text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Karl Koscher – @supersat
Eric Butler – @codebutler
Writing, building, loading, and using code on SIM Cards.
Toorcamp 2012!
Hacker camp on WA coast
Project: Run a GSM network.
My task: Procure SIM Cards.
2
“Subscriber Identity Module”
Contains an identity (IMSI)
and symmetric key (Ki).
“Secure” ... | pdf |
1
Certified Pre-Owned
背景
什么是PKI?
Active Directory 证书服务 (AD CS)
AD CS ⻆⾊包括以下⻆⾊服务:
认证机构
证书颁发机构 Web 注册
Online Responder
⽹络设备注册服务 (NDES)
证书注册 Web 服务 (CES)
证书注册策略 Web 服务
常⻅的CA 层次结构
环境搭建
ESCN复现-域管理员的提权
攻击路径
漏洞分析
漏洞利⽤
ESCO
攻击路径
漏洞复现
ESCP
攻击路径
漏洞复现
ESCQ
ESCS
ESCT
ESCV
ESCW
漏洞分析
2
漏洞复现
域持久性
漏洞分析
漏洞利⽤
Certified Pre-Owned是安全研究员@(... | pdf |
Compromising online services by
cracking voicemail systems
Martin Vigo
@martin_vigo | martinvigo.com
Martin Vigo
Product Security Lead
From Galicia, Spain
Research | Scuba | Gin tonics
@martin_vigo - martinvigo.com
Amstrad CPC 6128
Captured while playing “La Abadía del crímen”
History
Year 1983
“Voice Mail” patent... | pdf |
Don M. Blumenthal
Defcon 16
Defcon 16
Las Vegas, Nevada
August 9, 2008
g
© 2008 – Don M. Blumenthal
Opinions expressed are my own and intended
f
i f
ti
l
Th
h
ld
t
for informational purposes. They should not
be attributed to any organization or used as a
substitute for direct legal or technical advice.
g
Laws va... | pdf |
利用$_COOKIE写过D盾马(php 7.x + 菜刀很配哦)
oxo1 前言
之前就在土司发过一篇利用 $_COOKIE 过D盾的文章、同时利用setcookie的写法投稿过圈子。发现 D盾
好像对 $_COOKIE 不怎么敏感、完全可以利用来过D盾。之前一直在想菜刀要怎么连接 php 7.x 的
webshell、修改下 caidao.conf 就可以连接了。这次主要的目的是菜刀连接php 7.x 的webshell...
oxo2 编写
1)修改菜刀、方便连接 php 7.x
2)编写Webshell
之前发在土司的webshell
已经被扫出、级别为:1
<?php
@$a = $_COOKIE[1];
$b = '';
... | pdf |
1
DEFCON 2018 USA
ALEXANDRE BORGES
RING 0/-2 ROOKITS :
COMPROMISING
DEFENSES
DEFCON 2018 - USA
ALEXANDRE BORGES - MALWARE AND SECURITY RESEARCHER
PROFILE AND TOC
TOC:
• Introduction
• Rootkits: Ring 0
• Advanced Malwares and Rootkits: Ring -2
• Malware and Security Researcher.
• Consultant, Instructor and Speaker ... | pdf |
cat /config/etc/sangfor/ssl/httpd.conf | grep -e "^\s*LoadModule"
mpm_worker_module modules/mod_mpm_worker.so //
-httpd.conf
0x00 httpd.conf
auth_kerb_module modules/mod_auth_kerb.so //kerberos
authn_core_module modules/mod_authn_core.so //httpbasicldap
authz_user_module modules/mod_authz_user.so //
authz_core_... | pdf |
Airsnarf
Why 802.11b Hotspots Ain’t So Hot.
Coming up...
• Disclaimer
• Example hotspot setup & weakness
• Rogue APs
• Demo of Airsnarf
• Defense strategies
Disclaimer
• This presentation and example software are
intended to demonstrate the inherent
security flaws in publicly accessible
wireless architectures and p... | pdf |
Automated Malware Similarity Analysis
Daniel Raygoza
General Dynamics Advanced Information Systems
1
Friday, June 26, 2009
Disclaimers
(they seem like a good idea)
• This project and presentation are my own personal work, and they are
not a product of (or approved by) General Dynamics (GD) or its
customers.
• Anythin... | pdf |
End
End--to
to--End
End
Voice Encryption
Voice Encryption
over GSM:
over GSM:
A Different Approach
Wesley Tanner
Nick Lane-Smith
Keith Lareau
www.CellularCrypto.com
About Us:
Wesley Tanner
- Systems Engineer for a Software-Defined
Radio (SDRF) company
- B.S. Electrical Engineering from RPI
Nick Lane-Smith
- Security... | pdf |
Discovering and Triangulating Rogue Cell Towers
Eric Escobar, PE
Security Engineer
Reddit: jaycrew
A bit about me:
•
Started off in Civil Engineering (MS, PE)
•
Always loved computers
•
Nerded out on all things wireless
•
Licensed HAM
•
I love to automate things
•
Chicken coop
•
Sprinklers
•
Caught the DEF CON bug
•
Wi... | pdf |
Abusing Adobe Reader’s
JavaScript APIs
Brian Gorenc, Manager, Vulnerability Research
AbdulAziz Hariri, Security Researcher
Jasiel Spelman, Security Researcher
Agenda
• Introduction
• Understanding the Attack Surface
• Vulnerability Discovery
• Constructing the Exploit
Introduction
Introduction
4
HP Zero Day Initi... | pdf |
0x0000
a great fool in my life i have been
i have squandered 'til pallid and thin
hung my head in shame
and refused to take blame
for the darkness i know i've let win
j knapp
VulnCatcher:
Fun with Programmatic Debugging
atlas
atlas@r4780y.com
http://atlas.r4780y.com
0x0001 Who am I
● Scattered past in computing
● In... | pdf |
Medical device security
-- Anirudh Duggal
Disclaimer:
The views in the presentation are entirely my own and do not reflect the views of my employer.
