22018, 1/1101 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   morieye
   Á¦°¡ Áö±Ý °øºÎ¸¦ ¾î¶»°Ô ÇØ¾ßÇÒÁö ¸·¸·ÇÕ´Ï´Ù µµ¿ÍÁÖ¼¼¿ä.....

http://www.hackerschool.org/HS_Boards/zboard.php?AllArticle=true&no=34987 [º¹»ç]


Àú´Â Áö±Ý ÇÐÁ¡¿î¿µÁ¦¸¦ ´Ù´Ï´Â ÇØÅ·°ú 1ÇгâÀÔ´Ï´Ù.
Àú´Â ¸®´ª½ºÂÊÀ» Á»´õ °øºÎÇϰí½Í½À´Ï´Ù. ±×·±µ¥ Çб³¿¡¼­´Â À©µµ¿ìÁîAPI¶óµç°¡ À©µµ¿ìȯ°æ¸®¹ö½ÌÀ» °¡¸£Ä¡´Â°Å°°½À´Ï´Ù. ¹°·Ð À©µµ¿ìȯ°æ¿¡¼­ ¸®¹ö½ÌÀ» ¹è¿öµÎ¸é ¸®´ª½ºÈ¯°æ¿¡¼­ ¸®¹ö½ÌÇÒ¶§ µµ¿òÀÌ µÈ´Ù´Â°Ç ¾Ë°íÀÖ½À´Ï´Ù¸¸.... ±×·¡µµ Á¦°¡ ÆíÇÏ°Ô °øºÎÇÒ¼öÀÖ´Â ±â°£Àº 2³âµµ ¾È³²¾Æ¼­ ¸®´ª½ºÂʸ¸ ÆÄ°í½Í½À´Ï´Ù.... ±×¸®°í Á¦°¡ ÇÐÁ¡¿î¿µÁ¦¸¦ ´Ù´Ï°í À־ ÇÐÁ¡°ü¸®(µ¶Çлç, ÀÚ°ÝÁõ)¸¦ ÇØ¾ßÇØ¼­ Á¦ÂÊ °øºÎµµ Á¦´ë·Î ¸øÇϰíÀÖ´Â ½ÇÁ¤ÀÔ´Ï´Ù....
¾î¶»°ÔÇØ¾ßÇÒ±î¿ä?
´ñ±Û·Î ¾î¶»°ÔÇϸéµÇ´ÂÁö ´äº¯ÇØÁּŵµµÇ°í kakao_talk·Î »ó´ãÇØÁÖ½Ã¸é °¨»çÇϰڽÀ´Ï´Ù µµ¿ÍÁÖ¼¼¿ä...¾î¶»°Ô ÇØ¾ßÇÒÁö¸¦ ¸ð¸£°Ú½À´Ï´Ù
(kakao_talk´Â °Ë»öID¸¦ ÂÊÁö·Î º¸³»µå¸®°Ú½À´Ï´Ù)

  Hit : 8050     Date : 2017/05/16 03:27



    
rabbitlycat Çб³°øºÎ º»ÀΰøºÎ µû·Î ÇÏ¸é µÇÁÒ. 2017/05/16  
morieye ÇÏ..... rabbitlycat´Ô ±×°Ç ÁøÀÛ¿¡ ÇÏ·Á°íÇϰíÀÖ½À´Ï´Ù. ±ÛÀ» Á¦´ë·Î ÀÐ°í ´äº¯ÇØÁÖ¼ÌÀ¸¸éÇÕ´Ï´Ù.
ÇÐÁ¡°ü¸®¶§¹®¿¡ Á¦²¨ °øºÎ¸¦ ¸øÇϰíÀÖÀ¸´Ï±ñ ÀÌ·¸°Ô ±ÛÀ» ÀûÀº°ÅÁÒ;;
2017/05/17  
rabbitlycat ÀßÀоú´Âµ¥¿ä? ¾Æ´Ï ¾ÖÃÊ¿¡ ±×¸¸Å­ ¸¹Àº ½Ã°£ÅõÀÚÇØ¼­ º»ÀÎÀÌ Àß ³ª´²¼­ ÇØ¾ßÁÒ º°¼öÀÖ³ª¿ä?
