Category news

Qubit Bridge Post-mortem

On January 28, 2022, Qubit was attacked through their cross-chain bridge. An attacker1 called the deposit function of the Bridge contract2 on Ethereum, passing in a valid resource ID3 that...

Theori Secures Funding from Naver

We are excited to announce that Naver has invested in Theori, an Austin-based cybersecurity startup that provides consulting, training, vulnerability assesment and R&D services. Theoriโ€™s co-founders and employees are security...

Expanding to Korea

Theori is opening its first branch office in South Korea! The official opening date is February 2017 and the office will be located at WeWork Gangnam. We have already assembled...

Introduction

Hello, everybody! Itโ€™s actually been a couple months since we started operating, but weโ€™ve been busy with traveling and stuff. We are glad to finally roll our website blog where...

Category research

Linux Kernel Exploit (CVE-2022-32250) with mqueue

Background Netfilter is a framework in the Linux kernel for implementing various networking-related tasks with user-defined handlers. Netfilter provides various functions for packet filtering, network address translation and port translation,...

Binary-searching into CVMServer

During the analysis of the patch for CVE-2021-30724 while writing a Fermium-252 report, our researcher (@jinmo123) discovered a vulnerability introduced by the patch. The vulnerability was reported to Apple and...

Exploiting Safari's ANGLE Component

In early 2022, I (@singi21a) found an interesting bug in WebKit WebGL Component during the code audit. This bug is exploitable and macOS/iOS Safari is affected. The bug is assigned...

2021 Hot๐Ÿ”ฅ ๋ณด์•ˆ ์‚ฌ๊ฑด ์‚ฌ๊ณ  - ํ•˜๋ฐ˜๊ธฐ

์•ž์„  ํฌ์ŠคํŠธ์—์„œ๋Š” ์ƒ๋ฐ˜๊ธฐ์— ๋ฐœ์ƒํ•œ Hot๐Ÿ”ฅ ํ–ˆ๋˜ CVE์™€ ๋ณด์•ˆ ์‚ฌ๊ฑด/์‚ฌ๊ณ ๋ฅผ ๋‹ค๋ฃจ์—ˆ์Šต๋‹ˆ๋‹ค. ์ด๋ฒˆ ์‹œ๊ฐ„์—๋Š” ํ•˜๋ฐ˜๊ธฐ์— ๋Œ€ํ•ด ๋‹ค๋ฃจ๋„๋ก ํ•˜๊ฒ ์Šต๋‹ˆ๋‹ค !

2021 Hot๐Ÿ”ฅ ๋ณด์•ˆ ์‚ฌ๊ฑด ์‚ฌ๊ณ  - ์ƒ๋ฐ˜๊ธฐ

๋‹ค์‚ฌ๋‹ค๋‚œ ํ–ˆ๋˜ 2021, ์ฝ”๋กœ๋‚˜๋กœ ์ธํ•ด ๋‹ค์–‘ํ•œ ๋ถ„์•ผ์—์„œ ๋น ๋ฅธ ์†๋„๋กœ ๋””์ง€ํ„ธํ™”๊ฐ€ ์ง„ํ–‰๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ๊ทธ๋กœ์ธํ•ด ๋‹ค์–‘ํ•œ ์†Œํ”„ํŠธ์›จ์–ด ๋ฐ ์„œ๋น„์Šค์—์„œ ์ทจ์•ฝ์  ๋ฐ ๋ณด์•ˆ ์‚ฌ๊ณ ๊ฐ€ ๋ฐœ์ƒํ–ˆ๋˜ ํ•ด๊ฐ€ ์•„๋‹Œ๊ฐ€ ์‹ถ์Šต๋‹ˆ๋‹ค. ๊ทธ ์ค‘ Hot๐Ÿ”ฅ ํ–ˆ๋˜ CVE์™€ ๋ณด์•ˆ...

Patch Gapping a Safari Type Confusion

Safari 14.1 shipped in late April with many new features, including its long-awaited implementation of AudioWorklets. Shortly after, a commit landed in WebKit, fixing an AudioWorklet bug which โ€œcrashes Safariโ€....

