Home Blog
Blog
Cancel

Blog

HVFUZZ

1. HVFUZZ 1-1) Summary Hyper-V Fuzzer using hAFL2 This fuzzer was manufactured based on hAFL2, and HyperViperโ€™s technology is partially included. Since the targets of these two fuzzers were ...

C์™€ C++ ์ฝ”๋“œ์—์„œ ๋ฉ”๋ชจ๋ฆฌ ์˜ค๋ฅ˜๋ฅผ ๊ฐ์ง€ํ•˜๋Š” ๋„๊ตฌ | Address Sanitizer

C์™€ C++์€ ๊ฐ•๋ ฅํ•œ ํ”„๋กœ๊ทธ๋ž˜๋ฐ ์–ธ์–ด์ด์ง€๋งŒ, ๋ฉ”๋ชจ๋ฆฌ ๊ด€๋ฆฌ์— ๊ด€ํ•œ ์ทจ์•ฝ์ (ํ˜น์€ ๋ฒ„๊ทธ)๊ฐ€ ์กด์žฌํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋ฉ”๋ชจ๋ฆฌ ์˜ค๋ฅ˜๋Š” ํ”„๋กœ๊ทธ๋žจ์—์„œ ์น˜๋ช…์ ์ธ ๊ฒฐํ•จ์„ ์ผ์œผํ‚ฌ ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๊ฐœ๋ฐœ ๋‹จ๊ณ„์—์„œ ๋ถ€ํ„ฐ ์ด๋Ÿฌํ•œ ์˜ค๋ฅ˜๋ฅผ ๋ฏธ๋ฆฌ ์ฐพ์•„๋‚ด๊ณ  ์˜ˆ๋ฐฉํžˆ๊ธฐ๋Š” ์—ฌ๊ฐ„ ์–ด๋ ค์šด๊ฒŒ ์•„๋‹ˆ์ฃ . ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด Google์—์„œ๋Š” Sanitizers๋ผ๋Š” ํ”„๋กœ์ ํŠธ๋ฅผ ๊ณต๊ฐœํ–ˆ์Šต๋‹ˆ๋‹ค. ์ด ...

ํผ๋„ˆ๋ธ”/๋ฆฌ๋ฒ„์‹ฑ์„ ์œ„ํ•œ ๋„๊ตฌ ์„ค์น˜ ๋ฐฉ๋ฒ• | gdb-peda ์„ค์น˜ ๊ฐ€์ด๋“œ

1. gdb-peda ๋ž€? ๋ณธ ํ”„๋กœ์ ํŠธ๋Š” python์œผ๋กœ ๊ฐœ๋ฐœ๋˜์–ด ์žˆ์œผ๋ฉฐ, gdb ์‚ฌ์šฉ์„ ๋ณด๋‹ค ํŽธ๋ฆฌํ•˜๊ฒŒ ์‚ฌ์šฉํ•˜๊ธฐ ์œ„ํ•œ ํ”Œ๋Ÿฌ๊ทธ์ธ์ด๋‹ค. ๋ณดํ†ต CTF ์—์„œ ๋งŽ์ด ์‚ฌ์šฉ๋˜์ง€๋งŒ, ์š”์ฆ˜์€ real-world์˜ binary๋ฅผ ๋ถ„์„ํ•  ๋•Œ๋„ ๋งŽ์ด ํ™œ์šฉํ•˜๊ณ  ์žˆ๋‹ค. 2. gdb-peda ์„ค์น˜ ๋ฐฉ๋ฒ• gdb-peda๋Š” longld๋ผ๋Š” ์‚ฌ์šฉ์ž๊ฐ€ ๊ฐœ๋ฐœํ–ˆ์œผ๋ฉฐ, ํ•ด...

Miniconda ์„ค์น˜ ๋ฐ ์‚ฌ์šฉ๋ฒ•

1. Miniconda ๋ž€? Python์„ ์‚ฌ์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•์€ ๋งค์šฐ ๋‹ค์–‘ํ•˜๋‹ค. local system์— python์„ ์„ค์น˜ํ•œ ํ›„ ๊ทธ๋ƒฅ ์‹คํ–‰์„ ํ•œ๋‹ค๊ฑฐ๋‚˜, venv๋ฅผ ์‹คํ–‰ํ•œ๋‹ค๊ฑฐ๋‚˜, anaconda๋ฅผ ์‚ฌ์šฉํ•˜๊ฑฐ๋‚˜. ์ด ์ค‘์—์„œ Miniconda๋ผ๋Š” ํ”„๋กœ๊ทธ๋žจ์„ ์‚ฌ์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•๋„ ์กด์žฌํ•œ๋‹ค. ํ•˜์—ฌ Miniconda๋ž€, anaconda ๋ฅผ ์ตœ์†Œํ™”ํ•œ ํ”„๋กœ๊ทธ๋žจ์œผ๋กœ...

A Comprehensive Guide for Using Keyboard Shortcuts Like a Pro | Mac Shortcut Keys

โ˜ It is write with LLaMA2 Mastering Mac Shortcut Keys: Boost Your Productivity Are you tired of endlessly clicking through menus and navigating your Mac using only your mouse? Look no further! In...

Communicate with a Developer | Effective Communication

Effective Communication When it comes to working with developers, effective communication is key. Whether youโ€™re a co-worker or a client, being able to clearly convey your needs and expectations ...

How to Check & Protect Your Phone or iPhone | Preventing Hacks

Introduction In this era of technology and internet, hacking has become more prevalent than ever before. With the increasing use of smartphones and social media platforms like Instagram and Telegr...

The Benefits of Using Reusable Tumblers

โ˜ It is write with LLaMA2 Introduction In this article, we will discuss the benefits of using reusable tumblers and how they can help reduce waste and protect the environment. We will also provid...

The Ultimate Language Model for Businesses, Educators, and Content Creators | ChatGPT

โ˜ It is write with LLaMA2 ChatGPT is a cutting-edge language model that has taken the world by storm. Developed by Large Model Systems Organization (OpenAI), it uses advanced deep learning algorit...

Meta์—์„œ ๊ณต๊ฐœํ•œ Code Llama ์•Œ์•„๋ณด๊ธฐ | Coding Assistant

์ถ”์ฒœ ๊ธ€ Meta์—์„œ ์ถœ์‹œํ•œ ์ธ๊ณต์ง€๋Šฅ LLaMA๋ฅผ ์‚ฌ์šฉํ•ด๋ณด์ž (ChatGPT๋งŒํผ ๋˜๋‚˜?) LLaMA.cpp๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•œ ์ฝ”๋”ฉ Asistant ํ”„๋กœ์ ํŠธ (Copilot ๋Œ€์ฒดํ•˜๊ธฐ) Code LLaMA ๊ณต๊ฐœ Meta AI๊ฐ€ ์„ ๋ณด์ธ ์ƒˆ๋กœ์šด ๋Œ€ํ™”ํ˜• ์–ธ์–ด ๋ชจ๋ธ์ธ Code Llama์— ๋Œ€ํ•ด ์ด์•ผ๊ธฐํ•ด๋ณด๋ ค ํ•ฉ๋‹ˆ๋‹ค. ์ด ๋ชจ๋ธ์€ ํ…์ŠคํŠธ ํ”„๋กฌํ”„ํŠธ๋ฅผ ํ™œ์šฉํ•˜์—ฌ ...

