728x90 ๋ฐ์ํ Lucete284 individual bands of image.py from PIL import Imageimport numpy as np im = Image.open('heartbleed.png') # In this case, it's a 3-band (red, green, blue) image# so we'll unpack the bands into 3 separate 2D arrays.r, g, b = np.array(im).T # Let's make an alpha (transparency) band based on where blue is < 100a = np.zeros_like(b)a[b Language 2016. 12. 21. RGB image analysis.py import numpy as npimport mpl_toolkits.mplot3d.axes3d as p3import matplotlib.pyplot as pltimport colorsysfrom PIL import Image # (1) Import the file to be analyzed!img_file = Image.open("sunset.jpg")img = img_file.load() # (2) Get image width & height in pixels[xs, ys] = img_file.sizemax_intensity = 100hues = {} # (3) Examine each pixel in the image filefor x in xrange(0, xs): for y in xrange(0, .. Language 2016. 12. 21. image GPS.py from PIL import Imagefrom PIL.ExifTags import TAGS filename = "sunset.jpg"extension = filename.split('.')[-1]if (extension == 'jpg') | (extension == 'JPG') | (extension == 'jpeg') | (extension == 'JPEG') | (extension == 'PNG') |(extension == 'png'): try: img = Image.open(filename) info = img._getexif() exif = {} for tag, value in info.items(): decoded = TAGS.get(tag, tag) exif[decoded] = value #.. Language 2016. 12. 21. base image.py from PIL import Image img = Image.open("filename.jpg")print(img.size)print(img.format) img.show() Language 2016. 12. 21. Heartbleed :) ํํธ๋ธ๋ฆฌ๋ heartbleed ๋ 2015๋ ๋ณด์ ์ทจ์ฝ์ ์ค ๋ํ์ ์ธ ์ทจ์ฝ์ ์ด๋ผ ํ ์ ์๋ค. heartbleed ์ทจ์ฝ์ ์ ๊ณต๊ฒฉ์๊ฐ ์๋ฒ์ ๋ฉ๋ชจ๋ฆฌ์ ์ผ๋ถ๋ถ์ ์ฝ์ด ์ฌ ์ ์๋ openSSL์ ์ทจ์ฝ์ ์ผ๋ก ์์ฒญํ ๋ ์์ฒญํ ๋จ์ด๊ฐ ๋ง์ฝ aaa์ด๋ฉด 3๋ฐ์ดํธ๋ฅผ ์์ฒญํ๋ฉด ๋๋๋ฐ ์ด ๋ณด๋ค ๋ ํฐ ๋ฐ์ดํธ์ธ 500์ ํ๊ฒ ๋๋ค๋ฉด aaa๋ฅผ ๋ฐํํ๊ณ ๋จ์ ๋ฉ๋ชจ๋ฆฌ๋ฅผ ๋ค๋ฅธ ๊ฐ์ผ๋ก ๋ฑ์ด ์ฃผ๋ ์ทจ์ฝ์ ์ ๋งํ๋ค. ์ทจ์ฝ์ ์ ์ค์ตํด๋ณผ ๋์๋ 1. https://raw.githubusercontent.com/HackerFantastic/Public/master/exploits/heartbleed.c์ฌ๊ธฐ์ ๋ค์ด์ ๋ฐ์ ํ 2. gcc heartbleed.c -o heartbleed -Wl,-Bstatic -ssl -Wl,-Bdynamic -lssl3 .. Metasploit 2016. 12. 21. python ๊ฐ์ ํ์ผ ๋ฝ์๋ด๊ธฐ :) ์ฌ์ ํ์ผ์ ํ์ผ์ด๋ฆ๊ณผ ํด๋๋ฅผ ์ง์ ํด์ฃผ๋ฉด ์ค๋ณตํ์ผ์ ๋ฝ์์ค๋๋ค :) # -*- coding: utf-8 -*- import os f = open('/Users/z3alous/Desktop/flag1.txt', 'w') Language 2016. 12. 