Rate Limit Bypass

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

Rate limit bypass techniques

Exploring Similar Endpoints

๋Œ€์ƒ ์—”๋“œํฌ์ธํŠธ์˜ ๋ณ€ํ˜•์— ๋Œ€ํ•ด ๋ฌด์ฐจ๋ณ„ ๊ณต๊ฒฉ์„ ์‹œ๋„ํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด /api/v3/sign-up์™€ ๊ฐ™์€ ์—”๋“œํฌ์ธํŠธ์˜ ๋ณ€ํ˜•์œผ๋กœ๋Š” /Sing-up, /SignUp, /singup, /api/v1/sign-up, /api/sign-up ๋“ฑ์ด ์žˆ์Šต๋‹ˆ๋‹ค.

Incorporating Blank Characters in Code or Parameters

์ฝ”๋“œ๋‚˜ ๋งค๊ฐœ๋ณ€์ˆ˜์— %00, %0d%0a, %0d, %0a, %09, %0C, %20์™€ ๊ฐ™์€ ๋นˆ ๋ฐ”์ดํŠธ๋ฅผ ์‚ฝ์ž…ํ•˜๋Š” ๊ฒƒ์€ ์œ ์šฉํ•œ ์ „๋žต์ด ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ๋งค๊ฐœ๋ณ€์ˆ˜๋ฅผ code=1234%0a๋กœ ์กฐ์ •ํ•˜๋ฉด ์ž…๋ ฅ์˜ ๋ณ€ํ˜•์„ ํ†ตํ•ด ์‹œ๋„๋ฅผ ํ™•์žฅํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ์ด๋ฉ”์ผ ์ฃผ์†Œ์— ์ค„ ๋ฐ”๊ฟˆ ๋ฌธ์ž๋ฅผ ์ถ”๊ฐ€ํ•˜์—ฌ ์‹œ๋„ ์ œํ•œ์„ ์šฐํšŒํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Manipulating IP Origin via Headers

ํ—ค๋”๋ฅผ ์ˆ˜์ •ํ•˜์—ฌ ์ธ์‹๋œ IP ์ถœ์ฒ˜๋ฅผ ๋ณ€๊ฒฝํ•˜๋ฉด IP ๊ธฐ๋ฐ˜ ์†๋„ ์ œํ•œ์„ ํ”ผํ•˜๋Š” ๋ฐ ๋„์›€์ด ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. X-Originating-IP, X-Forwarded-For, X-Remote-IP, X-Remote-Addr, X-Client-IP, X-Host, X-Forwared-Host์™€ ๊ฐ™์€ ํ—ค๋”๋ฅผ ์กฐ์ •ํ•˜์—ฌ ์—ฌ๋Ÿฌ ์ธ์Šคํ„ด์Šค์˜ X-Forwarded-For๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋‹ค๋ฅธ IP์—์„œ ์š”์ฒญ์„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

X-Originating-IP: 127.0.0.1
X-Forwarded-For: 127.0.0.1
X-Remote-IP: 127.0.0.1
X-Remote-Addr: 127.0.0.1
X-Client-IP: 127.0.0.1
X-Host: 127.0.0.1
X-Forwared-Host: 127.0.0.1

# Double X-Forwarded-For header example
X-Forwarded-For:
X-Forwarded-For: 127.0.0.1

๋‹ค๋ฅธ ํ—ค๋” ๋ณ€๊ฒฝํ•˜๊ธฐ

user-agent ๋ฐ ์ฟ ํ‚ค์™€ ๊ฐ™์€ ๋‹ค๋ฅธ ์š”์ฒญ ํ—ค๋”๋ฅผ ๋ณ€๊ฒฝํ•˜๋Š” ๊ฒƒ์ด ๊ถŒ์žฅ๋ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ํ—ค๋”๋Š” ์š”์ฒญ ํŒจํ„ด์„ ์‹๋ณ„ํ•˜๊ณ  ์ถ”์ ํ•˜๋Š” ๋ฐ ์‚ฌ์šฉ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ํ—ค๋”๋ฅผ ๋ณ€๊ฒฝํ•˜๋ฉด ์š”์ฒญ์ž์˜ ํ™œ๋™์„ ์ธ์‹ํ•˜๊ณ  ์ถ”์ ํ•˜๋Š” ๊ฒƒ์„ ๋ฐฉ์ง€ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

