AD ์ธ์ฆ์„œ

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

์†Œ๊ฐœ

์ธ์ฆ์„œ ๊ตฌ์„ฑ ์š”์†Œ

  • ์ธ์ฆ์„œ์˜ Subject๋Š” ์†Œ์œ ์ž๋ฅผ ๋‚˜ํƒ€๋ƒ…๋‹ˆ๋‹ค.
  • Public Key๋Š” ๊ฐœ์ธ ํ‚ค์™€ ์Œ์„ ์ด๋ฃจ์–ด ์ธ์ฆ์„œ๋ฅผ ์ •๋‹นํ•œ ์†Œ์œ ์ž์™€ ์—ฐ๊ฒฐํ•ฉ๋‹ˆ๋‹ค.
  • ์œ ํšจ ๊ธฐ๊ฐ„์€ NotBefore ๋ฐ NotAfter ๋‚ ์งœ๋กœ ์ •์˜๋˜๋ฉฐ ์ธ์ฆ์„œ์˜ ์œ ํšจ ๊ธฐ๊ฐ„์„ ํ‘œ์‹œํ•ฉ๋‹ˆ๋‹ค.
  • ๊ณ ์œ ํ•œ Serial Number๋Š” Certificate Authority(CA)๊ฐ€ ์ œ๊ณตํ•˜๋ฉฐ ๊ฐ ์ธ์ฆ์„œ๋ฅผ ์‹๋ณ„ํ•ฉ๋‹ˆ๋‹ค.
  • Issuer๋Š” ์ธ์ฆ์„œ๋ฅผ ๋ฐœํ–‰ํ•œ CA๋ฅผ ๊ฐ€๋ฆฌํ‚ต๋‹ˆ๋‹ค.
  • SubjectAlternativeName์€ subject์— ๋Œ€ํ•œ ์ถ”๊ฐ€ ์ด๋ฆ„์„ ํ—ˆ์šฉํ•˜์—ฌ ์‹๋ณ„ ์œ ์—ฐ์„ฑ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.
  • Basic Constraints๋Š” ์ธ์ฆ์„œ๊ฐ€ CA์šฉ์ธ์ง€ ์—”๋“œ ์—”ํ„ฐํ‹ฐ์šฉ์ธ์ง€ ์‹๋ณ„ํ•˜๊ณ  ์‚ฌ์šฉ ์ œํ•œ์„ ์ •์˜ํ•ฉ๋‹ˆ๋‹ค.
  • **Extended Key Usages (EKUs)**๋Š” Object Identifiers(OIDs)๋ฅผ ํ†ตํ•ด ์ฝ”๋“œ ์„œ๋ช…์ด๋‚˜ ์ด๋ฉ”์ผ ์•”ํ˜ธํ™”์™€ ๊ฐ™์€ ์ธ์ฆ์„œ์˜ ํŠน์ • ์šฉ๋„๋ฅผ ๊ตฌ๋ถ„ํ•ฉ๋‹ˆ๋‹ค.
  • Signature Algorithm์€ ์ธ์ฆ์„œ๋ฅผ ์„œ๋ช…ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ง€์ •ํ•ฉ๋‹ˆ๋‹ค.
  • Signature๋Š” ๋ฐœํ–‰์ž์˜ ๊ฐœ์ธ ํ‚ค๋กœ ์ƒ์„ฑ๋˜์–ด ์ธ์ฆ์„œ์˜ ์ง„์œ„๋ฅผ ๋ณด์žฅํ•ฉ๋‹ˆ๋‹ค.

ํŠน๋ณ„ ๊ณ ๋ ค ์‚ฌํ•ญ

  • **Subject Alternative Names (SANs)**๋Š” ํ•˜๋‚˜์˜ ์ธ์ฆ์„œ๋ฅผ ์—ฌ๋Ÿฌ ์ •์ฒด์„ฑ์— ์ ์šฉํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•˜์—ฌ, ์—ฌ๋Ÿฌ ๋„๋ฉ”์ธ์„ ๊ฐ€์ง„ ์„œ๋ฒ„์— ํŠนํžˆ ์ค‘์š”ํ•ฉ๋‹ˆ๋‹ค. SAN ๊ทœ๊ฒฉ์„ ์กฐ์ž‘ํ•ด ์‚ฌ์นญํ•˜๋Š” ๊ณต๊ฒฉ์„ ๋ฐฉ์ง€ํ•˜๋ ค๋ฉด ์•ˆ์ „ํ•œ ๋ฐœ๊ธ‰ ์ ˆ์ฐจ๊ฐ€ ํ•„์ˆ˜์ ์ž…๋‹ˆ๋‹ค.

