text
stringlengths
100
9.93M
category
stringclasses
11 values
Modern Initial Access and Evasion Tactics Red Teamer’s Delight Mariusz Banach Red Team Operator at ING Tech Poland @mariuszbit, github/mgeeky beacon> whoami Agenda » A Few Phishing Tricks » Initial Access in 2022 » Typical Vectors » Rise of Containerized Malware » The Beauty of HTML Smuggling » Evasion In-Depth » Deli...
pdf
1 OWASP 代码审计指南 V2.0 中文版 注:本指南版权归 OWASP Foundation 所有。由刘传兴、孙维康翻译,仅供业内人士学习参考。 2 目 录 1 介绍 ......................................................................................................................................................... 10 1.1 前言 ..................................................................
pdf
Monitoring Surveillance Vendors: A Deep Dive into In-the-Wild Android Full Chains in 2021 Xingyu Jin Christian Resell Clement Lecigne Richard Neal #BHUSA  @BlackHatEvents #BHUSA   @BlackHatEvents Introduction Xingyu @1ce0ear Richard @ExploitDr0id Christian @0xbadcafe1 #BHUSA   @BlackHatEvents Agenda ● Examples ...
pdf
Beyond the Scan: The Value Proposition of Vulnerability Assessment Damon J. Small, MSc.IA, CISSP Managing Consultant, IOActive August 6, 2015 About @damonsmall • Managing Consultant at IOActive • Louisiana native
 “Not from Texas but I got here as fast as I could!” • In IT since 1995; infosec since 2001 • Spent mu...
pdf
!"# $ % !&' # ( & ) * + !' # , - % . , % . / ( - 0 / 0 1 0 ( Æ + 2 % $ $ !" # 3 + - + % 4 ( ( 5 5 ,', !&6 # + !7 # 8 9 &'67 5 ' : ; : Æ + < " 2 < 2 = % > + ? !&7 # " 5 - 1 !&# / 2 9 + 7 @ / + !&7 " # - !& &7 A " # 2 % $ 2 ' > % 4 % + 5 Æ % 8 2 8 & < " &< !&7 # - $ % 2 5 1 9 4 ( + 4 2 4 5 B / = + 1 4 3 ( 3 2 $ ; C: D % ...
pdf
DFIR(Digital Forensics and Incident Response) 数字取证和应急响应 一.介绍 二.正文 1. mess #DFIR 地址: https://twitter.com/0gtweet/status/1305887051976511489 通常我们运行一个程序,会在prefetch目录缓存,用来加速程序的运行 *.pf文件,也叫预读取功能。加快 系统启动,文件读取速度。 默认路径: c:\windows\prefetch 仔细观察,会发现有两个CHRROME.exe程序,因此在渗透中exe不得不落地到目标磁盘上时,也要重 命名,可以改为dllhost,mmc,rundll32,svchost等等...
pdf
针对⼤家在作业⾥⾯常⻅的⼀些问题作了⼀些汇总。 1. goby的指纹感觉不那么好 会有很多误报 ,对goby指纹⼀些字段的理解不太清晰,如何处理goby的指纹? 2. 如何实现程序让速度和效率最⼤化 这⾥给出我的⼀些思考的想法和过程。 goby指纹的处理 第⼀期作业中提取出了goby指纹并将它转换为了json格式。第⼀期我的提取⽅法:https://t.zsxq.com/eiQVRZv 多看⼏个规则差不多就能把规则了解清楚了。 { "rule_id": "1", // id没啥⽤ "level": "5", // 暂时不知道有什么⽤ "softhard": "2", // 是否是硬...
pdf
2021 年 12 ⽉ 9 号注定是⼀个不眠之夜,著名的Apache Log4j 项⽬被爆存在远程代码执⾏漏洞, 且利⽤简单,影响危害巨⼤,光是引⼊了 log4j2 依赖的组件都是数不清,更别提项⽬本身可能存 在的⻛险了,如下图所示,mvnrepository搜索引⽤了 log4j-core version 2.14.1的项⽬就 ⼗⼏ ⻚了: 本⽂就来简单分析⼀下该漏洞的原理。 引⽤了版本处于2.x < 2.15.0-rc2的 Apache log4j-core的应⽤项⽬或组件 根据官⽅的修订信息:https://issues.apache.org/jira/projects/LOG4J2/issues/LOG4J2- 3201?l...
pdf
没有0x0C的evil.so 为什么constructor 会在库加载的时候执行 static void before_main(void) __attribute__((constructor)); 像这种具有constructor属性的函数会在初始化时执行,主要是通过.init / .init_array 实现(还有.fini_array 类似析构), 不同的平台/版本编译链接时处理不同,详见宋教授的文章 .init, .ctors, and .init_array 落到文件内容层面,ELF的Section中有一个类型为SHT_DYNAMIC (6) 的Section, 其存储着动态链接信 息,一般情况下name为 .dynam...
pdf
2 u Dongsung Kim u Graduate Student Researcher u @kid1ng u https://kidi.ng u Hackers In inTrusion Laboratory u https://hit.skku.edu Surname 1 4 u Samsung’s smartwatch products ° Track fitness; control smart devices; receive calls, texts, and emails; pay with NFC ° Pair phone with Bluetooth + Wi-Fi (+ LTE) ° App marketp...
pdf
1 Computer Crime Year In Review: MySpace, MBTA, Boston College and More Jennifer Stisa Granick, EFF Civil Liberties Director Kurt Opsahl, EFF Senior Staff Attorney Marcia Hofmann, EFF Staff Attorney DEFCON 17 July 31, 2009 2 Topics 1. Computer Crime Law Overview 2. MBTA v. Anderson 3. United States v. Lori Drew 4....
pdf
web⸺ 0x00 ida88 32 char 1 char*: 4322^32, 32bit464 short int : 2 int 4 unsigned int : 4 float: 4 double: 8 long: 4 long long: 8 unsigned long: 4 64 char 1 char*(): 8 short int : 2 int 4 unsigned int : 4 float: 4 double: 8 long: 8 long long: 8 unsigned long: 8 a...
