Jastes 2023. 2. 11. 18:49

Brute Force(๋ฌด์ฐจ๋ณ„ ๋Œ€์ž… ๊ณต๊ฒฉ)

์ •์˜
๐Ÿ’ก์•”ํ˜ธํ•™์—์„  ํŠน์ •์•”ํ˜ธ(๋น„๋ฒˆ ๋“ฑ)์„ ํ’€๊ธฐ ์œ„ํ•ด ๊ฐ€๋Šฅํ•œ ๋ชจ๋“  ๊ฐ’์„ ๋Œ€์ž…ํ•˜๋Š” ํ–‰์œ„

ํ•ด๋‹น ํŠน์ง•์œผ๋กœ ์ธํ•˜์—ฌ ์ปดํ“จํ„ฐ ์„ฑ๋Šฅ์— ๋”ฐ๋ฅธ ์˜ํ–ฅ์„ ๊ฐ€์žฅ ๋งŽ์ด ๋ฐ›์œผ๋ฉฐ,
๋น„๋ฒˆ์˜ ๋ณต์žก๋„์™€ ๊ธธ์ด์— ๋”ฐ๋ผ ์ˆ˜ํ–‰ํ•˜๋Š” ์‹œ๊ฐ„์ด ๋‹ฌ๋ผ์ง‘๋‹ˆ๋‹ค. ์ด๋ก ์ƒ ๋ชจ๋“  ์•”ํ˜ธ๋ฅผ ํ’€ ์ˆ˜ ์žˆ์œผ๋ฉฐ..
๊ฐ€์žฅ ๊ธฐ์ดˆ์ ์ธ ๊ณต๊ฒฉ๊ธฐ๋ฒ•์ด์ž, ์‘์šฉํ•œ ๋ฒ„์ „์ด ๋ ˆ์ธ๋ณด์šฐ ํ…Œ์ด๋ธ” ๊ณต๊ฒฉ!!(ํ•ด๋‹น ๋ถ€๋ถ„์€ ์ƒ์„ธ ๋‚ด์šฉ์€ ๋‚˜์ค‘์—.. ใ… )


๊ณต๊ฒฉ ์œ ํ˜•

์ผ๋ฐ˜์ ์œผ๋กœ ๊ฐ€๋Šฅํ•œ ๋ชจ๋“  ์กฐํ•ฉ์„ ์‹œ๋„ํ•ฉ๋‹ˆ๋‹ค. ์–ด๋–ค ์‹์œผ๋กœ ์ ‘๊ทผํ•˜๋Š”์ง€ ์ข…๋ฅ˜๋กœ ๋‚˜๋ˆˆ๋‹ค๋ฉด..

  1. ์—ญ ๋ฌด์ฐจ๋ณ„ ๋Œ€์ž… ๊ณต๊ฒฉ
    : ํ”ํ•œ ๋น„๋ฒˆ์„ ์ถ”์ถœํ•˜์—ฌ ๋ฐ˜๋ณต์ ์œผ๋กœ ์‹œ๋„(Ex. root, admin, etc..)
  2. ์‚ฌ์ „ ๊ณต๊ฒฉ(Dictionary)
    : ์œ„์™€ ์œ ์‚ฌํ•˜๊ฒŒ ์ทจ์•ฝํ•œ ๋น„๋ฒˆ์„ ์‚ฌ์ „์œผ๋กœ ๋งŒ๋“ค์–ด ๋Œ๋ ค๊ฐ€๋ฉฐ ์‹œ๋„
  3. ๋ ˆ์ธ๋ณด์šฐ ํ…Œ์ด๋ธ” ๊ณต๊ฒฉ
    : ํ‰๋ฌธ ๋น„๋ฒˆ๊ณผ ๊ฐ ๋น„๋ฒˆ์˜ ํ•ด์‹œ๊ฐ’์ด ์ €์žฅ๋œ ์‚ฌ์ „์„ ๊ณ„์‚ฐ ํ…Œ์ด๋ธ”๋กœ ์ œ์ž‘ ํ›„ ๋Œ€์ž… ๊ณต๊ฒฉ

WriteUp

์œ„์™€ ๊ฐ™์ด ์‹คํ–‰ํ•˜์‹œ๊ณ .. ๋‹จ Username์ด "admin"์ด๋ผ๋Š” ์กฐ๊ฑด์œผ๋กœ ์‹คํ–‰ํ•ฉ๋‹ˆ๋‹ค

php๋ฅผ ์ž˜ ์•„๋Š”๊ฑด ์•„๋‹ˆ์ง€๋งŒ ์–ด๋Š์ •๋„์˜ ์‹ค๋ ฅ์œผ๋กœ ๋ถ„์„ํ•˜์ž๋ฉด..