๊ฒŒ์ž„ํ•ต์˜ ์›๋ฆฌ์— ๋Œ€ํ•ด ์•Œ์•„๋ณด์ž (3) - ์—์ž„๋ด‡ ํŽธ

์—์ž„๋ด‡(Aimbot)์€ ํ”Œ๋ ˆ์ด์–ด๊ฐ€ ์กฐ์ค€์ ์„ ์›€์ง์ด์ง€ ์•Š์•„๋„ ์ž๋™์œผ๋กœ ์ ์„ ์กฐ์ค€์‹œํ‚ค๋Š” ํ•ต์ด๋‹ค. ์ด ํ•ต์€ ๊ตญ๋‚ด์—์„œ โ€˜์—์ž„ํ•ตโ€™, โ€˜์˜คํ† ์—์ž„โ€™์œผ๋กœ ์•Œ๋ ค์กŒ์ง€๋งŒ, ํ•ด์™ธ์—์„œ๋Š” ์˜ค๋ž˜์ „๋ถ€ํ„ฐ ์—์ž„๋ด‡์ด๋ผ๋Š” ์ด๋ฆ„์œผ๋กœ ์‚ฌ์šฉ๋˜์–ด ์™”๋‹ค. ๊ทธ๋Ÿผ, ์ด ์—์ž„๋ด‡์˜ ์›๋ฆฌ์— ๋Œ€ํ•ด ์•Œ์•„๋ณด์ž.

Analyzing Clubhouse for fun and profit

Clubhouse (์ดํ•˜ โ€œํด๋Ÿฝํ•˜์šฐ์Šคโ€)๋Š” 2020๋…„ Alpha Exploration Co ์‚ฌ์—์„œ ๊ฐœ๋ฐœํ•œ ์˜ค๋””์˜ค ์ฑ„ํŒ… ํ˜•ํƒœ์˜ ์†Œ์…œ ๋„คํŠธ์›Œํ‚น ์•ฑ์ž…๋‹ˆ๋‹ค. ์ตœ๊ทผ ํ•œ๊ตญ์—์„œ๋„ ์ธ๊ธฐ๋ฅผ ๋”ํ•˜๋ฉฐ ์ดˆ๋Œ€์žฅ์ด ๋‹น๊ทผ๋งˆ์ผ“์—์„œ ํŒ๋งค๋˜๊ฑฐ๋‚˜ ํด๋Ÿฝํ•˜์šฐ์Šค๋ฅผ ์‚ฌ์šฉํ•ด๋ณด๊ธฐ ์œ„ํ•ด ์ค‘๊ณ  ์•„์ดํฐ์„ ๊ตฌ๋งคํ•˜๋Š” ์‚ฌ๋žŒ๋“ค๋„ ์ƒ๊ธธ...

๊ฒŒ์ž„ํ•ต์˜ ์›๋ฆฌ์— ๋Œ€ํ•ด ์•Œ์•„๋ณด์ž (2) - ESP ํŽธ

ESP๋ผ๊ณ  ๋ถˆ๋ฆฌ๋Š” ์ด ํ•ต์€ ์ ์˜ ์œ„์น˜๊ฐ€ ํ™”๋ฉด์— ๋‚˜ํƒ€๋‚œ๋‹ค. ESP๋Š” ExtraSensory Perception, ์ดˆ๊ฐ๊ฐ์  ์ง€๊ฐ์ด๋ผ๋Š” ๋œป์ด๋‹ค. ์›”ํ•ต๊ณผ ์œ ์‚ฌํ•ด ๋ณด์ด์ง€๋งŒ ์บ๋ฆญํ„ฐ ๋ง๊ณ ๋„ ๋ฌผ์ฒด์˜ ์ƒํƒœ๋‚˜ ์ •๋ณด๋ฅผ ํ™”๋ฉด์— ํ‘œ์‹œํ•ด์ฃผ๋Š” ์ ์—์„œ ์ฐจ์ด๋ฅผ ๋ณด์ธ๋‹ค.