API ๊ฒŒ์ดํŠธ์›จ์ด ๋™์ž‘ ํ™œ์šฉํ•˜๊ธฐ

์ผ๋ถ€ API ๊ฒŒ์ดํŠธ์›จ์ด๋Š” ์—”๋“œํฌ์ธํŠธ์™€ ๋งค๊ฐœ๋ณ€์ˆ˜์˜ ์กฐํ•ฉ์— ๋”ฐ๋ผ ์†๋„ ์ œํ•œ์„ ์ ์šฉํ•˜๋„๋ก ๊ตฌ์„ฑ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. ๋งค๊ฐœ๋ณ€์ˆ˜ ๊ฐ’์„ ๋ณ€๊ฒฝํ•˜๊ฑฐ๋‚˜ ์ค‘์š”ํ•˜์ง€ ์•Š์€ ๋งค๊ฐœ๋ณ€์ˆ˜๋ฅผ ์š”์ฒญ์— ์ถ”๊ฐ€ํ•จ์œผ๋กœ์จ ๊ฒŒ์ดํŠธ์›จ์ด์˜ ์†๋„ ์ œํ•œ ๋…ผ๋ฆฌ๋ฅผ ์šฐํšŒํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๊ฐ ์š”์ฒญ์ด ๊ณ ์œ ํ•˜๊ฒŒ ๋ณด์ด๋„๋ก ๋งŒ๋“ค ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด /resetpwd?someparam=1.

๊ฐ ์‹œ๋„ ์ „์— ๊ณ„์ •์— ๋กœ๊ทธ์ธํ•˜๊ธฐ

๊ฐ ์‹œ๋„ ๋˜๋Š” ๊ฐ ์‹œ๋„ ์„ธํŠธ ์ „์— ๊ณ„์ •์— ๋กœ๊ทธ์ธํ•˜๋ฉด ์†๋„ ์ œํ•œ ์นด์šดํ„ฐ๊ฐ€ ์žฌ์„ค์ •๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” ๋กœ๊ทธ์ธ ๊ธฐ๋Šฅ์„ ํ…Œ์ŠคํŠธํ•  ๋•Œ ํŠนํžˆ ์œ ์šฉํ•ฉ๋‹ˆ๋‹ค. Burp Suite์™€ ๊ฐ™์€ ๋„๊ตฌ์—์„œ Pitchfork ๊ณต๊ฒฉ์„ ํ™œ์šฉํ•˜์—ฌ ๋ช‡ ๋ฒˆ์˜ ์‹œ๋„๋งˆ๋‹ค ์ž๊ฒฉ ์ฆ๋ช…์„ ํšŒ์ „์‹œํ‚ค๊ณ  ๋ฆฌ๋””๋ ‰์…˜์„ ๋”ฐ๋ฅด๋„๋ก ํ‘œ์‹œํ•˜๋ฉด ์†๋„ ์ œํ•œ ์นด์šดํ„ฐ๋ฅผ ํšจ๊ณผ์ ์œผ๋กœ ์žฌ์‹œ์ž‘ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

