<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>冷渗透</title>
    <link>https://wechat2rss.xlab.app/feed/c23cb9dcbc234e732381ea10aa3d2fe1394ab36d.xml</link>
    <description>专注于Cyber Phshing 网络钓鱼研究，记录非常规思路的hackdom。&#xA;(wechat feed made by @ttttmr https://wechat2rss.xlab.app)</description>
    <managingEditor> (冷渗透)</managingEditor>
    <image>
      <url>http://wx.qlogo.cn/mmhead/Q3auHgzwzM5ToF5MtJ3UiaiaO4lxEQkyYibNSAfvIYicvdzbSJic53bf1hA/0</url>
      <title>冷渗透</title>
      <link>https://wechat2rss.xlab.app/feed/c23cb9dcbc234e732381ea10aa3d2fe1394ab36d.xml</link>
    </image>
    <item>
      <title>抵御網絡釣魚 *1-尼日利亞BEC組織</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247484240&amp;idx=1&amp;sn=5d32cffdad52151cd0803a0c77749a44</link>
      <description>抵御網絡釣魚*1，来自尼日利亞的🎣BEC組織長期針對全球實施電子郵件釣魚活動，研究发现，至少從2014年以前</description>
      <content:encoded><![CDATA[<p>
原创 <span>N10th</span> <span>2023-07-05 17:37</span> <span style="display: inline-block;">广东</span>
</p>

<p>抵御網絡釣魚*1，来自尼日利亞的🎣BEC組織長期針對全球實施電子郵件釣魚活動，研究发现，至少從2014年以前</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=e8fc20f1&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3bdTeA6yV0SZKHLgW90WZ0yOG8UCHxsQgXqz6PNYnSO5nAicfwdvkahA%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p>抵御網絡釣魚*1，<span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">来自尼日利亞的🎣BEC組織</span></p><p><span style="font-size: var(--articleFontsize);letter-spacing: 0.034em;">長期針對全球實施電子郵件釣魚活動，研究发现，至少從2014年以前就開始，尤其偏愛針對CN具有跨境业务、外貿商務的公司企業，開展<span style="letter-spacing: 0.578px;text-wrap: wrap;">釣魚</span>攻擊。</span></p><p>BEC 釣魚攻擊簡要流程圖：</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.42314814814814816" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=bb03611c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3rFpewudm5pzwJvDPaenkEibbKTcWAvq93AlKGXZbCQ68ExhgyrSjR2w%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;">图0：BEC Cyber Phishing Attack Process</p><p>BEC 常用釣魚郵件文案類型：</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.5601851851851852" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=3a5b29e8&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3Ec3Z0QTHS2OiavMujBicolen26ic7Rib9QXkcLrXKObjRN29DicykiaUhNFQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;">图1：伪冒順丰速运</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.7861111111111111" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=da5639ad&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3bGNsPoXtiaJrsMOCTribT0tnr8hibhyShtFO6KHXbplP16Xm4XTMicicC4g%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;">图2：<span style="letter-spacing: 0.578px;text-align: center;text-wrap: wrap;">伪冒</span>领英邀请</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.48703703703703705" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=bbea2c31&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3XmG3FBK4X91ibiamo9dXRhYBWVuuc7m6YicLXWmchFurKYRcwT0rvBudA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;">图3：<span style="letter-spacing: 0.578px;text-align: center;text-wrap: wrap;">伪冒</span>管理员终止邮箱账户</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.8935185185185185" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=3f8e4266&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3Wll1Ku7BC6Z3kCxOrL3maibn629s6sal9WNvB0mNqiaic5T9jQicve0y5w%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;">图4：<span style="letter-spacing: 0.578px;text-align: center;text-wrap: wrap;">伪冒</span>商业活动</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.7064814814814815" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=6eff0129&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3WAtHibPf7r6wicuD1kNM5KTYK7vPGfe1ScheqTCFvKyYlWAlxCJQBzKw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;">图5：<span style="letter-spacing: 0.578px;text-align: center;text-wrap: wrap;">伪冒</span>Alibaba发送邀请</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.512962962962963" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=477a5677&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3pVdR5ardbduQVYUicSX8PkddT94LJe4uFP0FduE4VSLTu4oWybjezhQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;">图6：<span style="letter-spacing: 0.578px;text-align: center;text-wrap: wrap;">伪冒</span>邮件升级</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.7092592592592593" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=b4d807a5&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3oBicrF6Ek1E7ibuVYNo0FKn9GT709gibVACnPgicnQGibew7MQM9KBVjKOQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;">图7：<span style="letter-spacing: 0.578px;text-align: center;text-wrap: wrap;">伪冒密码确认</span></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.8861111111111111" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=db682eaa&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3XmOY2xzwHO86BWCuE2Jw9xGibstDM0JLezPyrXiblR5SboQFia7jibunuw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;">图8：伪冒WeTransfer确认</p><p style="text-align: center;"><img class="rich_pages wxw-img" data-galleryid="" data-ratio="0.6962962962962963" data-s="300,640" style="" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=2c762638&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd39cdg9lk67tA59c42GvkQiaUwCE0bIYJwBhzh78n2BVWLpay68icNW2Zg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;">图9：伪冒SFf发票开具</p><p><span style="font-size: 12px;">Hi，Everyone！<o:p></o:p></span></p><p><span style="font-size: 12px;">This is from N10 Phishing LAB，We are devote Phishing Hunting from today！<o:p></o:p></span></p><p><span style="font-size: 12px;">We detected and analyzed many Email
Phishing Attack in 3 years，these Group from different
country or regions，we will expose these attack tech and
continue to help Goverment and Enterprise defend. We are back<o:p></o:p></span></p><p><span style="font-size: 12px;">大家好！<o:p></o:p></span></p><p><span style="font-size: 12px;">來自N10網絡釣魚實驗室，從今天開始我們致力於網絡釣魚狩獵！<o:p></o:p></span></p><p><span style="font-size: 12px;">我們在3年內檢測並分析了許多來自不同國家或地區的電子郵件網絡釣魚攻擊，我們將揭露這些攻擊技術並繼續幫助GOV和企業防禦。</span></p><p><span style="font-size: 12px;">陌上花开，缓缓归矣</span></p><p style="text-align: center;"><img class="rich_pages wxw-img" data-backh="242" data-backw="578" data-galleryid="" data-ratio="0.4186046511627907" data-s="300,640" style="width: 100%;height: auto;" data-type="jpeg" data-w="3440" src="https://wechat2rss.xlab.app/img-proxy/?k=8ae5a33a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3HqgFksticdSAsDjgsf7vILJj3vkLo3OFsAHn0rFgxjdfjKCpSjKSkTg%2F640%3Fwx_fmt%3Djpeg"/></p><p style="display: none;"><mp-style-type data-value="3"></mp-style-type></p>


<p><img src="https://wechat2rss.xlab.app/img-proxy/?k=bb03611c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3rFpewudm5pzwJvDPaenkEibbKTcWAvq93AlKGXZbCQ68ExhgyrSjR2w%2F640%3Fwx_fmt%3Dpng"/></p>
<p><img src="https://wechat2rss.xlab.app/img-proxy/?k=3a5b29e8&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3Ec3Z0QTHS2OiavMujBicolen26ic7Rib9QXkcLrXKObjRN29DicykiaUhNFQ%2F640%3Fwx_fmt%3Dpng"/></p>
<p><img src="https://wechat2rss.xlab.app/img-proxy/?k=da5639ad&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3bGNsPoXtiaJrsMOCTribT0tnr8hibhyShtFO6KHXbplP16Xm4XTMicicC4g%2F640%3Fwx_fmt%3Dpng"/></p>
<p><img src="https://wechat2rss.xlab.app/img-proxy/?k=bbea2c31&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3XmG3FBK4X91ibiamo9dXRhYBWVuuc7m6YicLXWmchFurKYRcwT0rvBudA%2F640%3Fwx_fmt%3Dpng"/></p>
<p><img src="https://wechat2rss.xlab.app/img-proxy/?k=3f8e4266&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3Wll1Ku7BC6Z3kCxOrL3maibn629s6sal9WNvB0mNqiaic5T9jQicve0y5w%2F640%3Fwx_fmt%3Dpng"/></p>
<p><img src="https://wechat2rss.xlab.app/img-proxy/?k=6eff0129&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3WAtHibPf7r6wicuD1kNM5KTYK7vPGfe1ScheqTCFvKyYlWAlxCJQBzKw%2F640%3Fwx_fmt%3Dpng"/></p>
<p><img src="https://wechat2rss.xlab.app/img-proxy/?k=477a5677&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3pVdR5ardbduQVYUicSX8PkddT94LJe4uFP0FduE4VSLTu4oWybjezhQ%2F640%3Fwx_fmt%3Dpng"/></p>
<p><img src="https://wechat2rss.xlab.app/img-proxy/?k=b4d807a5&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3oBicrF6Ek1E7ibuVYNo0FKn9GT709gibVACnPgicnQGibew7MQM9KBVjKOQ%2F640%3Fwx_fmt%3Dpng"/></p>
<p><img src="https://wechat2rss.xlab.app/img-proxy/?k=db682eaa&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3XmOY2xzwHO86BWCuE2Jw9xGibstDM0JLezPyrXiblR5SboQFia7jibunuw%2F640%3Fwx_fmt%3Dpng"/></p>
<p><img src="https://wechat2rss.xlab.app/img-proxy/?k=2c762638&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd39cdg9lk67tA59c42GvkQiaUwCE0bIYJwBhzh78n2BVWLpay68icNW2Zg%2F640%3Fwx_fmt%3Dpng"/></p>
<p><img src="https://wechat2rss.xlab.app/img-proxy/?k=968cab20&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8IEztIkR9KQEPXfY0Pdcd3HqgFksticdSAsDjgsf7vILJj3vkLo3OFsAHn0rFgxjdfjKCpSjKSkTg%2F0%3Fwx_fmt%3Djpeg"/></p>



<p><a href="2247484240">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=9769fb43&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247484240%26idx%3D1%26sn%3D5d32cffdad52151cd0803a0c77749a44">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Wed, 05 Jul 2023 17:37:00 +0800</pubDate>
    </item>
    <item>
      <title>实战笔记之Host 标头漏洞挖掘（一）</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247484199&amp;idx=1&amp;sn=0cf4a35bc416efffb3fc4b5fc26f67e4</link>
      <description>介绍两种实战中碰到的案例！！第二种案例自己瞎折腾的，结果......</description>
      <content:encoded><![CDATA[<p>
原创 <span>N10th</span> <span>2020-11-09 19:30</span> <span style="display: inline-block;"></span>
</p>

<p>介绍两种实战中碰到的案例！！第二种案例自己瞎折腾的，结果......</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=fa00e47e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib9HqlzNVicM35FvU8I1DPbaGRRIL3wb5OB3iaSH7Tb3n9ht7oiasBkZPiaFxJLrvv7FicsrfyS5ShCXicRg%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><span style="font-size: 15px;">几个月前看到国外的bug bounty tips在传Host攻击技巧，前阵子又看到国内有不少文章总结，冷渗透就不再复述了，直接介绍实际业务场景中碰到的案例。</span></p><p><span style="font-size: 24px;"><em><strong>0x01 </strong></em><strong>自定义Host—窃取Token</strong></span></p><p><span style="font-size: 15px;">1. 找到重置密码处，填写任意一个受害者邮箱帐号，点击发送-Burpsuite抓包</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.36525612472160357" data-s="300,640" style="" data-type="png" data-w="1796" src="https://wechat2rss.xlab.app/img-proxy/?k=f97aee00&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9HqlzNVicM35FvU8I1DPbaGNJ5wKeLhasN0UD4yVvvEMbeV2XIn4jM8oThlmrPfqyiaUkYMBrBX4ZQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><span style="text-align: justify;"> </span></p><p><span style="font-size: 15px;">2. 修改Host为自己搭建的HTTPS服务器47.xx.xx.47</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.34393530997304583" data-s="300,640" style="" data-type="png" data-w="1855" src="https://wechat2rss.xlab.app/img-proxy/?k=fc924beb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9HqlzNVicM35FvU8I1DPbaGF4RUicQRSP1odWH1N0F8Nw6tIgSSFuQdfickdtYeezrK9tS17becI6Dg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.3523914238592633" data-s="300,640" style="" data-type="png" data-w="1819" src="https://wechat2rss.xlab.app/img-proxy/?k=e3d0bdbd&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9HqlzNVicM35FvU8I1DPbaGM8UpyHLyLmTQJ54P6L97AbOd770807iblmicCs8e9ib8jXmIQ8JzTibH0Q%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 15px;">只需要修改Host的值</span></p><p><span style="font-size: 15px;"><span style="color: rgb(0, 0, 0);">（注意一点：看图片右上角，目标服务器是https，所以攻击者的服务器47.xx.xx.47也需要事先启一个</span><span style="color: rgb(255, 76, 65);">https</span><span style="color: rgb(0, 0, 0);">的服务器）</span></span></p><p><span style="font-size: 15px;"> 放行数据包</span></p><p><span style="font-size: 15px;">3. 电话/邮件/短信等社工受害者</span></p><p><span style="font-size: 15px;">随便举个栗子:</span></p><p><span style="font-size: 15px;">“为了保障账号的安全，请及时定期修改密码，系统已为您发送重置链接，请及时查看邮箱查收”</span></p><p><span style="font-size: 15px;">受害者打开邮箱</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.3513328776486671" data-s="300,640" style="" data-type="png" data-w="1463" src="https://wechat2rss.xlab.app/img-proxy/?k=ee7e6a53&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9HqlzNVicM35FvU8I1DPbaGwTMiau9W5LpjwnUmP5CSffia7XYp0PE37lHjKMhiayMXmSEZuiaBlf7mFw%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 15px;"> 可以发现，这里收到的链接，是47.xx.xx.47</span></p><p><span style="font-size: 15px;">（上一步骤中攻击者自定义的Host值）</span></p><p><span style="font-size: 15px;"> </span></p><p><span style="font-size: 15px;">点击重置密码链接</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.32065217391304346" data-s="300,640" style="" data-type="png" data-w="1472" src="https://wechat2rss.xlab.app/img-proxy/?k=1b6affa2&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9HqlzNVicM35FvU8I1DPbaGeMh5DVDAgacAsUqtfhqSsgq0F4yQvLVInKQToOvHLK8DF1zIOhXEMg%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 15px;"> </span></p><p><span style="font-size: 15px;">此时受害者可能一脸蒙b</span></p><p><span style="font-size: 15px;">因为返回的是攻击者服务器的内容</span></p><p><span style="font-size: 15px;">会引起怀疑？没关系，我们已经拿到了Token</span></p><p><span style="font-size: 15px;"> </span></p><p><span style="font-size: 15px;"> </span></p><p><span style="font-size: 15px;"> </span></p><p><span style="font-size: 15px;">5. 攻击者查看47.xx.xx.47服务器</span></p><p><span style="font-size: 15px;">我使用的是python3 快速启动一个简易的https服务器</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.3281566509115463" data-s="300,640" style="" data-type="png" data-w="1481" src="https://wechat2rss.xlab.app/img-proxy/?k=b23471ea&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9HqlzNVicM35FvU8I1DPbaGpibBlPH6hx3jiautrpXVJHFCJKXXj3xSNgf9dhg4qykxehP626Viaowxw%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 15px;">（你们可以试试python3启https）</span></p><p><span style="font-size: 15px;">成功获取到了重置密码链接的Token值</span></p><p><span style="font-size: 15px;"> </span></p><p><span style="font-size: 15px;"> </span></p><p><span style="font-size: 15px;">6. 攻击者拼接原始IP/域名为正确重置密码链接🔗</span></p><p><span style="font-size: 15px;"><strong><a href="https://10.10.20.153" target="_blank">https://10.10.20.153</a></strong><strong>/reset_password/Ik4xMHRoIg.Xyqm4xxxxxxxxxxxxxxxxxxx</strong></span></p><p><span style="font-size: 15px;"> </span></p><p><span style="font-size: 15px;">访问URL</span></p><p><span style="font-size: 15px;">攻击者填写任意的新密码</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.37169939065673663" data-s="300,640" style="" data-type="png" data-w="1477" src="https://wechat2rss.xlab.app/img-proxy/?k=9b82b7a8&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9HqlzNVicM35FvU8I1DPbaGVpTUxGtyhEXxrQOQsUr9jf9peJFqPYSFOTI7HQd0nU3M72uHaCXhag%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><span style="font-size: 14px;">图：重置密码页面</span></p><p><span style="font-size: 15px;">点击发送，即可成功重置用户密码</span></p><p><span style="font-size: 15px;">至此，完成账户入侵！</span></p><p><span style="font-size: 15px;">希望有用</span></p><p><span style="font-size: 15px;">————————————————————</span></p><p><span style="font-size: 15px;">以下内容明天再继续！</span></p><p><em><strong><span style="font-size: 24px;">0x02 </span></strong></em><strong><span style="font-size: 24px;">畸形Host—</span></strong><strong><span style="font-size: 24px;">服务端缓存中毒</span></strong></p><p style="white-space: normal;"><span style="font-size: 15px;">虽然漏洞超简单，而且评级只是中危</span></p><p style="white-space: normal;"><span style="font-size: 15px;">不过后来，用这个攻击方式</span></p><p style="white-space: normal;"><span style="font-size: 15px;">在一次秘密众测中，发现目标范围存在一大堆此类缺陷</span></p><p style="white-space: normal;"><span style="font-size: 15px;">获得了*K的赏金，也算是一个小惊喜~</span></p><p><span style="font-size: 15px;">闹了个乌龙</span></p><p><span style="font-size: 15px;">最开始误以为是F5设备的问题，</span></p><p><span style="font-size: 15px;">就简单写了一个英文的paper报送给官方</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7176522899066252" data-s="300,640" style="" data-type="png" data-w="2249" src="https://wechat2rss.xlab.app/img-proxy/?k=c5010118&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9HqlzNVicM35FvU8I1DPbaGGImvU88DTIG7hybzvUruLjf8LXQZMdGZXTw6S6Ohic9hgTOzBJemvtw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">后来发现貌似并不是哈哈</span></p><p style="text-align: justify;"><span style="font-size: 14px;">打算明天再更</span></p><p><mp-qa class="js_uneditable custom_select_card qa_iframe" data-pluginname="insertquestion" data-id="1599306883687825409" data-bizuin="MzIxMDMwODc2OQ==" data-title="各位师傅觉得，英文的paper需要翻译嘛"></mp-qa></p>



<p><a href="2247484199">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=4ff8adb3&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247484199%26idx%3D1%26sn%3D0cf4a35bc416efffb3fc4b5fc26f67e4">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Mon, 09 Nov 2020 19:30:00 +0800</pubDate>
    </item>
    <item>
      <title>记录一次红队钓鱼攻击—组合漏洞利用</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247484181&amp;idx=1&amp;sn=a722dff5d5a7882bee190803168db9fb</link>
      <description>《冷渗透》背景故事：首先解释一下，消失的几个月去了哪————————</description>
      <content:encoded><![CDATA[<p>
原创 <span>N10th</span> <span>2020-11-07 19:20</span> <span style="display: inline-block;"></span>
</p>

<p>《冷渗透》背景故事：首先解释一下，消失的几个月去了哪————————</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=53a4d949&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib970z14TGtoANfg8qH4AKlb2ibbC9XqlwuGjjZPutGjvmWYeokunAiaamISibB3C4hD0icKzrqhlbQk9g%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><em><strong><span style="font-size: 20px;">0x01 背景故事</span></strong></em></p><p><span style="font-size: 14px;">首先解释一下，消失的几个月去了哪</span></p><p><span style="font-size: 14px;">————————————————</span></p><p><span style="font-size: 15px;">    Halo everyone, I am soooo embrassed that I have a long time no update my  Official Accounts. <span style="color: rgb(0, 0, 0);font-family: Verdana, Arial, Tahoma;font-size: 20px;letter-spacing: 5px;text-align: start;background-color: rgb(255, 255, 255);">😶</span>Maybe you have been disappointed to me, but you don&#39;t konw what happend for me. I experienced a vary life in the past half year, for instance: track a threat actor in the DeepWeb<span style="color: rgb(0, 0, 0);font-family: Verdana, Arial, Tahoma;font-size: 20px;letter-spacing: 5px;text-align: start;background-color: rgb(255, 255, 255);">👥</span>, assist the Ministry of Public Security<span style="color: rgb(0, 0, 0);font-family: Verdana, Arial, Tahoma;font-size: 20px;letter-spacing: 5px;text-align: start;background-color: rgb(255, 255, 255);">👮</span>, join a big activity about protecting  our country and so on. <span style="color: rgb(0, 0, 0);font-family: Verdana, Arial, Tahoma;font-size: 20px;letter-spacing: 5px;text-align: start;background-color: rgb(255, 255, 255);">🌇</span>Last but not least, the above are all my excuses, I am lazy, so I just wanner enjoy my life. hahaha~ But don&#39;t worry, I can adjust myself so that  write and share all my little rubbish hacking technology to you. just hope is useful to you. thx! <span style="color: rgb(0, 0, 0);font-family: Verdana, Arial, Tahoma;font-size: 20px;letter-spacing: 5px;text-align: start;background-color: rgb(255, 255, 255);">💯</span></span></p><p><span style="font-size: 15px;">—————————————————</span></p><p><span style="font-size: 14px;">碍于面子，就不用母语解释了哈哈</span></p><p><span style="font-size: 14px;">总结：去了黑暗一趟，带回一片面包</span></p><p><span style="text-decoration: none;"><em style="white-space: normal;"><strong><span style="text-decoration: none;font-size: 20px;">0x02 正文开始</span></strong></em></span></p><p><span style="font-size: 15px;">目标：大型传统行业单位C集团</span></p><p><span style="font-size: 15px;">情况：拥有多名蓝队防守方，明面资产已被多次排查</span></p><p style="text-align: justify;"><strong>1. icon_hash技巧查找隐形资产</strong></p><p style="text-align: justify;"><span style="font-size: 15px;">其实这个小技巧相信现在蛮多人知道了，最早是去年在国外的hack圈流传，当时是国外的漏洞赏金猎人用来做资产搜集，进一步挖掘隐形资产的漏洞。期间这个技巧，我用在溯源上，挖掘到了一些重要威胁情报，言归正传。</span></p><p style="text-align: justify;"><span style="font-size: 15px;">①将单位C集团的网站各种代表性的favicon.ico图标文件donwload下载到本地，再计算其hash值，丢到fofa/shodan等搜索引擎查找资产。</span></p><p style="text-align: justify;"><span style="font-size: 15px;">所谓icon图标文件</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.0718954248366013" data-s="300,640" style="" data-type="png" data-w="459" src="https://wechat2rss.xlab.app/img-proxy/?k=1cef21d4&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbVRJibZtUf4SQcw5f8lFpgWrtXXAVhYZDQiaibjQ955FR748CyqALeWEwA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">比如百度的ico：</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5968688845401174" data-s="300,640" style="width: 325px;height: 194px;" data-type="png" data-w="1022" src="https://wechat2rss.xlab.app/img-proxy/?k=a8585c91&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbviapiaMOfs3ClcWdESS4GbPZwiaryW1kPHs9CicfEP7OUzIl5gJWD73Kzg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><strong>2. 发现后台登录界面，爆破无果</strong></p><p style="white-space: normal;"><span style="font-size: 15px;">找到单位C的两处隐匿资产：21x.xxx.xxx.198 和 21x.xxx.xxx.194，发现两个资产都是相同界面的系统，如下图所示：</span></p><p style="white-space: normal;text-align: center;"><span style="font-size: 15px;"><img class="rich_pages" data-ratio="0.734955185659411" data-s="300,640" style="height: 315px;width: 428px;" data-type="png" data-w="2343" src="https://wechat2rss.xlab.app/img-proxy/?k=5f122571&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9zObUR8iajlC6jrM8neQUWZwpFbeziaEwbkLfx5JM2utOXLianNkBg5uFsIQWjSeyRT9pABYlMV1EwA%2F640%3Fwx_fmt%3Dpng"/></span></p><p style="text-align: justify;">    </p><p style="text-align: justify;"><span style="font-size: 15px;">网站使用</span>vue.js<span style="font-size: 15px;">搭建，一些小伙伴看到这种系统无从下手</span></p><p style="text-align: justify;"><span style="font-size: 15px;">因为没有什么可利用的漏洞。</span></p><p style="text-align: justify;"><strong><span style="font-size: 15px;">粗糙一点：</span></strong><span style="font-size: 15px;">手动尝试几个弱口令admin/123456等，失败</span></p><p style="text-align: justify;"><strong><span style="font-size: 15px;">蛮狠一点：</span></strong><span style="font-size: 15px;">尝试直接弱口令账号500/密码6000，打开burpsuite 选择<span style="color: rgb(77, 77, 77);font-family: -apple-system, &#34;SF UI Text&#34;, Arial, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei&#34;, &#34;WenQuanYi Micro Hei&#34;, sans-serif, SimHei, SimSun;font-size: 16px;text-align: start;background-color: rgb(255, 255, 255);">cluster bomb</span>模式爆破。失败</span></p><p style="text-align: justify;"><strong><span style="font-size: 15px;">细腻一点：</span></strong><span style="font-size: 15px;">翻</span><span style="font-size: 15px;color: rgb(255, 76, 65);">21x.xxx.xxx.194</span><span style="font-size: 15px;">系统网站的JS文件（记住这里我们翻的是194的系统资产）</span></p><p style="text-align: justify;"><span style="font-size: 15px;">一般来说找两个东西：</span></p><p style="text-align: justify;"><span style="font-size: 15px;">①Key密钥和账号密码等敏感信息</span></p><p style="text-align: justify;"><span style="font-size: 15px;">②URL路径和各种api端点</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6225425950196593" data-s="300,640" style="width: 382px;height: 236px;" data-type="png" data-w="763" src="https://wechat2rss.xlab.app/img-proxy/?k=4522e326&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlb15iasmFtickEyicNCfmoCNLYkbhk0hRkEVSXb4ENvViaPfZmzrbT02uKaQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">手工翻阅效率太低，使用JSFinder.py工具</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.043137254901960784" data-s="300,640" style="" data-type="png" data-w="510" src="https://wechat2rss.xlab.app/img-proxy/?k=dfea1686&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbhwAs1MepNKNBDNPmOe0icZxVF3eQsfFOutpsl4gia6v3BQOsR5pS6P3g%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">提取了一大堆的URL</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.8018867924528302" data-s="300,640" style="width: 315px;height: 252px;" data-type="png" data-w="848" src="https://wechat2rss.xlab.app/img-proxy/?k=7ee16cd6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlb1qq859aoqhtYNr9QGxUnXU9TahTK9805l5twJR2Ay87x3dpVXGP7tQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">再利用http_title工具扫一下，快速排查404、200和301等URL，如下图所示</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.192079207920792" data-s="300,640" style="width: 247px;height: 295px;" data-type="png" data-w="505" src="https://wechat2rss.xlab.app/img-proxy/?k=9765cefa&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlb7k3QQxWggcIOlibfTayuMMpNAickZkZt5duM42IyeBGkUSk6pET3TWJg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">一堆404状态码，没有可利用的URL端点</span></p><p style="text-align: justify;"><strong><span style="font-size: 15px;">再细腻一点：</span></strong><span style="font-size: 15px;">上文说到过，两个一样的系统资产21x.xxx.xxx.198 和 21x.xxx.xxx.194，这里21x.xxx.xxx.194的系统没有找到可利用的东西，继续尝试找21x.xxx.xxx.198。</span></p><p style="text-align: justify;"><strong>4. 细心有惊喜，发现一处api端点，</strong>如下图所示</p><p style="text-align: justify;">    </p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.07635009310986965" data-s="300,640" style="" data-type="png" data-w="537" src="https://wechat2rss.xlab.app/img-proxy/?k=3a23a338&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbt9UUfO9zrZmKW1uXvhGrtCv8aoBONAiaqWmG5e5TLuOAP7ZFkVulmYw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">打开泄露大量的用户名和账号密码（截图未保存）</span></p><p style="text-align: justify;"><span style="font-size: 15px;">（但密码加盐处理了，且不知道加密方式，非前端加密）</span></p><p style="text-align: justify;"><span style="font-size: 15px;">尝试找师傅帮忙</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.3697234352256186" data-s="300,640" style="width: 402px;height: 148px;" data-type="png" data-w="687" src="https://wechat2rss.xlab.app/img-proxy/?k=ece0fe89&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbFJayxIMEjMRuUIl53COpODJd4ZAnUqm7bJ4zBL5aTsBA5fpyjQPe5g%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">试了几种典型的加解密方式，未果</span></p><p style="text-align: justify;"><span style="font-size: 15px;">兜兜转转回到原地</span></p><p style="text-align: justify;"><strong>5. 二次爆破，峰回路转</strong></p><p style="text-align: justify;"><span style="font-size: 15px;">结合泄露的用户名进行密码爆破，爆破出多个账号的密码均为Password1</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.734955185659411" data-s="300,640" style="height: 315px;text-align: center;white-space: normal;width: 428px;" data-type="png" data-w="2343" src="https://wechat2rss.xlab.app/img-proxy/?k=5f122571&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9zObUR8iajlC6jrM8neQUWZwpFbeziaEwbkLfx5JM2utOXLianNkBg5uFsIQWjSeyRT9pABYlMV1EwA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">（ps: 以下内容部分不能贴图了，当时未保存下来，只能介绍思路）</span></p><p style="text-align: justify;"><strong>6.成功登录系统后台，毫无收获</strong></p><p style="text-align: justify;"><span style="font-size: 15px;">用其中一个账号密码：xinming.zhang/password1进入后台后</span></p><p style="text-align: justify;"><strong><span style="font-size: 15px;">①找文件：</span></strong><span style="font-size: 15px;">没有找到敏感数据</span></p><p style="text-align: justify;"><strong><span style="font-size: 15px;">②试上传：</span></strong><span style="font-size: 15px;">发现有上传接口，白名单机制且不解析</span></p><p style="text-align: justify;"><strong><span style="font-size: 15px;">③换账号：</span></strong><span style="font-size: 15px;">更换多个账户，均没有敏感数据</span></p><p style="text-align: justify;"><span style="font-size: 15px;">兜兜转转又回到原地....</span></p><p style="text-align: justify;"><strong><span style="font-size: 17px;">7. 组合漏洞，深度利用</span></strong></p><p style="text-align: justify;"><span style="font-size: 14px;">写到这我都累了，当时更心累</span></p><p style="text-align: justify;"><span style="font-size: 14px;">实战中讲究心态</span></p><p style="text-align: justify;"><span style="font-size: 14px;">怎么能轻言放弃</span></p><p style="text-align: justify;"><span style="font-size: 15px;">仔细排查每个账户的功能，终于在20多个可登录后台账户中，发现了一个账户，在其：“监测-提醒”中，隐含了一个发送邮件提醒的功能。（截图未保存）</span></p><p style="text-align: justify;"><span style="font-size: 14px;">刚好这时候，我们准备进行钓鱼攻击</span></p><p style="text-align: justify;"><span style="font-size: 14px;">伪造域名，并搭建了一个该单位使用的邮件系统钓鱼网站</span></p><p style="text-align: justify;"><span style="font-size: 14px;">但经过测试发现，使用</span><span style="font-size: 16px;">普通的邮箱是无法正常投递钓鱼邮件</span></p><p style="text-align: justify;"><span style="font-size: 14px;">原因是被网关拦截了！</span></p><p style="text-align: justify;"><span style="font-size: 15px;">推测网关做了白名单机制，即只允许接收本集团邮箱域名的邮件</span></p><p style="text-align: justify;"><span style="font-size: 15px;">于是我想到上文中，挖掘到后台的“邮件提醒”功能</span></p><p style="text-align: justify;"><span style="font-size: 15px;">是否可以组合起来利用！</span></p><p style="text-align: justify;"><strong>8. 山重水复疑无路</strong></p><p style="text-align: justify;"><span style="font-size: 15px;">但又遇到了一个困难，</span></p><p style="text-align: justify;"><span style="font-size: 15px;">这个邮件提醒功能，只能选择收件人</span></p><p style="text-align: justify;"><span style="font-size: 15px;">除此之外，并无其它可以输入的地方。</span></p><p style="text-align: justify;"><span style="font-size: 15px;">于是想到抓包，尝试纂改数据包试试</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.9883720930232558" data-s="300,640" style="width: 333px;height: 327px;" data-type="png" data-w="602" src="https://wechat2rss.xlab.app/img-proxy/?k=6fc64c4e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbcTcw0PiaCtOoRvtBkS3ibQmgPY5icic22LSIYFNBtj2L0U7VibE6BibvQfoA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><span style="font-size: 14px;">（历史截图）</span></p><p style="text-align: justify;"><span style="font-size: 14px;">分析发现</span></p><p style="text-align: justify;"><span style="font-size: 14px;">我可以篡改的地方有：收件人、发件标题和时间日期</span></p><p style="text-align: justify;"><span style="font-size: 14px;">但无法完全篡改发件内容！</span></p><p style="text-align: justify;"><span style="font-size: 14px;">什么是无法完全篡改呢？</span></p><p style="text-align: justify;"><span style="font-size: 14px;">系统在服务器后端采用了硬编码发件内容</span></p><p style="text-align: justify;"><span style="font-size: 14px;">如下图所示：</span></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">原始固定邮件内容：</span></strong></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.146919431279621" data-s="300,640" style="width: 247px;height: 285px;" data-type="png" data-w="422" src="https://wechat2rss.xlab.app/img-proxy/?k=81a1bb6c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbgJ3ibrJUleNrvhBGrOibw3Lm3Ric5WyOFRZNHLmWewIUUBR9rlV9q6koA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">测试篡改邮件内容：</span></strong></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.2640586797066016" data-s="300,640" style="width: 231px;height: 292px;" data-type="png" data-w="409" src="https://wechat2rss.xlab.app/img-proxy/?k=ab568b7a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbPicEzVuias4RTT6ThU6r8xX8EtOcEGc0nC7IPiaHvwdeJfB42d36OJ0kw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">发现我无法消除硬编码区域的内容。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">但如果这么发送钓鱼邮件，很明显会容易引起警惕！</span></p><p style="text-align: justify;"><span style="font-size: 17px;"><strong>9. 柳暗花明又一村</strong></span></p><p style="text-align: justify;"><span style="font-size: 14px;">这里用到了一个技巧，做到了完全“消除”硬编码的内容</span></p><p style="text-align: justify;"><span style="font-size: 14px;">有师傅告诉我，&lt;script&gt;标签</span></p><p style="text-align: justify;"><span style="font-size: 14px;">可以在收件箱的邮件中隐藏掉硬编码的内容！</span></p><p style="text-align: justify;"><span style="font-size: 14px;">编写话术文案+格式排版，如下图所示：</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.426550598476605" data-s="300,640" style="width: 402px;height: 171px;" data-type="png" data-w="919" src="https://wechat2rss.xlab.app/img-proxy/?k=daaf575b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbVWSVl8pDS158gqHKvCC5Aeg3iaJjclSvy1vkrjWkHfLWlJNUWPWxPNg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><strong><span style="font-size: 14px;">图：伪造邮件的payload</span></strong></p><p style="text-align: justify;"><strong><span style="font-size:14px;font-family:等线;">利用了&lt;a&gt;标签和图片超链接</span></strong></p><p style="text-align: justify;"><strong><span style="font-size:14px;font-family:等线;">话术诱导受害者点击</span></strong></p><p style="text-align: justify;"><strong><span style="font-size:14px;font-family:等线;">从而跳转到钓鱼网站</span></strong></p><p style="text-align: justify;"><strong><span style="font-size:14px;font-family:等线;">如下图所示</span></strong></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.4100899100899101" data-s="300,640" style="width: 422px;height: 173px;" data-type="png" data-w="2002" src="https://wechat2rss.xlab.app/img-proxy/?k=2ae58646&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbIictBwzMVgs9jGEoUgWnic4bz0pdBOvk5JPB6QAhxXoNP4ibV1wCbBNibQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><strong><span style="font-size: 14px;">图：<span style="font-family: 等线;">受害者接收的邮件</span></span></strong><span style="font-family: 等线;font-size: 14px;">（打码严重）</span></p><p style="text-align: justify;"><span style="font-size: 14px;">钓鱼网站就不给你们看了。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">接下来就需要发送钓鱼邮件了</span></p><p style="text-align: justify;"><span style="font-size: 14px;">那发送给谁呢？</span></p><p style="text-align: justify;"><strong><span style="font-size: 17px;">10. 回归本质—信息搜集</span></strong></p><p style="text-align: justify;"><span style="font-size: 14px;">这里介绍一个平时做威胁情报用到的接口</span></p><p style="text-align: justify;"><span style="font-size: 14px;">可以帮我们快速的查找指定域名的邮箱账号和子域等</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.46048387096774196" data-s="300,640" style="width: 422px;height: 195px;" data-type="png" data-w="1240" src="https://wechat2rss.xlab.app/img-proxy/?k=d36c507d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbSzy5UjlFPgIYvUfbtxHViaUBJ43gRzwtP4kYpnbrUADl9p6yPeddXFQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">比如查下cia[.]gov</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7707275803722504" data-s="300,640" style="width: 435px;height: 335px;" data-type="png" data-w="1182" src="https://wechat2rss.xlab.app/img-proxy/?k=c61d32de&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbKGzDF8qJ77dq1mfep0xIhQ7M9b6wg6E2ibqsxGvHzIyib0sMTmYs9KMQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">当然，实战中不能这么简单了事。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">我打了他们的一个供应商平台</span></p><p style="text-align: justify;"><span style="font-size: 14px;">利用供应商平台在Github的信息泄露</span></p><p style="text-align: justify;"><span style="font-size: 14px;">&gt;拿到 测试系统的管理员账号密码</span></p><p style="text-align: justify;"><span style="font-size: 14px;">&gt;登录  测试系统</span></p><p style="text-align: justify;"><span style="font-size: 14px;">&gt;现场挖掘测试系统漏洞</span></p><p style="text-align: justify;"><span style="font-size: 14px;">&gt;发现一处api 未授权访问的接口，可以获取注册人的邮箱账号信息</span></p><p style="text-align: justify;"><span style="font-size: 14px;">&gt;</span><span style="font-size: 14px;">利用此漏洞，打该供应商用于单位C的生产系统</span></p><p style="text-align: justify;"><span style="font-size: 14px;">&gt;成功获取单位C</span><span style="font-size: 14px;">集团的邮箱账号，员工职业，姓名等精准信息</span></p><p style="text-align: justify;"><span style="font-size: 15px;">如下图所示：</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.974496644295302" data-s="300,640" style="width: 258px;height: 252px;" data-type="png" data-w="745" src="https://wechat2rss.xlab.app/img-proxy/?k=db01995e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbvHbXTfgazOEv0TZia8qpyvF1Rw8Sq7fWUMOibmDtOtgOiaFwcQwWRCicrQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><span style="font-size: 14px;">图：未授权接口泄露的信息</span></p><p style="text-align: justify;"><span style="font-size: 14px;">ok, 万事俱备</span></p><p style="text-align: justify;"><span style="font-size: 14px;">此时     真想说一句：</span></p><p style="text-align: justify;"><strong><span style="font-size: 17px;">二营长，把我的迫击炮拉过来！！！</span></strong></p><p style="text-align: justify;"><span style="font-size: 14px;">拉个锤子，前辈的经验告诉我</span></p><p style="text-align: justify;"><span style="font-size: 14px;">所有的实战，要以尽可能小的动作，来达到我们的目的。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">所以，不能批量发钓鱼邮件！！</span></p><p style="text-align: justify;"><span style="font-size: 14px;">筛选出了一些信息安全意识薄弱的部门员工，进行钓鱼投递</span></p><p style="text-align: justify;"><span style="font-size: 14px;">最终成功窃取到了单位C集团员工的邮箱账号密码</span></p><p style="text-align: justify;"><span style="font-size: 14px;">“</span><span style="font-size: 14px;">鱼儿”上线结果示例：</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.3794162826420891" data-s="300,640" style="width: 442px;height: 166px;" data-type="png" data-w="651" src="https://wechat2rss.xlab.app/img-proxy/?k=6523f7e6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib970z14TGtoANfg8qH4AKlbPlzetPMnsP0icxs6s2UbO8VicuR2V70p0tEsCZHX2RUKonVZ90PDq86Q%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">发现这密码真是复杂，大小写字母+特殊字符+数字</span></p><p style="text-align: justify;"><span style="font-size: 14px;">后面就转交专业选手了。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">至此，完成组合漏洞利用 + <span style="font-size: 14px;">供应链初步攻击！</span></span></p><p style="white-space: normal;"><span style="font-size: 14px;">“宇宙间最渺小的星宿，一样有着惊人的力量”</span></p><p style="text-align: justify;"><span style="font-size: 14px;"><span style="font-size: 14px;">你可以看到，其实再小的漏洞，一旦组合利用起来</span></span></p><p style="text-align: justify;"><span style="font-size: 14px;"><span style="font-size: 14px;">也可能会触发意想不到的的结果</span></span></p><p style="text-align: justify;"><strong><span style="font-size: 14px;"><em style="white-space: normal;"><strong><span style="font-size: 20px;">0x03 实战总结</span></strong></em></span></strong></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">1. icon_hash寻找隐形资产</span></strong></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">2. JS文件暴露URL端点，其中一处api泄露明文账号和加密的密码</span></strong></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">3. 使用泄露的账号，组合6k+字典爆破出密码Password1</span></strong></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">4. 通过登录后台，翻阅多个账号，找到一处较高权限用户</span></strong></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">5. 利用其隐藏的邮件提醒功能，通过抓包分析，隐藏硬编码内容，最终成功篡改邮件内容</span></strong></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">6. 搭建钓鱼网站，打供应商，搜集精准信息，小动作发送钓鱼邮件</span></strong></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">实战中，细心，耐心，运气缺一不可！</span></strong></p><p style="white-space: normal;"><span style="font-size: 14px;">我是一个小菜ji， 并不会RCE/Getshell等高级的技术</span></p><p style="white-space: normal;"><span style="font-size: 14px;">能为圈子的师傅们分享的也只有这些</span></p><p style="white-space: normal;"><span style="font-size: 14px;">希望有用！</span></p><p style="white-space: normal;"><strong><span style="font-size: 14px;">Peace&amp;Love</span></strong></p><p style="white-space: normal;"><strong><span style="font-size: 14px;">                                        ——N10th九号</span></strong></p><p><mp-qa class="js_uneditable custom_select_card qa_iframe" data-pluginname="insertquestion" data-id="1596245708829933570" data-bizuin="MzIxMDMwODc2OQ==" data-title="师傅们可以留言啦！"></mp-qa></p>