  • ์‚ฌ์šฉ์ž์˜ ์ž…๋ ฅ์„ ๊ทธ๋Œ€๋กœ ๋ฐ›์Œ(GET ๋ฐฉ์‹; URL๋กœ ์ „์†ก)
    - ์ž…๋ ฅ ๋ฐ›์€ Pass๋ฅผ MD5์œผ๋กœ ์•”ํ˜ธํ™”
    - ์งœํ”ผ ์ž…๋ ฅ ๋ฐ›์€ ์•”ํ˜ธ๋ฅผ ์•”๋ณตํ˜ธํ™” ํ•˜๋Š”๊ฑฐ๋ผ ์‹ ๊ฒฝ์“ธ ํ•„์š”๋Š” ์—†์Œ
  • SQL๋ฌธ์„ ํ†ตํ•ด ๊ฒฐ๊ณผ ์ถœ๋ ฅ(์‹ ๊ฒฝ ใ„ดใ„ด) 

์ด๊ฑฐ ์บก์ฒ˜๋ฅผ ์ž˜๋ชปํ•ด์„œ ๊ทธ๋Ÿฐ๋ฐ Intruder๋กœ ๋“ค์–ด๊ฐ€์•ผํ•ด์š” ใ… 

๊ทธ๋ฆฌ๊ณ  ๋ฐ”๋กœ brute force๋ฅผ ํ•ด์•ผํ•˜์ง€๋งŒ.. ์ข€ ๋” ์ „๋ฌธ์ ์œผ๋กœ directory brute force๋ฅผ ํ•ด๋ด…์‹œ๋‹ค.
kali linux์—์„  John์ด๋ผ๋Š” ํˆด(brute force tools)์˜ password list๋ฅผ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค.

/usr/share/john/password.lst

๊ทธ๋Ÿผ ์‹คํ–‰์„ ์™ผ์ชฝ ์ด๋ฏธ์ง€์—์„œ ์˜ค๋ฅธ์ชฝ Start attack์„ ๋ˆ„๋ฅด์‹œ๊ณ  ํ•ด๋ด…์‹œ๋‹น

๊ณต๊ฒฉ์„ ์‹คํ–‰ํ•ด๋ณด๋ฉด password(์‹ค์ œ๋ก  "p@55w0rd")๋กœ ์ž…๋ ฅ ์‹œ Length์˜ ๋ณ€ํ™”๋ฅผ ๋ณด๋ฉฐ,
Response์˜ ๋‚ด์šฉ์„ ํ™•์ธํ•˜๋ฉด.. admin ๊ณ„์ •์œผ๋กœ ํ†ต๊ณผ๋œ ๋ชจ์Šต์„ ๋ณผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๊ทธ๋Ÿผ Python ์ฝ”๋“œ๋ฅผ ์ณ์„œ ํ•œ ๋ฒˆ ๋™์ž‘์„ ์‹œ๋„ํ•ด๋ณผ๊นŒ์š”?


Exploit code

 

How to Brute Force DVWA login with Python

In this article, I want to show you one of the most known attacks in the cybersecurity field. And as

stackzero.net

์œ„์— ์ž๋ฃŒ๋ฅผ ๋ณด๊ณ  ์ž‘์„ฑํ•˜์˜€์Šต๋‹ˆ๋‹ค.
์›น ๋ณด์•ˆ์— ๋Œ€ํ•˜์—ฌ ๊ณต๋ถ€๋ฅผ ๋งŽ์ด ๋ชปํ•œ ์ƒํƒœ๋ผ์„œ.. ใ…  ์ถ”ํ›„์— ๊ณต๋ถ€ ํ›„ ๋˜ ์ •๋ฆฌํ•ด๋ด์•ผ๊ฒ ๋„ค์š”
(ํˆดํ‚ค๋””๊ฐ€ ๋˜๋ฉด ์•ˆ๋˜๋‹ˆ๊นŒ์š”)

Exploit code

ํ•ด๋‹น ๊ตฌ์„ฑ ์š”์†Œ๋Š” burp suite์—์„œ ํ™•์ธ ํ•  ์ˆ˜ ์žˆ์—ˆ์œผ๋ฉฐ, ๊ธฐ์ดˆ์ ์ธ ํ‹€์€ ์œ„์— ๋งํฌ ๋ณด๊ณ  ์ฐธ๊ณ ํ–ˆ์Šต๋‹ˆ๋‹ค.
์†”์งํžˆ ํŒŒ์ด์ฌ ์ข€ ๋”... ๋ฐฐ์›Œ์•ผํ• ๊ฑฐ ๊ฐ™์•„์š” ใ… 


