text
stringlengths
100
9.93M
category
stringclasses
11 values
A Journey into Hexagon Dissecting Qualcomm Basebands Seamus Burke Agenda ● About me ● Why Basebands? ● History ● Modern SoC Architecture ● Hexagon ● Cellular Stack architecture ● Analysis About Me ● Student, still finishing up my undergrad ● Interested in kernel internals, exploit development, and embedded systems ● P...
pdf
APK 流量转发保姆级教程 作者:lings- 时间:2021/10/02 目 录 绪 论 ............................................................................................................... 1 第 1 章 Burpsuite 证书安装 ........................................................................... 2 1.1 导出 burpsuite 证书 .....................................
pdf
M A N N I N G Dominik Picheta www.allitebooks.com Nim Reference Common constructs const x = 5 Compile-time constant let y = “Hello” Immutable binding var z = [1, 2, 3] Mutable variable proc name(param: int): ReturnType = body method name(param: float): ReturnType = body iterator items(list: seq[int]): int...
pdf
MEATPISTOL A Modular Malware Implant Framework Presened by: @ceyxies and @fzzynop Biographical Summary: ? HERE TO TALK ABOUT— A GUN MADE OF MEAT ...THAT SHOOTS MALWARE BULLETS? This is a tool for... RED TEAM You mean "Pentesting?" "Fundamentally a framework for creating, managing, and interacting with stealth implant...
pdf
Are all BSDs created equally? A survey of BSD kernel vulnerabili9es.; ! ! ! Ilja!van!Sprundel!<ivansprundel@ioac4ve.com>! Who Am I; •  Ilja!van!Sprundel!! •  ivansprundel@ioac4ve.com! •  Director!of!Penetra4on!Tes4ng!at!IOAc4ve!! •  Pen!test! •  Code!review! •  Break!stuff!for!fun!and!profit!J!! Outline/Agenda ; •  Intr...
pdf
1 2 Public safety may be an obscure, public-sector part of the telecom/tech crowd, but “the crowd” is actually quite sophisticated. We consulted with members of the standards community before attempting these attacks to determine what attack surfaces they deemed most vulnerable. After completing our in-lab research, ...
pdf
Free Your Mind The NMRC Info/Warez Panel Our Agenda • Intro – hellNbak • Hack FAQ – jrandom, Weasel • Ncrypt/Ncovert – Simple Nomad • Political Rant – Sioda an Cailleach • Win32 Buffer Overflow Eggs – Cyberiad • nmrcOS – Inertia • Panel Q&A • Closing – Simple Nomad Special Note No photography of the crowd No questions...
pdf
因为公司经常会有批量⾃动化测试的需求,所以之前⽤Python写了⼀套类似于群控的⼿机 调度系统。 ⾸先想到的第⼀个问题是如何使⽤ADB控制⼿机; ⼀开始我写了⼀个 pyadbhelper 公共类,内容是使⽤ os.system 来调⽤ adb ,并且使 ⽤ -s 参数来选择操作的设备。 但实际上这个⽅案很不稳定,因为 adb 的代码⾥既包含 server 端⼜包含 client 端,有时候 莫名其妙的就会把 server 端重启了(不同的环境有很多原因)。 因为是多线程操作,所以⼀ 旦重启那么其他线程有可能正在进⾏ push pull 等操作就直接被中断导致任务失败。 换⼀种思路,就是⽤ python 实现⼀个 cl...
pdf
Face Swapping Video Detection with CNN Wang Yang, Junfeng Xiong, Liu Yan, Hao Xin, Wei Tao Baidu X-Lab Face Swapping Video Detection with CNN •  Deepfakes video •  A simple and effective CNN •  Face recognition based method Deepfakes Video When Face Recognition Systems Meet Deepfakes Vulnerable face comp...
pdf
Sarah Edwards | @iamevltwin | oompa@csh.rit.edu | mac4n6.com iCloud Basics Storage and Acquisition of iCloud Data Synced Preferences Application Data What is “Everything”? • Documents • Email • Contacts • Preference Configurations • Photos • Calendar • Notes • Reminders • and more! !  Email: Apple ID !...
pdf
Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language 2 @jfslowik 3 Disclaimer ● None of this research was paid for ● We research in good faith ● Nothing today represents our past/present/future employers ● None of us are under gag orders* ● All images are CC0 or pub...
pdf
ThruGlassXfer ThruGlassXfer Remote Access, the APT Remote Access, the APT Credit: Awesome graphics from WallpapersWide.com August 2015 Remote Access, the APT // Ian Latter 2 Key messages for this session Key messages for this session • Current security architecture, flawed (now) Current security architecture, flawed ...
pdf
1 The Middler Reloaded It’s Not Just for the Web Anymore Def Con 17 Copyright 2009 Jay Beale and Justin Searle Jay Beale and Justin Searle InGuardians and The Middler Project 2 Copyright 2008 and 2009 Jay Beale and Justin Searle The Middler – Application-Layer Rootkit •  Is a next-generation man-in-the-mid...
pdf
The Bieber Project Ad Tech and Fraud 101 Mark Ryan Talabis, zvelo zvelo proprietary and confidential Introduction ! Chief Security Scientist, zvelo ▫ Ad Tech Fraud Research ! Formerly, Cloud Email Threat Protection, Fireeye !  Alumni Member, Honeynet Project "  Honeypots/Honeynets ! Author, Elsevier-Syngress...
