text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Attack2Defense星球专属版CobaltStrike发布
IceRiver
经过星球内⼤佬们的不懈努⼒,星球内部专属版CobaltStrike终于开发完成,我们将其命名为
IceRiver。IceRiver主要基于CobaltStrike 4.4 进⾏的⼆次开发,在修复了这个版本的⼀些bug的
同时,扩展了⼀些功能,下⾯进⾏详细介绍:
版本特性清单
修改特征
修改默认登录认证的header标志位数据
修改beacon配置信息的默认XOR密钥
修改配置数据所在堆块的默认值
修改HTTP ua头
修改HTTP Server默认的返回信息
在兼容ForeignHTTP和ForeignHTTPS监听器前提... | pdf |
www.senseofsecurity.com.au
© Sense of Security 2013
Page ‹#› – 13-Sep-13
Compliance, Protection & Business Confidence
Sense of Security Pty Ltd
!
Sydney
Level 8, 66 King Street
Sydney NSW 2000 Australia
Melbourne
Level 10, 401 Docklands Drv
Docklands VIC 3008 Australia
T: 1300 922 923
T: +61 (0) 2 929... | pdf |
Can Homegrown Information Analysis Tools Help Us Make
Better Predictions about the Outcome of Supreme Court Cases?
Foofus
Table of Contents
Introduction..........................................................................................................................................1
Gathering Argument Data via... | pdf |
Toxic Proxies - Bypassing HTTPS & VPNs to
pwn your online identity
Alex Chapman @noxrnet
Paul Stone @pdjstone
Introduction
Our Talk
Exciting introduction
Some history – SSL, PAC, WPAD, sslstrip, HSTS
The PAC Attack – bypassing HTTPS
– Sniffing your traffic
– Stealing your data
– Stealing your accounts
T... | pdf |
Connection String Parameter Pollution Attacks
Chema Alonso1, Manuel Fernandez1, Alejandro Martín1 and Antonio Guzmán2
1Informatica64, S.L.
2Universidad Rey Juan Carlos
1{chema,mfernandez,amartin}@informatica64.com, 2antonio.guzman@urjc.es
Abstract. In 2007 the ranking of the top ten critical vulnerabilities for th... | pdf |
D E F C O N 1 3
Windows vs FreeBSD vs Linux
Windows vs FreeBSD vs Linux
Or: Why Deploying Linux in your
Environment is Suicide
D E F C O N 1 3
Don’t Believe Anything I Say
Don’t Believe Anything I Say
•
"Do not believe in anything simply because you have
heard it. Do not believe in anything simply because it is
... | pdf |
R I C K Y H I L L
D E F C O N 2 1
8 / 3 / 2 0 1 3
Phantom Network Surveillance
UAV / Drone
1
About Me
Security Consultant, D.C. Area
Specialties: Wireless & SCADA Security
US Govt. and Commercial Engagements
Previous DEFCON talks: WarRocketing &
WarBallooning, (over Las Vegas ;-)
Hobbies: R... | pdf |
I Know What
You Are By the
Smell of Your
Wi-Fi
Denton Gentry
Try It!
1%
10%
Poll: Wi-Fi at DEFCON for a demo
89%
bad idea.
worst idea.
what could go wrong?
SSID: SmellOfWifiTalk
MAC Sublayer Management Entity (MLME)
Probe Request: Asks nearby APs to respond.
Association Request: join the Wi-Fi network
Probe Request
... | pdf |
Vul of PostpreSql、Informic JDBC Driver
当程序中JDBC 连接 URL 可控时,可能会造成安全问题。HITB2021SIN 中的分享议题 "Make
JDBC Attacks Brilliant Again" 列举出了H2、IBM DB2、MODEShape、Apache Derby、
SQLite等数据库Driver,在Connect URL可控情况下的安全问题。
⼀、Postgresql CVE-2022-21724
近⽇披露了CVE-2022-21724,同样是在JDBC Connection URL可控情况下将会出现某些安
全问题。
当攻击者控制 jdbc url 或属性时,使⽤ po... | pdf |
Technique and bypassing defense
mechanisms
07. 2010
STRI/Advance Technology Lab/Security
Exploitation on ARM
CONFIDENTIAL
2
# /usr/bin/whoami
● Itzhak (Zuk) Avraham
● Researcher at Samsung Electronics
● Partner at PIA
● Follow me on twitter under “ihackbanme”
● Blog : http://imthezuk.blogspot.com
● For any questions/t... | pdf |
安全测试中
一些有趣的姿势和技巧
Fresh business general template
Applicable to enterprise introduction, summary
report, sales marketing, chart data
gdygdy
ID
gdygdy
程序猿转行安全
多年搬砖背锅经验,目前在练习甩锅
曾经在多个SRC和漏洞平台打酱油
每天专心撸铁
自我介绍
聊些什么?
测试中那些总被忽略的目标
目 标
哪些目标?
APP
移动APP应用
微信
微信公众号,小程序
QQ
QQ公众号
支付宝
支付宝生活号、小程序
移动APP来源
安卓应用市场
AppStore
苹果企业证书安装
iO... | pdf |
WSUSpendu
ANSSI
Romain Coltel Romain.Coltel@Alsid.eu
Yves Le Provost Yves.Le-Provost@ssi.gouv.fr
2
WSUSpendu
Contents
Introduction
5
WSUS and network architecture
7
1.1
Architectures presentation
7
1.2
Auto approved updates
10
1.3
State of the art - WSUSpect and technical limitations
11
WSUS internals
13
2.1
IIS Webser... | pdf |
Botnet and Malware
behavior analysis
蔡一郎
2010/07/17
Honeynet Project Taiwan Chapter www.honeynet.org.tw
蔡一郎 Steven
學歷:國立成功大學電機工程研究所碩士
現任:國家高速網路與計算中心 副工程師
重要經歷:
國立成功大學研究發展基金會助理研究員
崑山科技大學兼任講師
台南科學園區產學協會理事
Honeynet Project Taiwan Chapter負責人
自由作家
電腦... | pdf |
EasyToUsePDDOS
:BurnerPhoneDDOS2Dollarsaday:70CallsaMin
WestonHeckerSecurityExpert
SystemsNetwork
Analyst/Penetrations
Tester/PresidentOfComputer
SecurityAssociationOf
NorthDakota
A1
Slide 1
A1
Author, 9/16/2013
WhoamIandwhatisthistalkabout?