pdf
S-fastjson fastjson的使用 实体类 package fastjson.example.use; import java.util.Map; public class User {    private String name;    private int age;    private Map hashMap;    @Override    public String toString() {        return "User{" +                "name='" + name + '\'' +                ", age=" + age +      ...
pdf
DEE可视化工具 软件破解 认证过程 系统使用 struts2 框架开发,通过在 struts2.xml 配置文件当中找到过滤器获取到认证程序。 com.seeyon.dee.configurator.interceptor.SerialInterceptor // // Source code recreated from a .class file by IntelliJ IDEA // (powered by FernFlower decompiler) // package com.seeyon.dee.configurator.interceptor; import com.opensymphony.xwork2.Act...
pdf
ZoomEye(钟馗之眼) 网络空间搜索引擎 项目简介及技术架构 张弘引(小雨) 2013- 08 我和我的小伙伴们 春哥 • Java 达人 张波 • Django • WebUI pnig0s 小P • 小 • Powerful pw • 小 • 纯洁 小雨 • 猥琐 大叔 目录 • ZoomEye是什么 • ZoomEye的诞生原因 • ZoomEye的对象 • ZoomEye的使用方法 • ZoomEye的优势 • ZoomEye的技术细节 • ZoomEye的未来展望 ZoomEye是什么? • 它是一个搜索引擎 • 搜索对象是网络空间中的“WEB服务组件” 和“网络设备” • 基于我们长期积累的安全研究能力 • 为白帽子...
pdf
Repelling  the Wily  Insider Ma#as  Madou,  PhD  /  Jacob  West DEF  CON  18  /  Las  Vegas,  NV  /  7.30-­‐8.1,  2010 7/4/10 2 Ma#as  Madou   Security  Researcher @  For#fy  SoKware   Focus  on  new  techniques  to find  vulnerabili#es (sta#c  and  dynami...
pdf
Pwn2Own Qualcomm cDSP Slava Makkaveev What processors are on your mobile phone? modem DSP (mDSP/baseband) audio DSP (aDSP) compute DSP (cDSP) sensor DSP (sDSP) Kryo CPU (Android) Adreno GPU Wireless modem Hexagon DSP Spectra ISP Snapdragon SoC DSP assignment ● Low-power processing of audio and voice data ● Computer vis...
pdf
字节容器技术实践 01 未来5年容器云在 公有云市场上渗透率将超过50 % 未来5年私有云 容器云平台市场C AGR将达到3 3 % 全球容器安全市场的 复合年增长率 (C AGR) 预计为3 0 .9% 到2 0 2 4年,全球市场规模约为1 50 亿元人民币 国内市场发展规模约占50 亿元 原生&容器业务技术趋势 数据来源于:IDC 与M a rketsa n d M a rkets 部容器规模和现状 面向现代化应用构建平台化能力 • 结合现代化应用特点,为用户提供新一代云原生架构下 的研发工具栈与方法论,保证业务敏捷迭代、弹性稳定 运行 • 结合经过实践验证的“端”技术和“边”形态,构建 “云-边-端”一体化的应用管理...
pdf
Taking your ball and going home; building your own secure storage space that mirrors Dropbox's functionality Phil Cryer (@fak3r) open source technologist DEFCON 19 - August 2011 $ whoami phil $ whoami phil $ alias phil=@fak3r http://afistfulofsoundtracks.blogspot.com $ whoami phil $ alias phil=@fak3r $ cat brief...
pdf
author: lazydog@noahlab Go template 遇上 yaml 反序列化 CVE-2022-21701 分析 前⾔ 本⽂对 CVE-2022-21701 istio 提权漏洞进⾏分析,介绍 go template 遇到 yaml 反序列化两者相 结合时造成的漏洞,类似于 “模版注⼊” 但不是单⼀利⽤了模版解析引擎特性,⽽是结合 yaml 解 析后造成了“变量覆盖”,最后使 istiod gateway controller 创建⾮预期的 k8s 资源。 k8s validation 在对漏洞根因展开分析前,我们先介绍 k8s 如何对各类资源中的属性进⾏有效性的验证。 ⾸先是常⻅的 k8s 资源,如 Pod ...
pdf
If You Give A Mouse A Microchip It will execute a payload and cheat at your high-stakes video game tournament Mark Williams (skud) and Rob Stanley (Sky) ● 1958 - ‘first’ video game ● 1972 - first recorded, sponsored video game tournament ○ Spacewar! - build in 1960s ○ Rolling Stone sponsored a Spacewar! Olympics in ‘...
pdf
Abusing Web Hooks For Command And Control Dimitry Snezhkov @Op_nomad What we are going to talk about Subject: Safe(er) bidirectional delivery of content and communication across network boundaries with the use of WebHook technology. From: - Hostile networks - Monitored networks - Censored networks - Restricted netwo...
pdf
Disassemble Flash Lite 3.0 SWF file (How to protect your ActionScript source code) TAKESAKO @32bit.in <takesako@gmail.com> Japan is a birthplace of "K-ON!" and "K-TAI" nJapanese cellular phones are called "K-TAI" nJapanese cellular phones have made original evolution because the communication method isn't an u...
pdf
在看极客巅峰2020的wp里,babyback的题wp提到了。单引号被过滤使用\代替。由于当时没做出来 看了一下挺好奇查看了一下文章,做个总结。使用\代替单引号的一半只适用于下面的这种情况 类似 (Login_Only_For_36D的题) 这里的题目源码:https://github.com/y1nglamore/Y1ngCTF/blob/master/36D_Login_Only_For_36D/src/index.php 分析了一下代码,之所以用\在$uname处逃逸是因为,单引号被过滤了。绕过在uname处做过滤点造成无法闭合单引号的问题,如果用\逃逸单引号将变成如下的sql 从上面的题目代码修改了一下,然后练习一波 单引号...