Before we begin
• Thank you HITCON
• Specially thank the organizing team
• Jal , Pineapple, Turkey, Shanny, Shang and all the people whom I’ve
troubled till now
About me... | pdf |
Charged by an Elephant
An APT Fabricating Evidence to Throw You In Jail
Tom Hegel
Senior Threat Researcher
tomhegel
Juan Andres Guerrero-Saade
Senior Director of SentinelLabs
juanandres_gs
Planted Modi
Assassination Plot
Ltr_1804_to_CC.pdf
Planted ‘Domestic Chaos’ Plans Document
Ltr_2_Anand_E.pdf
11 Days... | pdf |
Golang中的SSTI
Go的标准库⾥有两个模板引擎, 分别是 text/template 和 html/template , 两者接⼝⼀致, 区别在于 html/template ⼀般⽤于⽣成
HTML 输出, 它会⾃动转义 HTML 标签, ⽤于防范如 XSS 这样的攻击。
0x01 init...
从⼀个题⽬⼊⼿:
先把题⽬的代码敲出来。
package main
import (
"bufio"
"html/template"
"log"
"os"
"os/exec"
)
type Program string
func (p Program) Secret(test string) string {
... | pdf |
1
WMCTF 2022 部分 WRITEUP
前⾔
WEB
subconverter
RCE?
⽂件写⼊
任意⽂件读取
构造quickjs脚本
RCE 链
RCE!
⼩插曲
easyjeecg
Java
ssrf
spark
bash延时"注⼊"
交互shell
6166lover
信息泄露
代码审计
cpython简单的沙箱逃逸
数据恢复?
k8s 容器逃逸
PWN
Ubuntu
MISC
Hacked_by_L1near
permessage-deflate
Checkin
2
作者:⽩帽酱
这次WMCTF拿了3个⼀⾎
题⽬设计⾮常有趣 其中还有⼏个0day 很多实际渗透遇到的问题也考虑到了
题⽬给了⼀个开源的代理订阅... | pdf |
2019/2/26
GET来的漏洞 | WooYun知识库
http://www.anquan.us/static/drops/web-7112.html
1/10
GET来的漏洞
呆子不开口 (/author/呆子不开口) · 2015/07/15 10:04
0x00 前言
这篇文章主要讲目前互联网上get方法被不规范使用带来的一些安全漏洞。其中重点会讲get请求在账号登陆体系中被滥用
的场景和攻击方式。
0x01 Get方法的定义
在客户机和服务器之间进行请求-响应时,两种最常被用到的方法是:GET 和 POST
GET - 从指定的资源请求数据
POST - 向指定的资源提交要被处理的数据
GET 方法的查询字符串是... | pdf |
Exploit Archaeology
First in the series of talks on excavating and
exploiting retro hardware.
I promise the talk will get technical.
Who am I?
• Penetration Tester
• Geek Dad
• Amateur Phone Phreak
• @savant42 on the twitters
Who I’m not.
• Leet.
• A programmer.
• A reverse engineer-er.
• A speller.
Why this talk?
Fro... | pdf |
爱奇艺安全攻防实践
李劼杰
About Me
• 爱奇艺 安全云 SRC 负责人
• WooYun 白帽子 Rank TOP 10
• 腾讯 TSRC 2016 年度漏洞之王
李劼杰
http://www.lijiejie.com
subDomainsBrute / BBScan / githack / htpwdScan
Agenda
• 漏洞扫描
• 威胁感知
• 入侵检测
• 堡垒机
• 渗透测试
扫描器
现状
• 小机房端口策略过于宽松
• 资产变更频繁
• 服务间依赖复杂
20万+
开放端口
300万+
设计目标
稳定 高效
误报率低
高危漏洞覆盖全
任务管理合理
30 个扫描节点
每月完成约1亿次插件扫描
扫描组件
We... | pdf |
自动化生成器
前面核心的内容跑通了,后面自动化生成就是理所当然的,这方面没什么困难的,就是注意一下加一些
对抗的东西,比如生成的源码里面的字符串全部加密,用于加解密shellcode的key全部随机化生成。将
源码一起打包,并告诉编译方式,这样即使生成的dll被杀了也没关系,自己改改又可以继续了。
一些核心功能:
收集一些白加黑文件,制作成模板
解析白文件pe,将shellcode写入证书目录
根据模板来生成劫持dll
自动调用go命令进行编译
自动打包成zip
里面最麻烦的就是自动编译,因为服务器是linux,而要生成windows的程序,并且在go里面使用了
cgo,不可避免的,要使用交叉编译器了。
找了找资料,用mingw-w... | pdf |
%2F 构造路径穿越, exp 如下
bytedance 2022 Nu1L
Compare
from pwn import *
import random
from fractions import Fraction
from Crypto.Util.number import *
CHALLENGE_ID = 'c34409b34458e108242ea271d5126481'
r = remote(CHALLENGE_ID + '.2022.capturetheflag.fun', 1337,
ssl=True)
context(log_level='debug')
MSG = b'MSG//2**512==0... | pdf |
Home Invasion 2.0
Attacking Network-Connected Embedded Devices
0. Abstract
1. Introduction
2. Methodology for devices evaluated
2.1 Belkin WeMo switch
2.2 MiCasaVerde VeraLite
2.3 INSTEON Hub
2.4 Karotz Smart Rabbit
2.5 Linksys Media Adapter
2.6 Lixil Satis Smart Toilet
2.7 Radio Thermostat
2.8 Sonos Bridge
3. Results
... | pdf |
1
A
REALLY,
REALLY
BRIEF
HISTORY
OF
DCG
REALLY
…
WE’RE
GETTING
TO
THE
PANEL
2
3
GROUP
UP
4
5
FINDING OTHER
HACKERS WAS
HARD
2 0 7
6
5 0 3
7
2 0 6
8
??
9
91 active Defcon Groups worldwide
..and growing again!
10
d C g
11
12
dcgroups{at}defcon(døt)org
13
d... | pdf |
Liar! Macs have
no viruses!
-[ OS X Kernel Rootkits ]-
§ Don't take me too seriously, I fuzz the Human brain!
§ The capitalist "pig" degrees: Economics & MBA.
§ Worked for the evil banking system!
§ Security Researcher at COSEINC.
§ "Famous" blogger.
§ Wannabe rootkits book writer.