• AboutMe:PenetrationTester,ComputerScience/Geophysics,TonsofCerts,Customexpl... | pdf |
这本来只是是我写的⼯具⾥⾯⼀个插件 后⾯那个⼯具bug太多就没有维护了,有⼀个需求就把这个插件摘出来改
了⼀下。
需求是拿到域内控制器的权限,但是要定位域内⽤户的ip,找了市⾯上的⼯具基本都是扔到域控上去执⾏,在域控
上执⾏难免会再产⽣额外的⽇志,如果脱⽇志回来的话⼤部分程序都不允许指定⽇志⽂件,所以写了这个简单的
⼯具脱⽇志回来本地解析⽇志,如果本地解析的话⽤LogParser⾸先参数太复杂,并且移植性相较差,并且这个⼩
插件还可以根据⾃⼰的需求环境进⾏简单的改动。
主要功能是解析evtx⽂件,调⽤的evtx的模块编写的,原有的evtx模块使⽤起来较为麻烦于是⾃⼰编写了那么⼀个
⼯具。⼀般使⽤场景如: 拿到预控时读取域内主机对应的... | pdf |
Demystifying Modern
Windows Rootkits
Bill Demirkapi
Independent Security Researcher
1
Demystifying Modern Windows Rootkits – Black Hat USA 2020
Who Am I?
18 years old
Sophomore at the Rochester Institute of Technology
Windows Internals
Mostly self-taught (with guidance)
Strong “Game Hacking” background
2
Dem... | pdf |
Security Response Center
吴
永
佳
国内SRC的漏洞趋势变化
及漏洞挖掘的一些思路分享
关于我
一名白帽子
常用ID getshell1993
曾活跃于多个第三方漏洞平台及众测平台
曾活跃于多个SRC漏洞平台
SogouSRC BaiduSRC 360SRC CainiaoSRC WifiSRC TuniuSRC MeizuSRC DouyuSRC
Wooyun Xianzhi Allsec DidiSRC MobikeSRC NcfSRC SinaSRC LenovoSRC LetvSRC ……
国
内
S
R
C
的
漏
洞
趋
势
变
化
1
Past
Now
传统漏洞企业自动化扫描检测越来越成熟
... | pdf |
聊聊这⼀一年年多以来
如何建设滴滴DSRC
分享嘉宾:安惞
今天,我打着滴滴来滴滴安全⼤大会,⼀一边听着《平凡之
路路》,⼀一边看着窗外的蓝天⽩白云,回忆起⼏几年年前在寒⻛风
中等⻋车,在地铁中赶路路,感觉真幸福。
滴滴改变出⾏行行
滴滴改变出⾏行行
现在,4.5亿⼈人的出⾏行行⽅方式,因为“滴滴⼀一下,⻢马上出发”
发⽣生了了改变。
⽩白帽⼦子
漏漏洞洞
互联⽹网企业
情报、经验和传播共享
安全⼚厂商
产品、技术、⼈人才合作
⾼高校
⼈人才,漏漏洞洞,学术
媒体
传播,信息资源
政府
法律律法规
谁来保护滴滴4.5亿⽤用户的信息安全?
安全⽣生态圈
注:部分内容参考“⽼老老⻢马哥哥”默安科技公众号发布的⽂文章《浅谈企业安全技术品牌... | pdf |
openjdk8 编译与clion 调试
1
openjdk8 编译与clion 调试
Created
Tags
Mac catalina 10.15.7 , base java version = 1.8.91
step by step:
brew install mercurial
brew install autoconf
brew install freetype
brew install ccache
xcode-select install or xcode-select —install
gcc -v
Configured with: --prefix=/Applications/Xcode.app/Cont... | pdf |
Fingerprinting and Cracking Java
Obfuscated Code
Yiannis Pavlosoglou
A total of 36 slides
Brief Outline
1.
Background
2.
Motivation
3.
Methodology
4.
Fingerprinting Tool
5.
Examples
6.
Conclusions
1. Background
•
Java Bytecode Operations
•
Language Security Mechanisms
•
Disassembling HelloWorld.java
•
From Bytecode t... | pdf |
Martin Holst Swende
@mhswende
Patrik Karlsson
@nevdull77
Is very diverse: from a low-level infrastructure
point-of-view to high-level application flow
There are many tools, but a central
component is an intercepting proxy
Usually complex beasts
Feature
Requirement
Must be in
proxy?
Possible alternatives
... | pdf |
RESEARCH ON THE MACHINES
HELP THE FTC PROTECT PRIVACY
AND SECURITY
Humans
User: Terrell McSweeny
Function: Commissioner, FTC
User: Lorrie Cranor
Function: Chief Technologist, FTC
Machines
Speech Schematics
Privacy &
Security
Protections
Now
Issues of
the Day
We Need
Your Help!
