text
stringlengths
100
9.93M
category
stringclasses
11 values
Karl Koscher – @supersat Eric Butler – @codebutler Writing, building, loading, and using code on SIM Cards.  Toorcamp 2012!  Hacker camp on WA coast  Project: Run a GSM network.  My task: Procure SIM Cards. 2  “Subscriber Identity Module”  Contains an identity (IMSI) and symmetric key (Ki).  “Secure” ...
pdf
1 Certified Pre-Owned 背景 什么是PKI? Active Directory 证书服务 (AD CS) AD CS ⻆⾊包括以下⻆⾊服务: 认证机构 证书颁发机构 Web 注册 Online Responder ⽹络设备注册服务 (NDES) 证书注册 Web 服务 (CES) 证书注册策略 Web 服务 常⻅的CA 层次结构 环境搭建 ESCN复现-域管理员的提权 攻击路径 漏洞分析 漏洞利⽤ ESCO 攻击路径 漏洞复现 ESCP 攻击路径 漏洞复现 ESCQ ESCS ESCT ESCV ESCW 漏洞分析 2 漏洞复现 域持久性 漏洞分析 漏洞利⽤ Certified Pre-Owned是安全研究员@(...
pdf
Compromising online services by cracking voicemail systems Martin Vigo @martin_vigo | martinvigo.com Martin Vigo Product Security Lead From Galicia, Spain Research | Scuba | Gin tonics @martin_vigo - martinvigo.com Amstrad CPC 6128 Captured while playing “La Abadía del crímen” History Year 1983 “Voice Mail” patent...
pdf
Don M. Blumenthal Defcon 16 Defcon 16 Las Vegas, Nevada August 9, 2008 g © 2008 – Don M. Blumenthal Opinions expressed are my own and intended f i f ti l Th h ld t for informational purposes. They should not be attributed to any organization or used as a substitute for direct legal or technical advice. g Laws va...
pdf
利用$_COOKIE写过D盾马(php 7.x + 菜刀很配哦) oxo1 前言 之前就在土司发过一篇利用 $_COOKIE 过D盾的文章、同时利用setcookie的写法投稿过圈子。发现 D盾 好像对 $_COOKIE 不怎么敏感、完全可以利用来过D盾。之前一直在想菜刀要怎么连接 php 7.x 的 webshell、修改下 caidao.conf 就可以连接了。这次主要的目的是菜刀连接php 7.x 的webshell... oxo2 编写 1)修改菜刀、方便连接 php 7.x 2)编写Webshell 之前发在土司的webshell 已经被扫出、级别为:1 <?php @$a = $_COOKIE[1]; $b = ''; ...
pdf
1 DEFCON 2018 USA ALEXANDRE BORGES RING 0/-2 ROOKITS : COMPROMISING DEFENSES DEFCON 2018 - USA ALEXANDRE BORGES - MALWARE AND SECURITY RESEARCHER PROFILE AND TOC TOC: • Introduction • Rootkits: Ring 0 • Advanced Malwares and Rootkits: Ring -2 • Malware and Security Researcher. • Consultant, Instructor and Speaker ...
pdf
cat /config/etc/sangfor/ssl/httpd.conf | grep -e "^\s*LoadModule" ​ ​ mpm_worker_module modules/mod_mpm_worker.so // -httpd.conf 0x00 httpd.conf auth_kerb_module modules/mod_auth_kerb.so //kerberos authn_core_module modules/mod_authn_core.so //httpbasicldap authz_user_module modules/mod_authz_user.so // authz_core_...
pdf
Airsnarf Why 802.11b Hotspots Ain’t So Hot. Coming up... • Disclaimer • Example hotspot setup & weakness • Rogue APs • Demo of Airsnarf • Defense strategies Disclaimer • This presentation and example software are intended to demonstrate the inherent security flaws in publicly accessible wireless architectures and p...
pdf
Automated Malware Similarity Analysis Daniel Raygoza General Dynamics Advanced Information Systems 1 Friday, June 26, 2009 Disclaimers (they seem like a good idea) • This project and presentation are my own personal work, and they are not a product of (or approved by) General Dynamics (GD) or its customers. • Anythin...
pdf
End End--to to--End End Voice Encryption Voice Encryption over GSM: over GSM: A Different Approach Wesley Tanner Nick Lane-Smith Keith Lareau www.CellularCrypto.com About Us: Wesley Tanner - Systems Engineer for a Software-Defined Radio (SDRF) company - B.S. Electrical Engineering from RPI Nick Lane-Smith - Security...
pdf
Discovering and Triangulating Rogue Cell Towers Eric Escobar, PE Security Engineer Reddit: jaycrew A bit about me: • Started off in Civil Engineering (MS, PE) • Always loved computers • Nerded out on all things wireless • Licensed HAM • I love to automate things • Chicken coop • Sprinklers • Caught the DEF CON bug • Wi...
pdf
Abusing Adobe Reader’s JavaScript APIs Brian Gorenc, Manager, Vulnerability Research AbdulAziz Hariri, Security Researcher Jasiel Spelman, Security Researcher Agenda •  Introduction •  Understanding the Attack Surface •  Vulnerability Discovery •  Constructing the Exploit Introduction Introduction 4 HP Zero Day Initi...
pdf
0x0000 a great fool in my life i have been i have squandered 'til pallid and thin hung my head in shame and refused to take blame for the darkness i know i've let win j knapp VulnCatcher: Fun with Programmatic Debugging atlas atlas@r4780y.com http://atlas.r4780y.com 0x0001 Who am I ● Scattered past in computing ● In...
pdf
Medical device security -- Anirudh Duggal Disclaimer: The views in the presentation are entirely my own and do not reflect the views of my employer. Before we begin • Thank you HITCON • Specially thank the organizing team • Jal , Pineapple, Turkey, Shanny, Shang and all the people whom I’ve troubled till now About me...
