Access Tokens

Tip

AWS ν•΄ν‚Ή 배우기 및 μ—°μŠ΅ν•˜κΈ°:HackTricks Training AWS Red Team Expert (ARTE)
GCP ν•΄ν‚Ή 배우기 및 μ—°μŠ΅ν•˜κΈ°: HackTricks Training GCP Red Team Expert (GRTE) Azure ν•΄ν‚Ή 배우기 및 μ—°μŠ΅ν•˜κΈ°: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks μ§€μ›ν•˜κΈ°

Access Tokens

각 μ‹œμŠ€ν…œμ— λ‘œκ·ΈμΈν•œ μ‚¬μš©μžλŠ” ν•΄λ‹Ή 둜그인 μ„Έμ…˜μ— λŒ€ν•œ λ³΄μ•ˆ 정보가 ν¬ν•¨λœ μ•‘μ„ΈμŠ€ 토큰을 λ³΄μœ ν•˜κ³  μžˆμŠ΅λ‹ˆλ‹€. μ‚¬μš©μžκ°€ λ‘œκ·ΈμΈν•  λ•Œ μ‹œμŠ€ν…œμ€ μ•‘μ„ΈμŠ€ 토큰을 μƒμ„±ν•©λ‹ˆλ‹€. μ‚¬μš©μžλ₯Ό λŒ€μ‹ ν•˜μ—¬ μ‹€ν–‰λ˜λŠ” λͺ¨λ“  ν”„λ‘œμ„ΈμŠ€λŠ” μ•‘μ„ΈμŠ€ ν† ν°μ˜ 볡사본을 κ°€μ§€κ³  μžˆμŠ΅λ‹ˆλ‹€. 이 토큰은 μ‚¬μš©μž, μ‚¬μš©μžμ˜ κ·Έλ£Ή 및 μ‚¬μš©μžμ˜ κΆŒν•œμ„ μ‹λ³„ν•©λ‹ˆλ‹€. 토큰은 ν˜„μž¬ 둜그인 μ„Έμ…˜μ„ μ‹λ³„ν•˜λŠ” 둜그인 SID(λ³΄μ•ˆ μ‹λ³„μž)도 ν¬ν•¨ν•©λ‹ˆλ‹€.

이 정보λ₯Ό 보렀면 whoami /all을 μ‹€ν–‰ν•  수 μžˆμŠ΅λ‹ˆλ‹€.

whoami /all

USER INFORMATION
----------------

User Name             SID
===================== ============================================
desktop-rgfrdxl\cpolo S-1-5-21-3359511372-53430657-2078432294-1001


GROUP INFORMATION
-----------------

Group Name                                                    Type             SID                                                                                                           Attributes
============================================================= ================ ============================================================================================================= ==================================================
Mandatory Label\Medium Mandatory Level                        Label            S-1-16-8192
Everyone                                                      Well-known group S-1-1-0                                                                                                       Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Local account and member of Administrators group Well-known group S-1-5-114                                                                                                     Group used for deny only
BUILTIN\Administrators                                        Alias            S-1-5-32-544                                                                                                  Group used for deny only
BUILTIN\Users                                                 Alias            S-1-5-32-545                                                                                                  Mandatory group, Enabled by default, Enabled group
BUILTIN\Performance Log Users                                 Alias            S-1-5-32-559                                                                                                  Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\INTERACTIVE                                      Well-known group S-1-5-4                                                                                                       Mandatory group, Enabled by default, Enabled group
CONSOLE LOGON                                                 Well-known group S-1-2-1                                                                                                       Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users                              Well-known group S-1-5-11                                                                                                      Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization                                Well-known group S-1-5-15                                                                                                      Mandatory group, Enabled by default, Enabled group
MicrosoftAccount\cpolop@outlook.com                           User             S-1-11-96-3623454863-58364-18864-2661722203-1597581903-3158937479-2778085403-3651782251-2842230462-2314292098 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Local account                                    Well-known group S-1-5-113                                                                                                     Mandatory group, Enabled by default, Enabled group
LOCAL                                                         Well-known group S-1-2-0                                                                                                       Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Cloud Account Authentication                     Well-known group S-1-5-64-36                                                                                                   Mandatory group, Enabled by default, Enabled group


PRIVILEGES INFORMATION
----------------------

Privilege Name                Description                          State
============================= ==================================== ========
SeShutdownPrivilege           Shut down the system                 Disabled
SeChangeNotifyPrivilege       Bypass traverse checking             Enabled
SeUndockPrivilege             Remove computer from docking station Disabled
SeIncreaseWorkingSetPrivilege Increase a process working set       Disabled
SeTimeZonePrivilege           Change the time zone                 Disabled

or using Process Explorer from Sysinternals (select process and accessβ€œSecurityβ€œ tab):

