free
Tip
AWS ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:
HackTricks Training AWS Red Team Expert (ARTE)
GCP ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:HackTricks Training GCP Red Team Expert (GRTE)
Azure ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricks ์ง์ํ๊ธฐ
- ๊ตฌ๋ ๊ณํ ํ์ธํ๊ธฐ!
- **๐ฌ ๋์ค์ฝ๋ ๊ทธ๋ฃน ๋๋ ํ ๋ ๊ทธ๋จ ๊ทธ๋ฃน์ ์ฐธ์ฌํ๊ฑฐ๋ ํธ์ํฐ ๐ฆ @hacktricks_live๋ฅผ ํ๋ก์ฐํ์ธ์.
- HackTricks ๋ฐ HackTricks Cloud ๊นํ๋ธ ๋ฆฌํฌ์งํ ๋ฆฌ์ PR์ ์ ์ถํ์ฌ ํดํน ํธ๋ฆญ์ ๊ณต์ ํ์ธ์.
Free ์ฒ๋ฆฌ ์์ ์์ฝ
(์ด ์์ฝ์์๋ ๊ฒ์ฌ๋ค์ ์ค๋ช ๋์ง ์์์ผ๋ฉฐ ์ผ๋ถ ๊ฒฝ์ฐ๋ ๊ฐ๋ตํ๋ฅผ ์ํด ์๋ต๋์์ต๋๋ค)
- ์ฃผ์๊ฐ null์ด๋ฉด ์๋ฌด ์์ ๋ ํ์ง ์์
- chunk๊ฐ mmaped๋ ๊ฒฝ์ฐ munmapํ๊ณ ์ข ๋ฃ
_int_free๋ฅผ ํธ์ถ:- ๊ฐ๋ฅํ๋ฉด chunk๋ฅผ tcache์ ์ถ๊ฐ
- ๊ฐ๋ฅํ๋ฉด chunk๋ฅผ fast bin์ ์ถ๊ฐ
- chunk๋ฅผ ํตํฉ(consolidate)ํด์ผ ํ๋ฉด
_int_free_merge_chunk๋ฅผ ํธ์ถํ๊ณ unsorted list์ ์ถ๊ฐ
์ฐธ๊ณ : glibc 2.42๋ถํฐ tcache ๋จ๊ณ๋ ํจ์ฌ ๋ ํฐ ํฌ๊ธฐ ์๊ณ๊ฐ๊น์ง์ chunk๋ ์์ฉํ ์ ์์ต๋๋ค (์๋ โRecent glibc changesโ ์ฐธ์กฐ). ์ด๋ก ์ธํด free๊ฐ tcache์ ๋ค์ด๊ฐ๋์ง ์๋๋ฉด unsorted/small/large bins์ ๋ค์ด๊ฐ๋์ง๊ฐ ๋ฌ๋ผ์ง๋๋ค.
__libc_free
Free๊ฐ __libc_free๋ฅผ ํธ์ถํฉ๋๋ค.
- ์ฃผ์๊ฐ Null (0)์ด๋ฉด ์๋ฌด ์์ ๋ ํ์ง ์์.
