text
stringlengths
100
9.93M
category
stringclasses
11 values
Attack2Defense星球专属版CobaltStrike发布 IceRiver 经过星球内⼤佬们的不懈努⼒,星球内部专属版CobaltStrike终于开发完成,我们将其命名为 IceRiver。IceRiver主要基于CobaltStrike 4.4 进⾏的⼆次开发,在修复了这个版本的⼀些bug的 同时,扩展了⼀些功能,下⾯进⾏详细介绍: 版本特性清单 修改特征  修改默认登录认证的header标志位数据  修改beacon配置信息的默认XOR密钥  修改配置数据所在堆块的默认值  修改HTTP ua头  修改HTTP Server默认的返回信息  在兼容ForeignHTTP和ForeignHTTPS监听器前提...
pdf
www.senseofsecurity.com.au © Sense of Security 2013 Page ‹#› – 13-Sep-13 Compliance, Protection & Business Confidence Sense of Security Pty Ltd ! Sydney Level 8, 66 King Street Sydney NSW 2000 Australia Melbourne Level 10, 401 Docklands Drv Docklands VIC 3008 Australia T: 1300 922 923 T: +61 (0) 2 929...
pdf
Can Homegrown Information Analysis Tools Help Us Make Better Predictions about the Outcome of Supreme Court Cases? Foofus Table of Contents Introduction..........................................................................................................................................1 Gathering Argument Data via...
pdf
Toxic Proxies - Bypassing HTTPS & VPNs to pwn your online identity Alex Chapman @noxrnet Paul Stone @pdjstone Introduction Our Talk Exciting introduction Some history – SSL, PAC, WPAD, sslstrip, HSTS The PAC Attack – bypassing HTTPS – Sniffing your traffic – Stealing your data – Stealing your accounts T...
pdf
Connection String Parameter Pollution Attacks Chema Alonso1, Manuel Fernandez1, Alejandro Martín1 and Antonio Guzmán2 1Informatica64, S.L. 2Universidad Rey Juan Carlos 1{chema,mfernandez,amartin}@informatica64.com, 2antonio.guzman@urjc.es Abstract. In 2007 the ranking of the top ten critical vulnerabilities for th...
pdf
D E F C O N 1 3 Windows vs FreeBSD vs Linux Windows vs FreeBSD vs Linux Or: Why Deploying Linux in your Environment is Suicide D E F C O N 1 3 Don’t Believe Anything I Say Don’t Believe Anything I Say • "Do not believe in anything simply because you have heard it. Do not believe in anything simply because it is ...
pdf
R I C K Y H I L L D E F C O N 2 1 8 / 3 / 2 0 1 3 Phantom Network Surveillance UAV / Drone 1 About Me  Security Consultant, D.C. Area  Specialties: Wireless & SCADA Security  US Govt. and Commercial Engagements  Previous DEFCON talks: WarRocketing & WarBallooning, (over Las Vegas ;-)  Hobbies: R...
pdf
I Know What You Are By the Smell of Your Wi-Fi Denton Gentry Try It! 1% 10% Poll: Wi-Fi at DEFCON for a demo 89% bad idea. worst idea. what could go wrong? SSID: SmellOfWifiTalk MAC Sublayer Management Entity (MLME) Probe Request: Asks nearby APs to respond. Association Request: join the Wi-Fi network Probe Request ...
pdf
Vul of PostpreSql、Informic JDBC Driver 当程序中JDBC 连接 URL 可控时,可能会造成安全问题。HITB2021SIN 中的分享议题 "Make JDBC Attacks Brilliant Again" 列举出了H2、IBM DB2、MODEShape、Apache Derby、 SQLite等数据库Driver,在Connect URL可控情况下的安全问题。 ⼀、Postgresql CVE-2022-21724 近⽇披露了CVE-2022-21724,同样是在JDBC Connection URL可控情况下将会出现某些安 全问题。 当攻击者控制 jdbc url 或属性时,使⽤ po...
pdf
Technique and bypassing defense mechanisms 07. 2010 STRI/Advance Technology Lab/Security Exploitation on ARM CONFIDENTIAL 2 # /usr/bin/whoami ● Itzhak (Zuk) Avraham ● Researcher at Samsung Electronics ● Partner at PIA ● Follow me on twitter under “ihackbanme” ● Blog : http://imthezuk.blogspot.com ● For any questions/t...
pdf
安全测试中 一些有趣的姿势和技巧 Fresh business general template Applicable to enterprise introduction, summary report, sales marketing, chart data gdygdy ID gdygdy 程序猿转行安全 多年搬砖背锅经验,目前在练习甩锅 曾经在多个SRC和漏洞平台打酱油 每天专心撸铁 自我介绍 聊些什么? 测试中那些总被忽略的目标 目 标 哪些目标? APP 移动APP应用 微信 微信公众号,小程序 QQ QQ公众号 支付宝 支付宝生活号、小程序 移动APP来源 安卓应用市场 AppStore 苹果企业证书安装 iO...
pdf
WSUSpendu ANSSI Romain Coltel Romain.Coltel@Alsid.eu Yves Le Provost Yves.Le-Provost@ssi.gouv.fr 2 WSUSpendu Contents Introduction 5 WSUS and network architecture 7 1.1 Architectures presentation 7 1.2 Auto approved updates 10 1.3 State of the art - WSUSpect and technical limitations 11 WSUS internals 13 2.1 IIS Webser...
