ãã®è¨äºã¯ NFLaboratories Advent Calendar 2023 14 æ¥ç®ã®è¨äºã§ãã
- ã¯ããã«
- åé¡ç´¹ä»
- 解æ³
- ä½è«ã¨åç
- ãããã«
ã¯ããã«
ããã«ã¡ã¯ãç 究éçºé¨ã®ä¿è¦ (@takahoyo) ã§ãã
å¼ç¤¾ã§ã¯ãä»å¹´åãã¦å¦çéå®ã®ã»ãã¥ãªãã£ã³ã³ãã¹ããNFLabs. Cybersecurity Challenge for Students 2023ããéå¬ãã¾ããã
ã³ã³ãã¹ãã¯CTFå½¢å¼ã§ããããé常ã®CTFã¨ã¯ç°ãªãå®åã«è¿ãåéã®åé¡ã®åºé¡ãç®æãã¦ãOSINT, DFIR, Web, Malware, Dev, Pentest ã®6ã¸ã£ã³ã«ã§åé¡ãåºé¡ãã¾ããã ã¾ããåºé¡ãããåé¡ã®é£æ度ãé£ãããã®ã°ããã§ãªã easy, medium, hard ã®3段éã§åºé¡ãã¾ããã
ãã®ãã¡ãç§ã¯DFIRã®ä½åãã¬ãã¥ã¼ãæ å½ãã¾ããã DFIRã¨ããã¨ããã£ã¹ã¯ãã¡ã¢ãªã®è§£æãªã©ãæ³åãããæ¹ãå¤ãã¨æãã¾ãããä»åã¯ãã°è§£æã«ãã©ã¼ã«ã¹ãã¦ããããããã¯ã¼ã¯ãã©ãã£ãã¯ãã°ãLinuxãWindowsãã¢ããªã±ã¼ã·ã§ã³ã®ã¤ãã³ããã°ã®è§£æã«ææ¦ãã¦ãããã¾ããã é常ã®CTFã§ã¯ããã°è§£æã®åé¡ã¯ã»ã¨ãã©åºé¡ãããªããã*1ãã¢ã³ã±ã¼ããèªãã§ããã¨ããã®ãããªåé¡ãåºé¡ããã¦è¯ãã£ãã¨ããåå è ã®æè¦ãå¤ãã£ãã®ãå°è±¡çã§ããã
ãã®è¨äºã§ã¯ãç§ãä½æããDFIRã®hardåé¡ ã§ãããdeveloperãã®è§£æ³ãç´¹ä»ãã¾ãã ãªãããdeveloperãã¯ç´50åã®åå è ã®ãã¡ç«¶ææéä¸ã«4åãæ£è§£ããæåã«æ£è§£ããã£ãã®ã¯ç«¶æéå§ããç´3æéå¾ã§ãã*2
åé¡ç´¹ä»
åé¡ã¯ã以ä¸ã®ããã«ãéçºè ãå½ã®ã¤ã³ã¹ãã¼ã©ãå®è¡ãã¦ãã¾ãããã¹ã¯ã¼ããçã¾ãã¦ãã¾ã£ããçã¾ãããã¹ã¯ã¼ããç¹å®ãã¦æ¬²ãããã¨ããè¨å®ã§å§ã¾ãã¾ãã*3
éçºè ã使ç¨ãã¦ããã¯ã©ã¦ããµã¼ãã¹ã侵害ãåãã¦åå ã調æ»ãã¦ããã¨ãããããéçºè ãè¤æ°ã®ãµã¼ãã¹ãéçºç«¯æ«ã§åããã¹ã¯ã¼ãã使ç¨ãã¦ãããã¨ããããã¾ããã
ããã§ããªãã¯ãã¹ã¯ã¼ããæ¼ããããåå ã調æ»ããããã«ãéçºè ã®ç«¯æ«ãååãã¦èª¿æ»ããããã¨ã«ãã¾ããã éçºè ã«ä¸å¯©ãªåºæ¥äºããªãã£ãããã¢ãªã³ã°ããã¨ããããããããã°ãéçºã«ä½¿ãã½ããã¦ã§ã¢ãã¤ã³ã¹ãã¼ã«ããããã«ãISOãã¡ã¤ã«ã«å ¥ã£ã¦ããã¤ã³ã¹ãã¼ã©ãå®è¡ããããä½ã表示ãããªãã£ããªããããã¨è©±ãã¦ãã¾ãã éçºè ããã®è¡åãè¡ã£ã大ä½ã®æéãèãã¦ãããªãã¯ãã®è¡åãè¡ãããæéã®ãã©ãã£ãã¯ãã°ã¨OSã®ã¤ãã³ããã°ãæ½åºãã¾ããã