- pointer tag๋ฅผ ํ์ธ
- chunk๊ฐ
mmaped๋ ๊ฒฝ์ฐmunmapํ๊ณ ๋ - ๊ทธ๋ ์ง ์์ผ๋ฉด color๋ฅผ ์ถ๊ฐํ๊ณ
_int_free๋ฅผ ํธ์ถ
__lib_free ์ฝ๋
```c void __libc_free (void *mem) { mstate ar_ptr; mchunkptr p; /* chunk corresponding to mem */if (mem == 0) /* free(0) has no effect */ return;
/* Quickly check that the freed pointer matches the tag for the memory. This gives a useful double-free detection. */ if (__glibc_unlikely (mtag_enabled)) *(volatile char *)mem;
int err = errno;
p = mem2chunk (mem);
if (chunk_is_mmapped (p)) /* release mmapped memory. / { / See if the dynamic brk/mmap threshold needs adjusting. Dumped fake mmapped chunks do not affect the threshold. */ if (!mp_.no_dyn_threshold && chunksize_nomask (p) > mp_.mmap_threshold && chunksize_nomask (p) <= DEFAULT_MMAP_THRESHOLD_MAX) { mp_.mmap_threshold = chunksize (p); mp_.trim_threshold = 2 * mp_.mmap_threshold; LIBC_PROBE (memory_mallopt_free_dyn_thresholds, 2, mp_.mmap_threshold, mp_.trim_threshold); } munmap_chunk (p); } else { MAYBE_INIT_TCACHE ();
/* Mark the chunk as belonging to the library again. */ (void)tag_region (chunk2mem (p), memsize (p));
ar_ptr = arena_for_chunk (p); _int_free (ar_ptr, p, 0); }
__set_errno (err); } libc_hidden_def (__libc_free)
</details>
## _int_free <a href="#int_free" id="int_free"></a>
### _int_free start <a href="#int_free" id="int_free"></a>
๋จผ์ ๋ช ๊ฐ์ง ๊ฒ์ฌ๋ฅผ ์งํํฉ๋๋ค:
- **pointer**๊ฐ **aligned** ๋์ด ์๋์ง ํ์ธํฉ๋๋ค. ๊ทธ๋ ์ง ์์ผ๋ฉด ์ค๋ฅ `free(): invalid pointer`๊ฐ ๋ฐ์ํฉ๋๋ค.
- **size**๊ฐ ์ต์๊ฐ๋ณด๋ค ์์ง ์์์ง, ๊ทธ๋ฆฌ๊ณ **size**๊ฐ ๋ํ **aligned** ๋์ด ์๋์ง ํ์ธํฉ๋๋ค. ๊ทธ๋ ์ง ์์ผ๋ฉด ์ค๋ฅ `free(): invalid size`๊ฐ ๋ฐ์ํฉ๋๋ค.
<details>
<summary>_int_free start</summary>
```c
// From https://github.com/bminor/glibc/blob/f942a732d37a96217ef828116ebe64a644db18d7/malloc/malloc.c#L4493C1-L4513C28
#define aligned_OK(m) (((unsigned long) (m) &MALLOC_ALIGN_MASK) == 0)
static void
_int_free (mstate av, mchunkptr p, int have_lock)
{
INTERNAL_SIZE_T size; /* its size */
mfastbinptr *fb; /* associated fastbin */
size = chunksize (p);
/* Little security check which won't hurt performance: the
allocator never wraps around at the end of the address space.
Therefore we can exclude some size values which might appear
here by accident or by "design" from some intruder. */
if (__builtin_expect ((uintptr_t) p > (uintptr_t) -size, 0)
|| __builtin_expect (misaligned_chunk (p), 0))
malloc_printerr ("free(): invalid pointer");
/* We know that each chunk is at least MINSIZE bytes in size or a
multiple of MALLOC_ALIGNMENT. */
if (__glibc_unlikely (size < MINSIZE || !aligned_OK (size)))
malloc_printerr ("free(): invalid size");
check_inuse_chunk(av, p);
_int_free tcache
๋จผ์ ๊ด๋ จ tcache์ ์ด chunk๋ฅผ ํ ๋นํ๋ ค ์๋ํฉ๋๋ค. ๋ค๋ง, ๊ทธ์ ์์ ๋ช ๊ฐ์ง ๊ฒ์ฌ๊ฐ ์ํ๋ฉ๋๋ค. ํด์ ๋ chunk์ ๊ฐ์ ์ธ๋ฑ์ค์ ์๋ tcache์ ๋ชจ๋ chunk๋ฅผ ์ํํ๋ฉฐ ๋ค์์ ๊ฒ์ฌํฉ๋๋ค:
- ๋ง์ฝ ํญ๋ชฉ ์๊ฐ
mp_.tcache_count๋ณด๋ค ๋ง์ผ๋ฉด:free(): too many chunks detected in tcache - ํญ๋ชฉ์ด ์ ๋ ฌ๋์ด ์์ง ์์ผ๋ฉด:
free(): unaligned chunk detected in tcache 2 - ํด์ ๋ chunk๊ฐ ์ด๋ฏธ ํด์ ๋์ด tcache์ chunk๋ก ์กด์ฌํ๋ฉด:
free(): double free detected in tcache 2
๋ชจ๋ ๊ฒ์ฌ๊ฐ ํต๊ณผํ๋ฉด, chunk๋ tcache์ ์ถ๊ฐ๋๋ฉฐ ํจ์๋ ๋ฐํํฉ๋๋ค.