pdf
Botnet and Malware behavior analysis 蔡一郎 2010/07/17 Honeynet Project Taiwan Chapter www.honeynet.org.tw  蔡一郎 Steven  學歷:國立成功大學電機工程研究所碩士  現任:國家高速網路與計算中心 副工程師  重要經歷:  國立成功大學研究發展基金會助理研究員  崑山科技大學兼任講師  台南科學園區產學協會理事  Honeynet Project Taiwan Chapter負責人  自由作家  電腦...
pdf
EasyToUsePDDOS :BurnerPhoneDDOS2Dollarsaday:70CallsaMin WestonHeckerSecurityExpert SystemsNetwork Analyst/Penetrations Tester/PresidentOfComputer SecurityAssociationOf NorthDakota A1 Slide 1 A1 Author, 9/16/2013 WhoamIandwhatisthistalkabout? • AboutMe:PenetrationTester,ComputerScience/Geophysics,TonsofCerts,Customexpl...
pdf
这本来只是是我写的⼯具⾥⾯⼀个插件 后⾯那个⼯具bug太多就没有维护了,有⼀个需求就把这个插件摘出来改 了⼀下。 需求是拿到域内控制器的权限,但是要定位域内⽤户的ip,找了市⾯上的⼯具基本都是扔到域控上去执⾏,在域控 上执⾏难免会再产⽣额外的⽇志,如果脱⽇志回来的话⼤部分程序都不允许指定⽇志⽂件,所以写了这个简单的 ⼯具脱⽇志回来本地解析⽇志,如果本地解析的话⽤LogParser⾸先参数太复杂,并且移植性相较差,并且这个⼩ 插件还可以根据⾃⼰的需求环境进⾏简单的改动。 主要功能是解析evtx⽂件,调⽤的evtx的模块编写的,原有的evtx模块使⽤起来较为麻烦于是⾃⼰编写了那么⼀个 ⼯具。⼀般使⽤场景如: 拿到预控时读取域内主机对应的...
pdf
Demystifying Modern Windows Rootkits Bill Demirkapi Independent Security Researcher 1 Demystifying Modern Windows Rootkits – Black Hat USA 2020 Who Am I?  18 years old  Sophomore at the Rochester Institute of Technology  Windows Internals  Mostly self-taught (with guidance)  Strong “Game Hacking” background 2 Dem...
pdf
Security Response Center 吴 永 佳 国内SRC的漏洞趋势变化 及漏洞挖掘的一些思路分享 关于我 一名白帽子 常用ID getshell1993 曾活跃于多个第三方漏洞平台及众测平台 曾活跃于多个SRC漏洞平台 SogouSRC BaiduSRC 360SRC CainiaoSRC WifiSRC TuniuSRC MeizuSRC DouyuSRC Wooyun Xianzhi Allsec DidiSRC MobikeSRC NcfSRC SinaSRC LenovoSRC LetvSRC …… 国 内 S R C 的 漏 洞 趋 势 变 化 1 Past Now 传统漏洞企业自动化扫描检测越来越成熟 ...
pdf
聊聊这⼀一年年多以来 如何建设滴滴DSRC 分享嘉宾:安惞 今天,我打着滴滴来滴滴安全⼤大会,⼀一边听着《平凡之 路路》,⼀一边看着窗外的蓝天⽩白云,回忆起⼏几年年前在寒⻛风 中等⻋车,在地铁中赶路路,感觉真幸福。 滴滴改变出⾏行行 滴滴改变出⾏行行 现在,4.5亿⼈人的出⾏行行⽅方式,因为“滴滴⼀一下,⻢马上出发” 发⽣生了了改变。 ⽩白帽⼦子 漏漏洞洞 互联⽹网企业 情报、经验和传播共享 安全⼚厂商 产品、技术、⼈人才合作 ⾼高校 ⼈人才,漏漏洞洞,学术 媒体 传播,信息资源 政府 法律律法规 谁来保护滴滴4.5亿⽤用户的信息安全? 安全⽣生态圈 注:部分内容参考“⽼老老⻢马哥哥”默安科技公众号发布的⽂文章《浅谈企业安全技术品牌...
pdf
openjdk8 编译与clion 调试 1 openjdk8 编译与clion 调试 Created Tags Mac catalina 10.15.7 , base java version = 1.8.91 step by step: brew install mercurial brew install autoconf brew install freetype brew install ccache xcode-select install or xcode-select —install gcc -v Configured with: --prefix=/Applications/Xcode.app/Cont...
pdf
Fingerprinting and Cracking Java Obfuscated Code Yiannis Pavlosoglou A total of 36 slides Brief Outline 1. Background 2. Motivation 3. Methodology 4. Fingerprinting Tool 5. Examples 6. Conclusions 1. Background • Java Bytecode Operations • Language Security Mechanisms • Disassembling HelloWorld.java • From Bytecode t...
pdf
 Martin Holst Swende  @mhswende  Patrik Karlsson  @nevdull77  Is very diverse: from a low-level infrastructure point-of-view to high-level application flow  There are many tools, but a central component is an intercepting proxy  Usually complex beasts Feature Requirement Must be in proxy? Possible alternatives ...
pdf
RESEARCH ON THE MACHINES HELP THE FTC PROTECT PRIVACY AND SECURITY Humans User: Terrell McSweeny Function: Commissioner, FTC User: Lorrie Cranor Function: Chief Technologist, FTC Machines Speech Schematics Privacy & Security Protections Now Issues of the Day We Need Your Help! How does the FTC respond...