pdf
@Y4tacker jsp新webshell的探索之旅 简介 这篇⽂章记录了我从⼀个⼩发现到实现RCE,为了实现更短的webshell,在这之间遇到了不断 的新问题再到解决,再到最终精简得到⼀个新的jsp五⾏Payload构成的webshell的过程 发现 在tomcat的扫描中都有对⼀些配置⽂件的扫描以及对⾥⾯的属性解析赋值的过程,由于之前的 ⼀些⼩发现(这⾥不多说),今天下午⼀个突如其来的crush在我⼼中出现,我去跟踪了⼀下解析 context.xml的过程 在 org.apache.catalina.startup.ContextConfig#contextConfig 中,从这⾥可以看 到defaultContextXml...
pdf
Hi! I’m DOMAIN\Steve, please let me access VLAN2. Tricking firewall user identity capabilities into applying security policies to arbitrary IPs on the network. Get-ADUser "Justin Perdok" @JustinPerdok on Twitter Into hacking and automating stuff Pentester at Orange Cyberdefense Enjoys craft beers and longboarding ...
pdf
I Know Where You Are: 基于LBSN APP的地理位置追踪 2015年9月1日 赵 双(DFlower) 羅夏樸(Xiapu Luo) 1 Who AM I  赵双 (DFlower, dflower.zs@gmail.com) • Insight-Labs Team 成员 (http://insight-labs.org) • 研究领域:漏洞挖掘/恶意代码分析/手机安全 • 《0day安全:软件漏洞分析技术》(第2版)作者之一 • OWASP China 2010、 Xcon 2011 Speaker  羅夏樸 (Xiapu Luo, luoxiapu@gmail.com) • RAP in HKPolyU...
pdf
1 http://www.soldierx.com/defcon16speech/docsis_insecure_by_design-blake_durandal.ppt Humor 2 Maybe Ted Stevens has a series of hacked modems and a drop amp at his place. Could this be the reason he thinks that the internet is a series of tubes? Background • Personal – Conducted SIPRNET Administration and Red Team Pen...
pdf
HITCON Pacific 2016 Threats to the Korea Financial Sector Fly me to the BLACKMOON KYOUNG-JU KWAK, CEAT(Computer Emergency Analysis Team) FSI kjkwak@fsec.or.kr HITCON Pacific 2016 Career ~ 2015.4 KFTC (Korea Financial Telecommunications and Clearings Institute) KF-ISAC ~ 2016.6 CERT, FSI (Financial Security Institut...
pdf
优酷主站一处 SQL 注入 注:该文档仅“Web 安全”小蜜圈交流之用,漏洞已经修复,请勿外传,如出现 法律问题,外传该文档者自行承担法律责任。 在测试上个 XSS 的时候,无意跑的,注入点在配色的这个请求包上: 然后确定的时候用 burpsuite 抓包,给 color_page_back 参数后面加了个双引号,就爆了 了 mysql 的错: 然后给后面加个*,扔进 sqlmap: 就跑出来啦~ 为了证明危害,我这里还跑出来了数据库名:
pdf
TLS$Canary$ Keeping$your$dick$pics$ safe(r)$ US$ •  Evilrob$ –  Rob$Bathurst$ –  Director$for$Healthcare/Biomedical$Security$ –  Cylance$ •  xaphan$ –  Jeff$Thomas$ –  Plays$with$other$people's$computers$ –  Is$barely$awake$right$now$ "The$good$news$is$that$there's$no$ program$named$the$'dick$pic'$program.$ The$bad$news...
pdf
1 Acquiring .NET Objects from the Managed Heap Topher Timzen Southern Oregon University Cybersecurity Research Lab F ABSTRACT This paper will describe how to use instantiated objects on the .NET CLR Managed Heap as if they were declared locally. It will be shown that by referencing an object pointer from the Managed He...
pdf
Who Controls the Controllers? Hacking Crestron IoT Automation Systems Copyright 2017 Trend Micro Inc. 2 Who am I? • Offensive Security Research on ASR team at Trend Micro – Focused mainly on IoT research – Break things in interesting ways and build cool exploit demos – Report vulns to ZDI and work with vendo...
pdf
VLAN Hopping, ARP Poisoning & Man-In-The-Middle Attacks in Virtualized Environments Ronny Bull Dr. Jeanna Matthews & Kaitlin Trumbull (DEF CON 24) Road Map © 2016 Ronny L. Bull - Clarkson University ● Context for the Problem of Layer 2 Network Security in Virtualized Environments – Virtualization, Multi-tenant enviro...
pdf
第 1页 共 12页 SDL-软件安全设计初窥 — safer applications begin with secure design — Cryin@insight-labs.org 摘要:本文详细介绍微软软件安全开发生命周期(SDL)相关概念,并讨论要遵循 SDL 过 程所应执行的各种安全活动,其中着重对软件安全设计的原则进行探讨。并对 STRIDE 威胁 建模方法进行深入介绍。 安全开发生命周期(SDL)是一个帮助开发人员构建更安全的软件和解决安全合规要求 的同时降低开发成本的软件开发过程。 安全应用从安全设计开始,软件的安全问题很大一 部分是由于不安全的设计而引入的,微软用多年的经验总结出了安全开发生命周期(SDL), ...
pdf
第 1页 共 12页 SDL-软件安全设计初窥 — safer applications begin with secure design — Cryin@insight-labs.org 摘要:本文详细介绍微软软件安全开发生命周期(SDL)相关概念,并讨论要遵循 SDL 过 程所应执行的各种安全活动,其中着重对软件安全设计的原则进行探讨。并对 STRIDE 威胁 建模方法进行深入介绍。 安全开发生命周期(SDL)是一个帮助开发人员构建更安全的软件和解决安全合规要求 的同时降低开发成本的软件开发过程。 安全应用从安全设计开始,软件的安全问题很大一 部分是由于不安全的设计而引入的,微软用多年的经验总结出了安全开发生命周期(SDL), ...
pdf
THE KEY RECOVERY ATTACKS
 AGAINST COMMERCIAL WHITE BOX CRYPTOGRAPHY IMPLEMENTATIONS SANGHWAN AHN(H2SPICE), LINE CORPORATION AGENDA • Introduction • WHITE-BOX CRYPTOGRAPHY • White-box Cryptanalysis • Conclusion INTRODUCTION CRYPTO SYSTEM IN THE SOFTWARE 0 1 0 1 1 1 1 0 1 0 1 1 0 1 0 1 WHITE-BOX THREAT MODEL ● Bi...
