Kerberos ์ธ์ฆ

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

์ข‹์€ ๊ฒŒ์‹œ๋ฌผ ํ™•์ธ: https://www.tarlogic.com/en/blog/how-kerberos-works/

๊ณต๊ฒฉ์ž์šฉ ์š”์•ฝ

  • Kerberos๋Š” ๊ธฐ๋ณธ AD auth protocol์ž…๋‹ˆ๋‹ค; ๋Œ€๋ถ€๋ถ„์˜ lateral-movement ์ฒด์ธ์ด ์ด๋ฅผ ๊ฑฐ์นฉ๋‹ˆ๋‹ค. ์‹ค์Šต์šฉ ์น˜ํŠธ์‹œํŠธ(ASโ€‘REP/Kerberoasting, ticket forging, delegation abuse ๋“ฑ)๋Š” ๋‹ค์Œ์„ ์ฐธ์กฐํ•˜์„ธ์š”: 88tcp/udp - Pentesting Kerberos

์ตœ์‹  ๊ณต๊ฒฉ ๋…ธํŠธ (2024โ€‘2026)

  • RC4 finally going away โ€“ Windows Server 2025 DCs๋Š” ๋” ์ด์ƒ RC4 TGT๋ฅผ ๋ฐœ๊ธ‰ํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค; Microsoft๋Š” 2026๋…„ Q2 ๋ง๊นŒ์ง€ AD DC์— ๋Œ€ํ•ด RC4๋ฅผ ๊ธฐ๋ณธ์ ์œผ๋กœ ๋น„ํ™œ์„ฑํ™”ํ•  ๊ณ„ํš์ž…๋‹ˆ๋‹ค. ๋ ˆ๊ฑฐ์‹œ ์•ฑ์„ ์œ„ํ•ด RC4๋ฅผ ๋‹ค์‹œ ํ™œ์„ฑํ™”ํ•œ ํ™˜๊ฒฝ์€ Kerberoasting์— ๋Œ€ํ•œ ๋‹ค์šด๊ทธ๋ ˆ์ด๋“œ/๋น ๋ฅธ ํฌ๋ž™ ๊ธฐํšŒ๋ฅผ ๋งŒ๋“ญ๋‹ˆ๋‹ค.
  • PAC validation enforcement (Apr 2025) โ€“ 2025๋…„ 4์›” ์—…๋ฐ์ดํŠธ๋Š” โ€œCompatibilityโ€ ๋ชจ๋“œ๋ฅผ ์ œ๊ฑฐํ•ฉ๋‹ˆ๋‹ค; enforcement๊ฐ€ ํ™œ์„ฑํ™”๋œ ํŒจ์น˜๋œ DC์—์„œ๋Š” ์œ„์กฐ๋œ PACs/golden tickets๊ฐ€ ๊ฑฐ๋ถ€๋ฉ๋‹ˆ๋‹ค. ๋ ˆ๊ฑฐ์‹œ/๋ฏธํŒจ์น˜ DC๋Š” ์—ฌ์ „ํžˆ ์•…์šฉ ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
  • CVEโ€‘2025โ€‘26647 (altSecID CBA mapping) โ€“ DC๊ฐ€ ๋ฏธํŒจ์น˜์ด๊ฑฐ๋‚˜ Audit ๋ชจ๋“œ๋กœ ๋‚จ์•„ ์žˆ๋Š” ๊ฒฝ์šฐ, nonโ€‘NTAuth CA์— ์ฒด์ธ๋œ ์ธ์ฆ์„œ์ง€๋งŒ SKI/altSecID๋กœ ๋งคํ•‘๋œ ์ธ์ฆ์„œ๋Š” ์—ฌ์ „ํžˆ ๋กœ๊ทธ์˜จํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋ณดํ˜ธ๊ฐ€ ์ž‘๋™ํ•˜๋ฉด ์ด๋ฒคํŠธ 45/21์ด ์ƒ์„ฑ๋ฉ๋‹ˆ๋‹ค.
  • NTLM phaseโ€‘out โ€“ Microsoft๋Š” ํ–ฅํ›„ Windows ๋ฆด๋ฆฌ์Šค๋ฅผ ๊ธฐ๋ณธ์ ์œผ๋กœ NTLM ๋น„ํ™œ์„ฑํ™” ์ƒํƒœ๋กœ ์ถœ์‹œํ•  ์˜ˆ์ •์ž…๋‹ˆ๋‹ค(2026๋…„๊นŒ์ง€ ๋‹จ๊ณ„์  ์ ์šฉ), ์ด๋กœ ์ธํ•ด ๋” ๋งŽ์€ ์ธ์ฆ์ด Kerberos๋กœ ์ด๋™ํ•  ๊ฒƒ์ž…๋‹ˆ๋‹ค. ํ•˜๋“œ๋‹๋œ ๋„คํŠธ์›Œํฌ์—์„œ๋Š” Kerberos ํ‘œ๋ฉด ์˜์—ญ ์ฆ๊ฐ€์™€ ๋” ์—„๊ฒฉํ•œ EPA/CBT๋ฅผ ์˜ˆ์ƒํ•˜์„ธ์š”.
  • Crossโ€‘domain RBCD remains powerful โ€“ Microsoft Learn์— ๋”ฐ๋ฅด๋ฉด resourceโ€‘based constrained delegation์€ ๋„๋ฉ”์ธ/ํฌ๋ฆฌ์ŠคํŠธ ๊ฐ„์— ์ž‘๋™ํ•ฉ๋‹ˆ๋‹ค; ๋ฆฌ์†Œ์Šค ๊ฐ์ฒด์˜ ์“ฐ๊ธฐ ๊ฐ€๋Šฅํ•œ msDS-AllowedToActOnBehalfOfOtherIdentity๋Š” ํ”„๋ŸฐํŠธ์—”๋“œ ์„œ๋น„์Šค ACL์„ ๊ฑด๋“œ๋ฆฌ์ง€ ์•Š๊ณ ๋„ S4U2selfโ†’S4U2proxy impersonation์„ ํ—ˆ์šฉํ•ฉ๋‹ˆ๋‹ค.

๋น ๋ฅธ ๋„๊ตฌ

  • Rubeus kerberoast (AES default): Rubeus.exe kerberoast /user:svc_sql /aes /nowrap /outfile:tgs.txt โ€” AES ํ•ด์‹œ๋ฅผ ์ถœ๋ ฅํ•ฉ๋‹ˆ๋‹ค; GPU ํฌ๋ž˜ํ‚น์„ ๊ณ„ํšํ•˜๊ฑฐ๋‚˜ ๋Œ€์‹  preโ€‘auth disabled ์‚ฌ์šฉ์ž๋ฅผ ๋Œ€์ƒ์œผ๋กœ ํ•˜์„ธ์š”.
  • RC4 downgrade target hunting: RC4๋ฅผ ์—ฌ์ „ํžˆ ๊ด‘๊ณ ํ•˜๋Š” ๊ณ„์ •์„ Get-ADObject -LDAPFilter '(msDS-SupportedEncryptionTypes=4)' -Properties msDS-SupportedEncryptionTypes๋กœ ์—ด๊ฑฐํ•˜์—ฌ RC4๊ฐ€ ์™„์ „ํžˆ ๋น„ํ™œ์„ฑํ™”๋˜๊ธฐ ์ „์— ์•ฝํ•œ kerberoast ํ›„๋ณด๋ฅผ ์ฐพ์œผ์„ธ์š”.

References

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