text stringlengths 100 9.93M | category stringclasses 11
values |
|---|---|
Modern Initial Access and Evasion Tactics
Red Teamer’s Delight
Mariusz Banach
Red Team Operator at ING Tech Poland
@mariuszbit, github/mgeeky
beacon>
whoami
Agenda
» A Few Phishing Tricks
» Initial Access in 2022
»
Typical Vectors
»
Rise of Containerized Malware
»
The Beauty of HTML Smuggling
» Evasion In-Depth
»
Deli... | pdf |
1
OWASP 代码审计指南
V2.0 中文版
注:本指南版权归 OWASP Foundation 所有。由刘传兴、孙维康翻译,仅供业内人士学习参考。
2
目 录
1 介绍 ......................................................................................................................................................... 10
1.1 前言 .................................................................. | pdf |
Monitoring Surveillance Vendors: A Deep
Dive into In-the-Wild Android Full Chains in
2021
Xingyu Jin
Christian Resell
Clement Lecigne
Richard Neal
#BHUSA @BlackHatEvents
#BHUSA @BlackHatEvents
Introduction
Xingyu
@1ce0ear
Richard
@ExploitDr0id
Christian
@0xbadcafe1
#BHUSA @BlackHatEvents
Agenda
●
Examples ... | pdf |
Beyond the Scan:
The Value Proposition of
Vulnerability Assessment
Damon J. Small, MSc.IA, CISSP
Managing Consultant, IOActive
August 6, 2015
About @damonsmall
•
Managing Consultant at IOActive
•
Louisiana native
“Not from Texas but I got here as fast as I could!”
•
In IT since 1995; infosec since 2001
•
Spent mu... | pdf |
!"#
$
%
!&'
#
(
&
)
*
+
!'
#
,
-
%
.
,
%
.
/
(
-
0
/
0
1
0
(
Æ
+
2
%
$
$
!"
#
3
+
-
+
%
4
(
(
5
5
,',
!&6
#
+
!7
#
8
9
&'67
5
'
:
;
:
Æ
+
<
"
2
<
2
=
%
>
+
?
!&7
#
"
5
-
1
!&#
/
2
9
+
7
@
/
+
!&7
"
#
-
!&
&7
A
"
#
2
%
$
2
'
>
%
4
%
+
5
Æ
%
8
2
8
&
<
"
&<
!&7
#
-
$
%
2
5
1
9
4
(
+
4
2
4
5
B
/
=
+
1
4
3
(
3
2
$
;
C:
D
%
... | pdf |
DFIR(Digital Forensics and Incident
Response) 数字取证和应急响应
一.介绍
二.正文
1. mess #DFIR
地址: https://twitter.com/0gtweet/status/1305887051976511489
通常我们运行一个程序,会在prefetch目录缓存,用来加速程序的运行 *.pf文件,也叫预读取功能。加快
系统启动,文件读取速度。
默认路径: c:\windows\prefetch
仔细观察,会发现有两个CHRROME.exe程序,因此在渗透中exe不得不落地到目标磁盘上时,也要重
命名,可以改为dllhost,mmc,rundll32,svchost等等... | pdf |
针对⼤家在作业⾥⾯常⻅的⼀些问题作了⼀些汇总。
1. goby的指纹感觉不那么好 会有很多误报 ,对goby指纹⼀些字段的理解不太清晰,如何处理goby的指纹?
2. 如何实现程序让速度和效率最⼤化
这⾥给出我的⼀些思考的想法和过程。
goby指纹的处理
第⼀期作业中提取出了goby指纹并将它转换为了json格式。第⼀期我的提取⽅法:https://t.zsxq.com/eiQVRZv
多看⼏个规则差不多就能把规则了解清楚了。
{
"rule_id": "1", // id没啥⽤
"level": "5", // 暂时不知道有什么⽤
"softhard": "2", // 是否是硬... | pdf |
2021 年 12 ⽉ 9 号注定是⼀个不眠之夜,著名的Apache Log4j 项⽬被爆存在远程代码执⾏漏洞,
且利⽤简单,影响危害巨⼤,光是引⼊了 log4j2 依赖的组件都是数不清,更别提项⽬本身可能存
在的⻛险了,如下图所示,mvnrepository搜索引⽤了 log4j-core version 2.14.1的项⽬就 ⼗⼏
⻚了:
本⽂就来简单分析⼀下该漏洞的原理。
引⽤了版本处于2.x < 2.15.0-rc2的 Apache log4j-core的应⽤项⽬或组件
根据官⽅的修订信息:https://issues.apache.org/jira/projects/LOG4J2/issues/LOG4J2-
3201?l... | pdf |
没有0x0C的evil.so
为什么constructor 会在库加载的时候执行
static void before_main(void) __attribute__((constructor));
像这种具有constructor属性的函数会在初始化时执行,主要是通过.init / .init_array 实现(还有.fini_array
类似析构), 不同的平台/版本编译链接时处理不同,详见宋教授的文章 .init, .ctors, and .init_array
落到文件内容层面,ELF的Section中有一个类型为SHT_DYNAMIC (6) 的Section, 其存储着动态链接信
息,一般情况下name为 .dynam... | pdf |
2
u Dongsung Kim
u Graduate Student Researcher
u @kid1ng
u https://kidi.ng
u Hackers In inTrusion Laboratory
u https://hit.skku.edu
Surname
1
4
u Samsung’s smartwatch products
° Track fitness; control smart devices;
receive calls, texts, and emails; pay with NFC
° Pair phone with Bluetooth + Wi-Fi (+ LTE)
° App marketp... | pdf |
1
Computer Crime Year In Review:
MySpace, MBTA, Boston College
and More
Jennifer Stisa Granick, EFF Civil Liberties Director
Kurt Opsahl, EFF Senior Staff Attorney
Marcia Hofmann, EFF Staff Attorney
DEFCON 17
July 31, 2009
2
Topics
1. Computer Crime Law Overview
2. MBTA v. Anderson
3. United States v. Lori Drew
4.... | pdf |
web⸺
0x00
ida88
32
char 1
char*: 4322^32, 32bit464
short int : 2
int 4
unsigned int : 4
float: 4
double: 8
long: 4
long long: 8
unsigned long: 4
64
char 1
char*(): 8
short int : 2
int 4
unsigned int : 4
float: 4
double: 8
long: 8
long long: 8
unsigned long: 8
a... | pdf |
S-fastjson
fastjson的使用
实体类
package fastjson.example.use;
import java.util.Map;
public class User {
private String name;
private int age;
private Map hashMap;
@Override
public String toString() {
return "User{" +
"name='" + name + '\'' +
", age=" + age +
... | pdf |
DEE可视化工具
软件破解
认证过程
系统使用 struts2 框架开发,通过在 struts2.xml 配置文件当中找到过滤器获取到认证程序。
com.seeyon.dee.configurator.interceptor.SerialInterceptor
//
// Source code recreated from a .class file by IntelliJ IDEA
// (powered by FernFlower decompiler)
//
package com.seeyon.dee.configurator.interceptor;
import com.opensymphony.xwork2.Act... | pdf |
ZoomEye(钟馗之眼)
网络空间搜索引擎
项目简介及技术架构
张弘引(小雨)
2013-
08
我和我的小伙伴们
春哥
• Java
达人
张波
• Django
• WebUI
pnig0s 小P
• 小
• Powerful
pw
• 小
• 纯洁
小雨
• 猥琐
大叔
目录
• ZoomEye是什么
• ZoomEye的诞生原因
• ZoomEye的对象
• ZoomEye的使用方法
• ZoomEye的优势
• ZoomEye的技术细节
• ZoomEye的未来展望
ZoomEye是什么?
