text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
A Journey into Hexagon
Dissecting Qualcomm Basebands
Seamus Burke
Agenda
●
About me
●
Why Basebands?
●
History
●
Modern SoC Architecture
●
Hexagon
●
Cellular Stack architecture
●
Analysis
About Me
●
Student, still finishing up my undergrad
●
Interested in kernel internals, exploit development, and embedded systems
●
P... | pdf |
APK 流量转发保姆级教程
作者:lings- 时间:2021/10/02
目 录
绪 论 ............................................................................................................... 1
第 1 章 Burpsuite 证书安装 ........................................................................... 2
1.1 导出 burpsuite 证书 ..................................... | pdf |
M A N N I N G
Dominik Picheta
www.allitebooks.com
Nim Reference
Common constructs
const x = 5
Compile-time constant
let y = “Hello”
Immutable binding
var z = [1, 2, 3]
Mutable variable
proc name(param: int): ReturnType = body
method name(param: float): ReturnType = body
iterator items(list: seq[int]): int... | pdf |
MEATPISTOL
A Modular Malware Implant Framework
Presened by: @ceyxies and @fzzynop
Biographical Summary:
?
HERE TO TALK ABOUT—
A GUN MADE OF MEAT
...THAT SHOOTS MALWARE BULLETS?
This is a tool for...
RED TEAM
You mean "Pentesting?"
"Fundamentally a framework for creating,
managing, and interacting with stealth implant... | pdf |
Are all BSDs created equally?
A survey of BSD kernel vulnerabili9es.;
!
!
!
Ilja!van!Sprundel!<ivansprundel@ioac4ve.com>!
Who Am I;
• Ilja!van!Sprundel!!
• ivansprundel@ioac4ve.com!
• Director!of!Penetra4on!Tes4ng!at!IOAc4ve!!
• Pen!test!
• Code!review!
• Break!stuff!for!fun!and!profit!J!!
Outline/Agenda ;
• Intr... | pdf |
1
2
Public safety may be an obscure, public-sector part of the telecom/tech crowd, but
“the crowd” is actually quite sophisticated.
We consulted with members of the standards community before attempting these
attacks to determine what attack surfaces they deemed most vulnerable.
After completing our in-lab research, ... | pdf |
Free Your Mind
The NMRC Info/Warez Panel
Our Agenda
• Intro – hellNbak
• Hack FAQ – jrandom, Weasel
• Ncrypt/Ncovert – Simple Nomad
• Political Rant – Sioda an Cailleach
• Win32 Buffer Overflow Eggs – Cyberiad
• nmrcOS – Inertia
• Panel Q&A
• Closing – Simple Nomad
Special Note
No photography of the crowd
No questions... | pdf |
因为公司经常会有批量⾃动化测试的需求,所以之前⽤Python写了⼀套类似于群控的⼿机
调度系统。
⾸先想到的第⼀个问题是如何使⽤ADB控制⼿机;
⼀开始我写了⼀个 pyadbhelper 公共类,内容是使⽤ os.system 来调⽤ adb ,并且使
⽤ -s 参数来选择操作的设备。
但实际上这个⽅案很不稳定,因为 adb 的代码⾥既包含 server 端⼜包含 client 端,有时候
莫名其妙的就会把 server 端重启了(不同的环境有很多原因)。 因为是多线程操作,所以⼀
旦重启那么其他线程有可能正在进⾏ push pull 等操作就直接被中断导致任务失败。
换⼀种思路,就是⽤ python 实现⼀个 cl... | pdf |
Face Swapping Video Detection
with CNN
Wang Yang, Junfeng Xiong,
Liu Yan, Hao Xin, Wei Tao
Baidu X-Lab
Face Swapping Video
Detection with CNN
• Deepfakes video
• A simple and effective CNN
• Face recognition based method
Deepfakes Video
When Face Recognition
Systems Meet Deepfakes
Vulnerable face comp... | pdf |
Sarah Edwards | @iamevltwin | oompa@csh.rit.edu | mac4n6.com
iCloud Basics
Storage and Acquisition of iCloud Data
Synced Preferences
Application Data
What is “Everything”?
• Documents
• Email
• Contacts
• Preference Configurations
• Photos
• Calendar
• Notes
• Reminders
• and more!
