SlideShare ist ein Scribd-Unternehmen logo
1 von 53
Downloaden Sie, um offline zu lesen
C01-202
c)¸Ø¦”±
©1j
c)¸ØYaª~fY
ï[c)¸ØYaª
•   B
•   œRz
•   Â
•   H[ž€
•   µÈ
•   _”…;B
c)¸ØfY
•   ÿ_Øe´
•   NxØeûUd4eØÌ,Ml6*
•   F*
•   ˆ4b
•    8œ?
•   A7ªo
©2j
c)¸Øóè~tû
c)¸Øóè-ô̸Ø
• ô̸Ø8]§kæÁæéз뙆
  ý¿ÐL·
• lYô̸Ø,
 – ý (Masquerade)
 – g(Replay)
 – ù·(Message Modification)
 – œ(Denial of Service)
c)¸Øóè-—̸Ø
• —̸Ø8]§k(¢,)_{Ã*Y
  À_Æd (J(JÁI«™†·f
• lY—̸Ø,
 – ÿÓ(Eavesdropping)
 – ·Ã±(Traffic Analysis)
c)¸Øtû
          1ØŽ«

 8
Xǽ            2fz§:


                   3®ÃPž
7m˜


 6†Nx            4_{‹ÉÆ
          5dÆ
©3j
c)¸ØÙ,¿#7Á
lc)¸ØÙ,-œÙ
• œÙ¸Ø
 –   TCP SYN (SYN flood)
 –   Smurf ¸Ø
 –   Ping of Death
 –   LAND Attack
 –   Teardrop ¸Ø
lc)¸ØÙ,-FûÌ
• eØ7m
• @% (Worm)
• ÝõûÌ
lc)¸ØÙ,-Iü
•   ¹Ÿ=§:
•   WÁ¸Ø
•   ¹ÞÚ® (Session Hijacking)
•    Ô¸Ø (Replay Attack)
•   àP (Buffer Overflow)
•   ÿÓ (SniffingeEavesdropping)
•   _tˆû (Social Engineering)
•   دÁ (SQL Injection)
©3jc)¸ØÙ,¿#7Á

    œÙ¸Ø
œÙ¸Ø (1/2)
• œÙ¸Ø DoS (Deny of Service)
  – J8;c)ûUUÞ(¾³dˆ#œd
    –1)d jűc)ûU´Ðk´ë
    ·¦X›¯£Ð¼*jY
xdÀ@}Ž
    òW«Y
ÂÔd:Q4—¸ØYôÚÐc
    gÌ,ˆ#dø碵Ml¹jcgY
    ÒdÇ—œ¯.d¹”jôÚÐcgi
    ÐkJ¬ûÌÌ,ˆ#Y7.K1¿ÓûU
    …ÚdÌ,d6f
œÙ¸Ø (2/2)
• lY¸ØÙÌ
 – Smurf
 – TCP DoS: Land ¸ØeTeardrop¸ØeTCP SYN
   ¸Ø
 – UDP Flood DoS
 – ICMP DoS
±s̜ٸØ
• ±s̜ٸØH‰DDoS
 – ®±sY¸ØÙÌdL¥c)jDï
   DoS¸ØYôڝÛï¸Ød¯õÛœ«
   *[}Ž
t]ç¸ØYfzd¿ÓÁÙ
   ûU#7d ¬çÌ,Mld6f
DDoS ¸Øj¡
 ]§(1Ç
 DaemonûÌ client
                               daemon

¸Øk
            client             daemon



                               daemon
                                        a”ôÚ

                               daemon
          client   ICMP
                   Echoreply
                   Packets
                               daemon
             Internet ôÚ
TCP SYN (SYN flood) (1/2)
• ¸Øa#j
 – J;Âi4X›(TCP)m¹ÞÃ@ê¾@g£
   te(three way handshake)Yx›ÚSþ£f

 HOST
                                   HOST
  A
                                    B

  Send SYN              Receive SYN
  (seq=x)
   seq=x)               (seq=x)
                         seq=x)

                        Send SYN
  Receive SYN           (seq=y,
                         seq=y,
  (seq=y,
   seq=y,               ACK=x+1)
  ACK=x+1)
                        Receive ACK
  Receive ACK
                        (ack=y+1)
                         ack=y+1)
  (ack=y+1)
   ack=y+1)
TCP SYN (SYN flood) (2/2)
• ¸ØÙÌj
 – æÁ¸ØfzÔS¹HÞÿY8UgYSYN
   
f
 – a¸ØYûU6Z J×QACK«ÐYSYN
r
   Àõ•dQ×QÁÙYACK«ÐÐt@C‚
   Ûœ‘Eðf
 – ûU6ª‰×”QACK«Ðdþ4{•9
   rÀYSYN
þÌ,Žˆ#I44kYËf
Smurf ¸Ø (1/2)
• a#j
 – ICMP(Internet Control Message Protocol)