pdf
REST API安全测试的思路 基于Swagger的REST API自动化安 全测试实践 贾玉彬 Gary Gary_jia@rapid7.com 大纲 • 由应用安全说起 • 传统REST API安全测试 • 基于Swagger的REST API 的安全测试 在SDLC中尽早发现和修复安全问题 30X 15X 10X 5X 2X Cost Source: NIST Production System testing Integration/ component testing Coding Requirements 不同的团队不同的目标 DevSecOps Image : Pete Cheslock at #DevOpsD...
pdf
Linux-Stack Based V2X: White Paper Duncan Woodbury, Nicholas Haltmeyer, and Robert Leale {p3n3troot0r, ginsback}@protonmail.com, robertleale@canbushack.com May 13, 2017 Abstract Vehicle-to-vehicle (V2V) and, more generally, vehicle-to-everything (V2X) wireless com- munication enables semi-autonomous driving via the exc...
pdf
​ open -a /System/Applications/Calculator.app // open /System/Applications/Calculator.app // open -a /Applications/Safari.app https://www.baidu.com //safari open http://www.baidu.com/System/Applications/Calculator.app http://www.baidu.com/System/Applications/Calculator.app open 0x00 0x01 open 0x02 ​ open -a htt...
pdf
1 OLONLXOL-Resin解析漏洞 初学JAVA有问题请指正 受影响版本:全版本 之前测试resin⾥的权限绕过时提到过可以采⽤下⾯的⽅式 后来在北京玩的时候突然想到,那我可不可以和 iis解析漏洞 ⼀样创建⼀个⽂件夹为 test.jsp 下⾯存放⼀个⾮ jsp 后缀⽂件,但是 Resin 能解析呢。 回来测试了⼀下发现可以 Plain Text 复制代码 /test.jsp /test.jsp/1.css 1 2 2 得到如下结论 看⼀下问题出在哪⾥,⾸先查看 Resin 的配置⽂件 Plain Text 复制代码 /test.jsp/test.jpg test.jsp ⽂件夹下的⽂件都会解析成jsp 1 2 3 注意到三个...
pdf
DNS - Devious Name Services Destroying Privacy & Anonymity Without Your Consent Jim Nitterauer Senior Security Specialist Disclaimer Information disclosed in this presentation is intended to help improve your security & privacy posture and should not be used for unethical purposes The concepts presented are in no ...
pdf
网络安全屋 INTEL 汇编指令集 Intel Assemble Instruction Set CONTENT Intel 8086 Family Architecture Instruction Clock Cycle Calculation 8088/8086 Effective Address (EA) Calculation Task State Calculation FLAGS - Intel 8086 Family Flags Register MSW - Machine Status Word (286+ only) 8086/80186/80286/80386/80486 ...
pdf
Sleight of Mind Magic and Social Engineering Mike Murray Tyler Reguly 1 A DANGEROUS OPENER Credit: Luke Jermay 2 EXPLANATION 3 THE FORCE IS WITH YOU 4 EXPLANATION 5 COIN BENDING Credit: Luke Jermay 6 EXPLANATION 7 EQUIVOQUE Credit: Luke Jermay 8 EXPLANATION 9 IN THE CARDS 10 EXPLANATION 11 RGM Credit: Luke Jermay 12 E...
pdf
报告初稿完成时间:2017 年 1 月 13 日 16 时 00 分 首次发布时间:2017 年 1 月 16 日 10 时 00 分 本版本更新时间:2017 年 1 月 25 日 14 时 30 分 方程式组织 EQUATION DRUG 平台解析 ——方程式组织系列分析报告之四 安天安全研究与应急处理中心(Antiy CERT) 目 录 1 本版本更新小语 ....................................................................................................................................
pdf
1 Resin unicode Resin⾥URI和参数名参数值都可以⽤unicode代替。 如图根⽬录存在b.jsp 使⽤http://127.0.0.1:8083/%u0062%u002e%u006a%u0073%u0070访问 注意到此处 getRequestURI() 依然为unicode编码以后的值,如果项⽬使⽤ getRequestURI() 对路径做权限校验,可使⽤这种⽅式绕过。 在泛微上试了⼀下这种⽅法发现会直接爆500,查看⽇志定位报错位置。 1.URI 2 WEB-INF/myclasses/weaver/security/filter/SecurityMain.class Plain Te...
pdf
Christian Nagel Professional C# 6 and .NET Core 1.0 EISBN: 978-1-119-09660-3 Copyright © 2016 by John Wiley & Sons, Inc. All Rights Reserved. This translation published under license. Trademarks: Wiley, the Wiley logo, Wrox, the Wrox logo, Programmer to Programmer, and related trade dress are trademarks or registered t...
pdf
Porosity Decompiling Ethereum Smart-Contracts Matt Suiche (@msuiche) Founder, Comae Technologies m@comae.io Whoami @msuiche Comae Technologies OPCDE - www.opcde.com First time in Vegas since BlackHat 2011 Mainly Windows-related stuff CloudVolumes (VMware App Volumes) Memory Forensics for DFIR (Hibr2Bin, DumpIt...
pdf
How to Disclose or Sell an Exploit Without Getting in Trouble Jim Denaro @CipherLaw 1 DEF CON 21 This presentation is not legal advice about your specific situation. “If I were your lawyer, I’d advise you not to answer that tweet.” DEF CON 21 2 What are we talking about? “Techniques” Information relating to both...
pdf
如何成為駭客? 剛剛那些駭客的朋友 GD 駭客 Roadmap 如何成為駭客? • 好奇心 feeling everything be interesting • 持續學習 spend a lot time on new tricks • 習慣踏出舒適圈 • 專注力 research, go after one goal for a long while • 需要滿多運氣、沒有也別灰心 • 有耐心 不要柿子挑軟的 • 創意 thinking out-of-the-box • 形成駭客的直覺 當興趣或工作? 有能力之後的選擇? Cleverness is a gift, Skillz can be learned, Kindness ...
