{"author_url":"https://blog.hatena.ne.jp/tanigawa/","url":"https://vul.hatenadiary.com/entry/2023/08/08/000000_2","title":"Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables","blog_title":"TT \u8106\u5f31\u6027 Blog","width":"100%","description":"\u3010\u56f3\u8868\u3011 \u51fa\u5178: https://papers.mathyvanhoef.com/usenix2023-tunnelcrack.pdf \u3010\u8981\u7d04\u3011 \u4eee\u60f3\u30d7\u30e9\u30a4\u30d9\u30fc\u30c8\u30fb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\uff08VPN\uff09\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30fb\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u6697\u53f7\u5316\u3057\u3001\u30e6\u30fc\u30b6\u30fc\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3092\u4fdd\u8b77\u3002\u4ed5\u4e8b\u3084\u500b\u4eba\u7528\u9014\u3067\u4f7f\u7528\u3055\u308c\u3001\u60aa\u610f\u306e\u3042\u308b\u653b\u6483\u304b\u3089\u8eab\u3092\u5b88\u3063\u305f\u308a\u3001\u30ea\u30e2\u30fc\u30c8\u4f5c\u696d\u3092\u884c\u3063\u305f\u308a\u3059\u308b\u969b\u306b\u91cd\u8981\u3002\u8ad6\u6587\u3067\u306f\u3001\u4fdd\u8b77\u3055\u308c\u305fVPN\u30c8\u30f3\u30cd\u30eb\u5916\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u6f0f\u6d29\u3092\u5f15\u304d\u8d77\u3053\u30592\u3064\u306e\u653b\u6483\u3092\u793a\u3057\u3001VPN\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u8a2d\u8a08\u4e0a\u306e\u6b20\u9665\u304c\u539f\u56e0\u3067\u3042\u308b\u3053\u3068\u3092\u6307\u6458\u3002\u30ed\u30fc\u30ab\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3084VPN\u30b5\u30fc\u30d0\u30fc\u3078\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u304cVPN\u30c8\u30f3\u30cd\u30eb\u5916\u306b\u9001\u3089\u308c\u2026","provider_name":"Hatena Blog","author_name":"tanigawa","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/t/tanigawa/20230827/20230827095740.png","height":"190","version":"1.0","type":"rich","categories":["\u8106\u5f31\u6027: TunnelCrack","**\u5fc5\u8aad\u30ec\u30dd\u30fc\u30c8","\u6280\u8853: VPN"],"provider_url":"https://hatena.blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fvul.hatenadiary.com%2Fentry%2F2023%2F08%2F08%2F000000_2\" title=\"Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables - TT \u8106\u5f31\u6027 Blog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","published":"2023-08-08 00:00:00","blog_url":"https://vul.hatenadiary.com/"}