Windows Service Triggers: Enumeration and Abuse

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

Windows Service Triggers๋Š” Service Control Manager(SCM)๊ฐ€ ํŠน์ • ์กฐ๊ฑด์ด ๋ฐœ์ƒํ–ˆ์„ ๋•Œ(์˜ˆ: IP ์ฃผ์†Œ๊ฐ€ ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•ด์ง, named pipe ์—ฐ๊ฒฐ ์‹œ๋„, ETW ์ด๋ฒคํŠธ ๊ฒŒ์‹œ ๋“ฑ) ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘/์ค‘์ง€ํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค. ๋Œ€์ƒ ์„œ๋น„์Šค์— ๋Œ€ํ•ด SERVICE_START ๊ถŒํ•œ์ด ์—†๋”๋ผ๋„ ํŠธ๋ฆฌ๊ฑฐ๊ฐ€ ๋ฐœ๋™ํ•˜๋„๋ก ์œ ๋„ํ•˜๋ฉด ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ด ํŽ˜์ด์ง€๋Š” ๊ณต๊ฒฉ์ž์—๊ฒŒ ์œ ๋ฆฌํ•œ ์—ด๊ฑฐ ๋ฐฉ๋ฒ•๊ณผ ์ผ๋ฐ˜์ ์ธ ํŠธ๋ฆฌ๊ฑฐ๋ฅผ ํ™œ์„ฑํ™”ํ•˜๋Š” ๋‚ฎ์€ ๋งˆ์ฐฐ์˜ ๋ฐฉ๋ฒ•๋“ค์— ์ค‘์ ์„ ๋‘ก๋‹ˆ๋‹ค.

Tip: ๊ถŒํ•œ์ด ๋†’์€ ๋นŒํŠธ์ธ ์„œ๋น„์Šค(์˜ˆ: RemoteRegistry, WebClient/WebDAV, EFS)๋ฅผ ์‹œ์ž‘ํ•˜๋ฉด ์ƒˆ๋กœ์šด RPC/named-pipe ๋ฆฌ์Šค๋„ˆ๊ฐ€ ๋…ธ์ถœ๋˜์–ด ์ถ”๊ฐ€์ ์ธ ์•…์šฉ ์ฒด์ธ์ด ์—ด๋ฆด ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Enumerating Service Triggers

  • sc.exe (local)
  • ์„œ๋น„์Šค์˜ ํŠธ๋ฆฌ๊ฑฐ ๋‚˜์—ด: sc.exe qtriggerinfo <ServiceName>
  • Registry (local)
  • ํŠธ๋ฆฌ๊ฑฐ๋Š” ๋‹ค์Œ์— ์œ„์น˜: HKLM\SYSTEM\CurrentControlSet\Services\<ServiceName>\TriggerInfo
  • ์žฌ๊ท€ ๋คํ”„: reg query HKLM\SYSTEM\CurrentControlSet\Services\<ServiceName>\TriggerInfo /s
  • Win32 API (local)
  • SERVICE_CONFIG_TRIGGER_INFO (8)๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ QueryServiceConfig2๋ฅผ ํ˜ธ์ถœํ•˜๋ฉด SERVICE_TRIGGER_INFO๋ฅผ ๊ฐ€์ ธ์˜ต๋‹ˆ๋‹ค.
  • Docs: QueryServiceConfig2[W/A] and SERVICE_TRIGGER/SERVICE_TRIGGER_SPECIFIC_DATA
  • RPC over MSโ€‘SCMR (remote)
  • SCM์€ ์›๊ฒฉ์œผ๋กœ ์ฟผ๋ฆฌํ•˜์—ฌ ํŠธ๋ฆฌ๊ฑฐ ์ •๋ณด๋ฅผ ๊ฐ€์ ธ์˜ฌ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. TrustedSec์˜ Titanis๋Š” ์ด๋ฅผ ๋…ธ์ถœํ•ฉ๋‹ˆ๋‹ค: Scm.exe qtriggers.
  • Impacket์€ msrpc MS-SCMR์˜ ๊ตฌ์กฐ์ฒด๋ฅผ ์ •์˜ํ•ฉ๋‹ˆ๋‹ค; ์ด๋ฅผ ์ด์šฉํ•ด ์›๊ฒฉ ์ฟผ๋ฆฌ๋ฅผ ๊ตฌํ˜„ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