ãã®ãã°ãããéçºè developer ã®æ¼ãããããã¹ã¯ã¼ãã調ã¹ã¦ãã ããã
解æãè¡ã£ã¦ãããåé¡ãã¡ã¤ã«ã¯ãpcapãã¡ã¤ã«ã¨Windowsã¤ãã³ããã°ãã¡ã¤ã«ï¼.evtxï¼ã§ãã
ã¡ãªã¿ã«ããããã¯ã¼ã¯ã¨ã¨ã³ããã¤ã³ãã®ãã°ä¸¡æ¹ãåºãã¾ããããããã¯ãããã¯ã¼ã¯ã¨ã¨ã³ããã¤ã³ã両æ¹ã§ã®è§£æãéè¦ã§ãããã¨ãç解ãã¦ãããçããããã¾ããã ã¨ã³ããã¤ã³ã/ãããã¯ã¼ã¯ãã°ã®ä¸æ¹ã®è§£æã§ã¯çºçããã¤ãã³ãã®è§£å度ãä½ããé©åãªèª¿æ»ãåºæ¥ãªããã¨ãããã¾ãã ãã®åé¡ã§ãããããã¯ã¼ã¯ã¨ã¨ã³ããã¤ã³ãããããã®ãã°ãèªãã ãã§ã¯è§£ããã¨ãã§ããã両æ¹ã®ãã°ãè¡ãæ¥ããªããèªããªãã¨è§£ããªãããã«ãªã£ã¦ãã¾ãã
解æ³
pcapãã¡ã¤ã«ã®è§£æ
Wiresharkã§pcapãã¡ã¤ã«ãéãã¾ãã
ã©ã®ãããªãã©ãã£ãã¯ãããã確èªãããããConversationsã確èªãã¾ãã
以ä¸ã®ãã¨ããããã¾ãã
- 10.1.1.116ãã¯ã©ã¤ã¢ã³ãã10.1.1.117ããµã¼ã
- 80/tcp (HTTP), 443/tcp (HTTPS), 21/tcp (FTP) ã®éä¿¡ã¨ã37039/tcp, 59847/tcp ã®high port ã®éä¿¡ããã
80/tcp
80/tcp ã®éä¿¡ã¯1ã¹ããªã¼ã ããããã¾ãããFollow HTTP Streamã§éä¿¡å 容ã確èªãã¾ãã
以ä¸ã®ãã¨ããããã¾ãã
http://10.1.1.117/lib
ã«å¯¾ãã¦ã¢ã¯ã»ã¹- Serverããã㯠SimpleHTTP/0.6 Python/3.10.8
- ä½ããã®ãã¡ã¤ã«ã®ãã¦ã³ãã¼ãã«ä½¿ç¨ã¨æããã
- é£èªåãããã¹ã¯ãªããã®ãã¦ã³ãã¼ã
ekovnI
(Invoke) ã¿ãããªæååãè¦ãã
443/tcp
tcp.port == 443 ã§Display Filter ããããã
443/tcpã¯é常SSL/TLSã使ç¨ããHTTPSã®éä¿¡ã«ä½¿ããã¾ãããSSL/TLSéä¿¡ã§ããã°ããµã¼ãã®ãªããã¾ãã確èªããããã«è¨¼ææ¸ããã¦ã³ãã¼ãããããæå·åãè¡ãããã«å¿ è¦ãªéµã®äº¤æãªã©ãè¡ããã³ãã·ã§ã¤ã¯ã®éä¿¡ãçºçããã¯ãã§ããããããä»åã¯ãã®ãã³ãã·ã§ã¤ã¯éä¿¡ããªããããHTTPSã§ã¯ãªãéä¿¡ã§ãããã¨ããããã¾ãã
80/tcpã¨åæ§ã«ãFollow TCP Stream ã§è¦ã¦ã¿ã¾ãã
人ãèªããASCIIæååã¯ãªãããã§ãã ãã®å ´åãä½ããã®ãã¤ããªãã¼ã¿ããä½ããã®æ¹æ³ã§æå·åããã¦ãããã¼ã¿ã®å¯è½æ§ãèãããã¾ããããã®æç¹ã§ã¯ãããã¾ããã
21/tcp, 37039/tcp, 59847/tcp
ä»ã®ãã¼ãã®éä¿¡ã¨åæ§ã«ãFollow TCP Stream ã§è¦ã¦ã¿ã¾ãã
FTP㧠hoge ã¨ãããã¡ã¤ã«ãã¢ãããã¼ããã¦ãã¾ãã