<p><a href="2247484181">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=a5bd740c&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247484181%26idx%3D1%26sn%3Da722dff5d5a7882bee190803168db9fb">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Sat, 07 Nov 2020 19:20:00 +0800</pubDate>
    </item>
    <item>
      <title>悄悄归来</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247484145&amp;idx=1&amp;sn=92d48b0a9e30e526915805e2d5bbe8d2</link>
      <description>Long time no see.</description>
      <content:encoded><![CDATA[<p>
<span>N10th</span> <span>2020-07-23 22:04</span> <span style="display: inline-block;"></span>
</p>

<p>Long time no see.</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=910cfb97&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib9Xp2aqxUpVtpMRdiaRSRCCNknLN6VL7L3dW68QpgfxGz7BBF1EmUPRaOcP8OibIbegDAf2NFrzqOPA%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><span style="font-size: 15px;">嗨！</span></p><p><span style="font-size: 15px;">老朋友们，好久不见</span><img data-ratio="1" style="display:inline-block;width:20px;vertical-align:text-bottom;" data-type="png" data-w="20" src="https://wechat2rss.xlab.app/img-proxy/?k=eed77e53&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9Xp2aqxUpVtpMRdiaRSRCCN75x9PfNoVzCqRBuPxb16GltZ1iagjkaZXtznT64sIkUPvRSWOyZhdiaA%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 15px;">-------------------------------------</span></p><p><span style="font-size: 15px;">首先请允许我感慨一段</span></p><p><span style="font-size: 15px;">从5月底至今，</span></p><p><span style="font-size: 15px;">无论是工作职业   </span></p><p><span style="font-size: 15px;">还是感情生活，</span></p><p><span style="font-size: 15px;">都经历了很多事情。</span></p><p><span style="font-size: 15px;">我不知道，这次是以怎样的姿态回来。</span></p><p><span style="font-size: 15px;">但很幸运，依然满怀希望，踽踽前行。</span></p><p><span style="font-size: 15px;">-----------------------------------------</span></p><p><span style="font-size: 15px;">在这期间，探到了网络中比较深地方。</span></p><p><span style="font-size: 15px;">想给大家分享的东西</span></p><p><span style="font-size: 15px;">主要是偏思路类型的隐秘技巧，比如</span></p><p><span style="font-size: 15px;">一个冷门的侦察溯源技巧</span></p><p><span style="font-size: 15px;">一个针对通用web的小工具</span></p><p>...</p><p><span style="font-size: 15px;">可如果毫无保留地</span></p><p><span style="font-size: 15px;">还原整个case场景，</span></p><p><span style="font-size: 15px;">会有一些危险因素。</span></p><p><span style="font-size: 15px;">所以，我还需要琢磨一下</span></p><p><span style="font-size: 15px;">如何写这个paper。</span></p><p><span style="font-size: 14px;">如果你有任何好的建议或想法，</span></p><p><span style="font-size: 14px;">出门右拐，趁着旁若无人，进后门（公众号后台）</span></p><p><span style="font-size: 14px;">我们 暗中联系 (●&#39;◡&#39;●)</span></p>



<p><a href="2247484145">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=3da49cff&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247484145%26idx%3D1%26sn%3D92d48b0a9e30e526915805e2d5bbe8d2">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Thu, 23 Jul 2020 22:04:00 +0800</pubDate>
    </item>
    <item>
      <title>【新】业务安全情报</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247484137&amp;idx=1&amp;sn=0acb9d83dce9ba57ce960ebab4eb1d6b</link>
      <description>一个安全界的小众领域</description>
      <content:encoded><![CDATA[<p>
原创 <span>N10th</span> <span>2020-06-12 22:06</span> <span style="display: inline-block;"></span>
</p>

<p>一个安全界的小众领域</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=fac5d7a0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8UObbmQiaZG4zLDBoRWgiaibkODcI42EGe2uZH77fxvJLWThmL79qDtPsfyLQHc2e30P4p5Du1N0KCQ%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><span style="font-size: 14px;">公众号新增一个板块——业务安全情报</span></p><p><em><span style="font-size: 20px;"><strong>0x01 </strong></span></em><span style="font-size: 20px;"><strong>架构划分</strong></span></p><p><span style="font-size: 14px;">公众号架构划分如下</span></p><table><tbody><tr><td style="word-break: break-all;" width="195" valign="top"><span style="font-size: 15px;color: rgb(0, 0, 0);"><strong>黑产研究</strong></span></td><td style="word-break: break-all;" width="227" valign="top"><span style="font-size: 15px;color: rgb(0, 0, 0);"><strong>实战笔记</strong></span></td></tr><tr><td style="word-break: break-all;" width="195" valign="top"><span style="font-size: 15px;color: rgb(0, 0, 0);">黑灰产工具研究</span></td><td style="word-break: break-all;" width="227" valign="top"><span style="font-size: 15px;color: rgb(0, 0, 0);">冷门漏洞挖掘</span></td></tr><tr><td style="word-break: break-all;" width="195" valign="top"><span style="font-size: 15px;color: rgb(171, 25, 66);">【新】业务安全情报</span></td><td style="word-break: break-all;" width="227" valign="top"><span style="font-size: 15px;color: rgb(0, 0, 0);">威胁情报溯源</span></td></tr></tbody></table><p style="text-align: center;"><img class="rich_pages" data-ratio="0.513121546961326" data-s="300,640" style="" data-type="png" data-w="1448" src="https://wechat2rss.xlab.app/img-proxy/?k=24967809&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8UObbmQiaZG4zLDBoRWgiaibkIK93RDEenRqWet8HibTPbk3x82Xk6Uicwn7vnicUhiapmOJnseHwH544gw%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 20px;"><em><strong>0x02 </strong></em><strong>面向对象</strong></span></p><p><span style="font-size: 14px;">主要面向对象：</span></p><p><span style="font-size: 14px;">①金融、航司、购物、社交、直播视频等带有活动类业务的甲方企业</span></p><p><span style="font-size: 14px;">②风控/业务安全人员</span></p><p><span style="font-size: 14px;">③白帽子</span></p><p><span style="font-size: 14px;">④有关单位人员</span></p><p><span style="font-size: 20px;"><em><strong>0x03</strong></em></span> <strong><span style="font-size: 20px;">黑灰产和黑客</span></strong></p><p><span style="font-size: 14px;">了解一下业务安全层的黑灰产结构划分</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.2065972222222222" data-s="300,640" style="" data-type="png" data-w="1152" src="https://wechat2rss.xlab.app/img-proxy/?k=aca4ac7c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8UObbmQiaZG4zLDBoRWgiaibkjFicFPCzaHe9R3LY2yGoS2iaGKAkHnYeaibkq64WVia3wzVuib20mu2e8BQ%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">现在我们再对 基础安全+业务安全  生态</span></p><p><span style="font-size: 14px;">进行简单画像划分</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.0737327188940091" data-s="300,640" style="width: 416px;height: 447px;" data-type="png" data-w="868" src="https://wechat2rss.xlab.app/img-proxy/?k=13459d72&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8UObbmQiaZG4zLDBoRWgiaibkqFtcK4B47Iw5sFcaiaOdQFYE7Imq4hzURNQJzE64MBHKZvBjNFwx8LA%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">所以你会发现，其实这二者之间是会有交集的。</span></p><p><em><span style="font-size: 20px;"><strong>0x04</strong></span></em><strong><span style="font-size: 20px;"> 目的意义</span></strong></p><p><span style="font-size: 17px;"><strong>1. 安全理解</strong></span></p><p><span style="font-size: 15px;">基础安全部门+业务安全部门</span></p><p><span style="font-size: 15px;">所以公众号从一开始就划分了两大类</span></p><p><span style="font-size: 15px;">黑产研究 &gt;&gt;&gt;业务安全</span></p><p><span style="font-size: 15px;">实战笔记 &gt;&gt;&gt;基础安全</span></p><p><strong><span style="font-size: 17px;">2. 甲方企业</span></strong></p><p><span style="font-size: 15px;">除了需要具备，系统网站的基础安全防护来对抗攻击者外，</span></p><p><span style="font-size: 15px;">同时也需要不断净化业务内部的生态环境，</span></p><p><span style="font-size: 15px;">来抵制业务层的黑灰产。</span></p><p><span style="font-size: 15px;">例如，刷量刷单、薅羊毛、诈骗引流等诸如此类业务风险，</span></p><p><span style="font-size: 15px;">防火墙和WAF是无法做到保护的。</span></p><p><span style="font-size: 15px;">了解具体黑灰产作弊实现手法，</span></p><p><span style="font-size: 15px;">及时引入强特征风控策略</span></p><p><span style="font-size: 15px;">显得尤为重要。</span></p><p><strong><span style="font-size: 17px;">3. 白帽子师傅</span></strong></p><p><span style="font-size: 15px;">其实刷src，除了递交漏洞报告</span></p><p><span style="font-size: 15px;">现在很多甲方企业自营的src平台</span></p><p><span style="font-size: 15px;">你会看到包含了递交情报。</span></p><p><span style="font-size: 15px;">往往很多师傅把情报，局限于攻击入侵事件。</span></p><p><span style="font-size: 15px;">但对于很多甲方企业来说，</span></p><p><span style="font-size: 15px;">在举办某次活动时</span></p><p><span style="font-size: 15px;">很多时候更需要业务安全的情报。</span></p><p><strong><span style="font-size: 17px;">4. 有关单位</span></strong></p><p><span style="font-size: 15px;">有时在案件处理过程中</span></p><p><span style="font-size: 15px;">你们或许会碰到出现了一些</span></p><p><span style="font-size: 15px;">“云控”，“群控”，“设备农场”</span></p><p><span style="font-size: 15px;">“接码平台”，“硬改软改”等名词。</span></p><p><em><strong><span style="font-size: 20px;">0x05</span></strong></em><strong><span style="font-size: 20px;"> 板块规划</span></strong></p><p><span style="font-size: 16px;">业务安全情报板块，主要承载两部分内容：</span></p><p><span style="font-size: 16px;">面向白帽子师傅们和有关单位：</span></p><p><span style="font-size: 16px;"><strong>①分享业务安全层的黑灰产作弊手法和思路</strong></span></p><p><span style="font-size: 16px;">面向企业和风控安全人员：</span></p><p><span style="font-size: 16px;"><strong>②甲方企业举办xx活动期间，</strong></span></p><p><span style="font-size: 16px;"><strong>提供及时业务风险情报和黑灰产作弊完整路径</strong></span></p><p><span style="font-size: 14px;">但考虑到，为了不给企业造成麻烦</span></p><p><span style="font-size: 14px;">在活动期间，情报内容不宜公开。</span></p><p><span style="font-size: 14px;">所以如果是甲方风控人员，可以后台私信单独分享。</span></p><p><span style="font-size: 14px;">等活动结束后，再向师傅们公开思路。</span></p><p><em><strong><span style="font-size: 20px;">0x06 </span></strong></em><strong><span style="font-size: 20px;">黑灰产作弊案例</span></strong></p><p><span style="font-size: 14px;">下图是一个完整的作弊链</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.8509433962264151" data-s="300,640" style="width: 407px;height: 346px;" data-type="png" data-w="1590" src="https://wechat2rss.xlab.app/img-proxy/?k=dcfee866&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8UObbmQiaZG4zLDBoRWgiaibkqa6LwYggu5P1T81ibkAhUhDU87PRx086t2TrzXX2h6yWOUZxqqCS5Bg%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 16px;">这是一个往年真实的zfb的注册拉新活动作弊案例，</span></p><p><span style="font-size: 16px;">作弊持续时间达1个月。</span></p><p><span style="font-size: 16px;">你会发现，毫无技术含量但却利用逻辑漏洞，</span></p><p><span style="font-size: 16px;">收益居然达到了20-30w的金额量。</span></p><p><span style="font-size: 16px;">而最终，这部分实名卡</span></p><p><span style="font-size: 16px;">可能会被流入到一些不法分子手中</span></p><p><span style="font-size: 16px;">进而实施匿名的诈骗等违法行为。</span></p><p><span style="font-size: 16px;">无论对于企业业务生态环境还是普通百姓来说</span></p><p><span style="font-size: 16px;">都会造成损失和危害。</span></p><p><em><strong><span style="font-size: 20px;">0x07</span></strong></em> <strong><span style="font-size: 20px;">总结</span></strong></p><p><span style="font-size: 14px;">初心未改，肩负安全。</span></p><p><span style="font-size: 14px;">愿，齐心协力，</span></p><p><span style="font-size: 14px;">维护这，国泰民安。</span></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div style="margin-top: 10px;margin-bottom: 10px;"><div style="border-style: solid;border-width: 1px;border-color: rgb(32, 9, 74);text-align: justify;box-sizing: border-box;"><div style="display: inline-block;width: 100%;border-width: 1px;border-style: solid;border-color: transparent;background-image: url(&#34;https://mmbiz.qpic.cn/mmbiz_gif/211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOaeicw3jEncRggCbN0MeZ61p62jvgI5a13zmTx17r8XOhMTVQSDMplLQ/640?wx_fmt=gif&#34;);background-position: 100% 100%;background-repeat: repeat;background-size: 100%;background-attachment: scroll;padding: 5px;box-sizing: border-box;"><div style="border-radius: 5px;box-sizing: border-box;"><p style="letter-spacing: 2px;margin: 10px;"><span style="font-size: 14px;">一个只专注于黑灰产研究 和 冷门渗透技巧  的暗侍卫</span></p></div></div></div></div></div>



<p><a href="2247484137">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=d7302e0e&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247484137%26idx%3D1%26sn%3D0acb9d83dce9ba57ce960ebab4eb1d6b">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Fri, 12 Jun 2020 22:06:00 +0800</pubDate>
    </item>
    <item>
      <title>后会有期</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247484123&amp;idx=1&amp;sn=40c7d5b52a48931867e28dd73a061ede</link>
      <description>这次，也算是无可厚非了。</description>
      <content:encoded><![CDATA[<p>
<span>N10th</span> <span>2020-06-06 23:49</span> <span style="display: inline-block;"></span>
</p>

