äŸµå ¥ãã¹ãã䜿çšãããšãæªæã®ãã人ããããã¯ãŒã¯ãæ¹ããããå¯èœæ§ããããšãã質åã«çããããšãã§ããŸãããã¯ã€ããããããã«ãŒãšã»ãã¥ãªãã£å°éå®¶ã¯ãäŸµå ¥ãã¹ãããŒã«ã䜿çšããŠãéçºãŸãã¯å±éã®ã©ã®æ®µéã§ããã·ã¹ãã ãå±éºã«ãããããšã«ããããããã¯ãŒã¯ãšã¢ããªã±ãŒã·ã§ã³ã®æ¬ é¥ãè匱æ§ã調ã¹ãããšãã§ããŸãã
ãã®ãããªãã³ãã¹ãããŒã«ã®1ã€ã¯ãMetasploitãããžã§ã¯ãã§ããRubyã«çµã¿èŸŒãŸããŠãããã®ãªãŒãã³ãœãŒã¹ãã¬ãŒã ã¯ãŒã¯ã§ã¯ãã³ãã³ãã©ã€ã³ãŸãã¯GUIã䜿çšããŠãã¹ãã§ããŸããç¬èªã®å€èšèªã¢ãã€ã³ãäœæããããšã§æ¡åŒµã§ããŸãã
Metasploitãã¬ãŒã ã¯ãŒã¯ãšã¯äœã§ããïŒã©ã®ããã«äœ¿çšãããŸããïŒ
Metasploit Frameworkã¯ããµã€ããŒç¯çœªè ããã¯ã€ããããããã«ãŒãäŸµå ¥ã®å°éå®¶ããããã¯ãŒã¯ãšãµãŒããŒã®è匱æ§ã調æ»ããããã«äœ¿çšã§ãã匷åãªããŒã«ã§ãããªãŒãã³ãœãŒã¹ãã¬ãŒã ã¯ãŒã¯ã§ãããããã»ãšãã©ã®ãªãã¬ãŒãã£ã³ã°ã·ã¹ãã ã§ç°¡åã«æ§æããŠäœ¿çšã§ããŸãã
Metasploitã䜿çšãããšããã³ãã¹ã¿ãŒã¯æ¢è£œã®ãã®ã䜿çšããããã«ã¹ã¿ã ã³ãŒããäœæããŠãªã³ã©ã€ã³ã§æ¿å ¥ãã匱ç¹ãèŠã€ããããšãã§ããŸããè åšãèŠã€ããå¥ã®æ¹æ³ãšããŠãã®ã£ãããç¹å®ããŠææžåããåŸããã®æ å ±ã䜿çšããŠã·ã¹ãã ã®ã£ããã«å¯ŸåŠãããœãªã¥ãŒã·ã§ã³ã«åªå é äœãä»ããããšãã§ããŸãã
Metasploitã®ç°¡åãªæŽå²
Metasploitãããžã§ã¯ãã¯ãããŒã¿ãã«ãããã¯ãŒãã³ã°ããŒã«ãšããŠäœ¿çšããããã«ãã¡ã€ã³éçºè ã®Matt Millerã®æ¯æŽãåããŠãHDMooreã«ãã£ãŠ2003幎ã«Perlã§äœæãããŸããã 2007幎ãŸã§ã«Rubyã«å®å šã«å€æããã2009幎ã«Rapid7ã«ãã£ãŠã©ã€ã»ã³ã¹äŸäžãããäŸµå ¥æ€åºã·ã¹ãã ãšãªã¢ãŒãã¢ã¯ã»ã¹èåŒ±æ§æªçšããŒã«ãå°éãšãããã®ãã¹ãã³ãæ ç¹ãšããäŒç€Ÿã®ããŒããã©ãªãªã®äžéšã§ããç¶ããŠããŸãã
ãããã®ä»ã®ããŒã«ã®äžéšã¯ãKali LinuxOSã«çµã¿èŸŒãŸããŠããMetasploitç°å¢ã«ãããŸãã Rapid7ã¯ãMetasploitProãšMetasploitExpressãšãã2ã€ã®ç¬èªã®OpenCoreããŒã«ãéçºããŸããã