§ Love a secon... | pdf |
Can You Trust Autonomous Vehicles:
Contactless Attacks against Sensors of
Self-driving Vehicle
Jianhao Liu 360 ADLAB SKY-GO Team
Chen Yan Zhejiang University
Wenyuan Xu Zhejiang University & University of South Carolina
Paddy Liu
Director of Qihoo360 ADLAB
SKY-GO Team Vehicle Cyber Security
Jianhao Liu is a seni... | pdf |
Emula&on
based
analysis
using
binary
instrumenta&on
Applica&on
on
CTF
1
SPEAKERS
2
Myunghun
Cha
• From
Republic
of
Korea
• POSTECH
senior
student
majoring
CSE
• Team
Leader
of
PLUS
• CODEGATE
2009
Hacking
Contest
3rd
place
• DEFCON
2009 ... | pdf |
收到情报->追番ing->顺便看看->认证绕过
git clone https://github.com/ehang-io/nps.git
git pull
⼀些本信息
框架:beego
⽂档:docs/api.md
直奔鉴权逻辑去 -> web/controllers/base.go
默认情况下auth_key配置是注释掉的,本能的想到获取到值可能为空,那结合时间戳算⼀下
md5Key,认证就绕过了,实际测试也是如此:
代理⼯具nps认证绕过
Done | pdf |
•
1$1
•
+110@1101
•
•
-
•
•
0011
•
@21
- &-
•
-- &---
•
- -- &
•
:-&---
•
---
//(/(/) )
•
/
•
/)-))
•
/(/)
•
./-/)///
•
/
•
/ / /( /) .
..
•
.
•
..
•
..
•
•
. .
•
. ....
...
1.+0
•
.1.,.,.
•
.+..10. A 3 2. 21 3 2. ,.
•
1.0...2,3 A ,2 8. ..3
•
2. .1
•
8.. ,22. 1. +0 +20 8,.
.(
•
( /.
•
(.
•
A/
•
/A/... | pdf |
1
Bypass Antivirus Dynamic Analysis
Limitations of the AV model and how to exploit them
Date of writing: 08/2014
Author: Emeric Nasi – emeric.nasi[at]sevagas.com
Website: http://www.sevagas.com/
License: This work is licensed under a Creative Commons Attribution 4.0 International License
Note: This paper requir... | pdf |
极棒跨次元 CTF 初赛解题报告
本队伍承诺诚信比赛,比赛期间,队伍之间不互相交流思路和 Flag。本队伍承诺题目包
中的所有内容仅用于信息安全学习,不用于任何其它恶意用途。本报告均由本队伍独立完成。
队伍: Nu1L
提示:题目名称后面的数字为本题总分数,详细评分规则请见题目包内部 ReadMe。题
目不分先后顺序。
SignIn-10
Flag:flag{Geekpwn2016}
直接修改高度
Only a JPG-150
Flag:flag{fight_on_the_stage}
解题步骤:
提取 MP4 文件
SecretCode-150
Flag:
解题步骤:
这题用 ollvm 混淆了下,写了段代码直接爆破,从-2147... | pdf |
企业安全架构概述
An Introduction of Enterprise Security Architecture
北海之帝为忽,南海之帝为倏,中央
之帝为混沌。忽与倏时相与遇于混沌之地,
混沌待之甚善。忽与倏谋报混沌之德,曰:
“人皆有七窍,以视听食息,此独无有,尝
试凿之。”日凿一窍,七日而混沌死。
--
庄子.应帝王
一些问题
什么是企业安全架构
几种常见模型
企业安全架构实践
企业安全建设中的一些问题
•
如何保证与战略和业务一致性
•
如何体现价值交付
•
如何评估投入产出
•
大系统的复杂度
•
一处失效,全盘皆输?
•
如何避免重复投入
•
管理和技术脱节?
•
技术应用和运维失效
系统论与系统工程
*SYSTE... | pdf |
2021 强⽹杯 Writeup - Nu1L
2021 强⽹杯 Writeup - Nu1L
Web
Hard_Penetration
pop_master
WhereIsUWebShell
EasySQL
[强⽹先锋]赌徒
Hard_APT_jeesite
[强⽹先锋]寻宝
EasyWeb
EasyXSS
Misc
BlueTeaming
ISO1995
签到
CipherMan
ExtremelySlow
问卷题
EzTime
Pwn
baby_diary
EzCloud
notebook
[强⽹先锋]orw
[强⽹先锋]no_output
babypwn
pipeline
[强⽹先锋]shellcode
Reverse
ez... | pdf |
通用型漏洞的应急响应
主讲人: 钟武强
腾讯安全应急响应中心(TSRC)负责人
关于我
• 钟武强(小五),微信号Mark4z5
• 腾讯安全应急响应中心(TSRC)负责人
• 广东省信息安全测评中心 —> 百度 —> 腾讯
• 十多年安全经验,擅长应急响应、渗透测试
关于腾讯
• 中国最大互联网公司,全球市值排名第五
• 产品众多,形态多样化
• 超十亿用户,超百万台服务器
安全风险分类
账号风险
欺诈风险
etc..
漏洞攻击风险
DDOS攻击风险
etc..
办公网攻击风险
员工违规风险
etc..
业务安全
应用运维安全
内部安全
漏洞Case 1... | pdf |
autocoinapp
0x00
autocoin
appapp
IOSJSBOX
0x01
1. autocoinvpshttp
2. VPShttp
3. jsboxAPPjshttp
vpshttpnginxhttpvpshttpflask
0x02 VPShttp
flaskautocoin
jsbox
from flask import Flask
from flask import request
from flask import jsonify
import json
app = Flask(__name__)
##
@app.route('/getconf',methods=['GET'])
def ... | pdf |
© 2008 Security-Assessment.com
SCADA
Fear, Uncertainty, and the Digital Armageddon
Presented By Morgan Marquis-Boire
© 2007 Security-Assessment.com
Whois
Hi, My Name is Morgan
© 2007 Security-Assessment.com
Whois
Hi, My Name is Morgan
I’m a security guy
© 2007 Security-Assessment.com
Whois
Hi, My Name is Morgan
I’m a s... | pdf |
Android Proguard 混淆对抗之我见
关于何为 Proguard,可以参考 GuardSquare 官网其优化业务及 Wikipedia 相关条目.