둜컬 κ΄€λ¦¬μž

둜컬 κ΄€λ¦¬μžκ°€ λ‘œκ·ΈμΈν•  λ•Œ, 두 개의 μ•‘μ„ΈμŠ€ 토큰이 μƒμ„±λ©λ‹ˆλ‹€: ν•˜λ‚˜λŠ” κ΄€λ¦¬μž κΆŒν•œμ„ κ°€μ§„ 것이고, λ‹€λ₯Έ ν•˜λ‚˜λŠ” 일반 κΆŒν•œμ„ κ°€μ§„ κ²ƒμž…λ‹ˆλ‹€. 기본적으둜, 이 μ‚¬μš©μžκ°€ ν”„λ‘œμ„ΈμŠ€λ₯Ό μ‹€ν–‰ν•  λ•Œ 일반 (λΉ„κ΄€λ¦¬μž) κΆŒν•œμ΄ μ‚¬μš©λ©λ‹ˆλ‹€. 이 μ‚¬μš©μžκ°€ κ΄€λ¦¬μžλ‘œμ„œ 무엇인가λ₯Ό μ‹€ν–‰ν•˜λ €κ³  ν•  λ•Œ (β€œκ΄€λ¦¬μžλ‘œ 싀행” 예λ₯Ό λ“€μ–΄) UACκ°€ κΆŒν•œ μš”μ²­μ„ μœ„ν•΄ μ‚¬μš©λ©λ‹ˆλ‹€.
UAC에 λŒ€ν•΄ 더 μ•Œμ•„λ³΄λ €λ©΄ 이 νŽ˜μ΄μ§€λ₯Ό μ½μœΌμ„Έμš”.

자격 증λͺ… μ‚¬μš©μž κ°€μž₯

λ‹€λ₯Έ μ‚¬μš©μžμ˜ μœ νš¨ν•œ 자격 증λͺ…이 μžˆλ‹€λ©΄, ν•΄λ‹Ή 자격 증λͺ…μœΌλ‘œ μƒˆλ‘œμš΄ 둜그온 μ„Έμ…˜μ„ 생성할 수 μžˆμŠ΅λ‹ˆλ‹€:

runas /user:domain\username cmd.exe

μ•‘μ„ΈμŠ€ 토큰은 LSASS λ‚΄μ˜ 둜그온 μ„Έμ…˜μ— λŒ€ν•œ 참쑰도 κ°€μ§€κ³  μžˆμŠ΅λ‹ˆλ‹€. μ΄λŠ” ν”„λ‘œμ„ΈμŠ€κ°€ λ„€νŠΈμ›Œν¬μ˜ 일뢀 객체에 μ ‘κ·Όν•΄μ•Ό ν•  λ•Œ μœ μš©ν•©λ‹ˆλ‹€.
λ„€νŠΈμ›Œν¬ μ„œλΉ„μŠ€μ— μ ‘κ·Όν•˜κΈ° μœ„ν•΄ λ‹€λ₯Έ 자격 증λͺ…을 μ‚¬μš©ν•˜λŠ” ν”„λ‘œμ„ΈμŠ€λ₯Ό μ‹œμž‘ν•  수 μžˆμŠ΅λ‹ˆλ‹€:

runas /user:domain\username /netonly cmd.exe

이것은 λ„€νŠΈμ›Œν¬μ˜ 객체에 μ ‘κ·Όν•  수 μžˆλŠ” μœ μš©ν•œ 자격 증λͺ…이 μžˆμ§€λ§Œ, ν˜„μž¬ 호슀트 λ‚΄μ—μ„œλŠ” μœ νš¨ν•˜μ§€ μ•Šμ€ κ²½μš°μ— μœ μš©ν•©λ‹ˆλ‹€(ν˜„μž¬ ν˜ΈμŠ€νŠΈμ—μ„œλŠ” ν˜„μž¬ μ‚¬μš©μž κΆŒν•œμ΄ μ‚¬μš©λ©λ‹ˆλ‹€).

ν† ν°μ˜ μ’…λ₯˜

μ‚¬μš© κ°€λŠ₯ν•œ 두 κ°€μ§€ μœ ν˜•μ˜ 토큰이 μžˆμŠ΅λ‹ˆλ‹€:

  • Primary Token: ν”„λ‘œμ„ΈμŠ€μ˜ λ³΄μ•ˆ 자격 증λͺ…을 λ‚˜νƒ€λ‚΄λŠ” 역할을 ν•©λ‹ˆλ‹€. κΈ°λ³Έ ν† ν°μ˜ 생성 및 ν”„λ‘œμ„ΈμŠ€μ™€μ˜ 연관은 κΆŒν•œ μƒμŠΉμ΄ ν•„μš”ν•œ μž‘μ—…μœΌλ‘œ, κΆŒν•œ 뢄리 원칙을 κ°•μ‘°ν•©λ‹ˆλ‹€. 일반적으둜 인증 μ„œλΉ„μŠ€κ°€ 토큰 생성을 λ‹΄λ‹Ήν•˜κ³ , 둜그온 μ„œλΉ„μŠ€κ°€ μ‚¬μš©μž 운영 체제 μ…Έκ³Όμ˜ 연관을 μ²˜λ¦¬ν•©λ‹ˆλ‹€. ν”„λ‘œμ„ΈμŠ€λŠ” 생성 μ‹œ λΆ€λͺ¨ ν”„λ‘œμ„ΈμŠ€μ˜ κΈ°λ³Έ 토큰을 μƒμ†λ°›λŠ”λ‹€λŠ” 점도 μ£Όλͺ©ν•  λ§Œν•©λ‹ˆλ‹€.
  • Impersonation Token: μ„œλ²„ μ• ν”Œλ¦¬μΌ€μ΄μ…˜μ΄ ν΄λΌμ΄μ–ΈνŠΈμ˜ 신원을 μΌμ‹œμ μœΌλ‘œ μ±„νƒν•˜μ—¬ λ³΄μ•ˆ 객체에 μ ‘κ·Όν•  수 μžˆλ„λ‘ ν•©λ‹ˆλ‹€. 이 λ©”μ»€λ‹ˆμ¦˜μ€ λ„€ κ°€μ§€ 운영 μˆ˜μ€€μœΌλ‘œ λ‚˜λ‰©λ‹ˆλ‹€:
    • Anonymous: μ‹λ³„λ˜μ§€ μ•Šμ€ μ‚¬μš©μžμ™€ μœ μ‚¬ν•œ μ„œλ²„ 접근을 ν—ˆμš©ν•©λ‹ˆλ‹€.
    • Identification: μ„œλ²„κ°€ 객체 접근을 μœ„ν•΄ ν΄λΌμ΄μ–ΈνŠΈμ˜ 신원을 μ‚¬μš©ν•˜μ§€ μ•Šκ³  확인할 수 μžˆλ„λ‘ ν•©λ‹ˆλ‹€.
    • Impersonation: μ„œλ²„κ°€ ν΄λΌμ΄μ–ΈνŠΈμ˜ μ‹ μ›μœΌλ‘œ μž‘λ™ν•  수 있게 ν•©λ‹ˆλ‹€.
    • Delegation: Impersonationκ³Ό μœ μ‚¬ν•˜μ§€λ§Œ, μ„œλ²„κ°€ μƒν˜Έμž‘μš©ν•˜λŠ” 원격 μ‹œμŠ€ν…œμ— 이 신원 가정을 ν™•μž₯ν•  수 μžˆλŠ” λŠ₯λ ₯을 ν¬ν•¨ν•˜μ—¬ 자격 증λͺ…을 λ³΄μ‘΄ν•©λ‹ˆλ‹€.

Impersonate Tokens

λ©”νƒ€μŠ€ν”Œλ‘œμž‡μ˜ incognito λͺ¨λ“ˆμ„ μ‚¬μš©ν•˜λ©΄ μΆ©λΆ„ν•œ κΆŒν•œμ΄ μžˆλŠ” 경우 λ‹€λ₯Έ tokensλ₯Ό μ‰½κ²Œ listν•˜κ³  impersonateν•  수 μžˆμŠ΅λ‹ˆλ‹€. μ΄λŠ” λ‹€λ₯Έ μ‚¬μš©μžμ²˜λŸΌ ν–‰λ™ν•˜λŠ” μž‘μ—…μ„ μˆ˜ν–‰ν•˜λŠ” 데 μœ μš©ν•  수 μžˆμŠ΅λ‹ˆλ‹€. 이 기술둜 κΆŒν•œ μƒμŠΉλ„ ν•  수 μžˆμŠ΅λ‹ˆλ‹€.

Token Privileges

μ–΄λ–€ token privilegesκ°€ κΆŒν•œ μƒμŠΉμ— μ•…μš©λ  수 μžˆλŠ”μ§€ μ•Œμ•„λ³΄μ„Έμš”:

Abusing Tokens

λͺ¨λ“  κ°€λŠ₯ν•œ 토큰 κΆŒν•œκ³Ό 이 μ™ΈλΆ€ νŽ˜μ΄μ§€μ˜ 일뢀 μ •μ˜λ₯Ό ν™•μΈν•˜μ„Έμš”.

References

토큰에 λŒ€ν•΄ 더 μ•Œμ•„λ³΄λ €λ©΄ 이 νŠœν† λ¦¬μ–Όμ„ μ°Έμ‘°ν•˜μ„Έμš”: https://medium.com/@seemant.bisht24/understanding-and-abusing-process-tokens-part-i-ee51671f2cfa 및 https://medium.com/@seemant.bisht24/understanding-and-abusing-access-tokens-part-ii-b9069f432962

Tip

AWS ν•΄ν‚Ή 배우기 및 μ—°μŠ΅ν•˜κΈ°:HackTricks Training AWS Red Team Expert (ARTE)
GCP ν•΄ν‚Ή 배우기 및 μ—°μŠ΅ν•˜κΈ°: HackTricks Training GCP Red Team Expert (GRTE) Azure ν•΄ν‚Ή 배우기 및 μ—°μŠ΅ν•˜κΈ°: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks μ§€μ›ν•˜κΈ°