Active Directory(AD)์˜ Certificate Authorities (CAs)

AD CS๋Š” ์ง€์ •๋œ ์ปจํ…Œ์ด๋„ˆ๋ฅผ ํ†ตํ•ด AD ํฌ๋ฆฌ์ŠคํŠธ์—์„œ CA ์ธ์ฆ์„œ๋ฅผ ์ธ์‹ํ•˜๋ฉฐ, ๊ฐ ์ปจํ…Œ์ด๋„ˆ๋Š” ๊ณ ์œ ํ•œ ์—ญํ• ์„ ํ•ฉ๋‹ˆ๋‹ค:

  • Certification Authorities ์ปจํ…Œ์ด๋„ˆ์—๋Š” ์‹ ๋ขฐ๋œ ๋ฃจํŠธ CA ์ธ์ฆ์„œ๊ฐ€ ์ €์žฅ๋ฉ๋‹ˆ๋‹ค.
  • Enrolment Services ์ปจํ…Œ์ด๋„ˆ์—๋Š” Enterprise CAs ๋ฐ ํ•ด๋‹น ์ธ์ฆ์„œ ํ…œํ”Œ๋ฆฟ์— ๋Œ€ํ•œ ์ •๋ณด๊ฐ€ ํฌํ•จ๋ฉ๋‹ˆ๋‹ค.
  • NTAuthCertificates ๊ฐ์ฒด์—๋Š” AD ์ธ์ฆ์— ํ—ˆ์šฉ๋œ CA ์ธ์ฆ์„œ๊ฐ€ ํฌํ•จ๋ฉ๋‹ˆ๋‹ค.
  • AIA (Authority Information Access) ์ปจํ…Œ์ด๋„ˆ๋Š” ์ค‘๊ฐ„ CA ๋ฐ ๊ต์ฐจ CA ์ธ์ฆ์„œ์™€ ํ•จ๊ป˜ ์ธ์ฆ์„œ ์ฒด์ธ ๊ฒ€์ฆ์„ ๋•์Šต๋‹ˆ๋‹ค.

์ธ์ฆ์„œ ํš๋“: ํด๋ผ์ด์–ธํŠธ ์ธ์ฆ์„œ ์š”์ฒญ ํ๋ฆ„

  1. ํด๋ผ์ด์–ธํŠธ๊ฐ€ Enterprise CA๋ฅผ ์ฐพ๋Š” ๊ฒƒ์œผ๋กœ ์š”์ฒญ ํ”„๋กœ์„ธ์Šค๊ฐ€ ์‹œ์ž‘๋ฉ๋‹ˆ๋‹ค.
  2. ๊ณต๊ฐœ-๊ฐœ์ธ ํ‚ค ์Œ์„ ์ƒ์„ฑํ•œ ํ›„ ๊ณต๊ฐœ ํ‚ค์™€ ๊ธฐํƒ€ ์„ธ๋ถ€ ์ •๋ณด๋ฅผ ํฌํ•จํ•œ CSR์ด ์ž‘์„ฑ๋ฉ๋‹ˆ๋‹ค.
  3. CA๋Š” ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•œ ์ธ์ฆ์„œ ํ…œํ”Œ๋ฆฟ์— ๋Œ€ํ•ด CSR์„ ํ‰๊ฐ€ํ•˜๊ณ , ํ…œํ”Œ๋ฆฟ ๊ถŒํ•œ์— ๋”ฐ๋ผ ์ธ์ฆ์„œ๋ฅผ ๋ฐœ๊ธ‰ํ•ฉ๋‹ˆ๋‹ค.
  4. ์Šน์ธ๋˜๋ฉด CA๋Š” ์ž์‹ ์˜ ๊ฐœ์ธ ํ‚ค๋กœ ์ธ์ฆ์„œ์— ์„œ๋ช…ํ•˜์—ฌ ํด๋ผ์ด์–ธํŠธ์—๊ฒŒ ๋ฐ˜ํ™˜ํ•ฉ๋‹ˆ๋‹ค.

์ธ์ฆ์„œ ํ…œํ”Œ๋ฆฟ

AD ๋‚ด์—์„œ ์ •์˜๋˜๋Š” ์ด ํ…œํ”Œ๋ฆฟ์€ ์ธ์ฆ์„œ ๋ฐœ๊ธ‰ ์„ค์ •๊ณผ ๊ถŒํ•œ์„ ๊ทœ์ •ํ•˜๋ฉฐ, ํ—ˆ์šฉ๋œ EKU, ๋“ฑ๋ก(enrollment) ๋˜๋Š” ์ˆ˜์ • ๊ถŒํ•œ ๋“ฑ ์ธ์ฆ์„œ ์„œ๋น„์Šค ์ ‘๊ทผ ๊ด€๋ฆฌ๋ฅผ ์œ„ํ•ด ์ค‘์š”ํ•ฉ๋‹ˆ๋‹ค.

