본문 바로가기

모의해킹 (WAPT)175

Testing Snort IDS with Metasploit vSploit Modules One of my key objectives for developing the new vSploit modules was to test network devices such as Snort. Snort or Sourcefire enterprise products are widely deployed in enterprises, so Snort can safely be considered the de-facto standard when it comes to intrusion detection systems (IDS). So much that even third-party intrusion detection systems often import Snort rules. Organizations are often.. 2011. 7. 11.
POC of Vsftpd backdoor discovered vsftpd version of 2.3.4 downloadable source code was compromised and a backdoor added to the code. Evans, the author of vsftpd . This module exploits a malicious backdoor that was added to the VSFTPD download archive. This backdoor was present in the vsftpd-2.3.4.tar.gz archive sometime before July 3rd 2011. The bad tarball included a backdoor in the code which would respond to a user logging in.. 2011. 7. 6.
Metasploit Framework 3.7.2 Released “The Metasploit Framework is a penetration testing toolkit, exploit development platform, and research tool. The framework includes hundreds of working remote exploits for a variety of platforms. Payloads, encoders, and nop slide generators can be mixed and matched with exploit modules to solve almost any exploit-related task.“ This is the official change log: Statistics: Metasploit now ships wi.. 2011. 6. 22.
안드로이드 앱을 통한 로그인 세션 가로채기 (Session Hijacking) 동일 네트워크(공유기)에 연결된 PC 및 스마트폰에서 접속한 로그인 세션을 가로채어 별도 로그인 없이 불특정 사용자의 개인정보 및 대부분의 권한을 가지게 됩니다. ARP Spoofing 공격으로 세션 가로채기 (Session Hijacking) 를 안드로이드 스마트폰에서 간편하게 누구나 손쉽게 가능한 앱이 등장했습니다. 스마트폰에서 사용되는 SNS 등 대부분 사이트는 세션을 통해 로그인을 유지하고 있어 세션만 가로채면 로그인 사용자의 동일한 권한을 가지게 됩니다. 초반에 트위터와 페이스북이 HTTP 통신을 사용하여 손쉽게 가능한 것이 확인되었는데.. 당시에는 스마트폰으로 직접하기는 좀 어려움이 있었는데 앱으로 손쉽게 가능합니다. 트위터와 페이스북 같이 HTTPS 보안 통신 옵션을 제공하는 사이트의 경우 .. 2011. 6. 20.
현재, 과거 USB장치 연결목록 (USBDeview/Metasploit) USBDeview v1.80 USBDeview is a small utility that lists all USB devices that currently connected to your computer, as well as all USB devices that you previously used. For each USB device, exteneded information is displayed: Device name/description, device type, serial number (for mass storage devices), the date/time that device was added, VendorID, ProductID, and more... USBDeview also allows y.. 2011. 6. 7.