pdf
#BHUSA @BlackHatEvents DirectX: The New Hyper-V Attack Surface Zhenhao Hong (@rthhh17) Ziming Zhang (@ezrak1e) #BHUSA @BlackHatEvents Information Classification: General whoami Zhenhao Hong (@rthhh17) • Security Specialist of Ant Group Light-Year Security Lab • 2019-2020 MSRC Most Valuable Security Researchers • Bl...
pdf
URI相关 0x00 前⾔ 最近看了⼀些关于url的⼩技巧,感觉⾃⼰对url的相关基础其实搞不太清楚,所以⼲脆从头仔细再学⼀遍。 主要参考⼀些链接 https://datatracker.ietf.org/doc/html/rfc3986#section-1.1 https://docs.oracle.com/javase/8/docs/api/java/net/URI.html https://blog.csdn.net/anguowei/article/details/118381316 0x01 什么是uri、url、urn uri(uniform resource identifier),统⼀资源标识符,⽤于标识⽹络上任意资...
pdf
2022/9/27 19:20 Markdoc Preview about:blank 1/12 学习⼀下浅蓝的《Hacking JSON》议题。 回顾fastjson历史漏洞 fastjson1.2.47是通过MiscCodec向⽩名单缓存中put任意类。 fastjson1.2.68是⽤的期望类, 找实现了AutoCloseable接⼝的⼦类中的危险操作。 1.2.68的修复⽅式简单粗暴,将 java.lang.Runnable 、 java.lang.Readable 和 java.lang.AutoCloseable 加⼊了⿊名单,那么1.2.80⽤的就是另⼀个期望类:异 常类Throwable。 2022/9/27 19:...
pdf
Debugging and Reversing ALPC Contents: Introduction & Disclaimer Environment Preparation Getting Off The Ground From User to Kernel Land Hunting An ALPC Object Introduction & Disclaimer This post is an addendum to my journey to discover and verify the internals of ALPC, which I’ve documented in Offensive Windows IPC I...
pdf
All Your Solar Panels are belong to Me FRED BRET-MOUNET Who am I? • Disclaimer: • This presentation is based on information I gathered through my research. It is full of omissions and inaccuracies due to my own lack of knowlege and incompetency. • This research has performed on my (extensive) spare time. My empl...
pdf
设备 皆有 故障! 全⾯面沦陷:噪声攻击与IOT设备的 10+年年战争 ⽬目录 概述 FI 的发展和现状 FI的实际应⽤用 FI的预防 问题在哪? const char *PIN = "19379148" // Compare the PIN with the correct one // Return true if different bool comparePIN(char *pin) { for (int i=0; i<strlen(pin); i++) { if (pin[i]!=PIN[i]) return true; ...
pdf
Bypassing)Android) Password)Manager)Apps) Without)Root Stephan)Huber,)Siegfried)Rasthofer,)Steven)Arzt Fraunhofer SIT 2 Stephan • Mobile)Security)Researcher)at) Fraunhofer)SIT • Enjoys teaching)students)in) Android)(app))hacking • Twitter:)@teamsik Siegfried • Head)of Secure)Software) Engineering)at)Fraunhofer)SIT • Fo...
pdf
滴滴SDL体系建设 范世强 2020.12.17 --滴滴SDL从0-1建设历程 目录 滴滴SDL建设历程概览 02 个人介绍 01 滴滴SDL建设历程详解 03 滴滴SDL现在与未来 04 10余年安全从业经历: • 国舜科技-安全服务 • CNCERT-渗透测试 • 阿里云-云产品安全 • 滴滴出行-SDL负责人 2017年加入滴滴,参与了整个滴滴SDL从0-1的建设过程。 01 个人介绍 02 滴滴SDL建设历程概览 01 滴滴SDL建设历程概览 开发生命周期 滴滴SDL 2017 安全开发技术咨询 设计方案评估 提供安全开发规范 黑盒扫描 三方组件扫描 代码安全评估 SRC漏洞运营 资产库建设 SDL:Security De...
pdf
Linux Containers: Future or Fantasy? Aaron Grattafiori Technical Director NCC Group (aka iSEC Partners/Matasano Security/Intrepidus Group) DEF CON 23 Infosec, pentesting, Neg9/CTF iSEC Partners for 5.5 years NCC Group for 0.1 years Hacking Samsung Smart TVs @ BH USA 2013, Toorcon, etc Macs in the age of the...
pdf
© 2013 tenacitysolutions.com 1835 Alexander Bell Drive, Suite 100, Reston, VA 20191 703-673-3100 Weaponizing your Pets! The War Kitteh and the Denial of Service Dog! DefCon! 10 August 2014! ! © 2013 tenacitysolutions.com 1835 Alexander Bell Dr. Suite 100, Reston, VA 20191 703-673-3100 Introductions! •  Gene Bransfield ...
pdf
#BHUSA @BlackHatEvents DNSSEC Downgrade Attacks Haya Shulman, Elias Heftrig, Michael Waidner #BHUSA @BlackHatEvents Information Classification: General Why DNSSEC Downgrade Attacks? DNS is involved in virtually all transactions on the Internet and many mechanisms rely on its security ➢ when determining which IP host t...
pdf
Chris Rock I WILL KILL YOU & BIRTH YOU How to kill someone and bury the body yourself without a shovel & How to make Babies and then Harvest them Chris Rock chris@kustodian.com Why research DEATH Death Process behind the curtain Globally U.S. Certificate of Death Details about the Dead Person Medical ...
