Abusing Tokens

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

Tokens

๋งŒ์•ฝ Windows Access Tokens๊ฐ€ ๋ฌด์—‡์ธ์ง€ ๋ชจ๋ฅธ๋‹ค๋ฉด ๊ณ„์†ํ•˜๊ธฐ ์ „์— ์ด ํŽ˜์ด์ง€๋ฅผ ์ฝ์œผ์„ธ์š”:

Access Tokens

์ด๋ฏธ ๊ฐ€์ง€๊ณ  ์žˆ๋Š” tokens์„ ์•…์šฉํ•˜์—ฌ ๊ถŒํ•œ ์ƒ์Šน์„ ํ•  ์ˆ˜ ์žˆ์„์ง€๋„ ๋ชจ๋ฆ…๋‹ˆ๋‹ค

SeImpersonatePrivilege

์ด ๊ถŒํ•œ์€ ์–ด๋–ค ํ”„๋กœ์„ธ์Šค๊ฐ€ ํ† ํฐ์„ ์ƒ์„ฑํ•˜๋Š” ๊ฒƒ์€ ์•„๋‹ˆ์ง€๋งŒ, ํ•ด๋‹น ํ† ํฐ์— ๋Œ€ํ•œ ํ•ธ๋“ค์„ ์–ป์„ ์ˆ˜ ์žˆ๋‹ค๋ฉด ๊ทธ ํ† ํฐ์„ impersonation(๋Œ€๋ฆฌ)ํ•˜๋Š” ๊ฒƒ์„ ํ—ˆ์šฉํ•ฉ๋‹ˆ๋‹ค. ๊ถŒํ•œ์ด ์žˆ๋Š” ํ† ํฐ์€ Windows ์„œ๋น„์Šค(DCOM)์—์„œ NTLM ์ธ์ฆ์„ exploit ์ชฝ์œผ๋กœ ์œ ๋„ํ•˜์—ฌ ์–ป์„ ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด SYSTEM ๊ถŒํ•œ์œผ๋กœ ํ”„๋กœ์„ธ์Šค๋ฅผ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ์ทจ์•ฝ์ ์€ juicy-potato, RogueWinRM (winrm์ด ๋น„ํ™œ์„ฑํ™”๋˜์–ด ์žˆ์–ด์•ผ ํ•จ), SweetPotato, PrintSpoofer ๊ฐ™์€ ๋‹ค์–‘ํ•œ ๋„๊ตฌ๋กœ ์•…์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

RoguePotato, PrintSpoofer, SharpEfsPotato, GodPotato

JuicyPotato

SeAssignPrimaryPrivilege

์ด๋Š” SeImpersonatePrivilege์™€ ๋งค์šฐ ์œ ์‚ฌํ•˜๋ฉฐ, ๊ถŒํ•œ ์žˆ๋Š” ํ† ํฐ์„ ์–ป๊ธฐ ์œ„ํ•ด ๊ฐ™์€ ๋ฐฉ๋ฒ•์„ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค.
๊ทธ ๋‹ค์Œ ์ด ๊ถŒํ•œ์€ ์ƒˆ๋กœ ์ƒ์„ฑ๋˜๊ฑฐ๋‚˜ ์ผ์‹œ์ค‘๋‹จ๋œ ํ”„๋กœ์„ธ์Šค์— primary token์„ ํ• ๋‹นํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•ด์ค๋‹ˆ๋‹ค. ๊ถŒํ•œ ์žˆ๋Š” impersonation ํ† ํฐ์œผ๋กœ๋ถ€ํ„ฐ primary token์„ ํŒŒ์ƒ(DuplicateTokenEx)ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๊ทธ ํ† ํฐ์œผ๋กœ โ€™CreateProcessAsUserโ€™๋ฅผ ์‚ฌ์šฉํ•ด ์ƒˆ ํ”„๋กœ์„ธ์Šค๋ฅผ ์ƒ์„ฑํ•˜๊ฑฐ๋‚˜ ํ”„๋กœ์„ธ์Šค๋ฅผ ์ผ์‹œ์ค‘๋‹จ ์ƒํƒœ๋กœ ๋งŒ๋“  ๋’ค ํ† ํฐ์„ ์„ค์ •ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค(์ผ๋ฐ˜์ ์œผ๋กœ ์‹คํ–‰ ์ค‘์ธ ํ”„๋กœ์„ธ์Šค์˜ primary token์€ ์ˆ˜์ •ํ•  ์ˆ˜ ์—†์Šต๋‹ˆ๋‹ค).