! Email: Apple ID
!... | pdf |
Rotten code, aging standards,
& pwning IPv4 parsing across
nearly every mainstream
programming language
2
@jfslowik
3
Disclaimer
● None of this research was paid for
● We research in good faith
● Nothing today represents our
past/present/future employers
● None of us are under gag orders*
● All images are CC0 or pub... | pdf |
ThruGlassXfer
ThruGlassXfer
Remote Access, the APT
Remote Access, the APT
Credit: Awesome graphics from WallpapersWide.com
August 2015
Remote Access, the APT // Ian Latter
2
Key messages for this session
Key messages for this session
• Current security architecture, flawed (now)
Current security architecture, flawed ... | pdf |
1
The Middler Reloaded
It’s Not Just for the Web Anymore
Def Con 17
Copyright 2009 Jay Beale and Justin Searle
Jay Beale and Justin Searle
InGuardians
and
The Middler Project
2
Copyright 2008 and 2009 Jay Beale and Justin Searle
The Middler – Application-Layer Rootkit
• Is a next-generation man-in-the-mid... | pdf |
The Bieber Project
Ad Tech and Fraud 101
Mark Ryan Talabis, zvelo
zvelo proprietary and confidential
Introduction
! Chief Security Scientist, zvelo
▫ Ad Tech Fraud Research
! Formerly, Cloud Email Threat Protection, Fireeye
! Alumni Member, Honeynet Project
" Honeypots/Honeynets
! Author, Elsevier-Syngress... | pdf |
1
Julian Grizzard
DEFCON 13
Surgical Recovery from
Kernel-Level Rootkit Installations
Speaker: Julian Grizzard
July 2005
DEFCON THIRTEEN
2
Julian Grizzard
DEFCON 13
Latest Slides and Tools
PLEASE DOWNLOAD THE LATEST SLIDES AND TOOLS
[ Latest slides available ]
http://www.ece.gatech.edu/research/labs/nsa/presentations/d... | pdf |
Analyzing and Counter-Attacking
Attacker-Implanted Devices
Case Study:
Pwn Plug
Robert Wesley McGrew
wesley@mcgrewsecurity.com
Introduction
In order to bypass restrictions on inbound network traffic, an attacker might find it
desirable to “implant” a hardware device in the target network that would allow tha... | pdf |
RFID Hacking
Live Free or RFID Hard
03 Aug 2013 – DEF CON 21 (2013) – Las Vegas, NV
Presented by:
Francis Brown
Bishop Fox
www.bishopfox.com
Agenda
2
• Quick Overview
•
RFID badge basics
• Hacking Tools
•
Primary existing RFID hacking tools
•
Badge stealing, replaying, and cloning
•
Attacking badge read... | pdf |
1
IceRiver⾼版本Q.V简单说明
前⾔
⼀些功能使⽤介绍
Self Inject模式
由于CS 4.6版本之后,官⽅对ts和client端做了代码分离,ts端⼜由java to native技术做了编译,因此后
续版本对ts端的修改,将不再那么容易,所以⽬前所做的⼆开主要集中在client端。IceRiver今后的计划
是:保持CS的稳定性、规避内存和⾏为查杀、添加实⽤性插件、结合其他开源项⽬更⾼效的应⽤于实
战。
这个插件是⾃从4.4版本的IceRiver就已经存在的,在4.7版本实现⽅式有了变动,但对于⽤户侧使⽤⽅法
不变。默认情况下,可以看到beacon的inject配置显示为"default".
这个时候执⾏⼀些后... | pdf |
CVE-2022-22733 Apache ShardingSphere
ElasticJob-UI RCE
author:Y4er
分析
看diff https://github.com/apache/shardingsphere-elasticjob-
ui/commit/f3afe51221cd2382e59afc4b9544c6c8a4448a99
getToken函数会将this对象转json返回,而this对象中存储了root的密码
分析调用关系
handleLogin函数处理登录时会进行判断,如果 authenticationResult.isSuccess() 登录成功会返
回getToken()
而handleLo... | pdf |
TTBSP
Jon R. Kibler
Mike Cooper
textbook.security@gmail.com
Hack the Textbook:
The Textbook Security Project
Hack the Textbook
TTBSP
Introduction
• The Problem
• Fixing It
• The Project
• How You Can Help!
• Demo
• Q&A
Hack the Textbook
TTBSP
The Problem
• Most security problems are caused by bad code
• Bad code is cau... | pdf |
Scott Wolchok
“Spying the World from Your Laptop” @ LEET
Crawl Pirate Bay, scrape trackers
Tracked downloads for millions of IPs
TPB added magnet links last year
No more .torrent files; get data from DHT
“no central tracker that can be down”
“don’t need to rely on a single server”
http://thepiratebay.org/blog/175
DHT c... | pdf |
Hacking travel routers
like it’s 1999
Mikhail Sosonkin
Director of R&D
Always a Student
@hexlogic
mikhail@synack.com
http://debugtrap.com
Why do this?
Breaking in.
Show me the bugs!
The End.
We all just hack for fun… right?
I travel a lot
I work in cafes
I do security things
Why do this?
The unboxing
We want bugs!
The... | pdf |
Making Games Cerebral
Ne0nRa1n
Julian Spillane, CEO, Frozen North Productions, Inc.
Breakdown
Who are these brain people?
Brain 101
Video Game Myths
History of Game Peripherals
Industry Current Trends (The Good and The Bad)
Our Proposal...
Demonstration
Who are these brain people?
Ne0nRa1n
Under‐Educated
Und... | pdf |
Sneak into buildings
with KNXnet/IP
using BOF
whoami
Claire Vacherot
Senior pentester @ Orange Cyberdefense France
Random info:
►Writing tools (and then discover they already exist)
►Part of GreHack’s organization team
►Penetration testing on "unusual" environments
2
PROGRAMMING
SECURE
PROGRAMMING
… ON EMBEDDED/ICS
... | pdf |
Is This Your Pipe?
Hijacking the Build Pipeline
$ whoami
@rgbkrk
OSS, Builds and Testing
Protecting pipelines
• Need Want benefits of continuous delivery!
• Open source pathways to real, running
infrastructure!
• Community services with > 200,000 users
Build Pipeline Components
• Source Control
• Continuous Integratio... | pdf |
页眉
忆一次渗透实战
从打点到域控的全过程
杭州安恒信息技术股份有限公司
安服战略支援部-星火实验室-李兵
2019 年 9 月 19 日
目录
1. 信息收集阶段 ................................................................................................................................................ 1
2. 外部打点阶段 ........................................................................... | pdf |
Windows Process Injection in 2019
Amit Klein, Itzik Kotler
Safebreach Labs
Introduction
Process injection in Windows appears to be a well-researched topic, with many techniques now known
and implemented to inject from one process to the other. Process injection is used by malware to gain
more stealth (e.g. run ma... | pdf |
Next Generation Collaborative Reversing
with Ida Pro and CollabREate
Christopher Eagle and Timothy Vidas
Department of Computer Science,
Naval Postgraduate School, Monterey, CA
{cseagle,tmvidas}@nps.edu
Abstract
A major drawback with the use of most reverse
engineering tools is that they were not designed with... | pdf |
Respond Before Incident
Building proactive APT defense capabilities (Public Version)
• Introduction
• Popular cyber attack countermeasures
• Evolution of cyber incident handling
• Traditional incident handling challenges
• Ideal CSIRT Resource Allocation
• Story of a long-term NPO victim
• Original Compromised Situatio... | pdf |
Apache Solr Injection
Michael Stepankin
@artsploit
DEF CON 27
@whoami – Michael Stepankin
•
Security Researcher @ Veracode
•
Web app breaker
•
Works on making Dynamic and Static Code Analysis smarter
•
Penetration tester in the past
•
Never reported SSL ciphers
Ones upon a time on bug bounty…
What is Solr?