ãã®ãã¬ãŒã ã¯ãŒã¯ã¯ããšã¯ã¹ããã€ããéçºããè匱æ§ãä¿®æ£ããããã®äž»èŠãªããŒã«ã«ãªããŸãããMetasploitã®åã¯ããã³ãã¹ã¿ãŒã¯ããã¹ã察象ã®ãã©ãããã©ãŒã ããµããŒãããå ŽåãšãµããŒãããªãå ŽåãããããŸããŸãªããŒã«ã䜿çšããŠããã¹ãŠã®ãã§ãã¯ãæåã§å®è¡ããå¿ èŠããããŸããããŸããç¬èªã®ã³ãŒããæåã§èšè¿°ããŠãããã¯ãŒã¯ã«ãããã€ããå¿ èŠããããŸããããªã¢ãŒããã¹ãã¯äžŠå€ãããã®ã§ãããã»ãã¥ãªãã£ã¹ãã·ã£ãªã¹ãã®äœæ¥ã¯å°åãå°å ã®äŒæ¥ã«éå®ãããçµç¹ã¯ITã³ã³ãµã«ã¿ã³ããã»ãã¥ãªãã£ã¹ãã·ã£ãªã¹ãã«å€§éãè²»ããå¿ èŠããããŸããã
Metasploitã䜿çšããŠããã®ã¯èª°ã§ããïŒ
Metasploitã¯ããã®å¹ åºãçšéãšãªãŒãã³ãœãŒã¹ã³ãŒãã«ããããµã€ããŒã»ãã¥ãªãã£ã®å°éå®¶ããããã«ãŒãŸã§ãããŸããŸãªäººã ã«äœ¿çšãããŠããŸãã Metasploitã¯ããã©ãããã©ãŒã ãèšèªã«é¢ä¿ãªããã€ã³ã¹ããŒã«ãç°¡åã§ä¿¡é Œæ§ã®é«ãããŒã«ãæ¢ããŠãã人ã«åœ¹ç«ã¡ãŸãããã®ãœãããŠã§ã¢ã¯ããã«ãŒã«äººæ°ããããåºãå©çšãããŠãããããã»ãã¥ãªãã£ã®å°éå®¶ã¯ãèªåã§äœ¿çšããªããŠãMetasploitãã©ãããã©ãŒã ãåŠã¶ããšãã§ããŸãã
Metasploitã®ææ°ããŒãžã§ã³ã«ã¯ãAndroidãPHPãPythonãJavaãCiscoãªã©ãå«ã25ãè¶ ãããã©ãããã©ãŒã çšã®1677ãè¶ ãããšã¯ã¹ããã€ããå«ãŸããŠããŸãããã¬ãŒã ã¯ãŒã¯ã«ã¯çŽ500åã®ã³ã³ãã³ãïŒããã€ããŒããïŒãå«ãŸããŠããããã®äžã«ã¯æ¬¡ã®ãã®ããããŸãã
- â .
- â .
- Meterpreter â , , .
- â .
Metasploit
Metasploitãã€ã³ã¹ããŒã«ããåŸã¯ãããŒããã¹ãã£ã³ãããããªãã¬ãŒãã£ã³ã°ã·ã¹ãã ã®ããžã¿ã«æçŽãååŸããããè匱æ§ã¹ãã£ããŒã䜿çšããŠãããã¯ãŒã¯ã«äŸµå ¥ããæ¹æ³ãèŠã€ããããšã«ãããã¿ãŒã²ããæ å ±ãååŸããã ãã§ããæ®ã£ãŠããã®ã¯ããšã¯ã¹ããã€ããšãã€ããŒããéžæããããšã ãã§ãããã®ã³ã³ããã¹ãã§ã¯ããšã¯ã¹ããã€ãã¯ããããã¯ãŒã¯ãŸãã¯ã·ã¹ãã ã®åŒ±ç¹ãç¹å®ãããã®è匱æ§ãæªçšããŠã¢ã¯ã»ã¹ãååŸããææ®µã§ãã
ãã©ãããã©ãŒã ã¯ãæ§ã ãªã¢ãã«ãšã€ã³ã¿ãŒãã§ãŒã¹ã§æ§æïŒmsfconsole cursesã©ã€ãã©ãªã«åºã¥ãmsfcli端æ«ãŸãã¯ã³ãã³ãã©ã€ã³ããã®å šãŠã®MSF颿°ã®ArmitagMSFãšã®çµ±åã«äœ¿çšãããJavaGUIããŒã«ã§ããããªã¢ãŒãäŸµå ¥ãã¹ãããµããŒãããMetasploitã³ãã¥ããã£Webã€ã³ã¿ãŒãã§ã€ã¹ã§ãã