• 它是一个搜索引擎
• 搜索对象是网络空间中的“WEB服务组件”
和“网络设备”
• 基于我们长期积累的安全研究能力
• 为白帽子... | pdf |
Repelling
the
Wily
Insider
Ma#as
Madou,
PhD
/
Jacob
West
DEF
CON
18
/
Las
Vegas,
NV
/
7.30-‐8.1,
2010
7/4/10
2
Ma#as
Madou
Security
Researcher
@
For#fy
SoKware
Focus
on
new
techniques
to
find
vulnerabili#es
(sta#c
and
dynami... | pdf |
Pwn2Own Qualcomm cDSP
Slava Makkaveev
What processors are on your mobile phone?
modem DSP (mDSP/baseband)
audio DSP (aDSP)
compute DSP (cDSP)
sensor DSP (sDSP)
Kryo CPU (Android)
Adreno GPU
Wireless modem
Hexagon DSP
Spectra ISP
Snapdragon SoC
DSP assignment
●
Low-power processing of audio and voice data
●
Computer vis... | pdf |
字节容器技术实践
01
未来5年容器云在
公有云市场上渗透率将超过50 %
未来5年私有云
容器云平台市场C AGR将达到3 3 %
全球容器安全市场的
复合年增长率 (C AGR) 预计为3 0 .9%
到2 0 2 4年,全球市场规模约为1 50 亿元人民币
国内市场发展规模约占50 亿元
原生&容器业务技术趋势
数据来源于:IDC 与M a rketsa n d M a rkets
部容器规模和现状
面向现代化应用构建平台化能力
•
结合现代化应用特点,为用户提供新一代云原生架构下
的研发工具栈与方法论,保证业务敏捷迭代、弹性稳定
运行
•
结合经过实践验证的“端”技术和“边”形态,构建
“云-边-端”一体化的应用管理... | pdf |
Taking your
ball and going
home; building
your own secure
storage space that
mirrors Dropbox's
functionality
Phil Cryer (@fak3r)
open source technologist
DEFCON 19 - August 2011
$ whoami
phil
$ whoami
phil
$ alias phil=@fak3r
http://afistfulofsoundtracks.blogspot.com
$ whoami
phil
$ alias phil=@fak3r
$ cat brief... | pdf |
author: lazydog@noahlab
Go template 遇上 yaml 反序列化 CVE-2022-21701 分析
前⾔
本⽂对 CVE-2022-21701 istio 提权漏洞进⾏分析,介绍 go template 遇到 yaml 反序列化两者相
结合时造成的漏洞,类似于 “模版注⼊” 但不是单⼀利⽤了模版解析引擎特性,⽽是结合 yaml 解
析后造成了“变量覆盖”,最后使 istiod gateway controller 创建⾮预期的 k8s 资源。
k8s validation
在对漏洞根因展开分析前,我们先介绍 k8s 如何对各类资源中的属性进⾏有效性的验证。
⾸先是常⻅的 k8s 资源,如 Pod ... | pdf |
If You Give A Mouse A Microchip
It will execute a payload
and cheat at your high-stakes video game tournament
Mark Williams (skud) and Rob Stanley (Sky)
●
1958 - ‘first’ video game
●
1972 - first recorded, sponsored video game tournament
○
Spacewar! - build in 1960s
○
Rolling Stone sponsored a Spacewar! Olympics in ‘... | pdf |
Abusing Web Hooks
For Command And Control
Dimitry Snezhkov
@Op_nomad
What we are going to talk about
Subject: Safe(er) bidirectional delivery of content and communication across
network boundaries with the use of WebHook technology.
From:
- Hostile networks
- Monitored networks
- Censored networks
- Restricted netwo... | pdf |
Disassemble Flash Lite 3.0 SWF file
(How to protect your ActionScript source code)
TAKESAKO
@32bit.in
<takesako@gmail.com>
Japan is a birthplace of "K-ON!" and "K-TAI"
nJapanese cellular phones are called "K-TAI"
nJapanese cellular phones have made original
evolution because the communication method
isn't an u... | pdf |
在看极客巅峰2020的wp里,babyback的题wp提到了。单引号被过滤使用\代替。由于当时没做出来
看了一下挺好奇查看了一下文章,做个总结。使用\代替单引号的一半只适用于下面的这种情况
类似 (Login_Only_For_36D的题)
这里的题目源码:https://github.com/y1nglamore/Y1ngCTF/blob/master/36D_Login_Only_For_36D/src/index.php
分析了一下代码,之所以用\在$uname处逃逸是因为,单引号被过滤了。绕过在uname处做过滤点造成无法闭合单引号的问题,如果用\逃逸单引号将变成如下的sql
从上面的题目代码修改了一下,然后练习一波
单引号... | pdf |
@Y4tacker
jsp新webshell的探索之旅
简介
这篇⽂章记录了我从⼀个⼩发现到实现RCE,为了实现更短的webshell,在这之间遇到了不断
的新问题再到解决,再到最终精简得到⼀个新的jsp五⾏Payload构成的webshell的过程
发现
在tomcat的扫描中都有对⼀些配置⽂件的扫描以及对⾥⾯的属性解析赋值的过程,由于之前的
⼀些⼩发现(这⾥不多说),今天下午⼀个突如其来的crush在我⼼中出现,我去跟踪了⼀下解析
context.xml的过程
在 org.apache.catalina.startup.ContextConfig#contextConfig 中,从这⾥可以看
到defaultContextXml... | pdf |
Hi! I’m
DOMAIN\Steve,
please let me
access VLAN2.
