Frida Basic

1️⃣ Frida κΈ°λ³Έ πŸ“œFrida? Oleκ°€ κ°œλ°œν•œ DBI(Dynamic Binary Instrumention) ν”„λ ˆμž„ μ›Œν¬ (* Instrumentation : 앱이 싀행쀑인 μƒνƒœμ—μ„œ μ½”λ“œ λͺ…λ Ήμ–΄λ₯Ό μ‚½μž…ν•΄ ν”„λ‘œμ„ΈμŠ€λ₯Ό 좔적, 뢄석, λ””λ²„κΉ…ν•˜λŠ” 도ꡬ) πŸ“œFrida νŠΉμ§• λ‹€μ–‘ν•œ ν”Œλž«νΌμ—μ„œ ν”„λ‘œμ„ΈμŠ€μ— λŒ€ν•œ μΈμ μ…˜μ΄ κ°€λŠ₯ν•΄ 큰 ν™•μž₯성을 가짐 μœˆλ„μš°, λ§₯OS, GNU/Linux, iOS, Android 및 QNXμ—μ„œ μžλ°”μŠ€ν¬λ¦½νŠΈλ₯Ό λ„€μ΄ν‹°λΈŒ 앱에 μ‚½μž…κ°€λŠ₯ πŸ“œFrida μ£Όμš”κΈ°λŠ₯ ν•¨μˆ˜ ν›„ν‚Ή (νŠΉμ • ν•¨μˆ˜μ— μ—°κ²°ν•˜μ—¬ λ°˜ν™˜ κ°’ λ³€κ²½, ν•¨μˆ˜ μž¬μž‘μ„± λ“±) μ• ν”Œλ¦¬μΌ€μ΄μ…˜ 디버깅 κ°€λŠ₯ νž™ λ©”λͺ¨λ¦¬ λ‚΄ 객체 μΈμŠ€ν„΄μŠ€ 검색 및 μ‚¬μš© μ‹€μ‹œκ°„ νŠΈλž˜ν”½ μŠ€λ‹ˆν•‘ λ˜λŠ” μ•”ν˜Έ 해독 νƒˆμ˜₯ λ˜λŠ” λ£¨νŒ…λ˜μ§€ μ•Šμ€ λ‹¨λ§κΈ°μ—μ„œλ„ κ°€λŠ₯ πŸ“œ**λ™μž‘λ°©μ‹ πŸ“œFrida Tools frida (frida -h)...

July 10, 2023 Β· CrackerNote

Frida ν™˜κ²½μ„ΈνŒ…

1️⃣ Frida ν™˜κ²½μ„ΈνŒ… πŸ“œFrida ν™˜κ²½ λ…ΉμŠ€ μ•± ν”Œλ ˆμ΄μ–΄ (NoX) : samsung SM-G965N μ•„λ‚˜μ½˜λ‹€ (python) : ν”„λ¦¬λ‹€λŠ” Python 기반으둜 μž‘λ™ν•˜κΈ° λ•Œλ¬Έμ— λ…λ¦½λœ ν™˜κ²½μ„ μ œκ³΅ν•˜λŠ” μ•„λ‚˜μ½˜λ‹€κ°€ νŽΈλ¦¬ν•¨ 프리닀 (12.6.11) 프리닀 μ„œλ²„ (Android)(Server 12.6.11) Jadx 1.1.0 : Dex to Java decompiler Target App : 뢄석 ν•  μ•±λ“€..

