Home
glasses96
Cancel

CSS Injection

Dreamhack ๊ฐ•์˜๋ฅผ ํ†ตํ•ด CSS Injection์ด ๋ฌด์—‡์ธ์ง€ ์•Œ์•„๋ด…์‹œ๋‹ค. CSS Injection CSS Injection์€ XSS์™€ ๋น„์Šทํ•˜๊ฒŒ ์›น ํŽ˜์ด์ง€ ๋กœ๋”ฉ ์‹œ ์•…์˜์ ์ธ ๋ฌธ์ž์—ด์„ ์‚ฝ์ž…ํ•˜์—ฌ ์•…์˜์ ์ธ ๋™์ž‘์„ ์ด๋„๋Š” ๊ณต๊ฒฉ์ž…๋‹ˆ๋‹ค. ๊ณต๊ฒฉ์ž๊ฐ€ ์ž„์˜ CSS ์†์„ฑ์„ ์‚ฝ์ž…ํ•ด ์›น ํŽ˜์ด์ง€ UI๋ฅผ ๋ณ€์กฐ ํ•˜๊ฑฐ๋‚˜ CSS ์†์„ฑ์˜ ๋‹ค์–‘ํ•œ ๊ธฐ๋Šฅ์„ ํ†ตํ•ด ์›น ํŽ˜์ด์ง€...

php filter chain RCE

์›Œ๊ฒŒ์ž„ ๋ฌธ์ œ๋ฅผ ํ’€๋‹ค๊ฐ€ ๋ฐœ๊ฒฌํ•œ PHP Filter chain ๊ณต๊ฒฉ์œผ๋กœ RCE๋ฅผ ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์•Œ์•„๋ด…์‹œ๋‹ค. What is php filter? php://filter is a kind of meta-wrapper designed to permit the application of filters to a stream at the time of o...

XSS with Fileupload Name

ํŒŒ์ผ ์—…๋กœ๋“œ ํ›„ ๋‹ค์šด๋กœ๋“œ ๋ฐ›์„ ๋•Œ <a>๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ javascript๋ฅผ ํ†ตํ•ด ํŒŒ์ผ ์ด๋ฆ„๋ช…์œผ๋กœ ๋‹ค์šด๋กœ๋“œ ๋ฐ›์„ ์‹œ URL Encoding์„ ํ•˜์—ฌ XSS ์ทจ์•ฝ์ ์ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. Source Code ๋จผ์ € flask ๊ธฐ๋ฐ˜์œผ๋กœ ๋งŒ๋“ค์–ด์ง„ ์†Œ์Šค ์ฝ”๋“œ๋ฅผ ์•Œ์•„ ๋ด…์‹œ๋‹ค. upload ๊ธฐ๋Šฅ๊ณผ download ๊ธฐ๋Šฅ์ด ์กด์žฌํ•ฉ๋‹ˆ๋‹ค. fro...

Cookie Security

๋“œ๋ฆผํ•ต ๊ฐ•์˜๋ฅผ ํ†ตํ•ด Cookie์˜ ๋ณด์•ˆ์„ค์ •์„ ์•Œ์•„๋ด…์‹œ๋‹ค. Cookie Domain/Path ์•„๋ž˜์™€ ๊ฐ™์ด Cookie๊ฐ€ ์„ค์ •๋˜์—ˆ์„ ๋•Œ ์–ด๋–ป๊ฒŒ ๋˜๋Š”์ง€ ์•Œ์•„๋ด…์‹œ๋‹ค. Set-Cookie: <cookie-name>=<cookie-value>; Domain=<domain-value>; Path=<cookie-...

Unicode Lower Case & Decomposition

์›Œ๊ฒŒ์ž„ ๋ฌธ์ œ๋ฅผ ํ’€๋‹ค๊ฐ€ ๋ฌธ์ž์—ด์„ ๊ฒ€์ฆ ๋กœ์ง ์šฐํšŒ์™€ ๊ด€๋ จํ•œ ์žฌ๋ฏธ์žˆ๋Š” ํŠธ๋ฆญ์ด ์žˆ์–ด ๊ธ€์„ ๋‚จ๊น๋‹ˆ๋‹ค. What is Unicode ์œ ๋‹ˆ์ฝ”๋“œ(Unicode)๋Š” ์ „ ์„ธ๊ณ„์˜ ๋ชจ๋“  ๋ฌธ์ž๋ฅผ ์ปดํ“จํ„ฐ์—์„œ ์ผ๊ด€๋˜๊ฒŒ ํ‘œํ˜„ํ•˜๊ณ  ๋‹ค๋ฃฐ ์ˆ˜ ์žˆ๋„๋ก ์„ค๊ณ„๋œ __๊ตญ์ œ ํ‘œ์ค€ ๋ฌธ์ž ์ธ์ฝ”๋”ฉ ์‹œ์Šคํ…œ__์ž…๋‹ˆ๋‹ค. Unicode์˜ ์ฃผ์š” ํŠน์ง• ๋ฒ”์œ„ : 0~0x10FFFF ๊นŒ์ง€์˜ 1...

