text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Inside the Matrix,How to Build Transparent
Sandbox for Malware Analysis
C.K Chen (Bletchley)
1
Who am I
C.K Chen (陳仲寬)
P.H.D Student in DSNS Lab, NCTU
Research in
Reverse Engineering
Malware Analysis
Virtual Machine
2
About DSNS
謝續平教授
實驗室研究方向
惡意程式分析
虛擬機器
數位鑑識
網路安全
3
Outl... | pdf |
某凌OA前台⽆条件RCE(组合利⽤)
这个其实就是前段时间两个漏洞的结合。
1.SSRF(这⾥应该叫⽂件包含)
2.XmlDecoder反序列化
之前写了⼀个读取密码到后台JNDI的利⽤⽅式
这个⽅法也不是百分百可⾏,后⾯在塔王的提醒下发现了⼀种更为简洁的⽅式。
看⻅有师傅在打了,就放出来了。
其实主要还是在于 <c:import> 这个标签的特性。
之前也有详细介绍过。
<c:import> 标签提供了所有 < jsp:include > ⾏为标签所具有的功能,同时也允许包
含绝对 URL。
举例来说,使⽤ <c:import> 标签可以包含⼀个 FTP 服务器中不同的⽹⻚内容。
既然提供了include的所有功能,那么也可以直接... | pdf |
IOT安全 - 测信道实战
演讲人:KEVIN2600
2019
@Kevin2600
议程
. 测信道的那点事
. 测信道案例简析
. 测信道 Power Analysis
测信道的那点事
测信道攻击是一种针对软件或硬件设计缺陷, 剑走偏锋的攻击方式
攻击途径通常采用被动式监听, 或通过特殊渠道发送隐蔽数据信号
攻击点不在暴力破解, 而是通过功耗; 时序; 电磁泄漏等方式达到
破 解 目 的 . 在 很 多 物 理 隔 绝 的 环 境 中 , 往 往 也 能 出 奇 制 胜
测信道
测信道
. Public key signature check
. Bootloader 加固 (bootdelay = 0)
. 屏蔽调试端口 ... | pdf |
REpsych
: psycholigical warfare in reverse engineering
{ def con 2015 // domas
This serves no purpose
Warning
Taking something apart …
… to figure out how it works
With software…
Interfacing
Documentation
Obsolescence
Bug fixing
Academic
Reverse Engineering?
Taking something apart …
… to figure ... | pdf |
SITCH
Inexpensive, coordinated GSM anomaly detection
About Me
• 2000: Technology career started (I can get paid for
this??)
• 2003: Started building with Linux
• Came to infosec through systems and network
engineering, integration
• Security tools and integration (SIEM, HIDS, etc…)
• Current: R&D
About You
• Back... | pdf |
Introduction
Flight of the Bumblebee
With bird eyes
Taming of the camera
Views from up-there
Flight Demo
A low cost spying quadrotor for global security
applications using hacked digital cameras
A. Gademer, C. Ch´eron, S. Monat, F. Mainfroy, L. Beaudoin
ESIEA Paris / Universit´e Paris-Est (France)
DEFCON 17
http://fauc... | pdf |
"Hacking Web Apps"
– Brent White / @brentwdesign
Abstract:
Understanding how to exploit vulnerabilities within a web application is beneficial to both
breakers and fixers. It is a core skill for penetration testers, and it provides significant insight into
secure coding practices for developers.
This talk covers... | pdf |
State of the Hack: Maltego Use Cases
Over the past several years, data has quickly gone from being sparsely collected to hoarded in mounds, locked away in
datacenters and spread across the world. Is there really a need to store so much information? That question has yet to be
answered, but with advances in modern te... | pdf |
NSA Playset:
JTAG Implants
Introductory Rites
●
Electrical Engineering education
with focus on CS and Infosec
●
10 years of fun with hardware
o
silicon debug
o
security research
o
pen testing of CPUs
o
security training
●
Hardware Security Training:
o
Secure RTL design
o
Low-cost physical attacks
o
“Applied... | pdf |
Copyright © Government Technology Agency. Not to be reproduced without permission.
Hacking Humans with AI as a Service
Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee
DEF CON 29
Disclaimer
Materials presented are based on research conducted.
Not to be attributed to any entity.
Copyright © Government Technology Agen... | pdf |
GeekPwn CTF WP
AuthorNu1L Team
GeekPwn CTF WP
WEB
noXSS 2020
rtmpdump
cosplay!
umsg
Re
easyydre
Androidcmd
babyre
Pwn
BabyPwn
PlayTheNew
EasyShell
ChildShell
WEB
noXSS 2020
....
Cross Origin Opener Policy
<!DOCTYPE html>
<html lang="en">
<head>
<script>
function cb(win,c) {
if(win.frames.length == 0... | pdf |
One-Liners to Rule
Them All
egypt
wvu
What this is
Bash basics
●
Minor portability considerations
One-liners and demos of stuff we find to be useful
@egyp7
@wvuuuuuuuuuuuuu
What this isn’t
Linux system administration
●
Although there is some amount of overlap
Reading the man page to you
@egyp7
@wvuuuuuuuuuuuuu
`man ba... | pdf |
Iftach Ian Amit
Managing Partner
Security Art
Down the rabbit Hole
Agenda
• Background on research
• The server – first impressions
• Doors, windows, whatever you want to call these…
• Dances with lawyers
• Slip sliding down the hole
– Tools
– Scripts
– Logs, logins, and other “soft” data
• Meanwhile – CERT‐CC and othe... | pdf |
wordpress <5.8.3 对象注入漏洞
本文仅用于技术讨论与研究,文中的实现方法切勿应用在任何违法场景。如因涉嫌违法造成的一切不良
影响,本文作者概不负责。
本文由本人在今年2月份发表于奇安信攻防社区 https://forum.butian.net/share/1303 ,因此在
一些关于时间的描述上存在误差,请谅解。
0x00 漏洞描述
看了 wordpress 注入( CVE-2022-21661 )的洞之后,发现还存在另外一个对象注入漏洞,具有管理
员权限的用户通过更改一些选项,将有机会 getshell 。
0x01 漏洞影响
getshell 的条件:
wordpress < 5.8.3
启用多站点模式
存在一... | pdf |
PRELIMINARY SLIDES
FINAL DECK AVAILABLE AFTER DEF CON
Popping a Smart Gun
DEF CON 25
plore@tuta.io
PRELIMINARY SLIDES
FINAL DECK AVAILABLE AFTER DEF CON
What is a smart gun?