pdf
1 Julian Grizzard DEFCON 13 Surgical Recovery from Kernel-Level Rootkit Installations Speaker: Julian Grizzard July 2005 DEFCON THIRTEEN 2 Julian Grizzard DEFCON 13 Latest Slides and Tools PLEASE DOWNLOAD THE LATEST SLIDES AND TOOLS [ Latest slides available ] http://www.ece.gatech.edu/research/labs/nsa/presentations/d...
pdf
Analyzing and Counter-Attacking Attacker-Implanted Devices Case Study: Pwn Plug Robert Wesley McGrew wesley@mcgrewsecurity.com Introduction In order to bypass restrictions on inbound network traffic, an attacker might find it desirable to “implant” a hardware device in the target network that would allow tha...
pdf
RFID Hacking Live Free or RFID Hard 03 Aug 2013 – DEF CON 21 (2013) – Las Vegas, NV Presented by: Francis Brown Bishop Fox www.bishopfox.com Agenda 2 • Quick Overview • RFID badge basics • Hacking Tools • Primary existing RFID hacking tools • Badge stealing, replaying, and cloning • Attacking badge read...
pdf
1 IceRiver⾼版本Q.V简单说明 前⾔ ⼀些功能使⽤介绍 Self Inject模式 由于CS 4.6版本之后,官⽅对ts和client端做了代码分离,ts端⼜由java to native技术做了编译,因此后 续版本对ts端的修改,将不再那么容易,所以⽬前所做的⼆开主要集中在client端。IceRiver今后的计划 是:保持CS的稳定性、规避内存和⾏为查杀、添加实⽤性插件、结合其他开源项⽬更⾼效的应⽤于实 战。 这个插件是⾃从4.4版本的IceRiver就已经存在的,在4.7版本实现⽅式有了变动,但对于⽤户侧使⽤⽅法 不变。默认情况下,可以看到beacon的inject配置显示为"default". 这个时候执⾏⼀些后...
pdf
CVE-2022-22733 Apache ShardingSphere ElasticJob-UI RCE author:Y4er 分析 看diff https://github.com/apache/shardingsphere-elasticjob- ui/commit/f3afe51221cd2382e59afc4b9544c6c8a4448a99 getToken函数会将this对象转json返回,而this对象中存储了root的密码 分析调用关系 handleLogin函数处理登录时会进行判断,如果 authenticationResult.isSuccess() 登录成功会返 回getToken() 而handleLo...
pdf
TTBSP Jon R. Kibler Mike Cooper textbook.security@gmail.com Hack the Textbook: The Textbook Security Project Hack the Textbook TTBSP Introduction • The Problem • Fixing It • The Project • How You Can Help! • Demo • Q&A Hack the Textbook TTBSP The Problem • Most security problems are caused by bad code • Bad code is cau...
pdf
Scott Wolchok “Spying the World from Your Laptop” @ LEET Crawl Pirate Bay, scrape trackers Tracked downloads for millions of IPs TPB added magnet links last year No more .torrent files; get data from DHT “no central tracker that can be down” “don’t need to rely on a single server” http://thepiratebay.org/blog/175 DHT c...
pdf
Hacking travel routers like it’s 1999 Mikhail Sosonkin Director of R&D Always a Student @hexlogic mikhail@synack.com http://debugtrap.com Why do this? Breaking in. Show me the bugs! The End. We all just hack for fun… right? I travel a lot I work in cafes I do security things Why do this? The unboxing We want bugs! The...
pdf
Making Games Cerebral Ne0nRa1n Julian Spillane, CEO, Frozen North Productions, Inc. Breakdown Who are these brain people? Brain 101 Video Game Myths History of  Game Peripherals Industry Current Trends (The Good and The Bad) Our Proposal... Demonstration Who are these brain people? Ne0nRa1n Under‐Educated Und...
pdf
Sneak into buildings with KNXnet/IP using BOF whoami Claire Vacherot Senior pentester @ Orange Cyberdefense France Random info: ►Writing tools (and then discover they already exist) ►Part of GreHack’s organization team ►Penetration testing on "unusual" environments 2 PROGRAMMING SECURE PROGRAMMING … ON EMBEDDED/ICS ...
pdf
Is This Your Pipe? Hijacking the Build Pipeline $ whoami @rgbkrk OSS, Builds and Testing Protecting pipelines • Need Want benefits of continuous delivery! • Open source pathways to real, running infrastructure! • Community services with > 200,000 users Build Pipeline Components • Source Control • Continuous Integratio...
pdf
页眉 忆一次渗透实战 从打点到域控的全过程 杭州安恒信息技术股份有限公司 安服战略支援部-星火实验室-李兵 2019 年 9 月 19 日 目录 1. 信息收集阶段 ................................................................................................................................................ 1 2. 外部打点阶段 ...........................................................................
pdf
Windows Process Injection in 2019 Amit Klein, Itzik Kotler Safebreach Labs Introduction Process injection in Windows appears to be a well-researched topic, with many techniques now known and implemented to inject from one process to the other. Process injection is used by malware to gain more stealth (e.g. run ma...
pdf
Next Generation Collaborative Reversing with Ida Pro and CollabREate Christopher Eagle and Timothy Vidas Department of Computer Science, Naval Postgraduate School, Monterey, CA {cseagle,tmvidas}@nps.edu Abstract A major drawback with the use of most reverse engineering tools is that they were not designed with...