Tricking firewall user identity capabilities into
applying security policies to arbitrary IPs on the
network.
Get-ADUser "Justin Perdok"
@JustinPerdok on Twitter
Into hacking and automating stuff
Pentester at Orange Cyberdefense
Enjoys craft beers and longboarding
... | pdf |
I Know Where You Are:
基于LBSN APP的地理位置追踪
2015年9月1日
赵 双(DFlower)
羅夏樸(Xiapu Luo)
1
Who AM I
赵双 (DFlower, dflower.zs@gmail.com)
•
Insight-Labs Team 成员 (http://insight-labs.org)
•
研究领域:漏洞挖掘/恶意代码分析/手机安全
•
《0day安全:软件漏洞分析技术》(第2版)作者之一
•
OWASP China 2010、 Xcon 2011 Speaker
羅夏樸 (Xiapu Luo, luoxiapu@gmail.com)
•
RAP in HKPolyU... | pdf |
1
http://www.soldierx.com/defcon16speech/docsis_insecure_by_design-blake_durandal.ppt
Humor
2
Maybe Ted Stevens has a series of
hacked modems and a drop amp at his
place. Could this be the reason he
thinks that the internet is a series of
tubes?
Background
• Personal
– Conducted SIPRNET Administration and Red Team
Pen... | pdf |
HITCON Pacific 2016
Threats to the Korea Financial Sector
Fly me to the BLACKMOON
KYOUNG-JU KWAK, CEAT(Computer Emergency Analysis Team) FSI
kjkwak@fsec.or.kr
HITCON Pacific 2016
Career
~ 2015.4 KFTC (Korea Financial Telecommunications and Clearings Institute) KF-ISAC
~ 2016.6 CERT, FSI (Financial Security Institut... | pdf |
优酷主站一处 SQL 注入
注:该文档仅“Web 安全”小蜜圈交流之用,漏洞已经修复,请勿外传,如出现
法律问题,外传该文档者自行承担法律责任。
在测试上个 XSS 的时候,无意跑的,注入点在配色的这个请求包上:
然后确定的时候用 burpsuite 抓包,给 color_page_back 参数后面加了个双引号,就爆了
了 mysql 的错:
然后给后面加个*,扔进 sqlmap:
就跑出来啦~
为了证明危害,我这里还跑出来了数据库名: | pdf |
TLS$Canary$
Keeping$your$dick$pics$
safe(r)$
US$
•
Evilrob$
– Rob$Bathurst$
– Director$for$Healthcare/Biomedical$Security$
– Cylance$
•
xaphan$
– Jeff$Thomas$
– Plays$with$other$people's$computers$
– Is$barely$awake$right$now$
"The$good$news$is$that$there's$no$
program$named$the$'dick$pic'$program.$
The$bad$news... | pdf |
1
Acquiring .NET Objects from the Managed Heap
Topher Timzen
Southern Oregon University Cybersecurity Research Lab
F
ABSTRACT
This paper will describe how to use instantiated
objects on the .NET CLR Managed Heap as if
they were declared locally. It will be shown
that by referencing an object pointer from the
Managed He... | pdf |
Who Controls the Controllers?
Hacking Crestron IoT Automation
Systems
Copyright 2017 Trend Micro Inc.
2
Who am I?
• Offensive Security Research on ASR team at Trend
Micro
– Focused mainly on IoT research
– Break things in interesting ways and build cool exploit
demos
– Report vulns to ZDI and work with vendo... | pdf |
VLAN Hopping, ARP Poisoning &
Man-In-The-Middle Attacks
in Virtualized Environments
Ronny Bull
Dr. Jeanna Matthews
&
Kaitlin Trumbull
(DEF CON 24)
Road Map
© 2016 Ronny L. Bull - Clarkson University
● Context for the Problem of Layer 2 Network Security in
Virtualized Environments
– Virtualization, Multi-tenant enviro... | pdf |
第 1页 共 12页
SDL-软件安全设计初窥
— safer applications begin with secure design
— Cryin@insight-labs.org
摘要:本文详细介绍微软软件安全开发生命周期(SDL)相关概念,并讨论要遵循 SDL 过
程所应执行的各种安全活动,其中着重对软件安全设计的原则进行探讨。并对 STRIDE 威胁
建模方法进行深入介绍。
安全开发生命周期(SDL)是一个帮助开发人员构建更安全的软件和解决安全合规要求
的同时降低开发成本的软件开发过程。 安全应用从安全设计开始,软件的安全问题很大一
部分是由于不安全的设计而引入的,微软用多年的经验总结出了安全开发生命周期(SDL),
... | pdf |
第 1页 共 12页
SDL-软件安全设计初窥
— safer applications begin with secure design
— Cryin@insight-labs.org
摘要:本文详细介绍微软软件安全开发生命周期(SDL)相关概念,并讨论要遵循 SDL 过
程所应执行的各种安全活动,其中着重对软件安全设计的原则进行探讨。并对 STRIDE 威胁
建模方法进行深入介绍。
安全开发生命周期(SDL)是一个帮助开发人员构建更安全的软件和解决安全合规要求
的同时降低开发成本的软件开发过程。 安全应用从安全设计开始,软件的安全问题很大一
部分是由于不安全的设计而引入的,微软用多年的经验总结出了安全开发生命周期(SDL),
... | pdf |
THE KEY RECOVERY ATTACKS
AGAINST COMMERCIAL WHITE BOX
CRYPTOGRAPHY IMPLEMENTATIONS
SANGHWAN AHN(H2SPICE), LINE CORPORATION
AGENDA
• Introduction
• WHITE-BOX CRYPTOGRAPHY
• White-box Cryptanalysis
• Conclusion
INTRODUCTION
CRYPTO SYSTEM IN THE SOFTWARE
0 1 0 1
1 1 1 0
1 0 1 1
0 1 0 1
WHITE-BOX THREAT MODEL
● Bi... | pdf |
REST API安全测试的思路
基于Swagger的REST API自动化安
全测试实践
贾玉彬 Gary
Gary_jia@rapid7.com
大纲
• 由应用安全说起
• 传统REST API安全测试
• 基于Swagger的REST API 的安全测试
在SDLC中尽早发现和修复安全问题
30X
15X
10X
5X
2X
Cost
Source: NIST