์•„์ดํฐ ํ•ดํ‚น ํ™•์ธ ๋ฐฉ๋ฒ• | ์‰ฝ๊ณ  ์ •ํ™•ํ•œ ๊ฐ€์ด๋“œ

๋ชฉ์ฐจ ์†Œ๊ฐœ ์•„์ดํฐ ํ•ดํ‚น ์—ฌ๋ถ€ ํ™•์ธ์ด ์ค‘์š”ํ•œ ์ด์œ  ์•„์ดํฐ ํ•ดํ‚น ์—ฌ๋ถ€๋ฅผ ํ™•์ธํ•˜๋Š” ๋ฐฉ๋ฒ• 3.1. ์ด์ƒํ•œ ๋™์ž‘ ๋ฐ ์†Œ๋ชจ ๋ฐ์ดํ„ฐ ์–‘ ์ฆ๊ฐ€ ํ™•์ธ 3.2. ๋ฐฐํ„ฐ๋ฆฌ ์ˆ˜๋ช… ๊ฐ‘์ž‘์Šค๋Ÿฝ๊ฒŒ ๊ฐ์†Œ ์—ฌ๋ถ€ ํ™•์ธ 3.3. ์˜์‹ฌ์Šค๋Ÿฌ์šด ์•ฑ ๋ฐ ์„ค์ • ํ™•์ธ 3.4. ์Šค๋งˆํŠธํฐ ๋™์ž‘ ๋ถˆ๊ทœ์น™์„ฑ ํ™•์ธ 3.5. ๋„คํŠธ์›Œํฌ ...

Mastering Cybersecurity | Top 10 Essential Hacking Tools for Security Engineers

10 Must-Install Hacking Tools for Security Engineers In todayโ€™s rapidly evolving digital landscape, security engineers play a crucial role in safeguarding systems and data. To enhance their capabi...

Boost Your Security Engineering Skills with These Must-Follow Reddit Channels

10 Hottest Reddit Channels for Security Engineers Are you a security engineer looking to stay up-to-date on the latest security trends and technologies? Look no further! Here are the top 10 hottest...

How to Study Hacking for Beginners | A Comprehensive Guide

How to Study Hacking for Beginners Hacking is an exciting field that many beginners are eager to learn about. However, it can be challenging to know where to start when youโ€™re new to the world of ...

Top Bug Bounty Programs| Uncover Vulnerabilities and Get Rewarded

Introduction to Bug Bounty Programs Bug bounties are cash rewards offered by technology companies for responsibly disclosing 0-day vulnerabilities in their software. These programs encourage ethic...

Mastering Bug Hunter's Game| A Comprehensive Guide to Bughunter

Introduction to Bughunter Welcome to the fascinating world of bug hunting! As technology advances and systems become more complex, finding vulnerabilities in software becomes increasingly importan...

5 Great Songs to Boost Your Productivity While Developing Software

Great Songs to Listen to While Developing Software Developing software can be a challenging and time-consuming task. However, with the right music, it can also be a very enjoyable experience. In t...

Cyber Security Career Roadmaps| A Comprehensive Guide

Introduction to Cyber Security Career Roadmaps Cyber security is one of the fastest-growing fields in the world of technology today. As more and more businesses shift their operations online, th...

์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ์ง„๋กœ ๋กœ๋“œ๋งต | ์ง„๋กœ ๊ฐ€์ด๋“œ

์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ์ง„๋กœ ๋กœ๋“œ๋งต ์†Œ๊ฐœ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ์€ ์˜ค๋Š˜๋‚  ๊ธฐ์ˆ  ๋ถ„์•ผ์—์„œ ๊ฐ€์žฅ ๋น ๋ฅด๊ฒŒ ์„ฑ์žฅํ•˜๋Š” ๋ถ„์•ผ ์ค‘ ํ•˜๋‚˜์ž…๋‹ˆ๋‹ค. ์ ์  ๋” ๋งŽ์€ ๊ธฐ์—…๋“ค์ด ์˜จ๋ผ์ธ์œผ๋กœ ์—…๋ฌด๋ฅผ ์ „ํ™˜ํ•จ์— ๋”ฐ๋ผ, ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ์ „๋ฌธ๊ฐ€์— ๋Œ€ํ•œ ์ˆ˜์š”๊ฐ€ ๊ธ‰์ฆํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ์ง์—…์€ ๋„์ „์ ์ด๋ฉด์„œ ๋ณด์ƒ์ ์ผ ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ „๋ฌธ์ ์ธ ์ง„๋กœ์˜ ๋‹ค์–‘ํ•œ ๋‹จ๊ณ„๋ฅผ ์•ˆ๋‚ดํ•ด์ฃผ๋Š” ๋กœ๋“œ๋งต์ด ํ•„์ˆ˜์ž…๋‹ˆ๋‹ค. ์ฃผ์š” ์‚ฌ์ด...

Red Teaming in Cyber Security | Evaluating Resilience Against Realistic Threats

Index Introduction What is Red Teaming? How does Red Teaming work in Cyber Security? Why is Red Teaming important in Cyber Security? Conclusion Introduction Cyber security is an essen...

Top 10 Must-Watch Movies and TV Shows About Hacking and Hackers

Are you fascinated by the world of hacking and the tech-savvy individuals who inhabit it? If so, youโ€™re in luck! Weโ€™ve compiled a list of the top 10 movies and TV shows about hacking and hackers th...

Reverse Engineering in Software Development | Techniques, Implications, and Best Practices

Index Introduction to Reverse Engineering Definition and purpose in software development Approaches to Reverse Engineering Software Static Analysis Dynamic ...

CTF ์—ฐ์Šต์„ ํ†ตํ•œ ๋ณด์•ˆ ์ „๋ฌธ๊ฐ€๋กœ์˜ ๋ฐœ์ „ | ์ถ”์ฒœ ์˜จ๋ผ์ธ ํ”Œ๋žซํผ

๋ฌผ๋ฆฌ์ ์ธ ๊ณต๊ฐ„์„ ๋„˜์–ด ์„ธ์ƒ์€ ๋””์ง€ํ„ธ๋กœ๋„ ํ™•์žฅ๋˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด์ œ๋Š” ๊ฐ€์ƒ ๊ณต๊ฐ„์—์„œ๋„ ํ˜„์‹ค๊ณผ ๋งˆ์ฐฌ๊ฐ€์ง€๋กœ ๋Œ€๊ฒฐ์ด ๋ฒŒ์–ด์ง€๊ณ  ์žˆ๋Š”๋ฐ์š”, ๊ทธ ์ค‘ ํ•˜๋‚˜๊ฐ€ โ€˜Capture The Flagโ€™ ๋˜๋Š” ์ค„์—ฌ์„œ โ€˜CTFโ€™์ž…๋‹ˆ๋‹ค. CTF๋Š” ํ•ดํ‚น ๋Œ€ํšŒ๋กœ, ๋‹ค์–‘ํ•œ ๋ณด์•ˆ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๋ฉฐ ์‹ค๋ ฅ์„ ๊ฒจ๋ฃจ๋Š” ๊ฒฝ์Ÿ์„ ๋งํ•ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฐ CTF ๋ฌธ์ œ๋ฅผ ์—ฐ์Šตํ•˜๊ณ  ์‹ถ๋‹ค๋ฉด, ๋ช‡ ๊ฐ€์ง€ ์œ ์šฉํ•œ ์˜จ๋ผ์ธ ํ”Œ...

