๐ŸŒ†โ”‚Web_Study/๐Ÿ”ฌโ”‚DVWA

DVWA Training - Command Injection

Jastes 2023. 2. 19. 14:01

Command Injection(๋ช…๋ น์–ด ์‚ฝ์ž… ๊ณต๊ฒฉ)

์ •์˜
๐Ÿ’กCmd(/bin/bash, SetUID, etc..)์˜ ์‹คํ–‰ ๊ถŒํ•œ์œผ๋กœ ๋ช…๋ น์–ด๋ฅผ ์‚ฝ์ž…/๊ณต๊ฒฉ ํ–‰์œ„

syscall๊ณผ ๊ฐ™์€ shell ์‹คํ–‰ ๊ถŒํ•œ์ด ์žˆ๋Š” ๊ธฐ๋Šฅ์„ ์ด์šฉํ•˜์—ฌ ๊ณต๊ฒฉ ๋ช…๋ น์–ด๋ฅผ ์‚ฝ์ž…/๊ณต๊ฒฉํ•˜๋Š” ํ–‰์œ„์ด๋ฉฐ,
์‹œ์Šคํ…œ ํ•จ์ˆ˜์—์„œ ์ฃผ๋กœ ์‚ฌ์šฉ๋ฉ๋‹ˆ๋‹ค.(์šฐํšŒ ์‹œ ๊ฐœ๋ฐœ ๋‚œ์ด๋„ ↑ ์•ˆ๋˜๋Š” ๊ฒฝ์šฐ๋„ ์žˆ๊ณ ..)

 

CI์ด๋ผ๊ณ  ๋ถˆ๋ฆฌ๋ฉฐ, ์ด์ œ ์ˆ˜๋งŽ์€ ์—ฐ๊ณ„ ์ทจ์•ฝ์ ์œผ๋กœ๋„ ์ด์–ด์ง‘๋‹ˆ๋‹ค.
์ด ๋ถ€๋ถ„์€ ๋‹ค๋ฅธ OWASP10๊ณผ ์—ฐ๊ด€์ด ๋˜์–ด ์žˆ๊ธฐ๋„ ํ•˜๋‹ˆ ์ด ๋ถ€๋ถ„์€ ์•„๋ก€ ์ด๋ฏธ์ง€๋กœ ํ™•์ธํ•ด๋ด…์‹œ๋‹ค.


๊ณต๊ฒฉ ์œ ํ˜•

์ผ๋ฐ˜์ ์œผ๋กœ syscall์˜ ์ทจ์•ฝํ•œ ํ•จ์ˆ˜์—์„œ ์ด์šฉํ•ฉ๋‹ˆ๋‹ค. ์–ด๋–ค ์‹์œผ๋กœ ์ ‘๊ทผํ•˜๋Š”์ง€ ์ข…๋ฅ˜๋กœ ๋‚˜๋ˆˆ๋‹ค๋ฉด..

์•Œ๋œฐ์‹ ์žก
๐Ÿ’ก๋ฐ”์ธ๋“œ ์‰˜[Bind Shell]
: Server์—์„œ ํฌํŠธ๊ฐ€ ์—ด๋ ค์žˆ์œผ๋ฉฐ, ํด๋ผ์ธก์ด ์ ‘์†ํ•ด ์‰˜์„ ํš๋“

- ์ผ๋ฐ˜์ ์œผ๋กœ ๊ฐ€์žฅ ๋งŽ์ด ํ†ต์šฉ๋˜๋Š” ๋ฐฉ์‹(Ex. SSH, Telnet, nc, etc..)

๐Ÿ’ก๋ฆฌ๋ฒ„์Šค ์‰˜[Reverse Shell]
: ํด๋ผ ์ธก์ด ์„œ๋ฒ„๋ฅผ ์—ด๊ณ  ์„œ๋ฒ„์—์„œ ์ ‘์†ํ•˜๋Š” ํ˜•ํƒœ

- ๋ฐฉํ™”๋ฒฝ์— ์˜ํ•˜์—ฌ ์‚ฌ์šฉํ•˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋‹ค๋ฐ˜์ด๋ฉฐ, ๋ฐฉํ™”๋ฒฝ์˜ ์•ฝ์ ์„ ๊ณต๊ฒฉํ•จ
L ์™ธ๋ถ€ → ๋‚ด๋ถ€๋Š” ๋ณดํ˜ธ/ ๋‚ด๋ถ€ → ์™ธ๋ถ€ ๋ณดํ˜ธ X ๊ฒฝํ–ฅ

