전체 글

DevOps Security Specialist를 목표하는 Security Compliance Engineer의 블로그
old/Forensic

[자료] 포렌식 보고서 작성 시 참고사항

http://www.4ensics.net/home/2014/4/2/r8nqt1isgo3lvaxtbcx7xy8iyqu6uq APRIL 6, 2014ON REPORT WRITING FOR DFIRby Jan Previously I was talking in this space about how the truth should be your main client. About how you have to let go all preconceptions of things you think you know. Today I want to talk a bit about reporting.The report of your digital forensic investigation is the product you are exp..

old/Web

[Tool] 100 Greatest Hacking Tools!

Wireless Hacking: These are tools that help you hack into wireless networks. Wireless hacking tools though useful, do not make you a complete hacker. In order to achieve that, you must learn the different ways in which a secure network can be accessed. Also, you should work on making your own network as secure as possible. 1. Aircrack-ng 2. Kismet 3. inSSIDer 4. KisMAC Intrusion Detection System..

old/Network

[자료] XSS를 이용한 DDoS

http://arstechnica.com/security/2014/04/how-a-website-flaw-turned-22000-visitors-into-a-botnet-of-ddos-zombies/ XSS를 이용한 DDoS

MR. ZERO
Security & DevOps