Production
System
testing
Integration/ component
testing
Coding
Requirements
不同的团队不同的目标
DevSecOps
Image : Pete Cheslock at #DevOpsD... | pdf |
Linux-Stack Based V2X: White Paper
Duncan Woodbury, Nicholas Haltmeyer, and Robert Leale
{p3n3troot0r, ginsback}@protonmail.com, robertleale@canbushack.com
May 13, 2017
Abstract
Vehicle-to-vehicle (V2V) and, more generally, vehicle-to-everything (V2X) wireless com-
munication enables semi-autonomous driving via the exc... | pdf |
open -a /System/Applications/Calculator.app //
open /System/Applications/Calculator.app //
open -a /Applications/Safari.app https://www.baidu.com //safari
open http://www.baidu.com/System/Applications/Calculator.app
http://www.baidu.com/System/Applications/Calculator.app
open
0x00
0x01 open
0x02
open -a htt... | pdf |
1
OLONLXOL-Resin解析漏洞
初学JAVA有问题请指正
受影响版本:全版本
之前测试resin⾥的权限绕过时提到过可以采⽤下⾯的⽅式
后来在北京玩的时候突然想到,那我可不可以和 iis解析漏洞 ⼀样创建⼀个⽂件夹为
test.jsp 下⾯存放⼀个⾮ jsp 后缀⽂件,但是 Resin 能解析呢。
回来测试了⼀下发现可以
Plain Text
复制代码
/test.jsp
/test.jsp/1.css
1
2
2
得到如下结论
看⼀下问题出在哪⾥,⾸先查看 Resin 的配置⽂件
Plain Text
复制代码
/test.jsp/test.jpg
test.jsp ⽂件夹下的⽂件都会解析成jsp
1
2
3
注意到三个... | pdf |
DNS - Devious Name
Services
Destroying Privacy &
Anonymity Without Your
Consent
Jim Nitterauer
Senior Security Specialist
Disclaimer
Information disclosed in this presentation is intended to
help improve your security & privacy posture and should
not be used for unethical purposes
The concepts presented are in no ... | pdf |
网络安全屋
INTEL 汇编指令集
Intel Assemble Instruction Set
CONTENT
Intel 8086 Family Architecture
Instruction Clock Cycle Calculation
8088/8086 Effective Address (EA) Calculation
Task State Calculation
FLAGS - Intel 8086 Family Flags Register
MSW - Machine Status Word (286+ only)
8086/80186/80286/80386/80486 ... | pdf |
Sleight of Mind
Magic and Social Engineering
Mike Murray
Tyler Reguly
1
A DANGEROUS OPENER
Credit: Luke Jermay
2
EXPLANATION
3
THE FORCE IS WITH YOU
4
EXPLANATION
5
COIN BENDING
Credit: Luke Jermay
6
EXPLANATION
7
EQUIVOQUE
Credit: Luke Jermay
8
EXPLANATION
9
IN THE CARDS
10
EXPLANATION
11
RGM
Credit: Luke Jermay
12
E... | pdf |
报告初稿完成时间:2017 年 1 月 13 日 16 时 00 分
首次发布时间:2017 年 1 月 16 日 10 时 00 分
本版本更新时间:2017 年 1 月 25 日 14 时 30 分
方程式组织 EQUATION DRUG 平台解析
——方程式组织系列分析报告之四
安天安全研究与应急处理中心(Antiy CERT)
目 录
1
本版本更新小语 .................................................................................................................................... | pdf |
1
Resin unicode
Resin⾥URI和参数名参数值都可以⽤unicode代替。
如图根⽬录存在b.jsp
使⽤http://127.0.0.1:8083/%u0062%u002e%u006a%u0073%u0070访问
注意到此处 getRequestURI() 依然为unicode编码以后的值,如果项⽬使⽤
getRequestURI() 对路径做权限校验,可使⽤这种⽅式绕过。
在泛微上试了⼀下这种⽅法发现会直接爆500,查看⽇志定位报错位置。
1.URI
2
WEB-INF/myclasses/weaver/security/filter/SecurityMain.class
Plain Te... | pdf |
Christian Nagel
Professional C# 6 and .NET Core 1.0
EISBN: 978-1-119-09660-3
Copyright © 2016 by John Wiley & Sons, Inc.
All Rights Reserved. This translation published under license.
Trademarks: Wiley, the Wiley logo, Wrox, the Wrox logo, Programmer to Programmer,
and related trade dress are trademarks or registered t... | pdf |
Porosity
Decompiling Ethereum Smart-Contracts
Matt Suiche (@msuiche)
Founder, Comae Technologies
m@comae.io
Whoami
@msuiche
Comae Technologies
OPCDE - www.opcde.com
First time in Vegas since BlackHat 2011
Mainly Windows-related stuff
CloudVolumes (VMware App Volumes)
Memory Forensics for DFIR (Hibr2Bin, DumpIt... | pdf |
How to Disclose or
Sell an Exploit
Without Getting in
Trouble
Jim Denaro
@CipherLaw
1
DEF CON 21
This presentation is not legal
advice about your specific
situation.
“If I were your lawyer, I’d advise
you not to answer that tweet.”
DEF CON 21
2
What are we talking about?
“Techniques”
Information relating to both... | pdf |
如何成為駭客?
剛剛那些駭客的朋友 GD
駭客
Roadmap
如何成為駭客?
• 好奇心 feeling everything be interesting
• 持續學習 spend a lot time on new tricks
• 習慣踏出舒適圈
• 專注力 research, go after one goal for a long while
• 需要滿多運氣、沒有也別灰心
• 有耐心 不要柿子挑軟的
• 創意 thinking out-of-the-box
• 形成駭客的直覺
當興趣或工作?