SeTcbPrivilege

์ด ๊ถŒํ•œ์ด ํ™œ์„ฑํ™”๋˜์–ด ์žˆ์œผ๋ฉด KERB_S4U_LOGON์„ ์‚ฌ์šฉํ•ด ์ž๊ฒฉ ์ฆ๋ช…์„ ๋ชจ๋ฅด๋Š” ์ƒํƒœ์—์„œ๋„ ๋‹ค๋ฅธ ์‚ฌ์šฉ์ž์— ๋Œ€ํ•œ impersonation token์„ ์–ป์„ ์ˆ˜ ์žˆ๊ณ , ํ† ํฐ์— ์ž„์˜์˜ ๊ทธ๋ฃน(์˜ˆ: admins)์„ ์ถ”๊ฐ€ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ํ† ํฐ์˜ integrity level์„ โ€œmediumโ€œ์œผ๋กœ ์„ค์ •ํ•˜๊ณ  ์ด ํ† ํฐ์„ ํ˜„์žฌ ์Šค๋ ˆ๋“œ์— ํ• ๋‹น(SetThreadToken)ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

SeBackupPrivilege

์ด ๊ถŒํ•œ์€ ์‹œ์Šคํ…œ์ด ๋ชจ๋“  ํŒŒ์ผ์— ๋Œ€ํ•ด ๋ชจ๋“  ์ฝ๊ธฐ ์ ‘๊ทผ๊ถŒํ•œ์„ ๋ถ€์—ฌํ•˜๋„๋ก ํ•˜๋ฉฐ(์ฝ๊ธฐ ์ž‘์—…์œผ๋กœ ์ œํ•œ), ๋กœ์ปฌ Administrator ๊ณ„์ •์˜ ํŒจ์Šค์›Œ๋“œ ํ•ด์‹œ๋ฅผ ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์—์„œ ์ฝ์–ด์˜ค๋Š” ๋ฐ ์‚ฌ์šฉ๋ฉ๋‹ˆ๋‹ค. ๊ทธ๋Ÿฐ ๋‹ค์Œ โ€œpsexecโ€œ๋‚˜ โ€œwmiexecโ€ ๊ฐ™์€ ๋„๊ตฌ๋กœ ํ•ด์‹œ๋ฅผ ์‚ฌ์šฉ(Pass-the-Hash ๊ธฐ๋ฒ•)ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋‹ค๋งŒ Local Administrator ๊ณ„์ •์ด ๋น„ํ™œ์„ฑํ™”๋˜์–ด ์žˆ๊ฑฐ๋‚˜ ์›๊ฒฉ ์—ฐ๊ฒฐ ์‹œ ๋กœ์ปฌ ๊ด€๋ฆฌ์ž ๊ถŒํ•œ์„ ์ œ๊ฑฐํ•˜๋Š” ์ •์ฑ…์ด ์žˆ์œผ๋ฉด ์ด ๊ธฐ๋ฒ•์€ ์‹คํŒจํ•ฉ๋‹ˆ๋‹ค.
์ด ๊ถŒํ•œ์€ ๋‹ค์Œ์œผ๋กœ ์•…์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