How does the FTC respond... | pdf |
#BHUSA @BlackHatEvents
DirectX: The New Hyper-V
Attack Surface
Zhenhao Hong (@rthhh17)
Ziming Zhang (@ezrak1e)
#BHUSA @BlackHatEvents
Information Classification: General
whoami
Zhenhao Hong (@rthhh17)
• Security Specialist of Ant
Group Light-Year Security Lab
• 2019-2020 MSRC Most
Valuable Security
Researchers
• Bl... | pdf |
URI相关
0x00 前⾔
最近看了⼀些关于url的⼩技巧,感觉⾃⼰对url的相关基础其实搞不太清楚,所以⼲脆从头仔细再学⼀遍。
主要参考⼀些链接
https://datatracker.ietf.org/doc/html/rfc3986#section-1.1
https://docs.oracle.com/javase/8/docs/api/java/net/URI.html
https://blog.csdn.net/anguowei/article/details/118381316
0x01 什么是uri、url、urn
uri(uniform resource identifier),统⼀资源标识符,⽤于标识⽹络上任意资... | pdf |
2022/9/27 19:20
Markdoc Preview
about:blank
1/12
学习⼀下浅蓝的《Hacking JSON》议题。
回顾fastjson历史漏洞
fastjson1.2.47是通过MiscCodec向⽩名单缓存中put任意类。
fastjson1.2.68是⽤的期望类,
找实现了AutoCloseable接⼝的⼦类中的危险操作。
1.2.68的修复⽅式简单粗暴,将 java.lang.Runnable 、 java.lang.Readable 和 java.lang.AutoCloseable 加⼊了⿊名单,那么1.2.80⽤的就是另⼀个期望类:异
常类Throwable。
2022/9/27 19:... | pdf |
Debugging and Reversing ALPC
Contents:
Introduction & Disclaimer
Environment Preparation
Getting Off The Ground
From User to Kernel Land
Hunting An ALPC Object
Introduction & Disclaimer
This post is an addendum to my journey to discover and verify the internals of ALPC, which I’ve
documented in Offensive Windows IPC I... | pdf |
All Your Solar Panels
are belong to Me
FRED BRET-MOUNET
Who am I?
• Disclaimer:
•
This presentation is based on
information I gathered through my
research. It is full of omissions and
inaccuracies due to my own lack of
knowlege and incompetency.
•
This research has performed on my
(extensive) spare time. My
empl... | pdf |
设备
皆有
故障!
全⾯面沦陷:噪声攻击与IOT设备的
10+年年战争
⽬目录
概述
FI 的发展和现状
FI的实际应⽤用
FI的预防
问题在哪?
const char *PIN = "19379148"
// Compare the PIN with the correct one
// Return true if different
bool comparePIN(char *pin) {
for (int i=0; i<strlen(pin); i++) {
if (pin[i]!=PIN[i])
return true;
... | pdf |
Bypassing)Android)
Password)Manager)Apps)
Without)Root
Stephan)Huber,)Siegfried)Rasthofer,)Steven)Arzt
Fraunhofer SIT
2
Stephan
•
Mobile)Security)Researcher)at)
Fraunhofer)SIT
•
Enjoys teaching)students)in)
Android)(app))hacking
•
Twitter:)@teamsik
Siegfried
•
Head)of Secure)Software)
Engineering)at)Fraunhofer)SIT
•
Fo... | pdf |
滴滴SDL体系建设
范世强
2020.12.17
--滴滴SDL从0-1建设历程
目录
滴滴SDL建设历程概览
02
个人介绍
01
滴滴SDL建设历程详解
03
滴滴SDL现在与未来
04
10余年安全从业经历:
•
国舜科技-安全服务
•
CNCERT-渗透测试
•
阿里云-云产品安全
•
滴滴出行-SDL负责人
2017年加入滴滴,参与了整个滴滴SDL从0-1的建设过程。
01
个人介绍
02
滴滴SDL建设历程概览
01 滴滴SDL建设历程概览
开发生命周期
滴滴SDL 2017
安全开发技术咨询
设计方案评估
提供安全开发规范
黑盒扫描
三方组件扫描
代码安全评估
SRC漏洞运营
资产库建设
SDL:Security De... | pdf |
Linux Containers: Future or Fantasy?
Aaron Grattafiori
Technical Director
NCC Group (aka iSEC Partners/Matasano Security/Intrepidus Group)
DEF CON 23
Infosec, pentesting, Neg9/CTF
iSEC Partners for 5.5 years
NCC Group for 0.1 years
Hacking Samsung Smart TVs @ BH USA 2013, Toorcon, etc
Macs in the age of the... | pdf |
© 2013 tenacitysolutions.com 1835 Alexander Bell Drive, Suite 100, Reston, VA 20191 703-673-3100
Weaponizing your Pets!
The War Kitteh and the Denial of
Service Dog!
DefCon!
10 August 2014!
!
© 2013 tenacitysolutions.com 1835 Alexander Bell Dr. Suite 100, Reston, VA 20191 703-673-3100
Introductions!
• Gene Bransfield ... | pdf |
#BHUSA @BlackHatEvents
DNSSEC Downgrade Attacks
Haya Shulman, Elias Heftrig, Michael Waidner
#BHUSA @BlackHatEvents
Information Classification: General
Why DNSSEC Downgrade Attacks?
DNS is involved in virtually all transactions on the Internet and many mechanisms rely on its security
➢ when determining which IP host t... | pdf |
Chris Rock
I WILL KILL YOU
& BIRTH YOU
How to kill someone and
bury the body yourself
without a shovel
&
How to make Babies and
then Harvest them
Chris Rock
chris@kustodian.com
Why research DEATH
Death Process behind the curtain
Globally
U.S. Certificate of Death
Details about the
Dead Person
Medical ... | pdf |
Building
SECURE SERVERS
with
LINUX
TOOLS & BEST PRACTICES FOR BASTION HOSTS
MICHAEL D. BAUER
Building
SECURESERVERS
with
LINUX
Michael D. Bauer
Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo
TITLE Page iii Wednesday, October 16, 2002 6:14 PM
This is the Title of the Book, eMatter Edition
... | pdf |
Automated Discovery of
Deserialization Gadget
Chains
Ian Haken
DEF CON 26, 2018
Automated Discovery of Deserialization Gadget Chains
Ian Haken
$ whoami
Senior Security Software Engineer on Netflix’s Platform Security team.