ã¾ãã227 Entering passive mode (10,1,1,117,144,175). ããã³ 227 Entering passive mode (10,1,1,117,233,199) ã¨ããã¡ãã»ã¼ã¸ãã ãPassive mode ãç¨ãã¦ãã¡ã¤ã«ãã¢ãããã¼ããã¦ãããã¨ããããã¾ãã Passive modeã§ä½¿ããããã¼ãçªå·ã¯ã¡ãã»ã¼ã¸ãã 144256+175=37039 ããã³ 233256+199=59847 ã®ããã«è¨ç®ã§ããã®ã§ããã®TCPãã¼ãã使ã£ã¦éä¿¡ãã¦ãããã¼ã¿ãExportãã¾ãã
Windows ã¤ãã³ããã°ã®è§£æ
ç¶ãã¦Windowsã¤ãã³ããã°ã®è§£æãè¡ãã¾ãã
ã¤ãã³ããã°ã®è§£æã¯åå è ã®ä¸ã«ã¯Windowsã®ã¤ãã³ããã°ãä¸ã¤ãã¤è¦ã¦ãã£ã¦ãæªãããã°ãæ¢ãã¦ãã£ã人ãããããããã¾ããã ããããWindowsã¤ãã³ããã°ã¯å¤§éã«ãããããå½ãããã¤ããã«è¦ã¤ããã®ã¯æéããããä½æ¥ã§ããéå¹ççã§ãã
ããã§ãWIndowsã¤ãã³ããã°ã®è§£æãã¼ã«ã§ãã Hayabusa ã使ããWindows ã¤ãã³ããã°ã®ããªã¢ã¼ã¸ *4 ãè¡ãã¾ãã
ä»åã¯ã csv-timeline æ©è½ãç¨ãã¦ãCSVã®Windowsã¤ãã³ããã°ã®ã¿ã¤ã ã©ã¤ã³ãä½æãã¾ãã ãã®ã¿ã¤ã ã©ã¤ã³ã¯ãåã«ã¤ãã³ããã°ãåæãã¦ã¿ã¤ã ã©ã¤ã³ãä½æãããã®ã§ã¯ãªããHayabusa Rule ã«å«ã¾ããã«ã¼ã«ã«ããããããã®ããä½æããã¾ãã*5
hayabusa-2.10.0-win-x64.exe csv-timeline -d <Windowsã¤ãã³ããã°ãä¿åããã¦ãããã©ã«ã> -o timeline.csv
ãªãã·ã§ã³ã¯ããWhich set of detection rules would you like to load? · 1. Core ( status: test, stable | level: high, critical )ãããInclude Emerging Threats rules? · yesãããInclude Threat Hunting rules? · yesããé¸ã³ã¾ãã
å®è¡ããã¨ã3件㮠Severity: High ã®ã¢ã©ã¼ããåºã¦ãã¾ãã
åºåãããCSVãExcelã Eric Immerman's tool ã® Timeline Exporer ãç¨ãã¦ç¢ºèªãã¾ãã
確èªããã¨ãSysmonã®Event ID:1 ã®ãã°ï¼ããã»ã¹ã®èµ·åï¼ãã以ä¸ã®3ã¤ã®ã¤ãã³ããçºè¦ãã¦ãã¾ãã
- ååãå¤æ´ããLOLBIN
- ã³ãã³ãã©ã¤ã³ãè¦ãã¨ãpowershell.exeãchrome.exeã«renameãã¦ãããã¨ããããã
- Comsvcs.dl ã使ã£ãããã»ã¹ã¡ã¢ãªãã³ã
"C:\Windows\System32\rundll32.exe" C:\windows\System32\comsvcs.dll MiniDump 668 C:\Users\DEVELO~1\AppData\Local\Temp\20231122.dump full
