ab a C loud H an Zheng (LittleH ann) Security Engineer @ A lib ab a C loud M ay 29, 2019 Enhance Security Awareness with Data Mining Data-driven Intrusion Detection Solu...
pdf
RCE 0x00 NO p “java0day” https://t.zsxq.com/EAMb2V3 https://t.zsxq.com/3jQ7Y3B checklist 0x01 1. 2. 3. payload 4. rce 5. 1. 2. 3. 0x02 1. xxxxxx 2. payload 3. F8 0x03 1. source 2. sink 3. 4. trick 111RCE 1312 4513 trick 0x04 SQL SQL XSS Javascriptcookie javagadget SSRF owasp RCEcombo 1. + 2. + 3. ++P...
pdf
title: 蚁剑改造计划之支持内存马 author: yzddmr6 blog: yzddmr6.tk 前言 最近因为各种事情太忙了,博客也很久没有更新了。今天暂且先水一篇。 前几天发了一版新的蚁剑JSP一句话的payload,这篇文章记录一下更新的细节。 1. 兼容高版本JDK 这个没啥好说的,就是base64解码的问题。在jdk9开始移除了sun.misc这个包,导致原有的 sun.misc.BASE64Decoder 没法继续使用,取而代之的是 java.util.Base64 这个类。 解决办法就是两个都试一下,看哪个能解码成功,核心代码如下 2. 兼容Tomcat内存马 这个问题可以掰扯一下。很多文章都提到了冰蝎或者蚁剑...
pdf
Hardware Hacking for us dumb software guys My Story  Done software since 1999  Degree in Computer Science  Done a little hardware over the years  About five years ago bought a Microchip PIC Kit  The labs were cool and easy to get working  Anything practical was difficult (low level assembly) Defcon 17  Bought ...
pdf
Phreaking Elevators Who am I? ● Car hacking things ● High voltage projects ● CTFs (lifetime badge winner for Cyphercon) ● Infosec is a hobby ( I might be looking for a job) ● I am new to the infosec world (3 years) ● Car hacking things ● High voltage projects ● CTFs (lifetime badge winner for Cyphercon) ● Infosec is a ...
pdf
Bugged&Files& Is#Your#Document#Telling#on#You?# Daniel#Crowley,#Damon#Smith# •  Damon&Smith& Who&are&we?& •  Daniel&Crowley& Files&that&trigger&outbound&traffic&when&parsed& & &Without&being&an&executable&format& &Regardless&of&format&complexity& &&&&&&Without&the&use&of&exploits& & &…and&the&implications&of&all&that& Wh...
pdf
SHODAN for Penetration Testers Michael “theprez98” Schearer SHODAN for Penetration Testers  What is SHODAN?  Basic Operations  Penetration Testing  Case Study 1: Cisco Devices  Case Study 2: Default Passwords  Case Study 3: Infrastructure Exploitation  Other Examples  The Future  Conclusions By pen testing, I...
pdf
《PHP 安全基础详解》 www.528163.cn 提供 《 《 《 《PHP 安全基础 安全基础 安全基础 安全基础详解 详解 详解 详解》 》 》 》 www.528163.cn 提供 《PHP 安全基础详解》 www.528163.cn 提供 第一章 第一章 第一章 第一章 简介 简介 简介 简介 PHP 已经由一个制作个人网页的工具发展成为了世界上最流行的网络编程 语言。它保证了许多网络上最繁忙的站点的运行。这一转变带来了亟待关注的问 题,那就是性能、可维护性、可测性、可靠性以及最重要的一点—安全性。 与语言的一些功能如条件表达式、循环结构等相比,安全性更为抽象。事实 上,安全性更像...
pdf
WhiteSpace: A Different Approach to JavaScript Obfuscation DEFCON 16 August, 2008 Kolisar 1 Introduction • What led to WhiteSpace? 2 Agenda • What is “WhiteSpace”? • A Brief Survey of Current JavaScript Obfuscation Methods • The Telltale Indicators of Obfuscation • The Components of this Approach • Demo 3 What is “Wh...
pdf
Hardware Backdooring is practical Jonathan Brossard (Toucan System) DISCLAIMER  We are not « terrorists ». We won't release our PoC backdoor.  The x86 architecture is plagued by legacy. Governments know. The rest of the industry : not so much.  There is a need to discuss the problems in order to find solutions......
pdf
Steal Everything, Kill Everyone, Cause Total Financial Ruin! (or how I walked in & Misbehaved!) Jayson E. Street, C|EH, CISSP, GSEC, GCIH, C|IH, IEM, IAM, ETC… Let go of my EGO Who Am I? @jaysonstreet Let go of my EGO Who Am I? @jaysonstreet Hacker/Social Eng...
pdf
CVE-2022-34916 JNDI命令执 ⾏执⾏漏洞 H1 H2 项⽬介绍 Flume 是⼀种分布式、可靠且可⽤的服务,⽤于⾼效收集、聚合和移动⼤量⽇志数据。它具 有基于流数据流的简单灵活的架构。它具有可调整的可靠性机制以及许多故障转移和恢复机 制,具有健壮性和容错性。它使⽤允许在线分析应⽤程序的简单可扩展数据模型。 H2 项⽬地址 https://flume.apache.org/ H2 漏洞概述 当攻击者控制⽬标 LDAP 服务器时,如果配置使⽤带有 JNDI LDAP 数据源 URI 的 JMS 源, Apache Flume 版本 1.4.0 到 1.10.0 很容易受到远程代码执⾏ (RCE) 攻击。通过将 JNDI ...