๊ฒŒ์ž„ํ•ต์˜ ์›๋ฆฌ์— ๋Œ€ํ•ด ์•Œ์•„๋ณด์ž (1) - Wall Hack ํŽธ

FPS ๊ฒŒ์ž„์—์„œ ์ž์ฃผ ๋ฐœ๊ฒฌ๋˜๋Š” โ€œWall Hackโ€ (์›”ํ•ต)์€ ๋ฒฝ ๋„ˆ๋จธ์˜ ์ ์„ ๋ณด์—ฌ์ฃผ์–ด ์œ„์น˜๋ฅผ ์•Œ ์ˆ˜ ์žˆ๋„๋ก ํ•œ๋‹ค. ์›”ํ•ต์„ ๊ตฌํ˜„ํ•˜๋Š” ๋ฐฉ๋ฒ•์€ ๊ทธ๋ž˜ํ”ฝ ๋ Œ๋”๋ง ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ๋งˆ๋‹ค ์กฐ๊ธˆ์”ฉ ๋‹ค๋ฅด๋‹ค.

Compromising virtualization without attacking the hypervisor

This post explains a denial-of-service (and potentially out-of-bounds write) vulnerability (CVE-2020-27675, XSA-331) we discovered in the Xen paravirtualization driver in Linux, and how a virtualization platform may be compromised without...

Cleanly Escaping the Chrome Sandbox

This post will explain how we discovered and exploited Issue 1062091, a use-after-free (UAF) in the browser process leading to a sandbox escape in Google Chrome as well as Chromium-based...

Taming architecture complexity in V8 (Translation)

CSA๋Š” ํฌ๋กฌ ๋‚ด๋ถ€์˜ ์ž๋ฐ”์Šคํฌ๋ฆฝํŠธ ์—”์ง„์ธ V8์—์„œ ์‚ฌ์šฉ๋˜๋Š” ์ค‘์š”ํ•œ ๊ตฌ์„ฑ ์š”์†Œ์ž…๋‹ˆ๋‹ค. V8์˜ ์†๋„ ํ–ฅ์ƒ์— ํฌ๊ฒŒ ๊ธฐ์—ฌํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ตœ๊ทผ V8์—์„œ ๋‚ด๋ถ€์ ์œผ๋กœ ์‚ฌ์šฉ๋˜๋Š” ์–ธ์–ด์ธ Torque์™€๋„ ๊ด€๋ จ์ด ๊นŠ์Šต๋‹ˆ๋‹ค. ๊ทธ๋ฟ ์•„๋‹ˆ๋ผ ๊ด€๋ จ ์ฝ”๋“œ์—์„œ ์—ฌ๋Ÿฌ ๋ฒ„๊ทธ...

Reverse Engineering Crypto Algorithms From Libraries

ํ•œ๊ตญ์—์„œ ์ธํ„ฐ๋„ท ๋ฑ…ํ‚น์ด๋‚˜ ํ™ˆํƒ์Šค ๊ฐ™์€ ์—…๋ฌด๋ฅผ ๋ณด๋ ค๋ฉด ActiveX ์ปดํฌ๋„ŒํŠธ๋ถ€ํ„ฐ ์‹œ์ž‘ํ•ด์„œ ๋งค์šฐ ๋‹ค์–‘ํ•œ ์ข…๋ฅ˜์˜ โ€œ๋ณด์•ˆโ€ ์†”๋ฃจ์…˜๋“ค์„ ์„ค์น˜ํ•ด์•ผ๋งŒ ํ•œ๋‹ค. ํ•˜์ง€๋งŒ, ์ด๋Ÿฌํ•œ ๋ณด์•ˆ ์†”๋ฃจ์…˜๋“ค์ด ์ •๋ง๋กœ ์œ ์ €๋“ค์˜ ๋ณด์•ˆ์„ ์ž˜ ์ง€์ผœ์ฃผ๋„๋ก ์„ค๊ณ„๋˜๊ณ  ๊ตฌํ˜„๋˜์–ด ์žˆ์„๊นŒ? ๊ณผ๊ฑฐ์—๋„...

NEAT and NES Algorithms

The South Korean Ministry of the Interior provides a cryptography library for its GPKI program. This library contains two symmetric encryption algorithms, NEAT and NES, which have not been published....

