text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
0xcsandker
csandker
RSS Feed
//Posts
//History of Windows
//Archive
//Tags & Search
//ME
Switch Theme
Debugging and Reversing ALPC
29 May 2022
>> Introduction & Disclaimer
>> Environment Preparation
>> Getting Off The Ground
>> From User to Kernel Land
>> Hunting An ALPC Object
This post is an addendum to my jo... | pdf |
Hack%to%Basics%–%x86%Windows%Based%Buffer%Overflows,%an%introduc:on%to%buffer%overflows%
Instructor%-%Dino%Covotsos%– Telspace%Systems%
Co–Instructor%–%Manuel%Corregedor%
@telspacesystems%
Whoami'(x2)'?'
We%work%in%the%Penetra:on%Tes:ng%space%(Telspace%Systems)%
%
Approximately%20%years%in%
%
Trying%to%keep%some%sort%of%wo... | pdf |
CONFESSIONS OF A
NESPRESSO MONEY
MULE
NINA KOLLARS
@NIANASAVAGE
“KITTY HEGEMON”
VIEW EXPRESSED TODAY
DO NOT NECESSARILY
REFLECT THE DON, DOD,
NWC, ….
YES, THEY KNOW I’M
HERE, ….
….SO I BOUGHT
SOME COFFEE ON
EBAY…
And this showed up with my
coffee….. Retail $280
Triangulation
Fraud
…..SO I
BOUGHT SOME
MO... | pdf |
Nanika
naninb@gmail.com
魔術
薩斯頓三原則
表演之前絕對不透漏接下來的表演內容。
不在同一時間、地點對相同的觀眾變同樣
的表演2次以上。
表演過後,絕不向觀眾透露表演的秘密。
Windows 防護弱點機制
/GS
SafeSEH
DEP
ASLR
突破
破解魔術手法
一般弱點利用
Fish 應用範圍
成功魔術的需求
手法 (弱點利用)
Why Spraying
Not control precisely
Not control
Universal
12
NOP
NOP
0x0c0c0c0c OR AL,0C
0x0d0d0d0d 0d OR EAX,0D0D0D0D
0x0a0a0... | pdf |
HITCON GIRLS 成果分享
與 BLACK HAT 之旅
HITCON COMMUNITY 2019
SPEAKERS
‣shad0w
‣ 台灣停電科技大學研究生,HITCONGIRLS創始團隊中最晚脫離學生身份的人(・ω・)ノ
‣akee
‣ HITCONGIRLS成員,不是創始團隊也沒有兼職,只是個單純的成員_(:з」∠)_
‣HazelYen
‣ HITCONGIRLS創始團隊暨總召,比較擅長活在鍵盤後面的生物(゚∀゚)
OUTLINE
‣HITCONGIRLS介紹
‣近期成果與專案
‣BlackHat旅程
‣DEFCON見聞
OUTLINE
‣HITCONGIRLS介紹
‣近期成果與專案
‣BlackHat旅程
... | pdf |
eBPF, I thought we were
friends !
Guillaume Fournier
Sylvain Afchain
August 2021
Defcon 2021
2
About us
Guillaume Fournier
Security Engineer
guillaume.fournier@datadoghq.com
Sylvain Afchain
Staff Engineer
sylvain.afchain@datadoghq.com
Sylvain Baubeau
Staff Engineer & Team lead
sylvain.baubeau@datadoghq.com
●
Cloud Workl... | pdf |
Climbing Everest
Voting 101
Voting in the US
• Highly decentralized:
– Federal government sets broad standards
– Each state has own laws, rules, requirements
– Elections run by counties (>3000 in US)
– Voting takes place in neighborhood precincts
• tens, hundreds or thousands per county
• Complex:
– Typical election ha... | pdf |
Index
Veritas Project
Computer Security Trends
Military Intelligence
American Minds
Submit HQ
Contact Us
Understanding the Security Trends Interface
So how does this thing work? Basically the premise of this study is to track increases in "chatter" (based on keywords) just like what
ECHELON, INTERPOL, or the other inte... | pdf |
Compliance: The
Enterprise
Vulnerability
Roadmap
• • •
Weasel
Nomad Mobile Research Centre
weasel@nmrc.org
Introduction
The Semi-Security State of Compliance
• Overview of Compliance Benefits and
Standards
• Things Compliance Gets Wrong
• Detrimental effects of Compliance
Compliance Benefits
• Old, hard-to-sell co... | pdf |
No MAS:
Mike Davis
(misadventures in high security lock design)
Introduction
• I Hack stuff for IOActive
Weird embedded stuff
• Amateur lock picker
I’m not very good
• Pretty good understanding of how the pixies flow
• I’m not interested in hacking one thing, I want to hack all
of the things.
2
Todays plan
• We’re g... | pdf |
针对 PHP 的网站主要存在下面几种攻击方式:
1、命令注入(Command Injection)
2、eval 注入(Eval Injection)
3、客户端脚本攻击(Script Insertion)
4、跨网站脚本攻击(Cross Site Scripting, XSS)
5、SQL 注入攻击(SQL injection)
6、跨网站请求伪造攻击(Cross Site Request Forgeries, CSRF)
7、Session 会话劫持(Session Hijacking)
8、Session 固定攻击(Session Fixation)
9、HTTP 响应拆分攻击(HTTP Response Splitting)... | pdf |
making fun of your malware
Defcon 17
Matt Richard and Michael Ligh
Following the presentation at Defcon 17,
you can find the final slides here:
http://code.google.com/p/mhl-malware-scripts/Defcon2009_MakingFun.pdf
Silent Banker author forgets to seed the PRNG
Honey, I Shrunk the Entropy!