   ø1Ôc)Âi‹1qy¬Ã¹dø:Ùc)¾
   LYeØJIÞ«Ðf
 – :ÙÙÌ
   • ÁôÚgÂÔICMP echo request packet.
   • ðôÚ×QÛd·l6«ÐICMP echo reply packet.
   • ·lµH@ûJ_SH“ping”vÿ8:Ó
 – ªädøûÌ8;IP ProtocolÂÔ}Žping
   message 
Internetj¢µ(Úœd¿Ó}Ž
   Reply message¿Óc)t·Y#7f
Smurf ¸Ø (2/2)
• Smurf Dos Y¸ØÙÌj
 – }Ž*[ÿ¿YICMP echo Request
 – Zÿ¿Y
Ô?ggdÍ?gg6
   «}ŽYicmp«Ð
fzeØf¿Ó»
   µ4pYICMP echo reply
«ç¸ØY
   fzf
 – Í7jping -s 30000 192.168.30.255
   • µGÙÌHÞó}YÖdÔøf—H‰ ó}è
     smurf ¸Øf
Ping of Death
• a#
 – ˜Ping of Death™J¾_ïÔ@}Y ping Ë
   (ICMP echo request) dø¿ÓàP
   (Overflow)d1þ¬çÌ,Ml6*Ð…Úf
LAND Attack
• ¸Øk; IP ý Y¦”L·CZÔY
  
dZI8U~fY IP gi·ÓJfzÚ
  œY IP gdø¿Z8U~fz¹Ÿ=p·
  ‰Suf
• äG¸ØøÿT,*8ûUÐc)£ê…Ú
  Ì,Ml6*

                From : 60.44.35.11:23
                  TO: 64.44.35.11:23
                                           fzڜ
               8U~fYYIPß´                60.44.35.11
   ¸Øk
               8U~fYY¹Ÿ=´              Port 23 Open Crash
 211.3.56.22
Teardrop ¸Øa#
• a#j;IP
   Y
x†¸Øf
• ¸ØÙ,j
 – ïÔS¾$9£@Y
êlQfzeØdµ
   S
êl
^Y ÌYE=dµ4{µ
   
 Óa8YIP 
Ûd¬çc)ôÚ¬:
   
}ƒd¿ÓûU…Ú$e




 Ml˜êl           .l˜êl
œÙ~±s̜ٸØYÁ

• þJ4Дê4Y
• ¯)_œj£Ä
@éœÐ¼Ingress
  Filtering
døÜ8U”¥#ÐJfzJ
  broadcastY
• Ä Ä#æ
e]§»Ð]§k#ûU
• ¼?ãX(Disk Quota)

• ÄFjûU
• –?»-Ä LMæ
©3jc)¸ØÙ,¿#7Á

     FûÌ
eØ7m
• Þ”YeØûÌ(FûÌ)
 – B•mYûÌ(¯$›‹1hï*(½jÚ‚ªo)
• Gó
 – šÚèeæéèe6«èe$~1èePiè
 – 
G7m
• ¯ÙÌ
 – T[¯$›ÐûÌd7: .exe, .dll, .htm, .vbs, .js
• ÂÈÄ°
 – e‰eFTPec)yLeInternet c+íŽ
• fY
 – NxØe›SôÚe#7c)e*¸Ø
@% (Worm)
• ~7m¢ló'YF
  ûÌd(J(”êT
  ôûÌ1”Ù
¡
  ‰
• @%6ƒ8eØ
  UeL·ûU£›Ð¬
  çûUÌ,6*f
Ýõû̧W
• WÝõûÌ
 – a¤$~zÝõefH˜ûÌf
 – ¯Internetjd“$~zÝõ”·8S,ûÌ£[p¯
   I}c)jh1YÐûÌ•d£
^Yø›
   SÒYeØûUYûÌd¿ÓÒYûUØ
   .ƒe—NxŸôÚ#7YFYÃLÇ›ûÌf
 – Client (›SL) / Server (—›SL) Vôf
 – ?I$D
   •   ý
   •   =8Y¯‰
   •   ”¢?Ÿdp(”ô
QIüց
   •   d6‘ÒÐÒL=
Ýõû̱
• ÝõûÌ8U
 –   ûU—]§J¡”]
 –   F4k£YØ%
 –   B8)”üYûÌeÄ   —·@Yû́
 –   —c)@%
Q
• Ýõóè
 – ÃLÇ›è/Nxè/ŸµÏ}è/WÁÂÔè/FTPè
• ôÂgÙÌ
 – e‰qæéh1/À@*8ûUÐÐûÌ
   ®Ã—G”
• ôfY
 – ›SôÚeØÿ_e*¸Øe#7c)
FûÌYÁ
• Ä #m´
• Ä Ýõû̧:œ
• –?»-#m´eÝõû̧:œYØ«
©3jc)¸ØÙ,¿#7Á

    ¹Ÿ=§:
¹Ÿ=§:
    • TCP/IP X›d6 65536 H¹Ÿ=d*‰Á.
      ¹ŸYLÃ
     – TCP ~ UDP port
    • ¹Ÿ=§:Yôf®¯õ»
fzeØûU
      Ôš¼Y¹Ÿ=d†þ±IÞd6,c)
      ø¿4JnõSG*8ûU.
A          Port Scan                              B
                        Port 1000,2000,3000....
            ¸Ø
¹Ÿ=§:YÁ
• þ”ê4YÐûÌ
• 4)_œÀ_›Sö
e#æ
eþ##
  œ£›À_›SÚS
• 4IDSÆ9¹Ÿ=§:z
• EðЯ*8ûUÐJÐûÌYÆ9¾î
  (banner)
• ºtл-‰»ÄŒY*8ûUeÐûÌe
  ·ÃX›
©3jc)¸ØÙ,¿#7Á