•
Solr is ... | pdf |
Flash内存管理与漏洞利用
Hearmen
北京大学软件安全研究小组
目录
AVM2 虚拟机简介
CVE-2015-0313
CVE-2015-3043
CVE-2015-5119
攻击演示
uCVE-2015-3043
AVM2 虚拟机简介
uAVM2 是 目 前 使 用 的 flash player 的 核 心 , 所 有 的
ActionScript 3 代码都由AVM2来执行
u采用Jit与解释器混合执行的方式,大幅提升flash的运
行效率
ActionScript 3执行流程
u《avm2overview》
ActionScript 3
bytecode
Constant pool
堆栈初始化
常量池初始化
J... | pdf |
Greater Than One
Defeating “strong” authentication in
web applications
- Brendan O’Connor
Introduction
Background Information
Control Types
Device Fingerprinting
One Time Passwords
Knowledge Base Archives
Conclusions
Introduction
Internet Banking
Bill Pay
Car Loans and Mortgages
Retirement Plans / 401K
Stoc... | pdf |
DEFCON 2007
David Hulton <david@toorcon.org>
Chairman, ToorCon
Security R&D, Pico Computing, Inc.
Researcher, The OpenCiphers Project
Faster PwninG Assured:
New Adventures with
FPGAs
DEFCON 2007
2007 © The OpenCiphers Project
Overview
FPGAs – Quick Intro
New Cracking Tools! (Since ShmooCon)
BTCrack – Bluetooth... | pdf |
1
第NS届全国⼤学⽣知识竞赛 初赛 online_crt
writeup
项⽬分析
解题
c_rehash
利⽤条件
go server
url注⼊http头
go的RawPath特性
构造利⽤链
第⼀步
第⼆步
使⽤baseTQ 编码
使⽤截断环境变量
使⽤现有环境变量
第三步
总结
author:⽩帽酱
题⽬给了后端源码 ⼀道题利⽤了前不久出现的⼀个鸡肋洞 题⽬还是⽐较有意思的
项⽬后端是pyhton + go
pyhton的服务直接暴露给⽤户
pyhton服务 ⼀共有4个路由
/getcrt ⽣成⼀个x509证书
/createlink 调⽤ c_rehash 创建证书链接
项⽬分析
2
/proxy 通过... | pdf |
8/1/13
Cui,
Costello,
Kataria,
Stolfo,
Blackhat
USA
2013
8/1/13
Cui,
Costello,
Kataria,
Stolfo,
Blackhat
USA
2013
Stepping p3wns
Adventures in full-spectrum Embedded Exploitation And Defense
8/1/13
Cui,
Costello,
Kataria,
Stolfo,
Blackhat
USA
2013
Our Typical Tal... | pdf |
攻防演练中的攻击战术演进
长亭科技 崔勤
变化与机会
甲
方
乙
方
监管
实 战
“实战”标准下的安全效果更真实
1.
结果导向,不限制手法。
2.
攻防两端深度参与,不再仅仅是一份检测报告,体验感更足。
3.
低危漏洞?安全意识不重要?
实战标准的特点
乙
方
实 战
攻防演练
攻防演练是“实战”视角下最佳验证手段之
一
攻防演练(红队)
1. 能力象限
2. 框架的演进
3. 决策及思考,攻击战术
攻防演练(框架演进)
以为人为核心到组织矩阵
攻防演练(框架的演进)
•
范围
•
速度
•
内容
•
影响范围
•
利用程度
•
自动化程度
•
隐蔽性
•
对抗能力
攻防演练(决策及思考)
初始信息收集
初始入侵
站稳脚跟
提升... | pdf |
Hacking
Embedded
Devices
(Doing
Bad
Things
to
Good
Hardware)
About
your
hosts…
• Phorkus
has
been
breaking
things
since
he
was
5
years
old.
– SomeDmes
with
a
hammer,
someDmes
a
soldering
iron.
• EvilRob
has
been
causing
mayhem
... | pdf |
Microsoft Passport
Yahoo
MMORPG
MMORPG
MMORPG
MMORPG
0
5000
10000
15000
20000
25000
30000
35000
40000
02/07
02/10
02/13
02/16
02/19
02/22
02/25
02/28
03/03
03/06
03/09
03/12
03/15
03/18
03/21
03/24
03/27
03/30
04/02
04/05
04/08
04/11
04/14
04/17
04/20
04/23
04/26
04/29
05/02
0
1000
2000
3000
4000
5000
6000
7000
8000
90... | pdf |
Steganography in Commonly
Used HF Radio Protocols
@pdogg77 @TheDukeZip
pdogg
● Paul / pdogg /
@pdogg77
● Day Job: Security
Researcher at Confer
Technologies Inc.
● Hobby: Licensed as
an amateur radio
operator in 1986,
ARRL VE
● This is my second
trip to DEF CON
thedukezip
● Brent / thedukezip / @thedukezip
... | pdf |
Abusing Certificate Transparency
Or how to hack Web Applications before Installation
Hanno Böck
https://hboeck.de/
1
HTTPS
2
Certificate Authorities
3
Can we trust Certificate
Authorities?