Off to a bad start…
Zeus, Sep... | pdf |
Wifi Hacking
DEFCON China 1.0 2019
This presentation at http://bit.ly/2LeM0U3
> whoarewe // Philippe Delteil // @philippedelteil
CS. Engineer@University of Chile
Self proclaimed hacker
1st talk at Defcon 26 Skytalks "Macabre stories of a hacker in the public health
sector"
Hacked over 3,000 wifi routers of Brazil... | pdf |
0x00 前⾔
作者J0o1ey,有技术交流或渗透测试/Redteam培训需求的朋友欢迎联系QQ/VX-547006660
本⽂简单记述了⼀下本⼈在某攻防演练过程中⼀次层层突破的有趣经历
技术性⼀般,但是层层突破属实艰难,并⽤到了⽐较多的思路,还望各位⼤佬多多指教
0x01 SSO账号获取
由于⽬标是某⼤学,对外开放的服务基本上都是⼀些静态Web⻚⾯,没什么太多利⽤点
因此获取⼀个该⼤学的SSO账号就显得尤为重要~
本⼈使⽤该⼤学的域名、以及常⻅的搜索密码关键词,调⽤Github的api在Github中定位到了就读该⼤学的关键⽤
户
该同学安全意识较为薄弱,经常将账号密码硬编码在程序内,这正是我们苦苦寻觅的⼈才
结合他在其他项⽬中硬... | pdf |
Hacking and Securing
DB2 LUW
Alexander Kornbrust – Red-Database-Security GmbH
Table of Content
Information
Known DB2 LUW Exploits
Vulnerabilities in custom DB2 code
Accessing the OS from the DB
Hardening DB2
Summary
Information
Version History
Where to get DB2 LUW
Pre-installed D... | pdf |
S-Mimikatz源码调试
前期准备
mimikatz源码:地址
调试环境: vs2019
几点设置:
1. 因为官方项目没有debug方案,所以需要手动添加debug配置
2. 项目属性配置
程序入口
调试以 privilege::debug 为例。打开调试-> mimikatz 调试属性->配置属性->调试->命令参数
wmain()是 mimikatz`的入口函数。
命令分发
从上面的循环中获取到请求参数之后就进入到命令分发的 mimikatz_dispatchCommand() 函数。
这里首先有一个 kull_m_file_fullPath 方法,然后进行匹配,暂时不知道具体作用是什么,之
后进入 mimikat... | pdf |
"FIRST-TRY" DNS CACHE
POISONING WITH IPV4 AND IPV6
FRAGMENTATION
Or how to become the one in
“one in 34 million”
WHERE WE’RE GOING
1. Intro
2. Background on DNS
3. Fragmentation Attacks
4. IPID Inference
5. The Attack (agnostic to IPv4 and IPv6)
6. Mitigations
© 2018 Cisco and/or its affiliates. All rights reserved... | pdf |
SAVING THE INTERNET
Jay Healey
@Jason_Healey
Atlantic Council
~1436
~1454
“If there is something you know,
communicate it.
If there is something you don't
know, search for it.”
Violates Privacy? Civil Liberties?
Legal? Constitutional?
“If there is something you
know, communicate it.
If th... | pdf |
Be your own telephone company...
...with Asterisk!
Presented by
Strom Carlson and Black Ratchet
DEFCON 13
July 2005
Brief history of telephone switching
● Manual cordboards
– Labor-intensive
● Step / Panel / Crossbar
– Electromechanical
– Simple and effective, but limited in function
– Expensive to maintain
● No. 1 / 1... | pdf |
Joshua Corman && Nicholas J. Percoco
The Cavalry Year[0]
A Path Forward for Public Safety
Our Dependance on Technology is
Growing Faster than our Ability to
Secure it.
Our Dependance on Technology is Growing
Faster than our Ability to Secure it.
Problem Statement:
While we struggle to secure our
organizations, conn... | pdf |
© 2002 SPI Dynamics, Inc. All Right Reserved. No reproduction or redistribution without written permission.
Page 1
SQL Injection
Are Your Web Applications Vulnerable?
A White Paper from SPI Dynamics
© 2002 SPI Dynamics, Inc. All Right Reserved. No reproduction or redistribution without written permission.
Page... | pdf |
Honey Onions: Exposing Snooping
Tor HSDir Relays
Guevara Noubir, Amirali Sanatinia
College of Computer and Information Science
Northeastern University, Boston, USA
{noubir,amirali}@ccs.neu.edu
Abstract—Tor is a widely used anonymity network that
protects users’ privacy and identity from corporations, agencies
and gover... | pdf |
© 2014 The MITRE Corporation. All rights reserved.
C orey K allenberg
Xeno K ovah
John B ut t erw orth
Sam C ornw ell
Extreme Privilege Escalation
on Windows 8/UEFI Systems
@ coreykal
@ xenokovah
@jw but terw orth3
@ssc0rnw ell
| 2 |
Introduction
Who we are:
– Trusted Computing and firmware sec... | pdf |
Hijacking Web 2.0
Sites with SSLstrip
Hands-on Training
Contact
Sam Bowne
Computer Networking and Information
Technology
City College San Francisco
Email: sbowne@ccsf.edu
Web: samsclass.info
The Problem
HTTP Page with an HTTPS Logon Button
Proxy Changes HTTPS to
HTTP
Target
Using
Facebook
Attacker:
Evil... | pdf |
Koadic C3
COM Command & Control
DEF CON 25 - July 2017
Agenda
●
Current open-source "malware" options for red teams
●
Koadic (C3)
○
Advanced JScript/VBScript RAT
●
The hell we went through
●
Demos
whoami /all
●
@zerosum0x0
●
@Aleph___Naught
●
@JennaMagius
●
@The_Naterz
Red Team @ RiskSense, Inc
First things first...