<p>这次，也算是无可厚非了。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=136fa2de&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9JyaM6ItY5buutLefgxR1ibJDdpwtfnrqR10eNiajTjDIORHzZrMKHeD4w%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><span style="font-size: 14px;">这应该是我最后一次</span></p><p><span style="font-size: 14px;">发表这篇情报文章了吧</span>。</p><p><span style="font-size: 14px;">有一个公众号，之前未经许可</span></p><p><span style="font-size: 14px;">直接复制粘贴这篇情报文章</span></p><p><span style="font-size: 14px;">然后发表到自己公众号</span></p><p><span style="font-size: 14px;">发现后和对方交流，让其删除</span></p><p><span style="font-size: 14px;">但沟通无果。</span></p><p><span style="font-size: 14px;"><span style="font-size: 14px;">更可笑的，我成了不是原创了hh</span></span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6460674157303371" data-s="300,640" style="width: 303px;height: 196px;" data-type="png" data-w="534" src="https://wechat2rss.xlab.app/img-proxy/?k=94dbe43f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibYFZ5IDh6ugJUWvg8ea1CRA4K98iceFebozDmek4aRcp6YhYicibtCCRnthEpaDInOib4xmx5eTdWMKQ%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">又是一次，让人无语的操作。</span></p><p><span style="font-size: 14px;">因为事情已经过去一段时间了</span></p><p><span style="font-size: 14px;">而且文章也已经被人复制发表了</span></p><p><span style="font-size: 14px;">所以也没什么影响了。</span></p><p><span style="font-size: 14px;">我的初衷只是为了分享</span></p><p><span style="font-size: 14px;">也是为了促进圈子交流。</span></p><p><span style="font-size: 14px;">未来如果还有机会分享情报类的实战笔记</span></p><p><span style="font-size: 14px;">一定会先脱敏处理。</span></p><p><span style="font-size: 14px;">其实，更重要的只是思路。</span></p><p><span style="font-size: 14px;">后台私信很多</span></p><p><span style="font-size: 14px;">有不少师傅，让我建立一个封闭式社区</span></p><p><span style="font-size: 14px;">但，考虑到工作性质</span></p><p><span style="font-size: 14px;">没办法建立群聊和大家沟通。</span></p><p><span style="font-size: 14px;">现在，我唯一能做的</span></p><p><span style="font-size: 14px;">就是每隔一段时间的沉淀</span></p><p><span style="font-size: 14px;">将自身学到  亦或 实战遇到的技巧</span></p><p><span style="font-size: 14px;">分享给大家</span></p><p><span style="font-size: 14px;">只愿，对师傅们有用。</span></p><p><span style="font-size: 14px;">接下来要沉淀一段时间</span></p><p><span style="font-size: 14px;">什么时候回来</span></p><p><span style="font-size: 14px;">或许下下周，或许下个月</span></p><p><span style="font-size: 14px;">我们，后会有期。</span></p><p style="text-align: justify;"><span style="font-size: 12px;">以下是原文</span></p><p><span style="font-size: 14px;">---------------------------</span></p><p><span style="font-size: 14px;">为了不浪费有些大师傅的时间，先提前报备一下。</span></p><p><span style="font-size: 14px;">本篇不是技术文章</span></p><p><span style="font-size: 14px;">没有结局</span></p><p><span style="font-size: 14px;">也没有成功</span></p><p><span style="font-size: 14px;">因为最终没有拿到对方的隐私信息。</span></p><p><span style="font-size: 14px;">如果没有时间，可以直接翻到最后。</span></p><p><span style="font-size: 14px;">这篇文章的目的</span></p><p><span style="font-size: 14px;">主要是希望国内企业，特别是医疗单位，重视网络安全。</span></p><p><span style="font-size: 14px;">同时，因为很少看到针对国外黑客组织的社工类文章</span></p><p><span style="font-size: 14px;">所以就记录一下。</span></p><p><em><strong><span style="font-size: 24px;">0x01 背景介绍</span></strong></em></p><p><strong><span style="font-size: 14px;">时间线</span></strong></p><p><span style="font-size: 14px;">2020年4月28日早</span></p><p><span style="font-size: 14px;">在黑白之道看到这篇文章。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7905604719764012" data-s="300,640" style="width: 423px;height: 334px;" data-type="png" data-w="678" src="https://wechat2rss.xlab.app/img-proxy/?k=9a0ef9ff&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bThSMJN5aIXUOvUmDyuMjgna3ZiaY5kMWlCKrjshoJJ0wsNOa83FSZ9Jg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6714060031595577" data-s="300,640" style="width: 425px;height: 285px;" data-type="png" data-w="633" src="https://wechat2rss.xlab.app/img-proxy/?k=8a81020d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTzHSficQ4MKlP0KleTHjctBPAdbNOXC3y31EZa5nzAMHUibHRK75krUiag%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;"><a target="_blank" href="https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&amp;mid=2650461062&amp;idx=1&amp;sn=829e082e6163ceac5674483046c0999c&amp;scene=21#wechat_redirect" tab="innerlink" data-linktype="2">原文链接</a></span></p><p><span style="font-size: 14px;">下午</span></p><p><span style="font-size: 14px;">接到上级单位的任务，寻找一些蛛丝马迹。</span></p><p><span style="font-size: 17px;"><strong>信息分析</strong></span></p><p><span style="font-size: 14px;">1. 观察公开的图片中，只有@THE0[.]TIME的水印</span></p><p><span style="font-size: 14px;">2.Google/Baidu/twitter/darkweb爬虫接口/简单搜索了一下THE0[.]TIM关键字后，发现除了公开的新闻外，都没什么有价值信息。</span></p><p><span style="font-size: 14px;">3. 后在Telegram搜索，发现了一个名为“00:00”的电报频道。</span></p><p style="text-align: center;"><img class="rich_pages" data-croporisrc="https://mmbiz.qlogo.cn/mmbiz_png/211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTzU4GtTHUwphrjeuI93Fwx2GjDsGJacemauFW9CQnBHXibQXVUZMt4zQ/0?wx_fmt=png" data-cropx1="0" data-cropx2="1080" data-cropy1="81.8181818181818" data-cropy2="1227.272727272727" data-ratio="1.0611111111111111" data-s="300,640" style="width: 285px;height: 302px;" data-type="jpeg" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=4e38b936&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTBZxnGmphTGicmpl8RiaiaIEz6icQF9mZvBU5HadcgrfZZ9CKFsIMRBv1KA%2F640%3Fwx_fmt%3Djpeg"/></p><p style="text-align: justify;"><span style="font-size: 14px;">该频道的标签#DataBounty（数据赏金）</span></p><p style="text-align: justify;"><span style="font-size: 14px;"><strong>4. 实锤取证</strong></span></p><p style="text-align: justify;"><span style="font-size: 14px;">THE0[.]TIME符合00:00，zero time的含义。</span></p><p style="text-align: justify;"><span style="font-size: 12px;">（ps:不想被搜索引擎的关键字轻易匹配到，所以加入[.]符号进行规避）</span></p><p style="text-align: justify;"><span style="font-size: 14px;">进入后检索历史消息</span></p><p style="text-align: justify;"><span style="font-size: 14px;">果然发现了从国内窃取的数据文件，实锤。</span></p><p style="text-align: center;"><img class="rich_pages" data-croporisrc="https://mmbiz.qpic.cn/mmbiz_png/211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTychdl8at7D7u5YvaBAOEyKxSsazc9ibKvOOExd5vic6hmibjhGPvzqh6A/640?wx_fmt=png" data-cropx1="0" data-cropx2="1080" data-cropy1="72.48322147651008" data-cropy2="2221.610738255034" data-ratio="1.988888888888889" data-s="300,640" style="width: 227px;height: 451px;" data-type="jpeg" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=2c41bb5f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTrOFyjwOhGoZsQcooTfruicY8ibLibKTZhrHTKAE0Iib712Okn3ibquOCMew%2F640%3Fwx_fmt%3Djpeg"/></p><p style="text-align: justify;"><span style="font-size: 14px;">从历史消息来看，该黑客组织在4月15日就已经拿到数据并开始贩卖。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">并声称，拿到的数据信息分为四部分：</span></p><p style="text-align: justify;"><span style="font-size: 14px;">①用户数据</span></p><p style="text-align: justify;"><span style="font-size: 14px;">②技术数据</span></p><p style="text-align: justify;"><span style="font-size: 14px;">③研究成果</span></p><p style="text-align: justify;"><span style="font-size: 14px;">④COVID-19疫情相关资料</span></p><p style="text-align: justify;"><span style="font-size: 14px;">频道中还公布了一个视频和若干图片样本。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.9583333333333334" data-s="300,640" style="width: 422px;height: 404px;" data-type="png" data-w="600" src="https://wechat2rss.xlab.app/img-proxy/?k=10b3ea72&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTOkuGqCUnhicEDzCibh9jfXdp6icDyNvIYUMryJ7LbMmuXSrMjbHK0n8Lw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.44954128440366975" data-s="300,640" style="width: 419px;height: 188px;" data-type="png" data-w="436" src="https://wechat2rss.xlab.app/img-proxy/?k=6c6d86ab&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTJyXGUeoEkQV7Cia0EtHvuY395VM3WlG9cfEugkvWArIGVicwTYdp3pug%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">并且图片均带有汇医慧影的水印。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">因为部分视频图片的敏感性，所以就不全部放出了。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">仔细观察第一张截图</span></p><p style="text-align: justify;"><span style="font-size: 14px;">看到一处</span></p><p style="text-align: justify;"><img class="rich_pages" data-ratio="0.6329113924050633" data-s="300,640" style="" data-type="png" data-w="79" src="https://wechat2rss.xlab.app/img-proxy/?k=e1f6866a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTrVfopbcHN0pwticVTAoib1YeZzQEaTwyTvM6aWx3Lb3jBzdp3hGm1CAA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">For buy:</span></p><p style="text-align: justify;"><span style="font-size: 14px;">@Unfrein[.]ded</span></p><p style="text-align: justify;"><span style="font-size: 14px;">点开后，此人电报昵称为0x1。</span></p><p style="text-align: justify;"><img class="rich_pages" data-ratio="1.0172413793103448" data-s="300,640" style="width: 153px;height: 156px;" data-type="png" data-w="290" src="https://wechat2rss.xlab.app/img-proxy/?k=99b5d8f4&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTlhFpsMBvzLwFpOiaFxyUptia0u5ZzJhmjNS0SB4DqqIuyWsXbg4JRSlg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">后来与他交流，确定此人即为，窃取国内数据的zero time黑客组织核心成员。</span></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">5. 攻击者公开信息整理</span></strong></p><p style="text-align: justify;"><span style="font-size: 14px;">把该组织公开的信息，进行了一下整理。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">①联系方式：Telegram账户：@Unfre[.]indedJabber账户:    z3r0t1m3@[.]xmpp.jp②电报频道：<a href="https://t.me/The0[.]Time" target="_blank">https://t.me/The0[.]Time</a></span></p><p style="text-align: justify;"><span style="font-size: 14px;">③zero time核心成员0x1</span></p><p style="text-align: justify;"><span style="font-size: 14px;">④两个区块链钱包地址:a. BTC1Mb131pc1igShCz2pD6UuzRB4BdK6AmYJ5 b. USDT1GyeoHwWpkmHbeuMqwvp7MZSwgXsK3Y</span></p><p style="text-align: justify;"><span style="font-size: 14px;">⑤区块链货币交易查询</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6937142857142857" data-s="300,640" style="width: 394px;height: 273px;" data-type="png" data-w="875" src="https://wechat2rss.xlab.app/img-proxy/?k=a66498bf&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bT5KgEuF1GKxRr3DlOamNfwHOdahz3R4PZLicNJSlUcswdflSkJXicyJ1Q%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">截止2月28日下午，暂未出现交易情况</span></p><p style="text-align: justify;"><span style="font-size: 14px;">但USDT的查询地址无效</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.4233378561736771" data-s="300,640" style="width: 373px;height: 158px;" data-type="png" data-w="737" src="https://wechat2rss.xlab.app/img-proxy/?k=35e92ccb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bT0NzHWnYc5fl9s1uvEf4dEvUcU06aWtRrR63GHL6O3XLBjaYBhKYqtQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><em><strong><span style="font-size: 24px;">0x02 心理战</span></strong></em></p><p style="text-align: justify;"><span style="font-size: 14px;">为了寻找更多的蛛丝马迹，</span></p><p style="text-align: justify;"><span style="font-size: 14px;">九号索性使用土味式英语，与ZeroTime组织核心成员0x1，进行了一次无果的社工交流。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">———————————————————————</span></p><p style="text-align: justify;"><span style="font-size: 14px;">伪造身份：德国人，以假装购买数据的需求，与对方进行了交流。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">目的：尽可能的调查清楚对方窃取到手的数据内容和对手情况。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">———————————————————————</span></p><p style="text-align: justify;"><span style="font-size: 14px;"><strong>正文开始</strong></span></p><p style="text-align: justify;"><img class="rich_pages" data-croporisrc="https://mmbiz.qlogo.cn/mmbiz_png/211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTltxPER9E7cCCgdaXfO7axonOnZ4335yicFBXPo3kcEMX5rQRHtPD3tw/0?wx_fmt=png" data-cropx1="0" data-cropx2="1080" data-cropy1="0" data-cropy2="2082.566037735849" data-ratio="1.9287037037037038" data-s="300,640" style="width: 176px;height: 339px;" data-type="jpeg" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=00cf5043&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bT6dp8LHVjhibc6Vyd6Fe6WHKPsaOUGic8mRQnesB4XEEMKtlOdwkcqqwA%2F640%3Fwx_fmt%3Djpeg"/><img class="rich_pages" data-ratio="1.7886710239651415" data-s="300,640" style="width: 190px;height: 340px;" data-type="png" data-w="459" src="https://wechat2rss.xlab.app/img-proxy/?k=7f1a6e15&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTgrbZKrRt7BbHedANsFvxiapm7oicZoiaASWcguN9uz0wTRQUkyUEicd1fA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">halo式问候完，开门见山。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">不管国内外</span></p><p style="text-align: justify;"><span style="font-size: 14px;">陌生人之间，最大的障碍无非是信任二字</span></p><p style="text-align: justify;"><span style="font-size: 14px;">人性的弱点。</span></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">①欲情故纵，首先质疑对方data的真实性。</span></strong></p><p style="text-align: justify;"><span style="font-size: 14px;">他就为了解释证明，巴拉巴拉的说一堆。</span></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">②顺其自然，抛出愿意“相信”对方，trust you。</span></strong></p><p style="text-align: justify;"><span style="font-size: 14px;">对方又甩了两张窃取的资料图片，证实真实性。</span></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">③“赞赏”对方，说了句酷cool。</span></strong></p><p style="text-align: justify;"><span style="font-size: 14px;">（内心想法是，酷他个锤子，恨不得扒了你的皮）</span></p><p style="text-align: justify;"><span style="font-size: 14px;">纯粹是为了让他感觉交流舒畅，温水煮青蛙。</span></p><p style="text-align: justify;"><img class="rich_pages" data-ratio="1.8591288229842446" data-s="300,640" style="width: 173px;height: 322px;" data-type="png" data-w="1079" src="https://wechat2rss.xlab.app/img-proxy/?k=9290db43&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTJlfymGdYicVY7sINInQyfhkfowAnhTWyc1KicgXcrLJCZ9MlG354MplQ%2F640%3Fwx_fmt%3Dpng"/><img class="rich_pages" data-ratio="1.8458244111349036" data-s="300,640" style="width: 174px;height: 321px;" data-type="png" data-w="467" src="https://wechat2rss.xlab.app/img-proxy/?k=36f79248&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTcN2XqicxeUXmqriaQTiaNd9pkLD1bhFictUISlTy4vsicL2vFBmZkdjTraQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">⑤开始试探</span></p><p style="text-align: justify;"><span style="font-size: 14px;">没购买之前，自然不会直接给我们放出数据的详细内容，但我们可以打探他窃取的内容“轮廓”。得到如下结果：</span></p><p style="text-align: justify;"><span style="font-size: 14px;">a. 1700行，1000名左右的用户信息。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">b. 分别来自湖北、Youan(地域不明，猜测是云南？)、shanxi(陕西或山西)、河南地区的医疗单位账号</span></p><p style="text-align: justify;"><span style="font-size: 14px;">c. 数据格式（图片打码区域）：账号密码、权限、用户名以及注册单位等（不幸中的万幸，不包含医护人员的身份证详细地址什么的）</span></p><p style="text-align: justify;"><span style="font-size: 14px;">⑥一探到底</span></p><p style="text-align: justify;"><span style="font-size: 14px;">我想让他发一些更多未公开的信息，他后来拍了一张照片</span></p><p style="text-align: justify;"><span style="font-size: 14px;">内容是汇医慧影的AI辅助系统控制文档。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">接着，他说如果我不想买，就直说。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">担心问太多了，引起怀疑。</span></p><p style="text-align: justify;"><img class="rich_pages" data-croporisrc="https://mmbiz.qlogo.cn/mmbiz_png/211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTo1NfyDo6kgldspPKJYWFclbAFlScsJAibyJwia53lDzL7do3eDXwJxsw/0?wx_fmt=png" data-cropx1="0" data-cropx2="1080" data-cropy1="0" data-cropy2="2016.0000000000002" data-ratio="1.863888888888889" data-s="300,640" style="width: 164px;height: 306px;" data-type="jpeg" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=7359fa5f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTT5DGLddbbqyfZGGibricKn1LG5YPK5z4LuhOjlCRickQY7ZDeicico5dTtQ%2F640%3Fwx_fmt%3Djpeg"/><img class="rich_pages" data-ratio="1.8722222222222222" data-s="300,640" style="width: 163px;height: 305px;" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=34ee1321&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTB018TheXlkuFJPIjXZuy5THqcPV4ib1utWLKAahic5d2MTjuVgysHFUw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">⑦假装“砍价”</span></p><p style="text-align: justify;"><span style="font-size: 14px;">为了让他相信，媒体曝光说是4btc。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">我直接就砍价到1比特币，对面问号三连</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.2779291553133515" data-s="300,640" style="" data-type="png" data-w="367" src="https://wechat2rss.xlab.app/img-proxy/?k=1e4c59b8&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTuukt94s0T8E53lutrJ5VNg8uBeP5ls6Dm9sZEBubz2LcRBffnmGOQg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">1btc买它所有东西，显然不现实。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">所以我说，一半。买它一半的东西，source code和data。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">对方说2.5比特币，把所有的给我。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">我说2比特币，有来有回地“砍”他。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6614349775784754" data-s="300,640" style="width: 319px;height: 211px;" data-type="png" data-w="446" src="https://wechat2rss.xlab.app/img-proxy/?k=2b343fc0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTuwe4icQZv1xdJjUbmrsOiaZRjpmHvCOFO8kdqFM1d7vz9wCqeRsXjNKg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">砍价只是个幌子，其目的还是在于打探更多的信息。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">所以，我插了一句，问他是哪个国家的</span></p><p style="text-align: justify;"><span style="font-size: 14px;">结果，对方来了句，他们是一个地下组织...</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.28634361233480177" data-s="300,640" style="width: 307px;height: 88px;" data-type="png" data-w="454" src="https://wechat2rss.xlab.app/img-proxy/?k=dd25e588&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTT6ffPIZRpl26IUWKCJ5pk6KNGsPicxicV7oxCP3tsdq8LxfUcBykgX8A%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">很明显，警惕性。</span></p><p><span style="font-size: 14px;">还说，“请叫我们zero time或者00:00”。（真是一群夜半三更出门干坏事的鬼）</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.3939393939393939" data-s="300,640" style="width: 313px;height: 123px;" data-type="png" data-w="462" src="https://wechat2rss.xlab.app/img-proxy/?k=95d7f80c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTPhAq0TEribFDmicZ3Aic8jaG0bdTWxjf6p1IayZz5B9ufrhL5dXodTSVg%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">把握机会，再次 “赞赏”他，让他开心，加火，继续温水煮青蛙。</span></p><p><span style="font-size: 14px;">而后，对方又回到正题说，如果我准备好了，就开始交易。（交易他个锤子）</span></p><p><span style="font-size: 14px;">我假装自己比特币钱包余额不够2.2btc，跟他说，我要跟老大商量一下。</span></p><p><span style="font-size: 14px;">趁势又“谄媚”了一句，说你们有如此高的技术，想后期跟你们团队“合作”。（是想获得对方更多信息）</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.4541484716157205" data-s="300,640" style="width: 285px;height: 414px;" data-type="png" data-w="458" src="https://wechat2rss.xlab.app/img-proxy/?k=3e04f039&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bT5DJAsJPbH4r91bF2mJibZhXiaOiajnibG4JLia6iaIiaY5UMOkIdyibBc56iarg%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">但果不其然，对方警惕。</span></p><p><span style="font-size: 14px;">他说，他们zero time会评估核验每一个合作或者加入的人。（没戏）</span></p><p><span style="font-size: 14px;">同时，又发了一张国内的病史化验报告。</span></p><p><span style="font-size: 14px;">说实话，到此处心情有点难受，看见几份中文大字的报告图，被一个黑产老外拿捏在手。</span></p><p><span style="font-size: 14px;">4月28日，交流结束。</span></p><p><strong><span style="font-size: 14px;">⑧</span></strong><strong><span style="font-size: 14px;">让小朋友一脸问号的一幕</span></strong></p><p><span style="font-size: 14px;">4月29日，我想获取他ip试试</span></p><p><span style="font-size: 14px;">构思了一个方法，钓鱼URL重定向。</span></p><p><span style="font-size: 14px;">虽然明知这种方法，失败率很高，</span></p><p><span style="font-size: 14px;">就算我构造了一个URL发过去</span></p><p><span style="font-size: 14px;">他也不一定点开</span></p><p><span style="font-size: 14px;">就算他点开了</span></p><p><span style="font-size: 14px;">他也八九成不是真实ip</span></p><p><span style="font-size: 14px;">但还是想试试。</span></p><p><span style="font-size: 14px;">首先，因为了解对方手里窃取到的用户数据，是用于登录汇医慧影网站的。</span></p><p><span style="font-size: 14px;">所以，这里用一个跟踪器，构造一个重定向的URL：<a href="https://catsnthing.com/CWEDAI" target="_blank">https://catsnthing.com/CWEDAI</a></span></p><p><span style="font-size: 14px;">用于重定向到<a href="http://en.huiyihuiying.com" target="_blank">http://en.huiyihuiying.com</a> 汇医慧影的网站。</span></p><p><span style="font-size: 14px;">其目的是，对方访问后，记录他的IP地址。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.40015661707126077" data-s="300,640" style="" data-type="png" data-w="1277" src="https://wechat2rss.xlab.app/img-proxy/?k=063b82b0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTEm6OGZwkSovfQAzJeic8TFPVsCa2qChfvsSlTuKTxXC3EdkWNdcafVQ%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">有点虚哈哈</span></p><p><span style="font-size: 14px;">然后，找个借口。发给对方</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.874730021598272" data-s="300,640" style="width: 249px;height: 467px;" data-type="png" data-w="463" src="https://wechat2rss.xlab.app/img-proxy/?k=f2fbcf3b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTEib0JafGPvsicpSWR5D0lJl3J9Kd3UEsF8PZYMc8KRFDSsVCHQIQSdxw%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">等到下午，他回复我了，立即打开后台，查看是否有对方的IP记录。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.440466278101582" data-s="300,640" style="width: 457px;height: 201px;" data-type="png" data-w="1201" src="https://wechat2rss.xlab.app/img-proxy/?k=8d0ea0ee&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTkcQk8icA2NHdhRgM4fia1ZzIMrEf91b2lTjCyeAJlCcWwyhlMk7OibfDw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">红色框出来的，即为抓到的ip：244.242.105.51，其余均为我挂了代理测试的ip记录。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">然后，我去搜索该IP的归属地时</span></p><p style="text-align: justify;"><span style="font-size: 14px;">让人大跌眼镜的一幕发生了</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.4705111402359109" data-s="300,640" style="width: 368px;height: 173px;" data-type="png" data-w="763" src="https://wechat2rss.xlab.app/img-proxy/?k=d02eb75f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTXicdSZy7FhS52V3CfL6C6k2DV6XMoic1QpnNtiaCqy1qIMN6PyXw4t8SQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">这是一个E类的IP地址，而且是保留地址...</span></p><p style="text-align: justify;"><span style="font-size: 14px;">此时的心情</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.029535864978903" data-s="300,640" style="" data-type="png" data-w="237" src="https://wechat2rss.xlab.app/img-proxy/?k=539aa313&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTFqQHYgG5b4tu7Z4eOGgEtSyJYCeB6nu5VdJTBYdCiaBtiaQnETHXg5Fg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">我考虑过对方不会点击我的URL，</span></p><p style="text-align: justify;"><span style="font-size: 14px;">考虑过会挂VPN代理，</span></p><p style="text-align: justify;"><span style="font-size: 14px;">但始终没想过会出现保留地址的情况。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">最开始的推测是，对方在数据包中伪造了XFF等系列头</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.46825396825396826" data-s="300,640" style="" data-type="png" data-w="252" src="https://wechat2rss.xlab.app/img-proxy/?k=5d751a02&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTTXNFfP6K5YO0qcVYHknBNQLMwNyo3EeVTUIJVBoFhovtzyZ9wupuSg%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">但自己本地测试后，发现这种伪造的做法并不会干扰影响对我的URL跟踪器结果。</span></p><p><span style="font-size: 14px;">所以，进行到这，思路暂时断了。</span></p><p><span style="font-size: 14px;">目前掌握的信息只有以下内容</span></p><p><span style="font-size: 14px;">①记录的保留地址IP</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.41839080459770117" data-s="300,640" style="width: 428px;height: 179px;" data-type="png" data-w="870" src="https://wechat2rss.xlab.app/img-proxy/?k=0c3c99ab&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTfmoannyKR9K3oY3PZT16pHp7ga8mzhRmGVic0zibdwOXTVOdlESIO7bQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">②搜集到的公开信息</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.8208232445520581" data-s="300,640" style="width: 323px;height: 265px;" data-type="png" data-w="413" src="https://wechat2rss.xlab.app/img-proxy/?k=04e04b66&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTlTH2qCYHfG9iaVGg3ibcKBXXqxtb1vLAQV36xV4VEQzZ0b8KRUw967hw%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">最后，在电报频道，还发现他们在售卖了国内另一个系统的数据（crmeb.com）</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.9722222222222222" data-s="300,640" style="width: 270px;height: 263px;" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=73a3e11d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTLjT1oTsu03lZmiavr085mAZibn0TtKM5uaSxjicdqmM8qztdW0ZS3XXiaw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.46959459459459457" data-s="300,640" style="width: 314px;height: 147px;" data-type="png" data-w="592" src="https://wechat2rss.xlab.app/img-proxy/?k=f190d059&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTYEicEBqiam0JZ9Nksnbflf5WFmRv9SgWnO0Fn16FLV6xv8eibWcib2BMfw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><span style="font-size: 14px;">可信度无法判断，仅以此做个提醒</span></p><p><span style="font-size: 14px;">与此同时，其它国家的数据也能在其中找到。</span></p><p><span style="font-size: 14px;">这是一个真实的案例，也是失败的案例。</span></p><p><span style="font-size: 14px;">至此，只能先告一段落。</span></p><p>————————————————————</p><p><em><strong><span style="font-size: 24px;">0x03 落幕</span></strong></em></p><p><em><span style="font-size: 17px;"><strong>IP分析</strong></span></em></p><p><strong><span style="font-size: 14px;">4月30日</span></strong></p><p><span style="font-size: 14px;">对昨天拿到的ip：244.242.108.51</span></p><p><span style="font-size: 14px;">在各大威胁情报引擎检索，并无收获。</span></p><p style="text-align: justify;"><img class="rich_pages" data-ratio="0.9236209335219236" data-s="300,640" style="width: 177px;height: 163px;" data-type="png" data-w="1414" src="https://wechat2rss.xlab.app/img-proxy/?k=dac7ade9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9JgLiagLR7z7TrQjTxFA2pfcTCRUbnul3tmthxfeiatNloCILnGib4ZL4nA%2F640%3Fwx_fmt%3Dpng"/><img class="rich_pages" data-croporisrc="https://mmbiz.qlogo.cn/mmbiz_png/211GsCcwoibibBnicNJq3M8MekqyKGJ6M9JbJOoG1FSwgwn03A04LfAtMK8ae3ZLiavCVEN9xuQ5Z2VqPYeQULtE9Q/0?wx_fmt=png" data-cropx1="0" data-cropx2="998.2096774193549" data-cropy1="0" data-cropy2="842.7096774193548" data-ratio="0.844689378757515" data-s="300,640" style="width: 199px;height: 168px;" data-type="jpeg" data-w="998" src="https://wechat2rss.xlab.app/img-proxy/?k=8cd39191&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9J5xbbGmXHxYcTIic0wO3oaH0dc5lDgXu2Qum7nopic7A53ve0gCyGWfSg%2F640%3Fwx_fmt%3Djpeg"/></p><p><span style="font-size: 14px;">只在一个地方发现该IP曾在2019年被发送过大量垃圾邮件</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.1471571906354514" data-s="300,640" style="width: 309px;height: 354px;" data-type="png" data-w="1196" src="https://wechat2rss.xlab.app/img-proxy/?k=34c94c7d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9JvKaIXyeWvdVvDu81Jfx9yBWYZDJJkvlCEMOtmYBzRUVW1ZZRzvBb3g%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">思考了很久...</span></p><p><span style="font-size: 14px;">为什么会是抓到的IP是保留地址</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.42530835998172684" data-s="300,640" style="width: 381px;height: 162px;" data-type="png" data-w="2189" src="https://wechat2rss.xlab.app/img-proxy/?k=851fb4eb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9JvzibuS9GQucSkwNbR1huJa2FcOLm2KnMZt19LJ3kClWdVX18aFD8HEw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">把这件事跟实验室的顾师傅分享了</span></p><p><span style="font-size: 14px;">我们不断篡改HTTP数据头，</span></p><p><span style="font-size: 14px;">反复对IP记录器的钓鱼URL进行碰撞。</span></p><p><span style="font-size: 14px;">也办法复现保留地址的IP场景</span></p><p><span style="font-size: 14px;">世界观感觉要崩塌了。</span></p><p style="text-align: justify;"><strong>柳暗花明</strong></p><p><span style="font-size: 14px;">然后我们又回到了IP Logger的记录后台</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5125858123569794" data-s="300,640" style="width: 374px;height: 192px;" data-type="png" data-w="1748" src="https://wechat2rss.xlab.app/img-proxy/?k=e3512866&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9Jo6knZYyhXZ9eDbZBiaGJq5uUic04sdhMZFstazBFpvAAmjRKB7MNjG2Q%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">顾师傅多年的爬虫经验</span></p><p><span style="font-size: 14px;">对HTTP数据包的头部有着敏感的嗅觉</span></p><p><span style="font-size: 14px;">发现，User-Agent像极了Tor浏览器的头部信息。</span></p><p><span style="font-size: 14px;">立即动手实验，</span></p><p><span style="font-size: 14px;">我们使用Tor浏览器访问百度，对比我们IP Logger抓到的头部信息</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5527488855869243" data-s="300,640" style="width: 434px;height: 240px;" data-type="png" data-w="2692" src="https://wechat2rss.xlab.app/img-proxy/?k=bab85f9c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9JDE8JXn8nicuP8s6vqSmwrtYrLkmibqfcicBWsLfnmHicdWztNEuynMX02Q%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">果不其然，丝毫未差，一模一样。</span></p><p><span style="font-size: 14px;">可是这跟我们的保留地址IP有什么关系呢？</span></p><p style="text-align: justify;"><span style="font-size: 14px;">在查阅了一些关于Tor浏览器的资料后</span></p><p style="text-align: justify;"><span style="font-size: 14px;">意外发现了一篇国外的文章</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.1944888178913738" data-s="300,640" style="width: 461px;height: 90px;" data-type="png" data-w="2504" src="https://wechat2rss.xlab.app/img-proxy/?k=6610e746&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9JnIJss8IFAGEXDKGBkpibfSbABHyiach6rVg3oVRzOdicGfB26sia7WDSAQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">文章介绍了，他在对一次攻击行为的数据包流量进行分析时，</span></p><p style="text-align: justify;"><span style="font-size: 14px;">惊讶地发现，拿到的IP是254.110.107.86，</span></p><p style="text-align: justify;"><span style="font-size: 14px;">查看归属地，发现同样也是一个保留地址。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">但他发现，其它数据包流量中最后有一行是86.107.110.254的IP地址</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5913936044216345" data-s="300,640" style="width: 369px;height: 218px;" data-type="png" data-w="2533" src="https://wechat2rss.xlab.app/img-proxy/?k=940f97fa&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9J5ESe01txgTq8zyLiauDyIcicXkbnp2qhUic2VlZLaNosLDYgIchm0TkJQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;color: rgb(0, 0, 0);">而86.107.110.254恰好是IP地址254.110.107.86的反转。</span></p><p style="text-align: justify;">——————————————————</p><p style="text-align: justify;"><span style="font-size: 14px;">作者的解释是</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.4516991218022146" data-s="300,640" style="width: 379px;height: 171px;" data-type="png" data-w="2619" src="https://wechat2rss.xlab.app/img-proxy/?k=cbc489e0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9J4HBfccj9WA1Ke9zAWfoUvTR3SVY2nPwhCvwG7P25OhFELDF77vyraw%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 17px;color: rgb(255, 104, 39);">对方机器使用的是小端模式（little endian）</span></p><p><span style="font-size: 17px;color: rgb(255, 104, 39);">而不是大端模式（big endian）</span></p><p><span style="font-size: 14px;">这时候我们老大说了一句</span></p><p><span style="font-size: 14px;">这或许就是为什么</span></p><p><span style="font-size: 14px;">114.114.114.114和8.8.8.8这两个IP</span></p><p><span style="font-size: 14px;">会用做DNS服务器的其中一个原因。</span></p><p><span style="font-size: 14px;">因为可能有的机器采用大端模式，有的采用小端模式。</span></p><p><span style="font-size: 14px;">而114.114.114.114和8.8.8.8这两个IP</span></p><p><span style="font-size: 14px;">无论怎么反转，都还是不变，对大小端机器都适用。</span></p><p><span style="font-size: 14px;color: rgb(61, 167, 66);">在小端模式中,低位字节放在低地址,高位字节放在高地址;在大端模式中,低位字节放在高地址,高位字节放在低地址</span></p><p>——————————————————</p><p><span style="font-size: 14px;">大胆推测</span></p><p><span style="font-size: 14px;">这是不是像极了我们当下的情况。</span></p><p><span style="font-size: 14px;">抓到的IP：244.242.108.51</span></p><p><span style="font-size: 14px;">将其反转：51.108.242.244</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.4946714031971581" data-s="300,640" style="width: 394px;height: 195px;" data-type="png" data-w="2252" src="https://wechat2rss.xlab.app/img-proxy/?k=ff959502&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9Je5e0MatbkMgjctFvKGs3qkf497RXVQ1VPSqNemZ3MlvgM3sIXQKc7Q%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">IP归属地，从保留地址&gt;&gt;&gt;到英国</span></p><p><span style="font-size: 14px;">蓦然回首，柳暗花明</span>。</p><p><span style="font-size: 14px;">于是，我们多了一条线索</span></p><p><span style="font-size: 14px;">IP：51.108.242.244</span></p><p><span style="font-size: 14px;">归属地：英国</span></p><p><img class="rich_pages" data-ratio="0.5753834642723532" data-s="300,640" style="width: 419px;height: 241px;" data-type="png" data-w="2673" src="https://wechat2rss.xlab.app/img-proxy/?k=c977c29c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9JibLVuqLxl7dnIe53Ir1kcAibhhokvZsuOrvtatAeRFuYEF0XysetqZcg%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">虽然这应该还只是，对方多重Tor节点中的最后一个IP而已。</span></p><p><span style="font-size: 14px;">这是一个真实的案例，也是失败的案例。</span></p><p><span style="font-size: 14px;">至此，只能告一段落。</span></p><p><span style="font-size: 14px;">毕竟眼前的ZeroTime，是一个国际黑产组织</span></p><p style="text-align: center;"><img class="rich_pages" data-croporisrc="https://mmbiz.qlogo.cn/mmbiz_png/211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bT6vJyjh36OibObuia81RicgSVytjcQbNsaPgTSC0zzeHVdVuqRkaAu4vXg/0?wx_fmt=png" data-cropx1="49.826989619377166" data-cropx2="418.5467128027682" data-cropy1="407.4740484429066" data-cropy2="566.9204152249135" data-ratio="0.43089430894308944" data-s="300,640" style="width: 333px;height: 144px;" data-type="jpeg" data-w="369" src="https://wechat2rss.xlab.app/img-proxy/?k=4f2d04d6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8YxWhicIicVoiap2XiaBoZv0bTcU9tHJeolRNiaHuyiblX3yWacf8W2q1K2JZExoN6Fdvl9kSupCwAmubQ%2F640%3Fwx_fmt%3Djpeg"/></p><p><span style="font-size: 14px;">手握多少0day不知道</span></p><p><span style="font-size: 14px;">其安全技术可能领先于一般的水平。</span></p><p><span style="font-size: 14px;">一己之力固然难以抗衡</span></p><p><span style="font-size: 14px;">虽然明知是南墙，但还是想撞一撞。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">感觉像是写了一个故事，却又是真实场景。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">虽然不在国家单位工作，</span></p><p style="text-align: justify;"><span style="font-size: 14px;">但我们服务于国家，</span></p><p style="text-align: justify;"><span style="font-size: 14px;">更授命保护于国家。</span></p><p><span style="font-size: 14px;">毕竟，我们是</span><span style="color: rgb(0, 0, 0);font-size: 14px;">中国</span><span style="font-size: 14px;">白帽子。</span></p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="0.75" data-s="300,640" style="width: 288px;height: 216px;" data-type="jpeg" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=2b5b5524&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib9mliaY2axs5qSkLQHL9hKR9iczGjnSzFw9csv7RLaabUpFNedAFNqDAtu6n9zNoMSWOggg23E2e4Rw%2F640%3Fwx_fmt%3Djpeg"/></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div style="margin-top: 20px;margin-bottom: 10px;"><div style="margin-top: -22px;text-align: center;font-style: italic;"><p style="font-size: 20px;min-width: 1px;font-weight: bold;"><em>END</em></p></div></div></div><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div style="margin-top: 10px;margin-bottom: 10px;"><div style="border-style: solid;border-width: 1px;border-color: rgb(32, 9, 74);text-align: justify;box-sizing: border-box;"><div style="display: inline-block;width: 100%;border-width: 1px;border-style: solid;border-color: transparent;background-image: url(&#34;https://mmbiz.qpic.cn/mmbiz_gif/211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOaeicw3jEncRggCbN0MeZ61p62jvgI5a13zmTx17r8XOhMTVQSDMplLQ/640?wx_fmt=gif&#34;);background-position: 100% 100%;background-repeat: repeat;background-size: 100%;background-attachment: scroll;padding: 5px;box-sizing: border-box;"><div style="border-radius: 5px;box-sizing: border-box;"><div style="letter-spacing: 2px;margin: 10px;"><span style="font-size: 14px;">仅以此文，报以国家，献以情深。</span><p style="color: rgb(32, 9, 74);font-size: 14px;min-width: 1px;">                                            ——N10th</p></div></div></div></div></div></div>



<p><a href="2247484123">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=ade3b2a7&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247484123%26idx%3D1%26sn%3D40c7d5b52a48931867e28dd73a061ede">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Sat, 06 Jun 2020 23:49:00 +0800</pubDate>
    </item>
    <item>
      <title>实战笔记之二维码劫持漏洞</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247484118&amp;idx=1&amp;sn=2ca27dba82679e4519ace5899d788f72</link>
      <description>这次面向白帽子师傅们，分享一个二维码劫持漏洞案例</description>
      <content:encoded><![CDATA[<p>
原创 <span>N10th</span> <span>2020-06-01 19:05</span> <span style="display: inline-block;"></span>
</p>

<p>这次面向白帽子师傅们，分享一个二维码劫持漏洞案例</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=4c8a8109&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoibiciaLv7tADibHPRvMCsFSLEYzKZuicwygCuMCoR6Gvxbr764bvATQPkp2lM0tRuxTtXMrnm8jITvqbcA%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p>----------------------------</p><p><span style="font-size: 14px;">思考了一段时间</span></p><p><span style="font-size: 14px;">情报类的实战笔记</span></p><p><span style="font-size: 14px;">不适合未经脱敏地外放</span></p><p><span style="font-size: 14px;">以后，我会去掉具体细节</span></p><p><span style="font-size: 14px;">跟大家分享思路。</span></p><p><span style="font-size: 14px;">这次面向白帽子师傅们，</span></p><p><span style="font-size: 14px;">分享一个实战中</span></p><p><span style="font-size: 14px;">碰到的二维码劫持漏洞案例</span></p><p><span style="font-size: 14px;">------------------------------------</span></p><p><em><span style="font-size: 20px;"><strong>0x01</strong></span></em><span style="font-size: 20px;"><strong> 场景再现</strong></span></p><p><span style="font-size: 14px;">vue类型的网站，登录口，有三种登陆方式。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6835781041388518" data-s="300,640" style="width: 370px;height: 253px;" data-type="png" data-w="749" src="https://wechat2rss.xlab.app/img-proxy/?k=3adcfa53&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibkBrCOu0C9L9IYd35If2jh3fcykMc7OsyDfwiaWEX060QoWY1hF3fMYhQ5iaBteIShebEsLibicqtvhw%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 12px;">（ps:你要是只看到了两种登陆方式，抬头反思三秒钟）</span></p><p><span style="font-size: 14px;">选择扫码登录，弹出“微信扫码登录”</span></p><p><span style="font-size: 14px;">直觉告诉我，这里可能存在漏洞。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.8087201125175809" data-s="300,640" style="width: 258px;height: 209px;" data-type="png" data-w="711" src="https://wechat2rss.xlab.app/img-proxy/?k=22fad94c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibkBrCOu0C9L9IYd35If2jhqjVlwib5qCafJo6UA2WsK1EUJHOk4eicFrTFJqh6Bo2RJKlnSelLswnA%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 20px;"><em><strong>0x02 </strong></em><strong>漏洞分析</strong></span></p><p><span style="font-size: 14px;">微信扫码后，显示需要关注该网站的公众号</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7449521785334751" data-s="300,640" style="width: 386px;height: 288px;" data-type="png" data-w="941" src="https://wechat2rss.xlab.app/img-proxy/?k=32f9900c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibkBrCOu0C9L9IYd35If2jhEtw6uOS8nfvYicrvV8NAMAXvf3iamalDOGcuFPJKCQibTIEQCOhP6ylicA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">待微信绑定公众号后，即可注册/登录。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">注册了一个账号后。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">再进行扫码登录</span></p><p style="text-align: justify;"><span style="font-size: 14px;">扫码&gt;&gt; 弹出“前往包含的公众号”</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.968363136176066" data-s="300,640" style="width: 255px;height: 502px;" data-type="png" data-w="727" src="https://wechat2rss.xlab.app/img-proxy/?k=b20ff08f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibkBrCOu0C9L9IYd35If2jhnOBnJHJ7U6B0xynIzCb5zTsGhUZY853ZpkP239cukiaZYm8pTW2RBNA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;"> “点击授权”</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.27384615384615385" data-s="300,640" style="width: 410px;height: 112px;" data-type="png" data-w="650" src="https://wechat2rss.xlab.app/img-proxy/?k=4ad3ec95&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibkBrCOu0C9L9IYd35If2jhkudgwIGFKibSIBKp4qQ31iaXzO2FDQDeUSqudFbn9ice7zEzxyiaXcVDQA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">微信网页跳转，&gt;&gt;&gt;点击确认登录</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.22279792746113988" data-s="300,640" style="width: 427px;height: 95px;" data-type="png" data-w="1737" src="https://wechat2rss.xlab.app/img-proxy/?k=6c27fd08&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibkBrCOu0C9L9IYd35If2jhSv4yKbqAUHKXhIibdyXaD2daia6mmibqn2ZrF0Ib4JjsiaOybW6JI1eKAA%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">会发现浏览器Web端页面跳转，</span></p><p><span style="font-size: 14px;">登录成功！</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.2894736842105263" data-s="300,640" style="" data-type="png" data-w="228" src="https://wechat2rss.xlab.app/img-proxy/?k=cb9a5166&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibiciaLv7tADibHPRvMCsFSLEYzU8DGibMc6QyTsVJw3wXia7hCicMlGAQdGFX6jU7w1Z5Mpvb4kddAlyuVw%2F640%3Fwx_fmt%3Dpng"/></p><p><strong><span style="font-size: 14px;">分析</span></strong></p><p><span style="font-size: 14px;">①浏览器Web端分析</span></p><p><span style="font-size: 14px;">回到最开始的地方，Web端网站的扫码登录入口点</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.8229166666666666" data-s="300,640" style="" data-type="png" data-w="192" src="https://wechat2rss.xlab.app/img-proxy/?k=67fdea3c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibiblZFFWXWroAkkfHWfByjG2XaTosmYzqzGPhuBxZpRUicbzSQpru4DcJJuL4uHx5icrz6HodAg5XiaAw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.4444444444444444" data-s="300,640" style="width: 351px;height: 156px;" data-type="png" data-w="549" src="https://wechat2rss.xlab.app/img-proxy/?k=db00f779&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibiblZFFWXWroAkkfHWfByjG2cZVib5hmgPVVaibjc6wXq6A0RVcpn7BPY7Sw5gmU6tqNJIZIaibV7batA%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">此时，浏览器进入二维码轮循状态，</span></p><p><span style="font-size: 14px;">不断向服务器发送请求，</span></p><p><span style="font-size: 14px;">判断是否扫描了二维码。</span></p><p><span style="font-size: 14px;">点开任意一个轮循环发送的请求数据包</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5089285714285714" data-s="300,640" style="width: 406px;height: 207px;" data-type="png" data-w="560" src="https://wechat2rss.xlab.app/img-proxy/?k=e4561230&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibiblZFFWXWroAkkfHWfByjG2KicCkg6NansCGuAkkw1a0nGdWJiaZliaN4Q6QlMXM2DbDr5CRWvcYy8Cg%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">你会发现post body的其中一个参数，“loginId”。</span></p><p><span style="font-size: 14px;">记住这个值：f4a891xxxxxxxx</span></p><p><span style="font-size: 14px;">②微信客户端分析</span></p><p><span style="font-size: 14px;">在扫码前往公众号后，需要“点击授权”确认后，即可成功登录。</span></p><p style="text-align: center;"><span style="font-size: 14px;"><img class="rich_pages" data-ratio="0.27384615384615385" data-s="300,640" style="width: 410px;height: 112px;" data-type="png" data-w="650" src="https://wechat2rss.xlab.app/img-proxy/?k=4ad3ec95&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibkBrCOu0C9L9IYd35If2jhkudgwIGFKibSIBKp4qQ31iaXzO2FDQDeUSqudFbn9ice7zEzxyiaXcVDQA%2F640%3Fwx_fmt%3Dpng"/></span></p><p><span style="font-size: 14px;">我们在微信PC端，提取这个“点击授权”的URI超链，进行分析</span></p><p><span style="font-size: 14px;color: rgb(0, 128, 255);"><a href="https://xxxx.com/#/login/auth?loginId=f4a891xxxxxxxxxxxxxxx" target="_blank">https://xxxx.com/#/login/auth?loginId=f4a891xxxxxxxxxxxxxxx</a></span></p><p>发现携带了参数loginId值，并且与上一步中的loginId值相同！</p><p style="text-align: justify;">有什么用呢？</p><p style="text-align: justify;">一旦受害者扫码</p><p style="text-align: justify;">攻击者能否“代替”对方点击授权，如何代替？</p><p style="text-align: justify;">因为我们有了loginId，通过自行构造出“点击授权”的URI</p><p style="text-align: justify;"><span style="font-size: 14px;">构造漏洞利用思路：</span></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">两个身份</span></strong><span style="font-size: 14px;">：受害者，攻击者。</span></p><p style="text-align: justify;"><span style="font-size: 14px;"><strong>前提条件</strong>：受害者注册了该网站，可用微信扫码直接登录</span></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">攻击场景</span></strong><span style="font-size: 14px;">：攻击者打开该网站，选择微信扫码登录。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">截图，截取二维码发给受害者。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">受害者扫码&gt;&gt;点击“前往该公众号”</span></p><p style="text-align: justify;"><span style="font-size: 14px;">攻击者获取loginId  构造“点击授权”的URI链接</span></p><p style="text-align: justify;"><span style="font-size: 14px;">从而完成账户入侵</span></p><p style="text-align: justify;"><span style="font-size: 20px;"><strong><em>0x03</em> </strong><strong>漏洞复现</strong></span></p><p style="text-align: justify;"><span style="font-size: 14px;">① 打开登录网站</span></p><p style="text-align: justify;"><span style="font-size: 14px;">②点击扫码登录</span></p><p style="text-align: justify;"><span style="font-size: 14px;">③记录轮循数据包的loginId值f4a89xxxxxxxxxx</span></p><p style="text-align: justify;"><span style="font-size: 14px;">④直接截取web端登录的二维码图片，发给受害者</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7232597623089984" data-s="300,640" style="width: 351px;height: 254px;" data-type="png" data-w="589" src="https://wechat2rss.xlab.app/img-proxy/?k=4e64472b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibiblZFFWXWroAkkfHWfByjG25WcXKh3icOTlR9VAnlKhSZRMyCzkuM4uT3uEtePj4KmL92DvfMf2hgQ%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">有个前提：</span></p><p><span style="font-size: 14px;"> 二维码在有效期内，因为时间过长，二维码会失效</span></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">受害者视角</span></strong></p><p style="text-align: justify;"><span style="font-size: 14px;">受害者扫码</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="2.0644257703081235" data-s="300,640" style="width: 187px;height: 386px;" data-type="png" data-w="357" src="https://wechat2rss.xlab.app/img-proxy/?k=8e3dfb3e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibiblZFFWXWroAkkfHWfByjG2OWAZ3B8CfqGuPWXUUjU6ATEt4BdicIeWMzrjgm56SMveZCH0tiaFggibQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">一旦点击“前往图中包含的公众号”。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">此时，我们视角转换，</span></p><p style="text-align: justify;"><span style="font-size: 14px;">不需要关心受害者会接下来进行什么操作，</span></p><p style="text-align: justify;"><span style="font-size: 14px;">他都已经沦陷了</span></p><p style="text-align: justify;"><strong><span style="font-size: 14px;">攻击者视角</span></strong></p><p><span style="font-size: 14px;"><span style="font-size: 14px;">通过loginId值的拼接</span></span></p><p><span style="font-size: 14px;">自行构造出URI</span></p><p><span style="font-size: 14px;"><a href="https://xxxx.com/#/login/auth?loginId=f4a89xxxxxxxxxx" target="_blank">https://xxxx.com/#/login/auth?loginId=f4a89xxxxxxxxxx</a></span></p><p><span style="font-size: 14px;">攻击者微信客户端直接打开该链接</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.3877005347593583" data-s="300,640" style="" data-type="png" data-w="374" src="https://wechat2rss.xlab.app/img-proxy/?k=2a52bed0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibiblZFFWXWroAkkfHWfByjG25bfnPIwumrZWwbw8LAORmv6XWmOicdEVwexcd3Jiakp2mYxAlxFBPYSQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.8519134775374376" data-s="300,640" style="width: 366px;height: 312px;" data-type="png" data-w="601" src="https://wechat2rss.xlab.app/img-proxy/?k=a9cb2541&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibiblZFFWXWroAkkfHWfByjG21SoBeLN1oUR2lIgsYwEl2trqiaFPSU7cyvnQGqQib1SHcWL2CMSx8fHA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">点击“确认登录”</span></p><p style="text-align: justify;"><span style="font-size: 14px;">OK</span></p><p style="text-align: justify;"><span style="font-size: 14px;">Web端浏览器页面跳转</span></p><p style="text-align: justify;"><span style="font-size: 14px;">使用受害者账户登录成功！</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.24873096446700507" data-s="300,640" style="" data-type="png" data-w="197" src="https://wechat2rss.xlab.app/img-proxy/?k=fb1837ca&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibiblZFFWXWroAkkfHWfByjG29ice1V8LNIogRWr26cPgjE3j3CX0ibP2vHqplNNTxRbVUicPVibndm0ldw%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">至此，完成复现。</span></p><p><strong><span style="font-size: 14px;">总结</span></strong></p><p><span style="font-size: 14px;">如果要真正用到社工钓鱼，可以自行搭建一个服务器</span></p><p><span style="font-size: 14px;">用于对接该网站的扫码登录入口</span></p><p><span style="font-size: 14px;">从而保证二维码更新，不失效。</span></p><p><span style="font-size: 14px;">这个，已经看过很多大师傅写过了</span></p><p><span style="font-size: 14px;">就不再重复。</span></p><p><span style="font-size: 14px;">希望有用，如果没有</span></p><p><span style="font-size: 14px;">我想下篇或许会有。</span></p>