ํ”„๋ก์‹œ ๋„คํŠธ์›Œํฌ ํ™œ์šฉํ•˜๊ธฐ

์—ฌ๋Ÿฌ IP ์ฃผ์†Œ์— ์š”์ฒญ์„ ๋ถ„์‚ฐ์‹œํ‚ค๊ธฐ ์œ„ํ•ด ํ”„๋ก์‹œ ๋„คํŠธ์›Œํฌ๋ฅผ ๋ฐฐํฌํ•˜๋ฉด IP ๊ธฐ๋ฐ˜ ์†๋„ ์ œํ•œ์„ ํšจ๊ณผ์ ์œผ๋กœ ์šฐํšŒํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋‹ค์–‘ํ•œ ํ”„๋ก์‹œ๋ฅผ ํ†ตํ•ด ํŠธ๋ž˜ํ”ฝ์„ ๋ผ์šฐํŒ…ํ•˜๋ฉด ๊ฐ ์š”์ฒญ์ด ๋‹ค๋ฅธ ์ถœ์ฒ˜์—์„œ ๋ฐœ์ƒํ•˜๋Š” ๊ฒƒ์ฒ˜๋Ÿผ ๋ณด์ด๋ฏ€๋กœ ์†๋„ ์ œํ•œ์˜ ํšจ๊ณผ๊ฐ€ ํฌ์„๋ฉ๋‹ˆ๋‹ค.

๋‹ค๋ฅธ ๊ณ„์ •์ด๋‚˜ ์„ธ์…˜์— ๊ณต๊ฒฉ ๋ถ„์‚ฐํ•˜๊ธฐ

๋Œ€์ƒ ์‹œ์Šคํ…œ์ด ๊ณ„์ •๋ณ„ ๋˜๋Š” ์„ธ์…˜๋ณ„๋กœ ์†๋„ ์ œํ•œ์„ ์ ์šฉํ•˜๋Š” ๊ฒฝ์šฐ, ์—ฌ๋Ÿฌ ๊ณ„์ •์ด๋‚˜ ์„ธ์…˜์— ๊ณต๊ฒฉ ๋˜๋Š” ํ…Œ์ŠคํŠธ๋ฅผ ๋ถ„์‚ฐ์‹œํ‚ค๋ฉด ํƒ์ง€๋ฅผ ํ”ผํ•˜๋Š” ๋ฐ ๋„์›€์ด ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ์ ‘๊ทผ ๋ฐฉ์‹์€ ์—ฌ๋Ÿฌ ์‹ ์› ๋˜๋Š” ์„ธ์…˜ ํ† ํฐ์„ ๊ด€๋ฆฌํ•ด์•ผ ํ•˜์ง€๋งŒ, ํ—ˆ์šฉ ๊ฐ€๋Šฅํ•œ ํ•œ๋„ ๋‚ด์—์„œ ๋ถ€ํ•˜๋ฅผ ํšจ๊ณผ์ ์œผ๋กœ ๋ถ„์‚ฐ์‹œํ‚ฌ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๊ณ„์† ์‹œ๋„ํ•˜๊ธฐ

์†๋„ ์ œํ•œ์ด ์„ค์ •๋˜์–ด ์žˆ๋”๋ผ๋„ ์œ ํšจํ•œ OTP๊ฐ€ ์ „์†ก๋  ๋•Œ ์‘๋‹ต์ด ๋‹ค๋ฅธ์ง€ ํ™•์ธํ•ด ๋ณด์•„์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์ด ๊ฒŒ์‹œ๋ฌผ์—์„œ ๋ฒ„๊ทธ ํ—Œํ„ฐ๋Š” 20๋ฒˆ์˜ ์‹คํŒจํ•œ ์‹œ๋„ ํ›„ 401๋กœ ์‘๋‹ตํ•˜๋”๋ผ๋„ ์†๋„ ์ œํ•œ์ด ๋ฐœ์ƒํ•˜๋”๋ผ๋„ ์œ ํšจํ•œ OTP๊ฐ€ ์ „์†ก๋˜๋ฉด 200 ์‘๋‹ต์„ ๋ฐ›์•˜๋‹ค๋Š” ๊ฒƒ์„ ๋ฐœ๊ฒฌํ–ˆ์Šต๋‹ˆ๋‹ค.


