97, 2/4 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   bluemario
   http://dpmh.wo.tc
   ±ÞÇÑ´ë·Î 6¹øÆÄÆ®

http://www.hackerschool.org/HS_Boards/zboard.php?id=HS_Translate&no=26 [º¹»ç]


That is very good question that uhh this typical list of threat

are i dont know if you have had a chance look at this guy in Microsoft

I'm keep refering to Microsoft, becaues a lately I've been looking their web site quite a bit.

ahh I know bad thing. I intially  starts rufing the threads guy from the open BST cording standard--(¹º ´ëȸ´ø°¡ ´Üü´ø°¡).

They have some really good stuff over there.

We stated also a looking at all the good,, i've been doing a lot of cc++ related stuff,

so what i've been trying to combine together is a all the wonderability that have been release _____time,

and open source software and trying to figur what those wonderability were, from _____ point of view,

and then look at threat model, and trying to attach with air(?).

Does it someone making sence?

so going to CVE are minor or other side with actually tell you open___________ was

___________to ____ by one attack, so you go and look at that and figure out ok this are the

major types of attacks from when there is loop. right?

so from an external point of view, when you look at the loop, what are the major problems?

if there is any loop, that is reciving external data will talk _______ movement in MCC++ ___

Where they can be issues, and why is that existing and then you _____ that _____ (map that backÀ¸·Î µé¸®´Âµ¥,,)

to your major threat. That comes down to either recieving data from the outside, ________

either you can go through the major files _______________________

and you just mark everything under those major areas, or you can combine,,

everyone has different method of doing it, so what we take(?) to do,, depending on games,

depends on application, if its bad application, it would make a lot of sence,

go to ________ or someother websites,

and figure out what the major threads are from their point of view. right?

But the cc++, these are the one that major the we had big classify them under(???), and then

figure it out under bases  of that.

Thus that some of answer of your question?

Áú¹®ÀÚ ¹¹¶ó¹¹¶ó


ahh

right so basically this question is ______ that how do we understand all of major threads

that exist in an application. Would that be correct?

ahhh that might not having define(define ÀÎÁö defeat)

or that it have been define. so the ones that have been define that is not much for problem

that you can list them, you can assign them _______________ figure out by that you want to do it or not.

That have not been define amm that is the most difficult task thats why

you move back to the first change of the process, you remember i talked about,

getting as much as micron(?) information and documenting all that?

When you new class of thread comes out then you go back and look at your documentation,

and say "ok thus this application has something,, is it doing something of the start"

like today, ELB ,~~~~ JOne i think right? (Áß¿äÇÏÁö ¾ÊÀ½)

He was talking about it might be something that is slightly unique, that is not been discuss

openly so much, So you might have aaa if you had initialy done research on your application

and say that ok, my application is provider(ÇÁ·Î¿ÍÀÌ´õ¶ó µé¸®´Âµ¥,,) and itself.

right? and you go back to your code and

Is it a provider(?) is it doing any kind of check?

my provider is first one or is there a different provider thats coming ahead of time and then you can figure ou
t
okay there is possibility of threat, then you go back to your code and figure it out

does that help?

Yes sir,

Áú¹®ÀÚ°¡ ¹°¾îº¸´Âµ¥ ¼Ò¸®¸¦ ÃÖ´ë·Î Å°¿öµµ ¾Èµé¸®³×¿ä ¤Ì¤Ì ³ëÆ®ºÏÀÌ¶ó¼­ ±×·±°¨,,

Yes i had look at that. It is a ..Yes

The question was have you look at attack tree is that Jone---(»ç¶÷À̸§) and couple of other guys have done?

Basically, i have look at that and my opinion is everything is still pertty new and everyone is developing

their own technique, becuz they are finding,, they have been reviewing ______ or they have been reviewing

products for while and it is not so much as science and ____________ trying figure out what's....

Thats why mine is proposal which, hopefully, other people can try and use.

and they will be other people proposing different techniques and um which suits you best would be

the ideal technique. I'll take a little while to figure out what is the best technique for you

becuz for the longest i used to try to do the Microsoft method and didn't really fit in, well for me

and not becuz that is not,,may not be a good method or its a bad method. It just didn't the way i thaught

was not the way that person who came up with that was thinking.