- 親ããã»ã¹ã¯chrome.exe ã®ãããããããããã»ã¹ã®ã¡ã¢ãªãã³ããå®è¡ãããã¨æããã
ãã®ãã¨ãããPowerShellãå®è¡ãã¦ãããã¨ããããã®ã§ããã®ã³ã¼ãã解æãã¦ããã¾ãã
PowerShellã®ã³ã¼ãã®è§£æ
ã¤ãã³ããã°ããè¦ã¤ãã£ãã³ã¼ã
Hayabusaã®ã¢ã©ã¼ãã§è¦ã¤ãã£ãBase64ã«ã¨ã³ã³ã¼ããããPowerShellã®ã³ã¼ãããã³ã¼ããã¦ã¿ã¾ãã
é£èªåããã¦ããã
ãã®é£èªåããã¦ããã³ã¼ããé å¼µã£ã¦è§£ãã¦ãè¯ãã§ãããä»å㯠Microsoft-Windows-PowerShell%4Operational.evtx
ãããã®ã§ãã¾ãã¯ãã®ãã°ãè¦ã¦ã¿ã¾ãã
è¦ã¦ã¿ãã¨ãå
ã»ã©ãããé£èªåã解é¤ãããã³ã¼ããæ®ã£ã¦ãã¾ãã;
ãå½ä»¤ã®å¥åããªã®ã§ãããã§æ¹è¡ãã¦ãã¡ãã£ã¨æ´å½¢ãã¾ãã
æååã並ã³æ¿ããããããå¤æ°ããããã«ãããªã£ã¦ãããããèªã¿ã«ããã§ããããã®ã¹ã¯ãªããã§ã¯ä»¥ä¸ã®å¦çãå®è¡ãã¦ãã¾ãã
http://10.1.1.117/lib
ãããã¡ã¤ã«ããã¦ã³ãã¼ãããå®è¡- ããããlibã¯PowerShellã®ã¹ã¯ãªããã ã¨èãããã
SH("a")
ãå®è¡ãã$a
ã«æ ¼ç´10.1.1.117:443
ã«ã³ãã¯ã·ã§ã³ãå¼µã- åä¿¡ãããã¼ã¿ã
$b2
ã«æ ¼ç´ D($a, $b2)
ãå®è¡ãã$d
ã«æ ¼ç´$d
ã®çµæãIEXã§å®è¡ãã$sB
ã«æ ¼ç´- IEXã¯
Invoke-EXpression
ã®ç¥ã§ãæå®ããæååãPowerShellã®ã³ãã³ãã¨ãã¦è©ä¾¡ã¾ãã¯å®è¡ããåºåãããçµæãè¿ãã¾ã *6
- IEXã¯
$sB
ã®ãã¼ã¿ã®å¾ãã«'PS ' + (pwd).path + '>
ã追å$sB
ãByteåã«å¤æãE($a, $sB)
ãå®è¡ãã$SBY
ã«æ ¼ç´$SBY
ããµã¼ãã«éä¿¡
ãµã¼ãããåä¿¡ãããã¼ã¿ãã³ãã³ãã¨ãã¦å®è¡ãããã®å¾çµæããµã¼ãã«è¿ãã®ã¯ãªãã¼ã¹ã·ã§ã«ã®æåã§ãã
ããããä»å㯠åä¿¡ãããã¼ã¿ã D
ã¨ããé¢æ°ã«éããéä¿¡ãããã¼ã¿ã E
ã¨ããé¢æ°ã«éãã¦ãã¾ãã
ãããã®é¢æ°ã¯ããã®ã¹ã¯ãªããå
ã«ã¯åå¨ãã¾ããã
ãã£ã¦ãä¸è¬çã«å®ç¾©ããã¦ããé¢æ°ã§ããªãã®ã§ããããã¯ãã¦ã³ãã¼ããã¦ããlibã®ä¸ã«ãããã®é¢æ°ãããã¨èãããã¾ãã
lib
libã®æ¬ä½ã¯pcapãã¡ã¤ã«ã«æ®ã£ã¦ãã¾ãã
ããããå
ã»ã©ã®ã³ã¼ãã¨åæ§ã« Microsoft-Windows-PowerShell%4Operational.evtx
ãè¦ã¦ã¿ãã¨ãããç¨åº¦é£èªåã解é¤ãããã³ã¼ããæ®ã£ã¦ãããã¨ããããã¾ãã
ãããã;
ã§æ¹è¡ãã¦æ´å½¢ãã¾ãã