pdf
Charged by an Elephant An APT Fabricating Evidence to Throw You In Jail Tom Hegel Senior Threat Researcher tomhegel Juan Andres Guerrero-Saade Senior Director of SentinelLabs juanandres_gs Planted Modi Assassination Plot Ltr_1804_to_CC.pdf Planted ‘Domestic Chaos’ Plans Document Ltr_2_Anand_E.pdf 11 Days...
pdf
Golang中的SSTI Go的标准库⾥有两个模板引擎, 分别是 text/template 和 html/template , 两者接⼝⼀致, 区别在于 html/template ⼀般⽤于⽣成 HTML 输出, 它会⾃动转义 HTML 标签, ⽤于防范如 XSS 这样的攻击。 0x01 init... 从⼀个题⽬⼊⼿: 先把题⽬的代码敲出来。 package main import ( "bufio" "html/template" "log" "os" "os/exec" ) type Program string func (p Program) Secret(test string) string { ...
pdf
1 WMCTF 2022 部分 WRITEUP 前⾔ WEB subconverter RCE? ⽂件写⼊ 任意⽂件读取 构造quickjs脚本 RCE 链 RCE! ⼩插曲 easyjeecg Java ssrf spark bash延时"注⼊" 交互shell 6166lover 信息泄露 代码审计 cpython简单的沙箱逃逸 数据恢复? k8s 容器逃逸 PWN Ubuntu MISC Hacked_by_L1near permessage-deflate Checkin 2 作者:⽩帽酱 这次WMCTF拿了3个⼀⾎ 题⽬设计⾮常有趣 其中还有⼏个0day 很多实际渗透遇到的问题也考虑到了 题⽬给了⼀个开源的代理订阅...
pdf
2019/2/26 GET来的漏洞 | WooYun知识库 http://www.anquan.us/static/drops/web-7112.html 1/10 GET来的漏洞 呆子不开口 (/author/呆子不开口) · 2015/07/15 10:04 0x00 前言 这篇文章主要讲目前互联网上get方法被不规范使用带来的一些安全漏洞。其中重点会讲get请求在账号登陆体系中被滥用 的场景和攻击方式。 0x01 Get方法的定义 在客户机和服务器之间进行请求-响应时,两种最常被用到的方法是:GET 和 POST GET - 从指定的资源请求数据 POST - 向指定的资源提交要被处理的数据 GET 方法的查询字符串是...
pdf
Exploit Archaeology First in the series of talks on excavating and exploiting retro hardware. I promise the talk will get technical. Who am I? • Penetration Tester • Geek Dad • Amateur Phone Phreak • @savant42 on the twitters Who I’m not. • Leet. • A programmer. • A reverse engineer-er. • A speller. Why this talk? Fro...
pdf
爱奇艺安全攻防实践 李劼杰 About Me • 爱奇艺 安全云 SRC 负责人 • WooYun 白帽子 Rank TOP 10 • 腾讯 TSRC 2016 年度漏洞之王 李劼杰 http://www.lijiejie.com subDomainsBrute / BBScan / githack / htpwdScan Agenda • 漏洞扫描 • 威胁感知 • 入侵检测 • 堡垒机 • 渗透测试 扫描器 现状 • 小机房端口策略过于宽松 • 资产变更频繁 • 服务间依赖复杂 20万+ 开放端口 300万+ 设计目标 稳定 高效 误报率低 高危漏洞覆盖全 任务管理合理 30 个扫描节点 每月完成约1亿次插件扫描 扫描组件 We...
pdf
自动化生成器 前面核心的内容跑通了,后面自动化生成就是理所当然的,这方面没什么困难的,就是注意一下加一些 对抗的东西,比如生成的源码里面的字符串全部加密,用于加解密shellcode的key全部随机化生成。将 源码一起打包,并告诉编译方式,这样即使生成的dll被杀了也没关系,自己改改又可以继续了。 一些核心功能: 收集一些白加黑文件,制作成模板 解析白文件pe,将shellcode写入证书目录 根据模板来生成劫持dll 自动调用go命令进行编译 自动打包成zip 里面最麻烦的就是自动编译,因为服务器是linux,而要生成windows的程序,并且在go里面使用了 cgo,不可避免的,要使用交叉编译器了。 找了找资料,用mingw-w...
pdf
%2F 构造路径穿越, exp 如下 bytedance 2022 Nu1L Compare from pwn import * import random from fractions import Fraction from Crypto.Util.number import * CHALLENGE_ID = 'c34409b34458e108242ea271d5126481' r = remote(CHALLENGE_ID + '.2022.capturetheflag.fun', 1337, ssl=True) context(log_level='debug') MSG = b'MSG//2**512==0...
pdf
Home Invasion 2.0 Attacking Network-Connected Embedded Devices 0. Abstract 1. Introduction 2. Methodology for devices evaluated 2.1 Belkin WeMo switch 2.2 MiCasaVerde VeraLite 2.3 INSTEON Hub 2.4 Karotz Smart Rabbit 2.5 Linksys Media Adapter 2.6 Lixil Satis Smart Toilet 2.7 Radio Thermostat 2.8 Sonos Bridge 3. Results ...
pdf
1 A  REALLY,  REALLY  BRIEF HISTORY  OF  DCG REALLY  …  WE’RE  GETTING  TO  THE  PANEL 2 3 GROUP UP 4 5 FINDING OTHER HACKERS WAS HARD 2 0 7 6 5 0 3 7 2 0 6 8 ?? 9 91 active Defcon Groups worldwide ..and growing again! 10 d C g 11 12 dcgroups{at}defcon(døt)org 13 d...
pdf
Liar! Macs have no viruses! -[ OS X Kernel Rootkits ]- §  Don't take me too seriously, I fuzz the Human brain! §  The capitalist "pig" degrees: Economics & MBA. §  Worked for the evil banking system! §  Security Researcher at COSEINC. §  "Famous" blogger. §  Wannabe rootkits book writer. §  Love a secon...
