Real Geeks

와우해커 해킹책 두번째 이야기 - 와우스토리 리로디드-

카테고리 없음


엄청나게 인기가 많았던 와우해커에서 출판한 와우스토리 첫번째이야기에 이어

와우스토리 두번째 이야기인 와우해커 리로디드 라는 책이 나와 오늘 부터 판매에 들어갔다.

구매는 http://www.hackerbook.net 에서 구매할 수 있다.



와우스토리 첫번째판을 구매하지 않으셨던 분은 , 1과 2를 동시에 구입하면 할인혜택이 주어지며

이번에 함께 나온 자바해킹 이라는 책과도 함께 구매하면 좀더 많은 할인 혜택이 주어집니다.

와우 스토리 두번째판의 내용은 실제 분석등의 업무에 도움이 되는 테크닉과 DDoS 공격 기법에 대한 이해 및

방법론에 대해서 알수 있다.


내용안내)

두번째 이야기 “The WOWHACKER Reloaded” 에서는 입문자를 위한 해킹이나 보안에 대한 기초 주제를 와우해커 (http://www.wowhacker.org) 
자유게시판에서 투표 한 결과 “버퍼오버플로우”, “쿠키 스니핑 스푸핑”, “포렌식”, “DDos”가 선택되어서 해당 주제에 대하여 작성되었고 
그 외에 멤버들이 작성한 “파일 시스템 직접 접근으로 접근제어 우회하기”, ”애플릿 보안”, “UNPACKING을 위한 코드 인젝션”, “DLL INJECTION”의 
총 9개의 주제로 구성되어 있습니다. 
또한 독자분들이 이해를 돕기 위하여 각 단원의 첫 장에 주제 밑에 난이도를 별표(☆★)로 다섯개 까지 표시하였으며 채워진 별표 만큼 
난이도가 높은 내용입니다.  
목차 
쿠키스니핑,스푸핑	1
1. 들어가면서	2
1.1. 쿠키란 무엇일까?	2
1.2. 쿠키는 어떻게 볼 수 있을까?	3
1.3. 쿠키는 왜 쓸까?	7
2. 쿠키와 세션	9
2.1. 쿠키의 문제점	9
2.2. 쿠키의 문제를 보완한 세션	13
3. 쿠키스니핑,스푸핑	15
3.1. 웹 서버 설치	15
3.2. XSS 란?	15
3.3. XSS 테스트	16
3.4. 쿠키스니핑	18
3.5. 쿠키스푸핑	20
3.6. 웹게임풀이(1)	22
3.7. 웹게임풀이(2)	24
3.8. 웹게임풀이(3)	28
4. 마치며	35
4.1. 결론	35
4.2. 참고자료	35

DDOS	36
1. DDOS 소개	37
1.1. DOS	37
1.2. DDOS	38
1.3. DRDOS	40
1.4. PDOS	41
2. DDOS 공격 기법	42
2.1. LAND ATTACK	42
2.2. PING OF DEATH	42
2.3. TEAR DROP ATTACK	43
2.4. ICMP FLOOD	43
2.5. ICMP ROUTER DISCOVERY ATTACK	44
2.6. SMURF ATTACK	45
2.7. UDP FLOOD	46
2.8. SYN FLOOD	46
2.9. SYSLOG FLOOD	48
2.10. AMPLIFICATION ATTACKS	48
2.11. GET FLOOD	49
2.12. CC ATTACK	49
3. DDOS TOOL 소개	50
3.1. TRIN00	50
3.2. TFN	50
3.3. STACHELDRAHT	51
3.4. DOSHTTP 2.0	52
3.5. 도깨비 DDOS, GANSI V2008, NETBOT ATTACKER	53
4. BOTNET	57
4.1. BOTNET 소개	57
4.2. BOTNET 구분	59
4.2.1. 중앙 집중형	59
4.2.2. P2P형	59
4.2.3. RANDOM형	59
4.3. BOTNET의 현재	60
5. 실제 사례	61
6. 탐지 및 대응 기법	62
6.1. 탐지	62
6.1.1. 엔트로피 연산법	62
6.1.2. 트래픽 볼륨	63
6.1.3. 카이 제곱 검증법	63
6.1.4. 패턴 매칭	64
6.1.5. PI마킹	64
6.1.6. MIB	65
6.1.7. 데이터 마이닝	65
6.2. 대응	66
7. 마치며	68
8. 참고 자료	69