Netflix is a microservice ecosystem and we build security services and
libraries to keep those... | pdf |
ISC 2019 第七届互联网安全大会
郑文彬
360集团首席安全技术官、伏尔甘团队创始人
追踪NSA网络武器的那些年
扫码添加小鹅助理,与数万科技圈人士
分享重量级活动PPT、干货培训课程、高端会议免费
门票
小鹅助理
扫码添加小鹅助理,与数万科技圈人士
分享重量级活动PPT、干货培训课程、高端会议免费门票
小鹅助理
谢谢! | pdf |
A Picture is Worth a
Thousand Words, Literally
Deep Neural Networks for Social Stego
Philip Tully | Mike Raggo
1
DC25: Community, Discovery and the
Unintended Uses of Technology
2
2600: The Hacker Quarterly
3
Summer 1992
Summer 2017
25 years
#whoami
4
Philip Tully
... | pdf |
Network Protocol Reverse Engineering
Literature Survey for “Eavesdropping on the Machines”
Presented 2016-08-05 at DEF CON 24 by Tim Estell and Katea Murray
Prior DEF CON Talks
DC22 - Jesus Molina presented “Learn how to control every room at a luxury hotel remotely: the
dangers of insecure home automation deploym... | pdf |
Setiri:
Advances in Trojan Technology
Roelof Temmingh & Haroon Meer
Defcon 10
Las Vegas
2002
Schedule
Introduction
Why Trojans?
Brief History of Trojans & Covert Channels
The Hybrid model
Setiri: Advances in Trojan Technology
Demonstration
Taking it further
Possible fixes
Introduction
SensePost
The speakers
Objective ... | pdf |
Out-of-Band File Transfer on Closed Systems
An Insider’s Options
Michael Rich
@miketofet
mike@tofet.net
Abstract
I present a method of transferring arbitrary binary files to and from an ostensibly closed system
using standard office software and readily available office tools while avoiding the use of
Internet ... | pdf |
DEFCON 19 // Adam Baldwin
Pillaging DVCS
Repos
...for fun and profit
$ whoami
Pillaging DVCS Repos // DEFCON 19 // @adam_baldwin
@adam_baldwin
Co-Founder of nGenuity
Pentester of webs
evilpacket.net
WTF is DVCS
Pillaging DVCS Repos // DEFCON 19 // @adam_baldwin
Objectives
Pillaging DVCS Rep... | pdf |
.NET 下的⼏种可执⾏⽂件
在net中,⽐较常⻅的⼏种脚本后戳名有,aspx,ashx,asmx,svc等等。(asp等其实并不是由net程序去处理)
在net程序中所有未预编译的程序最终都会进⼊BuildManager, System.Web.Compilation.BulidManager 负责
整站的动态编译。
如果开发者在程序根⽬录的 PrecompiledApp.config 中设置了不更新编译内容后,那么最终在 BuildManager
的 GetVPathBuildResultInternal ⽅法中会进⾏判断,如果⽤户设置了禁⽌更新编译内容且此时程序内置变
量 allowBuildInPrecompile 为fal... | pdf |
从键盘钩子木马到无线键鼠套装劫持
演讲人:石冰
2 0 1 8
PART 01
键盘Hack
目录
CONTENTS
PART 02
键盘钩子木马
PART 03
无线键鼠
套装劫持
PART 04
安全建议
01
02
03
04
针对键盘的攻击思路分析
PART
01
键盘Hack
键盘——最常见的输入设备之一
物理键盘
虚拟键盘
机械键盘
ATM机键盘
软键盘
手机键盘
计算机键盘分类
计算机键盘
编码键盘:键盘控制电路的功能
完全靠硬件完成
非编码键盘:键盘控制电路的
功能由硬件和软件共同实现
数字电路 对应按键ASCII码
查询程序
传送程序
译码程序
便于重定义
应用广泛
非编码键盘的短板:键位冲... | pdf |
Module 3
Understanding and countering malware’s evasion
and self-defence
https://github.com/hasherezade/malware_training_vol1
Fingerprinting for evasion
Fingerprinting for evasion
• Fingerprinting = gathering information about the environment where the executable
was deployed
• It is used by malware to determine whet... | pdf |
从FireEye的泄露看红队的差距
1. 前言
一大早被领导拉起来分析火眼事件。朋友圈整个安全圈子也是沸腾不已,但随着分析的深入,发现有
点“小题大做”了,没有想要的高尖精工具和技术方案,全是一堆已知攻击技术的红队模拟工具。但站在
一个红队人员的角度,也是收获不少。
2. 红队服务真的有用“假想敌手段”么?
以“假想敌”手段来评估企业安全,这里的手段往往被定义为APT手段。国内当前的红队服务使用的手段是
APT手段么?什么是APT手段?红队是怎么模拟的?
在火眼给的防御策略中,明显看出APT开头的很多样本、工具、后门。火眼的安全人员把各项在APT活动
中的技术方法做成了红队工具,用来评估企业对各种APT技术的防御能力,至少从工具层面... | pdf |
#BHUSA @BlackHatEvents
RollBack
A New Time-Agnostic Replay Attack Against the Automotive
Remote Keyless Entry Systems
Joint work with Jun Wen Wong (NCS Group / DSBJ), Soundarya Ramesh (NUS), Rohini Poolat Parameswarath (NUS), Mun Choon Chan (NUS)
Levente Csikor
NCS Group
Institute for Infocomm Research, A*STAR
... | pdf |
@patrickwardle
DEATH BY 1000 INSTALLERS
...it's all broken :(
WHOIS
“leverages the best combination of humans and technology to discover
security vulnerabilities in our customers’ web apps, mobile apps, IoT
devices and infrastructure endpoints”
security for the
21st century
@patrickwardle
issues; bugs; & exploits!... | pdf |
Hacking Google
AdWords
“Don’t be evil my ass”
By: StankDawg
What is Google AdWords?
