[Dreamhack] Level 3: CSS Injection
ยท
CTF, War game
1. ๋ฌธ์ œhttps://dreamhack.io/wargame/challenges/421 CSS InjectionDescription Exercise: CSS Injection์—์„œ ์‹ค์Šตํ•˜๋Š” ๋ฌธ์ œ์ž…๋‹ˆ๋‹ค. ๋ฌธ์ œ ์ˆ˜์ • ๋‚ด์—ญ 2023.08.09 Dockerfile ๋ฐ bot ์ผ๋ถ€ ์ˆ˜์ • 2023.11.27 main.py ๋ฐ requirements.txt ์ˆ˜์ •dreamhack.io 2. ํ•ด๊ฒฐ ๊ณผ์ •(1) ์ฝ”๋“œ ๋ถ„์„์ „์ฒด ์ฝ”๋“œ๋”๋ณด๊ธฐ#!/usr/bin/python3import hashlib, os, binascii, random, stringfrom flask import Flask, request, render_template, redirect, url_for, session, g, flashfrom functools i..
[Dreamhack] Level 2: crawling
ยท
CTF, War game
1. ๋ฌธ์ œ https://dreamhack.io/wargame/challenges/274 crawling ๋“œ๋ฆผ์ด๋Š” ์›น ํฌ๋กค๋ง ์‚ฌ์ดํŠธ๋ฅผ ๊ตฌ์ถ•ํ–ˆ์Šต๋‹ˆ๋‹ค. ํฌ๋กค๋ง ์‚ฌ์ดํŠธ์—์„œ ์ทจ์•ฝ์ ์„ ์ฐพ๊ณ  flag๋ฅผ ํš๋“ํ•˜์„ธ์š”! ๋ฌธ์ œ ์ˆ˜์ • ๋‚ด์—ญ 2024.02.13 ํ’€์ด์ž์—๊ฒŒ ์ œ๊ณต๋˜๋Š” ํŒŒ์ผ ์ผ๋ถ€๊ฐ€ ๋ณ€๊ฒฝ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. dreamhack.io 2. ํ•ด๊ฒฐ ๊ณผ์ • ํฌ๋กค๋งํ•  URL์„ ์ž…๋ ฅํ•˜๋Š” ํ™”๋ฉด์ด ๋ณด์ธ๋‹ค. #app.py from re import split import socket import requests import ipaddress from urllib.parse import urlparse from flask import Flask, request, render_template app = Flask(__name__) app.flag ..
[Dreamhack] Level 2: login-1
ยท
CTF, War game
1. ๋ฌธ์ œ login-1python์œผ๋กœ ์ž‘์„ฑ๋œ ๋กœ๊ทธ์ธ ๊ธฐ๋Šฅ์„ ๊ฐ€์ง„ ์„œ๋น„์Šค์ž…๋‹ˆ๋‹ค. "admin" ๊ถŒํ•œ์„ ๊ฐ€์ง„ ์‚ฌ์šฉ์ž๋กœ ๋กœ๊ทธ์ธํ•˜์—ฌ ํ”Œ๋ž˜๊ทธ๋ฅผ ํš๋“ํ•˜์„ธ์š”. Reference Server-side Basicdreamhack.io2. ํ•ด๊ฒฐ ๊ณผ์ •๋ฌธ์ œ์— ์ ‘์†ํ•˜๋‹ˆ, ๋กœ๊ทธ์ธ/ ํšŒ์›๊ฐ€์ž…/๋น„๋ฐ€๋ฒˆํ˜ธ ์žฌ์„ค์ • ๊ธฐ๋Šฅ์ด ์žˆ๋Š” ํŽ˜์ด์ง€๊ฐ€ ๋ณด์ธ๋‹ค.   ๋กœ๊ทธ์ธ ํŽ˜์ด์ง€์—์„œ admin/admin ์œผ๋กœ ์ž…๋ ฅํ•ด๋ณด์•˜๋”๋‹ˆ ํ‹€๋ ธ๋‹ค๊ณ  ๋‚˜์˜จ๋‹ค.  ์ฝ”๋“œ ํ™•์ธ @app.route('/')def index(): return render_template('index.html')@app.route('/login', methods=['GET', 'POST'])def login(): if request.method == 'GET': return ..
