๊ธฐ๋ณธ ํฌ๋ Œ์‹ ๋ฐฉ๋ฒ•๋ก 

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

์ด๋ฏธ์ง€ ์ƒ์„ฑ ๋ฐ ๋งˆ์šดํŠธ

Image Acquisition & Mount

Malware Analysis

์ด๊ฒƒ์€ ์ด๋ฏธ์ง€๋ฅผ ํ™•๋ณดํ•œ ํ›„ ๋ฐ˜๋“œ์‹œ ๊ฐ€์žฅ ๋จผ์ € ์ˆ˜ํ–‰ํ•ด์•ผ ํ•˜๋Š” ๋‹จ๊ณ„๋Š” ์•„๋‹™๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ํŒŒ์ผ, file-system image, memory image, pcap ๋“ฑ์ด ์žˆ๋‹ค๋ฉด ์ด malware analysis ๊ธฐ์ˆ ๋“ค์„ ๋…๋ฆฝ์ ์œผ๋กœ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์œผ๋ฏ€๋กœ ์ด๋Ÿฌํ•œ ์ž‘์—…๋“ค์„ ์—ผ๋‘์— ๋‘๋Š” ๊ฒƒ์ด ์ข‹์Šต๋‹ˆ๋‹ค:

Malware Analysis

์ด๋ฏธ์ง€ ๊ฒ€์‚ฌ

๋งŒ์•ฝ ์žฅ์น˜์˜ forensic image๊ฐ€ ์ฃผ์–ด์ง„๋‹ค๋ฉด ์‚ฌ์šฉ๋œ partitions, file-system์„ ๋ถ„์„ํ•˜๊ณ  ์ž ์žฌ์ ์œผ๋กœ ํฅ๋ฏธ๋กœ์šด ํŒŒ์ผ๋“ค(์‚ญ์ œ๋œ ํŒŒ์ผ ํฌํ•จ)์„ ๋ณต๊ตฌํ•˜๋Š” ์ž‘์—…์„ ์‹œ์ž‘ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋ฐฉ๋ฒ•์€ ๋‹ค์Œ์„ ์ฐธ์กฐํ•˜์„ธ์š”:

Partitions/File Systems/Carving# ๊ธฐ๋ณธ ํฌ๋ Œ์‹ ๋ฐฉ๋ฒ•๋ก 

์ด๋ฏธ์ง€ ์ƒ์„ฑ ๋ฐ ๋งˆ์šดํŠธ

Image Acquisition & Mount

Malware Analysis

์ด๊ฒƒ์€ ์ด๋ฏธ์ง€๋ฅผ ํ™•๋ณดํ•œ ํ›„ ๋ฐ˜๋“œ์‹œ ๊ฐ€์žฅ ๋จผ์ € ์ˆ˜ํ–‰ํ•ด์•ผ ํ•˜๋Š” ๋‹จ๊ณ„๋Š” ์•„๋‹™๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ํŒŒ์ผ, file-system image, memory image, pcap ๋“ฑ์ด ์žˆ๋‹ค๋ฉด ์ด malware analysis ๊ธฐ์ˆ ๋“ค์„ ๋…๋ฆฝ์ ์œผ๋กœ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์œผ๋ฏ€๋กœ ์ด๋Ÿฌํ•œ ์ž‘์—…๋“ค์„ ์—ผ๋‘์— ๋‘๋Š” ๊ฒƒ์ด ์ข‹์Šต๋‹ˆ๋‹ค:

Malware Analysis

์ด๋ฏธ์ง€ ๊ฒ€์‚ฌ

๋งŒ์•ฝ ์žฅ์น˜์˜ forensic image๊ฐ€ ์ฃผ์–ด์ง„๋‹ค๋ฉด ์‚ฌ์šฉ๋œ partitions, file-system์„ ๋ถ„์„ํ•˜๊ณ  ์ž ์žฌ์ ์œผ๋กœ ํฅ๋ฏธ๋กœ์šด ํŒŒ์ผ๋“ค(์‚ญ์ œ๋œ ํŒŒ์ผ ํฌํ•จ)์„ ๋ณต๊ตฌํ•˜๋Š” ์ž‘์—…์„ ์‹œ์ž‘ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋ฐฉ๋ฒ•์€ ๋‹ค์Œ์„ ์ฐธ์กฐํ•˜์„ธ์š”:

Partitions/File Systems/Carving

์‚ฌ์šฉ๋œ OS๋‚˜ ํ”Œ๋žซํผ์— ๋”ฐ๋ผ ๊ฒ€์ƒ‰ํ•ด์•ผ ํ•  ๋‹ค์–‘ํ•œ ํฅ๋ฏธ๋กœ์šด artifacts๊ฐ€ ์žˆ์Šต๋‹ˆ๋‹ค:

Windows Artifacts

Linux Forensics

Docker Forensics

Ios Backup Forensics

ํŠน์ • ํŒŒ์ผํ˜•์‹ ๋ฐ ์†Œํ”„ํŠธ์›จ์–ด์˜ ์‹ฌ์ธต ๊ฒ€์‚ฌ

๋งค์šฐ ์˜์‹ฌ์Šค๋Ÿฌ์šด ํŒŒ์ผ์ด ์žˆ๋Š” ๊ฒฝ์šฐ, ํ•ด๋‹น ํŒŒ์ผ์„ ์ƒ์„ฑํ•œ file-type ๋ฐ software์— ๋”ฐ๋ผ ์—ฌ๋Ÿฌ ๊ฐ€์ง€ ์œ ์šฉํ•œ ํŠธ๋ฆญ์ด ์žˆ์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๋‹ค์Œ ํŽ˜์ด์ง€๋ฅผ ์ฝ์–ด ๋ช‡ ๊ฐ€์ง€ ํฅ๋ฏธ๋กœ์šด ํŠธ๋ฆญ์„ ํ™•์ธํ•˜์„ธ์š”:

Specific Software/File-Type Tricks

ํŠนํžˆ ๋‹ค์Œ ํŽ˜์ด์ง€๋ฅผ ๋ณ„๋„๋กœ ์–ธ๊ธ‰ํ•˜๊ณ  ์‹ถ์Šต๋‹ˆ๋‹ค:

Browser Artifacts

Memory Dump Inspection

Memory dump analysis

Pcap Inspection

Pcap Inspection

Anti-Forensic Techniques

anti-forensic techniques์˜ ์‚ฌ์šฉ ๊ฐ€๋Šฅ์„ฑ์„ ์—ผ๋‘์— ๋‘์„ธ์š”:

Anti-Forensic Techniques

Threat Hunting

Baseline Monitoring

ํŠน์ • ํŒŒ์ผํ˜•์‹ ๋ฐ ์†Œํ”„ํŠธ์›จ์–ด์˜ ์‹ฌ์ธต ๊ฒ€์‚ฌ

๋งค์šฐ ์˜์‹ฌ์Šค๋Ÿฌ์šด ํŒŒ์ผ์ด ์žˆ๋Š” ๊ฒฝ์šฐ, ํ•ด๋‹น ํŒŒ์ผ์„ ์ƒ์„ฑํ•œ file-type ๋ฐ software์— ๋”ฐ๋ผ ์—ฌ๋Ÿฌ ๊ฐ€์ง€ ์œ ์šฉํ•œ ํŠธ๋ฆญ์ด ์žˆ์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๋‹ค์Œ ํŽ˜์ด์ง€๋ฅผ ์ฝ์–ด ๋ช‡ ๊ฐ€์ง€ ํฅ๋ฏธ๋กœ์šด ํŠธ๋ฆญ์„ ํ™•์ธํ•˜์„ธ์š”:

Specific Software/File-Type Tricks

ํŠนํžˆ ๋‹ค์Œ ํŽ˜์ด์ง€๋ฅผ ๋ณ„๋„๋กœ ์–ธ๊ธ‰ํ•˜๊ณ  ์‹ถ์Šต๋‹ˆ๋‹ค:

Browser Artifacts

Memory Dump Inspection

Memory dump analysis

Pcap Inspection

Pcap Inspection

Anti-Forensic Techniques

anti-forensic techniques์˜ ์‚ฌ์šฉ ๊ฐ€๋Šฅ์„ฑ์„ ์—ผ๋‘์— ๋‘์„ธ์š”:

Anti-Forensic Techniques

Threat Hunting

Baseline Monitoring

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