●
... | pdf |
零信任在中通黑灰产对抗的实践
零信任在中通黑灰产对抗的实践
中通快递 朱颖骏
目录
CONTENT
目录>>
02
04
03
成效
01
背景
挑战
零信任安全
总结
05
背景
01
背景
01 背景
业务背景
170亿
业务量全球第一
2000亿港元
纽约/香港上市
50万+
中通人遍布全国
3万+
网点达全国
01 背景
监管背景
信息安全监管
落实企业网络安全主体责任
加强个人用户信息保护
提高企业的信息安全意识水平
《中华人民共和国网络安全法》
《关键信息基础设施安全保护条例》
《中华人民共和国个人信息保护法》
《中华人民共和国数据安全法》
挑战
02
挑战
技术挑战
自研1000+应用
外购、本地部署、公有云部署
频繁... | pdf |
digita security
Fire & Ice
making and breaking mac firewalls
WHOIS
cybersecurity solutions for the macOS enterprise
@patrickwardle
synack
digita
nsa
nasa
Outline
making
breaking
macos firewalls
socket filter
}
bugs
bypasses
}
ipc, rules, alerts
digita security
MAKING A FIREWALL
filtering network traffic
The Goal
to ... | pdf |
深育杯 WriteUp By Nu1L
深育杯 WriteUp By Nu1L
10.10.16.33
10.10.16.182
10.10.16.233
10.10.16.54
10.10.16.109
192.168.54.24
192.168.54.25
192.168.54.26
192.168.199.133
10.10.16.33
ianxtianxt/discuz-ml-rce: 影响系统及版本:Discuz!ML V3.2-3.4 Discuz!x V3.2-3.4 (github.com)
直接rce
10.10.16.182
三次撞⻋导致vftable被free,后续可以劫持
from pwn import *
... | pdf |
ddi/server/login.php
-
0x00
0x01 CLI
conf t //config
webmaster level 0 username admin password 123123 //
show webmaster users //
$res = execCli("exec", "webmaster $username $password");
if ($res["status"] != 1) {
json_echo($res);
exit();
}
$isSuccess = trim($res["data"]);
if ($isSuccess == 0) {... | pdf |
hw
0x01
userid=1|roleid=1
0x02
0x03
this.UserID = CommonFunction.DESDec(this.UserID);
this.RoleID = CommonFunction.DESDec(this.RoleID);
UserID=Uhe4q0dwPJk=
34dc0AHJKqA=
0x04 | pdf |
日常审计任务,记录一下
审计
某套短视频点赞诈骗平台的GetShell组合拳(TP3反序列化实战)
打开看到源码,很明显就是ThinkPHP v3.2.x的目录结构。
查看框架入口文件里的 THINK_VERSION 发现是3.2.3版本。
一些旧的框架版本的注入也都被修复了,寻找注入无果,于是开始其他漏洞的挖掘。
任意Session操作
文件: /Application/Api/Controller/AlipayController.class.php
这里的 session() 是ThinkPHP提供的,功能是可以操作session。
那么这里的利用思路就很清晰了,利用seesion操作,模拟管理员的sessio... | pdf |
Go With the Flow
Enforcing Program Behavior Through Syscall Sequences and Origins
Claudio Canella (@cc0x1f)
August 11, 2022
Graz University of Technology
Who am I?
Claudio Canella
PhD Candidate @ Graz University of Technology
@cc0x1f
claudio.canella@iaik.tugraz.at
1
Claudio Canella (@cc0x1f)
2002 2004 2006 2008 2010 ... | pdf |
云影实验室
1 / 12
.NET 高级代码审计(第一课)XmlSerializer 反序列漏洞
Ivan1ee@360 云影实验室
2019 年 03 月 01 日
云影实验室
2 / 12
0X00 前言
在.NET 框架中的 XmlSerializer 类是一种很棒的工具,它是将高度结构化的 XML 数据
映射为 .NET 对象。XmlSerializer 类在程序中通过单个 API 调用来执行 XML 文档和对
象之间的转换。转换的映射规则在 .NET 类中通过元数据属性来表示,如果程序开发人
员使用 Type 类的静态方法获取外界数据,并调用 Deserialize 反序列化 xml 数据就会
触发反... | pdf |
Good Viruses. Evaluating the Risks.
Dr. Igor Muttik | Senior Architect | McAfee | Avert Labs®
2
Good viruses
• It is just technology – neither bad nor good
• What could make it dangerous:
— Lack of control
— Wide availability
• If it is dangerous – it’s bad
— “Atomic bomb” is bad
— “Splitting the atom”?
— “Chain reacti... | pdf |
A New Era of SSRF - Exploiting URL Parser in
Trending Programming Languages!
Orange Tsai
Taiwan No.1
About Orange Tsai
The most professional red team in Taiwan
About Orange Tsai
The largest hacker conference in Taiwan
founded by chrO.ot
About Orange Tsai
Speaker - Speaker at several security conferences
HITCON, WooYun... | pdf |
Disclosing Private Information from
Metadata, hidden info and lost data
Chema Alonso, Enrique Rando, Francisco Oca and Antonio Guzmán
Abstract — Documents contain metadata and hidden information that can be used to disclose private data and to
fingerprint an organization and its network computers. This document sho... | pdf |
大可(Dark)
熟悉的語言:C/C++ , PASCAL , ASM
專長:windows 程式設計&逆向工程
講課經驗:在ZCamp2008講過課
興趣:程式設計&資訊安全&美食&聊天&動漫&
睡覺&看電影&聽音樂&彈鋼琴&打電玩
Hackshield是一款防止外掛程式的入侵的軟件,
執行遊戲時,Hackshield會偵防外掛使用者的
電腦, 並封鎖不正常的程式碼, 有效防止按鍵
精靈、加速器等的外掛的運行。
轉自
http://eco.gamecyber.com.tw/tw/hanckshield01.html
CE (Cheat Engine)
讀寫記憶體
按照使... | pdf |
COPYRIGHT ©2006 McAfee Inc.
» Fuzzing XML Based Protocols (SAML)
Hacks-In-Taiwan 2006
Yen-Ming Chen
Senior Principal Consultant
Foundstone, A Division of McAfee
2
COPYRIGHT ©2006 McAfee Inc.
Agenda
»
Introduction
–
SAML
–
OpenSAML
»
Scenarios
»
Implementation
»
Conclusion
3
COPYRIGHT ©2006 McAfee Inc.