• Gun that can be fired only by authorized parties
• Various authorization/authentication approaches
– Biometrics (e.g., fingerprint rea... | pdf |
YOUR COMOANYS NAME
Python动态代码审计
演讲人:聂心明
2 0 1 8
自我介绍
•亚信安全软件工程师
•n0tr00t团队成员
•个人博客:https://blog.csdn.net/niexinming
•个人github地址:https://github.com/niexinming
•大型项目,代码结构复杂
•有些危险的功能隐藏较深(危险的定时计划任务、sqlite数据库任意创建导致任意
文件覆盖……)
•提高效率
为什么会想到动态代码审计?
漏洞
数据库
敏感函数
文件读写
网络访问
日志
PART 01
数据库日志
目录
CONTENTS
PART 02
Hook关键函数
PART 03
结合A... | pdf |
De Gustibus*
Adventures in Hacking Taste
Sandy Clark (Mouse)
Erin (Edw0rd)
Defcon 09
*De Gustibus Non Est Disputandem
Confessions of a Foodie
• Hackers in Norway (the motivation for this
talk)
Confessions of a Foodie
• Hackers in Norway (the Motivation for this talk)
• The child is the maker of the Mouse
Confessions ... | pdf |
A DIRTY LITTLE
HISTORY
Bypassing Spectre Hardware Defenses to Leak Kernel Data
1
2
Vrije Universiteit Amsterdam
Enrico
Barberis
Herbert
Bos
Cristiano
Giuffrida
Marius
Muench
Pietro
Frigo
2
TL;DR
•
Spectre affects most modern CPUs
○
You can leak data across privilege levels (e.g., User-to-Kernel)
•
CPU vendors release... | pdf |
(ps:x86_pie&x86_srop入门题)
文件链接:https://pan.baidu.com/s/17pIc0RrfLRH9arMbJmJGjA
提取码:4olb
环境搭建:
1.查看文件信息及保护机制
got表只读,NX,PIE都开了
2.ubuntu运行ida*32远程调试文件,打开ida32对程序进行分析
函数窗口中未发现可以函数,打开main函数,发现只有一个read函数,并且可以栈溢出。
3.远程调试,断点于main函数第一行,运行
4.
看到程序运行后,ida中的模块窗口出现这些,则有:
一.根据pie的特性,最后12位不变,多次加载程序后,发现libc的基址前三位也是不变,也
就是只需爆破8位即可
二.可... | pdf |
shawn.webb@hardenedbsd.org
Twitter: @lattera
HardenedBSD Internals
Agenda
● About Me
● De<nitions
● About HardenedBSD
● Features
● Weather Report
● Digging In
About Me
● Cofounder of HardenedBSD
● Security enthusiast
● Opensource advocate
● Evangelist of FreeBSD
● ZFS fanboy
De<nitions
Security
De<nitions
Expl... | pdf |
Invisible Access
Opening New Doors to Insecurity
Marc Weber Tobias - Matt Fiddler - Tobias Bluzmanis
©2009 Security.org
Agenda
• Standards and Requirements
• Electro-Mechanical Locks
• Critical Infrastructure and
Vulnerabilities
• Real World Threats
• Case Studies
Standards
• Why we need Standards
• What They Measure
•... | pdf |
Maltego’s (Local) Partner in Crime
Nadeem Douba | www.cygnos.com
How you doin’
Nadeem Douba | www.cygnos.com
2
} Nadeem Douba
◦ Work at Cygnos (http://www.cygnos.com) in
Ottawa, ON, Canada
◦ Certs: GWAPT, GPEN
◦ Worked in the InfoSec field for 10+ years.
◦ Love (European) football and hacking stuff…
}... | pdf |
N Stage Authentication with
Biometric Devices
Presented by:
Nate Rotschafer
Sophomore
Peter Kiewit Institute
Revised: July 8, 2002
N Stage Authentication
Outline
– Background on Authentication
– General Network Security
– Need for High Grade Authentication
– Need for Multiple Factor Authentication
– Background on Er... | pdf |
SECURITY PAPER
Preparation Date: 11 Dec 2016
Art of Anti Detection – 3
Shellcode Alchemy
Prepared by:
Ege BALCI
Penetration Tester
ege.balci<at>invictuseurope.com
INVICTUS
2
Security Paper
TABLE OF CONTENT
1. Abstract:......................................................................................................... | pdf |
Duplicating Restricted Keys
Billy & Bobby Graydon
Outline
1.
Keyways
2.
Other Stuff
How keys work
How Key Cutting works
How keyways work
3D Printing
The Old Approach to Keyway Research
Our Approach to Keyway Research
C: E: F: ∩: ∪:
BEST A Bump Key
Pic of CPC arrow press d... | pdf |
Revoke-Obfuscation
> PowerShell Obfuscation Detection Using Science
Daniel Bohannon - @danielhbohannon
Lee Holmes - @Lee_Holmes
0.0/00
> Whois
0.0/00
-
MANDIANT Senior Applied Security Researcher
-
Invoke-Obfuscation, Invoke-CradleCrafter
-
Obfuscation, evasion and detection techniques
-
@danielhbohannon
Title . @Speak... | pdf |
Social attacks against
anonymity networks
Nick Mathewson
The Tor Project
<nickm@torproject.org>
Defcon XV
Aug 4, 2007
That title was confusing!
