97, 1/4 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   ¸Û¸Û
   http://www.hackerschool.org
   [°øÁö] RECON 2005 ¹ßÇ¥ÀÚ·á ¸ñ·ÏÀÔ´Ï´Ù

http://www.hackerschool.org/HS_Boards/zboard.php?id=HS_Translate&no=2 [º¹»ç]


À¯¸íÇÑ ÇØ¿Ü º¸¾È ÄÁÆÛ·±½º·Î¼­ BlackHat, Defcon, RECON, ShmooCon, CansecWest, rootedCon, HITB µîÀÌ ÀÖ½À´Ï´Ù.

À̵é Áß RECONÀ» ù ¹ø° ¹ø¿ª ´ë»óÀ¸·Î ¼±Á¤ÇØ º¸¾Ò½À´Ï´Ù.

RECONÀº Áö³­ 2005³âÀ» ½ÃÀÛÀ¸·Î ¸Å³â ij³ª´Ù ¸óÆ®¸®¿Ã¿¡¼­ °³ÃֵǴ º¸¾È ÄÁÆÛ·±½º·Î¼­,
Reverse Engineering ¹× ÃֽŠExploit, ±×¸®°í 0-day ¹ß°ß ±â¼ú¿¡ ÁßÁ¡À» µÎ°í ÀÖ´Ù´Â Á¡ÀÌ ¸Å·ÂÀûÀÔ´Ï´Ù.
RECONÀÇ °ø½Ä À¥ »çÀÌÆ®´Â http://recon.cx À̸ç, ÄÁÆÛ·±½º Á¾·á ÈÄ archive ¸Þ´º¸¦ ÅëÇØ ¹ßÇ¥ µ¿¿µ»óµéÀ» °ø°³ÇÕ´Ï´Ù.

ÀÌ Áß Ã¹ ÄÁÆÛ·±½º¿´´ø 2005³â¿¡¼­ºÎÅÍ ¸®½º´×&¹ø¿ªÀ» ½ÃÀÛÇØ ³ª°¡·Á°í ÇÕ´Ï´Ù.
2005³âÀÇ ¹ßÇ¥ ÁÖÁ¦µéÀ» Á¤¸®ÇÏ¸é ´ÙÀ½°ú °°½À´Ï´Ù.

[¹ßÇ¥ ÁÖÁ¦]
http://2005.recon.cx/en/s/jlloyd.html
[¹ßÇ¥ ÀÚ·á]
http://2005.recon.cx/recon2005/papers/
[樨毢]
http://www.archive.org/details/Recon2005videos