pdf
Building SECURE SERVERS with LINUX TOOLS & BEST PRACTICES FOR BASTION HOSTS MICHAEL D. BAUER Building SECURESERVERS with LINUX Michael D. Bauer Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo TITLE Page iii Wednesday, October 16, 2002 6:14 PM This is the Title of the Book, eMatter Edition ...
pdf
Automated Discovery of Deserialization Gadget Chains Ian Haken DEF CON 26, 2018 Automated Discovery of Deserialization Gadget Chains Ian Haken $ whoami Senior Security Software Engineer on Netflix’s Platform Security team. Netflix is a microservice ecosystem and we build security services and libraries to keep those...
pdf
ISC 2019 第七届互联网安全大会 郑文彬 360集团首席安全技术官、伏尔甘团队创始人 追踪NSA网络武器的那些年 扫码添加小鹅助理,与数万科技圈人士 分享重量级活动PPT、干货培训课程、高端会议免费 门票 小鹅助理 扫码添加小鹅助理,与数万科技圈人士 分享重量级活动PPT、干货培训课程、高端会议免费门票 小鹅助理 谢谢!
pdf
A Picture is Worth a Thousand Words, Literally Deep Neural Networks for Social Stego Philip Tully | Mike Raggo 1 DC25: Community, Discovery and the Unintended Uses of Technology 2 2600: The Hacker Quarterly 3 Summer 1992 Summer 2017 25 years #whoami 4 Philip Tully ...
pdf
Network Protocol Reverse Engineering Literature Survey for “Eavesdropping on the Machines” Presented 2016-08-05 at DEF CON 24 by Tim Estell and Katea Murray Prior DEF CON Talks DC22 - Jesus Molina presented “Learn how to control every room at a luxury hotel remotely: the dangers of insecure home automation deploym...
pdf
Setiri: Advances in Trojan Technology Roelof Temmingh & Haroon Meer Defcon 10 Las Vegas 2002 Schedule Introduction Why Trojans? Brief History of Trojans & Covert Channels The Hybrid model Setiri: Advances in Trojan Technology Demonstration Taking it further Possible fixes Introduction SensePost The speakers Objective ...
pdf
Out-of-Band File Transfer on Closed Systems An Insider’s Options Michael Rich @miketofet mike@tofet.net Abstract I present a method of transferring arbitrary binary files to and from an ostensibly closed system using standard office software and readily available office tools while avoiding the use of Internet ...
pdf
DEFCON 19 // Adam Baldwin Pillaging DVCS Repos ...for fun and profit $ whoami Pillaging DVCS Repos // DEFCON 19 // @adam_baldwin @adam_baldwin Co-Founder of nGenuity Pentester of webs evilpacket.net WTF is DVCS Pillaging DVCS Repos // DEFCON 19 // @adam_baldwin Objectives Pillaging DVCS Rep...
pdf
.NET 下的⼏种可执⾏⽂件 在net中,⽐较常⻅的⼏种脚本后戳名有,aspx,ashx,asmx,svc等等。(asp等其实并不是由net程序去处理) 在net程序中所有未预编译的程序最终都会进⼊BuildManager, System.Web.Compilation.BulidManager 负责 整站的动态编译。 如果开发者在程序根⽬录的 PrecompiledApp.config 中设置了不更新编译内容后,那么最终在 BuildManager 的 GetVPathBuildResultInternal ⽅法中会进⾏判断,如果⽤户设置了禁⽌更新编译内容且此时程序内置变 量 allowBuildInPrecompile 为fal...
pdf
从键盘钩子木马到无线键鼠套装劫持 演讲人:石冰 2 0 1 8 PART 01 键盘Hack 目录 CONTENTS PART 02 键盘钩子木马 PART 03 无线键鼠 套装劫持 PART 04 安全建议 01 02 03 04 针对键盘的攻击思路分析 PART 01 键盘Hack 键盘——最常见的输入设备之一 物理键盘 虚拟键盘 机械键盘 ATM机键盘 软键盘 手机键盘 计算机键盘分类 计算机键盘 编码键盘:键盘控制电路的功能 完全靠硬件完成 非编码键盘:键盘控制电路的 功能由硬件和软件共同实现 数字电路 对应按键ASCII码 查询程序 传送程序 译码程序 便于重定义 应用广泛 非编码键盘的短板:键位冲...
pdf
Module 3 Understanding and countering malware’s evasion and self-defence https://github.com/hasherezade/malware_training_vol1 Fingerprinting for evasion Fingerprinting for evasion • Fingerprinting = gathering information about the environment where the executable was deployed • It is used by malware to determine whet...
pdf
从FireEye的泄露看红队的差距 1. 前言 一大早被领导拉起来分析火眼事件。朋友圈整个安全圈子也是沸腾不已,但随着分析的深入,发现有 点“小题大做”了,没有想要的高尖精工具和技术方案,全是一堆已知攻击技术的红队模拟工具。但站在 一个红队人员的角度,也是收获不少。 2. 红队服务真的有用“假想敌手段”么? 以“假想敌”手段来评估企业安全,这里的手段往往被定义为APT手段。国内当前的红队服务使用的手段是 APT手段么?什么是APT手段?红队是怎么模拟的? 在火眼给的防御策略中,明显看出APT开头的很多样本、工具、后门。火眼的安全人员把各项在APT活动 中的技术方法做成了红队工具,用来评估企业对各种APT技术的防御能力,至少从工具层面...
