2024/10/5 YAPC::Hakodate 2024
2024/10/5 YAPC::Hakodate 2024
2021å¹´8æãã9æã«ããã¦ãæ±äº¬2020ãªãªã³ããã¯ã»ãã©ãªã³ããã¯ï¼ä»¥ä¸ãæ±äº¬äºè¼ªï¼ãéå¬ããã¾ããããªãªã³ããã¯ã®ãããªä¸ççã«æ³¨ç®ãéã¾ãã¤ãã³ãã§ã¯ã大è¦æ¨¡ãªãµã¤ãã¼æ»æã®è å¨ãæ¸å¿µããã¾ãã®ã§ããã®å¯¾çã«åããæºåãæéãããã¦å ¥å¿µã«è¡ããã¦ãã¾ããã幸ããç®ç«ã£ãæ»æ被害ã¯å ±åããã¾ããã§ããã®ã§ãé¢ä¿è ã¯ä¸å®å¿ã¨ãã£ãã¨ãããã¨æãã¾ãã 表èå°ã§ã¯å¤§ããªäºä»¶ã¯ããã¾ããã§ããããè£èå°ã§ã¯ãæ±äº¬äºè¼ªã®ããã¡ã¤ã³åãã«é¢ãã¦ãæ§ã ãªåããããã¾ãããç¹ã«ä»åã®äºè¼ªã¯ä¼æã1å¹´é延æããã¨ããæªæ¾æã®äºæ ã¨ãªãã¾ããããäºè¼ªãã¡ã¤ã³åäºæ ã«ãå½±é¿ãåã³ã¾ããããã¡ã¤ã³åã¨ã¯ãã¤ã³ã¿ã¼ãããä¸ã§æä¾ããããµã¼ãã¹ãä¾ãã°ã¦ã§ãã«ã¢ã¯ã»ã¹ããéã®èå¥åã¨ãã¦ä½¿ããããã®ã§ããæ±äº¬äºè¼ªã®å ¬å¼ãµã¤ã㯠tokyo2020.org ã¨ãããã¡ã¤ã³åã使ã£ã¦ãã¾ããããã±ãããäºç´ãã
Searching: Domain age, Alexa rank, HTTPS valid, Blacklisting, SSL certificates, Source code, Location, IP address, WOT Trustworthiness, Spam reports, Advanced technology, Privacy Policy, Terms of Use, Contact options Scam Detector, Website Reviews and Online Scam Protection Scam Detector provides original information, reporting, research, reviews, and analysis on websites, domain names, and e-comm
As the influence of the internet rises, so does the prevalence of online scams. There are fraudsters making all kinds of claims to trap victims online - from fake investment opportunities to online stores - and the internet allows them to operate from any part of the world with anonymity. The ability to spot online scams is an important skill to have as the virtual world is increasingly becoming a