_int_free tcache
```c // From https://github.com/bminor/glibc/blob/f942a732d37a96217ef828116ebe64a644db18d7/malloc/malloc.c#L4515C1-L4554C7 #if USE_TCACHE { size_t tc_idx = csize2tidx (size); if (tcache != NULL && tc_idx < mp_.tcache_bins) { /* Check to see if it's already in the tcache. */ tcache_entry *e = (tcache_entry *) chunk2mem (p);/* This test succeeds on double free. However, we donโt 100% trust it (it also matches random payload data at a 1 in 2^<size_t> chance), so verify itโs not an unlikely coincidence before aborting. / if (_glibc_unlikely (e->key == tcache_key)) { tcache_entry *tmp; size_t cnt = 0; LIBC_PROBE (memory_tcache_double_free, 2, e, tc_idx); for (tmp = tcache->entries[tc_idx]; tmp; tmp = REVEAL_PTR (tmp->next), ++cnt) { if (cnt >= mp.tcache_count) malloc_printerr (โfree(): too many chunks detected in tcacheโ); if (__glibc_unlikely (!aligned_OK (tmp))) malloc_printerr (โfree(): unaligned chunk detected in tcache 2โ); if (tmp == e) malloc_printerr (โfree(): double free detected in tcache 2โ); / If we get here, it was a coincidence. Weโve wasted a few cycles, but donโt abort. */ } }
if (tcache->counts[tc_idx] < mp_.tcache_count) { tcache_put (p, tc_idx); return; } } } #endif
</details>
### _int_free fast bin <a href="#int_free" id="int_free"></a>
์ฐ์ ํฌ๊ธฐ๊ฐ fast bin์ ์ ํฉํ์ง ํ์ธํ๊ณ , ๊ทธ๊ฒ์ top chunk ๊ทผ์ฒ๋ก ์ค์ ํ ์ ์๋์ง ํ์ธํ๋ค.
๊ทธ๋ค์, freed chunk๋ฅผ fast bin์ top์ ์ถ๊ฐํ๋ฉด์ ๋ช ๊ฐ์ง ๊ฒ์ฌ๋ฅผ ์ํํ๋ค:
- ์ฒญํฌ์ ํฌ๊ธฐ๊ฐ ์ ํจํ์ง ์์ผ๋ฉด(๋๋ฌด ํฌ๊ฑฐ๋ ์์ ๊ฒฝ์ฐ) ๋ฐ์: `free(): invalid next size (fast)`
- ์ถ๊ฐํ๋ ค๋ ์ฒญํฌ๊ฐ ์ด๋ฏธ fast bin์ top์ด์๋ค๋ฉด: `double free or corruption (fasttop)`
- fast bin์ top์ ์๋ ์ฒญํฌ ํฌ๊ธฐ๊ฐ ์ฐ๋ฆฌ๊ฐ ์ถ๊ฐํ๋ ค๋ ์ฒญํฌ์ ๋ค๋ฅด๋ฉด: `invalid fastbin entry (free)`
<details>
<summary>_int_free Fast Bin</summary>
```c
// From https://github.com/bminor/glibc/blob/f942a732d37a96217ef828116ebe64a644db18d7/malloc/malloc.c#L4556C2-L4631C4
/*
If eligible, place chunk on a fastbin so it can be found
and used quickly in malloc.
