text
stringlengths
100
9.93M
category
stringclasses
11 values
Home%Insecurity:%No%alarm,%False% alarms,%and%SIGINT% Logan&Lamb& lamblm@ornl.gov& & Agenda% •  Mo/va/on& •  Models&and&Methodology& •  A7ack&Primi/ve&Implementa/on& •  Applica/on&to&three&security&systems& •  Observa/ons& •  Conclusion& Who%am%I?% •  Researcher&for&Center&for&Trustworthy& Embedded&Systems&at&ORNL& •  ...
pdf
Next Generation Process Emulation with Binee Kyle Gwinnup @switchp0rt John Holowczak @skipwich Carbon Black TAU The Problem: getting information from binaries Each sample contains some total set of information. Our goal is to extract as much of it as possible Time/Cost to analyze Sample coverage Static Dynamic High c...
pdf
The Hacker Pimps The Hexagon Security Group Creating Unreliable Systems “Attacking the Systems that Attack You” Sysmin Sys73m47ic & Marklar From: The Hacker Pimps The Hacker Pimps The Hexagon Security Group Document Versioning ● For a copy of this presentation visit: ● www.hackerpimps.com/docs.html The Hacker Pimps The...
pdf
Cisco Catalyst Exploitation Artem Kondratenko @artkond Whoami -Penetration tester @ Kaspersky Lab -Hacker -OSC(P|E) -Skydiver ;) Long story short • On March 26th 2017 Cisco announces that numerous models of switches are vulnerable to unauthenticated remote code execution vulnerability • No signs of exploitation in t...
pdf
• 蔡政達 a.k.a Orange • CHROOT 成員 / HITCON 成員 / DEVCORE 資安顧問 • 國內外研討會 HITCON, AVTokyo, WooYun 等講師 • 國內外駭客競賽 Capture the Flag 冠軍 • 揭露過 Microsoft, Django, Yahoo, Facebook, Google 等弱 點漏洞 • 專精於駭客⼿手法、Web Security 與網路滲透 #90後 #賽棍 #電競選⼿手 #滲透師 #Web狗 #🐶 – 講 Web 可以講到你們聽不懂就贏了 – 「⿊黑了你,從不是在你知道的那個點上」 – 擺在你眼前是 Feature、擺在駭客眼前就是漏洞 -...
pdf
VulReport sylphid@vulreport.net Agenda • 弱點揭露現狀 • 為什麼要建置VulReport • 負責任的弱點揭露 "高超的電腦技術,卻沒有用在正途” zone-h Underground Economy 關於 VulReport • 由 HITCON(Hacks in Taiwan Conf.) 主要成員發起 • 政府、企業與白帽駭客間的溝通管道及技術交流平台 • 藉由此平台讓政府單位或企業正視漏洞問題 • 增進資安相關訊息的交流 別讓駭客不開心 • 黑色產業 -> 資安產業/公益 • 技術的交流與提昇 • 正面形象的轉變 Google VRP - 1 Google VRP - 2 ...
pdf
护网杯WP-Nu1L 护网杯WP-Nu1L WEB 签到 SQLManager SimpleCalculator easyphp Pwn logger Crypto Signsystem 2EM Re gocrypt WEB 签到 js里有 SQLManager 原题:https://www.anquanke.com/post/id/200927#h3-6 SimpleCalculator 国赛原题 easyphp 读源码/index.php?page=php://filter/read=convert.base64-encode/resource=index.php,绕过死亡 die,写入aPD9waHAgZXZhbCgkX1BPU...
pdf
Shellcodes for ARM: Your Pills Don’t Work on Me, x86 Svetlana Gaivoronski @SadieSv Ivan Petrov @_IvanPetrov_ Why it’s important ! ! !Increasing!number!of!ARM3based!devices! ! !Significant!number!of!vulnerable!so:ware! !!!!!!!and!huge!base!of!reusable!code! ! !Memory!corrup?on!errors!ar...
pdf
1 Advanced Hardware Hacking Techniques Joe Grand (Kingpin) joe@grandideastudio.com DEFCON 12 Friday, July 30 2 © 2004 Grand Idea Studio, Inc. Agenda The "What" and "Why" of Hardware Hacking Enclosure & Mechanical Attacks Electrical Attacks Final Thoughts and Conclusions 3 © 2004 Grand Idea Studio, Inc. What is Ha...
pdf
@Y4tacker 两个好玩的问题 1.为什么往 /WEB-INF/tomcat-web.xml/ /WEB-INF/tomcat-web.xml/ ⽂件夹下写东西可以触发重加载 问题来源 问题的⼀切来源于⼀句话: Trigger a reload of the web app by writing any file to /WEB-INF/tomcat-web.xml/ ,⽂件夹 什么⿁! 当然多提⼀嘴不是每个版本这个tomcat-web.xml都⽣效的具体看配置,详细的往下看 解决 ⾸先既然能够在tomcat运⾏后继续加载新的jar到jvm,如果是你会怎么实现呢,答案很显然, 多线程,定时让⼀个⼦进程去监控⽂件的变化,tomc...
pdf
All your family secrets belong to us - Worrisome security issues in tracker apps Siegfried Rasthofer | Fraunhofer SIT, Germany Stephan Huber | Fraunhofer SIT, Germany DefCon26, August 11th 2018 Who are we? § Head of Department Secure Software Engineering § PhD, M.Sc., B.Sc. in computer science § Static and Dynamic C...
pdf
Take advantage of randomness Frank Tse Nexusguard Agenda What is random Some applications of random Detecting anomalies from randomness Mitigating ‘random’ attacks 1 2 3 4 Visualizing randomness 5 About::me From Hong Kong Researcher in DDoS I like RFC IT Security Identify them correctly Take action...