     WÁ¸Ø
WÁ¸Ø
• vbN (Brute-force attack)
  – À@”Ù“
»¢G¥,¿©Y¥QM
    ½‰ßY¸ØÙ,
• ¿J¸Ø (Dictionary-Based attack)
  – ;lYWÁq¿d”Ù®·
¥SQN
    WÁ‰ß
                         y¬!!
  A                      y¬!!      B
            nîeWÁ
WÁ¸ØYÁ
• £›SHvxYWÁaÆþµHaÆ«
^
  ½hY£›:
 –   ¼
OÌWÁ»
 –   ¼WÁðõ—»
 –   ¼WÁð—4‚»
 –   ¼WÁy¬A›»
©3jc)¸ØÙ,¿#7Á

      ¹ÞÚ®
¹ÞÚ®Ya#
• Session Hijacking•ÖH‰˜¹ÞÚ® ™
• ¸Øa#j
  – …]§k¯4kî]ôÚ(Ó…½©dC
    †¹ÞÚ®d+¥,4k'ôÚœY¹Þ•Ùd
    ]§kYeØ_þ¥,4k~ÃLôÚ†¹d
    ]§kÀ_4a¥,4kÔÞÞÆÀ_Y
    ‚Uf
• Kra”õ1998Ë11ÜÜ3YHuntd ”Þ
  “daemon9”Ü3Yjuggernautdid6Session
  Hijacking
f
Session Hijacking YÁ
• D4Þd6ëLÌ…Ç(mutual
  authentication)
YX›7½IPSECeSSH
  dø­·ÃœYÄŒ.

            ÃLôÚ


      IPSEC / SSH
                       Ú®Ó
A                           B
                    ¸Ø0»
©3jc)¸ØÙ,¿#7Á

   Ô¸Ø (Replay Attack)
Ô¸Ø (Replay Attack)
• a#j
 – ¸ØkõÿÓc)d_(¾}Y·ÃPÙÂÔ
   Y¯ÇÃd˜© Ôµ…¯ÇÃøÿ½TH
   $ލ–LY4kdø:QÀ_ûUY]§f
   Yf
• Áj
 – –L£›®0õÞÖÛœS
 – ®ÆP£ÇYÄŒÌX›
©3jc)¸ØÙ,¿#7Á

  àP(Buffer Overflow)
àP (Buffer Overflow)
• £¯ûÌ•Ô
  SY¾³ï
             Í7:
             #include stdio.h
  ìt@4Ԑ
             #include string.h
  ˆ#YØŽÛd     void func(char *p)
                    func(char
  16¿ÓÔWY      {
                   char buffer1[10];
                        buffer1[10];
  àPYK          strcpy(buffer1,
                   strcpy(buffer1, p);
  1f               printf(buffer1);
                   printf(buffer1); }

               Int main (int argc, char *argv[])
                   main(int argc,       *argv [])
               {
               func(
               func(“I am the law in the network”);
                                           network”
                 return 0; }
àP˜ÄŒB¤
• Póè
 – I®(local buffer overflow)
 – ÃL(remote buffer overflow)
• ÄŒB¤
 – ‘c)ÿ_Ø
 – †*̸Ø
• #7Á
 – –?»-~Ä LMæ(patches)
 – ’5Ä ~4J¾»
Ьƴ
©3jc)¸ØÙ,¿#7Á

      ÿÓ
ÿÓ
• ÿÓJl—4Y—̸Ø,
 – Ú
(èV±«™
 – N÷WÌØ
• SnifferBÛ6ZTÄc)£›Ó‡Úˆ#
  |Ì(Promiscuous Mode), p1J”‚
  
Y@é
• ªÐÁj
 – 4switch _þ hub
 – 4ÄŒYX›ÐJ

Weitere ähnliche Inhalte

Was ist angesagt?

Додаток 3
Додаток 3Додаток 3
Додаток 3ymcmb_ua
 
17. pengantar teknik pondasi
17. pengantar teknik pondasi17. pengantar teknik pondasi
17. pengantar teknik pondasiKHRISTIAN MAUKO
 
Шпаргалки
ШпаргалкиШпаргалки
ШпаргалкиFr3net1c
 
Using Phing for Fun and Profit
Using Phing for Fun and ProfitUsing Phing for Fun and Profit
Using Phing for Fun and ProfitNicholas Jansma
 
Petunjuk pengisian lhkpn model a
Petunjuk pengisian lhkpn model aPetunjuk pengisian lhkpn model a
Petunjuk pengisian lhkpn model aGolden Saragih
 
Tercera parte parte del Cuaderno de Ingles
Tercera parte parte del Cuaderno de InglesTercera parte parte del Cuaderno de Ingles
Tercera parte parte del Cuaderno de InglesRicardo Aguilar
 
Solutions manual for operations research an introduction 10th edition by taha...
Solutions manual for operations research an introduction 10th edition by taha...Solutions manual for operations research an introduction 10th edition by taha...
Solutions manual for operations research an introduction 10th edition by taha...ricmka
 