HTTP/2 ๋‹ค์ค‘ํ™” ๋ฐ ์š”์ฒญ ํŒŒ์ดํ”„๋ผ์ด๋‹ ๋‚จ์šฉํ•˜๊ธฐ (2023-2025)

ํ˜„๋Œ€์˜ ์†๋„ ์ œํ•œ๊ธฐ ๊ตฌํ˜„์€ ์ข…์ข… TCP ์—ฐ๊ฒฐ(๋˜๋Š” ๊ฐœ๋ณ„ HTTP/1.1 ์š”์ฒญ)์„ ๊ณ„์‚ฐํ•˜๋Š” ๋Œ€์‹  ์—ฐ๊ฒฐ์ด ํฌํ•จํ•˜๋Š” HTTP/2 ์ŠคํŠธ๋ฆผ ์ˆ˜๋ฅผ ๊ณ„์‚ฐํ•ฉ๋‹ˆ๋‹ค. ๋™์ผํ•œ TLS ์—ฐ๊ฒฐ์ด ์žฌ์‚ฌ์šฉ๋  ๋•Œ, ๊ณต๊ฒฉ์ž๋Š” ์ˆ˜๋ฐฑ ๊ฐœ์˜ ๋ณ‘๋ ฌ ์ŠคํŠธ๋ฆผ์„ ์—ด ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๊ฐ ์ŠคํŠธ๋ฆผ์€ ๋ณ„๋„์˜ ์š”์ฒญ์„ ์ „๋‹ฌํ•˜์ง€๋งŒ ๊ฒŒ์ดํŠธ์›จ์ด๋Š” ํ• ๋‹น๋Ÿ‰์—์„œ ํ•˜๋‚˜์˜ ์š”์ฒญ๋งŒ ์ฐจ๊ฐํ•ฉ๋‹ˆ๋‹ค.

# Send 100 POST requests in a single HTTP/2 connection with curl
seq 1 100 | xargs -I@ -P0 curl -k --http2-prior-knowledge -X POST \
-H "Content-Type: application/json" \
-d '{"code":"@"}' https://target/api/v2/verify &>/dev/null

If the limiter protects only /verify but not /api/v2/verify, you can also combine path confusion with HTTP/2 multiplexing for extremely high-speed OTP or credential brute-forcing.

๐Ÿพ Tip: PortSwiggerโ€™s Turbo Intruder supports HTTP/2 and lets you fine-tune maxConcurrentConnections and requestsPerConnection to automate this attack.

GraphQL aliases & batched operations

GraphQL์€ ํด๋ผ์ด์–ธํŠธ๊ฐ€ ํ•˜๋‚˜์˜ ์š”์ฒญ์—์„œ ์—ฌ๋Ÿฌ ๊ฐœ์˜ ๋…ผ๋ฆฌ์ ์œผ๋กœ ๋…๋ฆฝ์ ์ธ ์ฟผ๋ฆฌ ๋˜๋Š” ๋ณ€์ด๋ฅผ ์ „์†กํ•  ์ˆ˜ ์žˆ๋„๋ก ๋ณ„์นญ์œผ๋กœ ์ ‘๋‘์‚ฌ๋ฅผ ๋ถ™์ž…๋‹ˆ๋‹ค. ์„œ๋ฒ„๋Š” ๋ชจ๋“  ๋ณ„์นญ์„ ์‹คํ–‰ํ•˜์ง€๋งŒ ์†๋„ ์ œํ•œ๊ธฐ๋Š” ์ข…์ข… ํ•˜๋‚˜์˜ ์š”์ฒญ๋งŒ ๊ณ„์‚ฐํ•˜๊ธฐ ๋•Œ๋ฌธ์—, ์ด๋Š” ๋กœ๊ทธ์ธ ๋˜๋Š” ๋น„๋ฐ€๋ฒˆํ˜ธ ์žฌ์„ค์ • ์†๋„ ์ œํ•œ์„ ์šฐํšŒํ•˜๋Š” ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ๋ฐฉ๋ฒ•์ž…๋‹ˆ๋‹ค.

