Notice
Recent Posts
Recent Comments
Link
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
Tags
- 무결성검증
- 3utools
- reverse shell
- frida-client
- 모바일보안
- 모바일해킹
- goorm
- 동적분석
- checkra1n
- fowarding
- checkrain
- 무료웹ide
- 메모리취약점
- 웹ide
- 프록시
- IDE
- fridump
- frida-server
- ios
- Frida
- android
- frida설정
- frida서버설정
- 안드로이드동적분석
- goormide
- irunit
- m5stack
- m5go
- 중요정보검색
- 위변조탐지
Archives
- Today
- Total
WhiteHat Security
안드로이드 Proxy 설정 방법 (wifi, iptables) 본문
모바일앱 취약점 점검을 위한 Proxy 설정 방법
Wifi 를 이용한 설정
wifi 설정 > SSID 선택 > 네트워크 설정 관리 > 고급 옵션 표시 체크 > 프록시 수동 > 프록시 호스트, 포트 설정
iptables 를 이용한 설정
iptables 를 수정하려면 root 권한이 필요하다.
2|shell@zerofltektt:/ $ iptables -t nat -L
iptables v1.4.20: can't initialize iptables table `nat': Permission denied (you must be root)
Perhaps iptables or your kernel needs to be upgraded.
root 권한으로 변경
id
uid=0(root) gid=0(root) groups=0(root) context=u:r:toolbox:s0
현재 설정 내역 확인 : iptables -t nat -L
iptables -t nat -L
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
oem_nat_pre all -- anywhere anywhere
natctrl_nat_PREROUTING all -- anywhere anywhere
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
natctrl_nat_POSTROUTING all -- anywhere anywhere
st_nat_POSTROUTING all -- anywhere anywhere
Chain natctrl_nat_POSTROUTING (1 references)
target prot opt source destination
Chain natctrl_nat_PREROUTING (1 references)
target prot opt source destination
Chain oem_nat_pre (1 references)
target prot opt source destination
Chain st_nat_POSTROUTING (1 references)
target prot opt source destination
Proxy 설정 : iptables -t nat -A OUTPUT -p tcp -j DNAT --to-destination 192.168.0.27:8080
iptables -t nat -A OUTPUT -p tcp -j DNAT --to-destination 192.168.0.27:8080
iptables -t nat -L
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
oem_nat_pre all -- anywhere anywhere
natctrl_nat_PREROUTING all -- anywhere anywhere
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
DNAT tcp -- anywhere anywhere to:192.168.0.27:8080
사용된 옵션 설명
--table -t table table to manipulate (default: `filter')
--protocol -p proto protocol: by number or name, eg. `tcp'
--append -A chain Append to chain
--jump -j target target for rule (may load target extension)
--destination -d address[/mask][...]
iptables 룰 삭제
iptables -t nat -D OUTPUT 1
* iptables 설정했는데 burp에 프록시가 되지 않을때 아래 설정 체크 필요
invisible proxy support allows non-proxy-aware clients to connect directly to the listener
'보안 > Penetration testing' 카테고리의 다른 글
Blind SQL Injection - Bit 연산 (0) | 2022.07.08 |
---|---|
[Mac] VMware Fusion Nat Port Forwading (0) | 2020.03.24 |
[OSINT] karma 사용법 (0) | 2019.08.06 |
icmpsh을 이용한 리버스쉘 (0) | 2018.09.20 |
Comments