97, 4/4 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   ¸Û¸Û
   http://www.hackerschool.org
   [°øÁö] RECON 2005 ¹ßÇ¥ÀÚ·á ¸ñ·ÏÀÔ´Ï´Ù

http://www.hackerschool.org/HS_Boards/zboard.php?id=HS_Translate&no=2 [º¹»ç]


À¯¸íÇÑ ÇØ¿Ü º¸¾È ÄÁÆÛ·±½º·Î¼­ BlackHat, Defcon, RECON, ShmooCon, CansecWest, rootedCon, HITB µîÀÌ ÀÖ½À´Ï´Ù.

À̵é Áß RECONÀ» ù ¹ø° ¹ø¿ª ´ë»óÀ¸·Î ¼±Á¤ÇØ º¸¾Ò½À´Ï´Ù.

RECONÀº Áö³­ 2005³âÀ» ½ÃÀÛÀ¸·Î ¸Å³â ij³ª´Ù ¸óÆ®¸®¿Ã¿¡¼­ °³ÃֵǴ º¸¾È ÄÁÆÛ·±½º·Î¼­,
Reverse Engineering ¹× ÃֽŠExploit, ±×¸®°í 0-day ¹ß°ß ±â¼ú¿¡ ÁßÁ¡À» µÎ°í ÀÖ´Ù´Â Á¡ÀÌ ¸Å·ÂÀûÀÔ´Ï´Ù.
RECONÀÇ °ø½Ä À¥ »çÀÌÆ®´Â http://recon.cx À̸ç, ÄÁÆÛ·±½º Á¾·á ÈÄ archive ¸Þ´º¸¦ ÅëÇØ ¹ßÇ¥ µ¿¿µ»óµéÀ» °ø°³ÇÕ´Ï´Ù.

ÀÌ Áß Ã¹ ÄÁÆÛ·±½º¿´´ø 2005³â¿¡¼­ºÎÅÍ ¸®½º´×&¹ø¿ªÀ» ½ÃÀÛÇØ ³ª°¡·Á°í ÇÕ´Ï´Ù.
2005³âÀÇ ¹ßÇ¥ ÁÖÁ¦µéÀ» Á¤¸®ÇÏ¸é ´ÙÀ½°ú °°½À´Ï´Ù.

[¹ßÇ¥ ÁÖÁ¦]
http://2005.recon.cx/en/s/jlloyd.html
[¹ßÇ¥ ÀÚ·á]
http://2005.recon.cx/recon2005/papers/
[樨毢]
http://www.archive.org/details/Recon2005videos


