사고대응관련 기관
국내 |
CERTCC-KR - http://www.certcc.or.kr/ |
국외 |
FIRST - http://www.first.org/ |
■ 취약성 정보 제공 사이트
CVE |
|
CERTCC-KR |
|
Securityfocus |
|
CERTCC |
|
CIAC |
|
SANS ISC |
■ PGP software
PGPi |
|
GnuPG |
Part II: 유닉스 피해시스템 분석
■ 분석 도구
netcat |
http://www.atstake.com/research/tools/network_utilities/ |
lsof |
|
nmap |
http://www.nmap.org |
chkrootkit |
|
sleuthkit/autopsy |
|
TCT |
|
분석도구링크사이트 |
http://www.sleuthkit.org/links.php |
분석 CD |
snarl - http://snarl.eecue.com/articles/ |
■ 무결성 관련 사이트 및 도구
Tripwire |
|
SUN fingerprint |
http://sunsolve.Sun.COM/pub-cgi/show.pl?target=content/content7 |
Known Goods |
|
Cyber Abuse |
|
NIST NSRL |
|
Hacker Keeper |
■ LKM 관련 자료
Solaris LKM/BSD LKM/Linux LKM |
|
Knark 분석문서 |
http://www.certcc.or.kr/paper/paper-2.htm |
Runtime Kernel Patch |
|
Adore LKM |
|
kstat |
|
carbonite |
■ log 분석 및 관리
Counterpane |
■ 코드분석
strace |
|
ltrace |
|
fenris |
|
REC |
|
IDA Pro |
Part III: Windows 피해시스템 분석
■ 디스크 복제
EnCase | http://www.guidancesoftware.com/ |
Safeback | http://www.forensics-intl.com/ |
Ghost | |
TrueImage | http://www.acronis.com/products/trueimage/ |
Windows dd | http://unxutils.sourceforge.net/ http://fire.dmzs.com/ |
VOGON Image | http://www.vogon-international.com |
Fastbloc | http://www.guidancesoftware.com |
netcat |
http://www.atstake.com/ http://sourceforge.net/projects/cryptcat/ |
■ 피해 정보 수집
psinfo, uptime, loggedon, pslist, listdlls, handle, streams |
http://www.sysinternals.com |
fport/vision, sfind | http://www.foundstone.com |
promiscdetect | http://ntsecurity.nu/toolbox/promiscdetect |
listmodules, LNS | http://www.ntsecurity.nu/ |
■ 초기대응 자동화 도구
Biatchux | http://biatchux.dmzs.com/ |
IRCR |
http://packetstormsecurity.nl/Win/IRCR.zip |
■ 파일 분석
fs |
http://protools.anticrack.de/files/utilities/fs.zip |
SECRETS | http://www.invisiblesecrets.com |
EnCase | http://www.guidancesoftware.com |
FTK | http://www.accessdata.com |
bintext | http://www.foundstone.com |
■ NT 루트킷
NT 루트킷 동작원리 | http://www.phrack.org/show.php?p=55&a=5 |
NT 후크(hook) 프로그래밍 | http://www.iamaphex.cjb.net |
NT 후크(hook) API | http://www.anticracking.sk/elicz |
HookTool | http://www.ivosoft.com/ |
Windows API 보호 프로그램 | http://www.watchguard.co.kr/slock.htm |
■ 디스크 분석
디스크 탐색기 | http://www.restorer2000.com http://www.runtime.org/ |
플로피디스크/하드디스크 분석 | http://home.ahnlab.com/securityinfo |
Seagate 디스크 유틸리티 | http://www.seagate.com/support/software |
Maxtor 디스크 유틸리티 | http://www.maxtor.com/en/index.htm |
SAMSUNG 디스크 유틸리티 | http://www.sec.co.kr |
슬랙 공간 검색 프로그램(NTI) | http://www.secure-data.com |
■ 메모리 덤프
Windows NT memory dumps | http://support.microsoft.com/default.aspx?scid=KB;EN-US;Q235496& |
Windows 2000/xp/2003 memory dumps | http://support.microsoft.com/default.aspx?scid=KB;EN-US;Q254649& |
Windows Debugging Tools | http://www.microsoft.com/whdc/ddk/debugging/default.mspx |
pmdump | http://ntsecurity.nu/toolbox/pmdump |
■ Timeline 분석
Wininterrogate | http://winfingerprint.sourceforge.net |
|
|
■ 파일 복구
휴지통 폴더 분석(Rifiuti) | http://sourceforge.net/projects/odessa |
파일 복구(Undelete) | http://www.execsoft.com/undelete |
GetDataBack | http://www.runtime.org |
File Recover | http://www.filerecover.com |
■ 임시파일 분석
