text
stringlengths
100
9.93M
category
stringclasses
11 values
 0xcsandker  csandker  RSS Feed //Posts //History of Windows //Archive //Tags & Search //ME  Switch Theme Debugging and Reversing ALPC 29 May 2022 >> Introduction & Disclaimer >> Environment Preparation >> Getting Off The Ground >> From User to Kernel Land >> Hunting An ALPC Object This post is an addendum to my jo...
pdf
Hack%to%Basics%–%x86%Windows%Based%Buffer%Overflows,%an%introduc:on%to%buffer%overflows% Instructor%-%Dino%Covotsos%– Telspace%Systems% Co–Instructor%–%Manuel%Corregedor% @telspacesystems% Whoami'(x2)'?' We%work%in%the%Penetra:on%Tes:ng%space%(Telspace%Systems)% % Approximately%20%years%in% % Trying%to%keep%some%sort%of%wo...
pdf
CONFESSIONS OF A NESPRESSO MONEY MULE NINA KOLLARS @NIANASAVAGE “KITTY HEGEMON” VIEW EXPRESSED TODAY DO NOT NECESSARILY REFLECT THE DON, DOD, NWC, …. YES, THEY KNOW I’M HERE, …. ….SO I BOUGHT SOME COFFEE ON EBAY… And this showed up with my coffee….. Retail $280 Triangulation Fraud …..SO I BOUGHT SOME MO...
pdf
Nanika naninb@gmail.com 魔術 薩斯頓三原則  表演之前絕對不透漏接下來的表演內容。  不在同一時間、地點對相同的觀眾變同樣 的表演2次以上。  表演過後,絕不向觀眾透露表演的秘密。 Windows 防護弱點機制 /GS SafeSEH DEP ASLR 突破 破解魔術手法 一般弱點利用 Fish 應用範圍 成功魔術的需求 手法 (弱點利用) Why Spraying  Not control precisely  Not control  Universal 12 NOP  NOP 0x0c0c0c0c OR AL,0C 0x0d0d0d0d 0d OR EAX,0D0D0D0D 0x0a0a0...
pdf
HITCON GIRLS 成果分享 與 BLACK HAT 之旅 HITCON COMMUNITY 2019 SPEAKERS ‣shad0w ‣ 台灣停電科技大學研究生,HITCONGIRLS創始團隊中最晚脫離學生身份的人(・ω・)ノ ‣akee ‣ HITCONGIRLS成員,不是創始團隊也沒有兼職,只是個單純的成員_(:з」∠)_ ‣HazelYen ‣ HITCONGIRLS創始團隊暨總召,比較擅長活在鍵盤後面的生物(゚∀゚)
 OUTLINE ‣HITCONGIRLS介紹 ‣近期成果與專案 ‣BlackHat旅程 ‣DEFCON見聞 OUTLINE ‣HITCONGIRLS介紹 ‣近期成果與專案 ‣BlackHat旅程 ...
pdf
eBPF, I thought we were friends ! Guillaume Fournier Sylvain Afchain August 2021 Defcon 2021 2 About us Guillaume Fournier Security Engineer guillaume.fournier@datadoghq.com Sylvain Afchain Staff Engineer sylvain.afchain@datadoghq.com Sylvain Baubeau Staff Engineer & Team lead sylvain.baubeau@datadoghq.com ● Cloud Workl...
pdf
Climbing Everest Voting 101 Voting in the US • Highly decentralized: – Federal government sets broad standards – Each state has own laws, rules, requirements – Elections run by counties (>3000 in US) – Voting takes place in neighborhood precincts • tens, hundreds or thousands per county • Complex: – Typical election ha...
pdf
Index Veritas Project Computer Security Trends Military Intelligence American Minds Submit HQ Contact Us Understanding the Security Trends Interface So how does this thing work? Basically the premise of this study is to track increases in "chatter" (based on keywords) just like what ECHELON, INTERPOL, or the other inte...
pdf
Compliance: The Enterprise Vulnerability Roadmap • • • Weasel Nomad Mobile Research Centre weasel@nmrc.org Introduction The Semi-Security State of Compliance • Overview of Compliance Benefits and Standards • Things Compliance Gets Wrong • Detrimental effects of Compliance Compliance Benefits • Old, hard-to-sell co...
pdf
No MAS: Mike Davis (misadventures in high security lock design) Introduction • I Hack stuff for IOActive Weird embedded stuff • Amateur lock picker I’m not very good • Pretty good understanding of how the pixies flow • I’m not interested in hacking one thing, I want to hack all of the things. 2 Todays plan • We’re g...
pdf
针对 PHP 的网站主要存在下面几种攻击方式: 1、命令注入(Command Injection) 2、eval 注入(Eval Injection) 3、客户端脚本攻击(Script Insertion) 4、跨网站脚本攻击(Cross Site Scripting, XSS) 5、SQL 注入攻击(SQL injection) 6、跨网站请求伪造攻击(Cross Site Request Forgeries, CSRF) 7、Session 会话劫持(Session Hijacking) 8、Session 固定攻击(Session Fixation) 9、HTTP 响应拆分攻击(HTTP Response Splitting)...
pdf
making fun of your malware Defcon 17 Matt Richard and Michael Ligh Following the presentation at Defcon 17, you can find the final slides here: http://code.google.com/p/mhl-malware-scripts/Defcon2009_MakingFun.pdf Silent Banker author forgets to seed the PRNG Honey, I Shrunk the Entropy! Off to a bad start… Zeus, Sep...
pdf
Wifi Hacking DEFCON China 1.0 2019 This presentation at http://bit.ly/2LeM0U3 > whoarewe // Philippe Delteil // @philippedelteil CS. Engineer@University of Chile Self proclaimed hacker 1st talk at Defcon 26 Skytalks "Macabre stories of a hacker in the public health sector" Hacked over 3,000 wifi routers of Brazil...