4
No
5
CAs are bad, we need to get rid of them
Popular Infosec opinion
6
Reality
Nobody has a feasible plan how to replace CAs
7
... | pdf |
The$env:PATH lessTraveledisFull
ofEasyPrivilegeEscalationVulns
Bio
SecurityResearcher/Tester(HarrisCorp)
FormerArmyRedTeamOperator
OneofthedevelopersofPowerSploit
Twitter:@obscuresec
Blog:www.obscuresec.com
Sucksalotlessnow…
Gettingevenbetter…
OneGet
ChocolateyNuget
PSGet
Alloftheseutilitiesaregreatfor:
Simpl... | pdf |
UNORTHODOX LATERAL
MOVEMENT:
STEPPING AWAY FROM STANDARD
TRADECRAFT
> ldapsearch (displayname=Riccardo Ancarani)
sAMAccountname: Rancarani
displayname: Riccardo Ancarani
memberOf: @APTortellini, WithSecure/F-Secure
security certifications: who cares really
▪ Lateral Movement is the act of using authentication mat... | pdf |
LIFE OF CODER
QUESTION 1
int a = 5, b = 7, c;
c = a+++b;
(A) A=6, C=10 (B) B=7, C=10 (C) A=6, C=12
QUESTION 2
char str[]="startrek";
char *p=str;
int n=10;
A=sizeof(str);
B=sizeof(p);
C=sizeof(n);
(A) A=8, C= 4 (B) B=4, C=1 (C) A=9, C=4
QUESTION 3
unsigned long *i;
unsigned long *j;
unsigned long s... | pdf |
RICHARD THIEME
THIEMEWORKS
WWW.THIEMEWORKS.COM
rthieme@thiemeworks.com
neuralcowboy@gmail.com
PO Box 170737
Milwaukee WI 53217-8061
THE ONLY WAY TO TELL
THE TRUTH IS
THROUGH FICTION
THE DYNAMICS OF LIFE IN THE NATIONAL SECURITY
STATE
" It's no wonder how complicated things get,
what with one thing leading to ... | pdf |
TABBY:
Java Code Review like a pro
TABBY:
Java Code Review like a pro
王柏柱(wh1t3p1g)
CONTENTS
目录
1
2
3
Background
Find Java Web Vulnerabilities like a pro
Find Java Gadget like a pro
4
Find Java RPC Framework Vulnerabilities like a pro
Background
01
依靠专家经验人工审计
辅以正则匹配工具
标志性工具:
Seay代码审计工具[1]
过程内分析
AST流分析/token流分析/
简单数据流分析... | pdf |
Let's Dance in the Cache:
Orange Tsai
Destabilizing Hash Table on Microsoft IIS
USA 2022
For a Protected Area
Th1s-1s-@-Sup3r-Str0ng-P@33w0rD!
DI1D8XF4
T9433W0N
R04K85R8
OR7SHSQM
4IDF7LAU
T9ILKRJO
DIO376UC
29WM5WPU
XRXNHYS8
I0XVSRY7
4J4F29DY
BA55FF5B
VJ5QUDCJ
XS9B66QE
I1BICTG1
DJH24HH4
OSNADCSM
FSNPV263
91T4TLRP
91UKBH... | pdf |
不不可能完成的任务
从⽤用户空间窃取内核数据
Yueqiang Cheng, Zhaofeng Chen, Yulong Zhang, Yu Ding,
Tao Wei
Baidu Security
关于演讲者
Dr. Tao Wei
Dr.$Yueqiang$Cheng$
Mr. Zhaofeng Chen
Mr. Yulong Zhang
Dr. Yu Ding
我们的安全项⽬目:
怎样从⽤用户空间读取未授权的内核数据?
$$
强有⼒力力的内核-⽤用户隔离 (KUI)
MMU-⻚页表(Page Table)的加持
这为什什么很难?
假设内核⽆无缺陷:
⽆无内核缺陷来任意... | pdf |
@unapibageek - @ssantosv
Tracking Malware Developers
by Android “AAPT” Timezone Disclosure Bug
ROCK APPROUND THE CLOCK!
@unapibageek - @ssantosv
Sheila Ayelen Berta
Sergio De Los Santos
Security Researcher
ElevenPaths
(Telefonica Digital cyber security unit)
Head of Innovation and Lab
ElevenPaths
(Telefonica Digital... | pdf |
Gaming - The Next Overlooked
Security Hole
Ferdinand Schober
Overview
Overview
Historical development
Know thy gamer
Know thy developer
Know thy engine
Profit?
Virtual Economies
Current malware
Games 2.0 & Privacy
Exercise in Exploits
The little nude patch that could
View my post and get owned
... | pdf |
10 Things That Are Pissing Me Off
RenderMan, Church of Wifi
Caution: The first 3 rows may get wet
10 Things That Are Pissing Me Off
● There's a lot more, but we're sticking to Hacker
related ones
● This is cheaper than therapy
● Got so pissed off I'm doing something about
some of them, others I need help
● Save discu... | pdf |
Hacking 911:
Adventures in Disruption,
Destruction, and Death
quaddi, r3plicant & Peter Hefley
August 2014
Jeff Tully
Christian Dameff
Peter Hefley
Physician, MD
Emergency Medicine
Open CTF champion sudoers- Defcon 16
Speaker, Defcon 20
Physician, MD
Pediatrics
Wrote a program for his TI-83 graphing... | pdf |
Printing is still the Stairway
to Heaven
A Decade After Stuxnet’s Printer Vulnerability
LABS
Peleg Hadar Senior Security Researcher & Tomer Bar Research Team Lead |
Peleg
Hadar Senior Security Researcher
■
7+ years in InfoSec
■
Senior Security Researcher @ SafeBreach Labs
■
Main focus in Windows internals and ... | pdf |
From ROOT
to SPECIAL
Hacking IBM
Mainframes
Soldier of Fortran
@mainframed767
DISCLAIMER!