Integer Underflow ์ทจ์•ฝ์  ๊ทธ๋ฆผ์ž์—์„œ ๋ฒ—์–ด๋‚œ ์–ด๋‘ ์˜ ๊ฒฝ๋กœ

์•ˆ๋…•ํ•˜์„ธ์š”, ์—ฌ๋Ÿฌ๋ถ„! ์˜ค๋Š˜์€ ์ปดํ“จํ„ฐ ๋ณด์•ˆ ๋ถ„์•ผ์—์„œ ์ค‘์š”ํ•œ ์ฃผ์ œ์ธ โ€˜Integer Underflowโ€™ ์ทจ์•ฝ์ ์— ๋Œ€ํ•ด ์•Œ์•„๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. ์ด ์ทจ์•ฝ์ ์€ ํ”„๋กœ๊ทธ๋ž˜๋ฐ ์‹ค์ˆ˜๋กœ ์ธํ•ด ๋ฐœ์ƒํ•˜๋ฉฐ, ํ•ด์ปค๋“ค์ด ์‹œ์Šคํ…œ์„ ๊ณต๊ฒฉํ•˜๋Š” ๋ฐ ์ด์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์œ„ํ—˜ํ•œ ์ƒํ™ฉ์„ ์ดˆ๋ž˜ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ํ•จ๊ป˜ ์ดํ•ดํ•ด๋ณด๋„๋ก ํ•˜๊ฒ ์Šต๋‹ˆ๋‹ค. Integer Underflow๋ž€ ๋ฌด์—‡์ธ๊ฐ€์š”? Integer...

Bugcrowd vs HackerOne| A Comprehensive Comparison

Bugcrowd vs HackerOne: A Comprehensive Comparison Bugcrowd and HackerOne are two of the most popular bug bounty platforms that connect security researchers with organizations to find and report vu...

Use After Free ์ทจ์•ฝ์ ๊ณผ ์˜ˆ์‹œ

Use After Free ์ทจ์•ฝ์ ์€ ๋ฉ”๋ชจ๋ฆฌ ๊ด€๋ฆฌ ์˜ค๋ฅ˜๋กœ ์ธํ•ด ๋ฐœ์ƒํ•˜๋Š” ๋ณด์•ˆ ์ทจ์•ฝ์  ์ค‘ ํ•˜๋‚˜๋กœ, ์ด๋ฏธ ํ•ด์ œ๋œ ๋ฉ”๋ชจ๋ฆฌ ์˜์—ญ์— ์ ‘๊ทผํ•˜๋Š” ๊ณต๊ฒฉ์„ ์˜๋ฏธํ•ฉ๋‹ˆ๋‹ค. ์ด๋ฒˆ ๊ธ€์—์„œ๋Š” Use After Free ์ทจ์•ฝ์ ์˜ ๊ฐœ๋…์„ ์ž์„ธํžˆ ์„ค๋ช…ํ•˜๊ณ , ์‹ค์ œ ์˜ˆ์‹œ๋ฅผ ํ†ตํ•ด ๊ทธ ์ž‘๋™ ์›๋ฆฌ์™€ ๋ฐฉ์ง€ ๋ฐฉ๋ฒ•์„ ์•Œ์•„๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. Use After Free ์ทจ์•ฝ์ ์ด๋ž€? Use After Fr...

Type Confusion ์ทจ์•ฝ์  ์ดํ•ด - ์˜ˆ์‹œ์™€ ๋ฐฉ์ง€ ๋ฐฉ๋ฒ•

Type Confusion ์ทจ์•ฝ์ ์€ ํ”„๋กœ๊ทธ๋žจ์˜ ๋ณ€์ˆ˜๋‚˜ ๊ฐ์ฒด์˜ ๋ฐ์ดํ„ฐ ํƒ€์ž…์„ ์ž˜๋ชป ํ•ด์„ํ•˜์—ฌ ๋น„์ •์ƒ์ ์ธ ๋™์ž‘์„ ์œ ๋ฐœํ•˜๋Š” ๋ณด์•ˆ ์ทจ์•ฝ์ ์ž…๋‹ˆ๋‹ค. ์ด๋ฒˆ ๊ธ€์—์„œ๋Š” Type Confusion ์ทจ์•ฝ์ ์˜ ๊ฐœ๋…์„ ์ž์„ธํžˆ ์„ค๋ช…ํ•˜๊ณ , ์‹ค์ œ ์˜ˆ์‹œ๋ฅผ ํ†ตํ•ด ๊ทธ ์ž‘๋™ ์›๋ฆฌ์™€ ๋ฐฉ์ง€ ๋ฐฉ๋ฒ•์„ ์•Œ์•„๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. Type Confusion ์ทจ์•ฝ์ ์ด๋ž€? Type Confusion ์ทจ์•ฝ์ ์€ ...

์ •์ˆ˜ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ ์ทจ์•ฝ์  ์ดํ•ด - ์˜ˆ์‹œ์™€ ๋ฐฉ์ง€ ๋ฐฉ๋ฒ•

์ •์ˆ˜ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ(Integer Overflow)๋Š” ํ”„๋กœ๊ทธ๋žจ์—์„œ ์‚ฌ์šฉ๋˜๋Š” ์ •์ˆ˜ ๋ฐ์ดํ„ฐ ํƒ€์ž…์˜ ์ตœ๋Œ“๊ฐ’์„ ์ดˆ๊ณผํ•˜์—ฌ ๋ฐœ์ƒํ•˜๋Š” ๋ณด์•ˆ ์ทจ์•ฝ์ ์ž…๋‹ˆ๋‹ค. ์ด๋ฒˆ ๊ธ€์—์„œ๋Š” ์ •์ˆ˜ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ์˜ ๊ฐœ๋…์„ ์ž์„ธํžˆ ์„ค๋ช…ํ•˜๊ณ , ์‹ค์ œ ์˜ˆ์‹œ๋ฅผ ํ†ตํ•ด ๊ทธ ์ž‘๋™ ์›๋ฆฌ์™€ ๋ฐฉ์ง€ ๋ฐฉ๋ฒ•์„ ์•Œ์•„๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. ์ •์ˆ˜ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ๋ž€? ์ •์ˆ˜ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ๋Š” ์ปดํ“จํ„ฐ์—์„œ ์‚ฌ์šฉ๋˜๋Š” ์ •์ˆ˜ ๋ฐ์ดํ„ฐ ํƒ€์ž…์˜ ํ‘œํ˜„ ๋ฒ”์œ„๋ฅผ ๋„˜...