๋ณด์•ˆ ๋ฐฉ์‹

์ด ๋ถ€๋ถ„์€ ์•„๋ฌด๋ž˜๋„ ํฌ๊ฒŒ ์•”ํ˜ธํ™” ๋น„๋ฒˆ์˜ ๋ณต์žก๋„๋ฅผ ํ–ฅ์ƒ์‹œํ‚จ๋‹ค๋˜์ง€,
์ง€์—ฐ ์‹œ๊ฐ„์„ ์ฃผ๋˜์ง€, ์ž…๋ ฅ ํšŸ์ˆ˜ ์ œํ•œ ๋“ฑ์˜ ๋ฐฉ์‹์ด ์žˆ๊ฒ ์ฃ ?
์ •ํ™•ํ•œ ๋ถ€๋ถ„์€ PHP ์ฝ”๋“œ๋ฅผ ํ™•์ธํ•ด์•ผ์ง€๋งŒ.. High ๋ฌธ์ œ ํ’€๋ฉด์„œ ๊ฐ™์ด ์•Œ์•„๋ณผ๊ป˜์š”

 

How Secure Is My Password? | Password Strength Checker

Data breaches and identity theft are on the rise, and the cause is often compromised passwords. After stealing credentials, cybercriminals can use passwords to

www.security.org

์šฐ๋ฆฌ์˜ ๋น„๋ฒˆ์œผ๋กœ๋Š” 10^-24s ๋งŒ์— ํ’€๋ ค๋ฒ„๋ฆฐ๋‹ค๊ณ  ํ•˜๋„ค์š”


์ฐธ๊ณ  ์ž๋ฃŒ

 

How to Brute Force DVWA login with Python

In this article, I want to show you one of the most known attacks in the cybersecurity field. And as

stackzero.net

๋”๋ณด๊ธฐ

 

 

Python์˜ requests ๋ชจ๋“ˆ์„ ํ†ตํ•œ DVWA-Low Brute Force ์ž๋™ํ™” ์ฝ”๋“œ

1234567891011121314151617181920212223242526import requestsimport sysfrom bs4 import BeautifulSoupimport re #loginlogin_url = 'http://192.168.10.100/dvwa/vulnerabilities/brute/'proxies ={'http': 'http://localhost:9000'}session={'security':'low', 'PHPSESSID'

johyungen.tistory.com

 

 

[๋นก๊ณตํŒŸ 5๊ธฐ] W5 : DVWA ์‹ค์Šต - Brute Force

[DVWA ์‹ค์Šตํ™˜๊ฒฝ] ๊ฐ€์ƒ๋จธ์‹ ์—์„œ kali Linux ๋กœ Docker ๋ฅผ ์ด์šฉํ•˜์—ฌ ์„œ๋ฒ„๋ฅผ ๊ตฌ์ถ•ํ–ˆ๋‹ค. [Brute Force ๊ณต๊ฒฉ์˜ ์ •์˜] ๋ฌด์ฐจ๋ณ„ ๋Œ€์ž… ๊ณต๊ฒฉ์ด๋ผ๊ณ  ๋ถˆ๋ฆฌ๋ฉฐ ํŠน์ •ํ•œ ์•”ํ˜ธ ๊ฐ’์„ ์•Œ์•„๋‚ด๊ธฐ ์œ„ํ•ด์„œ ๊ฐ€๋Šฅํ•œ ๊ฐ’์„ ๋ชจ๋‘ ๋Œ€์ž…ํ•˜

uksohun1.tistory.com

 

 

ํŒŒ์ด์ฌ requests 2. text์™€ content

ํŒŒ์ด์ฌ requests 2๋ฒˆ์งธ ๊ฐ•์˜๋Š” text์™€ content์ž…๋‹ˆ๋‹ค. 0. ๊ธฐ์ดˆ ์„ค๋ช… ์—ฌ๋Ÿฌ๋ถ„๋“ค์ด ์‚ฌ์šฉํ•˜๊ณ  ๊ณ„์‹  ์ธํ„ฐ๋„ท์€ ๋ชจ๋‘ html(HyperText Mark-up Language)๋กœ ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. ๋ณด๊ธฐ ์ข‹๊ฒŒ ๋˜์–ด์žˆ๋Š” ๋„ค์ด๋ฒ„์˜ ๋ฉ”์ธํ™”๋ฉด๋„ ์œ„์ฒ˜

marisara.tistory.com

 

 

Brute force attack: A definition + 6 types to know | Norton

Brute force attacks use trial and error hacking methods to guess your credentials and gain unauthorized access to a system. Learn how to stay protected.

us.norton.com

์ฐธ๊ณ  ์ด๋ฏธ์ง€

 

Brute force attack: A definition + 6 types to know | Norton

Brute force attacks use trial and error hacking methods to guess your credentials and gain unauthorized access to a system. Learn how to stay protected.

us.norton.com