UIAccess๋ฅผ ํ†ตํ•œ Admin Protection ์šฐํšŒ

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

๊ฐœ์š”

  • Windows AppInfo๋Š” UIAccess ํ”„๋กœ์„ธ์Šค๋ฅผ ์ƒ์„ฑํ•˜๊ธฐ ์œ„ํ•ด RAiLaunchAdminProcess๋ฅผ ๋…ธ์ถœํ•ฉ๋‹ˆ๋‹ค(์ ‘๊ทผ์„ฑ์šฉ์œผ๋กœ ์˜๋„๋จ). UIAccess๋Š” ๋Œ€๋ถ€๋ถ„์˜ User Interface Privilege Isolation (UIPI) ๋ฉ”์‹œ์ง€ ํ•„ํ„ฐ๋ง์„ ์šฐํšŒํ•˜์—ฌ ์ ‘๊ทผ์„ฑ ์†Œํ”„ํŠธ์›จ์–ด๊ฐ€ ๋” ๋†’์€ IL์˜ UI๋ฅผ ์ œ์–ดํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค.
  • UIAccess๋ฅผ ์ง์ ‘ ํ™œ์„ฑํ™”ํ•˜๋ ค๋ฉด NtSetInformationToken(TokenUIAccess)๋ฅผ SeTcbPrivilege์™€ ํ•จ๊ป˜ ํ˜ธ์ถœํ•ด์•ผ ํ•˜๋ฏ€๋กœ ๊ถŒํ•œ์ด ๋‚ฎ์€ ํ˜ธ์ถœ์ž๋Š” ์„œ๋น„์Šค์— ์˜์กดํ•ฉ๋‹ˆ๋‹ค. ์„œ๋น„์Šค๋Š” UIAccess๋ฅผ ์„ค์ •ํ•˜๊ธฐ ์ „์— ๋Œ€์ƒ ๋ฐ”์ด๋„ˆ๋ฆฌ์— ๋Œ€ํ•ด ์„ธ ๊ฐ€์ง€ ๊ฒ€์‚ฌ๋ฅผ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค:
    • ์ž„๋ฒ ๋””๋“œ ๋งค๋‹ˆํŽ˜์ŠคํŠธ์— uiAccess="true"๊ฐ€ ํฌํ•จ๋˜์–ด ์žˆ๋Š”์ง€.
    • Local Machine ๋ฃจํŠธ ์ €์žฅ์†Œ์—์„œ ์‹ ๋ขฐํ•˜๋Š” ์ธ์ฆ์„œ๋กœ ์„œ๋ช…๋˜์—ˆ๋Š”์ง€(ํŠน์ • EKU/Microsoft ์š”๊ตฌ์‚ฌํ•ญ ์—†์Œ).
    • ์‹œ์Šคํ…œ ๋“œ๋ผ์ด๋ธŒ์˜ ๊ด€๋ฆฌ์ž ์ „์šฉ ๊ฒฝ๋กœ์— ์œ„์น˜ํ•˜๋Š”์ง€(์˜ˆ: C:\Windows, C:\Windows\System32, C:\Program Files, ํŠน์ • ์“ฐ๊ธฐ ๊ฐ€๋Šฅํ•œ ํ•˜์œ„ ๊ฒฝ๋กœ ์ œ์™ธ).
  • RAiLaunchAdminProcess๋Š” UIAccess ์‹คํ–‰์— ๋Œ€ํ•ด ๋™์˜(consent) ํ”„๋กฌํ”„ํŠธ๋ฅผ ํ‘œ์‹œํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค(๊ทธ๋ ‡์ง€ ์•Š์œผ๋ฉด ์ ‘๊ทผ์„ฑ ๋„๊ตฌ๊ฐ€ ํ”„๋กฌํ”„ํŠธ๋ฅผ ์ œ์–ดํ•  ์ˆ˜ ์—†์Šต๋‹ˆ๋‹ค).