pdf
Respond Before Incident Building proactive APT defense capabilities (Public Version) • Introduction • Popular cyber attack countermeasures • Evolution of cyber incident handling • Traditional incident handling challenges • Ideal CSIRT Resource Allocation • Story of a long-term NPO victim • Original Compromised Situatio...
pdf
Apache Solr Injection Michael Stepankin @artsploit DEF CON 27 @whoami – Michael Stepankin • Security Researcher @ Veracode • Web app breaker • Works on making Dynamic and Static Code Analysis smarter • Penetration tester in the past • Never reported SSL ciphers Ones upon a time on bug bounty… What is Solr? • Solr is ...
pdf
Flash内存管理与漏洞利用 Hearmen 北京大学软件安全研究小组 目录 AVM2 虚拟机简介 CVE-2015-0313 CVE-2015-3043 CVE-2015-5119 攻击演示 uCVE-2015-3043 AVM2 虚拟机简介 uAVM2 是 目 前 使 用 的 flash player 的 核 心 , 所 有 的 ActionScript 3 代码都由AVM2来执行 u采用Jit与解释器混合执行的方式,大幅提升flash的运 行效率 ActionScript 3执行流程 u《avm2overview》 ActionScript 3 bytecode Constant pool 堆栈初始化 常量池初始化 J...
pdf
Greater Than One Defeating “strong” authentication in web applications - Brendan O’Connor Introduction Background Information Control Types Device Fingerprinting One Time Passwords Knowledge Base Archives Conclusions Introduction Internet Banking Bill Pay Car Loans and Mortgages Retirement Plans / 401K Stoc...
pdf
DEFCON 2007 David Hulton <david@toorcon.org> Chairman, ToorCon Security R&D, Pico Computing, Inc. Researcher, The OpenCiphers Project Faster PwninG Assured: New Adventures with FPGAs DEFCON 2007 2007 © The OpenCiphers Project Overview  FPGAs – Quick Intro  New Cracking Tools! (Since ShmooCon)  BTCrack – Bluetooth...
pdf
1 第NS届全国⼤学⽣知识竞赛 初赛 online_crt writeup 项⽬分析 解题 c_rehash 利⽤条件 go server url注⼊http头 go的RawPath特性 构造利⽤链 第⼀步 第⼆步 使⽤baseTQ 编码 使⽤截断环境变量 使⽤现有环境变量 第三步 总结 author:⽩帽酱 题⽬给了后端源码 ⼀道题利⽤了前不久出现的⼀个鸡肋洞 题⽬还是⽐较有意思的 项⽬后端是pyhton + go pyhton的服务直接暴露给⽤户 pyhton服务 ⼀共有4个路由 /getcrt ⽣成⼀个x509证书 /createlink 调⽤ c_rehash 创建证书链接 项⽬分析 2 /proxy 通过...
pdf
8/1/13 Cui,  Costello,  Kataria,  Stolfo,  Blackhat  USA 2013 8/1/13 Cui,  Costello,  Kataria,  Stolfo,  Blackhat  USA 2013 Stepping p3wns Adventures in full-spectrum Embedded Exploitation And Defense 8/1/13 Cui,  Costello,  Kataria,  Stolfo,  Blackhat  USA 2013 Our Typical Tal...
pdf
攻防演练中的攻击战术演进 长亭科技 崔勤 变化与机会 甲 方 乙 方 监管 实 战 “实战”标准下的安全效果更真实 1. 结果导向,不限制手法。 2. 攻防两端深度参与,不再仅仅是一份检测报告,体验感更足。 3. 低危漏洞?安全意识不重要? 实战标准的特点 乙 方 实 战 攻防演练 攻防演练是“实战”视角下最佳验证手段之 一 攻防演练(红队) 1. 能力象限 2. 框架的演进 3. 决策及思考,攻击战术 攻防演练(框架演进) 以为人为核心到组织矩阵 攻防演练(框架的演进) • 范围 • 速度 • 内容 • 影响范围 • 利用程度 • 自动化程度 • 隐蔽性 • 对抗能力 攻防演练(决策及思考) 初始信息收集 初始入侵 站稳脚跟 提升...
pdf
Hacking  Embedded  Devices (Doing  Bad  Things  to  Good Hardware) About  your  hosts… •  Phorkus  has  been  breaking  things  since  he was  5  years  old. – SomeDmes  with  a  hammer,  someDmes  a  soldering iron. •  EvilRob  has  been  causing  mayhem ...
pdf
Microsoft Passport Yahoo MMORPG MMORPG MMORPG MMORPG 0 5000 10000 15000 20000 25000 30000 35000 40000 02/07 02/10 02/13 02/16 02/19 02/22 02/25 02/28 03/03 03/06 03/09 03/12 03/15 03/18 03/21 03/24 03/27 03/30 04/02 04/05 04/08 04/11 04/14 04/17 04/20 04/23 04/26 04/29 05/02 0 1000 2000 3000 4000 5000 6000 7000 8000 90...
pdf
Steganography in Commonly Used HF Radio Protocols @pdogg77 @TheDukeZip pdogg ● Paul / pdogg / @pdogg77 ● Day Job: Security Researcher at Confer Technologies Inc. ● Hobby: Licensed as an amateur radio operator in 1986, ARRL VE ● This is my second trip to DEF CON thedukezip ● Brent / thedukezip / @thedukezip ...
pdf
Abusing Certificate Transparency Or how to hack Web Applications before Installation Hanno Böck https://hboeck.de/ 1 HTTPS 2 Certificate Authorities 3 Can we trust Certificate Authorities? 4 No 5 CAs are bad, we need to get rid of them Popular Infosec opinion 6 Reality Nobody has a feasible plan how to replace CAs 7 ...
