97, 1/4 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   ¸Û¸Û
   http://www.hackerschool.org
   [°øÁö] RECON 2005 ¹ßÇ¥ÀÚ·á ¸ñ·ÏÀÔ´Ï´Ù

http://www.hackerschool.org/HS_Boards/zboard.php?id=HS_Translate&no=2 [º¹»ç]


À¯¸íÇÑ ÇØ¿Ü º¸¾È ÄÁÆÛ·±½º·Î¼­ BlackHat, Defcon, RECON, ShmooCon, CansecWest, rootedCon, HITB µîÀÌ ÀÖ½À´Ï´Ù.

À̵é Áß RECONÀ» ù ¹ø° ¹ø¿ª ´ë»óÀ¸·Î ¼±Á¤ÇØ º¸¾Ò½À´Ï´Ù.

RECONÀº Áö³­ 2005³âÀ» ½ÃÀÛÀ¸·Î ¸Å³â ij³ª´Ù ¸óÆ®¸®¿Ã¿¡¼­ °³ÃֵǴ º¸¾È ÄÁÆÛ·±½º·Î¼­,
Reverse Engineering ¹× ÃֽŠExploit, ±×¸®°í 0-day ¹ß°ß ±â¼ú¿¡ ÁßÁ¡À» µÎ°í ÀÖ´Ù´Â Á¡ÀÌ ¸Å·ÂÀûÀÔ´Ï´Ù.
RECONÀÇ °ø½Ä À¥ »çÀÌÆ®´Â http://recon.cx À̸ç, ÄÁÆÛ·±½º Á¾·á ÈÄ archive ¸Þ´º¸¦ ÅëÇØ ¹ßÇ¥ µ¿¿µ»óµéÀ» °ø°³ÇÕ´Ï´Ù.

ÀÌ Áß Ã¹ ÄÁÆÛ·±½º¿´´ø 2005³â¿¡¼­ºÎÅÍ ¸®½º´×&¹ø¿ªÀ» ½ÃÀÛÇØ ³ª°¡·Á°í ÇÕ´Ï´Ù.
2005³âÀÇ ¹ßÇ¥ ÁÖÁ¦µéÀ» Á¤¸®ÇÏ¸é ´ÙÀ½°ú °°½À´Ï´Ù.

[¹ßÇ¥ ÁÖÁ¦]
http://2005.recon.cx/en/s/jlloyd.html
[¹ßÇ¥ ÀÚ·á]
http://2005.recon.cx/recon2005/papers/
[樨毢]
http://www.archive.org/details/Recon2005videos


- Anonymous Blogging Submission : ÀÎÅÍ³Ý ±ÔÁ¦°¡ ÀÖ´Â ±¹°¡¸¦ À§ÇØ ÀÍ¸í ºí·Î±ë ¹æ¹ýÀ» ¼³¸íÇÕ´Ï´Ù.
- Binary Protection Schemes : ¹ÙÀ̳ʸ® ºÐ¼®À» ¹æÁöÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¸®´ª½º¸¦ ±â¹ÝÀ¸·Î ¼³¸íÇÕ´Ï´Ù.
- Attacking WiFi with traffic injection : ¹«¼±·£ ±âÃÊ, WEP Å©·¢, ±×¸®°í traffic injectionÀ» ÅëÇÑ ÁÖº¯Àå¾Ç ¹æ¹ýÀ» ¼³¸íÇÕ´Ï´Ù.
- reversing the commercial web for fun and knowledge : ±¸±ÛÇØÅ·, JS ³­µ¶È­ µî¿¡ ´ëÇØ ´Ù·ì´Ï´Ù.
- Web Application Hacking : À¥ÇØÅ·À» ¿¹Á¦¿Í ÇÔ²² ´Ù·ì´Ï´Ù.
- The Dark Side of Winsock : winsock°ú À̸¦ ÀÌ¿ëÇÑ ¹éµµ¾î¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Encrypted P2P and VoIP Spaces with CUTLASS : P2P¿Í voip ÇÁ·ÎÅäÄÝÀ» ¾ÈÀüÇÏ°Ô ¾ÏȣȭÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Syllogistic Application Testing : ÀÀ¿ëÇÁ·Î±×·¥ º¸¾È Å×½ºÆÿ¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Visual Analysis: 2D Does it Better in Color : ÅؽºÆ®°¡¾Æ´Ñ ºñÁê¾óÇÑ ·Î±×¸¦ Ç¥ÇöÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Practical Attacks on a Prox Card : Çϵå¿þ¾îÀûÀÎ door lock °ø°Ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Introduction to network programming with libevent. libdnet and libnids : network ÇÁ·Î±×·¡¹Ö ¶óÀ̺귯¸®¸¦ ¼³¸íÇÕ´Ï´Ù.
- Using honeyclients to discover new attacks : client ±â¹ÝÀÇ honeypot¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Passive Asset Detection System : invisibleÇÏ°Ô ³×Æ®¿öÅ© Á¤º¸¸¦ ¼öÁýÇÏ´Â ¹æ¹ý¿¡ ¼³¸íÇÕ´Ï´Ù.
- Auditing Source Code : C/C++ ¾ð¾î¿¡¼­ÀÇ º¸¾È Ãë¾àÁ¡ ¼³¸í°ú À̸¦ ã´Â ¹æ¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Process Stalking: Run Time Visual RCE : ¹ÙÀ̳ʸ® ¸®¹ö½ÌÀ» À§ÇÑ ÇÁ·Î¼¼½º ÃßÀû ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Improving Network Security by Adding Randomness : OpenBSDÀÇ ³×Æ®¿öÅ© º¸¾È°ú Ãë¾àÁ¡¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Malware Analysis : ¾Ç¼ºÄÚµå ºÐ¼®¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Hardening Registration Number Protection Schemes : ÀÀ¿ëÇÁ·Î±×·¥ ½Ã¸®¾ó ³Ñ¹öÀÇ Ãë¾àÁ¡°ú ¹æ¾î¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- recent shelLcode developments : ½©ÄÚµå ÀÛ¼º¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- reverse engineering panel : ¸®¹ö½º ¿£Áö´Ï¾î¸µÀ» ÁÖÁ¦·Î Åä·ÐÇÕ´Ï´Ù.