Token shaping ๋ฐ ๋ฌด๊ฒฐ์„ฑ ์ˆ˜์ค€

  • ๊ฒ€์‚ฌ๊ฐ€ ํ†ต๊ณผ๋˜๋ฉด AppInfo๋Š” ํ˜ธ์ถœ์ž ํ† ํฐ์„ ๋ณต์‚ฌํ•˜๊ณ , UIAccess๋ฅผ ํ™œ์„ฑํ™”ํ•˜๋ฉฐ ๋ฌด๊ฒฐ์„ฑ ์ˆ˜์ค€(IL)์„ ์ƒ์Šน์‹œํ‚ต๋‹ˆ๋‹ค:
    • ์ œํ•œ๋œ ๊ด€๋ฆฌ์ž ์‚ฌ์šฉ์ž(Administrators ๊ทธ๋ฃน์— ์†ํ•˜์ง€๋งŒ ํ•„ํ„ฐ๋ง๋œ ์ƒํƒœ) โžœ High IL.
    • ๋น„๊ด€๋ฆฌ์ž ์‚ฌ์šฉ์ž โžœ IL์ด +16 ๋ ˆ๋ฒจ์”ฉ ์ฆ๊ฐ€ํ•˜์—ฌ ์ตœ๋Œ€ High๊นŒ์ง€ ์ƒ์Šน(์‹œ์Šคํ…œ IL์€ ๋ถ€์—ฌ๋˜์ง€ ์•Š์Œ).
  • ํ˜ธ์ถœ์ž ํ† ํฐ์— ์ด๋ฏธ UIAccess๊ฐ€ ์žˆ์œผ๋ฉด IL์€ ๋ณ€๊ฒฝ๋˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค.
  • โ€œRatchetโ€ ๊ธฐ๋ฒ•: UIAccess ํ”„๋กœ์„ธ์Šค๊ฐ€ ์Šค์Šค๋กœ์˜ UIAccess๋ฅผ ๋น„ํ™œ์„ฑํ™”ํ•˜๊ณ  RAiLaunchAdminProcess๋กœ ์žฌ์‹คํ–‰ํ•˜๋ฉด ์ถ”๊ฐ€๋กœ +16 IL ์ฆ๊ฐ€๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. MediumโžœHigh๋Š” 255๋ฒˆ์˜ ์žฌ์‹คํ–‰์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค(์‹œ๋„๋Ÿฝ์ง€๋งŒ ์ž‘๋™ํ•จ).

UIAccess๊ฐ€ Admin Protection ์šฐํšŒ๋ฅผ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜๋Š” ์ด์œ 

  • UIAccess๋Š” ๋” ๋‚ฎ์€ IL ํ”„๋กœ์„ธ์Šค๊ฐ€ ๋” ๋†’์€ IL์˜ ์œˆ๋„์šฐ๋กœ ์œˆ๋„์šฐ ๋ฉ”์‹œ์ง€๋ฅผ ๋ณด๋‚ผ ์ˆ˜ ์žˆ๊ฒŒ ํ•˜์—ฌ UIPI ํ•„ํ„ฐ๋ฅผ ์šฐํšŒํ•ฉ๋‹ˆ๋‹ค. ๋™์ผ IL์—์„œ๋Š” SetWindowsHookEx์™€ ๊ฐ™์€ ์ „ํ†ต์  UI ์›์‹œ๊ฐ€ ์œˆ๋„์šฐ๋ฅผ ์†Œ์œ ํ•œ ๋ชจ๋“  ํ”„๋กœ์„ธ์Šค(์˜ˆ: COM์—์„œ ์‚ฌ์šฉํ•˜๋Š” message-only windows ํฌํ•จ)์— ์ฝ”๋“œ ์ธ์ ์…˜/DLL ๋กœ๋”ฉ์„ ํ—ˆ์šฉํ•ฉ๋‹ˆ๋‹ค.
  • Admin Protection์€ UIAccess ํ”„๋กœ์„ธ์Šค๋ฅผ ์ œํ•œ๋œ ์‚ฌ์šฉ์ž ์‹ ์›์œผ๋กœ, ๊ทธ๋Ÿฌ๋‚˜ High IL๋กœ ์กฐ์šฉํžˆ ์‹คํ–‰ํ•ฉ๋‹ˆ๋‹ค. ํ•ด๋‹น High-IL UIAccess ํ”„๋กœ์„ธ์Šค ๋‚ด๋ถ€์—์„œ ์ž„์˜ ์ฝ”๋“œ๊ฐ€ ์‹คํ–‰๋˜๋ฉด ๊ณต๊ฒฉ์ž๋Š” ๋ฐ์Šคํฌํƒ‘์˜ ๋‹ค๋ฅธ High-IL ํ”„๋กœ์„ธ์Šค(๋‹ค๋ฅธ ์‚ฌ์šฉ์ž ์†Œ์œ ์ธ ๊ฒฝ์šฐ๋„ ํฌํ•จ)์— ์ธ์ ์…˜ํ•  ์ˆ˜ ์žˆ์–ด ์˜๋„๋œ ๋ถ„๋ฆฌ๊ฐ€ ๊นจ์ง‘๋‹ˆ๋‹ค.