<p><a href="2247484118">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=b604f67a&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247484118%26idx%3D1%26sn%3D2ca27dba82679e4519ace5899d788f72">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Mon, 01 Jun 2020 19:05:00 +0800</pubDate>
    </item>
    <item>
      <title>再次删除文章！！！</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247484082&amp;idx=1&amp;sn=ed6cffebc6484f8f889463d69275e4de</link>
      <description>文章第二次删了，原因在里面。</description>
      <content:encoded><![CDATA[<p>
<span>九号</span> <span>2020-05-24 16:36</span> <span style="display: inline-block;"></span>
</p>

<p>文章第二次删了，原因在里面。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=41db4192&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8xQ3376BFwqRC245n6TOIQgVX6E7SPsIlrogZVAicDqLa4iaBYq9DericazZajN8P2ZsibFDWC3Aj55Q%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><span style="font-size: 14px;">刚刚朋友传来消息</span></p><p><span style="font-size: 14px;">由于上篇文章被多次转发</span></p><p><span style="font-size: 14px;">他看到群里</span></p><p><span style="font-size: 14px;">有一些  “大佬”</span></p><p><span style="font-size: 14px;">看到对方tg账号</span></p><p><span style="font-size: 14px;">一个个都跑去联系对方了。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.1862244897959184" data-s="300,640" style="width: 247px;height: 293px;" data-type="png" data-w="392" src="https://wechat2rss.xlab.app/img-proxy/?k=3c28f30a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8xQ3376BFwqRC245n6TOIQAvAWzTWlVIuxbcYpfo8eEfc6AFF0byF5axwfEC2Tibba2UtKK4gRorQ%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">这是什么操作？</span></p><p><span style="font-size: 14px;">如果是有关单位</span></p><p><span style="font-size: 14px;">这件事早就在处理了</span></p><p><span style="font-size: 14px;">如果你是因为好玩</span></p><p><span style="font-size: 14px;">那我觉得你不适合这个圈子</span></p><p><span style="font-size: 14px;">今年疫情这么严峻</span></p><p><span style="font-size: 14px;">做不到白衣天使们的英勇无畏，比肩神明</span></p><p><span style="font-size: 14px;">但，我们至少有能力爱护国家，不拖后腿</span></p><p><span style="font-size: 14px;">如果只是普通人，就做好普通的事。</span></p><p><span style="font-size: 14px;">为了给大家分享思路</span></p><p><span style="font-size: 14px;">我是发了两遍，又删了两遍</span></p><p><span style="font-size: 14px;">属实抱歉。</span></p><p><span style="font-size: 14px;">原本开公众号的初心</span></p><p><span style="font-size: 14px;">是想保持和国外黑客圈子一样的open&amp;free的精神</span></p><p><span style="font-size: 14px;">这样能和大家一起互相学习，共同进步，</span></p><p><span style="font-size: 14px;">来守护网络安全。</span></p><p><span style="font-size: 14px;">现在看来</span></p><p><span style="font-size: 14px;">真正有价值的东西，永远只会聚焦于顶端</span></p><p><span style="font-size: 14px;">也只能掌握在少数人手里。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.58359375" data-s="300,640" style="width: 404px;height: 236px;" data-type="jpeg" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=94e88b3c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8xQ3376BFwqRC245n6TOIQcIZdvnoK0gJX5SnicrAbImfPMyooB3xGpplkkh1MDzKVmpBbdFl11Lw%2F640%3Fwx_fmt%3Djpeg"/></p>



<p><a href="2247484082">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=1abc9eeb&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247484082%26idx%3D1%26sn%3Ded6cffebc6484f8f889463d69275e4de">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Sun, 24 May 2020 16:36:00 +0800</pubDate>
    </item>
    <item>
      <title>对不起，文章删了</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247484075&amp;idx=1&amp;sn=67b462428819f29dc5977814e8713229</link>
      <description>一些内心独白</description>
      <content:encoded><![CDATA[<p>
<span>九号(N10th)</span> <span>2020-05-01 00:00</span> <span style="display: inline-block;"></span>
</p>

<p>一些内心独白</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=b4e7cdff&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9JKzvNUL64TRBUfapOaytar7U9Z7eXcBlLicgFHibbuIe4002H5Vp2NWtw%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><span style="font-size: 14px;">虽然整个任务，</span></p><p><span style="font-size: 14px;">几乎都是自己一个人在做，不牵扯其他人</span></p><p><span style="font-size: 14px;">但因为涉及company &amp; job保密</span></p><p><span style="font-size: 14px;">暂时没办法发</span></p><p><span style="font-size: 14px;">抱歉...</span></p><p><span style="font-size: 12px;">（内心os: 这么菜的文章也被要求bao mi）</span></p><p><span style="font-size: 14px;">不过，目的终究是服务于国家</span></p><p><span style="font-size: 14px;">只是暂时不能服务于各位师傅</span></p><p><span style="font-size: 14px;">哈哈~</span></p><p><span style="font-size: 14px;">以后会再发的</span></p><p><span style="font-size: 14px;">别取关我！！！</span></p><p><span style="font-size: 14px;">最后，跟黑白之道编辑道歉</span></p><p><span style="font-size: 14px;">未能如约赴稿</span></p><p><span style="font-size: 14px;">最讨厌欺骗</span></p><p><span style="font-size: 14px;">自己却成了不守信用之人</span></p><p><span style="font-size: 14px;">对不起</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1" data-s="300,640" style="width: 305px;height: 305px;" data-type="jpeg" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=f326276d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoibibBnicNJq3M8MekqyKGJ6M9Jyg0e8ygNRWGXq6KkTYwLyTTmL3iaTicZJ4dcl1SyBRcQqvsos5BdicibVg%2F640%3Fwx_fmt%3Djpeg"/></p><p style="text-align: justify;"><span style="font-size: 14px;">记住这张图，记住这个故事</span></p><p style="text-align: justify;"><span style="font-size: 14px;">我会再回来的</span></p><p style="text-align: justify;"><span style="font-size: 14px;">                                       ——九号</span></p>



<p><a href="2247484075">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=307f605a&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247484075%26idx%3D1%26sn%3D67b462428819f29dc5977814e8713229">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Fri, 01 May 2020 00:00:00 +0800</pubDate>
    </item>
    <item>
      <title>业务安全之黑产引流工具（续）</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483993&amp;idx=1&amp;sn=f1d31b4d7693c6de811eb39d56183301</link>
      <description>续上篇，业务安全层黑产引流硬件工具</description>
      <content:encoded><![CDATA[<p>
原创 <span>N10th</span> <span>2020-04-09 12:36</span> <span style="display: inline-block;"></span>
</p>

<p>续上篇，业务安全层黑产引流硬件工具</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=8aa3297a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKG7WOGgQy4ZHKFnqChjUzAEuaoUgtwzDw01ClSlg6NmBve7fhN0qsJzQ%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><span style="font-size: 14px;">如果你没有看到上一篇</span></p><p><span style="font-size: 14px;">可以先看</span>👉  <a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483950&amp;idx=1&amp;sn=415ab7fea7c7906990326ab5ae9124ae&amp;chksm=9767d9e0a01050f658d3a3cbf8c74e2cf96fadc585134167e37570b491400e087bf0316a1fc2&amp;scene=21#wechat_redirect" data-itemshowtype="0" tab="innerlink" data-linktype="2"><span style="font-size: 16px;">业务安全之黑产引流工具（上） </span></a></p><p><span style="font-size: 14px;">    前一文章中，我们对业务安全层灰黑产使用的语音引流工具，进行了一个场景复现的Demo测试。而在此前，购买这个硬件工具，受到了来自卖这款工具灰黑产的嘲讽，这篇文章，我们来扒一下他的皮。</span></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);" data-color="rgb(43,33,97)"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="display: flex;flex-direction: row;justify-content: center;width: 100%;"><div style="width: 30px;background: rgb(43, 33, 97);padding-top: 15px;padding-bottom: 15px;flex-shrink: 0;text-align: center;box-sizing: border-box;"><p style="font-size: 14px;color: rgb(255, 255, 255);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;"><span style="font-size: 15px;">目</span></p><p style="font-size: 14px;color: rgb(255, 255, 255);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;"><span style="font-size: 15px;">录</span></p></div><div style="width: 100%;border-color: rgb(43, 33, 97);border-style: solid;border-width: 1px;margin-left: 4px;padding: 18px;text-align: justify;display: flex;flex-direction: column;justify-content: space-between;box-sizing: border-box;"><p style="font-size: 13px;color: rgb(43, 33, 97);letter-spacing: 1.5px;min-width: 1px;"><span style="font-size: 15px;">一、故事篇</span></p><p style="font-size: 13px;color: rgb(43, 33, 97);letter-spacing: 1.5px;min-width: 1px;"><span style="font-size: 15px;">二、行动篇</span></p><p style="font-size: 13px;color: rgb(43, 33, 97);letter-spacing: 1.5px;min-width: 1px;"><span style="font-size: 15px;">三、危害篇</span></p><p style="font-size: 13px;color: rgb(43, 33, 97);letter-spacing: 1.5px;min-width: 1px;"><span style="font-size: 15px;">四、防护篇</span></p></div></div></div></div><p><strong>一、故事篇</strong></p><p><span style="font-size: 14px;">在情报库中发现这款工具后，添加了卖工具老板的QQ，打听了一下价格</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.1602787456445993" data-s="300,640" style="" data-type="png" data-w="287" src="https://wechat2rss.xlab.app/img-proxy/?k=54acabf5&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGxfR4V1P9ZYcG7AjILOszVnlrzycDLRkiasIyanicZzBEmkYme6axTTHw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.2608695652173913" data-s="300,640" style="" data-type="png" data-w="299" src="https://wechat2rss.xlab.app/img-proxy/?k=ab9e274b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKG3wQITLyAjGued5kn8I8ObRTseicvFjp9obNPoXibzq77e3OLV37x809Q%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.20846905537459284" data-s="300,640" style="" data-type="png" data-w="307" src="https://wechat2rss.xlab.app/img-proxy/?k=0973c758&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGwToKJAEUqnnmcu3tu9SoIetUjouibDvSzbvbiaxEYL2YbRDkt1ePhJrA%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">简单来说，两种方案价格：</span></p><p><span style="font-size: 14px;">①一款语音包软件（100RMB） + 一个硬件小工具（57RMB） == 157 RMB</span></p><p><span style="font-size: 14px;">②一个脚本配合语音包软件（150RMB）+ 一个硬件小工具（57RMB）== 207RMB</span></p><p><span style="font-size: 14px;">买了第一个方案。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6657303370786517" data-s="300,640" style="width: 185px;height: 123px;" data-type="png" data-w="1068" src="https://wechat2rss.xlab.app/img-proxy/?k=1292a328&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGibEhZSup1rG73fjicKKtSb4BhKCYeYlF8XWt1myznnpWDJz4zqcBh7VA%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">在等硬件工具快递过来中，想先看看对方的语音包软件。</span></p><p><span style="font-size: 14px;">但对方怎样都不肯先给我，当时以为是他们自己写的apk</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.9694189602446484" data-s="300,640" style="width: 291px;height: 282px;" data-type="png" data-w="327" src="https://wechat2rss.xlab.app/img-proxy/?k=5ceb9738&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGcibzgvpjMUWQ7MhKtyh4xYsic8TknQqlgV2zeNeFGBcOnpWfktEu7UyQ%2F640%3Fwx_fmt%3Dpng"/></p><p>两天后...</p><p><span style="font-size: 14px;">去取快递时，发现还是顺丰到付23元<img style="display:inline-block;width:20px;vertical-align:text-bottom;" data-ratio="1" data-w="20" src="https://wechat2rss.xlab.app/img-proxy/?k=4ec62094&amp;u=https%3A%2F%2Fres.wx.qq.com%2Fmpres%2Fhtmledition%2Fimages%2Ficon%2Fcommon%2Femotion_panel%2Femoji_wx%2FCold.png"/>忍不住口吐芬芳：“这老板买菜必涨价”。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.3333333333333333" data-s="300,640" style="width: 133px;height: 177px;" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=b038bfa1&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGULWYRy480IjKrBgTAS0lWF8ibzjPRH1mgl5jicILPwP6O9BWrJfI6XIQ%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">然后，我跟他说收到快递了。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6083743842364532" data-s="300,640" style="width: 265px;height: 161px;" data-type="png" data-w="406" src="https://wechat2rss.xlab.app/img-proxy/?k=dbfa277c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGRthTAgmmia0GFgQ7IMD2kVHKa4gpZW6zloTVp7ujZWOo1t7Up5YBgzQ%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">安全考虑，先把对方发过来的apk丢到模拟器</span></p><p style="text-align: center;"><img class="rich_pages" data-croporisrc="https://mmbiz.qpic.cn/mmbiz_png/211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGnQicTkw6M05vCszyokbmicsqhj19QXxA0WA01OQsiae0YpeJxVLNibxErw/640?wx_fmt=png" data-cropx1="0" data-cropx2="145" data-cropy1="0" data-cropy2="147" data-ratio="1.0138888888888888" data-s="300,640" style="width: 145px;height: 147px;" data-type="jpeg" data-w="144" src="https://wechat2rss.xlab.app/img-proxy/?k=cd56871d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGzIT6263zvWwGUac6XHpXzeY6Ksz271kecYdibye7kteciabSibYcibLEqw%2F640%3Fwx_fmt%3Djpeg"/></p><p><span style="font-size: 14px;">打开的一刻让我瞬间失望</span></p><p style="text-align: center;"><img class="rich_pages" data-croporisrc="https://mmbiz.qlogo.cn/mmbiz_png/211GsCcwoibibuaHTeG0TqbmgmWRQ17icKG1QJXYeNK168ZnYKviaOZaXZTwoFoczWfe88m36A46nsNFzSxP0Cn1eA/0?wx_fmt=png" data-cropx1="0" data-cropx2="841" data-cropy1="11.6401384083045" data-cropy2="803.1695501730105" data-ratio="0.9417360285374554" data-s="300,640" style="width: 235px;height: 221px;" data-type="jpeg" data-w="841" src="https://wechat2rss.xlab.app/img-proxy/?k=edf655e6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGBIiahs5TXtlgQuWbhIN3MfDPrjO7QwjURLYEib14F6MLMruSMfbgqypg%2F640%3Fwx_fmt%3Djpeg"/></p><p><span style="font-size: 14px;">不过是一款，游戏开黑的语音包而已。还是免费下载的软件<img style="display:inline-block;width:20px;vertical-align:text-bottom;" data-ratio="1" data-w="20" src="https://wechat2rss.xlab.app/img-proxy/?k=4ec62094&amp;u=https%3A%2F%2Fres.wx.qq.com%2Fmpres%2Fhtmledition%2Fimages%2Ficon%2Fcommon%2Femotion_panel%2Femoji_wx%2FCold.png"/></span></p><p><span style="font-size: 14px;">于是</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.27474402730375425" data-s="300,640" style="width: 390px;height: 107px;" data-type="png" data-w="586" src="https://wechat2rss.xlab.app/img-proxy/?k=93a3b09f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGOFXPxNlWBkms5GXFic6sXRRHZ3M2YmXV4RLgbsIYuVSAsCfEAQMMF1w%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">这次，彻底压不住邪火了，感觉多年未交的智商税被扣除了。</span></p><p><span style="font-size: 14px;">故事结束，正文开始</span></p><p><strong><span style="font-size: 14px;">————————————————————</span></strong></p><p><strong><span style="font-size: 17px;">二、行动篇</span></strong></p><p><span style="font-size: 14px;"><strong>目标：①复现硬件 ②搜集信息</strong></span></p><p><span style="font-size: 14px;">————————————————————</span></p><p><strong><span style="font-size: 14px;">1. 拆解</span></strong></p><p><span style="font-size: 14px;">首先我们要做的就是，拆开小工具。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.75" data-s="300,640" style="width: 293px;height: 220px;" data-type="png" data-w="1440" src="https://wechat2rss.xlab.app/img-proxy/?k=10709610&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKG8Rz0t5qs9qryFhdGVPxCewzUCklelhib2BPNGbIo540eVpSNyBAPDHw%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">拆开看，里面就一个很小的电路板，但中间电路部分被502胶水黏住的。</span></p><p><span style="font-size: 14px;">一时间无法完整还原电路。</span></p><p><strong><span style="font-size: 14px;">2. 寻找痕迹</span></strong></p><p><span style="font-size: 14px;">在对方QQ空间发现了，此人在给宣传工具时曾拍摄过的照片。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.4453125" data-s="300,640" style="width: 186px;height: 83px;" data-type="png" data-w="512" src="https://wechat2rss.xlab.app/img-proxy/?k=0be0b3c6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGHmB38gIyoTBXAzv18bvEkyWD04iaONv0zgE9SgQDFILDh7qaewdziceQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">放大</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.2875" data-s="300,640" style="" data-type="png" data-w="80" src="https://wechat2rss.xlab.app/img-proxy/?k=2f726778&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGvlibgrMhGdD5GRh4gnCsWCGicK1YXj0FTbiaprrP3A937K9LlA4icXnNew%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;"><span style="font-size: 14px;">虽然像素很模糊，但大概能看清，“阿杰电子”。</span></p><p style="text-align: left;"><span style="font-size: 14px;">最初的想法是，直接taobao等搜索该名字，但一无所获。</span></p><p style="text-align: left;"><strong><span style="font-size: 14px;">3. 分析</span></strong></p><p style="text-align: left;"><span style="font-size: 14px;">①电子元件，六个电阻R1-R6，配合两个电容C1-C2。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.3694581280788178" data-s="300,640" style="width: 55px;height: 75px;" data-type="png" data-w="203" src="https://wechat2rss.xlab.app/img-proxy/?k=284b5654&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGUz3kXWibRpZ5p16LE7dExvv5hp1MXPmxiclLqXAuJSOCiaIqkibskrHA9Q%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><span style="font-size: 12px;">（这么丑的图就不放大了）</span></p><p style="text-align: left;"><span style="font-size: 14px;">②接线分析</span></p><p style="text-align: left;"><span style="font-size: 14px;">一个耳机头 + 一个小电路板</span></p><p style="text-align: left;"><span style="font-size: 14px;">因为没有万用表可以用</span></p><p style="text-align: left;"><span style="font-size: 14px;">搞硬件的BigLee师傅远程带用电池+LED做了个简易万用表</span></p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="0.4835443037974684" data-s="300,640" style="width: 344px;height: 166px;" data-type="gif" data-w="790" src="https://wechat2rss.xlab.app/img-proxy/?k=111f3f91&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_gif%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGaNLhJCBgAXqANhicrhcPeiaI1e2XC652fLo6XtiaYZroTDcNPgSFQ8UDA%2F640%3Fwx_fmt%3Dgif"/></p><p style="text-align: left;"><span style="font-size: 14px;">目的在于测出耳机头的红蓝绿铜色，四根线的接法。</span></p><p style="text-align: left;"><span style="font-size: 14px;">然后，拿出初中物理知识，绘制了一个简易电路图</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.0025906735751295" data-s="300,640" style="width: 246px;height: 247px;" data-type="png" data-w="386" src="https://wechat2rss.xlab.app/img-proxy/?k=8dfc8854&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGJpNXt1ZttLOfEjrMiapPWd7pYkiaPLicz0bfXJNQ1zxtcuIt6JIYbZibSg%2F640%3Fwx_fmt%3Dpng"/></p><p><strong><span style="font-size: 14px;">④复现</span></strong></p><p><span style="font-size: 14px;">手里只有几个小电阻和一块板子，没有电容。</span></p><p><span style="font-size: 14px;">测试发现，其实多余的电阻电容可只是整流所用。</span></p><p><span style="font-size: 14px;">可以进一步简化</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.9398907103825136" data-s="300,640" style="" data-type="png" data-w="183" src="https://wechat2rss.xlab.app/img-proxy/?k=7245349c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ShcAtvPdlkVviaBo7UP86fmwEV6ichnfGaAp9LgsibqWs4j9xuWib9V1G8iacrNhNzAfkice7SbANIePQ%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">耳机线是有四根线的，其中两根是左右声道，去掉一根毫无影响。</span></p><p><span style="font-size: 14px;">最后，只用三个小电阻+剪一根坏掉的耳机头就实现了完整的功能。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.75" data-s="300,640" style="width: 305px;height: 229px;" data-type="png" data-w="1440" src="https://wechat2rss.xlab.app/img-proxy/?k=90c452ea&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGKTiaEp8ia8QaRNicAcnmLWZXSKfLZ8oFOU2tUgpQeqJIj7VFicXT3qsbnw%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">  </span></p><p><span style="font-size: 14px;">五块七不到的成本卖到了一百五十七，二百零七。</span></p><p><span style="font-size: 14px;">业务安全层的黑产技术真的很Low，但牟利真的大。</span></p><p><span style="font-size: 14px;">写到这里，依然记得卖工具老板的那句</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.2823834196891192" data-s="300,640" style="width: 290px;height: 82px;" data-type="png" data-w="386" src="https://wechat2rss.xlab.app/img-proxy/?k=07220d9d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibuaHTeG0TqbmgmWRQ17icKGKEXXpicnAevAmNqzBCgI1C978T7FYTAfCfFVSqPic3NMWHoJhjMiawSzA%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">或许，对他来说，这里已然是知识的天花板。</span></p><p><span style="font-size: 14px;">但，我们还得前行。</span></p><p><span style="font-size: 14px;">————————————————————</span></p><p><span style="font-size: 14px;"><strong><span style="font-size: 17px;">三、危害篇</span></strong></span></p><p><span style="font-size: 14px;"><strong>之所以想写这篇文章，是因为看见有黑产，在大学校园做博彩引流。</strong></span></p><p><span style="font-size: 14px;"><strong>————————————————————</strong></span></p><p><span style="font-size: 14px;">流程大概是：</span></p><p><span style="font-size: 14px;">①从校园自媒体(如表白墙)发布，找男朋友</span></p><p><span style="font-size: 14px;">②加联系方式QQ</span></p><p><span style="font-size: 14px;">③QQ回复你，“这个不常用，你可以叫我微信”</span></p><p><span style="font-size: 14px;">④加微信用语音引流工具，开始话术自动“养鱼”。</span></p><p><span style="font-size: 14px;">⑤数天后，微信朋友圈风格秒变，从女神变成菠菜营销</span></p><p><span style="font-size: 14px;">⑥总有人机智辨别，也总有人抵挡不住温柔的陷阱</span></p><p><span style="font-size: 14px;">你也许会觉得，灰黑产搞这么麻烦，直接装一个变身器就好。</span></p><p><span style="font-size: 14px;">但业务安全层灰黑产的核心要义是，批量。</span></p><p><span style="font-size: 14px;">薅羊毛，刷量刷赞，语音引流等都是遵循这个核心。</span></p><p><span style="font-size: 14px;"><strong>————————————————————</strong></span></p><p><span style="font-size: 14px;"><strong><span style="font-size: 17px;"><strong>四、防护篇</strong></span></strong></span></p><p><span style="font-size: 14px;">————————————————————</span></p><p><span style="font-size: 14px;">①对于个人，提高安全警惕就好。</span></p><p><span style="font-size: 14px;">②对于企业</span></p><p><span style="font-size: 14px;">从硬件角度，没办法做真人检测，</span></p><p><span style="font-size: 14px;">但由于这款硬件工具需要配合语音包软件使用。</span></p><p><span style="font-size: 14px;">所以我能给风控安全部门的建议是：</span></p><p><span style="font-size: 14px;">①app包检测</span></p><p><span style="font-size: 14px;">②SDK检测无障碍服务</span></p><p><span style="font-size: 14px;">③对于司法行政</span></p><p><span style="font-size: 14px;">如果有需要</span></p><p><span style="font-size: 14px;">可以提供相关情报信息</span></p><p><span style="font-size: 14px;">最后，感谢BigLee和Paladin2Wink两位师傅的帮助。</span></p><p><span style="font-size: 14px;">也感谢jianmicro业务情报来源<strong>。</strong></span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.667590027700831" data-s="300,640" style="width: 397px;height: 265px;" data-type="png" data-w="722" src="https://wechat2rss.xlab.app/img-proxy/?k=c6a8c145&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ShcAtvPdlkVviaBo7UP86fDJlaia3zR6ibRYphGZib113icFFXe96SBGyuyvla8xRq4CEQ3p32SIUtRw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><span style="font-size: 14px;"><strong>也许这些事，没多大意义。</strong></span></p><p style="text-align: center;"><span style="font-size: 14px;"><strong>我的想法很简单</strong></span></p><p style="text-align: center;"><span style="font-size: 14px;"><strong>无需像英雄一样被人致敬</strong></span></p><p style="text-align: center;"><span style="font-size: 14px;"><strong>那就如凡人一般爱护国家</strong></span></p><p style="text-align: center;"><span style="font-size: 14px;"><strong><strong>疫情期间，理应如此</strong></strong></span></p><p style="text-align: center;"><span style="font-size: 14px;"><strong><strong>疫情过后</strong>，更是如此</strong></span></p><p><span style="font-size: 12px;">如果这篇文章写的不好</span></p><p><span style="font-size: 12px;">请多担待，菜是原罪</span></p><p><span style="font-size: 12px;">下一篇，实战笔记之收获通用漏洞</span></p>



<p><a href="2247483993">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=0e86f21d&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247483993%26idx%3D1%26sn%3Df1d31b4d7693c6de811eb39d56183301">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Thu, 09 Apr 2020 12:36:00 +0800</pubDate>
    </item>
    <item>
      <title>业务安全之黑灰产引流工具</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483950&amp;idx=1&amp;sn=415ab7fea7c7906990326ab5ae9124ae</link>
      <description>业务安全之引流工具硬件篇（司法执政进，风控进）</description>
      <content:encoded><![CDATA[<p>
原创 <span>N10th</span> <span>2020-03-30 00:00</span> <span style="display: inline-block;"></span>
</p>

<p>业务安全之引流工具硬件篇（司法执政进，风控进）</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=4b4dd9d9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8FSDwwz4yr9od2JY3slD0DawQIvcTHOOJwbU3yY4OeSrlsWNQHuXzecbj8KTknVwxnDu9HpHWAgQ%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><strong>简单介绍</strong></p><p><span style="font-size: 14px;">业务安全层和传统安全圈的黑产不一样</span></p><p><span style="font-size: 14px;">传统安全圈的黑产可能是以技术为核心。</span></p><p><span style="font-size: 14px;">而薅羊毛，刷量刷单，恶意爬虫等业务安全层的灰黑产则更为普遍。</span></p><p><span style="font-size: 14px;">借用一张图，以往年pinduoduo被薅为典型代表，进行的圈层分类。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.33017190278601066" data-s="300,640" style="" data-type="png" data-w="1687" src="https://wechat2rss.xlab.app/img-proxy/?k=92a324e6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8FSDwwz4yr9od2JY3slD0DocbWpfl0Au6swtxvxbsEdeg45PPl3ISBo1TmU16bo6rJsDmaZ9jia1w%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">在风控领域，核心圈的黑产并不多见</span></p><p><span style="font-size: 14px;"><span style="font-size: 14px;">中低端的职业圈黑灰产，大部分没有深厚的技术</span></span></p><p><span style="font-size: 14px;">但却是利益链牵扯最多的一环</span><span style="font-size: 14px;">。</span></p><p><span style="font-size: 14px;">职业圈以“工作室” “设备农场”  “机群”等模式，批量绕过策略为核心驱动力</span></p><p><span style="font-size: 14px;">来进行低成本的投入，获得高回报的灰色利益。</span></p><p><strong>正片开始</strong></p><p><span style="font-size: 15px;">本节（硬件篇）  介绍一款   </span></p><p><span style="font-size: 15px;">业务安全层黑灰产</span></p><p><span style="font-size: 15px;">使用的语音引流工具</span></p><p></p><p><strong>写在最后</strong></p><p><span style="font-size: 14px;">大部分关注冷渗透的有两类大师傅们</span></p><p><span style="font-size: 14px;">①白帽子人员</span></p><p><span style="font-size: 14px;">②司法执政人员</span></p><p><span style="font-size: 14px;">所以方向也会偏向两类</span></p><p><span style="font-size: 14px;">①冷门的漏洞挖掘</span></p><p><span style="font-size: 14px;">②业务安全层的黑灰产场景复现和小众情报</span></p><p><span style="font-size: 14px;">以下内容</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5689189189189189" data-s="300,640" style="" data-type="png" data-w="1480" src="https://wechat2rss.xlab.app/img-proxy/?k=1d140a12&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8FSDwwz4yr9od2JY3slD0DNpV8EOWz3PulxJgz7O4s2ibyaicEiagKmk9wzLBWGTUb5YD6ITpS4UIug%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 14px;">无论是实战挖掘，还是场景复现</span></p><p style="text-align: justify;"><span style="font-size: 14px;">都几乎是靠自己一个人研究和探索</span></p><p style="text-align: justify;"><span style="font-size: 14px;">希望有用</span></p>



<p><a href="2247483950">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=09e9240d&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247483950%26idx%3D1%26sn%3D415ab7fea7c7906990326ab5ae9124ae">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Mon, 30 Mar 2020 00:00:00 +0800</pubDate>
    </item>
    <item>
      <title>实战笔记之csv/xlsx注入</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483941&amp;idx=1&amp;sn=867fc746f6944b017be8ed750550f7d5</link>
      <description>记录在一次秘密众测中get到的冷门漏洞思路。（只是中低危，老师傅请绕路）</description>
      <content:encoded><![CDATA[<p>
原创 <span>N10th</span> <span>2020-03-27 17:00</span> <span style="display: inline-block;"></span>
</p>