SAML
»
Security ... | pdf |
Bypass KB2871997
0x01 KB2871997
1
2014513
2
2014 7 8
(CredSSP)
2973351 Microsoft 2919355 Windows
2975625 Microsoft 2919355 Windows
2014 9 9
2982378 Microsoft : Windows 7 Windows Server 2008 R2
2014 10 14
2984972 Windows 7 Windows Server 2008 R2
2984976 2592687 8.0 Windows 7
Windows Server 2... | pdf |
我的CS笔记之- In-memory Evasion 2
0x01 前言
内存逃逸的第二部分主要是作者讲诉CS的Payload的一个完整执行流程,这个对理解CS植入体非常重
要,对后面做免杀、规避都起到很大作用。第一部分讲侦测手法、第二部分讲自身运行流程,真的是知
己知彼。这一部分作者先讲诉了Stager是什么?然后讲述一个分段加载Payload的完整执行流程,接着
就是不分段加载,最后作者讲了进程注入相关技术在CS中的应用。
0x02 分阶段payload和不分阶段payload
关于分不分阶段,使用过CS的小伙伴应该都很清楚了,但是里面的具体细节,相信很多小伙伴也是一知
半解。下面就详细说下分阶段Payload。
分阶段的pay... | pdf |
Re: What’s up Johnny?
Covert Content Attacks on Email End-To-End Encryption
Jens Müller, Marcus Brinkmann, Damian Poddebniak,
Sebastian Schinzel, Jörg Schwenk
Remember EFAIL?
2
• Last year: EFAIL
Remember EFAIL?
2
• Last year: EFAIL
– Major attack with a logo
Remember EFAIL?
2
• Last year: EFAIL
– Major attack with a l... | pdf |
0x01 前言
!"#$%&'('))*)'('+,-)+./00'123456789:;<=
>?@ABC=DEFGHIJKLMNOPQRSTUVW
0x02 渗透日常——单点登录
@A XYZ[\]]^_`aabbbbcbbbbbbbcd+eafa*_-.a0+gh,
i]ej=klmnLopqBCrstu )h.-)+b vw=xyz{
|}~•€=•‚ƒ„z{|=-jg- vw…†7‡ˆ‰Š‹Œ
~••••Ž'
•C•‘=‚’“”R•–—o˜™=Šo†š›œ•
•žŸ =¡¢
£¤¥¦§¨ ]+^©ªª «¬'-®¦§¨ ]+^©ªªªª=u ¯*.^_*h]- 6
7°±²¡¢
³$´}=¤¥µ¶·yvw·... | pdf |
1
threat protection | compliance | archiving & governance | secure communication
Malware Command and Control Channels
- a journey into Darkness -
By Brad Woodberg
-
Emerging Threats Product Manager / Proofpoint
-
@bradmatic517
-
bradmatic@gmail.com
2
Agenda
C2 Intro and Background (7 mins)
Modern C2 Techniques (6 min... | pdf |
Legal Aspects of
Full Spectrum
Computer Network
(Active) Defense
def con
2013
Agenda
Disclaimer
Errata
Self Defense in Physical World
Applying Self Defense to Computer Network Defense
Technology
Pen Testing/Red Teaming
Intelligence/Open Source
IA and Training/Polices
Information Control
Activ... | pdf |
WTF Happened to
the Constitution?!
The Right to Privacy
in the Digital Age
Michael “theprez98” Schearer
DEFCON 19
Las Vegas, NV
Michael “theprez98” Schearer
• Founder and Owner, Leverage Consulting &
Associates
• 8+ years in the U.S. Navy as an EA-6B
Prowler Electronic Countermeasures
Officer
– Veteran of aerial... | pdf |
Developing Managed Code Rootkits for the Java Runtime Environment
Developing Managed Code Rootkits for the Java
Runtime Environment
DEFCON 24, August 6th 2016
Benjamin Holland (daedared)
ben-holland.com
DEFCON 24, August 6th 2016
Developing Managed Code Rootkits for the Java Runtime Environment
Developing Managed Code ... | pdf |
Utu: Saving The Internet With Hate
The Grand Experiment
● An experiment in sociology and computing
Philosophical Foundations
● Strong Identity
● Reputation
● Retribution
Identity
● Nobody knows how you are on the internet.
Reputation
● But, they know you're a dickhead.
Retribution
● And, wouldn't it be great to punish ... | pdf |
一次诡异的弱口令
0x01 背景
某次客户授权渗透碰到的问题,比较有趣,分享一下。
项目开始没多久,一起的小姐妹说存在弱口令admin/admin,让我试试。然而在我尝试登录的时候,返
回消息为“密码错误,失败次数为1”。这没法登录,密码不对阿,还有账号锁定机制。
继续测试,发现登录页面验证码在使用后未作失效处理,正常操作,爆破一下。
burp的结果显示四五个账号存在弱口令,手动验证下,只有两个账号使用密码正常登录了,其他账号都
返回密码错误的消息。
弱口令登录不能复现,非常诡异,讲给客户估计会被客户加开发一起喷死,于是我就请教了一下我大
哥。
大哥如此清新脱俗的解释,一直喊666的我,灵魂在吹牛逼的过程中莫然得到了一丝的愉悦。然而... | pdf |
BBQSQL
Ben Toews
Scott Behrens
Who are we?
● Ben Toews
○ Security Consultant / Researcher at
Neohapsis
● Scott Behrens
○ Security Consultant / Researcher at
Neohapsis
Why are we here?