CRLF Injection & HTTP Response Splitting

์ตœ๊ทผ CTF ๋ฌธ์ œ๋ฅผ ํ’€๋‹ค๊ฐ€ CRLF Injection์„ ํ†ตํ•ด HTTP Response Splitting์œผ๋กœ flag๋ฅผ ์ฐพ๋Š” ๋ฌธ์ œ๊ฐ€ ์žˆ์—ˆ์Šต๋‹ˆ๋‹ค. ๊ฐœ๋… ์ดํ•ด๊ฐ€ ๋ถ€์กฑํ•œ๊ฑฐ ๊ฐ™์•„ ๊ธ€๋กœ ์ž‘์„ฑํ•˜๋ ค๊ณ  ํ•ฉ๋‹ˆ๋‹ค. CRLF Injection CRLF Injection์€ Carriage Return๊ณผ Line Feed๋ฅผ Inject ํ•˜๋Š” ๊ณต๊ฒฉ์ž…๋‹ˆ๋‹ค. Carr...

ICMP Tunneling by Python with Scapy v2

ICMP ํ„ฐ๋„๋ง ์„œ๋ฒ„์—์„œ ์ž๋™ํ™”๋กœ ๋ฐ›๋Š” ๋ฐฉ๋ฒ•์œผ๋กœ ์—…๋ฐ์ดํŠธ๋ฅผ ์ง„ํ–‰ํ–ˆ์Šต๋‹ˆ๋‹ค. ์ด์ „์˜ ๋‚ด์šฉ์€ ICMP Tunneling 1ํŽธ์„ ์ฐธ๊ณ  ๋ถ€ํƒ๋“œ๋ฆฝ๋‹ˆ๋‹ค. ๋ชฉ์  ๋‚ด๋ถ€๋ง์—์„œ ๋…ผ๋ฆฌ์  ๋ง๋ถ„๋ฆฌ๊ฐ€ ๋˜์–ด์žˆ์–ด๋„ ๋‘ HOST๊ฐ„ ping์ด ๊ฐ€๋Šฅํ•  ๋•Œ ICMP Tunneling์œผ๋กœ ๋ฐ์ดํ„ฐ ์ „์†ก์„ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. Send HOST์™€ Recieve HOST์—์„œ ํŒŒ์ด์ฌ ...

URL Check Automation

์—…๋ฌด๋ฅผ ํ•˜๋ฉด์„œ ์ž์‚ฐ๋งˆ๋‹ค ์ ‘๊ทผ ๋˜๋Š”์ง€ ํ™•์ธ์„ ํ•˜๊ธฐ ์œ„ํ•œ ์ž‘์—…์„ ์žˆ์–ด ์ด๋ฅผ ์ž๋™ํ™” ํ•˜๋Š” ์ฝ”๋“œ๋ฅผ ๋งŒ๋“ค์—ˆ์Šต๋‹ˆ๋‹ค. ๊ตฌ์กฐ ๊ทธ๋ฆผ์œผ๋กœ ๊ทธ๋ ค๋ณธ ๋„์‹ํ™”์ž…๋‹ˆ๋‹ค. ์—‘์…€ ํŒŒ์ผ์—์„œ URL๊ณผ URL ์„œ๋น„์Šค ์ด๋ฆ„์„ ์ฝ์–ด์˜ต๋‹ˆ๋‹ค. ์ฝ์–ด์˜จ ๋ฐ์ดํ„ฐ๋ฅผ URL ์„œ๋น„์Šค๋ฅผ ๋”•์…”๋„ˆ๋ฆฌ์˜ ํ‚ค, URL์„ ๋”•์…”๋„ˆ๋ฆฌ์˜ ๊ฐ’์œผ๋กœ ์ €์žฅํ•ฉ๋‹ˆ๋‹ค. URL Request & Reply...