±×°Ô ¾ÈµÇ´Â°Å¸é º»ÀÎ ³ë·ÂÀÌ ºÎÁ·ÇѰŰÚÁÒ ±×·² ´É·ÂÀÌ ¾ÈµÇ°Å³ª¿ä
2017/05/17  
ÇØÄð·¯ ¾î·Á¿î »óȲÀ̽ó׿ä
»ç½Ç ±Û¿¡¼­µµ ¾²¼ÌµíÀÌ À©µµ¿ìÁî·Î ÇÏµç ¸®´ª½º·Î ÇÏµç ¾î´À ÇѰ÷¿¡¼­ Á¦´ë·Î °øºÎÇØµÎ¸é Ç÷§Æû »ó°ü¾øÀÌ È°¿ëµÇ´Â°Ô ¸®¹ö½ÌÀÔ´Ï´Ù
¸®´ª½ºÂʸ¸ ÆÄ°í ½Í´Ù´Â°ÍÀÌ ¸®´ª½º »ó¿¡¼­ ¸®¹ö½ÌÀ» ÇÏ°í »ùÇÃÇÁ·Î±×·¥À» ÀͽºÇ÷ÎÀÕÇØº¸°í º¸È£±â¹ýµµ °øºÎÇØº¸°í ½Í´Ù ÀÌ·±Àǹ̶ó¸éÀº ¿ö°ÔÀÓÀ» Ãë¹Ì·Î °¡Áö½Ã´Â¼ö¹Û¿¡´Â ¸¶¶¥È÷ ¾øÀ»°Í°°½À´Ï´Ù
¿ö°ÔÀÓÀº overthewire.org smashthestack.org pwnable.kr FTZ LOB exploit-exercises.com pwnable.tw ÀÌ·±°ÍµéÀÌ ´ëÁßÀûÀ̱¸¿ä
¸®´ª½º¸¦ ÆÄ°í½Í´Ü°Ô ±× Àǹ̰¡ ¾Æ´Ï°í ¸®´ª½º ¿î¿µÃ¼Á¦¿¡ ´ëÇÑ ÇнÀÀ» ¿øÇѴٴ°Ŷó¸é ÀÚ±âÀü¿¡ 30ºÐ¾¿ÀÌ¶óµµ ¸®´ª½º Ä¿³ÎÃ¥À» ²ÙÁØÈ÷ ÀÐÀ¸½Ã¸é ¾î´ÀÁ¤µµ °øºÎ°¡ µÇÁö ¾ÊÀ»±î ½Í½À´Ï´Ù
ȤÀº ¼­¹ö °ü¸®¿¡ ´ëÇÑ°É °øºÎÇÏ°í ½ÍÀ¸½Å°Å¶ó¸é À̰Ŵ ¿©·¯°³¸¦ ¼³Ä¡Çغ¸°í ½áº¸´Â ¿¬½ÀÀ» ÇØ¾ßÁÒ pythonÀÇ virtualenv, docker, qemu, ȤÀº À¥¼­¹ö¶ó¸é apache, nginx, µðºñ¶ó¸é mysqlµî°ú °°ÀÌ Çö¾÷¿¡¼­ ¸¹ÀÌ »ç¿ëµÇ´Â ÇÁ·Î±×·¥ ȤÀº ÇÁ·¹ÀÓ¿öÅ©µéÀ» ¿­½ÉÈ÷ °Ë»öÇØ¼­ ´Ù¿î¹Þ¾Æº¸°í ½áº¸¸é µË´Ï´Ù
2017/05/17  
morieye @ÇØÄð·¯
Á¤¸» °¨»çÇÕ´Ï´Ù µµ¿ò¹Þ¾Ò½À´Ï´Ù. ±×¸®°í ±Ã±ÝÇѰÔÀÖ½À´Ï´Ù.
Á¦°¡ ½Ã½ºÅÛÇØÅ·ÂÊÀ¸·Î °øºÎ¸¦ ÇϰíÀִµ¥ ÀÌÂÊÀ» °øºÎÇÏ·Á¸é ¹Ýµå½Ã ¤¾îºÁ¾ßÇÏ°Å¿Í ¹Ýµå½Ã´Â ¾Æ´ÏÁö¸¸ ¾Ë¸é µµ¿òÀ̵Ǵ °ÍÀº ¹«¾ù¹«¾ùÀÌÀÖ³ª¿ä(¸®´ª½º)?