Privileged Groups

SeRestorePrivilege

์ด ๊ถŒํ•œ์€ ํŒŒ์ผ์˜ Access Control List(ACL)์— ๊ด€๊ณ„์—†์ด ๋ชจ๋“  ์‹œ์Šคํ…œ ํŒŒ์ผ์— ๋Œ€ํ•œ ์“ฐ๊ธฐ ์ ‘๊ทผ์„ ํ—ˆ์šฉํ•ฉ๋‹ˆ๋‹ค. ์ด๋กœ ์ธํ•ด ์„œ๋น„์Šค ์ˆ˜์ •, DLL Hijacking ์ˆ˜ํ–‰, Image File Execution Options๋ฅผ ํ†ตํ•œ ๋””๋ฒ„๊ฑฐ ์„ค์ • ๋“ฑ ์—ฌ๋Ÿฌ ๊ฐ€์ง€ ๊ถŒํ•œ ์ƒ์Šน ๊ฐ€๋Šฅ์„ฑ์ด ์—ด๋ฆฝ๋‹ˆ๋‹ค.

SeCreateTokenPrivilege

SeCreateTokenPrivilege๋Š” ๊ฐ•๋ ฅํ•œ ๊ถŒํ•œ์œผ๋กœ, ํŠนํžˆ ์‚ฌ์šฉ์ž๊ฐ€ ํ† ํฐ์„ impersonateํ•  ์ˆ˜ ์žˆ์„ ๋•Œ ์œ ์šฉํ•˜์ง€๋งŒ SeImpersonatePrivilege๊ฐ€ ์—†์–ด๋„ ์œ ์šฉํ•ฉ๋‹ˆ๋‹ค. ์ด ๊ธฐ๋Šฅ์€ ๋™์ผํ•œ ์‚ฌ์šฉ์ž๋ฅผ ๋‚˜ํƒ€๋‚ด๊ณ  ํ˜„์žฌ ํ”„๋กœ์„ธ์Šค์˜ integrity level์„ ์ดˆ๊ณผํ•˜์ง€ ์•Š๋Š” ํ† ํฐ์„ impersonateํ•  ์ˆ˜ ์žˆ๋Š” ๋Šฅ๋ ฅ์— ๊ธฐ๋ฐ˜ํ•ฉ๋‹ˆ๋‹ค.

ํ•ต์‹ฌ ํฌ์ธํŠธ:

  • Impersonation without SeImpersonatePrivilege: ํŠน์ • ์กฐ๊ฑด์—์„œ SeCreateTokenPrivilege๋ฅผ ์ด์šฉํ•ด EoP๋ฅผ ์‹œ๋„ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • Conditions for Token Impersonation: ์„ฑ๊ณต์ ์ธ impersonation์„ ์œ„ํ•ด์„œ๋Š” ๋Œ€์ƒ ํ† ํฐ์ด ๋™์ผํ•œ ์‚ฌ์šฉ์ž์— ์†ํ•˜๋ฉฐ, ๊ทธ ํ† ํฐ์˜ integrity level์ด impersonation์„ ์‹œ๋„ํ•˜๋Š” ํ”„๋กœ์„ธ์Šค์˜ integrity level๋ณด๋‹ค ์ž‘๊ฑฐ๋‚˜ ๊ฐ™์•„์•ผ ํ•ฉ๋‹ˆ๋‹ค.
  • Creation and Modification of Impersonation Tokens: ์‚ฌ์šฉ์ž๋Š” impersonation ํ† ํฐ์„ ์ƒ์„ฑํ•˜๊ณ  ์—ฌ๊ธฐ์— ๊ถŒํ•œ์ด ์žˆ๋Š” ๊ทธ๋ฃน์˜ SID(Security Identifier)๋ฅผ ์ถ”๊ฐ€ํ•˜์—ฌ ํ† ํฐ์„ ๊ฐ•ํ™”ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