pdf
This talk is not about LTE vulnerabilities No cables Why isn’t it working? Scared Poopless – LTE and *your* laptop Disclaimer: During the slides you will be exposed to hacker stock photos from the internet. Thank you! Goldy aSmig @octosavvi Intel Security would like to acknowledge and thank the Huawei PSIRT team ...
pdf
Domain Fronting is Dead, Long Live Domain Fronting Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise Erik Hunstad Outline 0 Domain Fronting 101 ● If you wish to make an apple pie from scratch, you must first invent the universe ● To understand Domain Fronting, you must first understa...
pdf
“Resilience is a form of health.” - Dr. Steve Miles “Grossman!!!” I declare the global social space we are building to be naturally independent of the tyrannies you seek to impose on us. You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear. - John Perry Barlo...
pdf
DROID-FF – THE ANDROID FUZZING FRAMEWORK TWITTER : @ANTOJOSEP007 GITHUB : @ANTOJOSEPH @WHOAMI • security engineer @ intel • android security enthusiast • speaker / trainer @ Hitb Amsterdam, brucon / hackinparis / blackhat / nullcon / ground zero / c0c0n … • when not hacking , you can see me travelling / djing / bikin...
pdf
离线安装windbg preview 因为近期的⼀些⼯作问题,⼜重新⽤上了宇宙第⼀调试器 windbg ,但是我是windows server的ECS环境,没法从微软商店安装 windbg preview ,所以只能暂时安装 windbg 。⼈ 都是视觉动物,看着⼿⾥丑陋的 windbg ,我陷⼊了沉思,决定研究⼀下怎么离线安装 wind bg preview 。 下⾯就是我找到的安装⽅法: 找到 windbg preview 的微软商店安装⻚⾯: https://apps.microsoft.com/store/detail/wi ndbg-preview/9PGJGD53TN86?hl=zh-hk&gl=HK 然后将这个UR...
pdf
chromemaclinux 0x00 chrome chrome RCE maclinux --gpu-launcher bashshell Windowspoccmd Linux Linuxchrome touchchrometouch bash 0x01 --gpu-launcher chrome --gpu-launcher= --utility-cmd-prefix= --renderer-cmd-prefix= sandbox cc --gpu-launcher ⸺Chromium gpu-launcher renderer-cmd-prefix 1. gpu-launchergpu 2. renderer...
pdf
Advanced Exploitation Techniques: Breaking AV-Emulator XCon2016/by nEINEI Who is @nEINEI • nEINEI - neineit@gmail.com • Security researcher / software developer /reverse engineer • http://www.vxjump.net • Research interests • Vulnerability, Advanced Exploitation Techniques ,NIPS/HIPS • Complexity Virus/Reverse engin...
pdf
DISCLAIMER • This publication contains references to the products of SAP AG. SAP, R/3, SAP NetWeaver and other SAP products. • Products and services mentioned herein are trademarks or registered trademarks of SAP AG in Germany, in the US and in several other countries all over the world. • SAP AG is neither the autho...
pdf
1 CVE-OLON-OOOLS Gitlab 前台RCE 分析 之 L、 N、O L、起因 N、exiftool 的调⽤点 O、授权认证问题 与 CSRF P、扩展利⽤ 起因在于 有师傅私信提问了,所以周末研究了下,另外有 ⽂章第3部分是基于此篇的扩展,相⽐⽬前⼤ 家所熟知的利⽤会更简便也更通⽤。等明天另发⼀篇。 0、起因 2 从 Github 上搜 https://github.com/search?q=CVE-2021-22205 以及 绝⼤部分⼈使⽤的 ⼤家所熟 知的上传的 第⼆个 请求包⼤概如下 3 从这个请求包,第⼀直觉有两个问题。 1、gitlab 是如何调⽤ exiftool 的 2、/uploads/user 接...
pdf
Defending Networks with Incomplete Information: A Machine Learning Approach Alexandre Pinto alexcp@mlsecproject.org @alexcpsec @MLSecProject • This is a talk about DEFENDING not attacking – NO systems were harmed on the development of this talk. – We are actually trying to BUILD something here. • This talk includes...
pdf
Assisted Discovery of On-Chip Debug Interfaces Joe Grand (@joegrand) Introduction • On-chip debug interfaces are a well-known attack vector - Can provide chip-level control of a target device - Extract program code or data - Modify memory contents - Affect device operation on-the-fly - Gain insight into system operatio...
pdf
Mac OS X Server Command-Line Administration For Version 10.3 or Later 034-2454_Cvr 10/15/03 11:47 AM Page 1  Apple Computer, Inc. © 2003 Apple Computer, Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication for the purpose of learning t...
pdf
Testimony of Paul Vixie, Chairman & CEO Farsight Security, Inc. before the Subcommittee on Crime and Terrorism United States Senate Committee on the Judiciary Hearing on Taking Down Botnets: Public and Private Efforts to Disrupt and Dismantle Cybercriminal Networks July 15, 2014 I. INTRODUCTION Good afternoon Mr. Chair...
pdf
Many Birds, One Stone: Exploiting a Single SQLite Vulnerability Across Multiple Software Kun Yang(@KelwinYang) About us ● Beijing Chaitin Tech Co., Ltd(@ChaitinTech) ○ https://chaitin.cn/en ○ pentesting services and enterprise products ● Chaitin Security Research Lab ○ Pwn2Own 2017 3rd place ○ GeekPwn 2015/2016 awarde...
pdf
Machine Learning Protect against tomorrow’s threats 基於機器學習的惡 意軟體分類實作:" Microsoft"Malware" Classification" Challenge"經驗談 Trend Micro ch0upi miaoski Kyle Chung 2 Dec 2016 Machine Learning Protect against tomorrow’s threats Machine Learning Protect against tomorrow’s threats ch0upi • Staff"engineer"in"Trend"Micro • Machin...