å°ãè¦ããããªã£ãã®ã§ããã®ç¶æ ã§åé¢æ°ã®å¦çãææ¡ãã¾ãã
ã¾ã¨ããã¨ãåé¢æ°ã§ã¯ã以ä¸ã®ãã¨ãè¡ã£ã¦ãã¾ãã
- é¢æ°SH
- 第1å¼æ°ã®æååã®SHA256ã®å¤ããã¤ãåã§è¿ã
- é¢æ°E
- 第1å¼æ°ã®æååãKeyã¨ãã¦ã第2å¼æ°ã®ãã¼ã¿ãAES CBCã¢ã¼ãã§æå·åãã
- æå·åãããã¼ã¿ã®åã«AESã®IVãã¤ãã
- é¢æ°D
- 第1å¼æ°ã®æååãKeyã¨ãã¦ã第2å¼æ°ã®ãã¼ã¿ãAES CBCã¢ã¼ãã§å¾©å·ãã
- åä¿¡ãããã¼ã¿ã®å é 16bytesãIVã¨ããã
PowerShell解æçµæã®ã¾ã¨ã
以ä¸ãããPowerShellã¯ãµã¼ãããAESã§æå·åãããPowerShellã®ã³ã¼ããåãåãå®è¡ãå®è¡ããçµæãAESã§æå·åãã¦éä¿¡ãããªãã¼ã¹ã·ã§ã«ã®ã³ã¼ãã§ããã¨ãããã¾ããã
ã¾ããæå·åã®éµã¯æåå a
ã®SHA256ã®ããã·ã¥å¤ã§ãIVã¯å
é 16ãã¤ãã«ä»ä¸ããã¦ãã¾ãã
æå·åããããã©ãã£ãã¯ã®å¾©å·
æå·åããããã©ãã£ãã¯ã復å·ã§ããã°ãæ»æè ãã©ã®ãããªè¡åãè¡ã£ããææ¡ã§ããããªã®ã§ãããã¾ã§ã®è§£æçµæãå ã«ãã©ãã£ãã¯ã復å·ãã¾ãã ãã©ãã£ãã¯ã®pcapããã¼ã¹ã§ãã Scapy ãæå·ã©ã¤ãã©ãª Pycryptodome ãç¨ããã¨ãPythonã§ã¯ä»¥ä¸ã®ããã«å¾©å·ã¹ã¯ãªãããæ¸ãã¾ãã
from scapy.all import * import hashlib from Crypto.Cipher import AES from Crypto.Random import get_random_bytes from Crypto.Util import Padding def SH(key): return hashlib.sha256(key.encode()).digest() def d(key, data): iv = data[:16] aes = AES.new(key=key, mode=AES.MODE_CBC, iv=iv) res = Padding.unpad(aes.decrypt(data[16:]), AES.block_size) return res.decode() key = SH("a") pcap = rdpcap("traffic.pcap") for p in pcap: if p["IP"].src=="10.1.1.116" and p["TCP"].dport==443 and p["TCP"].flags=="PA": print("C: " + d(key,p["Raw"].load)) elif p["IP"].src=="10.1.1.117" and p["TCP"].sport==443 and p["TCP"].flags=="PA": print("S: " + d(key,p["Raw"].load))
ãããå®è¡ããã¨ã以ä¸ã®ããã«å®è¡ããã³ãã³ãã復å·ã§ãã¾ãã
ã³ãã³ãã®å¾©å·çµæãããæ»æè ã¯ä»¥ä¸ã®ã³ãã³ããå®è¡ãããã¨ããããã¾ãã
- ã¦ã¼ã¶ã®æ¨©é確èª