mutation bruteForceOTP {
a: verify(code:"111111") { token }
b: verify(code:"222222") { token }
c: verify(code:"333333") { token }
# โ€ฆ add up to dozens of aliases โ€ฆ
}

์ •ํ™•ํžˆ ํ•˜๋‚˜์˜ ๋ณ„์นญ๋งŒ์ด ์˜ฌ๋ฐ”๋ฅธ ์ฝ”๋“œ๊ฐ€ ํ˜ธ์ถœ๋  ๋•Œ 200 OK๋ฅผ ๋ฐ˜ํ™˜ํ•˜๋ฉฐ, ๋‚˜๋จธ์ง€๋Š” ์†๋„ ์ œํ•œ์ด ์žˆ์Šต๋‹ˆ๋‹ค.

์ด ๊ธฐ์ˆ ์€ 2023๋…„ PortSwigger์˜ โ€œGraphQL batching & aliasesโ€ ์—ฐ๊ตฌ์— ์˜ํ•ด ๋Œ€์ค‘ํ™”๋˜์—ˆ์œผ๋ฉฐ, ์ตœ๊ทผ ๋งŽ์€ ๋ฒ„๊ทธ ๋ฐ”์šดํ‹ฐ ์ง€๊ธ‰์˜ ์›์ธ์ด ๋˜์—ˆ์Šต๋‹ˆ๋‹ค.

๋ฐฐ์น˜ ๋˜๋Š” ๋Œ€๋Ÿ‰ REST ์—”๋“œํฌ์ธํŠธ์˜ ๋‚จ์šฉ

์ผ๋ถ€ API๋Š” /v2/batch์™€ ๊ฐ™์€ ๋„์šฐ๋ฏธ ์—”๋“œํฌ์ธํŠธ๋ฅผ ๋…ธ์ถœํ•˜๊ฑฐ๋‚˜ ์š”์ฒญ ๋ณธ๋ฌธ์—์„œ ๊ฐ์ฒด ๋ฐฐ์—ด์„ ์ˆ˜๋ฝํ•ฉ๋‹ˆ๋‹ค. ์ œํ•œ๊ธฐ๊ฐ€ ๊ตฌ์‹ ์—”๋“œํฌ์ธํŠธ ์•ž์—๋งŒ ๋ฐฐ์น˜๋œ ๊ฒฝ์šฐ, ์—ฌ๋Ÿฌ ์ž‘์—…์„ ๋‹จ์ผ ๋Œ€๋Ÿ‰ ์š”์ฒญ์œผ๋กœ ๊ฐ์‹ธ๋ฉด ๋ณดํ˜ธ๋ฅผ ์™„์ „ํžˆ ์šฐํšŒํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

[
{"path": "/login", "method": "POST", "body": {"user":"bob","pass":"123"}},
{"path": "/login", "method": "POST", "body": {"user":"bob","pass":"456"}}
]

