97, 2/4 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   ¸Û¸Û
   http://www.hackerschool.org
   µÎ ¹ø° ¹ø¿ª ´ë»ó ¹Ì¸® Á¤ÇսôÙ~

http://www.hackerschool.org/HS_Boards/zboard.php?id=HS_Translate&no=54 [º¹»ç]


¸¶Âù°¡Áö·Î RECON2005 Áß¿¡¼­ ¼±ÅÃÇÏ°Ú½À´Ï´Ù.
(ÇÑ ÄÁÆÛ·±½º ´ç 2~3°³¾¿ ¹ø¿ª ÁøÇà ¿¹Á¤ÀÔ´Ï´Ù)

½Ã°£ µÇ½Ã´Â ºÐÀº Àç¹Õ¾î º¸ÀÌ´Â ¹ßÇ¥ ¸î°³ µé¾îº¸½Ã°í ±¦ÂúÀº °Å ÃßõÇØ ÁÖ¼¼¿ä~

´ÙÀ½Àº RECON2005ÀÇ Àüü ¸ñ·ÏÀÔ´Ï´Ù

[¹ßÇ¥ ÁÖÁ¦]
http://2005.recon.cx/en/s/jlloyd.html
[¹ßÇ¥ ÀÚ·á]
http://2005.recon.cx/recon2005/papers/
[樨毢]
http://www.archive.org/details/Recon2005videos

- Anonymous Blogging Submission : ÀÎÅÍ³Ý ±ÔÁ¦°¡ ÀÖ´Â ±¹°¡¸¦ À§ÇØ ÀÍ¸í ºí·Î±ë ¹æ¹ýÀ» ¼³¸íÇÕ´Ï´Ù.
- Binary Protection Schemes : ¹ÙÀ̳ʸ® ºÐ¼®À» ¹æÁöÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¸®´ª½º¸¦ ±â¹ÝÀ¸·Î ¼³¸íÇÕ´Ï´Ù.
- Attacking WiFi with traffic injection : ¹«¼±·£ ±âÃÊ, WEP Å©·¢, ±×¸®°í traffic injectionÀ» ÅëÇÑ ÁÖº¯Àå¾Ç ¹æ¹ýÀ» ¼³¸íÇÕ´Ï´Ù.
- reversing the commercial web for fun and knowledge : ±¸±ÛÇØÅ·, JS ³­µ¶È­ µî¿¡ ´ëÇØ ´Ù·ì´Ï´Ù.
- Web Application Hacking : À¥ÇØÅ·À» ¿¹Á¦¿Í ÇÔ²² ´Ù·ì´Ï´Ù.
- The Dark Side of Winsock : winsock°ú À̸¦ ÀÌ¿ëÇÑ ¹éµµ¾î¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Encrypted P2P and VoIP Spaces with CUTLASS : P2P¿Í voip ÇÁ·ÎÅäÄÝÀ» ¾ÈÀüÇÏ°Ô ¾ÏȣȭÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Syllogistic Application Testing : ÀÀ¿ëÇÁ·Î±×·¥ º¸¾È Å×½ºÆÿ¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Visual Analysis: 2D Does it Better in Color : ÅؽºÆ®°¡¾Æ´Ñ ºñÁê¾óÇÑ ·Î±×¸¦ Ç¥ÇöÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Practical Attacks on a Prox Card : Çϵå¿þ¾îÀûÀÎ door lock °ø°Ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Introduction to network programming with libevent. libdnet and libnids : network ÇÁ·Î±×·¡¹Ö ¶óÀ̺귯¸®¸¦ ¼³¸íÇÕ´Ï´Ù.
- Using honeyclients to discover new attacks : client ±â¹ÝÀÇ honeypot¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Passive Asset Detection System : invisibleÇÏ°Ô ³×Æ®¿öÅ© Á¤º¸¸¦ ¼öÁýÇÏ´Â ¹æ¹ý¿¡ ¼³¸íÇÕ´Ï´Ù.
- Auditing Source Code : C/C++ ¾ð¾î¿¡¼­ÀÇ º¸¾È Ãë¾àÁ¡ ¼³¸í°ú À̸¦ ã´Â ¹æ¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Process Stalking: Run Time Visual RCE : ¹ÙÀ̳ʸ® ¸®¹ö½ÌÀ» À§ÇÑ ÇÁ·Î¼¼½º ÃßÀû ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Improving Network Security by Adding Randomness : OpenBSDÀÇ ³×Æ®¿öÅ© º¸¾È°ú Ãë¾àÁ¡¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Malware Analysis : ¾Ç¼ºÄÚµå ºÐ¼®¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Hardening Registration Number Protection Schemes : ÀÀ¿ëÇÁ·Î±×·¥ ½Ã¸®¾ó ³Ñ¹öÀÇ Ãë¾àÁ¡°ú ¹æ¾î¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- recent shelLcode developments : ½©ÄÚµå ÀÛ¼º¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- reverse engineering panel : ¸®¹ö½º ¿£Áö´Ï¾î¸µÀ» ÁÖÁ¦·Î Åä·ÐÇÕ´Ï´Ù.