Proguard:https://www.guardsquare.com/proguard
Wikipedia:https://en.wikipedia.org /wiki/ProGuard
局部敏感哈希与 Proguard 混淆对抗
2017 年 6 月,Richard Baumann 发表了标题为"Anti-ProGuard: Towards Automated
Deobfuscation of Android Apps"(DOI:10.1145/30... | pdf |
How To Get Your FBI File
(and Other Information You Want
From the
Federal Government)
DEF CON 18
July 30, 2010
What’s the FOIA?
The Freedom of Information Act is a law that
lets anyone ask for records from federal
agencies.
An agency has to give you the stuff you ask for
unless it thinks that there’s a good reaso... | pdf |
Hijacking Arbitrary .NET
Application Control Flow
Topher Timzen
Security Researcher, Intel
Security Trainer
TopherTimzen.com
@TTimzen
#whoami
Overview
.NET?
Runtime Attacks
Modify Control Flow
Machine Code Editing
Managed Heap
Tools Released
Use .NET to attack
Using Objects on the Heap
Why are we... | pdf |
Pen-testing Wi-Fi
Defcon 2007
Aaron Peterson
"What you talking about, Willis?”
We're talking about …
● Pen-testing Wi-Fi with a new wireless
auditing tool:
**Wicrawl**
● Who am I
● Current state of Wi-Fi scanning
● Wi-Fi Penetration testing
● How Wicrawl can help
● How it works
● Use cases and examples
● Screenshot... | pdf |
Weaponize GhostWriting Injection
Code injection series part 5
Prerequisites: This paper requires some knowledge about Windows system programming. Also, it is
mandatory to be familiar with concepts presented in Code injection series part 1.
License : Copyright Emeric Nasi , some rights reserved
This work is license... | pdf |
大陆浏览器安全
宋雷
1
大陆浏览器市场特点
• 面临安全问题与国际市场迥异
• 由于金山/腾讯/360,导致漏洞补丁很快,0day几
乎不会规模性出现。
• 主要威胁为:小成本钓鱼,下载欺骗,点对点社
会工程(网购诈骗)
2
金山网络在浏览器安全的积累
• 2009年,我们在业界率先推出了首款基于浏览器
的专业防护产品 - 金山网盾
• 除360以外的国内主流浏览器产品安全技术几乎全
部基于金山云开放平台开发
• 金山毒霸在网购保护方面做出了诸多的创新,如
敢陪模式等
3
遨游浏览器
(Maxthon)
金山云开放平台
搜狗浏览器(Sogou)
360云平台
360浏览器
4
• 在做安全的路上,我们反复在思考... | pdf |
探索一切、攻破一切
[ Hacker@KCon ]
9/6/2016 3:01:52 PM
0
探索一切、攻破一切
[ Hacker@KCon ]
伪基站高级利用技术
——彻底攻破短信验证码
Seeker
BD4ET
9/6/2016 3:01:54 PM
1
日程
• 个人简介
• 手机通信安全概述
• LTE伪基站的实现
• GSM MITM攻击的实现
• 短信验证码的脆弱性
• 安全建议
9/6/2016 3:01:54 PM
2
个人简介
• 连续创业失败的创业导师
• 伪天使投资人
• 某非知名私立大学创办人兼校长
• 业余时间在本校通信安全实验室打杂
• 个人微信:70772177
9/6/2016 3:02:42 PM... | pdf |
open
0x00
open
0x01
open https://www.baidu.com//System/Applications/Maps.app
mapsapp
1. maps.app
2. urlmaps
open "https://www.baidu.com/System/Applications/Calendar.app"
calendar
urlurlcalendar
0x02
app
1. appurl
2. appurl
app
open "https://xxxxx"
open "/Applications/Safari.app" "http://xxxxx"
xxx
app
applemusic... | pdf |
From BUG to 0day – Busting the perimeter
egghunter_wtf = (
“%JMNU%521*TX-1MUU-1KUU-5QUUP\AA%J"
"MNU%521*-!UUU-!TUU-IoUmPAA%JMNU%5"
"21*-q!au-q!au-oGSePAA%JMNU%521*-D"
"A~X-D4~X-H3xTPAA%JMNU%521*-qz1E-1"
"z1E-oRHEPAA%JMNU%521*-3s1--331--^"
"TC1PAA%JMNU%521*-E1wE-E1GE-tEtFPA"
"A%JMNU%521*-R222-1111-nZJ2PAA%JMN"
... | pdf |
近場狩獵
Hunting in the Near Field
Android平台上NFC相關漏洞的研究
An Investigation of NFC-related bugs of Android
360阿爾法實驗室 趙奇
Qi Zhao from 360 Alpha Team
360 ALPHA
關於講者 About the Speaker
• @JHyrathon
• 360阿爾法實驗室 安全研究員 Security Researcher of 360 Alpha Team
• 專注於Android組件安全,NFC、多媒體、IPC通訊(Binder)
均有涉獵
Focuses on the security of compon... | pdf |
目录
致谢
前言
目录
第一课:windows提权-快速查找exp
第二课:Linux提权-依赖exp篇
第三课:Delphi代码审计—项目实战1
第四课:Asp代码审计—项目实战2
第五课:工具介绍-Sqlmap
第六课:反攻的一次溯源—项目实战3
第七课:sqlserver常用操作远程桌面语句
第八课:模拟诉求任务攻击
第九课:工具介绍-the-backdoor-factory
第十课:msfvenom常用生成payload命令
第十一课:工具介绍Veil-Evasion
第十二课:基于UDP发现内网存活主机
第十三课:基于ARP发现内网存活主机
第十四课:基于第十课补充payload1
第十五课:基于第十课补充payload2... | pdf |
众测困住你的那些问题
jkgh006 | 众测资深玩家,多家众测平台TOP白帽
前 言
安全趋势的发展,现在已经变成三大阵容,一个是代表过去的传统漏洞平台,第二个是以乙方为
首的众测平台,以及以甲方主导的SRC平台 , 传统的漏洞平台慢慢的淡出视野,现在最火的莫过于
SRC和众测,所有的类型终将归为一种方法,所以对于其中众测也是有一套方法论,怎么分析,怎
么去绕,怎么去获取证据,等等都是有章可循,我们重点关注众测困住你的那些问题。
目录
01
拦截框架下注入的过程拆解
02
基于三方调用框架分析利用
03
趣味的SESSION和EXCEL
01
拦截框架下注入的过程拆解
越来越多的web系统,随着运维方安全意识的提高... | pdf |
前⾔
在域内,有很多种⼿法可以获取域控权限,包括不限于利⽤溢出类的漏洞如ms17-010、抓取域管密码,当然也有
今天的主⻆,利⽤ntlm relay。ntlm relay⼿法有很多,⽐如利⽤WPAD、LLMNR等“被动性”攻击,利⽤打印机等
“主动性”攻击,核⼼就是中继了他⼈的net-ntlm。但是呢,利⽤⼯具监听的都是本地445端⼝,受害者机器与我们
通信的也是445端⼝,⽽在windows上445端⼝是占⽤的,难道利⽤ntlm relay⼿法只能基于linux机器?