<p>记录在一次秘密众测中get到的冷门漏洞思路。（只是中低危，老师傅请绕路）</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=32a80417&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpKa3XS4L4GhxGWp6RibuHW8Wgw1T17GYVlY3bjyRwoz8S7QDRfQhaaOw%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);" data-color="rgb(43,33,97)"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="display: flex;flex-direction: row;justify-content: center;width: 100%;"><div style="width: 30px;background: rgb(43, 33, 97);padding-top: 15px;padding-bottom: 15px;flex-shrink: 0;text-align: center;box-sizing: border-box;"><p style="font-size: 14px;color: rgb(255, 255, 255);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;"><span style="font-size: 15px;">目</span></p><p style="font-size: 14px;color: rgb(255, 255, 255);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;"><span style="font-size: 15px;">录</span></p></div><div style="width: 100%;border-color: rgb(43, 33, 97);border-style: solid;border-width: 1px;margin-left: 4px;padding: 18px;text-align: justify;display: flex;flex-direction: column;justify-content: space-between;box-sizing: border-box;"><p style="font-size: 13px;color: rgb(43, 33, 97);letter-spacing: 1.5px;min-width: 1px;"><span style="font-size: 15px;">一、故事背景</span></p><p style="font-size: 13px;color: rgb(43, 33, 97);letter-spacing: 1.5px;min-width: 1px;"><span style="font-size: 15px;">二、实战案例</span></p></div></div></div></div><p><span style="color: rgb(32, 9, 74);visibility: visible;font-size: 17px;">一、故事背景</span></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="text-align: center;margin-top: 30px;margin-bottom: 10px;"><div style="margin-top:-15px;"><div style="border-width: 1px;border-left-style: solid;border-color: rgb(83, 0, 0);border-right-style: solid;padding-right: 10px;padding-left: 10px;background-color: rgb(254, 254, 254);display: inline-block;-webkit-text-stroke: 0.7px rgb(83, 0, 0);color: rgb(238, 154, 73);box-sizing: border-box;"><p style="letter-spacing: 4px;font-size: 20px;font-weight: bold;min-width: 1px;"><strong>回顾往期内容</strong></p></div></div></div></div><p><span style="font-size: 14px;"><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483898&amp;idx=1&amp;sn=fcc88b25789e731c89d19a6119260bab&amp;chksm=9767da34a010532229192f3134c24b6f884d54674c67e1d81e0cc965a013a42e1f2d849aec1b&amp;scene=21#wechat_redirect" data-itemshowtype="0" tab="innerlink" data-linktype="2">实战笔记之服务端逻辑重构漏洞</a></span></p><p><span style="font-size: 14px;"><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483824&amp;idx=1&amp;sn=a202ba76c1c8a88f7bb90fdb0dcd21e9&amp;chksm=9767da7ea010536873c4eba13b8f299aabd13a8eba7f88c47753145b7267acfee35fe55bb637&amp;scene=21#wechat_redirect" data-itemshowtype="0" tab="innerlink" data-linktype="2">滑动验证码攻防对抗</a></span></p><p><span style="font-size: 14px;"><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483824&amp;idx=2&amp;sn=8bab0d69a15ed91c6524334ad6738d5c&amp;chksm=9767da7ea01053683a438ae23b4304ad1556873cfeb45fbf0de20a180bec7b72c81ab1f22725&amp;scene=21#wechat_redirect" data-itemshowtype="0" tab="innerlink" data-linktype="2">实战笔记之X厂滑动验证码漏洞挖掘</a></span></p><p><span style="font-size: 14px;">好久不见。</span></p><p><span style="font-size: 14px;">记得写完上一篇文章《</span><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483898&amp;idx=1&amp;sn=fcc88b25789e731c89d19a6119260bab&amp;chksm=9767da34a010532229192f3134c24b6f884d54674c67e1d81e0cc965a013a42e1f2d849aec1b&amp;scene=21#wechat_redirect" data-itemshowtype="0" data-linktype="2" style="font-size: 14px;"><span style="font-size: 14px;">实战笔记之服务端逻辑重构漏洞</span></a><span style="font-size: 14px;">》后。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.3346938775510204" data-s="300,640" style="width: 378px;height: 127px;" data-type="png" data-w="735" src="https://wechat2rss.xlab.app/img-proxy/?k=5bbcbb4d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpBicXPMabpukOG9ZEXqO1ibTd4slznEK1DOOqAsepKPc5h7sDcVqCaO4Q%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 14px;">...</span></p><p><span style="font-size: 14px;">比3月29号提前了两天，不算如期而至。</span></p><p><span style="font-size: 14px;">期间参加了一次秘密众测，中间get到一个比较冷门的漏洞点，虽然危害不高，但想简单记录分享一下。老师傅绕路，下篇文章再见~</span></p><p><span style="color: rgb(32, 9, 74);visibility: visible;font-size: 17px;">二、实战案例</span></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div><div style="width: 100%;text-align: center;"><div style="display: inline-block;width: auto;"><div style="display: flex;display: -webkit-flex;align-items: center;-webkit-align-items: center;"><div style="padding-right: 6px;padding-left: 6px;box-sizing: border-box;"><div style="display: inline-block;padding-right: 6px;padding-left: 6px;background-color: rgb(222, 246, 250);line-height: 22px;box-sizing: border-box;"><p style="min-width: 1px;color: rgb(122, 122, 122);">1</p></div></div></div></div></div></div></div><p style="text-align: center;"><strong><span style="font-size: 15px;">复现场景</span></strong></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="width: 100%;border-radius: 5px;border-color: rgb(105, 105, 105);border-style: solid;border-width: 1px;padding: 6px;box-sizing: border-box;"><div style="width: 100%;border-radius: 5px;border-color: rgb(255, 185, 15);border-style: solid;border-width: 1px;padding: 20px;text-align: justify;box-sizing: border-box;"><p><span style="font-size: 15px;">①两重身份：普通用户&amp;管理员用户</span></p><p style="text-align: justify;">            </p><p style="text-align: justify;"><img class="rich_pages" data-ratio="0.9055690072639225" data-s="300,640" style="width: 107px;height: 97px;" data-type="png" data-w="413" src="https://wechat2rss.xlab.app/img-proxy/?k=fdccd851&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lp0jsrfibLBCibxa4z8yAy5eeyIncBU92LosSULSoclU1w6mpCK3jm0glw%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 15px;">②漏洞切入点：后台具有数据<strong>导出</strong>的接口</span></p><p style="text-align: justify;"> <img class="rich_pages" data-ratio="0.6555555555555556" data-s="300,640" style="width: 96px;height: 63px;" data-type="png" data-w="90" src="https://wechat2rss.xlab.app/img-proxy/?k=9adca528&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lp4uPOMuAjQw3pzPcic1RKWgWOsG7bMJUE2fqBsdKWnzSJWL3QrWO9lsg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">③挖掘思路：实际测试中，要是看到有<strong>导出</strong>按钮的地方，有两个思路。</span></p><p style="text-align: justify;"><strong><span style="font-size: 15px;">                    a. 常规思路，越权。</span></strong></p><p style="text-align: justify;"><strong><span style="font-size: 15px;">                    b. 冷门思路，csv/xlsx注入</span></strong></p></div></div></div></div><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div><div style="width: 100%;text-align: center;"><div style="display: inline-block;width: auto;"><div style="display: flex;display: -webkit-flex;align-items: center;-webkit-align-items: center;"><div style="padding-right: 6px;padding-left: 6px;box-sizing: border-box;"><div style="display: inline-block;padding-right: 6px;padding-left: 6px;background-color: rgb(222, 246, 250);line-height: 22px;box-sizing: border-box;"><p style="min-width: 1px;color: rgb(122, 122, 122);">2</p></div></div></div></div></div></div></div><p style="text-align: center;"><strong><span style="font-size: 15px;">复现步骤</span></strong></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-top: 10px;margin-bottom: 10px;margin-left: 8px;"><div><div style="display: flex;justify-content: center;align-items: center;"><div style="width:10%;"><div style="background-color: rgb(100, 149, 237);border-radius: 50%;display: inline-block;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;background-color: rgba(243, 244, 245, 0.173);border-radius: 50%;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;border-style: dashed;border-width: 1px;border-color: rgb(0, 0, 0);border-radius: 50%;padding-right: 5px;padding-left: 5px;box-sizing: border-box;"><p style="min-width: 1px;">01</p></div></div></div></div><div style="width:90%;"><div><p style="letter-spacing: 2px;color: rgb(34, 40, 49);min-width: 1px;">发现脆弱点</p></div></div></div><div style="margin-left: 12px;border-width: 1px;border-left-style: solid;border-color: rgb(0, 0, 0);padding: 10px;box-sizing: border-box;"><p style="letter-spacing: 2px;color: rgb(34, 40, 49);min-width: 1px;font-size: 14px;">登录管理员身份——后台有<strong>导出</strong>接口——测试csv/xlsx注入</p></div></div><div><div style="display: flex;justify-content: center;align-items: center;"><div style="width:10%;"><div style="background-color: rgb(100, 149, 237);border-radius: 50%;display: inline-block;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;background-color: rgba(243, 244, 245, 0.173);border-radius: 50%;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;border-style: dashed;border-width: 1px;border-color: rgb(0, 0, 0);border-radius: 50%;padding-right: 5px;padding-left: 5px;box-sizing: border-box;"><p style="min-width: 1px;">02</p></div></div></div></div><div style="width:90%;"><div><p style="letter-spacing: 2px;color: rgb(34, 40, 49);min-width: 1px;">登录普通用户身份——前端发布内容</p></div></div></div><div style="margin-left: 12px;border-width: 1px;border-left-style: solid;border-color: rgb(0, 0, 0);padding: 10px;box-sizing: border-box;"><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7612456747404844" data-s="300,640" style="width: 288px;height: 219px;" data-type="png" data-w="289" src="https://wechat2rss.xlab.app/img-proxy/?k=5e57fa57&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpJWSWYtxgibClej8zeEcRZr3cEblxQWicwicFBzVKyVaCMybvbtia8libd8A%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">内容填写恶意payload：  </span><span style="color: rgb(0, 0, 0);"><strong><span style="color: rgb(0, 0, 0);font-family: 等线;font-size: 15px;">=2+5+cmd|&#39; /C calc&#39;!A0</span></strong></span></p><p style="text-align: justify;"><span style="font-family: 等线;color: rgb(0, 0, 0);font-size: 14px;">（ps:这个是弹计算器，图片中写的是cmd执行ipconfig命令）</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.34146341463414637" data-s="300,640" style="width: 309px;height: 106px;" data-type="png" data-w="369" src="https://wechat2rss.xlab.app/img-proxy/?k=8b4880c9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpcial1Tqcic02GJdWTuI6wH8VwPelJj4JHLjrlvvVibjCoI50LvI3sjPjw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">点击发布。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.2777777777777778" data-s="300,640" style="" data-type="png" data-w="252" src="https://wechat2rss.xlab.app/img-proxy/?k=6d331bfe&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpvHVC5UNFDXtZytO5butGy1ek8fgT4Y2LCKq9f1ofxVTcOPqEKssWVw%2F640%3Fwx_fmt%3Dpng"/></p></div></div><div><div style="display: flex;justify-content: center;align-items: center;"><div style="width:10%;"><div style="background-color: rgb(100, 149, 237);border-radius: 50%;display: inline-block;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;background-color: rgba(243, 244, 245, 0.173);border-radius: 50%;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;border-style: dashed;border-width: 1px;border-color: rgb(0, 0, 0);border-radius: 50%;padding-right: 5px;padding-left: 5px;box-sizing: border-box;"><p style="min-width: 1px;">03</p></div></div></div></div><div style="width:90%;"><div><p style="letter-spacing: 2px;color: rgb(34, 40, 49);min-width: 1px;">登录管理员身份——进入后台——导出发布的内容数据</p></div></div></div><div style="margin-left: 12px;border-width: 1px;border-left-style: solid;border-color: rgb(0, 0, 0);padding: 10px;box-sizing: border-box;"><p style="letter-spacing: 2px;color: rgb(34, 40, 49);min-width: 1px;font-size: 14px;">①点击<strong>导出</strong>，这里导出的是xlsx格式</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5458248472505092" data-s="300,640" style="" data-type="png" data-w="982" src="https://wechat2rss.xlab.app/img-proxy/?k=4a49a307&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpepCjcEe3ic4Xo18ibbu2UaXrSd8GDEILJibr9MbbzQmDJia0PvdHKtcWYg%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 15px;">②下载完成，点击启用编辑</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.28601108033240996" data-s="300,640" style="" data-type="png" data-w="1444" src="https://wechat2rss.xlab.app/img-proxy/?k=b145b9e9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lp7VeiceVPhq8icrBfj674nndiaoSYNpTDzMBypxm1hugwwO6yHUTqvk96g%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 15px;">③点击一下此单元格，再点击任意其它地方</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5258620689655172" data-s="300,640" style="" data-type="png" data-w="348" src="https://wechat2rss.xlab.app/img-proxy/?k=142d9dfa&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lp4AXOib6vDRjQMeDgEE80qgcLHfzw2nfpTSuGYXTRibicDxCjkyFzpazLQ%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 15px;">④弹出对话框，点击“是”</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.12722298221614228" data-s="300,640" style="" data-type="png" data-w="1462" src="https://wechat2rss.xlab.app/img-proxy/?k=29404051&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpy9nw3QC2gYchiciccMGvMHp3PJ3MlfVcls9FxmZewEia6ap7ibhAgL6Rkg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">⑤触发payload, 后台会悄悄运行cmd并执行ipconfig命令</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7775700934579439" data-s="300,640" style="" data-type="png" data-w="1605" src="https://wechat2rss.xlab.app/img-proxy/?k=eeae20dc&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpXxXI5vPCB3rqOQlAb36WGbLGX0WasQibHaafHEUbLWQEOKQY8CdeOGg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">⑥如果用<span style="color: rgb(0, 0, 0);font-family: 等线;">  =cmd|&#39; /C calc&#39;!A0  这个Payload，则弹出计算器</span></span></p><p style="text-align: justify;"><strong><span style="font-size: 15px;color: rgb(0, 0, 0);font-family: 等线;">win7</span></strong></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7642458100558659" data-s="300,640" style="" data-type="png" data-w="895" src="https://wechat2rss.xlab.app/img-proxy/?k=0ac66660&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lplxX1sBnsbZXg8ScwT5oIbpxm1H7ewC38IP7FOKPdTLc61Ef5o6MmCA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;"><strong>win10</strong></span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6344086021505376" data-s="300,640" style="" data-type="png" data-w="1767" src="https://wechat2rss.xlab.app/img-proxy/?k=288383ab&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpcczMfsoh605s0CT89pSLg9OoicMRtbgoicV886OZR9KNpQBz5XgewNgw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><strong><span style="font-size: 15px;">漏洞危害</span></strong></p><p style="text-align: justify;"><img class="rich_pages" data-ratio="0.07802547770700637" data-s="300,640" style="" data-type="png" data-w="1256" src="https://wechat2rss.xlab.app/img-proxy/?k=f875b83a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpfXyicfBjicasefVwA9MKLfJ7gOicwNmJLzfMA5PVY7vXQTkoDS6icIv6hQ%2F640%3Fwx_fmt%3Dpng"/><span style="font-size: 12px;">（上面这句话，是在漏洞报告里吹的五香麻辣牛肉屁，不要当真。）</span></p><p style="text-align: justify;"><span style="font-size: 15px;">⑦真正涉及漏洞利用，需要很多次管理员点击交互。所以危害程度也就不够高了。</span></p><p style="text-align: justify;"><span style="font-size: 15px;">顺便提一下如果是csv格式的文档，则需要交互的地方就比xls/xlsx格式少两步。</span></p><p style="text-align: justify;"><span style="font-size: 15px;">可以本地测试一下：</span></p><p style="text-align: justify;"><span style="font-size: 15px;">a. 新建1.csv</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.0630372492836677" data-s="300,640" style="width: 168px;height: 179px;" data-type="png" data-w="349" src="https://wechat2rss.xlab.app/img-proxy/?k=f4d5d235&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpdGv1NwleYtsAyArV0ueEpbTN489XDtDmyTkSnAb9FqHFYcq3NskLag%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">b. 写入语句</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.2490974729241877" data-s="300,640" style="" data-type="png" data-w="277" src="https://wechat2rss.xlab.app/img-proxy/?k=d3bbaff1&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lp0wZKkxUw0QnwJg0vPy9wxTXAeCRoBNm9uDpeiaMicibL6KHTjdJmI6NoQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">c. 保存后，重新打开</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5222772277227723" data-s="300,640" style="width: 381px;height: 199px;" data-type="png" data-w="808" src="https://wechat2rss.xlab.app/img-proxy/?k=c1eaea81&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpIIbOXibgXoEMEkJk9f0Mic1EibOueptoaLAaMhRRIALvib2RFV5aPBc7Iw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 15px;">d. 点击是，即可触发payload</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.1797804208600183" data-s="300,640" style="" data-type="png" data-w="2186" src="https://wechat2rss.xlab.app/img-proxy/?k=326a9595&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpMVc5B7QeFvqMGcmUI79cfqgcYFMHxvSe0TC9IOHXE0L5WbHAJhVgcg%2F640%3Fwx_fmt%3Dpng"/></p></div></div></div></div><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="width: 100%;border-radius: 5px;border-color: rgb(105, 105, 105);border-style: solid;border-width: 1px;padding: 6px;box-sizing: border-box;"><div style="width: 100%;border-radius: 5px;border-color: rgb(255, 185, 15);border-style: solid;border-width: 1px;padding: 20px;text-align: justify;box-sizing: border-box;"><p><span style="font-size: 15px;">复现过程中，有两个需要注意的点：</span></p><p style="border-color: currentcolor;border-style: none;border-width: medium;padding: 0px 0px 1px;"><span style="font-size: 15px;">(1) 由于是xls/xlsx格式的文档，第一次下载打开时，会比csv格式的文档多两步交互才能触发payload.</span></p><p style="border-color: currentcolor;border-style: none;border-width: medium;padding: 0px 0px 1px;"><span style="font-size: 15px;">(2）如果使用的是win7/win8或其它低版本机器，即可直接打开。</span></p><p style="text-align: justify;"><span style="font-size: 15px;">若使用的是win10复现此漏洞，需要进行以下操作才能执行payload。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.20607028753993611" data-s="300,640" style="width: 517px;height: 107px;" data-type="png" data-w="1252" src="https://wechat2rss.xlab.app/img-proxy/?k=3f524b8b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpNAnlZgCEOy16GhW2ia80OeEtwp7qpicibPffjgyia460CNibGmbpicib1HBKA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.467860048820179" data-s="300,640" style="" data-type="png" data-w="1229" src="https://wechat2rss.xlab.app/img-proxy/?k=7be6cdc0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpcYgT5yUrTIoicSQE77SqNJZPic3UBiczia2Bxr3KbicApWtEOerjUNLBNrA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.8017241379310345" data-s="300,640" style="" data-type="png" data-w="1276" src="https://wechat2rss.xlab.app/img-proxy/?k=7ae82b2e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8hlol8Ur9UpUkr2cc1p1lpn5yd17Jia9I2Pb8ibWdCz7MibxvJrFicstbEmiasXbZBtd1C2ChHj7GBCGA%2F640%3Fwx_fmt%3Dpng"/></p></div></div></div></div><p><span style="font-size: 15px;">还有一些升级的payload玩法，因为都是前车之鉴，所以网上都能找到的，不再累赘。</span></p><p><span style="font-size: 15px;">欢迎各位师傅，在后台留言批评指点</span>。</p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-top: 20px;margin-bottom: 10px;"><div style="margin-top:-22px;text-align: center;font-style: italic;"><p style="font-size: 20px;min-width: 1px;font-weight: bold;"><em><strong>END</strong></em></p></div></div></div><p style="text-align: justify;"><span style="font-size: 15px;">下一篇。记录一下对业务安全层的黑灰产硬件工具研究。</span></p>



<p><a href="2247483941">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=c1795d50&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247483941%26idx%3D1%26sn%3D867fc746f6944b017be8ed750550f7d5">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Fri, 27 Mar 2020 17:00:00 +0800</pubDate>
    </item>
    <item>
      <title>境外匿名者组织—入侵预警提示</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483908&amp;idx=1&amp;sn=40a183beb4848fa378092e501f2d0782</link>
      <description>以JohnDoe为核心的，所谓的匿名者成员，已经开始对国内的信息化系统和网站服务器攻击。</description>
      <content:encoded><![CDATA[<p>
原创 <span>九号(N10th)</span> <span>2020-02-13 21:51</span> <span style="display: inline-block;"></span>
</p>

<p>以JohnDoe为核心的，所谓的匿名者成员，已经开始对国内的信息化系统和网站服务器攻击。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=b6736ee3&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8MF4da1a3qLlwFAJWxYvTs5SmHL7kvQ46sJ2fciaib9hUZURS8ZEfgcVQu0YYQahT4ciaiaSKaHIP4Fw%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p>起因：</p><p>咋们国家是一个爱好和平，严厉打击犯罪势力的国家。</p><p>但境外藏独份子，诋毁国家名誉，以人脸识别技术和生物特征扫描技术侵犯所谓的西藏人民“自由”为理由，开展了对中国国内，科大讯飞、中集集团、网智天元、浩瀚深度 厂商、中国电信集团和政府网站为主要目标的攻击。</p><p>过程：</p><p>以JohnDoe为核心的，所谓的匿名者成员，已经开始对国内的信息化系统和网站服务器攻击。    </p><p>2020年2月11日，公开扬言对地图中几处标记国内地点的服务器进行攻击。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.9563365282215123" data-s="300,640" style="width: 421px;height: 403px;" data-type="png" data-w="939" src="https://wechat2rss.xlab.app/img-proxy/?k=29e68ff0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8MF4da1a3qLlwFAJWxYvTstvQUFasTKbzBUiaTibtmv6xrv6kSOFbQwTEznZyUjIxhOOYwMU37NuIg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;">2020年2月12日，对外声称已经入侵了中国电信集团网站</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6481900452488688" data-s="300,640" style="" data-type="png" data-w="884" src="https://wechat2rss.xlab.app/img-proxy/?k=9c8a8f19&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8MF4da1a3qLlwFAJWxYvTsyoqPV13qundwnwrdHZRf6b27eodLWrb9qBrichvWOiaTa1YJl5NH4nQQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;">2020年2月12日傍晚，JohnDoe公布了中国国内的一些系统漏洞。</p><p style="text-align: justify;">漏洞是以Hadhoop数据库统的未授权访问导致的数据泄露问题为主。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5375153751537516" data-s="300,640" style="" data-type="png" data-w="813" src="https://wechat2rss.xlab.app/img-proxy/?k=cfc6b806&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8MF4da1a3qLlwFAJWxYvTsLkxTULWwFuLItYibMdibnPx5EoicUuRtMXoDnxv0zxy741QDJKDFfqGPw%2F640%3Fwx_fmt%3Dpng"/></p><p>并在Tibettruth网站上，公开了一张工具截图。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7346570397111913" data-s="300,640" style="" data-type="png" data-w="554" src="https://wechat2rss.xlab.app/img-proxy/?k=070b5f07&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8MF4da1a3qLlwFAJWxYvTs7dEf09U6Qd1FDPmnAVFJcZiahmjLWRXd0JPy9NEOeefMRfjWsMczh7A%2F640%3Fwx_fmt%3Dpng"/></p><p>北京时间，2020年2月13日晚。</p><p>北美的天已经开始亮了，国外猖狂的藏独份子把今天当作一个主要攻击时间。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="2.1666666666666665" data-s="300,640" style="width: 165px;height: 358px;" data-type="png" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=611214df&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8MF4da1a3qLlwFAJWxYvTs0KgWLib0sA1TaKNOwwDZvrSLQA4jarrPhQmSuiaYNUOfeZwPEuMcW3eQ%2F640%3Fwx_fmt%3Dpng"/></p><p>国家内忧，不能让这些小老鼠成为外患。</p><p>疫情当前，能力有限。</p><p>谨以此文，做个不知道有用没有的提示。</p><p>望，国泰民安。    </p>



<p><a href="2247483908">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=a12d36cb&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247483908%26idx%3D1%26sn%3D40a183beb4848fa378092e501f2d0782">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Thu, 13 Feb 2020 21:51:00 +0800</pubDate>
    </item>
    <item>
      <title>实战笔记之服务端逻辑重构漏洞</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483898&amp;idx=1&amp;sn=fcc88b25789e731c89d19a6119260bab</link>
      <description>发送恶意数据包，导致服务端逻辑重构，造成Cookie中毒、图片验证码“变形虫”、手机号“劫持”，钓鱼短信。</description>
      <content:encoded><![CDATA[<p>
原创 <span>九号(N10th)</span> <span>2020-02-06 22:25</span> <span style="display: inline-block;"></span>
</p>