è匱æ§ãç¹å®ãããããµã€ããŒç¯çœªæ»æããåŠãŒããšããŠããçœäººã®ããã«ãŒãäŸµå ¥ãã¹ã¿ãŒã¯ããµã€ããŒç¯çœªè ãèªåã®è¡åã宣äŒããŠããªãããšãçè§£ããå¿ èŠããããŸãããµã€ããŒç¯çœªè ã¯ã¹ãã«ã¹ã§ãããVPNãã³ãã«ãä»ããŠäœæ¥ããããšã奜ããããIPã¢ãã¬ã¹ããã¹ã¯ããŸãããŸããå€ãã®ãµã€ããŒç¯çœªè ã¯ãå°çšã®ä»®æ³ãµãŒããŒã䜿çšããŠãå€ãã®å ±æãã¹ãã£ã³ã°ãããã€ããŒãéåžžåããäžæãåé¿ããŸãããããã®2ã€ã®ãã©ã€ãã·ãŒããŒã«ã¯ãMetasploitã䜿çšãããšã¯ã¹ããã€ããšäŸµå ¥ãã¹ãã®äžçã«åå ¥ããããšããŠãããã¯ã€ããããããã«ãŒã«ã圹ç«ã¡ãŸãã
äžèšã®ããã«ãMetasploitã¯ããšã¯ã¹ããã€ãããã€ããŒãããã«ããŒé¢æ°ããšã³ã³ãŒããŒãã€ã³ã¿ãŒã»ãã¿ãŒãã·ã§ã«ã³ãŒããããã³ãšã¯ã¹ããã€ãåŸã®ã³ãŒããšNOPãæäŸããŸãã
Metasploit Pro Professionalèªå®ããªã³ã©ã€ã³ã§ååŸããŠãèªå®ãã³ãã¹ã¿ãŒã«ââãªãããšãã§ããŸããèªå®ã®åæ Œç¹ã¯80ïŒ ã§ãè©Šéšæéã¯çŽ2æéã§ãåèæžã®äœ¿çšãèš±å¯ãããŠããŸãããã®è²»çšã¯195ãã«ã§ãæ£åžžã«å®äºãããšãèšŒææžãå°å·ã§ããããã«ãªããŸãã
詊éšã®åã«ãMetasploitãã¬ãŒãã³ã°ã³ãŒã¹ãä¿®äºããæ¬¡ã®åéã®å°éç¥èãŸãã¯å®åç¥èãæã£ãŠããããšããå§ãããŸãã
- Windowsããã³LinuxOS;
- ãããã¯ãŒã¯ãããã³ã«;
- è匱æ§ç®¡çã·ã¹ãã ;
- ãã³ãã¹ãã®åºæ¬æŠå¿µã
ãã®èªå®ãååŸããããšã¯ãéèŠã®é«ããã³ãã¹ã¿ãŒãŸãã¯ãµã€ããŒã»ãã¥ãªãã£ã¢ããªã¹ãã«ãªããããšèããŠãã人ã«ãšã£ãŠæãŸããææã§ãã
Metasploitã®ã€ã³ã¹ããŒã«æ¹æ³
Metasploitã¯ãRapid7Webãµã€ãããããŠã³ããŒãã§ãããªãŒãã³ãœãŒã¹ã€ã³ã¹ããŒã©ãŒãšããŠå©çšã§ããŸããæå°ã·ã¹ãã èŠä»¶ã«ã¯ãææ°ããŒãžã§ã³ã®ChromeãFirefoxããŸãã¯Explorerãã©ãŠã¶ãå«ãŸããŸãã
ãªãã¬ãŒãã£ã³ã°ã»ã·ã¹ãã ïŒ
- Ubuntu Linux 14.04 LTSããã³16.04 ïŒæšå¥šïŒ ;
- Windows Server2008ãŸãã¯2012R2
- Windows 7 SP1 +ã8.1ãŸãã¯10;
- Red Hat Enterprise Linux Server 5.10ã6.5ã7.1以éã
è£ çœ®
- 2GHzããã»ããµ;
- å°ãªããšã4GBã®RAMïŒ8GBãæšå¥šïŒã
- å°ãªããšã1GBã®ãã£ã¹ã¯å®¹éïŒ50GBãæšå¥šïŒã