pdf
Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle Jianhao Liu 360 ADLAB SKY-GO Team Chen Yan Zhejiang University Wenyuan Xu Zhejiang University & University of South Carolina Paddy Liu Director of Qihoo360 ADLAB SKY-GO Team Vehicle Cyber Security Jianhao Liu is a seni...
pdf
Emula&on  based  analysis using  binary  instrumenta&on Applica&on  on  CTF 1 SPEAKERS 2 Myunghun  Cha •  From  Republic  of  Korea •  POSTECH  senior  student  majoring  CSE •  Team  Leader  of  PLUS •  CODEGATE  2009  Hacking  Contest  3rd  place •  DEFCON  2009 ...
pdf
收到情报->追番ing->顺便看看->认证绕过 git clone https://github.com/ehang-io/nps.git git pull ⼀些本信息 框架:beego ⽂档:docs/api.md 直奔鉴权逻辑去 -> web/controllers/base.go 默认情况下auth_key配置是注释掉的,本能的想到获取到值可能为空,那结合时间戳算⼀下 md5Key,认证就绕过了,实际测试也是如此: 代理⼯具nps认证绕过 Done
pdf
• 1$1 • +110@1101 • • - • • 0011 • @21 - &- • -- &--- • - -- & • :-&--- • --- //(/(/) ) • / • /)-)) • /(/) • ./-/)/// • / • / / /( /) . .. • . • .. • .. • • . . • . .... ... 1.+0 • .1.,.,. • .+..10. A 3 2. 21 3 2. ,. • 1.0...2,3 A ,2 8. ..3 • 2. .1 • 8.. ,22. 1. +0 +20 8,. .( • ( /. • (. • A/ • /A/...
pdf
1 Bypass Antivirus Dynamic Analysis Limitations of the AV model and how to exploit them Date of writing: 08/2014 Author: Emeric Nasi – emeric.nasi[at]sevagas.com Website: http://www.sevagas.com/ License: This work is licensed under a Creative Commons Attribution 4.0 International License Note: This paper requir...
pdf
极棒跨次元 CTF 初赛解题报告 本队伍承诺诚信比赛,比赛期间,队伍之间不互相交流思路和 Flag。本队伍承诺题目包 中的所有内容仅用于信息安全学习,不用于任何其它恶意用途。本报告均由本队伍独立完成。 队伍: Nu1L 提示:题目名称后面的数字为本题总分数,详细评分规则请见题目包内部 ReadMe。题 目不分先后顺序。 SignIn-10 Flag:flag{Geekpwn2016} 直接修改高度 Only a JPG-150 Flag:flag{fight_on_the_stage} 解题步骤: 提取 MP4 文件 SecretCode-150 Flag: 解题步骤: 这题用 ollvm 混淆了下,写了段代码直接爆破,从-2147...
pdf
企业安全架构概述 An Introduction of Enterprise Security Architecture 北海之帝为忽,南海之帝为倏,中央 之帝为混沌。忽与倏时相与遇于混沌之地, 混沌待之甚善。忽与倏谋报混沌之德,曰: “人皆有七窍,以视听食息,此独无有,尝 试凿之。”日凿一窍,七日而混沌死。 -- 庄子.应帝王 一些问题 什么是企业安全架构 几种常见模型 企业安全架构实践 企业安全建设中的一些问题 • 如何保证与战略和业务一致性 • 如何体现价值交付 • 如何评估投入产出 • 大系统的复杂度 • 一处失效,全盘皆输? • 如何避免重复投入 • 管理和技术脱节? • 技术应用和运维失效 系统论与系统工程 *SYSTE...
pdf
2021 强⽹杯 Writeup - Nu1L 2021 强⽹杯 Writeup - Nu1L Web Hard_Penetration pop_master WhereIsUWebShell EasySQL [强⽹先锋]赌徒 Hard_APT_jeesite [强⽹先锋]寻宝 EasyWeb EasyXSS Misc BlueTeaming ISO1995 签到 CipherMan ExtremelySlow 问卷题 EzTime Pwn baby_diary EzCloud notebook [强⽹先锋]orw [强⽹先锋]no_output babypwn pipeline [强⽹先锋]shellcode Reverse ez...
pdf
通用型漏洞的应急响应 主讲人: 钟武强 腾讯安全应急响应中心(TSRC)负责人 关于我 • 钟武强(小五),微信号Mark4z5 • 腾讯安全应急响应中心(TSRC)负责人 • 广东省信息安全测评中心 —> 百度 —> 腾讯 • 十多年安全经验,擅长应急响应、渗透测试 关于腾讯 • 中国最大互联网公司,全球市值排名第五 • 产品众多,形态多样化 • 超十亿用户,超百万台服务器 安全风险分类 账号风险 欺诈风险 etc.. 漏洞攻击风险 DDOS攻击风险 etc.. 办公网攻击风险 员工违规风险 etc.. 业务安全 应用运维安全 内部安全 漏洞Case 1...
pdf
autocoinapp 0x00 autocoin appapp IOSJSBOX 0x01 1. autocoinvpshttp 2. VPShttp 3. jsboxAPPjshttp vpshttpnginxhttpvpshttpflask 0x02 VPShttp flaskautocoin jsbox from flask import Flask from flask import request from flask import jsonify import json app = Flask(__name__) ## @app.route('/getconf',methods=['GET']) def ...
pdf
© 2008 Security-Assessment.com SCADA Fear, Uncertainty, and the Digital Armageddon Presented By Morgan Marquis-Boire © 2007 Security-Assessment.com Whois Hi, My Name is Morgan © 2007 Security-Assessment.com Whois Hi, My Name is Morgan I’m a security guy © 2007 Security-Assessment.com Whois Hi, My Name is Morgan I’m a s...