<p>发送恶意数据包，导致服务端逻辑重构，造成Cookie中毒、图片验证码“变形虫”、手机号“劫持”，钓鱼短信。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=b7430794&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOTpRialKTjf71cQI0155oDSXOnOSuxkgibnpRQ3ich4g9LgJYJzmL26nmg%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p style="text-align: justify;"><span style="font-size: 14px;">篇幅较长，建议先收藏。</span></p><p style="text-align: justify;"><span style="font-size: 14px;">阅读时间：10min</span></p><p style="text-align: center;"><img data-ratio="0.2222222222222222" style="vertical-align: top;box-sizing: border-box;width: 96%;" data-type="gif" data-w="900" src="https://wechat2rss.xlab.app/img-proxy/?k=c70fcec4&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_gif%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOqqicbArTppIMVSb7ia1xiaEHIukm2AVkliaswnxibSIUZr19SBoO052eaNg%2F640%3Fwx_fmt%3Dgif"/></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="display: flex;flex-direction: row;justify-content: center;width: 100%;"><div style="width: 30px;background: rgb(32, 9, 74);padding-top: 15px;padding-bottom: 15px;flex-shrink: 0;text-align: center;box-sizing: border-box;"><p style="font-size: 14px;color: rgb(255, 255, 255);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">目</p><p style="font-size: 14px;color: rgb(255, 255, 255);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">录</p></div><div style="width: 100%;border-width: 1px;border-style: solid;border-color: rgb(32, 9, 74);margin-left: 4px;padding: 18px;display: flex;flex-direction: column;justify-content: space-between;box-sizing: border-box;"><p style="font-size: 13px;color: rgb(53, 20, 113);letter-spacing: 1.5px;min-width: 1px;">一、故事背景</p><p style="font-size: 13px;color: rgb(53, 20, 113);letter-spacing: 1.5px;min-width: 1px;">二、实战案例</p><p style="font-size: 13px;color: rgb(53, 20, 113);letter-spacing: 1.5px;min-width: 1px;">    1. Set-Cookie<span style="color: rgb(53, 20, 113);font-size: 13px;letter-spacing: 1.5px;">重构</span></p><p style="font-size: 13px;color: rgb(53, 20, 113);letter-spacing: 1.5px;min-width: 1px;"><span style="color: rgb(53, 20, 113);font-size: 13px;letter-spacing: 1.5px;">    危害&gt;&gt;&gt; Cookie中毒-服务器错误</span></p><p style="font-size: 13px;color: rgb(53, 20, 113);letter-spacing: 1.5px;min-width: 1px;"><span style="color: rgb(53, 20, 113);font-size: 13px;letter-spacing: 1.5px;">    2. Captcha重构</span></p><p style="font-size: 13px;color: rgb(53, 20, 113);letter-spacing: 1.5px;min-width: 1px;"><span style="color: rgb(53, 20, 113);font-size: 13px;letter-spacing: 1.5px;">    危害&gt;&gt;&gt; 验证码图片&#34;变形虫&#34;</span></p><p style="font-size: 13px;color: rgb(53, 20, 113);letter-spacing: 1.5px;min-width: 1px;"><span style="color: rgb(53, 20, 113);font-size: 13px;letter-spacing: 1.5px;">    3. Phone&amp;SMS_code重构</span></p><p style="font-size: 13px;color: rgb(53, 20, 113);letter-spacing: 1.5px;min-width: 1px;"><span style="color: rgb(53, 20, 113);font-size: 13px;letter-spacing: 1.5px;">    危害&gt;&gt;&gt; 手机号劫持&amp;短信钓鱼</span></p><p style="font-size: 13px;color: rgb(53, 20, 113);letter-spacing: 1.5px;min-width: 1px;">三、总结</p></div></div></div></div><p style="text-align: justify;"><span style="color: rgb(32, 9, 74);">一、故事背景</span></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="width: 100%;border-radius: 5px;border-width: 1px;border-style: solid;padding: 6px;box-sizing: border-box;"><div style="width: 100%;border-radius: 5px;border-width: 1px;border-style: solid;padding: 20px;box-sizing: border-box;"><p style="font-size: 13px;letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">其实“重构”的名字是我自己取的，<span style="font-size: 13px;letter-spacing: 1.5px;">因为</span><span style="font-size: 13px;letter-spacing: 1.5px;">这些方法是在实战中探索到的。<span style="font-size: 13px;letter-spacing: 1.5px;">总的来说，都属于服务端</span><span style="font-size: 13px;letter-spacing: 1.5px;">逻辑设计缺陷，名字不重要。</span></span></p><p style="font-size: 13px;letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">实战案例的基础思路来源分别是</p><ul class="list-paddingleft-2" style="list-style-type: disc;"><li><p style="font-size: 13px;letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">《黑客攻防技术宝典—web实战篇》中的CRLF注入剖析</p></li><li><p style="font-size: 13px;letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;"><span style="font-size: 13px;letter-spacing: 1.5px;">key</span><span style="font-size: 13px;letter-spacing: 1.5px;">的Fuzz captcha DOS</span><span style="font-size: 13px;letter-spacing: 1.5px;">分享</span></p></li><li><p style="font-size: 13px;letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">&#34;乌云&#34;逻辑漏洞历史文章</p></li></ul><p style="font-size: 13px;letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">在这些基础思路上，我创新了几种攻击思路手法。危害程度肯定是不如RCE惊天地，不如CVE泣鬼神。但谁让我这么菜呢？由于实验室的师傅们很厉害了！0day我挖不到。面对同一测试目标时，RCE会的不如他们多。信息收集又不够他们全面。身为被实验室收留的小混子选手，毫无存在感的我能做什么？苦思冥想后，就试试边缘化的东西吧。故而转向一些比较冷门的渗透技巧，希望有些作用。</p></div></div></div></div><p style="text-align: justify;"><span style="color: rgb(32, 9, 74);">二、实战案例</span></p><p style="text-align: justify;"><span style="color: rgb(32, 9, 74);"><em><span style="font-size: 24px;"><strong>0x01 </strong></span></em></span><span style="color: rgb(32, 9, 74);"><strong><span style="font-size: 24px;">Set-Cookie</span></strong></span><span style="color: rgb(32, 9, 74);"><strong><span style="color: rgb(32, 9, 74);font-size: 24px;"> 重构</span></strong></span></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div><div style="width: 100%;display: flex;justify-content: center;"><div style="margin-top: 10px;margin-right: auto;margin-left: auto;padding-top: 10px;padding-bottom: 10px;width: 100%;display: flex;box-sizing: border-box;"><p style="width: 40px;margin-top: -10px;justify-content: center;"><img data-ratio="1" style="width: 100%;vertical-align:top;" data-type="png" data-w="35" src="https://wechat2rss.xlab.app/img-proxy/?k=43d76b2c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOn5WPC4NgjM8EgsOoeNwJjjM1W9htb4ZT0ic8vHJAJlNKMW81Wfl7icBQ%2F640%3Fwx_fmt%3Dpng"/></p></div></div></div></div><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div style="margin-top: 10px;margin-bottom: 10px;margin-left: 8px;"><div><div style="display: flex;justify-content: center;align-items: center;"><div style="width:10%;"><div style="background-color: rgb(37, 28, 84);border-radius: 50%;display: inline-block;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;background-color: rgba(37, 28, 84, 0.173);border-radius: 50%;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;border-style: dashed;border-width: 1px;border-color: rgb(37, 28, 84);border-radius: 50%;padding-right: 5px;padding-left: 5px;box-sizing: border-box;"><p style="min-width: 1px;"><span style="color: rgb(255, 255, 255);">01</span></p></div></div></div></div><div style="width:90%;"><div><p style="letter-spacing: 2px;color: rgb(37, 28, 84);min-width: 1px;">第一步，漏洞场景</p></div></div></div><div style="margin-left: 12px;border-width: 1px;border-left-style: solid;border-color: rgb(37, 28, 84);padding: 10px;box-sizing: border-box;"><p style="letter-spacing: 2px;color: rgb(37, 28, 84);min-width: 1px;font-size: 14px;">漏洞利用的场景发生在不太被师傅们所关心的网站中英文切换处。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.11271783463107156" data-s="300,640" style="" data-type="png" data-w="2697" src="https://wechat2rss.xlab.app/img-proxy/?k=75dd5375&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAwsS5VNXTe7HChWuicT5Tkjb8zINGrPqAIxOgL97c8s3ucUEyK3Gz0Fw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="font-size: 12px;">（出于安全保护，我不能截全图，请不要破坏）</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.3889845094664372" data-s="300,640" style="" data-type="png" data-w="581" src="https://wechat2rss.xlab.app/img-proxy/?k=214a7708&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLO6YGLqGuFbl3GvMTw70t8r04z4icZicLW7xYqaW5uDe2SqGWChw5GC4SA%2F640%3Fwx_fmt%3Dpng"/></p></div></div><div><div style="display: flex;justify-content: center;align-items: center;"><div style="width:10%;"><div style="background-color: rgb(37, 28, 84);border-radius: 50%;display: inline-block;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;background-color: rgba(37, 28, 84, 0.173);border-radius: 50%;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;border-style: dashed;border-width: 1px;border-color: rgb(37, 28, 84);border-radius: 50%;padding-right: 5px;padding-left: 5px;box-sizing: border-box;"><p style="min-width: 1px;"><span style="color: rgb(255, 255, 255);">02</span></p></div></div></div></div><div style="width:90%;"><div><p style="letter-spacing: 2px;color: rgb(37, 28, 84);min-width: 1px;">第二步，构造恶意请求数据包</p></div></div></div><div style="margin-left: 12px;border-width: 1px;border-left-style: solid;border-color: rgb(37, 28, 84);padding: 10px;box-sizing: border-box;"><p style="letter-spacing: 2px;color: rgb(37, 28, 84);min-width: 1px;font-size: 14px;">1. 先看一下正常“切换English”操作时的请求和响应数据包</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.41398058252427183" data-s="300,640" style="" data-type="png" data-w="2575" src="https://wechat2rss.xlab.app/img-proxy/?k=7fc27b22&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOGdu9mQIKkep8oXicjBau49swT5tqYDYFUo82RYXQYzSCs8RJuPEr6xg%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(37, 28, 84);min-width: 1px;font-size: 14px;">其实打码完特征很明显，language参数出现在三个位置。</p><p style="letter-spacing: 2px;color: rgb(37, 28, 84);min-width: 1px;font-size: 14px;">2. 下面啰嗦分析下</p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="width: 100%;border-radius: 5px;border-width: 1px;border-style: solid;border-color: rgb(37, 28, 84);padding: 6px;box-sizing: border-box;"><div style="width: 100%;border-radius: 5px;border-width: 1px;border-style: solid;border-color: rgb(37, 28, 84);padding: 20px;box-sizing: border-box;"><p style="font-size: 13px;color: rgb(37, 28, 84);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">分析：</p><p style="font-size: 13px;color: rgb(37, 28, 84);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">&lt;&lt;左边Request</p><p style="font-size: 13px;color: rgb(37, 28, 84);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">①Cookie中的&#34;H-language=zh-cn&#34;,表示页面使用的是“中文”语言。</p><p style="font-size: 13px;color: rgb(37, 28, 84);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">②POST主体中的&#34;<span style="color: rgb(37, 28, 84);font-size: 13px;letter-spacing: 1.5px;">language=en-us</span>&#34;，告诉服务器，我要切换成的语言类型。</p><p style="font-size: 13px;color: rgb(37, 28, 84);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">&gt;&gt;右边Response</p><p style="font-size: 13px;color: rgb(37, 28, 84);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">③Set-Cookie中的&#34;<span style="color: rgb(37, 28, 84);font-size: 13px;letter-spacing: 1.5px;">H-</span><span style="color: rgb(37, 28, 84);font-size: 13px;letter-spacing: 1.5px;">language</span>=en-us&#34;，服务器说，如你所愿。</p></div></div></div></div><p style="letter-spacing: 2px;color: rgb(37, 28, 84);min-width: 1px;font-size: 14px;">3.最关键的一步，篡改上面分析的第②步数据包参数，<span style="color: rgb(37, 28, 84);font-size: 13px;letter-spacing: 1.5px;">&#34;</span><span style="color: rgb(37, 28, 84);font-size: 13px;letter-spacing: 1.5px;">language=en-us</span><span style="color: rgb(37, 28, 84);font-size: 13px;letter-spacing: 1.5px;">&#34;改成<span style="color: rgb(37, 28, 84);font-size: 13px;letter-spacing: 1.5px;">&#34;</span><span style="color: rgb(37, 28, 84);font-size: 13px;letter-spacing: 1.5px;">language=en-us</span><span style="color: rgb(37, 28, 84);font-size: 13px;letter-spacing: 1.5px;">N10th&#34;，</span></span>中毒的Cookie都用N10th的作为标识<span style="color: rgb(37, 28, 84);font-size: 13px;letter-spacing: 1.5px;"><span style="color: rgb(37, 28, 84);font-size: 13px;letter-spacing: 1.5px;">。</span></span></p><p style="text-align: center;"><img class="rich_pages" data-croporisrc="https://mmbiz.qlogo.cn/mmbiz_png/211GsCcwoib8OibHmFSTmlc9Juplic7DPYA2Qs8zcsRb4icaJmC9fsAAoiboXKTH7rV7uia4AcbkkWCgl6DoVdgDSJVw/0?wx_fmt=png" data-cropx1="0" data-cropx2="1377" data-cropy1="33.33519553072625" data-cropy2="1107.754189944134" data-ratio="0.78046875" data-s="300,640" style="width: 537px;height: 419px;" data-type="jpeg" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=ffe69f1d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYA5VutUC5WlHZPcCh1cAMTuE7YjmkY9icvkxInWq0q3iaSEag6db2V0AOw%2F640%3Fwx_fmt%3Djpeg"/></p><p style="letter-spacing: 2px;color: rgb(37, 28, 84);min-width: 1px;font-size: 14px;">发送后，我们看一下响应的数据包。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.4653179190751445" data-s="300,640" style="" data-type="png" data-w="1384" src="https://wechat2rss.xlab.app/img-proxy/?k=c35398ef&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAJ5fSAU5lpxlV6cZH9LCyPn7jjwQsRF5ZjWYMRUmgY7PMpJ7Nt1XgHg%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(37, 28, 84);min-width: 1px;font-size: 14px;">Set-Cookie被重构，很简单，至此完成恶意数据包请求。</p></div></div><div><div style="display: flex;justify-content: center;align-items: center;"><div style="width:10%;"><div style="background-color: rgb(37, 28, 84);border-radius: 50%;display: inline-block;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;background-color: rgba(37, 28, 84, 0.173);border-radius: 50%;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;border-style: dashed;border-width: 1px;border-color: rgb(37, 28, 84);border-radius: 50%;padding-right: 5px;padding-left: 5px;box-sizing: border-box;"><p style="min-width: 1px;"><span style="color: rgb(255, 255, 255);">03</span></p></div></div></div></div><div style="width:90%;"><div><p style="letter-spacing: 2px;color: rgb(37, 28, 84);min-width: 1px;">第三步，多端验证POC</p></div></div></div><div style="margin-left: 12px;border-width: 1px;border-left-style: solid;border-color: rgb(37, 28, 84);padding: 10px;box-sizing: border-box;"><p style="text-align: justify;"><span style="color: rgb(37, 28, 84);font-size: 14px;letter-spacing: 2px;">如果只是重构，不能造成危害，那有什么用。</span></p><p style="text-align: justify;"><span style="color: rgb(37, 28, 84);font-size: 14px;letter-spacing: 2px;">POC：</span></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 78);border-style: solid;border-width: 1px;padding: 6px;box-sizing: border-box;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 78);border-style: solid;border-width: 1px;padding: 20px;text-align: justify;box-sizing: border-box;"><p style="font-size: 13px;color: rgb(34, 25, 78);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;"><span style="color: rgb(37, 28, 84);font-size: 14px;letter-spacing: 2px;">松开放行上面步骤的数据包后，会发现页面提示服务器错误。此时我们可以查看本地的Cookie值为<span style="font-size: 13px;letter-spacing: 1.5px;">&#34;en-usN10th&#34;，</span></span><span style="color: rgb(37, 28, 84);font-family: 微软雅黑, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 1.5px;background-color: rgb(255, 255, 255);font-size: 14px;">OK，成功缓存使Cookie中毒。</span></p></div></div></div></div><p style="text-align: center;"><img class="rich_pages" data-ratio="0.4551341350601295" data-s="300,640" style="" data-type="png" data-w="1081" src="https://wechat2rss.xlab.app/img-proxy/?k=e83ef80d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAMSoW8Mmhu13SkhabFoI3OtibajKGXEstdkOz86rg6TiapvSzWJO1fePQ%2F640%3Fwx_fmt%3Dpng"/></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 78);border-style: solid;border-width: 1px;padding: 6px;box-sizing: border-box;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 78);border-style: solid;border-width: 1px;padding: 20px;text-align: justify;box-sizing: border-box;"><p style="font-size: 13px;color: rgb(34, 25, 78);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;"><span style="color: rgb(37, 28, 84);font-size: 14px;">我们再使用pc端其它浏览器、ios端Safari浏览器等任意平台，去访问URI。同样都是直接爆出服务器错误。</span></p></div></div></div></div><p style="text-align: justify;"><img class="rich_pages" data-ratio="0.700770847932726" data-s="300,640" style="" data-type="png" data-w="2854" src="https://wechat2rss.xlab.app/img-proxy/?k=4c6bff7f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAWey1zDQUY0lpic9fibOMW4MCF42dhpHqbBKF33XLY7tMCGVqcaOibUsUw%2F640%3Fwx_fmt%3Dpng"/></p><p style="font-size: 13px;color: rgb(34, 25, 78);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;"><span style="color: rgb(37, 28, 84);font-size: 13px;">这里要注意的一点，如果你用某浏览器打开过正常页面，则正常的cookie会缓存到本地，在cookie未过期的时间内，是不受影响。只有第一次打开此页面，或深度清缓存cookie数据等方法也可以。</span></p><p style="text-align: justify;"><span style="font-size: 13px;">移动端推荐使用via浏览器验证，设置每次退出后，清除所有数据缓存。</span></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="width: 100%;border-radius: 5px;border-width: 1px;border-style: solid;border-color: rgb(37, 28, 84);padding: 6px;box-sizing: border-box;"><div style="width: 100%;border-radius: 5px;border-width: 1px;border-style: solid;border-color: rgb(37, 28, 84);padding: 20px;box-sizing: border-box;"><p style="font-size: 13px;color: rgb(37, 28, 84);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">危害就是，一个HTTP请求就能让当前域下所有的业务功能拒绝服务。</p><p style="font-size: 13px;color: rgb(37, 28, 84);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;">注意，我说的是当前域，而不是服务器。所以如果这台服务器的<a href="http://1.1.1.1/被攻击而拒绝服务了，但不代表http://1.1.1.1:8000/受影响。" target="_blank">http://1.1.1.1/被攻击而拒绝服务了，但不代表http://1.1.1.1:8000/受影响。</a></p></div></div></div></div><p style="text-align: justify;"><span style="font-size: 14px;color: rgb(37, 28, 84);font-family: 微软雅黑, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 1.5px;background-color: rgb(255, 255, 255);">因为是服务端代码重构漏洞，不要忘记帮别人更改回来。包括下面的captcha重构。那如何更改回来呢？只需要重新发送一次正常的数据包请求。</span></p><p style="text-align: justify;"><span style="color: rgb(37, 28, 84);font-family: 微软雅黑, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 1.5px;background-color: rgb(255, 255, 255);font-size: 14px;">(1)本地手动更改cookie为正常值，再找到切换语言处。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6394316163410302" data-s="300,640" style="" data-type="png" data-w="2252" src="https://wechat2rss.xlab.app/img-proxy/?k=83307689&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAlicQZfpUuOqoDrX2pLjchX2VOqBNniaicnb1ERenkGtJmjxXosibIsAQLA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="color: rgb(37, 28, 84);font-family: 微软雅黑, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 1.5px;background-color: rgb(255, 255, 255);font-size: 14px;">（2）正常点击一次中/英文，重新重构Set-Cookie。服务端逻辑即可恢复正常。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.3889845094664372" data-s="300,640" style="" data-type="png" data-w="581" src="https://wechat2rss.xlab.app/img-proxy/?k=214a7708&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLO6YGLqGuFbl3GvMTw70t8r04z4icZicLW7xYqaW5uDe2SqGWChw5GC4SA%2F640%3Fwx_fmt%3Dpng"/></p></div></div></div></div><p style="text-align: justify;"><span style="color: rgb(32, 9, 74);"><em style="white-space: normal;"><span style="color: rgb(32, 9, 74);font-size: 24px;"><strong>0x02 </strong></span></em><span style="color: rgb(32, 9, 74);font-size: 24px;"><strong>Captcha 重构</strong></span></span></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div><div style="width: 100%;display: flex;justify-content: center;"><div style="margin-top: 10px;margin-right: auto;margin-left: auto;padding-top: 10px;padding-bottom: 10px;width: 100%;display: flex;box-sizing: border-box;"><p style="width: 40px;margin-top: -10px;justify-content: center;"><img data-ratio="1" style="width: 100%;vertical-align:top;" data-type="png" data-w="35" src="https://wechat2rss.xlab.app/img-proxy/?k=43d76b2c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOn5WPC4NgjM8EgsOoeNwJjjM1W9htb4ZT0ic8vHJAJlNKMW81Wfl7icBQ%2F640%3Fwx_fmt%3Dpng"/></p></div></div></div></div><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-top: 10px;margin-bottom: 10px;margin-left: 8px;"><div><div style="display: flex;justify-content: center;align-items: center;"><div style="width:10%;"><div style="background-color: rgb(34, 25, 78);border-radius: 50%;display: inline-block;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;background-color: rgba(34, 25, 78, 0.173);border-radius: 50%;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;border-style: dashed;border-width: 1px;border-color: rgb(34, 25, 78);border-radius: 50%;padding-right: 5px;padding-left: 5px;box-sizing: border-box;"><p style="min-width: 1px;"><span style="color: rgb(255, 255, 255);">01</span></p></div></div></div></div><div style="width:90%;"><div><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;">思路来源</p></div></div></div><div style="margin-left: 12px;border-width: 1px;border-left-style: solid;border-color: rgb(34, 25, 78);padding: 10px;box-sizing: border-box;"><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 78);border-style: solid;border-width: 1px;padding: 6px;box-sizing: border-box;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 78);border-style: solid;border-width: 1px;padding: 20px;text-align: justify;box-sizing: border-box;"><p style="font-size: 13px;color: rgb(34, 25, 78);letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;"><span style="font-size: 14px;">key分享过captcha dos攻击，即验证码DOS攻击。</span><span style="font-size: 14px;">可造成服务器资源耗尽，CPU飙升情况。</span><span style="font-size: 14px;">网上有很多文章，Google搜一下”验证码DOS“，会有很多案例。所以不再仔细介绍。</span></p></div></div></div></div><p style="text-align: justify;">（<span style="color: rgb(37, 28, 84);font-family: 微软雅黑, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 14px;letter-spacing: 1.5px;background-color: rgb(255, 255, 255);">知道有的人懒，贴两个网上搜的案例，不懂地快速了解下）</span></p><p style="text-align: justify;"><span style="color: rgb(37, 28, 84);font-family: 微软雅黑, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 14px;letter-spacing: 1.5px;background-color: rgb(255, 255, 255);"><a href="https://www.jianshu.com/p/bc51fc289183" target="_blank">https://www.jianshu.com/p/bc51fc289183</a></span></p><p><span style="color: rgb(37, 28, 84);font-family: 微软雅黑, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 14px;letter-spacing: 1.5px;background-color: rgb(255, 255, 255);"><a href="http://www.aiyuanzhen.com/index.php/archives/69/" target="_blank">http://www.aiyuanzhen.com/index.php/archives/69/</a></span></p><p><img class="rich_pages" data-ratio="0.7472315840154068" data-s="300,640" style="width: 351px;height: 262px;" data-type="png" data-w="2077" src="https://wechat2rss.xlab.app/img-proxy/?k=45356b29&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOLhtye77toKzpQCNfQTs8Qica1E7OOTaniaMA7Pd5pjiaqO3qr7dyD4kQg%2F640%3Fwx_fmt%3Dpng"/></p><p><span style="font-size: 12px;">                            (图片来源网上验证码DOS案例)</span></p><p><span style="color: rgb(37, 28, 84);font-family: 微软雅黑, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 14px;letter-spacing: 1.5px;background-color: rgb(255, 255, 255);">本文介绍的Captcha重构的漏洞，利用方法跟验证码DOS的一模一样，但不同的是，最终关注的危害结果。</span></p><p><span style="font-size: 13px;">（ps：</span><span style="font-size: 13px;">下面的内容是在你了解怎么使用验证码DOS攻击后再看的）</span></p></div></div><div><div style="display: flex;justify-content: center;align-items: center;"><div style="width:10%;"><div style="background-color: rgb(34, 25, 78);border-radius: 50%;display: inline-block;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;background-color: rgba(34, 25, 78, 0.173);border-radius: 50%;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;border-style: dashed;border-width: 1px;border-color: rgb(34, 25, 78);border-radius: 50%;padding-right: 5px;padding-left: 5px;box-sizing: border-box;"><p style="min-width: 1px;"><span style="color: rgb(255, 255, 255);">02</span></p></div></div></div></div><div style="width:90%;"><div><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;">验证码变形虫</p></div></div></div><div style="margin-left: 12px;border-width: 1px;border-left-style: solid;border-color: rgb(34, 25, 78);padding: 10px;box-sizing: border-box;"><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;">开始复现</p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;"><strong><span style="font-size: 17px;">场景1：变大消失验证码字符</span></strong></p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;">①测试中碰到的一个带有验证码登录页面——打开验证码URL</p><p style="text-align: justify;"><span style="color: rgb(37, 28, 84);font-size: 14px;letter-spacing: 1.5px;"><img class="rich_pages" data-ratio="0.7386629266012156" data-s="300,640" style="text-align: center;white-space: normal;" data-type="png" data-w="2139" src="https://wechat2rss.xlab.app/img-proxy/?k=69ce67a9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLO5lqwF8Depy7dGLWW0DqaGSrp61h5RMCrBHoC6iaueu3Vxu1icrwID5BA%2F640%3Fwx_fmt%3Dpng"/></span></p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;"><span style="font-size: 14px;">②Fuzz出验证码的宽和高等参数名——发送类似&#34;width=4000&amp;height=4000&#34;请求——服务器慢悠悠的返回一个超大的验证码图片。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.839622641509434" data-s="300,640" style="" data-type="png" data-w="2120" src="https://wechat2rss.xlab.app/img-proxy/?k=c2cf712d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOtLIkbeXEnVxmgenVc4l8icBiazkZFTnGJCPSQghEmC9CibiahcUqdobeyg%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;"><span style="color: rgb(37, 28, 84);font-family: 微软雅黑, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 14px;letter-spacing: 1.5px;background-color: rgb(255, 255, 255);">至此很多师傅发现验证码图片的大小可控，就会去进行DOS攻击，但实际上我们可能已经重构了服务端captcha验证码的生成逻辑。</span></p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;"><span style="color: rgb(37, 28, 84);font-family: 微软雅黑, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 14px;letter-spacing: 1.5px;background-color: rgb(255, 255, 255);">③回到前端刷新，验证码已经因为变得巨大，而让字符看起来消失了。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7093639575971732" data-s="300,640" style="" data-type="png" data-w="2264" src="https://wechat2rss.xlab.app/img-proxy/?k=1df3f286&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOSt5x8eibHUUWSkMb26qZcHaxZLoz6T0fn787ZMdMicIafvINDQ89HBug%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;"><strong><span style="font-size: 17px;">场景2：变小消失验证码图片</span></strong></p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;"><span style="font-size: 14px;">既然图片可变大，那也可变小。</span></p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;"><span style="font-size: 14px;">看另一个案例，首先打开正常页面，找出验证码获取接口。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6008344923504868" data-s="300,640" style="" data-type="png" data-w="719" src="https://wechat2rss.xlab.app/img-proxy/?k=16f4a38e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAgIjGrOanYpJT8o0qaTz4t7LoFWzYOEseBxl1BAV13nx7n5sSfSibnaQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;"><span style="font-size: 14px;">这里设置width=1&amp;height=1。仔细看会有一个亮点，即1pix。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6708105420188961" data-s="300,640" style="" data-type="png" data-w="2011" src="https://wechat2rss.xlab.app/img-proxy/?k=07d7be05&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOk9XptxdC1G7JPTxTvaibGLZNlwqVzCL7zia9Zn6k0OrWPfeBODBe75ug%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;">回到前端，刷新验证码。</p><p style="text-align: justify;"><img class="rich_pages" data-ratio="0.5921787709497207" data-s="300,640" style="" data-type="png" data-w="716" src="https://wechat2rss.xlab.app/img-proxy/?k=b2998f45&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAxU5KAkT7Fu957btlQIxfdCMlCNqiaAcibKj2W1pYwMafTMBNG8Zzia6qg%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;"><strong><span style="font-size: 17px;">场景3：变化功能成失效</span></strong></p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;"><span style="font-size: 17px;"><span style="color: rgb(37, 28, 84);font-family: 微软雅黑, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 14px;letter-spacing: 1.5px;background-color: rgb(255, 255, 255);"><span style="color: rgb(37, 28, 84);font-family: 微软雅黑, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 14px;letter-spacing: 1.5px;background-color: rgb(255, 255, 255);">某又一次测试中，遇到过不仅能改变宽高像素，还能控制参数n来决定验证码字符数量。</span></span></span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5380886426592798" data-s="300,640" style="" data-type="png" data-w="1444" src="https://wechat2rss.xlab.app/img-proxy/?k=61d053aa&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOZ0NGXmrWibRNRsb3Ud6rk0ibdazChoU91zA5fyO82ib4ImBptyHVicsZMQ%2F640%3Fwx_fmt%3Dpng"/></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 78);border-style: solid;border-width: 1px;padding: 6px;box-sizing: border-box;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 78);border-style: solid;border-width: 1px;padding: 20px;text-align: justify;box-sizing: border-box;"><p style="letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;"><span style="color:#251c54;"><span style="font-size: 14px;">当时我将n修改为0，此时回到前端刷新验证码。</span></span></p><p style="letter-spacing: 1.5px;line-height: 1.75;min-width: 1px;"><span style="color:#251c54;"><span style="font-size: 14px;">这时候，其实服务端验证码就已经失效了，因为验证码字符数=0，即无需验证。但由于前端策略限制，我们需要先任意输入一个1作为占位符，然后抓包删除，就可以无限次爆破了。验证码功能宣布失效。</span></span></p></div></div></div></div><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5404699738903395" data-s="300,640" style="" data-type="png" data-w="766" src="https://wechat2rss.xlab.app/img-proxy/?k=d0d9a395&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAAlO4xMxcxtibjsD0HQ2z6LNpyX15wqRQnPJ7Anz4I1icj5DwVqUEaKxg%2F640%3Fwx_fmt%3Dpng"/></p></div></div><div><div style="display: flex;justify-content: center;align-items: center;"><div style="width:10%;"><div style="background-color: rgb(34, 25, 78);border-radius: 50%;display: inline-block;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;background-color: rgba(34, 25, 78, 0.173);border-radius: 50%;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;border-style: dashed;border-width: 1px;border-color: rgb(34, 25, 78);border-radius: 50%;padding-right: 5px;padding-left: 5px;box-sizing: border-box;"><p style="min-width: 1px;"><span style="color: rgb(255, 255, 255);">03</span></p></div></div></div></div><div style="width:90%;"><div><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;">小结</p></div></div></div><div style="margin-left: 12px;border-width: 1px;border-left-style: solid;border-color: rgb(34, 25, 78);padding: 10px;box-sizing: border-box;"><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;">小结一下，验证码变形虫三种危害场景：变大变小能干扰业务；变化功能可失效。</p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;">最后提醒一句，服务端captcha逻辑被你重构了，别忘了给人家改回来。</p><p style="letter-spacing: 2px;color: rgb(34, 25, 78);min-width: 1px;font-size: 14px;"><img class="rich_pages" data-ratio="0.5761458846722524" data-s="300,640" style="" data-type="png" data-w="2029" src="https://wechat2rss.xlab.app/img-proxy/?k=4837ca2b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLO3xCt6Uz89887ic6eAuibIojiaibo6RZ439m5fzbwFwaIvmOicxXa76iarVSw%2F640%3Fwx_fmt%3Dpng"/></p></div></div></div></div><p style="text-align: justify;"><em style="white-space: normal;"><span style="font-size: 24px;"><strong><em style="color: rgb(32, 9, 74);white-space: normal;"><span style="font-size: 24px;"><strong>0x03 SMS_Code</strong></span></em><span style="color: rgb(32, 9, 74);font-size: 24px;"><strong> 重构</strong></span></strong></span></em></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div><div style="width: 100%;display: flex;justify-content: center;"><div style="margin-top: 10px;margin-right: auto;margin-left: auto;padding-top: 10px;padding-bottom: 10px;width: 100%;display: flex;box-sizing: border-box;"><p style="width: 40px;margin-top: -10px;justify-content: center;"><img data-ratio="1" style="width: 100%;vertical-align:top;" data-type="png" data-w="35" src="https://wechat2rss.xlab.app/img-proxy/?k=43d76b2c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOn5WPC4NgjM8EgsOoeNwJjjM1W9htb4ZT0ic8vHJAJlNKMW81Wfl7icBQ%2F640%3Fwx_fmt%3Dpng"/></p></div></div></div></div><p><span style="color: rgb(37, 28, 84);font-size: 14px;letter-spacing: 1.5px;"><span style="font-size: 14px;">利用重放攻击，<span style="color: rgb(37, 28, 84);font-size: 14px;letter-spacing: 1.5px;"><span style="font-size: 14px;">造成的短信轰炸漏洞，</span></span>已经是众所周知了。但其实这个接口还可能劫持任意手机号进行恶意注册登录、重置他人密码，还可能进行短信验证码钓鱼你知道吗？话不多说，实战。</span></span></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-top: 10px;margin-bottom: 10px;margin-left: 8px;"><div><div style="display: flex;justify-content: center;align-items: center;"><div style="width:10%;"><div style="background-color: rgb(34, 25, 76);border-radius: 50%;display: inline-block;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;background-color: rgba(34, 25, 76, 0.173);border-radius: 50%;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;border-style: dashed;border-width: 1px;border-color: rgb(34, 25, 76);border-radius: 50%;padding-right: 5px;padding-left: 5px;box-sizing: border-box;"><p style="min-width: 1px;"><span style="color: rgb(255, 255, 255);">01</span></p></div></div></div></div><div style="width:90%;"><div><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;">攻击手法1——手机号劫持</p></div></div></div><div style="margin-left: 12px;border-width: 1px;border-left-style: solid;border-color: rgb(34, 25, 76);padding: 10px;box-sizing: border-box;"><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">这种攻击手法，我在实战中碰到过的很多次利用场景。</p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">实战案例复现：①在注册登录或修改密码处，寻找发送短信验证码功能的接口</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6262626262626263" data-s="300,640" style="" data-type="png" data-w="1089" src="https://wechat2rss.xlab.app/img-proxy/?k=08776c7c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAqxfJJxicn4iafibicGzAoGcuAWn5LOkqElCbbNrADSy9eEvIcia5sic88Lvg%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">②抓包修改phone的参数值为&#34;phone=手机号1,手机号2&#34;</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.391705069124424" data-s="300,640" style="" data-type="png" data-w="1302" src="https://wechat2rss.xlab.app/img-proxy/?k=a09ecee6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAUXia8HNXOb8y7SA8GYlIjSPJkFnjBSS0NEQTn8HzwjO7IYhfUVpCvgg%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">③即可让手机号卡1和手机号卡2获取到相同的验证码。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.0203045685279188" data-s="300,640" style="" data-type="png" data-w="788" src="https://wechat2rss.xlab.app/img-proxy/?k=857fbbbd&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAz5G84gNeFNymU4m48TX7t776LUUQyFcP8xsAfk1vhHnPzc0Cqtg0sQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">此漏洞一旦存在，危害巨大，可任意重置他人密码，任意手机号注册登录。</p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">简单至极的技巧，仅仅是在原有手机号1后，添加一个逗号和手机号2。但，你能发现吗？</p></div></div><div><div style="display: flex;justify-content: center;align-items: center;"><div style="width:10%;"><div style="background-color: rgb(34, 25, 76);border-radius: 50%;display: inline-block;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;background-color: rgba(34, 25, 76, 0.173);border-radius: 50%;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;border-style: dashed;border-width: 1px;border-color: rgb(34, 25, 76);border-radius: 50%;padding-right: 5px;padding-left: 5px;box-sizing: border-box;"><p style="min-width: 1px;"><span style="color: rgb(255, 255, 255);">02</span></p></div></div></div></div><div style="width:90%;"><div><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;">攻击手法2——短信验证码钓鱼</p></div></div></div><div style="margin-left: 12px;border-width: 1px;border-left-style: solid;border-color: rgb(34, 25, 76);padding: 10px;box-sizing: border-box;"><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">这是在上面的思路基础上，无意中拓展的思路。实战案例复现：①还是在注册登录或修改密码处，寻找发送短信验证码功能的接口</p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">②抓包——寻找phone的参数位置——修改为&#34;phonNum=手机号1,手机号2&#34;，注意看这里的手机号2我们写的是187xxxxxxxx。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5775480059084195" data-s="300,640" style="" data-type="png" data-w="1354" src="https://wechat2rss.xlab.app/img-proxy/?k=db424338&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAB9H60xu7FuPhsPu47EBHdfBdCzbm5LHNnDls2JGPqpfQee8IqNBlfQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">③我们看一下收到的短信</p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;"><img class="rich_pages" data-s="300,640" data-w="1080" data-type="png" style="" data-ratio="0.612037037037037" src="https://wechat2rss.xlab.app/img-proxy/?k=dbc8b995&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAuyribzibTRz0qgcjVSGpqBIYSu7B8seb3Ym0k5bAjv9OQLicleRoGCglg%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">第一条是一个正常的短信第二条短信是，&#34;phonNum=手机号1,手机号2&#34;参数里逗号后的内容，即手机号2&#34;187xxxxxxxx&#34;当作短信验证码内容，向手机号1发过来了！！</p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">立即想到短信验证码可控，思路变成&#34;phonNum=手机号,短信验证码&#34;。</p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">我知道你在想什么，是不是直接能给管理员手机号发我控制的验证码内容，然后直接用这个验证码登录管理员账户。岂不是高危了。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.39184397163120566" data-s="300,640" style="" data-type="png" data-w="564" src="https://wechat2rss.xlab.app/img-proxy/?k=4d7830d1&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAa1B4ukHGE6RGQ53KCrwqge26KCdoicSiamQXT8f4sMm41HKnqicJ5m3yw%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">但，后来发现，并不能登录。.........思绪到这就断了，风险程度又降到低危。</p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">后来想到，既然不能可控的验证码无法登录，那就打组合拳来提升危害程度。</p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">④<strong>钓鱼创新思路</strong></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5703994760969221" data-s="300,640" style="" data-type="png" data-w="1527" src="https://wechat2rss.xlab.app/img-proxy/?k=fa7ec92b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAuXTSqvURtbmzjX5oMnzuaZcqyZOiap2xF9yTAL6XBTPj6pmRcj5wJwA%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">果然可以收到短信</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.30249343832021" data-s="300,640" style="" data-type="png" data-w="1524" src="https://wechat2rss.xlab.app/img-proxy/?k=0b632bac&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAe7yvmcz9ua4mNA2Grq6fgPu94zrprGvjHp9tCRtugsVA9lsSgEABdA%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">仔细看这是一个超链，可以打开后跳转淘宝首页成功。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.057936507936508" data-s="300,640" style="" data-type="png" data-w="1260" src="https://wechat2rss.xlab.app/img-proxy/?k=fcbaa859&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAUEtQClzexFYoYCUa0uV4X1FQRUcpvJuelHRrtYTKXwOdosulibOhaMQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">再想想，如果我们构造的这个链接，是一个钓鱼链接，受害者打开后让他输入账号密码，从而达到钓鱼窃密。又或者是一个下载恶意软件的链接。</p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">其实到这就已经可以向用户手机发送可控的短信钓鱼了，但我还不满足。如果不知道哪些手机号注册了，难道瞎发么？继续找脆弱点，发现回显提示。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5354330708661418" data-s="300,640" style="" data-type="png" data-w="508" src="https://wechat2rss.xlab.app/img-proxy/?k=7586bf5b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYADtzqUYW0KvwQbmDlzjSPJCn74PWLlviazeJ0zC6HxOia9EZuttqaVVYg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.45289148797920725" data-s="300,640" style="" data-type="png" data-w="1539" src="https://wechat2rss.xlab.app/img-proxy/?k=d13b0128&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAY2hHEbREEvibWaxktl8UWIGQUJpffExHdXLhNn1NDEibOpa3ZH10IHtQ%2F640%3Fwx_fmt%3Dpng"/></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 76);border-style: solid;border-width: 1px;padding: 6px;box-sizing: border-box;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 76);border-style: solid;border-width: 1px;padding: 20px;text-align: justify;box-sizing: border-box;"><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">那接下来，继续打组合拳。我们就可以通过该接口，写个脚本简单遍历出该平台注册的手机号，再发送钓鱼短信。</p></div></div></div></div><p><img class="rich_pages" data-ratio="0.6271864067966016" data-s="300,640" style="" data-type="png" data-w="2001" src="https://wechat2rss.xlab.app/img-proxy/?k=929e9ca0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYAdTBkudrK9ZjS19IY6zCHmEkKl4USGVZHFF77ZxuwiaYrNraFYPU8Eibg%2F640%3Fwx_fmt%3Dpng"/></p><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">OK，当遍历出存在的手机号时，我们发送一个钓鱼URI链接。</p><p><img class="rich_pages" data-ratio="0.3888888888888889" data-s="300,640" style="" data-type="png" data-w="864" src="https://wechat2rss.xlab.app/img-proxy/?k=5c6fa18d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8OibHmFSTmlc9Juplic7DPYA8w3E3hQDZYYgniadSaFl2Yvn30P7AJx2wOibNcxBXKpID6twictjto8Gg%2F640%3Fwx_fmt%3Dpng"/></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 76);border-style: solid;border-width: 1px;padding: 6px;box-sizing: border-box;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 76);border-style: solid;border-width: 1px;padding: 20px;text-align: justify;box-sizing: border-box;"><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">如果只是简单的短信轰炸，顶多造成资源消耗，但如果结合用户遍历+钓鱼攻击的手法，危害就提升了两个度。</p></div></div></div></div></div></div><div><div style="display: flex;justify-content: center;align-items: center;"><div style="width:10%;"><div style="background-color: rgb(34, 25, 76);border-radius: 50%;display: inline-block;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;background-color: rgba(34, 25, 76, 0.173);border-radius: 50%;box-sizing: border-box;"><div style="margin: -3px 3px 3px -3px;border-style: dashed;border-width: 1px;border-color: rgb(34, 25, 76);border-radius: 50%;padding-right: 5px;padding-left: 5px;box-sizing: border-box;"><p style="min-width: 1px;"><span style="color: rgb(255, 255, 255);">03</span></p></div></div></div></div><div style="width:90%;"><div><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;">小结</p></div></div></div><div style="margin-left: 12px;border-width: 1px;border-left-style: solid;border-color: rgb(34, 25, 76);padding: 10px;box-sizing: border-box;"><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">在传统的短信轰炸上，增加了两种攻击手法：手机号劫持和短信验证码钓鱼。其实这些思路，都是在我看完了乌云上所有的逻辑漏洞文章后，自己在实战中和探索到的。我把它称之为Phone&amp;SMS_code重构。这个漏洞的逻辑缺陷，不像上面两个案例一样的持续性重构，我把它称之为一次性重构。</p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin: 0px auto;opacity: 1;transform: rotateZ(0deg);-webkit-transform: rotateZ(0deg);-moz-transform: rotateZ(0deg);-ms-transform: rotateZ(0deg);-o-transform: rotateZ(0deg);"><div style="margin-right: auto;margin-left: auto;display: flex;justify-content: center;align-items: center;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 76);border-style: solid;border-width: 1px;padding: 6px;box-sizing: border-box;"><div style="width: 100%;border-radius: 5px;border-color: rgb(34, 25, 76);border-style: solid;border-width: 1px;padding: 20px;text-align: justify;box-sizing: border-box;"><p style="letter-spacing: 2px;color: rgb(34, 25, 76);min-width: 1px;font-size: 14px;">针对攻击手法1——手机号劫持，除了在短信发送的接口添加逗号+手机号2外，还可以尝试phone=[phone1,phone2]这种方法。针对攻击手法2——短信钓鱼，除了在短信发送的接口添加逗号+钓鱼URL外，还可以尝试phone=phone1&amp;sms_text=111111，补齐参数这种方法。</p></div></div></div></div></div></div></div></div><p><span style="color: rgb(37, 28, 84);font-size: 14px;letter-spacing: 1.5px;"><span style="font-size: 14px;">好了，思路被榨干了...</span></span></p><p style="text-align: justify;"><span style="color: rgb(37, 28, 84);font-size: 14px;letter-spacing: 1.5px;"><span style="font-size: 14px;">要去自闭一段时间了，什么时候回来或许9号，或许19号，或许29号。</span></span></p><p style="text-align: justify;"><em style="white-space: normal;"><span style="font-size: 24px;"><strong>0x04 </strong></span></em><span style="font-size: 24px;color: rgb(32, 9, 74);"><strong>总结</strong></span></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div><div style="width: 100%;display: flex;justify-content: center;"><div style="margin-top: 10px;margin-right: auto;margin-left: auto;padding-top: 10px;padding-bottom: 10px;width: 100%;display: flex;box-sizing: border-box;"><p style="width: 40px;margin-top: -10px;justify-content: center;"><img data-ratio="1" style="width: 100%;vertical-align:top;" data-type="png" data-w="35" src="https://wechat2rss.xlab.app/img-proxy/?k=43d76b2c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOn5WPC4NgjM8EgsOoeNwJjjM1W9htb4ZT0ic8vHJAJlNKMW81Wfl7icBQ%2F640%3Fwx_fmt%3Dpng"/></p></div></div></div></div><p style="text-align: justify;"><span style="color: rgb(37, 28, 84);font-size: 14px;letter-spacing: 1.5px;">或许身处黑暗，或许面目狰狞，还会被人看作狡黠阴暗。</span><span style="color: rgb(37, 28, 84);font-size: 14px;letter-spacing: 1.5px;">但无论网络世界有多邪恶，请不要忘记，白帽子的心里依然充满阳光。九号N10th。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.562363238512035" data-s="300,640" style="" data-type="jpeg" data-w="914" src="https://wechat2rss.xlab.app/img-proxy/?k=eb56d985&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOyJJzVAXsz5n9ZGHbaWx5Xw0icuyYPfRwpSt6KMciauNh83GibGUd9X61Q%2F640%3Fwx_fmt%3Djpeg"/></p><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div style="margin-top: 20px;margin-bottom: 10px;"><div style="margin-top:-22px;text-align: center;font-style: italic;"><p style="font-size: 20px;min-width: 1px;font-weight: bold;"><em>END</em></p></div></div></div><div data-width="100%" data-opacity="1" data-rotate="0" style="width: 100%;margin-right: auto;margin-left: auto;opacity: 1;transform: rotateZ(0deg);"><div style="margin-top: 10px;margin-bottom: 10px;"><div style="border-style: solid;border-width: 1px;border-color: rgb(32, 9, 74);text-align: center;box-sizing: border-box;"><div style="display: inline-block;width: 100%;border-width: 1px;border-style: solid;border-color: transparent;background-image: url(&#34;https://mmbiz.qpic.cn/mmbiz_gif/211GsCcwoibicTx6tcFWbQMiaKAtUbiavicLOaeicw3jEncRggCbN0MeZ61p62jvgI5a13zmTx17r8XOhMTVQSDMplLQ/640?wx_fmt=gif&#34;);background-position: 100% 100%;background-repeat: repeat;background-size: 100%;background-attachment: scroll;padding: 5px;box-sizing: border-box;"><div style="border-radius: 5px;box-sizing: border-box;"><div style="letter-spacing: 2px;margin:10px 10px 10px 10px;"><p style="color: rgb(32, 9, 74);font-size: 14px;min-width: 1px;">技术研究总是孤独的</p><p style="color: rgb(32, 9, 74);font-size: 14px;min-width: 1px;">边缘化的东西更是如此</p><p style="color: rgb(32, 9, 74);font-size: 14px;min-width: 1px;">一个只专注于冷门渗透技巧</p><p style="color: rgb(32, 9, 74);font-size: 14px;min-width: 1px;">研究灰黑产的暗侍卫</p><p style="color: rgb(32, 9, 74);font-size: 14px;min-width: 1px;">                    ——冷渗透</p></div></div></div></div></div></div>



<p><a href="2247483898">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=1517b7bc&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247483898%26idx%3D1%26sn%3Dfcc88b25789e731c89d19a6119260bab">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Thu, 06 Feb 2020 22:25:00 +0800</pubDate>
    </item>
    <item>
      <title>滑动验证码攻防对抗</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483824&amp;idx=1&amp;sn=a202ba76c1c8a88f7bb90fdb0dcd21e9</link>
      <description>隐秘接口处XSS带来的惊喜，绕过验证思路。实战总结的灰黑产精准识别方案。</description>
      <content:encoded><![CDATA[<p>
原创 <span>九号(N10th)</span> <span>2020-01-28 16:56</span> <span style="display: inline-block;"></span>
</p>