2017/05/17  
ÇØÄð·¯ ÂÊÁö·Îµµ º¸³»ÁÖ¼ÌÁö¸¸ °°Àº°í¹ÎÀ» Çϰí°è½ÇºÐµéÀ» À§ÇØ ´ñ±Û·Î¸¸ ÀÛ¼ºÇÕ´Ï´Ù
½Ã½ºÅÛÇØÅ·Àº ¼¼°¡Áö »ó¼¼ºÐ¾ß·Î ³ª´­ ¼ö ÀÖ½À´Ï´Ù
1. ¾î¶»°Ô Ãë¾àÁ¡À» ã´Â°¡
2. ¾î¶»°Ô Ãë¾àÁ¡À» °ø°ÝÇϴ°¡
3. ¾î¶»°Ô ±× Ãë¾àÁ¡À» °íÄ¥°ÍÀΰ¡
1¹øÀº Ãë¾àÁ¡ ºÐ¼® ÀÚµ¿È­·Î Âß ¿¬±¸µÇ°í ÀÖ½À´Ï´Ù. ¸î°¡Áö °øºÎ Ű¿öµå¸¦ ³ª¿­Çص帮¸é
1. ÆÛ¡
1-1. mutation fuzzing
1-2. structural fuzzing (or smart fuzzing)
1-3. program adaptive mutational fuzzing (Ä«À̽ºÆ® Â÷»ó±æ ±³¼ö´Ô ¿¬±¸)
1-4. American Fuzzy Lop (or AFL)
2. Taint Analysis
2-1. Dynamic Binary Instrumentation (or DBI)
2-2. Symbolic/Concolic Execution°ú °áÇÕµÈ ÇüÅÂÀÇ Taint Analysis
2-3. Dynamic Taint Analysis (ÁÖ·Î À©µµ¿ì/¸®´ª½º ÂÊ ³í¹®ÀÌ ¸¹À½)
2-4. Static Taint Analysis (¾Èµå·ÎÀ̵å ÂÊ ³í¹®ÀÌ ¸¹À½)
3. Symbolic Execution
3-1. Z3
3-2. angr
4. Machine Learning based approach
4-1. ÈÞ¸®½ºÆ½Àû Åë°è ±â¹Ý Ãë¾à¼º ¿¹Ãø
4-2. À¯»çµµ ±â¹Ý Ãë¾à¼º ¿¹Ãø
5. ±×³É °æÇè¿¡ ±â¹ÝÇÑ ¼Ò½ºÄÚµå ¿ÀµðÆÃ

±×¸®°í Ãë¾àÁ¡ °ø°Ý
1. ²ö±â¿Í ¼¾½º·Î °è¼Ó ´Ù¸¥ °ø°Ýº¤Å͸¦ ã´Â ºÎ·ù
Google Project ZeroÆÀÀÌ ´ëÇ¥ÀûÀÔ´Ï´Ù Áö±ÝÀº º¸±â ¾î·Á¿ì½Ã°ÚÁö¸¸ ¾î´ÀÁ¤µµ °øºÎÇϽÅÈÄ¿¡ º¸¸é ¿µ°¨À» ¸¹ÀÌ ¾òÀ¸½Ç ¼ö ÀÖÀ»°Ì´Ï´Ù
https://googleprojectzero.blogspot.kr/
2. Automatic Exploit Generation (º¸Åë Ãë¾àÁ¡ ºÐ¼® ÀÚµ¿È­ -> ÀÚµ¿ ÀͽºÇ÷ÎÀÕ »ý¼ºÀÇ ¼ø¼­·Î ¿¬±¸µÉ°ÍÀ̶ó°í »ý°¢Çϱ⠽¬¿ì³ª AEG ´ÜÀϷνá Ãë¾àÁ¡À» ã¾Æ³»·Á´Â ¿¬±¸µµ Ȱ¹ßÇÕ´Ï´Ù. ¿Ö³Ä¸é AEG¿¡¼­ ºÐ¼®ÇÏ´Â Á¤º¸µéÀº Ãë¾à¼ºÀ» ºÐ¼®ÇÒ¶§µµ »ç¿ëµÉ¸¸ÇÑ Á¤º¸µéÀ̱⠶§¹®¿¡)
3. Patch based Exploitation