July 10, 2023 Β· CrackerNote

DreamHack Web Beginner_simple-web-request

1️⃣ DreamHack Web Beginner_simple-web-request λ¬Έμ œν™•μΈ (https://dreamhack.io/wargame/challenges/830) 풀이 πŸ“œλ¬Έμ œν™•μΈ λ“œλ¦Όν•΅ μ‚¬μ΄νŠΈμ—μ„œ 문제 확인 μ„œλ²„ μ˜€ν”ˆ ν›„ μ ‘μ†ν•˜λ©΄ μ•„λž˜μ™€ 같이 메인 νŽ˜μ΄μ§€μ™€ step1 을 확인 κ°€λŠ₯ 문제파일 λ‹€μš΄ν›„ μ½”λ“œ 확인 κ°€λŠ₯ #!/usr/bin/python3 import os from flask import Flask, request, render_template, redirect, url_for import sys app = Flask(__name__) try: # flag is here! FLAG = open("./flag.txt", "r").read() except: FLAG = "[**FLAG**]" @app.route("/") def index(): return render_template("index.html") @app.route("/step1", methods=["GET", "POST"]) def step1(): #### 풀이와 κ΄€κ³„μ—†λŠ” μΉ˜νŒ… λ°©μ§€ μ½”λ“œ global step1_num step1_num = int....

May 25, 2023 Β· CrackerNote

DreamHack Web Beginner_devtools-sources

1️⃣ DreamHack Web Beginner_devtools-sources λ¬Έμ œν™•μΈ (https://dreamhack.io/wargame/challenges/267) 풀이 πŸ“œλ¬Έμ œν™•μΈ λ“œλ¦Όν•΅ μ‚¬μ΄νŠΈμ—μ„œ 문제 확인 μ΄λ¬Έμ œλŠ” μ„œλ²„κ°€ μ—†μœΌλ―€λ‘œ λ‹€μš΄λ‘œλ“œλœ νŒŒμΌμ—μ„œ index.html 을 μ‹€ν–‰ν•΄λ³Έλ‹€ πŸ“œν’€μ΄ 개발자 도ꡬ에 λ“€μ–΄κ°€ μ—¬λŸ¬κ°€μ§€ νŒŒμΌλ“€μ„ ν™•μΈν•˜λ©΄ main.css에 μ£Όμ„μœΌλ‘œ Flag 값을 확인할 수 있음

April 25, 2023 Β· CrackerNote

Active Directory Cheatsheet

1️⃣ Active Directory Cheatsheet Perform user hunting to track down where users are logged into in the network - find users that are members of high-value groups. Dump credentials and/or obtain Kerberos tickets. Gain access to the user’s machine using creds/ticket. (Possibly) escalate privileges in the machine. Repeat steps above until you have administrative privileges in the Domain Controller. πŸ“œAD Enumeration - Users / Groups / Computers μƒμœ„ κΆŒν•œμ„ κ°€μ§„ user μ°ΎκΈ° λ©”μ„œλ“œ μ„€λͺ… onCreate() μ•‘ν‹°λΉ„ν‹° 생성 μ‹œ 호좜, 화면에 λ³΄μ΄λŠ” 뷰의 일반적인 μƒνƒœλ₯Ό μ„€μ • onStart() μ•‘ν‹°λΉ„ν‹°κ°€ μ‚¬μš©μžμ—κ²Œ ν‘œμ‹œλ˜κΈ° 직전에 호좜 onResume() μ•‘ν‹°λΉ„ν‹°κ°€ μ‚¬μš©μžμ™€ μƒν˜Έμž‘μš© ν•˜κΈ° 전에 호좜 onPause() μ‹œμŠ€ν…œμ΄ λ‹€λ₯Έ μ•‘ν‹°λΉ„ν‹°λ₯Ό μž¬κ°œν•˜μ§€ 직전에 호좜 onStop() μ•‘ν‹°λΉ„ν‹°κ°€ 더이상 μ‚¬μš©μžμ—κ²Œ ν‘œμ‹œλ˜μ§€ μ•Šμ„ λ•Œ 호좜 onDestroy() μ•‘ν‹°λΉ„ν‹° μ†Œλ©Έ 전에 호좜(λ§ˆμ§€λ§‰ 호좜) πŸ“œ**μ•‘ν‹°λΉ„ν‹° Flow !...

March 14, 2023 Β· CrackerNote