All research was done under
personal time. I am not here
in the name of, or on behalf
of, my employer.
Therefore, any views expressed
in this talk are my own and
not those of my employer.
This talk discusses work
... | pdf |
K &T :: IGS :: MAF
K &T :: IGS :: MAF
11
VLANs Layer 2 Attacks:
VLANs Layer 2 Attacks:
Their Relevance
Their Relevance
and
and
Their Kryptonite
Their Kryptonite
VLAN Layer 2 Attacks
K &T :: IGS :: MAF
K &T :: IGS :: MAF
22
Security is only as strong as the weakest link
Security is only as strong as the weakest li... | pdf |
#BHUSA @BlackHatEvents
RCE-as-a-Service:
Lessons Learned from 5 Years of Real-World CI/CD
Pipeline Compromise
Iain Smart & Viktor Gazdag
#BHUSA @BlackHatEvents
Information Classification: General
WhoAreWe
Iain Smart (@smarticu5)
NCC Group Containerisation Practice Lead
6 years Container & Cloud Pentesting
Viktor Gazda... | pdf |
時間
題⺫⽬目
主講者
13:00
-
13:30
記者會 – VulReport 發表會
Sylphid Su
13:30
-
14:00
聽眾報到
14:00
-
14:30
開場及 2014 年度回顧 / HITCON 2015
TT
14:30
-
15:00
2014 年台灣企業安全常⾒見⾵風險剖析
Bowen Hsu
15:00
-
15:20
下午茶
15:20
-
15:50
駭客如何弄垮企業?
從索尼影業與南韓核電廠事件說起
GasGas / Fyodor
15:50
-
16:40
Operation GG
台灣最... | pdf |
asar e app.asar dst
0x00
0x01
0x02
<body>
<img src='https://127.0.0.1:54530/a=%3A%22%5C%22%20-a%3Bopen%20%2FSystem%2FApplications%2FCalendar.app%3B%5C%22%22%2C
%22withShortcut%22%3A1%7D'></img>
</body>
0x03 awvs
0x03 | pdf |
Your boss is a
douchebag...
How about you?
effffn
agenda
[ Intro
[ hacker jobs
[ Job status
[ Why (some of us) hate it
[ Our own mistakes
[ Why do we make mistakes?
[ Turn the tables
[ conclusion
DEFCON 18
What matters...
[ What you do...
[ How much you make...
[ Company you work for...
[ Your boss...
conclusion
thank... | pdf |
My journey on SMBGhost
Angelboy
angelboy@chroot.org
@scwuaptx
Whoami
• Angelboy
• Researcher at DEVCORE
• CTF Player
• HITCON / 217
• Chroot
• Co-founder of pwnable.tw
• Speaker
• HITB GSEC 2018/AVTokyo 2018/VXCON
Outline
• Introduction
• Vulnerability - CVE-2020-0796
• Exploitation of SMBGhost
• From crash to arbitra... | pdf |
Attacking Biometric
Access Control
Systems
By: Zamboni
Outline
Overview of biometrics
General methodology used to attack
biometric systems
Example attacks against physical access
control systems
Defenses
Question
Biometrics
Unique and (relatively) permanent physical or
behavioral characteristic that can be u... | pdf |
记⼀次某电梯Web系统⿊盒到PHP⽩盒挖掘RCE的过程
概述:
闲来⽆事,感觉IOT的洞挺好挖,记⼀次针对某电梯的Web系统挖掘到的⼏个任意
⽂件上传跟命令注⼊的过程,算是对PHP代码审计学习的⼀个记录。)
前置知识:
PHP执⾏命令函数:)
1、shell_exec())
string)shell_exec)()string)$cmd)))执⾏命令,并将结果作为字符串返回。)
返回值:如果执⾏失败,则返回NULL。执⾏成功则返回执⾏结果字符串。)
注意:This)function)is)disabled)when)PHP)is)running)in)safe)mode)
2、passthru())
void)passthru... | pdf |
DEFCON16
Virtually Hacking
08 August 2008
2
Why VMware?
•
Virtualisation has taken off and is here to stay
•
Many of our clients are using virtualisation technologies
•
Virtualisation services are being sold
•
VMware is the dominant product*
•
Need to be familiar with a product in order to hack it
*source silicon.co... | pdf |
目录
前言
2
1-linux提权描述
4
2-基本Linux权限提升前的信息收集
6
3-linux提权—自动信息收集
18
4-linux提权-内核漏洞提权
19
5-1-linux-历史漏洞提权
24
5-linux提权-利用以root权限运行的服务
25
6-Linux提权-NFS权限弱
27
7-linux提权-Suid和Guid配置错误
32
8-linux提权—滥用SUDO
41
9-linux提权-利用“.”路径配置错误
45
10-linux提权—利用定时任务(Cron jobs)
47
11-linux提权-通配符注入
54
渗透测试 红队攻防 免杀 权限维持 等等技术
及时分享最新漏洞复现以及EXP 国内外最... | pdf |
How to do it Wrong:
Smartphone Antivirus and
Security Applications Under Fire
Stephan Huber, Siegfried Rasthofer,
Steven Arzt, Michael Tröger, Andreas Wittmann, Philipp
Roskosch, Daniel Magin
1
2
Who are we
Siegfried
Stephan
• Mobile Security Researcher
at Fraunhofer SIT
• Enjoys teaching students in
Android Hac... | pdf |
Feei <feei@feei.cn>
Github敏敏感信息泄露露监控
⽌止介 <feei@feei.cn>
Feei <feei@feei.cn>
吴⽌止介(Feei)
介绍
‣
⽩白帽⼦子
‣
美丽联合集团 安全项⽬目总监
‣
专注漏漏洞洞⾃自动化发现与防御
Feei <feei@feei.cn>
议程
‣
背景
‣
爬取⽅方案
‣
特征思路路
‣
规则设计
‣
报告
‣
误报
‣
未来
Feei <feei@feei.cn>
背景
以技术⼿手段杜绝由于员⼯工意识问题导致的Github敏敏感信息泄露露
Feei <feei@feei.cn>
爬取⽅方案
爬取
Proxy+Page vs Token+API
Fe... | pdf |
DGAs and Threat
Intelligence
John Bambenek – Fidelis Cybersecurity Threat Research Team
HITCON 2015
Intro
President and Chief Forensic Examiner for
Bambenek Consulting
Adjunct Faculty in CS Department at the
University of Illinois at Urbana-Champaign
Producer of open-source intel feeds
Work with compa... | pdf |
The Day Of The Update
Once upon an Update …
Itzik Kotler
Tomer Bitton
Update? I already donated
• Ability to delivery bug fixes or new features
to existing customers of applications
• Natural inhibitors:
– Punch Cards
– BBS/Modem
– Floppies/CD’s
– Internet
What’s The Big Update?