● What I mean by “social attacks.”
● What I mean by “anonymity network.”
● How to be a more effective social engineer.
Not covered here
● Intro to anonymity networks.
– Basics ... | pdf |
Introduction to Unicornscan
Introducing Unicornscan
RIDING THE UNICORN
Unicornscan is an open source (GPL) tool designed to assist with information gathering and security auditing.
This talk will contrast the real world problems we’ve experienced using other tools and methods while
demonstrating the solutions that Unic... | pdf |
1
新型句话连接原有句话
@yzddMr6
1.jsp
Payload
密码test
1 <%@ page import="javax.script.ScriptEngineManager" %>
2 <%@ page import="javax.script.ScriptEngine" %><%
3 try {
4 ScriptEngine engine = new ScriptEngineManager().getEngine
ByName("js");
5 engine.put("request", request);
6 engine.put("respon... | pdf |
Hacking Your Thoughts:
Batman Forever meets Black Mirror
Katherine Pratt
DEFCON 27
10 Aug 19
The Standard Disclaimer
The work in this presentation was done at the University of Washington as
part of a PhD dissertation. The results and views presented here do not
necessarily represent those of my funding sources or m... | pdf |
05 Nov 19
Breaching the perimeter - PhantomJs Arbitrary file
read
Introduction
PhantomJS is a headless browser used for automating web page interaction. PhantomJS provides
a JavaScript API enabling automated navigation, screenshots, user behavior and assertions
making it a common tool used to run browser-based unit tes... | pdf |
滲透測試
基本技巧與經驗分享
講者: 趙偉捷
自我介紹
ID : OAlienO
姓名 : 趙偉捷
學校系所 : 國立交通大學 電機資訊學士班 大二升大三
社群 : Bamboofox
目錄
滲透測試 - Penetration Test ( PT )
情境一 : 收集情報
情境二 : 資料洩漏
情境三 : SQL injection
情境四 : XSS
情境五 : XST
情境六 : CSRF
情境七 : File Upload Vulnerability
Common Vulnerabilities and Exposures ( CVE )
Bug Bounty 與漏洞通報
滲透測試
Penetration Test ( PT... | pdf |
JDBC内存Dump密码 - 1
JDBC内存Dump密码
引⾔
在红队⾏动中经常会遇到拿到 Webshell 后找不到数据库密码存放位置或者是数据库密码被加密的情况(需要逆向代码查找解密逻辑)。
在此提出两种在从运⾏时获取所有的数据库连接信息(密码)的⽅式
第⼀种⽅式实现效果
服务端数据库加密 Demo
成功获取到解密后的数据库密码 插件已经集成到哥斯拉 https://github.com/BeichenDream/Godzilla/releases/
JDBC内存Dump密码 - 2
实现原理⽅式⼀
⼀般不使⽤数据库连接池情况下 我们通常使⽤ Java 的⼯⼚类 DriverManager 获取数据库连接
Java
跟进逻辑... | pdf |
XIII / I / MMIII
DefCon XI
Bluesniff - The Next
Wardriving Frontier
Bruce Potter <gdead@shmoo.com>
Brian Caswell <bmc@shmoo.com>
XIII / I / MMIII
DefCon XI
Bluetooth Basics
• NOT 802.11! NOT a relative of 802.11!
• Cable replacement technology
– Low power for embedded devices
• More BT radios than 802.11 radios in
e... | pdf |
1
dogcs 4.4 patch补丁分析
声明
加⼊我们的社区
前⾔
⽂件对⽐
JAVA端
aggressor/Aggressor.class
aggressor/AggressorClient.class
aggressor/browsers/Connect.class
aggressor/browsers/Sessions.class
aggressor/dialogs/AboutDialog.class
aggressor/dialogs/ConnectDialog.class
aggressor/headless/Start.class
aggressor/MultiFrame.class
aggressor/TabMan... | pdf |
PUBLIC
THREAT HUNTING,
THE NEW WAY
HITCON PACIFIC 2017
In Ming, Wei Chea
PUBLIC
INTRO
1
In Ming
(胤銘)
Loves
MMA
Wei Chea
(偉傑)
Loves diving
& my dog
½ Taiwanese
PUBLIC
We are not involved in ALL the information we are sharing today.
Many of the information (use cases, tools) we going to discuss are made
possible by... | pdf |
void fake_image_path(WCHAR *img_path) {
__asm {
// PEB
mov eax, fs:[0x30]
// _RTL_USER_PROCESS_PARAMETERS
mov eax, [eax+0x010]
// ImagePathName.Buffer
add eax, 0x3C
push img_path
pop [eax]
}
}
int main()
{
HWND game = FindWindow(NU... | pdf |
tomcat整体架构和处理请求的流程
tomcat源码调试
以 tomcat8.5.68 为例
首先下载tomcat源代码:tomcat8
创建资源文件目录。在任意文件夹下可以创建一个文件夹,用于存放配置文件,站点信息等。我创
建的 catalina_home
新建pom.xml,使用maven管理项目,导入调试所需要的依赖包
<?xml version="1.0" encoding="UTF-8"?>
<project xmlns="http://maven.apache.org/POM/4.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
... | pdf |
Somerset Recon
Infecting the Embedded
Supply Chain
Zach Miller
Alex Kissinger
Somerset Recon
Introduction - Who We Are
Zach:
●
Reverse Engineering, Pen Testing
●
Twitter: @bit_twidd1er
Alex:
●
Barista that occasionally does security things @ Somerset Recon
●
Cappuccinos, Hardware Hacking, Reverse Engineering
Somerse... | pdf |
Please insert
inject more
coins
Defcon XXI
Press start
x 2
Me ?