pdf
Writeup - Nu1L Writeup - Nu1L WEB laravel do you know zzm's blog hate-php MISC run loop mc philosopher Welcome to 5space CRYPTO tinysocks rosb PWN pwnme twice of REVERSE nop ManageCode rev WEB lib/webuploader/0.1.5/server/preview.php curl http://119.3.183.154/daochu.php\? type\=1\&imei\=aaa\&imei2\=ttt%22union%20se...
pdf
1 反序列化脏数据 Java反序列化数据绕WAF之加⼤量脏数据 https://mp.weixin.qq.com/s/wvKfe4xxNXWEgtQE4PdTaQ 其实就是再最外层封装⼀层,只要该类有对象属性,⼀般来说在反序列化的时候都会试着调⽤该属性的 readObject去还原他。所以我们要找的class,第⼀需要实现java.io.Serializable接⼝,第⼆可以存储任 意对象。这么看来集合类型就⾮常符合我们的需求。 如 1. ArrayList 2. LinkedList 3. HashMap 4. LinkedHashMap 5. TreeMap 这个思路是基于@Y4tacker师傅做的扩展,源头总...
pdf
CMS 0x00 CMS assign_resume_tpl http://www.74cms.com/news/show-2497.html /Application/Common/Controller/BaseController.class.php assign_resume_tpl 0x01 CMS Thinkphp 3.2.3 3.2.3 URL CMS GET Home User login mca/GET http://serverName/index.php/// http://localhost/?m=home&c=user&a=login&var=value 'VAR_MODU...
pdf
WMI + MSI Lateral Movement NO WIN32_PROCESS NEEDED – EXPANDING THE WMI LATERAL MOVEMENT ARSENAL 原文很棒,建议阅读,本质上仍然是对wmi的利用 如标题所说,利用的WMI执行MSI包,一般我们用的 WIN32_PROCESS 类,但这里不是 WIN32_PROCESS 类。 Execution 使用msfvenom生成一个payload: wmic 对 - 敏感,这里使用了双引号避免出现问题 这里的用户前面加了一个 . ,不加 . 会导致拒绝访问,另外要求目标机器本地管理,如果是域 环境,域管也可。 WMIC 任然是通过 rpc ...
pdf
Machine Duping Pwning Deep Learning Systems CLARENCE CHIO MLHACKER @cchio adapted from Dave Conway HACKING MATH & STATS MACHINE LEARNING 1337 HAX0R ACADEMIC RESEARCH Deep Learning deep neural networks (DNN) • Not a new toy - history goes back to 1943 • MUCH MORE DATA EVERYWHERE • Revived due to improvements i...
pdf
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda ● Introduction ● VoIP Overview ● Security ● Conclusion Voice over IP (VoIP) Good News ● Cheap phone calls ● Explosive growth in recent years ● Internet telephony converging with the PSTN Other News ● Immature security best practi...
pdf
Pwned by the Owner Zoz Months! Fuck! Fuck! ...time passes... WTF! % nslookup 72.193.81.105 Server:127.0.0.1 Address:127.0.0.1#53 Non-authoritative answer: 105.81.193.72.in-addr.arpaname = ip72-193-81-105.lv.lv.cox.net. Authoritative answers can be found from: 81.193.72.in-addr.arpanameserver = ns.cox.net. 81.193.72.in-...
pdf
Vulnerability Exchange: One Domain Account for More Than Exchange Server RCE Tianze Ding (@D1iv3) > whoami • Tianze Ding (@D1iv3) – Senior security researcher at Tencent Security Xuanwu Lab – Focusing on Active Directory Security / Red Team / Web Security – Reported some vulnerabilities to Microsoft, Apple, Google, et...
pdf
泛微审计小结 0x00:起因是群里周末发了一个 cnvd 收录泛微注入的截图。。然后找泛微要了一份补丁 发现漏洞位置在/upgrade/detail.jsp 登陆后的注入,,没啥卵子用。。遂自己扒了套代码自己审计 0x01:未授权的 sql 注入 漏洞位置:/clusterupgrade/getProcessInfo.jsp 跟进去 注入点发生在上图 408 行 实际测试中发现泛微全局的 filter。。。黑盒绕的。。比较迷。。。简单 fuzz 了下 得到了如 下 poc 这时候发现这个 poc 的字段位置。。只要填入非数字型字符。。union 就被转成乱码。。 这里实在不想再饶了。。留个坑。。 然后又碰到了另一个坑(mmp 的泛微...
pdf
OTP circumventing in MIFARE ULTRALIGHT: Who says free rides? bughardy bughardy@cryptolab.net Eagle1753 eagle1753@onenetbeyond.org Introduction RFID technologies are becoming more and more prevalent in our lives. This motivated us to study them, and in particular to study the MIFARE ULTRALIGHT chips, which are widel...
pdf
REDNAGA ANDROID COMPILER FINGERPRINTING CALEB FENTON - TIM “DIFF” STRAZZERE 07.22.2016 HITCON COMMUNITY 2016 WHO ARE WE • Banded together by the love of 0days and hot sauces • Random out of work collaboration and pursuit of up-leveling the community • Disclosures / Code / Lessons available on GitHub • rednaga.i...
pdf
The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirect Wireless Pivots DEF CON Gabriel “solstice” Ryan net user author /domain Gabriel Ryan Security Engineer @ Gotham Digital Science Appsec | Infrastructure Testing | Red Team | Research @s0lst1c3 gryan@gdssecurity.com labs@gd...
pdf
• • • • • • • • • • REVIEW THE POST AT: HTTPS://DEFCONGROUPS.ORG/DCGSTART.HTML • • IT'S BASED ON LOCAL PHONE CODES FROM • YOU CANNOT BE DC042 OR DC666 OR DC11010100011 • • BASED ON DIALING CODES AND AREA CODE *FROM THE USA* • E.G. EDMONTON, CANADA = DC780 BECAUSE OF NORTH AMERICA, BILDA, ALGERIA = DC11213 (21 IS COUNT...