1. å§ãã« ããã«ã¡ã¯ãmorioka12 ã§ãã æ¬ç¨¿ã§ã¯ãAWS ããã¸ã¡ã³ãã³ã³ã½ã¼ã«ã«ç¦ç¹ãå½ã¦ããã£ãã·ã³ã°ã«ãã MFA (Multi-Factor Authentication) èªè¨¼ã®åé¿ãäºä¾ãã»ãã¥ãªãã£å¯¾çã«ã¤ãã¦ç´¹ä»ãã¾ãã 1. å§ãã« å 責äºé æ³å®èªè 2. AWS ããã¸ã¡ã³ãã³ã³ã½ã¼ã« MFA (Multi-Factor Authentication) 3. ãã£ãã·ã³ã° (Phishing) MITRE ATT&CK 4. ãã£ãã·ã³ã°ã«ãã AWS ãã°ã¤ã³ã®ä»®æ³ MFA ããã¤ã¹èªè¨¼ã®åé¿ 5. ãã£ãã·ã³ã°ã«ãã AWS ãã°ã¤ã³ã® SSO èªè¨¼ã®åé¿ 6. AWS ãã°ã¤ã³ãã¿ã¼ã²ããã«ãããã£ãã·ã³ã°ã®äºä¾ äºä¾1 (Google æ¤ç´¢) äºä¾2 (ã¡ã¼ã«) äºä¾3 (ã¡ã¼ã«) 7. ãã®ä» Web ã¢ããªã±ã¼ã·ã§ã³ã«ããã MFA èªè¨¼ã®å
ã¯ããã« ãã£ãã·ã³ã°è©æ¬ºã¯ä¼æ¥ã«ãå人ã«ãè¿«ã身è¿ãªãµã¤ãã¼è å¨ã®1ã¤ã§ããããããå ãã被害件æ°ã®å²åã¯ãµã¤ãã¼æ»æå ¨ä½ã§è¦ã¦ãããããæ大ã¯ã©ã¹ã§ãã 大è¦æ¨¡ãª SOC ã CSIRT ã«æå±ãã¦ããæ¹ã«ã¨ã£ã¦ã¯ã対å¿ãããã¨ãå¤ãã¢ã©ã¼ãã»ã¤ã³ã·ãã³ãã®ä¸ã¤ã«ãªã£ã¦ããã®ã§ã¯ãªããã¨æãã¾ãã ãã¡ããã¢ã©ã¼ãã»ã¤ã³ã·ãã³ããããã°å¯¾å¿è ããã£ãã·ã³ã°ãµã¤ãã®èª¿æ»ãããå¿ è¦ãåºã¦ãã¾ãããããã§ä¸ã¤èª²é¡ã«ãªãã®ã¯ ã¯ãã¼ãã³ã° ã®åå¨ã§ãã ã¯ãã¼ãã³ã°ã¯ä¸è¬çãªITç¨èªãªã®ã§ãã§ã«ç¥ã£ã¦ããæ¹ãå¤ãã¨æãã¾ãããããããã¢ã¯ã»ã¹å ã®æ å ±ãé ¼ãã«è¡¨ç¤ºããã³ã³ãã³ããå¤ããæè¡ã®ãã¨ã§ããã wacul-ai.com ãã£ãã·ã³ã°ãµã¤ããã¯ãã¼ãã³ã°ã«ãã£ã¦ãã£ãã·ã³ã°ç¨ã³ã³ãã³ãã¨è¯æ§ã³ã³ãã³ãã®è¡¨ç¤ºãåãæ¿ãã¦ããã®ã§ãããåé¡ã¯ãã®ã¯ãã¼ãã³ã°æè¡ã¯å¯¾å¿è ã»ãªãµã¼ãã£ã¼å´ããã¯
Check a website: ã¦ã§ããµã¤ãã«ã¢ã¯ã»ã¹ããåã«ãä¿¡é ¼ã§ããã¦ã§ããµã¤ããã©ããããSAGICHECKãã§ç¢ºèªãã¦ã¿ã¾ãããã ãSAGICHECKãã§ã¯ãå®å¿ãã¦ã¦ã§ããµã¤ãããå©ç¨ããã ãããã«ãã§ããéãææ°ã®æ å ±ãæä¾ããã¹ãåªåãè¡ã£ã¦ãã¾ãããã¤ã³ã¿ã¼ãããã®æ å ±ã¯ãæ¥ã å¤åãã¦ãããå¤å®çµæã¯å®ç§ã§ã¯ããã¾ããããSAGICHECKãã®æ å ±ã¯ãããã¾ã§ãèªèº«ã®ãå¤æã®åèã¨ãã¦ãå©ç¨ãã ããã ãªããæ¬ãµã¼ãã¹ã®æ å ±ã¯åèæ å ±ã®æä¾ãç®çã¨ãããã®ã§ãããæ å ±ã«ã¤ãã¦ã¯æ¬ãµã¤ãã¯ä¸å責任ãè² ãã¾ããã詳ããã¯å 責ãã確èªãã ããã
