Security. Computer Center, CS, NCTU 2 FreeBSD Security Advisories .
[NCTU] [CCCA] Network Security II
-
Upload
xatierlike-lee -
Category
Technology
-
view
247 -
download
2
Transcript of [NCTU] [CCCA] Network Security II
![Page 1: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/1.jpg)
Network SecurityNCTU CSCC xatier2012.12.24
![Page 2: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/2.jpg)
Security?
![Page 3: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/3.jpg)
![Page 5: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/5.jpg)
![Page 6: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/6.jpg)
Security?
![Page 7: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/7.jpg)
Security?
![Page 8: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/8.jpg)
True Story
![Page 9: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/9.jpg)
http://i.imgur.com/k1qoD.jpg
![Page 10: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/10.jpg)
evil input
![Page 11: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/11.jpg)
SQL injection
![Page 12: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/12.jpg)
pangolin
http://nosec.org/en
![Page 14: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/14.jpg)
XSS
![Page 15: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/15.jpg)
XSShttp://thehackernews.com/2012/11/xss-vulnerability-in-apple-website.html#
![Page 16: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/16.jpg)
XSRF
![Page 17: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/17.jpg)
Burp Suite打嗝套房
http://www.portswigger.net/burp/
![Page 18: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/18.jpg)
social engineering
![Page 19: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/19.jpg)
social engineering駭客大騙局
欺騙的藝術:人心控制的安全要素The Art of Deception: Controlling the Human Element of Security
![Page 20: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/20.jpg)
social engineeringSET!
http://www.social-engineer.org/
![Page 21: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/21.jpg)
social engineeringcosmo the God
http://wired.tw/2012/10/03/cosmo-the-god-who-fell-to-earth-1/index.html
![Page 22: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/22.jpg)
air crack!空氣爆破術
![Page 23: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/23.jpg)
air crack!空氣爆破術
![Page 24: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/24.jpg)
air crack!空氣爆破術http://www.aircrack-ng.org/
![Page 25: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/25.jpg)
air crack!空氣爆破術http://www.aircrack-ng.org/feedingbottle 奶瓶beini Linuxhttp://beini.en.softonic.com/
![Page 26: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/26.jpg)
phishing
![Page 27: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/27.jpg)
phishing
![Page 28: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/28.jpg)
phishing
![Page 29: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/29.jpg)
exploit vulnerabilityJohn von Neumann 對於圖靈機實作的天然缺陷
data / program 傻傻分不清楚
圖靈機能夠複製自己!
我的 data 你的 code >/////<
![Page 30: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/30.jpg)
metasploithttp://www.metasploit.com/
open source!
plugins and scripts (Ruby)
![Page 31: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/31.jpg)
ms08067
![Page 32: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/32.jpg)
ms08067
Allow Remote Code Execution !
![Page 33: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/33.jpg)
Programming LanguageVulnerable design in the programming language.
http://www.nruns.com/_downloads/advisory28122011.pdf
![Page 34: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/34.jpg)
surf the net secretly
![Page 35: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/35.jpg)
ssh tunneling ssh -NfD [localport] you@bsd1
proxy: localhost:[localport]
proxychains!
![Page 36: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/36.jpg)
VPN
virtualprivatenetwork
![Page 37: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/37.jpg)
PPTPThe Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.
![Page 38: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/38.jpg)
the Tor project
https://www.torproject.org/
![Page 39: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/39.jpg)
News
thehackernews.comwww.hack-stuff.comcoolshell.cnsecurity-sh3ll.blogspot.tw
![Page 40: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/40.jpg)
wargameshttp://hitcon.org/2012/wargame.html
最簡單的第零題:http://hitcon.org!
![Page 41: [NCTU] [CCCA] Network Security II](https://reader034.fdocuments.net/reader034/viewer/2022052410/5549d08fb4c905856d8b4d3e/html5/thumbnails/41.jpg)
happy hacking
:-)