有能力之後的選擇?
Cleverness is a gift, Skillz can be learned, Kindness ... | pdf |
Rob Rehrig
Josh Marks
Larry Aiello
Introduction to the Wiimote
Nintendo’s controller for the Wii system
Infrared camera in the front
Determines direction Wiimote is moving
How far the Wiimote is from the Sensor Bar
Sensor Bar is just 2 clusters of IR LEDs
Wiimote cluster coordinates to determine positioning... | pdf |
Fooling Image Search Engine
Yuanjun Gong,Bin Liang*,Jianjun Huang
{Gongyuanjun, liangb, hjj}@ruc.edu.cn
Renmin University of China
1
2
1. Introduction
2. Technical Background
3. Methodology
4. Attacking Google Image Search Engine
5. Discussion
6. Conclusion
Outline
• Image search engines (e.g. Google, Baidu) provide s... | pdf |
⼀、什么是DoS?
DoS是Denial of Service的简称,即拒绝服务,造成DoS的攻击⾏为被称为DoS攻
击,其⽬的是使计算机或⽹络⽆法提供正常的服务。拒绝服务存在于各种⽹络服务
上,这个⽹络服务可以是c、c++实现的,也可以是go、java、php、python等等语
⾔实现。
⼆、Java DoS的现状
在各种开源和闭源的java系统产品中,我们经常能看到有关DoS的缺陷公告,其中
⼤部分都是耗尽CPU类型或者业务卸载类型的DoS。耗尽CPU类型的DoS⼤体上主
要包括“正则回溯耗尽CPU、代码⼤量重复执⾏耗尽CPU、死循环代码耗尽CPU”
等。⽽业务卸载DoS这⼀类型的DoS则和系统业务强耦合,⼀般情况下并不具备通... | pdf |
1
JarLoader模块的细节问题
前⾔
正⽂
冰蝎
哥斯拉
⼩实验
@yzddmr6
As-Exploits v 1.2 更新了⼀个JarLoader模块,可以在内存中直接加载⼀个jar,⽽⽂件不落地。今天来
讲⼀讲开发的细节。
打⼀个jar进去通常有两个⽤处:
⼀是可以⽤来上传数据库驱动。
⼆是把恶意类打⼊JVM中,后续只需要通过反射调⽤即可。哥斯拉的实现⽅式就是第⼀次就把所有的
payload打⼊jvm中,后续通过反射调⽤。所以后续通信的流量包都⾮常的⼩,只需要传递参数即可。
冰蝎跟哥斯拉都有类似的功能,研究了⼀下他们的实现。
冰蝎的加载jar功能内嵌于数据库连接部分,仅⽤于上传数据库驱动。⾸先把要打⼊的jdbc上传到⽬标的... | pdf |
从一道CTF的非预期解看PHP反斜杠匹配问题
前言
刷buuoj的时候遇到这样一个题,做一半看到他这个正则写的有点问题,就去翻wp。
找到了官方的wp发现果然是个非预期。
但是官方wp中并没有深入说明。后来看到评论去翻出题人的博客也没找到相关的信息,加上看到了其
他wp中一些不准确的说法,所以今天就有了这篇文章来讲一讲自己的看法。
正文
题目源码
前面md5碰撞已经是老套路了,问题出在后面对shell命令的过滤上。
熟悉php代码审计的同学应该都知道,在preg_match中要过滤 \ 是需要四个 \\\\ 才可以达到目的,原
理如下:
<?php
error_reporting(E_ALL || ~ E_NOTICE);
hea... | pdf |
Hacking Cloud Product
[ Demon@n0tr00t ]
探索⼀一切、攻破⼀一切
[ Hacker@KCon ]
3
About me
• Working on 阿里云-云平台安全
• Team of n0tr00t (http://www.n0tr00t.com/)
• ID: Demon (微博:Demon写Demo)
• 跨界:摇滚乐、Coding、安全
Part. 01
分类和架构
4
5
云的基础架构
• 种类繁多
基础服务大同小异,每家云厂商还有自己的特色云服务
• 资源开放
按需付费、资源开放,对于安全的说法就是可控点变多,结界难以把控,安全的天秤随... | pdf |
0x00 漏洞描述
CVE-2021-21972 vmware vcenter的一个未授权的命令执行漏洞。
该漏洞可以上传一个webshell至vcenter服务器的任意位置,然后执行webshell即可。
0x01 影响版本
VMware vCenter Server 7.0系列 < 7.0.U1c
VMware vCenter Server 6.7系列 < 6.7.U3l
VMware vCenter Server 6.5系列 < 6.5 U3n
VMware ESXi 7.0系列 < ESXi70U1c-17325551
VMware ESXi 6.7系列 < ESXi670-202102401-SG
VMware ESXi ... | pdf |
DefCon 22, Las Vegas 2014
Abusing Software Defined Networks
Gregory Pickett, CISSP, GCIA, GPEN
Chicago, Illinois
gregory.pickett@hellfiresecurity.com
Hellfire Security
Overview
What is it?
Exploiting it!
Fixing it!
Moving Forward
Wrapping Up
Modern Day Networks
Vendor Dependent
Difficult to scale
Complex and Prone to B... | pdf |
You found that on Google?
Gaining awareness about “Google Hackers”
Johnny Long
johnny@ihackstuff.com
HUGE DISCLAIMER!
•The print/CD version of
this presentation is much
smaller than the live
version!
• The live version shows many more techniques
and examples. After all, I can’t leave a paper
trail… =^P
• DEFCON ATTENDE... | pdf |
-webshell
self-xssxss
A“”
0x01
http/https
nodejsgoby
js
rcegobywebshell
1. jb
2. shell.php
3. jb
4. jb
5. jbwebshell
6.
7. JS⸻—RCE
OKwebshelljbrcewebshell
webshell
1. post
2.
3.
4. ”“
5.
