๊ฐ€์น˜ ์ค‘์‹ฌ์˜ Web3 Red Teaming (MITRE AADAPT)

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

MITRE Adversarial Actions in Digital Asset Payment Techniques (AADAPT) ๋งคํŠธ๋ฆญ์Šค๋Š” ์ธํ”„๋ผ๋งŒ์ด ์•„๋‹ˆ๋ผ ๋””์ง€ํ„ธ ๊ฐ€์น˜ ์ž์ฒด๋ฅผ ์กฐ์ž‘ํ•˜๋Š” ๊ณต๊ฒฉ์ž ํ–‰๋™์„ ํฌ์ฐฉํ•ฉ๋‹ˆ๋‹ค. ์ด๋ฅผ ์œ„ํ˜‘ ๋ชจ๋ธ๋ง์˜ ์ฒ™์ถ”(backbone)๋กœ ๋‹ค๋ฃจ์„ธ์š”: ์ž์‚ฐ์„ mint, ๊ฐ€๊ฒฉ๊ฒฐ์ •, ์Šน์ธ, ๋˜๋Š” ๋ผ์šฐํŒ…ํ•  ์ˆ˜ ์žˆ๋Š” ๋ชจ๋“  ๊ตฌ์„ฑ์š”์†Œ๋ฅผ ๋‚˜์—ดํ•˜๊ณ , ํ•ด๋‹น ์ ‘์ ๋“ค์„ AADAPT ๊ธฐ๋ฒ•์— ๋งคํ•‘ํ•œ ๋’ค, ํ™˜๊ฒฝ์ด ๋˜๋Œ๋ฆด ์ˆ˜ ์—†๋Š” ๊ฒฝ์ œ์  ์†์‹ค์„ ๊ฒฌ๋”œ ์ˆ˜ ์žˆ๋Š”์ง€ ์ธก์ •ํ•˜๋Š” red-team ์‹œ๋‚˜๋ฆฌ์˜ค๋ฅผ ์„ค๊ณ„ํ•˜์„ธ์š”.

1. ๊ฐ€์น˜ ๋ณด์œ  ๊ตฌ์„ฑ์š”์†Œ ์ธ๋ฒคํ† ๋ฆฌ ์ž‘์„ฑ

์˜คํ”„์ฒด์ธ์ด๋ผ๋„ ๊ฐ€์น˜ ์ƒํƒœ์— ์˜ํ–ฅ์„ ์ค„ ์ˆ˜ ์žˆ๋Š” ๋ชจ๋“  ๊ฒƒ์„ ๋„์‹ํ™”ํ•˜์„ธ์š”.

  • Custodial signing services (HSM/KMS clusters, Vault/KMaaS, signing APIs used by bots or back-office jobs). ํ‚ค ID, ์ •์ฑ…, ์ž๋™ํ™” ID, ์Šน์ธ ์›Œํฌํ”Œ๋กœ์šฐ๋ฅผ ์บก์ฒ˜ํ•˜์„ธ์š”.
  • Admin & upgrade paths for contracts (proxy admins, governance timelocks, emergency pause keys, parameter registries). ๋ˆ„๊ฐ€/๋ฌด์—‡์ด ํ˜ธ์ถœํ•  ์ˆ˜ ์žˆ๋Š”์ง€, ์–ด๋–ค ์ฟผ๋Ÿผ์ด๋‚˜ ์ง€์—ฐ ์กฐ๊ฑด์ธ์ง€ ํฌํ•จํ•˜์„ธ์š”.
  • On-chain protocol logic handling lending, AMMs, vaults, staking, bridges, or settlement rails. ๊ทธ๋“ค์ด ๊ฐ€์ •ํ•˜๋Š” ๋ถˆ๋ณ€์กฐ๊ฑด(invariants)๋“ค์„ ๋ฌธ์„œํ™”ํ•˜์„ธ์š” (oracle prices, collateral ratios, rebalance cadenceโ€ฆ).
  • Off-chain automation that builds transactions (market-making bots, CI/CD pipelines, cron jobs, serverless functions). ์ด๋Ÿฌํ•œ ๊ฒƒ๋“ค์€ ์„œ๋ช… ์š”์ฒญ์„ ํ•  ์ˆ˜ ์žˆ๋Š” API ํ‚ค๋‚˜ ์„œ๋น„์Šค ์ฃผ์ฒด๋ฅผ ๋ณด์œ ํ•˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ์Šต๋‹ˆ๋‹ค.
  • Oracles & data feeds (aggregator composition, quorum, deviation thresholds, update cadence). ์ž๋™ํ™”๋œ ๋ฆฌ์Šคํฌ ๋กœ์ง์ด ์˜์กดํ•˜๋Š” ๋ชจ๋“  ์—…์ŠคํŠธ๋ฆผ์„ ๊ธฐ๋กํ•˜์„ธ์š”.
  • Bridges and cross-chain routers (lock/mint contracts, relayers, settlement jobs) ์ฒด์ธ์ด๋‚˜ ๊ด€๋ฆฌ ์„œ๋น„์Šค ์Šคํƒ์„ ์—ฐ๊ฒฐํ•˜๋Š” ์š”์†Œ๋“ค์„ ํฌํ•จํ•˜์„ธ์š”.