• Google Advertising Program
– Pay Per Click
– Customizable
– Used by:
• Gmail
• Google Groups
• Adsense
• etc…
How does it work?
• 20 bucks up front
– $5 activation fee
– $15 Credit towards account
• Pay per click
– Bidding system
• ... | pdf |
KUBERNETES中的异常活动检测
About me
0 1
@9ian1i
朱思宇
blue teamer,⼊侵对抗,业余安全开发,阿⾥云融媒体安全。
DEFCON Blue Team Village,Black Hat Arsenal 演讲者。
WatchAD – AD Security Intrusion Detection System
crawlergo – A powerful browser crawler for web vulnerability scanners
??? - kubernetes abnormal activity detection and blocking system
开源安全项⽬:
安全... | pdf |
DCFluX in:
Moon-Bouncer
DCFluX in:
Moon-Bouncer
Presented By:
Matt Krick, DCFluX – K3MK
Chief Engineer, New West Broadcasting Systems, Inc.
DEFCON 18; Las Vegas, NV
Track 4
Friday July 30, 2010; 17:00 – 17:50
In A.D. 2101
War Was Beginning
Hidden Agenda
1. A Series of Tubes
2. Natural Satellites and Moon Bouncing
3. A... | pdf |
APPLIED INTELLIGENCE:
APPLIED INTELLIGENCE:
Using information that isn't there
Using information that isn't there
Michael Schrenk
Las Vegas, Nevada
@mgschrenk
DEF CON XXIII
DEF CON XXIII
APPLIED INTELLIGENCE:
APPLIED INTELLIGENCE:
Using information that isn't there
Using information that isn't there
APPLIED INTELLIGENC... | pdf |
Demystifying Modern
Windows Rootkits
Bill Demirkapi
Independent Security Researcher
1
Demystifying Modern Windows Rootkits – DEF CON 28
Who Am I?
▪ 19 years old
▪ Sophomore at the Rochester Institute of Technology
▪
Windows Internals
▪ Mostly self-taught (with guidance)
▪ Strong “Game Hacking” background
2
Demystifyin... | pdf |
Spread Spectrum Satcom
Hacking
Attacking the Globalstar Simplex Data Service
Colby Moore
@colbymoore - colby@synack.com
Motivation
• Satellite hacking talks never deliver
• RF world largely neglected by hacker community
• So much legacy tech in critical systems
• Spark interest in satellite security research
What... | pdf |
Writing Fiction to Tell the Truth
By Richard Thieme
Things are often not what they seem. That’s a “fact.” But that fact and others are filtered
into our brains through images and words that often distort the truth—sometimes due to
sloppy thinking but often as a result of policies adopted by “the national security ... | pdf |
nmap去除指纹以及识别假端⼝开放问题
0x00 前⾔
最近在研究⼯具链的组合使⽤,在⽹络端⼝扫描⽅⾯还是打算先集成⼀下nmap这种⽼牌的⼯具再
结合其他⼀些个性化⼯具来解决⼀些端⼝扫描上的需求。
这边先对nmap进⾏⼀些优化⽐如去除明显的指纹降低被识别的⻛险,其次解决⼀下因为防⽕墙策
略导致批量假端⼝开放的问题。
0x01 去除指纹的思路
nmap等各类开源扫描器⼀般来说都会有意⽆意的引⼊⼀些请求特征。⽐如tcp请求的⼀些选项配置
与正常请求不同,⽐如包含特定关键词的payload等。针对nmap我们可以先参考⼀下先知的这篇⽂
章《如何修改nmap, 重新编译,bypass emergingthreats 的公开ids规则》... | pdf |
Computer Science / www.isec.utulsa.edu
How to Hack Your Mini Cooper:
Reverse Engineering CAN Messages
on Passenger Automobiles
Jason Staggs
Computer Science / www.isec.utulsa.edu
Who is this guy?
• Jason Staggs
– Graduate Research Assistant
• Institute for Information Security (iSec)
• Crash Reconstruction R... | pdf |
解析bootloader安全
程君 throber3@gmail.com
自我介绍
• 10年安全研究与开发
• 系统安全,移动与嵌入式安全
• 2008-2010 comodo 主动防御研究与开发
• 2010- 2011 网秦移动安全高级研究员
• 2011- 至今 猎豹移动研发经理,参与手机
毒霸研发
移动安全支付
• 社会工程
短信诈骗 电话诈骗
• 盗号
程序伪冒 钓鱼 键盘记录 网络截获
• 系统漏洞
Root 提权 内存读取
• bootloader级别漏洞
议程
• bootloader 基本介绍
• bootloader 获取与分析
• bootloader 具体流程
• bootloader attack v... | pdf |
@patrickwardle
I got 99 Problems, but
Little Snitch ain’t one!
WHOIS
“leverages the best combination of humans and technology to discover
security vulnerabilities in our customers’ web apps, mobile apps, IoT
devices and infrastructure endpoints”
@patrickwardle
security for the
21st century
career
hobby
making li... | pdf |
蓝凌OA前台SSRF漏洞
漏洞地址: /sys/ui/extend/varkind/custom.jsp
直接贴源码:
<%@page import="com.landray.kmss.util.ResourceUtil"%>
<%@page import="net.sf.json.JSONArray"%>
<%@page import="net.sf.json.JSONObject"%>
<%@ page language="java" pageEncoding="UTF-8"%>
<%@ taglib prefix="c" uri="http://java.sun.com/jsp/jstl/core"%>
<%
JSONObje... | pdf |
Anthony Lai
Security Researcher@VXRL
Taste the power
of Crimeware!
