ÈÀÌÆ® ÇØÄ¿¸¦ ²Þ²Ù´Â ÇлýµéÀº ¸ðÀÇ ÇØÅ·À» ÅëÇØ ½Ã½ºÅÛ¿¡ ´ëÇÑ Ãë¾àÁ¡À» ºÐ¼®ÇÏ°í À̸¦ °ø°ÝÇÏ´Â ±â¼úÀ» ½ÀµæÇÒ ¼ö Àִµ¥ À̸¦ ü°èÀûÀ¸·Î ÇнÀÇÒ ¼ö ÀÖ´Â ³»¿ëÀ» Æ÷ÇÔÇÑ ¼ÀûÀÌ ºÎÀçÇÑ °ü°è·Î Ãʺ¸ÀÚ¿¡°Ô ¸ðÀÇ ÇØÅ·Àº Á¢±ÙÇϱ⠾î·Á¿î ÁÖÁ¦ÀÎ °ÍÀÌ Çö½ÇÀÌ´Ù.
ÀÌ Ã¥¿¡¼´Â ÈÀÌÆ® ÇØÄ¿ÀÇ ²ÞÀ» Å°¿ì°í ÀÖ´Â Áß°íµîÇлýÀ̳ª IT Àü°ø °ü·Ã ´ëÇлýµéÀÌ ½±°Ô ¸ðÀÇ ÇØÅ·À» ½Ç½ÀÇÒ ¼ö ÀÖ°Ô ´Ù¾çÇÑ ÁÖÁ¦¿Í ±â¼úµéÀ» Æ÷ÇÔÇÏ°í ÀÖ´Ù. ÇöÀç ¸ðÀÇ ÇØÅ·À» ½Ç½ÀÇÒ ¼ö ÀÖ´Â ´Ù¾çÇÑ ÁÖÁ¦ÀÇ °¡»ó¼¹ö¸¦ Á¦°øÇÏ´Â À¯¸í »çÀÌÆ®µéÀÌ Á¸ÀçÇϴµ¥ ÀÌ Áß¿¡¼ Ãʺ¸Àڵ鿡°Ô ÀûÇÕÇÑ Tryhackme »çÀÌÆ®¸¦ ´ë»óÀ¸·Î ÇÑ ½Ç½À ³»¿ëÀ» ±¸¼ºÇÏ¿´´Ù. µû¶ó¼ ¸ðÀÇ ÇØÅ·À» óÀ½ Á¢ÇÏ´Â µ¶Àڵ鵵 óÀ½ºÎÅÍ ÃµÃµÈ÷ ½Ç½ÀÀ» ÁøÇàÇÏ´Ù º¸¸é ºÐ¸í Èï¹Ì¸¦ ´À³¥ ¼ö ÀÖÀ» °ÍÀ̶ó »ý°¢ÇÑ´Ù.ƯÈ÷, ½Ç½ÀÇÏ°Ô µÇ´Â ¼¹öµéÀº ½ÇÀü¿¡¼ »ç¿ëÇÒ ¼ö ÀÖ´Â ÇØÅ· ÁÖÁ¦¸¦ Æ÷ÇÔÇÏ°í ÀÖ¾î ÀÌ ³»¿ëÀ» º»Àú¼¿¡¼ ±â¼úÀûÀÎ ½Ç½À Ãø¸é°ú ÇнÀÀû ¹æ¹ýÀÎ Âü°í »çÇ× Çü½ÄÀ¸·Î Á¦°øÇÔÀ¸·Î½á µ¶ÀÚµéÀÌ ½±°Ô ÇнÀÇÒ ¼ö ÀÖµµ·Ï ±¸¼ºÇÏ¿´´Ù.
¸ñÂ÷
1 Àå • ¸ðÀÇÇØÅ· Á¤ÀÇ
1.1 ¸ðÀÇÇØÅ· Á¤ÀÇ ¹× ¸ñÀû
[Âü°í] º¸¾È Ãë¾àÁ¡(CVE ü°è)
1.2 ¸ðÀÇÇØÅ· Ç¥ÁØ ÀýÂ÷
[Âü°í] ½ÇÁ¦ ¸ðÀÇÇØÅ· ÀýÂ÷
1.3 ¸ðÀÇÇØÅ· ½Ç½À °¡´ÉÇÑ »çÀÌÆ®
[Âü°í] ±¹Á¦ÀÚ°ÝÁõ(OSCP)
2 Àå • ȯ°æ±¸Ãà ¹× ¼³Á¤
2.1 ÇÁ·Î±×·¥ ´Ù¿î·Îµå
[Âü°í] Windows 11 ¹öÀü
2.2 Kali ¸®´ª½º ¼³Ä¡
2.3 Kali ¸®´ª½º ½ÇÇà ¹× update / upgrade
[Âü°í] ¸®´ª½º °è¿º° ÆÐÅ°Áö °ü¸®
3 Àå • Tryhackme Á¢¼Ó ¹× ¿¬°á
3.1 Tryhackme »çÀÌÆ® ¿¬°á
3.2 VPN »ý¼º ¹× ¿¬°á
[Âü°í] VPN ¿¬°á
4 Àå • Tryhackme – Ignite ¼¹ö
4.1 Ignite ¼¹ö ¿¬°á ¹× Áغñ
[Âü°í] °¡»ó ¼¹ö »ç¿ë ½Ã°£
4.2 NmapÀ» »ç¿ëÇÑ Á¤º¸ ¼öÁý
[Âü°í] NMAP
4.3 Nmap °á°ú ºÐ¼®
[Âü°í] 80¹ø Æ÷Æ®°¡ ¿·ÈÀ» ¶§
4.4 Exploit(Searchsploit ¸í·É¾î)
[Âü°í] Exploit ÄÚµå ¿ÏÀüÇÑ °æ·Î
4.5 Target ½Ã½ºÅÛ Á¦¾î±Ç È®º¸ ¹æ¹ý
[Âü°í] Reverse Shell Generator
4.6 Exploit(Reverse Shell ¹æ¹ý)
4.7 Post-Exploit(ȨÆäÀÌÁö Á¤º¸ È°¿ë)
4.8 Post-Exploit(±ÇÇÑ »ó½Â µµ±¸ »ç¿ë)
5 Àå • Tryhackme – Basic Pentesting ¼¹ö
5.1 Basic Pentesting ¼¹ö ¿¬°á ¹× Áغñ
5.2 NmapÀ» »ç¿ëÇÑ Á¤º¸ ¼öÁý ¹× ºÐ¼®
5.3 Gobuster¸¦ »ç¿ëÇÑ Á¤º¸ ¼öÁý ¹× ºÐ¼®
[Âü°í] Brute force °ø°Ý(»çÀü ´ëÀÔ °ø°Ý)
[Âü°í] OWASP
5.4 Enum4linux¸¦ »ç¿ëÇÑ Á¤º¸ ¼öÁý ¹× ºÐ¼®
5.5 Hydra¸¦ »ç¿ëÇÑ Brute force °ø°Ý