pdf
Xploiting Google Gadgets: Gmalware and Beyond Robert Hansen Tom Stracener DRAFT: Complete slides will be made available after our talk. The Dark Side of Gadgets Complete slides will be made available after the our talk on August 8th. Xploiting Google Gadgets: Gmalware and Beyond Tom Stracener & Robert Hansen (...
pdf
Beacon、Payload、Shellcode我傻傻分不清 1. 前言 有一段时间我发现好多安全从业者,也包括我,分不清楚C2工具中的一些名词,包括:Beacon、 Payload、Shellcode、Loader、Stager、Stagerless等。没办法都是舶来品,洋大人的文章中有时候也 是乱用的,更不要说国内的相关文章,导致大家对以上词汇的理解出现了分歧。然后就出现了相互交流 的时候鸡同鸭讲的情况,以下是我对这些词汇的理解,有分歧欢迎讨论。 2. Beacon和Payload 前段时间看见这么一段话: 没有任何贬低和攻击的意思,我私信作者讨论了下,关于什么是Beacon。 Beacon字面意思是信标,主要功能有:心跳和执行...
pdf
1 Linux下echo计算哈希的坑 因为遇到好⼏次了,每次都忘记,搞得要怀疑⼈⽣⼏分钟,故简单记录下避免下次⼜⼊坑。 linux下常⽤的计算的哈希命令: md5sum sha256sum 但是这两个命令读取的是参数指定的⽂件名,或者是标准的输⼊。 那么如果我们想加密单个字符串的时候,⼀般会这样利⽤管道符来使⽤: 1. echo '123' |md5sum 2. echo '123'|sha256sum 得到的是: 123 -> md5 -> ba1f2511fc30423bdbb183fe33f3dd0f 123 -> sha256 -> 181210f8f9c779c26da1d9b2075bde0...
pdf
Android weblogin: Google's Skeleton Key Craig Young, Tripwire VERT # whoami I research, identify, and disclose vulnerabilities as a senior researcher in Tripwire VERT. I enjoy long bike rides, breaking things which fail to sanitize input, and building furniture with my wife on the weekend. DISCLAIMER: I am definitel...
pdf
[root@sslvpn /]# netstat -tulnp Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 127.0.0.1:9990 0.0.0.0:* LISTEN 25124/node tcp 0 0 0.0.0.0:51111 0.0.0.0:* ...
pdf
《PHP 安全基础详解》 www.528163.cn 提供 《 《 《 《PHP 安全基础 安全基础 安全基础 安全基础详解 详解 详解 详解》 》 》 》 www.528163.cn 提供 《PHP 安全基础详解》 www.528163.cn 提供 第一章 第一章 第一章 第一章 简介 简介 简介 简介 PHP 已经由一个制作个人网页的工具发展成为了世界上最流行的网络编程 语言。它保证了许多网络上最繁忙的站点的运行。这一转变带来了亟待关注的问 题,那就是性能、可维护性、可测性、可靠性以及最重要的一点—安全性。 与语言的一些功能如条件表达式、循环结构等相比,安全性更为抽象。事实 上,安全性更像...
pdf
高级攻防下的WEBSHELL About Me 0 1 •"张一臣 BeichenDream; •"360政企安全-高级攻防实验室-安全研究资深工程师 •"JVM安全研究者 •"哥斯拉作者 目录 CONTENTS 0 1 01 PART"01 流量对抗 02 PART"02 武器化 03 PART"03 内存马 05 PART"05 Agent对抗 06 PART"06 正向代理 07 PART"07 哥斯拉插件扩展 04 PART"04 Java反射绕过 PART.01" 0 2 对抗流量审查 •" 伪装正常业务的流量 为什么要对抗流量审查 0 1 蚁剑 •"防止流量被他人窃取分析 •"不想被人发现异常流量 •"防止被WAF拦截 ...
pdf
Stolen Data Markets: An Economic and Organizational Assessment This project was supported by Award No. 2010-IJ-CX-1676, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this publication are...
pdf
Attacking Autonomic Networks 2 #sh run o o o 3 Agenda o o o o 4 Autonomic Systems o o 5 Autonomic Network o o o o Autonomic Network logo as shown by Cisco in their presentations here and here 6 Live Demo 7 Demo Results o o o 8 Cisco Deployment o o o o 9 Channel Discovery o o 10 Adjacency Discovery o o o o o 11 Adjace...
pdf
Golang红队开发指南 目录 1 2 3 ProjectDiscovery Golang 植入端对抗方案 Golang C2 Sliver 1. 像Python一样简单,代码可读性好 2. 简单的多架构交叉编译支持 3. 语法层面的并发支持 4. 易用的包管理 & 很多红队生态 前言 为什么是Go Par t1:ProjectDiscover y 域名收集 Subfinder:通过各种api接口被动收集子域名 Uncover:整合各种网络空间引擎api接口 Dnsx:dns验证 资产探测 Httpx:web信息探测 Naabu:端口扫描 PoC Nuclei:Poc批量探测 通知 Notify:整合第三方结果通知 ProjectD...
pdf
在WAF⼦子 Who am I IdMayIKissYou 01 WAF Nginx-lua-waf Modsecurity web的WAF这 02 WAF 多只http://www.miku.com/ 1.php?id=1%20and1=1 ⽤用多情情 只TCP/IP⽤用到 情WAF下情 WAF bypass Know It Then Bypass It 03 WAF BYPASS 上BYPASS WAFWAF /这WAF上 你上个这 上上 上这 上WAF上bypassWAF 这 04 WAF BYPASS Puzzle到 bypass 到对发WAF情到对mysql情sqlserve...