pdf
Android Proguard 混淆对抗之我见 关于何为 Proguard,可以参考 GuardSquare 官网其优化业务及 Wikipedia 相关条目. Proguard:https://www.guardsquare.com/proguard Wikipedia:https://en.wikipedia.org /wiki/ProGuard 局部敏感哈希与 Proguard 混淆对抗 2017 年 6 月,Richard Baumann 发表了标题为"Anti-ProGuard: Towards Automated Deobfuscation of Android Apps"(DOI:10.1145/30...
pdf
How To Get Your FBI File (and Other Information You Want From the Federal Government) DEF CON 18 July 30, 2010 What’s the FOIA? The Freedom of Information Act is a law that lets anyone ask for records from federal agencies. An agency has to give you the stuff you ask for unless it thinks that there’s a good reaso...
pdf
Hijacking Arbitrary .NET Application Control Flow Topher Timzen Security Researcher, Intel Security Trainer TopherTimzen.com @TTimzen #whoami Overview .NET? Runtime Attacks Modify Control Flow Machine Code Editing Managed Heap Tools Released Use .NET to attack Using Objects on the Heap Why are we...
pdf
Pen-testing Wi-Fi Defcon 2007 Aaron Peterson "What you talking about, Willis?” We're talking about … ● Pen-testing Wi-Fi with a new wireless auditing tool: **Wicrawl** ● Who am I ● Current state of Wi-Fi scanning ● Wi-Fi Penetration testing ● How Wicrawl can help ● How it works ● Use cases and examples ● Screenshot...
pdf
Weaponize GhostWriting Injection Code injection series part 5 Prerequisites: This paper requires some knowledge about Windows system programming. Also, it is mandatory to be familiar with concepts presented in Code injection series part 1. License : Copyright Emeric Nasi , some rights reserved This work is license...
pdf
大陆浏览器安全 宋雷 1 大陆浏览器市场特点 • 面临安全问题与国际市场迥异 • 由于金山/腾讯/360,导致漏洞补丁很快,0day几 乎不会规模性出现。 • 主要威胁为:小成本钓鱼,下载欺骗,点对点社 会工程(网购诈骗) 2 金山网络在浏览器安全的积累 • 2009年,我们在业界率先推出了首款基于浏览器 的专业防护产品 - 金山网盾 • 除360以外的国内主流浏览器产品安全技术几乎全 部基于金山云开放平台开发 • 金山毒霸在网购保护方面做出了诸多的创新,如 敢陪模式等 3 遨游浏览器 (Maxthon) 金山云开放平台 搜狗浏览器(Sogou) 360云平台 360浏览器 4 • 在做安全的路上,我们反复在思考...
pdf
探索一切、攻破一切 [ Hacker@KCon ] 9/6/2016 3:01:52 PM 0 探索一切、攻破一切 [ Hacker@KCon ] 伪基站高级利用技术 ——彻底攻破短信验证码 Seeker BD4ET 9/6/2016 3:01:54 PM 1 日程 • 个人简介 • 手机通信安全概述 • LTE伪基站的实现 • GSM MITM攻击的实现 • 短信验证码的脆弱性 • 安全建议 9/6/2016 3:01:54 PM 2 个人简介 • 连续创业失败的创业导师 • 伪天使投资人 • 某非知名私立大学创办人兼校长 • 业余时间在本校通信安全实验室打杂 • 个人微信:70772177 9/6/2016 3:02:42 PM...
pdf
open 0x00 open 0x01 open https://www.baidu.com//System/Applications/Maps.app mapsapp 1. maps.app 2. urlmaps open "https://www.baidu.com/System/Applications/Calendar.app" calendar urlurlcalendar 0x02 app 1. appurl 2. appurl app open "https://xxxxx" open "/Applications/Safari.app" "http://xxxxx" xxx app applemusic...
pdf
From BUG to 0day – Busting the perimeter egghunter_wtf = ( “%JMNU%521*TX-1MUU-1KUU-5QUUP\AA%J" "MNU%521*-!UUU-!TUU-IoUmPAA%JMNU%5" "21*-q!au-q!au-oGSePAA%JMNU%521*-D" "A~X-D4~X-H3xTPAA%JMNU%521*-qz1E-1" "z1E-oRHEPAA%JMNU%521*-3s1--331--^" "TC1PAA%JMNU%521*-E1wE-E1GE-tEtFPA" "A%JMNU%521*-R222-1111-nZJ2PAA%JMN" ...
pdf
近場狩獵 Hunting in the Near Field Android平台上NFC相關漏洞的研究 An Investigation of NFC-related bugs of Android 360阿爾法實驗室 趙奇 Qi Zhao from 360 Alpha Team 360 ALPHA 關於講者 About the Speaker • @JHyrathon • 360阿爾法實驗室 安全研究員 Security Researcher of 360 Alpha Team • 專注於Android組件安全,NFC、多媒體、IPC通訊(Binder) 均有涉獵 Focuses on the security of compon...
pdf
目录 致谢 前言 目录 第一课:windows提权-快速查找exp 第二课:Linux提权-依赖exp篇 第三课:Delphi代码审计—项目实战1 第四课:Asp代码审计—项目实战2 第五课:工具介绍-Sqlmap 第六课:反攻的一次溯源—项目实战3 第七课:sqlserver常用操作远程桌面语句 第八课:模拟诉求任务攻击 第九课:工具介绍-the-backdoor-factory 第十课:msfvenom常用生成payload命令 第十一课:工具介绍Veil-Evasion 第十二课:基于UDP发现内网存活主机 第十三课:基于ARP发现内网存活主机 第十四课:基于第十课补充payload1 第十五课:基于第十课补充payload2...