(HIT 2010 Edition)
Special Thanks
• HIT fellows
• Thank you to PK and Birdman
• My wife and Pomeranian family
My Bio
• From Hong Kong
• Worked in penetration
test, code audit and
threat analysis
• Interested in reverse
engineering and
malware analy... | pdf |
CobaltStrike
0x00
C2
@L.N
TeamServerCS
TeamServer
CobaltStrike 4.3 DoS
C2
0x01 +
1.
teamserver 50050
java -XX:ParallelGCThreads=4 -Dcobaltstrike.server_port=55555 -Dcobaltstrike.ser
ver_bindto=0.0.0.0 -Djavax.net.ssl.keyStore=./cobaltstrike.store -Djavax.net.ssl
.keyStorePassword=123456 -server -XX:+Aggressi... | pdf |
VoIP Wars : Return of the SIP
Fatih Özavcı
Information Security Researcher & Consultant
fatih.ozavci at viproy.com
viproy.com/fozavci
2
# whois
● Information Security Consultant @ Viproy / Turkey
● 10+ Years Experience in Penetration Testing
● 800+ Penetration Tests, 40+ Focused on NGN/VoIP
– SIP/NGN/VoIP Systems Pen... | pdf |
Runtime Process Insemination
Shawn “lattera” Webb
SoldierX
https://www.soldierx.com/
Who Am I?
Just another blogger
Professional Security Analyst
Twelve-year C89 programmer
Member of SoldierX, BinRev, and Hack3r
Disclaimers
Opinions/views expressed here are mine, not
my employer’s
Talk is semi-random
Tie... | pdf |
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential.
1
Vulnerability, Malware and DDoS
HITCON 2014
Taipei, Taiwan
石謂龍 Robin Shih, APJ TippingPoint Solution Architect
HP ESP
rshih@hp.com
+886-935784086
© Copyright 2013 Hewlett... | pdf |
GOBY
0x00
awvsgoby
0x01
windowsgobymac
/Applications/Goby.app app
electronapp.asarjs
asar e app.asar builddist
jsbuilddist
exec
execSync
scan.js
render.js
90000js
0x02
xsshttp
goby
xss
ip
phpphpvendor
headerh1phphttpserver
XSSscriptimg
<img src="x" onerror="alert(1);">
tab
XSS
jbXSS
ip
8080
xss
0x03 XSSRCE
XS... | pdf |
BCTF 2018
By Nu1L
BCTF 2018
PWN
easiest
three
hardcore_fmt
SOS
easywasm
Reverse
easypt
Web
checkin
SimpleVN
babySQLiSPA
SEAFARING1
SEAFARING2
Crypto
guess_polynomial
guess_number
BlockChain
EOSGame
Fake3D
MISC
easysandbox
https://bctf.xctf.org.cn/ 1127 14:00 - 1129 02:00
PWN
easiest
Double Freetcache Leak GOT0x40size
... | pdf |
© 2013 NSFOCUS
www.nsfocus.com
nsfocus.com
www.nsfocus.com
nsfocus.com
瀏覽器和本地域
public
於暘
綠盟科技研究院
Who am I
@tombkeeper on twitter
Researcher @NSFOCUS Security Labs
SCADA/ICS security research
Focus on: APT/0-day attacks detection
Vulnerability research
Exploit technology
Some other geek things
流覽器的域
域的意義:數據隔離
... | pdf |
MALWARE MIGRATING TO
GAMING CONSOLES
Embedded devices, an AntiVirus-free safe hideout for Malware
Ahn Ki-Chan - Hanyang University, Undergraduate
Ha Dong-Joo - AhnLab Inc., Security Researcher
About
Introduction
- Embedded systems(gaming consoles, smartphones, etc.)
have enough hardware for malware to survive and
per... | pdf |
FORENSIC ARTIFACTS FROM A
PASS THE HASH (PTH) ATTACK
BY: GERARD LAYGUI
DISCLAIMER: THE VIEWS AND
OPINIONS EXPRESSED IN THIS
PRESENTATION ARE THOSE OF THE
AUTHOR’S AND DOES NOT
NECESSARILY REPRESENT THE
OFFICIAL POLICY OR POSITION OF
THE COMPANY THAT THE AUTHOR
WORKS FOR.
WHAT IS A HASH?
A HASH FUNCTION IS ANY FU... | pdf |
▪
• Relatively Easy to Exploit
• Easily Automated
• Usually not Monitored
▪
▪
▪
▪ Kerberos
▪ Kerberos Delegation
▪
▪ Focus on High Privileges
▪ Malicious JIT Administration
▪
▪
▪
• Ticket based authentication protocol
Domain User
AS
TGS
KDC
LSASS
(KERBEROS)
ST
TGT
App Server
TGT
ST
▪
• Why?
• An application reusing ... | pdf |
Social
Networking
Special
Ops:
Extending
Data
Visualization
Tools
for
Faster
Pwnage
1
Chris Sumner | @TheSuggmeister | www.securityg33k.com
Tuesday, 3 August 2010
Disclaimer
“I am not speaking on behalf of my
employer.
The information and perspectives I
present are personal and do not
represent those of ... | pdf |
DEFCON 18
Electronic Weapons
Presented by: mage2
Warning
Mucking about with the things I am
about to talk to you about can and will
kill you and all puppies, kittens and
laptops around you. So be forewarned.