● BBQSQL
○ New dog, old trick
■ Exploits Blind SQL Injection
○ New dog, new trick
■ Fast
■ Easy
■ Gets those hard to reach spots
SQL W... | pdf |
MEMORY FORENSICS
识“黑”寻踪 之 内存取证
演讲人:伍智波 (SkyMine)
中国网安 · 广州三零卫士 - 安全专家
2 0 1 8
目录
CONTENTS
PART 01
内存取证的起源与发展
01
PART 02
内存管理机制简述
02
PART 03
如何获取内存数据
03
PART 04
内存分析的工具
04
PART 05
犯罪取证案例分析
05
KEYWORD : 应急响应、数字取证、行为溯源
THE ORIGIN AND DEVELOPMENT OF MEMORY FORENSICS
PART
01
内存取证的起源与发展
2002年
2005年
2006年
2... | pdf |
前言
By:Astartes
杀软对抗貌似是个经久不衰的议题,在我看来他是红队必备的基础设施之一,在红队中不可缺少,我想
用这篇文章,尽量用大白话的形式来说一下 "静","动",这篇文章很基础。因为到头来我只讲了如何上
线。同时,这篇文章又与别的文章不太一样,我想从比较基础的东西让初学者知道到底该如何对抗。
静态免杀
首先我们先看下面这段代码,定义了两个数组
这两个数组的不同之处在于
1. 类型不同
Characterarr为字符数组,String为字符串。字符串在后面默认填\0
1. 存放区域不同 字符数组或者小数组存放的位置在栈里,而字符串是常量,在常量区
请一定要注意这两种的格式,字符串由双引号包裹,字符数组由单引号包裹... | pdf |
I’m your MAC(b) Daddy
Grayson Lenik – Trustwave
@handlefree
Copyright Trustwave 2010
Confidential
Bio
•
Security Consultant for Trustwave’s Spiderlabs.
•
Author of the Digital Forensics blog “An Eye on Forensics”
•
GIAC Certified Forensic Analyst (GCFA)
•
Microsoft Certified Systems Engineer (MCSE)
•
Qualified Securit... | pdf |
Windows Offender:
Reverse Engineering
Windows Defender's
Antivirus Emulator
Alexei Bulazel
@0xAlexei
DEF CON 26
About Me
● Security researcher at ForAllSecure
● Firmware RE & cyber policy at River Loop Security
● RPI / RPISEC alumnus
● First time speaking at DEF CON!
@0xAlexei
This is my personal research, any ... | pdf |
PentesterAcademy.co
m/
©PentesterAcademy.com
VOIPSHARK:开源VOIP分析平台是与⾮非
Nishant/Sharma/
Jeswin1Mathai1
Ashish1Bhangale1
PentesterAcademy.com1&1AttackDefense.com1
PentesterAcademy.co
m/
©PentesterAcademy.com
PentesterAcademy.co
m/
关于我们
我,/Nishant/Sharma/
• R&D1经理理及资深培训师, Pentester1Academy1
• 固件开发者, 企业级WiFi1APs和WIPS传... | pdf |
@jtpereyda
curl 'fj48914309qr2p3 rim e/resd,fa;wf.,4vpl6v3/5p.vl;ul.6.ty[5p16[4[1]4\5][13]5123'
curl 'fj48914309qr2p3 rim e/resd,fa;wf.,4vpl6v3/5p.vl;ul.6.ty[5p16[4[1]4\5][13]5123'
https://apps.dtic.mil/dtic/tr/fulltext/u2/a558209.pdf
https://community.synopsys.com/s/question/0D53400004D2fALCAZ
from boofuzz import *
# ... | pdf |
Offensive Windows IPC Internals 1:
Named Pipes
Contents:
Introduction
Named Pipe Messaging
Data Transfer Modes
Overlapping Pipe I/O, Blocking mode & In-/Out Buffers
Named Pipe Security
Impersonation
Impersonating a Named Pipe Client
Attack Surface
Client Impersonation
Attack scenario
Prerequisites
Misleading Documentat... | pdf |
CyCraft Proprietary and Confidential Information
Operation Chimera - APT Operation
Targets Semiconductor Vendors
C h u n g - K u a n C h e n , I n n d y L i n , S h a n g - D e J i a n g
CyCraft Proprietary and Confidential Information
Whoami
C.K Chen
► Senior Researcher at CyCraft
► Retired CTF Player – BambooFox Fou... | pdf |
HACKSTUFF @ OSCAR
WEB前端攻擊與防禦
前言
★
不講FLASH
★
不講Moblie
★
WEB基礎
大綱
★
攻擊原理介紹
★
衍生攻擊
★
防禦方式
★
實際案例
我是誰
★
奧斯卡
★
PHP後端工程師
★
hackstuff member
★
oscar3x39@gmail.com
前端
什麼是前端
★ 前端就是軟體中與用戶交互的部分
★ 這裡軟體指的是瀏覽器
HTML + CSS + JS
前端攻擊
★ 利用軟體中與用戶交互的弱點
進行非法操作
什麼是前端攻擊
攻擊點
★瀏覽器
★網站
★使用者
WEB前端攻擊主要類型
★XSS
★CSRF
★操作挾持
XSS
OWASP OPEN WEB APPLIC... | pdf |
Defending Networks with Incomplete Information: A Machine Learning Approach
DefCon 21 – 2013
Page 1
Defending Networks with Incomplete
Information: A Machine Learning
Approach
Introduction and Abstract
Let's face it: we may win some battles, but we are losing the war pretty badly.