Real Life Uses of a Program (Tik Tok Toy Game) useing by C Programming
Real Life Uses of a Program (Tik Tok Toy Game) useing by C Programming Real Life Uses of a Program (Tik Tok Toy Game) useing by C Programming
Real Life Uses of a Program (Tik Tok Toy Game) useing by C Programming Badhon Biswas
 
محاسبة البنوك
محاسبة البنوكمحاسبة البنوك
محاسبة البنوكJouhar119
 
An integrated-approach-to-intermediate-japanese
An integrated-approach-to-intermediate-japaneseAn integrated-approach-to-intermediate-japanese
An integrated-approach-to-intermediate-japaneseIto Ree
 
Flow of events during Media Player creation in Android
Flow of events during Media Player creation in AndroidFlow of events during Media Player creation in Android
Flow of events during Media Player creation in AndroidSomenath Mukhopadhyay
 
Mtk khoirul bab 1
Mtk khoirul bab 1Mtk khoirul bab 1
Mtk khoirul bab 1Zinoa
 
The smiley dictionary
The smiley dictionaryThe smiley dictionary
The smiley dictionaryadindayeti
 
Hangman Game Programming in C (coding)
Hangman Game Programming in C (coding)Hangman Game Programming in C (coding)
Hangman Game Programming in C (coding)hasan0812
 
Hebrew Bible as Data: Laboratory, Sharing, Lessons
Hebrew Bible as Data: Laboratory, Sharing, LessonsHebrew Bible as Data: Laboratory, Sharing, Lessons
Hebrew Bible as Data: Laboratory, Sharing, LessonsDirk Roorda
 

Was ist angesagt? (16)

Додаток 3
Додаток 3Додаток 3
Додаток 3
 
17. pengantar teknik pondasi
17. pengantar teknik pondasi17. pengantar teknik pondasi
17. pengantar teknik pondasi
 
Шпаргалки
ШпаргалкиШпаргалки
Шпаргалки
 
Using Phing for Fun and Profit
Using Phing for Fun and ProfitUsing Phing for Fun and Profit
Using Phing for Fun and Profit
 
Prelude to halide_public
Prelude to halide_publicPrelude to halide_public
Prelude to halide_public
 
Petunjuk pengisian lhkpn model a
Petunjuk pengisian lhkpn model aPetunjuk pengisian lhkpn model a
Petunjuk pengisian lhkpn model a
 
Tercera parte parte del Cuaderno de Ingles
Tercera parte parte del Cuaderno de InglesTercera parte parte del Cuaderno de Ingles
Tercera parte parte del Cuaderno de Ingles
 
Solutions manual for operations research an introduction 10th edition by taha...
Solutions manual for operations research an introduction 10th edition by taha...Solutions manual for operations research an introduction 10th edition by taha...
Solutions manual for operations research an introduction 10th edition by taha...
 
Real Life Uses of a Program (Tik Tok Toy Game) useing by C Programming
Real Life Uses of a Program (Tik Tok Toy Game) useing by C Programming Real Life Uses of a Program (Tik Tok Toy Game) useing by C Programming
Real Life Uses of a Program (Tik Tok Toy Game) useing by C Programming
 
محاسبة البنوك
محاسبة البنوكمحاسبة البنوك
محاسبة البنوك
 
An integrated-approach-to-intermediate-japanese
An integrated-approach-to-intermediate-japaneseAn integrated-approach-to-intermediate-japanese
An integrated-approach-to-intermediate-japanese
 
Flow of events during Media Player creation in Android
Flow of events during Media Player creation in AndroidFlow of events during Media Player creation in Android
Flow of events during Media Player creation in Android
 
Mtk khoirul bab 1
Mtk khoirul bab 1Mtk khoirul bab 1
Mtk khoirul bab 1
 
The smiley dictionary
The smiley dictionaryThe smiley dictionary
The smiley dictionary
 
Hangman Game Programming in C (coding)
Hangman Game Programming in C (coding)Hangman Game Programming in C (coding)
Hangman Game Programming in C (coding)
 
Hebrew Bible as Data: Laboratory, Sharing, Lessons
Hebrew Bible as Data: Laboratory, Sharing, LessonsHebrew Bible as Data: Laboratory, Sharing, Lessons
Hebrew Bible as Data: Laboratory, Sharing, Lessons
 

Ähnlich wie 網路攻擊技術分析

Zh solaris-11-whatsnew-201111-1388248
Zh solaris-11-whatsnew-201111-1388248Zh solaris-11-whatsnew-201111-1388248
Zh solaris-11-whatsnew-201111-1388248wayne huang
 
직장인을 위한 GTD 시작하기 (How To Start GTD)
직장인을 위한 GTD 시작하기 (How To Start GTD)직장인을 위한 GTD 시작하기 (How To Start GTD)
직장인을 위한 GTD 시작하기 (How To Start GTD)Jinho Jung
 
DevLove k8s nobusue 20180711
DevLove k8s nobusue 20180711DevLove k8s nobusue 20180711
DevLove k8s nobusue 20180711Nobuhiro Sue
 
Shibuya.abc - Gnashで遊ぼう
Shibuya.abc - Gnashで遊ぼうShibuya.abc - Gnashで遊ぼう
Shibuya.abc - Gnashで遊ぼうgyuque
 
Parallel Computing in R
Parallel Computing in RParallel Computing in R
Parallel Computing in Rmickey24
 