Heap Overflow ์ทจ์•ฝ์  ์ดํ•ด - ์˜ˆ์‹œ์™€ ๋ฐฉ์ง€ ๋ฐฉ๋ฒ•

Heap Overflow ์ทจ์•ฝ์ ์€ ํ”„๋กœ๊ทธ๋žจ์˜ ๋™์  ํ• ๋‹น๋œ ๋ฉ”๋ชจ๋ฆฌ์ธ ํž™(heap) ์˜์—ญ์„ ์ดˆ๊ณผํ•˜์—ฌ ๋ฐ์ดํ„ฐ๋ฅผ ์“ธ ๋•Œ ๋ฐœ์ƒํ•˜๋Š” ๋ณด์•ˆ ์ทจ์•ฝ์ ์ž…๋‹ˆ๋‹ค. ์ด๋ฒˆ ๊ธ€์—์„œ๋Š” Heap Overflow ์ทจ์•ฝ์ ์˜ ๊ฐœ๋…์„ ์ž์„ธํžˆ ์„ค๋ช…ํ•˜๊ณ , ์‹ค์ œ ์˜ˆ์‹œ๋ฅผ ํ†ตํ•ด ๊ทธ ์ž‘๋™ ์›๋ฆฌ์™€ ๋ฐฉ์ง€ ๋ฐฉ๋ฒ•์„ ์•Œ์•„๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. Heap Overflow ์ทจ์•ฝ์ ์ด๋ž€? ํž™์€ ๋™์ ์œผ๋กœ ํ• ๋‹น๋˜๋Š” ๋ฉ”๋ชจ๋ฆฌ ์˜์—ญ...

Format String Bug ์ทจ์•ฝ์ ๊ณผ ์˜ˆ์‹œ

Format String Bug(FSB) ์ทจ์•ฝ์ ์€ ํ”„๋กœ๊ทธ๋žจ์˜ ์ž…๋ ฅ ์ฒ˜๋ฆฌ ๊ณผ์ •์—์„œ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ๋ณด์•ˆ ์ทจ์•ฝ์  ์ค‘ ํ•˜๋‚˜๋กœ, ์ž˜๋ชป๋œ ํ˜•์‹ ๋ฌธ์ž์—ด์„ ํ†ตํ•ด ๊ณต๊ฒฉ์ž๊ฐ€ ํ”„๋กœ๊ทธ๋žจ์˜ ๋ฉ”๋ชจ๋ฆฌ๋ฅผ ์ฝ๊ฑฐ๋‚˜ ์ˆ˜์ •ํ•  ์ˆ˜ ์žˆ๋Š” ์ƒํ™ฉ์„ ๋…ธ์ถœ์‹œํ‚ค๋Š” ๋ฌธ์ œ์ž…๋‹ˆ๋‹ค. ์ด๋ฒˆ ๊ธ€์—์„œ๋Š” FSB ์ทจ์•ฝ์ ์˜ ๊ฐœ๋…์„ ์ƒ์„ธํžˆ ์„ค๋ช…ํ•˜๊ณ , ์‹ค์ œ ์˜ˆ์‹œ๋ฅผ ํ†ตํ•ด ๊ทธ ์ž‘๋™ ์›๋ฆฌ์™€ ์˜ˆ๋ฐฉ ๋ฐฉ๋ฒ•์„ ์‚ดํŽด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. F...

Double Free Bug ์ทจ์•ฝ์ ๊ณผ ์˜ˆ์‹œ

Double Free Bug๋Š” ํ”„๋กœ๊ทธ๋žจ์—์„œ ๋™์ผํ•œ ๋ฉ”๋ชจ๋ฆฌ ์˜์—ญ์„ ๋‘ ๋ฒˆ ์ด์ƒ ํ•ด์ œ(free)ํ•˜๋Š” ๊ฒฝ์šฐ์— ๋ฐœ์ƒํ•˜๋Š” ๋ณด์•ˆ ์ทจ์•ฝ์ ์ž…๋‹ˆ๋‹ค. ์ด๋ฒˆ ๊ธ€์—์„œ๋Š” Double Free Bug์˜ ๊ฐœ๋…์„ ์ž์„ธํžˆ ์„ค๋ช…ํ•˜๊ณ , ์‹ค์ œ ์˜ˆ์‹œ๋ฅผ ํ†ตํ•ด ๊ทธ ์ž‘๋™ ์›๋ฆฌ์™€ ๋ฐฉ์ง€ ๋ฐฉ๋ฒ•์„ ์•Œ์•„๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. Double Free Bug๋ž€? Double Free Bug๋Š” ์ฃผ๋กœ ๋™์  ๋ฉ”๋ชจ๋ฆฌ ํ• ๋‹น...

Command Injection ์ทจ์•ฝ์ ๊ณผ ์˜ˆ์‹œ

์†Œ๊ฐœ ์›น ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ์—์„œ Command Injection์€ ์ค‘์š”ํ•œ ์ทจ์•ฝ์ ์œผ๋กœ, ์‚ฌ์šฉ์ž ์ž…๋ ฅ์„ ํ†ตํ•ด ์•…์˜์ ์ธ ๋ช…๋ น์–ด๊ฐ€ ์‹คํ–‰๋˜๋Š” ์ƒํ™ฉ์„ ์˜๋ฏธํ•ฉ๋‹ˆ๋‹ค. ์ด ๊ธ€์—์„œ๋Š” Command Injection์˜ ๊ฐœ๋…๊ณผ ํ•จ๊ป˜ ์‹ค์ œ ์˜ˆ์‹œ๋ฅผ ํ†ตํ•ด ์–ด๋–ป๊ฒŒ ๋ฐœ์ƒํ•˜๋Š”์ง€ ์•Œ์•„๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. Command Injection์ด๋ž€? Command Injection์€ ์›น ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜...

Buffer Overflow ์ทจ์•ฝ์ ๊ณผ ์˜ˆ์‹œ

๋ฒ„ํผ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ(Buffer Overflow)๋Š” ์ปดํ“จํ„ฐ ๋ณด์•ˆ ๋ถ„์•ผ์—์„œ ๊ฐ€์žฅ ์ž˜ ์•Œ๋ ค์ง„ ์ทจ์•ฝ์  ์ค‘ ํ•˜๋‚˜๋กœ, ์ œ๋Œ€๋กœ ์ฒ˜๋ฆฌ๋˜์ง€ ์•Š์€ ๋ฐ์ดํ„ฐ ์ž…๋ ฅ์œผ๋กœ ์ธํ•ด ํ”„๋กœ๊ทธ๋žจ์˜ ๋ฉ”๋ชจ๋ฆฌ ์˜์—ญ์„ ์นจ๋ฒ”ํ•˜๋Š” ๊ณต๊ฒฉ์ž…๋‹ˆ๋‹ค. ์ด๋ฒˆ ๊ธ€์—์„œ๋Š” ๋ฒ„ํผ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ์˜ ๊ฐœ๋…์„ ์ž์„ธํžˆ ์„ค๋ช…ํ•˜๊ณ , ์‹ค์ œ ์˜ˆ์‹œ๋ฅผ ํ†ตํ•ด ๊ทธ ์ž‘๋™ ์›๋ฆฌ์™€ ํ”ผํ•ด๋ฅผ ํ™•์ธํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. ๋ฒ„ํผ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ๋ž€? ๋ฒ„ํผ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ๋Š” ...