攻击过程
⾸先把受控机的445端⼝流量重定向到受控机⾃⼰的8445端⼝,然后把受控机的8445端⼝转发到⿊客机器的445端
⼝上,⿊客机器利⽤受控机的socks代... | pdf |
E VA DING
E DR
A C O M P R E H E N S I V E G U I D E T O D E F E A T I N G
E N D P O I N T D E T E C T I O N S Y S T E M S
M A T T H A N D
placeholder
NOT FINAL
EARLY
ACCESS
NO S TA RCH PR E S S
E A R LY ACCE S S PROG R A M:
F E E DBACK W E L COME !
Welcome to the Early Access edition of the as yet unpub... | pdf |
1
KWs ⼩⽩备忘录
前⾔
简介&&基础知识
暴漏⾯梳理
etcd-未授权访问
kube-apiserver未授权访问
kubelet未授权访问
kWs dashboard认证绕过(CVE-OLNW-NWOTQ)
docker未授权访问
kube-proxy配置错误
参考⽂章
致谢
最近做了⼀个某央企的内部攻防项⽬,在这种项⽬中⼜⼀次深深体会到⾃⼰的菜,加之⾃⼊球以来⼀直
没有发过⽂章,主管都准备踢我出球了,所以特地⽔⼀篇⽂章。
找了找星球还没有k8s之类的⽂章,于是⽔⽂章思想更重。
之前从来没怎么接触过k8s,但是随着云原⽣以及微服务架构的兴起,云原⽣必定是攻防重点,很多⾯试
也会问k8s的渗透经验。这次侥幸⼊内⽹后也正好发现... | pdf |
Digital Vengeance
Exploiting the Most Notorious C&C Toolkits
@professor__plum
Disclaimer
The views expressed herein do not necessarily state or reflect the views of
my current or former employers.
I am not responsible for any use or misuse of the information provided.
Implementation of the information given is at y... | pdf |
1
ASP.NET下的内存⻢(⼀):filter内存⻢
前⾔
过程
总结
@yzddmr6
asp.net下的内存⻢研究⽂章⽐较少,⽬前提到过的包括虚拟路径内存⻢以及HttpListener内存⻢。周末
研究了⼀下其他类型的内存⻢,发现.net可以利⽤的地⽅要多得多。所以准备写个系列⽂章,讲⼀讲
asp.net下的内存⻢。
⽂章仅作研究性质,不保证任何实战效果,请勿⽤于⾮法⽤途。
java下有filter,servlet等拦截器,asp.net mvc也有同样类似的机制。
在rider中新建⼀个asp.net web项⽬,默认就会起⼀个asp.net mvc的项⽬。
前⾔
过程
2
根⽬录下有个 Global.asax... | pdf |
Privacy in DSRC connected
vehicles
Defcon 21 – August 3, 2013
whoami
• BSEE, digital communications
• Many years as a network engineer
• Santa Clara University Law student
• Research assistant providing technical expertise
on privacy audits and reviews
• Contracted by auto consortium to review
privacy of proposed ve... | pdf |
PASSIVE BLUETOOH
MONITORING IN SCAPY
Ryan Holeman
AGENDA
• bluetooth essentials
• fundamental projects
• scapy-btbb project overview
• demo
ESSENTIAL
BLUETOOTH
• bluetooth is a frequency
hopping protocol
ESSENTIAL
BLUETOOTH
• BTBB - bluetooth baseband
• air traffic between master
and slave bluetooth devices
ESSENTIAL... | pdf |
The WorldWide WarDrive:
The Myths, The Misconceptions, The Truth, The Future
Chris Hurley aka Roamer
History
•I was talking with The Watcher on the Netstumbler
Forums and found out we live relatively close to each
other.
•We thought it would be fun to try to coordinate a
WarDrive to cover the entire city of Baltimo... | pdf |
前5个加密字符还原, 请看龙哥的文章
SO逆向入门实战教程九——blackbox
https://blog.csdn.net/qq_38851536/article/details/118115569
打开ida, 从sub_3B3C方法继续向下分析
我们一步一步看:
首先是v19的赋值
1
uint8x8_t v19; // d16
2
v19.n64_u32[1] = *(_DWORD *)"6789BCDFGHJKRTVWMNPQ567";
3
uint8x8_t 的结构体如下:
这里用到了 ARM NEON 编程
https://www.cnblogs.com/xylc/p/5410517.html
DCD 4个字节
DC... | pdf |
GNU Readline Library User Interface
Edition 6.1, for Readline Library Version 6.1.
October 2009
Chet Ramey, Case Western Reserve University
Brian Fox, Free Software Foundation
This manual describes the end user interface of the GNU Readline Library (version 6.1,
9 October 2009), a library which aids in the consistency ... | pdf |
Module 1
A journey from high level languages, through
assembly, to the running process
https://github.com/hasherezade/malware_training_vol1
Introduction
PE injections in malware
• At various stages of execution, malware may inject its implants to other processes
• Typical goals: process impersonation, API hooking
• Ev... | pdf |
基于历史行为的异常检测
O365怎样反击内部恶意攻击
Lei He
Principal Engineering Manager, Microsoft Corporation
2019-05-30
Office365安全要求
* 客户密码箱入门只能用于访问客户数据的企业服务.