HWND-to-process handle primitive (GetProcessHandleFromHwnd / NtUserGetWindowProcessHandle)

  • Windows 10 1803 ์ด์ƒ์—์„œ ํ•ด๋‹น API๋Š” Win32k๋กœ ์ด๋™ํ•˜์—ฌ(NtUserGetWindowProcessHandle) ํ˜ธ์ถœ์ž๊ฐ€ ์ œ๊ณตํ•œ DesiredAccess๋ฅผ ์‚ฌ์šฉํ•ด ํ”„๋กœ์„ธ์Šค ํ•ธ๋“ค์„ ์—ด ์ˆ˜ ์žˆ๊ฒŒ ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ์ปค๋„ ๊ฒฝ๋กœ๋Š” ObOpenObjectByPointer(..., KernelMode, ...)๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ์ผ๋ฐ˜์ ์ธ ์‚ฌ์šฉ์ž ๋ชจ๋“œ ์ ‘๊ทผ ๊ฒ€์‚ฌ๋ฅผ ์šฐํšŒํ•ฉ๋‹ˆ๋‹ค.
  • ์‹ค๋ฌด์ƒ ์ „์ œ์กฐ๊ฑด: ๋Œ€์ƒ ์œˆ๋„์šฐ๋Š” ๊ฐ™์€ ๋ฐ์Šคํฌํƒ‘์— ์žˆ์–ด์•ผ ํ•˜๋ฉฐ UIPI ๊ฒ€์‚ฌ๋ฅผ ํ†ต๊ณผํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์—ญ์‚ฌ์ ์œผ๋กœ UIAccess๋ฅผ ๊ฐ€์ง„ ํ˜ธ์ถœ์ž๋Š” UIPI ์‹คํŒจ๋ฅผ ์šฐํšŒํ•˜๊ณ  ์—ฌ์ „ํžˆ ์ปค๋„ ๋ชจ๋“œ ํ•ธ๋“ค์„ ์–ป์„ ์ˆ˜ ์žˆ์—ˆ๋Š”๋ฐ(์ด๋Š” CVE-2023-41772๋กœ ์ˆ˜์ •๋จ).
  • ์˜ํ–ฅ: ์œˆ๋„์šฐ ํ•ธ๋“ค์€ ํ˜ธ์ถœ์ž๊ฐ€ ์ •์ƒ์ ์œผ๋กœ ์—ด ์ˆ˜ ์—†๋˜ ๊ฐ•๋ ฅํ•œ ํ”„๋กœ์„ธ์Šค ํ•ธ๋“ค(์ฃผ๋กœ PROCESS_DUP_HANDLE, PROCESS_VM_READ, PROCESS_VM_WRITE, PROCESS_VM_OPERATION)์„ ์–ป์„ ์ˆ˜ ์žˆ๋Š” capability๊ฐ€ ๋ฉ๋‹ˆ๋‹ค. ์ด๋Š” ์ƒŒ๋“œ๋ฐ•์Šค ๊ฐ„ ์ ‘๊ทผ์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜๊ณ , ๋Œ€์ƒ์ด ์–ด๋–ค ์œˆ๋„์šฐ(์˜ˆ: message-only windows)๋ฅผ ๋…ธ์ถœํ•˜๋ฉด Protected Process / PPL ๊ฒฝ๊ณ„๋ฅผ ๋ฌด๋„ˆ๋œจ๋ฆด ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • ์‹ค์ œ ์•…์šฉ ํ๋ฆ„: HWND๋ฅผ ์—ด๊ฑฐํ•˜๊ฑฐ๋‚˜ ์ฐพ๊ธฐ(์˜ˆ: EnumWindows/FindWindowEx), ์†Œ์œ  PID ํ™•์ธ(GetWindowThreadProcessId), GetProcessHandleFromHwnd ํ˜ธ์ถœ, ๋ฐ˜ํ™˜๋œ ํ•ธ๋“ค๋กœ ๋ฉ”๋ชจ๋ฆฌ ์ฝ๊ธฐ/์“ฐ๊ธฐ ๋˜๋Š” ์ฝ”๋“œ ํ•˜์ด์žฌํ‚น ์›์‹œ๋ฅผ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค.
  • ํŒจ์น˜ ์ดํ›„ ๋™์ž‘: UIAccess๋Š” ๋” ์ด์ƒ UIPI ์‹คํŒจ ์‹œ ์ปค๋„ ๋ชจ๋“œ ์˜คํ”ˆ์„ ํ—ˆ์šฉํ•˜์ง€ ์•Š์œผ๋ฉฐ ํ—ˆ์šฉ๋œ ์ ‘๊ทผ ๊ถŒํ•œ์€ ๋ ˆ๊ฑฐ์‹œ ํ›„ํฌ ์ง‘ํ•ฉ์œผ๋กœ ์ œํ•œ๋ฉ๋‹ˆ๋‹ค; Windows 11 24H2๋Š” ํ”„๋กœ์„ธ์Šค ๋ณดํ˜ธ ๊ฒ€์‚ฌ์™€ ๊ธฐ๋Šฅ ํ”Œ๋ž˜๊ทธ๋กœ ์ œ์–ด๋˜๋Š” ์•ˆ์ „ํ•œ ๊ฒฝ๋กœ๋ฅผ ์ถ”๊ฐ€ํ–ˆ์Šต๋‹ˆ๋‹ค. ์‹œ์Šคํ…œ ์ „์ฒด์—์„œ UIPI๋ฅผ ๋น„ํ™œ์„ฑํ™”(EnforceUIPI=0)ํ•˜๋ฉด ์ด๋Ÿฌํ•œ ๋ณดํ˜ธ๊ฐ€ ์•ฝํ™”๋ฉ๋‹ˆ๋‹ค.