Deliverable: ์ž์‚ฐ์ด ์–ด๋–ป๊ฒŒ ์ด๋™ํ•˜๋Š”์ง€, ๋ˆ„๊ฐ€ ์ด๋™์„ ์Šน์ธํ•˜๋Š”์ง€, ์–ด๋–ค ์™ธ๋ถ€ ์‹ ํ˜ธ๊ฐ€ ๋น„์ฆˆ๋‹ˆ์Šค ๋กœ์ง์— ์˜ํ–ฅ์„ ์ฃผ๋Š”์ง€๋ฅผ ๋ณด์—ฌ์ฃผ๋Š” value-flow ๋‹ค์ด์–ด๊ทธ๋žจ.

2. ๊ตฌ์„ฑ์š”์†Œ๋ฅผ AADAPT ํ–‰๋™์— ๋งคํ•‘

AADAPT ๋ถ„๋ฅ˜์ฒด๊ณ„๋ฅผ ๊ฐ ๊ตฌ์„ฑ์š”์†Œ๋ณ„ ๊ตฌ์ฒด์  ๊ณต๊ฒฉ ํ›„๋ณด๋กœ ๋ณ€ํ™˜ํ•˜์„ธ์š”.

ComponentPrimary AADAPT focus
Signing/KMS estatesCredential theft, policy bypass, signing-abuse, governance takeover
Oracles/feedsInput poisoning, aggregation manipulation, deviation-threshold evasion
On-chain protocolsFlash-loan economic manipulation, invariant breaking, parameter reconfiguration
Automation pipelinesCompromised bot/CI identities, batch replay, unauthorized deployment
Bridges/routersCross-chain evasion, rapid hop laundering, settlement desynchronization

์ด ๋งคํ•‘์€ ๊ณ„์•ฝ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ๊ฐ€์น˜์— ๊ฐ„์ ‘์ ์œผ๋กœ ์˜ํ–ฅ์„ ์ค„ ์ˆ˜ ์žˆ๋Š” ๋ชจ๋“  identity/automation์„ ํ…Œ์ŠคํŠธํ•˜๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค.