High-Value Trigger Types and How to Activate Them

Network Endpoint Triggers

ํด๋ผ์ด์–ธํŠธ๊ฐ€ IPC ์—”๋“œํฌ์ธํŠธ์— ์ ‘์†์„ ์‹œ๋„ํ•  ๋•Œ ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘ํ•ฉ๋‹ˆ๋‹ค. ๋‚ฎ์€ ๊ถŒํ•œ ์‚ฌ์šฉ์ž๊ฐ€ ์œ ์šฉํ•œ ์ด์œ ๋Š” SCM์ด ํด๋ผ์ด์–ธํŠธ๊ฐ€ ์‹ค์ œ๋กœ ์—ฐ๊ฒฐํ•˜๊ธฐ ์ „์— ์ž๋™์œผ๋กœ ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘ํ•ด์ฃผ๊ธฐ ๋•Œ๋ฌธ์ž…๋‹ˆ๋‹ค.

  • Named pipe trigger
  • ๋™์ž‘: ํด๋ผ์ด์–ธํŠธ๊ฐ€ \.\pipe<PipeName>์— ์—ฐ๊ฒฐ์„ ์‹œ๋„ํ•˜๋ฉด, SCM์ด ํ•ด๋‹น ์„œ๋น„์Šค๊ฐ€ ๋ฆฌ์Šค๋‹์„ ์‹œ์ž‘ํ•  ์ˆ˜ ์žˆ๋„๋ก ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘ํ•ฉ๋‹ˆ๋‹ค.
  • Activation (PowerShell):
$pipe = new-object System.IO.Pipes.NamedPipeClientStream('.', 'PipeNameFromTrigger', [System.IO.Pipes.PipeDirection]::InOut)
try { $pipe.Connect(1000) } catch {}
$pipe.Dispose()
  • ์ฐธ๊ณ : Named Pipe Client Impersonation์€ ์„œ๋น„์Šค ์‹œ์ž‘ ํ›„ ์•…์šฉ์— ์œ ์šฉํ•ฉ๋‹ˆ๋‹ค.

  • RPC endpoint trigger (Endpoint Mapper)

  • ๋™์ž‘: ์„œ๋น„์Šค์— ์—ฐ๊ฒฐ๋œ ์ธํ„ฐํŽ˜์ด์Šค UUID์— ๋Œ€ํ•ด Endpoint Mapper(EPM, TCP/135)๋ฅผ ์กฐํšŒํ•˜๋ฉด, SCM์ด ํ•ด๋‹น ์„œ๋น„์Šค๊ฐ€ ์ž์‹ ์˜ ์—”๋“œํฌ์ธํŠธ๋ฅผ ๋“ฑ๋กํ•  ์ˆ˜ ์žˆ๋„๋ก ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘ํ•ฉ๋‹ˆ๋‹ค.

  • Activation (Impacket):

# Queries local EPM; replace UUID with the service interface GUID
python3 rpcdump.py @127.0.0.1 -uuid <INTERFACE-UUID>

Custom (ETW) Triggers

์„œ๋น„์Šค๋Š” ETW provider/event์— ๋ฐ”์ธ๋”ฉ๋œ ํŠธ๋ฆฌ๊ฑฐ๋ฅผ ๋“ฑ๋กํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ถ”๊ฐ€์ ์ธ ํ•„ํ„ฐ(keyword/level/binary/string)๊ฐ€ ์„ค์ •๋˜์–ด ์žˆ์ง€ ์•Š๋‹ค๋ฉด, ํ•ด๋‹น provider์˜ ์–ด๋–ค ์ด๋ฒคํŠธ๋“  ์„œ๋น„์Šค ์‹œ์ž‘์„ ์œ ๋ฐœํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