pdf
0x00 前⾔ 作者J0o1ey,有技术交流或渗透测试/Redteam培训需求的朋友欢迎联系QQ/VX-547006660 本⽂简单记述了⼀下本⼈在某攻防演练过程中⼀次层层突破的有趣经历 技术性⼀般,但是层层突破属实艰难,并⽤到了⽐较多的思路,还望各位⼤佬多多指教 0x01 SSO账号获取 由于⽬标是某⼤学,对外开放的服务基本上都是⼀些静态Web⻚⾯,没什么太多利⽤点 因此获取⼀个该⼤学的SSO账号就显得尤为重要~ 本⼈使⽤该⼤学的域名、以及常⻅的搜索密码关键词,调⽤Github的api在Github中定位到了就读该⼤学的关键⽤ 户 该同学安全意识较为薄弱,经常将账号密码硬编码在程序内,这正是我们苦苦寻觅的⼈才 结合他在其他项⽬中硬...
pdf
Hacking and Securing DB2 LUW Alexander Kornbrust – Red-Database-Security GmbH Table of Content   Information   Known DB2 LUW Exploits   Vulnerabilities in custom DB2 code   Accessing the OS from the DB   Hardening DB2   Summary Information   Version History   Where to get DB2 LUW   Pre-installed D...
pdf
S-Mimikatz源码调试 前期准备 mimikatz源码:地址 调试环境: vs2019 几点设置: 1. 因为官方项目没有debug方案,所以需要手动添加debug配置 2. 项目属性配置 程序入口 调试以 privilege::debug 为例。打开调试-> mimikatz 调试属性->配置属性->调试->命令参数 wmain()是 mimikatz`的入口函数。 命令分发 从上面的循环中获取到请求参数之后就进入到命令分发的 mimikatz_dispatchCommand() 函数。 这里首先有一个 kull_m_file_fullPath 方法,然后进行匹配,暂时不知道具体作用是什么,之 后进入 mimikat...
pdf
"FIRST-TRY" DNS CACHE POISONING WITH IPV4 AND IPV6 FRAGMENTATION Or how to become the one in “one in 34 million” WHERE WE’RE GOING 1. Intro 2. Background on DNS 3. Fragmentation Attacks 4. IPID Inference 5. The Attack (agnostic to IPv4 and IPv6) 6. Mitigations © 2018 Cisco and/or its affiliates. All rights reserved...
pdf
SAVING THE INTERNET Jay Healey @Jason_Healey Atlantic Council ~1436 ~1454 “If  there  is  something  you  know,   communicate it. If there is something you don't know,  search  for  it.” Violates Privacy? Civil Liberties? Legal? Constitutional? “If  there  is  something  you   know, communicate it. If th...
pdf
Be your own telephone company... ...with Asterisk! Presented by Strom Carlson and Black Ratchet DEFCON 13 July 2005 Brief history of telephone switching ● Manual cordboards – Labor-intensive ● Step / Panel / Crossbar – Electromechanical – Simple and effective, but limited in function – Expensive to maintain ● No. 1 / 1...
pdf
Joshua Corman && Nicholas J. Percoco The Cavalry Year[0] A Path Forward for Public Safety Our Dependance on Technology is Growing Faster than our Ability to Secure it. Our Dependance on Technology is Growing Faster than our Ability to Secure it. Problem Statement: While we struggle to secure our organizations, conn...
pdf
© 2002 SPI Dynamics, Inc. All Right Reserved. No reproduction or redistribution without written permission. Page 1 SQL Injection Are Your Web Applications Vulnerable? A White Paper from SPI Dynamics © 2002 SPI Dynamics, Inc. All Right Reserved. No reproduction or redistribution without written permission. Page...
pdf
Honey Onions: Exposing Snooping Tor HSDir Relays Guevara Noubir, Amirali Sanatinia College of Computer and Information Science Northeastern University, Boston, USA {noubir,amirali}@ccs.neu.edu Abstract—Tor is a widely used anonymity network that protects users’ privacy and identity from corporations, agencies and gover...
pdf
© 2014 The MITRE Corporation. All rights reserved. C orey K allenberg Xeno K ovah John B ut t erw orth Sam C ornw ell Extreme Privilege Escalation on Windows 8/UEFI Systems @ coreykal @ xenokovah @jw but terw orth3 @ssc0rnw ell | 2 | Introduction Who we are: – Trusted Computing and firmware sec...
pdf
Hijacking Web 2.0 Sites with SSLstrip Hands-on Training Contact  Sam Bowne  Computer Networking and Information Technology  City College San Francisco  Email: sbowne@ccsf.edu  Web: samsclass.info The Problem  HTTP Page with an HTTPS Logon Button Proxy Changes HTTPS to HTTP Target Using Facebook Attacker: Evil...
pdf
Koadic C3 COM Command & Control DEF CON 25 - July 2017 Agenda ● Current open-source "malware" options for red teams ● Koadic (C3) ○ Advanced JScript/VBScript RAT ● The hell we went through ● Demos whoami /all ● @zerosum0x0 ● @Aleph___Naught ● @JennaMagius ● @The_Naterz Red Team @ RiskSense, Inc First things first... ● ...
pdf
零信任在中通黑灰产对抗的实践 零信任在中通黑灰产对抗的实践 中通快递 朱颖骏 目录 CONTENT 目录>> 02 04 03 成效 01 背景 挑战 零信任安全 总结 05 背景 01 背景 01 背景 业务背景 170亿 业务量全球第一 2000亿港元 纽约/香港上市 50万+ 中通人遍布全国 3万+ 网点达全国 01 背景 监管背景 信息安全监管 落实企业网络安全主体责任 加强个人用户信息保护 提高企业的信息安全意识水平 《中华人民共和国网络安全法》 《关键信息基础设施安全保护条例》 《中华人民共和国个人信息保护法》 《中华人民共和国数据安全法》 挑战 02 挑战 技术挑战 自研1000+应用 外购、本地部署、公有云部署 频繁...