๊ธฐ๋“œ๋ผ Ghidra ์‹ค์ „ ๊ฐ€์ด๋“œ

๋ฆฌ๋ฒ„์Šค ์—”์ง€๋‹ˆ์–ด๋ง ๊ธฐ๋“œ๋ผ ์‹ค์ „๊ฐ€์ด๋“œ Chapter1 ๋ฆฌ๋ฒ„์Šค ์—”์ง€๋‹ˆ์–ด๋ง ์ž…๋ฌธ์„ ์ •๋ฆฌํ•ด๋ด…์‹œ๋‹ค. ๋””์Šค์–ด์…ˆ๋ธ”๊ณผ ๋””์ปดํŒŒ์ผ ๋””์Šค์–ด์…ˆ๋ธ” : ํ—ฅ์Šค์ฝ”๋“œ ์ƒํƒœ์—์„œ ์–ด์…ˆ๋ธ”๋ฆฌ ์–ธ์–ด(์ €์ˆ˜์ค€ ์–ธ์–ด) ๋กœ ๋ณ€ํ™˜ ํ•˜๋Š” ๊ฒƒ ๋””์ปดํŒŒ์ผ : ํ—ฅ์Šค์ฝ”๋“œ ์ƒํƒœ์—์„œ ๊ณ ์ˆ˜์ค€ ์–ธ์–ด๋กœ ๋ณ€ํ™˜ ํ•˜๋Š” ๊ฒƒ ํ”„๋กœ๊ทธ๋žจ ์‹คํ–‰ํŒŒ์ผ๊ณผ ํ•˜๋“œ์›จ์–ด CPU : ์ œ์–ด๋ถ€, ์—ฐ์‚ฐ๋ถ€, ๋ ˆ์ง€์Šคํ„ฐ๋กœ ๊ตฌ์„ฑ๋จ ์ œ์–ด...

Requestbin Development

์—…๋ฌด๋ฅผ ์ง„ํ–‰ํ•˜๋ฉด์„œ Data ํƒˆ์ทจ๊ฐ€ ๊ฐ€๋Šฅํ•œ ๊ฒฝ์šฐ ๊ณต๊ฒฉ์ž์˜ ์„œ๋ฒ„๋กœ ๊ฐ€์ ธ์˜ฌ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์•„์ง ๋ถ€์กฑํ•˜๊ณ  ๋‹ค๋ฅธ ์ข‹์€ ๋„๊ตฌ๋“ค๋„ ๋งŽ์ง€๋งŒ ํ•˜๋‚˜์”ฉ ํ•ด๋ณด๋Š”๊ฒŒ ์ข‹์ง€์•Š๋‚˜๋ผ๋Š” ์ƒ๊ฐ์— ๊ฐœ๋ฐœ์„ ํ•ด๋ณด์•˜์Šต๋‹ˆ๋‹ค. requestbin? requestbin ์ด๋ž€ client๊ฐ€ ์š”์ฒญํ•˜๋Š” ์ •๋ณด๋ฅผ ๋ฐ›์•„์„œ ํ™•์ธํ•  ์ˆ˜ ์žˆ๋Š” ์„œ๋น„์Šค์ž…๋‹ˆ๋‹ค. ์—ฌ๋Ÿฌ๊ฐ€์ง€ ๊ตฌํ˜„๋˜์–ด ์žˆ๋Š” ๊ธฐ์ˆ ๋“ค์ด ๋งŽ์ง€๋งŒ ์ €๋Š”...

SQL Injection Sleep() is Danger..

Sleep() ํ•จ์ˆ˜๋ฅผ ์ด์šฉํ•˜์—ฌ SQLi ๊ณต๊ฒฉ์„ ์ˆ˜ํ–‰ํ•  ๋•Œ ์กฐ์‹ฌํ•ด์•ผ ํ•˜๋Š” ๋ถ€๋ถ„์„ ์•Œ์•„๋ด…์‹œ๋‹ค. Time Based SQL Injection SLEEP ๋ชจ์˜ํ•ดํ‚น ์—…๋ฌด๋ฅผ ์ˆ˜ํ–‰ํ•  ๋•Œ Time Based SQL Injection์ด ๊ฐ€๋Šฅํ•œ ๊ฒฝ์šฐ sleep() ํ•จ์ˆ˜๋ฅผ ์ด์šฉํ•˜์—ฌ ์‘๋‹ต ๊ฐ„์˜ ์ฐจ์ด๋ฅผ ์ด์šฉํ•˜์—ฌ DB๋ฅผ ๋ฝ‘์•„์˜ฌ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ order b...