๋ณด์•ˆ ๋””๋ ‰ํ„ฐ๋ฆฌ ๊ฒ€์ฆ ์ทจ์•ฝ์  (AppInfo AiCheckSecureApplicationDirectory)

AppInfo๋Š” ์ œ๊ณต๋œ ๊ฒฝ๋กœ๋ฅผ GetFinalPathNameByHandle๋กœ ํ•ด์„ํ•œ ๋‹ค์Œ ํ•˜๋“œ์ฝ”๋”ฉ๋œ ๋ฃจํŠธ/์ œ์™ธ ๋ชฉ๋ก์— ๋Œ€ํ•ด ๋ฌธ์ž์—ด ํ—ˆ์šฉ/๊ฑฐ๋ถ€ ๊ฒ€์‚ฌ๋ฅผ ์ ์šฉํ•ฉ๋‹ˆ๋‹ค. ๊ทธ ๋‹จ์ˆœํ•œ ๊ฒ€์ฆ์œผ๋กœ ์ธํ•ด ์—ฌ๋Ÿฌ ์šฐํšŒ ์œ ํ˜•์ด ๋ฐœ์ƒํ•ฉ๋‹ˆ๋‹ค:

  • Directory named streams: ์ œ์™ธ๋œ ์“ฐ๊ธฐ ๊ฐ€๋Šฅํ•œ ๋””๋ ‰ํ„ฐ๋ฆฌ(์˜ˆ: C:\Windows\tracing)๋Š” ๋””๋ ‰ํ„ฐ๋ฆฌ ์ž์ฒด์˜ named stream์„ ์ด์šฉํ•ด ์šฐํšŒํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์˜ˆ: C:\Windows\tracing:file.exe. ๋ฌธ์ž์—ด ๊ฒ€์‚ฌ๋Š” C:\Windows\๋ฅผ ๋ณด๊ณ  ์ œ์™ธ๋œ ํ•˜์œ„ ๊ฒฝ๋กœ๋ฅผ ๋†“์นฉ๋‹ˆ๋‹ค.
  • Writable file/directory inside an allowed root: CreateProcessAsUser๋Š” .exe ํ™•์žฅ์ž๋ฅผ ์š”๊ตฌํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. ํ—ˆ์šฉ๋œ ๋ฃจํŠธ ์•„๋ž˜์˜ ์“ฐ๊ธฐ ๊ฐ€๋Šฅํ•œ ํŒŒ์ผ์„ ์‹คํ–‰ ํŒŒ์ผ ํŽ˜์ด๋กœ๋“œ๋กœ ๋ฎ์–ด์“ฐ๊ฑฐ๋‚˜ ์„œ๋ช…๋œ uiAccess="true" EXE๋ฅผ ์“ฐ๊ธฐ ๊ฐ€๋Šฅํ•œ ํ•˜์œ„ ๋””๋ ‰ํ„ฐ๋ฆฌ(์˜ˆ: Tasks_Migrated์™€ ๊ฐ™์€ ์—…๋ฐ์ดํŠธ ์ž”์—ฌ๋ฌผ)๋กœ ๋ณต์‚ฌํ•˜๋ฉด secure-path ๊ฒ€์‚ฌ๋ฅผ ํ†ต๊ณผํ•ฉ๋‹ˆ๋‹ค.
  • MSIX into C:\Program Files\WindowsApps (fixed): ๋น„๊ด€๋ฆฌ์ž๋Š” WindowsApps์— ์„ค์น˜๋œ ์„œ๋ช…๋œ MSIX ํŒจํ‚ค์ง€๋ฅผ ์„ค์น˜ํ•  ์ˆ˜ ์žˆ์—ˆ๊ณ  ํ•ด๋‹น ๊ฒฝ๋กœ๋Š” ์ œ์™ธ ๋Œ€์ƒ์ด ์•„๋‹ˆ์—ˆ์Šต๋‹ˆ๋‹ค. MSIX์— UIAccess ๋ฐ”์ด๋„ˆ๋ฆฌ๋ฅผ ํฌํ•จ์‹œํ‚ค๊ณ  RAiLaunchAdminProcess๋กœ ์‹คํ–‰ํ•˜๋ฉด ํ”„๋กฌํ”„ํŠธ ์—†๋Š” High-IL UIAccess ํ”„๋กœ์„ธ์Šค๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ์—ˆ์Šต๋‹ˆ๋‹ค. Microsoft๋Š” ์ด ๊ฒฝ๋กœ๋ฅผ ์ œ์™ธํ•˜์—ฌ ์™„ํ™”ํ–ˆ์œผ๋ฉฐ, uiAccess๋กœ ์ œํ•œ๋œ MSIX ๊ธฐ๋Šฅ ์ž์ฒด๋Š” ์ด๋ฏธ ๊ด€๋ฆฌ์ž ์„ค์น˜๋ฅผ ์š”๊ตฌํ•ฉ๋‹ˆ๋‹ค.