Regardless of the advances in ... | pdf |
Beyond the Lulz:
Black Hat Trolling, White Hat Trolling, and Hacking the Attention Landscape
SECTION 1
Are you familiar with fishing? Trolling is where you set your
fishing lines in the water and then slowly go back and forth
dragging the bait and hoping for a bite. Trolling on the Net is
the same concept - someone ... | pdf |
ASP/ASPX下的流量混淆
前言
今天谈一谈ASP/ASPX下的流量混淆姿势。
以执行 Response.Write("yzddmr6") 为例。
不带eval的普通编码方式
Unicode(asp/aspx)
利用iis解析unicode的特性,我们可以像sql的bypass一样来用unicode编码绕过。
mr6=Response.Write("yzddmr6")
蚁剑中aspx类型shell默认有unicode编码器,但是asp中没有,可以自己手动添加一份。
大小写(asp)
asp对于大小写不敏感,所以可以对payload中的字符进行大小写变换。
mr6=REsponSe.WriTe("yzddmr6")
要注意的是asp... | pdf |
CS的shellcode功能分析和代码重写实战
前⾔
随着圈⼦⾥的新⼈越来越多,我准备从这⼀篇开始慢慢写⼀些与基础知识相关的⽂章,⽅便
⼀些对⼆进制安全知识了解不多的同学参考。虽然讲的还是基础知识,但是我也尽量写的实
⽤和有趣⼀点,防⽌与⽹上的⽂章出现同质化问题。
这篇要讲的问题是由上⼀篇⽂章 滥⽤具备RWX-S权限且有签名的dll进⾏⽆感知的shellcode
注⼊引出的,有同学问我为什么接收 metepreter 第⼆阶段的恶意代码需要那样写,本篇⽂
章就回答这个问题。
另外⾮常欢迎各位同学在圈⼦⾥提问,能为基础知识板块的编写提供更多素材
CS的shellcode功能分析
我们这⾥讲的其实是stage类型的shellcode,... | pdf |
Antivirus Bypass
Techniques
Learn practical techniques and tactics to combat,
bypass, and evade antivirus software
Nir Yehoshua
Uriel Kosayev
BIRMINGHAM—MUMBAI
Antivirus Bypass Techniques
Copyright © 2021 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or
... | pdf |
Dmitry Kurbatov
Sergey Puzankov
Vladimir Kropotov
Fractured Backbones –
Incidents Detection and
Forensics in Telco Networks
ptsecurity.com
About us
Joint research of Incident Response and Telco Security Teams
Introduction
Technologies behind telco networks
Чем мы пользуемся сегодня
и на основе каких техно... | pdf |
1
【CVE-2022-36804】bitbucket 前台RCE漏洞
Critical severity command injection vulnerability - CVE-OLOO-PTWLQ
patch#N
patch#O
分析N
分析O:
分析猜想
补丁分析
事后诸葛亮
(N)为什么是%LL
(O)为什么不能命令注⼊,只能参数注⼊
(P)为什么是git archive?
EXP
Ref
官⽅通告:https://confluence.atlassian.com/bitbucketserver/bitbucket-server-and-data-center-
advisory-2022-08-24-115548983... | pdf |
Sliver 是一个基于Go的开源、跨平台的红队平台,可供各种规模的组织用于执行安全测试。 Sliver
的木马 支持 C2 over Mutual-TLS、HTTP(S) 和 DNS等协议。 implant可以时时编译生成,并会使
用证书进行加密。
基于Go语言的特性,服务器和客户端以及implant都支持 MacOS、Windows 和 Linux。
Github地址:https://github.com/BishopFox/sliver tag:v1.4.22
go语言越来越流行,并且作为红队使用语言有很多优势。它十分简单,代码可以轻松编译为native代码
到各类平台,跨平台开发非常容易。像py2exe和jar2exe,... | pdf |
T1175: Lateral Movement via DCOM
查看mitre ATT&CK 的描述,已经不推荐使用该技术,推荐使用Remote Services: Distributed
Component Object Model和Inter-Process Communication: Component Object Model。
参考:
The Component Object Model
LATERAL MOVEMENT USING EXCEL.APPLICATION AND DCOM
域渗透——利用DCOM在远程系统执行程序
组件对象模型
什么是DCOM( Distributed Component Object ... | pdf |
作者:http://www.sectop.com/
文档制作:http://www.mythhack.com
PHP 代码审计
目录
1. 概述 ...................................................................... 2
2. 输入验证和输出显示 ......................................................... 2
1.
命令注入 ............................................................ 3
2.
跨站脚本 ............... | pdf |
DDoS Black and White
“Kungfu” Revealed
(DEF CON 20 Edition)
{Tony Miu (aka MT),
Anthony Lai (aka Darkfloyd),
Alan Chung (aka Avenir),
Kelvin Wong (aka Captain)}
Valkyrie-X Security Research Group
(VXRL)
Disclaimer
• There is no national secrets leaked here.
• Welcome to all national spies.
• No real attacks are l... | pdf |
Geo
Geo--IP Blocking: A sometimes
IP Blocking: A sometimes
effective Mal
effective Mal--ware deterrent
ware deterrent
DEFCON 13
Presentation
July 30, 2005
Agenda
Agenda
What is Geo-IP Blocking?
Why Geo-IP Block?
Why not to Geo-IP Block
How Geo-IP Blocking works
Regional Internet Registries (RIRs)
Different Ge... | pdf |
The Risks and Vulnerabilities Associated with Wireless Hotspots
Michael Sutton <msutton@idefense.com>
Pedram Amini <pamini@idefense.com>
Hacking The Invisible Network
iDEFENSE
Copyright © 2003 iDEFENSE Inc.
iDEFENSE
Purpose
•
Study security from two points
of view
– Providers
– End users
•
A variety of implementation... | pdf |
1
從GDPR看言論自由與被遺忘權
中華民國電腦稽核協會 Computer Audit Association
國際電腦稽核協會 台灣分會 ISACA Taiwan Chapter
service@isasa.org.tw
Hacks in Taiwan Conference Community 2018
2
報告人簡歷
1
3
2
姓名
張紹斌
經歷
司法官班第33期結業
智慧財產及電腦犯罪專組主任檢察官
東吳法研所科技法律組兼任助理教授
行政院資通安全稽核委員
司法官學院講座
學歷
政治大學法律學系學士
交通大學科技法律研究所碩士
廈門大學知識產權研究院博士生
4
現職
中華民國... | pdf |
2021/10/28
让你的php⽹站拥有shiro - depy
https://blog.happysec.cn/index/view/366.jsp
1/6
depy
让你的php网站拥有shiro
2021年10月28日 / 网络安全
前言
很久很久以前freebuf发过一篇通过shiro反序列化拿下php网站的文章后,我大
受震撼,震撼到今天。
我今天花了一下午摸鱼做这个实验。实验非常简单,也就是我们如何让php网站
收到shiro探测的请求后让工具或脚本认为这是一个有shiro框架的网站?如何收
到密钥爆破检测请求的时候,通过请求的字段值来与后端密钥做匹配,更加逼真的
还原密钥爆破的场景,从而让脚本小子继续误入歧途?
S... | pdf |
From “No Way” to 0-day:
Weaponizing the
Unweaponizable
Joshua Wise
1
“...you’re de0uing it wrong...”
Outline
• Intro
• Vulnerabilities: in general
-
What makes something easy to exploit?
• Vulnerabilities: a case study
-
Making something hard into something doable
• Briefly -- what went wrong?