pdf
GoBypassAV 整理理了了基于Go的16种API免杀测试、8种加密测试、反沙盒测试、编译混淆、加壳、资源修改等免 杀技术,并搜集汇总了了⼀一些资料料和⼯工具。 免杀专题⽂文章及⼯工具:https://github.com/TideSec/BypassAntiVirus 免杀专题在线⽂文库:http://wiki.tidesec.com/docs/bypassav 本⽂文涉及的所有代码和资料料:https://github.com/TideSec/GoBypassAV/ 0x01 基于Go的免杀 Go语⾔言是⾕谷歌2009发布的第⼆二款开源编程语⾔言,Go语⾔言专⻔门针对多处理理器器系统应⽤用程序的编程进 ⾏行行了了优化,使⽤用...
pdf
Tram control system Hacking in Poland ‘2008.1 (Stuxnet) Nuclear power plant in Iran ‘2010.7 Banks and Broadcasting companies ‘2013.3 Waste water treatment system Hacking in Queensland ‘2000.4 Roosevelt dam hacking ‘1998.2 Georgia gov Website defaced 2008.8 Newzeland-Australia Network hacking 2007.9 Pentagon hacking ‘...
pdf
[Nu1L] writup-for-Alictf-2016 MISC coloroverflow 首先感觉这种包名不像是 CTF 用的,所以直接 Google 之,发现是 Google Play 上开源的游戏 Color Overflow。于是下载下来进行比对,发现多出了几个类无法匹配上原 apk,所以猜测是 自己后加的。分别将多出的类分析之后,发现分别是用语发送请求、生成请求和工具类。我 将其命名为 LogClass、n 和 Utils 程序将请求生成之后向 log.godric.me 发送 POST 请求,在代码里发现数据发送之前用经过了 GZIP 压缩。在 pcap 中,也发现了这个请求,pcap 里显示确实有 Con...
pdf
1 APISIX CVE-OLOO-OXOTT 漏洞分析与复现 漏洞描述 影响版本 前要介绍 APISIX JWT 漏洞分析 环境搭建 漏洞复现 漏洞代码修复 修复⽅案 总结 CVE-2022-29266 这个漏洞已经出现有些时间了,正好现在有时间,⽹上也出现了不少分析⽂章,今 天来看看这个漏洞。 在 2.13.1 之前的 Apache APISIX 中,由于 APISIX 中的 jwt-auth 插件依赖于 lua-resty-jwt 库,⽽在 lua-resty-jwt 库返回的错误信息中可能会包含 JWT 的 sceret 值,因此对于开启了 jwt-auth 插件的 APISIX 存在 JWT sceret 的泄露,从...
pdf
“We don’t need no stinkin’ badges!” Shawn Merdinger security researcher DEFCON 18 Hacking electronic door access controllers Outline • EDAC technology – Trends, landscape – Vendors – Architecture • EDAC real-world analysis – S2 Security NetBox • Research, exposure, vulnerabilities, attacks • Countermeasures & recommen...
pdf
.NET WebShell 免杀系列Ⅱ之 Tricks 分享 Ivan1ee@dotNet 安全矩阵 [ dotNet 安全矩阵] —— 聚焦于微软.NET 安全技术,关注基于.NET 衍生出的各种红蓝攻防对抗技术、分享内容不限于 .NET 代码审计、 最新的.NET 漏洞分析、反序列化漏洞研究、有趣的.NET 安全 Trick、.NET 开源软件分享、. NET 生态等热点话题,愿你能在这里学 到实在的干货,共同推动.NET 安全氛围卷起来。 配套的[ dotNet 安全矩阵]知识星球优惠活动持续进行,每天只需要 1 块钱不到,就可以让自己从.NET 小白成为高手,因为星球里的资料 和教程很少在市面上广泛传播,价值完全划算...
pdf
所有操作均在授权项目中进行。 一天下午好兄弟发来一个 ueditor 环境存在.net 任意文件上传一起看下,存在创某盾 waf。 0x01 把所有常用办法都测试例如 uri 填充、post 填充、大并发、参数混淆、参数 fuzz 等等都测试 过后均失败。 后 fuzz 其他扩展名发现 cer、asmx、shtml 可以上传其他 ashx 什么的拦截。 其中 cer 创某盾禁止访问。asmx 文件试了很多个文件访问均 500 报错,谷歌后似乎是因为 要.net4.6 以上才默认支持 asmx,不知道与 iis10 版本有没有关系。 尝试 shtml exec 执行命令提示。 包含文件报错,谷歌说原因是读取的路径或者文件中含有中文,此...
pdf
Exploiting Keyspace Vulnerabilities in Locks Bill Graydon @access_ctrl b.graydon@ggrsecurity.com github.com/bgraydon Take a look at your keyring... 2 Outline ● How locks & keys work ● Intro to the tools I’m releasing ● Brute forcing all possible keys ● Reading the pins in a lock ● Impressioning with extra informa...
pdf
1 Websocket内存⻢利⽤的些补充 jspjs利⽤ WsProxy内存⻢ 前⼀段时间有师傅提出了基于websocket的内存⻢,并给出了实现: https://github.com/veo/wsMemShell 本来想写⼀写,但是看到https://tttang.com/archive/1673/ 这篇师傅的⽂章已经写的很好了,这⾥就 提⼀些利⽤⽅⾯的东⻄。 最新版本的蚁剑已经⽀持连接websocket协议的内存⻢,在官⽅更新doc⾥提到pswindows跟 cmdlinux可以使⽤,其实jspjs类型也是可以直接连接的。上篇⽂章https://yzddmr6.com/posts/java- expression-explo...
pdf
1 Spring Security CVE-OLOO-OOXVW漏洞分析 ⾸先查看官⽅公告 https://spring.io/blog/2022/05/15/cve-2022-22978-authorization-bypass-in- regexrequestmatcher 注意到和 RegexRequestMatcher 有关,在官⽅仓库找到了最近修改 和 RegexRequestMatcher 有关的代码。 https://github.com/spring-projects/spring- security/commit/472c25b5e8b7374ba7e1b194ea09f43601f6f1c2 ⼀、漏洞简单分...