Also transmitting on frequencies you
are not licensed for can really piss off
the FCC and DHS, depending o... | pdf |
Tell me who you are
and I will tell you
your lock pattern
Marte Løge
23 years, Norway
MSc. Computer Science @NUTS
Developer @Itera
Humans are…
…predictable!
How Many
Combinations does
the Android Lock
Pattern Have?
389,112
Length
#Combina/ons
4
1624
5
7152
6
26,016
7
72,912
8
140,704
9
140,704
Tot... | pdf |
Android 渗透测试入门教程(内部资料)——daxueba.net 版权所有
Android 渗透测试入门教程
(内部资料)
大学霸
www.daxueba.net
Android 渗透测试入门教程(内部资料)——daxueba.net 版权所有
前 言
Kali Linux 是业内最知名的安全渗透测试专用操作系统。它的前身就是业界知名的 BackTrack 操作
系统。BackTrack 在 2013 年停止更新,转为 Kali Linux。Kali Linux 集成了海量渗透测试、网络扫描、
攻击等专用工具。通过系统更新,用户可以快速获取最新的各类工具。所以,Kali Linux 是专业人员的
不二选择。
目... | pdf |
aRgus
d4yj4y
sMURFBOy
the
Luna Correspondence
Protocol
The security of our world as we know it is at stake. The
nature of our project may lend itself to abuse by
malicious users, cooperate espionage, and even
terrorism. More positive applications include freedom of
speech and information under oppressive regimes,... | pdf |
强⽹杯 WriteUp By Nu1L
Author:Nu1L Team
强⽹杯 WriteUp By Nu1L
Pwn
yakagame
easychain1
house of cat
Reverse
find_basic
easyre
deeprev
GameMaster
easyapk
Web
uploadpro
babyweb
easylogin
easyweb
crash
Crypto
Factor
myJWT
Lattice
Misc
谍影重重
强⽹先锋
rcefile
polydiv
devnull
WP-UM
AVR
Pwn
yakagame
llvm
void a000(int a);
void a001(... | pdf |
Introduction
SEH Basics
Anti-RE Techniques
Decrypting the Content
Anti-RE Techniques in DRM Code
Jan Newger
Seminar on Advanced Exploitation Techniques
i4, RWTH Aachen, Germany
DEF CON 16 / 2008
Jan Newger
Anti-RE Techniques in DRM Code
Introduction
SEH Basics
Anti-RE Techniques
Decrypting the Content
Outline
1
Introdu... | pdf |
Introductions
• Benjamin Caudill
• Principal Consultant with Rhino Security Labs
• Pentesting, Social Engineering, Webapp
• ~4 Years in Security, 8+ Years in IT
• Aerospace/Defense
• Incident response, forensics (APT-centric)
• Finance Industry
• Webapp assessments
• Consulting
• Pentesting, Socia... | pdf |
Catching the Golden Snitch
Leveraging Threat Intelligence Platforms
to Defend Against Cyber Attacks
ashley@teamt5.org
• Malware analysis, malicious document detection,
advanced persistence threat research
• Tracking several cyber espionage groups for years
• Tracking new operations, TTP of APT groups
zha... | pdf |
目录
Vulnhub渗透测试练习(一)-------------------------------Breach1.0
Vulnhub渗透测试练习(二) ------------------------------Billu_b0x
Vulnhub渗透测试练习(三) -------------------------------Bulldog1
Vulnhub渗透测试练习(四)---------------------------------Acid
Vulnhub渗透测试练习(五)---------------------------------LazysysAdmin-1
Vulnhub渗透测试练习(六)------------... | pdf |
Translation-Based Steganography
Christian Grothoff
Krista Grothoff
Ludmila Alkhutova
Ryan Stutsman
Mikhail Atallah
CERIAS, Purdue University {christian,krista}@grothoff.org,
{lalkhuto,rstutsma}@purdue.edu,mja@cs.purdue.edu
Abstract. This paper investigates the possibilities of steganographically
embedding information in ... | pdf |
Honey Onions: Exposing
Snooping Tor HSDir Relays
Guevara'Noubir &'Amirali Sanatinia
{noubir,'amirali}@ccs.neu.edu
Northeastern'University
1
Motivations
• Previous'research'studied'the'maliciousness'of'the'relays
• Known'bad'Exit'nodes
• Other'work'looked'at'the'nature'of'hidden'services'content
• No'prior'work'on'the'... | pdf |
August 8, 2008
Inducing Momentary Faults
Within Secure Smartcards /
Microcontrollers
DEFCON – Las Vegas
Christopher Tarnovsky
Flylogic Engineering, LLC.
chris@flylogic.net – http://www.flylogic.net
August 8, 2008
What is a momentary fault?
• Temporary forced change in behavior
• The change is precisely calculated
... | pdf |
Time
^
estomping
time
For our guests from England, please allow me to translate.
^
ng
tompin
timest
Quick background
File
Creation Date
Last Accessed
File 127
08/04/11 10:22:36
08/04/11 10:22:3
File 128
08/04/11 10:22:37
08/04/11 10:22:3
File 129
08/04/11 10:22:37
08/04/11 10:22:3
File 130
08/04/11 10:22:37
08/04/11 10... | pdf |
Sketchtools: Prototyping Physical Interaction
Matt Cottam
Tellart and Rhode Island School of Design
27 Sims Avenue, Providence, RI 02909 USA
matt@tellart.com
Abstract
Industrial designers working in traditional media have the luxury of sketching, playing, and experimenting with their
materials before constructing a fin... | pdf |
CSerV2 Final 版产品介绍
产品名称:CSer C2 适用操作系统平台:Windows
注:新版本增改内容,详见文中红字部分及最后一页的更新记录。
产品简介:
1、 采用 C/T/B 架构,即 Controller(控制端)、TeamServer(服
务器端)、Beacon(客户端) 三端,支持多用户在线,并实
时共享所有信息。
2、 Controller 端发布的任务,支持同步和异步两种方式:同步方
式可以实时的执行任务和查看任务执行结果;异步方式,则可
以实现类似于离线任务的效果,即 Controller 可以一次性下达
多个任务,Beacon 端会依次取出任务执行并将结果返回给
TeamServer。
... | pdf |
Hacking With GnuRadio
Hacking With GnuRadio
How to have fun with wireless transmissions!