0x02
111webshell
111=@ini_set("display_errors", "0");
@set_time_limit(0);
$opdir=@ini_get("open_basedir");
if($opdir) {
$opa... | pdf |
WMI ——重写版
本文是以WMI的重写版,本来这份笔记会更长,原版的笔记以 Black Hat 2015的
Abusing Windows Management Instrumentation (WMI) to Build a Persistent, Asyncronous, and
Fileless Backdoor为主要学习资料,在笔记写到大概一万字的时候,Typora 中保存的内容部分丢失。
于是重新整理,有了这份,我认为精简版的WMI 笔记。
WMI 背景
WMI 是什么?Windows管理规范(WMI)是Microsoft对基于Web的业务管理标准(WBEM),公共信
息模型(CIM)和分布式管理任务组(DMTF)的... | pdf |
Rob Havelt - Director of Penetration Testing, Trustwave SpiderLabs
Wendel G. Henrique – Security Consultant, Trustwave SpiderLabs
Copyright Trustwave 2010
Confidential
BIO
SpiderLabs:~ Trustwave$ whois RHavelt
•
Director of Penetration Testing at Trustwave’s SpiderLabs.
•
Over 18 years in the security industry... | pdf |
411: A Framework for
Managing Security Alerts
Kai Zhong
@sixhundredns
Ken Lee
@kennysan
411: A Framework for
Managing Security Alerts
Kai Zhong
@sixhundredns
Ken Lee
@kennysan
OPEN SOURCE!
Who Are We?
KZER
Kai Zhong
Product Security Engineer @ Etsy
I wear many hats
Twitter: @sixhundredns
KLEE
Ken Lee
Senior Product S... | pdf |
@ripshy
+
@hackajar
Thursday
July
26th,
2012
¡ Ripshy
§ 90%
Badass
/
10%
Cuddly
§ Attending
CON
since
2002,
supporting
role
since
2004,
Vegas
2.0
Co-‐Founder
¡ Hackajar
§ 90%
Cuddly
/
10%
Badass
§ Attending
CON
since
2000,
... | pdf |
⾃动化通⽤DLL劫持 - 1
⾃动化通⽤DLL劫持
之前写过⼀篇
使⽤⽩加⿊的⽅式⽣成"冲锋⻢",使⽤到部分 dll 劫持的技术。但是它的场景是劫持后阻断正常⽩⽂件的运⾏,程序的控制权交到“⿊⽂
件”中。
这篇⽂章是对通⽤ DLL 劫持的研究,期望能制作⼀个通⽤的 DLL,劫持程序原有的 dll 但保留原 dll 的功能,同时执⾏⾃⼰的代码,这个 dll
最好能⾃动⽣成(不要⼿动编译),主要⽤于维权场景。
已有研究
Aheadlib
著名的⼯具 Aheadlib 能直接⽣成转发形式的 dll 劫持源码,通过 #pragma comment(linker,"/EXPORT:") 来指定导出表的转发。
转发模式⽣成的源码:
红队开发 -... | pdf |
1
Design of a blocking-resistant
anonymity system
Roger Dingledine, Nick Mathewson
The Tor Project
2
Outline
● Crash course on Tor
● Goals for blocking resistance
● Assumptions (threat model)
● What Tor offers now
● Current proxy solutions
● What we need to add to Tor
● All the other issues that come up
3
Tor: Big Pi... | pdf |
Introduction
Major Malfunction
Security professional by day
White Hat hacker since the '70s
DEFCON Goon since DC5
Co-founder of InterFACE internet pirate radio station
Introduction
Why Infra Red?
Ubiquitous - still used in modern applications
TV / Cable / Sat remotes
Master configuration / Tuning
Package selection
Cent... | pdf |
(U) I hunt TR-069 admins
Shahar Tal
T O P S E C R E T / / S I / / R E L T O D C 2 2
no ISPs were harmed during the
making of this presentation
corporate legal wouldn't let us
• Shahar Tal (@jifa)
• Father, husband, geek
• 10 years with IDF
obligatory whoami
Agenda
• Intro to TR-069
• Why you should care ... | pdf |
Caught you
-
reveal and exploit IPC logic
bugs inside Apple
Zhipeng Huo,,Yuebin Sun,,Chuanda Ding
of,
Tencent,Security,Xuanwu,Lab
Who are We?
• Zhipeng Huo (@R3dF09)
• Senior security researcher
• Member of EcoSec Team at Tencent Security Xuanwu Lab
• macOS, iOS and Windows platform security
• Speaker of Black Hat Eur... | pdf |
Crypto for Hackers
Eijah
v1.00
August 7th, 2015
“Shall we play a game?”
– Joshua/WOPR
Hello World
Free Party Tonight!
4
• www.demonsaw.com
• www.defconparties.com
Who am I?
5
• Founder
• Programmer
• Hacker
Last year at Defcon…
• Saving Cyberspace by Reinventing File Sharing
• We’re losing our right to privacy and free... | pdf |
Sniffing cable modems
Guy Martin <gmsoft@tuxicoman.be>
Defcon 16 - Aug 2008 – Las Vegas
Agenda
What is DOCSIS ?
– Use of DOCSIS
– General architecture
– Registration process
– Encryption on the link
Cool, how can I sniff it ?
– DVB-C card
– Packet-o-matic to the rescue
Agenda
Doable things
– Privacy
– Modem SNMP ... | pdf |
深入理解 Windows 字体解析引擎漏洞
wang yu
SyScan(+)360, 2012
议题简介
第一部分
议题简介
·关于作者 ( wangyu@360.cn )
·议题背景
2011 年 12 月微软月度安全更新修复了此
前曾被Duqu 恶意软件利用的 Win32K 内核漏洞。
同月,在中国更受关注的一个话题是网站后
台数据库的安全性问题。
本议题将聚焦于 Win32K 字体解析引擎的设
计与实现,以白盒的视角审视 Duqu 0-day 的利用细
节。
议题简介
·议题涵盖
- 字体解析引擎客户端接口 ( Font Scaler Client... | pdf |
the Constructocat by Jason Costello - https://github.com/jsncostello
gitDigger
Creating useful wordlists from GitHub
By: WiK & Mubix
We suck at “picturing” things, so in order
for this presentation to be successful you
must all strip down to your underwear
CENSORED
The Researcher – WiK
@jaimefilson
We weren't the ... | pdf |
SSRF bible. Cheatsheet
If you have any questions, please post them in the comments!