pdf
Rob Rehrig Josh Marks Larry Aiello Introduction to the Wiimote  Nintendo’s controller for the Wii system  Infrared camera in the front  Determines direction Wiimote is moving  How far the Wiimote is from the Sensor Bar  Sensor Bar is just 2 clusters of IR LEDs  Wiimote cluster coordinates to determine positioning...
pdf
Fooling Image Search Engine Yuanjun Gong,Bin Liang*,Jianjun Huang {Gongyuanjun, liangb, hjj}@ruc.edu.cn Renmin University of China 1 2 1. Introduction 2. Technical Background 3. Methodology 4. Attacking Google Image Search Engine 5. Discussion 6. Conclusion Outline • Image search engines (e.g. Google, Baidu) provide s...
pdf
⼀、什么是DoS? DoS是Denial of Service的简称,即拒绝服务,造成DoS的攻击⾏为被称为DoS攻 击,其⽬的是使计算机或⽹络⽆法提供正常的服务。拒绝服务存在于各种⽹络服务 上,这个⽹络服务可以是c、c++实现的,也可以是go、java、php、python等等语 ⾔实现。 ⼆、Java DoS的现状 在各种开源和闭源的java系统产品中,我们经常能看到有关DoS的缺陷公告,其中 ⼤部分都是耗尽CPU类型或者业务卸载类型的DoS。耗尽CPU类型的DoS⼤体上主 要包括“正则回溯耗尽CPU、代码⼤量重复执⾏耗尽CPU、死循环代码耗尽CPU” 等。⽽业务卸载DoS这⼀类型的DoS则和系统业务强耦合,⼀般情况下并不具备通...
pdf
1 JarLoader模块的细节问题 前⾔ 正⽂ 冰蝎 哥斯拉 ⼩实验 @yzddmr6 As-Exploits v 1.2 更新了⼀个JarLoader模块,可以在内存中直接加载⼀个jar,⽽⽂件不落地。今天来 讲⼀讲开发的细节。 打⼀个jar进去通常有两个⽤处: ⼀是可以⽤来上传数据库驱动。 ⼆是把恶意类打⼊JVM中,后续只需要通过反射调⽤即可。哥斯拉的实现⽅式就是第⼀次就把所有的 payload打⼊jvm中,后续通过反射调⽤。所以后续通信的流量包都⾮常的⼩,只需要传递参数即可。 冰蝎跟哥斯拉都有类似的功能,研究了⼀下他们的实现。 冰蝎的加载jar功能内嵌于数据库连接部分,仅⽤于上传数据库驱动。⾸先把要打⼊的jdbc上传到⽬标的...
pdf
从一道CTF的非预期解看PHP反斜杠匹配问题 前言 刷buuoj的时候遇到这样一个题,做一半看到他这个正则写的有点问题,就去翻wp。 找到了官方的wp发现果然是个非预期。 但是官方wp中并没有深入说明。后来看到评论去翻出题人的博客也没找到相关的信息,加上看到了其 他wp中一些不准确的说法,所以今天就有了这篇文章来讲一讲自己的看法。 正文 题目源码 前面md5碰撞已经是老套路了,问题出在后面对shell命令的过滤上。 熟悉php代码审计的同学应该都知道,在preg_match中要过滤 \ 是需要四个 \\\\ 才可以达到目的,原 理如下: <?php error_reporting(E_ALL || ~ E_NOTICE); hea...
pdf
Hacking Cloud Product [ Demon@n0tr00t ] 探索⼀一切、攻破⼀一切 [ Hacker@KCon ] 3 About me • Working  on  阿里云-云平台安全 • Team  of  n0tr00t  (http://www.n0tr00t.com/) • ID:  Demon  (微博:Demon写Demo)   • 跨界:摇滚乐、Coding、安全 Part. 01 分类和架构 4 5 云的基础架构 • 种类繁多 基础服务大同小异,每家云厂商还有自己的特色云服务   • 资源开放 按需付费、资源开放,对于安全的说法就是可控点变多,结界难以把控,安全的天秤随...
pdf
0x00 漏洞描述 CVE-2021-21972 vmware vcenter的一个未授权的命令执行漏洞。 该漏洞可以上传一个webshell至vcenter服务器的任意位置,然后执行webshell即可。 0x01 影响版本 VMware vCenter Server 7.0系列 < 7.0.U1c VMware vCenter Server 6.7系列 < 6.7.U3l VMware vCenter Server 6.5系列 < 6.5 U3n VMware ESXi 7.0系列 < ESXi70U1c-17325551 VMware ESXi 6.7系列 < ESXi670-202102401-SG VMware ESXi ...
pdf
DefCon 22, Las Vegas 2014 Abusing Software Defined Networks Gregory Pickett, CISSP, GCIA, GPEN Chicago, Illinois gregory.pickett@hellfiresecurity.com Hellfire Security Overview What is it? Exploiting it! Fixing it! Moving Forward Wrapping Up Modern Day Networks Vendor Dependent Difficult to scale Complex and Prone to B...
pdf
You found that on Google? Gaining awareness about “Google Hackers” Johnny Long johnny@ihackstuff.com HUGE DISCLAIMER! •The print/CD version of this presentation is much smaller than the live version! • The live version shows many more techniques and examples. After all, I can’t leave a paper trail… =^P • DEFCON ATTENDE...
pdf
-webshell self-xssxss A“” 0x01 http/https nodejsgoby js rcegobywebshell 1. jb 2. shell.php 3. jb 4. jb 5. jbwebshell 6. 7. JS⸻—RCE OKwebshelljbrcewebshell webshell 1. post 2. 3. 4. ”“ 5. 0x02 111webshell 111=@ini_set("display_errors", "0"); @set_time_limit(0); $opdir=@ini_get("open_basedir"); if($opdir) { $opa...