ã€ã³ã¹ããŒã«ããåã«ãããã€ã¹äžã®ãã¹ãŠã®ã¢ã³ããŠã€ã«ã¹ããã³ãã¡ã€ã¢ãŠã©ãŒã«ããã°ã©ã ãç¡å¹ã«ããŠã管çè æš©éãååŸããå¿ èŠããããŸããã€ã³ã¹ããŒã©ãŒã¯ããã©ãããã©ãŒã ã®ã€ã³ã¹ããŒã«æã«æ§æãããã¹ã¿ã³ãã¢ãã³ã¢ãžã¥ãŒã«ã§ããäŸåãªããžã§ã¯ããç¬èªã®æ¹æ³ã§ã«ã¹ã¿ãã€ãºããå Žåã¯ãæåã§ã€ã³ã¹ããŒã«ããããšãã§ããŸãã
Kali LinuxãŠãŒã¶ãŒã¯ããã§ã«MetasploitProãOSã«ãââã³ãã«ããŠããŸããWindowsãŠãŒã¶ãŒã®å Žåãã€ã³ã¹ããŒã«ã¯InstallShieldãŠã£ã¶ãŒããä»ããŠè¡ãããŸãã
ã€ã³ã¹ããŒã«åŸãèµ·åæã«ã次ã®ãªãã·ã§ã³ã衚瀺ãããŸãã
- /Users/joesmith/.msf4/dbã«ããŒã¿ããŒã¹ãäœæããŸãã
- Postgresqlãéå§ããŸãã
- ããŒã¿ããŒã¹ãŠãŒã¶ãŒã®äœæã
- åæããŒã¿ããŒã¹ã¹ããŒããäœæããŸãã
Metasploitã®äœ¿ãæ¹ãåŠã¶ïŒãã³ã
Metasploitã®åŠç¿ã®ããããã¯ãRubyã®ç¥èã«ãã£ãŠç°ãªããŸãããã ããPythonãªã©ã®ä»ã®ã¹ã¯ãªããèšèªãããã°ã©ãã³ã°èšèªã«ç²ŸéããŠããå Žåã¯ãMetasploitãžã®ç§»è¡ã¯ç°¡åã§ããããã§ãªããã°ãããã¯å®éã«åŠã¶ã®ãç°¡åãªçŽæçãªèšèªã§ãã
ãã®ããŒã«ã§ã¯ãç¬èªã®é²åŸ¡ãç¡å¹ã«ããŠæªæã®ããã³ãŒããçæããå¿ èŠããããããæœåšçãªãªã¹ã¯ã«æ³šæããå¿ èŠããããŸããå¯èœã§ããã°ããã®ããã°ã©ã ãå¥ã®ã·ã¹ãã ã«ã€ã³ã¹ããŒã«ããŠãã ãããæ©å¯æ å ±ãå«ãŸããŠããããŸãã¯ã¢ã¯ã»ã¹ã§ããå人ã®ããã€ã¹ãã³ã³ãã¥ãŒã¿ãŒã«ã¯ã€ã³ã¹ããŒã«ããªãã§ãã ãããMetasploitã«äŸµå ¥ãããšãã¯ãå¥ã®äœæ¥ããã€ã¹ã䜿çšããå¿ èŠããããŸãã
MetasploitãåŠã¶çç±
ãã®ãã©ãããã©ãŒã ã¯ããã¹ãŠã®ã»ãã¥ãªãã£ã¢ããªã¹ããŸãã¯äŸµå ¥ãã¹ã¿ãŒã«ââãšã£ãŠå¿ é ã§ããããã¯ãããŸããŸãªããŒã«ããŠãŒãã£ãªãã£ã䜿çšããŠé ããè匱æ§ãçºèŠããããã«äžå¯æ¬ ãªããŒã«ã§ããMetasploitã䜿çšãããšãããã«ãŒã®ç«å Žã«ãªããåãææ³ã䜿çšããŠãããã¯ãŒã¯ããµãŒããŒãåµå¯ããäŸµå ¥ããããšãã§ããŸãã
å žåçãªMetasploitã¢ãŒããã¯ãã£ã®å³ã次ã«ç€ºããŸãã
Metasploitã¹ããããã€ã¹ãããã¬ã€ã