BUFFER OVERFLOW	70
1. 들어가면서	71
1.1. 개요	71
2. BUFFER OVERFLOW란?	72
2.1. 취약성	72
2.2. 동작원리	72
2.3. 스택을 조작한다면?	73
3. SAMPLE CODE	75
3.1. 취약한 코드	75
3.2. 안전한 코드	78
4. 버퍼오버플로우 테스트	79
4.1. 프로그램 작성 및 취약성 테스트	79
4.2. 쉘 코드의 작성	81
4.3. 취약한 프로그램 공격	89
5. 결론	94
6. 참고문헌	95

BASIC COMPUTER FORENSICS	96
1. 들어가면서	97
1.1. 개요	97
2. COMPUTER FORENSICS 간보기	98
2.1. COMPUTER FORENSICS이란?	98
2.2. COMPUTER FORENSICS 유형	99
2.3. COMPUTER FORENSICS 주요 목적	99
3. COMPUTER FORENSICS 맛보기	101
3.1. 일상에서의 COMPUTER FORENSICS	101
3.2. 따라하는 COMPUTER FORENSICS	103
4. ANTI COMPUTER FORENSICS 간보기	116
4.1. ANTI COMPUTER FORENSICS 존재의 이유	116
4.2. ANTI COMPUTER FORENSICS 간보기	116
5. 마치며	120
5.1. 마치며	120
5.2. 참고문헌	120

DLL INJECTION	121
1. 들어가면서	122
1.1. 개요	122
2. DLL	123
2.1. DLL 이란?	123
3. DLL INJECTION	124
3.1. DLL INJECTION이란?	124
3.2. WINDOWS HOOK FUNCTION	124
3.2.1. HOOKING의 절차	125
3.2.2. SETWINDOWSHOOKEX	125
3.2.3. HOOKPROCEDURE	126
3.2.4. UNHOOKWINDOWSHOOKEX	126
3.2.5. 예제	127
3.2.5.1. DLL	127
3.3. CREATEREMOTETHREAD & LOADLIBRARY	131
3.3.1. CREATEREMOTETHREAD절차	132
3.3.2. GETMODULEHANDLE & GETPROCADDRESS	132
3.3.3. VIRCTUALALLOCEX & WRITEPROCESSMEMORY	133
3.3.4. CREATEREMOTETHREAD	134
3.3.5. 예제	134
4. 지뢰찾기 MAP HACK	139
4.1. 일반적인 제작 방법	139
4.1.1. 리버스 엔지니어링	139
4.1.2. DLL INJECTION	139
4.2. 소스코드	140
4.2.1. DLL	140
4.2.2. DLL INJECTOR	143
4.3. 실험 및 결과	145
5. 스피드 핵	147
5.1. 일반적인 제작 방법	147
5.1.1. USER LEVEL API HOOKING	148
5.1.1.1. IAT Patching	148
5.1.1.2. IAT Patching의 절차	148
5.1.2. DLL INJECTION	149
5.1.3. SPEED CONTROL	149
5.2. 소스코드	149
5.2.1. DLL	149
5.2.2. DLL INJECTOR	151
5.3. 실험 및 결과	152
6. 참고 자료	154

APPLET SECURITY	155
1. 들어가면서	156
1.1. 개요	156
1.2. SAND BOX	156
1.3. 잔액조회 애플릿	158
2. 공격	159
2.1. 클라이언트 다운로드	159
2.2. 역컴파일	161
2.2.1. JAD	161
2.2.2. 사용법	162
2.2.3. 다운로드된 애플릿 CLASS파일 역컴파일	163
2.3. 정보분석	165
3. 방어	171
3.1. 중요 데이터 노출	171
3.1.1. 서블릿(JSP) 호출 방법	171
3.2. 역컴파일 방지	172
3.2.1. 혼란기법(OBFUSCATOR)	172
3.2.2. JODE	172
4. 결론	183