pdf
WMI ——重写版 本文是以WMI的重写版,本来这份笔记会更长,原版的笔记以 Black Hat 2015的 Abusing Windows Management Instrumentation (WMI) to Build a Persistent, Asyncronous, and Fileless Backdoor为主要学习资料,在笔记写到大概一万字的时候,Typora 中保存的内容部分丢失。 于是重新整理,有了这份,我认为精简版的WMI 笔记。 WMI 背景 WMI 是什么?Windows管理规范(WMI)是Microsoft对基于Web的业务管理标准(WBEM),公共信 息模型(CIM)和分布式管理任务组(DMTF)的...
pdf
Rob Havelt - Director of Penetration Testing, Trustwave SpiderLabs Wendel G. Henrique – Security Consultant, Trustwave SpiderLabs Copyright Trustwave 2010 Confidential BIO SpiderLabs:~ Trustwave$ whois RHavelt •  Director of Penetration Testing at Trustwave’s SpiderLabs. •  Over 18 years in the security industry...
pdf
411: A Framework for Managing Security Alerts Kai Zhong @sixhundredns Ken Lee @kennysan 411: A Framework for Managing Security Alerts Kai Zhong @sixhundredns Ken Lee @kennysan OPEN SOURCE! Who Are We? KZER Kai Zhong Product Security Engineer @ Etsy I wear many hats Twitter: @sixhundredns KLEE Ken Lee Senior Product S...
pdf
@ripshy  +  @hackajar Thursday  July  26th,  2012 ¡  Ripshy §  90%  Badass  /  10%  Cuddly §  Attending  CON  since  2002,  supporting  role  since 2004,  Vegas  2.0  Co-­‐Founder ¡  Hackajar §  90%  Cuddly  /  10%  Badass §  Attending  CON  since  2000, ...
pdf
⾃动化通⽤DLL劫持 - 1 ⾃动化通⽤DLL劫持 之前写过⼀篇 使⽤⽩加⿊的⽅式⽣成"冲锋⻢",使⽤到部分 dll 劫持的技术。但是它的场景是劫持后阻断正常⽩⽂件的运⾏,程序的控制权交到“⿊⽂ 件”中。 这篇⽂章是对通⽤ DLL 劫持的研究,期望能制作⼀个通⽤的 DLL,劫持程序原有的 dll 但保留原 dll 的功能,同时执⾏⾃⼰的代码,这个 dll 最好能⾃动⽣成(不要⼿动编译),主要⽤于维权场景。 已有研究 Aheadlib 著名的⼯具 Aheadlib 能直接⽣成转发形式的 dll 劫持源码,通过 #pragma comment(linker,"/EXPORT:") 来指定导出表的转发。 转发模式⽣成的源码: 红队开发 -...
pdf
1 Design of a blocking-resistant anonymity system Roger Dingledine, Nick Mathewson The Tor Project 2 Outline ● Crash course on Tor ● Goals for blocking resistance ● Assumptions (threat model) ● What Tor offers now ● Current proxy solutions ● What we need to add to Tor ● All the other issues that come up 3 Tor: Big Pi...
pdf
Introduction Major Malfunction Security professional by day White Hat hacker since the '70s DEFCON Goon since DC5 Co-founder of InterFACE internet pirate radio station Introduction Why Infra Red? Ubiquitous - still used in modern applications TV / Cable / Sat remotes Master configuration / Tuning Package selection Cent...
pdf
(U) I hunt TR-069 admins Shahar Tal T O P S E C R E T / / S I / / R E L T O D C 2 2 no ISPs were harmed during the making of this presentation corporate legal wouldn't let us • Shahar Tal (@jifa) • Father, husband, geek • 10 years with IDF obligatory whoami Agenda • Intro to TR-069 • Why you should care ...
pdf
Caught you - reveal and exploit IPC logic bugs inside Apple Zhipeng Huo,,Yuebin Sun,,Chuanda Ding of, Tencent,Security,Xuanwu,Lab Who are We? • Zhipeng Huo (@R3dF09) • Senior security researcher • Member of EcoSec Team at Tencent Security Xuanwu Lab • macOS, iOS and Windows platform security • Speaker of Black Hat Eur...
pdf
Crypto for Hackers Eijah v1.00 August 7th, 2015 “Shall we play a game?” – Joshua/WOPR Hello World Free Party Tonight! 4 • www.demonsaw.com • www.defconparties.com Who am I? 5 • Founder • Programmer • Hacker Last year at Defcon… • Saving Cyberspace by Reinventing File Sharing • We’re losing our right to privacy and free...
pdf
Sniffing cable modems Guy Martin <gmsoft@tuxicoman.be> Defcon 16 - Aug 2008 – Las Vegas Agenda  What is DOCSIS ? – Use of DOCSIS – General architecture – Registration process – Encryption on the link  Cool, how can I sniff it ? – DVB-C card – Packet-o-matic to the rescue Agenda  Doable things – Privacy – Modem SNMP ...
pdf
深入理解 Windows 字体解析引擎漏洞 wang yu SyScan(+)360, 2012 议题简介 第一部分 议题简介 ·关于作者 ( wangyu@360.cn ) ·议题背景 2011 年 12 月微软月度安全更新修复了此 前曾被Duqu 恶意软件利用的 Win32K 内核漏洞。 同月,在中国更受关注的一个话题是网站后 台数据库的安全性问题。 本议题将聚焦于 Win32K 字体解析引擎的设 计与实现,以白盒的视角审视 Duqu 0-day 的利用细 节。 议题简介 ·议题涵盖 - 字体解析引擎客户端接口 ( Font Scaler Client...
pdf
the Constructocat by Jason Costello - https://github.com/jsncostello gitDigger Creating useful wordlists from GitHub By: WiK & Mubix We suck at “picturing” things, so in order for this presentation to be successful you must all strip down to your underwear CENSORED The Researcher – WiK @jaimefilson We weren't the ...
pdf
SSRF bible. Cheatsheet  If you have any questions, please post them in the comments!  Revision 1.02  6 august 2014  Authors:   @ONsec_Lab   http://lab.onsec.ru​ [ENG]  @Wallarm​ research team  blog.wallarm.com  1  Table of contents  Table of contents  Basics  Typical attack steps  File Descriptors exploitation way  URL...