Attention-Based Adaptive Selection of Operations for Image Restoration in the...
Attention-Based Adaptive Selection of Operations for Image Restoration in the...Attention-Based Adaptive Selection of Operations for Image Restoration in the...
Attention-Based Adaptive Selection of Operations for Image Restoration in the...MasanoriSuganuma
 
strace for Perl Mongers
strace for Perl Mongersstrace for Perl Mongers
strace for Perl MongersNaosuke Yokoe
 
Apache Menu Zh Cn
Apache Menu Zh CnApache Menu Zh Cn
Apache Menu Zh Cnzyhuacnic
 
Mcs011 solved assignment by divya singh
Mcs011 solved assignment by divya singhMcs011 solved assignment by divya singh
Mcs011 solved assignment by divya singhDIVYA SINGH
 
SLES11で構築するXen仮想化+HAクラスタ入門
SLES11で構築するXen仮想化+HAクラスタ入門SLES11で構築するXen仮想化+HAクラスタ入門
SLES11で構築するXen仮想化+HAクラスタ入門VirtualTech Japan Inc.
 
Global money
Global moneyGlobal money
Global moneygabz28
 
Linuxカーネルを読んで改めて知るプロセスとスレッドの違い
Linuxカーネルを読んで改めて知るプロセスとスレッドの違いLinuxカーネルを読んで改めて知るプロセスとスレッドの違い
Linuxカーネルを読んで改めて知るプロセスとスレッドの違いRetrieva inc.
 
JTF2018_B30_k8s_operator_nobusue
JTF2018_B30_k8s_operator_nobusueJTF2018_B30_k8s_operator_nobusue
JTF2018_B30_k8s_operator_nobusueNobuhiro Sue
 
TensorFlow 2: New Era of Developing Deep Learning Models
TensorFlow 2: New Era of Developing Deep Learning ModelsTensorFlow 2: New Era of Developing Deep Learning Models
TensorFlow 2: New Era of Developing Deep Learning ModelsJeongkyu Shin
 
C Code and the Art of Obfuscation
C Code and the Art of ObfuscationC Code and the Art of Obfuscation
C Code and the Art of Obfuscationguest9006ab
 
katagaitai CTF workshop #10 AESに対する相関電力解析
katagaitai CTF workshop #10 AESに対する相関電力解析katagaitai CTF workshop #10 AESに対する相関電力解析
katagaitai CTF workshop #10 AESに対する相関電力解析trmr
 
論文紹介 Hyperkernel: Push-Button Verification of an OS Kernel (SOSP’17)
論文紹介 Hyperkernel: Push-Button Verification of an OS Kernel (SOSP’17)論文紹介 Hyperkernel: Push-Button Verification of an OS Kernel (SOSP’17)
論文紹介 Hyperkernel: Push-Button Verification of an OS Kernel (SOSP’17)mmisono
 

Ähnlich wie 網路攻擊技術分析 (20)

Zh solaris-11-whatsnew-201111-1388248
Zh solaris-11-whatsnew-201111-1388248Zh solaris-11-whatsnew-201111-1388248
Zh solaris-11-whatsnew-201111-1388248
 
Stop Monkeys Fall
Stop Monkeys FallStop Monkeys Fall
Stop Monkeys Fall
 
직장인을 위한 GTD 시작하기 (How To Start GTD)
직장인을 위한 GTD 시작하기 (How To Start GTD)직장인을 위한 GTD 시작하기 (How To Start GTD)
직장인을 위한 GTD 시작하기 (How To Start GTD)
 
DevLove k8s nobusue 20180711
DevLove k8s nobusue 20180711DevLove k8s nobusue 20180711
DevLove k8s nobusue 20180711
 
Shibuya.abc - Gnashで遊ぼう
Shibuya.abc - Gnashで遊ぼうShibuya.abc - Gnashで遊ぼう
Shibuya.abc - Gnashで遊ぼう
 
What Can Compilers Do for Us?
What Can Compilers Do for Us?What Can Compilers Do for Us?
What Can Compilers Do for Us?
 
Parallel Computing in R
Parallel Computing in RParallel Computing in R
Parallel Computing in R
 
Attention-Based Adaptive Selection of Operations for Image Restoration in the...
Attention-Based Adaptive Selection of Operations for Image Restoration in the...Attention-Based Adaptive Selection of Operations for Image Restoration in the...
Attention-Based Adaptive Selection of Operations for Image Restoration in the...
 
strace for Perl Mongers
strace for Perl Mongersstrace for Perl Mongers
strace for Perl Mongers
 
Apache Menu Zh Cn
Apache Menu Zh CnApache Menu Zh Cn
Apache Menu Zh Cn
 
Mcs011 solved assignment by divya singh
Mcs011 solved assignment by divya singhMcs011 solved assignment by divya singh
Mcs011 solved assignment by divya singh
 
SLES11で構築するXen仮想化+HAクラスタ入門
SLES11で構築するXen仮想化+HAクラスタ入門SLES11で構築するXen仮想化+HAクラスタ入門
SLES11で構築するXen仮想化+HAクラスタ入門
 
Global money
Global moneyGlobal money
Global money
 
CGI.pm - 3ло?!
CGI.pm - 3ло?!CGI.pm - 3ло?!
CGI.pm - 3ло?!
 