pdf
众测困住你的那些问题 jkgh006 | 众测资深玩家,多家众测平台TOP白帽 前 言 安全趋势的发展,现在已经变成三大阵容,一个是代表过去的传统漏洞平台,第二个是以乙方为 首的众测平台,以及以甲方主导的SRC平台 , 传统的漏洞平台慢慢的淡出视野,现在最火的莫过于 SRC和众测,所有的类型终将归为一种方法,所以对于其中众测也是有一套方法论,怎么分析,怎 么去绕,怎么去获取证据,等等都是有章可循,我们重点关注众测困住你的那些问题。 目录 01 拦截框架下注入的过程拆解 02 基于三方调用框架分析利用 03 趣味的SESSION和EXCEL 01 拦截框架下注入的过程拆解 越来越多的web系统,随着运维方安全意识的提高...
pdf
前⾔ 在域内,有很多种⼿法可以获取域控权限,包括不限于利⽤溢出类的漏洞如ms17-010、抓取域管密码,当然也有 今天的主⻆,利⽤ntlm relay。ntlm relay⼿法有很多,⽐如利⽤WPAD、LLMNR等“被动性”攻击,利⽤打印机等 “主动性”攻击,核⼼就是中继了他⼈的net-ntlm。但是呢,利⽤⼯具监听的都是本地445端⼝,受害者机器与我们 通信的也是445端⼝,⽽在windows上445端⼝是占⽤的,难道利⽤ntlm relay⼿法只能基于linux机器? 攻击过程 ⾸先把受控机的445端⼝流量重定向到受控机⾃⼰的8445端⼝,然后把受控机的8445端⼝转发到⿊客机器的445端 ⼝上,⿊客机器利⽤受控机的socks代...
pdf
E VA DING E DR A C O M P R E H E N S I V E G U I D E T O D E F E A T I N G E N D P O I N T D E T E C T I O N S Y S T E M S M A T T H A N D placeholder NOT FINAL EARLY ACCESS NO S TA RCH PR E S S E A R LY ACCE S S PROG R A M: F E E DBACK W E L COME ! Welcome to the Early Access edition of the as yet unpub...
pdf
1 KWs ⼩⽩备忘录 前⾔ 简介&&基础知识 暴漏⾯梳理 etcd-未授权访问 kube-apiserver未授权访问 kubelet未授权访问 kWs dashboard认证绕过(CVE-OLNW-NWOTQ) docker未授权访问 kube-proxy配置错误 参考⽂章 致谢 最近做了⼀个某央企的内部攻防项⽬,在这种项⽬中⼜⼀次深深体会到⾃⼰的菜,加之⾃⼊球以来⼀直 没有发过⽂章,主管都准备踢我出球了,所以特地⽔⼀篇⽂章。 找了找星球还没有k8s之类的⽂章,于是⽔⽂章思想更重。 之前从来没怎么接触过k8s,但是随着云原⽣以及微服务架构的兴起,云原⽣必定是攻防重点,很多⾯试 也会问k8s的渗透经验。这次侥幸⼊内⽹后也正好发现...
pdf
Digital Vengeance Exploiting the Most Notorious C&C Toolkits @professor__plum Disclaimer The views expressed herein do not necessarily state or reflect the views of my current or former employers. I am not responsible for any use or misuse of the information provided. Implementation of the information given is at y...
pdf
1 ASP.NET下的内存⻢(⼀):filter内存⻢ 前⾔ 过程 总结 @yzddmr6 asp.net下的内存⻢研究⽂章⽐较少,⽬前提到过的包括虚拟路径内存⻢以及HttpListener内存⻢。周末 研究了⼀下其他类型的内存⻢,发现.net可以利⽤的地⽅要多得多。所以准备写个系列⽂章,讲⼀讲 asp.net下的内存⻢。 ⽂章仅作研究性质,不保证任何实战效果,请勿⽤于⾮法⽤途。 java下有filter,servlet等拦截器,asp.net mvc也有同样类似的机制。 在rider中新建⼀个asp.net web项⽬,默认就会起⼀个asp.net mvc的项⽬。 前⾔ 过程 2 根⽬录下有个 Global.asax...
pdf
Privacy in DSRC connected vehicles Defcon 21 – August 3, 2013 whoami • BSEE, digital communications • Many years as a network engineer • Santa Clara University Law student • Research assistant providing technical expertise on privacy audits and reviews • Contracted by auto consortium to review privacy of proposed ve...
pdf
PASSIVE BLUETOOH MONITORING IN SCAPY Ryan Holeman AGENDA • bluetooth essentials • fundamental projects • scapy-btbb project overview • demo ESSENTIAL BLUETOOTH • bluetooth is a frequency hopping protocol ESSENTIAL BLUETOOTH • BTBB - bluetooth baseband • air traffic between master and slave bluetooth devices ESSENTIAL...
pdf
The WorldWide WarDrive: The Myths, The Misconceptions, The Truth, The Future Chris Hurley aka Roamer History •I was talking with The Watcher on the Netstumbler Forums and found out we live relatively close to each other. •We thought it would be fun to try to coordinate a WarDrive to cover the entire city of Baltimo...
pdf
前5个加密字符还原, 请看龙哥的文章 SO逆向入门实战教程九——blackbox https://blog.csdn.net/qq_38851536/article/details/118115569 打开ida, 从sub_3B3C方法继续向下分析 我们一步一步看: 首先是v19的赋值 1 uint8x8_t v19; // d16 2 v19.n64_u32[1] = *(_DWORD *)"6789BCDFGHJKRTVWMNPQ567"; 3 uint8x8_t 的结构体如下:  这里用到了 ARM NEON 编程 https://www.cnblogs.com/xylc/p/5410517.html DCD 4个字节 DC...
pdf
GNU Readline Library User Interface Edition 6.1, for Readline Library Version 6.1. October 2009 Chet Ramey, Case Western Reserve University Brian Fox, Free Software Foundation This manual describes the end user interface of the GNU Readline Library (version 6.1, 9 October 2009), a library which aids in the consistency ...