CI์˜ ํ•ต์‹ฌ์€ ์‰˜์„ ํš๋“ํ•˜์—ฌ ์ปค๋„์„ ์กฐ์ž‘ํ•˜๋Š” ๋ฐฉ์‹์ด๋ฏ€๋กœ ์‹œ์Šคํ…œ ๋ณด์•ˆ ๊ด€์ ์—์„œ๋„
์œ ์‚ฌํ•˜๊ฒŒ ๋ณผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด์™€ ๋น„์Šทํ•œ ๋ฐฉ์‹์˜ ๊ตฌ์กฐ(๋„คํŠธ์›Œํฌ ๊ด€์ ์ด๋ผ ๋‹ค ๋น„์Šทํ•˜๋„ค์š”)
์•„๋ก€ ๋งํฌ์— ์žˆ์œผ๋‹ˆ ์ฐธ๊ณ ๋กœ ๋ณด์…”๋„ ์ข‹์„ ๋“ฏ ์‹ถ๋„ค์š”

 

Proxy meaning

ํ”„๋ก์‹œ(Proxy)๋ž€? ์˜๋ฌธ ์˜๋ฏธ๋ก  "๋Œ€๋ฆฌ"๋ผ๋Š” ์˜๋ฏธ๋ฅผ ๊ฐ–์Œ ํ”„๋ก์‹œ ์„œ๋ฒ„๋กœ์จ Client๊ฐ€ ์ž์‹ ์„ ํ†ตํ•ด์„œ ๋‹ค๋ฅธ ๋„คํŠธ์›Œํฌ ์„œ๋น„์Šค๋ฅผ ๊ฐ„์ ‘์ ์œผ๋กœ ์ ‘์†ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•ด์ฃผ๋Š” ์ปดํ“จํ„ฐ ์‹œ์Šคํ…œ์ด๋‚˜ ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ์„

dystopia050119.tistory.com


WriteUp

์œ„์™€ ๊ฐ™์ด ์‹คํ–‰ํ•˜์‹œ๊ณ .. ์›๋ž˜๋Œ€๋กœ ์‹คํ–‰์„ ํ•œ๋‹ค๋ฉด Ping a device(IP addr connetcion)
CI์˜ ์ทจ์•ฝ์ ์„ ํ™œ์šฉํ•˜์—ฌ ๊ฐ™์€ CI ๊ณต๊ฒฉ์„ ์ทจํ•œ ๋ชจ์Šต์ž…๋‹ˆ๋‹ค.

 

์ด ๋ถ€๋ถ„์€ ์ œ๊ฐ€ Hacker School FTZ์™€ ๊ฐ™์€ ๊ณณ์—์„œ ์ž์ฃผ ํ•œ ๋ถ€๋ถ„์ด๋ผ์„œ..

 

HackerSchool_level3

Level3 ๋ฌธ์ œํ’€์ด Keyword : System() func weakness ๋ฌธ์ œ ํŒŒ์•… ์ด์ „์ด๋ž‘ ๋น„๊ตํ•˜๋ฉด ํž˜๋“ค์–ด๋ณด์ด๋„ค์š” ใ…  ์ € ์ฝ”๋“œ๋ฅผ ๋œฏ์–ด๋ด…์‹œ๋‹น~ ์ด์   ์ € ์œ„ C์–ธ์–ด์˜ ์†Œ์Šค์ฝ”๋“œ์˜ ์ž‘๋™ ์ˆœ์„œ๋ฅผ ์•„์‹œ๊ณ  autodig ํŒŒ์ผ ์ฐพ์„๊นŒ์š”? autodig

dystopia050119.tistory.com

์œ„์— ์ž๋ฃŒ๋ฅผ ์ฐธ๊ณ  ํ•˜์‹œ๊ธธ ๋ฐ”๋ž๋‹ˆ๋‹น ใ…Ž

php๋ฅผ ์ž˜ ์•„๋Š”๊ฑด ์•„๋‹ˆ์ง€๋งŒ ์–ด๋Š์ •๋„์˜ ์‹ค๋ ฅ์œผ๋กœ ๋ถ„์„ํ•˜์ž๋ฉด..