๋ฐ”์ด๋„ˆ๋ฆฌ ํŒŒ์ผ์—์„œ ๋ฐœ์ƒ๊ฐ€๋Šฅํ•œ ์ทจ์•ฝ์ ์— ๋Œ€ํ•ด ์•Œ์•„๋ณด์ž

๋ชฉ์ฐจ: 1. ์†Œ๊ฐœ ๋ฐ”์ด๋„ˆ๋ฆฌ๋ž€ ๋ฌด์—‡์ธ๊ฐ€? ๋ฐ”์ด๋„ˆ๋ฆฌ ์ทจ์•ฝ์ ์˜ ์ค‘์š”์„ฑ 2. ๋ฐ”์ด๋„ˆ๋ฆฌ ์ทจ์•ฝ์ ์˜ ์ข…๋ฅ˜ ๋ฒ„ํผ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ ํฌ๋งท ์ŠคํŠธ๋ง ์ทจ์•ฝ์  ์ •์ˆ˜ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ์™€ ์–ธ๋”ํ”Œ๋กœ์šฐ ํž™ ๊ธฐ๋ฐ˜ ์ทจ์•ฝ์  ์ฝ”๋“œ ์ธ์ ์…˜ ๊ธฐํƒ€ ์ทจ์•ฝ์ ๋“ค 3. ์ทจ์•ฝ์  ๊ณต๊ฒฉ ๊ธฐ๋ฒ• ์•…์˜์ ์ธ ์‰˜ ์ฝ”๋“œ ์‚ฝ์ž… ๋ฆฌํ„ด ์–ด๋“œ๋ ˆ์Šค ๋ฎ์–ด์“ฐ๊ธฐ NOP ์Šฌ๋ ˆ๋”ฉ๊ณผ ๋ฆฌํ„ด ํˆฌ ๋ผ์ด...

LLaMA.cpp๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•œ ์ฝ”๋”ฉ Asistant ํ”„๋กœ์ ํŠธ (Copilot ๋Œ€์ฒดํ•˜๊ธฐ)

1. Turbopilot ํ”„๋กœ์ ํŠธ ์†Œ๊ฐœ ๋“ค์–ด๊ฐ€๊ธฐ์— ์•ž์„œ, ์ด ์ „ ํฌ์ŠคํŠธ์—์„œ LLaMA๋ผ๋Š” ์ธ๊ณต์ง€๋Šฅ์„ ์†Œ๊ฐœํ•˜๊ณ  LLaMA.cpp ํ”„๋กœ์ ํŠธ ์…‹ํŒ… ๋ฐ ์‚ฌ์šฉ๊นŒ์ง€ ํ•ด๋ณด์•˜์Šต๋‹ˆ๋‹ค. ์ด ํ”„๋กœ์ ํŠธ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํƒ„์ƒํ•˜๊ณ  ์žˆ๋Š” ์ˆ˜๋งŽ์€ ํ”„๋กœ์ ํŠธ์™€ Model๋“ค์ด ์žˆ๋Š”๋ฐ์š”. ์—ฌ๋Ÿฌ๊ฐ€์ง€ ๋‚˜์˜จ ๊ฒƒ ์ค‘์— ๊ฐœ๋ฐœ์ž์—๊ฒŒ ์œ ์ตํ•œ ํ”„๋กœ์ ํŠธ๊ฐ€ ์žˆ์–ด์„œ ์†Œ๊ฐœํ•˜๊ณ ์ž ํ•ฉ๋‹ˆ๋‹ค. ํ”„๋กœ์ ํŠธ๋Š” turbopi...

Meta์—์„œ ์ถœ์‹œํ•œ ์ธ๊ณต์ง€๋Šฅ LLaMA๋ฅผ ์‚ฌ์šฉํ•ด๋ณด์ž (ChatGPT๋งŒํผ ๋˜๋‚˜?)

์ฐธ๊ณ : ์ธ๊ณต์ง€๋Šฅ์„ ์ „ํ˜€ ๊ณต๋ถ€ํ•˜์ง€ ์•Š์€ ์‚ฌ๋žŒ์ด ์ž‘์„ฑํ•˜๋Š” ๊ธ€์ž…๋‹ˆ๋‹ค. ์‚ฌ์šฉํ•˜๋Š” ๋‹จ์–ด๋‚˜ ๋ฌธ์žฅ์— ๋Œ€ํ•ด์„œ ํ‹€๋ฆด ์ˆ˜ ์žˆ์œผ๋‹ˆ, ์ˆ˜์ •์ด ํ•„์š”ํ•  ๊ฒฝ์šฐ ์–ธ์ œ๋“  ๋Œ“๊ธ€ ๋ถ€ํƒ๋“œ๋ฆฝ๋‹ˆ๋‹ค. LLaMA ์†Œ๊ฐœ ย  Meta์—์„œ๋Š” ๋Œ€๊ทœ๋ชจ ์–ธ์–ด ๋ชจ๋ธ์ธ LLaMA(Large Language Model Meta AI)๋ฅผ ๊ณต๊ฐœํ–ˆ๋‹ค. ๋ณดํ†ต์˜ ์ธ๊ณต์ง€๋Šฅ ๋ชจ๋ธ๋“ค์€ ๋นต๋นต(?)ํ•œ ์„œ๋ฒ„ ํ™˜๊ฒฝ์ด ๋’ท ๋ฐ›์นจ ๋˜...

๋งฅ๋ถ ๋ฎ๊ฐœ๋ฅผ ๋ฎ์–ด๋„ ๊บผ์ง€์ง€ ์•Š๊ฒŒ ์„ค์ •ํ•˜๋Š” ๋ฐฉ๋ฒ•

์žฌํƒ ๊ทผ๋ฌด๊ฐ€ ๊ธธ์–ด์ง์— ๋”ฐ๋ผ ์ฑ…์ƒ๋ฅผ ์ •๋น„ํ•ด์•ผํ•  ์ผ์ด ์žˆ์—ˆ์Šต๋‹ˆ๋‹ค. ํ˜„์žฌ ์‚ฌ์šฉ์ค‘์ธ ๋งฅ๋ถ์„ ๋ชจ๋‹ˆํ„ฐ์— ์—ฐ๊ฒฐํ•˜์—ฌ setup์„ ํ•˜๊ณ  ์‹ถ์—ˆ๊ณ , ์—ฌ๋Š ๋…ธํŠธ๋ถ๊ณผ ๊ฐ™์ด ๋งฅ๋ถ์— ๋ชจ๋‹ˆํ„ฐ ์ผ€์ด๋ธ”์„ ์—ฐ๊ฒฐํ•œ ํ›„ ๋ฎ๊ฐœ๋ฅผ ๋‹ซ์œผ๋ฉด ๊น”๋”ํ•˜๊ฒŒ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์„ ์ค„ ์•Œ์•˜์Šต๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ๋ฎ๊ฐœ๋ฅผ ๋‹ซ์œผ๋ฉด ์ ˆ์ „๋ชจ๋“œ๋กœ ์ง„์ž…ํ•˜๋Š” ๋งฅ๋ถโ€ฆ ๋งฅ๋ถ์ด ์ ˆ์ „๋˜์ง€ ์•Š๋„๋ก ์„ค์ •ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ๊ณต์œ ๋“œ๋ฆฝ๋‹ˆ๋‹ค. Su...