Revision 1.02
6 august 2014
Authors:
@ONsec_Lab
http://lab.onsec.ru [ENG]
@Wallarm research team
blog.wallarm.com
1
Table of contents
Table of contents
Basics
Typical attack steps
File Descriptors exploitation way
URL... | pdf |
我的CS笔记之- In-memory Evasion 1
0x00 前言
周末温习了一下2018年,CS的作者制作的In-memory Evasion的系列视频。这是视频以前也是看过的,
但是没有做笔记,现在很多细节都有点模糊了。学习一定要做笔记。
In-memory Evasion,主要有5个视频,作者传到youtube的不能开启自动英文识别字幕,于是我重新传
了一下https://www.youtube.com/watch?v=FeydRT3UTVE&list=PLI7tp5mNfPSbgSBc0VpCNh7t98vw
JO0jv,可以开启英文字幕,作为一个会点哑巴英语的人,这个字幕真的拯救了我。目前国内技术资料比
以前是丰富了... | pdf |
Comparison between two practical mix designs
Claudia D´ıaz
Len Sassaman
Evelyne Dewitte
Abstract
We evaluate the anonymity provided by two popular email mix im-
plementations, Mixmaster and Reliable, and compare their effectiveness
through the use of simulations which model the algorithms used by these
mixing applicatio... | pdf |
Chris&Li(lebury&
Senior&Penetra4on&Tester&with&Knowledge&Consul4ng&Group&
Chris.Li(lebury@KnowledgeCG.com&
&
I&like&building&stuff.&
About&me&
DDISCLAIMERD&
I&am:&
• Providing&ideas,&examples,&and&code&of&what’s&worked&for&me.&
• Open&to&ques4ons&aQerward&and&sugges4ons.&
&
I&am¬:&
• GeRng&paid&to&endorse&any&prod... | pdf |
Crypto: State of the Law
DEF CON 24
Nate Cardozo, Senior Staff Attorney, EFF
783A 8CC4 166D 1768 4E8E DAFD 2D76 4786 4AE6 3181
“End to end encryption is legal. Period.”
Jennifer Granick, Black Hat 2016
Questions?
“The Net interprets censorship as damage
and routes around it.”
John Gilmore, ~1993
The First Cry... | pdf |
Analyzing Bankbot
whoami
Malware Analyst at Hispasec.
■
■
■
@entdark_
What is Bankbot?
Origins
6
7
■
■
■
8
AV detections
9
1
0
1
1
1
2
Overlays
■
■
■
■
1
3
Android Toast
■
■
■
■
1
4
1
5
Cloak & Dagger
Client side
1
7
Infection workflow
1
8
Malicious websites are still a thing
1
9
Infection workflow
if (Build.VERSION... | pdf |
Stargate: pivoting through VNC to own
internal networks
By Yonathan Klijnsma & Dan Tentler
Stargate: pivoting through VNC to own internal networks
2
@ydklijnsma
Yonathan Klijnsma
Shodan professional, VNC voyeur,
watches attackers and contemplates
their motives.
@Viss
Dan Tentler
Dark overlord of Shodan, VNC voyeur,... | pdf |
Finding Xori
Malware Analysis Triage with Automated Disassembly
Amanda Rousseau
Rich Seymour
About Us
Amanda Rousseau
Rich Seymour
Sr. Malware Researcher,
Endgame, Inc.
@malwareunicorn
Sr. Data Scientist,
Endgame, Inc.
@rseymour
Quick Overview
The Current State of
Disassemblers
Functionality & Features
Brief overvie... | pdf |
Toho is the owner of all rights in and to the
trademark and service mark GODZILLA.
As such, we request that you remove the
objectionable imagery and reference
to GODZILLA from your website to
eliminate any likelihood of confusion and
posibility of an inaccurate affiliation with
Toho and GODZILLA
Please be advise... | pdf |
Go NULL yourself
:or How I Learned to Start Worrying
While Getting Fined for Other’s Auto
Infractions
Introduction
• whoami
•
I’m called droogie.
•
I’m a degenerate.
•
I hack things for IOActive.
Introduction
• Why this talk?
•
Discussions of old “famous” hacker tales
•
Fake stories, lulz
•
Victims of computer bugs
•... | pdf |
云环境自动化入侵溯源实战
徐越 阿里云安全工程师
WHOAMI
2015
2016
2019
• @cdxy_
• 安全工程师@阿里云
• 企业安全/入侵检测与响应
• 数据分析/机器学习爱好者
响应速度是企业安全能力的核心体现
是否误报?
漏洞?攻击路线?
黑客背景?目的?
影响哪些资产和账号?
泄露哪些数据?
是否存在内部违规操作?
...
告警
安全运营
看看怎么被入侵的
200G
日志
0
日志
看看怎么被入侵的
99%
误报
又来告警了
安全运营现状
安全运营流程中的技术问题
数据缺失
系统孤立
人工检索
[ 自动化入侵回溯 ]
多源异构数据的知识表达
采集
计算
交互
云原生的数据采集方案
满足90%以上事件调查
千万级... | pdf |
Module 2
Typical goals of malware and their
implementations
https://github.com/hasherezade/malware_training_vol1
Introduction
Malware: missions and tactics
Malware: missions and tactics
• First questions that we need to answer analyzing malware: WHAT?
• What is the main purpose (mission) of tha malware?
• What is the ... | pdf |
(U) I hunt TR-069 admins
Shahar Tal
TOP SECRET//SI//REL TO DC22
no ISPs were harmed during the
making of this presentation
corporate legal wouldn't let us
• Shahar Tal (@jifa)
• Father, husband, geek
• 10 years with IDF
obligatory whoami
Residential Gateway Security
• It sucks.
• Pedro Joaquin (Routerpwn), Jacob Holcom... | pdf |
Cloud Computing
A Weapon of Mass Destruction?