<p>隐秘接口处XSS带来的惊喜，绕过验证思路。实战总结的灰黑产精准识别方案。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=06ec380a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsfU8BmHibgzxo8x1FrPGBNZA9LZuEIOiau8rdiamqic2PfpwJKIImQFPUsVw%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p style="text-align: left;"><span style="font-size: 14px;">续上篇，</span><span style="font-size: 14px;color: rgb(0, 0, 0);">实战笔记之X厂滑动验证码漏洞挖掘</span></p><p style="text-align: left;"><span style="font-size: 12px;">关键字：接口XSS、重复校验、灰黑产识别</span></p><p style="text-align: left;"><span style="font-size: 14px;">阅读简介：</span><span style="font-size: 14px;">第二节，绕过和攻击</span></p><p style="text-align: left;"><span style="font-size: 14px;">                 第三节：</span><span style="font-size: 14px;">风控防御</span></p><p style="text-align: left;"><span style="max-width: 100%;font-family: -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;background-color: rgb(255, 255, 255);font-size: 20px;box-sizing: border-box !important;overflow-wrap: break-word !important;"><strong style="max-width: 100%;box-sizing: border-box !important;overflow-wrap: break-word !important;">一、背景介绍</strong></span><span style="font-family: -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;background-color: rgb(255, 255, 255);">  </span></p><p style="text-align: justify;">    在业务安全领域，滑动验证码已经是国内继，传统字符型验证码之后的标配。众所周知，打码平台和机器学习这两种绕过验证码的方式，已经是攻击者很主流的思路，不再阐述。冷渗透介绍的是一个冷门的绕过思路和防御方案。这些积累，均来自于实战之中，希望有用。</p><p style="text-align: left;"><span style="font-size: 24px;"><strong style="font-family: -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 20px;letter-spacing: 0.544px;text-align: left;white-space: normal;max-width: 100%;box-sizing: border-box !important;overflow-wrap: break-word !important;">二、<strong style="text-align: left;white-space: normal;">黑产攻击者</strong></strong><strong style="font-family: -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 20px;letter-spacing: 0.544px;text-align: left;white-space: normal;max-width: 100%;box-sizing: border-box !important;overflow-wrap: break-word !important;"><strong style="text-align: left;white-space: normal;"><img style="display: inline-block;width: 20px;vertical-align: text-bottom;" data-ratio="1" data-w="20" src="https://wechat2rss.xlab.app/img-proxy/?k=d8659280&amp;u=https%3A%2F%2Fres.wx.qq.com%2Fmpres%2Fhtmledition%2Fimages%2Ficon%2Fcommon%2Femotion_panel%2Femoji_ios%2Fu1F47B.png"/></strong></strong></span></p><p style="text-align: left;">知己知彼，百战不殆。</p><p style="text-align: left;">如果不清楚攻击者的手段，又如何能制定防御方案？</p><p style="text-align: left;"><span style="font-size: 18px;"><strong>1. 滑动验证码绕过思路</strong></span></p><p style="text-align: left;"><span style="color: rgb(0, 0, 0);"><strong>漏洞名字：<strong style="color: rgb(255, 76, 0);text-align: left;white-space: normal;">session</strong><strong style="color: rgb(255, 76, 0);text-align: left;white-space: normal;">参数</strong></strong></span><span style="color: rgb(255, 76, 0);"><strong>重复校验漏洞</strong></span></p><p style="text-align: justify;"><strong><span style="color: rgb(0, 0, 0);">思路介绍</span></strong><strong><span style="color: rgb(0, 0, 0);">：</span></strong></p><p style="text-align: justify;"><span style="color: rgb(0, 0, 0);">    此思路来源于一次对黑产路径的溯源复现，由于每次拖动滑块后，会发送一个Request请求数据包到服务器，服务器会验证这个Request请求数据包里携带的位移参数，来判断是否是拖动滑块到了正确的缺口位置。而服务器接收的数据包有很多，除了你发送的，也还会有其他人发送的请求，所以需要一个session参数来作为标识。本文中的&#34;rid&#34;值就是一个session标识。</span></p><p style="text-align: justify;"><span style="color: rgb(0, 0, 0);">    其中&#34;rid&#34;值是加引号的，因为它<span style="text-align: left;">只是一个参数</span>。针对不同的滑动验证码厂商，可能参数命名不一样。</span></p><p style="text-align: justify;"><span style="color: rgb(0, 0, 0);"><strong>漏洞详情：</strong></span></p><p style="text-align: justify;"><span style="color: rgb(0, 0, 0);">    在用户客户端完成一次</span><span style="color: rgb(255, 169, 0);">正确</span><span style="color: rgb(0, 0, 0);">的验证码滑动后，发送到服务器的session参数，会在服务器后端，</span><span style="color: rgb(255, 76, 0);">默认隐含生成一个有效时间和一个有效次数的值</span><span style="color: rgb(0, 0, 0);">。前提条件是正确的滑动。想想这里会不会存在问题？</span></p><p style="text-align: justify;"><span style="color: rgb(0, 0, 0);">    曾在黑盒测试中发现，有的滑动验证码厂商的后端逻辑设计存在缺陷，一个session参数的有效时间是10分钟，有效使用次数是5次。那么如何利用呢？<span style="text-align: left;">这是我在风控后台的真实业务环境下，挖掘到的一条黑产绕过滑动验证码的手法。</span></span></p><p><strong><span style="color: rgb(0, 0, 0);text-align: left;">思路剖析：</span></strong></p><p>①首先，触发滑动验证机制，如下图类似。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7637426900584795" data-s="300,640" style="width: 339px;height: 259px;" data-type="png" data-w="855" src="https://wechat2rss.xlab.app/img-proxy/?k=f12993e4&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicvRnWyMnZQyvosWJqBVecaWRUJGHyUD5k6KEIX0PqC792QYDWiaMvzCUDHK8zzyJMV8IicBQPPm4Dw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">②接着，滑动滑块到正确缺口位置，然后抓包。</p><p style="text-align: justify;"><span style="text-align: left;">    分析数据包，</span>寻找session参数。通过测试找到&#34;rid&#34;值为session参数。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.43562401263823064" data-s="300,640" data-backh="198" data-type="png" data-w="2532" style="width: 100%;height: auto;" data-backw="454" src="https://wechat2rss.xlab.app/img-proxy/?k=d248c74c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicvRnWyMnZQyvosWJqBVecaNZO6FcAic4IBW3T3bxODA983qRNzy7qjckYKKCib4qgTFMnn1ESuvZgg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;">    这里再强调一下，不同的厂商开发的代码，可能对session参数命名不一样。比如下图，&#34;sessionId&#34;值是另一家厂商的session参数，需要我们去分析判断。</p><p style="text-align: center;"><img class="rich_pages" data-backh="248" data-backw="578" data-ratio="0.4281188118811881" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="2525" src="https://wechat2rss.xlab.app/img-proxy/?k=005367a7&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibicvRnWyMnZQyvosWJqBVeca2kjM004r4wxs8OAfBbqnbjgEiczPU4Zncf2WP4JRkzxL38BKrgqE0GQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">③每次滑动正确位移后，使用Brupsuite或者其它中间人代理工具，抓包提取数据包里的session参数（&#34;rid&#34;值），保存到本地。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.9279661016949152" data-s="300,640" style="height: 332px;text-align: center;white-space: normal;width: 358px;" data-type="png" data-w="708" src="https://wechat2rss.xlab.app/img-proxy/?k=879018de&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9TYKImBgngRRqH5gcW7pCgRxb3I4RKsU3GC8sqEMTltFLNyNzTl2LMpvAxibv8WlicEZE1qNicEuHDw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;"><span style="text-align: left;">    因为服务器后端默认隐含对我们本地保存的session参数有一个有效时间和有效次数，所以我们不需要再去滑动验证码，直接在session的有效期内发送Request请求数据包到服务器即可验证成功！</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.29943729903536975" data-s="300,640" style="text-align: center;white-space: normal;" data-type="png" data-w="2488" src="https://wechat2rss.xlab.app/img-proxy/?k=5b8730a0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9TYKImBgngRRqH5gcW7pCg1HRqn3SmRia2HwO7ic1ibv8vHP6knSAtiblRYaFNmngThqmhwF9G78WgeA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">④上述操作，我用python编写了一个小工具使其流程化。全自动化过程：调用打码平台滑动验证码滑块到正确位置，使用python的mitmproxy库配合正则提取rid，并写入保存到本地rid.txt。</p><p style="text-align: left;"><span style="text-align: left;">    最后黑产在实际批量注册，薅羊毛或刷赞过程中，遇到触发的滑动验证码机制，只要session在有效期内，只需使用python读取本地的rid.txt内容，调用requests库发送请求数据包，即可绕过滑动验证码。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.44242803504380473" data-s="300,640" style="" data-type="png" data-w="1598" src="https://wechat2rss.xlab.app/img-proxy/?k=6295931b&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9TYKImBgngRRqH5gcW7pCgpN5lO2fnhOPK3UZVmp2uPEoSlY1mrqInV7HRo5xP7exwWdHlrlh7DA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;"><span style="text-align: left;">    至此，滑动验证码绕过思路剖析完成。</span></p><p style="text-align: left;"><span style="font-size: 18px;"><strong>2. 滑动验证码js接口XSS攻击</strong></span></p><p style="text-align: justify;">    众所周知的跨站脚本攻击—XSS，攻击手法可能很平常，但把常用的攻击手法用在一个不被人注意的地方，有时候会给你意想不到的效果。</p><p style="text-align: justify;">    在某次实战中，对一个安全公司的真实后台登录页面做黑盒测试。</p><p style="text-align: justify;">    ①首先，给到的只有一个这种后台登录页面。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6976967370441459" data-s="300,640" style="width: 370px;height: 258px;" data-type="png" data-w="1042" src="https://wechat2rss.xlab.app/img-proxy/?k=5b7201eb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibXNQ8ZALLhaHtRuEbN1JHkXdHjwx4frlYdX8I9zczBg36EIHB73p1VHCGfd1Bovu3YypUGicQDl4w%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;">    ②对常规的地方进行一番测试后，并没有发现什么脆弱缺陷。既是一家安全公司，安全防护做的比较高，也是意料之中的事。在屏幕前发了很久的呆，没有思路的时候，喜欢倒退，会回到渗透测试最本质的起点，信息收集。</p><p style="text-align: justify;">    ③<span style="color: rgb(0, 0, 0);">因为这家公司做的是业务安全，了解到这个后台是一个风控数据监测的登录后台。</span></p><p style="text-align: justify;"><span style="color: rgb(0, 0, 0);">    风控面对的业务场景有：注册、登录、浏览，支付，活动等。</span></p><p style="text-align: justify;"><span style="color: rgb(0, 0, 0);">    面对的威胁有：恶意爬虫、批量注册、薅羊毛、盗号撞库等。</span></p><p style="text-align: justify;"><span style="color: rgb(0, 0, 0);">    风控策略有：限制注册登录频率、恶意IP识别、验证码等。</span></p><p style="text-align: justify;"><span style="color: rgb(0, 0, 0);">    【恶意/正常行为】——【风控策略】——【业务场景】，风控在其中扮演者中间人的角色，无论是一个正常用户的行为还是群控设备的恶意行为，风控一方面会使用策略进行过滤行为，另一方面会将恶意/正常行为会被记录到日志中，进而在后台展示。</span></p><p style="text-align: justify;">    ④至此，信息收集完毕，我们整理一下思路。</p><p style="text-align: justify;">    我们先看一下手里拿到的测试页面，再对比分析一下上面那段信息。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.8270762229806599" data-s="300,640" style="height: 285px;text-align: center;white-space: normal;width: 345px;" data-type="png" data-w="879" src="https://wechat2rss.xlab.app/img-proxy/?k=fe0705b6&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibXNQ8ZALLhaHtRuEbN1JHkHLfN8gnFr0DzelSSvquECSlqLoEEdWOXT0tAdibafXiaRYJ6haz9rNiaw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.4006024096385542" data-s="300,640" style="width: 334px;height: 133px;" data-type="png" data-w="1328" src="https://wechat2rss.xlab.app/img-proxy/?k=2050974f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibXNQ8ZALLhaHtRuEbN1JHkGs1wbo0qt32unm7gIcywTYiaqUKgHflticSia7uPzMx9Hq4alfHwuibFYQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;">    ⑤我们发现这个登录页，是有滑动验证码的。而对比上面的信息，我将红色框圈出来的文字，构建了一个我的漏洞测试想法。如果我能控制滑动验证码的输入，那在后台的输出也可能将是可控的。红色框圈出的最后四个字，“后台展示”，第一反应就是用XSS攻击手法再合适不过了。</p><p style="text-align: justify;"><strong><span style="font-size: 20px;">开始行动</span></strong></p><p style="text-align: justify;">a. 首先，找到获取滑动验证码的js接口</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5424445227192674" data-s="300,640" style="width: 531px;height: 288px;" data-type="png" data-w="2839" src="https://wechat2rss.xlab.app/img-proxy/?k=2119b400&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibXNQ8ZALLhaHtRuEbN1JHksicpCvVN97ttw62yj1v1lNuu9IxAibBpvDlD1d3PCHNKRAZLMBYzyQUw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;">b. 分析接口参数</p><p style="text-align: center;"><img class="rich_pages" data-backh="83" data-backw="578" data-ratio="0.14296268932397488" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="2707" src="https://wechat2rss.xlab.app/img-proxy/?k=0029f8f7&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibXNQ8ZALLhaHtRuEbN1JHkD4rgAfwUL40AH7ML7NVBrLoqqVsIFuZKL4R31ABotcoVYW7pZeIt8A%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">找到以下参数：</p><p style="text-align: left;">channel,appId,orgaization,lang,data,sdkver,callback,model,reversion</p><p style="text-align: left;">c. 黑盒XSS——FUZZ</p><p style="text-align: left;">刷新验证码，截断，抓包。</p><p style="text-align: left;">（1）蛮力碰撞，直接把所有的参数的值替换成XSS payload，但这样往往容易失败，因为有些参数是硬编码，一旦更改，服务器返回的respnse就会直接显示reject拒绝。</p><p style="text-align: left;">（2）舍近求远，9个参数，抓9次包，分别替换参数值成XSS payload，最后，几分钟后，成功打到了cookie。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.313184584178499" data-s="300,640" style="" data-type="png" data-w="2465" src="https://wechat2rss.xlab.app/img-proxy/?k=3516a51c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibXNQ8ZALLhaHtRuEbN1JHkGD3JgVKViabNJHK7KKsVOBCZtibQEaGbRQibojEYgcFSCJykvv5oKYicQg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.048846675712347354" data-s="300,640" style="" data-type="png" data-w="1474" src="https://wechat2rss.xlab.app/img-proxy/?k=e1391517&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibXNQ8ZALLhaHtRuEbN1JHkibm8vEzyHBVAqXZJS9xEUaRxLlJQYFHUJIarNZYlQpEgNicZFs0Js5mQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.18097014925373134" data-s="300,640" style="" data-type="png" data-w="1608" src="https://wechat2rss.xlab.app/img-proxy/?k=4b55ff79&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibXNQ8ZALLhaHtRuEbN1JHkaOe3cfKd4MyAf8t8sdwDD1BibCl0PbKqEhibibBmNLgtm8WT4p9icSc3Ug%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><span style="font-size: 12px;">(因为XSS平台更新，当时的记录未保存)</span></p><p style="text-align: justify;">    </p><p style="text-align: justify;">（3）因为是黑盒测试，在漏洞修复后，内部人员把后台触发漏洞的位置告诉了我。</p><p style="text-align: justify;">下面这张图是，风控后台的滑动验证码记录的行为信息展示栏，未修复之前这里有一列language的值，就是参数里的&#34;lang&#34;，而插入的XSS payload也就会出现在这个位置。</p><p style="text-align: justify;"><img class="rich_pages" data-ratio="0.16229435304579815" data-s="300,640" style="text-align: center;white-space: normal;" data-type="png" data-w="2249" src="https://wechat2rss.xlab.app/img-proxy/?k=79f7e16c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibXNQ8ZALLhaHtRuEbN1JHk1ZfhyOhQHQq6eqStNw2hWYwjHYFwW0eqkDLtS0X1JzWricQic9iaIicuyg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;">由于开发人员未考虑到这个隐秘的js接口，所以未做过滤防护，且未申明http only，导致XSS payload可以顺利执行。</p><p style="text-align: justify;">（4）最后，在黑盒测试盲打XSS中，很大一部分靠运气。但saya师傅告诉我，使用极限语句再配合一个超短域名的XSS平台，会增加成功率。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.14203730272596843" data-s="300,640" style="width: 564px;height: 80px;" data-type="png" data-w="697" src="https://wechat2rss.xlab.app/img-proxy/?k=89942068&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibXNQ8ZALLhaHtRuEbN1JHkbLPOrfiawK4UqtLa9fFt2cNwwXmWGMpuSQhefd8gAH5ezjkRdGgJPBg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;"><strong><strong style="text-align: left;white-space: normal;font-family: -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;font-size: 20px;letter-spacing: 0.544px;max-width: 100%;box-sizing: border-box !important;overflow-wrap: break-word !important;">二、</strong></strong><span style="font-size: 20px;"><strong>风控防御方</strong></span><strong><img style="display:inline-block;width:20px;vertical-align:text-bottom;" data-ratio="1" data-w="20" src="https://wechat2rss.xlab.app/img-proxy/?k=8cfdfc52&amp;u=https%3A%2F%2Fres.wx.qq.com%2Fmpres%2Fhtmledition%2Fimages%2Ficon%2Fcommon%2Femotion_panel%2Fsmiley%2Fsmiley_95.png"/></strong></p><p style="text-align: left;"><span style="font-size: 17px;">滑动验证码可能会部署在：注册、登录、反爬、支付等场景当中，而黑产绕过滑动验证码的技术会有很多种，但凡只要有一种是当前风控策略未考虑的情况，就可能会造成比较严重的损失。</span></p><p style="text-align: left;"><strong><span style="font-size: 18px;">1. 攻击手法总结</span></strong></p><p style="text-align: justify;">从黑产/攻击者的角度，针对滑动验证码，我们介绍了一种绕过的思路：<span style="text-align: left;color: rgb(0, 0, 0);"><strong><strong style="color: rgb(255, 76, 0);">session</strong><strong style="color: rgb(255, 76, 0);">参数</strong></strong></span><span style="text-align: left;color: rgb(255, 76, 0);"><strong>重复校验漏洞</strong></span>，一种攻击的手法：<strong>JS接口的XSS攻击</strong>。</p><p style="text-align: justify;">那么，从风控/防御方的角度，我们如何制定防守方案呢？九号才疏学浅，不敢无稽之谈，只能把平时实战之中碰到的问题，记录下来，希望有用。</p><p style="text-align: left;"><span style="font-size: 18px;"><strong><span style="color: rgb(0, 0, 0);">2. </span>被动防守——针对攻击者</strong></span></p><p style="text-align: justify;"><span style="text-align: left;">这里没什么特色，既然是被动防守，自然是要避免亡羊补牢。</span>针对诸如XSS等OWASP TOP漏洞，不能依赖开发的细心。除了在业务上线之前，内部测试和攻防测试；还可以在在业务上线之后，托管类似国外Hackone平台的国内赏金平台，或自运营SRC。当然，结合考虑预算成本。</p><p style="white-space: normal;"><strong><span style="font-size: 18px;">3. 主动出击——针对灰黑产</span></strong></p><p style="white-space: normal;">主动出击，针对的是利用滑动验证码，来精准识别灰黑产。</p><p style="white-space: normal;">①在上一篇文章<span style="font-size: 14px;text-align: left;color: rgb(0, 128, 255);">实战笔记之X厂滑动验证码漏洞挖掘</span><span style="text-align: left;color: rgb(0, 0, 0);">里</span>最后一节，提到了多缺口、滑块多样化的方案。</p><p style="white-space: normal;">②在一次滑动验证码更新升级过程中，发现了一个<span style="color: rgb(255, 169, 0);">新思路</span>。</p><p style="white-space: normal;">（1）原始过程：在用户完成一次验证码滑动后，将request请求数据包发送给服务器。</p><p style="white-space: normal;">（2）升级方案：在服务器后端升级滑动验证码的js代码，使每一个滑动验证码都在用户客户端生成一个或多个随机参数，这些随机参数需要跟随request请求发送到服务器进行一个简单逻辑验证。重点在于：<span style="color: rgb(255, 76, 65);">正常用户只有</span><span style="color: rgb(123, 12, 0);">通过滑动滑块发送的request数据包</span><span style="color: rgb(255, 76, 65);">才一定是携带随机参数的，但<span style="color: rgb(255, 76, 65);">并不强制要求发送的request请求携带这些随机参数。</span></span></p><p style="white-space: normal;"><span style="color: rgb(0, 0, 0);">（3）精准识别：因为核心圈的黑产下放的工具，都是通过直接通过发送request请求数据包来进行批量注册、刷量刷赞和恶意爬虫等行为。称之为：<span style="color: rgb(0, 0, 0);">“协议刷”或“打接口”，这种方式效率极高。</span>加上利益化的原因，黑产不会去在乎过程，只在乎是否结果能成功。</span></p><p style="white-space: normal;"><span style="color:#000000;">    升级的方案：只有通过正常滑动滑块，才能发送携带随机参数的request数据包发到服务器。</span></p><p style="white-space: normal;"><span style="color:#000000;">    旧方案：通过以前的旧接口直接发送不携带随机参数的<span style="color: rgb(0, 0, 0);">request</span>数据包到服务器也可以通过验证。</span></p><p style="white-space: normal;"><span style="color: rgb(0, 0, 0);">    在无声无息升级后，两种方案并行运行，那么拐点就到来了。</span></p><p style="white-space: normal;"><span style="color:#000000;"><span style="color: rgb(0, 0, 0);">    是不是就意味着</span>旧方案的验证码接口过来的ip，sdk，captcha_flag等数据一定都是源于黑产池；而升级方案的验证码接口过来的ip，sdk，captcha_flag等数据不说百分百，也绝大部分都是来自正常用户群体。这就悄然无声的就达到了精准识别灰黑产的目的。</span></p><p style="white-space: normal;"><span style="color: rgb(0, 0, 0);">（4）持续化：在被黑产发现后，就需要做持续化更新的对抗了。</span></p><p style="white-space: normal;"><span style="color: rgb(0, 0, 0);">还是那句，攻防本身就是一场不公平的战斗，或许只要能大大增加黑产攻击者的成本，就是有效果的防守。</span></p><p style="white-space: normal;"><span style="font-size: 20px;"><strong>三、总结</strong></span></p><p style="white-space: normal;">以上理论，皆为实战总结。希望有用。</p><p style="white-space: normal;">如果没有，我想下篇或许会有。</p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="1" data-s="300,640" data-w="258" data-type="jpeg" src="https://wechat2rss.xlab.app/img-proxy/?k=a142748d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNJ6yCoGFf5Y1rLNrBVnXka7HxcI02CJicVMhzibt9ToddKKglSI8BRJKQ%2F640%3Fwx_fmt%3Djpeg"/></p><p style="max-width: 100%;min-height: 1em;font-family: -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;white-space: normal;background-color: rgb(255, 255, 255);text-align: center;box-sizing: border-box !important;overflow-wrap: break-word !important;"><span style="max-width: 100%;font-size: 18px;box-sizing: border-box !important;overflow-wrap: break-word !important;">技术研究总是孤独的，</span></p><p style="max-width: 100%;min-height: 1em;font-family: -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;white-space: normal;background-color: rgb(255, 255, 255);text-align: center;box-sizing: border-box !important;overflow-wrap: break-word !important;"><span style="max-width: 100%;font-size: 18px;box-sizing: border-box !important;overflow-wrap: break-word !important;">边缘化的东西更是如此。</span></p><p style="max-width: 100%;min-height: 1em;font-family: -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;white-space: normal;background-color: rgb(255, 255, 255);text-align: center;box-sizing: border-box !important;overflow-wrap: break-word !important;"><span style="max-width: 100%;font-size: 18px;box-sizing: border-box !important;overflow-wrap: break-word !important;">一个只专注冷门渗透技巧，</span></p><p style="max-width: 100%;min-height: 1em;font-family: -apple-system-font, BlinkMacSystemFont, &#34;Helvetica Neue&#34;, &#34;PingFang SC&#34;, &#34;Hiragino Sans GB&#34;, &#34;Microsoft YaHei UI&#34;, &#34;Microsoft YaHei&#34;, Arial, sans-serif;letter-spacing: 0.544px;white-space: normal;background-color: rgb(255, 255, 255);text-align: center;box-sizing: border-box !important;overflow-wrap: break-word !important;"><span style="max-width: 100%;font-size: 18px;box-sizing: border-box !important;overflow-wrap: break-word !important;">研究灰黑产的暗侍卫。</span></p><p style="white-space: normal;"><span style="text-indent: 28px;">                                                          ———冷渗透</span></p>



<p><a href="2247483824">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=2a711d64&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247483824%26idx%3D1%26sn%3Da202ba76c1c8a88f7bb90fdb0dcd21e9">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Tue, 28 Jan 2020 16:56:00 +0800</pubDate>
    </item>
    <item>
      <title>实战笔记之X厂滑动验证码漏洞挖掘</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483824&amp;idx=2&amp;sn=8bab0d69a15ed91c6524334ad6738d5c</link>
      <description>在传统安全界，验证码是很少有白帽子会去关注的一个点，但作为任何一个平台，特别是电商平台，由于黑产作恶手法日益猖獗，业务安全带来的损失，很可能会超过一个OWASP top 漏洞带来的危害。</description>
      <content:encoded><![CDATA[<p>
<span>九号(N10th)</span> <span>2020-01-28 16:56</span> <span style="display: inline-block;"></span>
</p>

<p>在传统安全界，验证码是很少有白帽子会去关注的一个点，但作为任何一个平台，特别是电商平台，由于黑产作恶手法日益猖獗，业务安全带来的损失，很可能会超过一个OWASP top 漏洞带来的危害。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=c892ee68&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNjicF5wC58SENDhq4DiccyqNnibQdXwYusEPIkYibodPNwibwoCrLAww5Zsg%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p style="white-space: normal;"><span style="font-size: 20px;"><strong>+--------------------------------------------------------------+</strong></span></p><p style="white-space: normal;"><span style="font-size: 20px;"><strong>+病毒肆虐，首先致敬一线的医护人员，逆行的前辈们。加油！+</strong></span></p><p style="white-space: normal;"><span style="font-size: 20px;"><strong>+--------------------------------------------------------------+</strong></span></p><p style="white-space: normal;"><span style="font-size: 12px;">阅读适合对象</span></p><p style="white-space: normal;"><span style="font-size: 12px;">三至五节：个人，漏洞挖掘复现</span></p><p style="white-space: normal;"><span style="font-size: 12px;">六节至下篇：风控部门，验证码对抗</span></p><p style="white-space: normal;"><span style="font-size: 20px;"><strong>一、背景介绍</strong></span>      </p><p style="white-space: normal;">    在传统安全界，验证码是很少有白帽子会去关注的一个点，但作为任何一个平台，特别是电商平台，由于黑产作恶手法日益猖獗，业务安全带来的损失，很可能会超过一个OWASP top 漏洞带来的危害。验证码作为抵挡黑产的第一道防线，若轻易失守，则溃不成军。</p><p style="white-space: normal;"> </p><p style="white-space: normal;"><strong><span style="font-size: 20px;">二、测试时间</span></strong></p><p style="white-space: normal;text-align: center;"><img class="rich_pages" data-ratio="0.09531013615733737" data-s="300,640" data-w="1322" data-type="png" src="https://wechat2rss.xlab.app/img-proxy/?k=0d1a1238&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNuT8icJROfPXhnQ43RneRzFDyHCUNdzicJ6bUVGr4x917gOKrBrrXPM2A%2F640%3Fwx_fmt%3Dpng"/></p><p style="white-space: normal;"><strong><span style="font-size: 20px;">三、详细过程</span></strong></p><p style="white-space: normal;"><strong>    1.场景复现</strong></p><p style="white-space: normal;"><strong><span style="font-size: 20px;">    </span></strong>众所周知，滑动验证码是国内厂商的风控标配，当点击登录后弹出的滑动验证码。（应SRC要求，高度打码，实属抱歉）</p><p style="white-space: normal;text-align: center;"><img class="rich_pages" data-ratio="0.8027571580063627" data-s="300,640" style="width: 456px;height: 366px;" data-type="png" data-w="943" src="https://wechat2rss.xlab.app/img-proxy/?k=b7629607&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNIc1ZlQicOLS5HzvHIsoIFzIk51eXLwibvHj5IjK5b0dEZaNTwfsntDXA%2F640%3Fwx_fmt%3Dpng"/></p><p style="white-space: normal;"><span style="text-align: center;">    在点击滑动验证码的&#34;刷新&#34;按钮后，验证码的缺口位置改变，而验证码背景图却不发生变化。<span style="text-align: center;">至此，直觉告诉我，这里一定存在问题。</span></span></p><p style="white-space: normal;"><span style="text-align: center;">    （类似如下这种）</span></p><p style="white-space: normal;text-align: center;"><img class="rich_pages" data-ratio="0.9190404797601199" data-s="300,640" style="height: 238px;width: 259px;" data-type="png" data-w="667" src="https://wechat2rss.xlab.app/img-proxy/?k=6bae5281&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNgPRAETNVDAibul4PoMAlSicAeaDVwDJ11ZbcyAibGcSkzUfeRy4GFNz1w%2F640%3Fwx_fmt%3Dpng"/></p><p style="white-space: normal;text-align: center;"><img class="rich_pages" data-ratio="0.8961424332344213" data-s="300,640" style="height: 238px;text-align: center;white-space: normal;width: 266px;" data-type="png" data-w="674" src="https://wechat2rss.xlab.app/img-proxy/?k=23b1f11a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNbX80ltibNAAbxhqIYpxiasH8QtbAFNbBJ2uIic5W69fWQc2fpAL8ry2icg%2F640%3Fwx_fmt%3Dpng"/></p><p style="white-space: normal;"><strong>    2.漏洞猜想</strong></p><p style="white-space: normal;text-align: center;"><strong><img class="rich_pages" data-ratio="0.8037383177570093" data-s="300,640" style="height: 181px;text-align: center;text-indent: 28px;white-space: normal;width: 226px;" data-type="png" data-w="535" src="https://wechat2rss.xlab.app/img-proxy/?k=16606d59&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNgjnNVeaGchibLiaT9rGlCL1deWbTfKhf1gXiaweiapmAyibzESHhC62gd0A%2F640%3Fwx_fmt%3Dpng"/></strong></p><p style="white-space: normal;"><span style="text-indent: 28px;">    猜测该厂商的数据库里，验证码的数量级不大，如果我们获取到所有的滑动验证码缺口背景图去重后，对每张验证码名字遍历，进行打标记。</span></p><p style="white-space: normal;"><span style="text-indent: 28px;">    形成一个【验证码图片名<strong>：</strong>滑块滑动的正确位移】的标记列表，如[[‘A.jpg’,342pix,[‘B.jpg’,456pix],……]，那么，以后我们遇见滑动验证码，不需要做任何图片二值化、灰度处理等，直接根据图片名字，和本地标记的列表数据库对应，即可知道需要滑动的位移。验证码的轻易失效，能带来的直接危害有爆破撞库、批量注册登录。</span></p><p style="white-space: normal;text-align: center;"><span style="text-indent: 28px;"><img class="rich_pages" data-ratio="0.5812133072407045" data-s="300,640" style="height: 178px;text-indent: 28px;white-space: normal;text-align: center;width: 306px;" data-type="png" data-w="1022" src="https://wechat2rss.xlab.app/img-proxy/?k=4b13efce&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNar0ls4zgUPxH1gLtDIBQLMibfedn3duoIVbW82qdO9tQJuDm7w1H92A%2F640%3Fwx_fmt%3Dpng"/></span></p><p style="white-space: normal;"><span style="text-indent: 28px;">    <strong>3.漏洞POC</strong></span></p><p style="white-space: normal;"><strong style="text-indent: 28px;">    开始动手：</strong></p><p style="white-space: normal;"><strong style="text-indent: 28px;">    </strong>①<span style="font-variant-numeric: normal;font-variant-east-asian: normal;font-stretch: normal;font-size: 9px;line-height: normal;font-family: &#34;Times New Roman&#34;">   </span>寻找获取验证码的js接口，下载验证码缺口背景图（目的：提取缺口背景图名）</p><p style="white-space: normal;">    找到如下类似URL请求，该接口能够获取到验证码缺口背景图bp的路径和缺口背景图的名字（xxx.jpg）<span style="font-family: 等线;font-size: 17px;">。</span></p><p style="text-align: center;"><img class="rich_pages" data-backh="298" data-backw="578" data-ratio="0.5148648648648648" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1480" src="https://wechat2rss.xlab.app/img-proxy/?k=f9751033&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibKPQavJLM0jqf6xALhoqbVsl2rSPKArISRM9KiaDy4cMqOQc1VCIhVb0Sjg16ZLtXicicfWWmNicf7Xw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-backh="195" data-backw="578" data-ratio="0.33773245350929815" data-s="300,640" style="width: 100%;height: auto;" data-type="png" data-w="1667" src="https://wechat2rss.xlab.app/img-proxy/?k=cbd963d1&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibKPQavJLM0jqf6xALhoqbVaX3Be5qs5TKPhW0K2EG2cUzkK1kmEhKtgUp07IID204ATbGoVwUnrA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">       ②<span style="font-variant-numeric: normal;font-variant-east-asian: normal;font-stretch: normal;font-size: 9px;line-height: normal;font-family: &#34;Times New Roman&#34;">  </span>Requests遍历该接口，再用正则提取出参数&#34;bp&#34;</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7949852507374632" data-s="300,640" style="width: 410px;height: 326px;" data-type="png" data-w="1356" src="https://wechat2rss.xlab.app/img-proxy/?k=5fb79508&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNNwZHZBtr4oZFqWffvBf6G4gMKZ2WpOxLMjyR8LIDozibrolrGL4qVmA%2F640%3Fwx_fmt%3Dpng"/></p><p>        去重后为50个不同验证码缺口背景图</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5583333333333333" data-s="300,640" style="width: 418px;height: 233px;" data-type="png" data-w="960" src="https://wechat2rss.xlab.app/img-proxy/?k=0bc0fad9&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsN4N0eOOMTun9KtWfNXSx5gBzosPEM31AA2WOFKhBZw1flhMYyxX1icCQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">        </p><p>        ③【<strong>关键】对每张验证码图做位移标记，制作标记列表：</strong><strong>【【验证码缺口背景图名，正确位移】…】</strong></p><p>        由于验证码数量级很小，并且验证码的缺口背景图片名与正确位移在服务器后端存储是唯一对应关系，并且永久有效。</p><p>        那我们就可以对每张验证码名字做好位移标记后，即可进行爆破。标记</p><p>的方法几种，如打码平台标记。由于数量级只有50，我们完全可以手动标记。</p><p>        这里使用的方法是：使用pyppeteer自动化工具。</p><p>       流程：打开官网&gt;&gt;&gt;输入账号密码完登录&gt;&gt;&gt;触发滑块验证&gt;&gt;&gt;提取bp缺口背景图名&gt;&gt;&gt;判断bp名是否本地已标记&gt;&gt;&gt;【未标记：填写位移值；已标记：直接根据位移值滑动】。   </p><p><strong>    a. 已标记情况</strong></p><p>        程序判断为YES，自动化百分百通过滑块验证码</p><p style="white-space: normal;text-align: center;"><strong><img class="rich_pages" data-ratio="0.5933636955107352" data-s="300,640" style="height: 276px;width: 465px;" data-type="png" data-w="1537" src="https://wechat2rss.xlab.app/img-proxy/?k=449a7602&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNDnt65npLk9e0w6tjsrx3jQjjzulBnZ2oulxquH3lA59ic0wLKUc9t1w%2F640%3Fwx_fmt%3Dpng"/></strong></p><p><strong><strong style="white-space: normal;">    b. 未标记情况</strong></strong></p><p><strong><strong style="white-space: normal;">       </strong></strong>这是一个新样本未标记，工具会停留在这，则需要手动标记，输入Position位移值。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.588501291989664" data-s="300,640" style="width: 488px;height: 287px;" data-type="png" data-w="1548" src="https://wechat2rss.xlab.app/img-proxy/?k=38e09d94&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNy8uqibPoiaMXWcReJQuU7bQhZ08WKxm6xUYIaSkK8ByNzvNbGwrRPsAA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">        用截屏工具获取像素位移值，输入272</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5370611183355006" data-s="300,640" style="width: 496px;height: 266px;" data-type="png" data-w="1538" src="https://wechat2rss.xlab.app/img-proxy/?k=d5e77c3f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibKPQavJLM0jqf6xALhoqbVEbeGhSPia4o1Bz8mfQcq3g3zQbYRHiamFSYUdtf53ZEQ1l5sicJFFy7YA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">        <span style="text-indent: 28px;">自动拖动滑块完成验证，并将新样本（缺口背景图名）rZDASBdsPDKiQYj4uga和位移值272作为新样本写入本地，为50个缺口背景图识别，增加1条标记数据。</span></p><p style="text-align: left;">        </p><p style="text-align: left;"><img class="rich_pages" data-ratio="0.11525974025974026" data-s="300,640" style="" data-type="png" data-w="1232" src="https://wechat2rss.xlab.app/img-proxy/?k=0239337d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsN3n4PnchpjLepqZ6oU0BibOW7aFqFJtabXz4YR3gtYdzZtsFEuYb3bkw%2F640%3Fwx_fmt%3Dpng"/>        经过数分钟的标记，就能拿到所有的验证码缺口对应的位移值。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.7990353697749195" data-s="300,640" style="width: 179px;height: auto;" data-type="png" data-w="622" src="https://wechat2rss.xlab.app/img-proxy/?k=ca398f3c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsN9lnoXfgozdcoRI0sV6a8d4bMmZhx5SpHibXa9bcWBt7zqNFgKdh1PnQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">        <span style="text-indent: 28px;text-align: justify;">此后，验证码就成了“失效”状态。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.9027027027027027" data-s="300,640" style="width: 449px;height: auto;" data-type="png" data-w="1295" src="https://wechat2rss.xlab.app/img-proxy/?k=d8378a63&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoibibKPQavJLM0jqf6xALhoqbVEHK5S1L0ZRInns9nKXWPlADn9lSn1ic85Mq2T4tNJwibcTw1V4zfTuOg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;"><span style="text-indent: 28px;">④用Python编写实现整个漏洞测试流程的两款工具：</span></p><p style="text-align: left;"><span style="text-align: justify;">（</span><span style="text-align: justify;">1）验证码图片&#34;脱库&#34;工具</span></p><p style="text-indent: 0px;">        <span style="color: rgb(255, 76, 65);">Bughunter_captcha.py</span></p><p style="text-indent: 0px;">    用于证明漏洞猜想，检测验证码数量有限，是否可以“脱库”操作；</p><p style="text-indent: 0px;">    标记每个验证码，并存储到本地。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.8655172413793103" data-s="300,640" style="width: 441px;height: 381px;" data-type="png" data-w="2030" src="https://wechat2rss.xlab.app/img-proxy/?k=36188a31&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsN2BO42sotT13OUy89Nl9yuseibicIJaFWrDr2WlzrfquXMKtl78yTuWtw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">  (2) 滑块自动化拖拽工具 </p><p style="text-indent: 0px;">       <span style="color: rgb(255, 76, 65);">Attack_captcha.py</span></p><p style="text-indent: 0px;"><span style="color: rgb(255, 76, 65);">   </span><span style="color: rgb(0, 0, 0);">在工具（1）证实猜想后，使用工具（2）自动化完成操作。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5810092961487384" data-s="300,640" style="width: 436px;height: 253px;" data-type="png" data-w="1506" src="https://wechat2rss.xlab.app/img-proxy/?k=150a85fb&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNDxVE8v9NBmEN0zwetaXNbFtmfajGDYthbLoKlSzCT1juYLTKNxthOw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: justify;">        至此，完成漏洞从猜想、证实到利用的过程。提交报告后，SRC厂商视为高危，很快也修复了。完整的POC演示视频不方便打码，所以无法公开，如果有兴趣，可以在后台留言。</p><p style="text-align: left;"><strong style="white-space: normal;"><span style="font-size: 20px;">四、漏洞点</span></strong></p><p style="margin-left: 28px;">（1）验证码图片可遍历，通过向刷新获取验证码的js接口，不断发送get请求，可遍历出验证码数量。</p><p style="margin-left: 28px;">（2）验证码缺口背景图名字和滑动滑块到缺口的正确位移范围，在服务器端是一一对应。即{缺口背景图名字：【正确位移值】pix}如：{XxKI30uywjm6O49Yl9M_JEz4qGA9NHkJzTt1Qyc_bg_Pnl8UZnjAJD6pmfgt7z.jpg：【347】pix}）</p><p style="margin-left: 28px;">（3）客户端获取到的验证码缺口背景图名字，和保存在服务器端的名字相同，且图片名字在服务器端永久有效。</p><p style="text-align: left;"><strong style="text-align: left;white-space: normal;"><span style="font-size: 20px;">五、漏洞说明</span></strong></p><p style="margin-left: 28px;text-indent: 28px;">该漏洞属于业务安全中的验证码设计缺陷，风控策略缺陷。容易被黑产利用，进行爆破撞库，批量注册登录等。</p><p style="text-align: left;"><strong style="text-align: left;white-space: normal;"><span style="font-size: 20px;">六、写给风控部门的一些思路想法（下篇）</span></strong></p><p style="text-align: left;"><strong style="text-align: left;white-space: normal;"><span style="font-size: 20px;">        ...三种滑块验证码样式案例</span></strong></p><p style="white-space: normal;">        在点击验证码的&#34;刷新&#34;按钮<span style="text-align: center;">后，主要会出现以下几种情况：</span></p><p style="white-space: normal;"><span style="text-align: center;">    ①[low]发现滑动验证码的缺口位置会发生变化，而图片背景内容并无改变；</span></p><p style="white-space: normal;text-align: center;"><span style="text-align: center;">    <img class="rich_pages" data-ratio="0.9190404797601199" data-s="300,640" style="height: 238px;text-align: center;white-space: normal;width: 259px;" data-type="png" data-w="667" src="https://wechat2rss.xlab.app/img-proxy/?k=6bae5281&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNgPRAETNVDAibul4PoMAlSicAeaDVwDJ11ZbcyAibGcSkzUfeRy4GFNz1w%2F640%3Fwx_fmt%3Dpng"/></span></p><p style="white-space: normal;text-align: center;"><span style="text-align: center;"><img class="rich_pages" data-ratio="0.8961424332344213" data-s="300,640" style="height: 238px;text-align: center;white-space: normal;width: 266px;" data-type="png" data-w="674" src="https://wechat2rss.xlab.app/img-proxy/?k=23b1f11a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNbX80ltibNAAbxhqIYpxiasH8QtbAFNbBJ2uIic5W69fWQc2fpAL8ry2icg%2F640%3Fwx_fmt%3Dpng"/></span></p><p style="white-space: normal;text-align: center;"><span style="text-align: center;">    ②[medium]发现滑动验证码的缺口位置和图片背景内容都会发生变化；</span><span style="text-align: center;">     </span><img class="rich_pages" data-ratio="0.8948905109489051" data-s="300,640" style="text-align: center;height: 220px;width: 246px;" data-type="png" data-w="685" src="https://wechat2rss.xlab.app/img-proxy/?k=224dfe4f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNCp0O9xt4LdMianI6ITgdcMJyJNAnGUGAlKfYAc9P7kVUSJiaw8hiadOlg%2F640%3Fwx_fmt%3Dpng"/></p><p style="white-space: normal;text-align: center;"><img class="rich_pages" data-ratio="0.9011627906976745" data-s="300,640" style="height: 215px;text-align: center;white-space: normal;width: 239px;" data-type="png" data-w="688" src="https://wechat2rss.xlab.app/img-proxy/?k=4383e7e0&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsN3AMlbxCUFQlKHWfl9KVB6ftrT9cOjVHfr1b74tAuS4AXkBIiaSWicxxQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="white-space: normal;"><span style="text-align: center;">    ③[high]发现滑动验证码的拖拽的滑块形状位置、缺口位置和图片背景内容均会发生变化；</span></p><p style="white-space: normal;text-align: center;"> <img class="rich_pages" data-ratio="0.6930091185410334" data-s="300,640" style="height: 181px;text-align: center;width: 262px;" data-type="png" data-w="658" src="https://wechat2rss.xlab.app/img-proxy/?k=b4ded1d8&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNOvmOM97AmzOA4fatUQhBdJAzbQ59Ird05YFgtg6Ipcaibx8DqFhVniaQ%2F640%3Fwx_fmt%3Dpng"/></p><p style="white-space: normal;text-align: center;"><span style="text-align: center;"><img class="rich_pages" data-ratio="0.7115987460815048" data-s="300,640" style="height: 182px;text-align: center;white-space: normal;width: 256px;" data-type="png" data-w="638" src="https://wechat2rss.xlab.app/img-proxy/?k=a5e2cf53&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNXK5cFsbenvVicbU2njELnImJqPoNGev6D2nzgyF3bibfZqmibicfHEg4NQ%2F640%3Fwx_fmt%3Dpng"/></span></p><p style="white-space: normal;">        推荐升级验证码至第三种样式案例使用，当然，很多师傅们会说打码平台能摆平一切，<span style="color: rgb(122, 68, 66);">但对抗灰黑产本身就是一场不公平的战斗，如果能提升增加攻击者的成本，就达到了我们的一级目标。</span><span style="color: rgb(122, 68, 66);">对于防御方而言，在业务中，如何利用验证码主动出击，达到快速准确的识别出灰黑产的二级目标</span>，下篇再续...</p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="1" data-s="300,640" style="" data-type="jpeg" data-w="258" src="https://wechat2rss.xlab.app/img-proxy/?k=a142748d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNJ6yCoGFf5Y1rLNrBVnXka7HxcI02CJicVMhzibt9ToddKKglSI8BRJKQ%2F640%3Fwx_fmt%3Djpeg"/></p><p style="white-space: normal;">         技术研究总是孤独的，边缘化的东西更是如此。</p><p style="white-space: normal;">                       一个只专注冷门渗透技巧，研究灰黑产的暗侍卫。</p><p style="white-space: normal;"><span style="text-indent: 28px;">                                                                               ———冷渗透</span></p>



