Your SlideShare is downloading. ×
0
System hacking basics
System hacking basics
System hacking basics
System hacking basics
System hacking basics
System hacking basics
System hacking basics
System hacking basics
System hacking basics
System hacking basics
System hacking basics
System hacking basics
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

System hacking basics

606

Published on

Created by Sung-woo Kim who is high-school student and belongs into the LeaveRet security research group, in 2013.

Created by Sung-woo Kim who is high-school student and belongs into the LeaveRet security research group, in 2013.

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
606
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
13
Comments
0
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. System Hacking Basics cd80@LeaveRet GNOME 한국 모임
  • 2. 소개 • ME • LeaveRet • WiseGuyz • http://www.facebook.com/leaveretCD80
  • 3. 목차 • 시스템 해킹이란 ? • 기본 지식 • 시스템 취약점 / 버그 종류 • 시스템 해킹기법 종류 • 메모리 보호기법 종류 • 해킹 원리 • 시연 • Further studying materials • Q&A
  • 4. 시스템해킹이란 ? • 유저권한 , 관리자권한 • UAT? SetUID? • 로컬 해킹 • 원격 해킹 • 백도어 • 루트킷
  • 5. 기본지식 • C 언어 • 어셈블리어 • 레지스터 • 메모리 구조 • Perl or Python
  • 6. 시스템 취약점 / 버그 종류 • Buffer Overflow • Format String Bug • Integer overflow • Use After Free • Double Free Bug • Null Pointer Dereference
  • 7. 시스템 해킹기법 종류 • Direct RET Overwrite • EggShell • Return to Libc • Return/Jump Oriented Programming • Heap/JIT spraying • Function Pointer Overwrite • Jmp/Call [reg]/[address] • SEH Overwrite
  • 8. 메모리 보호기법 종류 • ASLR • DEP • ASCII-ARMOR • Security Cookie • SEHOP • PIE • SandBoxing
  • 9. 해킹 원리 • DirectRET Overwrite • Return to Libc • SEH Overwrite • Return Oriented Programming • Heap Spraying
  • 10. 시연 • DirectRET Overwrite • SEH Overwrite
  • 11. Further studying materials • • 번역서 - 해킹 , 공격의 예술 – John Erickson 파이썬 해킹 프로그래밍 – Justin Seitz 문제 풀이로 배우는 시스템 해킹 테크닉 – 여동기 버그헌터’ s 다이어리 – Tobias Klein 루트킷 : 윈도우 커널 조작의 미학 – Greg Hoglund, James Butler 원서 - Exploiting Software – Greg Hoglund, Gary McGraw The Shellcoder’s handbook – Felix “FX” Lindner 외 3 명 공저 The Rootkit Arsenal – Bill Blunden
  • 12. Q&A • ㄱㅏㅁㅅㅏㅎㅏㅂㄴㅣㄷㅏ

×