-
How did this sort of t... | pdf |
Hacking and protecting
Oracle Database Vault
Esteban Martínez Fayó
Argeniss (www.argeniss.com)
July 2010
Agenda
• Introduction to Oracle Database Vault
What is Oracle Database Vault, What changes introduce, Oracle
Database Vault elements.
• Attacks against Database Vault
Getting OS access
Impersonatin... | pdf |
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
WO
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF ARIZONA
MDY Industries, LLC,
Plaintiff/Counterdefendant,
vs.
Blizzard Entertainment, Inc.; and
Vivendi Games, Inc.,
Defendants/Counterclaimants.
_________________________________
Bliz... | pdf |
DzzOfficeRCEPHP
dzz/connect/oauth.php
SQLI
$_GET['bz'] dzz_io::authorize()
dzz_io::initIO() $_GET['bz']
io_dzz
io_baiduPCS
io_ALIOSS
io_disk
authorize() io_disk
$this->_xss_check();
$_POST $_GET
$this->_xss_check(); $_POST
Discuz
Discuz
Discuz
authkey random()
Discuz
authkey Discuz D... | pdf |
NoSQL, No Injection !?
By. Kuon
Agenda
What is NoSQL?
Types of NoSQL
Who use NoSQL concept?
NoSQL Architecture
Security Problem
Prevention and Detection !?
What is NoSQL?
χ No SQL (statement)
χ No SQL Injection
Not only a SQL
Non-RDBMS
• Semi-structured
• Schema-less
Types of NoSQL
1.
Key-value based
2.... | pdf |
Bypass AMSI的前世今生(4) - 非主流合集
0x00 前言
分析完了[BA1-4],我相信大家对AMSI已经有了不错的认知,也能够利用混淆bypass AMSI了。今天我
们讨论的是非主流的bypass amsi的合集,也就是[BA5-8],分别如下:
[BA5] 卸载当前进程中的amsi.dll
[BA6] PowerShell.exe同目录下放入傀儡amsi.dll劫持正常amsi.dll(正常amsi.dll存在于
c:\windows\system32\amsi.dll)
[BA7] Null字符绕过
[BA8] COM Server劫持(劫持杀软接入接口)
这些方法曾今都能起到bypass AMSI作用,但是很... | pdf |
cp / zet / f9a
L A S T E X P L O I T A T I O N
About Us
●
Researchers from TeamT5
●
Core Developer of ThreatSonar for Linux, macOS, Windows
●
We mainly focus on state of the art techniques of threat actors and
how to effectively identify them
3
Outline
4
Attack
Defense
Tool
●
LEAYA: an Embedded System Detection and Re... | pdf |
#BHUSA @BlackHatEvents
Backdooring and hijacking Azure AD accounts by abusing
external identities
Dirk-jan Mollema / @_dirkjan
#BHUSA @BlackHatEvents
Information Classification: General
whoami
-
Dirk-jan Mollema
-
Lives in The Netherlands
-
Hacker / Researcher / Founder @ Outsider Security
-
Author of several (Azure)... | pdf |
©2016 Check Point Softw are Technologies Ltd. All rights reserved
| P. 1
INTRODUCTION
The cloak-and-dagger of cybercrime makes for entertaining theater.
That’s especially true for sensational breaches often caused by malware
or other sophisticated attacks. Behind the drama though are some
inherent vulnerab... | pdf |
PCI:
Compromising Controls
and
Compromising Security
PCI? At DefCon?
Compliance is changing the way companies "do
security", and that has an effect on everyone,
hacker, defender, attacker, and innocent
bystander.
One result is that companies fear QSAs more
than 0-days.
Who are we?
• James Arlen, aka Myrcuri... | pdf |
Hacking G Suite: The Power
of Dark Apps Script Magic
By @IAmMandatory (Matthew Bryant)
Who am I?
● mandatory (Matthew Bryant)
● Leading the Red Team Effort at Snapchat
● @IAmMandatory
● Hacking write ups and research at
https://thehackerblog.com
Context & Background
What exactly are we dealing with here?
Google Works... | pdf |
0x00 背景
⽬前的攻防场景,攻击成本的节约、周期短,成果要求⾼成了普遍要⾯对的问题,所以
对于基础设施的建设越来越重视,⼀键⾃动化的部署CS、Frp gen等⼯具的开发,节省了以
前略⻓的搭建配置时间,变相增加攻击有效时间;优化的Profile,⽐如修改⼀些默认标记
位、流量伪装、关闭stager等,成熟的OPSEC,⽐如杀软度测试、攻击⼿法检测测试、上传
⽂件清除流程等,减少了免杀难度系数,增加溯源难度的同时,也减少团队协作中执⾏了⼀
些被杀软标记的攻击⽅式导致掉点的可能性。前两天刚好聊到域前置的节点⽩域名收集及验
证,内部以前也简单分享过,遂炒冷饭。
0x01 CDN and 域前置的原理
只要别 ping cdn 节点,然... | pdf |
TOOLSMITHING AN IDA BRIDGE:
A TOOL BUILDING CASE STUDY
Adam Pridgen
Matt Wollenweber
Presentation Agenda
• Motivation and Purpose
• Toolsmithing
• Identifying the short-cuts to meet project needs
• Processes for Expediting Development
• Prototyping, Modifying, Testing, Restart?!?
• Extension development with ... | pdf |
SITCH
Inexpensive, coordinated GSM anomaly detection
About Me
• 2000: Technology career started (I can get paid for this??)