3. ๊ณต๊ฒฉ์ž ์‹คํ˜„ ๊ฐ€๋Šฅ์„ฑ vs ๋น„์ฆˆ๋‹ˆ์Šค ์˜ํ–ฅ์œผ๋กœ ์šฐ์„ ์ˆœ์œ„ ์ง€์ •

  1. Operational weaknesses: ๋…ธ์ถœ๋œ CI ์ž๊ฒฉ์ฆ๋ช…, ๊ถŒํ•œ์ด ๊ณผ๋‹คํ•œ IAM ์—ญํ• , ์ž˜๋ชป ๊ตฌ์„ฑ๋œ KMS ์ •์ฑ…, ์ž„์˜ ์„œ๋ช… ์š”์ฒญ์ด ๊ฐ€๋Šฅํ•œ ์ž๋™ํ™” ๊ณ„์ •, ๋ธŒ๋ฆฌ์ง€ ์„ค์ •์ด ๊ณต๊ฐœ๋œ ๋ฒ„ํ‚ท ๋“ฑ.
  2. Value-specific weaknesses: ์ทจ์•ฝํ•œ ์˜ค๋ผํด ํŒŒ๋ผ๋ฏธํ„ฐ, ๋‹ค์ž ์Šน์ธ ์—†๋Š” ์—…๊ทธ๋ ˆ์ด๋“œ ๊ฐ€๋Šฅํ•œ ๊ณ„์•ฝ, flash-loan์— ๋ฏผ๊ฐํ•œ ์œ ๋™์„ฑ, timelock์„ ์šฐํšŒํ•  ์ˆ˜ ์žˆ๋Š” ๊ฑฐ๋ฒ„๋„Œ์Šค ์•ก์…˜ ๋“ฑ.

๊ณต๊ฒฉ์ž์ฒ˜๋Ÿผ ํ๋ฅผ ์šด์˜ํ•˜์„ธ์š”: ์˜ค๋Š˜ ์„ฑ๊ณตํ•  ์ˆ˜ ์žˆ๋Š” ์šด์˜์  ๋ฐœํŒ๋ถ€ํ„ฐ ์‹œ์ž‘ํ•ด, ๊นŠ์€ ํ”„๋กœํ† ์ฝœ/๊ฒฝ์ œ์  ์กฐ์ž‘ ๊ฒฝ๋กœ๋กœ ์ง„ํ–‰ํ•˜์„ธ์š”.

4. ํ†ต์ œ๋œ, ์‹ค์šด์˜๊ณผ ์œ ์‚ฌํ•œ ํ™˜๊ฒฝ์—์„œ ์‹คํ–‰

  • Forked mainnets / isolated testnets: ๋ฐ”์ดํŠธ์ฝ”๋“œ, ์Šคํ† ๋ฆฌ์ง€, ์œ ๋™์„ฑ์„ ๋ณต์ œํ•ด flash-loan ๊ฒฝ๋กœ, ์˜ค๋ผํด ๋“œ๋ฆฌํ”„ํŠธ, ๋ธŒ๋ฆฌ์ง€ ํ”Œ๋กœ์šฐ๊ฐ€ ์‹ค์ œ ์ž๊ธˆ ์—†์ด end-to-end๋กœ ์‹คํ–‰๋˜๊ฒŒ ํ•˜์„ธ์š”.
  • Blast-radius planning: ์‹œ๋‚˜๋ฆฌ์˜ค ์‹คํ–‰ ์ „ ์„œํ‚ท๋ธŒ๋ ˆ์ด์ปค, ์ผ์‹œ์ •์ง€ ๋ชจ๋“ˆ, ๋กค๋ฐฑ ๋Ÿฐ๋ถ, ํ…Œ์ŠคํŠธ ์ „์šฉ ๊ด€๋ฆฌ์ž ํ‚ค๋ฅผ ์ •์˜ํ•˜์„ธ์š”.
  • Stakeholder coordination: ์ˆ˜ํƒ์ž, ์˜ค๋ผํด ์šด์˜์ž, ๋ธŒ๋ฆฌ์ง€ ํŒŒํŠธ๋„ˆ, ์ปดํ”Œ๋ผ์ด์–ธ์ŠคํŒ€์— ํ†ต์ง€ํ•ด ๋ชจ๋‹ˆํ„ฐ๋ง ํŒ€์ด ํŠธ๋ž˜ํ”ฝ์„ ์˜ˆ์ƒํ•˜๊ฒŒ ํ•˜์„ธ์š”.
  • Legal sign-off: ์‹œ๋ฎฌ๋ ˆ์ด์…˜์ด ๊ทœ์ œ ๊ตฌ๊ฐ„์„ ๋„˜์„ ์ˆ˜ ์žˆ๋Š” ๊ฒฝ์šฐ ๋ฒ”์œ„, ์Šน์ธ, ์ค‘๋‹จ ์กฐ๊ฑด์„ ๋ฌธ์„œํ™”ํ•˜์„ธ์š”.