  Hit : 2048     Date : 2011/05/25 01:14



    
bluemario °³ÀÎÀûÀ¸·Î -> Attacking WiFi with traffic injection ÀÌ°Å Çϱ¸ ½Í³×¿ä ¤»¤»¤»

±×¸®°í ¹®¼­¹ø¿ª°°Àº°Íµµ Çϸé ÁÁÀ»°Í°°Àºµ¥,, ¤»¤»
2011/05/26  
lycan Web Application Hacking ÀÌ ¹ßÇ¥´Â µ¿¿µ»óÀÌ ¾ø´Â°Í °°¾Æ¿è~ 2011/05/27  
raepid9988 Àú´Â °³ÀÎÀûÀ¸·Î Hardening Registration Number Protection Schemes ¿ä°Å Çѹø Çغ¸°í ½Í¾î¿ä ¤¾;; 2011/05/27  
raepid9988 malware analysis µµ Èï¹Ì·Î¿ï°Å °°Àºµ¥¿ä? ¤¾¤¾ 2011/05/27  
lycan Àúµµ Attacking WiFi with traffic injection ÀÌ°Å ÇÑÇ¥¿è~
Áö±Ý º¸°í Àִµ¥ ¾ï¾çÀÌ µ¶Æ¯ÇÏ³×¿ä ¤§¤§¤§
2011/05/27  
ahotsuna Àúµµ ¾îÅÂÅ· ¿ÍÀÌÆÄÀÌ¿¡ ÇÑÇ¥¿ä!
¿äÁò ÈïÇÏ´Â ±â¼úÀ̶ó ±Ã±ÝÇÕ´Ï´Ù
2011/05/27  
W.H. Àü

Attacking WiFi with traffic injection
Anonymous Blogging Submission

¿¡ ÇÑÇ¥¿ä!
2011/05/27  
blaisepscal Àú´Â Malware Analysis ¿¡ ÇÑÇ¥. !