ํƒ€์ด๋ฐ ์Šฌ๋ผ์ด๋”ฉ ์œˆ๋„์šฐ

ํด๋ž˜์‹ ํ† ํฐ-๋ฒ„ํ‚ท ๋˜๋Š” ๋ฆฌํ‚ค-๋ฒ„ํ‚ท ๋ฆฌ๋ฏธํ„ฐ๋Š” ๋ฆฌ์…‹์ด ๊ณ ์ •๋œ ์‹œ๊ฐ„ ๊ฒฝ๊ณ„์—์„œ ๋ฐœ์ƒํ•ฉ๋‹ˆ๋‹ค (์˜ˆ: ๋งค ๋ถ„๋งˆ๋‹ค). ์œˆ๋„์šฐ๊ฐ€ ์•Œ๋ ค์ ธ ์žˆ๋‹ค๋ฉด (์˜ˆ: X-RateLimit-Reset: 27์™€ ๊ฐ™์€ ์˜ค๋ฅ˜ ๋ฉ”์‹œ์ง€๋ฅผ ํ†ตํ•ด), ๋ฒ„ํ‚ท์ด ๋ฆฌ์…‹๋˜๊ธฐ ์ง์ „์— ํ—ˆ์šฉ๋œ ์ตœ๋Œ€ ์š”์ฒญ ์ˆ˜๋ฅผ ๋ฐœ์‚ฌํ•œ ๋‹ค์Œ, ์ฆ‰์‹œ ๋˜ ๋‹ค๋ฅธ ์ „์ฒด ํญ๋ฐœ์„ ๋ฐœ์‚ฌํ•ฉ๋‹ˆ๋‹ค.

|<-- 60 s window โ€‘->|<-- 60 s window โ€‘->|
######                 ######

์ด ๊ฐ„๋‹จํ•œ ์ตœ์ ํ™”๋Š” ๋‹ค๋ฅธ ์šฐํšŒ ๊ธฐ์ˆ ์„ ๊ฑด๋“œ๋ฆฌ์ง€ ์•Š๊ณ ๋„ ์ฒ˜๋ฆฌ๋Ÿ‰์„ ๋‘ ๋ฐฐ ์ด์ƒ ๋Š˜๋ฆด ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.


๋„๊ตฌ

  • https://github.com/Hashtag-AMIN/hashtag-fuzz: ํ—ค๋” ๋ฌด์ž‘์œ„ํ™”, ์ฒญํฌ ๋‹จ์–ด ๋ชฉ๋ก ๋ฐ ๋ผ์šด๋“œ ๋กœ๋นˆ ํ”„๋ก์‹œ ํšŒ์ „์„ ์ง€์›ํ•˜๋Š” ํผ์ง• ๋„๊ตฌ์ž…๋‹ˆ๋‹ค.
  • https://github.com/ustayready/fireprox: ๋ชจ๋“  ์š”์ฒญ์ด ๋‹ค๋ฅธ IP ์ฃผ์†Œ์—์„œ ์‹œ์ž‘๋˜๋„๋ก ์ผํšŒ์šฉ AWS API Gateway ์—”๋“œํฌ์ธํŠธ๋ฅผ ์ž๋™์œผ๋กœ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค โ€“ IP ๊ธฐ๋ฐ˜ ์†๋„ ์ œํ•œ์„ ๋ฌด๋ ฅํ™”ํ•˜๋Š” ๋ฐ ์™„๋ฒฝํ•ฉ๋‹ˆ๋‹ค.
  • Burp Suite โ€“ IPRotate + ํ™•์žฅ: Intruder ๋ฐ Turbo Intruder ๊ณต๊ฒฉ ์ค‘์— ์†Œ์Šค IP๋ฅผ ํˆฌ๋ช…ํ•˜๊ฒŒ ํšŒ์ „์‹œํ‚ค๊ธฐ ์œ„ํ•ด SOCKS/HTTP ํ”„๋ก์‹œ(๋˜๋Š” AWS API Gateway) ํ’€์„ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค.
  • Turbo Intruder (BApp): HTTP/2 ๋‹ค์ค‘ํ™”๋ฅผ ์ง€์›ํ•˜๋Š” ๊ณ ์„ฑ๋Šฅ ๊ณต๊ฒฉ ์—”์ง„; ์ˆ˜๋ฐฑ ๊ฐœ์˜ ์š”์ฒญ์„ ๋‹จ์ผ ์—ฐ๊ฒฐ๋กœ ์ถ•์†Œํ•˜๊ธฐ ์œ„ํ•ด requestsPerConnection์„ 100-1000์œผ๋กœ ์กฐ์ •ํ•ฉ๋‹ˆ๋‹ค.

์ฐธ๊ณ ๋ฌธํ—Œ

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