•
无法使用Corp身份进行解密或访问,
所有访问要求2FA
•
背景调查及安全培训
•
用户数据和运作中心隔离
•
零永久访问权限
•
客户密码箱和BYOK
•
基于ETW的详细原始遥测技术,能够在
<1天内测量新的遥测技术
•
集中处理会在15分钟内发出警报,以解
决安全问题
•
每天至少1次攻击模拟服务以验证监视/
响应
•
能够在<15分钟内触发安全响... | pdf |
1
Abstract
This paper will examine how DTrace, a kernel-
based dynamic scriptable tracer, can be
effectively used for reverse engineering tasks.
DTrace offers an unprecedented view of both
user and kernel space, which has many
interesting implications for security researchers.
In this paper we will introduce DT... | pdf |
Response Smuggling:
Exploiting HTTP/1.1 Connections
Martin Doyhenard
Onapsis
mdoyhenard@onapsis.com
Abstract
Over the past few years, we have seen some novel presentations re-introducing the concept of
HTTP request smuggling, to reliably exploit complex landscapes and systems.
With advanced techniques, attackers were a... | pdf |
A Linguistic Platform for
A Linguistic Platform for
Threat Development
Threat Development
Ben Kurtz
Ben Kurtz
Imperfect Networks
Imperfect Networks
Introduction
Introduction
By applying programming language theory to the
By applying programming language theory to the
development of new networks attacks, we can
d... | pdf |
Attacking the macOS Kernel
Graphics Driver
wang yu
Didi Research America
- About me
- Background
Pluto Flyby: The Story of a Lifetime, NASA, 2016
New Horizons Team Reacts to Latest Image of Pluto, NASA, 2015
9 Years, 3 Billion Miles: The Journey of New Horizons
- Weapon X rootkit
- Rubilyn rootkit
- OS X/Crisis DAVINCI... | pdf |
西湖论剑 WP-Nu1L
WEB
HardXSS
网站就 dns 爆破 + 提交 xss + 管理员登录三个功能, 用了两个域名`xss.xss.` , `auth.xss.`
题目有句话 `我收到邮件后会先点开链接然后登录我的网站!` , 这么一看这个题应该是需要作
一个 xss 持久化的. xss 持久化就两种方式 serviceworker, 和 cache. cache 在这个题目里面没
法控制, 所以就得 serviceworker. 要用 serviceworker 就得找一个能 xss 的点, 去注册这个
serviceworker.
这里我们看代码发现一个 jsonp, 而且没有过滤, 于是就用这个路由做 ... | pdf |
IPv6@ARIN
Matt Ryanczak
Network Operations Manager
IPv6 Timeline
IETF starts
thinking about
successors to
IPv4.
1990
IETF forms IPNG
area
RFC 1475
TP/IX
RFC 1550
IPng Paper
Solicitation
1993
RFC1817
CIDR and Classful
Routing
RFC 1883
Draft IPv6 Spec
1995
6bone started
RFC 1970
Neighbor
Disco... | pdf |
@patrickwardle
I got 99 Problems, but
Little Snitch ain’t one!
WHOIS
“leverages the best combination of humans and technology to discover
security vulnerabilities in our customers’ web apps, mobile apps, IoT
devices and infrastructure endpoints”
@patrickwardle
security for the
21st century
career
hobby
making li... | pdf |
Picking Electronic Locks
Using TCP Sequence
Prediction
Ricky Lawshae 2009
3/25/2009
1
OSCP, GPEN
Network Technician for Texas State University
Have been working with electronic building access systems
for more years than I like to think about
Who am I?
3/25/2009
2
Testing of security of building access syste... | pdf |
YOU’RE DOING IOT RNG
• Random numbers are very important to security
• Encryption keys
• Authentication tokens
• Business logic
• Computers are notoriously bad at making random numbers
• They inherently only do deterministic functions
• Hardware RNG
• Makes entropy
• Solves the problem… right?
RANDOM NUMBERS
DOING RNG... | pdf |
Remote Attacks Against SOHO Routers
08 February, 2010
Craig Heffner
Abstract
This paper will describe how many consumer (SOHO) routers can be exploited via DNS re-binding to
gain interactive access to the router's internal-facing Web based administrative interface. Unlike other
DNS re-binding techniques, this att... | pdf |
Demonstration of
Hardware Trojans
Fouad Kiamilev (Dr. K), Ryan Hoover, Ray
Delvecchio, Nicholas Waite, Stephen Janansky,
Rodney McGee, Corey Lange, Michael Stamat
Who We Are
We take pride in our junk drawers.
Crazy ideas are encouraged.
We can't tell you everything but you can still ask.
You simulate it - we build i... | pdf |
OpenBSD Remote Exploit
”Only two remote holes in the default install”
Alfredo Ortega, Gerardo Richarte
Core Security
April 2007
Abstract
OpenBSD is regarded as a very secure Operating System. This
article details one of the few remote exploit against this system. A
kernel shellcode is described, that disables the prote... | pdf |
Assessing Civilian Willingness to Participate in On-line
Political and Social Conflict
1
Tom Holt, Ph.D.
Assistant Professor
Michigan State University
Spartan Devils Honeynet Chapter
Max Kilger, Ph.D.