pdf
#BHUSA   @BlackHatEvents RollBack A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems Joint work with Jun Wen Wong (NCS Group / DSBJ), Soundarya Ramesh (NUS), Rohini Poolat Parameswarath (NUS), Mun Choon Chan (NUS) Levente Csikor NCS Group Institute for Infocomm Research, A*STAR ...
pdf
@patrickwardle DEATH BY 1000 INSTALLERS ...it's all broken :( WHOIS “leverages the best combination of humans and technology to discover security vulnerabilities in our customers’ web apps, mobile apps, IoT devices and infrastructure endpoints” security for the 21st century @patrickwardle issues; bugs; & exploits!...
pdf
Hacking Google AdWords “Don’t be evil my ass” By: StankDawg What is Google AdWords? • Google Advertising Program – Pay Per Click – Customizable – Used by: • Gmail • Google Groups • Adsense • etc… How does it work? • 20 bucks up front – $5 activation fee – $15 Credit towards account • Pay per click – Bidding system • ...
pdf
KUBERNETES中的异常活动检测 About me 0 1 @9ian1i 朱思宇 blue teamer,⼊侵对抗,业余安全开发,阿⾥云融媒体安全。 DEFCON Blue Team Village,Black Hat Arsenal 演讲者。 WatchAD – AD Security Intrusion Detection System crawlergo – A powerful browser crawler for web vulnerability scanners ??? - kubernetes abnormal activity detection and blocking system 开源安全项⽬: 安全...
pdf
DCFluX in: Moon-Bouncer DCFluX in: Moon-Bouncer Presented By: Matt Krick, DCFluX – K3MK Chief Engineer, New West Broadcasting Systems, Inc. DEFCON 18; Las Vegas, NV Track 4 Friday July 30, 2010; 17:00 – 17:50 In A.D. 2101 War Was Beginning Hidden Agenda 1. A Series of Tubes 2. Natural Satellites and Moon Bouncing 3. A...
pdf
APPLIED INTELLIGENCE: APPLIED INTELLIGENCE: Using information that isn't there Using information that isn't there Michael Schrenk Las Vegas, Nevada @mgschrenk DEF CON XXIII DEF CON XXIII APPLIED INTELLIGENCE: APPLIED INTELLIGENCE: Using information that isn't there Using information that isn't there APPLIED INTELLIGENC...
pdf
Demystifying Modern Windows Rootkits Bill Demirkapi Independent Security Researcher 1 Demystifying Modern Windows Rootkits – DEF CON 28 Who Am I? ▪ 19 years old ▪ Sophomore at the Rochester Institute of Technology ▪ Windows Internals ▪ Mostly self-taught (with guidance) ▪ Strong “Game Hacking” background 2 Demystifyin...
pdf
Spread Spectrum Satcom Hacking Attacking the Globalstar Simplex Data Service Colby Moore @colbymoore - colby@synack.com Motivation • Satellite hacking talks never deliver • RF world largely neglected by hacker community • So much legacy tech in critical systems • Spark interest in satellite security research What...
pdf
Writing Fiction to Tell the Truth By Richard Thieme Things are often not what they seem. That’s a “fact.” But that fact and others are filtered into our brains through images and words that often distort the truth—sometimes due to sloppy thinking but often as a result of policies adopted by “the national security ...
pdf
nmap去除指纹以及识别假端⼝开放问题  0x00 前⾔  最近在研究⼯具链的组合使⽤,在⽹络端⼝扫描⽅⾯还是打算先集成⼀下nmap这种⽼牌的⼯具再 结合其他⼀些个性化⼯具来解决⼀些端⼝扫描上的需求。 这边先对nmap进⾏⼀些优化⽐如去除明显的指纹降低被识别的⻛险,其次解决⼀下因为防⽕墙策 略导致批量假端⼝开放的问题。 0x01 去除指纹的思路  nmap等各类开源扫描器⼀般来说都会有意⽆意的引⼊⼀些请求特征。⽐如tcp请求的⼀些选项配置 与正常请求不同,⽐如包含特定关键词的payload等。针对nmap我们可以先参考⼀下先知的这篇⽂ 章《如何修改nmap, 重新编译,bypass emergingthreats 的公开ids规则》...
pdf
Computer Science / www.isec.utulsa.edu How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles Jason Staggs Computer Science / www.isec.utulsa.edu Who is this guy? • Jason Staggs – Graduate Research Assistant • Institute for Information Security (iSec) • Crash Reconstruction R...
pdf
解析bootloader安全 程君 throber3@gmail.com 自我介绍 • 10年安全研究与开发 • 系统安全,移动与嵌入式安全 • 2008-2010 comodo 主动防御研究与开发 • 2010- 2011 网秦移动安全高级研究员 • 2011- 至今 猎豹移动研发经理,参与手机 毒霸研发 移动安全支付 • 社会工程 短信诈骗 电话诈骗 • 盗号 程序伪冒 钓鱼 键盘记录 网络截获 • 系统漏洞 Root 提权 内存读取 • bootloader级别漏洞 议程 • bootloader 基本介绍 • bootloader 获取与分析 • bootloader 具体流程 • bootloader attack v...
pdf
@patrickwardle I got 99 Problems, but 
 Little Snitch ain’t one! WHOIS “leverages the best combination of humans and technology to discover security vulnerabilities in our customers’ web apps, mobile apps, IoT devices and infrastructure endpoints” @patrickwardle security for the 21st century career hobby making li...