  • ์˜ˆ์‹œ (WebClient/WebDAV): provider {22B6D684-FA63-4578-87C9-EFFCBE6643C7}
  • ํŠธ๋ฆฌ๊ฑฐ ๋‚˜์—ด: sc.exe qtriggerinfo webclient
  • provider๊ฐ€ ๋“ฑ๋ก๋˜์–ด ์žˆ๋Š”์ง€ ํ™•์ธ: logman query providers | findstr /I 22b6d684-fa63-4578-87c9-effcbe6643c7
  • ์ผ์น˜ํ•˜๋Š” ์ด๋ฒคํŠธ๋ฅผ ๋ฐœ์ƒ์‹œํ‚ค๋ ค๋ฉด ์ผ๋ฐ˜์ ์œผ๋กœ ํ•ด๋‹น provider์— ๋กœ๊น…ํ•˜๋Š” ์ฝ”๋“œ๊ฐ€ ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค; ํ•„ํ„ฐ๊ฐ€ ์—†๋‹ค๋ฉด ์–ด๋–ค ์ด๋ฒคํŠธ๋“  ์ถฉ๋ถ„ํ•ฉ๋‹ˆ๋‹ค.

Group Policy Triggers

ํ•˜์œ„ ์œ ํ˜•: Machine/User. ๋„๋ฉ”์ธ ๊ฐ€์ž…๋œ ํ˜ธ์ŠคํŠธ์—์„œ ํ•ด๋‹น ์ •์ฑ…์ด ์กด์žฌํ•˜๋ฉด ํŠธ๋ฆฌ๊ฑฐ๋Š” ๋ถ€ํŒ… ์‹œ ์‹คํ–‰๋ฉ๋‹ˆ๋‹ค. ๋‹จ์ˆœํžˆ gpupdate๋งŒ์œผ๋กœ๋Š” ๋ณ€๊ฒฝ์ด ์—†์œผ๋ฉด ํŠธ๋ฆฌ๊ฑฐ๊ฐ€ ๋ฐœ๋™ํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ:

  • Activation: gpupdate /force
  • ๊ด€๋ จ ์ •์ฑ… ์œ ํ˜•์ด ์กด์žฌํ•˜๋ฉด, ์ด๊ฒƒ์œผ๋กœ ํŠธ๋ฆฌ๊ฑฐ๊ฐ€ ์‹ ๋ขฐ์„ฑ ์žˆ๊ฒŒ ๋ฐœ๋™ํ•˜์—ฌ ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘์‹œํ‚ต๋‹ˆ๋‹ค.

IP Address Available

์ฒซ ๋ฒˆ์งธ IP๊ฐ€ ์–ป์–ด์กŒ์„ ๋•Œ(๋˜๋Š” ๋งˆ์ง€๋ง‰์ด ์‚ฌ๋ผ์กŒ์„ ๋•Œ) ๋ฐœ๋™ํ•ฉ๋‹ˆ๋‹ค. ๋ถ€ํŒ… ์‹œ ์ž์ฃผ ํŠธ๋ฆฌ๊ฑฐ๋ฉ๋‹ˆ๋‹ค.