- Anonymous Blogging Submission : ÀÎÅÍ³Ý ±ÔÁ¦°¡ ÀÖ´Â ±¹°¡¸¦ À§ÇØ ÀÍ¸í ºí·Î±ë ¹æ¹ýÀ» ¼³¸íÇÕ´Ï´Ù.
- Binary Protection Schemes : ¹ÙÀ̳ʸ® ºÐ¼®À» ¹æÁöÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¸®´ª½º¸¦ ±â¹ÝÀ¸·Î ¼³¸íÇÕ´Ï´Ù.
- Attacking WiFi with traffic injection : ¹«¼±·£ ±âÃÊ, WEP Å©·¢, ±×¸®°í traffic injectionÀ» ÅëÇÑ ÁÖº¯Àå¾Ç ¹æ¹ýÀ» ¼³¸íÇÕ´Ï´Ù.
- reversing the commercial web for fun and knowledge : ±¸±ÛÇØÅ·, JS ³­µ¶È­ µî¿¡ ´ëÇØ ´Ù·ì´Ï´Ù.
- Web Application Hacking : À¥ÇØÅ·À» ¿¹Á¦¿Í ÇÔ²² ´Ù·ì´Ï´Ù.
- The Dark Side of Winsock : winsock°ú À̸¦ ÀÌ¿ëÇÑ ¹éµµ¾î¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Encrypted P2P and VoIP Spaces with CUTLASS : P2P¿Í voip ÇÁ·ÎÅäÄÝÀ» ¾ÈÀüÇÏ°Ô ¾ÏȣȭÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Syllogistic Application Testing : ÀÀ¿ëÇÁ·Î±×·¥ º¸¾È Å×½ºÆÿ¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Visual Analysis: 2D Does it Better in Color : ÅؽºÆ®°¡¾Æ´Ñ ºñÁê¾óÇÑ ·Î±×¸¦ Ç¥ÇöÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Practical Attacks on a Prox Card : Çϵå¿þ¾îÀûÀÎ door lock °ø°Ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Introduction to network programming with libevent. libdnet and libnids : network ÇÁ·Î±×·¡¹Ö ¶óÀ̺귯¸®¸¦ ¼³¸íÇÕ´Ï´Ù.
- Using honeyclients to discover new attacks : client ±â¹ÝÀÇ honeypot¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Passive Asset Detection System : invisibleÇÏ°Ô ³×Æ®¿öÅ© Á¤º¸¸¦ ¼öÁýÇÏ´Â ¹æ¹ý¿¡ ¼³¸íÇÕ´Ï´Ù.
- Auditing Source Code : C/C++ ¾ð¾î¿¡¼­ÀÇ º¸¾È Ãë¾àÁ¡ ¼³¸í°ú À̸¦ ã´Â ¹æ¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Process Stalking: Run Time Visual RCE : ¹ÙÀ̳ʸ® ¸®¹ö½ÌÀ» À§ÇÑ ÇÁ·Î¼¼½º ÃßÀû ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Improving Network Security by Adding Randomness : OpenBSDÀÇ ³×Æ®¿öÅ© º¸¾È°ú Ãë¾àÁ¡¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Malware Analysis : ¾Ç¼ºÄÚµå ºÐ¼®¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Hardening Registration Number Protection Schemes : ÀÀ¿ëÇÁ·Î±×·¥ ½Ã¸®¾ó ³Ñ¹öÀÇ Ãë¾àÁ¡°ú ¹æ¾î¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- recent shelLcode developments : ½©ÄÚµå ÀÛ¼º¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- reverse engineering panel : ¸®¹ö½º ¿£Áö´Ï¾î¸µÀ» ÁÖÁ¦·Î Åä·ÐÇÕ´Ï´Ù.

ÀÌ Áß¿¡ Auditing Source Code ¸¦ ¸®½º´×&¹ø¿ª ´ë»óÀ¸·Î ¼±Á¤ÇÏ°íÀÚ ÇÕ´Ï´Ù.
¼±Á¤ ÀÌÀ¯´Â ÀÏ´Ü ÁÖÁ¦°¡ Èï¹Ì·Î¿ì¸ç, ¹ßÇ¥ÀÇ ·¯´×ŸÀÓÀÌ ¾à 47ºÐÀ¸·Î ªÀºÆíÀ̶ó ù ÀÛ¾÷À¸·Î ¸öÇ®±â¿¡ ÁÁÀ» °Í
°°½À´Ï´Ù. ±×¸®°í ¹ßÇ¥ÀÚÀÎ Nishchal Bhalla´ÔÀÌ Àεµ°è¿­À̶ó ¿ø¾î¹Î´ÔµéÀÇ ¹öÅÍ ¹ßÀ½¿¡ ºñÇØ ºñ±³Àû ¸®½º´×ÀÌ ½±½À´Ï´Ù.
(ÀßÇϽô ºÐµéÀº ¿ÀÈ÷·Á ¾à°£ ´ä´äÇÏ°Ô µé¸± ¼öµµ ÀÖÀ» °Í °°³×¿ä.)

´ÙÀ½Àº ¹ßÇ¥ ÀÚ·á¿Í µ¿¿µ»óÀÔ´Ï´Ù.

http://2005.recon.cx/recon2005/papers/Nish_Bhalla/Security_Compass_Defects_Overview_final.pdf

http://www.archive.org/download/Recon2005videos/recon2005_nish_bhalla_auditing_source_code.avi

ÀÌÁ¦ ÀÌ µ¿¿µ»óÀ» ¿©·¯°³·Î ºÐÇÒÇÏ¿© ¸®½º´×&¹ø¿ªÀ» ÇÒÅÙµ¥, ±× Àü¿¡ À§ PDF ÆÄÀÏÀ» ¸ÕÀú º¸½Ã¸é Àü¹ÝÀûÀÎ È帧À»
ÀÌÇØÇϴµ¥ µµ¿òÀÌ µÉ °Í °°½À´Ï´Ù.