Linuxカーネルを読んで改めて知るプロセスとスレッドの違い
Linuxカーネルを読んで改めて知るプロセスとスレッドの違いLinuxカーネルを読んで改めて知るプロセスとスレッドの違い
Linuxカーネルを読んで改めて知るプロセスとスレッドの違い
 
JTF2018_B30_k8s_operator_nobusue
JTF2018_B30_k8s_operator_nobusueJTF2018_B30_k8s_operator_nobusue
JTF2018_B30_k8s_operator_nobusue
 
TensorFlow 2: New Era of Developing Deep Learning Models
TensorFlow 2: New Era of Developing Deep Learning ModelsTensorFlow 2: New Era of Developing Deep Learning Models
TensorFlow 2: New Era of Developing Deep Learning Models
 
C Code and the Art of Obfuscation
C Code and the Art of ObfuscationC Code and the Art of Obfuscation
C Code and the Art of Obfuscation
 
katagaitai CTF workshop #10 AESに対する相関電力解析
katagaitai CTF workshop #10 AESに対する相関電力解析katagaitai CTF workshop #10 AESに対する相関電力解析
katagaitai CTF workshop #10 AESに対する相関電力解析
 
論文紹介 Hyperkernel: Push-Button Verification of an OS Kernel (SOSP’17)
論文紹介 Hyperkernel: Push-Button Verification of an OS Kernel (SOSP’17)論文紹介 Hyperkernel: Push-Button Verification of an OS Kernel (SOSP’17)
論文紹介 Hyperkernel: Push-Button Verification of an OS Kernel (SOSP’17)
 

Kürzlich hochgeladen

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Kürzlich hochgeladen (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