  • ์‚ฌ์šฉ์ž์˜ ์ž…๋ ฅ์„ ๊ทธ๋Œ€๋กœ ๋ฐ›์Œ(POST ๋ฐฉ์‹)
    - ๋ฐ›์€ ์š”์ฒญ์„ target์— ๋„ฃ์–ด์คŒ(์ค‘๊ฐ„ ํ•„ํ„ฐ๋ง X)
    - cmd ์˜ ํ•จ์ˆ˜์— ํ•ด๋‹น ๋ช…๋ น์–ด๋ฅผ ์‹คํ–‰

์ด์™€ ๊ฐ™์ด ์ทจ์•ฝ์ ์„ ํ™•์ธ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.


Exploit code

 

How to Brute Force DVWA login with Python

In this article, I want to show you one of the most known attacks in the cybersecurity field. And as

stackzero.net

์œ„์— ์ž๋ฃŒ๋ฅผ ๋ณด๊ณ  ์ž‘์„ฑํ•˜์˜€์Šต๋‹ˆ๋‹ค.
์›น ๋ณด์•ˆ์— ๋Œ€ํ•˜์—ฌ ๊ณต๋ถ€๋ฅผ ๋งŽ์ด ๋ชปํ•œ ์ƒํƒœ๋ผ์„œ.. ใ…  ์ถ”ํ›„์— ๊ณต๋ถ€ ํ›„ ๋˜ ์ •๋ฆฌํ•ด๋ด์•ผ๊ฒ ๋„ค์š”
(ํˆดํ‚ค๋””๊ฐ€ ๋˜๋ฉด ์•ˆ๋˜๋‹ˆ๊นŒ์š”)

Exploit code

ํ•ด๋‹น ๊ตฌ์„ฑ ์š”์†Œ๋Š” burp suite์—์„œ ํ™•์ธ ํ•  ์ˆ˜ ์žˆ์—ˆ์œผ๋ฉฐ, ๊ธฐ์ดˆ์ ์ธ ํ‹€์€ ์œ„์— ๋งํฌ ๋ณด๊ณ  ์ฐธ๊ณ ํ–ˆ์Šต๋‹ˆ๋‹ค.
์†”์งํžˆ ํŒŒ์ด์ฌ ์ข€ ๋”... ๋ฐฐ์›Œ์•ผํ• ๊ฑฐ ๊ฐ™์•„์š” ใ… 


๋ณด์•ˆ ๋ฐฉ์‹

์ด ๋ถ€๋ถ„์€ ์•„๋ฌด๋ž˜๋„ ํฌ๊ฒŒ ์•”ํ˜ธํ™” ๋น„๋ฒˆ์˜ ๋ณต์žก๋„๋ฅผ ํ–ฅ์ƒ์‹œํ‚จ๋‹ค๋˜์ง€,
์ง€์—ฐ ์‹œ๊ฐ„์„ ์ฃผ๋˜์ง€, ์ž…๋ ฅ ํšŸ์ˆ˜ ์ œํ•œ ๋“ฑ์˜ ๋ฐฉ์‹์ด ์žˆ๊ฒ ์ฃ ?
์ •ํ™•ํ•œ ๋ถ€๋ถ„์€ PHP ์ฝ”๋“œ๋ฅผ ํ™•์ธํ•ด์•ผ์ง€๋งŒ.. High ๋ฌธ์ œ ํ’€๋ฉด์„œ ๊ฐ™์ด ์•Œ์•„๋ณผ๊ป˜์š”

 

How Secure Is My Password? | Password Strength Checker

Data breaches and identity theft are on the rise, and the cause is often compromised passwords. After stealing credentials, cybercriminals can use passwords to

www.security.org

์šฐ๋ฆฌ์˜ ๋น„๋ฒˆ์œผ๋กœ๋Š” 10^-24s ๋งŒ์— ํ’€๋ ค๋ฒ„๋ฆฐ๋‹ค๊ณ  ํ•˜๋„ค์š”


์ฐธ๊ณ  ์ž๋ฃŒ

 

What is command injection and how to exploit it

In this article I want to introduce you to command injection with a very simple practical example.I also suggest you

stackzero.net

์ฐธ๊ณ  ์ด๋ฏธ์ง€

 

What is OS command injection, and how to prevent it? | Web Security Academy

In this section, we'll explain what OS command injection is, describe how vulnerabilities can be detected and exploited, spell out some useful commands and ...

portswigger.net