David M. N. Bryan - CISSP
• Technology Enthusiast
(Aka “Hacker” or
VideoMan)
• Security Consultant (Other
Company)
• dave@drstrangelove.net
• PGP Key on key servers
Michael Anderson - Newb
• Security Consultant
(NetSPI)
• michael.anderson@netspi.
com
• cpt.fury@gmail.co... | pdf |
Dynamic Cross-Site Request
Forgery
A Per-Request Approach to Session Riding
By
Nathan Hamiel and Shawn Moyer
July 24, 2009
Revision 1
Dynamic Cross-Site Request Forgery
http://www.hexsec.com
Abstract
Cross-Site Request Forgery (“CSRF”) is typically described as a “replay” or static typ... | pdf |
不修改注册表获取 windows 明文密码的若干姿势之 SSP
一. SSP 的作用
Security Support Providers 是一个提供约定回调函数的 dll,向系统注册了 SSP 后,系统在认证
过程中就会调用此 dll 中的某些函数,SSP 必须导出的函数如下:
SpLsaModeInitialize
SpInitialize
SpGetInfo
SpShutDown
SpAcceptCredentials
在这里我们只需要关心 SpAcceptCredentials 这个回调函数,正如名字描述的一
样,此函数在系统认证过程中会接收到用户输入的账密,我们只需要记录下来,就
可以拿到用户的明文账密,m... | pdf |
Like a Boss
Open source Java EE application server
Developed by JBoss, a division of Red Hat
Abstracts the infrastructure of Java-based
web applications
Very large and complex
“We have over the years had the understanding that JBoss
AS will be primarily used by Java EE developers on their
desktop to develo... | pdf |
Man-In-The-Disk
Slava Makkaveev
DEF CON 2018
Me
●
Slava Makkaveev
○
Security Researcher
○
Check Point Software Technologies Ltd.
○
PhD in Computer Science
○
Reverse engineering and vulnerability research
Android Application Security Basics
App’s Sandbox Model
Application
UID 10045
untrusted_app
Android Framework
Storag... | pdf |
CODE
REVIEW
GUIDE
RELEASE
Creative Commons (CC) Attribution
Free Version at: https://www.owasp.org
Project leaders: Larry Conklin and Gary Robinson
2.0
1
Foreword
Acknowledgements
1
3
6
8
5
Introduction
How To Use The Code Review Guide
2
Code Review Do’s And Dont’s
Code Review Checklist
Threat Modeling Examp... | pdf |
Agenda
•
Who we are
•
What this talk is about
•
Why?
•
Background
•
Timing as a Channel
•
Timing as a Vector
•
Privacy Implications -
XSRT?
•
Another acronym -
(D)XSRT!
•
Conclusion / Questions
Who we are..
•
SensePost
–
Formed in 2000
–
Written a few papers..
–
Spoken at a few conferences
–
Written a few books
–
Done ... | pdf |
⽤codeql分析grafana最新任意⽂件读取
⽣成数据库
最近学了⼀下codeql,刚好拿这个来练⼀下⼿。简单记录⼀下,有疑问的师
傅可以⼀起探讨。
先从lgtm把数据库下下来,发现洞已经被修。
https://lgtm.com/projects/g/grafana/grafana/ci/#ql
只能⾃⼰编译了
codeql database create /Users/safe6/codeql/database/gf --language="go"
--source-root=/Users/safe6/Desktop/grafana-8.2.6 --overwrite
编译好的库,有需要的师傅可以找我要。
开始分析
各位⼤佬... | pdf |
自动化攻击背景下的过去、现在与未来
@ringzero
2
关于我
• 网名:猪猪侠
• 8年信息安全从业经历
• 信息安全领域爱好者
• 安全测试
• 数据挖掘
• 微博:@ringzero
我的安全观:互联网的本质
3
互联网的本质就两个字:信息
信息只做一个用处就是:交换
我的安全观:互联网下信息安全的本质
4
互联网:
连接彼此,交换信息。
信息安全:
保护信息在交换(传递)过程
中的完整性、可用性、保密
性。
我的安全观:连接彼此 交换信息
与目标系统进行信息交换
可以发起交换的请求
耦合度高被攻击可能性越大
涟漪效应
信息传递的客体对象、社会信息背
后的属性,都和人有关
人们的愚蠢没有补丁可打
八大典型APT:越... | pdf |
IPv666
Address of the Beast
Chris Grayson
@_lavalamp
Marc Newlin
@marcnewlin
CHRIS
MARC
MY NAME IS
IT’S THE FUTURE BAYBEEEEEE
Where to From Here Cap’n?
● Background
● The Scanning Problem
● Honeypotting for PSLAAC
● Modeling for non-PSLAAC
● Being Less Dumb
● To The Cloud
● Results
● IPv666
●... | pdf |
消失的那几年
杨 蔚 301
白帽子的成长独白
2016.07.14
众安天下
关于我
01
90后,连续创业者,黑客理想主义者
02
乌云核心白帽子,大学肄业
03
原乌云合伙人,乌云众测平台负责人
04 北京众安天下科技有限公司创始人兼
CEO,安全自媒体平台出品人(301
在路上)
WeChat:2036234
Email:301@allsec.cn
杨 蔚 花名:301
众安天下
CONTENT
消失的那几年哪去了
这几年做到的事情
快速成长的秘笈
安全总结与建议
众安天下
1、消失的那几年哪去了
众安天下
消失的那几年哪去了
WHY?
高考失利,人生太顺,无法接受
WHAT?
网络工作室,把自己关在网络世界
里,但因经营不... | pdf |
Why does my security
camera scream like a
Banshee?
Signal analysis and RE of a proprietary
audio-data encoding protocol
About Me
Love me some
codes!
Move fast and break
things... then fix
them!
Recipe hacking with
delicious results!
Hacker Mindset
🤍 Food
Software Engineer
Opinionated
All opinions are my own
a... | pdf |
Wagging&the&Tail&–&&Covert&Passive&Surveillance&and&
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&how&to&make&their&life&difficult
Are&You&A&Target?
Three&Letter&Agencies&(TLA)
NSA
FBI
CIA
Heat&States
•The&Pickup&
•The&Follow&
•The&Housing
Stages&of&Surveillance
•Static&Observation&Post&
•Static&Covert&Camera&
•Mobile&Obse... | pdf |
Came Saw Conquered
网络空间中的IoT安全
ID:ppprince
From:中国科学院信息工程研究所
物联网信息安全北京市重点实验室
yanzhaoteng@iie.ac.cn
2016年9月2日星期五2时21分16
秒
Part. 01
引言
1
物联网时代的到来
2013年,物联网处于上升期
2014年,物联网取代大数据登上了成熟度曲线的最高点
2015年,物联网仍位于顶点
联网设备数:2015年49亿,2020年260亿(Gartner)
Emerging Technologies of 2015
物联网终端
电力/工业
轨道交通
家居生活
保密场所 ... | pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.