pdf
Traffic Interception & Remote Mobile Phone Cloning with a Compromised CDMA Femtocell Doug DePerry Tom Ritter Andrew Rahimi iSEC Partners • The specific method used to access the device that makes the demonstration possible has been resolved by Verizon Wireless through a security patch. • The Network Extenders...
pdf
(i) to hold the Disclosing Party’s Proprietary Information in confidence and to take reasonable precautions to protect such Proprietary Information (including, without limitation, all precautions the Receiving Party employs with respect to its confidential materials), (ii) not to divulge any such Proprietary Informati...
pdf
Network Attack Visualization Greg Conti www.cc.gatech.edu/~conti Disclaimer The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defense or the U.S. Government...
pdf
Attacks you can’t combat: Vulnerabilities of most robust mobile operators Sergey Puzankov About me Telecom 7+ years in telecom security 18+ years in telecom industry Security Knowledge sharing Research results & community contribution @xigins sergey_puzankov spuzankov@ptsecurity.com SS7 basics SS7 (...
pdf
DCFluX in: License to Transmit DCFluX in: License to Transmit Presented By: Matt Krick, DCFluX – K3MK Chief Engineer, New West Broadcasting Systems, Inc. DEFCON 19; Las Vegas, NV “Where have all the weirdos gone?” --Moxie Marlinspike Hidden Agenda 1. Fuck Your Stupid Smart Phone 2. Amateur Radio 3. Ge...
pdf
DEF CON 19: Getting SSLizzard Nicholas J. Percoco – Trustwave SpiderLabs Paul Kehrer – Trustwave SSL Copyright Trustwave 2011 Agenda •  Introductions •  Primer / History: SSL and MITM Attacks •  Mobile SSL User Experience •  Research Motivations •  Research Implications •  Data Transmission Assault Course C...
pdf
The Market for Malware Dr. Thomas J. Holt Assistant Professor Department of Criminal Justice University of North Carolina at Charlotte tjholt@uncc.edu 704-687-6081 Copyright 2007. All references to this work must appropriately cite the author, Thomas J. Holt. Digital Crime Markets • The problem of malware and computer...
pdf
Bypassing All Bypassing All Web Application Firewalls Web Application Firewalls OuTian <outian@chroot.org> Agenda Agenda  Introduction  What is WAF  Why need WAF  What does WAF do  How to Bypass WAF  Q & A Introduction Introduction  近年來許多企業開始意識到傳統的資安設 備無法防護針對 Web 應用程式的攻擊  因此紛紛開始佈署「Web Application Firewall」(以下簡...
pdf
1 Advanced Wireless Attacks Against Enterprise Networks Course Guide Version 1.0.2 Gabriel Ryan @s0lst1c3 @gdssecurity gryan@gdssecurity.com solstice.me 2 Introduction ........................................................................................................................... 3 Lab Setup Guide...
pdf
Weaponizing Lady GaGa PsychoSonic Attacks Brad (theNURSE) Smith Private Practice Informatics Nurse What the heck is PsychoSonics? • Sounds that effect the Brain • “Harmonize” with brain • Not NLP, Yes SE Heinrich Wilhelm Dove • Binary beats founder • One for the first Climatologist • Binaural, Monaural, an...
pdf
Linux 全盘加密 看了橙子酱大佬的加密分区解密让我想起了我之前做过 Linux 的全盘加密。 特此分享一下思路。。。。 1. 首先安装系统选择 /(根)分区加密。 就 3 个分区。一个 swap 一个 boot 一个根分区(加密,密码自定义) 其余都正常安装,就拿 centos6.9 举例。 2.进入系统,打开/usr/share/dracut/modules.d/90crypt/目录(看了说明文档找到的) 修改 cryptroot-ask.sh 把 108-112 行加上“#”注释,然后增加一行(如图) echo "password" | cryptsetup luksOpen -T1 "$device" "...
pdf
Backdooring the Lottery and Other Security Tales from Gaming July 30, 2017 Gus Fritschie and Evan Teitelman Presentation Overview 1. Introductions 2. What has happened since 2011 3. Historical overview of security incidents in gaming 4. Eddie Tipton and the lottery 5. Russian slot attacks 6. Conclusion © SeNet Inter...
pdf
Cyberpeace Whitepaper Is WebAssembly Really Safe? - Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way July 19, 2022 – Version 1.0 Prepared by Zhao Hai(@h1zhao) Zhichen Wang Mengchen Yu Lei Li Abstract WebAssembly(Wasm) supports binary format which provides languages such as C/C++, C# and Rust with a com...
pdf
前⾔ 今天遇到⼀个有意思的Linux命令执⾏绕过分享⼀下。 某⽹络设备后台有个Ping功能,命令执⾏⽆回显,使⽤ dnslog收到请求,因此icmp、dns出⽹。 但是进⼀步命令执⾏的时候发现存在很多替换为空的过滤。 第⼀步绕过,cp命令读取源码。 ping.php中存在参数过滤函数,并且使⽤ exec() 命令执⾏因此⽆回显。 根据include包含的⽂件必然能找到过滤函数所在的⽂件。 过滤如下 `whoami`.dnslog cp ping.php ping.txt cd ..\ncd ..\ncd ..\ncd ..\ncd model\ncp filter.php filter.txt $val = str_replace(...
pdf
一、概述 最近需要逆深信服的 Easyconnect.apk,无壳但有混淆,so 层抛弃整个系统通信框架, 使用自编译的 openssl 为后续与服务器通信(图片均已厚码处理)。感谢看雪高研。有什 么错误还请师傅指出。 二、连接服务器请求分析 连接服务器时,会发送先后两个请求,下面先看第一个: 先使用脚本 hook onclik 点击事件,得到所实现的 ConnectActivity: [WatchEvent] onClick: com.sangfor.vpn.client.phone.ConnectActivity 跟入 o(): o()中调用 showDialog(10)显示对话框后,再新建 cb 对象,并新建异步...