[Âü°í] HTTP ¼ºñ½º¿¡ ´ëÇÑ Hydra °ø°Ý
[Âü°í] HTTP ¼ºñ½º¿¡ ´ëÇÑ wfuzz °ø°Ý
5.6 Exploit
[Âü°í] ¸®´ª½º °èÁ¤ ¹× Æнº¿öµå ÆÄÀÏ
5.7 ±ÇÇÑ »ó½Â ¹æ¹ý
[Âü°í] SetUID(SUID
5.8 Post Exploit
[Âü°í] Æнº¿öµå ÇØÅ·(John the Ripper)
6 Àå • Tryhackme – Bounty Hacker ¼¹ö
6.1 Bounty Hacker ¼¹ö ¿¬°á ¹× Áغñ
6.2 NmapÀ» »ç¿ëÇÑ Á¤º¸ ¼öÁý ¹× ºÐ¼®
6.3 Gobuster¸¦ »ç¿ëÇÑ Á¤º¸ ¼öÁý ¹× ºÐ¼®
6.4 Anonymous FTP¸¦ »ç¿ëÇÑ Á¤º¸ ¼öÁý ¹× ºÐ¼®
6.5 Brute force °ø°Ý
6.6 Exploit
6.7 ±ÇÇÑ »ó½Â ¹æ¹ý
[Âü°í] sudo¿Í su
7 Àå • Tryhackme – LazyAdmin ¼¹ö
7.1 LazyAdmin ¼¹ö ¿¬°á ¹× Áغñ
7.2 NmapÀ» »ç¿ëÇÑ Á¤º¸ ¼öÁý ¹× ºÐ¼®
7.3 Gobuster¸¦ »ç¿ëÇÑ Á¤º¸ ¼öÁý ¹× ºÐ¼®
7.4 Searchsploit¸¦ »ç¿ëÇÑ Exploit
[Âü°í] ·¹Àκ¸¿ì Å×À̺í
7.5 Reverse ShellÀ» »ç¿ëÇÑ exploit
7.6 Post Exploit
8 Àå • Tryhackme – RootMe ¼¹ö
8.1 RootMe ¼¹ö ¿¬°á ¹× Áغñ
8.2 Reconnaissance(Á¤Âû)
8.3 Exploit(Reverse Shell ¹æ¹ý)
8.4 Exploit(Burp Suite µµ±¸ »ç¿ë)
8.5 »ç¿ëÀÚ ½© ȹµæ
8.6 ±ÇÇÑ »ó½Â(Privilege Escalation)
9 Àå • Tryhackme – Blue ¼¹ö
9.1 Blue ¼¹ö ¿¬°á ¹× Áغñ
9.2 Recon
9.3 ½© ȹµæ(Metasploit »ç¿ë)
[Âü°í] Metasploit Framework(MSF)
9.4 Escalate
9.5 Password Cracking
[Âü°í] LM°ú NTLM
9.6 Find flags
10Àå • Tryhackme – ICE ¼¹ö
10.1 ICE ¼¹ö ¿¬°á ¹× Áغñ
10.2 [Task 2] Recon
10.3 [Task 3] Gain Access
10.4 [Task 4] Escalate
10.5 [Task 5] Looting
10.6 [Task 6] Post-Exploitation
11Àå • Tryhackme – The Cod Caper ¼¹ö
11.1 [Task 1] Intro
11.2 [Task 2] Host Enumeration
11.3 [Task 3] Web Enumeration
11.4 [Task 4] Web Exploitation
[Âü°í] SQL Injection °ø°Ý
11.5 [Task 5] Command Execution
11.6 [Task 6] LinEnum
11.7 [Task 7] pwndbg
[Âü°í] Buffer Overflow °ø°Ý
11.8 [Task 8] Binary-Exploitation : Manually
[Âü°í] Big Endian / Little Endian
11.9 [Task 9] Binary-Exploitation : The pwntools way(Âü°í»çÇ×)
11.10 [Task 10] Finishing the job
12Àå • Tryhackme
12.1 [Task 1] Open for business!
12.2 [Task 1] Let¡¯s go on an adventure!
12.3 [Task 3] Inject the juice
12.4 [Task 4] Who broke my lock?!
12.5 [Task 5] AH! Don¡¯t look!
12.6 [Task 6] Who¡¯s flying this thing?