18. md5 ํ๋ฒ์ ์ธ์ฝ๋ฉํ๊ธฐ :) ex)ํด๋์ง์ # -*- coding: utf-8 -*-import hashlibimport os f = open('/Users/z3alous/Desktop/flag.txt', 'w') def md5(fname): hash_md5 = hashlib.md5() with open(fname, "rb") as f: for chunk in iter(lambda: f.read(4096), b""): hash_md5.update(chunk) return hash_md5.hexdigest() for root, dirs, files in os.walk('ํด๋ ๊ฒฝ๋ก'): for fname in files: full_fname = os.path.join(root, fname) f.write(md5(full_fname) + '\n') f.. Language 2016. 12. 18. nmap tutorial :) nmap์ network mapper์ ์ค์ธ๋ง๋ก ๋คํธ์ํฌ๋ฅผ ๊ฒ์ํ ๋ ๋งค์ฐ ์ข์ ํด์ด์ง๋ง ํด์ปค์๊ฒ ๊ฐํ ๋ฌด๊ธฐ๊ฐ ๋ ์ ์๋ ์คํ ์์ค ์ด๋ค. nmap์ ๊ณต์ ์ฌ์ดํธ๋ www.nmap.org ์ด๋ฉฐ ์ฐ๋ถํฌ ๊ฐ์ ๊ฒฝ์ฐ์ apt-get install nmap Security Study/Network 2016. 12. 17. V3SPA: An Open Source Tool for Visually Analyzing and Diffing SELinux/SE for Android Security Policies V3SPA: An Open Source Tool for Visually Analyzing and Diffing SELinux/SE for Android Security Policies SELinux and SE for Android can be a crucial part of securing a system, but the size and complexity of SELinux security policies make them challenging for security policy administrators to develop and maintain security policies. For example, the sesearch utility shows 94,420 allow rules in the 2.. Security Study/Server(Linux) 2016. 12. 17. youtube ๊ตฌ๋ ๋ถํ๋๋ ค์ :) subscribe plz :) ๋ณด์ ๊ด๋ จ ๋์์์ ์ฌ๋ฆด ์์ ์ ๋๋ค. :)๋ง์ ๊ตฌ๋ ๋ถํ๋๋ ค์ !! https://www.youtube.com/channel/UCn81GCH7RfiOdaZmWfng2Ng We will post security related videos. :)Many subscriptions please !! My Story 2016. 12. 16. RC3CTF_300_Breaking News 300 - Breaking NewsWe just received this transmission from our news correspondents. We need to find out what they are telling us.file ๋ฌธ์ ์ธ๋ฐ ๋ฌธ์ ์ ํ์ผ์ ๋ฐ์๋ณด๋ฉด ์์ง์ผ๋ก ํ์ผ์ ํ๋ ์ฃผ๊ณ ๊ทธ๊ฒ์ ํ๋ฉด ์ด์ ์ฐ๋ฆฌ๊ฐ ํ์ด์ผ ํ๋ ๋ฌธ์ ํ์ผ๋ค์ด ๋์จ๋ค. ๋จผ์ ํฅ์ค๋ก ํ์ผ์ ํ์ธ ํด๋ณด๋ฉด ๋ณ ํน์ดํ ๊ฒ์ด ์๋ ๊ฒ๊ฐ๋ค ํ๋ ํ๋ ๋ณด๋ ๋์ค ๋ง์ง๋ง์ base64๋ก ๋์ฝ๋ฉ์ด ๋์ด ์๋ ๊ฒ ๊ฐ์ ๋ฌธ์์ด์ ๋ฐ๊ฒฌํ๊ณ ํ๋ํ๋ ํ์ผ์์ ๊ทธ๋ฌํ ๊ธ์๋ง ๋ชจ์๋ณด์๋ค. ์ด ๋์จ ํ์ผ์ 5๊ฐ chapter 4, 9, 10, 15, 18 ์ด๋ ๊ฒ ๋์๋ค. ์ด์ base 64 decoding ์ ํด๋ณด์ base 64 ๋์ฝ๋ฉ์ ํ๋.. Wargame/CTF(Capture The Flag) 2016. 12. 16. Mobile Application Reverse Engineering: MARA Mobile Application Reverse engineering and Analysis Framework MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering tools, in order to make the task or reverse engineering and analysis easier and friendly to mobile application developers and security professionals. Features supportedAPK Revers.. Security Study/Reversing 2016. 12. 16. ์ด์ 1 ยทยทยท 8 9 10 11 12 13 14 ยทยทยท 24 ๋ค์ 728x90 ๋ฐ์ํ