pdf
The$env:PATH lessTraveledisFull ofEasyPrivilegeEscalationVulns Bio SecurityResearcher/Tester(HarrisCorp) FormerArmyRedTeamOperator OneofthedevelopersofPowerSploit Twitter:@obscuresec Blog:www.obscuresec.com Sucksalotlessnow… Gettingevenbetter… OneGet ChocolateyNuget PSGet Alloftheseutilitiesaregreatfor: Simpl...
pdf
UNORTHODOX LATERAL MOVEMENT: STEPPING AWAY FROM STANDARD TRADECRAFT > ldapsearch (displayname=Riccardo Ancarani) sAMAccountname: Rancarani displayname: Riccardo Ancarani memberOf: @APTortellini, WithSecure/F-Secure security certifications: who cares really ▪ Lateral Movement is the act of using authentication mat...
pdf
LIFE OF CODER QUESTION 1 int a = 5, b = 7, c; c = a+++b; (A) A=6, C=10 (B) B=7, C=10 (C) A=6, C=12 QUESTION 2 char str[]="startrek"; char *p=str; int n=10; A=sizeof(str); B=sizeof(p); C=sizeof(n); (A) A=8, C= 4 (B) B=4, C=1 (C) A=9, C=4 QUESTION 3 unsigned long *i; unsigned long *j; unsigned long s...
pdf
RICHARD THIEME THIEMEWORKS WWW.THIEMEWORKS.COM rthieme@thiemeworks.com neuralcowboy@gmail.com PO Box 170737 Milwaukee WI 53217-8061 THE ONLY WAY TO TELL THE TRUTH IS THROUGH FICTION THE DYNAMICS OF LIFE IN THE NATIONAL SECURITY STATE " It's no wonder how complicated things get, what with one thing leading to ...
pdf
TABBY: Java Code Review like a pro TABBY: Java Code Review like a pro 王柏柱(wh1t3p1g) CONTENTS 目录 1 2 3 Background Find Java Web Vulnerabilities like a pro Find Java Gadget like a pro 4 Find Java RPC Framework Vulnerabilities like a pro Background 01 依靠专家经验人工审计 辅以正则匹配工具 标志性工具: Seay代码审计工具[1] 过程内分析 AST流分析/token流分析/ 简单数据流分析...
pdf
Let's Dance in the Cache: Orange Tsai Destabilizing Hash Table on Microsoft IIS USA 2022 For a Protected Area Th1s-1s-@-Sup3r-Str0ng-P@33w0rD! DI1D8XF4 T9433W0N R04K85R8 OR7SHSQM 4IDF7LAU T9ILKRJO DIO376UC 29WM5WPU XRXNHYS8 I0XVSRY7 4J4F29DY BA55FF5B VJ5QUDCJ XS9B66QE I1BICTG1 DJH24HH4 OSNADCSM FSNPV263 91T4TLRP 91UKBH...
pdf
不不可能完成的任务 从⽤用户空间窃取内核数据 Yueqiang Cheng, Zhaofeng Chen, Yulong Zhang, Yu Ding, Tao Wei Baidu Security 关于演讲者 Dr. Tao Wei Dr.$Yueqiang$Cheng$ Mr. Zhaofeng Chen Mr. Yulong Zhang Dr. Yu Ding 我们的安全项⽬目: 怎样从⽤用户空间读取未授权的内核数据? $$ 强有⼒力力的内核-⽤用户隔离 (KUI) MMU-⻚页表(Page Table)的加持 这为什什么很难? 假设内核⽆无缺陷: ⽆无内核缺陷来任意...
pdf
@unapibageek - @ssantosv Tracking Malware Developers by Android “AAPT” Timezone Disclosure Bug ROCK APPROUND THE CLOCK! @unapibageek - @ssantosv Sheila Ayelen Berta Sergio De Los Santos Security Researcher ElevenPaths (Telefonica Digital cyber security unit) Head of Innovation and Lab ElevenPaths (Telefonica Digital...
pdf
Gaming - The Next Overlooked Security Hole Ferdinand Schober Overview  Overview  Historical development  Know thy gamer  Know thy developer  Know thy engine  Profit?  Virtual Economies  Current malware  Games 2.0 & Privacy  Exercise in Exploits  The little nude patch that could  View my post and get owned ...
pdf
10 Things That Are Pissing Me Off RenderMan, Church of Wifi Caution: The first 3 rows may get wet 10 Things That Are Pissing Me Off ● There's a lot more, but we're sticking to Hacker related ones ● This is cheaper than therapy ● Got so pissed off I'm doing something about some of them, others I need help ● Save discu...
pdf
Hacking 911: Adventures in Disruption, Destruction, and Death quaddi, r3plicant & Peter Hefley August 2014 Jeff Tully Christian Dameff Peter Hefley Physician, MD Emergency Medicine Open CTF champion sudoers- Defcon 16 Speaker, Defcon 20 Physician, MD Pediatrics Wrote a program for his TI-83 graphing...
pdf
Printing is still the Stairway to Heaven A Decade After Stuxnet’s Printer Vulnerability LABS Peleg Hadar Senior Security Researcher & Tomer Bar Research Team Lead | Peleg Hadar Senior Security Researcher ■ 7+ years in InfoSec ■ Senior Security Researcher @ SafeBreach Labs ■ Main focus in Windows internals and ...
