Your SlideShare is downloading. ×
[NCTU] [CCCA] Network Security II
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

[NCTU] [CCCA] Network Security II

234
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
234
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
15
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Network Security NCTU CSCC xatier 2012.12.24
  • 2. Security?
  • 3. 先不管這個了,你聽過聖誕夜嗎
  • 4. Security?
  • 5. Security?
  • 6. True Story
  • 7. http://i.imgur.com/k1qoD.jpg
  • 8. evil input
  • 9. SQL injection
  • 10. pangolin http://nosec.org/en
  • 11. Havij
  • 12. XSS
  • 13. XSS http://thehackernews.com/2012/11/xss- vulnerability-in-apple-website.html#
  • 14. XSRF
  • 15. Burp Suite 打嗝套房 http://www.portswigger.net/burp/
  • 16. social engineering
  • 17. social engineering 駭客大騙局 欺騙的藝術:人心控制的安全要素 The Art of Deception: Controlling the Human Element of Security
  • 18. social engineering SET! http://www.social-engineer.org/
  • 19. social engineering cosmo the God http://wired.tw/2012/10/03/cosmo-the-god-who- fell-to-earth-1/index.html
  • 20. air crack! 空氣爆破術
  • 21. air crack! 空氣爆破術
  • 22. air crack! 空氣爆破術 http://www.aircrack-ng.org/
  • 23. air crack! 空氣爆破術 http://www.aircrack-ng.org/ feedingbottle 奶瓶 beini Linux http://beini.en.softonic.com/
  • 24. phishing
  • 25. phishing
  • 26. phishing
  • 27. exploit vulnerability John von Neumann 對於圖靈機實作的天然缺陷 data / program 傻傻分不清楚 圖靈機能夠複製自己! 我的 data 你的 code >/////<
  • 28. metasploit http://www.metasploit.com/ open source! plugins and scripts (Ruby)
  • 29. ms08067
  • 30. ms08067 Allow Remote Code Execution !
  • 31. Programming Language Vulnerable design in the programming language. http://www.nruns. com/_downloads/advisory2 8122011.pdf
  • 32. surf the net secretly
  • 33. ssh tunneling ssh -NfD [localport] you@bsd1 proxy: localhost:[localport] proxychains!
  • 34. VPN virtual private network
  • 35. PPTP The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.
  • 36. the Tor project https://www.torproject.org/
  • 37. News thehackernews.com www.hack-stuff.com coolshell.cn security-sh3ll.blogspot.tw
  • 38. wargames http://hitcon.org/2012/wargame. html 最簡單的第零題:http://hitcon.org!
  • 39. happy hacking :-)