pdf
digita security Fire & Ice making and breaking mac firewalls WHOIS cybersecurity solutions for the macOS enterprise @patrickwardle synack digita nsa nasa Outline making breaking macos firewalls socket filter } bugs bypasses } ipc, rules, alerts digita security MAKING A FIREWALL filtering network traffic The Goal to ...
pdf
深育杯 WriteUp By Nu1L 深育杯 WriteUp By Nu1L 10.10.16.33 10.10.16.182 10.10.16.233 10.10.16.54 10.10.16.109 192.168.54.24 192.168.54.25 192.168.54.26 192.168.199.133 10.10.16.33 ianxtianxt/discuz-ml-rce: 影响系统及版本:Discuz!ML V3.2-3.4 Discuz!x V3.2-3.4 (github.com) 直接rce 10.10.16.182 三次撞⻋导致vftable被free,后续可以劫持 from pwn import * ...
pdf
​ ddi/server/login.php - 0x00 0x01 CLI ​ ​ ​ conf t //config webmaster level 0 username admin password 123123 // show webmaster users // ​ $res = execCli("exec", "webmaster $username $password"); if ($res["status"] != 1) { json_echo($res); exit(); } $isSuccess = trim($res["data"]); if ($isSuccess == 0) {...
pdf
hw 0x01 ​ userid=1|roleid=1 0x02 0x03 this.UserID = CommonFunction.DESDec(this.UserID); this.RoleID = CommonFunction.DESDec(this.RoleID); UserID=Uhe4q0dwPJk= 34dc0AHJKqA= 0x04
pdf
日常审计任务,记录一下 审计 某套短视频点赞诈骗平台的GetShell组合拳(TP3反序列化实战) ​ 打开看到源码,很明显就是ThinkPHP v3.2.x的目录结构。 ​ 查看框架入口文件里的 THINK_VERSION 发现是3.2.3版本。 一些旧的框架版本的注入也都被修复了,寻找注入无果,于是开始其他漏洞的挖掘。 任意Session操作 文件: /Application/Api/Controller/AlipayController.class.php ​ 这里的 session() 是ThinkPHP提供的,功能是可以操作session。 那么这里的利用思路就很清晰了,利用seesion操作,模拟管理员的sessio...
pdf
Go With the Flow Enforcing Program Behavior Through Syscall Sequences and Origins Claudio Canella (@cc0x1f) August 11, 2022 Graz University of Technology Who am I? Claudio Canella PhD Candidate @ Graz University of Technology @cc0x1f claudio.canella@iaik.tugraz.at 1 Claudio Canella (@cc0x1f) 2002 2004 2006 2008 2010 ...
pdf
云影实验室 1 / 12 .NET 高级代码审计(第一课)XmlSerializer 反序列漏洞 Ivan1ee@360 云影实验室 2019 年 03 月 01 日 云影实验室 2 / 12 0X00 前言 在.NET 框架中的 XmlSerializer 类是一种很棒的工具,它是将高度结构化的 XML 数据 映射为 .NET 对象。XmlSerializer 类在程序中通过单个 API 调用来执行 XML 文档和对 象之间的转换。转换的映射规则在 .NET 类中通过元数据属性来表示,如果程序开发人 员使用 Type 类的静态方法获取外界数据,并调用 Deserialize 反序列化 xml 数据就会 触发反...
pdf
Good Viruses. Evaluating the Risks. Dr. Igor Muttik | Senior Architect | McAfee | Avert Labs® 2 Good viruses • It is just technology – neither bad nor good • What could make it dangerous: — Lack of control — Wide availability • If it is dangerous – it’s bad — “Atomic bomb” is bad — “Splitting the atom”? — “Chain reacti...
pdf
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! Orange Tsai Taiwan No.1 About Orange Tsai The most professional red team in Taiwan About Orange Tsai The largest hacker conference in Taiwan founded by chrO.ot About Orange Tsai Speaker - Speaker at several security conferences HITCON, WooYun...
pdf
Disclosing Private Information from Metadata, hidden info and lost data Chema Alonso, Enrique Rando, Francisco Oca and Antonio Guzmán Abstract — Documents contain metadata and hidden information that can be used to disclose private data and to fingerprint an organization and its network computers. This document sho...
pdf
大可(Dark)  熟悉的語言:C/C++ , PASCAL , ASM  專長:windows 程式設計&逆向工程  講課經驗:在ZCamp2008講過課  興趣:程式設計&資訊安全&美食&聊天&動漫& 睡覺&看電影&聽音樂&彈鋼琴&打電玩  Hackshield是一款防止外掛程式的入侵的軟件, 執行遊戲時,Hackshield會偵防外掛使用者的 電腦, 並封鎖不正常的程式碼, 有效防止按鍵 精靈、加速器等的外掛的運行。  轉自  http://eco.gamecyber.com.tw/tw/hanckshield01.html  CE (Cheat Engine)  讀寫記憶體  按照使...
pdf
COPYRIGHT ©2006 McAfee Inc. » Fuzzing XML Based Protocols (SAML) Hacks-In-Taiwan 2006 Yen-Ming Chen Senior Principal Consultant Foundstone, A Division of McAfee 2 COPYRIGHT ©2006 McAfee Inc. Agenda » Introduction – SAML – OpenSAML » Scenarios » Implementation » Conclusion 3 COPYRIGHT ©2006 McAfee Inc. SAML » Security ...