5. AADAPT ๊ธฐ๋ฒ•์— ๋งž์ถ˜ ํ…”๋ ˆ๋ฉ”ํŠธ๋ฆฌ

๋ชจ๋“  ์‹œ๋‚˜๋ฆฌ์˜ค๊ฐ€ ์‹ค์งˆ์  ํƒ์ง€ ๋ฐ์ดํ„ฐ๋ฅผ ์ƒ์„ฑํ•˜๋„๋ก ํ…”๋ ˆ๋ฉ”ํŠธ๋ฆฌ ์ŠคํŠธ๋ฆผ์„ ๊ณ„์ธกํ•˜์„ธ์š”.

  • Chain-level traces: ์ „์ฒด ํ˜ธ์ถœ ๊ทธ๋ž˜ํ”„, gas ์‚ฌ์šฉ๋Ÿ‰, ํŠธ๋žœ์žญ์…˜ ๋…ผ์Šค, ๋ธ”๋ก ํƒ€์ž„์Šคํƒฌํ”„โ€”flash-loan ๋ฒˆ๋“ค, ์žฌ์ง„์ž…(reentrancy)-์œ ์‚ฌ ๊ตฌ์กฐ, ํฌ๋กœ์Šค์ปจํŠธ๋ž™ํŠธ ํ™‰์„ ์žฌ๊ตฌ์„ฑํ•˜๊ธฐ ์œ„ํ•ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.
  • Application/API logs: ๊ฐ ์˜จ์ฒด์ธ tx๋ฅผ ์‚ฌ๋žŒ ๋˜๋Š” ์ž๋™ํ™” ID(session ID, OAuth client, API key, CI job ID)์™€ IP ๋ฐ ์ธ์ฆ ๋ฐฉ๋ฒ•์œผ๋กœ ์—ฐ๊ฒฐํ•˜์„ธ์š”.
  • KMS/HSM logs: ํ‚ค ID, ํ˜ธ์ถœ์ž ์ฃผ์ฒด, ์ •์ฑ… ๊ฒฐ๊ณผ, ๋ชฉ์ ์ง€ ์ฃผ์†Œ, ๊ฐ ์„œ๋ช…์— ๋Œ€ํ•œ ์ด์œ  ์ฝ”๋“œ. ๋ณ€๊ฒฝ ์œˆ๋„์šฐ์™€ ๊ณ ์œ„ํ—˜ ์ž‘์—…์˜ ๊ธฐ์ค€์„ ์„ ํ™•๋ณดํ•˜์„ธ์š”.
  • Oracle/feed metadata: ์—…๋ฐ์ดํŠธ๋ณ„ ๋ฐ์ดํ„ฐ ์†Œ์Šค ๊ตฌ์„ฑ, ๋ณด๊ณ ๋œ ๊ฐ’, ๋กค๋ง ํ‰๊ท  ๋Œ€๋น„ ํŽธ์ฐจ, ํŠธ๋ฆฌ๊ฑฐ๋œ ์ž„๊ณ„๊ฐ’, ํŽ˜์ผ์˜ค๋ฒ„ ๊ฒฝ๋กœ.
  • Bridge/swap traces: ์ฒด์ธ ๊ฐ„ lock/mint/unlock ์ด๋ฒคํŠธ๋ฅผ ์ƒ๊ด€ ID, ์ฒด์ธ ID, relayer ์ •์ฒด, ํ™‰ ํƒ€์ด๋ฐ๊ณผ ํ•จ๊ป˜ ์—ฐ๊ด€ ์ง€์œผ์„ธ์š”.
  • Anomaly markers: ์Šฌ๋ฆฌํ”ผ์ง€ ๊ธ‰์ฆ, ๋น„์ •์ƒ์  ๋‹ด๋ณด๋น„์œจ, ์ด์ƒํ•œ gas ๋ฐ€๋„, ํฌ๋กœ์Šค์ฒด์ธ ์†๋„์„ฑ ๊ฐ™์€ ํŒŒ์ƒ ์ง€ํ‘œ๋“ค.