Receiving NRSC-5

NRSC-5-C is the standard for digital terrestial radio in the United States. The physical layer and protocols are well documented on the NRSCโ€™s website. The audio compression details are conspicuously...

OS X Kernel Exploit Case Study

๋ณธ ๋ฌธ์„œ์—์„œ๋Š” macOS Sierra 10.12.2์—์„œ ๋ฐœ์ƒํ–ˆ๋˜ CVE-2017-2370 ์ทจ์•ฝ์ ์„ ์ด์šฉํ•ด ๊ณต๊ฒฉ์„ ์‹œ๋„ํ•˜์˜€์œผ๋ฉฐ, ์ด์— ๋”ฐ๋ผ ์ต์Šคํ”Œ๋กœ์ž‡ ์ž‘์„ฑ ์‹œ ํ•„์š”ํ•œ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•œ๋‹ค.

OS X Kernel Exploit ๊ธฐ์ดˆ (OS X 10.12 Sierra)

์ตœ๊ทผ ๋งŽ์€ ์—ฐ๊ตฌ๋“ค์ด Windows ์šด์˜์ฒด์ œ์— ์ดˆ์ ์ด ๋งž์ถ”์–ด์ ธ ์žˆ์ง€๋งŒ, ๋ณด์•ˆ์ ์ธ ์ธก๋ฉด์—์„œ ์•„์ดํฐ๊ณผ ๋งฅ๋ถ์— ํƒ‘์žฌ๋˜๋Š” iOS์™€ macOS๋ฅผ ๋นผ๋†“์„ ์ˆ˜ ์—†๋‹ค. ์ด๋ฒˆ ๋ธ”๋กœ๊ทธ ์‹œ๋ฆฌ์ฆˆ๋ฅผ ํ†ตํ•ด์„œ OS X ์ปค๋„์—์„œ์˜ ๋ฒ„๊ทธ ๋ถ„์„ ๋ฐ ์ต์Šคํ”Œ๋กœ์ž‡ ๊ธฐ๋ฒ•...

Chakra JIT CFG Bypass

As promised in our previous blog post, we are going to take a look at a method to bypass Microsoftโ€™s Control Flow Guard (CFG) when attacking Internet Explorer and Edge...

Patch Analysis of MS16-063 (jscript9.dll)

A couple weeks ago, Microsoft released the MS16-063 security bulletin for their monthly Patch Tuesday (June 2016) security updates. It addressed vulnerabilities that affected Internet Explorer. Among other things, the...

Patch Analysis of CVE-2016-0189

Last month, Microsoft released the MS16-051 security bulletin for their monthly Patch Tuesday (May 2016) security updates. It addressed vulnerabilities that affected Internet Explorer, including the Scripting Engine Memory Corruption...

Category korean

2021 Hot๐Ÿ”ฅ ๋ณด์•ˆ ์‚ฌ๊ฑด ์‚ฌ๊ณ  - ํ•˜๋ฐ˜๊ธฐ

์•ž์„  ํฌ์ŠคํŠธ์—์„œ๋Š” ์ƒ๋ฐ˜๊ธฐ์— ๋ฐœ์ƒํ•œ Hot๐Ÿ”ฅ ํ–ˆ๋˜ CVE์™€ ๋ณด์•ˆ ์‚ฌ๊ฑด/์‚ฌ๊ณ ๋ฅผ ๋‹ค๋ฃจ์—ˆ์Šต๋‹ˆ๋‹ค. ์ด๋ฒˆ ์‹œ๊ฐ„์—๋Š” ํ•˜๋ฐ˜๊ธฐ์— ๋Œ€ํ•ด ๋‹ค๋ฃจ๋„๋ก ํ•˜๊ฒ ์Šต๋‹ˆ๋‹ค !