pdf
Module 1 A journey from high level languages, through assembly, to the running process https://github.com/hasherezade/malware_training_vol1 Introduction PE injections in malware • At various stages of execution, malware may inject its implants to other processes • Typical goals: process impersonation, API hooking • Ev...
pdf
基于历史行为的异常检测 O365怎样反击内部恶意攻击 Lei He Principal Engineering Manager, Microsoft Corporation 2019-05-30 Office365安全要求 * 客户密码箱入门只能用于访问客户数据的企业服务. • 无法使用Corp身份进行解密或访问, 所有访问要求2FA • 背景调查及安全培训 • 用户数据和运作中心隔离 • 零永久访问权限 • 客户密码箱和BYOK • 基于ETW的详细原始遥测技术,能够在 <1天内测量新的遥测技术 • 集中处理会在15分钟内发出警报,以解 决安全问题 • 每天至少1次攻击模拟服务以验证监视/ 响应 • 能够在<15分钟内触发安全响...
pdf
1 Abstract This paper will examine how DTrace, a kernel- based dynamic scriptable tracer, can be effectively used for reverse engineering tasks. DTrace offers an unprecedented view of both user and kernel space, which has many interesting implications for security researchers. In this paper we will introduce DT...
pdf
Response Smuggling: Exploiting HTTP/1.1 Connections Martin Doyhenard Onapsis mdoyhenard@onapsis.com Abstract Over the past few years, we have seen some novel presentations re-introducing the concept of HTTP request smuggling, to reliably exploit complex landscapes and systems. With advanced techniques, attackers were a...
pdf
A Linguistic Platform for A Linguistic Platform for Threat Development Threat Development Ben Kurtz Ben Kurtz Imperfect Networks Imperfect Networks Introduction Introduction By applying programming language theory to the By applying programming language theory to the development of new networks attacks, we can d...
pdf
Attacking the macOS Kernel Graphics Driver wang yu Didi Research America - About me - Background Pluto Flyby: The Story of a Lifetime, NASA, 2016 New Horizons Team Reacts to Latest Image of Pluto, NASA, 2015 9 Years, 3 Billion Miles: The Journey of New Horizons - Weapon X rootkit - Rubilyn rootkit - OS X/Crisis DAVINCI...
pdf
西湖论剑 WP-Nu1L WEB HardXSS 网站就 dns 爆破 + 提交 xss + 管理员登录三个功能, 用了两个域名`xss.xss.` , `auth.xss.` 题目有句话 `我收到邮件后会先点开链接然后登录我的网站!` , 这么一看这个题应该是需要作 一个 xss 持久化的. xss 持久化就两种方式 serviceworker, 和 cache. cache 在这个题目里面没 法控制, 所以就得 serviceworker. 要用 serviceworker 就得找一个能 xss 的点, 去注册这个 serviceworker. 这里我们看代码发现一个 jsonp, 而且没有过滤, 于是就用这个路由做 ...
pdf
IPv6@ARIN Matt Ryanczak Network Operations Manager IPv6 Timeline IETF starts thinking about successors to IPv4. 1990 IETF forms IPNG area RFC 1475 TP/IX RFC 1550 IPng Paper Solicitation 1993 RFC1817 CIDR and Classful Routing RFC 1883 Draft IPv6 Spec 1995 6bone started RFC 1970 Neighbor Disco...
pdf
@patrickwardle I got 99 Problems, but 
 Little Snitch ain’t one! WHOIS “leverages the best combination of humans and technology to discover security vulnerabilities in our customers’ web apps, mobile apps, IoT devices and infrastructure endpoints” @patrickwardle security for the 21st century career hobby making li...
pdf
Picking Electronic Locks Using TCP Sequence Prediction Ricky Lawshae 2009 3/25/2009 1  OSCP, GPEN  Network Technician for Texas State University  Have been working with electronic building access systems for more years than I like to think about Who am I? 3/25/2009 2  Testing of security of building access syste...
pdf
YOU’RE DOING IOT RNG • Random numbers are very important to security • Encryption keys • Authentication tokens • Business logic • Computers are notoriously bad at making random numbers • They inherently only do deterministic functions • Hardware RNG • Makes entropy • Solves the problem… right? RANDOM NUMBERS DOING RNG...
pdf
Remote Attacks Against SOHO Routers 08 February, 2010 Craig Heffner Abstract This paper will describe how many consumer (SOHO) routers can be exploited via DNS re-binding to gain interactive access to the router's internal-facing Web based administrative interface. Unlike other DNS re-binding techniques, this att...
pdf
Demonstration of Hardware Trojans Fouad Kiamilev (Dr. K), Ryan Hoover, Ray Delvecchio, Nicholas Waite, Stephen Janansky, Rodney McGee, Corey Lange, Michael Stamat Who We Are We take pride in our junk drawers. Crazy ideas are encouraged. We can't tell you everything but you can still ask. You simulate it - we build i...
pdf
OpenBSD Remote Exploit ”Only two remote holes in the default install” Alfredo Ortega, Gerardo Richarte Core Security April 2007 Abstract OpenBSD is regarded as a very secure Operating System. This article details one of the few remote exploit against this system. A kernel shellcode is described, that disables the prote...
pdf
Assessing Civilian Willingness to Participate in On-line Political and Social Conflict 1 Tom Holt, Ph.D. Assistant Professor Michigan State University Spartan Devils Honeynet Chapter Max Kilger, Ph.D. Profiler The Honeynet Project Political Conflict On and Off-Line 2 • There has been significant attention in popular m...