Nicolas Oberli (aka Balda)
Swiss security engineer
CTF enthusiast
Retro gamer
Beer drinker / brewer
x 3
It all started so simply...
I wanted to add
coin handling to
my MAMEcab
Bought a coin
acceptor on an
auction site
x 4
Coin handli... | pdf |
Andrea Marcelli (@_S0nn1_)
Twitter
Email
Web
PhD Student
Security Researcher
The signature generation problem
The algorithm
Introducing YaYaGen
Demo
A unique pattern
Syntactic signatures
* this is where the most of the existing tools and researches focus on
Semantic signatures
Android malware
Reduce
Automate
100... | pdf |
PUT ON YOUR TINFO_T HAT
MIAUBIZ
DEFCON 23
AUGUST 7TH 2015
C++ templates
template <typename Type>
Type max(Type a, Type b) {
return a > b ? a : b;
}
specialized
char max<char>(char a, char b) {
return a > b ? a : b;
}
specialized
uint32_t max<uint32_t>(uint32_t a, uint32_t b)
{
return a > b ? a : b... | pdf |
Asura: A huge PCAP file analyzer for anomaly
packets detection using massive multithreading
Ruo Ando
National Institute of Informatics
DEF CON 26
Abstract—Recently, the inspection of huge traffic log is im-
posing a great burden on security analysts. Unfortunately, there
have been few research efforts focusing on scalabi... | pdf |
Business logic flaws in
mobile operators services
B o g d a n A l e c u
Bogdan ALECU
About me
Independent security researcher
Sysadmin
Passionate about security, specially when it’s
related to mobile devices; started with NetMonitor
(thanks Cosconor), continued with VoIP and finally
GSM networks / mobile phones
@mse... | pdf |
原始默认状态:
1
2
3
——WebKitFormBoundary2smpsxFB3D0KbA7D
ContentDisposition: formdata; name=”filepath”; filename=”backlion.asp”
ContentType: text/html
突破0,文件名前缀加[0x09]绕过:
1
2
3
——WebKitFormBoundary2smpsxFB3D0KbA7D
ContentDisposition: formdata; name=”filepath”; filename=”[0x09]backlion.asp”
ContentType: text/html
突破1,文件... | pdf |
The Cavalry Isn’t Coming
Starting the Revolution to FSCK it all!
Nicholas J. Percoco & Joshua Corman
@c7five @joshcorman
Introductions
Introductions
@c7five
Introductions
@c7five
@joshcorman
Backwards & Forward
I’ve Had Dreams
I’ve Had Dreams
Nightmares
Dangerous Precedents
Hitting Rock Bottom
Hittin... | pdf |
1
Call the plumber –
You have a leak in your (named) pipe
Gil Cohen
2
• Presenter introduction
• Key terms
• Connecting to named pipes
• Pipe ACLs And Connection Limitation
• Named pipes in the wild
Agenda
• Enumerating And Scanning For Named Pipes
• Sniffing Named Pipes Content
• Fuzzing Named Pipes
• Exploitation And... | pdf |
THE UNBELIEVABLE
INSECURITY OF THE
BIG DATA STACK
AN OFFENSIVE APPROACH TO ANALYZING
HUGE AND COMPLEX INFRASTRUCTURES
SHEILA A. BERTA (@UnaPibaGeek)
WHO AM I?
Head of Security Research at Dreamlab Technologies (Swiss Infosec Company)
SHEILA A. BERTA (@UnaPibaGeek)
●
Offensive Security Researcher - I like to break ev... | pdf |
XCTF WP
Author:Nu1L
XCTF WP
PWN
cpp
qemuzz
GAME
Reverse
divination
Web
mine1_1
mine2
pyer
webshell_1
hids
PWN
cpp
UAFlibcfree_hook
from pwn import *
# s = process("./chall")
s = remote("124.70.12.210","10002")
def add(idx,buf):
s.sendlineafter("> ",str(0))
s.sendafter("> ",buf)
s.sendlineafter("> ",str(idx)... | pdf |
I Know What
You Are By the
Smell of Your
Wi-Fi
Denton Gentry
@dgentry
denny@geekhold.com
We’re here today to talk about a mechanism which identifies the type of device
connecting to a Wi-Fi network. It can be quite specific: it can tell the difference
between an iPhone 5 and an iPhone 5s, between a Samsung Galaxy ... | pdf |
1
jboss
jboss RPC RCE
分析
JDNI
2022年4⽉27⽇13:28:14
看到⼀个帖⼦提到jboss 漏洞,就去Twitter找了链接
https://jspin.re/jboss-eap-as-6-rce-a-little-bit-beyond-xac-xed/
https://s3.amazonaws.com/files.joaomatosf.com/slides/alligator_slides.pdf
简单分析了下pdf的内容,漏洞不是传统的http漏洞,是jboss⾥的remoting3存在问题,可参考
weblogic的T3,只是jboss是跑在独⽴的端⼝上。
4446: JBoss R... | pdf |
DSCTF WriteUp By Nu1L
DSCTF WriteUp By Nu1L
Crypto
picproblem
approximate
RAS-330
Pwn
fuzzerinstrospector
Re
catchme
FFunction
Misc
Muti Operations
Web
pingpingping
easy_tou
Crypto
picproblem
from math import sqrt
from numpy import array, zeros, uint8
import cv2
image = cv2.imread('encflag.jpg')
imagearray = array(imag... | pdf |
回顾⼀下goby反制讨论的⼀些⼩技巧做个记录
限制前提
1. ⾃动转⼩写
2. 不能有空格
群友提供的⼀些思路
ftk提供的
r4提供的win下的
7师傅提供的数组⽅式,不过不知道为啥我的shell好像不⾏
ftk提供的利⽤已经有的命令切割其中字符最终获得空格,不过id的话需要知道⽤户名,得找个别的命令
⽐较完整的
js
我有点弱智,我能注⼊javascript我却在那边绕shell
所以使⽤javascript的⼀些编码就可以了,⽐如base64、url编码等。就不再说了。
我还整了个没啥⽤的
onerror=\"x=('a'+''['concat'])[9];cmd='/usr/local/bin/wget'+x+'127.0.... | pdf |
MSF渗透常用操作指南
一、msf安装与更新
在服务器或者虚拟机执行(linux)
curl https://raw.githubusercontent.com/rapid7/metasploitomnibus/master/config/template
s/metasploit-frameworkwrappers/msfupdate.erb > msfinstall
chmod 755 msfinstall
./msfinstall
然后验证是否安装成功
输入msfconsole
Windows安装
点击下载 https://windows.metasploit.com/metasploitframework-latest.... | pdf |
TV White Spaces:
The Next Wi-Fi?