๋ชจ๋“  ๊ฒƒ์„ ์‹œ๋‚˜๋ฆฌ์˜ค ID ๋˜๋Š” ํ•ฉ์„ฑ ์‚ฌ์šฉ์ž ID๋กœ ํƒœ๊น…ํ•ด ๋ถ„์„๊ฐ€๊ฐ€ ๊ด€์ฐฐ๊ฐ’์„ ์‹คํ–‰ํ•œ AADAPT ๊ธฐ๋ฒ•๊ณผ ์ •๋ ฌํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•˜์„ธ์š”.

6. Purple-team ๋ฃจํ”„ & ์„ฑ์ˆ™๋„ ์ง€ํ‘œ

  1. ํ†ต์ œ๋œ ํ™˜๊ฒฝ์—์„œ ์‹œ๋‚˜๋ฆฌ์˜ค๋ฅผ ์‹คํ–‰ํ•˜๊ณ  ํƒ์ง€(์•Œ๋ฆผ, ๋Œ€์‹œ๋ณด๋“œ, ํ˜ธ์ถœ๋œ ๋Œ€์‘์ž)๋ฅผ ์บก์ฒ˜ํ•˜์„ธ์š”.
  2. ๊ฐ ๋‹จ๊ณ„๋ฅผ ํŠน์ • AADAPT ๊ธฐ๋ฒ•๊ณผ ์ฒด์ธ/์•ฑ/KMS/์˜ค๋ผํด/๋ธŒ๋ฆฌ์ง€ ํ‰๋ฉด์—์„œ ์ƒ์„ฑ๋œ ๊ด€์ฐฐ๊ฐ’์— ๋งคํ•‘ํ•˜์„ธ์š”.
  3. ํƒ์ง€ ๊ฐ€์„ค(์ž„๊ณ„๊ฐ’ ๊ทœ์น™, ์ƒ๊ด€ ๊ฒ€์ƒ‰, ๋ถˆ๋ณ€์„ฑ ๊ฒ€์‚ฌ)์„ ์ˆ˜๋ฆฝํ•˜๊ณ  ๋ฐฐํฌํ•˜์„ธ์š”.
  4. MTTD ๋ฐ MTTC๊ฐ€ ๋น„์ฆˆ๋‹ˆ์Šค ํ—ˆ์šฉ๋ฒ”์œ„์— ๋„๋‹ฌํ•˜๊ณ  ํ”Œ๋ ˆ์ด๋ถ์ด ๊ฐ€์น˜ ์†์‹ค์„ ์‹ ๋ขฐ์„ฑ ์žˆ๊ฒŒ ์ฐจ๋‹จํ•  ๋•Œ๊นŒ์ง€ ์žฌ์‹คํ–‰ํ•˜์„ธ์š”.

ํ”„๋กœ๊ทธ๋žจ ์„ฑ์ˆ™๋„๋Š” ์„ธ ์ถ•์œผ๋กœ ์ถ”์ ํ•˜์„ธ์š”:

  • Visibility: ๋ชจ๋“  ์ค‘์š”ํ•œ ๊ฐ€์น˜ ๊ฒฝ๋กœ์— ๊ฐ ํ‰๋ฉด์˜ ํ…”๋ ˆ๋ฉ”ํŠธ๋ฆฌ๊ฐ€ ์กด์žฌ.
  • Coverage: ์šฐ์„ ์ˆœ์œ„๊ฐ€ ๋†’์€ AADAPT ๊ธฐ๋ฒ• ์ค‘ end-to-end๋กœ ์‹คํ–‰๋œ ๋น„์œจ.
  • Response: ๊ณ„์•ฝ ์ผ์‹œ์ค‘์ง€, ํ‚ค ํ๊ธฐ, ํ๋ฆ„ ๋™๊ฒฐ ๋“ฑ ๋˜๋Œ๋ฆด ์ˆ˜ ์—†๋Š” ์†์‹ค ์ด์ „์— ์กฐ์น˜ํ•  ์ˆ˜ ์žˆ๋Š” ๋Šฅ๋ ฅ.