Hack The Box - Waiting

Hack The Box mobile ๋ฌธ์ œ์ธ Waiting ๋ฌธ์ œ๋ฅผ ํ’€์–ด๋ด…์‹œ๋‹ค. ์š”์ฆ˜ ๋ชจ๋ฐ”์ผ์„ ๋„ํ†ต ์•ˆํ•ด์„œ ๋‹ค๊นŒ๋จน์–ด์„œโ€ฆ ํฐ์ผ ๊ฐœ์š” ์ œ์ผ ๋จผ์ € Waiting ์•ฑ ์‹คํ–‰ ์‹œ ์•„๋ž˜์™€ ๊ฐ™์Šต๋‹ˆ๋‹ค. ๊ทธ๋ฆฌ๊ณ  ๋ฐ”๋กœ ์•ฑ์ด ์ข…๋ฃŒ๋ฉ๋‹ˆ๋‹ค. ์ด ์•ฑ์€ ๋ชจ๋“  ์ข…๋ฅ˜์˜ ์‚ฌ์šฉ์ž๋ฅผ ์œ„ํ•œ ํ† ํฐ ๋˜๋Š” ๋น„๋ฐ€์„ ์ƒ์„ฑํ•˜๋Š” ๋ฐ ์œ ์šฉํ•ฉ๋‹ˆ๋‹ค. ์—…๋ฐ์ดํŠธ: ๋‹ค๋ฅธ ์•ฑ์˜ ์š”์ฒญ ํ† ํฐ์— ๋Œ€ํ•œ ์ผ...

regex

์›ํ•˜๋Š” ํŒจํ„ด์„ ์ฐพ์„ ๋•Œ regex(์ •๊ทœํ‘œํ˜„์‹)์„ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค. python์—์„œ re ๋ชจ๋“ˆ์—์„œ ์ •๊ทœ์‹์„ ์‚ฌ์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์•Œ์•„๋ด…์‹œ๋‹ค. ๋ฉ”ํƒ€ ๋ฌธ์ž ์ •๊ทœํ‘œํ˜„์‹์—์„œ ์‚ฌ์šฉ๋˜๋Š” ๋ฉ”ํƒ€ ๋ฌธ์ž๋“ค์˜ ์˜๋ฏธ๋ฅผ ์•Œ์•„๋ด…์‹œ๋‹ค. re ๋ชจ๋“ˆ reํŒŒ์ด์ฌ์—์„œ re๋ชจ๋“ˆ๋กœ ์ •๊ทœ์‹์„ ์‚ฌ์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์•Œ๋ ค์ค๋‹ˆ๋‹ค. ์ •๊ทœํ‘œํ˜„์‹ ์ปดํŒŒ์ผ ํŒŒ์ด์ฌ์—์„œ ์ •๊ทœํ‘œํ˜„์‹์„ ์‚ฌ์šฉํ•˜๊ธฐ ์œ„ํ•ด ...

Hack The Box - LoveTok

Hack The Box LoveTok ๋ฌธ์ œ๋ฅผ ํ’€์–ด๋ด…์‹œ๋‹ค. Main Page ๋ฉ”์ธ ํŽ˜์ด์ง€๋Š” ์•„๋ž˜์™€ ๊ฐ™์Šต๋‹ˆ๋‹ค. format์„ ๋ณ€์ˆ˜๋ฅผ ์ž…๋ ฅ๋ฐ›์•„ ๋‚ ์งœ ๋น„์Šทํ•˜๊ฒŒ ์ถœ๋ ฅํ•ด์ฃผ๋Š” ๊ธฐ๋Šฅ์ด ์กด์žฌํ•ฉ๋‹ˆ๋‹ค. Vuln Point WEB ROOT ์ตœ์ƒ์˜ index.php๋ฅผ ๋ณด๋ฉด ๋‹ค์Œ๊ณผ ๊ฐ™์Šต๋‹ˆ๋‹ค. <?php $router = new Router();...

Hack The Box - Templated

Hack The Box Templated ๋ฌธ์ œ๋ฅผ ํ’€์–ด๋ด…์‹œ๋‹ค. Description Can you exploit this simple mistake? Solve ๋ฌธ์ œ ์›น ์‚ฌ์ดํŠธ์— ์ ‘๊ทผํ•˜๋ฉด ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค. Flask๋กœ ๋งŒ๋“ค์–ด์ง„ ์›น ํŽ˜์ด์ง€๋ฅผ ํ™•์ธํ•  ์ˆ˜ ์žˆ๋‹ค. URL์— test ์ž…๋ ฅ์‹œ test๋ผ๋Š” ๋ฌธ๊ตฌ๊ฐ€ ์ถœ๋ ฅ๋œ๋‹ค. SSTI ...

