|
|


22018, 1/1101 |
![]() |
![]() |
![]() |
![]() |
|
morieye | ||||||
|
Á¦°¡ Áö±Ý °øºÎ¸¦ ¾î¶»°Ô ÇØ¾ßÇÒÁö ¸·¸·ÇÕ´Ï´Ù µµ¿ÍÁÖ¼¼¿ä..... | ||||||
|
http://www.hackerschool.org/HS_Boards/zboard.php?AllArticle=true&no=34987 [º¹»ç]
Hit : 8050 Date : 2017/05/16 03:27
|
|||||||
| ![]() |
| |
| rabbitlycat | Çб³°øºÎ º»ÀΰøºÎ µû·Î ÇÏ¸é µÇÁÒ. | 2017/05/16 | |
| morieye | ÇÏ..... rabbitlycat´Ô ±×°Ç ÁøÀÛ¿¡ ÇÏ·Á°íÇϰíÀÖ½À´Ï´Ù. ±ÛÀ» Á¦´ë·Î ÀÐ°í ´äº¯ÇØÁÖ¼ÌÀ¸¸éÇÕ´Ï´Ù. ÇÐÁ¡°ü¸®¶§¹®¿¡ Á¦²¨ °øºÎ¸¦ ¸øÇϰíÀÖÀ¸´Ï±ñ ÀÌ·¸°Ô ±ÛÀ» ÀûÀº°ÅÁÒ;; |
2017/05/17 | |
| rabbitlycat | ÀßÀоú´Âµ¥¿ä? ¾Æ´Ï ¾ÖÃÊ¿¡ ±×¸¸Å ¸¹Àº ½Ã°£ÅõÀÚÇØ¼ º»ÀÎÀÌ Àß ³ª´²¼ ÇØ¾ßÁÒ º°¼öÀÖ³ª¿ä? ±×°Ô ¾ÈµÇ´Â°Å¸é º»ÀÎ ³ë·ÂÀÌ ºÎÁ·ÇѰŰÚÁÒ ±×·² ´É·ÂÀÌ ¾ÈµÇ°Å³ª¿ä |
2017/05/17 | |
| ÇØÄð·¯ | ¾î·Á¿î »óȲÀÌ½Ã³×¿ä »ç½Ç ±Û¿¡¼µµ ¾²¼ÌµíÀÌ À©µµ¿ìÁî·Î ÇÏµç ¸®´ª½º·Î ÇÏµç ¾î´À ÇѰ÷¿¡¼ Á¦´ë·Î °øºÎÇØµÎ¸é Ç÷§Æû »ó°ü¾øÀÌ È°¿ëµÇ´Â°Ô ¸®¹ö½ÌÀÔ´Ï´Ù ¸®´ª½ºÂʸ¸ ÆÄ°í ½Í´Ù´Â°ÍÀÌ ¸®´ª½º »ó¿¡¼ ¸®¹ö½ÌÀ» ÇÏ°í »ùÇÃÇÁ·Î±×·¥À» ÀͽºÇ÷ÎÀÕÇØº¸°í º¸È£±â¹ýµµ °øºÎÇØº¸°í ½Í´Ù ÀÌ·±Àǹ̶ó¸éÀº ¿ö°ÔÀÓÀ» Ãë¹Ì·Î °¡Áö½Ã´Â¼ö¹Û¿¡´Â ¸¶¶¥È÷ ¾øÀ»°Í°°½À´Ï´Ù ¿ö°ÔÀÓÀº overthewire.org smashthestack.org pwnable.kr FTZ LOB exploit-exercises.com pwnable.tw ÀÌ·±°ÍµéÀÌ ´ëÁßÀûÀ̱¸¿ä ¸®´ª½º¸¦ ÆÄ°í½Í´Ü°Ô ±× Àǹ̰¡ ¾Æ´Ï°í ¸®´ª½º ¿î¿µÃ¼Á¦¿¡ ´ëÇÑ ÇнÀÀ» ¿øÇѴٴ°Ŷó¸é ÀÚ±âÀü¿¡ 30ºÐ¾¿ÀÌ¶óµµ ¸®´ª½º Ä¿³ÎÃ¥À» ²ÙÁØÈ÷ ÀÐÀ¸½Ã¸é ¾î´ÀÁ¤µµ °øºÎ°¡ µÇÁö ¾ÊÀ»±î ½Í½À´Ï´Ù ȤÀº ¼¹ö °ü¸®¿¡ ´ëÇÑ°É °øºÎÇÏ°í ½ÍÀ¸½Å°Å¶ó¸é À̰Ŵ ¿©·¯°³¸¦ ¼³Ä¡Çغ¸°í ½áº¸´Â ¿¬½ÀÀ» ÇØ¾ßÁÒ pythonÀÇ virtualenv, docker, qemu, ȤÀº À¥¼¹ö¶ó¸é apache, nginx, µðºñ¶ó¸é mysqlµî°ú °°ÀÌ Çö¾÷¿¡¼ ¸¹ÀÌ »ç¿ëµÇ´Â ÇÁ·Î±×·¥ ȤÀº ÇÁ·¹ÀÓ¿öÅ©µéÀ» ¿½ÉÈ÷ °Ë»öÇØ¼ ´Ù¿î¹Þ¾Æº¸°í ½áº¸¸é µË´Ï´Ù |
2017/05/17 | |
| morieye | @ÇØÄð·¯ Á¤¸» °¨»çÇÕ´Ï´Ù µµ¿ò¹Þ¾Ò½À´Ï´Ù. ±×¸®°í ±Ã±ÝÇѰÔÀÖ½À´Ï´Ù. Á¦°¡ ½Ã½ºÅÛÇØÅ·ÂÊÀ¸·Î °øºÎ¸¦ ÇϰíÀִµ¥ ÀÌÂÊÀ» °øºÎÇÏ·Á¸é ¹Ýµå½Ã ¤¾îºÁ¾ßÇÏ°Å¿Í ¹Ýµå½Ã´Â ¾Æ´ÏÁö¸¸ ¾Ë¸é µµ¿òÀ̵Ǵ °ÍÀº ¹«¾ù¹«¾ùÀÌÀÖ³ª¿ä(¸®´ª½º)? |
2017/05/17 | |
| ÇØÄð·¯ | ÂÊÁö·Îµµ º¸³»ÁÖ¼ÌÁö¸¸ °°Àº°í¹ÎÀ» Çϰí°è½ÇºÐµéÀ» À§ÇØ ´ñ±Û·Î¸¸ ÀÛ¼ºÇÕ´Ï´Ù ½Ã½ºÅÛÇØÅ·Àº ¼¼°¡Áö »ó¼¼ºÐ¾ß·Î ³ª´ ¼ö ÀÖ½À´Ï´Ù 1. ¾î¶»°Ô Ãë¾àÁ¡À» ã´Â°¡ 2. ¾î¶»°Ô Ãë¾àÁ¡À» °ø°ÝÇϴ°¡ 3. ¾î¶»°Ô ±× Ãë¾àÁ¡À» °íÄ¥°ÍÀΰ¡ 1¹øÀº Ãë¾àÁ¡ ºÐ¼® ÀÚµ¿È·Î Âß ¿¬±¸µÇ°í ÀÖ½À´Ï´Ù. ¸î°¡Áö °øºÎ Ű¿öµå¸¦ ³ª¿Çص帮¸é 1. ÆÛ¡ 1-1. mutation fuzzing 1-2. structural fuzzing (or smart fuzzing) 1-3. program adaptive mutational fuzzing (Ä«À̽ºÆ® Â÷»ó±æ ±³¼ö´Ô ¿¬±¸) 1-4. American Fuzzy Lop (or AFL) 2. Taint Analysis 2-1. Dynamic Binary Instrumentation (or DBI) 2-2. Symbolic/Concolic