pdf
蓝凌OA前台SSRF漏洞 漏洞地址: /sys/ui/extend/varkind/custom.jsp 直接贴源码: <%@page import="com.landray.kmss.util.ResourceUtil"%> <%@page import="net.sf.json.JSONArray"%> <%@page import="net.sf.json.JSONObject"%> <%@ page language="java" pageEncoding="UTF-8"%> <%@ taglib prefix="c" uri="http://java.sun.com/jsp/jstl/core"%> <% JSONObje...
pdf
Anthony Lai Security Researcher@VXRL Taste the power of Crimeware! (HIT 2010 Edition) Special Thanks • HIT fellows • Thank you to PK and Birdman • My wife and Pomeranian family My Bio • From Hong Kong • Worked in penetration test, code audit and threat analysis • Interested in reverse engineering and malware analy...
pdf
CobaltStrike 0x00 C2 @L.N TeamServerCS TeamServer CobaltStrike 4.3 DoS C2 0x01 + 1. teamserver 50050 java -XX:ParallelGCThreads=4 -Dcobaltstrike.server_port=55555 -Dcobaltstrike.ser ver_bindto=0.0.0.0 -Djavax.net.ssl.keyStore=./cobaltstrike.store -Djavax.net.ssl .keyStorePassword=123456 -server -XX:+Aggressi...
pdf
VoIP Wars : Return of the SIP Fatih Özavcı Information Security Researcher & Consultant fatih.ozavci at viproy.com viproy.com/fozavci 2 # whois ● Information Security Consultant @ Viproy / Turkey ● 10+ Years Experience in Penetration Testing ● 800+ Penetration Tests, 40+ Focused on NGN/VoIP – SIP/NGN/VoIP Systems Pen...
pdf
Runtime Process Insemination Shawn “lattera” Webb SoldierX https://www.soldierx.com/ Who Am I?  Just another blogger  Professional Security Analyst  Twelve-year C89 programmer  Member of SoldierX, BinRev, and Hack3r Disclaimers  Opinions/views expressed here are mine, not my employer’s  Talk is semi-random  Tie...
pdf
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential. 1 Vulnerability, Malware and DDoS HITCON 2014 Taipei, Taiwan 石謂龍 Robin Shih, APJ TippingPoint Solution Architect HP ESP rshih@hp.com +886-935784086 © Copyright 2013 Hewlett...
pdf
GOBY 0x00 awvsgoby 0x01 windowsgobymac /Applications/Goby.app app electronapp.asarjs asar e app.asar builddist jsbuilddist exec execSync scan.js render.js 90000js 0x02 xsshttp goby xss ip phpphpvendor headerh1phphttpserver XSSscriptimg <img src="x" onerror="alert(1);"> tab XSS jbXSS ip 8080 xss 0x03 XSSRCE XS...
pdf
BCTF 2018 By Nu1L BCTF 2018 PWN easiest three hardcore_fmt SOS easywasm Reverse easypt Web checkin SimpleVN babySQLiSPA SEAFARING1 SEAFARING2 Crypto guess_polynomial guess_number BlockChain EOSGame Fake3D MISC easysandbox https://bctf.xctf.org.cn/ 1127 14:00 - 1129 02:00 PWN easiest Double Freetcache Leak GOT0x40size ...
pdf
© 2013 NSFOCUS www.nsfocus.com nsfocus.com www.nsfocus.com nsfocus.com 瀏覽器和本地域 public 於暘 綠盟科技研究院 Who am I @tombkeeper on twitter Researcher @NSFOCUS Security Labs SCADA/ICS security research Focus on: APT/0-day attacks detection Vulnerability research Exploit technology Some other geek things 流覽器的域 域的意義:數據隔離 ...
pdf
MALWARE MIGRATING TO GAMING CONSOLES Embedded devices, an AntiVirus-free safe hideout for Malware Ahn Ki-Chan - Hanyang University, Undergraduate Ha Dong-Joo - AhnLab Inc., Security Researcher About Introduction - Embedded systems(gaming consoles, smartphones, etc.) have enough hardware for malware to survive and per...
pdf
FORENSIC ARTIFACTS FROM A PASS THE HASH (PTH) ATTACK BY: GERARD LAYGUI DISCLAIMER: THE VIEWS AND OPINIONS EXPRESSED IN THIS PRESENTATION ARE THOSE OF THE AUTHOR’S AND DOES NOT NECESSARILY REPRESENT THE OFFICIAL POLICY OR POSITION OF THE COMPANY THAT THE AUTHOR WORKS FOR. WHAT IS A HASH? A HASH FUNCTION IS ANY FU...
pdf
▪ • Relatively Easy to Exploit • Easily Automated • Usually not Monitored ▪ ▪ ▪ ▪ Kerberos ▪ Kerberos Delegation ▪ ▪ Focus on High Privileges ▪ Malicious JIT Administration ▪ ▪ ▪ • Ticket based authentication protocol Domain User AS TGS KDC LSASS (KERBEROS) ST TGT App Server TGT ST ▪ • Why? • An application reusing ...
pdf
Social Networking Special Ops: Extending Data Visualization Tools for Faster Pwnage 1 Chris Sumner | @TheSuggmeister | www.securityg33k.com Tuesday, 3 August 2010 Disclaimer “I am not speaking on behalf of my employer. The information and perspectives I present are personal and do not represent those of ...