pdf
Bypass KB2871997 0x01 KB2871997 1 2014513 2 2014 7 8 (CredSSP) 2973351 Microsoft 2919355 Windows 2975625 Microsoft 2919355 Windows 2014 9 9 2982378 Microsoft : Windows 7 Windows Server 2008 R2 2014 10 14 2984972 Windows 7 Windows Server 2008 R2 2984976 2592687 8.0 Windows 7 Windows Server 2...
pdf
我的CS笔记之- In-memory Evasion 2 0x01 前言 内存逃逸的第二部分主要是作者讲诉CS的Payload的一个完整执行流程,这个对理解CS植入体非常重 要,对后面做免杀、规避都起到很大作用。第一部分讲侦测手法、第二部分讲自身运行流程,真的是知 己知彼。这一部分作者先讲诉了Stager是什么?然后讲述一个分段加载Payload的完整执行流程,接着 就是不分段加载,最后作者讲了进程注入相关技术在CS中的应用。 0x02 分阶段payload和不分阶段payload 关于分不分阶段,使用过CS的小伙伴应该都很清楚了,但是里面的具体细节,相信很多小伙伴也是一知 半解。下面就详细说下分阶段Payload。 分阶段的pay...
pdf
Re: What’s up Johnny? Covert Content Attacks on Email End-To-End Encryption Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk Remember EFAIL? 2 • Last year: EFAIL Remember EFAIL? 2 • Last year: EFAIL – Major attack with a logo Remember EFAIL? 2 • Last year: EFAIL – Major attack with a l...
pdf
0x01 前言 !"#$%&'('))*)'('+,-)+./00'123456789:;<= >?@ABC=DEFGHIJKLMNOPQRSTUVW 0x02 渗透日常——单点登录 @A XYZ[\]]^_`aabbbbcbbbbbbbcd+eafa*_-.a0+gh, i]ej=klmnLopqBCrstu )h.-)+b vw=xyz{ |}~•€=•‚ƒ„z{|=-jg- vw…†7‡ˆ‰Š‹Œ ~••••Ž' •C•‘=‚’“”R•–—o˜™=Šo†š›œ• •žŸ =¡¢ £¤¥¦§¨ ]+^©ªª «¬'-®¦§¨ ]+^©ªªªª=u ¯*.^_*h]- 6 7°±²¡¢ ³$´}=¤¥µ¶·yvw·...
pdf
1 threat protection | compliance | archiving & governance | secure communication Malware Command and Control Channels - a journey into Darkness - By Brad Woodberg - Emerging Threats Product Manager / Proofpoint - @bradmatic517 - bradmatic@gmail.com 2 Agenda C2 Intro and Background (7 mins) Modern C2 Techniques (6 min...
pdf
Legal Aspects of Full Spectrum Computer Network (Active) Defense def con 2013 Agenda Disclaimer Errata Self Defense in Physical World Applying Self Defense to Computer Network Defense Technology Pen Testing/Red Teaming Intelligence/Open Source IA and Training/Polices Information Control Activ...
pdf
WTF Happened to the Constitution?! The Right to Privacy in the Digital Age Michael “theprez98” Schearer DEFCON 19 Las Vegas, NV Michael “theprez98” Schearer • Founder and Owner, Leverage Consulting & Associates • 8+ years in the U.S. Navy as an EA-6B Prowler Electronic Countermeasures Officer – Veteran of aerial...
pdf
Developing Managed Code Rootkits for the Java Runtime Environment Developing Managed Code Rootkits for the Java Runtime Environment DEFCON 24, August 6th 2016 Benjamin Holland (daedared) ben-holland.com DEFCON 24, August 6th 2016 Developing Managed Code Rootkits for the Java Runtime Environment Developing Managed Code ...
pdf
Utu: Saving The Internet With Hate The Grand Experiment ● An experiment in sociology and computing Philosophical Foundations ● Strong Identity ● Reputation ● Retribution Identity ● Nobody knows how you are on the internet. Reputation ● But, they know you're a dickhead. Retribution ● And, wouldn't it be great to punish ...
pdf
一次诡异的弱口令 0x01 背景 某次客户授权渗透碰到的问题,比较有趣,分享一下。 项目开始没多久,一起的小姐妹说存在弱口令admin/admin,让我试试。然而在我尝试登录的时候,返 回消息为“密码错误,失败次数为1”。这没法登录,密码不对阿,还有账号锁定机制。 继续测试,发现登录页面验证码在使用后未作失效处理,正常操作,爆破一下。 burp的结果显示四五个账号存在弱口令,手动验证下,只有两个账号使用密码正常登录了,其他账号都 返回密码错误的消息。 弱口令登录不能复现,非常诡异,讲给客户估计会被客户加开发一起喷死,于是我就请教了一下我大 哥。 大哥如此清新脱俗的解释,一直喊666的我,灵魂在吹牛逼的过程中莫然得到了一丝的愉悦。然而...
pdf
BBQSQL Ben Toews Scott Behrens Who are we? ● Ben Toews ○ Security Consultant / Researcher at Neohapsis ● Scott Behrens ○ Security Consultant / Researcher at Neohapsis Why are we here? ● BBQSQL ○ New dog, old trick ■ Exploits Blind SQL Injection ○ New dog, new trick ■ Fast ■ Easy ■ Gets those hard to reach spots SQL W...
pdf
MEMORY FORENSICS 识“黑”寻踪 之 内存取证 演讲人:伍智波 (SkyMine) 中国网安 · 广州三零卫士 - 安全专家 2 0 1 8 目录 CONTENTS PART 01 内存取证的起源与发展 01 PART 02 内存管理机制简述 02 PART 03 如何获取内存数据 03 PART 04 内存分析的工具 04 PART 05 犯罪取证案例分析 05 KEYWORD : 应急响应、数字取证、行为溯源 THE ORIGIN AND DEVELOPMENT OF MEMORY FORENSICS PART 01 内存取证的起源与发展 2002年 2005年 2006年 2...