- lsass.exe ã®ã¡ã¢ãªãã³ããåå¾ãããã¡ã¤ã«ã«ä¿åå¾ãZIPå§ç¸®
- ZIPãã¡ã¤ã« ãlibã«å«ã¾ããEé¢æ°ã§AESæå·åãæå·ãã¼ã¯æåå
gj
ãsha256ã«ãããã® - FTP㧠10.1.1.117 ã«ã¢ãããã¼ã
FTPã§è»¢éããããã¡ã¤ã«ã®å¾©å·
FTPã§ã¢ãããã¼ãããã¦ãããã¡ã¤ã«ãAESã§æå·åãããZIPãã¡ã¤ã«ã§ãããã¨ãããã£ãã®ã§ããã©ãã£ãã¯ã復å·ããæã¨åæ§ã®Pythonã¹ã¯ãªãããæ¸ãã復å·ãã¾ãã
data1.bin (SHA1: f6235ef821615447384a5695ba4f2d21fefc90f2
)ããWiresharkã§ã¨ã¯ã¹ãã¼ãããFTPã§ã¢ãããã¼ãããã¦ãããã¡ã¤ã«ã§ãã
import hashlib from Crypto.Cipher import AES from Crypto.Random import get_random_bytes from Crypto.Util import Padding key = "gj" f = open("data1.bin", "rb") data = f.read() f.close() k = hashlib.sha256(key.encode()).digest() iv = data[:16] aes = AES.new(key=k, mode=AES.MODE_CBC, iv=iv) res = Padding.unpad(aes.decrypt(data[16:]), AES.block_size) f = open("data1.zip", "wb") f.write(res) f.close()
ãããå®è¡ããã¨ãdata1.zip
ã¨ããZIPãã¡ã¤ã«ãã§ãããã®ä¸ã«æ»æè
ãæ¨çã®ç°å¢ã§åå¾ãã lsass.exe ã®ã¡ã¢ãªãã³ããå
¥ã£ã¦ãã¾ãã
dumpãã¡ã¤ã«ã®è§£æ
lsass.exe ã®dumpãã¡ã¤ã«ã®è§£æã«ã¯ã pypykatz ã使ãã¾ãã
pypykatz lsa minidump 20231122.dump
å®è¡ããã¨ä»¥ä¸ã®ããã«è¡¨ç¤ºãããã¦ã¼ã¶ developer ã® NTLMããã·ã¥ã b9a342164519c83554615eb152b582a3
ã§ãããã¨ããããã¾ãã
ãã¹ã¯ã¼ãã¯ã©ãã¯
ãã¨ã¯ããã®NTLMããã·ã¥ããå ã®ãã¹ã¯ã¼ãããç¹å®ãã¾ãã
ä»åã¯Crack Station ã使ç¨ãã¾ãã
ãã¹ã¯ã¼ãã¯ã©ãã¯ãåºæ¥ãã試ãã¦ã¿ãã¨1件ãããããdeveloperã®ãã¹ã¯ã¼ã㯠otakudeveloper
ã§ããã¨ãããã¾ãã
ä¸è¬çã«ç¥ããã¦ããªããã¹ã¯ã¼ããè¤éãªãã¹ã¯ã¼ãã§ããã°ããã®ããã«ç¹å®ãããã¨ã¯å°é£ã§ããããã®ãã¹ã¯ã¼ãã¯èåãªãã¹ã¯ã¼ããªã¹ã rockyou.txt ã«å«ã¾ãããã¹ã¯ã¼ããªã®ã§ãç°¡åã«ç¹å®ã§ãã¦ãã¾ãã¾ãã ã¯ã¼ããªã¹ãã«ä¹ã£ã¦ãããããªç°¡åãªãã¹ã¯ã¼ãã使ç¨ãããã¨ã¯ããã¾ãããã
ä½è«ã¨åç