๊ณต๊ฒฉ ์›Œํฌํ”Œ๋กœ์šฐ (ํ”„๋กฌํ”„ํŠธ ์—†๋Š” High IL)

  1. ์„œ๋ช…๋œ UIAccess ๋ฐ”์ด๋„ˆ๋ฆฌ(signed UIAccess binary)๋ฅผ ํš๋“ํ•˜๊ฑฐ๋‚˜ ์ œ์ž‘ํ•ฉ๋‹ˆ๋‹ค(๋งค๋‹ˆํŽ˜์ŠคํŠธ uiAccess="true").
  2. AppInfo์˜ ํ—ˆ์šฉ ๋ชฉ๋ก์ด ํ—ˆ์šฉํ•˜๋Š” ์œ„์น˜์— ๋ฐฐ์น˜ํ•˜๊ฑฐ๋‚˜(๋˜๋Š” ์œ„์—์„œ ์–ธ๊ธ‰ํ•œ ๊ฒฝ๋กœ ๊ฒ€์ฆ ์—ฃ์ง€์ผ€์ด์Šค/์“ฐ๊ธฐ ๊ฐ€๋Šฅํ•œ ์•„ํ‹ฐํŒฉํŠธ๋ฅผ ์•…์šฉ).
  3. RAiLaunchAdminProcess๋ฅผ ํ˜ธ์ถœํ•ด UIAccess + ์ƒ์Šน๋œ IL๋กœ ์กฐ์šฉํžˆ ์‹คํ–‰ํ•ฉ๋‹ˆ๋‹ค.
  4. ๊ทธ High-IL ๋ฐœํŒ์—์„œ window hooks/DLL injection ๋˜๋Š” ๋‹ค๋ฅธ ๋™์ผ IL ์›์‹œ๋ฅผ ์ด์šฉํ•ด ๋ฐ์Šคํฌํƒ‘์˜ ๋‹ค๋ฅธ High-IL ํ”„๋กœ์„ธ์Šค๋ฅผ ํ‘œ์ ์œผ๋กœ ์‚ผ์•„ ๊ด€๋ฆฌ์ž ์ปจํ…์ŠคํŠธ๋ฅผ ์™„์ „ํžˆ ์žฅ์•…ํ•ฉ๋‹ˆ๋‹ค.

ํ›„๋ณด ์“ฐ๊ธฐ ๊ฐ€๋Šฅํ•œ ๊ฒฝ๋กœ ์—ด๊ฑฐ

์„ ํƒํ•œ ํ† ํฐ ๊ด€์ ์—์„œ ๋ช…๋ชฉ์ƒ ์•ˆ์ „ํ•œ ๋ฃจํŠธ ๋‚ด์˜ ์“ฐ๊ธฐ/๋ฎ์–ด์“ธ ์ˆ˜ ์žˆ๋Š” ๊ฐ์ฒด๋ฅผ ์ฐพ๊ธฐ ์œ„ํ•ด PowerShell ํ—ฌํผ๋ฅผ ์‹คํ–‰ํ•ฉ๋‹ˆ๋‹ค:

$paths = "C:\\Windows","C:\\Program Files","C:\\Program Files (x86)"
Get-AccessibleFile -Win32Path $paths -Access Execute,WriteData `
-DirectoryAccess AddFile -Recurse -ProcessId <PID>
  • ๊ด€๋ฆฌ์ž ๊ถŒํ•œ์œผ๋กœ ์‹คํ–‰ํ•˜์—ฌ ๋” ๋„“์€ ๊ฐ€์‹œ์„ฑ์„ ํ™•๋ณดํ•˜์„ธ์š”; -ProcessId๋ฅผ low-priv ํ”„๋กœ์„ธ์Šค๋กœ ์„ค์ •ํ•˜์—ฌ ํ•ด๋‹น token์˜ ์ ‘๊ทผ ๊ถŒํ•œ์„ ๋ฏธ๋Ÿฌํ•˜์„ธ์š”.
  • RAiLaunchAdminProcess๋กœ ํ›„๋ณด๋ฅผ ์‚ฌ์šฉํ•˜๊ธฐ ์ „์— ์•Œ๋ ค์ง„ ํ—ˆ์šฉ๋˜์ง€ ์•Š๋Š” ํ•˜์œ„ ๋””๋ ‰ํ„ฐ๋ฆฌ๋ฅผ ์ˆ˜๋™์œผ๋กœ ํ•„ํ„ฐ๋งํ•˜์„ธ์š”.

์ฐธ์กฐ

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