pdf
1 企业、家庭智能家居安全解决⽅案 设计背景 智能家居品牌选择与⽤途 ⽹络架构设想图 拓扑图实现效果 关于IOT设备的漏洞 autor:枕边⽉亮 随着IOT技术的发展,智能家居逐渐普及化。⽬前的智能家居⽅案也含盖了很多⽅⾯,⽐如智能中控、智能 ⻔禁、智能灯光系统、智能窗帘系统、智能家电控制系统、智能暖通系统、智能安防系统、智能影⾳、甚 ⾄拓展到了智能晾⾐、智能厨电等等。随着IOT设备的增多,对宽带、路由器要求逐渐提升,部分低端路由 器与⽹关设备⽆法满⾜⼤量设备的承载与连接。同时物联⽹设备安全没有引起明显重视,安全问题层出不 穷,于是⾃⼰尝试部署后,于是有了这⼀篇解决⽅案。 ⽬前我⽐较推荐的品牌有:⼩⽶、homekit、超级智慧家、艾...
pdf
1 Implementation of Implementation of Web Application Firewall Web Application Firewall OuTian < OuTian <outian@chroot.org outian@chroot.org> > 2 Introduction Introduction Abstract • Web 層應用程式之攻擊日趨嚴重,而國內多 數企業仍不知該如何以資安設備阻擋,仍在採 購傳統的 Firewall/IPS ,因此本場次即對 Web Application Firewall( 以 下 簡 稱 WAF)之功能、及實作方式作介紹 About OuTian •...
pdf
在不久前参加了一次众测项目,需对某厂商的系统进行漏洞挖掘 在测试一套系统时,发现了很有意思的接口,可以操作另外两个站的输出点,以此导 致多处 XSS 触发 0x01:初探 Vulnerabilities 系统的 URL 是这样的:https://xxx.com/passport/?fromUrl=https://xxx.com/ 显然这样的 url 容易出现 Open Redirect XSS CRLF 注入的漏洞,其次还有以下这样 的参数: redirect ref redirect_to redirect_url url jump jump_to target to link linkto d...
pdf
Attack the Key Own the Lock by datagram & Schuyler Towne Defcon 18 (2010) Las Vegas, NV About Us  Datagram – Forensic locksmith – Douchebag – No game shows :(  Schuyler – TOOOL US – NDE Magazine – Wheel of Fortune How Locks Work How Locks Work How Locks Work How Locks Work Key Control  Availability of blanks  Distr...
pdf
PUBLIC Persisting with Microsoft Office: Abusing Extensibility Options William Knowles PUBLIC Obligatory $whoami • William Knowles • Security Consultant at MWR InfoSecurity • @william_knows 1 PUBLIC Agenda • DLL • VBA • COM • VSTO • Prevention and Detection 2 PUBLIC Motivations • It’s –everywhere- and it’s got lots of ...
pdf
masSEXploitation The Rook http://ppdhuluperak.gov.my Defaced! … and the next day.... PHPNuke.org too!? Eleonore Exploit Pack.  “What I cannot create, I do not understand.” – Richard Feynman Why? Overview “Layers of security.” --Unkown “Complexity is the worst enemy of security.” --Bruce Schneier ManageEngine Fir...
pdf
Universal RF Usb Keyboard Emulation Device URFUKED -by Monta Elkins monta.defcon @ geekslunch.com version .08 6/2010 Updates at: http://www.hackerwarrior.com/urfuked Updates at: http://www.hackerwarrior.com/urfuked Hardware Receiver (plugged into spare USB port) Quarter “Teensy” Microcontroller RF receiver  On th...
pdf
© 2011 NATO Cooperative Cyber Defence Centre of Excellence, June 2011 All rights reserved. No part of this pub- lication may be reprinted, reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permis...
pdf
软 件 供 应 链 安 全 技 术 白 皮 书 透 视 软 件 供 应 链 , 携 手 应 对 安 全 挑 战 透视软件供应链,携手应对安全挑战 软件供应链安全 技术白皮书 软件供应链安全技术白皮书 2 关于绿盟科技 绿盟科技集团股份有限公司(以下简称绿盟科技),成立于 2000 年 4 月,总部位于北京。公司于 2014 年 1 月 29 日在深圳证券交易所 创业板上市,证券代码:300369。绿盟科技在国内设有 50 余个分支机构, 为政府、金融、运营商、能源、交通、科教文卫等行业用户与各类型企 业用户,提供全线网络安全产品、全方位安全解决方案和体系化安全运 营服务。公司在美国硅谷、日本东京、英国伦敦、新加坡及巴西圣保罗 设立海...
pdf
HTTP Request Smuggling in 2020 Amit Klein Safebreach Labs About Me • 29 years in InfoSec • VP Security Research Safebreach (2015-Present) • 30+ Papers, dozens of advisories against high profile products • Presented in BlackHat (3 times), DefCon (twice), Usenix, NDSS, HITB, InfoCom, DSN, RSA, CertConf, Bluehat, OWASP G...
pdf
前段时间补上了迟迟没有写的 ⽂件包含漏洞原理与实际案例介绍⼀⽂,在其中就提到了 Thymeleaf SSTI 漏洞,昨天在赛博群⾥三梦师傅扔了⼀个随⼿挖的 CVE——Thymeleaf SSTI Bypass,想着之前项⽬的代码还没清理,⼀起分析来看看 Thymeleaf 是与 java 配合使⽤的⼀款服务端模板引擎,也是 Spring 官⽅⽀持的⼀款服务端模板 引擎。⽽ SSTI 最初是由 James Kettle 提出研究,后来 Emilio Pinna 对他的研究进⾏了补充,然 ⽽,这些作者都没有对 Thymeleaf 进⾏ SSTI 漏洞挖掘,因此后来 Aleksei Tiurin 在 ACUNETIX 的官⽅博客上发表了关...
pdf
Bypassing the ‘secureboot’ and etc on NXP SOCs Yuwei ZHENG, Shaokun CAO, Yunding JIAN, Mingchuang QIN UnicornTeam, 360 Technology Defcon 26 About us • 360 Technology is a leading Internet security company in China. Our core products are anti-virus security software for PC and cellphones. • UnicornTeam (https://unicorn...