BabyEncryption

Hack The Box BabyEncryption ๋ฌธ์ œ๋ฅผ ํ’€์–ด ๋ด…์‹œ๋‹ค. CHALLENGE DESCRIPTION You are after an organised crime group which is responsible for the illegal weapon market in your country. As a secret agent, yo...

loose comparison

์ตœ๊ทผ์— โ€œ==โ€ ์œผ๋กœ ๋А์Šจํ•œ ๋น„๊ต๋ฅผ ํ•˜๋Š” ์›Œ๊ฒŒ์ž„ ๋ฌธ์ œ๋ฅผ ํ’€์—ˆ์Šต๋‹ˆ๋‹ค. ์ด์— ๋А์Šจํ•œ ๋น„๊ต๊ฐ€ ๋ฌด์—‡์ธ์ง€ ์ž์„ธํ•˜๊ฒŒ ์•Œ์•„๋ด…์‹œ๋‹ค. loose comparison(๋А์Šจํ•œ ๋น„๊ต) ๋А์Šจํ•œ ๋น„๊ต๋ž€ ๋ง ๊ทธ๋Œ€๋กœ ๋А์Šจํ•œ ๋น„๊ต์ž…๋‹ˆ๋‹ค. ์ฝ”๋“œ์—์„œ == ํ˜น์€ === ์œผ๋กœ ๋น„๊ตํ•˜๋Š” ๊ฒƒ์„ ๋ณผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ==์€ ๋А์Šจํ•œ ๋น„๊ต, ===์€ ์—„๊ฒฉํ•œ ๋น„๊ต๋ผ๊ณ  ํ•ฉ๋‹ˆ๋‹ค. ์™œ ์—„๊ฒฉํ•˜๊ณ ...

Spoofing MAC

์˜ค๋Š˜ MAC Address๋ฅผ ๊ฐ„๋‹จํ•˜๊ฒŒ ๋ณ€๊ฒฝ ํ•ด์ค„์ˆ˜ ์žˆ๋Š” ๋„๊ตฌ๋ฅผ ์•Œ๊ฒŒ๋˜์—ˆ๋‹ค. ํ•ญ์ƒ ์ž˜ ์•Œ๋ ค์ฃผ์‹œ๋Š” ๋ถ„๋“ค์—๊ฒŒ ๊ฐ์‚ฌํ•ฉ๋‹ˆ๋‹ค๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘๐Ÿ‘ Spoofing MAC WIKI์— ๋”ฐ๋ฅด๋ฉด MAC Address๋ฅผ ๋ณ€๊ฒฝํ•˜๋Š” ๊ธฐ์ˆ ์ด๋ผ๊ณ  ํ•ฉ๋‹ˆ๋‹ค. ์ผ๋ฐ˜์ ์œผ๋กœ NIC(Network Interface Controller)์—์„œ ํ•˜๋“œ์ฝ”๋”ฉ ๋œ MAC ์ฃผ์†Œ๋Š” ๋ณ€๊ฒฝ์ด ๋ถˆ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค...

CVE-2022-25765 Vulnerability

Hack the Box Precious ๋ฌธ์ œ๋ฅผ ํ’€๋ฉด์„œ ๋ฐœ๊ฒฌ๋œ ์ทจ์•ฝ์  CVE-2022-25765 ๋ถ„์„์„ ํ•ด๋ด…์‹œ๋‹ค! ruby ์–ธ์–ด๋ฅผ ์ž˜๋ชฐ๋ผ ์ •ํ™•ํ•˜์ง€ ์•Š์„์ˆ˜ ์žˆ์Œ CVE-2022-25765 CVE mitre์— ๋”ฐ๋ฅด๋ฉด ํ•ด๋‹น ์ทจ์•ฝ์ ์€ ์•„๋ž˜์™€ ๊ฐ™์Šต๋‹ˆ๋‹ค. The package pdfkit from 0.0.0 are vulnerable to ...

Privilige escalation with Path Injection

์ผ๋ฐ˜์ ์œผ๋กœ ์‰˜์„ ๋”ฐ๊ฒŒ ๋˜๋ฉด ROOT ๊ถŒํ•œ์ด ์•„๋‹ˆ๋‹ค. ๊ทธ๋ž˜์„œ ์ด๋Ÿฐ์ €๋Ÿฐ ์ œ์•ฝ์ด ๋งŽ๊ธฐ ๋•Œ๋ฌธ์— ROOT ๊ถŒํ•œ์ด๋‚˜ ์ƒ์œ„ ๊ถŒํ•œ์ด ํ•„์š”ํ•œ ๊ฒฝ์šฐ๊ฐ€ ์žˆ๋‹ค. ๊ถŒํ•œ์ƒ์Šน ์ทจ์•ฝ์  ์ค‘ ํ•˜๋‚˜์ธ Path Injection์„ ์•Œ์•„๋ณด์ž Privilige escalation? ๊ถŒํ•œ ์ƒ์Šน(Privilige escalation)์€ ์šด์˜ ์ฒด์ œ๋‚˜ ์†Œํ”„ํŠธ์›จ์–ด ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๋ฒ„๊ทธ, ...