*/
if ((unsigned long)(size) <= (unsigned long)(get_max_fast ())
#if TRIM_FASTBINS
/*
If TRIM_FASTBINS set, don't place chunks
bordering top into fastbins
*/
&& (chunk_at_offset(p, size) != av->top)
#endif
) {
if (__builtin_expect (chunksize_nomask (chunk_at_offset (p, size))
<= CHUNK_HDR_SZ, 0)
|| __builtin_expect (chunksize (chunk_at_offset (p, size))
>= av->system_mem, 0))
{
bool fail = true;
/* We might not have a lock at this point and concurrent modifications
of system_mem might result in a false positive. Redo the test after
getting the lock. */
if (!have_lock)
{
__libc_lock_lock (av->mutex);
fail = (chunksize_nomask (chunk_at_offset (p, size)) <= CHUNK_HDR_SZ
|| chunksize (chunk_at_offset (p, size)) >= av->system_mem);
__libc_lock_unlock (av->mutex);
}
if (fail)
malloc_printerr ("free(): invalid next size (fast)");
}
free_perturb (chunk2mem(p), size - CHUNK_HDR_SZ);
atomic_store_relaxed (&av->have_fastchunks, true);
unsigned int idx = fastbin_index(size);
fb = &fastbin (av, idx);
/* Atomically link P to its fastbin: P->FD = *FB; *FB = P; */
mchunkptr old = *fb, old2;
if (SINGLE_THREAD_P)
{
/* Check that the top of the bin is not the record we are going to
add (i.e., double free). */
if (__builtin_expect (old == p, 0))
malloc_printerr ("double free or corruption (fasttop)");
p->fd = PROTECT_PTR (&p->fd, old);
*fb = p;
}
else
do
{
/* Check that the top of the bin is not the record we are going to
add (i.e., double free). */
if (__builtin_expect (old == p, 0))
malloc_printerr ("double free or corruption (fasttop)");
old2 = old;
p->fd = PROTECT_PTR (&p->fd, old);
}
while ((old = catomic_compare_and_exchange_val_rel (fb, p, old2))
!= old2);
/* Check that size of fastbin chunk at the top is the same as
size of the chunk that we are adding. We can dereference OLD
only if we have the lock, otherwise it might have already been
allocated again. */
if (have_lock && old != NULL
&& __builtin_expect (fastbin_index (chunksize (old)) != idx, 0))
malloc_printerr ("invalid fastbin entry (free)");
}
_int_free ๊ฒฐ๋ง
๋ง์ฝ ์ฒญํฌ๊ฐ ์์ง ์ด๋ค bin์๋ ํ ๋น๋์ง ์์๋ค๋ฉด, _int_free_merge_chunk๋ฅผ ํธ์ถํ๋ค
_int_free ๊ฒฐ๋ง
```c /* Consolidate other non-mmapped chunks as they arrive. */else if (!chunk_is_mmapped(p)) {
/* If weโre single-threaded, donโt lock the arena. */ if (SINGLE_THREAD_P) have_lock = true;
if (!have_lock) __libc_lock_lock (av->mutex);
_int_free_merge_chunk (av, p, size);
if (!have_lock) __libc_lock_unlock (av->mutex); } /* If the chunk was allocated via mmap, release via munmap(). */
else { munmap_chunk (p); } }
</details>
## _int_free_merge_chunk
This function will try to merge chunk P of SIZE bytes with its neighbours. Put the resulting chunk on the unsorted bin list.
Some checks are performed:
- ๋ง์ฝ chunk๊ฐ top chunk๋ผ๋ฉด: `double free or corruption (top)`
- ๋ค์ chunk๊ฐ arena์ ๊ฒฝ๊ณ ๋ฐ์ ์๋ค๋ฉด: `double free or corruption (out)`
- ํด๋น chunk๊ฐ ์ฌ์ฉ ์ค์ผ๋ก ํ์๋์ด ์์ง ์๋ค๋ฉด(๋ค์ chunk์ `prev_inuse`์์): `double free or corruption (!prev)`
