97, 1/4 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   bluemario
   http://dpmh.wo.tc
   ±ÞÇÑ´ë·Î 6¹øÆÄÆ®

http://www.hackerschool.org/HS_Boards/zboard.php?id=HS_Translate&no=26 [º¹»ç]


That is very good question that uhh this typical list of threat

are i dont know if you have had a chance look at this guy in Microsoft

I'm keep refering to Microsoft, becaues a lately I've been looking their web site quite a bit.

ahh I know bad thing. I intially  starts rufing the threads guy from the open BST cording standard--(¹º ´ëȸ´ø°¡ ´Üü´ø°¡).

They have some really good stuff over there.

We stated also a looking at all the good,, i've been doing a lot of cc++ related stuff,

so what i've been trying to combine together is a all the wonderability that have been release _____time,

and open source software and trying to figur what those wonderability were, from _____ point of view,

and then look at threat model, and trying to attach with air(?).

Does it someone making sence?

so going to CVE are minor or other side with actually tell you open___________ was

___________to ____ by one attack, so you go and look at that and figure out ok this are the

major types of attacks from when there is loop. right?

so from an external point of view, when you look at the loop, what are the major problems?

if there is any loop, that is reciving external data will talk _______ movement in MCC++ ___

Where they can be issues, and why is that existing and then you _____ that _____ (map that backÀ¸·Î µé¸®´Âµ¥,,)

to your major threat. That comes down to either recieving data from the outside, ________

either you can go through the major files _______________________

and you just mark everything under those major areas, or you can combine,,

everyone has different method of doing it, so what we take(?) to do,, depending on games,

depends on application, if its bad application, it would make a lot of sence,

go to ________ or someother websites,

and figure out what the major threads are from their point of view. right?

But the cc++, these are the one that major the we had big classify them under(???), and then

figure it out under bases  of that.

Thus that some of answer of your question?

Áú¹®ÀÚ ¹¹¶ó¹¹¶ó


ahh

right so basically this question is ______ that how do we understand all of major threads

that exist in an application. Would that be correct?

ahhh that might not having define(define ÀÎÁö defeat)

or that it have been define. so the ones that have been define that is not much for problem

that you can list them, you can assign them _______________ figure out by that you want to do it or not.

That have not been define amm that is the most difficult task thats why

you move back to the first change of the process, you remember i talked about,

getting as much as micron(?) information and documenting all that?

When you new class of thread comes out then you go back and look at your documentation,

and say "ok thus this application has something,, is it doing something of the start"

like today, ELB ,~~~~ JOne i think right? (Áß¿äÇÏÁö ¾ÊÀ½)

He was talking about it might be something that is slightly unique, that is not been discuss

openly so much, So you might have aaa if you had initialy done research on your application

and say that ok, my application is provider(ÇÁ·Î¿ÍÀÌ´õ¶ó µé¸®´Âµ¥,,) and itself.

right? and you go back to your code and

Is it a provider(?) is it doing any kind of check?

my provider is first one or is there a different provider thats coming ahead of time and then you can figure ou
t
okay there is possibility of threat, then you go back to your code and figure it out

does that help?

Yes sir,

Áú¹®ÀÚ°¡ ¹°¾îº¸´Âµ¥ ¼Ò¸®¸¦ ÃÖ´ë·Î Å°¿öµµ ¾Èµé¸®³×¿ä ¤Ì¤Ì ³ëÆ®ºÏÀÌ¶ó¼­ ±×·±°¨,,

Yes i had look at that. It is a ..Yes

The question was have you look at attack tree is that Jone---(»ç¶÷À̸§) and couple of other guys have done?

Basically, i have look at that and my opinion is everything is still pertty new and everyone is developing

their own technique, becuz they are finding,, they have been reviewing ______ or they have been reviewing

products for while and it is not so much as science and ____________ trying figure out what's....

Thats why mine is proposal which, hopefully, other people can try and use.

and they will be other people proposing different techniques and um which suits you best would be

the ideal technique. I'll take a little while to figure out what is the best technique for you

becuz for the longest i used to try to do the Microsoft method and didn't really fit in, well for me

and not becuz that is not,,may not be a good method or its a bad method. It just didn't the way i thaught

was not the way that person who came up with that was thinking.