pdf
前言 By:Astartes 杀软对抗貌似是个经久不衰的议题,在我看来他是红队必备的基础设施之一,在红队中不可缺少,我想 用这篇文章,尽量用大白话的形式来说一下 "静","动",这篇文章很基础。因为到头来我只讲了如何上 线。同时,这篇文章又与别的文章不太一样,我想从比较基础的东西让初学者知道到底该如何对抗。 静态免杀 首先我们先看下面这段代码,定义了两个数组 这两个数组的不同之处在于 1. 类型不同 Characterarr为字符数组,String为字符串。字符串在后面默认填\0 1. 存放区域不同 字符数组或者小数组存放的位置在栈里,而字符串是常量,在常量区 请一定要注意这两种的格式,字符串由双引号包裹,字符数组由单引号包裹...
pdf
I’m your MAC(b) Daddy Grayson Lenik – Trustwave @handlefree Copyright Trustwave 2010 Confidential Bio • Security Consultant for Trustwave’s Spiderlabs. • Author of the Digital Forensics blog “An Eye on Forensics” • GIAC Certified Forensic Analyst (GCFA) • Microsoft Certified Systems Engineer (MCSE) • Qualified Securit...
pdf
Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator Alexei Bulazel @0xAlexei DEF CON 26 About Me ● Security researcher at ForAllSecure ● Firmware RE & cyber policy at River Loop Security ● RPI / RPISEC alumnus ● First time speaking at DEF CON! @0xAlexei This is my personal research, any ...
pdf
PentesterAcademy.co m/ ©PentesterAcademy.com VOIPSHARK:开源VOIP分析平台是与⾮非 Nishant/Sharma/ Jeswin1Mathai1 Ashish1Bhangale1 PentesterAcademy.com1&1AttackDefense.com1 PentesterAcademy.co m/ ©PentesterAcademy.com PentesterAcademy.co m/ 关于我们 我,/Nishant/Sharma/ •  R&D1经理理及资深培训师, Pentester1Academy1 •  固件开发者, 企业级WiFi1APs和WIPS传...
pdf
@jtpereyda curl 'fj48914309qr2p3 rim e/resd,fa;wf.,4vpl6v3/5p.vl;ul.6.ty[5p16[4[1]4\5][13]5123' curl 'fj48914309qr2p3 rim e/resd,fa;wf.,4vpl6v3/5p.vl;ul.6.ty[5p16[4[1]4\5][13]5123' https://apps.dtic.mil/dtic/tr/fulltext/u2/a558209.pdf https://community.synopsys.com/s/question/0D53400004D2fALCAZ from boofuzz import * # ...
pdf
Offensive Windows IPC Internals 1: Named Pipes Contents: Introduction Named Pipe Messaging Data Transfer Modes Overlapping Pipe I/O, Blocking mode & In-/Out Buffers Named Pipe Security Impersonation Impersonating a Named Pipe Client Attack Surface Client Impersonation Attack scenario Prerequisites Misleading Documentat...
pdf
CyCraft Proprietary and Confidential Information Operation Chimera - APT Operation Targets Semiconductor Vendors C h u n g - K u a n C h e n , I n n d y L i n , S h a n g - D e J i a n g CyCraft Proprietary and Confidential Information Whoami C.K Chen ► Senior Researcher at CyCraft ► Retired CTF Player – BambooFox Fou...
pdf
HACKSTUFF @ OSCAR WEB前端攻擊與防禦 前言 ★ 不講FLASH ★ 不講Moblie ★ WEB基礎 大綱 ★ 攻擊原理介紹 ★ 衍生攻擊 ★ 防禦方式 ★ 實際案例 我是誰 ★ 奧斯卡 ★ PHP後端工程師 ★ hackstuff member ★ oscar3x39@gmail.com 前端 什麼是前端 ★ 前端就是軟體中與用戶交互的部分 ★ 這裡軟體指的是瀏覽器 HTML + CSS + JS 前端攻擊 ★ 利用軟體中與用戶交互的弱點 進行非法操作 什麼是前端攻擊 攻擊點 ★瀏覽器 ★網站 ★使用者 WEB前端攻擊主要類型 ★XSS ★CSRF ★操作挾持 XSS OWASP OPEN WEB APPLIC...
pdf
Defending Networks with Incomplete Information: A Machine Learning Approach DefCon 21 – 2013 Page 1 Defending Networks with Incomplete Information: A Machine Learning Approach Introduction and Abstract Let's face it: we may win some battles, but we are losing the war pretty badly. Regardless of the advances in ...
pdf
Beyond the Lulz: Black Hat Trolling, White Hat Trolling, and Hacking the Attention Landscape SECTION 1 Are you familiar with fishing? Trolling is where you set your fishing lines in the water and then slowly go back and forth dragging the bait and hoping for a bite. Trolling on the Net is the same concept - someone ...
pdf
ASP/ASPX下的流量混淆 前言 今天谈一谈ASP/ASPX下的流量混淆姿势。 以执行 Response.Write("yzddmr6") 为例。 不带eval的普通编码方式 Unicode(asp/aspx) 利用iis解析unicode的特性,我们可以像sql的bypass一样来用unicode编码绕过。 mr6=Response.Write("yzddmr6") 蚁剑中aspx类型shell默认有unicode编码器,但是asp中没有,可以自己手动添加一份。 大小写(asp) asp对于大小写不敏感,所以可以对payload中的字符进行大小写变换。 mr6=REsponSe.WriTe("yzddmr6") 要注意的是asp...