網路攻擊技術分析

  • 3. ï[c)¸ØYaª • B • œRz •  • H[ž€ • µÈ • _”…;B
  • 4. c)¸ØfY • ÿ_Øe´ • NxØeûUd4eØÌ,Ml6* • F*
  • 5. ˆ4b • 8œ? • A7ªo
  • 7. c)¸Øóè-ôÌ¸Ø • ô̸Ø8]§kæÁæéз뙆 ý¿ÐL· • lYô̸Ø, – ý (Masquerade) – g(Replay) – ù·(Message Modification) – œ(Denial of Service)
  • 8. c)¸Øóè-—Ì¸Ø • —̸Ø8]§k(¢,)_{Ã*Y À_Æd (J(JÁI«™†·f • lY—̸Ø, – ÿÓ(Eavesdropping) – ·Ã±(Traffic Analysis)
  • 9. c)¸Øtû 1ØŽ« 8 Xǽ 2fz§: 3®ÃPž 7m˜ 6†Nx 4_{‹ÉÆ 5dÆ
  • 11. lc)¸ØÙ,-œÙ • œÙ¸Ø – TCP SYN (SYN flood) – Smurf ¸Ø – Ping of Death – LAND Attack – Teardrop ¸Ø
  • 12. lc)¸ØÙ,-FûÌ • eØ7m • @% (Worm) • ÝõûÌ
  • 13. lc)¸ØÙ,-Iü • ¹Ÿ=§: • WÁ¸Ø • ¹ÞÚ® (Session Hijacking) • Ô¸Ø (Replay Attack) • àP (Buffer Overflow) • ÿÓ (SniffingeEavesdropping) • _tˆû (Social Engineering) • دÁ (SQL Injection)
  • 15. œÙ¸Ø (1/2) • œÙ¸Ø DoS (Deny of Service) – J8;c)ûUUÞ(¾³dˆ#œd –1)d jűc)ûU´Ðk´ë ·¦X›¯£Ð¼*jY xdÀ@}Ž òW«Y ÂÔd:Q4—¸ØYôÚÐc gÌ,ˆ#dø碵Ml¹jcgY ÒdÇ—œ¯.d¹”jôÚÐcgi ÐkJ¬ûÌÌ,ˆ#Y7.K1¿ÓûU …ÚdÌ,d6f
  • 16. œÙ¸Ø (2/2) • lY¸ØÙÌ – Smurf – TCP DoS: Land ¸ØeTeardrop¸ØeTCP SYN ¸Ø – UDP Flood DoS – ICMP DoS
  • 17. ±sÌœÙ¸Ø • ±s̜ٸØH‰DDoS – ®±sY¸ØÙÌdL¥c)jDï DoS¸ØYôڝÛï¸Ød¯õÛœ« *[}Ž t]ç¸ØYfzd¿ÓÁÙ ûU#7d ¬çÌ,Mld6f
  • 18. DDoS ¸Øj¡ ]§(1Ç DaemonûÌ client daemon ¸Øk client daemon daemon a”ôÚ daemon client ICMP Echoreply Packets daemon Internet ôÚ
  • 19. TCP SYN (SYN flood) (1/2) • ¸Øa#j – J;Âi4X›(TCP)m¹ÞÃ@ê¾@g£ te(three way handshake)Yx›ÚSþ£f HOST HOST A B Send SYN Receive SYN (seq=x) seq=x) (seq=x) seq=x) Send SYN Receive SYN (seq=y, seq=y, (seq=y, seq=y, ACK=x+1) ACK=x+1) Receive ACK Receive ACK (ack=y+1) ack=y+1) (ack=y+1) ack=y+1)
  • 20. TCP SYN (SYN flood) (2/2) • ¸ØÙÌj – æÁ¸ØfzÔS¹HÞÿY8UgYSYN f – a¸ØYûU6Z J×QACK«ÐYSYN r Àõ•dQ×QÁÙYACK«ÐÐt@C‚ Ûœ‘Eðf – ûU6ª‰×”QACK«Ðdþ4{•9 rÀYSYN þÌ,Žˆ#I44kYËf
  • 21. Smurf ¸Ø (1/2) • a#j – ICMP(Internet Control Message Protocol) ø1Ôc)Âi‹1qy¬Ã¹dø:Ùc)¾ LYeØJIÞ«Ðf – :ÙÙÌ • ÁôÚgÂÔICMP echo request packet. • ðôÚ×QÛd·l6«ÐICMP echo reply packet. • ·lµH@ûJ_SH“ping”vÿ8:Ó – ªädøûÌ8;IP ProtocolÂÔ}Žping message Internetj¢µ(Úœd¿Ó}Ž Reply message¿Óc)t·Y#7f
  • 22. Smurf ¸Ø (2/2) • Smurf Dos Y¸ØÙÌj – }Ž*[ÿ¿YICMP echo Request – Zÿ¿Y Ô?ggdÍ?gg6 «}ŽYicmp«Ð fzeØf¿Ó» µ4pYICMP echo reply «ç¸ØY fzf – Í7jping -s 30000 192.168.30.255 • µGÙÌHÞó}YÖdÔøf—H‰ ó}è smurf ¸Øf
  • 23. Ping of Death • a# – ˜Ping of Death™J¾_ïÔ@}Y ping Ë (ICMP echo request) dø¿ÓàP (Overflow)d1þ¬çÌ,Ml6*Ð…Úf
  • 24. LAND Attack • ¸Øk; IP ý Y¦”L·CZÔY dZI8U~fY IP gi·ÓJfzÚ œY IP gdø¿Z8U~fz¹Ÿ=p· ‰Suf • äG¸ØøÿT,*8ûUÐc)£ê…Ú Ì,Ml6* From : 60.44.35.11:23 TO: 64.44.35.11:23 fzÚœ 8U~fYYIPß´ 60.44.35.11 ¸Øk 8U~fYY¹Ÿ=´ Port 23 Open Crash 211.3.56.22
  • 25. Teardrop ¸Øa# • a#j;IP Y x†¸Øf • ¸ØÙ,j – ïÔS¾$9£@Y êlQfzeØdµ S êl ^Y ÌYE=dµ4{µ Óa8YIP Ûd¬çc)ôÚ¬: }ƒd¿ÓûU…Ú$e Ml˜êl .l˜êl
  • 27. døÜ8U”¥#ÐJfzJ broadcastY • Ä Ä#æ e]§»Ð]§k#ûU • ¼?ãX(Disk Quota)
  • 30. eØ7m • Þ”YeØûÌ(FûÌ) – B•mYûÌ(¯$›‹1hï*(½jÚ‚ªo) • Gó – šÚèeæéèe6«èe$~1èePiè – G7m • ¯ÙÌ – T[¯$›ÐûÌd7: .exe, .dll, .htm, .vbs, .js • ÂÈÄ° – e‰eFTPec)yLeInternet c+íŽ • fY – NxØe›SôÚe#7c)e*¸Ø