David M. N. Bryan
David M. N. Bryan
●Info Security Consultant
Info Security Consultant
●CISSP
CISSP
●HAM
HAM
●Hacker
Hacker
●DEFCON
DEFCON
Hacker Spaces!!!
Hacker Spaces!!!
Thanks to CCCKC – Sweet Hacker Space!
Thanks to CCCKC –... | pdf |
Police Criminal
Procedure
Professor
Steve
Dunker
When Can the Police Make a Stop?
An Officer MUST have either:
Reasonable Suspicion
OR
Probable Cause
Reasonable Suspicion
“Quantum of knowledge sufficient to induce
an ordinarily prudent and cautious man
under similar circumstances to believe
criminal activity is at... | pdf |
|=-----------------------------------------------------------------------=|
|=----------------------=[ Hijacking RDS-TMC Traffic ]=------------------=|
|=----------------------=[ Information signal ]=------------------=|
|=-----------------------------------------------------------------------=|
|=--------------... | pdf |
Seccubus
Repeated vulnerability scans made easy
for:
Public release
date:
18 March 2010
version:
1.0
author:
Frank Breedijk
status:
Public
D
R
A
F
T
for
Public release
title Seccubus
version 1.0
2
date 18 March 2010
PUBLIC
author
Frank Breedijk
Table of contents
1 Introduction
3
1.1 What is a v... | pdf |
HackingDojo.com
HackingDojo.com
Education
Masters Degrees in Computer Security:
▪ Computer Science
▪ Management
Author since 2007
Professional Penetration Testing
Ninja Hacking
Netcat Power Tools
Penetration Testing’s Open Source Toolkit, V2
Certifications
ISSMP, CISSP, SCSECA, SCNA, SCSA, IEM/IAM ... | pdf |
Finding VoIP vulnerabilities while you sleep
Background info on VoIP and previous
research
Introduction to VoIPER
Description of some of its features
Some demos and usage examples
The results of my testing
Q&A
From Ireland
Just finished a Bsc in Computer Systems
About to start a Msc in Computer Science
Intere... | pdf |
Before the
FEDERAL COMMUNICATIONS COMMISSION
Washington, D.C. 20554
In the Matters of
Unlicensed Operation in the TV Broadcast Bands
Additional Spectrum for Unlicensed Devices
Below 900 MHz and in the 3 GHz Band
ET Docket No. 04-186
ET Docket No. 02-380
COMMENTS OF DELL INC., GOOGLE, INC., THE
HEWLETT-PACK... | pdf |
Incident Response
Art, Science and Engineering
Maarten Van Horenbeeck
maarten@first.org
•
@maartenvhb
•
Director of Security Engineering at
•
Director and former Chairman of
•
Incident Responder.
你好
Ithaca, New York
Population 30,513
1988
Morris worm
The times, they are a-changing.
Bob Dylan, 1964
FIRST... | pdf |
Every Breath You Take
::data gathering, persistence, and what it all means::
jim.oleary|dc0f
WARNING: STATIC CONTENT
One of the overriding themes of this talk is that once a
piece of data has been captured, it’s forever retrievable. In
the spirit of that principle, these made-for-CD slides have
been watered down a ... | pdf |
Cybercrime: Challenges
for Law Enforcement
Susan Brenner
NCR
Distinguished
Professor of
Law &
Technology
University of
Dayton
Real-world & cybercrime
Current approaches
evolved to deal with
real-world crime
Cybercrime occurs in
a different context
and therefore
presents different
issues
Example #1: Theft
R... | pdf |
Ladar Levison
Stephen Watt
What is Dark Mail?
What is Dark Mail?
What is DIME?
Did you write down the formula?
Dark Internet Mail Environment
DIME Illustrated
User
Client
DARPA NET
DMAP
DMTP
Resolver
Transport
Signet Service
Global Ledger
(Optional)
Dark
Messages
Server
]
]
Signets
Signets
DNS
Why Do We Need It?
• Gui... | pdf |
Don’t Whisper My Chips
ColinOFlynn.com – DEFCON 2015.
1
Colin O’Flynn – Dalhousie University – Halifax, NS. Canada.
Objective: Learn about all sorts of ‘physical’ layer attacks.
Critical Difference: Everything I’m showing you is open
source and freely available. Most of the hardware is
commercially available (it’s d... | pdf |
微擎 CMS:从 SQL 到 RCE
0x01 写在前⾯
微擎 CMS 在 2.0 版本的时候悄咪咪修复了⼀处 SQL 注⼊漏洞:
api.php 536 ⾏
该处的注⼊漏洞⽹上没有出现过分析⽂章,因此本⽂就来分析⼀下该处 SQL 注⼊的利⽤。
0x02 影响版本
经过测试发现,官⽹在 GitLee 上,在 v1.5.2 存在此漏洞,在 2.0 版本修复了该漏洞,因此
⽬测⾄少影响到 v1.5.2 版本
0x03 SQL 注⼊漏洞分析
这个注⼊漏洞分析还是⽐较简单的,直接定位到存在漏洞的代码处 api.php 530 ⾏开始、
564 ⾏开始的两个函数:
private function analyzeSubscribe(&$... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.