pdf
ASM in .NET: The old is new again by Jon McCoy(DigitalBodyGuard) Abstract: This paper will cover running raw Machine Code(ASM) from within .NET. As we all know .NET runs on IL(Intermediate Language) also known as “Managed byte code”. A program can declare an unsafe section of code and drop out from the managed area t...
pdf
PROXY PRANK-O-MATIC starring charlie vedaa, ccie #7502 and anonymous speaker A messAGE fROM Jules A messAGE fROM Jules If you’re easily offended… A messAGE fROM Jules If you’re easily offended… now would be a good time to go fuck yourself. A messAGE fROM Jules If you’re easily offended… now would be a good time to go...
pdf
An Analysis of the State of Electron Security in the Wild Bachelor’s Thesis Benjamin Altpeter August 1, 2020 supervised by Prof. Dr. Martin Johns Declaration of Authorship I hereby declare that the thesis submitted is my own unaided work. All direct or indirect sources used are acknowledged as references. I am aware th...
pdf
序 推荐序 随着远程办公等应用的爆发,零信任安全理念得到迅速发展。中国产业互联网发展联盟零信任产业标准工 作组集结业界优势机构,基于实战经验和研究积累,研制和推出本白皮书,希望能为零信任产业发展带来新动 能。——中国产业互联网发展联盟秘书长 雷晓斌 本白皮书基于产业实践,给出了详细的技术实现和应用案例,为安全从业者提供了很好的借鉴。随着零信 任理念在国内的快速普及和落地,相关产品和解决方案要更加重视合规要求,这是安全管理的需要也是能被市 场认可的基础。——公安部第三研究所(国家网络与信息系统安全产品质量监督检验中心)副主任 顾健 零信任实战白皮书的发布,期待能为企业安全管理者、技术研发和运维等人员提供有价值的参考。腾讯基 于超大型企...
pdf
DEF CON 101 FIRST – A BRIEF MOMENT OF SILENCE DevNull KingTuna WELCOME TO DEF CON HighWiz @highwiz Will @bsummerz Niki7a @Niki7a Magen Wu @magen_wu SecBarbie @SecBarbie Shaggy @ShaggyMcG n00bz @n00bznet MEET THE PANEL WELCOME TO LAS VEGAS Pace Yourself THIS IS DEF CON DGAF Everyone was a n00b once. All of us are stil...
pdf
Winnti is Coming - Evolution after Prosecution TeamT5 2 研究員 UCCU 成員 工程師 Peter Syu 001 “Twice 推廣社” 社長 工程師 Tom Lai 456 研究員 Aragorn Tseng 首席分析師 Charles Li Who we are AGENDA 01 02 03 04 05 Initial Access Cobalt Strike Loader APT41’s Backdoor C2 Hiding Technique Relation to other operations 06 Takeaway Who is Winnti? 4 Winn...
pdf
Lockpicking Forensics datagram datagram.layerone@gmail.com Defcon 17, 2009 Agenda  How locks/picks work  Normal wear  Lock Analysis  Key Analysis  Investigative process Destructive entry still #1! How Locks Work How Locks Work How Locks Work How Locks Work Pin Binding Pin Binding Picking a Lock Apply tension Fi...
pdf
Drones Hijacking Aaron Luo Cyber Safety Solution multi-dimensional attack vectors and countermeasures Agenda • Introduce the drone architecture • Vulnerabilities on which component? • Demo • Provide the prevention solution • Release attack/defense tools on GitHub. Today, our target is… DJI-Phantom 3 Advanced DJI Pha...
pdf
第一章 概论 ..................................................................................................................1 1.1 网络的历史.......................................................................................................1 1.2 OSI 模型.........................................................................
pdf
Technical Service Bulletin: FXR-13 Modifying Motorola Maxtrac VHF 136 – 174 MHz for Amateur Radio Applications in the 222 – 225 MHz Band A FluX Research project in several phases Release Date: 07-01-2010 Last Update: v1.0 07-01-2010 By: Matt Krick, K3MK matt@kgmn.net Radio Model #: Motorola Maxtrac 100 Motorola Max...
pdf
Module 1 A journey from high level languages, through assembly, to the running process https://github.com/hasherezade/malware_training_vol1 Wow64: 32 bit PE on 64 bit Windows WoW64: basics • Backward compatibility: running 32 bit applications on 64 bit Windows • 32 bit application must be isolated from the 64 bit evi...
pdf
11 Dark.Net Dark.Net gasgas gasgas 22 簡介 簡介 Malware Malware Dot Net Framework Dot Net Framework .net .net rootkit rootkit Anti tech Anti tech Q & A Q & A 33 Malware Malware 44 Malware Malware Virus Virus Backdoor Backdoor Trojan horse Trojan horse Rootkit Rootkit Scareware Scareware Adware Adware Worm Worm...
pdf
By Alon Weinberg Please inject-me, a x64 code injection August 2019 I’m a Security researcher! I’ve been working at Deep Instinct, Since 2017 And I was in the IDF Cyber Unit for 4.5 years Alon Weinberg Please inject-me a x64 code injection Intro ▪ Code injection and its importance ▪ Introducing Inject-Me Technical bac...
pdf
从S-SDLC视角看API安全 【API威胁检测防御】专题研讨会 Silver Zhang 为何将API安全拧出来说 为何将API安全拧出来说 感冒 VS. 禽流感 感冒 VS. 禽流感 应用安全 VS. 移动安全 应用安全 VS. 移动安全 新业态 新业态 API历史沿革及风险评估 API面临的安全挑战 传输 存储 认证 授权 输入 输出 ➢ 客 户 端 不 支 持 加 密 传 输 协 议 怎 么 办 ➢ 客 户 需 要 走 非 加 密 支 持 代 理 ➢ 客 户 端 未 做 服 务 端 证 书 合 法 有 效 性 校 验 怎 么 办 ➢ 服 务 端 加 密 数 据 如 何 让 客 户 端 解 密 ➢ 客 户 的 服 务 端 与 ...