์ธ์ฆ์„œ ๋“ฑ๋ก

์ธ์ฆ์„œ ๋“ฑ๋ก ํ”„๋กœ์„ธ์Šค๋Š” ๊ด€๋ฆฌ์ž๊ฐ€ ์ธ์ฆ์„œ ํ…œํ”Œ๋ฆฟ์„ ์ƒ์„ฑํ•˜๋ฉด ์‹œ์ž‘๋˜๊ณ , ๊ทธ ํ…œํ”Œ๋ฆฟ์€ Enterprise Certificate Authority(CA)์— ์˜ํ•ด ๊ฒŒ์‹œ๋ฉ๋‹ˆ๋‹ค. ์ด๋ ‡๊ฒŒ ํ•˜๋ฉด ํ…œํ”Œ๋ฆฟ์ด ํด๋ผ์ด์–ธํŠธ ๋“ฑ๋ก์— ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•ด์ง€๋ฉฐ, ์ด๋Š” Active Directory ๊ฐ์ฒด์˜ certificatetemplates ํ•„๋“œ์— ํ…œํ”Œ๋ฆฟ ์ด๋ฆ„์„ ์ถ”๊ฐ€ํ•˜์—ฌ ์ด๋ฃจ์–ด์ง‘๋‹ˆ๋‹ค.

ํด๋ผ์ด์–ธํŠธ๊ฐ€ ์ธ์ฆ์„œ๋ฅผ ์š”์ฒญํ•˜๋ ค๋ฉด ๋“ฑ๋ก ๊ถŒํ•œ(enrollment rights) ์ด ๋ถ€์—ฌ๋˜์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๊ถŒํ•œ์€ ์ธ์ฆ์„œ ํ…œํ”Œ๋ฆฟ ๋ฐ Enterprise CA ์ž์ฒด์˜ ๋ณด์•ˆ ์„ค๋ช…์ž(security descriptor)์— ์˜ํ•ด ์ •์˜๋ฉ๋‹ˆ๋‹ค. ์š”์ฒญ์ด ์„ฑ๊ณตํ•˜๋ ค๋ฉด ๋‘ ์œ„์น˜ ๋ชจ๋‘์— ๊ถŒํ•œ์ด ๋ถ€์—ฌ๋˜์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.

ํ…œํ”Œ๋ฆฟ ๋“ฑ๋ก ๊ถŒํ•œ

์ด ๊ถŒํ•œ๋“ค์€ Access Control Entries(ACEs)๋ฅผ ํ†ตํ•ด ์ง€์ •๋˜๋ฉฐ, ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๊ถŒํ•œ๋“ค์„ ์ƒ์„ธํžˆ ๊ธฐ์ˆ ํ•ฉ๋‹ˆ๋‹ค:

  • Certificate-Enrollment ๋ฐ Certificate-AutoEnrollment ๊ถŒํ•œ(๊ฐ๊ฐ ํŠน์ • GUID์™€ ์—ฐ๊ด€)
  • ExtendedRights, ๋ชจ๋“  ํ™•์žฅ ๊ถŒํ•œ์„ ํ—ˆ์šฉ
  • FullControl/GenericAll, ํ…œํ”Œ๋ฆฟ์— ๋Œ€ํ•œ ์ „์ฒด ์ œ์–ด ๊ถŒํ•œ ์ œ๊ณต

Enterprise CA ๋“ฑ๋ก ๊ถŒํ•œ

CA์˜ ๊ถŒํ•œ์€ Certificate Authority ๊ด€๋ฆฌ ์ฝ˜์†”์—์„œ ์ ‘๊ทผ ๊ฐ€๋Šฅํ•œ ๋ณด์•ˆ ์„ค๋ช…์ž์— ๋ช…์‹œ๋ฉ๋‹ˆ๋‹ค. ์ผ๋ถ€ ์„ค์ •์€ ๋‚ฎ์€ ๊ถŒํ•œ์˜ ์‚ฌ์šฉ์ž์—๊ฒŒ ์›๊ฒฉ ์ ‘๊ทผ์„ ํ—ˆ์šฉํ•  ์ˆ˜๋„ ์žˆ์–ด ๋ณด์•ˆ์ƒ ์šฐ๋ ค๊ฐ€ ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ถ”๊ฐ€ ๋ฐœ๊ธ‰ ์ œ์–ด