pdf
DEFCON 18 Electronic Weapons Presented by: mage2 Warning Mucking about with the things I am about to talk to you about can and will kill you and all puppies, kittens and laptops around you. So be forewarned. Also transmitting on frequencies you are not licensed for can really piss off the FCC and DHS, depending o...
pdf
Tell me who you are and I will tell you your lock pattern Marte Løge 23 years, Norway MSc. Computer Science @NUTS Developer @Itera Humans are… …predictable! How Many Combinations does the Android Lock Pattern Have? 389,112 Length #Combina/ons 4 1624 5 7152 6 26,016 7 72,912 8 140,704 9 140,704 Tot...
pdf
Android 渗透测试入门教程(内部资料)——daxueba.net 版权所有 Android 渗透测试入门教程 (内部资料) 大学霸 www.daxueba.net Android 渗透测试入门教程(内部资料)——daxueba.net 版权所有 前 言 Kali Linux 是业内最知名的安全渗透测试专用操作系统。它的前身就是业界知名的 BackTrack 操作 系统。BackTrack 在 2013 年停止更新,转为 Kali Linux。Kali Linux 集成了海量渗透测试、网络扫描、 攻击等专用工具。通过系统更新,用户可以快速获取最新的各类工具。所以,Kali Linux 是专业人员的 不二选择。 目...
pdf
aRgus d4yj4y sMURFBOy the Luna Correspondence Protocol The security of our world as we know it is at stake. The nature of our project may lend itself to abuse by malicious users, cooperate espionage, and even terrorism. More positive applications include freedom of speech and information under oppressive regimes,...
pdf
强⽹杯 WriteUp By Nu1L Author:Nu1L Team 强⽹杯 WriteUp By Nu1L Pwn yakagame easychain1 house of cat Reverse find_basic easyre deeprev GameMaster easyapk Web uploadpro babyweb easylogin easyweb crash Crypto Factor myJWT Lattice Misc 谍影重重 强⽹先锋 rcefile polydiv devnull WP-UM AVR Pwn yakagame llvm void a000(int a); void a001(...
pdf
Introduction SEH Basics Anti-RE Techniques Decrypting the Content Anti-RE Techniques in DRM Code Jan Newger Seminar on Advanced Exploitation Techniques i4, RWTH Aachen, Germany DEF CON 16 / 2008 Jan Newger Anti-RE Techniques in DRM Code Introduction SEH Basics Anti-RE Techniques Decrypting the Content Outline 1 Introdu...
pdf
Introductions •  Benjamin Caudill •  Principal Consultant with Rhino Security Labs •  Pentesting, Social Engineering, Webapp •  ~4 Years in Security, 8+ Years in IT •  Aerospace/Defense •  Incident response, forensics (APT-centric) •  Finance Industry •  Webapp assessments •  Consulting •  Pentesting, Socia...
pdf
Catching the Golden Snitch Leveraging Threat Intelligence Platforms to Defend Against Cyber Attacks  ashley@teamt5.org • Malware analysis, malicious document detection, advanced persistence threat research • Tracking several cyber espionage groups for years • Tracking new operations, TTP of APT groups  zha...
pdf
目录 Vulnhub渗透测试练习(一)-------------------------------Breach1.0 Vulnhub渗透测试练习(二) ------------------------------Billu_b0x Vulnhub渗透测试练习(三) -------------------------------Bulldog1 Vulnhub渗透测试练习(四)---------------------------------Acid Vulnhub渗透测试练习(五)---------------------------------LazysysAdmin-1 Vulnhub渗透测试练习(六)------------...
pdf
Translation-Based Steganography Christian Grothoff Krista Grothoff Ludmila Alkhutova Ryan Stutsman Mikhail Atallah CERIAS, Purdue University {christian,krista}@grothoff.org, {lalkhuto,rstutsma}@purdue.edu,mja@cs.purdue.edu Abstract. This paper investigates the possibilities of steganographically embedding information in ...
pdf
Honey Onions: Exposing Snooping Tor HSDir Relays Guevara'Noubir &'Amirali Sanatinia {noubir,'amirali}@ccs.neu.edu Northeastern'University 1 Motivations • Previous'research'studied'the'maliciousness'of'the'relays • Known'bad'Exit'nodes • Other'work'looked'at'the'nature'of'hidden'services'content • No'prior'work'on'the'...
pdf
August 8, 2008 Inducing Momentary Faults Within Secure Smartcards / Microcontrollers DEFCON – Las Vegas Christopher Tarnovsky Flylogic Engineering, LLC. chris@flylogic.net – http://www.flylogic.net August 8, 2008 What is a momentary fault? • Temporary forced change in behavior • The change is precisely calculated ...
pdf
Time ^ estomping time For our guests from England, please allow me to translate. ^ ng tompin timest Quick background File Creation Date Last Accessed File 127 08/04/11 10:22:36 08/04/11 10:22:3 File 128 08/04/11 10:22:37 08/04/11 10:22:3 File 129 08/04/11 10:22:37 08/04/11 10:22:3 File 130 08/04/11 10:22:37 08/04/11 10...
pdf
Sketchtools: Prototyping Physical Interaction Matt Cottam Tellart and Rhode Island School of Design 27 Sims Avenue, Providence, RI 02909 USA matt@tellart.com Abstract Industrial designers working in traditional media have the luxury of sketching, playing, and experimenting with their materials before constructing a fin...