pdf
TC260-PG-20212A 网络安全标准实践指南 —网络数据分类分级指引 (v1.0-202112) 全国信息安全标准化技术委员会秘书处 2021 年 12 月 本文档可从以下网址获得: www.tc260.org.cn/ I 前 言 《网络安全标准实践指南》(以下简称《实践指南》) 是全国信息安全标准化技术委员会(以下简称“信安标委”) 秘书处组织制定和发布的标准相关技术文件,旨在围绕网络 安全法律法规政策、标准、网络安全热点和事件等主题,宣 传网络安全相关标准及知识,提供标准化实践指引。 II 声 明 本《实践指南》版权属于信安标委秘书处,未经秘书处 书面授权,不得以任何方式抄袭、翻译《实践指南...
pdf
android appios iosios iphone6 12.4.5 12.4.5CheckRa1n CheckRa1n --CheckRa1n Welcome to checkra1nstart next start 1.start 2.sidehome 3.sidehome checkra1n cydia frida python3 python3.7 frida cydiafrida https://build.frida.re cydia--- cydiafridafrida,iOSfrida frida for pre-A12iPhone6sA9 pip install frida pip install fri...
pdf
KUBERNETES中的异常活动检测 About me 0 1 @9ian1i 朱思宇 blue teamer,入侵对抗,业余安全开发,阿里云融媒体安全。 DEFCON Blue Team Village,Black Hat Arsenal 演讲者。 WatchAD – AD Security Intrusion Detection System crawlergo – A powerful browser crawler for web vulnerability scanners ??? - kubernetes abnormal activity detection and blocking system 开源安全项目: 安全...
pdf
Red vs. Blue: Modern Active Directory Attacks & Defense Sean Metcalf CTO DAn Solutions sean [@] dansolutions . com http://DAnSolutions.com http://www.ADSecurity.org Photo by Ed Speir IV. All Rights Reserved. Used with Permission. ABOUT Chief Technology Officer - DAn Solutions Microsoft Certified Master (MCM) Direct...
pdf
ITDR 介绍 A ITDR 之 vSphere B ITDR 之 vSphere 赛博昆仑 昆仑实验室负责人-古河 (Yuki Chen) vSphere 作为基础计算平台在如今企业环境中被广泛应用 , 同时对其的攻击和漏洞挖掘一直是非常热门的话 题 , 本书深入浅出地讲解了 vCenter 的攻防两面 , 对企业进行 vSphere 安全建设起到了重要的参考和指导意义。 奇安信 观星实验室负责人-龚玉山(ISWIN) vCenter 作为 vSphere 的核心控制节点,一直是攻击者的首选目标,本书总结了针对 vCenter 各个阶段的 攻击手法和实际案例以及对应的检测和加固方案,方便企业安全管理者快速了解 vSphere 攻击...
pdf
1 © Ofir Arkin, 2000-2005 Ofir Arkin, On the Current State of Remote Active OS Fingerprinting Tools On the Current State of Remote Active OS Fingerprinting Tools Ofir Arkin CTO ofir.arkin@insightix.com Defcon 13 2 © Ofir Arkin, 2000-2005 Ofir Arkin, On the Current State of Remote Active OS Fingerprinting Tools ...
pdf
Bypass AMSI的前世今生(3) - 脚本混淆和一行命令关闭AMSI 0x00 前言 本文的主要讲解[BA2-3],也就是脚本混淆和一行命令关闭AMSI的原理,而不是具体的脚本混淆方法。 混淆方法其实就是对脚本语法的理解,然后加入各种额外字符或换一种表示方法。混淆姿势细致繁复, 并且在网上已有比较全面的脑图和总结文章,在此就没必要重复了,相关推荐资料会在文末贴出。本文 主要分为以下几个部分: 为什么脚本混淆能够过AMSI 一行命令关闭AMSI原理 [BA2]和[BA3]配合达到关闭AMSI的作用 学习建议,工具和相关资料推荐 0x01 为什么脚本混淆能够过AMSI “脚本混淆能够过AMSI”,这句话其实是不正确的,本系列第一篇...
pdf
fastjson net.sf.json-lib org.json JSON-lib org.json Java Jacksongson fastjson json-lib/org.json SSRF fastjson URL fastjson Java autotype java.net.URL java.net.URL URL get URL URL getContent() fastjson getContent() fastjson 1.2.76 SSRF new URL(...).getContent(); new URL(...).openStream();...
pdf
Bugscan 基于插件众筹的分布式 漏洞扫描平台 契机 团队 功能 特点 契机 团队成员 BugScan和圈子成员 马坤(cnfjhh) 公司&团队负责人 12年信息安全领域专家 专注于网络安全前沿研 究 陈震国(Zero) BugScan扫描引擎研发 10年全栈工程师经验 玩转各种编程语言 著名的Hijack、Gh0st、 Arpspoof作品的作者 赵培源(半块西瓜 皮) BugScan扫描框架研发 7年以上python功底 熟悉各种漏洞原理 漏洞圈子的作者 贾林杰(不流畅) BugScan插件审核 5年以上底层固件研发 经历 圈子插件审核员 武成军 BugScan开发...