SeLoadDriverPrivilege

์ด ๊ถŒํ•œ์€ ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์— ํŠน์ • ๊ฐ’๋“ค์„ ๊ฐ€์ง„ ์—”ํŠธ๋ฆฌ๋ฅผ ์ƒ์„ฑํ•ด device drivers๋ฅผ load/unloadํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค. HKLM์— ๋Œ€ํ•œ ์ง์ ‘ ์“ฐ๊ธฐ ์ ‘๊ทผ์ด ์ œํ•œ๋˜์–ด ์žˆ์œผ๋ฏ€๋กœ HKCU๋ฅผ ์‚ฌ์šฉํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ๋‹ค๋งŒ kernel์ด ๋“œ๋ผ์ด๋ฒ„ ๊ตฌ์„ฑ์„ ์ธ์‹ํ•˜๊ฒŒ ํ•˜๋ ค๋ฉด ํŠน์ • ๊ฒฝ๋กœ๋ฅผ ๋”ฐ๋ผ์•ผ ํ•ฉ๋‹ˆ๋‹ค.

์ด ๊ฒฝ๋กœ๋Š” \Registry\User\<RID>\System\CurrentControlSet\Services\DriverName์ด๋ฉฐ, ์—ฌ๊ธฐ์„œ <RID>๋Š” ํ˜„์žฌ ์‚ฌ์šฉ์ž์˜ Relative Identifier์ž…๋‹ˆ๋‹ค. HKCU ์•ˆ์— ์ด ์ „์ฒด ๊ฒฝ๋กœ๋ฅผ ์ƒ์„ฑํ•˜๊ณ  ๋‘ ๊ฐ€์ง€ ๊ฐ’์„ ์„ค์ •ํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค:

  • ImagePath๋Š” ์‹คํ–‰๋  ๋ฐ”์ด๋„ˆ๋ฆฌ์˜ ๊ฒฝ๋กœ์ž…๋‹ˆ๋‹ค.
  • Type์€ SERVICE_KERNEL_DRIVER (0x00000001) ๊ฐ’์œผ๋กœ ์„ค์ •ํ•ฉ๋‹ˆ๋‹ค.

๋”ฐ๋ฅผ ๋‹จ๊ณ„:

  1. ์“ฐ๊ธฐ ์ ‘๊ทผ์ด ์ œํ•œ๋˜์–ด ์žˆ์œผ๋ฏ€๋กœ HKCU๋ฅผ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค.
  2. \Registry\User\<RID>\System\CurrentControlSet\Services\DriverName ๊ฒฝ๋กœ๋ฅผ HKCU ๋‚ด์— ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค. ์—ฌ๊ธฐ์„œ <RID>๋Š” ํ˜„์žฌ ์‚ฌ์šฉ์ž์˜ Relative Identifier์ž…๋‹ˆ๋‹ค.
  3. ImagePath๋ฅผ ๋ฐ”์ด๋„ˆ๋ฆฌ ์‹คํ–‰ ๊ฒฝ๋กœ๋กœ ์„ค์ •ํ•ฉ๋‹ˆ๋‹ค.
  4. Type์„ SERVICE_KERNEL_DRIVER (0x00000001)๋กœ ์„ค์ •ํ•ฉ๋‹ˆ๋‹ค.
# Example Python code to set the registry values
import winreg as reg

# Define the path and values
path = r'Software\YourPath\System\CurrentControlSet\Services\DriverName' # Adjust 'YourPath' as needed
key = reg.OpenKey(reg.HKEY_CURRENT_USER, path, 0, reg.KEY_WRITE)
reg.SetValueEx(key, "ImagePath", 0, reg.REG_SZ, "path_to_binary")
reg.SetValueEx(key, "Type", 0, reg.REG_DWORD, 0x00000001)
reg.CloseKey(key)

๋” ๋งŽ์€ ๊ถŒํ•œ ๋‚จ์šฉ ๋ฐฉ๋ฒ•์€ https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/privileged-accounts-and-token-privileges#seloaddriverprivilege ์ฐธ์กฐ