์ผ๋ฐ˜์ ์ธ ๋งˆ์ผ์Šคํ†ค: (1) ๊ฐ€์น˜ ์ธ๋ฒคํ† ๋ฆฌ ๋ฐ AADAPT ๋งคํ•‘ ์™„๋ฃŒ, (2) ํƒ์ง€๊ฐ€ ๊ตฌํ˜„๋œ ์ฒซ ๋ฒˆ์งธ end-to-end ์‹œ๋‚˜๋ฆฌ์˜ค, (3) ๋ถ„๊ธฐ๋ณ„ purple-team ์‚ฌ์ดํด๋กœ ์ปค๋ฒ„๋ฆฌ์ง€ ํ™•์žฅ ๋ฐ MTTD/MTTC ๋‹จ์ถ•.

7. ์‹œ๋‚˜๋ฆฌ์˜ค ํ…œํ”Œ๋ฆฟ

์ด ๋ฐ˜๋ณต ๊ฐ€๋Šฅํ•œ ์ฒญ์‚ฌ์ง„๋“ค์„ ์‚ฌ์šฉํ•ด AADAPT ํ–‰๋™์— ์ง์ ‘ ๋งคํ•‘๋˜๋Š” ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ์„ค๊ณ„ํ•˜์„ธ์š”.

Scenario A โ€“ Flash-loan economic manipulation

  • Objective: ํ•œ ํŠธ๋žœ์žญ์…˜ ๋‚ด์—์„œ ์ผ์‹œ์  ์ž๋ณธ์„ ๋นŒ๋ ค AMM์˜ ๊ฐ€๊ฒฉ/์œ ๋™์„ฑ์„ ์™œ๊ณกํ•ด ์ž˜๋ชป ๊ฐ€๊ฒฉ๋œ ์ฐจ์ž…, ์ฒญ์‚ฐ, ๋˜๋Š” mint๋ฅผ ํŠธ๋ฆฌ๊ฑฐํ•œ ๋’ค ์ƒํ™˜ํ•ฉ๋‹ˆ๋‹ค.
  • Execution:
  1. ๋Œ€์ƒ ์ฒด์ธ์„ forkํ•˜๊ณ  ์ƒ์‚ฐ ์ˆ˜์ค€์˜ ์œ ๋™์„ฑ์œผ๋กœ ํ’€์„ ์‹œ๋“œํ•˜์„ธ์š”.
  2. flash loan์œผ๋กœ ํฐ ๋…ธํ‹ฐ์…˜์„ ๋นŒ๋ฆฌ์„ธ์š”.
  3. ๋Œ€์ฐจ๋กœ ๊ณ„์‚ฐ๋œ ์Šค์™‘์„ ์ˆ˜ํ–‰ํ•ด ๋Œ€์ถœ, vault, ํŒŒ์ƒ ๋กœ์ง์ด ์˜์กดํ•˜๋Š” ๊ฐ€๊ฒฉ/์ž„๊ณ„๊ฐ’์„ ๋„˜๊ธฐ์„ธ์š”.
  4. ์™œ๊ณก ์งํ›„ ํ”ผํ•ด์ž ๊ณ„์•ฝ์„ ํ˜ธ์ถœ(์ฐจ์ž…, ์ฒญ์‚ฐ, mint)ํ•˜๊ณ  flash loan์„ ์ƒํ™˜ํ•˜์„ธ์š”.
  • Measurement: ๋ถˆ๋ณ€์„ฑ ์œ„๋ฐ˜์ด ์„ฑ๊ณตํ–ˆ๋‚˜์š”? ์Šฌ๋ฆฌํ”ผ์ง€/๊ฐ€๊ฒฉ ํŽธ์ฐจ ๋ชจ๋‹ˆํ„ฐ, ์„œํ‚ท๋ธŒ๋ ˆ์ด์ปค, ๊ฑฐ๋ฒ„๋„Œ์Šค ์ผ์‹œ์ •์ง€ ํ›…์ด ํŠธ๋ฆฌ๊ฑฐ๋˜์—ˆ๋‚˜์š”? ๋น„์ •์ƒ์  gas/ํ˜ธ์ถœ ๊ทธ๋ž˜ํ”„ ํŒจํ„ด์ด ๋ถ„์„์— ํ‘œ์‹œ๋˜๊ธฐ๊นŒ์ง€ ์–ผ๋งˆ๋‚˜ ๊ฑธ๋ ธ๋‚˜์š”?