ÀÏ´Ü ¸®½º´× ³¡³Â°í¿ä,, ¤Ì¤Ì ´Ê¾î¼­ ¤¸¤µ
¹ø¿ªÀº,,,,¤¿¤¿¤¿

ºóÄ­ÀÌ ³Ê¹« ¸¹¾Æ FAIL






  Hit : 1916     Date : 2011/05/11 12:59



    
¸Û¸Û °í»ý ¸¹À¸¼Ì½À´Ï´Ù. ºü¸£½Ã³×¿ä! ¤¾¤¾ ¹ø¿ªµµ °¡´ÉÇÑ µ¥±îÁö ºÎŹµå¸³´Ï´Ù. 2011/05/11  
72   12¹ø ÆÄÆ® (ºóÄ­ÀÌ ¸¹¾Æ¿ä)     Prox
08/03 2016
71   ¹ø¿ª part 7 status     babyalpha
08/21 2001
  ±ÞÇÑ´ë·Î 6¹øÆÄÆ®[1]     bluemario
05/11 1915
69   ÆÄÆ®1 ºÐ·®ÀÔ´Ï´Ù.     ¸Û¸Û
08/02 1895
68   [Á¦ 2ȸ] ¹ø¿ª ÆÄÆ®°¡ Á¤ÇØÁ³½À´Ï´Ù[12]     ¸Û¸Û
07/18 1892
67   µÎ ¹ø° ¹ø¿ª ´ë»ó °ü·Ã..[5]     ¸Û¸Û
06/16 1887
66   3¹ø° ÆÄÆ® ¾Èµé¸®´Â ºÎºÐ »©°í ´ÙÇß½À´Ï´Ù[9]     ahotsuna
05/04 1886
65   [1ȸ] recon - auditing source code ºÐÇÒ ÆÄÀÏÀÔ´Ï´Ù (ÃÑ 9°³)[8]     ¸Û¸Û
05/04 1877
64   À¯Æ©ºê µ¿¿µ»ó ¾÷·Îµå[3]     d4rkang3l
05/16 1856
63   Á¦ 1ȸ ¹ø¿ª ÀÚ¸· ´Þ¾ÆÁÖ½Ç ºÐ ã½À´Ï´Ù~[3]     ¸Û¸Û
05/25 1844
62   ¾ÕÀ¸·Î ¸®½º´×&¹ø¿ªÇϸé ÁÁ°Ú´Ù°í »ý°¢µÇ´Â µ¿¿µ»óµéÀÔ´Ï´Ù.     ¸Û¸Û
05/15 1828
61   ÀÚ¸· - darkangel´Ô °Í°ú lycan´Ô °Í ÅëÇÕ     ¸Û¸Û
06/22 1825
60   À§Å° ÆäÀÌÁö º¯°æ ¹× ¸ðµÎ ¸¸µé¾î ³õ°Ú½À´Ï´Ù. + ¸Û¸Û´Ô Çѹø ºÁÁÖ¼¼¿ä[1]     W.H.
05/13 1796
59   ¸¶Áö¸· ÆÄÆ® ÀÔ´Ï´Ù. ´Ê¾î¼­ Á˼ÛÇÕ´Ï´Ù. ¤¾[1]     k1rha
05/12 1787
58   6¹ø ÆÄÆ® ¾Èµé¸®´Â °Íµé ¸¹ÀÌ ¸øÇ߳׿䠠   ahotsuna
08/02 1785
57   µ¿¿µ»ó ÆÄÀÏÀÔ´Ï´Ù. <- ÀÌ µ¿¿µ»óÀº Á¤ÇØÁø µ¿¿µ»óÀÌ ¾Æ´Ï¿¡¿ä~~[8]     W.H.
05/27 1775
56   [°øÁö] Á¦ 1ȸ ¹ø¿ª ½ºÄÉÁìÀÔ´Ï´Ù. (ÁøÇà»óȲÀ» °¢ÀÚ ´ñ±Û·Î update)[10]     ¸Û¸Û
05/03 1772
55   [Á¦ 2ȸ] À¯Åõºê ¸µÅ©[1]     lycan
07/16 1767
54   ºÐÇÒµÈ µ¿¿µ»óÀ» À¯Åõºê¿¡ ¿Ã·ÁÁÖ½Ç ºÐ ã½À´Ï´Ù.[2]     ¸Û¸Û
05/15 1749
53   À§¿¡ ¸Û¸Û´ÔÀÌ ¿Ã¸®½Å µ¿¿µ»óÀ¸·Î ÀÛ¾÷ÇØÁÖ¼¼¿ä~ (ÀÌ °Ô½Ã¹°X)[21]     W.H.
05/03 1749
52   [1ȸ] ¿ªÇÒ ºÐ´ãÇÕ´Ï´Ù.[1]     ¸Û¸Û
05/03 1749
51   4¹ø ÆÄÆ® ¸®½º´×&¹ø¿ª ³»¿ëÀÔ´Ï´Ù.[1]     ¸Û¸Û
05/09 1748
50   1¹ø ÆÄÆ® ÀÏ´Ü Áö±Ý±îÁö ÇÑ°Å ¿Ã¸³´Ï´Ù.[2]     W.H.
05/10 1744
49   ÀÛ¾÷ÇÏ´Ù ¸·È÷½Å ºÐ, ±×¸®°í ÀÛ¾÷ ÇÒ´ç ¸ø¹ÞÀ¸½Å ºÐ ºÁÁÖ¼¼¿ä     ¸Û¸Û
05/06 1743
48   Á¦ 2ȸ ¹ø¿ª ÁøÇà»óȲ ´ñ±Û ¹Ù¶ø´Ï´Ù.[9]     ¸Û¸Û
08/02 1736
[1] 2 [3][4]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org