pdf
From ROOT to SPECIAL Hacking IBM Mainframes Soldier of Fortran @mainframed767 DISCLAIMER! All research was done under personal time. I am not here in the name of, or on behalf of, my employer. Therefore, any views expressed in this talk are my own and not those of my employer. This talk discusses work ...
pdf
K &T :: IGS :: MAF K &T :: IGS :: MAF 11 VLANs Layer 2 Attacks: VLANs Layer 2 Attacks: Their Relevance Their Relevance and and Their Kryptonite Their Kryptonite VLAN Layer 2 Attacks K &T :: IGS :: MAF K &T :: IGS :: MAF 22  Security is only as strong as the weakest link Security is only as strong as the weakest li...
pdf
#BHUSA @BlackHatEvents RCE-as-a-Service: Lessons Learned from 5 Years of Real-World CI/CD Pipeline Compromise Iain Smart & Viktor Gazdag #BHUSA @BlackHatEvents Information Classification: General WhoAreWe Iain Smart (@smarticu5) NCC Group Containerisation Practice Lead 6 years Container & Cloud Pentesting Viktor Gazda...
pdf
時間 題⺫⽬目 主講者 13:00 - 13:30 記者會 – VulReport 發表會 Sylphid Su 13:30 - 14:00 聽眾報到 14:00 - 14:30 開場及 2014 年度回顧 / HITCON 2015 TT 14:30 -  15:00 2014 年台灣企業安全常⾒見⾵風險剖析 Bowen Hsu 15:00 - 15:20 下午茶 15:20 - 15:50 駭客如何弄垮企業? 從索尼影業與南韓核電廠事件說起 GasGas / Fyodor 15:50 - 16:40 Operation GG 台灣最...
pdf
​ asar e app.asar dst 0x00 0x01 0x02 <body> <img src='https://127.0.0.1:54530/a=%3A%22%5C%22%20-a%3Bopen%20%2FSystem%2FApplications%2FCalendar.app%3B%5C%22%22%2C %22withShortcut%22%3A1%7D'></img> </body> ​ 0x03 awvs ​ 0x03
pdf
Your boss is a douchebag... How about you? effffn agenda [ Intro [ hacker jobs [ Job status [ Why (some of us) hate it [ Our own mistakes [ Why do we make mistakes? [ Turn the tables [ conclusion DEFCON 18 What matters... [ What you do... [ How much you make... [ Company you work for... [ Your boss... conclusion thank...
pdf
My journey on SMBGhost Angelboy angelboy@chroot.org @scwuaptx Whoami • Angelboy • Researcher at DEVCORE • CTF Player • HITCON / 217 • Chroot • Co-founder of pwnable.tw • Speaker • HITB GSEC 2018/AVTokyo 2018/VXCON Outline • Introduction • Vulnerability - CVE-2020-0796 • Exploitation of SMBGhost • From crash to arbitra...
pdf
Attacking Biometric Access Control Systems By: Zamboni Outline Overview of biometrics General methodology used to attack biometric systems Example attacks against physical access control systems Defenses Question Biometrics Unique and (relatively) permanent physical or behavioral characteristic that can be u...
pdf
记⼀次某电梯Web系统⿊盒到PHP⽩盒挖掘RCE的过程 概述: 闲来⽆事,感觉IOT的洞挺好挖,记⼀次针对某电梯的Web系统挖掘到的⼏个任意 ⽂件上传跟命令注⼊的过程,算是对PHP代码审计学习的⼀个记录。) 前置知识: PHP执⾏命令函数:) 1、shell_exec()) string)shell_exec)()string)$cmd)))执⾏命令,并将结果作为字符串返回。) 返回值:如果执⾏失败,则返回NULL。执⾏成功则返回执⾏结果字符串。) 注意:This)function)is)disabled)when)PHP)is)running)in)safe)mode) 2、passthru()) void)passthru...
pdf
DEFCON16  Virtually Hacking 08 August 2008 2 Why VMware? • Virtualisation has taken off and is here to stay • Many of our clients are using virtualisation technologies • Virtualisation services are being sold • VMware is the dominant product* • Need to be familiar with a product in order to hack it *source ­ silicon.co...
pdf
目录 前言 2 1-linux提权描述 4 2-基本Linux权限提升前的信息收集 6 3-linux提权—自动信息收集 18 4-linux提权-内核漏洞提权 19 5-1-linux-历史漏洞提权 24 5-linux提权-利用以root权限运行的服务 25 6-Linux提权-NFS权限弱 27 7-linux提权-Suid和Guid配置错误 32 8-linux提权—滥用SUDO 41 9-linux提权-利用“.”路径配置错误 45 10-linux提权—利用定时任务(Cron jobs) 47 11-linux提权-通配符注入 54 渗透测试 红队攻防 免杀 权限维持 等等技术  及时分享最新漏洞复现以及EXP 国内外最...
pdf
How to do it Wrong: Smartphone Antivirus and Security Applications Under Fire Stephan Huber, Siegfried Rasthofer, Steven Arzt, Michael Tröger, Andreas Wittmann, Philipp Roskosch, Daniel Magin 1 2 Who are we Siegfried Stephan • Mobile Security Researcher at Fraunhofer SIT • Enjoys teaching students in Android Hac...