- ๋ค์ chunk์ size๊ฐ ๋๋ฌด ์๊ฑฐ๋ ํฌ๋ค๋ฉด: `free(): invalid next size (normal)`
- ์ด์ chunk๊ฐ ์ฌ์ฉ ์ค์ด์ง ์๋ค๋ฉด ๋ณํฉ์ ์๋ํฉ๋๋ค. ํ์ง๋ง prev_size๊ฐ ์ด์ chunk์ ํ์๋ size์ ๋ค๋ฅด๋ฉด: `corrupted size vs. prev_size while consolidating`
<details>
<summary>_int_free_merge_chunk code</summary>
```c
// From https://github.com/bminor/glibc/blob/f942a732d37a96217ef828116ebe64a644db18d7/malloc/malloc.c#L4660C1-L4702C2
/* Try to merge chunk P of SIZE bytes with its neighbors. Put the
resulting chunk on the appropriate bin list. P must not be on a
bin list yet, and it can be in use. */
static void
_int_free_merge_chunk (mstate av, mchunkptr p, INTERNAL_SIZE_T size)
{
mchunkptr nextchunk = chunk_at_offset(p, size);
/* Lightweight tests: check whether the block is already the
top block. */
if (__glibc_unlikely (p == av->top))
malloc_printerr ("double free or corruption (top)");
/* Or whether the next chunk is beyond the boundaries of the arena. */
if (__builtin_expect (contiguous (av)
&& (char *) nextchunk
>= ((char *) av->top + chunksize(av->top)), 0))
malloc_printerr ("double free or corruption (out)");
/* Or whether the block is actually not marked used. */
if (__glibc_unlikely (!prev_inuse(nextchunk)))
malloc_printerr ("double free or corruption (!prev)");
INTERNAL_SIZE_T nextsize = chunksize(nextchunk);
if (__builtin_expect (chunksize_nomask (nextchunk) <= CHUNK_HDR_SZ, 0)
|| __builtin_expect (nextsize >= av->system_mem, 0))
malloc_printerr ("free(): invalid next size (normal)");
free_perturb (chunk2mem(p), size - CHUNK_HDR_SZ);
/* Consolidate backward. */
if (!prev_inuse(p))
{
INTERNAL_SIZE_T prevsize = prev_size (p);
size += prevsize;
p = chunk_at_offset(p, -((long) prevsize));
if (__glibc_unlikely (chunksize(p) != prevsize))
malloc_printerr ("corrupted size vs. prev_size while consolidating");
unlink_chunk (av, p);
}
/* Write the chunk header, maybe after merging with the following chunk. */
size = _int_free_create_chunk (av, p, size, nextchunk, nextsize);
_int_free_maybe_consolidate (av, size);
}
๊ณต๊ฒฉ์ ๋ ธํธ ๋ฐ ์ต๊ทผ ๋ณ๊ฒฝ์ฌํญ (2023โ2025)
- Safe-Linking in tcache/fastbins:
free()stores thefdpointer of singly-linked lists using the macroPROTECT_PTR(pos, ptr) = ((size_t)pos >> 12) ^ (size_t)ptr. ์ด๋ tcache poisoning์ ์ํด ๊ฐ์ง next ํฌ์ธํฐ๋ฅผ ๋ง๋ค๋ ค๋ฉด ๊ณต๊ฒฉ์๊ฐ ํ ์ฃผ์๋ฅผ ์์์ผ ํจ์ ์๋ฏธํฉ๋๋ค(์: leakchunk_addr, ๊ทธ๋ฐ ๋ค์chunk_addr >> 12๋ฅผ XOR ํค๋ก ์ฌ์ฉ). ์์ธํ ๋ด์ฉ๊ณผ PoCs๋ ์๋์ tcache ํ์ด์ง๋ฅผ ์ฐธ์กฐํ์ธ์. - Tcache double-free detection: ์ฒญํฌ๋ฅผ tcache์ ๋ฃ๊ธฐ ์ ์
free()๋ ๊ฐ ํญ๋ชฉ์e->key๋ฅผ ์ค๋ ๋๋ณtcache_key์ ๋น๊ตํ๊ณ ์ค๋ณต์ ์ฐพ๊ธฐ ์ํดmp_.tcache_count๊น์ง ๋น์ ์ํํฉ๋๋ค. ์ค๋ณต์ด ๋ฐ๊ฒฌ๋๋ฉดfree(): double free detected in tcache 2๋ก abortํฉ๋๋ค. - Recent glibc change (2.42): tcache๊ฐ ํจ์ฌ ๋ ํฐ ์ฒญํฌ๋ฅผ ํ์ฉํ๋๋ก ํ์ฅ๋์์ผ๋ฉฐ, ์ด๋ ์๋ก์ด
glibc.malloc.tcache_max_bytestunable๋ก ์ ์ด๋ฉ๋๋ค.free()๋ ์ด์ ํด๋น ๋ฐ์ดํธ ํ๋๊น์ง ํด์ ๋ ์ฒญํฌ๋ฅผ ์บ์ํ๋ ค๊ณ ์๋ํฉ๋๋ค(mmapped ์ฒญํฌ๋ ์บ์๋์ง ์์ต๋๋ค). ์ด๋ก ์ธํด ํ๋ ์์คํ ์์ ํด์ ๋ ์ฒญํฌ๊ฐ unsorted/small/large bins์ผ๋ก ๋จ์ด์ง๋ ๋น๋๊ฐ ์ค์ด๋ญ๋๋ค.