Hack The Box - Precious

Hack the Box Precious ๋ฌธ์ œ๋ฅผ ํ’€์–ด ๋ด…์‹œ๋‹ค. Port Scanning nmap ์Šค์บ๋‹ ๊ฒฐ๊ณผ๋ฅผ ์•„๋ž˜์™€ ๊ฐ™์Šต๋‹ˆ๋‹ค. ssh ์„œ๋น„์Šค์™€ http ์„œ๋น„์Šค๊ฐ€ ์—ด๋ ค์žˆ์Šต๋‹ˆ๋‹ค. ssh์˜ ๊ณ„์ • ์ •๋ณด๋Š” ๋ชจ๋ฅด๊ธฐ ๋•Œ๋ฌธ์— http ์„œ๋น„์Šค์— ์ ‘์†ํ•ด ๋ณผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. hosts ํŒŒ์ผ์— precious.htb๋ฅผ ๋“ฑ๋กํ•˜๋ฉด ์›น ํŽ˜์ด์ง€์— ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ...

Reversing Dreamhack Helloworld

๋“œ๋ฆผํ•ต ๊ฐ•์˜๋ฅผ ํ†ตํ•ด Helloworld.exe๋ฅผ ๋ถ„์„์„ ํ•ด๋ด…์‹œ๋‹ค. Helloworld Code ๊ฐ„๋‹จํ•œ ์˜ˆ์ œ์ธ HelloWorld.exe๋ฅผ ๋ถ„์„ํ•ด๋ณด์ž ์†Œ์Šค ์ฝ”๋“œ๋Š” 1์ดˆ๋ฅผ ๋Œ€๊ธฐํ•˜๊ณ  Hello, world!๋ฅผ ์ถœ๋ ฅํ•˜๋Š” ํ”„๋กœ๊ทธ๋žจ์ž…๋‹ˆ๋‹ค. #include <Windows.h> #include <stdio.h> char* st...

Hack The Box - Photobomb vulnerability analysis

Photobomb ๋ฌธ์ œ๋ฅผ ํ’€๋ฉด์„œ ๋‚˜์™”๋˜ ์ทจ์•ฝ์ ์„ ๋ถ„์„์„ ํ•ด๋ด…์‹œ๋‹ค. Flag๋ฅผ ์ฐพ๋Š” ๊ฒƒ๋„ ์ค‘์š”ํ•˜์ง€๋งŒ ์™œ ์ทจ์•ฝ์ ์ด ํ„ฐ์ง€๋Š”์ง€ ์›์ธ์„ ์•„๋Š” ๊ฒƒ์ด ๊ต‰์žฅํžˆ ์ค‘์š”ํ•˜๋‹ค๊ณ  ์ƒ๊ฐํ•ฉ๋‹ˆ๋‹ค.โ—๏ธโ—๏ธโ—๏ธ. Basic Authentication ์ฒซ๋ฒˆ์งธ๋กœ ๋ฐœ๊ฒฌ๋œ ์ทจ์•ฝ์ ์€ Baisc Authentication ์ •๋ณด๊ฐ€ ๋…ธ์ถœ๋˜์—ˆ๋˜ ์ทจ์•ฝ์ ์ž…๋‹ˆ๋‹ค. What is Basic...

Hack The Box - Photobomb

Hack the Box์˜ Photobomb์„ ํ’€์–ด๋ด…์‹œ๋‹ค. Port Scanning ์ œ์ผ ๋จผ์ € nmap์„ ์ด์šฉํ•˜์—ฌ ํฌํŠธ์Šค์บ”์„ ๋Œ๋ ธ์„ ๋•Œ ๋‚˜์˜ค๋Š” ๊ฒฐ๊ณผ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์Šต๋‹ˆ๋‹ค. ์•„๋ž˜์˜ ํฌํŠธ๊ฐ€ ์—ด๋ ค์žˆ์œผ๋ฉฐ ssh ์—ฐ๊ฒฐ์€ ID์™€ ํŒจ์Šค์›Œ๋“œ๋ฅผ ๋ชจ๋ฅด๋‹ˆ http ๋ถ€ํ„ฐ ์ ‘๊ทผ์„ ์‹œ๋„ํ–ˆ๋‹ค. ssh http HTTP Service ๊ทธ๋ƒฅ ์ ‘๊ทผํ•˜๋ฉด ...