Doug Mohney
Editor-in-Chief
VON Magazine
DEFCON 15, August 2007
Who am I ? 30 second intro
• Contributor to Mobile Radio Technology
(www.mrtmag.com) since January 2003.
• Hearing policy wonks talk about 700 MHz,
unlicensed spectrum in D.C. for years.
• Day job: Editor-in-Chief, VON M... | pdf |
Privacy in DSRC connected
vehicles
Defcon 21 – August 3, 2013
whoami
• BSEE, digital communications
• Many years as a network engineer
• Santa Clara University Law student
• Research assistant providing technical expertise
on privacy audits and reviews
• Contracted by auto consortium to review
privacy of... | pdf |
0x00
zacnday
ndaygetshellgetshell
0x01 getshell
nday
stampcookie
stamp
cookiecookie
rce
ping
ping
target
1. whoamiping
2. pwdping
3. bashshshell
shell
{"method":"ping","params":{"count":"1","size":"256","target":"`mknod backpipe p
&& nc xxxx 9999 0<backpipe | /bin/sh 1>backpipe
`www.guahao.com","noParse":true}}
sh... | pdf |
What
the
Watchers
See
Weaknesses
in
Municipal
Mesh
Network
Deployments
Dus8n
Hoffman
&
Thomas
(TK)
Kinsey
DEF
CON
22
Dus8n
Hoffman
the
researcher,
not
the
actor
:’(
• Senior
Engineer
@
Exigent
Systems
• Principal
@
various
other
... | pdf |
安服崽笔记_flex-messaging-core-4.7.2.jar AMF 反序列化
AMF 反序列化常用的利用链有 MetaDataEntry、ReplicatedTree 和 UnicastRef 等等
Externalizable 实现类
本次主要记录 MetaDataEntry 利用链
文章写的异常垃圾、凌乱,跟着代码看文章可能会好一些,
代码里很多父类引用指向子类对象的地方,我都有说明为什么会调用某个实现类的方法。
Src 目录下 Test.java,可以辅助了解 amf 协议格式。
靶场地址:https://github.com/jiashaoxiong1998/amfDemo
导入 idea,配置个... | pdf |
用Golang编写 dll劫持的一些坑 (1)
源于知识星球的一个想法,利用一些已知的dll劫持的程序作为"模板",自动生成白加黑的程序。
我想用Golang编写劫持的dll,这样也方便可以做成在线平台。
当然dll加载模式不同劫持的方式也不同。
我找到是vscode它的更新程序,也有它官方的签名
看 inno_updater.exe 的导出表,我只用实现它的5个函数就可以了。
因为我想做成通用型的,对于这种输入表导入的dll做劫持,只需要在 DllMain 中获取主程序的入口点,
然后将shellcode写入入口点,之后主程序运行就会执行我们的shellcode了。
C代码如下
测试过是能够正常使用的。
但是把它转成Go的过程中,... | pdf |
编码规范之 phpmailer 的安全隐患
By:奥村燐
1.众所周知,phpMailer 是一个非常强大的 php 发送邮件类,可以设定发送邮件地址、回复
地址、邮件主题、html 网页,上传附件,并且使用起来非常方便。
2.但是如果开发编码不规范,可能会导致安全问题的出现,下面实例讲解在什么场景下会
出现安全隐患。
3.例如 eyoucms 找回密码,点击发送的时候,会调用 Smtpmail 控制器的 send_email 方法
4. 然后又在 send_email 方法中调用了 SmtpmailLogic.php 文件中的 send_email
5.最后在 SmtpmailLogic.php 最后又调用了 send... | pdf |
酒票
35
贡献
0
积分
46
注册时间
2013-1-31
发消息
c4rt1y
九零元老
发表于 2016-4-17 06:31:25 | 只看该作者
表哥已经在https://forum.90sec.org/forum.php?mod=viewthread&tid=9133这里写了一些方法,今晚在看别人的代
了,于是乎,今晚测试了下安全狗的上传,发现方法还是如此,依旧没任何变化,当然我们只拿安全狗为案列,因为方
过狗方法,这里感谢keio牛文档,我虽然也做了类似的,但是排版没你的好,就拿你的放上去了。
默认状态
[Bash shell] 纯文本查看 复制代码
突破0
[Bash shell] 纯文本查看 ... | pdf |
Microsoft Portable Executable and
Common Object File Format Specification
Microsoft Corporation
Revision 6.0 - February 1999
Microsoft Portable Executable and Common Object File
Format Specification
IMPORTANT—READ CAREFULLY: This Microsoft Agreement (“Agreement”) is a legal agreement between
you (either an indiv... | pdf |
Hacker'Machine,Interface,
State,of,the,Union,for,SCADA,HMI,Vulnerabili:es,
Copyright,2016,Trend,Micro,Inc.,
2,
Introduc:on,
Copyright,2016,Trend,Micro,Inc.,
3,
Trend,Micro,Zero,Day,Ini:a:ve,
• Fritz,Sands,',@FritzSands,
– Security)Researcher)–)Zero)Day)Ini4a4ve)
– Root)cause)analysis)and)vulnerability)discovery)
– ... | pdf |
Truck Duck Board Bill of Materials
June 2016 - DEF CON 24
CHECK FOR UPDATES AT: http://truckhacking.github.io
Designator(s)
Description
Package/Footprint
Qty
Manufacturer
Part Number
Preferred Vendor
Subsitute OK?