- Anonymous Blogging Submission : ÀÎÅÍ³Ý ±ÔÁ¦°¡ ÀÖ´Â ±¹°¡¸¦ À§ÇØ ÀÍ¸í ºí·Î±ë ¹æ¹ýÀ» ¼³¸íÇÕ´Ï´Ù.
- Binary Protection Schemes : ¹ÙÀ̳ʸ® ºÐ¼®À» ¹æÁöÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¸®´ª½º¸¦ ±â¹ÝÀ¸·Î ¼³¸íÇÕ´Ï´Ù.
- Attacking WiFi with traffic injection : ¹«¼±·£ ±âÃÊ, WEP Å©·¢, ±×¸®°í traffic injectionÀ» ÅëÇÑ ÁÖº¯Àå¾Ç ¹æ¹ýÀ» ¼³¸íÇÕ´Ï´Ù.
- reversing the commercial web for fun and knowledge : ±¸±ÛÇØÅ·, JS ³­µ¶È­ µî¿¡ ´ëÇØ ´Ù·ì´Ï´Ù.
- Web Application Hacking : À¥ÇØÅ·À» ¿¹Á¦¿Í ÇÔ²² ´Ù·ì´Ï´Ù.
- The Dark Side of Winsock : winsock°ú À̸¦ ÀÌ¿ëÇÑ ¹éµµ¾î¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Encrypted P2P and VoIP Spaces with CUTLASS : P2P¿Í voip ÇÁ·ÎÅäÄÝÀ» ¾ÈÀüÇÏ°Ô ¾ÏȣȭÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Syllogistic Application Testing : ÀÀ¿ëÇÁ·Î±×·¥ º¸¾È Å×½ºÆÿ¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Visual Analysis: 2D Does it Better in Color : ÅؽºÆ®°¡¾Æ´Ñ ºñÁê¾óÇÑ ·Î±×¸¦ Ç¥ÇöÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Practical Attacks on a Prox Card : Çϵå¿þ¾îÀûÀÎ door lock °ø°Ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Introduction to network programming with libevent. libdnet and libnids : network ÇÁ·Î±×·¡¹Ö ¶óÀ̺귯¸®¸¦ ¼³¸íÇÕ´Ï´Ù.
- Using honeyclients to discover new attacks : client ±â¹ÝÀÇ honeypot¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Passive Asset Detection System : invisibleÇÏ°Ô ³×Æ®¿öÅ© Á¤º¸¸¦ ¼öÁýÇÏ´Â ¹æ¹ý¿¡ ¼³¸íÇÕ´Ï´Ù.
- Auditing Source Code : C/C++ ¾ð¾î¿¡¼­ÀÇ º¸¾È Ãë¾àÁ¡ ¼³¸í°ú À̸¦ ã´Â ¹æ¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Process Stalking: Run Time Visual RCE : ¹ÙÀ̳ʸ® ¸®¹ö½ÌÀ» À§ÇÑ ÇÁ·Î¼¼½º ÃßÀû ¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Improving Network Security by Adding Randomness : OpenBSDÀÇ ³×Æ®¿öÅ© º¸¾È°ú Ãë¾àÁ¡¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Malware Analysis : ¾Ç¼ºÄÚµå ºÐ¼®¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- Hardening Registration Number Protection Schemes : ÀÀ¿ëÇÁ·Î±×·¥ ½Ã¸®¾ó ³Ñ¹öÀÇ Ãë¾àÁ¡°ú ¹æ¾î¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- recent shelLcode developments : ½©ÄÚµå ÀÛ¼º¹ý¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù.
- reverse engineering panel : ¸®¹ö½º ¿£Áö´Ï¾î¸µÀ» ÁÖÁ¦·Î Åä·ÐÇÕ´Ï´Ù.

ÀÌ Áß¿¡ Auditing Source Code ¸¦ ¸®½º´×&¹ø¿ª ´ë»óÀ¸·Î ¼±Á¤ÇÏ°íÀÚ ÇÕ´Ï´Ù.
¼±Á¤ ÀÌÀ¯´Â ÀÏ´Ü ÁÖÁ¦°¡ Èï¹Ì·Î¿ì¸ç, ¹ßÇ¥ÀÇ ·¯´×ŸÀÓÀÌ ¾à 47ºÐÀ¸·Î ªÀºÆíÀ̶ó ù ÀÛ¾÷À¸·Î ¸öÇ®±â¿¡ ÁÁÀ» °Í
°°½À´Ï´Ù. ±×¸®°í ¹ßÇ¥ÀÚÀÎ Nishchal Bhalla´ÔÀÌ Àεµ°è¿­À̶ó ¿ø¾î¹Î´ÔµéÀÇ ¹öÅÍ ¹ßÀ½¿¡ ºñÇØ ºñ±³Àû ¸®½º´×ÀÌ ½±½À´Ï´Ù.
(ÀßÇϽô ºÐµéÀº ¿ÀÈ÷·Á ¾à°£ ´ä´äÇÏ°Ô µé¸± ¼öµµ ÀÖÀ» °Í °°³×¿ä.)

´ÙÀ½Àº ¹ßÇ¥ ÀÚ·á¿Í µ¿¿µ»óÀÔ´Ï´Ù.

http://2005.recon.cx/recon2005/papers/Nish_Bhalla/Security_Compass_Defects_Overview_final.pdf

http://www.archive.org/download/Recon2005videos/recon2005_nish_bhalla_auditing_source_code.avi

ÀÌÁ¦ ÀÌ µ¿¿µ»óÀ» ¿©·¯°³·Î ºÐÇÒÇÏ¿© ¸®½º´×&¹ø¿ªÀ» ÇÒÅÙµ¥, ±× Àü¿¡ À§ PDF ÆÄÀÏÀ» ¸ÕÀú º¸½Ã¸é Àü¹ÝÀûÀÎ È帧À»
ÀÌÇØÇϴµ¥ µµ¿òÀÌ µÉ °Í °°½À´Ï´Ù.