UNPACKING을 위한 코드 인젝션	184
1. 들어가면서	185
1.1. 개요	186
1.2. 먼저 알아야 할 것들	186
2. 인젝터, 타겟에 로더 삽입하기	187
2.1. CREATEPROCESS & CREATEREMOTETHREAD	187
2.2. VIRTUALALLOCEX & WRITEPROCESSMEMORY	189
2.3. 작성한 코드 영역 찾기	190
2.4. 방법론	192
3. 로더, 모든 것을 위한 준비	193
3.1. KERNEL32.DLL로부터 사용할 함수 획득하기	193
3.2. IAT 후킹하기	201
3.3. EXPORT TABLE PATCHING	204
3.4. 로거(LOGGER)를 위한 준비	208
3.5. 방법론	209
4. EXCEPTION 정보 알아내기	211
5. SELF-TRACING	215
6. 결론 & 참고문헌	217

파일 시스템 직접 접근으로 접근제어 우회하기	218
1. 들어가면서	219
1.1. 개요	219
2. 파일 시스템 이론(FILE SYSTEM THEORY)	220
2.1. 클러스터(CLUSTER)	220
2.2. DOS 파티션	221
2.3. EXT2 파일 시스템	223
3. 데이터 영역 이해하기(UNDERSTAND OF DATA AREA)	241
3.1. 디렉터리 엔트리(DIRECTORY ENTRY)	241
3.2. 파일 데이터(FILE DATA)	248
4. 접근제어 우회하기(BYPASS ACCESS CONTROL)	255
4.1. 국부적인 설정(SECTIONALLY CONFIGURATION)	255
4.2. 접근제어 우회하기(BYPASS ACCESS CONTROL)	258
4.3. 데이터 추출하기	267
4.4. 문제에 대한 해결책	268
5. 마치며..(EPILOGUE)	272
6. 참고자료(REFERENCE)	273
http://www.hackerbook.net 

와우스토리 한정판 레어 아이템!!

시스템/IT/탐나는정보들

남은 수량이 얼마없어서.. 한번더 그냥 포스팅 해봅니다.

누군가가 보고 도움이 누군가에게 도움이 되지 않을까 하는...



http://book.sessak.com

와우해커에서 만든 레어북!!

와우스토리 첫번째 이야기..