ÀÌ°Ç PPPÆÀÀÇ ¹Ú¼¼ÁØ´ÔÀÌ ¿À·¡ ¿¬±¸ÇÏ°í ¿©·¯¹ø ¹ßÇ¥ÇϽŠÁÖÁ¦Àε¥, ¾î¶² ¼ÒÇÁÆ®¿þ¾îÀÇ ÆÐÄ¡°¡ ¸±¸®ÁîµÇ¸é ±× ÆÐÄ¡¿Í, ±× Àü ÇÁ·Î±×·¥ÀÇ Â÷ÀÌÁ¡À» ºÐ¼®ÇØ ¾î¶² Ãë¾à¼º¿¡ ´ëÇÑ ÆÐÄ¡ÀÎÁö ¾Ë¾Æ³»°í, ±× ÆÐÄ¡°¡ ¸ðµÎ ÆÛÁö±â Àü¿¡ ¾Ë¾Æ³½ Ãë¾àÁ¡À» ÀÌ¿ëÇØ °ø°ÝÇÏ´Â ¹æ¹ý·ÐÀÔ´Ï´Ù. Ãë¾àÁ¡ ºÐ¼®¿¡ µé¾î°¥¼öµµ ÀÖ°í °ø°Ý¿¡ µé¾î°¥¼öµµ ÀÖ°ÚÁÒ
4. Mitigation Bypass
º¸È£±â¹ý¸¸Çصµ ¿­°³ ½º¹«°³´Â ±âº»À¸·Î ³ª¿­ÇÒ ¼ö ÀÖÀ»¸¸Å­ ¸¹½À´Ï´Ù. ÀÌ º¸È£±â¹ýµé¿¡ ´ëÇÑ ¿¬±¸¿Í º¸È£±â¹ýÀ» ¿ìȸÇÏ´Â ¹æ¹ý·ÐÀ» ¿¬±¸ÇÏ´Â ºÎ·ùµµ ÀÖ½À´Ï´Ù
¿¹¸¦µé¾î ASLR, NXºÎÅÍ ½ÃÀÛÇØ PIE, SSP, RELRO, kASLR, SMEP, SMAP, Isolated Heap, Sandboxing, Virtualization based mitigation, Intel shadow stack, Control Flow Guard, vtguard, ±×¸®°í À©µµ¿ìÁîÀÇ EMET¿¡¼­ Á¦°øÇÏ´Â ¾öû³ª°Ô ¸¹Àº º¸È£±â¹ýµé µîÀÌ ÀÖ½À´Ï´Ù

Ãë¾àÁ¡ ÆÐÄ¡
1. Á¤Ã¥Àû ¹æ¹ý
¿¹¸¦µé¾î IoTÁ¦Ç°Àº ÀÌÁ¦ ½ÃÀå¿¡ Ãâ½ÃÇϱâÀü¿¡ ¹«Á¶°Ç º¸¾È ÀÎÁõÀ» ¹Þ¾Æ¾ß Çϵµ·Ï Á¤Ã¥ÀÌ »ý°å½À´Ï´Ù. ÀÌ·±½ÄÀ¸·Î Ãë¾à¼ºÀ» º¸¿ÏÇØ³ª°¡´Â ¹æ¹ýµµ ÀÖ½À´Ï´Ù
2. ½ÃÅ¥¾îÄÚµù
´ç¿¬ÇÑ ¾ê±â±âµµ ÇÏÁö¸¸, ½ÇÁ¦ °³¹ßÇöÀå¿¡¼­´Â ³Ê¹«³ªµµ ´ç¿¬ÇÑ Ãë¾à¼ºÀ» ÀÎÁöÇÏÁö ¸øÇϰųª ÀÎÁöÇÏ°í¼­µµ °íÄ¥ ¼ö ÀÖ´Â ÀÏÁ¤ÀÌ ÀâÈ÷Áö ¾Ê´Â °æ¿ì°¡ ¸¹½À´Ï´Ù. Á¶Á÷¹®È­Â÷¿ø¿¡¼­ ½ÃÅ¥¾îÄÚµùÀ» °Ë¼öÇÏ°í °­Á¦Çϴ°ÍÀÌ ÇÊ¿äÇÕ´Ï´Ù
3. ÀÚµ¿È­ ÆÐÄ¡
»ó¿ëÁ¦Ç°ÀÇ °æ¿ì Á¦´ë·Î µÈ ºÐ¼®°ú ¼³°è¸¦ Åä´ë·Î ÆÐÄ¡¸¦ ÁøÇàÇØ¾ß°ÚÁö¸¸
¿¹¸¦µé¾î Defcon°ú DARPA°¡ °°ÀÌ ÁøÇàÇß´ø Cyber Grand Challenge¶ó´Â ÀΰøÁö´É ÇØÅ·´ëȸ¸¦ º¸¸é ÀΰøÁö´ÉÀÌ Ãë¾àÁ¡À» ã°í ÀÚµ¿À¸·Î ÆÐÄ¡±îÁö ÁøÇàÇØ¾ßÇÏ´Â Çü½ÄÀÇ ´ëȸÀÔ´Ï´Ù
CGC¿¡¼­ »ç¿ëÇÑ ÀΰøÁö´É ÇÁ·Î±×·¥ÀÌ ÀÎÅͳݿ¡ ¸¹ÀÌ °ø°³µÅÀÖÀ¸´Ï ã¾Æº¸¼¼¿ä
Shellphish¿¡¼­ °ø°³ÇѰÍÀÌ Á¦ÀÏ À¯¸íÇÕ´Ï´Ù
https://github.com/shellphish ¿©±â patcherex °¡ ÆÐÄ¡ ÀÚµ¿È­ ÅøÀ̳׿ä
2017/05/19