pdf
CS的shellcode功能分析和代码重写实战 前⾔ 随着圈⼦⾥的新⼈越来越多,我准备从这⼀篇开始慢慢写⼀些与基础知识相关的⽂章,⽅便 ⼀些对⼆进制安全知识了解不多的同学参考。虽然讲的还是基础知识,但是我也尽量写的实 ⽤和有趣⼀点,防⽌与⽹上的⽂章出现同质化问题。 这篇要讲的问题是由上⼀篇⽂章 滥⽤具备RWX-S权限且有签名的dll进⾏⽆感知的shellcode 注⼊引出的,有同学问我为什么接收 metepreter 第⼆阶段的恶意代码需要那样写,本篇⽂ 章就回答这个问题。 另外⾮常欢迎各位同学在圈⼦⾥提问,能为基础知识板块的编写提供更多素材 CS的shellcode功能分析 我们这⾥讲的其实是stage类型的shellcode,...
pdf
Antivirus Bypass Techniques Learn practical techniques and tactics to combat, bypass, and evade antivirus software Nir Yehoshua Uriel Kosayev BIRMINGHAM—MUMBAI Antivirus Bypass Techniques Copyright © 2021 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or ...
pdf
Dmitry Kurbatov Sergey Puzankov Vladimir Kropotov Fractured Backbones – Incidents Detection and Forensics in Telco Networks ptsecurity.com About us Joint research of Incident Response and Telco Security Teams Introduction Technologies behind telco networks Чем мы пользуемся сегодня и на основе каких техно...
pdf
1 【CVE-2022-36804】bitbucket 前台RCE漏洞 Critical severity command injection vulnerability - CVE-OLOO-PTWLQ patch#N patch#O 分析N 分析O: 分析猜想 补丁分析 事后诸葛亮 (N)为什么是%LL (O)为什么不能命令注⼊,只能参数注⼊ (P)为什么是git archive? EXP Ref 官⽅通告:https://confluence.atlassian.com/bitbucketserver/bitbucket-server-and-data-center- advisory-2022-08-24-115548983...
pdf
Sliver 是一个基于Go的开源、跨平台的红队平台,可供各种规模的组织用于执行安全测试。 Sliver 的木马 支持 C2 over Mutual-TLS、HTTP(S) 和 DNS等协议。 implant可以时时编译生成,并会使 用证书进行加密。 基于Go语言的特性,服务器和客户端以及implant都支持 MacOS、Windows 和 Linux。 Github地址:https://github.com/BishopFox/sliver tag:v1.4.22 go语言越来越流行,并且作为红队使用语言有很多优势。它十分简单,代码可以轻松编译为native代码 到各类平台,跨平台开发非常容易。像py2exe和jar2exe,...
pdf
T1175: Lateral Movement via DCOM 查看mitre ATT&CK 的描述,已经不推荐使用该技术,推荐使用Remote Services: Distributed Component Object Model和Inter-Process Communication: Component Object Model。 参考: The Component Object Model LATERAL MOVEMENT USING EXCEL.APPLICATION AND DCOM 域渗透——利用DCOM在远程系统执行程序 组件对象模型 什么是DCOM( Distributed Component Object ...
pdf
作者:http://www.sectop.com/ 文档制作:http://www.mythhack.com PHP 代码审计 目录 1. 概述 ...................................................................... 2 2. 输入验证和输出显示 ......................................................... 2 1. 命令注入 ............................................................ 3 2. 跨站脚本 ...............
pdf
DDoS Black and White “Kungfu” Revealed (DEF CON 20 Edition) {Tony Miu (aka MT), Anthony Lai (aka Darkfloyd), Alan Chung (aka Avenir), Kelvin Wong (aka Captain)} Valkyrie-X Security Research Group (VXRL) Disclaimer • There is no national secrets leaked here. • Welcome to all national spies.  • No real attacks are l...
pdf
Geo Geo--IP Blocking: A sometimes IP Blocking: A sometimes effective Mal effective Mal--ware deterrent ware deterrent DEFCON 13 Presentation July 30, 2005 Agenda Agenda What is Geo-IP Blocking? Why Geo-IP Block? Why not to Geo-IP Block How Geo-IP Blocking works Regional Internet Registries (RIRs) Different Ge...
pdf
The Risks and Vulnerabilities Associated with Wireless Hotspots Michael Sutton <msutton@idefense.com> Pedram Amini <pamini@idefense.com> Hacking The Invisible Network iDEFENSE Copyright © 2003 iDEFENSE Inc. iDEFENSE Purpose • Study security from two points of view – Providers – End users • A variety of implementation...
pdf
1 從GDPR看言論自由與被遺忘權 中華民國電腦稽核協會 Computer Audit Association 國際電腦稽核協會 台灣分會 ISACA Taiwan Chapter service@isasa.org.tw Hacks in Taiwan Conference Community 2018 2 報告人簡歷 1 3 2 姓名 張紹斌 經歷 司法官班第33期結業 智慧財產及電腦犯罪專組主任檢察官 東吳法研所科技法律組兼任助理教授 行政院資通安全稽核委員 司法官學院講座 學歷 政治大學法律學系學士 交通大學科技法律研究所碩士 廈門大學知識產權研究院博士生 4 現職 中華民國...
pdf
2021/10/28 让你的php⽹站拥有shiro - depy https://blog.happysec.cn/index/view/366.jsp 1/6 depy 让你的php网站拥有shiro 2021年10月28日 / 网络安全 前言 很久很久以前freebuf发过一篇通过shiro反序列化拿下php网站的文章后,我大 受震撼,震撼到今天。 我今天花了一下午摸鱼做这个实验。实验非常简单,也就是我们如何让php网站 收到shiro探测的请求后让工具或脚本认为这是一个有shiro框架的网站?如何收 到密钥爆破检测请求的时候,通过请求的字段值来与后端密钥做匹配,更加逼真的 还原密钥爆破的场景,从而让脚本小子继续误入歧途? S...