SeTakeOwnershipPrivilege

์ด๊ฒƒ์€ SeRestorePrivilege์™€ ์œ ์‚ฌํ•ฉ๋‹ˆ๋‹ค. ์ฃผ์š” ๊ธฐ๋Šฅ์€ ํ”„๋กœ์„ธ์Šค๊ฐ€ ๊ฐ์ฒด์˜ ์†Œ์œ ๊ถŒ์„ ์ทจ๋“ํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•˜์—ฌ WRITE_OWNER ์ ‘๊ทผ ๊ถŒํ•œ์„ ํ†ตํ•ด ๋ช…์‹œ์  ์žฌ๋Ÿ‰ ์ ‘๊ทผ ์š”๊ตฌ๋ฅผ ์šฐํšŒํ•˜๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. ์ด ๊ณผ์ •์€ ๋จผ์ € ์“ฐ๊ธฐ ๋ชฉ์ ์˜ ๋Œ€์ƒ ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ํ‚ค์— ๋Œ€ํ•œ ์†Œ์œ ๊ถŒ์„ ํ™•๋ณดํ•œ ๋‹ค์Œ, ์“ฐ๊ธฐ ์ž‘์—…์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜๋„๋ก DACL์„ ๋ณ€๊ฒฝํ•˜๋Š” ๊ฒƒ์œผ๋กœ ๊ตฌ์„ฑ๋ฉ๋‹ˆ๋‹ค.

takeown /f 'C:\some\file.txt' #Now the file is owned by you
icacls 'C:\some\file.txt' /grant <your_username>:F #Now you have full access
# Use this with files that might contain credentials such as
%WINDIR%\repair\sam
%WINDIR%\repair\system
%WINDIR%\repair\software
%WINDIR%\repair\security
%WINDIR%\system32\config\security.sav
%WINDIR%\system32\config\software.sav
%WINDIR%\system32\config\system.sav
%WINDIR%\system32\config\SecEvent.Evt
%WINDIR%\system32\config\default.sav
c:\inetpub\wwwwroot\web.config

SeDebugPrivilege

์ด ๊ถŒํ•œ์€ debug other processes๋ฅผ ํ—ˆ์šฉํ•˜๋ฉฐ, ๋ฉ”๋ชจ๋ฆฌ๋ฅผ ์ฝ๊ณ  ์“ฐ๋Š” ์ž‘์—…์„ ํฌํ•จํ•ฉ๋‹ˆ๋‹ค. ์ด ๊ถŒํ•œ์œผ๋กœ ๋Œ€๋ถ€๋ถ„์˜ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ๋ฐ ํ˜ธ์ŠคํŠธ ์นจ์ž… ๋ฐฉ์ง€ ์†”๋ฃจ์…˜์„ ํšŒํ”ผํ•  ์ˆ˜ ์žˆ๋Š” ๋‹ค์–‘ํ•œ ๋ฉ”๋ชจ๋ฆฌ ์ธ์ ์…˜ ์ „๋žต์„ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Dump memory

๋‹ค์Œ๊ณผ ๊ฐ™์ด ProcDump ๋ฅผ SysInternals Suite ์—์„œ ์‚ฌ์šฉํ•˜์—ฌ capture the memory of a process ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๊ตฌ์ฒด์ ์œผ๋กœ, ์ด๋Š” Local Security Authority Subsystem Service (LSASS) ํ”„๋กœ์„ธ์Šค์— ์ ์šฉ๋  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ด ํ”„๋กœ์„ธ์Šค๋Š” ์‚ฌ์šฉ์ž๊ฐ€ ์‹œ์Šคํ…œ์— ์„ฑ๊ณต์ ์œผ๋กœ ๋กœ๊ทธ์ธํ•œ ํ›„ ์‚ฌ์šฉ์ž ์ž๊ฒฉ ์ฆ๋ช…์„ ์ €์žฅํ•˜๋Š” ์—ญํ• ์„ ํ•ฉ๋‹ˆ๋‹ค.