Notes
D1
Power LED
0805
1
OSRAM
LG R971-KN-1
Digikey
Y
PTC1
Thermal Fuse, 2A Hold, 4A Trip
Custom
1
Littl... | pdf |
Behind the Scenes of the
Badge
by Joe Grand
aka Kingpin
Me.
electrical engineer.
hardware hacker.
product designer.
Retrospective: DEFCON 14
Retrospective: DEFCON 15
Retrospective: DEFCON 15
Retrospective: DEFCON 16
Retrospective: DEFCON 16
Retrospective: DEFCON 17
Retrospective: DEFCON 17
Badges by Christmas?
★ Fall... | pdf |
About This eBook
ePUB is an open, industry-standard format for eBooks. However, support of ePUB and its many
features varies across reading devices and applications. Use your device or app settings to customize
the presentation to your liking. Settings that you can customize often include font, font size, single or
dou... | pdf |
Portable Privacy
Portable Privacy
2006: Darfur, Sudan
1989: Beijing, China
2005: United States of America
Portable Privacy
Alias: LadyAda
Name: Limor Fried
Crime: Felony Assault w/ Banana
Location: New York, NY
Hangouts: Adafruit Industries
Notes: Gang member of cow
worshipping death cult
Last Seen: In the Company of ... | pdf |
White Paper
// PIN Automatic Try Attack
July 12th, 2021
metabaseq.com
PINATA
ATTACK
Salvador Mendoza – Ocelot Offensive Security Team
PINATA (PIN Automatic Try Attack)
// Summary of Findings
It is possible to brute force all 10,000 PIN combinations, from 0000 to 9999, in millions of physical EMV
cards. Th... | pdf |
Bypass AMSI的前世今生(1) - AMSI前置知识
0x00 前言
《Bypass AMSI的前世今生》是 [公鸡队之家] 知识星球的第一个专项技术分享。之所以选择这个主题作
为第一个主题,是因为AMSI是微软用来对抗无文件攻击而开发的安全模块,是当前攻防对抗前沿的技术
之一。从15年AMSI出现,越来越多的杀软厂商接入了AMSI接口,当前市面上主流杀软均接入此接口。
这给当时以powershell为主的红队工具致命打击。因此随后红队人员针对Bypass AMSI的研究从未停
止。从开始的script混淆到现在的内存补丁,详细的技术演变如下:
[BA1] 降级PowerShell版本到2.0(依赖于.Net 3.0,Win... | pdf |
30/06/2009
1
Chema Alonso, José Palzón
30/06/2009
2
Metadata:
Information
stored
to
give
information
about
the
document.
▪ For example: Creator, Organization, etc..
Hidden information:
Information internally stored by programs and not
editable.
▪ For example: Template paths, Printers, db structure, etc…
Lost data:... | pdf |
openbms代码审计
项目地址:链接
系统认证逻辑
系统采用thinkphp框架开发,主要是后台 admin 的功能
所有控制器全都继承 AdminBase.php ,认证程序也是在 AdminBase.php 中进行的,在进行父类
的初始化后有两个函数用于登录校验和权限校验-- checklogin() 和 checkAuth() 。
其中这个 checkAuth() 方法设置了白名单, $noLogin , $noAuth 两个数组中的是白名单接口,可
以不进行权限校验,也就是任意用户登录后都可以调用。
后台任意文件上传
看后台的 index 控制器,定义了 $noLogin , $noAuth 两个数组,且其中存在不需要权限... | pdf |
Cisco Talos
Mahdi Namazifar, PhD
DETECTING RANDOM STRINGS;
A LANGUAGE BASED APPROACH
! Given an arbitrary string, decide whether the string is a random
sequence of characters
! Disclaimer 1: This work does not address strings that are random
sequences of dictionary words
! Disclaimer 2: The current parameter... | pdf |
AWVS 也有一个插桩模式,我们也来试用一下,先安装好awvs
// pull 拉取下载镜像
docker pull secfa/docker-awvs
// 将Docker的3443端口映射到物理机的 13443端口
docker run -it -d -p 13443:3443 secfa/docker-awvs
// 容器的相关信息
awvs13 username: admin@admin.com
awvs13 password: Admin123
AWVS版本:13.0.200217097
1.开启插桩扫描
开启 AcuSensor 如下两张图
图1 未开启AcuSensor
图2 开启AcuSensor,... | pdf |
Down With The RIAA
Musicians Against the
Recording Industry
By: Ichabod Ver7
Independent artist/producer
www.loopbackimposter.com
Priceless
• New computer: $900
• I/O box: $500
• Studio monitors and Microphone: $900
• Telling the RIAA to go fsck themselves:
Priceless
Purpose of this Presentation
• This presentation i... | pdf |
0x00 前⾔
有技术交流或渗透测试培训需求的朋友欢迎联系QQ/VX-547006660
0x01 起因
朋友给某甲⽅做渗透测试,奈何甲⽅是某知名保险,系统太耐⺾,半天不出货
兄弟喊我来⼀块来看,于是有了本⽂
0x02 客户端RCE⼀处
朋友把靶标发给我看了下,除了两个下载链接啥也没有
链接下载下来的东⻄如图,看了下⽬录⾥⾯还有JRE,那么很显然,这客户端exe就是个JAVA启动命令执⾏套壳
随后打开program⽂件夹,逆了⼀下⾥⾯的Jar
full_path前⾯定义为⽤户更新时输⼊的路径
那么很简单了full_path可控,诱导⽤户安装更新时路径出输⼊注⼊命令即可
0x03 发现Webservice Soap接⼝
光这⼀个⽔来的... | pdf |
Embedded System Design:
From Electronics
to Microkernel Development
Rodrigo Maximiano Antunes de Almeida
rmaalmeida@gmail.com
@rmaalmeida
Universidade Federal de Itajubá
Portal embarcados
The work ”Embedded System Design: From Electronics to Microkernel
Development” of Rodrigo Maximiano Antunes de Almeida was licensed... | pdf |
One Token to Rule
Them All:
Post-Exploitation Fun in
Windows Environments
06 July 2007
2
Introduction
The Increasing Importance of Post-Exploitation
•
Microsoft Technology is Pervasive
•
Security has improved significantly since their Trustworthy Computing Initiative
•
Consequently, Post-Exploitation has become... | pdf |
a 30,000 feet look at wi-fi,
the freezing spot
luiz “effffn” eduardo
hello
DefCon 17
before we start...