Hack The Box - Fawn

Hack the box ๊ธฐ์ดˆ์ค‘ Fawn์„ ํ’€์–ด๋ด…์‹œ๋‹ค Fawn Quiz ํ˜•์‹์˜ ๋ฌธ์ œ๋ฅผ ๋ณด๋ฉด FTP ๊ด€๋ จ ๋ฌธ์ œ๋“ค์ด๋‹ค. Nmap์„ ํ†ตํ•ด FTP ์„œ๋น„์Šค๊ฐ€ ์—ด๋ ค์žˆ๋Š” ๊ฒƒ์„ ํŒŒ์•…ํ•˜๊ณ  FTP ๋ฒ„์ „์ด๋ผ๋˜์ง€ ์ต๋ช…(Anonymous)FTP๋กœ ์ ‘๊ทผํ•˜์—ฌ Flag๋ฅผ ์ฐพ๋„๋ก ๋˜์–ด ์žˆ๋‹ค. Anonymous๋กœ FTP๋ฅผ ์ ‘๊ทผํ•˜์—ฌ flag.txt๋ฅผ ๋‹ค์šด๋กœ๋“œ ๋ฐ›์„ ์ˆ˜ ์žˆ๋‹ค...

How to Extract Dynamic DEX Loading

์ตœ๊ทผ ๋ชจ๋ฐ”์ผ ์ง„๋‹จ ์ค‘ ๋ฃจํŒ…ํƒ์ง€๋ฅผ ํ•˜๊ณ  ์žˆ์ง€๋งŒ ์–ด๋””์„œ ํ˜ธ์ถœํ•˜๋Š”์ง€๋ฅผ ์ฐพ์„ ์ˆ˜๊ฐ€ ์—†์—ˆ๋Š”๋ฐ ์–ด์ฐŒ์ €์ฐŒ ํ•˜๋‹ค๊ฐ€ Dynamic Dex Loading์ด ์ ์šฉ๋œ ๊ฒƒ์„ ๋ฐœ๊ฒฌ ํ•˜์˜€์Šต๋‹ˆ๋‹ค. Dynamic Dex Loading์„ ํ•˜๋Š” App์—์„œ DEX๋ฅผ ์ถ”์ถœํ•˜๋Š” ๋ฐฉ๋ฒ•๋“ค์— ๋Œ€ํ•ด์„œ ์•Œ์•„๋ด…์‹œ๋‹ค. Dynamic Dex Loading ๐Ÿ”ตโšช๏ธ๐Ÿ”ด Dynamic Dex Loa...

Frida TCP Hooking

TCP ํ†ต์‹ ์„ MITM Relay๊ฐ€ ์•„๋‹Œ Frida ํ›„ํ‚น์„ ํ†ตํ•ด ํŒจํ‚ท์„ ์žก์•„๋ด…์‹œ๋‹ค. ๊ฐœ์š” ์†Œ์ผ“ ํ†ต์‹ ์—์„œ C/C++ ํ•จ์ˆ˜๋ฅผ ์ด์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•์€ ๋ฐ์ดํ„ฐ ์†ก์ˆ˜์‹  ํ•จ์ˆ˜๋ฅผ ์ด์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•์ž…๋‹ˆ๋‹ค. send(), recv() sendto(), rectfrom() ํ•จ์ˆ˜ ์›ํ˜• ํ•จ์ˆ˜ ์›ํ˜•์€ ์•„๋ž˜์™€ ๊ฐ™์Šต๋‹ˆ๋‹ค. send(int sockfd, co...

Error Based & Error based Blind SQL Injection

DreamHack ๊ฐ•์˜๋ฅผ ํ†ตํ•ด Error Based SQL Injection๊ณผ Error Based Blind SQL Injection์— ๋Œ€ํ•ด์„œ ์•Œ์•„๋ด…์‹œ๋‹ค. Error Based SQL Injection Dreamhack ๊ฐ•์˜๋ฅผ ํ†ตํ•ด Error Based SQL Injection์ด ๋ฌด์—‡์ธ์ง€ ์•Œ์•„๋ด…์‹œ๋‹ค. Error Based SQL I...