2021 Hot๐Ÿ”ฅ ๋ณด์•ˆ ์‚ฌ๊ฑด ์‚ฌ๊ณ  - ์ƒ๋ฐ˜๊ธฐ

๋‹ค์‚ฌ๋‹ค๋‚œ ํ–ˆ๋˜ 2021, ์ฝ”๋กœ๋‚˜๋กœ ์ธํ•ด ๋‹ค์–‘ํ•œ ๋ถ„์•ผ์—์„œ ๋น ๋ฅธ ์†๋„๋กœ ๋””์ง€ํ„ธํ™”๊ฐ€ ์ง„ํ–‰๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ๊ทธ๋กœ์ธํ•ด ๋‹ค์–‘ํ•œ ์†Œํ”„ํŠธ์›จ์–ด ๋ฐ ์„œ๋น„์Šค์—์„œ ์ทจ์•ฝ์  ๋ฐ ๋ณด์•ˆ ์‚ฌ๊ณ ๊ฐ€ ๋ฐœ์ƒํ–ˆ๋˜ ํ•ด๊ฐ€ ์•„๋‹Œ๊ฐ€ ์‹ถ์Šต๋‹ˆ๋‹ค. ๊ทธ ์ค‘ Hot๐Ÿ”ฅ ํ–ˆ๋˜ CVE์™€ ๋ณด์•ˆ...

๊ฒŒ์ž„ํ•ต์˜ ์›๋ฆฌ์— ๋Œ€ํ•ด ์•Œ์•„๋ณด์ž (3) - ์—์ž„๋ด‡ ํŽธ

์—์ž„๋ด‡(Aimbot)์€ ํ”Œ๋ ˆ์ด์–ด๊ฐ€ ์กฐ์ค€์ ์„ ์›€์ง์ด์ง€ ์•Š์•„๋„ ์ž๋™์œผ๋กœ ์ ์„ ์กฐ์ค€์‹œํ‚ค๋Š” ํ•ต์ด๋‹ค. ์ด ํ•ต์€ ๊ตญ๋‚ด์—์„œ โ€˜์—์ž„ํ•ตโ€™, โ€˜์˜คํ† ์—์ž„โ€™์œผ๋กœ ์•Œ๋ ค์กŒ์ง€๋งŒ, ํ•ด์™ธ์—์„œ๋Š” ์˜ค๋ž˜์ „๋ถ€ํ„ฐ ์—์ž„๋ด‡์ด๋ผ๋Š” ์ด๋ฆ„์œผ๋กœ ์‚ฌ์šฉ๋˜์–ด ์™”๋‹ค. ๊ทธ๋Ÿผ, ์ด ์—์ž„๋ด‡์˜ ์›๋ฆฌ์— ๋Œ€ํ•ด ์•Œ์•„๋ณด์ž.

Analyzing Clubhouse for fun and profit

Clubhouse (์ดํ•˜ โ€œํด๋Ÿฝํ•˜์šฐ์Šคโ€)๋Š” 2020๋…„ Alpha Exploration Co ์‚ฌ์—์„œ ๊ฐœ๋ฐœํ•œ ์˜ค๋””์˜ค ์ฑ„ํŒ… ํ˜•ํƒœ์˜ ์†Œ์…œ ๋„คํŠธ์›Œํ‚น ์•ฑ์ž…๋‹ˆ๋‹ค. ์ตœ๊ทผ ํ•œ๊ตญ์—์„œ๋„ ์ธ๊ธฐ๋ฅผ ๋”ํ•˜๋ฉฐ ์ดˆ๋Œ€์žฅ์ด ๋‹น๊ทผ๋งˆ์ผ“์—์„œ ํŒ๋งค๋˜๊ฑฐ๋‚˜ ํด๋Ÿฝํ•˜์šฐ์Šค๋ฅผ ์‚ฌ์šฉํ•ด๋ณด๊ธฐ ์œ„ํ•ด ์ค‘๊ณ  ์•„์ดํฐ์„ ๊ตฌ๋งคํ•˜๋Š” ์‚ฌ๋žŒ๋“ค๋„ ์ƒ๊ธธ...