ÀÌ Áß¿¡ Auditing Source Code ¸¦ ¸®½º´×&¹ø¿ª ´ë»óÀ¸·Î ¼±Á¤ÇÏ°íÀÚ ÇÕ´Ï´Ù.
¼±Á¤ ÀÌÀ¯´Â ÀÏ´Ü ÁÖÁ¦°¡ Èï¹Ì·Î¿ì¸ç, ¹ßÇ¥ÀÇ ·¯´×ŸÀÓÀÌ ¾à 47ºÐÀ¸·Î ªÀºÆíÀ̶ó ù ÀÛ¾÷À¸·Î ¸öÇ®±â¿¡ ÁÁÀ» °Í
°°½À´Ï´Ù. ±×¸®°í ¹ßÇ¥ÀÚÀÎ Nishchal Bhalla´ÔÀÌ Àεµ°è¿­À̶ó ¿ø¾î¹Î´ÔµéÀÇ ¹öÅÍ ¹ßÀ½¿¡ ºñÇØ ºñ±³Àû ¸®½º´×ÀÌ ½±½À´Ï´Ù.
(ÀßÇϽô ºÐµéÀº ¿ÀÈ÷·Á ¾à°£ ´ä´äÇÏ°Ô µé¸± ¼öµµ ÀÖÀ» °Í °°³×¿ä.)

´ÙÀ½Àº ¹ßÇ¥ ÀÚ·á¿Í µ¿¿µ»óÀÔ´Ï´Ù.

http://2005.recon.cx/recon2005/papers/Nish_Bhalla/Security_Compass_Defects_Overview_final.pdf

http://www.archive.org/download/Recon2005videos/recon2005_nish_bhalla_auditing_source_code.avi

ÀÌÁ¦ ÀÌ µ¿¿µ»óÀ» ¿©·¯°³·Î ºÐÇÒÇÏ¿© ¸®½º´×&¹ø¿ªÀ» ÇÒÅÙµ¥, ±× Àü¿¡ À§ PDF ÆÄÀÏÀ» ¸ÕÀú º¸½Ã¸é Àü¹ÝÀûÀÎ È帧À»
ÀÌÇØÇϴµ¥ µµ¿òÀÌ µÉ °Í °°½À´Ï´Ù.