pdf
Feei <feei@feei.cn> Github敏敏感信息泄露露监控 ⽌止介 <feei@feei.cn> Feei <feei@feei.cn> 吴⽌止介(Feei) 介绍 ‣ ⽩白帽⼦子 ‣ 美丽联合集团 安全项⽬目总监 ‣ 专注漏漏洞洞⾃自动化发现与防御 Feei <feei@feei.cn> 议程 ‣ 背景 ‣ 爬取⽅方案 ‣ 特征思路路 ‣ 规则设计 ‣ 报告 ‣ 误报 ‣ 未来 Feei <feei@feei.cn> 背景 以技术⼿手段杜绝由于员⼯工意识问题导致的Github敏敏感信息泄露露 Feei <feei@feei.cn> 爬取⽅方案 爬取 Proxy+Page vs Token+API Fe...
pdf
DGAs and Threat Intelligence John Bambenek – Fidelis Cybersecurity Threat Research Team HITCON 2015 Intro  President and Chief Forensic Examiner for Bambenek Consulting  Adjunct Faculty in CS Department at the University of Illinois at Urbana-Champaign  Producer of open-source intel feeds  Work with compa...
pdf
The Day Of The Update Once upon an Update … Itzik Kotler Tomer Bitton Update? I already donated • Ability to delivery bug fixes or new features to existing customers of applications • Natural inhibitors: – Punch Cards – BBS/Modem – Floppies/CD’s – Internet What’s The Big Update? • Updates are usually a background task...
pdf
KCon KCon Webkit Vulnerability form 0 to 1 Lockmanxxx •Work for 兴华永恒 •软件漏洞利用研究 •软件漏洞成因分析 •偶尔漏洞挖掘 @weibo:Lockmanxxx @twitter:lockmanxxx who 高效的挖掘?!? From 0 to 1 目录 CONTENTS PART 01 浏览器漏洞挖掘难点 PART 02 Why WebKit? PART 03 挖掘思路 PART 04 挑战 PART 05 漏洞挖掘平台 PART 06 展示 PART 07 To Do Soon 01 浏览器漏洞挖掘难点 https://www.flexerasoftware....
pdf
Hacking in the Name of Science Tadayoshi (Yoshi) Kohno (University of Washington) Jon Callas (PGP Corporation) Alexei Czeskis (University of Washington) Daniel Halperin (University of Washington) Karl Koscher (University of Washington) Michael Piatek (University of Washington) DEFCON 16 - August 8, 2008 Who We Are ✦ R...
pdf
宝宝树安全总监:王利 宝宝树 中国规模最大孕婴社区,公司员工约1000人 每天产生文字图片音视频百万级 用户覆盖全国大部分年轻一代准妈妈和孕婴妈妈 分享人:王利 多年甲乙双方打杂经验 曾任职于宝宝树、爱奇艺等互联网公司 兴趣爱好:产品经理、白帽子、羊毛党 公司介绍 Topics • 0x01 安全体系 (社区+电商) • 0x02 风控边控联动 (反爬虫+反扫描+防火墙自动化) • 0x03 风控系统 (引擎+指纹+数据) • 0x04 开源应用 (扫描平台+ HIDS) • 0x05 数据安全 (加密+脱敏+DLP) 宝宝树社区&电商常见攻击 中等规模社区电商互联网安全体系(绿色优先完成) 半 年 零 预 算 异 地 多 IDC ...
pdf
Medical Identity Theft updated slides available at www.pskl.us Eric Smith Bucknell University Dr. Shana Dardan Susquehanna University …Because of the difficulty in detection, the potential exists for this crime to be happening substantially more frequently than anyone has documented to date... World Privacy Forum, Spr...
pdf
Advanced Linux Programming 高级 Linux 程序设计 卷 I 网址 http://www.AdvancedLinuxProgramming.com 译者 完美废人 网址 http://blog.csdn.net/Wolf0403 作者 Mark Mitchell Jeffrey Oldham Alex Samuel 高级 Linux 程序设计·卷一·Linux 平台上的高级 UNIX 编程 完美废人 译 谨以此书献给 四月 你是我生命中的奇迹 www.AdvancedLinuxProgramming.com 2 高级 Linux 程序设计·卷一·Linux 平台上的高级 U...
pdf
Joe Grand aka The Projects of... DEFCON 17 Zoz aka ๏ Engineering entertainment program on Discovery Channel ๏ Four guys building prototypes of crazy things ๏ Try to follow the "true" design process ๏ Premiered October 2008 (US), ~February 2009 (World) ๏ Thirteen episodes ๏ ~1 million households/episode ๏ www.discove...
pdf
Mach%O'Malware'Analysis:'Combatting'Mac'OSX/iOS'Malware'with'Data'Visualization! ! ' ' ' ' Defcon'2013' Mach%O'Malware'Analysis:' Combatting*Mac*OSX/iOS*Malware*with*Data*Visualization* ' Remy'Baumgarten' ANRC'LLC.' Mach%O'Malware'Analysis:'Combatting'Mac'OSX/iOS'Malware'with'Data'Visualization! ! Mach%O'Malware'Analys...
pdf
Export Controls on Intrusion Software Collin Anderson (@CDA) Tom Cross (@_decius_) Do Export Controls on Intrusion Software Threaten Security Research? Truth is… we don’t know. (We’re not lawyers and this isn’t legal advice.) Truth is… the Government doesn’t know. (At least they are asking questions.) Truth is… ...
pdf
De1CTF 2019 WP Author:Nu1L Team Team Page:https://nu1l-ctf.com De1CTF 2019 WP Web Giftbox cloudmusic_rev 9calc ssrf ShellShellShell Re Evil_boost Signal vm Re_Sign Cplusplus Pwn A+B Judge Weapon Mimic_note Crypto xorz babyrsa Misc Upgrade Mine Sweeping Web Giftbox import pyotp import requests import string url = "http:...