관심가져주시길. ㅋㅋ


Content
<BHO> .............................................................................................................................................................................................. 9
1. BHO(Browser Helper Object) ............................................................................................................................. 11
1.1. What’s BHO .............................................................................................................................................................................. 11
1.2. Why BHO .................................................................................................................................................................................. 11
1.3. CLSID(Class ID)? ..................................................................................................................................................................... 11
1.4. DLL(Dynamic Link Library) .............................................................................................................................................. 12
1.5. Malignancy BHO(Spyware) .............................................................................................................................................. 12
2. Example for a BHO ............................................................................................................................................. 12
2.1. Environment ............................................................................................................................................................................ 12
2.2. For a testBHO ......................................................................................................................................................................... 13
2.2.1. ATL(Active Template Library) .................................................................................................... 13
2.2.2. BHO 등록 ...................................................................................................................................... 16
3. How to Clear Malignancy BHO ......................................................................................................................... 19
3.1. A way of Softeware ............................................................................................................................................................. 19
3.2. Clear by hand ......................................................................................................................................................................... 21
4. Conclusion ............................................................................................................................................................. 22
5. Reference ............................................................................................................................................................... 23
<악성코드 인코딩 디코딩> ......................................................................................................................................... 24
1. 악성코드의 정의 .................................................................................................................................................... 26
2. 악성코드의 종류 .................................................................................................................................................... 26
3. 악성코드 인코딩과 디코딩의 방법 소개와 분석 ............................................................................................... 27
3.1. HTML Page escape/unescape ........................................................................................................................................ 27
3.2. ‘\’ Encoding ............................................................................................................................................................................ 28
3.3. Microsoft Script Encoder .................................................................................................................................................. 29
3.4. US-ASCII .................................................................................................................................................................................... 31
4. 결론 ......................................................................................................................................................................... 33
5. Reference ............................................................................................................................................................... 33
<WHS, VBS를 이용한 악성코드> .......................................................................................................................... 34
1. WSH(Windows Script Host)와 VBS(Visual Basic Script) ................................................................................... 36
1.1. WSH ............................................................................................................................................................................................. 36
1.2. VBS ............................................................................................................................................................................................... 36
2. VBS 사용방법 ............................................................................................................................................................. 36
2.1. Wscript.Shell ............................................................................................................................................................................ 36
2.2. 레지스트리편집 ........................................................................................................................................................................ 37
2.3. Scripting.FileSystemObject .............................................................................................................................................. 38
2.4. Wscript.Network ................................................................................................................................................................... 39
-4-
2.5. Microsoft.XMLHttp .............................................................................................................................................................. 39
2.6. ADODB.Stream ....................................................................................................................................................................... 40
2.7. 웹에서의 스크립트 사용 ...................................................................................................................................................... 40
3. VBS의 실제 사용 ....................................................................................................................................................... 42
3.1. 폴더에 자기 자신을 복사 ................................................................................................................................................... 42
3.2. 시작 레지스트리에 등록 ...................................................................................................................................................... 43
3.3. 웹사이트에서 악성코드 다운로드 ................................................................................................................................... 44
4. 방어 ......................................................................................................................................................................... 46
5. 결론 ......................................................................................................................................................................... 46
6. 참고문헌 ................................................................................................................................................................. 47
<관리자 백도어 계정과 탐지> ................................................................................................................................. 49
1. 관리자 백도어 계정 .............................................................................................................................................. 51
1.1. ‘$’백도어 계정 ......................................................................................................................................................................... 51
1.2. 레지스트리 변조 백도어 계정 .......................................................................................................................................... 52
1.3. SAM 레지스트리..................................................................................................................................................................... 53
2. 관리자 백도어 계정 탐지 방법 ............................................................................................................................ 56
2.1. ‘$’ 백도어 계정 탐지 ............................................................................................................................................................ 56
2.2. 레지스트리 변조 백도어 탐지 .......................................................................................................................................... 57
3. 결론 ......................................................................................................................................................................... 59
4. 참고문헌 ................................................................................................................................................................. 59
