사고대응관련 기관
| 국내 |  CERTCC-KR   -  http://www.certcc.or.kr/ | 
| 국외 |  FIRST    -    http://www.first.org/ | 
■ 취약성 정보 제공 사이트
| CVE | |
| CERTCC-KR | |
| Securityfocus | |
| CERTCC | |
| CIAC | |
| SANS ISC | 
■ PGP software
| PGPi | |
| GnuPG | 
 Part II: 유닉스 피해시스템 분석
 ■ 분석 도구
|  netcat |  http://www.atstake.com/research/tools/network_utilities/ | 
| lsof | |
| nmap |  http://www.nmap.org | 
| chkrootkit | |
| sleuthkit/autopsy | |
| TCT | |
| 분석도구링크사이트 |  http://www.sleuthkit.org/links.php | 
| 분석 CD |  snarl  -  http://snarl.eecue.com/articles/ | 
■ 무결성 관련 사이트 및 도구
| Tripwire | |
|  SUN fingerprint  | http://sunsolve.Sun.COM/pub-cgi/show.pl?target=content/content7 | 
| Known Goods | |
| Cyber Abuse | |
| NIST NSRL | |
| Hacker Keeper | 
■ LKM 관련 자료
| Solaris LKM/BSD LKM/Linux LKM | |
| Knark 분석문서 |  http://www.certcc.or.kr/paper/paper-2.htm | 
| Runtime Kernel Patch | |
| Adore LKM | |
| kstat | |
| carbonite | 
■ log 분석 및 관리
| Counterpane | 
■ 코드분석
| strace | |
| ltrace | |
| fenris | |
| REC | |
| IDA Pro | 
Part III: Windows 피해시스템 분석
■ 디스크 복제
| EnCase | http://www.guidancesoftware.com/ | 
| Safeback | http://www.forensics-intl.com/ | 
| Ghost | |
| TrueImage | http://www.acronis.com/products/trueimage/ | 
| Windows dd | http://unxutils.sourceforge.net/ http://fire.dmzs.com/ | 
| VOGON Image | http://www.vogon-international.com | 
| Fastbloc | http://www.guidancesoftware.com | 
| netcat | http://www.atstake.com/ http://sourceforge.net/projects/cryptcat/ | 
■ 피해 정보 수집
| psinfo, uptime, loggedon, pslist, listdlls, handle, streams | http://www.sysinternals.com | 
| fport/vision, sfind | http://www.foundstone.com | 
| promiscdetect | http://ntsecurity.nu/toolbox/promiscdetect | 
| listmodules, LNS | http://www.ntsecurity.nu/ | 
■ 초기대응 자동화 도구
| Biatchux | http://biatchux.dmzs.com/ | 
| IRCR | http://packetstormsecurity.nl/Win/IRCR.zip | 
■ 파일 분석
| fs | http://protools.anticrack.de/files/utilities/fs.zip | 
| SECRETS | http://www.invisiblesecrets.com | 
| EnCase | http://www.guidancesoftware.com | 
| FTK | http://www.accessdata.com | 
| bintext | http://www.foundstone.com | 
■ NT 루트킷
| NT 루트킷 동작원리 | http://www.phrack.org/show.php?p=55&a=5 | 
| NT 후크(hook) 프로그래밍 | http://www.iamaphex.cjb.net | 
| NT 후크(hook) API | http://www.anticracking.sk/elicz | 
| HookTool | http://www.ivosoft.com/ | 
| Windows API 보호 프로그램 | http://www.watchguard.co.kr/slock.htm | 
■ 디스크 분석
| 디스크 탐색기 | http://www.restorer2000.com http://www.runtime.org/ | 
| 플로피디스크/하드디스크 분석 | http://home.ahnlab.com/securityinfo | 
| Seagate 디스크 유틸리티 | http://www.seagate.com/support/software | 
| Maxtor 디스크 유틸리티 | http://www.maxtor.com/en/index.htm | 
| SAMSUNG 디스크 유틸리티 | http://www.sec.co.kr | 
| 슬랙 공간 검색 프로그램(NTI) | http://www.secure-data.com | 
■ 메모리 덤프
| Windows NT memory dumps | http://support.microsoft.com/default.aspx?scid=KB;EN-US;Q235496& | 
| Windows 2000/xp/2003 memory dumps | http://support.microsoft.com/default.aspx?scid=KB;EN-US;Q254649& | 
| Windows Debugging Tools | http://www.microsoft.com/whdc/ddk/debugging/default.mspx | 
| pmdump | http://ntsecurity.nu/toolbox/pmdump | 
■ Timeline 분석
| Wininterrogate | http://winfingerprint.sourceforge.net | 
| 
 | 
 | 
■ 파일 복구
| 휴지통 폴더 분석(Rifiuti) | http://sourceforge.net/projects/odessa | 
| 파일 복구(Undelete) | http://www.execsoft.com/undelete | 
| GetDataBack | http://www.runtime.org | 
| File Recover | http://www.filerecover.com | 