pdf
From “No Way” to 0-day: Weaponizing the Unweaponizable Joshua Wise 1 “...you’re de0uing it wrong...” Outline • Intro • Vulnerabilities: in general - What makes something easy to exploit? • Vulnerabilities: a case study - Making something hard into something doable • Briefly -- what went wrong? - How did this sort of t...
pdf
Hacking and protecting Oracle Database Vault Esteban Martínez Fayó Argeniss (www.argeniss.com) July 2010 Agenda • Introduction to Oracle Database Vault  What is Oracle Database Vault, What changes introduce, Oracle Database Vault elements. • Attacks against Database Vault  Getting OS access  Impersonatin...
pdf
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 WO IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA MDY Industries, LLC, Plaintiff/Counterdefendant, vs. Blizzard Entertainment, Inc.; and Vivendi Games, Inc., Defendants/Counterclaimants. _________________________________ Bliz...
pdf
DzzOfficeRCEPHP ​ dzz/connect/oauth.php SQLI ​ $_GET['bz'] dzz_io::authorize() dzz_io::initIO() $_GET['bz'] io_dzz io_baiduPCS io_ALIOSS io_disk authorize() io_disk $this->_xss_check(); $_POST $_GET $this->_xss_check(); $_POST Discuz Discuz Discuz authkey random() Discuz authkey Discuz D...
pdf
NoSQL, No Injection !? By. Kuon Agenda  What is NoSQL?  Types of NoSQL  Who use NoSQL concept?  NoSQL Architecture  Security Problem  Prevention and Detection !? What is NoSQL? χ No SQL (statement) χ No SQL Injection  Not only a SQL  Non-RDBMS • Semi-structured • Schema-less Types of NoSQL 1. Key-value based 2....
pdf
Bypass AMSI的前世今生(4) - 非主流合集 0x00 前言 分析完了[BA1-4],我相信大家对AMSI已经有了不错的认知,也能够利用混淆bypass AMSI了。今天我 们讨论的是非主流的bypass amsi的合集,也就是[BA5-8],分别如下: [BA5] 卸载当前进程中的amsi.dll [BA6] PowerShell.exe同目录下放入傀儡amsi.dll劫持正常amsi.dll(正常amsi.dll存在于 c:\windows\system32\amsi.dll) [BA7] Null字符绕过 [BA8] COM Server劫持(劫持杀软接入接口) 这些方法曾今都能起到bypass AMSI作用,但是很...
pdf
cp / zet / f9a L A S T E X P L O I T A T I O N About Us ● Researchers from TeamT5 ● Core Developer of ThreatSonar for Linux, macOS, Windows ● We mainly focus on state of the art techniques of threat actors and how to effectively identify them 3 Outline 4 Attack Defense Tool ● LEAYA: an Embedded System Detection and Re...
pdf
#BHUSA @BlackHatEvents Backdooring and hijacking Azure AD accounts by abusing external identities Dirk-jan Mollema / @_dirkjan #BHUSA @BlackHatEvents Information Classification: General whoami - Dirk-jan Mollema - Lives in The Netherlands - Hacker / Researcher / Founder @ Outsider Security - Author of several (Azure)...
pdf
©2016 Check Point Softw are Technologies Ltd. All rights reserved | P. 1 INTRODUCTION The cloak-and-dagger of cybercrime makes for entertaining theater. That’s especially true for sensational breaches often caused by malware or other sophisticated attacks. Behind the drama though are some inherent vulnerab...
pdf
PCI: Compromising Controls and Compromising Security PCI? At DefCon? Compliance is changing the way companies "do security", and that has an effect on everyone, hacker, defender, attacker, and innocent bystander. One result is that companies fear QSAs more than 0-days. Who are we? • James Arlen, aka Myrcuri...
pdf
Hacking G Suite: The Power of Dark Apps Script Magic By @IAmMandatory (Matthew Bryant) Who am I? ● mandatory (Matthew Bryant) ● Leading the Red Team Effort at Snapchat ● @IAmMandatory ● Hacking write ups and research at https://thehackerblog.com Context & Background What exactly are we dealing with here? Google Works...
pdf
0x00 背景 ⽬前的攻防场景,攻击成本的节约、周期短,成果要求⾼成了普遍要⾯对的问题,所以 对于基础设施的建设越来越重视,⼀键⾃动化的部署CS、Frp gen等⼯具的开发,节省了以 前略⻓的搭建配置时间,变相增加攻击有效时间;优化的Profile,⽐如修改⼀些默认标记 位、流量伪装、关闭stager等,成熟的OPSEC,⽐如杀软度测试、攻击⼿法检测测试、上传 ⽂件清除流程等,减少了免杀难度系数,增加溯源难度的同时,也减少团队协作中执⾏了⼀ 些被杀软标记的攻击⽅式导致掉点的可能性。前两天刚好聊到域前置的节点⽩域名收集及验 证,内部以前也简单分享过,遂炒冷饭。 0x01 CDN and 域前置的原理 只要别 ping cdn 节点,然...
pdf
TOOLSMITHING AN IDA BRIDGE: A TOOL BUILDING CASE STUDY Adam Pridgen Matt Wollenweber Presentation Agenda • Motivation and Purpose • Toolsmithing • Identifying the short-cuts to meet project needs • Processes for Expediting Development • Prototyping, Modifying, Testing, Restart?!? • Extension development with ...
pdf
SITCH Inexpensive, coordinated GSM anomaly detection About Me • 2000: Technology career started (I can get paid for this??) • 2003: Started building with Linux • Came to infosec through systems and network engineering, integration • Security tools and integration (SIEM, HIDS, etc…) • Current: R&D –Ashmastaflash “Tho...
pdf
Offensive Windows IPC Internals 3: ALPC 24 May 2022 Contents: Introduction ALPC Internals The Basics ALPC Message Flow ALPC Messaging Details ALPC Message Attributes Putting the pieces together: A Sample Application Attack Surface Identify Targets Impersonation and Non-Impersonation Unfreed Message Objects Conclousion...