pdf
BRC4 - Brute Ratel Customized Command and Control Center Ratel War Room Ratel Server - TeamServer API Ratel War Room is an API driven server which works over HTTP and WebSocket Start Mode Ratel Mode Ratel mode is the core server mode which interacts with badgers, starts listener and is your main C2 communication channe...
pdf
Attacking .NET Applications at Runtime Jon McCoy - 2010 www.DigitalBodyGuard.com What will this presentation cover? How to pWN closed-source .NET applications in new and dynamic ways New tools I am releasing Show how incredibly vulnerable .NET applications are What tools will you get? New Metasploit payload Tools ...
pdf
Dam Control Substation Gas Distribution Petrochemical http://www.openplcproject.com Editor GUI Builder Raspberry Pi UniPi Linux (soft-PLC) Windows (soft- PLC) ESP8266 Arduino PiXtend FreeWave Zumlink Slave ID (1 byte) F. Code (1 byte) Data (n bytes) CRC (2 bytes) Slave ID (1 byte) F. Code (1 ...
pdf
NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It Felix Leder D About Myself • Passion: • Reverse Engineering (+ tool development) • Being out in the snow, being out on a bike, being out in the water • Fun Projects: • Bug hunting in malware • Botnet takeovers and countermeasure • The Honeynet Project • $$$...
pdf
Digital Vengeance Exploiting the Most Notorious C&C Toolkits @professor__plum Disclaimer The views expressed herein do not necessarily state or reflect the views of my current or former employers. I am not responsible for any use or misuse of the information provided. Implementation of the information given is at y...
pdf
中国网安集团·广州三零卫士 伍智波(SkyMine) ①Linux主要日志类型的分析 ②Windows主要日志类型的分析 ③某次真实入侵事件的日志分析过程 ④入侵案例攻击链分析 ①Linux主要日志类型的分析 accesslog accesslog是web中间件最 为重要的日志文件之一,它 记录了访问web应用的所有 请求,其中记录的字段主要 包括来源IP、请求时间、请 求方法、请求路径、HTTP状 态码、请求包大小等,是识 别web攻击的重要指标。 192.168.97.1 - - [02/Mar/2018:02:24:16 +0800] "GET /guestbook.php HTTP/1.1" 200 831 "-" "M...
pdf
护 网 的 起 源 和 演 变 01 未 知 攻 , 焉 知 防 02 实 战 出 真 知 03 目 录 CONTENTS 护网的起源和演 变 PART 1 护 网 的 起 源 和 演 变 — 新 形 势 下 攻 防 对 抗 法律法规 国家标准 基线检查 渗透测试 国家 层面 APT 组织型 常态化攻防演练 新的验证体系 监管要求 国际标准、规范 旧的验证体系 安全检查 漏洞扫描 思路转变 验证体系思路转变 “ 锁 盾 ” 攻 防 演 习  “Locked Shields”系列演习是北约年度例行性网络 安全演习,于2010年启动;  模式:假想国家“Berylia”;  目标:攻击模拟的海军基地、电站等关键信息基础 ...
pdf
1 浅谈PHP源代码保护⽅案&受保护PHP代码の解 密还原 前⾔ PHP 加密⽅案分析 ⽆扩展⽅案 源代码混淆 ⼿⼯解密 ⾃动化通⽤解密 PHP扩展⽅案 源代码混淆 ⼿⼯解密 ⾃动化通⽤解密 opcode 还原代码 附录 PHP扩展编译 总结 参考 php是⼀种解释型脚本语⾔. 与编译型语⾔不同,php源代码不是直接翻译成机器语⾔.⽽是翻译成中间代码(OPCODE) ,再由解释器 (ZEND引擎)对中间代码进⾏解释运⾏ . 在php源代码的保护在原理可以分为3⼤类. 源代码混淆(编码) OPCODE混淆(编码) 修改解释引擎(虚拟机) 前⾔ ● ● ● 2 在部署上可以分为2⼤类. ⽆扩展 有扩展 下⾯分析下各种...
pdf
APISIX_CVE-2022-29266 Patch https://github.com/apache/apisix/commit/61a48a2524a86f2fada90e8196e147538842db89 jwt jwt-auth consumer JWT Authentication service route consumer cookie jwt-auth HS256 RS256 jwt:load_jwt(token) https://github.com/SkyLothar/lua-resty-jwt/blob/ee1d024071f872e2b5a66eaaf9aeaf86c5ba...
pdf
从 后 门 到 漏 洞 — — 智 能 设 备 私 有 协 议 中 的 安 全 问 题 魏凡 绿盟科技 格物实验室 安全研究员 0 1 概述 0 2 0 3 0 4 私有协议逆向分析的几个关键点 某私有协议漏洞挖掘之旅 总结与建议 目录 0 1 概述 0 2 0 3 0 4 私有协议逆向分析的几个关键点 某私有协议漏洞挖掘之旅 总结与建议 目录 智能设备中的私有协议 私有协议一般来说指未文档化的协议,格式未知,一般具有以下特点: ⚫ 从功能上来讲,一般用于运维管理/服务发现等功能 ⚫ 一般监听于TCP/UDP的大端口 ⚫ 多数作为服务端,部分可以在厂商官网找到协议的客户端 私有协议的格式未知,所以逆向分析较难,因此公开的漏洞较少,但...
pdf
Reverse proxies & Inconsistency Aleksei "GreenDog" Tiurin About me • Web security fun • Security researcher at Acunetix • Pentester • Co-organizer Defcon Russia 7812 • @antyurin "Reverse proxy" - Reverse proxy - Load balancer - Cache proxy - … - Back-end/Origin "Reverse proxy" URL http://www.site.com/long/path/here.ph...