ÀÏ´Ü ¸®½º´× ³¡³Â°í¿ä,, ¤Ì¤Ì ´Ê¾î¼­ ¤¸¤µ
¹ø¿ªÀº,,,,¤¿¤¿¤¿

ºóÄ­ÀÌ ³Ê¹« ¸¹¾Æ FAIL






  Hit : 1917     Date : 2011/05/11 12:59



    
¸Û¸Û °í»ý ¸¹À¸¼Ì½À´Ï´Ù. ºü¸£½Ã³×¿ä! ¤¾¤¾ ¹ø¿ªµµ °¡´ÉÇÑ µ¥±îÁö ºÎŹµå¸³´Ï´Ù. 2011/05/11  
     [°øÁö] RECON 2005 ¹ßÇ¥ÀÚ·á ¸ñ·ÏÀÔ´Ï´Ù ¸Û¸Û 05/03 3002
     Á¦°¡ »ç¿ëÇÏ´Â ¸®½º´× ¹æ¹ý ÆÁ.. [4] Prox 05/21 3250
     RECON 2006 ±¦Âú¾Æº¸ÀÌ´Â ¹ßÇ¥ÁÖÁ¦µé ¸Þ¸ð ¸Û¸Û 06/14 2166
     [Çʵ¶] ¸®½º´× & ¹ø¿ª ½ÃÀÇ ±ÔÄ¢ÀÔ´Ï´Ù. [2] ¸Û¸Û 05/09 2260
     [°øÁö] ÁÖ±âÀûÀ¸·Î Á¤ÆÃÀ» ÇÏ·Á°í ÇÕ´Ï´Ù. [11] ¸Û¸Û 05/11 2154
     [°øÁö] WIKI¸¦ ÀÌ¿ëÇÑ Çùµ¿ ¹ø¿ª ¹æ¹ýÀÔ´Ï´Ù. ¸Û¸Û 05/13 2226
     [°øÁö] µ¿¿µ»ó ºÐÇÒ ¹æ¹ýÀÔ´Ï´Ù. ¸Û¸Û 05/11 3208
     [°øÁö] ¹ø¿ªÆÀ ¸â¹ö ¸ñ·ÏÀÔ´Ï´Ù. [33] ¸Û¸Û 05/03 3192
89   ÇïÇÁ¿ä~![1]     sdjgfhhfg12
12/13 1306
88   °¡ÀÔÇß½À´Ï´Ù.     nectars
03/03 1432
87   Èå¾Æ Á˼ÛÇØ¿ä ¤Ð¤Ð¤Ð 11¹ø µ¿¿µ»ó ¹ø¿ª~     dex023
04/14 2742
86 ºñ¹Ð±ÛÀÔ´Ï´Ù  VPN ¸Þ´º¾ó ¹ø¿ªÁ¡..[1]     wkdrns9711
03/07 0
85   Áß±¹¾î ¹ø¿ªÀº ÇÊ¿ä ¾ø³ª¿ä?     ºÒ²É¿¬ÁÖ°¡
01/02 2355
84   ³²Àº 10¹ø, 11¹ø ÆÄÆ® ¸®½º´×&¹ø¿ª ÇØÁÖ½Ç ºÐ ã½À´Ï´Ù.[5]     ¸Û¸Û
11/17 2503
83   9¹øÆÄÆ® dictationÀÔ´Ï´Ù[13]     neb91
08/26 2310
82   hackerwannabe´Ô, neb91´Ô, eplesky´Ô ÁøÇà»óȲ ¸»¾¸ÇØ Áֽñ⠹ٶø´Ï´Ù.[2]     ¸Û¸Û
08/23 2351
81   µ¿¿µ»ó 7¹ø ÆÄÆ®ÀÔ´Ï´Ù.[1]     babyalpha
08/22 2483
80   ¹ø¿ª part 7 status     babyalpha
08/21 2001
79   7¹ø, 9¹ø, 10¹ø, 11¹ø ÆÄÆ® ¸Ã¾ÆÁÖ½Ç ºÐ ¸ð½Ê´Ï´Ù~[9]     ¸Û¸Û
08/09 2403
78   ÆÄÆ® 3 ºÐ·® ÀÔ´Ï´Ù[1]     L0phrack
08/09 2230
77   l0phrack, heeya90, goodfacesong´ÔµéÀº ÁøÇà»óȲÀ» Àû¾îÁÖ¼¼¿ä[2]     ¸Û¸Û
08/08 2262
76   Àú Æ÷±â..Çؾ߰ڳ׿©     d4rkang3l
08/07 2661
75   ¹ø¿ª ÁøÇàÀÌ Á» ´õµð³×¿ä.[2]     babyalpha
08/06 2186
74   ÁøÇà»óȲ Á¤¸® (¸Þ¸ð¿ë)     ¸Û¸Û
08/05 2229
73   12¹ø ÆÄÆ® (ºóÄ­ÀÌ ¸¹¾Æ¿ä)     Prox
08/03 2016
1 [2][3][4]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org