Weaponizing Distroless

Tip

AWS ν•΄ν‚Ή 배우기 및 μ—°μŠ΅ν•˜κΈ°:HackTricks Training AWS Red Team Expert (ARTE)
GCP ν•΄ν‚Ή 배우기 및 μ—°μŠ΅ν•˜κΈ°: HackTricks Training GCP Red Team Expert (GRTE) Azure ν•΄ν‚Ή 배우기 및 μ—°μŠ΅ν•˜κΈ°: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks μ§€μ›ν•˜κΈ°

What is Distroless

Distroless μ»¨ν…Œμ΄λ„ˆλŠ” νŠΉμ • μ• ν”Œλ¦¬μΌ€μ΄μ…˜μ„ μ‹€ν–‰ν•˜λŠ” 데 ν•„μš”ν•œ μ’…μ†μ„±λ§Œ ν¬ν•¨ν•˜λŠ” μ»¨ν…Œμ΄λ„ˆμ˜ μΌμ’…μœΌλ‘œ, ν•„μš”ν•˜μ§€ μ•Šμ€ μΆ”κ°€ μ†Œν”„νŠΈμ›¨μ–΄λ‚˜ λ„κ΅¬λŠ” ν¬ν•¨ν•˜μ§€ μ•ŠμŠ΅λ‹ˆλ‹€. μ΄λŸ¬ν•œ μ»¨ν…Œμ΄λ„ˆλŠ” κ°€λŠ₯ν•œ ν•œ κ²½λŸ‰ν™”λ˜κ³  μ•ˆμ „ν•˜λ„λ‘ μ„€κ³„λ˜μ—ˆμœΌλ©°, λΆˆν•„μš”ν•œ ꡬ성 μš”μ†Œλ₯Ό μ œκ±°ν•˜μ—¬ 곡격 ν‘œλ©΄μ„ μ΅œμ†Œν™”ν•˜λŠ” 것을 λͺ©ν‘œλ‘œ ν•©λ‹ˆλ‹€.

Distroless μ»¨ν…Œμ΄λ„ˆλŠ” λ³΄μ•ˆκ³Ό 신뒰성이 κ°€μž₯ μ€‘μš”ν•œ 생산 ν™˜κ²½μ—μ„œ 자주 μ‚¬μš©λ©λ‹ˆλ‹€.

Distroless μ»¨ν…Œμ΄λ„ˆμ˜ λͺ‡ κ°€μ§€ μ˜ˆλŠ” λ‹€μŒκ³Ό κ°™μŠ΅λ‹ˆλ‹€:

Weaponizing Distroless

Distroless μ»¨ν…Œμ΄λ„ˆλ₯Ό λ¬΄κΈ°ν™”ν•˜λŠ” λͺ©ν‘œλŠ” distroless에 μ˜ν•΄ μ•”μ‹œλœ μ œν•œμ—λ„ λΆˆκ΅¬ν•˜κ³  μž„μ˜μ˜ λ°”μ΄λ„ˆλ¦¬μ™€ νŽ˜μ΄λ‘œλ“œλ₯Ό μ‹€ν–‰ν•  수 μžˆλŠ” κ²ƒμž…λ‹ˆλ‹€(μ‹œμŠ€ν…œμ— 일반적인 λ°”μ΄λ„ˆλ¦¬κ°€ 뢀쑱함) 그리고 읽기 μ „μš© λ˜λŠ” μ‹€ν–‰ κΈˆμ§€μ™€ 같은 μ»¨ν…Œμ΄λ„ˆμ—μ„œ 일반적으둜 λ°œκ²¬λ˜λŠ” 보호 κΈ°λŠ₯도 ν¬ν•¨λ©λ‹ˆλ‹€.

Through memory

2023λ…„μ˜ μ–΄λŠ μ‹œμ μ—β€¦

Via Existing binaries

openssl

****이 κ²Œμ‹œλ¬Όμ—μ„œ, λ°”μ΄λ„ˆλ¦¬ **openssl**이 μ΄λŸ¬ν•œ μ»¨ν…Œμ΄λ„ˆμ—μ„œ 자주 λ°œκ²¬λœλ‹€κ³  μ„€λͺ…λ˜μ–΄ 있으며, μ΄λŠ” μ»¨ν…Œμ΄λ„ˆ λ‚΄μ—μ„œ 싀행될 μ†Œν”„νŠΈμ›¨μ–΄μ— ν•„μš”ν•˜κΈ° λ•Œλ¬ΈμΌ 수 μžˆμŠ΅λ‹ˆλ‹€.

Tip

AWS ν•΄ν‚Ή 배우기 및 μ—°μŠ΅ν•˜κΈ°:HackTricks Training AWS Red Team Expert (ARTE)
GCP ν•΄ν‚Ή 배우기 및 μ—°μŠ΅ν•˜κΈ°: HackTricks Training GCP Red Team Expert (GRTE) Azure ν•΄ν‚Ή 배우기 및 μ—°μŠ΅ν•˜κΈ°: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks μ§€μ›ν•˜κΈ°