[Dreamhack] Level 3: blind sql injection advanced
ยท
CTF, War game
1. ๋ฌธ์ œhttps://dreamhack.io/wargame/challenges/411 blind sql injection advancedDescription Exercise: Blind SQL Injection Advanced์—์„œ ์‹ค์Šตํ•˜๋Š” ๋ฌธ์ œ์ž…๋‹ˆ๋‹ค. ๊ด€๋ฆฌ์ž์˜ ๋น„๋ฐ€๋ฒˆํ˜ธ๋Š” "์•„์Šคํ‚ค์ฝ”๋“œ"์™€ "ํ•œ๊ธ€"๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. ๋ฌธ์ œ ์ˆ˜์ • ๋‚ด์—ญ 2023.07.20 Dockerfile ์ œ๊ณตdreamhack.io 2. ํ•ด๊ฒฐ ๊ณผ์ •๋ฌธ์ œ์— '๊ด€๋ฆฌ์ž์˜ ๋น„๋ฐ€๋ฒˆํ˜ธ๋Š” "์•„์Šคํ‚ค์ฝ”๋“œ"์™€ "ํ•œ๊ธ€"๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค.' ๋ผ๊ณ  ์ž‘์„ฑ๋˜์–ด ์žˆ๋‹ค. ์ฆ‰, ๋ฐ์ดํ„ฐ๊ฐ€ ๋ฐ˜๋“œ์‹œ ์•„์Šคํ‚ค ๋ฒ”์œ„๋กœ ๊ตฌ์„ฑ๋˜๋Š” ๊ฒƒ์€ ์•„๋‹ˆ๋ผ๋Š” ๊ฒƒ์ด๋‹ค.  ๋ฌธ์ œํ™”๋ฉด์—๋Š” uid๋ฅผ ์ž…๋ ฅ๋ฐ›๋Š” form์ด ์กด์žฌํ•œ๋‹ค.  test๋ฅผ ์ž…๋ ฅํ•ด๋ณด๋‹ˆ ์กด์žฌํ•œ๋‹ค๋Š” ๋ฌธ์ž์—ด์ด ..
[Dreamhcak] Level 3: Login Page
ยท
CTF, War game
๋ณดํ˜ธ๋˜์–ด ์žˆ๋Š” ๊ธ€์ž…๋‹ˆ๋‹ค.
[Dreamhack] Level 2: login-1
ยท
CTF, War game
๋ณดํ˜ธ๋˜์–ด ์žˆ๋Š” ๊ธ€์ž…๋‹ˆ๋‹ค.
[Dreamhack] Level 1: proxy-1
ยท
CTF, War game
1. ๋ฌธ์ œ https://dreamhack.io/wargame/challenges/13 proxy-1 Raw Socket Sender๊ฐ€ ๊ตฌํ˜„๋œ ์„œ๋น„์Šค์ž…๋‹ˆ๋‹ค. ์š”๊ตฌํ•˜๋Š” ์กฐ๊ฑด์„ ๋งž์ถฐ ํ”Œ๋ž˜๊ทธ๋ฅผ ํš๋“ํ•˜์„ธ์š”. ํ”Œ๋ž˜๊ทธ๋Š” flag.txt, FLAG ๋ณ€์ˆ˜์— ์žˆ์Šต๋‹ˆ๋‹ค. Reference Introduction of Webhacking dreamhack.io 2. ํ•ด๊ฒฐ ๊ณผ์ • ์ฝ”๋“œ๋ฅผ ํ™•์ธํ•ด๋ณด๋ฉด 127.0.01 ๋กœ์ปฌํ˜ธ์ŠคํŠธ์ผ ๊ฒฝ์šฐ์—๋งŒ admin ์ ‘๊ทผ์„ ํ—ˆ๋ฝํ•œ๋‹ค. ์ฆ‰, Burp suite๋ฅผ ์ด์šฉํ•ด์„œ ์กฐ์ž‘ํ•  ์ˆ˜ ์—†์„ ๊ฒƒ์ด๋‹ค. @app.route('/admin', methods=['POST']) def admin(): if request.remote_addr != '127.0.0.1': return 'Only localhost' i..
[Dreamhack] Level 3: XSS Filtering Bypass Advanced
ยท
CTF, War game
1. ๋ฌธ์ œ https://dreamhack.io/wargame/challenges/434 XSS Filtering Bypass Advanced Description Exercise: XSS Filtering Bypass์˜ ํŒจ์น˜๋œ ๋ฌธ์ œ์ž…๋‹ˆ๋‹ค. ๋ฌธ์ œ ์ˆ˜์ • ๋‚ด์—ญ 2023.08.04 Dockerfile ์ œ๊ณต dreamhack.io 2. ํ•ด๊ฒฐ ๊ณผ์ • ๋ฌธ์ œ ํŽ˜์ด์ง€์™€ ์ „๋ฐ˜์ ์ธ ์ฝ”๋“œ๋Š” ๋‹ค๋ฅธ xss ๋ฌธ์ œ์™€ ๊ฐ™๋‹ค. ํ•„ํ„ฐ๋ง ๋ถ€๋ถ„์˜ ์ฝ”๋“œ๋ฅผ ์‚ดํŽด๋ณด์•„์•ผ ํ•œ๋‹ค. ์ผ๋‹จ, script, on, javascript๋Š” ๋ชจ๋‘ ํ•„ํ„ฐ๋งํ•˜๊ณ  ์žˆ๋‹ค. ์ฆ‰, ์™€ location href, onerror, ๋“ฑ์ด ํ•„ํ„ฐ๋ง ๋œ๋‹ค. ์ถ”๊ฐ€๋กœ window ๋“ฑ์ด ํ•„ํ„ฐ๋ง ๋˜์–ด์žˆ๋‹ค. document.cookie alert(document["\u0063ook" + "ie..