  • Activation: ์—ฐ๊ฒฐ์„ ํ† ๊ธ€ํ•˜์—ฌ ์žฌ๋ฐœ๋™์‹œํ‚ค๊ธฐ, ์˜ˆ:
netsh interface set interface name="Ethernet" admin=disabled
netsh interface set interface name="Ethernet" admin=enabled

Device Interface Arrival

์ผ์น˜ํ•˜๋Š” device interface๊ฐ€ ๋„์ฐฉํ•˜๋ฉด ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘ํ•ฉ๋‹ˆ๋‹ค. ๋ฐ์ดํ„ฐ ์•„์ดํ…œ์ด ์ง€์ •๋˜์ง€ ์•Š์€ ๊ฒฝ์šฐ ํŠธ๋ฆฌ๊ฑฐ ์„œ๋ธŒํƒ€์ž… GUID์™€ ์ผ์น˜ํ•˜๋Š” ์–ด๋–ค ์žฅ์น˜๋„ ํŠธ๋ฆฌ๊ฑฐ๋ฅผ ๋ฐœ๋™์‹œํ‚ฌ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋ถ€ํŒ… ์‹œ์™€ ํ•ซํ”Œ๋Ÿฌ๊ทธ ์‹œ์— ํ‰๊ฐ€๋ฉ๋‹ˆ๋‹ค.

  • Activation: ํŠธ๋ฆฌ๊ฑฐ ์„œ๋ธŒํƒ€์ž…์— ์ง€์ •๋œ ํด๋ž˜์Šค/ํ•˜๋“œ์›จ์–ด ID์™€ ์ผ์น˜ํ•˜๋Š” ์žฅ์น˜(๋ฌผ๋ฆฌ์  ๋˜๋Š” ๊ฐ€์ƒ)๋ฅผ ์—ฐ๊ฒฐ/์‚ฝ์ž…ํ•ฉ๋‹ˆ๋‹ค.

Domain Join State

MSDN์˜ ํ˜ผ๋ž€์Šค๋Ÿฌ์šด ๋ฌธ๊ตฌ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ , ์ด๋Š” ๋ถ€ํŒ… ์‹œ ๋„๋ฉ”์ธ ์ƒํƒœ๋ฅผ ํ‰๊ฐ€ํ•ฉ๋‹ˆ๋‹ค:

  • DOMAIN_JOIN_GUID โ†’ ๋„๋ฉ”์ธ์— ๊ฐ€์ž…๋˜์–ด ์žˆ์œผ๋ฉด ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘
  • DOMAIN_LEAVE_GUID โ†’ ๋„๋ฉ”์ธ์— ๊ฐ€์ž…๋˜์–ด ์žˆ์ง€ ์•Š์„ ๋•Œ๋งŒ ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘

System State Change โ€“ WNF (undocumented)

์ผ๋ถ€ ์„œ๋น„์Šค๋Š” ๋ฌธ์„œํ™”๋˜์ง€ ์•Š์€ WNF ๊ธฐ๋ฐ˜ ํŠธ๋ฆฌ๊ฑฐ(SERVICE_TRIGGER_TYPE 0x7)๋ฅผ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค. ํ™œ์„ฑํ™”ํ•˜๋ ค๋ฉด ๊ด€๋ จ WNF ์ƒํƒœ๋ฅผ publishํ•ด์•ผ ํ•˜๋ฉฐ, ๊ตฌ์ฒด์‚ฌํ•ญ์€ ์ƒํƒœ ์ด๋ฆ„์— ๋”ฐ๋ผ ๋‹ค๋ฆ…๋‹ˆ๋‹ค. ์—ฐ๊ตฌ ๋ฐฐ๊ฒฝ: Windows Notification Facility ๋‚ด๋ถ€ ๋™์ž‘.

