We've updated our privacy policy. Click here to review the details. Tap here to review the details.
Activate your 30 day free trial to unlock unlimited reading.
Activate your 30 day free trial to continue reading.
Download to read offline
(HITCON 2014 ENT 講題)
『資訊收集』在一場成功的入侵行動中扮演十分關鍵的步驟,攻擊者往往能透過一些枝微末節的訊息,組織出有效的攻擊行動。暴露資訊通常不會有立即性危害,是以企業往往也最容易忽視這些暴露的訊息,不知道這些資訊有可能會帶來殺身之禍。
本議程將根據 DEVCORE 監控中心提供的數據,介紹台灣企業目前資訊洩漏的概況及其風險,包含企業內部主機資訊洩漏、程式碼流出等問題。同時,我們將從 DEVCORE 團隊在過往滲透測試的經驗中,整理出幾項最容易被忽略的細節,並介紹這些細節帶來的潛在危機,以及 DEVCORE 如何透過資訊洩漏,在滲透測試中給予目標致命一擊...。
(HITCON 2014 ENT 講題)
『資訊收集』在一場成功的入侵行動中扮演十分關鍵的步驟,攻擊者往往能透過一些枝微末節的訊息,組織出有效的攻擊行動。暴露資訊通常不會有立即性危害,是以企業往往也最容易忽視這些暴露的訊息,不知道這些資訊有可能會帶來殺身之禍。
本議程將根據 DEVCORE 監控中心提供的數據,介紹台灣企業目前資訊洩漏的概況及其風險,包含企業內部主機資訊洩漏、程式碼流出等問題。同時,我們將從 DEVCORE 團隊在過往滲透測試的經驗中,整理出幾項最容易被忽略的細節,並介紹這些細節帶來的潛在危機,以及 DEVCORE 如何透過資訊洩漏,在滲透測試中給予目標致命一擊...。
You just clipped your first slide!
Clipping is a handy way to collect important slides you want to go back to later. Now customize the name of a clipboard to store your clips.The SlideShare family just got bigger. Enjoy access to millions of ebooks, audiobooks, magazines, and more from Scribd.
Cancel anytime.Unlimited Reading
Learn faster and smarter from top experts
Unlimited Downloading
Download to take your learnings offline and on the go
You also get free access to Scribd!
Instant access to millions of ebooks, audiobooks, magazines, podcasts and more.
Read and listen offline with any device.
Free access to premium services like Tuneln, Mubi and more.
We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.
You can read the details below. By accepting, you agree to the updated privacy policy.
Thank you!