pdf
Tim Hsu CHROOT.ORG PDF created with pdfFactory Pro trial version www.pdffactory.com 2008/7/25 2 ¤ HIT(Hacks In Taiwan)主辦人 ¤ 網駭科技創辦人 ¤ 資訊安全技術研究者,同時也是 Linux 愛好者。 ¤ 專長於網路程式設計、網路滲透測試、駭客攻擊手法研究、惡意程 式分析及嵌入式系統等。 ¤ 著作 ¡ Linux C 函式庫詳解辭典 (旗標) ¡ The Wargame 駭客訓練基地 - 決戰台灣版(旗標) (與曾信田、莊明 躍、何弈甫等人合著) 2 PDF created with pdfFactory Pro t...
pdf
Violent(Python( ! DEF(CON(23! Fri.,(Aug(8,(2015,(9?1! Sam(Bowne( City(College(San(Francisco! Slides(and(projects(at(samsclass.info( Bio$ CNIT$124$ Advanced$Ethical$Hacking$ Violent$Python$ •  Good$coding$principles$ – ExcepBon$handling$ – Modular$design$ – OpBmizaBon$ – CommenBng$ – Flow$charts$ •  FORGET$THEM$ALL$ Vio...
pdf
F.O.E. http://code.google.com/p/foe-project/ Feed Over Email A Proxy-less RSS Reader For Users in Internet Censored Countries By Sho Ho Broadcasting Board of Governors F.O.E. Who am I? Name: Sho Ho Job Title: Telecommunications Specialist Employer: Broadcasting Board of Governors The Federal Government agency that ov...
pdf
Aylin Caliskan @aylin_cim Assistant Professor George Washington University Rachel Greenstadt @ragreens Associate Professor Drexel University De-anonymizing Programmers from Source Code and Binaries August 10, 2018 1 Stylometry Natural language English English as a second language Translated text Underground...
pdf
Tesla released the P85D in 2014. At that time the vehicle came with "insane mode" acceleration with a 0-60 time of 3.2 seconds. Later in July of 2015, Tesla announced "Ludicrous mode" that cut the 0-60 time down to 2.8 seconds. This upgrade was offered both new and as a hardware and firmware change to the existing f...
pdf
Interview with Edgar Mitchell, ScD., Captain USN (Ret) by Richard Thieme RT: You’ve been involved with consciousness studies, including the exploration of UFOs, for some time. What’s your primary focus? EM: My focus has never been primarily on UFOs. My focus has been consciousness studies for thirty years. I kind of...
pdf
Art by Francesco Ciccolella www.francescociccolella.com Inside the Fake Science Factory Svea, Chris & Till Presented at DEF CON 26. Las Vegas 11th August 2018. Talk questions + answers 16.45 This talk Documentary Longer questions + answers 17.45 16.00 Design Conduct experiments Preliminary results Writing paper Feb...
pdf
Eternal Exploits Reverse Engineering of FuzzBunch and MS17-010 zerosum0x0 August 1983 Warning! Presentation may contain classified information. Those with active security clearances are forewarned. TOP SECRET//SI/TK//NOFORN//ICATION//4201337//REL TO DEF CON Spot The Fed Champ 2018 Agenda ● Recap (~2 mins) ○ Equation G...
pdf
业务漏洞挖掘 案例与思考分享 微博安全高级工程师 唐茂凡 现状 01 01 现状 分类 常 规 注入、XSS、XXE、CSRF、SSRF、文件包含、命令执行、 URL重定向、点击劫持等 其 他 网络层漏洞、系统层漏洞、 组件套件中间件漏洞等 业 务 登录认证、业务办理、业务数据、业务流 程逻辑、业务授权访问、业务接口调用、验 证码、输入\输出、回退、密码找回、密码 重置、实名认证、设置个人信息、绑定银行 卡、红包优惠券、订单CURD、充值、支付、 提现...... 01 现状 不同 01 04 02 03 漏洞成因 复杂度 场景流 程变化 多端 通用性 风险点 隐蔽 不 同 01 现状 为什么业务安全越来越受重视...
pdf
FOR THE LOVE OF MONEY Finding and exploiting vulnerabilities in mobile point of sales systems LEIGH-ANNE GALLOWAY & TIM YUNUSOV MPOS GROWTH 2010 Single vendor 2018 Four leading vendors shipping thousands of units per day Motivations Motivations MWR Labs “Mission mPOSsible” 2014 Related Work Mellen, Moore and Losev ...
pdf
The Remote Metamorphic Engine Detecting, Evading, Attacking the AI and Reverse Engineering Amro Abdelgawad / DEFCON 24 line46_1: mov ecx, [esp] nop nop mov dl, 0xe9 test edx, edx mov byte [ecx], dl xor eax, 0 mov edx, 0x00000067 mov dword [ecx+1], edx ret line95: pushad p...
pdf
Theft Of Service Attacks Subscription Service & Website Vulnerabilities Presented at Defcon 11 by: Robert Sheehy rjs@zendtech.com Zendtech Services www.zendtech.com Presentation updates are available at: http://www.zendtech.com/defcon11/tos Theft Of Service Attacks What Are Theft Of Service Attacks?  Application Lev...
pdf
Atlassian Confluence(简称Confluence)是⼀个专业的wiki程序。它是⼀个知识管理的⼯具,通过它 可以实现团队成员之间的协作和知识共享。本次漏洞为 Ognl 表达式注⼊,攻击者可未授权通过 Ognl 表达式在服务器上执⾏任意代码。 影响版本: version < 6.13.23 6.14.0 ≤ version < 7.4.11 7.5.0 ≤ version < 7.11.5 7.12.0 ≤ version < 7.12.5 环境搭建 执⾏下载的 bin ⽂件后,选择⼿动安装,并指定安装路径和服务运⾏端口,安装完成后执⾏ /atlassian/jira/atlassian-jira-8132/ji...