• Updates are usually a background task... | pdf |
KCon
KCon
Webkit Vulnerability form 0 to 1
Lockmanxxx
•Work for 兴华永恒
•软件漏洞利用研究
•软件漏洞成因分析
•偶尔漏洞挖掘
@weibo:Lockmanxxx
@twitter:lockmanxxx
who
高效的挖掘?!?
From 0 to 1
目录
CONTENTS
PART 01
浏览器漏洞挖掘难点
PART 02
Why WebKit?
PART 03
挖掘思路
PART 04
挑战
PART 05
漏洞挖掘平台
PART 06
展示
PART 07
To Do Soon
01 浏览器漏洞挖掘难点
https://www.flexerasoftware.... | pdf |
Hacking in the
Name of Science
Tadayoshi (Yoshi) Kohno (University of Washington)
Jon Callas (PGP Corporation)
Alexei Czeskis (University of Washington)
Daniel Halperin (University of Washington)
Karl Koscher (University of Washington)
Michael Piatek (University of Washington)
DEFCON 16 - August 8, 2008
Who We Are
✦ R... | pdf |
宝宝树安全总监:王利
宝宝树
中国规模最大孕婴社区,公司员工约1000人
每天产生文字图片音视频百万级
用户覆盖全国大部分年轻一代准妈妈和孕婴妈妈
分享人:王利
多年甲乙双方打杂经验
曾任职于宝宝树、爱奇艺等互联网公司
兴趣爱好:产品经理、白帽子、羊毛党
公司介绍
Topics
• 0x01 安全体系
(社区+电商)
• 0x02 风控边控联动
(反爬虫+反扫描+防火墙自动化)
• 0x03 风控系统
(引擎+指纹+数据)
• 0x04 开源应用
(扫描平台+ HIDS)
• 0x05 数据安全
(加密+脱敏+DLP)
宝宝树社区&电商常见攻击
中等规模社区电商互联网安全体系(绿色优先完成)
半
年
零
预
算
异
地
多
IDC
... | pdf |
Medical Identity Theft
updated slides available at www.pskl.us
Eric Smith
Bucknell University
Dr. Shana Dardan
Susquehanna University
…Because of the difficulty in detection, the potential exists for
this crime to be happening substantially more frequently than
anyone has documented to date...
World Privacy Forum, Spr... | pdf |
Advanced Linux Programming
高级 Linux 程序设计
卷 I
网址
http://www.AdvancedLinuxProgramming.com
译者
完美废人
网址
http://blog.csdn.net/Wolf0403
作者
Mark Mitchell
Jeffrey Oldham
Alex Samuel
高级 Linux 程序设计·卷一·Linux 平台上的高级 UNIX 编程
完美废人 译
谨以此书献给 四月
你是我生命中的奇迹
www.AdvancedLinuxProgramming.com
2
高级 Linux 程序设计·卷一·Linux 平台上的高级 U... | pdf |
Joe Grand aka
The Projects of...
DEFCON 17
Zoz aka
๏ Engineering entertainment program on
Discovery Channel
๏ Four guys building prototypes of crazy things
๏ Try to follow the "true" design process
๏ Premiered October 2008 (US), ~February
2009 (World)
๏ Thirteen episodes
๏ ~1 million households/episode
๏ www.discove... | pdf |
Mach%O'Malware'Analysis:'Combatting'Mac'OSX/iOS'Malware'with'Data'Visualization!
!
'
'
'
'
Defcon'2013'
Mach%O'Malware'Analysis:'
Combatting*Mac*OSX/iOS*Malware*with*Data*Visualization*
'
Remy'Baumgarten'
ANRC'LLC.'
Mach%O'Malware'Analysis:'Combatting'Mac'OSX/iOS'Malware'with'Data'Visualization!
!
Mach%O'Malware'Analys... | pdf |
Export Controls on
Intrusion Software
Collin Anderson (@CDA)
Tom Cross (@_decius_)
Do Export Controls on Intrusion Software
Threaten Security Research?
Truth is… we don’t know.
(We’re not lawyers and this isn’t legal advice.)
Truth is… the Government doesn’t know.
(At least they are asking questions.)
Truth is… ... | pdf |
De1CTF 2019 WP
Author:Nu1L Team
Team Page:https://nu1l-ctf.com
De1CTF 2019 WP
Web
Giftbox
cloudmusic_rev
9calc
ssrf
ShellShellShell
Re
Evil_boost
Signal vm
Re_Sign
Cplusplus
Pwn
A+B Judge
Weapon
Mimic_note
Crypto
xorz
babyrsa
Misc
Upgrade
Mine Sweeping
Web
Giftbox
import pyotp
import requests
import string
url = "http:... | pdf |
[SensePost – 2009]
Click to edit Master subtitle style
8/21/09
Clobbering the Cloud!