PowerShellã®çè·¡ã¯åã ã£ãããHayabusaã使ãã¨ããã«è¦ã¤ãã¦ãã¾ããã®ã§ããã£ããã®ISOãã¡ã¤ã«ãéããã·ããªãªããã¾ãæå³ãªããªã£ã¦ãã¾ãã¾ãããå®éã«åå è ã®Writeupãè¦ãã¨ããã¥ã¼ãªã¹ãã£ãã¯ã«PowerShellã®ã¤ãã³ããã°ãæ®ã£ã¦ããã¨ãå¯ãã¦ã人ãå¤ãã£ãã§ãã
ISOãã¡ã¤ã«ãéããçè·¡ã¯ãWindowsã®ã¤ãã³ããã° (
Microsoft-Windows-VHDMP-Operational.evtx
)ã«æ®ãã¾ããä»ååºé¡ãããã¯ããã¯ã¯ãç§ã以åããã°ã«æ¸ããWriteupã®å 容ã¨ä¸é¨è¢«ã£ã¦ããã®ã§ããã®ããã°ãèªãã§ã人ã¯å°ãæå©ã ã£ããããããªãã§ãã
- æå³ãã被害è 端æ«ããæ»æè ã®ãµã¼ãã«FTPã§ZIPãã¡ã¤ã«ãã¢ãããã¼ãããéãã³ãã³ãããªãã2åå®è¡ããã¦ãã¾ãã¾ããããã®çµæãpcapãã¡ã¤ã«ã®ãµã¤ãºã大ãããªã£ã¦ãã¾ãã¾ãããç³ã訳ããã¾ããã
ãããã«
ä»åã®åé¡ã¯ããã°åæã®åé¡ã¨è¨ãã¤ã¤ãããã«ã¦ã§ã¢è§£æãããã°ã©ãã³ã°ããããã¯ã¼ã¯ãããã³ã«ãæå·ãèªè¨¼æ å ±ãçªåããæ»æææ³ã®ç¥è ãªã©è¤æ°ã®ç¥èãè¦æ±ãããåé¡ã§ããã å®éã®ã¤ã³ã·ãã³ãã¬ã¹ãã³ã¹ããã©ã¬ã³ã¸ãã¯æ¥åã§ããã®ããã«æ§ã ãªã¹ãã«ãå¿ è¦ã«ãªããã¨ãããã®ã§ããã®åé¡ãéãã¦åå è ãæ§ã ãªç¹ã§å¦ã³ãå¾ãããã®ã§ããã°å¹¸ãã§ãã
ææ¥ã¯ã¢ããã³ãã«ã¬ã³ãã¼æçµæ¥ãä»åã®ã¤ãã³ãã®ãªã¼ãã¼ã«ãã éå¬è¨ & Writeupè³ã®çºè¡¨ã§ãã ã楽ãã¿ã«ï¼
*1:å人çãªè¦è§£ã§ããããã°è§£æã®åé¡ãã»ã¨ãã©åºé¡ãããªãã®ã¯ãé£æ度ãä½ãåºé¡ãã¦ãã³ã³ãã¹ãã¨ãã¦æãç«ããªãããã ã¨æã£ã¦ãã¾ãã
*2:ä»åã®ã³ã³ãã¹ãã§ã¯ãåã¸ã£ã³ã«ã®Hardåé¡ãä¸çªéã解ãã人ã«First Bloodè³ãè´åããããããããã解ããã¾ããã ä»ã®åé¡ã¯First Bloodè³ãåºãã¾ã§æéãããã£ãã®ã§ãç°¡åãããããããã¾ãããï¼
*3:å®éã®DFIRã§ã¯ãæ¼ãããã¹ã¯ã¼ããæããã«ããã®ã¯ç¨ã ã¨æãã¾ãããä»åã¯ã³ã³ãã¹ãã¨ãããã¨ãããã®ã§èª¿ã¹ã¦ããããã¨ã«ãã¾ããã
*4:ããªã¢ã¼ã¸ã¯å ã ã¯ææ¥äºæ ç¾å ´ãªã©ã§ä½¿ãããç¨èªã§ãå»çãæ²»çã®åªå 度ãè¦æ¥µãããã¨ã§ãããã®æèã§ã¯æªããã¤ãã³ãã«å½ãããã¤ãã¦ãåªå çã«èª¿æ»ãããã¨ãæãã¾ã
*5:ã«ã¼ã«ã¯ãHayabusaã®ãã©ã¼ããããSigmaãªã©ã§ç¬èªã«è¿½å ã§ãã¾ã
*6:https://learn.microsoft.com/ja-jp/powershell/module/microsoft.powershell.utility/invoke-expression