<The Way of Binary Copy Without Permission> ............................................................................... 60
1. 들어가며 ................................................................................................................................................................. 61
2. Linux, FreeBSD 란? .............................................................................................................................................. 61
3. 방법론 ..................................................................................................................................................................... 61
4. ptrace의 소개 ........................................................................................................................................................ 63
5. 핵심코드 ................................................................................................................................................................. 64
6. Let’s play hktrace ................................................................................................................................................. 70
7. 마치며 ..................................................................................................................................................................... 74
8. 참고자료 ................................................................................................................................................................. 74
9. 소스코드 첨부( hktrace.c ) .................................................................................................................................. 74
<Heap-Based Overflow for Baby> .................................................................................................................... 84
1. 서론[기본지식] ....................................................................................................................................................... 86
1.1. OverFlow의 개념 ................................................................................................................................................................... 86
1.2. Memory 구조 .......................................................................................................................................................................... 87
1.3. Heap Memory와 그 구조 .................................................................................................................................................. 89
2. Detail of malloc() ................................................................................................................................................. 91
2.1. Malloc의 기본 원리 .............................................................................................................................................................. 91
2.2. Heap Memory의 구조 ......................................................................................................................................................... 94
3. Heap Overflow Attack ........................................................................................................................................ 97
-5-
3.1. Heap Overflow공격의 가능성.......................................................................................................................................... 97
3.2. Simple Heap-Based Overflow Attack!! ...................................................................................................................... 99
4. 결론 ....................................................................................................................................................................... 103
5. 참조문헌 ............................................................................................................................................................... 103
<SELinux Operations & Sources Analysis> ............................................................................................ 104
1. SELinux 소개 및 기능 ........................................................................................................................................ 106
2. SELinux 설치 및 운용 ........................................................................................................................................ 107
2.1. 설치 및 운용 모드 ........................................................................................................................................................... 107
2-2. 지원되는 응용 프로그램 ............................................................................................................................................... 108
2-3. 정책 만들기 및 정보조회 ............................................................................................................................................. 112
2-4. semodule의 사용 ............................................................................................................................................................ 126
2-5. audit2allow의 사용 ........................................................................................................................................................ 127
3. 감사 로그 분석 .................................................................................................................................................... 128
4. SELinux 동작 구조 ............................................................................................................................................. 129
4-1. SELinux 전체 구조 .......................................................................................................................................................... 129
4-2. LSM Hook 과정 ............................................................................................................................................................... 130
4-3. LSM 커널 모듈 구조...................................................................................................................................................... 131
4-4. 사용자 공간의 객체 관리자 ........................................................................................................................................ 132
4-5. 사용자 공간의 정책 서버 ............................................................................................................................................. 133
4-6. 타입 전이 과정 ................................................................................................................................................................. 134
5. SELinux 소스분석 ............................................................................................................................................... 135
5-1. SELinux는 어디서부터 시작하는가 ........................................................................................................................... 135
5-2. 주요함수 호출 관계도 ................................................................................................................................................... 136
5-2. SID는 어디에 저장되는가 ............................................................................................................................................ 142
5-3. Security Context는 어떻게 사용되는가 ................................................................................................................. 143
5-4. S. O. A. 란? ........................................................................................................................................................................ 144
5-5. Process가 결정될 때 타입 결정 ............................................................................................................................... 145
6. 결 론 ..................................................................................................................................................................... 145
7. 참고자료(Reference) .......................................................................................................................................... 146
<Passive OS Fingerprint 소개> ........................................................................................................................... 147
1. 개요 ....................................................................................................................................................................... 149
2. OS Fingerprint 기법 .......................................................................................................................................... 149
2.1. Active OS Fingerprint ...................................................................................................................................................... 149
2.2. Passive OS Fingerprint .................................................................................................................................................... 150
3. Passive OS Fingerprint ..................................................................................................................................... 150
3.1. 원리 ............................................................................................................................................................................................ 150
3.1.1. TTL(Time To Live) ...................................................................................................................... 150
3.1.2. Window Size ............................................................................................................................... 152
3.1.3. DF : Don’t Flagment bit ........................................................................................................... 152