๊ทธ๋Ÿฐ ๋‹ค์Œ ์ด ๋คํ”„๋ฅผ mimikatz์— ๋กœ๋“œํ•˜์—ฌ ์•”ํ˜ธ๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

mimikatz.exe
mimikatz # log
mimikatz # sekurlsa::minidump lsass.dmp
mimikatz # sekurlsa::logonpasswords

RCE

๋งŒ์•ฝ NT SYSTEM shell์„ ์–ป๊ณ  ์‹ถ๋‹ค๋ฉด ๋‹ค์Œ์„ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

# Get the PID of a process running as NT SYSTEM
import-module psgetsys.ps1; [MyProcess]::CreateProcessFromParent(<system_pid>,<command_to_execute>)

SeManageVolumePrivilege

์ด ๊ถŒํ•œ (Perform volume maintenance tasks)์€ NTFS ACL์„ ์šฐํšŒํ•˜๋Š” ์ง์ ‘ ๋””์Šคํฌ I/O๋ฅผ ์œ„ํ•ด ์›์‹œ ๋ณผ๋ฅจ ๋””๋ฐ”์ด์Šค ํ•ธ๋“ค(์˜ˆ: \.\C:)์„ ์—ด ์ˆ˜ ์žˆ๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๊ธฐ๋ณธ ๋ธ”๋ก์„ ์ฝ์–ด ๋ณผ๋ฅจ์— ์žˆ๋Š” ์–ด๋–ค ํŒŒ์ผ์˜ ๋ฐ”์ดํŠธ๋„ ๋ณต์‚ฌํ•  ์ˆ˜ ์žˆ์–ด ๋ฏผ๊ฐํ•œ ์ž๋ฃŒ(์˜ˆ: machine private keys in %ProgramData%\Microsoft\Crypto, registry hives, SAM/NTDS via VSS)๋ฅผ ์ž„์˜๋กœ ์ฝ์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. CA servers์—์„œ ํŠนํžˆ ํฐ ์˜ํ–ฅ์„ ๋ฏธ์น˜๋ฉฐ, CA private key๋ฅผ ์œ ์ถœํ•˜๋ฉด Golden Certificate๋ฅผ ์œ„์กฐํ•ด ์–ด๋–ค ์ฃผ์ฒด๋กœ๋“  ๊ฐ€์žฅํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ž์„ธํ•œ ๊ธฐ๋ฒ•๊ณผ ์™„ํ™” ๋ฐฉ๋ฒ•์€ ๋‹ค์Œ์„ ์ฐธ์กฐํ•˜์„ธ์š”:

Semanagevolume Perform Volume Maintenance Tasks

๊ถŒํ•œ ํ™•์ธ

whoami /priv

Disabled๋กœ ํ‘œ์‹œ๋˜๋Š” ํ† ํฐ์€ ํ™œ์„ฑํ™”ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์‹ค์ œ๋กœ๋Š” Enabled ๋ฐ Disabled ํ† ํฐ์„ ๋ชจ๋‘ ์•…์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๋ชจ๋“  ํ† ํฐ ํ™œ์„ฑํ™”

ํ† ํฐ์ด ๋น„ํ™œ์„ฑํ™”๋˜์–ด ์žˆ๋‹ค๋ฉด, EnableAllTokenPrivs.ps1 ์Šคํฌ๋ฆฝํŠธ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋ชจ๋“  ํ† ํฐ์„ ํ™œ์„ฑํ™”ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

.\EnableAllTokenPrivs.ps1
whoami /priv

๋˜๋Š” ์ด post์— ํฌํ•จ๋œ script.