■ 임시파일 분석
| Cache Auditor | http://www.webknacks.com | 
| PurgeIE Pro | http://www.purgeie.com | 
| History Reader | http://www.wbaudisch.de/HistoryReader.htm | 
| IE Cookie File IE Internet Activity | http://sourceforge.net/project/odessa | 
| Examiner | http://www.paraben-forensics.com/examiner.html | 
■ 로그 파일 분석
| NT Security Event IDs | http://support.microsoft.com/default.aspx?scid=kb;en-us:174074 --> x | 
| Event ID 검색 | |
| Windows 2000 Event IDs | http://www.microsoft.com/korea/windows2000/techinfo/messages/default.asp | 
| EventCombMT | http://www.microsoft.com/downloads/release.asp?releaseid=36834 | 
| 이벤트 로그 모니터링 | http://www.tntsoftware.com | 
| 원격 이벤트 로그 수집 | http://www.kiwisyslog.com/ http://www.rippletech.com | 
| Log Parser | http://www.microsoft.com/windows2000/downloads/tools/default.asp | 
| 웹서버 공격 로그 점검 | http://www.securitymap.net/sdm/docs/ids/fingerprint-80-attack.txt | 
| Log Parser | http://securityfocus.com/infocus/1712 | 
| SQL-Inject 공격 분석 | http://www.nextgenss.com/papers/advanced_sql_injection.pdf http://www.spidynamics.com/whitepapers/WhitepaperSQLInjection.pdf | 
■ 바이너리 프로그램 분석
| Filemon, Regmon, CPUmon, TDImon, procexp, strings | http://www.sysinternals.com | 
| Winalysis | http://www.winalysis.com | 
| strace | http://razor.bindview.com/tools | 
| Tripwire | http://www.tripwire.com | 
| Undelete 3.0 | http://www.execsoft.com/undelete | 
| INTACT | http://www.pedestalsoftware.com | 
| API Spy | http://www.matcode.com/apis32.htm | 
| SoftICE | http://www.numega.com/ | 
| PE File Format | http://spiff.tripnet.se/~iczelion/files/pe1.zip http://www.windowsitlibrary.com/Content/356/11/toc.html | 
| PEiD | http://www.mesa-sys.com/~snaker/peid | 
| UPX | http://upx.sourceforge.net | 
| gt030 | http://surf.to/phax | 
| fd/fi FileScanner | http://protools.anticrack.de/files/utilities/fd.zip http://protools.anticrack.de/files/utilities/fi.zip | 
| Programmer’s Tools | http://protools.cjb.net/ | 
| IDA Pro | http://www.datarescue.com/idabase/ida.htm | 
| PE Exploere | http://www.heaventools.com | 
■ 패스워드 해독
| @stake LC | http://www.atstake.com/ | 
| John the Ripper | http://www.openwall.com/john/ | 
| chntpw | http://ntpass.blaa.net | 
| rawwrite2 | http://home.eunet.no/~pnordahl/ntpasswd | 
| 패스워드 복구 프로젝트 | http://www.openwall.com/passwords | 
| ELCOMSOFT | http://www.crackpassword.com | 
| Russian password crackers | http://www.password-crackers.com | 
| Passware Kit | http://www.lostpassword.com | 
| AccessData | http://www.accessdata.com | 
| PasswordService | http://www.passwordservice.com | 
Part IV: 공격자 모니터링
■ 네트워크 모니터링
| TCPDump | |
| tcpflow | |
| ngrep | |
| ethereal | |
| snort | |
| p0f | |
| dsniff | 
■ 시스템 모니터링
| sebek | |
| ComLog | |
| evtsys | https://engineering.purdue.edu/ECN/Resources/Documents/UNIX/evtsys | 
| 원격 이벤트 로그 수집 | 
■ Honeynet/Honeypot
| Honeynet.Org | |
| backofficer | |
| Deception Toolkit | |
| Honeyd | |
| Tracking Hackers | |
| Honeypots.net | |
| bridge Firewall | http://doc.kldp.org/wiki.php/DocbookSgml/Bridge_Firewall-KLDP | 
| Firewall 관련자료 | |
| Netfilter | http://doc.kldp.org/wiki.php/DocbookSgml/Netfilter-hacking-TRANS | 
|  Firewall 설정  | |
| Vmware | |
| UML | 
Part IV: 공격자 추적 및 대응
| samspade | |
| ARIN | |
| APNIC | |
| RIPE | |
| LACNIC | |
| KRNIC | |
| 이메일 환경개선 추진 협의체 | |
| Network Abuse Clearinghouse | |
| Fight Spam | |
| Spamcop | |
| Mail Abuse Prevention System | 
댓글