{ haroon | marco | nick }
@sensepost.com
[SensePost – 2009]
8/21/09
about: us
{Nicholas Arvanitis | Marco Slaviero | Haroon Meer}
[SensePost – 2009]
8/21/09
Why this talk ?
[SensePost – 2009]
8/21/09
This is not the time to split ... | pdf |
Introduction to Hardware
Hacking
Scott Fullam
Why Hardware Hacking?
• Hardware Hacking does not seem to get
near the publicity as computer hacking
• I’d like to change reputation of hacking,
hardware in particular
Hardware Hack: A Definition
• A (sometimes) clever modification or fix made to a piece
of equipment th... | pdf |
From Dvr to See
Exploit of IoT Device
0K5y
Nobody@360GearTeam
1559113201 Date
Larryxi
Nobody@360GearTeam
What’s time
0x00 Content
0x01 Preface
0x02 Vulnerability Mining
0x03 Debugging Environment
0x04 Exploiting
0x05 Summary
0x01 Preface
Welcome and Thanks
IoT Four Modules
IoT Current Situation and Problems
IoT Archit... | pdf |
DUST
Your Rss Feed
belongs to you!
Chema Alonso
chema@informatica64.com
Juan Garrido «Silverhack»
jgarrido@informatica64.com
Once upon a time….
… and we believed it
• Internet is a space of freedom
• All opinions are allowed
• Freedon for news
• Nobody controls Internet
• Neutrality
• Anonimaty
• No Rul... | pdf |
供应链安全分享
Greta Fan
供应链攻击案例
Solarwinds
特点
应对
伪装主机名
主动适配目标地区IP
横向移动
临时文件替换
1. 登录IP检查
2. 登录活动检查
3. 任务和文件监控
4. 高权限账户活动监控
高隐蔽性
范围极
广
针对性强
组织严密
持续性长
1. 资产和软件生命周期
安全管理
2. 安全开发管理
3. 针对供应链安全事故
的应急响应
供应链攻击案例
Solarwinds
供应链安全管理
管理框架
前瞻性为
导向
综合的风
险管理
效率和有
效性控制
领导和透
明性
业务部门
其他部门
合规风险管
理委员会
高层管理
董事会
内审/风控委
员会
供应链安全管理
供应商管理框架——供应商分类分级... | pdf |
HIGH-DEF FUZZING
EXPLORING VULNERABILITIES IN
HDMI-CEC
name = "Joshua Smith"
job = "Senior Security Researcher"
job += "HP Zero Day Initiative"
irc = "kernelsmith"
twit = "@kernelsmith"
Which of the following is false?
1. Have had 10 knee surgeries... | pdf |
INSIDE THE “MEET DESAI” ATTACK:
DEFENDING DISTRIBUTED TARGETS
FROM DISTRIBUTED ATTACKS
@CINCVOLFLT
(TREY FORGETY)
HACKER, LAWYER
NAVIGATOR, PHYSICIST
NENA: The 9-1-1 Association improves 9-1-1
through research, standards development,
training, education, outreach, and advocacy.
www.NENA.org
IN NOVEMBER, 2016, A
TEENA... | pdf |
Your secret files are mine:
Bug finding and exploit techniques on file transfer app of all top
Android vendors
Zhang Xiangqian
Liu Huiming
About us
• Tencent
• Largest social media and entertainment company in China
• Tencent Security Xuanwu Lab
• Applied and real world security research
• Members of Advanced Securi... | pdf |
2
3
4
5
6
7
8
9
10
11
12
13
14
15
21317 subdomain
11928 unique IP
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
66
67
68
69
70
75
76
77
78
79
80
82
84
85
91
93
96
97
98
99
100
104
109
113
114 | pdf |
Sniper Forensics
“One Shot, One Kill”
Christopher E. Pogue - Trustwave
Copyright Trustwave 2009
Confidential
Thank You Dan Christensen!
http://dcdrawings.blogspot.com/
Copyright Trustwave 2009
Confidential
Who Am I?
•
Senior Security Consultant for the Trustwave SpiderLabs
•
Master’s degree in Information Security
•... | pdf |
Resilience Despite Malicious
Participants
Radia Perlman
radia.perlman@emc.com
EMC
1
This talk
• I’ll give a few examples to show the wildly
different types of problems and solutions
2
Byzantine Failures
• Fail-stop: Something works perfectly, then halts
• Byzantine: Where something stops doing the right thing,
but ... | pdf |
《软件调试》补编
- 1 –
Copyright © 2009 ADVDBG.ORG All Rights Reserved
《软件调试》补编
作者:张银奎
2009 年 1 月 12 日
《软件调试》补编
- 2 –
Copyright © 2009 ADVDBG.ORG All Rights Reserved
大多数程序员的技术水平不如黑客的主要原因是他们远远不如黑客
那样重视和擅于使用调试技术。
《软件调试》补编
- 3 –
Copyright © 2009 ADVDBG.ORG All Rights Reserved
前 言
总的来说,今天的软件很糟糕,而且一段时期内还会继续变得更糟。原因有... | pdf |
calc && notepad
chrome.exe urlstr
https://www.baidu.com --gpu-launcher="cmd.exe"
chrome.exe https://www.baidu.com --gpu-launcher="cmd.exe"
chrome
chrome.exe https://www.baidu.com --no-sandbox --gpu-launcher="cmd.exe"
0x00
0x01 Chrome
QQ
chrome.exe https://www.baidu.com --gpu-launcher="cmd.exe"
360
chrome.exe h... | pdf |
1
OLONNONS-StrutsO logQjO RCE研究
看到有⼈分析Struts2 log4j2 RCE
漏洞点位于 org.apache.struts2.dispatcher.DefaultStaticContentLoader#process
具体调⽤过程为⾸先根据过滤器配置
进⼊ org.apache.struts2.dispatcher.filter.StrutsExecuteFilter#doFilter
1.前⾔
2
当mapping为空时也就是我们请求的路径找不到action时进⼊ executeStaticResourceRequest
⾸先获取 getServletPath 如果 ... | pdf |
w w w .ianange ll.co m
Co m ple xity in
Co m pute r Syste m s:
a Risky Busine ss
Pro fe sso r Ian O. Ange ll
Info rm atio n Syste m s and Inno vatio n Gro up
De partm e nt o f Manage m e nt
Lo ndo n Scho o l o f Eco no m ics
w w w .ianange ll.co m
Why do w e ne e d Te chno lo gy at all?