• 2003: Started building with Linux
• Came to infosec through systems and network engineering, integration
• Security tools and integration (SIEM, HIDS, etc…)
• Current: R&D
–Ashmastaflash
“Tho... | pdf |
Offensive Windows IPC Internals 3: ALPC
24 May 2022
Contents:
Introduction
ALPC Internals
The Basics
ALPC Message Flow
ALPC Messaging Details
ALPC Message Attributes
Putting the pieces together: A Sample Application
Attack Surface
Identify Targets
Impersonation and Non-Impersonation
Unfreed Message Objects
Conclousion... | pdf |
p
Chema Alonso
Chema Alonso
Informática 64
Informática 64
Connection Strings
Connection Strings
• Define the way an application connects to
Define the way an application connects to
data repository
• There are connection strings for:
• There are connection strings for:
– Relational Databases (MSSQL, Oracle, MySQL,…)
LD... | pdf |
Steele,
Patten, and
Kottmann
Black Hat Go
Go Programming
for Hackers and Pentesters
Go Programming for Hackers and Pentesters
Black Hat Go explores the darker side of Go,
the popular programming language revered
by hackers for its simplicity, efficiency, and
reliability. It provides an arsenal of practical
tacti... | pdf |
Secure SofwareDevelopment LifeCycle
为您构架安全的业务系统
企业最佳安全实践
系统安全
网络安全
应用安全
1990-2017
2002-2017
2006-2017
网络攻击的方向
木桶原理
安全攻击,最薄弱环节的攻击;
安全问题,最薄弱环节的集群式爆发;
最薄弱环节的攻击
没有考虑安全设计的业务系统,理论上安全风险较高;
没有经过长时间考验的业务系统,实际安全风险较高;
没有经过验证的业务逻辑,带来的新形式的攻击较多。
最新业务的攻击
漏洞
防御
体系
威胁
防御
体系
漏洞防御体系
依照漏洞思维来建立的防御系统:
1、既有漏洞的安全经验;
2、测试发现的漏洞情况;
优势:简单、快速、高效;
... | pdf |
Copyright ©2007 Savid Technologies, Inc. All Rights Reserved
DEFCON 15
Analyzing Intrusions & Intruders
A Deeper look at a psychological approach towards network analysis
Sean M. Bodmer
Savid Technologies, Inc.
sbodmer@savidtech.com
Copyright ©2007 Savid Technologies, Inc. All Rights Reserved
!!Updated Presentation!!
... | pdf |
Abusing Firefox Extensions
Defcon17– US, Las Vegas
Roberto Suggi Liverani
Nick Freeman
WTF Are We?
Roberto Suggi Liverani
Senior Security Consultant – Security-Assessment.com
OWASP NZ Leader
http://malerisch.net
Nick Freeman
Security Consultant – Security-Assessment.com
http://atta.cked.me
Contact us
... | pdf |
2022/3/17 16:07
Evernote Export
file:///C:/Users/jiushi/Desktop/k8s未授权.html
1/20
介绍
k8s全称kubernetes,是一个由google开源的,用于自动部署,扩展和管理容器化应用程序的开源系统。通过k8s可跨多台主机进行容器编排、快速按需扩展容器化应用及其资源、
对应用实施状况检查、服务发现和负载均衡等。
组件介绍
如图所示,k8s集群由主控节点(Master node,以下简称master)和工作节点(Worker Node,以下简称node)组成:
master节点负责资源调度,调度应用,维护状态和应用扩容等。
node节点上跑着应用服务,每... | pdf |
警告:10级地震将在一分钟内发生
李伟光
weelight.li@gmail.com
!
360 独角兽团队
演讲内容
01 关于公共预警系统与LTE网络
02 LTE协议中的漏洞
03 触发漏洞
a. 搭建一个伪基站
b. 伪造虚假的预警消息
04 结论!
01
公共预警系统与LTE网络
针对这些灾害对公众发出警告信息
PWS警告系统遍布全球
ETWS
KPAS
EU-ALERT
CMAS
• 2018年1月的夏威夷导弹警报
新闻
• 2018年1月的夏威夷导弹警报
新闻
02
LTE协议中的漏洞
LTE协议中的漏洞
1.
目前的标准中并未加入对警报信息的签名等验证信息... | pdf |
Hacking 911:
Adventures in Disruption,
Destruction, and Death
quaddi, r3plicant & Peter Hefley
August 2014
Jeff Tully
Christian Dameff
Peter Hefley
Physician, MD
Emergency Medicine
Physician, MD
Pediatrics
IT Security, MSM, C|CISO, CISA, CISSP, CCNP, QSA
Senior Manager, Sunera
Jeff Tully
Christia... | pdf |
那些年年的密碼學後⾨門
講者 : OAlienO
⽬目錄
1. Cryptographic Backdoor
✦ 重要性
✦ 種類
2. Dual EC Backdoor
✦ 介紹
✦ 隨機數很重要嗎?
✦ 後⾨門原理理
✦ 故事時間
3. Diffie Hellman Backdoor
✦ 複習時間
✦ Everybody Backdoor
✦ Nobody-But-Us Backdoor
4. Conclusion
Cryptographic Backdoor
Cryptographic Backdoor - 重要性
網路路通訊⼗十分依賴密碼系統
各國都想要 監聽網路路通訊
密碼學後⾨門
Cryptogra... | pdf |
Asia-Pacific Cybersecurity
Community Collaboration and Joint
Defense
Tom Millar, US Cybersecurity and
Infrastructure Security Agency (CISA)
1. A Little Bit About CISA
2. The Top Threat to US
Critical Infrastructure
3. Fighting The Top Threat
4. Working Collaboratively
5. Questions & Answers
What is CISA?
• CIS... | pdf |
CybricsCTF WriteUp By Nu1L
Author : Nu1L
CybricsCTF WriteUp By Nu1L
CTB
Little Buggy Editor
rm -rf’er
GrOSs 1
Reverse
Walker
Kernel Reverse
Paired
Listing
Network
LX-100
ASCII Terminal
WEB
Multichat
Ad Network
Announcement
Cyber
Signer
scanner
GrOSs 2
Forensic
Recording
Namecheck
rebyC
CAPTCHA The Flag
CTB
Little Buggy... | pdf |
“Quantum” Classification
of Malware
John Seymour (seymour1@umbc.edu)
2015-08-09
whoami
• Ph.D. student at the University of Maryland,
Baltimore County (UMBC)
• Actively studying/researching infosec for
about three years (mostly academic)
• Currently work for CyberPoint International
Outline
• D-Wave Basics
•
The D-W... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.