Docker๋ฅผ ๋Œ€์‹ ํ•ด์ค„ ๊ท€์—ฌ์šด ๋ช…๋ น์–ด Podman

Intro ์ตœ๊ทผ๋“ค์–ด docker๋ฅผ ์‚ฌ์šฉํ•œ ์ž‘์—…์ด ๋งŽ์•„์ง„ ๊ฐ€์šด๋ฐ ํšŒ์‚ฌ์—์„œ licence์˜ ๋ฌธ์ œ๋กœ docker desktop์„ ์ง€์šฐ๋ผ๋Š” ๋ช…(?)์„ ์ „๋‹ฌ๋ฐ›์•˜์Šต๋‹ˆ๋‹ค. ์ด์—๋”ฐ๋ผ docker๋ฅผ ์‚ญ์ œํ•ด์•ผ ํ–ˆ๊ณ , docker ๊ด€๋ จ ํ…Œ์ŠคํŒ…์„ ํ•˜๊ธฐ ์œ„ํ•ด์„  ๊ฐœ์ธ PC์—์„œ ๊น”์ง๊น”์ง ํ…Œ์ŠคํŠธ๋ฅผ ํ•ด์•ผํ•˜๋Š” ๋ฒˆ๊ฑฐ๋กœ์›€์ด ์žˆ์—ˆ๋Š”๋ฐ์š”. ๊ทธ๋Ÿฌ๋˜ ์ค‘ podman์ด๋ผ๋Š” tool์„ ์•Œ๊ฒŒ๋˜์—ˆ๊ณ ...

Localhost์— Aptos Node ์‹คํ–‰ํ•˜๊ธฐ

Intro ์š”์ฆ˜๋“ค์–ด Aptos ๋ธ”๋ก์ฒด์ธ์„ ์—ด์‹ฌํžˆ ๊ณต๋ถ€ํ•ด๋ณด๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. Layer1 ๋ธ”๋ก์ฒด์ธ์ด๋ฉฐ ํ”ํžˆ๋“ค ๋งํ•˜๋Š” Smart Contract๋Š” Move๋ผ๋Š” ์–ธ์–ด๋กœ ์ž‘์„ฑ๋˜๊ณ ์š”. ์ฝ”๋”ฉํ•˜๊ธฐ์— ์•ž์„œ์„œ ํ…Œ์ŠคํŠธ๋ฅผ ํ•˜๊ธฐ ์œ„ํ•œ ๋„คํŠธ์›Œํฌ๋ฅผ Localhost์— ๊ตฌ์„ฑํ•ด๋ณด์•˜๊ณ  ๊ทธ ์ ˆ์ฐจ๋ฅผ ์ •๋ฆฌํ•ด๋ณด์•˜์Šต๋‹ˆ๋‹ค. How to build network on localhost? (์ฐธ๊ณ ) ...

Archive Links about Aptos/Move security

Intro This is Aptos/Move security link archives for sharing . You can share links through comment if you want to share another sites about the same category. Official Links Guide Apt...

(์ž‘์„ฑ์ค‘) 2022 MOVEment CTF Writeups (Hello Move)

1. Info 2022๋…„ 12์›”์— movebit์ด ์ฃผ์ฒดํ•˜๋Š” CTF Movement๊ฐ€ ์—ด๋ ธ์—ˆ๋‹ค. ๋ฌผ๋ก  ๋‚˜๋Š” ๋’ค๋Šฆ๊ฒŒ ์ด๋Ÿฐ CTF๊ฐ€ ์—ด๋ฆฐ๊ฒƒ์„ ํ™•์ธํ•˜์˜€๊ณ , devnet์— ๋ฌธ์ œ ํŒŒ์ผ์ด ๊ทธ๋Œ€๋กœ ๋ณด์กด๋˜๊ณ  ์žˆ์–ด์„œ ๋•Œ๋Šฆ์€ ํ’€์ด๋ฅผ ํ•ด๋ณด๊ณ  ์žˆ๋‹ค. ๋ฌธ์ œ ๋‚œ์ด๋„๋Š” ๊ฝค ๋‹ค์–‘ํ•˜๊ฒŒ ๋‚˜์˜จ๋“ฏ ํ•ด์„œ, move languae์™€ aptos๊ฐ€ ์ดˆ์‹ฌ์ธ ๋‚˜์—๊ฒŒ๋Š” ์ ์ ˆํ•˜๊ณ  ์žฌ๋ฐŒ๋Š” ๋ฌธ์ œ๋“ค์ด์—ˆ๋‹ค....

2022 MOVEment CTF Writeups (checkin)

1. Info 2022๋…„ 12์›”์— movebit์ด ์ฃผ์ฒดํ•˜๋Š” CTF Movement๊ฐ€ ์—ด๋ ธ์—ˆ๋‹ค. ๋ฌผ๋ก  ๋‚˜๋Š” ๋’ค๋Šฆ๊ฒŒ ์ด๋Ÿฐ CTF๊ฐ€ ์—ด๋ฆฐ๊ฒƒ์„ ํ™•์ธํ•˜์˜€๊ณ , devnet์— ๋ฌธ์ œ ํŒŒ์ผ์ด ๊ทธ๋Œ€๋กœ ๋ณด์กด๋˜๊ณ  ์žˆ์–ด์„œ ๋•Œ๋Šฆ์€ ํ’€์ด๋ฅผ ํ•ด๋ณด๊ณ  ์žˆ๋‹ค. ๋ฌธ์ œ ๋‚œ์ด๋„๋Š” ๊ฝค ๋‹ค์–‘ํ•˜๊ฒŒ ๋‚˜์˜จ๋“ฏ ํ•ด์„œ, move languae์™€ aptos๊ฐ€ ์ดˆ์‹ฌ์ธ ๋‚˜์—๊ฒŒ๋Š” ์ ์ ˆํ•˜๊ณ  ์žฌ๋ฐŒ๋Š” ๋ฌธ์ œ๋“ค์ด์—ˆ๋‹ค....

Python basic day5

1. ๋ณต์Šต list์™€ dict ์˜ ์‚ฌ์šฉ๋ฒ• 2. ์ˆ˜์—…๋‚ด์šฉ 2.1) ์กฐ๊ฑด๋ฌธ์ด๋ž€? ํ”„๋กœ๊ทธ๋ž˜๋ฐ ํ๋ฆ„ ์ƒ ํŠน์ •ํ•œ ์กฐ๊ฑด์—์„œ๋งŒ ์‹คํ–‰ํ•ด์•ผํ•˜๋Š” ์ฝ”๋“œ๊ฐ€ ์žˆ๊ธฐ ๋งˆ๋ จ์ธ๋ฐ, ์ด ๋•Œ ํฌ๋“œ๋ฅผ ๋ถ„๊ธฐ(branch)ํ•˜๊ธฐ ์œ„ํ•ด์„œ ์‚ฌ์šฉ๋˜๋Š” ๋ฌธ๋ฒ•์ด๋‹ค. ์กฐ๊ฑด๋ฌธ์€ ์ค‘์ฒฉ 2.2) ์กฐ๊ฑด๋ฌธ ๋ฌธ๋ฒ• ์ „์ฒด์ ์ธ ๋ฌธ๋ฒ• ๊ตฌ์กฐ if, elif, else ์˜ ์ˆœ์œผ๋กœ...

