ð¡ããã§ããŠãOSIåç §ã¢ãã« å±éºåºŠé ã§çŽ¹ä»
https://ipwithease.com/network-vulnerabilities-and-the-osi-model/
ã¬ã€ã€ãŒ7 : ã¢ããªã±ãŒã·ã§ã³å±€ã®ã»ãã¥ãªãã£
åºæ¬ã¯ãŠã£ã«ã¹ãã¯ãŒã ãªã©
ã¬ã€ã€ãŒ6 : ãã¬ãŒã³ããŒã·ã§ã³ã¬ã€ã€ãŒã»ãã¥ãªãã£
ã¬ã€ã€ãŒ5ïŒã»ãã·ã§ã³å±€ã®ã»ãã¥ãªãã£
äºæž¬å¯èœãªã»ãã·ã§ã³ããŒã¯ã³
ã»ãã·ã§ã³ã¹ãããã£ã³ã°
ã¯ã©ã€ã¢ã³ããµã€ãæ»æïŒXSSãæªæã®ããJavaScriptã³ãŒããããã€ã®æšéŠ¬ããã®ä»ïŒ
äžéè
æ»æïŒMan-in-the-middle attack
ãã³ã»ã€ã³ã»ã¶ã»ãã©ãŠã¶æ»æ
ã¬ã€ã€ãŒ4ïŒãã©ã³ã¹ããŒãã¬ã€ã€ãŒã»ãã¥ãªãã£
ã¬ã€ã€4ã¯ãã©ã³ã¹ããŒãå±€ã§ããããããã¯ãŒã¯éä¿¡ãå¯èœã«ããããã«äžè¬çãªãã©ã³ã¹ããŒããããã³ã«ãå©çšããããã®å±€ã«ã¯ãTCPïŒTransport Control ProtocolïŒãUDPïŒUser Datagram ProtocolïŒãªã©ãå«ãŸããŸããããŒãã¹ãã£ã³ã¯ããããã¯ãŒã¯äžã®è匱ãªããŒããéããŠããããŒããç¹å®ããæ¹æ³ã§ãã
1ïŒSYNãã©ãã
ããŒããªãŒãã³æ»æãTCPã·ã³ã¯ãã©ãããšãåŒã°ããã
ãµãŒããŒã«å¯ŸããDDoSæ»æãå«ãŸããã
ãµãŒããŒã®åããŒãã«å¯ŸããŠãã¯ã©ã€ã¢ã³ããäžæ£ãªIPã¢ãã¬ã¹ã䜿ã£ãŠSYNïŒåæïŒãã±ãããç¹°ãè¿ãéä¿¡ãããµãŒããŒãéå°ã«æ¶è²»ãããŠå¿çäžèœã«ããæ»æãTCPã®3ãŠã§ã€ãã³ãã·ã§ã€ã¯ãå©çšããã
2ïŒã¹ããŒãã¢ã©ãã¯
Smurfæ»æã¯ãåœè£
ãããPingã¡ãã»ãŒãžã§ã·ã¹ãã ããã©ããã£ã³ã°ããDoSæ»æãæ»æè
ã¯ãæå³ãã被害è
ã®IPã¢ãã¬ã¹ãæã€ICMPãã±ããã倧éã«çæãããããã®ãã±ããããããŒããã£ã¹ãããããã®çµæããããã¯ãŒã¯äžã®ã»ãšãã©ã®ããã€ã¹ãå¿çããã
ã¬ã€ã€ãŒ3ïŒãããã¯ãŒã¯ã»ãã¥ãªãã£ïŒã«ãŒã¿ãŒã»ãã¥ãªãã£ïŒ
ã€ã€ãŒ3ã®ãããã³ã«æ»æã¯ãã€ã³ã¿ãŒããããããã³ã«ïŒIPïŒããã±ããã¹ãããã£ã³ã°ãICMPæ»æãPing of Deathãªã©ã®DoSæ»æã§æ§æããã®ãããªæ»æã®ãªã¹ã¯ã軜æžããããã«ããã±ãããã£ã«ã¿ãªã³ã°ã«ããå¶åŸ¡ãè¡ãå¿
èŠããããŸãã
IPã¢ãã¬ã¹è©ç§°
ã«ãŒãã£ã³ã°æ»æ
ããã¯ããŒã«ïŒéžæçãã©ã¯ãŒãã£ã³ã°
IPã¢ãã¬ã¹ã¹ããŒãã£ã³ã°
IPã¢ãã¬ã¹åœè£
ã¯ãIPã¢ãã¬ã¹åœé ããã¹ããã¡ã€ã«ãã€ãžã£ãã¯ãšãåŒã°ããããã±ãããã£ã«ã¿ãªã³ã°ãå°å
¥ããççŸãæ€åºããããšã§ç·©åããããšãã§ããã
ããã¯ããŒã«
ãã®æ»æã§ã¯ãæªæã®ããããŒããæ£åžžãªããŒãã®ãµããããŠãã±ããã転éããŸãããäžéšã®ãã±ãããéžæçã«ããããããŸãã