pdf
Timeless Timing Attacks
 by Tom Van Goethem & Mathy Vanhoef Hello! Tom Van Goethem Researcher at DistriNet - 
 KU Leuven, Belgium Fanatic web & network
 security enthousiast Exploiter of side-channel attacks in browsers & the Web platform Mathy Vanhoef Postdoctoral Researcher at 
 NYU Abu Dhabi
 Soon: professor at KU ...
pdf
Web渗透测试之逻辑漏洞 挖掘 演讲嘉宾:hackbar 上海银基信息安全技术股份有限公司 简单VS复杂 1.思考 1.1、利用工具简单: 数据包抓取工具(Burpsuit、fiddler等) 1.2、思路复杂: 核心: 绕过真实用户身份或正常业务流程达到预期的目的 1.2.1、用户身份:认证 用户身份特性认证 本地认证 服务器端认证 1.2.2、业务流程:对业务的熟悉程度(各种类 型的网站、业务模式) 电信网厅业务清单图解 2、逻辑漏洞类型 支付漏洞 密码找回漏洞 任意用户登录漏洞 认证缺陷(弱认证、认证凭证获取) 接口枚举 越权(有条件的越权:空值绕过) 。。。。。。。 2.1、支付漏洞 2.1.1、支付漏洞突破口: 一、订单相...
pdf
© 2011 NATO Cooperative Cyber Defence Centre of Excellence, June 2011 All rights reserved. No part of this pub- lication may be reprinted, reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permis...
pdf
Tools for Censorship Resistance Rachel Greenstadt greenie@eecs.harvard.edu Defcon XII July 29, 2004 http://www.eecs.harvard.edu/ greenie/defcon-slides.pdf Tools for Censorship Resistance – p.1/37 Overview Approaches to Censorship Circumvention methods Case study: China Censorship in a “free” society the LOCKSS project ...
pdf
感知·诱捕·情报·协作 [ Kimon@灯塔实验室 ] ⺴络空间⼯控系统威胁情报 关于我们 | [ Kimon@灯塔实验室 ] 王启蒙 Kimon 电话:18500851413 邮箱:kimon@plcscan.org 微信:ameng929 基础威胁情报 VS. 高级威胁情报 信息收集方式 VS. 威胁捕获技术 被动威胁感知架构体系 从威胁数据到威胁情报 [ 灯塔实验室@KCon ] Part. 01 基础威胁情报 VS. ⾼级威胁情报 基础威胁情报 VS. ⾼级威胁情报| [灯塔实验室@KCon ] 国外针对网络空间的情报收集计划 SHINE计划——Project Shodan Intelligence Extraction X...
pdf
目 录 封面 扉页 版权 内容提要 作者简介 前言 第1章 初识C语言 1.1 C语言的起源 1.2 选择C语言的理由 1.2.1 设计特性 1.2.2 高效性 1.2.3 可移植性 1.2.4 强大而灵活 1.2.5 面向程序员 1.2.6 缺点 1.3 C语言的应用范围 1.4 计算机能做什么 1.5 高级计算机语言和编译器 1.6 语言标准 1.6.1 第1个ANSI/ISO C标准 1.6.2 C99标准 1.6.3 C11标准 1.7 使用C语言的7个步骤 1.7.1 第1步:定义程序的目标 1.7.2 第2步:设计程序 1.7.3 第3步:编写代码 1.7.4 第4步:编译 1.7.5 第5步:运行程序 1.7.6 第6...
pdf
Exploiting 0ld Mag-stripe Information with New Technology Salvador Mendoza Twitter: @Netxing Blog: salmg.net About Me ● Security Researcher ● Samsung Pay: Tokenized Numbers, Flaws and Issues @Netxing Analyzing previous talks/tools ● Major Malfunction DEFCON 14 Magstripe Madness ● Samy Kamkar MagSpoof - 2015 ● Wes...
pdf
Jesse Michael Mickey Shkatov @JesseMichael @HackingThings WHO ARE WE AGENDA • Beginning • . • . • . • . • Conclusions • Q&A • Diego Juarez • https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities • https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulne...
pdf
Module 3 Understanding and countering malware’s evasion and self-defence https://github.com/hasherezade/malware_training_vol1 Introduction Malware: Evasion and self-defense Malware: Evasion and self-defense • In order to carry on its mission, malware must remain undetected • Malware needs to defend itself from: • An...
pdf
Exploring Layer 2 Network Security in Virtualized Environments Ronny L. Bull & Jeanna N. Matthews Road Map © 2015 Ronny L. Bull - Clarkson University ● Context for the Problem of Layer 2 Network Security in Virrtualized Environments – Virtualization, Multi-tenant environments, Cloud services – Physical networking ba...
pdf
After 35 years of serious investigation, exploration, and reflection, engaged with the best researchers in the field, it was time to make as succinct and clear a statement as I could, within the constraints of 1200 words for the Crossroads section in the Sunday Milwaukee Journal Sentinel. It was also a way for a m...
pdf
Covert Debugging Circumventing Software Armoring Techniques Offensive Computing, LLC Danny Quist Valsmith dquist@offensivecomputing.net valsmith@offensivecomputing.net Offensive Computing - Malware Intelligence Danny Quist • Offensive Computing, Cofounder • PhD Student at New Mexico Tech • Reverse Engineer • Exploit D...
pdf
PIG: Finding Truffles Without Leaving A Trace Ryan Linn DEFCON 19 Copyright Trustwave 2010 Overview •  Introduction •  Why are we here ? •  How will this help me ? •  Talking is boring show me •  That’s neat, how does this work ? •  Protocols and Plugins •  Remediation Copyright Trustwave 2010 Introductio...