๊ฒŒ์ž„ํ•ต์˜ ์›๋ฆฌ์— ๋Œ€ํ•ด ์•Œ์•„๋ณด์ž (2) - ESP ํŽธ

ESP๋ผ๊ณ  ๋ถˆ๋ฆฌ๋Š” ์ด ํ•ต์€ ์ ์˜ ์œ„์น˜๊ฐ€ ํ™”๋ฉด์— ๋‚˜ํƒ€๋‚œ๋‹ค. ESP๋Š” ExtraSensory Perception, ์ดˆ๊ฐ๊ฐ์  ์ง€๊ฐ์ด๋ผ๋Š” ๋œป์ด๋‹ค. ์›”ํ•ต๊ณผ ์œ ์‚ฌํ•ด ๋ณด์ด์ง€๋งŒ ์บ๋ฆญํ„ฐ ๋ง๊ณ ๋„ ๋ฌผ์ฒด์˜ ์ƒํƒœ๋‚˜ ์ •๋ณด๋ฅผ ํ™”๋ฉด์— ํ‘œ์‹œํ•ด์ฃผ๋Š” ์ ์—์„œ ์ฐจ์ด๋ฅผ ๋ณด์ธ๋‹ค.

๊ฒŒ์ž„ํ•ต์˜ ์›๋ฆฌ์— ๋Œ€ํ•ด ์•Œ์•„๋ณด์ž (1) - Wall Hack ํŽธ

FPS ๊ฒŒ์ž„์—์„œ ์ž์ฃผ ๋ฐœ๊ฒฌ๋˜๋Š” โ€œWall Hackโ€ (์›”ํ•ต)์€ ๋ฒฝ ๋„ˆ๋จธ์˜ ์ ์„ ๋ณด์—ฌ์ฃผ์–ด ์œ„์น˜๋ฅผ ์•Œ ์ˆ˜ ์žˆ๋„๋ก ํ•œ๋‹ค. ์›”ํ•ต์„ ๊ตฌํ˜„ํ•˜๋Š” ๋ฐฉ๋ฒ•์€ ๊ทธ๋ž˜ํ”ฝ ๋ Œ๋”๋ง ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ๋งˆ๋‹ค ์กฐ๊ธˆ์”ฉ ๋‹ค๋ฅด๋‹ค.

Naver Cloud Container Registry Garbage Collection

Theori์—์„œ ๊ฐœ๋ฐœํ•˜๊ณ  ์žˆ๋Š” ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๊ต์œก ํ”Œ๋žซํผ Dreamhack์—์„œ๋Š” NAVER CLOUD PLATFORM์„ ์ด์šฉํ•ด ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค.

Taming architecture complexity in V8 (Translation)

CSA๋Š” ํฌ๋กฌ ๋‚ด๋ถ€์˜ ์ž๋ฐ”์Šคํฌ๋ฆฝํŠธ ์—”์ง„์ธ V8์—์„œ ์‚ฌ์šฉ๋˜๋Š” ์ค‘์š”ํ•œ ๊ตฌ์„ฑ ์š”์†Œ์ž…๋‹ˆ๋‹ค. V8์˜ ์†๋„ ํ–ฅ์ƒ์— ํฌ๊ฒŒ ๊ธฐ์—ฌํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ตœ๊ทผ V8์—์„œ ๋‚ด๋ถ€์ ์œผ๋กœ ์‚ฌ์šฉ๋˜๋Š” ์–ธ์–ด์ธ Torque์™€๋„ ๊ด€๋ จ์ด ๊นŠ์Šต๋‹ˆ๋‹ค. ๊ทธ๋ฟ ์•„๋‹ˆ๋ผ ๊ด€๋ จ ์ฝ”๋“œ์—์„œ ์—ฌ๋Ÿฌ ๋ฒ„๊ทธ...