¸»¿þ¾î ºÐ¼® ¿äÁòÀ» ÇÏ°í À־ µµ¿òÀÌ ¸¹ÀÌ µÉ °Í °°±âµµ ÇØ¿ä
2011/05/27  
72   ´Ù¸¥ ºÐµéÀº ¾ó¸¶³ª Çϼ̳ª¿ä?[3]     ahotsuna
07/31 1701
71   ±âÇÑÀÌ...[3]     20500
07/31 1511
70   [Á¦ 2ȸ] ¹ø¿ª ÆÄÆ®°¡ Á¤ÇØÁ³½À´Ï´Ù[12]     ¸Û¸Û
07/18 1903
69   [Á¦ 2ȸ] µ¿¿µ»ó ÆÄÀÏ[1]     lycan
07/16 2694
68   [Á¦ 2ȸ] À¯Åõºê ¸µÅ©[1]     lycan
07/16 1777
67   [Á¦ 2ȸ] Á¦ 2ȸ ¸®½º´×&¹ø¿ª ÀÛ¾÷À» ½ÃÀÛÇÕ´Ï´Ù.[20]     ¸Û¸Û
07/14 2077
66   ÀÚ¸· - ÃÖÁ¾ ¼öÁ¤º»ÀÔ´Ï´Ù~     ¸Û¸Û
06/30 1612
65   ÀÚ¸· - darkangel´Ô °Í°ú lycan´Ô °Í ÅëÇÕ     ¸Û¸Û
06/22 1834
64   ÀÚ¸·[1]     d4rkang3l
06/21 1480
63   µÎ ¹ø° ¹ø¿ª ´ë»ó °ü·Ã..[5]     ¸Û¸Û
06/16 1896
62   ÀÚ¸·(¿µ¾î,Çѱ۸¸ ¿Ï¼º ½ÌÅ© ¿¡·¯)[1]     d4rkang3l
06/16 1726
61     [re] °³Çà ¹× ÀϺΠ¼öÁ¤ÇÑ ÀÚ¸· ¿Ã¸³´Ï´Ù.[1]     lycan
06/15 1608
     RECON 2006 ±¦Âú¾Æº¸ÀÌ´Â ¹ßÇ¥ÁÖÁ¦µé ¸Þ¸ð ¸Û¸Û 06/14 2173
59   ÀÚ¸· ¿Ã¸³´Ï´Ù~[4]     lycan
06/13 1610
58   ÀúÀÚ¸·ÀÌ¿ä(¹Ì¿Ï¼º)[1]     d4rkang3l
06/09 1514
57   Á¦ 1ȸ ¹ø¿ª ÀÚ¸· °ü·ÃÀÔ´Ï´Ù.     ¸Û¸Û
06/02 1681
56   WIKI ¶Ç ´Ù¿îµÅ¼­ ÆÄÆ® 7 ¿©±â¿¡ ¿Ã¸³´Ï´Ù     ¸Û¸Û
06/02 1707
55   ÆÄÆ® 7,8 ¸¶¹«¸® °ü·Ã..[1]     ¸Û¸Û
05/30 1479
54   µ¿¿µ»ó ÆÄÀÏÀÔ´Ï´Ù. <- ÀÌ µ¿¿µ»óÀº Á¤ÇØÁø µ¿¿µ»óÀÌ ¾Æ´Ï¿¡¿ä~~[8]     W.H.
05/27 1791
  µÎ ¹ø° ¹ø¿ª ´ë»ó ¹Ì¸® Á¤ÇսôÙ~[8]     ¸Û¸Û
05/25 2047
52   Á¦ 1ȸ ¹ø¿ª ÀÚ¸· ´Þ¾ÆÁÖ½Ç ºÐ ã½À´Ï´Ù~[3]     ¸Û¸Û
05/25 1855
51   ÆÄÆ® 7, 8¸¸ Á¶±Ý ´õ º¸°­ÇÏ°í ¹ø¿ª Á¾·áÇÏ°Ú½À´Ï´Ù~!     ¸Û¸Û
05/25 1607
     Á¦°¡ »ç¿ëÇÏ´Â ¸®½º´× ¹æ¹ý ÆÁ.. [4] Prox 05/21 3257
49   ¸®½º´× & ¹ø¿ª ½ÃÀÇ ±ÔÄ¢ÀÌ ¾÷µ¥ÀÌÆ® µÇ¾ú½À´Ï´Ù.     ¸Û¸Û
05/21 1673
48   5¿ù 20ÀÏ Á¤Æà ³»¿ë ¿ä¾àÀÔ´Ï´Ù.[4]     ¸Û¸Û
05/21 1606
[1] 2 [3][4]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org