Python basic day4

1. ๋ณต์Šต a = [1,2,3,[1,2,3]] # list ์ •์˜ print( a[1] ) # indexing print( a[2:3] ) # slicing 2. ์ˆ˜์—… list๋Š” ์ฝ”ํ…Œ(์ฝ”๋”ฉํ…Œ์ŠคํŠธ)์—์„œ ๋งŽ์ด ํ™œ์šฉ๋จ ์ฝ”๋”ฉํ…Œ์ŠคํŠธ = ์•Œ๊ณ ๋ฆฌ์ฆ˜ ํ…Œ์ŠคํŠธ (ํ•˜๋‚˜์˜ ๊ฒฐ๊ณผ๋ฅผ ์ตœ์†Œํ•œ์˜ ์‹œ๊ฐ„์— ์ถœ๋ ฅํ•˜๊ฒŒ๋” ์ฝ”๋”ฉํ•˜๋Š” ํ…Œ์ŠคํŠธ) 2-1) List ํ˜•ํƒœ์˜ me...

Python basic day3

1. ๋ณต์Šต num1 = "100" num2 = "30" print( f"{num1} + {num2} = {int(num1) + int(num2)}") 2. ์ปดํ“จํ„ฐ ์ด๋ก  1) ๋ฉ”๋ชจ๋ฆฌ a = 100 # ---> com: 11101110111000 b = 200 # ---> com: 00101110110111 => me...

Python basic day2

1. ๋ณต์Šต ๋ณ€์ˆ˜์„ ์–ธ nuber1 = 10 nuber2 = 3 ์ˆ™์ œ(๊ณ„์‚ฐ๊ธฐ ์ฝ”๋“œ) ๊ฒ€ํ†  2. ์ˆ˜์—…์ง„ํ–‰ ์ˆ˜์น˜ ์—ฐ์‚ฐ์ž # number1 = 10 # number2 = 3 # >>> 10 + 3 = 13 print( nuber1 + nuber2 ) print( nuber...

Python basic day1

0. ToDo ๋ณ€์ˆ˜ ์ •์˜ (๋ฐ์ดํ„ฐ ํƒ€์ž…: string, integer, float,// list, โ€ฆ) ์‚ฌ์šฉ์ž ์ž…๋ ฅ/์ถœ๋ ฅ (input, print) 1. ๋ณ€์ˆ˜ ์ •์˜ ๊ธฐ๋ณธ ํ˜•ํƒœ number1 = 1 # ๊ธฐ๋ณธ ํ˜•ํƒœ number2 = 123.0 string = "test1" print( string ) # ์ถœ๋ ฅํ•˜๋Š” ๊ธฐ๋Šฅ print(...

GitHub Push ์‹คํŒจ? ๊ถŒํ•œ ์—๋Ÿฌ ํ•ด๊ฒฐํ•˜๋Š” ๋ฐฉ๋ฒ•

1. Intro github์—์„œ๋Š” August 13, 2021๋ถ€๋กœ ํŒจ์Šค์›Œ๋“œ ์ธ์ฆ ๋ฐฉ์‹์„ ์ œ๊ฑฐํ•œ๋‹ค๊ณ  ๋ฐœํ‘œํ•˜์˜€์Šต๋‹ˆ๋‹ค. (๊ณต์ง€ ๋งํฌ) ์ดํ›„๋ถ€ํ„ฐ ์›๊ฒฉ์ง€(ssh)์—์„œ git push ๋ฐ ๊ธฐํƒ€ ์ž‘์—…์„ ํ•  ๋•Œ ๊ถŒํ•œ์ด ์—†๋‹ค๋Š” ์—๋Ÿฌ๊ฐ€ ๋ฐœ์ƒํ•˜๊ณ  ์žˆ๋Š”๋ฐ์š”. ๊ฐœ๋ฐœ์ž์—๊ฒŒ๋Š” ์•„์ฃผ ์ค‘์š”ํ•œ ๋ถ€๋ถ„์ด๋ผ, ์ด๋Ÿฌํ•œ ์—๋Ÿฌ๋ฅผ ์–ด๋–ป๊ฒŒ ํ•ด๊ฒฐํ•  ์ˆ˜ ์žˆ์„์ง€ step-by-step์œผ๋กœ ์ •๋ฆฌ๋ฅผ ํ•ด๋ณด...

QEMU ๋ฅผ ์ด์šฉํ•œ AVR ๋ฐ”์ด๋„ˆ๋ฆฌ ๋ถ„์„ํ•˜๋Š” ๋ฐฉ๋ฒ•

1. ํ™˜๊ฒฝ host: macOS target: ELF 32-bit LSB executable, Atmel AVR 8-bit, 2. QEMU ์„ค์น˜ brew ๋ฅผ ์‚ฌ์šฉํ•œ install brew install qemue apt ๋ฅผ ์‚ฌ์šฉํ•œ install apt install qemu ...

Hyper-V ๋ถ„์„ํ•˜๊ธฐ ์œ„ํ•œ ํ™˜๊ฒฝ์„ค์ • ํ•˜๋Š” ๋ฐฉ๋ฒ•

๋“ค์–ด๊ฐ€๊ธฐ์— ์•ž์„œ.. ํ•ด๋‹น ํฌ์ŠคํŠธ๋Š” MSRC(Microsoft Security Response Center) ๋ธ”๋กœ๊ทธ์— ์ž‘์„ฑ๋œ First Step Hyper-V Research ๋‚ด์šฉ์„ ํ† ๋Œ€๋กœ ์ž‘์„ฑํ•˜์˜€์Šต๋‹ˆ๋‹ค. Debugging Environment 1) Intro ์ด ๊ธ€์—์„œ ์ž‘์„ฑํ•  ํ™˜๊ฒฝ ์„ค์ •์€ nested(์ค‘์ฒฉ) VM์„ ์ƒ์„ฑํ•˜๊ณ  ์ด ๋‚ด๋ถ€์—์„œ Hype...

4. ๋‡Œ์ „๋„(EEG)์™€ P300

๋‡ŒํŒŒ? ๋‡Œ์ „๋„? TV๋‚˜ ๊ฐ์ข… ๋งค์ฒด๋ฅผ ํ†ตํ•ด์„œ ๋‡ŒํŒŒ๋ผ๋Š” ๋ง์„ ๋ณด์•˜์„ ํ…๋ฐ์š”. ๋‡ŒํŒŒ์˜ ๋œป์€ ๋‡Œ์˜ ํŒŒ๋™์ด๋ฉฐ, ์ด๊ฒƒ์€ ๋‡Œ์—์„œ ๋ฐœ์ƒํ•˜๋Š” ์ „๊ธฐ์˜ ํ๋ฆ„์ด๋ผ๊ณ  ๋ณด์‹œ๋ฉด ๋ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ ์ด ์ „๊ธฐ์˜ ํ๋ฆ„์€ ์‹ ๊ฒฝ๊ณ„ ์ค‘์—์„œ๋„ โ€˜๋‡Œ์‹ ๊ฒฝโ€™ ์‚ฌ์ด์—์„œ ์‹ ํ˜ธ๊ฐ€ ์ „๋‹ฌํ• ๋•Œ ๋ฐœ์ƒํ•˜๊ฒŒ ๋˜๊ฒŒ ๋˜์–ด์žˆ์Šต๋‹ˆ๋‹ค. ๋‡ŒํŒŒ์— ์žˆ๋Š” 5๊ฐœ์˜ ํŒŒ์žฅ ๋‡Œ์—์„œ๋Š” ์•„๋ž˜ ๋‹ค์„ฏ ์ข…๋ฅ˜์˜ ํŒŒ์žฅ์„ ๋„๊ณ  ์žˆ์œผ๋ฉฐ, ๊ฐ๊ฐ์˜ ํŠน์ง•์„ ...