Cache Auditor | http://www.webknacks.com |
PurgeIE Pro | http://www.purgeie.com |
History Reader | http://www.wbaudisch.de/HistoryReader.htm |
IE Cookie File IE Internet Activity |
http://sourceforge.net/project/odessa |
Examiner | http://www.paraben-forensics.com/examiner.html |
■ 로그 파일 분석
NT Security Event IDs | http://support.microsoft.com/default.aspx?scid=kb;en-us:174074 --> x |
Event ID 검색 |
|
Windows 2000 Event IDs | http://www.microsoft.com/korea/windows2000/techinfo/messages/default.asp |
EventCombMT | http://www.microsoft.com/downloads/release.asp?releaseid=36834 |
이벤트 로그 모니터링 | http://www.tntsoftware.com |
원격 이벤트 로그 수집 | http://www.kiwisyslog.com/ http://www.rippletech.com |
Log Parser | http://www.microsoft.com/windows2000/downloads/tools/default.asp |
웹서버 공격 로그 점검 | http://www.securitymap.net/sdm/docs/ids/fingerprint-80-attack.txt |
Log Parser | http://securityfocus.com/infocus/1712 |
SQL-Inject 공격 분석 | http://www.nextgenss.com/papers/advanced_sql_injection.pdf http://www.spidynamics.com/whitepapers/WhitepaperSQLInjection.pdf |
■ 바이너리 프로그램 분석
Filemon, Regmon, CPUmon, TDImon, procexp, strings | http://www.sysinternals.com |
Winalysis | http://www.winalysis.com |
strace | http://razor.bindview.com/tools |
Tripwire | http://www.tripwire.com |
Undelete 3.0 | http://www.execsoft.com/undelete |
INTACT | http://www.pedestalsoftware.com |
API Spy | http://www.matcode.com/apis32.htm |
SoftICE | http://www.numega.com/ |
PE File Format | http://spiff.tripnet.se/~iczelion/files/pe1.zip http://www.windowsitlibrary.com/Content/356/11/toc.html |
PEiD | http://www.mesa-sys.com/~snaker/peid |
UPX | http://upx.sourceforge.net |
gt030 | http://surf.to/phax |
fd/fi FileScanner | http://protools.anticrack.de/files/utilities/fd.zip http://protools.anticrack.de/files/utilities/fi.zip |
Programmer’s Tools | http://protools.cjb.net/ |
IDA Pro | http://www.datarescue.com/idabase/ida.htm |
PE Exploere | http://www.heaventools.com |
■ 패스워드 해독
@stake LC | http://www.atstake.com/ |
John the Ripper | http://www.openwall.com/john/ |
chntpw | http://ntpass.blaa.net |
rawwrite2 | http://home.eunet.no/~pnordahl/ntpasswd |
패스워드 복구 프로젝트 | http://www.openwall.com/passwords |
ELCOMSOFT | http://www.crackpassword.com |
Russian password crackers | http://www.password-crackers.com |
Passware Kit | http://www.lostpassword.com |
AccessData | http://www.accessdata.com |
PasswordService | http://www.passwordservice.com |
Part IV: 공격자 모니터링
■ 네트워크 모니터링
TCPDump |
|
tcpflow |
|
ngrep |
|
ethereal |
|
snort |
|
p0f |
|
dsniff |
■ 시스템 모니터링
sebek |
|
ComLog |
|
evtsys |
https://engineering.purdue.edu/ECN/Resources/Documents/UNIX/evtsys |
원격 이벤트 로그 수집 |
■ Honeynet/Honeypot
Honeynet.Org |
|
backofficer |
|
Deception Toolkit |
|
Honeyd |
|
Tracking Hackers |
|
Honeypots.net |
|
bridge Firewall |
http://doc.kldp.org/wiki.php/DocbookSgml/Bridge_Firewall-KLDP |
Firewall 관련자료 |
|
Netfilter |
http://doc.kldp.org/wiki.php/DocbookSgml/Netfilter-hacking-TRANS |
Firewall 설정 |
|
Vmware |
|
UML |
Part IV: 공격자 추적 및 대응
samspade |
|
ARIN |
|
APNIC |
|
RIPE |
|
LACNIC |
|
KRNIC |
|
이메일 환경개선 추진 협의체 |
|
Network Abuse Clearinghouse |
|
Fight Spam |
|
Spamcop |
|
Mail Abuse Prevention System |
댓글