[NCTU] [CCCA] Network Security II
Upcoming SlideShare
Loading in...5
×
 

[NCTU] [CCCA] Network Security II

on

  • 310 views

 

Statistics

Views

Total Views
310
Views on SlideShare
310
Embed Views
0

Actions

Likes
0
Downloads
7
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

[NCTU] [CCCA] Network Security II [NCTU] [CCCA] Network Security II Presentation Transcript

  • Network Security NCTU CSCC xatier 2012.12.24
  • Security?
  • 先不管這個了,你聽過聖誕夜嗎
  • Security?
  • Security?
  • True Story
  • http://i.imgur.com/k1qoD.jpg
  • evil input
  • SQL injection
  • pangolin http://nosec.org/en
  • Havij
  • XSS
  • XSS http://thehackernews.com/2012/11/xss- vulnerability-in-apple-website.html#
  • XSRF
  • Burp Suite 打嗝套房 http://www.portswigger.net/burp/
  • social engineering
  • social engineering 駭客大騙局 欺騙的藝術:人心控制的安全要素 The Art of Deception: Controlling the Human Element of Security
  • social engineering SET! http://www.social-engineer.org/
  • social engineering cosmo the God http://wired.tw/2012/10/03/cosmo-the-god-who- fell-to-earth-1/index.html
  • air crack! 空氣爆破術
  • air crack! 空氣爆破術
  • air crack! 空氣爆破術 http://www.aircrack-ng.org/
  • air crack! 空氣爆破術 http://www.aircrack-ng.org/ feedingbottle 奶瓶 beini Linux http://beini.en.softonic.com/
  • phishing
  • phishing
  • phishing
  • exploit vulnerability John von Neumann 對於圖靈機實作的天然缺陷 data / program 傻傻分不清楚 圖靈機能夠複製自己! 我的 data 你的 code >/////<
  • metasploit http://www.metasploit.com/ open source! plugins and scripts (Ruby)
  • ms08067
  • ms08067 Allow Remote Code Execution !
  • Programming Language Vulnerable design in the programming language. http://www.nruns. com/_downloads/advisory2 8122011.pdf
  • surf the net secretly
  • ssh tunneling ssh -NfD [localport] you@bsd1 proxy: localhost:[localport] proxychains!
  • VPN virtual private network
  • PPTP The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.
  • the Tor project https://www.torproject.org/
  • News thehackernews.com www.hack-stuff.com coolshell.cn security-sh3ll.blogspot.tw
  • wargames http://hitcon.org/2012/wargame. html 最簡單的第零題:http://hitcon.org!
  • happy hacking :-)