pdf
p Chema Alonso Chema Alonso Informática 64 Informática 64 Connection Strings Connection Strings • Define the way an application connects to Define the way an application connects to data repository • There are connection strings for: • There are connection strings for: – Relational Databases (MSSQL, Oracle, MySQL,…) LD...
pdf
Steele, Patten, and Kottmann Black Hat Go Go Programming for Hackers and Pentesters Go Programming for Hackers and Pentesters Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tacti...
pdf
Secure SofwareDevelopment LifeCycle 为您构架安全的业务系统 企业最佳安全实践 系统安全 网络安全 应用安全 1990-2017 2002-2017 2006-2017 网络攻击的方向 木桶原理 安全攻击,最薄弱环节的攻击; 安全问题,最薄弱环节的集群式爆发; 最薄弱环节的攻击 没有考虑安全设计的业务系统,理论上安全风险较高; 没有经过长时间考验的业务系统,实际安全风险较高; 没有经过验证的业务逻辑,带来的新形式的攻击较多。 最新业务的攻击 漏洞 防御 体系 威胁 防御 体系 漏洞防御体系 依照漏洞思维来建立的防御系统: 1、既有漏洞的安全经验; 2、测试发现的漏洞情况; 优势:简单、快速、高效; ...
pdf
Copyright ©2007 Savid Technologies, Inc. All Rights Reserved DEFCON 15 Analyzing Intrusions & Intruders A Deeper look at a psychological approach towards network analysis Sean M. Bodmer Savid Technologies, Inc. sbodmer@savidtech.com Copyright ©2007 Savid Technologies, Inc. All Rights Reserved !!Updated Presentation!! ...
pdf
Abusing Firefox Extensions Defcon17– US, Las Vegas Roberto Suggi Liverani Nick Freeman WTF Are We?  Roberto Suggi Liverani  Senior Security Consultant – Security-Assessment.com  OWASP NZ Leader  http://malerisch.net  Nick Freeman  Security Consultant – Security-Assessment.com  http://atta.cked.me  Contact us ...
pdf
2022/3/17 16:07 Evernote Export file:///C:/Users/jiushi/Desktop/k8s未授权.html 1/20 介绍 k8s全称kubernetes,是一个由google开源的,用于自动部署,扩展和管理容器化应用程序的开源系统。通过k8s可跨多台主机进行容器编排、快速按需扩展容器化应用及其资源、 对应用实施状况检查、服务发现和负载均衡等。 组件介绍 如图所示,k8s集群由主控节点(Master node,以下简称master)和工作节点(Worker Node,以下简称node)组成: master节点负责资源调度,调度应用,维护状态和应用扩容等。 node节点上跑着应用服务,每...
pdf
警告:10级地震将在一分钟内发生 李伟光 weelight.li@gmail.com ! 360 独角兽团队 演讲内容 01 关于公共预警系统与LTE网络 02 LTE协议中的漏洞 03 触发漏洞 a. 搭建一个伪基站 b. 伪造虚假的预警消息 04 结论! 01 公共预警系统与LTE网络 针对这些灾害对公众发出警告信息 PWS警告系统遍布全球 ETWS KPAS EU-ALERT CMAS •  2018年1月的夏威夷导弹警报 新闻 •  2018年1月的夏威夷导弹警报 新闻 02 LTE协议中的漏洞 LTE协议中的漏洞 1.  目前的标准中并未加入对警报信息的签名等验证信息...
pdf
Hacking 911: Adventures in Disruption, Destruction, and Death quaddi, r3plicant & Peter Hefley August 2014 Jeff Tully Christian Dameff Peter Hefley Physician, MD Emergency Medicine Physician, MD Pediatrics IT Security, MSM, C|CISO, CISA, CISSP, CCNP, QSA Senior Manager, Sunera Jeff Tully Christia...
pdf
那些年年的密碼學後⾨門 講者 : OAlienO ⽬目錄 1. Cryptographic Backdoor ✦ 重要性 ✦ 種類 2. Dual EC Backdoor ✦ 介紹 ✦ 隨機數很重要嗎? ✦ 後⾨門原理理 ✦ 故事時間 3. Diffie Hellman Backdoor ✦ 複習時間 ✦ Everybody Backdoor ✦ Nobody-But-Us Backdoor 4. Conclusion Cryptographic Backdoor Cryptographic Backdoor - 重要性 網路路通訊⼗十分依賴密碼系統 各國都想要 監聽網路路通訊 密碼學後⾨門 Cryptogra...
pdf
Asia-Pacific Cybersecurity Community Collaboration and Joint Defense Tom Millar, US Cybersecurity and Infrastructure Security Agency (CISA) 1. A Little Bit About CISA 2. The Top Threat to US Critical Infrastructure 3. Fighting The Top Threat 4. Working Collaboratively 5. Questions & Answers What is CISA? • CIS...
pdf
CybricsCTF WriteUp By Nu1L Author : Nu1L CybricsCTF WriteUp By Nu1L CTB Little Buggy Editor rm -rf’er GrOSs 1 Reverse Walker Kernel Reverse Paired Listing Network LX-100 ASCII Terminal WEB Multichat Ad Network Announcement Cyber Signer scanner GrOSs 2 Forensic Recording Namecheck rebyC CAPTCHA The Flag CTB Little Buggy...
pdf
“Quantum” Classification of Malware John Seymour (seymour1@umbc.edu) 2015-08-09 whoami • Ph.D. student at the University of Maryland, Baltimore County (UMBC) • Actively studying/researching infosec for about three years (mostly academic) • Currently work for CyberPoint International Outline • D-Wave Basics • The D-W...
pdf