3. EEG ์นฉ์…‹(TGAM1) ๋ถ„์„

1. ๋ถ„์„์€ RAWํ•˜๊ฒŒ ๋‚˜๋Š” ๋ณดํ†ต ํ”„๋กœ์ ํŠธ๋ฅผ ์ง„ํ–‰ํ•˜๋ฉดย ๋Œ€์ƒ์ด ๋ญ๋“ ๊ฐ„์— rawํ•˜๊ฒŒ ์ ‘๊ทผํ•˜๊ณ  ๊ด€๋ จ๋œ ๊ฒƒ๋“ค์„ ์ฐพ์•„๋ณธ๋‹ค. rawํ•˜๊ฒŒ ๋ณด๋Š”๊ฑด ์‚ฌ์„œ ์‚ฝ์งˆ์„ ํ•˜๋Š”๊ฑด๋ฐ, ์ด๋Ÿฌ๋ฉด์„œ ๋ฐฐ์šฐ๋Š”๊ฒŒ ์ƒ๊ฐ๋ณด๋‹ค ๋งŽ๊ณ  ์€๊ทผํžˆ ์žฌ๋ฏธ์žˆ๋‹ค!! ์‚ฌ์„œ ์‚ฝ์งˆํ•œ ๋‚ด์—ญ๋“ค์„ ๋Œ€์ถฉ ๋ณด๋ฉด ์ด๋Ÿฌํ•˜๋‹ค. GPU keyloggerํ”„๋กœ์ ํŠธํ• ๋•Œ ์ปค๋„ ์†Œ์Šค ๋ถ„์„ ๋ฐ ์ปค๋„ ๊ตฌ์กฐ ๊ณต๋ถ€ ์‘์šฉํ”„๋กœ๊ทธ๋žจ or ๊ฐ์ข…...

2. ํ™˜๊ฒฝ๊ตฌ์ถ•

1. ๋‹ค์‹œ ์‹œ์ž‘ ๋Œ€๋žต 1๋…„ ์ „, โ€œ๋‡Œ๋ฅผ ํ•ดํ‚นํ•˜์žโ€๋ผ๋Š” ๊ธ€์„ ์“ฐ๋ฉด์„œ โ€œEEG & BCIโ€๋ฅผ ๊ณต๋ถ€ํ•˜๊ธฐ ๋งˆ์Œ๋จน์—ˆ๋‹ค. ๊ทธ ํ›„๋กœ ๋ฐ”์˜๊ณ  ์ •์‹ ์—†๋Š” ์‹œ๊ฐ„์„ ๋ณด๋‚ด๊ณ  ๊ทธ๋‚˜๋งˆ ์—ฌ์œ ๋กœ์›Œ์ง„ ์ง€๊ธˆ, ๋‹ค์‹œ ํ”„๋กœ์ ํŠธ๋ฅผ ์‹œ์ž‘ํ•ด๋ณด๋ ค ํ•œ๋‹ค 2. ํ™˜๊ฒฝ๊ตฌ์ถ• 2-1) EEG(๋‡ŒํŒŒ) ์ธก์ • ์žฅ๋น„ ์ œ์ž‘ ์ด ์ „ ํฌ์ŠคํŠธ์—์„œ ์ž ๊น ์–ธ๊ธ‰ํ–ˆ๋‹ค์‹œํ”ผ ์•„๋ž˜์˜ ๊ฒƒ๋“ค์„ ํ•˜๋ ค ํ•œ๋‹ค. ํ–ˆ๋‹ค 1) EEG...

1. ๋‡Œ๋ฅผ ํ•ดํ‚นํ•˜์ž.

1. Intro ์ œ๋ชฉ์„ ์ด๋ ‡๊ฒŒ ํ•ด๋„ ๋˜๋‚˜..? ํ•ด๋‹น ๊ธ€์˜ ์นดํ…Œ๊ณ ๋ฆฌ๊ฐ€ โ€œEEG & BCIโ€์ธ๋ฐ, ์ฒ˜์Œ ์ ‘ํ•˜๋Š” ๋ถ„์•ผ์ด๋‹ค๋ณด๋‹ˆ ์นดํ…Œ๊ณ ๋ฆฌ ์ด๋ฆ„๋„ ๋งž๋Š”์ง€ ๋ชจ๋ฅด๊ฒ ๋‹ค (์ถ”ํ›„์— ์•„๋‹ˆ๋‹ค์‹ถ์œผ๋ฉด ๋ฐ”๊พธ๋Š”๊ฑธ๋กœํ•˜๊ณ ,,) 2. BCI(Brain-Computer Interface) BCI๋ž€? ์ตœ๊ทผ๋“ค์–ด์„œ ๋‡ŒํŒŒ(EEG), BCI(Brain-Computer Interface)์—...

ARM ์–ด์…ˆ๋ธ”๋ฆฌ์–ด Cross compileํ•˜๊ธฐ

์ผ๋ฐ˜ intel ์•„ํ‚คํ…์ฒ˜์—์„œ ARM ์•„ํ‚คํ…์ฒ˜์˜ ํ”„๋กœ๊ทธ๋žจ์„ ์ƒ์„ฑํ•˜๋Š” ํฌ๋กœ์Šค์ปดํŒŒ์ผ(Cross-Compile)์„ ๊ฐ„๋žตํžˆ ์„ค๋ช…ํ•œ๋‹ค. ํ…Œ์ŠคํŠธ ํ™˜๊ฒฝ์€ Ubuntu 14.04 64bit ์ด๋‹ค. $ uname -a Linux bk 3.13.0-51-generic #84-Ubuntu SMP Wed Apr 15 12:08:34 UTC 2015 x86_64 x86...

๋ธ”๋ฃจํˆฌ์Šค ์ด์–ดํฐ ํ•ดํ‚นํ•˜๊ธฐ

:: WARNING :: ์ด ํฌ์ŠคํŠธ๋Š” ๊ฐœ์ธ ๊ณต๋ถ€๋ฅผ ์œ„ํ•ด ๊ฒŒ์‹œ๋œ ๊ธ€์ž…๋‹ˆ๋‹ค. ์•…์˜์ ์œผ๋กœ ์ด์šฉ์‹œ ๋ชจ๋“  ์ฑ…์ž„์€ ๋‹น์‚ฌ์ž์—๊ฒŒ ์žˆ์œผ๋ฉฐ ์ž‘์„ฑ์ž๋Š” ์ฑ…์ž„์„ ์ง€์ง€ ์•Š๊ฒ ์Šต๋‹ˆ๋‹ค. 0x01. ๋ธ”๋ฃจํˆฌ์Šค ํ™˜๊ฒฝ 1) Hacker : Bluetooth-v2.1 (os : kali linux) 2) Victim - Earset : Bluetooth-v3.0 3) SmartP...