ã·ã¹ãã ãšOSãåºæ¬çãªèŠä»¶ãæºãããŠããããšãåæãšããŠãã¯ã€ãã¯ãšã¯ã¹ããã€ããã¥ãŒããªã¢ã«ãéå§ããŸãããã¹ãç°å¢ãã»ããã¢ããããã«ã¯ãVirtualboxãKaliãããã³MetasploitableãããŠã³ããŒãããŠã€ã³ã¹ããŒã«ããä»®æ³åãããããã«ãŒãã·ã³ãäœæããå¿ èŠããããŸãã Windows XP以éãããŠã³ããŒãããŠã€ã³ã¹ããŒã«ãããã®ãšã¯ã¹ããã€ãçšã®3çªç®ã®ä»®æ³ãã·ã³ãäœæã§ããŸãã
ãã¹ãããŒã«ãã€ã³ã¹ããŒã«ããåŸãMetasploitã³ã³ãœãŒã«ãéããŸããæ¬¡ã®ããã«ãªããŸãã
æãç°¡åãªæ¹æ³ã¯ãã³ã³ãœãŒã«ã«helpã³ãã³ããå ¥åããŠãMetasploitã³ãã³ããšãã®èª¬æã®ãªã¹ãã衚瀺ããããšã§ããããã¯æ¬¡ã®ããã«
ãªããŸããå¿ èŠãªæåã®åŒ·åã§äŸ¿å©ãªããŒã«ã¯ArmitageGUIã§ãããã«ãããã¿ãŒã²ãããèŠèŠåãããããã«ã¢ã¯ã»ã¹ããããã®æãé©åãªãšã¯ã¹ããã€ããæšå¥šã§ããŸãããã®ããŒã«ã¯ããšã¯ã¹ããã€ãã®æåã®äŸµå ¥ãå®è¡ãããåŸãããæ·±ã浞éãšãããªããã¹ãã®ããã®é«åºŠãªæ©èœã瀺ããŠããŸããã³ã³ãœãŒã«ã§ãããéžæããã«ã¯ã[ã¢ããªã±ãŒã·ã§ã³]-[ããŒã«ã®æŽ»çš]-[ã¢ãŒãããŒãž]ïŒ[ã¢ããªã±ãŒã·ã§ã³]-[ããŒã«ã®æŽ»çš]-ã¢ãŒãããŒãžïŒã«ç§»åããŸãã
ç»é¢ã«ãã©ãŒã ãã£ãŒã«ãã衚瀺ããããããã¹ããããŒãçªå·ããŠãŒã¶ãŒIDãããã³ãã¹ã¯ãŒããå ¥åããŸãããã¹ãŠã®ãã£ãŒã«ãã«å ¥åããåŸãEnterããŒãæŒããšããšã¯ã¹ããã€ããèµ·åããæºåãæŽããŸãã
MetasploitãåŠç¿ããããã®ãªãœãŒã¹
ãªãŒãã³ãœãŒã¹ãœãããŠã§ã¢ã³ãã¥ããã£ã®äž»ãªåŒ·ã¿ã®1ã€ã¯ããªãœãŒã¹ã®ããŒã«ãšæ å ±ã®å ±æã§ããããã¯ãã€ã³ã¿ãŒããããäœæãããçç±ã®çŸä»£ã®å ·äœåã§ããããã¯ãæè»æ§ãä¿é²ããã³ã©ãã¬ãŒã·ã§ã³ã®ç¡éã®æ©äŒãæäŸããããŒã«ã§ãã
ãã®ç¹ã§ãMatspoitã®å¯èœæ§ãæå€§éã«åŒãåºãããã®ãªãœãŒã¹ã®ãªã¹ããæäŸããŸãã
æé«ã®ãªãœãŒã¹ã®1ã€ã§ãããæåã«èšªããã¹ãå Žæã¯ãMetasploitç¬èªã®åºç¯ãªç¥èããŒã¹ã§ããããã«ã¯ãåå¿è åãã¬ã€ããã¡ã¿ã¢ãžã¥ãŒã«ããšã¯ã¹ããã€ããããã³çºèŠãããè匱æ§ãšãããã®ä¿®æ£ãå«ãŸããŠããŸãããŸããããŸããŸãªçš®é¡ã®MetasploitèšŒææžãšãã®ååŸæ¹æ³ã«ã€ããŠãåŠã¶ããšãã§ããŸãã
ãã1ã€ã®äŸ¿å©ãªãªãœãŒã¹ã¯VaronisCyberââWorkshopããµã€ããŒã»ãã¥ãªãã£ã®å°éå®¶ã«ããããŸããŸãªãã¥ãŒããªã¢ã«ãšã»ãã·ã§ã³ãæäŸããŸãã