1080 - Pentesting Socks

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

๊ธฐ๋ณธ ์ •๋ณด

SOCKS๋Š” ํด๋ผ์ด์–ธํŠธ์™€ ์„œ๋ฒ„ ๊ฐ„์˜ ๋ฐ์ดํ„ฐ๋ฅผ ํ”„๋ก์‹œ๋ฅผ ํ†ตํ•ด ์ „์†กํ•˜๋Š” ๋ฐ ์‚ฌ์šฉ๋˜๋Š” ํ”„๋กœํ† ์ฝœ์ž…๋‹ˆ๋‹ค. ๋‹ค์„ฏ ๋ฒˆ์งธ ๋ฒ„์ „์ธ SOCKS5๋Š” ์„ ํƒ์  ์ธ์ฆ ๊ธฐ๋Šฅ์„ ์ถ”๊ฐ€ํ•˜์—ฌ ๊ถŒํ•œ์ด ์žˆ๋Š” ์‚ฌ์šฉ์ž๋งŒ ์„œ๋ฒ„์— ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•ฉ๋‹ˆ๋‹ค. ์ฃผ๋กœ TCP ์—ฐ๊ฒฐ์˜ ํ”„๋ก์‹œ์™€ UDP ํŒจํ‚ท์˜ ์ „๋‹ฌ(UDP ASSOCIATE ๋ช…๋ น์„ ํ†ตํ•ด)์„ ์ฒ˜๋ฆฌํ•˜๋ฉฐ, OSI ๋ชจ๋ธ์˜ ์„ธ์…˜ ๊ณ„์ธต (Layer 5)์—์„œ ๋™์ž‘ํ•ฉ๋‹ˆ๋‹ค. ๋„๊ตฌ๊ฐ€ socks5h ์Šคํ‚ด์„ ์ง€์›ํ•˜๋ฉด, DNS ํ•ด์„์ด ํ”„๋ก์‹œ๋ฅผ ํ†ตํ•ด ๊ฐ•์ œ๋กœ ์ด๋ฃจ์–ด์ ธ ๋กœ์ปฌ DNS leak์„ ๋ฐฉ์ง€ํ•˜๊ณ  ๋ฐœ์‹  ํ˜ธ์ŠคํŠธ์˜ fingerprinting์„ ์–ด๋ ต๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค.

๊ธฐ๋ณธ ํฌํŠธ: 1080

์—ด๊ฑฐ

์ธ์ฆ ํ™•์ธ

nmap -p 1080 <ip> --script socks-auth-info

Brute Force

๊ธฐ๋ณธ ์‚ฌ์šฉ๋ฒ•

nmap --script socks-brute -p 1080 <ip>

๊ณ ๊ธ‰ ์‚ฌ์šฉ๋ฒ•

nmap  --script socks-brute --script-args userdb=users.txt,passdb=rockyou.txt,unpwdb.timelimit=30m -p 1080 <ip>

Output

PORT     STATE SERVICE
1080/tcp open  socks
| socks-brute:
|   Accounts
|     patrik:12345 - Valid credentials
|   Statistics
|_    Performed 1921 guesses in 6 seconds, average tps: 320

Hydra ๋ชจ๋“ˆ

hydra -L users.txt -P passwords.txt -s 1080 -t 16 -V <ip> socks5

๋ฐฉ๋ฒ• & open-proxy enumeration

nmap -sV --script socks-methods,socks-open-proxy -p 1080 <ip>

socks-methods๋Š” ์„œ๋ฒ„๊ฐ€ ์ง€์›ํ•˜๋Š” ์ธ์ฆ ์œ ํ˜•์„ ๋‚˜์—ดํ•˜๋„๋ก ๊ฐ•์ œํ•˜๊ณ , socks-open-proxy๋Š” ์„œ๋น„์Šค๊ฐ€ ๋ฆด๋ ˆ์ด๋กœ ์•…์šฉ๋  ์ˆ˜ ์žˆ๋Š”์ง€ ํ™•์ธํ•˜๊ธฐ ์œ„ํ•ด ์•„์›ƒ๋ฐ”์šด๋“œ CONNECT๋ฅผ ์‹œ๋„ํ•ฉ๋‹ˆ๋‹ค.

์›์‹œ ํ•ธ๋“œ์…ฐ์ดํฌ ๊ฒ€์‚ฌ

printf '\x05\x01\x00' | nc -nv <ip> 1080

A \x05 01 00 ์‘๋‹ต์€ SOCKS5๊ฐ€ โ€œno authenticationโ€œ์„ ์ œ๊ณตํ•จ์„ ๋‚˜ํƒ€๋ƒ…๋‹ˆ๋‹ค. \x00 ๋‹ค์Œ์— \x02๊ฐ€ ์˜ค๋ฉด username/password๊ฐ€ ํ•„์š”ํ•จ์„ ์˜๋ฏธํ•˜๋ฉฐ, ์ด๋Š” scripts์—์„œ ๋…ธ์ถœ๋œ ์žฅ์น˜๋ฅผ ๋น ๋ฅด๊ฒŒ fingerprintingํ•˜๋Š” ๋ฐ ์œ ์šฉํ•ฉ๋‹ˆ๋‹ค.

๋น ๋ฅธ egress ๊ฒ€์ฆ

curl --socks5-hostname <ip>:1080 https://ifconfig.me
curl --socks5-hostname user:pass@<ip>:1080 http://internal.target

DNS ํ•ด์„์ด ์›๊ฒฉ์—์„œ ์ด๋ฃจ์–ด์ง€๋„๋ก --socks5-hostname(๋˜๋Š” socks5h:// URL)๋ฅผ ์‚ฌ์šฉํ•˜์„ธ์š”. ํ”„๋ก์‹œ๊ฐ€ ์‹ค์ œ๋กœ ๋‚ด๋ถ€ ์ ‘๊ทผ์„ ์ œ๊ณตํ•˜๋Š”์ง€ ํ™•์ธํ•˜๋ ค๋ฉด proxychains4 -q nmap -sT -Pn --top-ports 200 <internal-host>์™€ ํ•จ๊ป˜ ์‚ฌ์šฉํ•˜์„ธ์š”.

์ธํ„ฐ๋„ท ์ „์—ญ ํƒ์ƒ‰ / ์ง€๋ฌธ ์ˆ˜์ง‘

masscan 0.0.0.0/0 -p1080 --banners --rate 100000 -oX socks.xml

๊ฒฐ๊ณผ๋ฅผ NSE, zgrab2, ๋˜๋Š” custom python scripts์— ๋‹ค์‹œ ํ”ผ๋“œ๋ฐฑํ•˜์—ฌ ์œ ๋งํ•œ ํ˜ธ์ŠคํŠธ(์˜ˆ: ๋ฐฐ๋„ˆ ๋ฌธ์ž์—ด 3proxy, Dante, MikroTik)์˜ ์šฐ์„ ์ˆœ์œ„๋ฅผ ์ •ํ•˜์„ธ์š”.

Tunneling and Port Forwarding

tunneling and post forwarding์— ๊ด€ํ•œ ์ •๋ณด๋Š” ๋‹ค์Œ ํŽ˜์ด์ง€๋ฅผ ํ™•์ธํ•˜์„ธ์š”: Tunneling and Port Forwarding

์ฐธ๊ณ ์ž๋ฃŒ

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