Pentest/๐Ÿ“–

    [Recon] ์›น์Šค์บ๋‹ ๋„๊ตฌ - httpx

    ๋ณดํ˜ธ๋˜์–ด ์žˆ๋Š” ๊ธ€์ž…๋‹ˆ๋‹ค.

    [AD] ์‹ค์Šต ํ™˜๊ฒฝ ์„ธํŒ…

    [AD] ์‹ค์Šต ํ™˜๊ฒฝ ์„ธํŒ…

    * ์ฐธ๊ณ : ์ด๊ฒƒ์ด_Windows_Server๋‹ค_๊ฐœ์ •ํŒ.pdf----------------------------------------------------------------AD ์‹ค์Šต ํ™˜๊ฒฝ ๊ตฌ์ถ• ----------------------------------------------------------------๋„๋ฉ”์ธ ์ปจํŠธ๋กค๋Ÿฌ = (์ฑ…) FIRST => DC01๋„๋ฉ”์ธ ๋ฉค๋ฒ„ ์ปดํ“จํ„ฐ = (์ฑ…) WinClient => WIN01, WIN02๋„๋ฉ”์ธ = (์ฑ…) hanbit.com => practice.localusers => james, john, aiden  1. ๋„๋ฉ”์ธ์ปจํŠธ๋กค๋Ÿฌ - DC01     2. ๋„๋ฉ”์ธ๋ฉค๋ฒ„ - WIN01, WIN02   3. ๋„๋ฉ”์ธ ์ปจํŠธ๋กค๋Ÿฌ ์„ค์ • ํ™•์ธ - ์‚ฌ์šฉ์ž ์ถ”๊ฐ€

    Apache์˜ CGI๋ชจ๋“ˆ - shellshock

    Apache์˜ CGI๋ชจ๋“ˆ - shellshock

    ์…ธ์‡ผํฌ | Shellshock | CVE-2014-627* ๊ฐœ๋… Unix Bash๊ฐ€ ํ™˜๊ฒฝ๋ณ€์ˆ˜๋ฅผ ํ†ตํ•ด ์ž„์˜์˜ ๋ช…๋ น์„ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ๋Š” ์ทจ์•ฝ์  (RCE) = command injection vulnerability ๋ฐœ์ƒ ์›์ธ Bash๊ฐ€ variable assignment๋ฅผ ์ฒ˜๋ฆฌํ•˜๋Š” ๋ฐฉ์‹์—์„œ ์ทจ์•ฝ์ ์ด ๋ฐœ์ƒํ•œ๋‹ค. Bash์˜ ์‰˜ ํ™˜.. jiniway.tistory.com ์œ„ ํฌ์ŠคํŒ… ์‹ค์Šต๊ณผ ๊ด€๋ จ๋œ ๋‚ด์šฉ์ž…๋‹ˆ๋‹ค ! ๋จผ์ € ์ฝ๊ณ  ์˜ค์‹œ๋Š” ๊ฒƒ์„ ์ถ”์ฒœ๋“œ๋ฆฝ๋‹ˆ๋‹ค :) ์ด ๋จธ์‹ ์—์„œ๋Š” Apache ์„œ๋ฒ„๋ฅผ ์‚ฌ์šฉํ–ˆ๊ณ , /cgi-bin ์ด๋ผ๋Š” ๋””๋ ‰ํ„ฐ๋ฆฌ์™€ user.sh CGI ์Šคํฌ๋ฆฝํŠธ๊ฐ€ ์žˆ์—ˆ์Šต๋‹ˆ๋‹ค. Q. ์™œ User-agent ํ—ค๋”์— ์‚ฝ์ž…ํ•œ ๋ช…๋ น์–ด๊ฐ€ ์‹คํ–‰๋˜๋Š” ๊ฒƒ์ผ๊นŒ? Q. ๋ฆฌ๋ฒ„์Šค์…ธ์ด ์–ด๋–ป๊ฒŒ ๋™์ž‘๋˜๋Š” ๊ฒƒ์ผ๊นŒ? ์œ„์™€ ๊ฐ™์€ ์งˆ๋ฌธ์„ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด์„œ ..