Kategorie
Exploiting nginx chunked overflow bug, the undisclosed attack vector (CVE-2013-2028)
In previous post, we analyzed and exploited stack based buffer overflow vulnerability in chunked encoding parsing of nginx-1.3.9 - 1.4.0. We mentioned that there was another attack vector which was more practical, more reliable. I talked about this attack vector at SECUINSIDE 2013 in July (btw, a great conference and ...
Kategorie: Hacking & Security
[Secuinside CTF 2013] movie talk
Challenge itself is very interesting, as we have typical use-after-free problem. It's running on Ubuntu 13.04 with NX + ASLR.
When we run challenge it gives us message as :
[code]
######################################
# #
# Welcome to the movie talk show #
# #
######################################
1. movie addition
2. movie deletion
3. my movie list
4. quit
:
[/code]
movie addition is very straight ...
Kategorie: Hacking & Security
[Secuinside CTF 2013] Reader Writeup
Description:
http://war.secuinside.com/files/reader
ip : 59.9.131.155
port : 8282 (SSH)
account : guest / guest
We have obtained a program designed for giving orders to criminals.
Our investigators haven't yet analyzed the file format this program reads.
Please help us analyze the file format this program uses, find a vulnerability, and take a shell.
From the description we can ...
Kategorie: Hacking & Security
[Secuinside CTF 2013] pwnme writeup
Challenge summary:
Binary : http://war.secuinside.com/files/pwnme
Source : http://war.secuinside.com/files/pwnme.c
===================================
OS : Ubuntu 13.04 with PIE+ASLR+NX
md5 of libc-2.17.so : 45be45152ad28841ddabc5c875f8e6e4
IP : 54.214.248.68
PORT : 8181,8282,8383
This is the only exploit challenge comes with source. The bug is simple: buffer overflow with only 16-bytes at pwnme.c:67, just enough to control EIP. The goal is to bypass PIE+ASLR+NX. We ...
Kategorie: Hacking & Security
[Secuinside CTF 2013]Trace Him Writeup
Description:
IP : 59.9.131.155
port : 18562 (SSH)
account : control / control porsche
binary : http://war.secuinside.com/files/firmware
data : http://war.secuinside.com/files/car.bin
(To prevent meaningless waste of time on certain analysis, car.bin is open to public.)
hint :
root@ubuntu:~# uname -a
Linux ubuntu 3.8.0-19-generic #29-Ubuntu SMP Wed Apr 17 18:19:42 UTC 2013 i686 i686 i686 GNU/Linux
The evil group is running ...
Kategorie: Hacking & Security
Analysis of nginx 1.3.9/1.4.0 stack buffer overflow and x64 exploitation (CVE-2013-2028)
A few days after the release of nginx advisory (CVE-2013-2028), we managed to successfully exploit the vulnerability with a full control over the program flow. However, in order to make it more reliable and useful in real world environment, we still explored several program paths and found some other ...
Kategorie: Hacking & Security
CMarkup Use After Free Vulnerability – CVE-2012-4782
Latest M$ tuesday patch kill one of my 0day in Microsoft Internet Explorer 9/10. So I decided release Proof Of Concept code and writeup some analyze about this bug. Hope it helpful.
Here is the PoC:
[sourcecode language="html"]
...
Kategorie: Hacking & Security
Snatching The H@t
Nhận lời mời từ IDG, VNSecurity đồng ý đứng ra phối hợp tổ chức cuộc thi "Snatching the h@t" như một sự kiện trong khuôn khổ hội thảo CSO Asean năm 2012 với mong muốn giới thiệu và phát triển CTF như một hình thức học tập và thể hiện ...
Kategorie: Hacking & Security
[writeup] Hacklu 2012 – Challenge #12 – Donn Beach – (500)
The famous zombie researcher “Donn Beach” almost created an immunization
against the dipsomanie virus. This severe disease leads to the inability to
defend against Zombies, later causes a complete loss of memory and finally
turns you into one of them. Inexplicably Donn forgot where he put the
license key for his centrifuge. Provide him ...
Kategorie: Hacking & Security
[writeup] Hacklu 2012 – Challenge #6 – BrainGathering – (500)
I did not solve this during CTF and my mistake is not using IDA to decompile since it has some obfuscate.
After CTF end, i use gdb to dump running process to binary file and
analyze it again, try to finish it.
gdb --pid [PID]
gdb>info proc
process 4660
gdb>shell cat /proc/4660/maps
08048000-0804a000 rwxp 00000000 08:03 7213513
gdb>dump ...
Kategorie: Hacking & Security
[writeup] Hacklu 2012 – Challenge #19 – Zombie Reminder – (200)
19 - Zombie Reminder
Zombies love brains. But zombies forget, so they have a tool where they can enter the location of brains they found. In a heroic mission someone managed to obtain both the source code and the information that a critical file can be found at '/var/www/flag'.
Your mission ...
Kategorie: Hacking & Security
Tor – Xác định các exit relay độc hại
1. Mở đầu
Bài viết này là phần mô tả sơ lược và bình luận bài báo "Spoiled Onions: Exposing Malicious Tor Exit Relays"[1].
Tor exit relay là nút cuối dùng trong hành trình vận chuyển của các gói tin trọng mạng Tor, gói tin từ đây sẽ đi đến địa chỉ ...
Kategorie: Hacking & Security
[writeup] Hacklu 2012 – Challenge #13 – The Sandbox Terminal
Solved by w00d @ clgt
Thanks g4mm4 for giving many suggestions and draft the first version of the exploit
13 - The Sandboxed Terminal (400)
Since the zombie apocalypse started people did not stop to ask themselves how the whole thing began. An abandoned military base may lead to answers but after infiltrating ...
Kategorie: Hacking & Security
Lấy lời nhạc nhaccuatui.com
Nhaccuatui vừa nâng cấp trình chơi nhạc trên web của mình có thể hiển thị lời nhạc theo thời gian khá tốt. Bài viết này sẽ trình bày các bước để lấy lời nhạc đó và cung cấp một công cụ để thực hiện trong 1 cú enter ;) (*).
Lấy ...
Kategorie: Hacking & Security
[writeup] Hacklu 2012 – Challenge #10 (500)
10 - zlotpy
Gambling time. Play against the Internet Zlot Machine at ctf.fluxfingers.net tcp/2053 This challenge has two stages.
1) Medium: Investigate the contents of a saved game.
2) Hard: Get 8 (EIGHT) bonus points. Good luck! Hint: We have some sourcecode for you! https://ctf.fluxfingers.net/challenges/zlot.py
At the first sight, we thought this challenge was ...
Kategorie: Hacking & Security
A Model for Licensing IT Security
Category: Legal Issues
Paper Added: August 6, 2013
Kategorie: Hacking & Security
Discovering Security Events of Interest Using Splunk
Category: Logging Technology and Techniques
Paper Added: July 17, 2013
Kategorie: Hacking & Security
Practical Cyber Security Training Techniques for New IT Support Employees
Category: Best Practices
Paper Added: July 19, 2013
Kategorie: Hacking & Security
Detecting Security Incidents Using Windows Workstation Event Logs
Category: Logging Technology and Techniques
Paper Added: July 9, 2013
Kategorie: Hacking & Security
Security Best Practices for IT Project Managers
Category: Best Practices
Paper Added: June 24, 2013
Kategorie: Hacking & Security
- « první
- ‹ předchozí
- …
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- následující ›
- poslední »