97, 3/4 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   ¸Û¸Û
   http://www.hackerschool.org
   µÎ ¹ø° ¹ø¿ª ´ë»ó ¹Ì¸® Á¤ÇսôÙ~

http://www.hackerschool.org/HS_Boards/zboard.php?id=HS_Translate&no=54 [º¹»ç]


¸¶Âù°¡Áö·Î RECON2005 Áß¿¡¼­ ¼±ÅÃÇÏ°Ú½À´Ï´Ù.
(ÇÑ ÄÁÆÛ·±½º ´ç 2~3°³¾¿ ¹ø¿ª ÁøÇà ¿¹Á¤ÀÔ´Ï´Ù)

½Ã°£ µÇ½Ã´Â ºÐÀº Àç¹Õ¾î º¸ÀÌ´Â ¹ßÇ¥ ¸î°³ µé¾îº¸½Ã°í ±¦ÂúÀº °Å ÃßõÇØ ÁÖ¼¼¿ä~

´ÙÀ½Àº RECON2005ÀÇ Àüü ¸ñ·ÏÀÔ´Ï´Ù

[¹ßÇ¥ ÁÖÁ¦]
http://2005.recon.cx/en/s/jlloyd.html
[¹ßÇ¥ ÀÚ·á]
http://2005.recon.cx/recon2005/papers/
[樨毢]
http://www.archive.org/details/Recon2005videos

- Anonymous Blogging Submission : ÀÎÅÍ³Ý ±ÔÁ¦°¡ ÀÖ´Â ±¹°¡¸¦ À§ÇØ ÀÍ¸í ºí·Î±ë ¹æ¹ýÀ» ¼³¸íÇÕ´Ï´Ù.
- Binary Protection Schemes : ¹ÙÀ̳ʸ® ºÐ¼®À» ¹æÁöÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¸®´ª½º¸¦ ±â¹ÝÀ¸·Î ¼³¸íÇÕ´Ï´Ù.
- Attacking WiFi with traffic injection : ¹«¼±·£ ±âÃÊ, WEP Å©·¢, ±×¸®°í traffic injectionÀ» ÅëÇÑ ÁÖº¯Àå¾Ç ¹æ¹ýÀ» ¼³¸íÇÕ´Ï´Ù.
- reversing the commercial web for fun and knowledge : ±¸±ÛÇØÅ·, JS ³­µ¶È­ µî¿¡ ´ëÇØ ´Ù·ì´Ï´Ù.
- Web Application Hacking : À¥ÇØÅ·À» ¿¹Á¦¿Í ÇÔ²² ´Ù·ì´Ï´Ù.
- The Dark Side of Winsock : winsock°ú À̸¦ ÀÌ¿ëÇÑ ¹éµµ¾î¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Encrypted P2P and VoIP Spaces with CUTLASS : P2P¿Í voip ÇÁ·ÎÅäÄÝÀ» ¾ÈÀüÇÏ°Ô ¾ÏȣȭÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Syllogistic Application Testing : ÀÀ¿ëÇÁ·Î±×·¥ º¸¾È Å×½ºÆÿ¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Visual Analysis: 2D Does it Better in Color : ÅؽºÆ®°¡¾Æ´Ñ ºñÁê¾óÇÑ ·Î±×¸¦ Ç¥ÇöÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Practical Attacks on a Prox Card : Çϵå¿þ¾îÀûÀÎ door lock °ø°Ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Introduction to network programming with libevent. libdnet and libnids : network ÇÁ·Î±×·¡¹Ö ¶óÀ̺귯¸®¸¦ ¼³¸íÇÕ´Ï´Ù.
- Using honeyclients to discover new attacks : client ±â¹ÝÀÇ honeypot¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Passive Asset Detection System : invisibleÇÏ°Ô ³×Æ®¿öÅ© Á¤º¸¸¦ ¼öÁýÇÏ´Â ¹æ¹ý¿¡ ¼³¸íÇÕ´Ï´Ù.
- Auditing Source Code : C/C++ ¾ð¾î¿¡¼­ÀÇ º¸¾È Ãë¾àÁ¡ ¼³¸í°ú À̸¦ ã´Â ¹æ¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Process Stalking: Run Time Visual RCE : ¹ÙÀ̳ʸ® ¸®¹ö½ÌÀ» À§ÇÑ ÇÁ·Î¼¼½º ÃßÀû ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Improving Network Security by Adding Randomness : OpenBSDÀÇ ³×Æ®¿öÅ© º¸¾È°ú Ãë¾àÁ¡¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Malware Analysis : ¾Ç¼ºÄÚµå ºÐ¼®¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Hardening Registration Number Protection Schemes : ÀÀ¿ëÇÁ·Î±×·¥ ½Ã¸®¾ó ³Ñ¹öÀÇ Ãë¾àÁ¡°ú ¹æ¾î¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- recent shelLcode developments : ½©ÄÚµå ÀÛ¼º¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- reverse engineering panel : ¸®¹ö½º ¿£Áö´Ï¾î¸µÀ» ÁÖÁ¦·Î Åä·ÐÇÕ´Ï´Ù.