<p><a href="2247483824">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=ae0d98d1&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247483824%26idx%3D2%26sn%3D8bab0d69a15ed91c6524334ad6738d5c">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Tue, 28 Jan 2020 16:56:00 +0800</pubDate>
    </item>
    <item>
      <title>思路技巧之生活分享</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483805&amp;idx=1&amp;sn=bd1d53613f259e48d2ef3900cc621cce</link>
      <description>这篇文章很轻松，希望能给你呆在屋子里的生活，添一点灵感或者兴趣。</description>
      <content:encoded><![CDATA[<p>
原创 <span>九号(N10th)</span> <span>2020-01-26 23:07</span> <span style="display: inline-block;"></span>
</p>

<p>这篇文章很轻松，希望能给你呆在屋子里的生活，添一点灵感或者兴趣。</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=ae06a298&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsfOSt5VC0HhVia90CZDUuVZrhxwh3FrrnX4HMoAFhjrkJBeKsF1kt2mzg%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p><span style="font-size: 18px;">    面对疫情严峻，和大家一样，实时关注着外界，同时心系着祖国。</span><span style="font-size: 18px;">但事情总有始终，一切都会变好的。</span></p><p><span style="font-size: 18px;">    现在可能很多人都没有心思去看技术类文章。</span><span style="font-size: 18px;">所以这篇文章很轻松，就随便聊聊，分享一下自己以前的生活实录，希望能给你呆在屋子里的生活，添一点灵感或者兴趣。</span></p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="0.7156549520766773" data-s="300,640" style="width: 165px;height: 118px;" data-type="jpeg" data-w="626" src="https://wechat2rss.xlab.app/img-proxy/?k=ca4c1077&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsfFpLnal6cdJIelgquvhGI4icyntgDXFjz7S8icjEnVRaGW83PHY46bDicQ%2F640%3Fwx_fmt%3Djpeg"/></p><p><span style="font-size: 18px;">    ①余弦说过，<strong>努力成为特定领域强者</strong>。</span></p><p><span style="font-size: 18px;">    上大学的时候，找到了兴趣爱好后，就去各种尝试喜欢的领域所涉及的东西。</span><span style="font-size: 18px;">有段时间，买了一堆小硬件。</span><span style="font-size: 18px;">其实很想都支持正版，但和hak5类似的品牌，对于学生阶段真的不便宜。</span><span style="font-size: 18px;">下面这张图，是当时拍的一部分工具。</span></p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="0.75" data-s="300,640" style="width: 428px;height: 321px;" data-type="jpeg" data-w="960" src="https://wechat2rss.xlab.app/img-proxy/?k=8f7bacb2&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsfHfZtK287LJ7KAzoyT5DhiabFTBxcrfeicMf3kDibB05M0mSYspIw0iaFcQ%2F640%3Fwx_fmt%3Djpeg"/></p><p style="text-align: center;">图1</p><p style="text-align: justify;"><span style="font-size: 18px;text-align: left;">    当时买了一台入门的小无人机，是看到玄武实验室研究的无人机搭载树莓派，对腾讯大楼的灯光设备进行攻击的视频，瞬间觉得酷毙了。</span></p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="0.5633802816901409" data-s="300,640" style="white-space: normal;width: 427px;height: 240px;" data-type="jpeg" data-w="1136" src="https://wechat2rss.xlab.app/img-proxy/?k=cf4db4d5&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsfoXmsa6te1vCAZ9ibVgEXCXPKaoXyvsFINbftfKE7oU4qyrgNOVBnpQQ%2F640%3Fwx_fmt%3Djpeg"/></p><p style="text-align: center;">图2</p><p style="text-align: left;"><span style="font-size: 18px;">    其它的都是一些平常的硬件，相信师傅们也都接触或者使用过。</span></p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="1" data-s="300,640" style="width: 224px;height: 224px;" data-type="jpeg" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=ca27c926&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsfvxPlT8AQ4booM1mhq475OUlhiaWHoJnaQhwd4Mxg9z0EicIuibNRVg0WA%2F640%3Fwx_fmt%3Djpeg"/></p><p style="text-align: left;"><span style="font-size: 18px;"><span style="font-size: 18px;text-align: left;">    如果有好奇的问题</span><span style="font-size: 18px;text-align: left;">，可以后台留言</span><span style="font-size: 18px;text-align: left;">。</span></span></p><p style="text-align: left;"><span style="font-size: 18px;">    ②买的最舒畅的正版，大概就是Wi-Fi Deauther的手环和板子了，这两款功能一样，都是基于ESP8266，只是样式不同。</span><span style="font-size: 18px;">当时用来配合wifi钓鱼使用过。</span></p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-backh="771" data-backw="578" data-ratio="1.3333333333333333" data-s="300,640" style="text-align: center;white-space: normal;width: 421px;height: 561px;" data-type="jpeg" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=4c6e3d46&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsf0Rp8j6PavX6szkb7vEYtsIaiaJEvNvvaSytzWNzZx6kIgkIomiaFO0fQ%2F640%3Fwx_fmt%3Djpeg"/></p><p style="text-align: center;">图3</p><p style="text-align: justify;"><span style="font-size: 18px;">    ③毕业前<span style="text-align: center;">🎓</span>，给自己刷了一台酱油师傅改造的Nethunter内核的手机，顺便用它实践复习一下msf。</span><span style="font-size: 18px;">但到后来工作中，这个手机，只用过在Firda抓包破解APP双向验证、跑字典、msf的辅助模块里POC测试、Python调用adb实现自动化注册机，无障碍服务自动化工具。</span><span style="font-size: 18px;">虽然这其中有的实战内容，跟刷没刷内核没关系，不过刷了后真的还不错。</span></p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="0.75" data-s="300,640" style="text-align: center;width: 431px;height: 323px;" data-type="jpeg" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=67732b6f&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsft65aJmBEtc1hbaQKlYF4u5Zrxfaia50zsr1aLromROHnicWiboNEciclFw%2F640%3Fwx_fmt%3Djpeg"/></p><p style="text-align: center;">图4</p><p style="text-align: justify;"><span style="font-size: 18px;">    ④记忆比较深刻的一次，大四。</span><span style="font-size: 18px;">被室友打游戏吵醒后，凌晨三点睡不着，就爬起来继续扫web安全盲点，没想到这为后来工作中遇到的问题打了一点理论基础。</span></p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="0.75" data-s="300,640" style="width: 438px;height: 328px;" data-type="jpeg" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=511f738d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsfBzmEI3SewNHUUZKnHQlUtluXFwExkLbiaCzWrbnwcdHovOsyznTJzPg%2F640%3Fwx_fmt%3Djpeg"/></p><p style="text-align: center;">图5</p><p style="text-align: justify;"><span style="font-size: 18px;">    ⑤图6是ios crash的一个漏洞，记不清哪个cve了。</span><span style="font-size: 18px;">特别开心的是，当时在做漏洞复现过程中，发现手机和电脑同在校园局域网下，直接能访问到电脑XAMPP搭建的web服务，猜测可能是关闭了类似&#34;AP隔离&#34;的策略。</span></p><p style="text-align: justify;"><span style="font-size: 18px;">    使用Nmap扫到开了62078端口的iPhone手机后，python启动payload。</span><span style="font-size: 18px;">在当时几乎是可以让所有ios设备都crash蓝屏重启。</span><span style="font-size: 18px;">其实类似的漏洞还有很多，只是以此为例。</span></p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="0.7497900923593619" data-s="300,640" style="width: 437px;height: 327px;" data-type="jpeg" data-w="1191" src="https://wechat2rss.xlab.app/img-proxy/?k=5faf7817&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsfYSa37Hw8L5wGa94oFZ7aSPh3dVyPexpicUL3gpic7JnFe05qX1IeXjcg%2F640%3Fwx_fmt%3Djpeg"/></p><p style="text-align: center;">图6</p><p style="text-align: justify;"><span style="font-size: 18px;">    ⑥下面这张图是在上面这个ios crash的CVE公布后，德国一个实验室的研究员又发布了一个比上面的CVE利用条件更简单的漏洞：</span><span style="font-size: 18px;"><span style="color: rgb(17, 17, 17);text-align: start;background-color: rgb(253, 253, 253);">CVE-2018-4368</span>。</span></p><p style="text-align: justify;"><span style="font-size: 18px;">    上面那个CVE需要攻击者和受害者在同一局域网下，通过发送tcp数据包到受害者机器上，才能利用。</span><span style="font-size: 18px;">而后者，德国实验室公布的漏洞<span style="color: rgb(17, 17, 17);text-align: start;background-color: rgb(253, 253, 253);">CVE-2018-4368</span>，无需在同一局域网下即可触发crash。</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7194835680751174" data-s="300,640" style="width: 428px;height: 307px;" data-type="png" data-w="2556" src="https://wechat2rss.xlab.app/img-proxy/?k=c5f7ae6a&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsfjdTs8W4d73MWYrkpB76Riclt5NGK7fNqPtgf0rBQ5qh5ZTDC3RTbRGw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;">图7</p><p style="text-align: justify;"><span style="font-size: 18px;">   作者并未公开exp，只发表了论文和开源了<span style="text-align: center;">wireshark</span>抓取<span style="text-align: center;">AWDL数据包的</span>插件。</span><span style="font-size: 18px;">所以当时很热血的买了micro bit并且花了一星期读完论文，虽然后来没有成功复现，做了一件没有结果的事，但一个人钻研汲取知识的过程真的很棒！</span></p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="1.3333333333333333" data-s="300,640" style="width: 419px;height: 558px;" data-type="jpeg" data-w="1080" src="https://wechat2rss.xlab.app/img-proxy/?k=fa1409c7&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsf5JPRbvBJmoEFzAPKP4Yx5zmFkCQKQ6QGr5TibA1FueYt1Ba4ZVpic7BA%2F640%3Fwx_fmt%3Djpeg"/></p><p style="text-align: center;">图8</p><p style="text-align: justify;"><span style="font-size: 18px;">    ⑦最后，学习知识本身就是一件很酷的事，将知识掌握成技能并运用到实战之中会让我们成为一个十分酷的人。</span></p><p style="text-align: justify;"><span style="font-size: 18px;"><span style="font-size: 18px;text-align: left;">    </span>OK，至此为止，希望能有触动你的东西。</span><span style="font-size: 18px;">如果没有，我想下篇一定会有。</span></p><p style="text-align: justify;"><span style="font-size: 18px;">    对了，一直想拥有一间这样的房间。</span></p><p style="text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="0.665625" data-s="300,640" style="height: 289px;text-align: center;white-space: normal;width: 434px;" data-type="jpeg" data-w="1280" src="https://wechat2rss.xlab.app/img-proxy/?k=bdf2d834&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8GiamJ1rJ3ic8esHoSGKuHsfrP3BKcc1TnGoBnvJ6icej6Y9IpUk16ZRGhsLnCZ90Kzs9vsFcUUllYw%2F640%3Fwx_fmt%3Djpeg"/></p><p style="text-align: center;">图9</p><p style="white-space: normal;text-align: center;"><img class="rich_pages js_insertlocalimg" data-ratio="1" data-s="300,640" data-w="258" data-type="jpeg" src="https://wechat2rss.xlab.app/img-proxy/?k=a142748d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib8ZKjyLCOwdYtmicsPXCCpsNJ6yCoGFf5Y1rLNrBVnXka7HxcI02CJicVMhzibt9ToddKKglSI8BRJKQ%2F640%3Fwx_fmt%3Djpeg"/></p><p style="white-space: normal;text-align: center;"><span style="font-size: 18px;">技术研究总是孤独的，</span></p><p style="white-space: normal;text-align: center;"><span style="font-size: 18px;">边缘化的东西更是如此。</span></p><p style="white-space: normal;text-align: center;"><span style="font-size: 18px;">一个只专注冷门渗透技巧，</span></p><p style="white-space: normal;text-align: center;"><span style="font-size: 18px;">研究灰黑产的暗侍卫。</span></p><p style="white-space: normal;text-align: right;"><span style="text-indent: 28px;font-size: 18px;">                                                                               ———冷渗透</span></p>



<p><a href="2247483805">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=2f15b24e&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247483805%26idx%3D1%26sn%3Dbd1d53613f259e48d2ef3900cc621cce">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Sun, 26 Jan 2020 23:07:00 +0800</pubDate>
    </item>
    <item>
      <title>黑产研究之秒拨IP</title>
      <link>https://mp.weixin.qq.com/s?__biz=MzIxMDMwODc2OQ==&amp;mid=2247483668&amp;idx=1&amp;sn=b3383fb324ef9ced1090eecc5a20b17e</link>
      <description>黑产研究—“秒拨IP挖掘机”制作，故事背景 黑产的本质是利益，因利益而存......</description>
      <content:encoded><![CDATA[<p>
原创 <span>N10th</span> <span>2020-01-21 22:39</span> <span style="display: inline-block;"></span>
</p>

<p>黑产研究—“秒拨IP挖掘机”制作，故事背景 黑产的本质是利益，因利益而存......</p>
<p></p>



<p>
<img src="https://wechat2rss.xlab.app/img-proxy/?k=c8a720c2&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_jpg%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNNiaIg62pzVWxlJX9N4pKBDzW22Z1cUyqe3jO9hibHT22jHlgyqTqiaKmA%2F0%3Fwx_fmt%3Djpeg"/>
</p>


<p>黑产研究——“秒拨IP挖掘机”制作</p><p style="text-align: center;">Author:黑产研究院N10th</p><h2>故事背景</h2><p style="text-align: center;"> </p><p style="text-indent: 28px;">黑产的本质是利益，因利益而存，为利益而生。正是因为有了黑产的存在，才有了风控的诞生。风控和黑产的战斗，是一场资源与技术的对抗，黑产研究人员，是最深入敌方内部的前线特种部队，搜集情报，工具研究，手法复现，决定了黑产攻防研究者的一生宿命。</p><p style="text-indent: 28px;"> </p><p style="text-indent: 28px;">注册、登录、撞库、薅羊毛、刷量等等，在所有的黑产业务场景中，离不开的是IP，所以IP是必备的资源特征。天网风控系统会对IP进行打标签，来作为判断是“好人”还是“坏人”的一个特征标记。而黑产会通过变化IP的手法来绕过风控策略，让风控系统误判其为“好人”。这种变化IP的手法，叫做动态IP，而黑产使用动态IP的工具经常几秒钟切换一个新IP， “秒拨”IP，因此得名。</p><p style="text-indent: 28px;"> </p><p style="text-indent: 28px;">“魔高一尺，道高一丈”，黑产秒拨IP的出现，驱使我们有新的攻防研究成果去升级防御系统。黑产研究院的秒拨IP池搭建，逢时而生。</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6629001883239172" data-s="300,640" style="" data-type="png" data-w="531" src="https://wechat2rss.xlab.app/img-proxy/?k=a817f135&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNRUOpgl5SSjMuaRbRm8haW0Nruic1T0jAPOsDrib5IVAnhJicf8RVHMUwA%2F640%3Fwx_fmt%3Dpng"/></p><p> </p><h2>知识储备</h2><p>       在深入敌方内部阵地前，我们先来储备一些知识干粮。</p><p>①<span style="font:9px &#39;Times New Roman&#39;;">   </span>共享型IP：基站、专用出口等；</p><p style="text-indent: 0px;">独占型IP：对于像家庭宽带IP、数据中心主机IP等</p><p>②<span style="font:9px &#39;Times New Roman&#39;;">   </span>pppoe拨号：最传统的家庭宽带拨号连接。</p><p>③<span style="font:9px &#39;Times New Roman&#39;;">   </span>PPTP/L2TP/SSTP：分别对应，“点对点隧道协议/<span style="color:#333333;background:white;">第二层隧道协议</span>（使用证书的隧道协议）/安全套接字隧道协议”，这三者都属于VPN协议。其中区别在于L2TP一般应用在工业，是一种链路层协议。PPTP和SSTP要求网络为IP网络，，而SSTP只是在PPTP上加了一层安全套接字，不扯这么多，我们要用的就是PPTP，仅此而已。</p><p>④<span style="font:9px &#39;Times New Roman&#39;;">   </span>秒拨机：一台运行切换ip脚本的vps服务器。</p><p>⑤<span style="font:9px &#39;Times New Roman&#39;;">   </span>全国混拨：可以切换到全国地区的IP资源</p><p>⑥<span style="font:9px &#39;Times New Roman&#39;;">   </span>动态拨号：只能切换到单一地区的IP资源。</p><p>⑦<span style="font:9px &#39;Times New Roman&#39;;">   </span>PPTP账号：从黑产手里购买到的拨号资源，采用PPTP类型的VPN进行切换获得取新IP。</p><p style="text-align: left;">相关资料</p><ol style="list-style-type: decimal;" class="list-paddingleft-2"><li><p>  威胁猎人介绍秒拨IP科普文：</p><p>  <span style="color:black;text-underline:none;"><a href="https://zhuanlan.zhihu.com/p/68528854" target="_blank">https://zhuanlan.zhihu.com/p/68528854</a></span></p></li><li><p><span style="color:black;"><span style="font:9px &#39;Times New Roman&#39;;">     </span></span><span style="color:black;">黑产动态拨号vps厂商：</span></p></li></ol><p style="text-indent: 0px;"><span style="color:black;">         圣高云：</span><span style="color:black;text-underline:none;"><a href="http://www.shenggaocloud.com/vps.asp?typeid=50032" target="_blank">http://www.shenggaocloud.com/vps.asp?typeid=50032</a></span></p><p style="text-indent: 0px;"><img class="rich_pages" data-ratio="0.3938053097345133" data-s="300,640" style="text-align: center;white-space: normal;" data-type="png" data-w="452" src="https://wechat2rss.xlab.app/img-proxy/?k=59eae61e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNbX9uBaiaDCZZicc3SROr2EAv32FjFUvic7y7icZ6xlxicdmduTbIENIzSew%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-indent: 0px;"><span style="color: black;">    3.<span style="font-variant-numeric: normal;font-variant-east-asian: normal;font-stretch: normal;font-size: 9px;line-height: normal;font-family: &#34;Times New Roman&#34;">     </span></span><span style="color: black;">黑产PPTP账号购买：</span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6646525679758308" data-s="300,640" style="" data-type="png" data-w="331" src="https://wechat2rss.xlab.app/img-proxy/?k=fb66540c&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNlYGunBvkjBH3MUyjgs93lcJKJfSLHI3plHQ6Zz3Yaa7z6RFbdwKz9A%2F640%3Fwx_fmt%3Dpng"/></p><h2>逻辑流程</h2><p>有两种可以部署的方案</p><p>①<span style="font:9px &#39;Times New Roman&#39;;">   </span>PPTP拨号</p><p style="text-indent: 0px;">优势：a. 对于最终要上传数据到公司服务器较为方便；b. 机器性能较好</p><p style="text-indent: 0px;">缺点：a. 规模化需要动用公司电脑，占用空间面积；b. PPTP账号价格6元一天稍贵</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.6932515337423313" data-s="300,640" style="" data-type="png" data-w="489" src="https://wechat2rss.xlab.app/img-proxy/?k=df9fc34d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNN7icWIvKY5pmyqB4o1iaZX7S4qHVia0s8VckXD9sIWzlib7x6LGhVJIdQhw%2F640%3Fwx_fmt%3Dpng"/></p><p>②<span style="font:9px &#39;Times New Roman&#39;;">   </span>秒拨机拨号</p><p style="text-indent: 0px;">优势：a. vps价格较低，特价仅为3-4元一天</p><p style="text-indent: 0px;">缺点：a. 机器内存512M，性能较差，容易宕机造成数据丢失；b. 数据返回内网较麻烦</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7830578512396694" data-s="300,640" style="" data-type="png" data-w="484" src="https://wechat2rss.xlab.app/img-proxy/?k=51732895&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNYl6mcNBibgEibdMfAI1bW8lLibZsuZcZhab8YlENDmxzR0DUb3UsSxvfw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: left;">开始行动</p><p><strong>方案Ⅰ——PPTP账号秒拨</strong></p><p>①<span style="font:9px &#39;Times New Roman&#39;;">   </span>购买完PPTP账号后，初次使用，须要添加VPN连接</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.8162650602409639" data-s="300,640" style="" data-type="png" data-w="332" src="https://wechat2rss.xlab.app/img-proxy/?k=fe1ca234&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNumfyb8Ik4YMDuwAfhUAwWLLAu3QJpEJVpw6nWxAS0MXexEqsgKkibQw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-indent: 10px;">填写相关信息，最关键的一步，一定要选择VPN类型，不然后期会容易出现难以连接状态</p><p style="text-align: center;"><img class="rich_pages" data-ratio="1.1254237288135593" data-s="300,640" style="" data-type="png" data-w="295" src="https://wechat2rss.xlab.app/img-proxy/?k=3c9c4aa4&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNN9pJ84eLBByD1tia7ibvwxVVic9Sf0Hr7078JFzbkQK05Ta3Hso6RdticGw%2F640%3Fwx_fmt%3Dpng"/></p><p>②<span style="font:9px &#39;Times New Roman&#39;;">   </span>测试连接</p><p>                             <img class="rich_pages" data-ratio="1.0881226053639848" data-s="300,640" style="text-align: center;white-space: normal;" data-type="png" data-w="261" src="https://wechat2rss.xlab.app/img-proxy/?k=77d0c679&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNyfeNne1Eee2ENU49eWdWASEBpfHekUG1xxhS3gvefvOVQ86uBvzlFw%2F640%3Fwx_fmt%3Dpng"/></p><p>③<span style="font:9px &#39;Times New Roman&#39;;">   </span>DOS命令实现VPN连接，并python化</p><p style="text-indent: 0px;">格式：“rasdial VPN名 用户名 密码“</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.24363636363636362" data-s="300,640" style="" data-type="png" data-w="550" src="https://wechat2rss.xlab.app/img-proxy/?k=17663b7e&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNRJdF632zn5cvaLmwy2S0hia4Du2NianqARoBOTRQAVL44XFia8Lc3Nyrg%2F640%3Fwx_fmt%3Dpng"/></p><p>④<span style="font:9px &#39;Times New Roman&#39;;">   </span>请求可以返回IP地址的API接口，这里用的sohu</p><p style="text-indent: 0px;"><span style="color:black;text-underline:none;"><a href="http://pv.sohu.com/cityjson?ie=utf-8" target="_blank">http://pv.sohu.com/cityjson?ie=utf-8</a></span></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.21947194719471946" data-s="300,640" style="" data-type="png" data-w="606" src="https://wechat2rss.xlab.app/img-proxy/?k=f214d2b2&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNwrrWETCND1nKLZzvJNWT7GLNuza5DMN8o8KyZhCEuMIKsTfYzNS3jg%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-indent: 0px;"> </p><p>⑤<span style="font:9px &#39;Times New Roman&#39;;">   </span>将IP数据保存写入本地（注意格式）</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.8106060606060606" data-s="300,640" style="" data-type="png" data-w="528" src="https://wechat2rss.xlab.app/img-proxy/?k=52446bf4&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNBMjyEBC40do5LPNTdCibwlWTVibHuTOxRoXUvw6eWNpdk3EzEOibcs95g%2F640%3Fwx_fmt%3Dpng"/></p><p>⑥<span style="font:9px &#39;Times New Roman&#39;;">   </span>每天定时上传到服务器</p><p style="text-indent: 0px;">Ps：a. 上传流程：内网PC&gt;&gt;跳板机&gt;&gt;开发机&gt;&gt;hdfs&gt;&gt;灌库</p><p>b. windows机器不自带scp工具，已打包好在压缩包内。自行安装</p><p>c. 写好定时任务</p><p> </p><p><strong>方案Ⅱ——秒拨机</strong></p><p><strong> </strong></p><p>①<span style="font:9px &#39;Times New Roman&#39;;">   </span>购买完vps后，等待5分钟，使用mstsc远程连接桌面</p><p style="text-indent: 0px;"> </p><p>②<span style="font:9px &#39;Times New Roman&#39;;">   </span>测试pppoe宽带连接账户密码</p><p style="text-indent: 0px;"> </p><p>③<span style="font:9px &#39;Times New Roman&#39;;">   </span>DOS命令实现宽带连接，并python化</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.1703204047217538" data-s="300,640" style="" data-type="png" data-w="593" src="https://wechat2rss.xlab.app/img-proxy/?k=e84374c8&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNyb3zp7sWnT86BiaL1EzFxhect5FHk5hGxMxZxVQXrrXw63uVdmvcGlQ%2F640%3Fwx_fmt%3Dpng"/></p><p>④⑤和上述步骤一致</p><p style="text-indent: 0px;"> </p><p>⑥  因为API接口写入的数据保存在vps秒拨机上，所以需要从外网将数据传回来</p><p>       解决思路：自主搭建了一台拥有文件上传的Flask轻量型服务器，</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.782258064516129" data-s="300,640" style="" data-type="png" data-w="496" src="https://wechat2rss.xlab.app/img-proxy/?k=7120241d&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNc0SN42qLJLEOvJPicibHelSh6ySJq989A8I7XjmVp6SYZPnTtyibiaSe6A%2F640%3Fwx_fmt%3Dpng"/></p><p> </p><p> </p><p style="text-align: justify;">代码实现</p><p>将上述行动用Python实现全流程自动化，我把它称之为：“秒拨IP挖掘机”自动化工具。</p><p> </p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5991561181434599" data-s="300,640" style="" data-type="png" data-w="474" src="https://wechat2rss.xlab.app/img-proxy/?k=08c95485&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNJIvuodWOyTgiaWMwx9TrMbzFPBwQ1SibovDUoicMclFicn325Xsesq1nMA%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-indent: 28px;">一共经历了数个版本，最终v3.5持续工作挖掘了一个月的秒拨IP，形成了每日增益3w IP入库量。代码已放入压缩包内。</p><p> </p><p style="text-align: left;">处理细节</p><p>       1.流程涉及部门：黑产研究院、数据挖掘部、行为策略部、架构部</p><p>       2.最终数据统计：</p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.7296296296296296" data-s="300,640" style="" data-type="png" data-w="270" src="https://wechat2rss.xlab.app/img-proxy/?k=ada49930&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNmNYbGHxvNU8j1PJ0wCgP555e1zl4Sc8wmy4JSR6A9Rldl4iabak6Uxw%2F640%3Fwx_fmt%3Dpng"/></p><p style="text-align: center;"><img class="rich_pages" data-ratio="0.5268817204301075" data-s="300,640" style="" data-type="png" data-w="279" src="https://wechat2rss.xlab.app/img-proxy/?k=1ca8b6bc&amp;u=https%3A%2F%2Fmmbiz.qpic.cn%2Fmmbiz_png%2F211GsCcwoib9yicOSdotyNibbD5M6nqDFNNRT6l9uNs3I7G5nl2Y53xV8icoTXUdTumnQ8ic4wHp9c7X6GyEPlfeSdQ%2F640%3Fwx_fmt%3Dpng"/></p><p>       每日数据实时发送到自己和策略邮箱，前日数据统计发送自己和黑产研究院院长邮箱。</p><p>       3.拦截量：策略部；灌库：数据挖掘部；数据分析：架构部</p>



<p><a href="2247483668">阅读原文</a></p>
<p><a href="https://wechat2rss.xlab.app/link-proxy/?k=a934e0c5&amp;r=1&amp;u=http%3A%2F%2Fmp.weixin.qq.com%2Fs%3F__biz%3DMzIxMDMwODc2OQ%3D%3D%26mid%3D2247483668%26idx%3D1%26sn%3Db3383fb324ef9ced1090eecc5a20b17e">跳转微信打开</a></p>
]]></content:encoded>
      <pubDate>Tue, 21 Jan 2020 22:39:00 +0800</pubDate>
    </item>
  </channel>
</rss>