Reverse Engineering Crypto Algorithms From Libraries

ํ•œ๊ตญ์—์„œ ์ธํ„ฐ๋„ท ๋ฑ…ํ‚น์ด๋‚˜ ํ™ˆํƒ์Šค ๊ฐ™์€ ์—…๋ฌด๋ฅผ ๋ณด๋ ค๋ฉด ActiveX ์ปดํฌ๋„ŒํŠธ๋ถ€ํ„ฐ ์‹œ์ž‘ํ•ด์„œ ๋งค์šฐ ๋‹ค์–‘ํ•œ ์ข…๋ฅ˜์˜ โ€œ๋ณด์•ˆโ€ ์†”๋ฃจ์…˜๋“ค์„ ์„ค์น˜ํ•ด์•ผ๋งŒ ํ•œ๋‹ค. ํ•˜์ง€๋งŒ, ์ด๋Ÿฌํ•œ ๋ณด์•ˆ ์†”๋ฃจ์…˜๋“ค์ด ์ •๋ง๋กœ ์œ ์ €๋“ค์˜ ๋ณด์•ˆ์„ ์ž˜ ์ง€์ผœ์ฃผ๋„๋ก ์„ค๊ณ„๋˜๊ณ  ๊ตฌํ˜„๋˜์–ด ์žˆ์„๊นŒ? ๊ณผ๊ฑฐ์—๋„...

OS X Kernel Exploit Case Study

๋ณธ ๋ฌธ์„œ์—์„œ๋Š” macOS Sierra 10.12.2์—์„œ ๋ฐœ์ƒํ–ˆ๋˜ CVE-2017-2370 ์ทจ์•ฝ์ ์„ ์ด์šฉํ•ด ๊ณต๊ฒฉ์„ ์‹œ๋„ํ•˜์˜€์œผ๋ฉฐ, ์ด์— ๋”ฐ๋ผ ์ต์Šคํ”Œ๋กœ์ž‡ ์ž‘์„ฑ ์‹œ ํ•„์š”ํ•œ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•œ๋‹ค.

OS X Kernel Exploit ๊ธฐ์ดˆ (OS X 10.12 Sierra)

์ตœ๊ทผ ๋งŽ์€ ์—ฐ๊ตฌ๋“ค์ด Windows ์šด์˜์ฒด์ œ์— ์ดˆ์ ์ด ๋งž์ถ”์–ด์ ธ ์žˆ์ง€๋งŒ, ๋ณด์•ˆ์ ์ธ ์ธก๋ฉด์—์„œ ์•„์ดํฐ๊ณผ ๋งฅ๋ถ์— ํƒ‘์žฌ๋˜๋Š” iOS์™€ macOS๋ฅผ ๋นผ๋†“์„ ์ˆ˜ ์—†๋‹ค. ์ด๋ฒˆ ๋ธ”๋กœ๊ทธ ์‹œ๋ฆฌ์ฆˆ๋ฅผ ํ†ตํ•ด์„œ OS X ์ปค๋„์—์„œ์˜ ๋ฒ„๊ทธ ๋ถ„์„ ๋ฐ ์ต์Šคํ”Œ๋กœ์ž‡ ๊ธฐ๋ฒ•...

Category development

Naver Cloud Container Registry Garbage Collection

Theori์—์„œ ๊ฐœ๋ฐœํ•˜๊ณ  ์žˆ๋Š” ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๊ต์œก ํ”Œ๋žซํผ Dreamhack์—์„œ๋Š” NAVER CLOUD PLATFORM์„ ์ด์šฉํ•ด ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค.

Category culture

ํ‹ฐ์˜ค๋ฆฌ๊ฐ€ ๊ถ๊ธˆํ•ด์š”๐Ÿข_DSMHS ํ•™์ƒ๋“ค์˜ ๊ธฐ์—…ํƒ๋ฐฉ ์ด์•ผ๊ธฐ

์•ˆ๋…•ํ•˜์„ธ์š” ์—ฌ๋Ÿฌ๋ถ„! ํ‹ฐ์˜ค๋ฆฌ ๋งˆ์ผ€ํŒ… ํŒ€ ์‹ ์ž… yerim ์ธ์‚ฌ๋“œ๋ฆฝ๋‹ˆ๋‹ค ๐Ÿ˜Š