  Hit : 2983     Date : 2011/05/03 06:32



    
     [°øÁö] RECON 2005 ¹ßÇ¥ÀÚ·á ¸ñ·ÏÀÔ´Ï´Ù ¸Û¸Û 05/03 2982
     Á¦°¡ »ç¿ëÇÏ´Â ¸®½º´× ¹æ¹ý ÆÁ.. [4] Prox 05/21 3238
     RECON 2006 ±¦Âú¾Æº¸ÀÌ´Â ¹ßÇ¥ÁÖÁ¦µé ¸Þ¸ð ¸Û¸Û 06/14 2149
     [Çʵ¶] ¸®½º´× & ¹ø¿ª ½ÃÀÇ ±ÔÄ¢ÀÔ´Ï´Ù. [2] ¸Û¸Û 05/09 2248
     [°øÁö] ÁÖ±âÀûÀ¸·Î Á¤ÆÃÀ» ÇÏ·Á°í ÇÕ´Ï´Ù. [11] ¸Û¸Û 05/11 2144
     [°øÁö] WIKI¸¦ ÀÌ¿ëÇÑ Çùµ¿ ¹ø¿ª ¹æ¹ýÀÔ´Ï´Ù. ¸Û¸Û 05/13 2215
     [°øÁö] µ¿¿µ»ó ºÐÇÒ ¹æ¹ýÀÔ´Ï´Ù. ¸Û¸Û 05/11 3191
     [°øÁö] ¹ø¿ªÆÀ ¸â¹ö ¸ñ·ÏÀÔ´Ï´Ù. [33] ¸Û¸Û 05/03 3180
89   ÇïÇÁ¿ä~![1]     sdjgfhhfg12
12/13 1294
88   °¡ÀÔÇß½À´Ï´Ù.     nectars
03/03 1421
87   Èå¾Æ Á˼ÛÇØ¿ä ¤Ð¤Ð¤Ð 11¹ø µ¿¿µ»ó ¹ø¿ª~     dex023
04/14 2727
86 ºñ¹Ð±ÛÀÔ´Ï´Ù  VPN ¸Þ´º¾ó ¹ø¿ªÁ¡..[1]     wkdrns9711
03/07 0
85   Áß±¹¾î ¹ø¿ªÀº ÇÊ¿ä ¾ø³ª¿ä?     ºÒ²É¿¬ÁÖ°¡
01/02 2341
84   ³²Àº 10¹ø, 11¹ø ÆÄÆ® ¸®½º´×&¹ø¿ª ÇØÁÖ½Ç ºÐ ã½À´Ï´Ù.[5]     ¸Û¸Û
11/17 2490
83   9¹øÆÄÆ® dictationÀÔ´Ï´Ù[13]     neb91
08/26 2298
82   hackerwannabe´Ô, neb91´Ô, eplesky´Ô ÁøÇà»óȲ ¸»¾¸ÇØ Áֽñ⠹ٶø´Ï´Ù.[2]     ¸Û¸Û
08/23 2337
81   µ¿¿µ»ó 7¹ø ÆÄÆ®ÀÔ´Ï´Ù.[1]     babyalpha
08/22 2467
80   ¹ø¿ª part 7 status     babyalpha
08/21 1986
79   7¹ø, 9¹ø, 10¹ø, 11¹ø ÆÄÆ® ¸Ã¾ÆÁÖ½Ç ºÐ ¸ð½Ê´Ï´Ù~[9]     ¸Û¸Û
08/09 2392
78   ÆÄÆ® 3 ºÐ·® ÀÔ´Ï´Ù[1]     L0phrack
08/09 2219
77   l0phrack, heeya90, goodfacesong´ÔµéÀº ÁøÇà»óȲÀ» Àû¾îÁÖ¼¼¿ä[2]     ¸Û¸Û
08/08 2246
76   Àú Æ÷±â..Çؾ߰ڳ׿©     d4rkang3l
08/07 2646
75   ¹ø¿ª ÁøÇàÀÌ Á» ´õµð³×¿ä.[2]     babyalpha
08/06 2173
74   ÁøÇà»óȲ Á¤¸® (¸Þ¸ð¿ë)     ¸Û¸Û
08/05 2216
73   12¹ø ÆÄÆ® (ºóÄ­ÀÌ ¸¹¾Æ¿ä)     Prox
08/03 2004
1 [2][3][4]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org