{% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**subscription plans**](https://github.com/sponsors/carlospolop)! * **Join the** ๐Ÿ’ฌ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** ๐Ÿฆ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %} ํ•‘ ์‘๋‹ต TTL:\ 127 = Windows\ 254 = Cisco\ ๋‚˜๋จธ์ง€, ์–ด๋–ค ๋ฆฌ๋ˆ…์Šค $1$- md5\ $2$ ๋˜๋Š” $2a$ - Blowfish\ $5$- sha256\ $6$- sha512 ์„œ๋น„์Šค ๋’ค์— ๋ฌด์—‡์ด ์žˆ๋Š”์ง€ ๋ชจ๋ฅธ๋‹ค๋ฉด, HTTP GET ์š”์ฒญ์„ ์‹œ๋„ํ•ด ๋ณด์„ธ์š”. **UDP ์Šค์บ”**\ nc -nv -u -z -w 1 \ 160-16 ํŠน์ • ํฌํŠธ๋กœ ๋นˆ UDP ํŒจํ‚ท์ด ์ „์†ก๋ฉ๋‹ˆ๋‹ค. UDP ํฌํŠธ๊ฐ€ ์—ด๋ ค ์žˆ์œผ๋ฉด, ๋Œ€์ƒ ๋จธ์‹ ์—์„œ ์‘๋‹ต์ด ์ „์†ก๋˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. UDP ํฌํŠธ๊ฐ€ ๋‹ซํ˜€ ์žˆ์œผ๋ฉด, ๋Œ€์ƒ ๋จธ์‹ ์—์„œ ICMP ํฌํŠธ ๋„๋‹ฌ ๋ถˆ๊ฐ€ ํŒจํ‚ท์ด ์ „์†ก๋˜์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.\ UDP ํฌํŠธ ์Šค์บ”์€ ์ข…์ข… ์‹ ๋ขฐํ•  ์ˆ˜ ์—†์œผ๋ฉฐ, ๋ฐฉํ™”๋ฒฝ๊ณผ ๋ผ์šฐํ„ฐ๊ฐ€ ICMP ํŒจํ‚ท์„ ์ฐจ๋‹จํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋กœ ์ธํ•ด ์Šค์บ”์—์„œ ์ž˜๋ชป๋œ ๊ธ์ • ๊ฒฐ๊ณผ๊ฐ€ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์Šค์บ”๋œ ๋จธ์‹ ์—์„œ ๋ชจ๋“  UDP ํฌํŠธ๊ฐ€ ์—ด๋ ค ์žˆ๋Š” ๊ฒƒ์œผ๋กœ ํ‘œ์‹œ๋˜๋Š” UDP ํฌํŠธ ์Šค์บ”์„ ์ž์ฃผ ๋ณผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.\ ๋Œ€๋ถ€๋ถ„์˜ ํฌํŠธ ์Šค์บ๋„ˆ๋Š” ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•œ ๋ชจ๋“  ํฌํŠธ๋ฅผ ์Šค์บ”ํ•˜์ง€ ์•Š์œผ๋ฉฐ, ์ผ๋ฐ˜์ ์œผ๋กœ ์Šค์บ”๋˜๋Š” "ํฅ๋ฏธ๋กœ์šด ํฌํŠธ"์˜ ๋ฏธ๋ฆฌ ์„ค์ •๋œ ๋ชฉ๋ก์„ ๊ฐ€์ง€๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. # CTF - ํŠธ๋ฆญ **Windows**์—์„œ **Winzip**์„ ์‚ฌ์šฉํ•˜์—ฌ ํŒŒ์ผ์„ ๊ฒ€์ƒ‰ํ•˜์„ธ์š”.\ **๋Œ€์ฒด ๋ฐ์ดํ„ฐ ์ŠคํŠธ๋ฆผ**: _dir /r | find ":$DATA"_\ ``` binwalk --dd=".*" #Extract everything binwalk -M -e -d=10000 suspicious.pdf #Extract, look inside extracted files and continue extracing (depth of 10000) ``` ## Crypto **featherduster**\ **Basae64**(6โ€”>8) โ€”> 0...9, a...z, Aโ€ฆZ,+,/\ **Base32**(5 โ€”>8) โ€”> Aโ€ฆZ, 2โ€ฆ7\ **Base85** (Ascii85, 7โ€”>8) โ€”> 0...9, a...z, A...Z, ., -, :, +, =, ^, !, /, \*, ?, &, <, >, (, ), \[, ], {, }, @, %, $, #\ **Uuencode** --> "_begin \ \_"๋กœ ์‹œ์ž‘ํ•˜๊ณ  ์ด์ƒํ•œ ๋ฌธ์ž\ **Xxencoding** --> "_begin \ \_"๋กœ ์‹œ์ž‘ํ•˜๊ณ  B64\ \ **Vigenere** (์ฃผํŒŒ์ˆ˜ ๋ถ„์„) โ€”> [https://www.guballa.de/vigenere-solver](https://www.guballa.de/vigenere-solver)\ **Scytale** (๋ฌธ์ž์˜ ์˜คํ”„์…‹) โ€”> [https://www.dcode.fr/scytale-cipher](https://www.dcode.fr/scytale-cipher) **25x25 = QR** factordb.com\ rsatool Snow --> ๊ณต๋ฐฑ๊ณผ ํƒญ์„ ์‚ฌ์šฉํ•˜์—ฌ ๋ฉ”์‹œ์ง€ ์ˆจ๊ธฐ๊ธฐ # Characters %E2%80%AE => RTL ๋ฌธ์ž (ํŽ˜์ด๋กœ๋“œ๋ฅผ ๊ฑฐ๊พธ๋กœ ์”€) {% hint style="success" %} AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
HackTricks ์ง€์›ํ•˜๊ธฐ * [**๊ตฌ๋… ๊ณ„ํš**](https://github.com/sponsors/carlospolop) ํ™•์ธํ•˜๊ธฐ! * **๐Ÿ’ฌ [**Discord ๊ทธ๋ฃน**](https://discord.gg/hRep4RUj7f) ๋˜๋Š” [**ํ…”๋ ˆ๊ทธ๋žจ ๊ทธ๋ฃน**](https://t.me/peass)์— ์ฐธ์—ฌํ•˜๊ฑฐ๋‚˜ **Twitter** ๐Ÿฆ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**๋ฅผ ํŒ”๋กœ์šฐํ•˜์„ธ์š”.** * **[**HackTricks**](https://github.com/carlospolop/hacktricks) ๋ฐ [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) ๊นƒํ—ˆ๋ธŒ ๋ฆฌํฌ์ง€ํ† ๋ฆฌ์— PR์„ ์ œ์ถœํ•˜์—ฌ ํ•ดํ‚น ํŒ์„ ๊ณต์œ ํ•˜์„ธ์š”.**
{% endhint %}