  Hit : 2033     Date : 2011/05/25 01:14



    
bluemario °³ÀÎÀûÀ¸·Î -> Attacking WiFi with traffic injection ÀÌ°Å Çϱ¸ ½Í³×¿ä ¤»¤»¤»

±×¸®°í ¹®¼­¹ø¿ª°°Àº°Íµµ Çϸé ÁÁÀ»°Í°°Àºµ¥,, ¤»¤»
2011/05/26  
lycan Web Application Hacking ÀÌ ¹ßÇ¥´Â µ¿¿µ»óÀÌ ¾ø´Â°Í °°¾Æ¿è~ 2011/05/27  
raepid9988 Àú´Â °³ÀÎÀûÀ¸·Î Hardening Registration Number Protection Schemes ¿ä°Å Çѹø Çغ¸°í ½Í¾î¿ä ¤¾;; 2011/05/27  
raepid9988 malware analysis µµ Èï¹Ì·Î¿ï°Å °°Àºµ¥¿ä? ¤¾¤¾ 2011/05/27  
lycan Àúµµ Attacking WiFi with traffic injection ÀÌ°Å ÇÑÇ¥¿è~
Áö±Ý º¸°í Àִµ¥ ¾ï¾çÀÌ µ¶Æ¯ÇÏ³×¿ä ¤§¤§¤§
2011/05/27  
ahotsuna Àúµµ ¾îÅÂÅ· ¿ÍÀÌÆÄÀÌ¿¡ ÇÑÇ¥¿ä!
¿äÁò ÈïÇÏ´Â ±â¼úÀ̶ó ±Ã±ÝÇÕ´Ï´Ù
2011/05/27  
W.H. Àü

Attacking WiFi with traffic injection
Anonymous Blogging Submission

¿¡ ÇÑÇ¥¿ä!
2011/05/27  
blaisepscal Àú´Â Malware Analysis ¿¡ ÇÑÇ¥. !