Table

Full token privileges cheatsheet at https://github.com/gtworek/Priv2Admin, ์•„๋ž˜ ์š”์•ฝ์€ ๊ด€๋ฆฌ์ž ์„ธ์…˜์„ ํš๋“ํ•˜๊ฑฐ๋‚˜ ๋ฏผ๊ฐํ•œ ํŒŒ์ผ์„ ์ฝ๊ธฐ ์œ„ํ•ด ํ•ด๋‹น ๊ถŒํ•œ์„ ์ง์ ‘ ์•…์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•๋งŒ ๋‚˜์—ดํ•ฉ๋‹ˆ๋‹ค.

PrivilegeImpactToolExecution pathRemarks
SeAssignPrimaryToken๊ด€๋ฆฌ์ž3rd party toolโ€œIt would allow a user to impersonate tokens and privesc to nt system using tools such as potato.exe, rottenpotato.exe and juicypotato.exeโ€๊ฐ์‚ฌํ•ฉ๋‹ˆ๋‹ค Aurรฉlien Chalot ์—…๋ฐ์ดํŠธํ•ด ์ฃผ์…”์„œ. ๊ณง ๋” ๋ ˆ์‹œํ”ผ ํ˜•์‹์œผ๋กœ ๋‹ค์‹œ ํ‘œํ˜„ํ•ด ๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.
SeBackup์œ„ํ˜‘Built-in commandsrobocopy /b๋กœ ๋ฏผ๊ฐํ•œ ํŒŒ์ผ ์ฝ๊ธฐ

- %WINDIR%\MEMORY.DMP๋ฅผ ์ฝ์„ ์ˆ˜ ์žˆ๋‹ค๋ฉด ๋” ํฅ๋ฏธ๋กœ์šธ ์ˆ˜ ์žˆ์Œ

- SeBackupPrivilege (๋ฐ robocopy)์€ ์—ด๋ฆฐ ํŒŒ์ผ์—๋Š” ๋„์›€์ด ๋˜์ง€ ์•Š์Œ.

- Robocopy๋Š” /b ํŒŒ๋ผ๋ฏธํ„ฐ๋กœ ๋™์ž‘ํ•˜๋ ค๋ฉด SeBackup๊ณผ SeRestore ๋‘˜ ๋‹ค ํ•„์š”.

SeCreateToken๊ด€๋ฆฌ์ž3rd party toolNtCreateToken์œผ๋กœ ๋กœ์ปฌ ๊ด€๋ฆฌ์ž ๊ถŒํ•œ์„ ํฌํ•จํ•œ ์ž„์˜ ํ† ํฐ ์ƒ์„ฑ.
SeDebug๊ด€๋ฆฌ์žPowerShelllsass.exe ํ† ํฐ ๋ณต์ œ.์Šคํฌ๋ฆฝํŠธ๋Š” FuzzySecurity์—์„œ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Œ.
SeLoadDriver๊ด€๋ฆฌ์ž3rd party tool

1. szkg64.sys ๊ฐ™์€ ์ทจ์•ฝํ•œ ์ปค๋„ ๋“œ๋ผ์ด๋ฒ„ ๋กœ๋“œ
2. ๋“œ๋ผ์ด๋ฒ„ ์ทจ์•ฝ์  ์•…์šฉ

๋˜๋Š”, ์ด ๊ถŒํ•œ์„ ์‚ฌ์šฉํ•ด ๋ณด์•ˆ ๊ด€๋ จ ๋“œ๋ผ์ด๋ฒ„๋ฅผ ์–ธ๋กœ๋“œํ•  ์ˆ˜ ์žˆ์Œ(๋‚ด์žฅ ๋ช…๋ น ftlMC ์‚ฌ์šฉ ์˜ˆ: fltMC sysmondrv).