Te chno lo gy transfo rm s un... | pdf |
ByteCTF WriteUp By Nu1L
author:Nu1L
ByteCTF WriteUp By Nu1L
Pwn
ByteCSMS
Babyandroid
eazydroid
bytezoom
Reverse
languages binding
moderncpp
0x6d21
Web
Unsecure Blog
double sqli
Misc
checkin
Survey
HearingNotBelieving
Crypto
JustDecrypt
overhead
easyxor
Pwn
ByteCSMS
#! /usr/bin/python2
# coding=utf-8
import sys
from pwn... | pdf |
针对域证书服务的攻击(2)- ESC2
0x00 前言
在ESC1的分析中我们遇到了一个问题,就是Certify这个工具带了2个DLL,很不方便,刚好今天看
twitter看到这么一个项目,https://github.com/CCob/dnMerge,使用NuGet搜dnMerge加入到项目
中,再release生成,就能编译成一个EXE了,很是简单。需要注意的就是只有release生成可以用,
debug是不能用的。
第二件事是一个题外话,我由于本地网络问题,我环境域控修改了IP,导致域中机器Ping域控域名的时
候返回127.0.0.1。这是我没有按照正规流程修改域控IP,细节看https://www.huaweicloud.... | pdf |
T
H
E
C
O
M
P
L
E
T
E
A
M
A
T
E
U
R
1
ID Making Operating Guide
by Doug Farre
For Informational Purposes Only : An introduction and word of caution
I want to start off by saying
that
none
of
the
information outlined in this
guide should be used in the
process of manufacturing
fraudulent
identification
cards.
... | pdf |
我的CS笔记之- In-memory Evasion 3
0x00 前言
前2部分,讲了侦测手法、CS payload的加载细节,这一部分主要讲怎么逃逸了,主要是使用CS自身的
C2profile来改变payload的加载行为。目前看来这些对抗手段已经是标配了,攻防对抗是一个水涨船高
的过程,标配都没搞好,天天去搞更强的对抗,就有点浮夸,我们一步一步来。
0x01 普通逃逸和CS的相关配置
在In-memory Evasion 3中逃逸主要还是围绕着In-memory Evasion 1中的3个部分展开:
我们先来回顾异常指标
线程开始地址异常
当前进程
公鸡程序常常是申请一个内存,写入公鸡代码,然后使用createThread执行... | pdf |
ABUSING CERTIFICATE
TRANSPARENCY
OR HOW TO HACK WEB APPLICATIONS BEFORE
INSTALLATION.
Hanno Böck
https://hboeck.de/
1
HTTPS
2
CERTIFICATE AUTHORITIES (CAS)
3
CAN WE TRUST CERTIFICATE
AUTHORITIES?
4
NO
Many cases of illegitimate certificates in the past.
5
IMPROVE OR REPLACE?
Popular Infosec opinion:
CAs are bad, we ne... | pdf |
Owning "bad" guys
{and mafia} with
Javascript botnets
Chema Alonso & Manu “The Sur”
Let´s do a botnet but…
• We are lazy
• We haven´t money
• We haven´t 0day
• We aren´t the FBI
• We aren´t either:
• Google
• Apple
• Microsoft
Let them to
be infected
Man in the Middle schemas
• Intercept communications ... | pdf |
演讲人:
2 0 1 8
• Swan:业余漏洞挖掘爱好者
• Heige:Web一哥,二进制新手
• Hui Gao:MSRC top 100一姐
• 业余时间搞下二进制
• 找找那些难以利用,无实战意义的漏洞
• 希望是非灌水性质,因为Adobe本身门槛略低
• 避开热点区域
• 不撞洞,不给其它有KPI要求的团队添麻烦
• 源于2014年的思路
• 2014年5月29日,我们发现了一个古天乐般平平无奇的IE漏洞(CVE-2014-1792)
• POC非常简单
• 72字节的Use-After-Free漏洞
• <!doctype><body onload=x.parentNode.applyElement(x)><body... | pdf |
Deviant Ollam & Howard Payne
DEFCON 22 – 2014/08/03
ELEVATOR HACKING
FROM THE PIT TO THE PENTHOUSE
WHO ARE WE?
http://enterthecore.net
Who Are We ?
Deviant Ollam
– Physical Penetration Tester
– Red Teamer
– Lockpicker
– Liquor of Choice: Lagavulin
Howard Payne
– Elevator Consultant & Inspector
– Non-Union... | pdf |
Amateur Digital
Archeology
Matt Joyce
"In the streets of Hau-kai, we wait Night comes, winter descends
The lights of the world grow cold And, in this three-hundredth year
From the ascendancy of Bilat He will come who treads the dawn
Tramples the sun beneath his feet And judges the souls of men
He will stride ... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.