pdf
我的CS笔记之- In-memory Evasion 1 0x00 前言 周末温习了一下2018年,CS的作者制作的In-memory Evasion的系列视频。这是视频以前也是看过的, 但是没有做笔记,现在很多细节都有点模糊了。学习一定要做笔记。 In-memory Evasion,主要有5个视频,作者传到youtube的不能开启自动英文识别字幕,于是我重新传 了一下https://www.youtube.com/watch?v=FeydRT3UTVE&list=PLI7tp5mNfPSbgSBc0VpCNh7t98vw JO0jv,可以开启英文字幕,作为一个会点哑巴英语的人,这个字幕真的拯救了我。目前国内技术资料比 以前是丰富了...
pdf
Comparison between two practical mix designs Claudia D´ıaz Len Sassaman Evelyne Dewitte Abstract We evaluate the anonymity provided by two popular email mix im- plementations, Mixmaster and Reliable, and compare their effectiveness through the use of simulations which model the algorithms used by these mixing applicatio...
pdf
Chris&Li(lebury& Senior&Penetra4on&Tester&with&Knowledge&Consul4ng&Group& Chris.Li(lebury@KnowledgeCG.com& & I&like&building&stuff.& About&me& DDISCLAIMERD& I&am:& •  Providing&ideas,&examples,&and&code&of&what’s&worked&for&me.& •  Open&to&ques4ons&aQerward&and&sugges4ons.& & I&am&not:& •  GeRng&paid&to&endorse&any&prod...
pdf
Crypto: State of the Law DEF CON 24 Nate Cardozo, Senior Staff Attorney, EFF 783A 8CC4 166D 1768 4E8E DAFD 2D76 4786 4AE6 3181 “End to end encryption is legal. Period.” Jennifer Granick, Black Hat 2016 Questions? “The Net interprets censorship as damage and routes around it.” John Gilmore, ~1993 The First Cry...
pdf
Analyzing Bankbot whoami Malware Analyst at Hispasec. ■ ■ ■ @entdark_ What is Bankbot? Origins 6 7 ■ ■ ■ 8 AV detections 9 1 0 1 1 1 2 Overlays ■ ■ ■ ■ 1 3 Android Toast ■ ■ ■ ■ 1 4 1 5 Cloak & Dagger Client side 1 7 Infection workflow 1 8 Malicious websites are still a thing 1 9 Infection workflow if (Build.VERSION...
pdf
Stargate: pivoting through VNC to own internal networks By Yonathan Klijnsma & Dan Tentler Stargate: pivoting through VNC to own internal networks 2 @ydklijnsma Yonathan Klijnsma Shodan professional, VNC voyeur, watches attackers and contemplates their motives. @Viss Dan Tentler Dark overlord of Shodan, VNC voyeur,...
pdf
Finding Xori Malware Analysis Triage with Automated Disassembly Amanda Rousseau Rich Seymour About Us Amanda Rousseau Rich Seymour Sr. Malware Researcher, Endgame, Inc. @malwareunicorn Sr. Data Scientist, Endgame, Inc. @rseymour Quick Overview The Current State of Disassemblers Functionality & Features Brief overvie...
pdf
Toho is the owner of all rights in and to the trademark and service mark GODZILLA. As such, we request that you remove the objectionable imagery and reference to GODZILLA from your website to eliminate any likelihood of confusion and posibility of an inaccurate affiliation with Toho and GODZILLA Please be advise...
pdf
Go NULL yourself :or How I Learned to Start Worrying While Getting Fined for Other’s Auto Infractions Introduction • whoami • I’m called droogie. • I’m a degenerate. • I hack things for IOActive. Introduction • Why this talk? • Discussions of old “famous” hacker tales • Fake stories, lulz • Victims of computer bugs •...
pdf
云环境自动化入侵溯源实战 徐越 阿里云安全工程师 WHOAMI 2015 2016 2019 • @cdxy_ • 安全工程师@阿里云 • 企业安全/入侵检测与响应 • 数据分析/机器学习爱好者 响应速度是企业安全能力的核心体现 是否误报? 漏洞?攻击路线? 黑客背景?目的? 影响哪些资产和账号? 泄露哪些数据? 是否存在内部违规操作? ... 告警 安全运营 看看怎么被入侵的 200G 日志 0 日志 看看怎么被入侵的 99% 误报 又来告警了 安全运营现状 安全运营流程中的技术问题 数据缺失 系统孤立 人工检索 [ 自动化入侵回溯 ] 多源异构数据的知识表达 采集 计算 交互 云原生的数据采集方案 满足90%以上事件调查 千万级...
pdf
Module 2 Typical goals of malware and their implementations https://github.com/hasherezade/malware_training_vol1 Introduction Malware: missions and tactics Malware: missions and tactics • First questions that we need to answer analyzing malware: WHAT? • What is the main purpose (mission) of tha malware? • What is the ...
pdf
(U) I hunt TR-069 admins Shahar Tal TOP SECRET//SI//REL TO DC22 no ISPs were harmed during the making of this presentation corporate legal wouldn't let us • Shahar Tal (@jifa) • Father, husband, geek • 10 years with IDF obligatory whoami Residential Gateway Security • It sucks. • Pedro Joaquin (Routerpwn), Jacob Holcom...
pdf
Cloud Computing A Weapon of Mass Destruction? David M. N. Bryan - CISSP • Technology Enthusiast (Aka “Hacker” or VideoMan) • Security Consultant (Other Company) • dave@drstrangelove.net • PGP Key on key servers Michael Anderson - Newb • Security Consultant (NetSPI) • michael.anderson@netspi. com • cpt.fury@gmail.co...
pdf
Dynamic Cross-Site Request Forgery A Per-Request Approach to Session Riding By Nathan Hamiel and Shawn Moyer July 24, 2009 Revision 1 Dynamic Cross-Site Request Forgery http://www.hexsec.com Abstract Cross-Site Request Forgery (“CSRF”) is typically described as a “replay” or static typ...