๋‹ค์Œ๊ณผ ๊ฐ™์€ ์ œ์–ด๊ฐ€ ์ ์šฉ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

  • Manager Approval: ์š”์ฒญ์„ ๋Œ€๊ธฐ(pending) ์ƒํƒœ๋กœ ๋‘๊ณ  ์ธ์ฆ์„œ ๋งค๋‹ˆ์ €์˜ ์Šน์ธ์ด ์žˆ์„ ๋•Œ๊นŒ์ง€ ๋ณด๋ฅ˜ํ•ฉ๋‹ˆ๋‹ค.
  • Enrolment Agents and Authorized Signatures: CSR์— ํ•„์š”ํ•œ ์„œ๋ช… ์ˆ˜์™€ ์š”๊ตฌ๋˜๋Š” Application Policy OID๋ฅผ ์ง€์ •ํ•ฉ๋‹ˆ๋‹ค.

์ธ์ฆ์„œ ์š”์ฒญ ๋ฐฉ๋ฒ•

์ธ์ฆ์„œ๋Š” ๋‹ค์Œ์„ ํ†ตํ•ด ์š”์ฒญํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

  1. Windows Client Certificate Enrollment Protocol (MS-WCCE), DCOM ์ธํ„ฐํŽ˜์ด์Šค ์‚ฌ์šฉ.
  2. ICertPassage Remote Protocol (MS-ICPR), named pipes ๋˜๋Š” TCP/IP ํ†ตํ•ด.
  3. certificate enrollment web interface, Certificate Authority Web Enrollment ์—ญํ• ์ด ์„ค์น˜๋œ ๊ฒฝ์šฐ.
  4. Certificate Enrollment Service (CES), Certificate Enrollment Policy (CEP) ์„œ๋น„์Šค์™€ ํ•จ๊ป˜ ์‚ฌ์šฉ.
  5. ๋„คํŠธ์›Œํฌ ์žฅ์น˜๋ฅผ ์œ„ํ•œ Network Device Enrollment Service (NDES), Simple Certificate Enrollment Protocol (SCEP) ์‚ฌ์šฉ.

Windows ์‚ฌ์šฉ์ž๋Š” GUI(certmgr.msc ๋˜๋Š” certlm.msc)๋‚˜ ์ปค๋งจ๋“œ๋ผ์ธ ๋„๊ตฌ(certreq.exe ๋˜๋Š” PowerShell์˜ Get-Certificate ๋ช…๋ น)๋ฅผ ํ†ตํ•ด์„œ๋„ ์ธ์ฆ์„œ๋ฅผ ์š”์ฒญํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

# Example of requesting a certificate using PowerShell
Get-Certificate -Template "User" -CertStoreLocation "cert:\\CurrentUser\\My"

์ธ์ฆ์„œ ์ธ์ฆ

Active Directory (AD) supports certificate authentication, primarily utilizing Kerberos and Secure Channel (Schannel) protocols.

Kerberos ์ธ์ฆ ํ”„๋กœ์„ธ์Šค

Kerberos ์ธ์ฆ ํ”„๋กœ์„ธ์Šค์—์„œ ์‚ฌ์šฉ์ž์˜ Ticket Granting Ticket (TGT) ์š”์ฒญ์€ ์‚ฌ์šฉ์ž์˜ ์ธ์ฆ์„œ์— ์žˆ๋Š” private key๋กœ ์„œ๋ช…๋œ๋‹ค. ์ด ์š”์ฒญ์€ ๋„๋ฉ”์ธ ์ปจํŠธ๋กค๋Ÿฌ์—์„œ ์ธ์ฆ์„œ์˜ validity, path, revocation status ๋“ฑ์„ ํฌํ•จํ•œ ์—ฌ๋Ÿฌ ๊ฒ€์ฆ์„ ๊ฑฐ์นœ๋‹ค. ๊ฒ€์ฆ์—๋Š” ๋˜ํ•œ ์ธ์ฆ์„œ๊ฐ€ ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ์ถœ์ฒ˜์ธ์ง€ ํ™•์ธํ•˜๊ณ  ๋ฐœ๊ธ‰์ž๊ฐ€ NTAUTH certificate store์— ์กด์žฌํ•˜๋Š”์ง€๋„ ํ™•์ธํ•˜๋Š” ์ ˆ์ฐจ๊ฐ€ ํฌํ•จ๋œ๋‹ค. ๊ฒ€์ฆ์— ์„ฑ๊ณตํ•˜๋ฉด TGT๊ฐ€ ๋ฐœ๊ธ‰๋œ๋‹ค. AD์˜ NTAuthCertificates ๊ฐ์ฒด๋Š” ๋‹ค์Œ ์œ„์น˜์— ์žˆ๋‹ค:

CN=NTAuthCertificates,CN=Public Key Services,CN=Services,CN=Configuration,DC=<domain>,DC=<com>

์ธ์ฆ์„œ ์ธ์ฆ์˜ ์‹ ๋ขฐ๋ฅผ ๊ตฌ์ถ•ํ•˜๋Š” ๋ฐ ์ค‘์‹ฌ์ ์ด๋‹ค.

Secure Channel (Schannel) Authentication

Schannel์€ ์•ˆ์ „ํ•œ TLS/SSL ์—ฐ๊ฒฐ์„ ์ง€์›ํ•˜๋ฉฐ, ํ•ธ๋“œ์…ฐ์ดํฌ ๋™์•ˆ ํด๋ผ์ด์–ธํŠธ๊ฐ€ ์ธ์ฆ์„œ๋ฅผ ์ œ์‹œํ•˜๊ณ  ํ•ด๋‹น ์ธ์ฆ์„œ๊ฐ€ ์„ฑ๊ณต์ ์œผ๋กœ ๊ฒ€์ฆ๋˜๋ฉด ์ ‘๊ทผ์ด ํ—ˆ์šฉ๋ฉ๋‹ˆ๋‹ค. ์ธ์ฆ์„œ๋ฅผ AD ๊ณ„์ •์— ๋งคํ•‘ํ•˜๋Š” ๋ฐฉ๋ฒ•์—๋Š” Kerberos์˜ S4U2Self ๊ธฐ๋Šฅ์ด๋‚˜ ์ธ์ฆ์„œ์˜ Subject Alternative Name (SAN) ๋“ฑ ์—ฌ๋Ÿฌ ๋ฐฉ๋ฒ•์ด ์žˆ์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

AD Certificate Services Enumeration

AD์˜ ์ธ์ฆ์„œ ์„œ๋น„์Šค๋Š” LDAP ์ฟผ๋ฆฌ๋ฅผ ํ†ตํ•ด ์—ด๊ฑฐํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, Enterprise Certificate Authorities (CAs) ๋ฐ ๊ทธ ๊ตฌ์„ฑ ์ •๋ณด๋ฅผ ๋“œ๋Ÿฌ๋ƒ…๋‹ˆ๋‹ค. ์ด๋Š” ํŠน๊ถŒ ์—†์ด ๋„๋ฉ”์ธ์— ์ธ์ฆ๋œ ๋ชจ๋“  ์‚ฌ์šฉ์ž๊ฐ€ ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. Certify ๋ฐ Certipy ๊ฐ™์€ ๋„๊ตฌ๋Š” AD CS ํ™˜๊ฒฝ์—์„œ ์—ด๊ฑฐ ๋ฐ ์ทจ์•ฝ์  ํ‰๊ฐ€์— ์‚ฌ์šฉ๋ฉ๋‹ˆ๋‹ค.

Commands for using these tools include:

# Enumerate trusted root CA certificates, Enterprise CAs and HTTP enrollment endpoints
# Useful flags: /domain, /path, /hideAdmins, /showAllPermissions, /skipWebServiceChecks
Certify.exe cas [/ca:SERVER\ca-name | /domain:domain.local | /path:CN=Configuration,DC=domain,DC=local] [/hideAdmins] [/showAllPermissions] [/skipWebServiceChecks]

# Identify vulnerable certificate templates and filter for common abuse cases
Certify.exe find
Certify.exe find /vulnerable [/currentuser]
Certify.exe find /enrolleeSuppliesSubject   # ESC1 candidates (CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT)
Certify.exe find /clientauth                # templates with client-auth EKU
Certify.exe find /showAllPermissions        # include template ACLs in output
Certify.exe find /json /outfile:C:\Temp\adcs.json

# Enumerate PKI object ACLs (Enterprise PKI container, templates, OIDs) โ€“ useful for ESC4/ESC7 discovery
Certify.exe pkiobjects [/domain:domain.local] [/showAdmins]

# Use Certipy for enumeration and identifying vulnerable templates
certipy find -vulnerable -u john@corp.local -p Passw0rd -dc-ip 172.16.126.128

# Enumerate Enterprise CAs and certificate templates with certutil
certutil.exe -TCAInfo
certutil -v -dstemplate

์ฐธ๊ณ  ์ž๋ฃŒ

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