전체 글
-
[iOS] Exit Function Hook#1 - Security/iOS 2020. 11. 25. 14:32
iOS 진단하다 탈옥 탐지 문구도 없이 앱 종료가 발생한다.. 그래서 생각해낸 방법은 exit 함수 훅걸어서 BackTrace 로 타고타고 올라감 var exit = Module.findExportByName('libSystem.B.dylib', 'exit'); Interceptor.attach(exit, { onEnter: function (args) { console.log("[*] exit Call"); console.log('\tBacktrace:\n\t' + Thread.backtrace(this.context, Backtracer.ACCURATE).map(DebugSymbol.fromAddress) .join('\n\t')); }, onLeave: function (retval) { } });
-
H@cktivitycon - Just not interesting(Mobile)#1 - Security/CTF 2020. 8. 12. 13:09
JNI 에서 로그인 처리함 Java_com_example_justnotinteresting_MainActivity_checkUsername 부분 확인 입력값과 admin 비교 -> ID 는 admin Java_com_example_justnotinteresting_MainActivity_checkPassword 부분 확인 byte_9FB 값과 NOTFLAG(the_fLag_ISN'T_here!!!!) 스트링 XOR 결과값이 flag인듯 대회떄는 미리 짜둔 Frida strncmp 후킹 스크립트로 돌려봤는데 값이 제대로 안나와서.. xor 연산했다 def decrypt(): byte_list = [0x28,0x23,0x35,0x21,0x37,0x2C,0x26,0x51,0x16,0xD, 0x3A, 0x3E,..
-
Shared Object(.so) 로드 순서#1 - Security/Android 2020. 8. 10. 16:55
1. System.loadlibrary('abc.so') --> Runtime.Load()-->Runtime.nativeLoad()-->Dalvik_java_lang_Runtime_nativeLoad() --> dvmLoadNativeCode() 2. dlopen > call_function > preinit_array->.init -> .init_array section 3. dlsym > jni_onload (매핑되어있다면 생략가능)
-
SSRF Payload#1 - Security/Web 2020. 7. 13. 15:15
Server-Side Request Forgery 127.0.0.1 BYPASS - http://localhost - http://[::]/ - http://[::]:8080 - http://0000::1/ - http://0:8080 - http://:8080 - http://[0:0:0:0:0:ffff:127.0.0.1] - http://0177.0.0.1 - http://2130706433 (Demical) - http://7f.00.00.01 (Hex) - http://0x7f000001 (Hex) - http://127.0.1 - http://127.1 URI Schemae - File:///etc/passwd - File://\/\/etc/passwd - FTP:// - TELNET:// - ..