DefCon 17
so, why freezing spots?
DefCon 17
agenda
•motivation
•the old and the new
•the pieces of the puzzle
DefCon 17
•the experiment(s)
•next?
disclaimer
DefCon 17
motivation
gts 12
the pieces of the puzzle
DefCo... | pdf |
前言
本篇文章由 Yii 2.0.35 反序列化漏洞复现到新利用链发现 中发现的新利用连的坑展开的测试. 结果在最后
面
我在文章中提到, poc 加上 phpinfo 才能执行成功. 我当时的猜测是因为 phpinfo 函数执行的回显内容
过大出发了分段传输导致的.
然后我就展开了测试, 测试环境: phpstudy, PHP 7.0.9
利用链调整
文章发出后才发现, 调试时发现利用链中的第二节: \vendor\guzzlehttp\psr7\src\FnStream.php 中
的 __destruct() (对象销毁时)魔术方法就存在危险函数且参数可控, 所以使用这条利用链不需要经过
\vendor\yiisof... | pdf |
Radio Exploitation 101
Characterizing, Contextualizing, and Applying Wireless Attack Methods
Matt Knight
Bastille Networks
San Francisco, CA
matt@bastille.net
Marc Newlin
Bastille Networks
Atlanta, GA
marc@bastille.net
Abstract—Reverse engineering wireless physical layers has never
been easier, thanks to the commoditiz... | pdf |
Blowing up the Celly!
Building Your Own SMS/MMS Fuzzer!
!
Brian Gorenc, Manager, Vulnerability Research!
Matt Molinyawe, Security Researcher!
!
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.!
2!
Agenda!
• Introduction!
• Testing Enviro... | pdf |
Defcon Comedy Jam IV:
A New Hope For The Fail Whale
David Mortman – C3/Securosis
Chris Hoff – Juniper
Dave Maynor – Errata
Rich Mogull – Securosis
arry Pesce – NWM/Paul.com
Rob Graham - Errata | pdf |
High Insecurity:
Locks, Lies, and Liability
Marc Weber Tobias
Matt Fiddler
Agenda
• Security Standards
• Conventional and High Security
• UL-437
• ANSI /BHMA (A156.5-2001)
• ANSI (A156.30)
• LOCKS:
– Bypass Methods
• LIES:
– Representations
– Design issues
• LIABILITY:
– Legal issues
High Security Locks and
Standards
•... | pdf |
Advancing Video Attacks
with video interception, recording, and replay
Defcon 17
July 31st, 2009
Jason Ostrom
Arjun Sambamoorthy
© 2008 Sipera Systems, Inc. All Rights Reserved.
Agenda
Introduction
Overview of UC
Live demo of Video Eavesdropping
Live demo of Video Replay and Video Hijack
VoIP Pentesting trick
Conclusi... | pdf |
A Picture is Worth a
Thousand Words, Literally:
Deep Neural Networks for Social Stego
Philip Tully | Mike Raggo
1
#whoami
2
Philip Tully
@phtully
Principal Data Scientist at ZeroFOX
PhD (KTH & University of Edinburg... | pdf |
KCon
KCon
探索虚拟化技术在漏洞检测中的应用
By:仙果
PART 01
自我介绍
PART 02
困境的“城内和城外”
PART 03
VT VS Exploit
PART 04
攻防技术对抗
PART 05
结语
目录
CONTENTS
自我介绍
01
高级安全工程师
仙果
安全研究员
准爸爸
我
是
谁
?
看雪学院
02 困境的“城内和城外”
困境
针对性的检测漏洞攻击
时间和效率的考量
人工分析的难度较大
人才培养周期长
攻防对抗成本显著增加
虚拟化技术应用于漏洞攻防对抗
精确对抗漏洞攻击
节省人力成本
虚拟化(Virtualization)
更多的时间在技术研究上
Virtualzation
Hardware ... | pdf |
Vulnerable Out of the Box:
An Evaluation of Android Carrier Devices
Ryan Johnson - Kryptowire
Angelos Stavrou - Kryptowire
Why Look for Cyber Threats?