Aggregate Service Triggers (undocumented)

Windows 11์˜ ์ผ๋ถ€ ์„œ๋น„์Šค(์˜ˆ: CDPSvc)์—์„œ ๊ด€์ฐฐ๋ฉ๋‹ˆ๋‹ค. ์ง‘๊ณ„๋œ ๊ตฌ์„ฑ์€ ๋‹ค์Œ์— ์ €์žฅ๋ฉ๋‹ˆ๋‹ค:

  • HKLM\SYSTEM\CurrentControlSet\Control\ServiceAggregatedEvents

์„œ๋น„์Šค์˜ Trigger ๊ฐ’์€ GUID์ด๊ณ , ํ•ด๋‹น GUID๋ฅผ ๊ฐ€์ง„ ์„œ๋ธŒํ‚ค๊ฐ€ ์ง‘๊ณ„๋œ ์ด๋ฒคํŠธ๋ฅผ ์ •์˜ํ•ฉ๋‹ˆ๋‹ค. ๊ตฌ์„ฑ์š”์†Œ ์ด๋ฒคํŠธ ์ค‘ ์–ด๋А ํ•˜๋‚˜๋ผ๋„ ํŠธ๋ฆฌ๊ฑฐ๋˜๋ฉด ์„œ๋น„์Šค๊ฐ€ ์‹œ์ž‘๋ฉ๋‹ˆ๋‹ค.

Firewall Port Event (quirks and DoS risk)

ํŠน์ • ํฌํŠธ/ํ”„๋กœํ† ์ฝœ์— ๋ฒ”์œ„๊ฐ€ ์ •ํ•ด์ง„ ํŠธ๋ฆฌ๊ฑฐ๊ฐ€ ๊ด€์ฐฐ๋œ ๋ฐ”์— ๋”ฐ๋ฅด๋ฉด, ์‹ค์ œ ์ง€์ •๋œ ํฌํŠธ ๋ณ€๊ฒฝ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ๋ฐฉํ™”๋ฒฝ ๊ทœ์น™์˜ ์•„๋ฌด ๋ณ€๊ฒฝ(๋น„ํ™œ์„ฑํ™”/์‚ญ์ œ/์ถ”๊ฐ€)์—๋„ ์‹œ์ž‘๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋” ์•…ํ™”๋˜๋Š” ๊ฒฝ์šฐ, ํ”„๋กœํ† ์ฝœ ์—†์ด ํฌํŠธ๋ฅผ ๊ตฌ์„ฑํ•˜๋ฉด ์žฌ๋ถ€ํŒ… ์‹œ BFE ์‹œ์ž‘์ด ์†์ƒ๋˜์–ด ์—ฐ์‡„์ ์œผ๋กœ ๋งŽ์€ ์„œ๋น„์Šค๊ฐ€ ์‹คํŒจํ•˜๊ณ  ๋ฐฉํ™”๋ฒฝ ๊ด€๋ฆฌ๊ฐ€ ๋ง๊ฐ€์งˆ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๊ทน๋„๋กœ ์ฃผ์˜ํ•ด์„œ ๋‹ค๋ฃจ์‹ญ์‹œ์˜ค.