pdf
AFTER SESTA SEX WORK DEFCON 26
 MAGGIE MAYHEM @MsMaggieMayhem 2018 WHEN SEX WORKER RIGHTS ARE UNDER ATTACK, WHAT DO WE DO? GET DRESSED, FIGHT BACK! Sex Worker Rights Labor Chant SEX WORK AFTER SESTA SEX WORK AFTER SESTA ABOUT ME ▸ Sex Worker, Birth Worker, Death Worker ▸ Based in San Francisco, CA ▸ Founder of Harm...
pdf
WHITE PAPER UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice AUTHORS Andrea Palanca Luca Cremona Roya Gordon About Nozomi Networks Labs Nozomi Networks Labs is dedicated to reducing cyber risk for the world’s industrial and critical infrastructure organizations. Through its c...
pdf
看了看⾃⼰硬盘⾥下载的很多markdwon,pdf,ppt的资料,如果能对它们进⾏全⽂搜索的话,不就相当于是个 ⾃⼰的⼩知识库吗。ES太重了,周末研究了⼀下,⾃⼰做了个玩具级别的全⽂索引,特点是轻量和占有资源⼩,只 运⾏⼀个exe就⾏。 索引⽀持⽂本,docx,ppt格式,pdf格式暂时不⽀持(没找到go解析pdf好⽤的库)。 ⼀些技术细节的碎碎念:全⽂索引的原理就是建⽴⼀个 倒排索引 ,索引的时候建⽴倒排表,查询的时候根据倒排表 的数据做合并,打分,排序操作,再输出结果。温习了很多在学校时的数据结构,在这个时候来找我在当年⽋下的 债了,源码开源,这个源码还有很多可以优化的地⽅,能够进⼀步提升速度。 使⽤ 使⽤很简单,就两步,先建⽴...
pdf
My name is Yoshinori Takesako. It's very long name. so call me "Yoshi". I came from Tokyo, Japan. 1 I am a chairman of the SECCON. SECCON is a largest security CTF contest in Japan. I am an CTF organizer and a challenge creator. I am also on the Open Web Application Security Project - OWASP Japan advisory board. ...
pdf
Memory Wars: 對記憶體攻擊手法與防禦技術的探討 Authorized Morphor distributor Leo Liaw 數位資安系統股份有限公司 | 2 Agenda 記憶體漏洞 How Windows execute an executable? What is PE? 微軟防護記憶體攻擊的工具 (EMET)  EMET 版本沿革  EMET 的限制 EMET/ASLR 以外的工具 We need to do better Before and After 3 | 記憶體漏洞 4 | 記憶體漏洞都是來自於載入可能錯誤的內容到程式中。 記憶體漏洞 • Intra-chunk heap ove...
pdf
Time Turner Hacking RF Attendance Systems (To Be in Two Places at Once) DEMO 1 ? ? ? Jacob Glueck Ammar Askar Aaron Wisner Charles Cao Prof. Bruce Land (Advisor) Cole Smith https://github.com/wizard97/iSkipper https://github.com/charlescao460/iSkipper-Software (Transposition Cipher) (Transposition Cipher) Device ID Che...
pdf
GAME OF CHROMES Owning the Web with Zombie Chrome Extensions Tomer Cohen April 2016 Sign-up Graph 1000 RPM 9000 RPM Sign-up Graph 1000 RPM 9000 RPM Investigating Attack Patterns 10 Sec Attack Page Attack Page Google Web Store Extension Course of Action Inject Code Into Facebook tabs Open Wix Frame Transparently ins...
pdf
Michael Ligh, Malicious Code Engineer Greg Sinclair, Rapid-Response Engineer iDefense Security Intelligence Services Malware RCE: Debuggers and Decryptor Development Topics • How to script a debugger for malware RCE • Almost all malicious code uses some form of obfuscation to protect » Strings » Configurations » Comm...
pdf
Evolving Exploits through Genetic Algorithms By soen Who am I !  CTF Player !  Programmer !  Virus / Worm Aficionado !  Computer Scientist !  Penetration Tester in daylight Exploiting Web Applications !  Attack problems !  Driven by customer !  Small scope !  Limited time !  Report driven !  Attack met...
pdf
AND OTHER FUN TRICKS Snide / Owen @LinuxBlog github.com/PhreakMe (Latest Slides & Code) Mandatory Disclaimer The opinions expressed in this presentation and on the following slides are solely those of the presenter. There is no guarantee on the accuracy or reliability of the information provided herein. ...
pdf
March 23 2004 Coming of Age The number isn’t important, friends have been saying when I talk about turning sixty. Some say, age is only a state of mind. Some say, you’re as young as you feel. Some say, age doesn’t matter. And some say, why, you look great! which unfortunately confirms that there really are three stages...
pdf
Story time! Supply Acquisition Circuit Interrupts around the house ≠  Purposes GFCI: Intends to prevent Electric Shock AFCI: Intends to prevent fires Ground Fault CI Arc Fault CI Code Requirements GFCI’s • Bathrooms/Indoor wet locations • Garages/storage areas/non habitable areas/unfinished basements ...
pdf
Staring into the Abyss: The Dark Side of Crime Fighting, Security, and Professional Intelligence Notes and Comments WHY SECURITY SUCKS As of 2010, Frost & Sullivan estimates that there are 2.28 million information security professionals worldwide. to which an experienced security practitioner replied: “it sou...
pdf
net user author /domain Gabriel Ryan Security Engineer @ Gotham Digital Science Appsec | Penetration Testing | Red Team | Research @s0lst1c3 gryan@gdssecurity.com labs@gdssecurity.com Target Identification Within A Red Team Environment Target Identification Within A Red Team Environment Well executed wireless attacks...
pdf
CSRF Bouncing By Michael Brooks What? This is an advanced talk on exploit chaning and CSRF. This will detail the process I used for finding and writing an exploit chain against a real world application. This will also discuess using JavaScript to locate targets to attack. Prerequsite You must already know how to e...
pdf