1. szkg64 ์ทจ์•ฝ์ ์€ CVE-2018-15732๋กœ ๋“ฑ์žฌ๋จ
2. szkg64์˜ exploit code๋Š” Parvez Anwar๊ฐ€ ์ž‘์„ฑํ•จ

SeRestore๊ด€๋ฆฌ์žPowerShell

1. SeRestore ๊ถŒํ•œ์ด ์žˆ๋Š” ์ƒํƒœ๋กœ PowerShell/ISE ์‹คํ–‰.
2. Enable-SeRestorePrivilege๋กœ ๊ถŒํ•œ ํ™œ์„ฑํ™”.
3. utilman.exe๋ฅผ utilman.old๋กœ ์ด๋ฆ„ ๋ณ€๊ฒฝ
4. cmd.exe๋ฅผ utilman.exe๋กœ ์ด๋ฆ„ ๋ณ€๊ฒฝ
5. ์ฝ˜์†” ์ž ๊ธˆ ํ›„ Win+U ๋ˆ„๋ฆ„

์ผ๋ถ€ AV ์†Œํ”„ํŠธ์›จ์–ด์—์„œ ํƒ์ง€๋  ์ˆ˜ ์žˆ์Œ.

๋Œ€์•ˆ ๋ฐฉ๋ฒ•์œผ๋กœ ๋™์ผ ๊ถŒํ•œ์œผ๋กœ โ€œProgram Filesโ€œ์— ์ €์žฅ๋œ ์„œ๋น„์Šค ๋ฐ”์ด๋„ˆ๋ฆฌ๋ฅผ ๊ต์ฒดํ•˜๋Š” ๋ฐฉ๋ฒ•์ด ์žˆ์Œ

SeTakeOwnership๊ด€๋ฆฌ์žBuilt-in commands

1. takeown.exe /f โ€œ%windir%\system32โ€
2. icalcs.exe โ€œ%windir%\system32โ€ /grant โ€œ%username%โ€:F
3. cmd.exe๋ฅผ utilman.exe๋กœ ์ด๋ฆ„ ๋ณ€๊ฒฝ
4. ์ฝ˜์†” ์ž ๊ธˆ ํ›„ Win+U ๋ˆ„๋ฆ„

์ผ๋ถ€ AV ์†Œํ”„ํŠธ์›จ์–ด์—์„œ ํƒ์ง€๋  ์ˆ˜ ์žˆ์Œ.

๋Œ€์•ˆ ๋ฐฉ๋ฒ•์œผ๋กœ ๋™์ผ ๊ถŒํ•œ์œผ๋กœ โ€œProgram Filesโ€œ์— ์ €์žฅ๋œ ์„œ๋น„์Šค ๋ฐ”์ด๋„ˆ๋ฆฌ๋ฅผ ๊ต์ฒดํ•˜๋Š” ๋ฐฉ๋ฒ•์ด ์žˆ์Œ.

SeTcb๊ด€๋ฆฌ์ž3rd party tool

ํ† ํฐ์„ ์กฐ์ž‘ํ•˜์—ฌ ๋กœ์ปฌ ๊ด€๋ฆฌ์ž ๊ถŒํ•œ์„ ํฌํ•จํ•˜๋„๋ก ๋งŒ๋“ฆ. SeImpersonate๊ฐ€ ํ•„์š”ํ•  ์ˆ˜ ์žˆ์Œ.

ํ™•์ธ ํ•„์š”.

Reference

  • Windows ํ† ํฐ์„ ์ •์˜ํ•œ ์ด ํ‘œ๋ฅผ ์ฐธ๊ณ : https://github.com/gtworek/Priv2Admin
  • ํ† ํฐ์„ ์ด์šฉํ•œ privesc์— ๊ด€ํ•œ this paper๋ฅผ ์ฐธ๊ณ ํ•˜์„ธ์š”.
  • Microsoft โ€“ Perform volume maintenance tasks (SeManageVolumePrivilege): https://learn.microsoft.com/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks
  • 0xdf โ€“ HTB: Certificate (SeManageVolumePrivilege โ†’ CA key exfil โ†’ Golden Certificate): https://0xdf.gitlab.io/2025/10/04/htb-certificate.html

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