Practical Workflow

  1. ํฅ๋ฏธ๋กœ์šด ์„œ๋น„์Šค(RemoteRegistry, WebClient, EFS, โ€ฆ)์˜ ํŠธ๋ฆฌ๊ฑฐ๋ฅผ ์—ด๊ฑฐํ•ฉ๋‹ˆ๋‹ค:
  • sc.exe qtriggerinfo <Service>
  • reg query HKLM\SYSTEM\CurrentControlSet\Services\<Service>\TriggerInfo /s
  1. Network Endpoint ํŠธ๋ฆฌ๊ฑฐ๊ฐ€ ์žˆ๋Š” ๊ฒฝ์šฐ:
  • Named pipe โ†’ \.\pipe<PipeName>์— ๋Œ€ํ•œ ํด๋ผ์ด์–ธํŠธ ์˜คํ”ˆ ์‹œ๋„
  • RPC endpoint โ†’ ์ธํ„ฐํŽ˜์ด์Šค UUID์— ๋Œ€ํ•ด Endpoint Mapper ์กฐํšŒ ์ˆ˜ํ–‰
  1. ETW ํŠธ๋ฆฌ๊ฑฐ๊ฐ€ ์žˆ๋Š” ๊ฒฝ์šฐ:
  • sc.exe qtriggerinfo๋กœ provider ๋ฐ ํ•„ํ„ฐ๋ฅผ ํ™•์ธ; ํ•„ํ„ฐ๊ฐ€ ์—†์œผ๋ฉด ํ•ด๋‹น provider์˜ ์–ด๋–ค ์ด๋ฒคํŠธ๋ผ๋„ ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘ํ•ฉ๋‹ˆ๋‹ค
  1. Group Policy/IP/Device/Domain ํŠธ๋ฆฌ๊ฑฐ์˜ ๊ฒฝ์šฐ:
  • ํ™˜๊ฒฝ์„ ์ด์šฉํ•œ ์กฐ์ž‘: gpupdate /force, NIC ํ† ๊ธ€, ์žฅ์น˜ ํ•ซํ”Œ๋Ÿฌ๊ทธ ๋“ฑ
  • Named Pipe ํŠธ๋ฆฌ๊ฑฐ๋ฅผ ํ†ตํ•ด ๊ถŒํ•œ ๋†’์€ ์„œ๋น„์Šค๋ฅผ ์‹œ์ž‘ํ•œ ํ›„์—๋Š” ํ•ด๋‹น ์„œ๋น„์Šค๋ฅผ ์ž„ํผ์Šจ๋„ค์ด์…˜ํ•  ์ˆ˜ ์žˆ์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

Named Pipe Client Impersonation

Quick command recap

  • List triggers (local): sc.exe qtriggerinfo <Service>
  • Registry view: reg query HKLM\SYSTEM\CurrentControlSet\Services\<Service>\TriggerInfo /s
  • Win32 API: QueryServiceConfig2(..., SERVICE_CONFIG_TRIGGER_INFO, ...)
  • RPC remote (Titanis): Scm.exe qtriggers
  • ETW provider check (WebClient): logman query providers | findstr /I 22b6d684-fa63-4578-87c9-effcbe6643c7

Detection and Hardening Notes

  • ์„œ๋น„์Šค ์ „๋ฐ˜์—์„œ TriggerInfo์˜ ๋ฒ ์ด์Šค๋ผ์ธ์„ ๋งŒ๋“ค๊ณ  ๊ฐ์‚ฌํ•˜์‹ญ์‹œ์˜ค. ๋˜ํ•œ ์ง‘๊ณ„ ํŠธ๋ฆฌ๊ฑฐ๋Š” HKLM\SYSTEM\CurrentControlSet\Control\ServiceAggregatedEvents๋ฅผ ๊ฒ€ํ† ํ•˜์‹ญ์‹œ์˜ค.
  • ๊ถŒํ•œ์ด ๋†’์€ ์„œ๋น„์Šค UUID์— ๋Œ€ํ•œ ์˜์‹ฌ์Šค๋Ÿฌ์šด EPM ์กฐํšŒ ๋ฐ ์„œ๋น„์Šค ์‹œ์ž‘์— ์•ž์„  named-pipe ์—ฐ๊ฒฐ ์‹œ๋„๋ฅผ ๋ชจ๋‹ˆํ„ฐ๋งํ•˜์‹ญ์‹œ์˜ค.
  • ๋ˆ„๊ฐ€ ์„œ๋น„์Šค ํŠธ๋ฆฌ๊ฑฐ๋ฅผ ์ˆ˜์ •ํ•  ์ˆ˜ ์žˆ๋Š”์ง€ ์ œํ•œํ•˜์‹ญ์‹œ์˜ค; ํŠธ๋ฆฌ๊ฑฐ ๋ณ€๊ฒฝ ํ›„ ์˜ˆ๊ธฐ์น˜ ์•Š์€ BFE ์‹คํŒจ๋Š” ์˜์‹ฌ์Šค๋Ÿฌ์šด ์ง•ํ›„๋กœ ์ทจ๊ธ‰ํ•˜์‹ญ์‹œ์˜ค.

References

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