pdf
quickbreach@defcon26:~# ./smbetray.py --help Backdooring & Breaking Signatures William Martin (@QuickBreach) > whoami • William Martin • OSCP • Penetration Tester • Supervisor at RSM US LLP in Charlotte, NC • Second time presenting at DEFCON • Twitter: @QuickBreach > Who is this talk for? • Red teamers looking to l...
pdf
P R O T E C T I N G Y O U R N E T W O R K Patrick DeSantis | @pat_r10t FROM BOX TO BACKDOOR U s i n g O l d S c h o o l To o l s a n d Te c h n i q u e s t o D i s c o v e r B ac k doors in Modern Dev ic es Patrick DeSantis | @pat_r10t OVERVIEW INTRO: WHO, WHAT, WHY MOXA AWK3131A WAP MOXA WAP: ABOU...
pdf
Hacking the EULA: Reverse Benchmarking Web Application Security Scanners Each year thousands of work hours are lost by security practitioners sorting through web application security reports separating out erroneous vulnerability data. Individuals must currently work through this process in a vacuum, as there is ...
pdf
Java 代码审计常用漏洞总结 1.1 审计方法总结 主要代码审计方法是跟踪用户输入数据和敏感函数参数回溯: 跟踪用户的输入数据,判断数据进入的每一个代码逻辑是否有可利用的点,此处的代码逻辑 可以是一个函数,或者是条小小的条件判断语句。 敏感函数参数回溯,根据敏感函数,逆向追踪参数传递的过程。这个方法是最高效,最常用 的方法。大多数漏洞的产生是因为函数的使用不当导致的,只要找到这些函数,就能够快速 挖掘想要的漏洞。 以下是基于关键词审计技巧总结: 在搜索时要注意是否为整个单词,以及小写敏感这些设置 漏洞名称 关键词 密码硬编码、密码明文存储 password 、pass、jdbc XSS getParamte...
pdf
Bugscan 发展历程 01 圈子成员 02 框架改进 03 发展历程 2015.2 正式发布 2011 诞生 历时四年,五次重构 2015.5 圈子发布 2015.8 Bugscan 沙龙 圈子人数增加到5000多人,插件由90个增加到600多 目前可针对20多种系统服务进行识别,弱口令破解; 可识别,扫描80多种主流web程序,网络设备的漏洞。 目前已扫描超过100万的目标,600万余条漏洞记录 圈子成员 圈子(社区) 圈子成员 圈子(社区)核心成员 各种通用型插件,数量最多,质量最高 快速跟踪热点漏洞 发现Xx狗拒绝服务漏洞 各种系统服务,协议漏洞 插件审核,圈子商城 插件审核,插件编写教程 Zero 星光点亮◇天 rang...
pdf
Windows 安全 - 服务篇(1) 0x00 前言 Windows安全范围真的很大,我也仅仅是在学习路上的行人。边学边记,在自己学习的同时,也希望有 一起的同行者。我计划从Windows服务开始,先学习windows服务的基础机制,然后再学习相关的安全 问题,然后记录这个过程中自己的一些思考,或延申性研究。这个过程中当然大量知识来自于网络公开 文献和《深入理解Windows操作系统7 》上下册。 Windows服务架构简图: 从简图看Windows服务的核心组件并不复杂,用户通常通过SCP类程序,例如:sc.exe等,来控制服务 应用。但是他并不是直接控制的,中间是通过SCM来控制的。 0x02 基础组件 通过上图,我们知道服务...
pdf
Owning the LAN in 2018 Defeating MACsec and 802.1x-2010 DEF CON 26 Gabriel “solstice” Ryan Disclaimers & Updates These slides are an early version designed for pre-release prior to DEF CON 26. All content will be updated by the time of the presentation at DEF CON 26 in August. Final versions of all content will be av...
pdf
对ZDI公布的InfraSuite Device Master⼀揽⼦漏洞的分析.md 2022/11/8 1 / 15 author: Y4er 前⾔ 看到zdi发了⼀堆洞,有反序列化、⽬录穿越、权限绕过等等,还是dotnet的,于是有了此⽂。 基础架构 exe对应端⼝ C:\Program Files\InfraSuite Device Master\Device-DataCollect\Device-DataCollect.exe 3000 C:\Program Files\InfraSuite Device Master\Device-Gateway\Device-Gateway.exe 3100 3110 C:\Progra...
pdf
8/5/16& DEFCON24&A&Monitor&Darkly&& 8/5/16& DEFCON24&A&Monitor&Darkly&& https:// github.com/ RedBalloonShena nigans/ MonitorDarkly A Monitor Darkly Ang Cui, PhD | Jatin Kataria 8/5/16& DEFCON24&A&Monitor&Darkly&& 8/5/16& DEFCON24&A&Monitor&Darkly&& 8/5/16& DEFCON24&A&Monitor&Darkly&& 8/5/16& DEFCON24&A&Monitor&Darkl...
pdf
ports=$(nmap -p- --min-rate=1000 -T4 10.10.10.27 | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//) nmap -sC -sV -p$ports 10.10.10.27 //-sC //-sV ​ ​ hack the box——-Archetype 0x00 0x01 ​ <DTSConfiguration> <DTSConfigurationHeading> <DTSConfigurationFileInfo GeneratedBy="..." GeneratedFromPac...
pdf
1 OLONLWNW-记次绕waf ⼀、前⾔ ⼆、第⼀次⻅这样的waf 三、⼲翻waf 做项⽬遇到,感觉有点意思记录⼀下。 打开这个站的时候就注意到了这个站⽤了之前我审过的⼀个框架具体是哪个就不说了。 本来想着直接打就⾏了结果有点意思。 java的框架存在两处权限绕过 第⼀处 第⼆处 我本着直接打完交洞的想法使⽤第⼆种权限绕过⽅式没想到看到了如下界⾯ ⼀、前⾔ ⼆、第⼀次⻅这样的waf Plain Text 复制代码 Plain Text 复制代码 /xxx/../api/user 1 /api/user;1.js 1 2 我⼲了啥就拦我了,第⼀次⻅拦我分号。之前阿⾥云waf也不这么拦我啊 /api/user;?upload=fil...