#2 Theori in Jeju๐ŸŒด_์ œ6ํšŒ ํ‹ฐ์˜ค๋ฆฌ ์›Œํฌ์ƒต ์Šค์ผ€์น˜

** ๋ณธ ์›Œํฌ์ƒต์€ ์‚ฌํšŒ์  ๊ฑฐ๋ฆฌ๋‘๊ธฐ๊ฐ€ ํ•ด์ œ๋˜์—ˆ์„ ๋•Œ ๋‹ค๋…€์™”์œผ๋ฉฐ, ํ‹ฐ์˜ค๋ฆฌ ๊ตฌ์„ฑ์› ๋ชจ๋‘ ๋ฐฉ์—ญ ์ˆ˜์น™์„ ์ค€์ˆ˜ํ•˜์˜€์Šต๋‹ˆ๋‹ค ** ** ์ฆ๊ฑฐ์› ๋˜ ์›Œํฌ์ƒต์˜ ๋ถ„์œ„๊ธฐ๋ฅผ ๊ณ ์Šค๋ž€ํžˆ ๋‹ด๊ณ ์ž ์‚ฌ์ง„์ด ์•„์ฃผ ์•„์ฃผ ๋งŽ์Œ์„ ์•Œ๋ ค๋“œ๋ฆฝ๋‹ˆ๋‹ค ** ์•ˆ๋…•ํ•˜์„ธ์š”, ํ‹ฐ์˜ค๋ฆฌ ์ปค๋ฎค๋‹ˆํ‹ฐ...

#1 Theori in Jeju๐ŸŒด_์ œ6ํšŒ ํ‹ฐ์˜ค๋ฆฌ ์›Œํฌ์ƒต ์Šค์ผ€์น˜

** ๋ณธ ์›Œํฌ์ƒต์€ ์‚ฌํšŒ์  ๊ฑฐ๋ฆฌ๋‘๊ธฐ๊ฐ€ ํ•ด์ œ๋˜์—ˆ์„ ๋•Œ ๋‹ค๋…€์™”์œผ๋ฉฐ, ํ‹ฐ์˜ค๋ฆฌ ๊ตฌ์„ฑ์› ๋ชจ๋‘ ๋ฐฉ์—ญ ์ˆ˜์น™์„ ์ค€์ˆ˜ํ•˜์˜€์Šต๋‹ˆ๋‹ค ** ** ์ฆ๊ฑฐ์› ๋˜ ์›Œํฌ์ƒต์˜ ๋ถ„์œ„๊ธฐ๋ฅผ ๊ณ ์Šค๋ž€ํžˆ ๋‹ด๊ณ ์ž ์‚ฌ์ง„์ด ์•„์ฃผ ์•„์ฃผ ๋งŽ์Œ์„ ์•Œ๋ ค๋“œ๋ฆฝ๋‹ˆ๋‹ค ** ์•ˆ๋…•ํ•˜์„ธ์š”, ํ‹ฐ์˜ค๋ฆฌ ์ปค๋ฎค๋‹ˆํ‹ฐ...

Welcome to Theori ๐Ÿ‘‹_ํ‹ฐ์˜ค๋ฆฌ ์›ฐ์ปดํ‚คํŠธ ์ œ์ž‘๊ธฐ

์•ˆ๋…•ํ•˜์„ธ์š”, ํ‹ฐ์˜ค๋ฆฌ ์ปค๋ฎค๋‹ˆํ‹ฐ ๋งค๋‹ˆ์ € otwi, ๋””์ž์ด๋„ˆ soi์ž…๋‹ˆ๋‹ค! ์—ฌ๋Ÿฌ๋ถ„์˜ ์ฒซ ์ถœ๊ทผ์€ ์–ด๋– ์…จ๋‚˜์š”? ์–ด์ƒ‰ํ•œ ๊ฑด๋ฌผ์— ๋“ค์–ด์™€ ํ•จ๊ป˜ ์ผํ•  ์‚ฌ๋žŒ๋“ค์„ ์ฒ˜์Œ ๋งŒ๋‚˜๊ณ , ์ผํ•  ์ž๋ฆฌ๋ฅผ ์•ˆ๋‚ด๋ฐ›๊ณ โ€ฆ ์ €๋Š” ๋‚ฏ์„  ํ™˜๊ฒฝ์ด ๊ดœํžˆ ์–ด์ƒ‰ํ•ด์„œ ๋ฌผ ๋งˆ์‹œ๋Š” ์‚ฌ์†Œํ•œ...