pdf
Get-$pwnd Attacking Battle-Hardened Windows Server Lee Holmes | @Lee_Holmes Lead Security Architect, Azure Management
pdf
快手应用安全演进之路 讲师介绍 • 廖新喜 • 大连理工大学毕业 • 快手Web安全负责人,原绿盟科技安全研究经理,8年安全攻防经验和2年 甲方安全建设经验 • 2011-2014,三年安全开发经验,担任绿盟科技极光扫描器开发 • 2014-2019,五年安全攻防经验,国内各大安全峰会演讲嘉宾;专注于 Web漏洞挖掘,尤其是Java反序列化漏洞,曾向RedHat、Apache、 Amazon,Weblogic和阿里提交10余份RCE级别漏洞报告,被誉为国内 Weblogic漏洞挖掘和反序列化漏洞挖掘的领导者 • 2019-现在,快手Web安全负责人,专注于甲方应用安全建设,对于漏洞 收敛有独到的见解,所带领的项目《Java代码安全漏...
pdf
A"Hacker’s"Guide"to"Risk Bruce"Potter DefCon gdead@shmoo.com ||"bpotter@keywcorp.com Don’t"believe"anything"I"Say • Also,"hold"those"around"you"accountable Failures"in"Understanding"Risk • Fukushima • BP"Oil"Spill The"other"side"of"the"coin… • Takata airbag"recall – Airbag"inflator"may"rupture"shoot"shrapnel"onto" pass...
pdf
#BHUSA @BlackHatEvents Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem Matt Graeber Director, Threat Research @ Red Canary #BHUSA @BlackHatEvents Information Classification: General Who protects the protector? Introduction to ELAM and PPL #BHUSA @BlackHatEvents Information...
pdf
Apache Struts2 RCE via Log4j2 CVE-2021-44228 环境搭建 首先搭建环境 下载源码:https://dlcdn.apache.org/struts/2.5.27/struts-2.5.27-all.zip,解压 复制struts-2.5.27\src\apps\showcase文件夹到自己的测试目录,右键用IDEA打开 配置tomcat,启动即可 注:确认是否使用log4j2组件 漏洞分析 根据流传的payload中携带的HTTP头字段 If-Modified-Since 找到对应的源码位置,下断点 org.apache.struts2.dispatcher.DefaultStaticCont...
pdf
1 NetRipper Smart traffic sniffing for penetration testers Ionut Popescu KPMG Bucharest, Romania ionut.popescu@outlook.com April 2015 Abstract — The post-exploitation activities in a penetration test can be challenging if the tester has low- privileges on a fully patched, well configured Windows machine. This w...
pdf
Jennifer Stisa Granick, Esq. Exec. Director, Center for Internet & Society Stanford Law School Stanford, California USA http://cyberlaw.stanford.edu Black Hat Briefings 2007 Intellectual Property Law and Vulnerability Reporting Cisco and ISS v. Lynn (2005) • http://www.granick.com/blog/ • http://www.wired.com/science/d...
pdf
Intranet Invasion Through Anti-DNS Pinning David Byrne, CISSP, MCSE Security Architect EchoStar Satellite L.L.C. / DISH Network DavidRiByrne@yahoo.com Introduction DNS pinning was introduced by web browsers to avoid DNS-spoofing attacks facilitated by client-side code execution. A number of factors including i...
pdf
HITCON GIRLS 的第一個軟體 破解課程 Charles 課程內容 • 逆向工程與軟體破解概念簡介 • Lab 0 • 軟體破解前你必須知道的二三事 • Lab 1 • 通往破解點的道路 – Strings 與 API • Lab 2 • 軟體破解實戰Demo – 010 Editor 逆向工程與軟體破解 • 何謂逆向工程 – 從宅仔和小P的愛情故事說 起 逆向工程與軟體破解 • 何謂逆向工程 – 宅仔深愛著小 p,卻發現自 己聽不懂她說的話 !@#$%^&* ()_+ int main(){ printf(“I love you\n!!”); } 817C24 08 1101>...
pdf
The cookie monster in your browsers @filedescriptor HITCON 2019 @filedescriptor • From Hong Kong  • Pentester for Cure53 • Love WebApp Sec & Browser Sec • Bug Bounty Hunter (#1 on Twitter's program) Motivation Motivation Motivation History 1966 The Dark Age 1994 1997 2000 Netscape's cookie_spec RFC 2109 RFC 2965 Basic ...
pdf
Malicious Proxies The Web’s Evil Twin Introducing Doppelganger Introduction • Who am I? • Security field since 1998 –IDS –Pen testing –Malicious logic analysis –Incident response (c) 2009 Edward J. Zaborowski 4 • Focusing on HTTP proxies • Plenty of reasons to legitimately deploy a proxy – Save bandwidth – Filtering o...
pdf
0x01 前言 这种反制也只能钓 "涉世未深" 的攻击方,和一些脚本小子,算是蚁剑插件编写不规范造成的RCE 0x02 DHTMLX 在 \source\app.entry.js : 行28-57 可以看得见蚁剑在新版加载器中设置了替换函数,将对应的特殊 字符替换成实体编码! 它调用了dhtmlx框架,所以只要是UI渲染的页面都可能存在 XSS->RCE 我把目标盯向了其他插件 0x03 AS_Plug-in 从自带的插件实例的代码开始看: phpinfo 在 行14-22 当中,渲染UI框架的时候,调用了 unxss 可以知道这个地方不存在XSS漏洞 noxss: (html = '', wrap = true) => {   ...
pdf
Hacking mobile network via SS7: interception, shadowing and more Dmitry Kurbatov Vladimir Kropotov Positive Research Agenda • Intro • Attacks prerequisites, costs and case studies • Official and underground market brief • Possible Security measures • Forecasts In Service LTE Networks VoLTE Networks http:...