3.1.4. TOS(Type Of Service) ................................................................................................................ 152
-6-
3.1.5. Passive OS Fingerprinting ........................................................................................................ 152
3.2. TOOL ......................................................................................................................................................................................... 154
3.2.1. Download ................................................................................................................................... 154
3.2.2. 사용 .............................................................................................................................................. 154
4. 방어 ....................................................................................................................................................................... 155
5. 결론 ....................................................................................................................................................................... 156
6. 참고문헌 ............................................................................................................................................................... 157
<PE Unpacking>…………………………………………………………………………………………………………………………….. 147
1. 들어가면서 ........................................................................................................................................................... 160
2. Packing이란 무엇인가........................................................................................................................................ 160
3. Packing된 파일은 어떻게 실행이 되는 것인가 .............................................................................................. 161
4. Packing된 파일인지 아닌지를 어떻게 판단 할 것인가 ................................................................................. 165
4.1. Section의 Naming ............................................................................................................................................................. 167
4.2 Import Table이 눈에 띄게 작은 경우 ........................................................................................................................ 167
4.3 String Table에 알 수 없는 값들로 채워져 있거나 아예 없는 경우 ............................................................. 168
4.4 Standard Entry Point가 아닐 경우 ............................................................................................................................. 168
5 OEP를 찾아내자 .................................................................................................................................................. 169
5.1 Stack Based ........................................................................................................................................................................... 169
5.1.1 OEP Find – 1 ............................................................................................................................... 170
5.1.2 OEP Find – 2 ............................................................................................................................... 175
6 이미지를 덤프하자 .............................................................................................................................................. 180
6.1 Dump by OllyDump ......................................................................................................................................................... 180
6.2 Dump by PE-Tools ............................................................................................................................................................. 181
6.3 Dump by LordPE ................................................................................................................................................................ 181
7 IAT를 복구하자 .................................................................................................................................................... 182
7.1 자동화 툴을 이용한 IAT 복구 ....................................................................................................................................... 183
7.1.1 자동으로 복구 해주니까 편하네 ............................................................................................... 183
7.1.2 왜 IAT복구를 못하는 거지? ....................................................................................................... 184
7.2 직접 IAT를 복구하자 ......................................................................................................................................................... 190
7.2.1 프로그램 로드 전과 후의 IAT의 모습은 어떨까? .................................................................. 190
7.2.2 이제 직접 IAT를 복구해보자 .................................................................................................... 196
8 Anti-Reversing만 없으면 좋으련만 .................................................................................................................. 210
8.1 Debugger Detection ......................................................................................................................................................... 210
8.1.1 OutputDebugString.................................................................................................................. 210
8.1.2 PEB.BeingDebugged ................................................................................................................. 213
8.1.3 PEB.NtGlobalFlag ....................................................................................................................... 214
8.1.4 HEAP.ForceFlags ......................................................................................................................... 216
8.1.5 FindWindow ............................................................................................................................... 219
8.2 Anti-Analysis ........................................................................................................................................................................ 222
8.2.1 Stolen Byte ................................................................................................................................. 222
8.2.2 Gabage Code .............................................................................................................................. 223
-7-
8.2.3 Junk Code .................................................................................................................................. 224
8.3 Breakpoint Detection ....................................................................................................................................................... 226
8.3.1 소프트웨어 브레이크 포인트 탐지 ........................................................................................... 226
8.3.2 하드웨어 브레이크 포인트 탐지 ............................................................................................... 229
9 이제 MUP를 해보자 ........................................................................................................................................... 235
9.1 GHF Protector - Full Option ........................................................................................................................................ 235
9.1.1 Protect 옵션 벗겨내기 .............................................................................................................. 235
9.1.2 Pack 옵션 벗겨내기 ................................................................................................................... 245
9.1.3 IAT 복구와 덤프하기 .................................................................................................................. 248
10 마치면서 ............................................................................................................................................................... 256
11 Reference & Thanks .......................................................................................................................................... 256
<Hackers in China> ........................................................................................................................................................ 258
1. 중국 해커 전쟁 연대기 ...................................................................................................................................... 260
2. 중국 해커 그룹 사이트 ...................................................................................................................................... 262
3. 중국 해킹 잡지 사이트 ...................................................................................................................................... 266
4. 중국 해커 연구 그룹 사이트 .............................................................................................................................. 267
5. 마치며 ................................................................................................................................................................... 271
6. 컴퓨터 IT 보안관련 용어(한.영.중) .................................................................................................................... 272
-8-

해킹 보안 기술책 소개 - 와우 스토리 (와우해커)

AB형의 GEEK
와우해커의 첫번째 오프라인 북 이야기

와우스토리.. 입니다.

와우해커에서 자체 제작한 책이며, 와우해커에서만 만날수 있습니다.

http://book.sessak.com 에서 목차랑 샘플을 볼 수 있습니다.

목차 및 샘플 PDF 파일 링크  클릭

수익금 전액 다시 두번째 이야기 책 제작을 위해서 사용 됩니다.

사용자 삽입 이미지


http://book.sessak.com

'AB형의 GEEK' 카테고리의 다른 글

구입 예정 목록에 추가  (1) 2008.05.13
우연히 본 마음에 드는 기사  (2) 2008.05.10
Jr, HONG 의 아이디  (1) 2008.04.30
그레이드를 쫏아가기 버겁다.  (2) 2008.04.29
와우해커 행사용 광고 영상  (2) 2008.04.12