본문 바로가기

정보보호 (Security)368

Stuxnet Redux: Questions and Answers Stuxnet continues to be a hot topic. Here's an updated set of Questions and Answers on it. Q: What is Stuxnet? A: It's a Windows worm, spreading via USB sticks. Once inside an organization, it can also spread by copying itself to network shares if they have weak passwords. Q: Can it spread via other USB devices? A: Sure, it can spread anything that you can mount as a drive. Like a USB hard drive.. 2010. 11. 29.
Hash Cracking tutorial with HashCat HashCat is a tool for cracking various types of hash. This tool can do more than one Hash cracking, which means we can put some hashes into a file.txt and it crack the hashes simultaneously. we can do offline cracking hashes (it means we don`t need an Internet connection that uses the hash databases that have been cracked before). the hash algorithm supported by this tool include: * MD5 * Md5 ($.. 2010. 11. 22.
「알기쉬운 무선랜 보안 안내서」 배포 방송통신위원회(위원장 최시중)와 한국인터넷진흥원은 안전한 무선랜 이용을 위해 누구나 무선랜 접속장치의 보안설정을 쉽게 따라할 수 있도록 하는「알기쉬운 무선랜 보안 안내서」를 마련하여 배포하기로 하였다. 이번에 마련한 무선랜 보안 안내서는 ▲무선랜 서비스 개념 ▲무선랜 보안의 필요성 ▲무선랜 안전 이용 수칙 ▲무선랜 보안설정 방법 등의 내용을 담고 있으며, 개인적으로 무선랜 서비스를 이용하는 일반 이용자들은 누구나 쉽게 이해하고 따라할 수 있도록 안내하고 있다. 무선랜 보안 안내서는 방송통신위원회 홈페이지(www.kcc.go.kr) 및 한국인터넷진흥원(KISA) 보호나라 홈페이지(www.118.or.kr)에서 내려받을 수 있으며, 전국 지자체(246개)의 협조를 통해 지자체 민원실에 안내서(각 5부씩)를 .. 2010. 10. 21.
Tracking the IMDDOS Botnet For the compelete report on the IMDDOS Botnet, Tracking the Global Growth of the IMDDOS BotnetThe newly discovered IMDDOS Botnet is a commercial DDoS service. The botnet grew large very quickly. Beginning testing in April 2010, it reached a production peak activity by the second week of August of 25,000 unique recursive DNS lookups/hour to the command-and-control (CnC) servers. This paper detail.. 2010. 9. 17.
Password Patterns In December 2009, a critical data breach in the Internet has been experienced. Around 32 million user passwords of rockyou.com web portal was stolen by a hacker which had used SQL injection for his attack. He got all passwords and made them anonymously (i.e. without usernames) available in the Internet to download. Security experts started analyzing the passwords and Imperva released a study reg.. 2010. 9. 16.
728x90