pdf
CSerV2 Final 版产品介绍 产品名称:CSer C2 适用操作系统平台:Windows 注:新版本增改内容,详见文中红字部分及最后一页的更新记录。 产品简介: 1、 采用 C/T/B 架构,即 Controller(控制端)、TeamServer(服 务器端)、Beacon(客户端) 三端,支持多用户在线,并实 时共享所有信息。 2、 Controller 端发布的任务,支持同步和异步两种方式:同步方 式可以实时的执行任务和查看任务执行结果;异步方式,则可 以实现类似于离线任务的效果,即 Controller 可以一次性下达 多个任务,Beacon 端会依次取出任务执行并将结果返回给 TeamServer。 ...
pdf
Hacking With GnuRadio Hacking With GnuRadio How to have fun with wireless transmissions! David M. N. Bryan David M. N. Bryan ●Info Security Consultant Info Security Consultant ●CISSP CISSP ●HAM HAM ●Hacker Hacker ●DEFCON DEFCON Hacker Spaces!!! Hacker Spaces!!! Thanks to CCCKC – Sweet Hacker Space! Thanks to CCCKC –...
pdf
Police Criminal Procedure Professor Steve Dunker When Can the Police Make a Stop? An Officer MUST have either: Reasonable Suspicion OR Probable Cause Reasonable Suspicion “Quantum of knowledge sufficient to induce an ordinarily prudent and cautious man under similar circumstances to believe criminal activity is at...
pdf
|=-----------------------------------------------------------------------=| |=----------------------=[ Hijacking RDS-TMC Traffic ]=------------------=| |=----------------------=[ Information signal ]=------------------=| |=-----------------------------------------------------------------------=| |=--------------...
pdf
Seccubus Repeated vulnerability scans made easy for: Public release date: 18 March 2010 version: 1.0 author: Frank Breedijk status: Public D R A F T for Public release title Seccubus version 1.0 2 date 18 March 2010 PUBLIC author Frank Breedijk Table of contents 1 Introduction 3 1.1 What is a v...
pdf
HackingDojo.com HackingDojo.com Education Masters Degrees in Computer Security: ▪ Computer Science ▪ Management Author since 2007 Professional Penetration Testing Ninja Hacking Netcat Power Tools Penetration Testing’s Open Source Toolkit, V2 Certifications ISSMP, CISSP, SCSECA, SCNA, SCSA, IEM/IAM ...
pdf
Finding VoIP vulnerabilities while you sleep Background info on VoIP and previous research Introduction to VoIPER Description of some of its features Some demos and usage examples The results of my testing Q&A From Ireland Just finished a Bsc in Computer Systems About to start a Msc in Computer Science Intere...
pdf
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matters of Unlicensed Operation in the TV Broadcast Bands Additional Spectrum for Unlicensed Devices Below 900 MHz and in the 3 GHz Band ET Docket No. 04-186 ET Docket No. 02-380 COMMENTS OF DELL INC., GOOGLE, INC., THE HEWLETT-PACK...
pdf
Incident Response Art, Science and Engineering Maarten Van Horenbeeck maarten@first.org • @maartenvhb • Director of Security Engineering at • Director and former Chairman of • Incident Responder. 你好 Ithaca, New York Population 30,513 1988 Morris worm The times, they are a-changing. Bob Dylan, 1964 FIRST...
pdf
Every Breath You Take ::data gathering, persistence, and what it all means:: jim.oleary|dc0f WARNING: STATIC CONTENT One of the overriding themes of this talk is that once a piece of data has been captured, it’s forever retrievable. In the spirit of that principle, these made-for-CD slides have been watered down a ...
pdf
Cybercrime: Challenges for Law Enforcement Susan Brenner NCR Distinguished Professor of Law & Technology University of Dayton Real-world & cybercrime Current approaches evolved to deal with real-world crime Cybercrime occurs in a different context and therefore presents different issues Example #1: Theft R...
pdf
Ladar Levison Stephen Watt What is Dark Mail? What is Dark Mail? What is DIME? Did you write down the formula? Dark Internet Mail Environment DIME Illustrated User Client DARPA NET DMAP DMTP Resolver Transport Signet Service Global Ledger (Optional) Dark Messages Server ] ] Signets Signets DNS Why Do We Need It? • Gui...
pdf
Don’t Whisper My Chips ColinOFlynn.com – DEFCON 2015. 1 Colin O’Flynn – Dalhousie University – Halifax, NS. Canada. Objective: Learn about all sorts of ‘physical’ layer attacks. Critical Difference: Everything I’m showing you is open source and freely available. Most of the hardware is commercially available (it’s d...
pdf
微擎 CMS:从 SQL 到 RCE 0x01 写在前⾯ 微擎 CMS 在 2.0 版本的时候悄咪咪修复了⼀处 SQL 注⼊漏洞: api.php 536 ⾏ 该处的注⼊漏洞⽹上没有出现过分析⽂章,因此本⽂就来分析⼀下该处 SQL 注⼊的利⽤。 0x02 影响版本 经过测试发现,官⽹在 GitLee 上,在 v1.5.2 存在此漏洞,在 2.0 版本修复了该漏洞,因此 ⽬测⾄少影响到 v1.5.2 版本 0x03 SQL 注⼊漏洞分析 这个注⼊漏洞分析还是⽐较简单的,直接定位到存在漏洞的代码处 api.php 530 ⾏开始、 564 ⾏开始的两个函数: private function analyzeSubscribe(&$...
pdf