Profiler
The Honeynet Project
Political Conflict On and Off-Line
2
• There has been significant attention in popular m... | pdf |
1
企业、家庭智能家居安全解决⽅案
设计背景
智能家居品牌选择与⽤途
⽹络架构设想图
拓扑图实现效果
关于IOT设备的漏洞
autor:枕边⽉亮
随着IOT技术的发展,智能家居逐渐普及化。⽬前的智能家居⽅案也含盖了很多⽅⾯,⽐如智能中控、智能
⻔禁、智能灯光系统、智能窗帘系统、智能家电控制系统、智能暖通系统、智能安防系统、智能影⾳、甚
⾄拓展到了智能晾⾐、智能厨电等等。随着IOT设备的增多,对宽带、路由器要求逐渐提升,部分低端路由
器与⽹关设备⽆法满⾜⼤量设备的承载与连接。同时物联⽹设备安全没有引起明显重视,安全问题层出不
穷,于是⾃⼰尝试部署后,于是有了这⼀篇解决⽅案。
⽬前我⽐较推荐的品牌有:⼩⽶、homekit、超级智慧家、艾... | pdf |
1
Implementation of
Implementation of
Web Application Firewall
Web Application Firewall
OuTian <
OuTian <outian@chroot.org
outian@chroot.org>
>
2
Introduction
Introduction
Abstract
• Web 層應用程式之攻擊日趨嚴重,而國內多
數企業仍不知該如何以資安設備阻擋,仍在採
購傳統的 Firewall/IPS ,因此本場次即對
Web Application Firewall( 以 下 簡 稱
WAF)之功能、及實作方式作介紹
About OuTian
•... | pdf |
在不久前参加了一次众测项目,需对某厂商的系统进行漏洞挖掘
在测试一套系统时,发现了很有意思的接口,可以操作另外两个站的输出点,以此导
致多处 XSS 触发
0x01:初探 Vulnerabilities
系统的 URL 是这样的:https://xxx.com/passport/?fromUrl=https://xxx.com/
显然这样的 url 容易出现 Open Redirect XSS CRLF 注入的漏洞,其次还有以下这样
的参数:
redirect ref redirect_to redirect_url url jump jump_to target to link linkto
d... | pdf |
Attack the Key
Own the Lock
by datagram & Schuyler Towne
Defcon 18 (2010)
Las Vegas, NV
About Us
Datagram
– Forensic locksmith
– Douchebag
– No game shows :(
Schuyler
– TOOOL US
– NDE Magazine
– Wheel of Fortune
How Locks Work
How Locks Work
How Locks Work
How Locks Work
Key Control
Availability of blanks
Distr... | pdf |
PUBLIC
Persisting with Microsoft Office:
Abusing Extensibility Options
William Knowles
PUBLIC
Obligatory $whoami
• William Knowles
• Security Consultant at MWR InfoSecurity
• @william_knows
1
PUBLIC
Agenda
• DLL
• VBA
• COM
• VSTO
• Prevention and Detection
2
PUBLIC
Motivations
• It’s –everywhere- and it’s got lots of ... | pdf |
masSEXploitation
The Rook
http://ppdhuluperak.gov.my
Defaced!
… and the next day....
PHPNuke.org too!?
Eleonore Exploit Pack.
“What I cannot create, I do not
understand.”
– Richard Feynman
Why?
Overview
“Layers of
security.”
--Unkown
“Complexity is the
worst enemy of
security.”
--Bruce Schneier
ManageEngine Fir... | pdf |
Universal RF Usb Keyboard Emulation Device
URFUKED
-by Monta Elkins
monta.defcon @ geekslunch.com
version .08 6/2010
Updates at: http://www.hackerwarrior.com/urfuked
Updates at: http://www.hackerwarrior.com/urfuked
Hardware
Receiver
(plugged into spare USB port)
Quarter
“Teensy”
Microcontroller
RF receiver
On th... | pdf |
© 2011 NATO Cooperative Cyber Defence Centre of Excellence, June 2011 All rights reserved. No part of this pub-
lication may be reprinted, reproduced, stored in a retrieval system, or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording or otherwise, without the prior written permis... | pdf |
软
件
供
应
链
安
全
技
术
白
皮
书
透
视
软
件
供
应
链
,
携
手
应
对
安
全
挑
战
透视软件供应链,携手应对安全挑战
软件供应链安全
技术白皮书
软件供应链安全技术白皮书
2
关于绿盟科技
绿盟科技集团股份有限公司(以下简称绿盟科技),成立于 2000
年 4 月,总部位于北京。公司于 2014 年 1 月 29 日在深圳证券交易所
创业板上市,证券代码:300369。绿盟科技在国内设有 50 余个分支机构,
为政府、金融、运营商、能源、交通、科教文卫等行业用户与各类型企
业用户,提供全线网络安全产品、全方位安全解决方案和体系化安全运
营服务。公司在美国硅谷、日本东京、英国伦敦、新加坡及巴西圣保罗
设立海... | pdf |
HTTP Request Smuggling
in 2020
Amit Klein
Safebreach Labs
About Me
•
29 years in InfoSec
•
VP Security Research Safebreach (2015-Present)
•
30+ Papers, dozens of advisories against high profile products
•
Presented in BlackHat (3 times), DefCon (twice), Usenix, NDSS, HITB, InfoCom,
DSN, RSA, CertConf, Bluehat, OWASP G... | pdf |
前段时间补上了迟迟没有写的 ⽂件包含漏洞原理与实际案例介绍⼀⽂,在其中就提到了
Thymeleaf SSTI 漏洞,昨天在赛博群⾥三梦师傅扔了⼀个随⼿挖的 CVE——Thymeleaf SSTI
Bypass,想着之前项⽬的代码还没清理,⼀起分析来看看
Thymeleaf 是与 java 配合使⽤的⼀款服务端模板引擎,也是 Spring 官⽅⽀持的⼀款服务端模板
引擎。⽽ SSTI 最初是由 James Kettle 提出研究,后来 Emilio Pinna 对他的研究进⾏了补充,然
⽽,这些作者都没有对 Thymeleaf 进⾏ SSTI 漏洞挖掘,因此后来 Aleksei Tiurin 在 ACUNETIX
的官⽅博客上发表了关... | pdf |
Bypassing the ‘secureboot’ and
etc on NXP SOCs
Yuwei ZHENG, Shaokun CAO, Yunding JIAN, Mingchuang QIN
UnicornTeam, 360 Technology
Defcon 26
About us
• 360 Technology is a leading Internet security company in China. Our
core products are anti-virus security software for PC and cellphones.
• UnicornTeam (https://unicorn... | pdf |
AFTER SESTA
SEX WORK
DEFCON 26
MAGGIE MAYHEM
@MsMaggieMayhem
2018
WHEN SEX WORKER RIGHTS ARE UNDER
ATTACK, WHAT DO WE DO?