Scenario B โ€“ Oracle/data-feed poisoning

  • Objective: ์กฐ์ž‘๋œ ํ”ผ๋“œ๊ฐ€ ๋Œ€๋Ÿ‰ ์ฒญ์‚ฐ์ด๋‚˜ ์ž˜๋ชป๋œ ์ •์‚ฐ ๊ฐ™์€ ํŒŒ๊ดด์  ์ž๋™ํ™” ๋™์ž‘์„ ์œ ๋ฐœํ•  ์ˆ˜ ์žˆ๋Š”์ง€ ํ™•์ธํ•ฉ๋‹ˆ๋‹ค.
  • Execution:
  1. fork/testnet์—์„œ ์•…์„ฑ ํ”ผ๋“œ ๋ฐฐํฌํ•˜๊ฑฐ๋‚˜ aggregator ๊ฐ€์ค‘์น˜/์ฟผ๋Ÿผ/์—…๋ฐ์ดํŠธ ์ฃผ๊ธฐ๋ฅผ ํ—ˆ์šฉ ํŽธ์ฐจ๋ฅผ ๋„˜๊ฒŒ ์กฐ์ •ํ•˜์„ธ์š”.
  2. ์˜์กดํ•˜๋Š” ๊ณ„์•ฝ๋“ค์ด ์˜ค์—ผ๋œ ๊ฐ’์„ ์†Œ๋น„ํ•˜๊ณ  ํ‘œ์ค€ ๋กœ์ง์„ ์‹คํ–‰ํ•˜๊ฒŒ ํ•˜์„ธ์š”.
  • Measurement: ํ”ผ๋“œ ๋ ˆ๋ฒจ์˜ ์˜คํ”„-๋ฐด๋“œ(alert) ์—ฌ๋ถ€, fallback oracle ํ™œ์„ฑํ™”, ์ตœ์†Œ/์ตœ๋Œ€ ๋ฐ”์šด๋“œ ์‹œํ–‰, ์ด์ƒ ๋ฐœ์ƒ ์‹œ์ ๋ถ€ํ„ฐ ์šด์˜์ž ๋ฐ˜์‘๊นŒ์ง€์˜ ์ง€์—ฐ.

Scenario C โ€“ Credential/signing abuse

  • Objective: ๋‹จ์ผ ์„œ๋ช…์ž ๋˜๋Š” ์ž๋™ํ™” ID๋ฅผ ํƒˆ์ทจํ•ด ๊ถŒํ•œ ์—†๋Š” ์—…๊ทธ๋ ˆ์ด๋“œ, ํŒŒ๋ผ๋ฏธํ„ฐ ๋ณ€๊ฒฝ, ๋˜๋Š” ๊ธˆ๊ณ (ํŠธ๋ ˆ์ €๋ฆฌ) ์œ ์ถœ์ด ๊ฐ€๋Šฅํ•œ์ง€ ํ…Œ์ŠคํŠธํ•ฉ๋‹ˆ๋‹ค.
  • Execution:
  1. ๋ฏผ๊ฐํ•œ ์„œ๋ช… ๊ถŒํ•œ์„ ๊ฐ€์ง„ ID(์šด์˜์ž, CI ํ† ํฐ, KMS/HSM๋ฅผ ํ˜ธ์ถœํ•˜๋Š” ์„œ๋น„์Šค ๊ณ„์ •, multisig ์ฐธ๊ฐ€์ž)๋ฅผ ์—ด๊ฑฐํ•˜์„ธ์š”.
  2. ์‹คํ—˜ ๋ฒ”์œ„ ๋‚ด์—์„œ ํ•ด๋‹น ์ž๊ฒฉ์ฆ๋ช…/ํ‚ค๋ฅผ ์žฌ์‚ฌ์šฉํ•ด ํƒˆ์ทจ๋ฅผ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•˜์„ธ์š”.
  3. ๊ถŒํ•œ ์ž‘์—…์„ ์‹œ๋„ํ•˜์„ธ์š”: ํ”„๋ก์‹œ ์—…๊ทธ๋ ˆ์ด๋“œ, ๋ฆฌ์Šคํฌ ํŒŒ๋ผ๋ฏธํ„ฐ ๋ณ€๊ฒฝ, ์ž์‚ฐ mint/pause, ๋˜๋Š” ๊ฑฐ๋ฒ„๋„Œ์Šค ์ œ์•ˆ ํŠธ๋ฆฌ๊ฑฐ ๋“ฑ.
  • Measurement: KMS/HSM ๋กœ๊ทธ๊ฐ€ ์ด์ƒ ์•Œ๋ฆผ(์‹œ๊ฐ„๋Œ€, ๋ชฉ์ ์ง€ ํŽธ์ฐจ, ๊ณ ์œ„ํ—˜ ์ž‘์—… ๊ธ‰์ฆ)์„ ๋ฐœ์ƒ์‹œํ‚ค๋‚˜์š”? ์ •์ฑ…์ด๋‚˜ multisig ์ž„๊ณ„๊ฐ’์ด ๋‹จ๋… ๋‚จ์šฉ์„ ๋ง‰์„ ์ˆ˜ ์žˆ๋‚˜์š”? ์Šค๋กœํ‹€/๋ ˆ์ดํŠธ ๋ฆฌ๋ฐ‹์ด๋‚˜ ์ถ”๊ฐ€ ์Šน์ธ ์ ˆ์ฐจ๊ฐ€ ์ ์šฉ๋˜๋‚˜์š”?