Quick crafting of a safe-linked fd (for tcache poisoning)
# Given a leaked heap pointer to an entry located at &entry->next == POS
# compute the protected fd that points to TARGET
protected_fd = TARGET ^ (POS >> 12)
- ์ ์ฒด tcache poisoning walkthrough(๋ฐ safe-linking ํ์์์ ํ๊ณ)๋ฅผ ๋ณด๋ ค๋ฉด ๋ค์์ ์ฐธ์กฐํ์ธ์:
์ฐ๊ตฌ ์ค free ํธ์ถ์ด unsorted/small bins์ ๋๋ฌํ๋๋ก ๊ฐ์ ํ๊ธฐ
๋๋๋ก ๋ก์ปฌ ์คํ์ค ํ๊ฒฝ์์ ๊ณ ์ ์ ์ธ _int_free ๋์(unsorted bin consolidation ๋ฑ)์ ๊ด์ฐฐํ๊ธฐ ์ํด tcache๋ฅผ ์์ ํ ํํผํ๊ณ ์ถ์ ๋๊ฐ ์์ต๋๋ค. GLIBC_TUNABLES๋ก ์ด ์์
์ ํ ์ ์์ต๋๋ค:
# Disable tcache completely
GLIBC_TUNABLES=glibc.malloc.tcache_count=0 ./vuln
# Pre-2.42: shrink the maximum cached request size to 0
GLIBC_TUNABLES=glibc.malloc.tcache_max=0 ./vuln
# 2.42+: cap the new large-cache threshold (bytes)
GLIBC_TUNABLES=glibc.malloc.tcache_max_bytes=0 ./vuln
HackTricks ๋ด ๊ด๋ จ ์ฝ์๊ฑฐ๋ฆฌ:
- First-fit/unsorted behaviour and overlap tricks:
- Double-free primitives and modern checks:
hooks์ ๋ํ ์ฃผ์: ๊ณ ์ ์ ์ธ
__malloc_hook/__free_hookoverwrite ๊ธฐ๋ฒ์ ์ต์ glibc (โฅ 2.34)์์๋ ์ ํจํ์ง ์์ต๋๋ค. ์ค๋๋ ์์ฑ๋ฌผ์์ ์ฌ์ ํ ๋ณด์ด๋ฉด IO_FILE, exit handlers, vtables ๋ฑ ๋์ฒด ํ๊น์ผ๋ก ์ ์ํ์ธ์. ๋ฐฐ๊ฒฝ ์ง์์ HackTricks์ hooks ํ์ด์ง๋ฅผ ํ์ธํ์ธ์.
WWW2Exec - __malloc_hook & __free_hook
์ฐธ๊ณ ์๋ฃ
- GNU C Library โ NEWS for 2.42 (allocator: larger tcache via tcache_max_bytes, mmapped chunks are not cached) https://www.gnu.org/software/libc/NEWS.html#2.42
- Safe-Linking explanation and internals (Red Hat Developer, 2020) https://developers.redhat.com/articles/2020/05/13/new-security-hardening-gnu-c-library
Tip
AWS ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:
HackTricks Training AWS Red Team Expert (ARTE)
GCP ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:HackTricks Training GCP Red Team Expert (GRTE)
Azure ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricks ์ง์ํ๊ธฐ
- ๊ตฌ๋ ๊ณํ ํ์ธํ๊ธฐ!
- **๐ฌ ๋์ค์ฝ๋ ๊ทธ๋ฃน ๋๋ ํ ๋ ๊ทธ๋จ ๊ทธ๋ฃน์ ์ฐธ์ฌํ๊ฑฐ๋ ํธ์ํฐ ๐ฆ @hacktricks_live๋ฅผ ํ๋ก์ฐํ์ธ์.
- HackTricks ๋ฐ HackTricks Cloud ๊นํ๋ธ ๋ฆฌํฌ์งํ ๋ฆฌ์ PR์ ์ ์ถํ์ฌ ํดํน ํธ๋ฆญ์ ๊ณต์ ํ์ธ์.