[Dreamhack] Level 1: XSS Filtering Bypass
ยท
CTF, War game
1. ๋ฌธ์ œ https://dreamhack.io/wargame/challenges/433 XSS Filtering Bypass Description Exercise: XSS Filtering Bypass์—์„œ ์‹ค์Šตํ•˜๋Š” ๋ฌธ์ œ์ž…๋‹ˆ๋‹ค. ๋ฌธ์ œ ์ˆ˜์ • ๋‚ด์—ญ 2023.08.04 Dockerfile ์ œ๊ณต dreamhack.io 2. ํ•ด๊ฒฐ๊ณผ์ • ์ „๋ฐ˜์ ์ธ ์ฝ”๋“œ๋Š” ๋“œ๋ฆผํ•ต ๋‚ด์˜ xss ๋ฌธ์ œ์˜ ์ฝ”๋“œ์™€ ๋น„์Šทํ•˜๋‹ค. ํ•˜์ง€๋งŒ ํ•ด๋‹น ์ฝ”๋“œ๋Š” ๋ฌธ์ž์—ด์„ ๊ณต๋ฐฑ์œผ๋กœ ํ•„ํ„ฐ๋งํ•˜๋Š” ์ฝ”๋“œ๊ฐ€ ํฌํ•จ๋˜์–ด ์žˆ๋‹ค. def xss_filter(text): _filter = ["script", "on", "javascript:"] for f in _filter: if f in text.lower(): text = text.replace(f, "") return tex..
[Dreamhack] Level 1: xss-2
ยท
CTF, War game
1. ๋ฌธ์ œ https://dreamhack.io/wargame/challenges/268 xss-2 ์—ฌ๋Ÿฌ ๊ธฐ๋Šฅ๊ณผ ์ž…๋ ฅ๋ฐ›์€ URL์„ ํ™•์ธํ•˜๋Š” ๋ด‡์ด ๊ตฌํ˜„๋œ ์„œ๋น„์Šค์ž…๋‹ˆ๋‹ค. XSS ์ทจ์•ฝ์ ์„ ์ด์šฉํ•ด ํ”Œ๋ž˜๊ทธ๋ฅผ ํš๋“ํ•˜์„ธ์š”. ํ”Œ๋ž˜๊ทธ๋Š” flag.txt, FLAG ๋ณ€์ˆ˜์— ์žˆ์Šต๋‹ˆ๋‹ค. ํ”Œ๋ž˜๊ทธ ํ˜•์‹์€ DH{...} ์ž…๋‹ˆ๋‹ค. ๋ฌธ์ œ ์ˆ˜์ • ๋‚ด์—ญ dreamhack.io 2. ํ•ด๊ฒฐ ๊ณผ์ • xss-1๊ณผ ์ฝ”๋“œ๋Š” ๋น„์Šทํ•˜์ง€๋งŒ, ํฐ ์ฐจ์ด์ ์ด ์žˆ๋‹ค. @app.route("/vuln") def vuln(): return render_template("vuln.html") ์ด ๋ถ€๋ถ„์ด๋‹ค. ๋™์ ์œผ๋กœ ํ…œํ”Œ๋ฆฟ์„ ๋ Œ๋”๋งํ•˜๊ธฐ ๋•Œ๋ฌธ์— ์ด์ „ xss-1์—์„œ๋Š” ํŒŒ๋ฆฌ๋ฏธํ„ฐ๋ฅผ ์ง์ ‘ ๋ฐ˜ํ™˜ํ•˜๋Š” ๋ฐฉ์‹๊ณผ ๋‹ค๋ฅด๋‹ค. ๋”ฐ๋ผ์„œ, vuln ํŽ˜์ด์ง€์—์„œ ๋‹ค์–‘ํ•œ ํŒŒ๋ผ๋ฏธํ„ฐ๋ฅผ ๋„ฃ์–ด ์–ด๋–ค ํƒœ๊ทธ๊ฐ€ ์‹คํ–‰..
mnzy๐ŸŒฑ
'CTF, War game' ์นดํ…Œ๊ณ ๋ฆฌ์˜ ๊ธ€ ๋ชฉ๋ก (3 Page)
-->