pdf
Covert Post-Exploitation Forensics with Metasploit Wesley McGrew McGrewSecurity.com Mississippi State University National Forensics Training Center From the DEF CON 19 CFP: Okay, let’s get sneaky... Covert • without the subject’s knowledge Post-Exploitation • after a remote compromise, local backdoor Forensics • r...
pdf
Kim Jong Kim Jong--il and me: il and me: How to build a cyber army to attack the How to build a cyber army to attack the U.S. U.S. Charlie Miller Charlie Miller Independent Security Evaluators Independent Security Evaluators cmiller@securityevaluators.com cmiller@securityevaluators.com Overview Overview About me Abo...
pdf
Author:@Y4er.com 调用关系查询 分析 com.imc.iview.network.NetworkServlet#doPost 两次校验 com.imc.iview.utils.CUtils#checkFileNameIncludePath(java.lang.String) MATCH (n:Class{NAME:'javax.servlet.http.HttpServlet'})-[:EXTEND]-(c:Class)- [:HAS]->(m:Method)-[:CALL*2]- (m1:Method{NAME:'exec',CLASS_NAME:'java.lang.Runtime'}) return * 检验 ...
pdf
Abusing  HTML5 DEF  CON  19 Ming  Chow Lecturer,  Department  of  Computer  Science TuCs  University Medford,  MA  02155 mchow@cs.tuCs.edu What  is  HTML5? •  The  next  major  revision  of  HTML.  To  replace  XHTML?  Yes •  Close  enough  to  a  full-­‐fledg...
pdf
剑走偏锋 —蓝军实战缓解措施滥用 # Whoami • @askme765cs • 安全研究员@绿盟科技 • M01N战队核心成员 • 专注系统安全与终端对抗 目录 CONTENTS 01 02 03 Mitigations 101 Red Team Operation "Mitigation Hell" Part 01 Mitigations 101 01 Why Mitigations? 漏洞利用两种常见路径 • 数据破坏 • 代码执行 利用过程中的动作与特征 • 修改代码段 • 加载DLL • 创建新进程 • … Mitigations的效用 • 截断利用链,削减机会窗口 • 对抗未知威胁与潜在攻击 02 Mitigation...
pdf
Hack Like the Movie Stars: A Big-Screen Multi-Touch Network Monitor George Louthan & Cody Pollet & John Hale Computer Science / www.isec.utulsa.edu Overview • Multi-touch interfaces – What is multi-touch? • This rhetorical question will not be dignified with a response. – Optical multi-touch methods • Our big boa...
pdf
<location, date> <Location, date> Defcon Safe Mode // Aug 2020 Detecting Fake 4G Base Stations in Real Time Cooper Quintin - Senior Security Researcher - EFF Threat Lab Defcon Safe Mode With Networking 2020 <location, date> <Location, date> Defcon Safe Mode // Aug 2020 Intro • Cooper Quintin – Senior security researc...
pdf
1 Attacking Autonomic Networks 2 Agenda o o o o 3 Autonomic Systems o o 4 Autonomic Network o o o o credits 5 Live Demo 6 Demo Results o o o 7 Cisco Deployment o o o o 8 Channel Discovery o o 9 Adjacency Discovery o o o o o 10 Adjacency Discovery I support network/domain X I am part of domain <domain name> Registrar En...
pdf
Summary of Attacks Against BIOS and Secure Boot Yuriy Bulygin, John Loucaides, Andrew Furtak, Oleksandr Bazhaniuk, Alexander Matrosov Intel Security In The Beginning Was The Legacy BIOS.. Legacy BIOS 1. CPU Reset vector in BIOS ’ROM’ (Boot Block) 2. Basic CPU, chipset initialization 3. Initialize Cache-as-...
pdf
Advanced API Security OAuth 2.0 and Beyond — Second Edition — Prabath Siriwardena Advanced API Security OAuth 2.0 and Beyond Second Edition Prabath Siriwardena Advanced API Security: OAuth 2.0 and Beyond ISBN-13 (pbk): 978-1-4842-2049-8 ISBN-13 (electronic): 978-1-4842-2050-4 https://doi.org/10.1007/978-1-4842-205...
pdf
你的智能硬件出卖了你的信息 —浅谈办公及教育场景硬件供应链安全 0 1 议程 • IoT产品供应链的安全现状 • 常见的保护机制及实现缺陷 • 如何避免缺陷,保护供应链安全 0 4 IoT产品供应链安全现状 金立2千多部手机被植入木马 软件供应链攻击易受关注,而 硬件供应链在流通环节的攻击, 非常容易被忽视。 0 5 IoT产品供应链安全现状 国内外的相关规范 0 7 IoT产品供应链安全现状 业界的做法 主流的桌面处理器、服务器、 笔电、操作系统厂商,很早就 实现了安全启动,可信计算等 机制。 0 8 IoT产品供应链安全现状 移动处理器厂商 高通、MTK等IoT 常用方案厂商都提 供了完整的 SecureBoot、TEE 的实现...
pdf
Jim Knowledge factors Ownership factors Inherence factors Password Pass phrase Personal identification number (PIN) Challenge response (the user must answer a question) ID card Security token Software token Phone Cell phone Fingerprint Retinal pattern DNA Signature Face Voice Unique bio-electric s...
pdf
Anonymity Loves Company: Usability and the Network Effect Roger Dingledine and Nick Mathewson The Free Haven Project {arma,nickm}@freehaven.net Abstract. A growing field of literature is studying how usability im- pacts security [4]. One class of security software is anonymizing networks— overlay networks on the Internet...
pdf