ICMP Tunneling by Python with Scapy

ICMP Tunneling์„ ํ†ตํ•ด ๋‚ด๋ถ€๋ง ๊ฐ„ ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋‚ด๋ถ€๋ง ๊ฐ„ ping ๋ช…๋ น์–ด๊ฐ€ ๋™์ž‘์„ ํ•˜๊ฒŒ ๋  ๊ฒฝ์šฐ ICMP Tunneling์„ ์ด์šฉํ•˜์—ฌ DATA๋ฅผ ์ „๋‹ฌํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. What is ICMP? ICMP์— ๋Œ€ํ•˜์—ฌ ๊ฐ„๋‹จํ•˜๊ฒŒ ์•Œ์•„๋ณด๋ฉด ์ธํ„ฐ๋„ท ์ œ์–ด ๋ฉ”์‹œ์ง€ ํ”„๋กœํ† ์ฝœ์œผ๋กœ ์ผ๋ฐ˜์ ์œผ๋กœ IP ๋™์ž‘์—์„œ ์ง„๋‹จ์ด๋‚˜ ์ œ์–ด๋กœ ์‚ฌ์šฉ๋˜...

Blind SQLi With Binary Search & Python

์ด๋ฒˆ์—๋Š” Binary Search๋ฅผ ์ด์šฉํ•˜์—ฌ DB๋ฅผ ์ถ”์ถœํ•  ์ˆ˜์žˆ๋Š” ๋ฐฉ๋ฒ•์„ ์•Œ์•„๋ด…์‹œ๋‹ค. Binary Search Binary Search๋ž€ ์ด์ง„ํƒ์ƒ‰ ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด๋ผ ํ•˜๋ฉฐ ์ •๋ ฌ๋œ ๋ฐ์ดํ„ฐ์—์„œ ๊ฒ€์ƒ‰ ๋ฒ”์œ„๋ฅผ ์ค„์—ฌ ๋‚˜๊ฐ€๋ฉด์„œ ์›ํ•˜๋Š” ๋ฐ์ดํ„ฐ๋ฅผ ๊ฒ€์ƒ‰ํ•˜๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์ž…๋‹ˆ๋‹ค. Contain DB Name test๋Š” acunetix์˜ ์ทจ์•ฝํ•œ ํŽ˜์ด์ง€๋กœ ์ง„ํ–‰...

Blind SQLi With Bit operation & Burp Intruder

Bit operation์„ ์ด์šฉํ•˜์—ฌ ๋ฒ„ํ”„์Šค์œ„ํŠธ์˜ Intruder ๊ธฐ๋Šฅ์œผ๋กœ ๊ฐ„๋‹จํ•˜๊ฒŒ DB๋ฅผ ์ถ”์ถœํ•  ์ˆ˜์žˆ๋Š” ๋ฐฉ๋ฒ•์„ ์•Œ์•„๋ด…์‹œ๋‹ค. Bit operation ํ•ญ์ƒ Binary Search๋ฅผ ์ด์šฉํ•˜์—ฌ Blind SQLi ์Šคํฌ๋ฆฝํŠธ๋ฅผ ๋ฅผ ๋งŒ๋“ค์—ˆ๋Š”๋ฐ ๋“œ๋ฆผํ•ต ๊ฐ•์˜๋ฅผ ํ†ตํ•ด MySQL DB์—์„œ Bit operation์„ ์ด์šฉํ•ด๋„ ๋˜๋Š” ๊ฒƒ์„ ์•Œ๊ฒŒ๋˜์—ˆ์Šต๋‹ˆ๋‹ค ...

XSS Filtering bypass with JSFuck

XSS๋ฅผ ๋ฐœ๊ฒฌํ–ˆ์ง€๋งŒ alert, confirm, prompt๋“ฑ ๋ฌธ์ž์—ด์ด WAF์—์„œ ํ•„ํ„ฐ๋ง ๋˜์—ˆ์„ ๋•Œ JSFuck์„ ์ด์šฉํ•˜์—ฌ ์ด๋ฅผ ์šฐํšŒํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์•Œ์•„๋ด…์‹œ๋‹ค. What is JSFuck? ์œ„ํ‚ค์— ๋”ฐ๋ฅด๋ฉด JavaScript ๋ฌธ๋ฒ•์—์„œ ์‚ฌ์šฉ๋˜๋Š” ๋ฌธ์ž ์ค‘ ๋‹จ 6๊ฐ€์ง€์ธ [,],(,),!,+ ๋งŒ์œผ๋กœ ๊ตฌํ˜„ํ•  ์ˆ˜ ์žˆ์Œ์— ์ฐฉ์•ˆํ•˜์—ฌ ๊ณ ์•ˆ๋œ ๋‚œํ•ดํ•œ ํ”„๋กœ๊ทธ๋ž˜...