  Hit : 3002     Date : 2011/05/03 06:32



    
     [°øÁö] ¹ø¿ªÆÀ ¸â¹ö ¸ñ·ÏÀÔ´Ï´Ù. [33] ¸Û¸Û 05/03 3190
     [°øÁö] RECON 2005 ¹ßÇ¥ÀÚ·á ¸ñ·ÏÀÔ´Ï´Ù ¸Û¸Û 05/03 3001
95   [1ȸ] µ¿¿µ»ó ºÐÇÒÇØÁÖ½Ç ºÐ![2]     ¸Û¸Û
05/03 2136
94   [1ȸ] ¿ªÇÒ ºÐ´ãÇÕ´Ï´Ù.[1]     ¸Û¸Û
05/03 1747
93   [°øÁö] Á¦ 1ȸ ¹ø¿ª ½ºÄÉÁìÀÔ´Ï´Ù. (ÁøÇà»óȲÀ» °¢ÀÚ ´ñ±Û·Î update)[10]     ¸Û¸Û
05/03 1771
92   ¸â¹öºÐµé ³×ÀÌÆ®¿Â or Ä«Åå or Æ®À§ÅÍ ±³È¯ÇØ¿ä[4]     ¸Û¸Û
05/03 2051
91   À§¿¡ ¸Û¸Û´ÔÀÌ ¿Ã¸®½Å µ¿¿µ»óÀ¸·Î ÀÛ¾÷ÇØÁÖ¼¼¿ä~ (ÀÌ °Ô½Ã¹°X)[21]     W.H.
05/03 1748
90   À̹ø ÀÛ¾÷(nish_bhalla_auditing_source_code) ¿øº» ÆÄÀÏÀÌ¿ä.     W.H.
05/03 1725
89   [1ȸ] recon - auditing source code ºÐÇÒ ÆÄÀÏÀÔ´Ï´Ù (ÃÑ 9°³)[8]     ¸Û¸Û
05/04 1876
88   ¾ÆÂü ¹ø¿ª¹®Àº Á¸´ñ¸»·Î Àû¾îÁÖ¼¼¿ä~ (³Ã¹«)     ¸Û¸Û
05/04 1365
87   3¹ø° ÆÄÆ® ¾Èµé¸®´Â ºÎºÐ »©°í ´ÙÇß½À´Ï´Ù[9]     ahotsuna
05/04 1884
86   ÀÛ¾÷ÇÏ´Ù ¸·È÷½Å ºÐ, ±×¸®°í ÀÛ¾÷ ÇÒ´ç ¸ø¹ÞÀ¸½Å ºÐ ºÁÁÖ¼¼¿ä     ¸Û¸Û
05/06 1741
85   4¹ø ÆÄÆ® ¸®½º´×&¹ø¿ª ³»¿ëÀÔ´Ï´Ù.[1]     ¸Û¸Û
05/09 1746
     [Çʵ¶] ¸®½º´× & ¹ø¿ª ½ÃÀÇ ±ÔÄ¢ÀÔ´Ï´Ù. [2] ¸Û¸Û 05/09 2257
83   2¹ø ÆÄÆ® ¸®½º´×&¹ø¿ªÀÔ´Ï´Ù.[2]     stardung86
05/09 1668
82   1¹ø ÆÄÆ® ÀÏ´Ü Áö±Ý±îÁö ÇÑ°Å ¿Ã¸³´Ï´Ù.[2]     W.H.
05/10 1742
81   5¹ø ÆÄÀÏ[1]     ¼­°æÀç
05/10 1642
80   °ÇÀÇ»çÇ×??[1]     ¼­°æÀç
05/10 1502
79   11ÀÏ ¼ö¿äÀÏ ³· 12½Ã¿¡ 1Â÷ Á¤¸®¸¦ ÇÏ°Ú½À´Ï´Ù.[1]     ¸Û¸Û
05/11 1582
78   8¹ø ÆÄÆ®ÀÔ´Ï´Ù[1]     Prox
05/11 1643
77   ±³Á¤ ´ã´çÀÚµéÀ» Ãß°¡ ¸ðÁýÇÕ´Ï´Ù.     ¸Û¸Û
05/11 1524
76   Á¦ 1ȸ ¹ø¿ª ÁøÇà »óȲÀÔ´Ï´Ù.[1]     ¸Û¸Û
05/11 1632
75   7¹ø ÆÄÆ® ÂÉ°³ÁÖ½Ç ºÐ ã½À´Ï´Ù.[2]     ¸Û¸Û
05/11 1621
     [°øÁö] µ¿¿µ»ó ºÐÇÒ ¹æ¹ýÀÔ´Ï´Ù. ¸Û¸Û 05/11 3207
73   ±ÞÇÑ´ë·Î 6¹øÆÄÆ®[1]     bluemario
05/11 1914
1 [2][3][4]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org