[nctu] [ccca] network security ii

41
Network Security NCTU CSCC xatier 2012.12.24

Upload: xatierlike-lee

Post on 06-May-2015

245 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: [NCTU] [CCCA] Network Security II

Network SecurityNCTU CSCC xatier2012.12.24

Page 2: [NCTU] [CCCA] Network Security II

Security?

Page 3: [NCTU] [CCCA] Network Security II
Page 4: [NCTU] [CCCA] Network Security II

先不管這個了,你聽過聖誕夜嗎

Page 5: [NCTU] [CCCA] Network Security II
Page 6: [NCTU] [CCCA] Network Security II

Security?

Page 7: [NCTU] [CCCA] Network Security II

Security?

Page 8: [NCTU] [CCCA] Network Security II

True Story

Page 9: [NCTU] [CCCA] Network Security II

http://i.imgur.com/k1qoD.jpg

Page 10: [NCTU] [CCCA] Network Security II

evil input

Page 11: [NCTU] [CCCA] Network Security II

SQL injection

Page 12: [NCTU] [CCCA] Network Security II

pangolin

http://nosec.org/en

Page 14: [NCTU] [CCCA] Network Security II

XSS

Page 16: [NCTU] [CCCA] Network Security II

XSRF

Page 17: [NCTU] [CCCA] Network Security II

Burp Suite打嗝套房

http://www.portswigger.net/burp/

Page 18: [NCTU] [CCCA] Network Security II

social engineering

Page 20: [NCTU] [CCCA] Network Security II

social engineeringSET!

http://www.social-engineer.org/

Page 21: [NCTU] [CCCA] Network Security II

social engineeringcosmo the God

http://wired.tw/2012/10/03/cosmo-the-god-who-fell-to-earth-1/index.html

Page 22: [NCTU] [CCCA] Network Security II

air crack!空氣爆破術

Page 23: [NCTU] [CCCA] Network Security II

air crack!空氣爆破術

Page 24: [NCTU] [CCCA] Network Security II

air crack!空氣爆破術http://www.aircrack-ng.org/

Page 25: [NCTU] [CCCA] Network Security II

air crack!空氣爆破術http://www.aircrack-ng.org/feedingbottle 奶瓶beini Linuxhttp://beini.en.softonic.com/

Page 26: [NCTU] [CCCA] Network Security II

phishing

Page 27: [NCTU] [CCCA] Network Security II

phishing

Page 28: [NCTU] [CCCA] Network Security II

phishing

Page 29: [NCTU] [CCCA] Network Security II

exploit vulnerabilityJohn von Neumann 對於圖靈機實作的天然缺陷

data / program 傻傻分不清楚

圖靈機能夠複製自己!

我的 data 你的 code >/////<

Page 30: [NCTU] [CCCA] Network Security II

metasploithttp://www.metasploit.com/

open source!

plugins and scripts (Ruby)

Page 31: [NCTU] [CCCA] Network Security II

ms08067

Page 32: [NCTU] [CCCA] Network Security II

ms08067

Allow Remote Code Execution !

Page 33: [NCTU] [CCCA] Network Security II

Programming LanguageVulnerable design in the programming language.

http://www.nruns.com/_downloads/advisory28122011.pdf

Page 34: [NCTU] [CCCA] Network Security II

surf the net secretly

Page 35: [NCTU] [CCCA] Network Security II

ssh tunneling ssh -NfD [localport] you@bsd1

proxy: localhost:[localport]

proxychains!

Page 36: [NCTU] [CCCA] Network Security II

VPN

virtualprivatenetwork

Page 37: [NCTU] [CCCA] Network Security II

PPTPThe Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.

Page 38: [NCTU] [CCCA] Network Security II

the Tor project

https://www.torproject.org/

Page 39: [NCTU] [CCCA] Network Security II

News

thehackernews.comwww.hack-stuff.comcoolshell.cnsecurity-sh3ll.blogspot.tw

Page 40: [NCTU] [CCCA] Network Security II

wargameshttp://hitcon.org/2012/wargame.html

最簡單的第零題:http://hitcon.org!

Page 41: [NCTU] [CCCA] Network Security II

happy hacking

:-)