Scenario D โ€“ Cross-chain evasion & traceability gaps

  • Objective: ๋ธŒ๋ฆฌ์ง€, DEX ๋ผ์šฐํ„ฐ, ํ”„๋ผ์ด๋ฒ„์‹œ ํ™‰์„ ํ†ตํ•ด ์ž์‚ฐ์„ ๋น ๋ฅด๊ฒŒ ์„ธํƒํ•  ๋•Œ ์ˆ˜๋น„ ์ธก์ด ์–ผ๋งˆ๋‚˜ ์‹ ์†ํ•˜๊ฒŒ ์ž์‚ฐ์„ ์ถ”์ ยท์ฐจ๋‹จํ•  ์ˆ˜ ์žˆ๋Š”์ง€ ํ‰๊ฐ€ํ•ฉ๋‹ˆ๋‹ค.
  • Execution:
  1. ์ผ๋ฐ˜์ ์ธ ๋ธŒ๋ฆฌ์ง€๋“ค์„ ๋”ฐ๋ผ lock/mint ์ž‘์—…์„ ์—ฐ๊ฒฐํ•˜๊ณ  ๊ฐ ํ™‰์—์„œ ์Šค์™‘/๋ฏน์„œ๋ฅผ ์„ž์–ด๊ฐ€๋ฉฐ per-hop correlation ID๋ฅผ ์œ ์ง€ํ•˜์„ธ์š”.
  2. ์ „์†ก์„ ๊ฐ€์†ํ•ด ๋ชจ๋‹ˆํ„ฐ๋ง ์ง€์—ฐ์„ ์ŠคํŠธ๋ ˆ์Šคํ•˜์„ธ์š”(๋ช‡ ๋ถ„/๋ธ”๋ก ๋‚ด ๋ฉ€ํ‹ฐํ™‰).
  • Measurement: ํ…”๋ ˆ๋ฉ”ํŠธ๋ฆฌ + ์ƒ์šฉ ์ฒด์ธ ๋ถ„์„์„ ํ†ตํ•ด ์ด๋ฒคํŠธ๋ฅผ ์ƒ๊ด€ํ•˜๋Š” ์‹œ๊ฐ„, ์žฌ๊ตฌ์„ฑ๋œ ๊ฒฝ๋กœ์˜ ์™„์ „์„ฑ, ์‹ค์ œ ์‚ฌ๊ฑด์—์„œ ๋™๊ฒฐ ๊ฐ€๋Šฅํ•œ choke point ์‹๋ณ„ ๋Šฅ๋ ฅ, ๋น„์ •์ƒ์  ํฌ๋กœ์Šค์ฒด์ธ ์†๋„/๊ฐ€์น˜์— ๋Œ€ํ•œ ์•Œ๋ฆผ ์ •ํ™•์„ฑ.

References

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