  Hit : 3006     Date : 2011/05/03 06:32



    
22   Á¦ 1ȸ ¹ø¿ª ÁøÇà »óȲÀÔ´Ï´Ù.[1]     ¸Û¸Û
05/11 1635
21   ±³Á¤ ´ã´çÀÚµéÀ» Ãß°¡ ¸ðÁýÇÕ´Ï´Ù.     ¸Û¸Û
05/11 1528
20   8¹ø ÆÄÆ®ÀÔ´Ï´Ù[1]     Prox
05/11 1646
19   11ÀÏ ¼ö¿äÀÏ ³· 12½Ã¿¡ 1Â÷ Á¤¸®¸¦ ÇÏ°Ú½À´Ï´Ù.[1]     ¸Û¸Û
05/11 1587
18   °ÇÀÇ»çÇ×??[1]     ¼­°æÀç
05/10 1507
17   5¹ø ÆÄÀÏ[1]     ¼­°æÀç
05/10 1645
16   1¹ø ÆÄÆ® ÀÏ´Ü Áö±Ý±îÁö ÇÑ°Å ¿Ã¸³´Ï´Ù.[2]     W.H.
05/10 1746
15   2¹ø ÆÄÆ® ¸®½º´×&¹ø¿ªÀÔ´Ï´Ù.[2]     stardung86
05/09 1672
     [Çʵ¶] ¸®½º´× & ¹ø¿ª ½ÃÀÇ ±ÔÄ¢ÀÔ´Ï´Ù. [2] ¸Û¸Û 05/09 2260
13   4¹ø ÆÄÆ® ¸®½º´×&¹ø¿ª ³»¿ëÀÔ´Ï´Ù.[1]     ¸Û¸Û
05/09 1750
12   ÀÛ¾÷ÇÏ´Ù ¸·È÷½Å ºÐ, ±×¸®°í ÀÛ¾÷ ÇÒ´ç ¸ø¹ÞÀ¸½Å ºÐ ºÁÁÖ¼¼¿ä     ¸Û¸Û
05/06 1745
11   3¹ø° ÆÄÆ® ¾Èµé¸®´Â ºÎºÐ »©°í ´ÙÇß½À´Ï´Ù[9]     ahotsuna
05/04 1887
10   ¾ÆÂü ¹ø¿ª¹®Àº Á¸´ñ¸»·Î Àû¾îÁÖ¼¼¿ä~ (³Ã¹«)     ¸Û¸Û
05/04 1370
9   [1ȸ] recon - auditing source code ºÐÇÒ ÆÄÀÏÀÔ´Ï´Ù (ÃÑ 9°³)[8]     ¸Û¸Û
05/04 1879
8   À̹ø ÀÛ¾÷(nish_bhalla_auditing_source_code) ¿øº» ÆÄÀÏÀÌ¿ä.     W.H.
05/03 1729
7   À§¿¡ ¸Û¸Û´ÔÀÌ ¿Ã¸®½Å µ¿¿µ»óÀ¸·Î ÀÛ¾÷ÇØÁÖ¼¼¿ä~ (ÀÌ °Ô½Ã¹°X)[21]     W.H.
05/03 1750
6   ¸â¹öºÐµé ³×ÀÌÆ®¿Â or Ä«Åå or Æ®À§ÅÍ ±³È¯ÇØ¿ä[4]     ¸Û¸Û
05/03 2056
5   [°øÁö] Á¦ 1ȸ ¹ø¿ª ½ºÄÉÁìÀÔ´Ï´Ù. (ÁøÇà»óȲÀ» °¢ÀÚ ´ñ±Û·Î update)[10]     ¸Û¸Û
05/03 1774
4   [1ȸ] ¿ªÇÒ ºÐ´ãÇÕ´Ï´Ù.[1]     ¸Û¸Û
05/03 1750
3   [1ȸ] µ¿¿µ»ó ºÐÇÒÇØÁÖ½Ç ºÐ![2]     ¸Û¸Û
05/03 2138
     [°øÁö] RECON 2005 ¹ßÇ¥ÀÚ·á ¸ñ·ÏÀÔ´Ï´Ù ¸Û¸Û 05/03 3005
     [°øÁö] ¹ø¿ªÆÀ ¸â¹ö ¸ñ·ÏÀÔ´Ï´Ù. [33] ¸Û¸Û 05/03 3194
[1][2][3] 4

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org