Execution°ú °áÇÕµÈ ÇüÅÂÀÇ Taint Analysis 2-3. Dynamic Taint Analysis (ÁÖ·Î À©µµ¿ì/¸®´ª½º ÂÊ ³í¹®ÀÌ ¸¹À½) 2-4. Static Taint Analysis (¾Èµå·ÎÀ̵å ÂÊ ³í¹®ÀÌ ¸¹À½) 3. Symbolic Execution 3-1. Z3 3-2. angr 4. Machine Learning based approach 4-1. ÈÞ¸®½ºÆ½Àû Åë°è ±â¹Ý Ãë¾à¼º ¿¹Ãø 4-2. À¯»çµµ ±â¹Ý Ãë¾à¼º ¿¹Ãø 5. ±×³É °æÇè¿¡ ±â¹ÝÇÑ ¼Ò½ºÄÚµå ¿ÀµðÆÃ ±×¸®°í Ãë¾àÁ¡ °ø°Ý 1. ²ö±â¿Í ¼¾½º·Î °è¼Ó ´Ù¸¥ °ø°Ýº¤Å͸¦ ã´Â ºÎ·ù Google Project ZeroÆÀÀÌ ´ëÇ¥ÀûÀÔ´Ï´Ù Áö±ÝÀº º¸±â ¾î·Á¿ì½Ã°ÚÁö¸¸ ¾î´ÀÁ¤µµ °øºÎÇϽÅÈÄ¿¡ º¸¸é ¿µ°¨À» ¸¹ÀÌ ¾òÀ¸½Ç ¼ö ÀÖÀ»°Ì´Ï´Ù https://googleprojectzero.blogspot.kr/ 2. Automatic Exploit Generation (º¸Åë Ãë¾àÁ¡ ºÐ¼® ÀÚµ¿È -> ÀÚµ¿ ÀͽºÇ÷ÎÀÕ »ý¼ºÀÇ ¼ø¼·Î ¿¬±¸µÉ°ÍÀ̶ó°í »ý°¢Çϱ⠽¬¿ì³ª AEG ´ÜÀϷνá Ãë¾àÁ¡À» ã¾Æ³»·Á´Â ¿¬±¸µµ Ȱ¹ßÇÕ´Ï´Ù. ¿Ö³Ä¸é AEG¿¡¼ ºÐ¼®ÇÏ´Â Á¤º¸µéÀº Ãë¾à¼ºÀ» ºÐ¼®ÇÒ¶§µµ »ç¿ëµÉ¸¸ÇÑ Á¤º¸µéÀ̱⠶§¹®¿¡) 3. Patch based Exploitation ÀÌ°Ç PPPÆÀÀÇ ¹Ú¼¼ÁØ´ÔÀÌ ¿À·¡ ¿¬±¸ÇÏ°í ¿©·¯¹ø ¹ßÇ¥ÇϽŠÁÖÁ¦Àε¥, ¾î¶² ¼ÒÇÁÆ®¿þ¾îÀÇ ÆÐÄ¡°¡ ¸±¸®ÁîµÇ¸é ±× ÆÐÄ¡¿Í, ±× Àü ÇÁ·Î±×·¥ÀÇ Â÷ÀÌÁ¡À» ºÐ¼®ÇØ ¾î¶² Ãë¾à¼º¿¡ ´ëÇÑ ÆÐÄ¡ÀÎÁö ¾Ë¾Æ³»°í, ±× ÆÐÄ¡°¡ ¸ðµÎ ÆÛÁö±â Àü¿¡ ¾Ë¾Æ³½ Ãë¾àÁ¡À» ÀÌ¿ëÇØ °ø°ÝÇÏ´Â ¹æ¹ý·ÐÀÔ´Ï´Ù. Ãë¾àÁ¡ ºÐ¼®¿¡ µé¾î°¥¼öµµ ÀÖ°í °ø°Ý¿¡ µé¾î°¥¼öµµ ÀÖ°ÚÁÒ 4. Mitigation Bypass º¸È£±â¹ý¸¸Çصµ ¿°³ ½º¹«°³´Â ±âº»À¸·Î ³ª¿ÇÒ ¼ö ÀÖÀ»¸¸Å ¸¹½À´Ï´Ù. ÀÌ º¸È£±â¹ýµé¿¡ ´ëÇÑ ¿¬±¸¿Í º¸È£±â¹ýÀ» ¿ìȸÇÏ´Â ¹æ¹ý·ÐÀ» ¿¬±¸ÇÏ´Â ºÎ·ùµµ ÀÖ½À´Ï´Ù ¿¹¸¦µé¾î ASLR, NXºÎÅÍ ½ÃÀÛÇØ PIE, SSP, RELRO, kASLR, SMEP, SMAP, Isolated Heap, Sandboxing, Virtualization based mitigation, Intel shadow stack, Control Flow Guard, vtguard, ±×¸®°í À©µµ¿ìÁîÀÇ EMET¿¡¼ Á¦°øÇÏ´Â ¾öû³ª°Ô ¸¹Àº º¸È£±â¹ýµé µîÀÌ ÀÖ½À´Ï´Ù Ãë¾àÁ¡ ÆÐÄ¡ 1. Á¤Ã¥Àû ¹æ¹ý ¿¹¸¦µé¾î IoTÁ¦Ç°Àº ÀÌÁ¦ ½ÃÀå¿¡ Ãâ½ÃÇϱâÀü¿¡ ¹«Á¶°Ç º¸¾È ÀÎÁõÀ» ¹Þ¾Æ¾ß Çϵµ·Ï Á¤Ã¥ÀÌ »ý°å½À´Ï´Ù. ÀÌ·±½ÄÀ¸·Î Ãë¾à¼ºÀ» º¸¿ÏÇØ³ª°¡´Â ¹æ¹ýµµ ÀÖ½À´Ï´Ù 2. ½ÃÅ¥¾îÄÚµù ´ç¿¬ÇÑ ¾ê±â±âµµ ÇÏÁö¸¸, ½ÇÁ¦ °³¹ßÇöÀå¿¡¼´Â ³Ê¹«³ªµµ ´ç¿¬ÇÑ Ãë¾à¼ºÀ» ÀÎÁöÇÏÁö ¸øÇϰųª ÀÎÁöÇÏ°í¼µµ °íÄ¥ ¼ö ÀÖ´Â ÀÏÁ¤ÀÌ ÀâÈ÷Áö ¾Ê´Â °æ¿ì°¡ ¸¹½À´Ï´Ù. Á¶Á÷¹®ÈÂ÷¿ø¿¡¼ ½ÃÅ¥¾îÄÚµùÀ» °Ë¼öÇÏ°í °Á¦Çϴ°ÍÀÌ ÇÊ¿äÇÕ´Ï´Ù 3. ÀÚµ¿È ÆÐÄ¡ »ó¿ëÁ¦Ç°ÀÇ °æ¿ì Á¦´ë·Î µÈ ºÐ¼®°ú ¼³°è¸¦ Åä´ë·Î ÆÐÄ¡¸¦ ÁøÇàÇØ¾ß°ÚÁö¸¸ ¿¹¸¦µé¾î Defcon°ú DARPA°¡ °°ÀÌ ÁøÇàÇß´ø Cyber Grand Challenge¶ó´Â ÀΰøÁö´É ÇØÅ·´ëȸ¸¦ º¸¸é ÀΰøÁö´ÉÀÌ Ãë¾àÁ¡À» ã°í ÀÚµ¿À¸·Î ÆÐÄ¡±îÁö ÁøÇàÇØ¾ßÇÏ´Â Çü½ÄÀÇ ´ëȸÀÔ´Ï´Ù CGC¿¡¼ »ç¿ëÇÑ ÀΰøÁö´É ÇÁ·Î±×·¥ÀÌ ÀÎÅͳݿ¡ ¸¹ÀÌ °ø°³µÅÀÖÀ¸´Ï ã¾Æº¸¼¼¿ä Shellphish¿¡¼ °ø°³ÇѰÍÀÌ Á¦ÀÏ À¯¸íÇÕ´Ï´Ù https://github.com/shellphish ¿©±â patcherex °¡ ÆÐÄ¡ ÀÚµ¿È ÅøÀ̳׿ä |
2017/05/19 | |
|
|