  • 31. @% (Worm) • ~7m¢ló'YF ûÌd(J(”êT ôûÌ1”Ù ¡ ‰ • @%6ƒ8eØ UeL·ûU£›Ð¬ çûUÌ,6*f
  • 32. Ýõû̧W • WÝõûÌ – a¤$~zÝõefH˜ûÌf – ¯Internetjd“$~zÝõ”·8S,ûÌ£[p¯ I}c)jh1YÐûÌ•d£ ^Yø› SÒYeØûUYûÌd¿ÓÒYûUØ .ƒe—NxŸôÚ#7YFYÃLÇ›ûÌf – Client (›SL) / Server (—›SL) Vôf – ?I$D • ý • =8Y¯‰ • ”¢?Ÿdp(”ô QIüց • d6‘ÒÐÒL=
  • 33. Ýõû̱ • ÝõûÌ8U – ûU—]§J¡”] – F4k£YØ% – B8)”üYûÌeÄ —·@Yû́ – —c)@% Q • Ýõóè – ÃLÇ›è/Nxè/ŸµÏ}è/WÁÂÔè/FTPè • ôÂgÙÌ – e‰qæéh1/À@*8ûUÐÐûÌ ®Ã—G” • ôfY – ›SôÚeØÿ_e*¸Øe#7c)
  • 34. FûÌYÁ • Ä #m´ • Ä Ýõû̧:œ • –?»-#m´eÝõû̧:œYØ«
  • 36. ¹Ÿ=§: • TCP/IP X›d6 65536 H¹Ÿ=d*‰Á. ¹ŸYLà – TCP ~ UDP port • ¹Ÿ=§:Yôf®¯õ» fzeØûU Ôš¼Y¹Ÿ=d†þ±IÞd6,c) ø¿4JnõSG*8ûU. A Port Scan B Port 1000,2000,3000.... ¸Ø
  • 37. ¹Ÿ=§:YÁ • þ”ê4YÐûÌ • 4)_œÀ_›Sö e#æ eþ## œ£›À_›SÚS • 4IDSÆ9¹Ÿ=§:z • EðЯ*8ûUÐJÐûÌYÆ9¾î (banner) • ºtл-‰»ÄŒY*8ûUeÐûÌe ·ÃX›
  • 39. WÁ¸Ø • vbN (Brute-force attack) – À@”Ù“ »¢G¥,¿©Y¥QM ½‰ßY¸ØÙ, • ¿J¸Ø (Dictionary-Based attack) – ;lYWÁq¿d”Ù®· ¥SQN WÁ‰ß y¬!! A y¬!! B nîeWÁ
  • 40. WÁ¸ØYÁ • £›SHvxYWÁaÆþµHaÆ« ^ ½hY£›: – ¼ OÌWÁ» – ¼WÁðõ—» – ¼WÁð—4‚» – ¼WÁy¬A›»
  • 42. ¹ÞÚ®Ya# • Session Hijacking•ÖH‰˜¹ÞÚ® ™ • ¸Øa#j – …]§k¯4kî]ôÚ(Ó…½©dC †¹ÞÚ®d+¥,4k'ôÚœY¹Þ•Ùd ]§kYeØ_þ¥,4k~ÃLôÚ†¹d ]§kÀ_4a¥,4kÔÞÞÆÀ_Y ‚Uf • Kra”õ1998Ë11ÜÜ3YHuntd ”Þ “daemon9”Ü3Yjuggernautdid6Session Hijacking
  • 43. f
  • 44. Session Hijacking YÁ • D4Þd6ëLÌ…Ç(mutual authentication)
  • 45. YX›7½IPSECeSSH dø­·ÃœYÄŒ. ÃLôÚ IPSEC / SSH Ú®Ó
  • 46. A B ¸Ø0»
  • 47. ©3jc)¸ØÙ,¿#7Á Ô¸Ø (Replay Attack)
  • 48. Ô¸Ø (Replay Attack) • a#j – ¸ØkõÿÓc)d_(¾}Y·ÃPÙÂÔ Y¯ÇÃd˜© Ôµ…¯ÇÃøÿ½TH $ލ–LY4kdø:QÀ_ûUY]§f Yf • Áj – –L£›®0õÞÖÛœS – ®ÆP£ÇYÄŒÌX›
  • 50. àP (Buffer Overflow) • £¯ûÌ•Ô SY¾³ï Í7: #include stdio.h ìt@4Ԑ #include string.h ˆ#YØŽÛd void func(char *p) func(char 16¿ÓÔWY { char buffer1[10]; buffer1[10]; àPYK strcpy(buffer1, strcpy(buffer1, p); 1f printf(buffer1); printf(buffer1); } Int main (int argc, char *argv[]) main(int argc, *argv []) { func( func(“I am the law in the network”); network” return 0; }
  • 51. àP˜ÄŒB¤ • Póè – I®(local buffer overflow) – ÃL(remote buffer overflow) • ÄŒB¤ – ‘c)ÿ_Ø – †*Ì¸Ø • #7Á – –?»-~Ä LMæ(patches) – ’5Ä ~4J¾» Ьƴ
  • 53. ÿÓ • ÿÓJl—4Y—̸Ø, – Ú (èV±«™ – N÷WÌØ • SnifferBÛ6ZTÄc)£›Ó‡Úˆ# |Ì(Promiscuous Mode), p1J”‚ Y@é • ªÐÁj – 4switch _þ hub – 4ÄŒYX›ÐJ
  • 55. _tˆû • _tˆûJ;¢¦”ÌÓ ld_{ûUÀ_YÃf 7½: – 0 ‰eM#[pÐ [pdÚú_WÁf • ªÐ+ – v†8pˆÃÄŒºf
  • 56. ©3jc)¸ØÙ,¿#7Á دÁ(SQL Injection)
  • 57. دÁ(SQL Injection) (1/2) • دÁ (SQL Injection) • a#j – ¯`3ÐûÌÛdÚÞÁ4kYi]|Y @é~ˆ#d©ZI¥ÓSQL8ÿdÂÔ SQLserverBdð4ki]˜Ø•^ÞT, ÁØ«ûUÞ$ÿÈYLîÐvÿÛd© +4kÞÚ6ÁØ«ûUh:8ÿdþ¿Ó] §Ôm8Y0f
  • 58. دÁ(SQL Injection) (2/2) • B¤Íj – cgûUjApacheeIISeDominoeNetscape – ûÌÁj ASPePHPeJSP – Ø«jMS-SQLeMySQLeOracleeSybasee DB2 • SQL Injection¿ÓYš” – À@SQL InjectionÁ*Ø«dø-#e»Ð ðØ«YØd¿ÓØr ÐJ”M½i½ Á*Ø«Y4kƉûUM#kdÿ” ސ¿ÓIü»
  • 59. YNxd7½®_Ø«Y ›SÆf
  • 60. دÁ˜ªÐÁ • @éc+4kYinputØ – c+ûÌpd6S,Lp8@é4ki]SQL§, • Ø«YÆ£› – ’5+c+YØ«4kÞ@µYØ«Æ •
  • 61. ø@é4shell command – ’5ûUBQ4ki]Yshell command • úZˆ#ÊH return code¿error codesYi – @µy¬Ã¹6s£@µûUØd+¡ÞÚu