GET DRESSED, FIGHT BACK!
Sex Worker Rights Labor Chant
SEX WORK AFTER SESTA
SEX WORK AFTER SESTA
ABOUT ME
▸ Sex Worker, Birth Worker, Death Worker
▸ Based in San Francisco, CA
▸ Founder of Harm... | pdf |
WHITE PAPER
UWB Real Time Locating
Systems: How Secure
Radio Communications
May Fail in Practice
AUTHORS
Andrea Palanca
Luca Cremona
Roya Gordon
About
Nozomi Networks
Labs
Nozomi Networks Labs is dedicated to reducing cyber risk for
the world’s industrial and critical infrastructure organizations.
Through its c... | pdf |
看了看⾃⼰硬盘⾥下载的很多markdwon,pdf,ppt的资料,如果能对它们进⾏全⽂搜索的话,不就相当于是个
⾃⼰的⼩知识库吗。ES太重了,周末研究了⼀下,⾃⼰做了个玩具级别的全⽂索引,特点是轻量和占有资源⼩,只
运⾏⼀个exe就⾏。
索引⽀持⽂本,docx,ppt格式,pdf格式暂时不⽀持(没找到go解析pdf好⽤的库)。
⼀些技术细节的碎碎念:全⽂索引的原理就是建⽴⼀个 倒排索引 ,索引的时候建⽴倒排表,查询的时候根据倒排表
的数据做合并,打分,排序操作,再输出结果。温习了很多在学校时的数据结构,在这个时候来找我在当年⽋下的
债了,源码开源,这个源码还有很多可以优化的地⽅,能够进⼀步提升速度。
使⽤
使⽤很简单,就两步,先建⽴... | pdf |
My name is Yoshinori Takesako. It's very long
name. so call me "Yoshi". I came from Tokyo,
Japan.
1
I am a chairman of the SECCON. SECCON is a
largest security CTF contest in Japan. I am an
CTF organizer and a challenge creator. I am
also on the Open Web Application Security
Project - OWASP Japan advisory board.
... | pdf |
Memory Wars:
對記憶體攻擊手法與防禦技術的探討
Authorized Morphor distributor
Leo Liaw
數位資安系統股份有限公司
| 2
Agenda
記憶體漏洞
How Windows execute an
executable?
What is PE?
微軟防護記憶體攻擊的工具
(EMET)
EMET 版本沿革
EMET 的限制
EMET/ASLR 以外的工具
We need to do better
Before and After
3
|
記憶體漏洞
4
|
記憶體漏洞都是來自於載入可能錯誤的內容到程式中。
記憶體漏洞
• Intra-chunk heap ove... | pdf |
Time Turner
Hacking RF Attendance Systems
(To Be in Two Places at Once)
DEMO 1
?
?
?
Jacob Glueck
Ammar Askar
Aaron Wisner
Charles Cao
Prof. Bruce Land
(Advisor)
Cole Smith
https://github.com/wizard97/iSkipper
https://github.com/charlescao460/iSkipper-Software
(Transposition Cipher)
(Transposition Cipher)
Device ID Che... | pdf |
GAME OF CHROMES
Owning the Web with Zombie Chrome Extensions
Tomer Cohen
April 2016
Sign-up Graph
1000
RPM
9000
RPM
Sign-up Graph
1000
RPM
9000
RPM
Investigating Attack Patterns
10 Sec
Attack Page
Attack Page
Google Web Store
Extension
Course of Action
Inject Code
Into Facebook tabs
Open Wix Frame
Transparently ins... | pdf |
Michael Ligh, Malicious Code Engineer
Greg Sinclair, Rapid-Response Engineer
iDefense Security Intelligence Services
Malware RCE:
Debuggers and Decryptor Development
Topics
• How to script a debugger for malware RCE
• Almost all malicious code uses some form of obfuscation to
protect
» Strings
» Configurations
» Comm... | pdf |
Evolving Exploits
through Genetic
Algorithms
By soen
Who am I
! CTF Player
! Programmer
! Virus / Worm Aficionado
! Computer Scientist
! Penetration Tester in daylight
Exploiting Web
Applications
! Attack problems
! Driven by customer
! Small scope
! Limited time
! Report driven
! Attack met... | pdf |
AND OTHER FUN TRICKS
Snide / Owen
@LinuxBlog
github.com/PhreakMe (Latest Slides & Code)
Mandatory Disclaimer
The opinions expressed
in this presentation and
on the following slides
are solely those of the
presenter. There is no
guarantee on the
accuracy or
reliability of the
information provided
herein. ... | pdf |
March 23 2004
Coming of Age
The number isn’t important, friends have been saying when
I talk about turning sixty. Some say, age is only a state of
mind. Some say, you’re as young as you feel. Some say,
age doesn’t matter.
And some say, why, you look great! which unfortunately
confirms that there really are three stages... | pdf |
Story time!
Supply Acquisition
Circuit Interrupts around the house
≠ Purposes
GFCI: Intends to
prevent Electric Shock
AFCI: Intends to
prevent fires
Ground Fault CI
Arc Fault CI
Code Requirements
GFCI’s
•
Bathrooms/Indoor wet
locations
•
Garages/storage areas/non
habitable areas/unfinished
basements
... | pdf |
Staring into the Abyss:
The Dark Side of Crime Fighting, Security, and Professional Intelligence
Notes and Comments
WHY SECURITY SUCKS
As of 2010, Frost & Sullivan estimates that there are 2.28 million information
security professionals worldwide.
to which an experienced security practitioner replied:
“it sou... | pdf |
net user author /domain
Gabriel Ryan
Security Engineer @ Gotham Digital Science
Appsec | Penetration Testing | Red Team | Research
@s0lst1c3
gryan@gdssecurity.com
labs@gdssecurity.com
Target Identification Within A Red Team
Environment
Target Identification Within A Red Team
Environment
Well executed wireless attacks... | pdf |
CSRF Bouncing
By Michael Brooks
What?
This is an advanced talk on exploit chaning and
CSRF.
This will detail the process I used for finding and
writing an exploit chain against a real world
application.
This will also discuess using JavaScript to locate
targets to attack.
Prerequsite
You must already know how to e... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.