¸»¿þ¾î ºÐ¼® ¿äÁòÀ» ÇÏ°í À־ µµ¿òÀÌ ¸¹ÀÌ µÉ °Í °°±âµµ ÇØ¿ä
2011/05/27  
47   WIKI ¶Ç ´Ù¿îµÅ¼­ ÆÄÆ® 7 ¿©±â¿¡ ¿Ã¸³´Ï´Ù     ¸Û¸Û
06/02 1694
46   ÆÄÆ® 7,8 ¸¶¹«¸® °ü·Ã..[1]     ¸Û¸Û
05/30 1466
45   µ¿¿µ»ó ÆÄÀÏÀÔ´Ï´Ù. <- ÀÌ µ¿¿µ»óÀº Á¤ÇØÁø µ¿¿µ»óÀÌ ¾Æ´Ï¿¡¿ä~~[8]     W.H.
05/27 1773
  µÎ ¹ø° ¹ø¿ª ´ë»ó ¹Ì¸® Á¤ÇսôÙ~[8]     ¸Û¸Û
05/25 2032
43   Á¦ 1ȸ ¹ø¿ª ÀÚ¸· ´Þ¾ÆÁÖ½Ç ºÐ ã½À´Ï´Ù~[3]     ¸Û¸Û
05/25 1838
42   ÆÄÆ® 7, 8¸¸ Á¶±Ý ´õ º¸°­ÇÏ°í ¹ø¿ª Á¾·áÇÏ°Ú½À´Ï´Ù~!     ¸Û¸Û
05/25 1597
41   ¸®½º´× & ¹ø¿ª ½ÃÀÇ ±ÔÄ¢ÀÌ ¾÷µ¥ÀÌÆ® µÇ¾ú½À´Ï´Ù.     ¸Û¸Û
05/21 1662
40   5¿ù 20ÀÏ Á¤Æà ³»¿ë ¿ä¾àÀÔ´Ï´Ù.[4]     ¸Û¸Û
05/21 1595
39   ¸¶Áö¸·, ÆÄÆ® 7~9 ¸µÅ©ÀÔ´Ï´Ù.[2]     ¸Û¸Û
05/20 1343
38   ¹ø¿ªÆÀ ºÐµé ÀüÈ­¹øÈ£Á» ÂÊÁö·Î º¸³»ÁÖ¼¼¿ä~     ¸Û¸Û
05/17 1599
37   ¿À´Ã ÀÛ¾÷ ÇÒ ÆÄÆ® 4~6 ¸µÅ©ÀÔ´Ï´Ù.[4]     ¸Û¸Û
05/17 1623
36   À¯Æ©ºê µ¿¿µ»ó ¾÷·Îµå[3]     d4rkang3l
05/16 1846
35   ÆÄÆ®2 ¾î¶»°Ô µÈ°ÅÁÒ..[2]     ahotsuna
05/16 1697
34   ´ÙÅ©¿£Á©´Ô~~     ¸Û¸Û
05/16 1495
33   ¹ø¿ªÆÀ ºÁÁÖ¼¼¿ä~ äÆùæ Á¤Æà ½Ã°£ÀÔ´Ï´Ù.[1]     ¸Û¸Û
05/16 1588
32   5¿ù 16~20ÀÏ °£ÀÇ ¹ø¿ª ½ºÄÉÁìÀÔ´Ï´Ù.     ¸Û¸Û
05/16 1501
31   ÆÄÆ® 3µµ °°ÀÌ ÇÒ²²¿ä~     ¸Û¸Û
05/16 1568
30   ÆÄÆ® 2¿¡ ´ëÇÑ Çùµ¿ ¸®½º´×&¹ø¿ªÀ» ÁøÇàÇÕ´Ï´Ù.     ¸Û¸Û
05/16 1714
29   ÆÄÆ® 1Àº ÀÌÁ¤µµ·Î ¿Ï·á Áþ°Ú½À´Ï´Ù.[2]     ¸Û¸Û
05/16 1495
28   WIKI°¡ ¼­¹ö°¡ ÀϽà ´Ù¿îµÇ¾ú½À´Ï´Ù.[2]     ¸Û¸Û
05/16 1571
27   ¾ÕÀ¸·Î ¸®½º´×&¹ø¿ªÇϸé ÁÁ°Ú´Ù°í »ý°¢µÇ´Â µ¿¿µ»óµéÀÔ´Ï´Ù.     ¸Û¸Û
05/15 1824
26   ºÐÇÒµÈ µ¿¿µ»óÀ» À¯Åõºê¿¡ ¿Ã·ÁÁÖ½Ç ºÐ ã½À´Ï´Ù.[2]     ¸Û¸Û
05/15 1745
25   7¹ø ÆÄÀÏ[4]     ¼­°æÀç
05/15 1483
24   À§Å° ÆäÀÌÁö º¯°æ ¹× ¸ðµÎ ¸¸µé¾î ³õ°Ú½À´Ï´Ù. + ¸Û¸Û´Ô Çѹø ºÁÁÖ¼¼¿ä[1]     W.H.
05/13 1793
23   ÆÄÆ® 1¿¡ ´ëÇÑ Çùµ¿ ¹ø¿ªÀ» ÁøÇàÇÕ´Ï´Ù.     ¸Û¸Û
05/13 1583
[1][2] 3 [4]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org