In this blog post, I will be introducing online resources that can be used to investigate Phishing sites. In Collecting the Phishing Samples, I will cover how Phishing samples can be collected from online databases. In Domain/IP/URL Analysis, I will be covering how the domains, IPs, and URLs can be analyzed using online services and WHOIS information. In Sandbox Analysis, I will be covering how on
å¹´æ«ã«ãã¤ãã¿ã¼ã«æ¸ãããã©ãç¹ã«è¨äºã«ãã¦ããªãã£ãã®ã§ä¾é¤ã¨ãã¦ä¸å¿è¨äºã«æ¸ãã¦ã¿ã¾ãã CT Log ã® SAN ãç°å¸¸ã«å¤ã CT Log ã¯ï¼å² Malicious ãªããããªããï¼ã¨æã£ã¦ä» CT Log Streaming ããªãããã£ã«ã¿ããã¦ã¿ã¦ããã©æ®éã®ãã¤ããããã¾ãã£ã¦ãã¦æ¨æ¸¬ãå¤ãããâ ãã¤ã« (@akroasis5150) 2022å¹´12æ23æ¥ å¤±æããå 容ã§ã¯ãããã§ããããããããã®è¦³ç¹ã§èª¿æ»ãã¦ã人ãå½å ã«ããªãã ãããã ï¼å¤å°é¢é£ããå 容ã«ã¤ãã¦è¨è¼ããã®ã§ï¼ ã»ãã®å°ãã¯éè¦ãããã¨æã£ã¦è¨è¼ãã¦ããã¾ãã ä¸å¿ä»¥ä¸ã®ãã¤ãèæ ®ã«å ¥ãã¦æ¤ç¥ãèãããã©å¤±æããã£ã¦è©±ã§ãã censys 㧠SAN ã®æ°ãå ã«ããæ¤ç´¢ï¼æ¤ç´¢ãããããã§ããªãï¼ crt.sh ã§ã SAN ã®æ°ãå ã«ããæ¤ç´¢ (æ¤ç´¢ãããããã§ããªã) crt.sh ãå ¬éãã¦ã
åæä¿¡æ¯æå: æ»å»æ¹å¼: æ»å»è åå æ¥æ¬å½å®¶ç¨å¡å±é对æ¥æ¬ç¨æ·ååéé±¼çä¿¡,å å«è¯±å¯¼æ¬ºéªçæå以åæåæ¶æç½ç«ççé¾æ¥,åç»ä¼æ ¹æ®ä¸åç设å¤ç±»åå»éå®åå°ä¸åçéé±¼é¡µé¢ iphone:éå®åå°å éæ¥æ¬å½å®¶ç¨å¡å±çç½ç«,éè¿ä¼ªé çå¼¹çªæ示,诱导ç¨æ·å¡«å个人身份信æ¯åV-Precaå¡è¯¦ç»ä¿¡æ¯ Android:éå®åå°èåç"AU"(æ¥æ¬ç§»å¨è¿è¥å)ç½ç«,诱导ç¨æ·ä¸è½½å®è£ æ¶æapkä»èè¾¾å°è¿ä¸æ¥çªåä¿¡æ¯çç®ç å·®å¼å¨äºAndroidæ¯è¾å®¹æä»ç½é¡µä¸è½½å®è£ æ¶æç¨åº,èiphoneä¸å¦æç´æ¥ä½¿ç¨ç½é¡µå®è£ 软件æ¯è¾éº»ç¦ä¸éè¦è·å¾ç¾å,ææ¬æ´é«,æ以ç´æ¥ä¼ªé éé±¼ç½ç«çªåä¸ªäººä¿¡æ¯ IOC: ææºå·:09061661959 çé¾æ¥:https://cutt.ly/YXZfAMP apk:8b6c4fea9e4a6d8761c1c53525a91374 代çæå¡å¨:220105.top C&C:192.186
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}