pdf
[SensePost – 2009] Click to edit Master subtitle style 8/21/09 Clobbering the Cloud! { haroon | marco | nick } @sensepost.com [SensePost – 2009] 8/21/09 about: us {Nicholas Arvanitis | Marco Slaviero | Haroon Meer} [SensePost – 2009] 8/21/09 Why this talk ? [SensePost – 2009] 8/21/09 This is not the time to split ...
pdf
Introduction to Hardware Hacking Scott Fullam Why Hardware Hacking? • Hardware Hacking does not seem to get near the publicity as computer hacking • I’d like to change reputation of hacking, hardware in particular Hardware Hack: A Definition • A (sometimes) clever modification or fix made to a piece of equipment th...
pdf
From Dvr to See Exploit of IoT Device 0K5y Nobody@360GearTeam 1559113201 Date Larryxi Nobody@360GearTeam What’s time 0x00 Content 0x01 Preface 0x02 Vulnerability Mining 0x03 Debugging Environment 0x04 Exploiting 0x05 Summary 0x01 Preface Welcome and Thanks IoT Four Modules IoT Current Situation and Problems IoT Archit...
pdf
DUST Your Rss Feed belongs to you! Chema Alonso chema@informatica64.com Juan Garrido «Silverhack» jgarrido@informatica64.com Once upon a time…. … and we believed it • Internet is a space of freedom • All opinions are allowed • Freedon for news • Nobody controls Internet • Neutrality • Anonimaty • No Rul...
pdf
供应链安全分享 Greta Fan 供应链攻击案例 Solarwinds 特点 应对 伪装主机名 主动适配目标地区IP 横向移动 临时文件替换 1. 登录IP检查 2. 登录活动检查 3. 任务和文件监控 4. 高权限账户活动监控 高隐蔽性 范围极 广 针对性强 组织严密 持续性长 1. 资产和软件生命周期 安全管理 2. 安全开发管理 3. 针对供应链安全事故 的应急响应 供应链攻击案例 Solarwinds 供应链安全管理 管理框架 前瞻性为 导向 综合的风 险管理 效率和有 效性控制 领导和透 明性 业务部门 其他部门 合规风险管 理委员会 高层管理 董事会 内审/风控委 员会 供应链安全管理 供应商管理框架——供应商分类分级...
pdf
HIGH-DEF FUZZING EXPLORING VULNERABILITIES IN HDMI-CEC               name = "Joshua Smith"               job  = "Senior Security Researcher"               job += "HP Zero Day Initiative"               irc  = "kernelsmith"               twit = "@kernelsmith" Which of the following is false? 1. Have had 10 knee surgeries...
pdf
INSIDE THE “MEET DESAI” ATTACK: DEFENDING DISTRIBUTED TARGETS FROM DISTRIBUTED ATTACKS @CINCVOLFLT (TREY FORGETY) HACKER, LAWYER NAVIGATOR, PHYSICIST NENA: The 9-1-1 Association improves 9-1-1 through research, standards development, training, education, outreach, and advocacy. www.NENA.org IN NOVEMBER, 2016, A TEENA...
pdf
Your secret files are mine: Bug finding and exploit techniques on file transfer app of all top Android vendors Zhang Xiangqian Liu Huiming About us • Tencent • Largest social media and entertainment company in China • Tencent Security Xuanwu Lab • Applied and real world security research • Members of Advanced Securi...
pdf
2 3 4 5 6 7 8 9 10 11 12 13 14 15 21317 subdomain 11928 unique IP 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 66 67 68 69 70 75 76 77 78 79 80 82 84 85 91 93 96 97 98 99 100 104 109 113 114
pdf
Sniper Forensics “One Shot, One Kill” Christopher E. Pogue - Trustwave Copyright Trustwave 2009 Confidential Thank You Dan Christensen! http://dcdrawings.blogspot.com/ Copyright Trustwave 2009 Confidential Who Am I? • Senior Security Consultant for the Trustwave SpiderLabs • Master’s degree in Information Security •...
pdf
Resilience Despite Malicious Participants Radia Perlman radia.perlman@emc.com EMC 1 This talk • I’ll give a few examples to show the wildly different types of problems and solutions 2 Byzantine Failures • Fail-stop: Something works perfectly, then halts • Byzantine: Where something stops doing the right thing, but ...
pdf
《软件调试》补编 - 1 – Copyright © 2009 ADVDBG.ORG All Rights Reserved 《软件调试》补编 作者:张银奎 2009 年 1 月 12 日 《软件调试》补编 - 2 – Copyright © 2009 ADVDBG.ORG All Rights Reserved 大多数程序员的技术水平不如黑客的主要原因是他们远远不如黑客 那样重视和擅于使用调试技术。 《软件调试》补编 - 3 – Copyright © 2009 ADVDBG.ORG All Rights Reserved 前 言 总的来说,今天的软件很糟糕,而且一段时期内还会继续变得更糟。原因有...
pdf
calc && notepad chrome.exe urlstr https://www.baidu.com --gpu-launcher="cmd.exe" chrome.exe https://www.baidu.com --gpu-launcher="cmd.exe" chrome chrome.exe https://www.baidu.com --no-sandbox --gpu-launcher="cmd.exe" 0x00 0x01 Chrome QQ chrome.exe https://www.baidu.com --gpu-launcher="cmd.exe" 360 chrome.exe h...