pdf
Suicide Risk Assessment and Intervention Tactics and Intervention Tactics Amber Baldet This won't be depressing. Trigger Warning: Discussion of mental health, self-harm, substance use/abuse, trauma, suicide depressing. amberella@attrition.org @amberbaldet The Numbers Leading Causes of Death in the United St...
pdf
Jon Rose Trustwave’s SpiderLabs Flash Remoting Technologies Flex Data Services •  Data Management –  Update client and/or server when data changes •  Messaging –  Real Time Messaging protocol (RTMP) –  Pub-sub model –  Real-time data streaming •  Remoting –  HTTP, SOAP, AMF –  Automatic data marshalling ...
pdf
Forensic Data Recovery – MyHardDriveDied.com © 2009 1 RAID by Sight and Sound By Scott A. Moulton Of My Hard Drive Died & Forensic Strategy Services LLC Forensic Data Recovery – MyHardDriveDied.com © 2009 2 Topics for Talk •  Brief Coverage of NOT RAID •  Brief Intro to RAID •  RAID 0 •  RAID 5 •  Demo o...
pdf
Upload Upload Upload Upload Attack Attack Attack Attack Framework Framework Framework Framework Version Version Version Version 1.0 1.0 1.0 1.0 CasperKid [Syclover][Insight-Labs] 2011/10/6 [*] Team : Syclover Security Team & Insight Labs [*] Web : www.myclover.org & www.insight-labs.org [*] Blog : hi.baidu.com/hackerca...
pdf
PCI 2.0: Still Compromising Controls and Compromising Security PCI? At DefCon? Again? Use the hashtag #DefconPCI to rant on the Twitterz during this talk. We damn sure will! Use @defconPCIpanel for comments or Twitter-heckling Who are we? • Dave Shackleford @daveshackleford • Joshua Corman @joshcorman • J...
pdf
Routing in The Dark Scalable Searches in Dark P2P Networks Ian Clarke and Oskar Sandberg The Freenet Project Ian Clarke & Oskar Sandberg - 2005 – p.1/33 Introduction • We have long been interested in decentralised “Peer to Peer” networks. Especially Freenet. Ian Clarke & Oskar Sandberg - 2005 – p.2/33 Introduction • We...
pdf
Criminal charges are not pursued: Hacking PKI Mike Zusman Principal Consultant mike.zusman@intrepidusgroup.com About the Title  From StartCom Critical Event Report  https://blog.startcom.org/?p=161  Thanks to StartCom for quickly fixing the bug I found  These guys care about PKI! Intrepidus Group, Inc. © 2008 2 O...
pdf
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Stuart E. Schechter, Rachel A. Greenstadt, and Michael D. Smith Harvard University {stuart,greenie,smith}@eecs.harvard.edu May 16, 2003 Abstract The entertainment industry, facing a formidable threat from peer-to- peer piracy netwo...
pdf
Browser Based Defenses - (c) 2010 All Rights Reserved 1 Browser Based Defenses Introducing x06d james@bluenotch.com Browser Based Defenses - (c) 2010 All Rights Reserved 2 The Problem: Re-Anonymizing You! • Overall State of the Web – Client/Browser issues • Hard to make public browsers secure • …at least enough to ke...
pdf
Satellite's Gone... Works in progress Major Malfunction aka Adam Laurie adam@algroup.co.uk http://rfidiot.org Who Am I? ● Co­Publisher APACHE­SSL ●  DEFCON 'goon' ● Open Source developer / researcher – Bluetooth – RFID – Full Disclosure / White Hat! ● Freelance research / training / lecturing Feed Hunting ● Look for 'i...
pdf
Bundles of Joy breaking macOS via subverted application bundles @patrickwardle WHOIS @patrickwardle tools, blog, & malware collection "Objective by the Sea" (macOS security conference) Book(s): "The Art of Mac Malware" In the wild? OUTLINE Background Protection & detection The flaw Patch Topics covered: os int...
pdf
Through the Looking-Glass, and what Eve found there http://www.s3.eurecom.fr/lg/ Luca 'kaeso' Bruno <lucab@debian.org>, Mariano 'emdel' Graziano <graziano@eurecom.fr> 2 10/08/2014 About us • S3 group at Eurecom (FR) - System security – Embedded systems – Networking devices – Critical infrastructures – Memory forensics ...
pdf
本篇文章翻译自:Offensive WMI - The Basics (Part 1) :: 0xInfection's Blog — Random ramblings of an Infected Geek. 这篇文章是有关 WMI 的多篇系列文章中的第一篇,如果读者对 PowerShell 有个基本的了解,那么对阅 读本篇文章会有所帮助,但这不是必需的。 一、介绍 1.1 为何是 WMI WMI 是 Microsoft 的一组规范,旨在对 Windows 系统进行快速高效的管理。正如你可能知道的那样, 一项安全规则表明任何对管理有用的东西也很容易被不法分子滥用,WMI 确实可以做很多事情 —— 从 收集计算机状态和配置设置到运...
pdf
Aura A peer-to-peer reputation system Cat Okita Copyright 2003 2 INDEX INDEX ................................................................................................................................................................... 2 ABSTRACT .......................................................................
pdf
2018年浏览器脚本引擎零日漏洞 Elliot Cao Trend Micro 2019-05-30 Whoami • 入行之前是电气工程师 • 2017年加入趋势科技 • 沙箱开发人员 • 2018年开始研究浏览器漏洞 • 专注于浏览器脚本引擎 • Lei Cao (@elli0tn0phacker) 目录 • 2018年的浏览器零日漏洞 • VBSEmulator • Chakra 2018年的浏览器零日漏洞 2018年的浏览器零日漏洞 • Flash: CVE-2018-4878 CVE-2018-15982 • VBScript: CVE-2018-8174 CVE-2018-8373 • JScript: ...
pdf