Aggressive data collection
– Exfiltration of sensitive user-data to China (Adups)
– Sensitive data collection (OnePlus 5)
Remote system compromise
– System compromise f... | pdf |
PLAYBACK: A TLS 1.3 STORY
WHO ARE WE?
Alfonso García Alguacil
Alejo Murillo Moya
INTRODUCING TLS 1.3
The Good
•
KISS – Only 5 ciphers supported
INTRODUCING TLS 1.3
The Good
•
No vulnerable to the attacks impacting
previous versions
INTRODUCING TLS 1.3
The Good
•
Welcome Forward Secrecy
INTRODUCING TLS 1.3
The Good
•
F... | pdf |
PLAYBACK: A TLS 1.3 STORY
WHO ARE WE?
Alfonso García Alguacil
Alejo Murillo Moya
INTRODUCING TLS 1.3
The Good
•
KISS – Only 5 ciphers supported
INTRODUCING TLS 1.3
The Good
•
No vulnerable to the attacks impacting
previous versions
INTRODUCING TLS 1.3
The Good
•
Welcome Forward Secrecy
INTRODUCING TLS 1.3
The Good
•
F... | pdf |
对抗实践
目录
01 终端风控的对抗体系
02 设备指纹的对抗之道
03 设备指纹的对抗实践
04 合规挑战的适应应对
01终端风控
对抗体系
设备
指纹
智能
验证
生物探针
行为
分析
应用
加固
安全管控
终端风控态势感知系统
机器学习平台
反欺诈模型
01终端风控
风险对抗
设备
指纹
智能
验证
生物探针
行为
分析
应用
加固
安全管控
唯一
标识
模拟
器
设备
篡改
设备
伪造
群控
识别
人机
识别
本人
识别
人机
验证
机刷
对抗
黑产
工具
刷机
抹机
联防
联控
异常
行为
风险
行为
敏感
权限
隐私
数据
网络
行为
动态
加载
应用
保护
文件
保护
代码
保护
文件
操作
合规
检测
数据
加密
... | pdf |
fofahub - 1
标签
地址
新增属性
fofahub
未开源
https://hub.fofa.info/
因为⾃⼰想做个 bugbounty 资产平台,所以体验了下 fofahub,记录些觉得不错的⽅式。
体验
新建项⽬ ( 图标好像是⾃动选取资产范围内的图标)
资产导⼊
输⼊范围域名后它能返回资产信息 (可能是根据 fofa 结果筛选)
fofahub - 2
分析⻚⾯
fofahub - 3
⽐较好的点是能通过分析⻚⾯的结果添加更多资产到“资产追踪”中。例如从证书主域名中添加更多域名,从根域名中添加域名。
点击⼀些详情后,会使⽤搜索语法到资产列表搜索
资产列表是以 ip 为维度,⼦域名什么的都是根据 ip 来的,这样显... | pdf |
NETWORK FLOW ANALYSIS
DefCon 2008
Bruce Potter
gdead@shmoo.com
bpotter@pontetec.com
Copyright 2008 - Bruce Potter
INTRODUCTIONS
Bruce Potter
Founder of Ponte Technologies
Focus on advanced defensive technologies
Founder of The Shmoo Group
We run ShmooCon as well as other events
Co-author ... | pdf |
Hacking Humanity:
Human Augmentation
And You
quaddi & r3plicant
Rio Hotel & Casino
July 2012
Who We Are.
Who We Are Not.
• Doctors
• Your Doctors
WARNINGS
• This talk does not constitute medical advice.
• Technologies & research described are purely experimental and dangerous.
• DO NOT ATTEMPT ANY MODI... | pdf |
HTTP DESYNC ATTACKS
SMASHING INTO THE CELL NEXT DOOR
James Kettle
The Fear Theory
Q) What topic am I really scared of?
A) HTTP Request Smuggling
Hiding Wookiees in HTTP
First documented by Watchfire in 2005
"You will not earn bounties"
"You will certainly not be considered like a white hat"
• Theory & Methodology
• Ex... | pdf |
Tag-side attacks against NFC
What is NFC?
Contactless communication between two
devices in close proximity
Many uses, primarily door controls and
payment systems
Why attack NFC?
Interesting technology
Low-level analysis tools can be prohibitively expensive
Known to be insecure, but still widely used
ISO-14443
Focuses... | pdf |
The Death Envelope:
A Medieval Solution
to a 21st
Century Problem
Matt Yoder
August 8-10, 2008, Las Vegas, Nevada
Who am I?
• Matt Yoder, acronym@acrønym.com
• Mostly a guy who believes in the concept,
and wants to spread the word.
• Made a promise to a friend, that if I
couldn’t find a good resource, I’d make it.
• I’... | pdf |
© The USA PATRIOT Act and You: A Legal Update
Jennifer Stisa Granick, Esq.
Stanford Law School
Center for Internet & Society
559 Nathan Abbott Way
Stanford, CA 94305
650-724-0014
jennifer@granick.com
What Can I Do?
Lobbying Works: Call or Write Your Congressperson
Get Educated
American Civil Libert... | pdf |
Quick Start
For Cluster Node Servers
Important hardware and safety
information and guide to
server documentation
Xserve
3
1
Overview of Xserve Hardware,
Setup, and Safety
This booklet provides an illustrated reference for your Xserve hardware and an orientation to
unpacking, setting up, and using your server. Use it ... | pdf |
Awesome CobaltStrike awesome
awesome cobaltstrike
cobaltstrike awesome
awesome community
community
Contents
0x00 Introduction
0x01 Articles & Videos
1. Basic Knowledge
2. Crack and Customisation
3. Useful Trick
4. CobaltStrike Hide
5. CobaltStrike Analysis
6. CobaltStrike Video
0x02 C2 Profiles
0x03 BOF
0x04 Aggres... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.