pdf
1 OLONNONS-StrutsO logQjO RCE研究 看到有⼈分析Struts2 log4j2 RCE 漏洞点位于 org.apache.struts2.dispatcher.DefaultStaticContentLoader#process 具体调⽤过程为⾸先根据过滤器配置 进⼊ org.apache.struts2.dispatcher.filter.StrutsExecuteFilter#doFilter 1.前⾔ 2 当mapping为空时也就是我们请求的路径找不到action时进⼊ executeStaticResourceRequest ⾸先获取 getServletPath 如果 ...
pdf
w w w .ianange ll.co m Co m ple xity in Co m pute r Syste m s: a Risky Busine ss Pro fe sso r Ian O. Ange ll Info rm atio n Syste m s and Inno vatio n Gro up De partm e nt o f Manage m e nt Lo ndo n Scho o l o f Eco no m ics w w w .ianange ll.co m Why do w e ne e d Te chno lo gy at all? Te chno lo gy transfo rm s un...
pdf
ByteCTF WriteUp By Nu1L author:Nu1L ByteCTF WriteUp By Nu1L Pwn ByteCSMS Babyandroid eazydroid bytezoom Reverse languages binding moderncpp 0x6d21 Web Unsecure Blog double sqli Misc checkin Survey HearingNotBelieving Crypto JustDecrypt overhead easyxor Pwn ByteCSMS #! /usr/bin/python2 # coding=utf-8 import sys from pwn...
pdf
针对域证书服务的攻击(2)- ESC2 0x00 前言 在ESC1的分析中我们遇到了一个问题,就是Certify这个工具带了2个DLL,很不方便,刚好今天看 twitter看到这么一个项目,https://github.com/CCob/dnMerge,使用NuGet搜dnMerge加入到项目 中,再release生成,就能编译成一个EXE了,很是简单。需要注意的就是只有release生成可以用, debug是不能用的。 第二件事是一个题外话,我由于本地网络问题,我环境域控修改了IP,导致域中机器Ping域控域名的时 候返回127.0.0.1。这是我没有按照正规流程修改域控IP,细节看https://www.huaweicloud....
pdf
T H E C O M P L E T E A M A T E U R 1 ID Making Operating Guide by Doug Farre For Informational Purposes Only : An introduction and word of caution I want to start off by saying that none of the information outlined in this guide should be used in the process of manufacturing fraudulent identification cards. ...
pdf
我的CS笔记之- In-memory Evasion 3 0x00 前言 前2部分,讲了侦测手法、CS payload的加载细节,这一部分主要讲怎么逃逸了,主要是使用CS自身的 C2profile来改变payload的加载行为。目前看来这些对抗手段已经是标配了,攻防对抗是一个水涨船高 的过程,标配都没搞好,天天去搞更强的对抗,就有点浮夸,我们一步一步来。 0x01 普通逃逸和CS的相关配置 在In-memory Evasion 3中逃逸主要还是围绕着In-memory Evasion 1中的3个部分展开: 我们先来回顾异常指标 线程开始地址异常 当前进程 公鸡程序常常是申请一个内存,写入公鸡代码,然后使用createThread执行...
pdf
ABUSING CERTIFICATE TRANSPARENCY OR HOW TO HACK WEB APPLICATIONS BEFORE INSTALLATION. Hanno Böck https://hboeck.de/ 1 HTTPS 2 CERTIFICATE AUTHORITIES (CAS) 3 CAN WE TRUST CERTIFICATE AUTHORITIES? 4 NO Many cases of illegitimate certificates in the past. 5 IMPROVE OR REPLACE? Popular Infosec opinion: CAs are bad, we ne...
pdf
Owning "bad" guys {and mafia} with Javascript botnets Chema Alonso & Manu “The Sur” Let´s do a botnet but… • We are lazy • We haven´t money • We haven´t 0day • We aren´t the FBI • We aren´t either: • Google • Apple • Microsoft Let them to be infected Man in the Middle schemas • Intercept communications ...
pdf
演讲人: 2 0 1 8 • Swan:业余漏洞挖掘爱好者 • Heige:Web一哥,二进制新手 • Hui Gao:MSRC top 100一姐 • 业余时间搞下二进制 • 找找那些难以利用,无实战意义的漏洞 • 希望是非灌水性质,因为Adobe本身门槛略低 • 避开热点区域 • 不撞洞,不给其它有KPI要求的团队添麻烦 • 源于2014年的思路 • 2014年5月29日,我们发现了一个古天乐般平平无奇的IE漏洞(CVE-2014-1792) • POC非常简单 • 72字节的Use-After-Free漏洞 • <!doctype><body onload=x.parentNode.applyElement(x)><body...
pdf
Deviant Ollam & Howard Payne DEFCON 22 – 2014/08/03 ELEVATOR HACKING FROM THE PIT TO THE PENTHOUSE WHO ARE WE? http://enterthecore.net Who Are We ? Deviant Ollam – Physical Penetration Tester – Red Teamer – Lockpicker – Liquor of Choice: Lagavulin Howard Payne – Elevator Consultant & Inspector – Non-Union...
pdf
Amateur Digital Archeology Matt Joyce "In the streets of Hau-kai, we wait Night comes, winter descends The lights of the world grow cold And, in this three-hundredth year From the ascendancy of Bilat He will come who treads the dawn Tramples the sun beneath his feet And judges the souls of men He will stride ...
pdf