{"provider_url":"https://hatena.blog","provider_name":"Hatena Blog","author_name":"lac_devblog","version":"1.0","published":"2026-04-06 12:38:10","blog_url":"https://devblog.lac.co.jp/","height":"190","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fdevblog.lac.co.jp%2Fentry%2F2026040602\" title=\"\u751f\u6210AI\u304c\u81ea\u5f8b\u7684\u306b\u30da\u30cd\u30c8\u30ec\u30fc\u30b7\u30e7\u30f3\u30c6\u30b9\u30c8\u3092\u5b9f\u884c\uff01\uff1f\u300cMetasploit MCP\u300d\u3067\u81ea\u52d5\u30cf\u30c3\u30ad\u30f3\u30b0\u3092\u691c\u8a3c - \u30e9\u30c3\u30af\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3054\u3063\u305f\u716e\u30d6\u30ed\u30b0\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_url":"https://blog.hatena.ne.jp/lac_devblog/","width":"100%","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/l/lac_devblog/20260406/20260406123638.png","type":"rich","description":"\u30c7\u30b8\u30bf\u30eb\u30da\u30f3\u30c6\u30b9\u30c8\u90e8\u306e\u5409\u539f\u3067\u3059\u3002\u666e\u6bb5\u306f\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u8a3a\u65ad\u3092\u62c5\u5f53\u3057\u3001\u8a3a\u65ad\u4f5c\u696d\u3084\u65b0\u898f\u8a3a\u65ad\u30b9\u30af\u30ea\u30d7\u30c8\u306e\u958b\u767a\u306a\u3069\u3092\u884c\u3063\u3066\u3044\u307e\u3059\u3002 \u6628\u4eca\u3001\u751f\u6210AI\u306e\u9032\u5316\u304c\u5927\u304d\u306a\u8a71\u984c\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u4eca\u56de\u306f\u3001\u305d\u306eAI\u6280\u8853\u3092\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5206\u91ce\u3067\u6d3b\u7528\u3059\u308b\u691c\u8a3c\u3068\u3057\u3066\u3001\u30da\u30cd\u30c8\u30ec\u30fc\u30b7\u30e7\u30f3\u30c6\u30b9\u30c8\u30c4\u30fc\u30eb\u300cMetasploit Framework\u300d\u3092AI\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u304b\u3089\u64cd\u4f5c\u53ef\u80fd\u306b\u3059\u308bModel Context Protocol\uff08MCP\uff09\u3067\u3042\u308b\u3001\u300cMetasploit MCP\u300d\u3092\u5229\u7528\u3057\u3066\u307f\u307e\u3057\u305f\u3002 \u30bf\u30fc\u30b2\u30c3\u30c8\u3068\u3057\u3066\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5b66\u7fd2\u7528\u306e\u3084\u3089\u308c\u74b0\u5883\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u300cVulnhub\u300d\u3067\u516c\u958b\u3055\u308c\u3066\u3044\u308b\u4eee\u60f3\u30de\u30b7\u30f3\u3092\u7528\u610f\u3057\u3001AI\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306b\u3088\u308b\u81ea\u5f8b\u7684\u306a\u2026","categories":["\u5409\u539f"],"title":"\u751f\u6210AI\u304c\u81ea\u5f8b\u7684\u306b\u30da\u30cd\u30c8\u30ec\u30fc\u30b7\u30e7\u30f3\u30c6\u30b9\u30c8\u3092\u5b9f\u884c\uff01\uff1f\u300cMetasploit MCP\u300d\u3067\u81ea\u52d5\u30cf\u30c3\u30ad\u30f3\u30b0\u3092\u691c\u8a3c","url":"https://devblog.lac.co.jp/entry/2026040602","blog_title":"\u30e9\u30c3\u30af\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3054\u3063\u305f\u716e\u30d6\u30ed\u30b0"}