æªæã®ããããŒãã¯ãã©ãã¯ããŒã«ã®ããã«æ¯ãèãããããééãããã±ããããã¹ãŠç Žæ£ããã
ã¬ã€ã€ãŒ2 : ããŒã¿ãªã³ã¯ã»ãã¥ãªãã£(ã¹ã€ããã»ãã¥ãªãã£)
è
åšã®å€§éšåã¯å
éšLANããçºçããã
ARP/ARPã¹ããŒãã£ã³ã°
ARPã¹ããŒãã£ã³ã°ãšã¯ãäžæ£ãªã¹ã€ããã§ãã±ãããå¥ã®VLANã«è»¢éããããšãçã£ããã®ã§ããã
ã»ãã¥ãªãã£ã®è匱æ§ã¯ãOSIã¢ãã«ã®äžäœå±€ã§çºçããããäžäœå±€ã®ã»ãã¥ãªãã£ã«åœ±é¿ãäžããã
ãããã®æ»æãé²ãããã«ãç¡åã®ARPãç¡èŠããããã«èšå®ã
ãŸãããšããžVLANïŒãã©ã€ããŒãVLANïŒã®åé¢ãARPã€ã³ã¹ãã¯ã·ã§ã³ã«ããããã®è
åšã軜æžããããšãã§ããŸãã
MACãã©ããã£ã³ã°
MACãã©ããã£ã³ã°ã¯ããããã¯ãŒã¯ã¹ã€ããã«å¯Ÿããæ»æã
MACãã©ããã£ã³ã°ã¯ãã¹ã€ããã®MACããŒãã«ã容éã«éãããã©ããã£ã³ã°ããããšã§çºçã
æªæã®ãããŠãŒã¶ã¯ããã©ãããããã©ãã£ãã¯ãã¹ãããã£ã³ã°ããŠããããã¯ãŒã¯ã®æ©å¯æ
å ±ãåéããããšãã§ããã
ã¹ããã³ã°ããªãŒæ»æ
æ»æè
ãããŒã¿ã¹ããªãŒã ã«æ¿å
¥ããDoSæ»æãè¡ãããšã§çºçããã
STPæ»æã¯ãæªæã®ãããŠãŒã¶ãäžæ£ãªã¹ã€ãããæ¿å
¥ããç©ççã«æ»æããããšããå§ãŸããæ»æè
ã¯ãããäœãã«ãŒãåªå
床ãå²ãåœãŠãŸããäœãã«ãŒããã©ã€ãªãªãã£ãå²ãåœãŠãããšã§ã2ã€ã®ã¹ã€ããéã®ãããã¯ãŒã¯æ¥ç¶ãåæãããŸããããã«ãããæ»æè
ã®ã¹ã€ãããã«ãŒãã¹ã€ãããšãªããæ»æè
ã¯ãã¹ãŠã®ã¹ã€ããéã§éä¿¡ãããããŒã¿ãå®å
šã«å¶åŸ¡ããããšãã§ããŸãã
ãã®åé¡ã軜æžããäžã€ã®æ¹æ³ã¯ããããã¯ãŒã¯ã®ã«ãŒãã¹ã€ãããã«ãŒããã©ã€ãªãªãã£=0ã«èšå®ããããšã§ãã
ãã®ä»ã®ããŒã¿ãªã³ã¯æ»æã¯
ãã©ã€ããŒãVLANæ»æ
ãã«ããã£ã¹ããã«ãŒããã©ãŒã¹æ»æ
ã©ã³ãã ãã¬ãŒã ã¹ãã¬ã¹æ»æ
ã¬ã€ã€1 : ç©çå±€ã»ãã¥ãªãã£
ã¬ã€ã€ãŒ1ãšã¯ããããã¯ãŒã¯ã®ç©ççãªåŽé¢ãæããäž»ã«ãµãŒãã¹åŠšå®³ïŒDoSïŒæ»æãçºçããããã®ã¬ãã«ã§çºçãããããã¯ãŒã¯ã®è匱æ§ïŒè
åšã¯ä»¥äžã®éã
ã¢ã¯ã»ã¹å¶åŸ¡
èš±å¯ãããè
ã ããã¢ã¯ã»ã¹ã§ããããã«ããããšã
ç©ççãªã»ãã¥ãªãã£ã«ãããäžæ£ãªã¢ã¯ã»ã¹ããå®å
šã確ä¿ããã
éèŠãªãµãŒããŒãžã®ã¢ã¯ã»ã¹å¶éã匷åãªãã¹ã¯ãŒãã®äœ¿çšã¯ãå€ãã®æ»æãé²ãããšãã§ããã
ããŒã¿ãããã®æå·
ç°å¢åé¡
ç©çå±€ã«ãããç°å¢åé¡ã«ã¯ãç«çœãç
ãæ°Žãªã©ãããã
枩床ã湿床ã塵åãææ°ãªã©ã®ç°å¢èŠå ã®ç®¡çãäžååãªå Žåãé害ãå€çºããå¯èœæ§ãããã
ãé¡ãèŽããŸã