pdf
不修改注册表获取 windows 明文密码的若干姿势之 SSP 一. SSP 的作用 Security Support Providers 是一个提供约定回调函数的 dll,向系统注册了 SSP 后,系统在认证 过程中就会调用此 dll 中的某些函数,SSP 必须导出的函数如下: SpLsaModeInitialize SpInitialize SpGetInfo SpShutDown SpAcceptCredentials 在这里我们只需要关心 SpAcceptCredentials 这个回调函数,正如名字描述的一 样,此函数在系统认证过程中会接收到用户输入的账密,我们只需要记录下来,就 可以拿到用户的明文账密,m...
pdf
Like a Boss  Open source Java EE application server  Developed by JBoss, a division of Red Hat  Abstracts the infrastructure of Java-based web applications  Very large and complex  “We have over the years had the understanding that JBoss AS will be primarily used by Java EE developers on their desktop to develo...
pdf
Man-In-The-Disk Slava Makkaveev DEF CON 2018 Me ● Slava Makkaveev ○ Security Researcher ○ Check Point Software Technologies Ltd. ○ PhD in Computer Science ○ Reverse engineering and vulnerability research Android Application Security Basics App’s Sandbox Model Application UID 10045 untrusted_app Android Framework Storag...
pdf
CODE REVIEW GUIDE RELEASE Creative Commons (CC) Attribution Free Version at: https://www.owasp.org Project leaders: Larry Conklin and Gary Robinson 2.0 1 Foreword Acknowledgements 1 3 6 8 5 Introduction How To Use The Code Review Guide 2 Code Review Do’s And Dont’s Code Review Checklist Threat Modeling Examp...
pdf
Agenda • Who we are • What this talk is about • Why? • Background • Timing as a Channel • Timing as a Vector • Privacy Implications - XSRT? • Another acronym - (D)XSRT! • Conclusion / Questions Who we are.. • SensePost – Formed in 2000 – Written a few papers.. – Spoken at a few conferences – Written a few books – Done ...
pdf
⽤codeql分析grafana最新任意⽂件读取 ⽣成数据库 最近学了⼀下codeql,刚好拿这个来练⼀下⼿。简单记录⼀下,有疑问的师 傅可以⼀起探讨。 先从lgtm把数据库下下来,发现洞已经被修。 https://lgtm.com/projects/g/grafana/grafana/ci/#ql 只能⾃⼰编译了 codeql database create /Users/safe6/codeql/database/gf --language="go" --source-root=/Users/safe6/Desktop/grafana-8.2.6 --overwrite 编译好的库,有需要的师傅可以找我要。 开始分析 各位⼤佬...
pdf
自动化攻击背景下的过去、现在与未来 @ringzero 2 关于我 • 网名:猪猪侠 • 8年信息安全从业经历 • 信息安全领域爱好者 • 安全测试 • 数据挖掘 • 微博:@ringzero 我的安全观:互联网的本质 3 互联网的本质就两个字:信息 信息只做一个用处就是:交换 我的安全观:互联网下信息安全的本质 4 互联网: 连接彼此,交换信息。 信息安全: 保护信息在交换(传递)过程 中的完整性、可用性、保密 性。 我的安全观:连接彼此 交换信息 与目标系统进行信息交换 可以发起交换的请求 耦合度高被攻击可能性越大 涟漪效应 信息传递的客体对象、社会信息背 后的属性,都和人有关 人们的愚蠢没有补丁可打 八大典型APT:越...
pdf
IPv666 Address of the Beast Chris Grayson @_lavalamp Marc Newlin @marcnewlin CHRIS MARC MY NAME IS IT’S THE FUTURE BAYBEEEEEE Where to From Here Cap’n? ●  Background ●  The Scanning Problem ●  Honeypotting for PSLAAC ●  Modeling for non-PSLAAC ●  Being Less Dumb ●  To The Cloud ●  Results ●  IPv666 ●...
pdf
消失的那几年 杨 蔚 301 白帽子的成长独白 2016.07.14 众安天下 关于我 01 90后,连续创业者,黑客理想主义者 02 乌云核心白帽子,大学肄业 03 原乌云合伙人,乌云众测平台负责人 04 北京众安天下科技有限公司创始人兼 CEO,安全自媒体平台出品人(301 在路上) WeChat:2036234 Email:301@allsec.cn 杨 蔚 花名:301 众安天下 CONTENT 消失的那几年哪去了 这几年做到的事情 快速成长的秘笈 安全总结与建议 众安天下 1、消失的那几年哪去了 众安天下 消失的那几年哪去了 WHY? 高考失利,人生太顺,无法接受 WHAT? 网络工作室,把自己关在网络世界 里,但因经营不...
pdf
Why does my security camera scream like a Banshee? Signal analysis and RE of a proprietary audio-data encoding protocol About Me Love me some codes! Move fast and break things... then fix them! Recipe hacking with delicious results! Hacker Mindset 🤍 Food Software Engineer Opinionated All opinions are my own a...
pdf
Wagging&the&Tail&–&&Covert&Passive&Surveillance&and& &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&how&to&make&their&life&difficult Are&You&A&Target? Three&Letter&Agencies&(TLA) NSA FBI CIA Heat&States •The&Pickup& •The&Follow& •The&Housing Stages&of&Surveillance •Static&Observation&Post& •Static&Covert&Camera& •Mobile&Obse...
pdf
Came Saw Conquered 网络空间中的IoT安全 ID:ppprince From:中国科学院信息工程研究所 物联网信息安全北京市重点实验室 yanzhaoteng@iie.ac.cn 2016年9月2日星期五2时21分16 秒 Part. 01 引言 1 物联网时代的到来  2013年,物联网处于上升期  2014年,物联网取代大数据登上了成熟度曲线的最高点  2015年,物联网仍位于顶点  联网设备数:2015年49亿,2020年260亿(Gartner) Emerging Technologies of 2015 物联网终端 电力/工业 轨道交通 家居生活 保密场所 ...
pdf