SlideShare una empresa de Scribd logo
1 de 41
Descargar para leer sin conexión
Network Security
NCTU CSCC xatier
2012.12.24
Security?
先不管這個了,你聽過聖誕夜嗎
Security?
Security?
True Story
http://i.imgur.com/k1qoD.jpg
evil input
SQL injection
pangolin
http://nosec.org/en
Havij
XSS
XSS
http://thehackernews.com/2012/11/xss-
vulnerability-in-apple-website.html#
XSRF
Burp Suite
打嗝套房
http://www.portswigger.net/burp/
social engineering
social engineering
駭客大騙局
欺騙的藝術:人心控制的安全要素
The Art of Deception: Controlling the Human
Element of Security
social engineering
SET!
http://www.social-engineer.org/
social engineering
cosmo the God
http://wired.tw/2012/10/03/cosmo-the-god-who-
fell-to-earth-1/index.html
air crack!
空氣爆破術
air crack!
空氣爆破術
air crack!
空氣爆破術
http://www.aircrack-ng.org/
air crack!
空氣爆破術
http://www.aircrack-ng.org/
feedingbottle 奶瓶
beini Linux
http://beini.en.softonic.com/
phishing
phishing
phishing
exploit vulnerability
John von Neumann 對於圖靈機實作的天然缺陷
data / program 傻傻分不清楚
圖靈機能夠複製自己!
我的 data 你的 code >/////<
metasploit
http://www.metasploit.com/
open source!
plugins and scripts (Ruby)
ms08067
ms08067
Allow Remote Code Execution !
Programming Language
Vulnerable design in the programming
language.
http://www.nruns.
com/_downloads/advisory2
8122011.pdf
surf the net secretly
ssh tunneling
ssh -NfD [localport] you@bsd1
proxy: localhost:[localport]
proxychains!
VPN
virtual
private
network
PPTP
The Point-to-Point Tunneling
Protocol (PPTP) is a method for
implementing virtual private networks.
PPTP uses a control channel over TCP
and a GRE tunnel operating to
encapsulate PPP packets.
the Tor project
https://www.torproject.org/
News
thehackernews.com
www.hack-stuff.com
coolshell.cn
security-sh3ll.blogspot.tw
wargames
http://hitcon.org/2012/wargame.
html
最簡單的第零題:http://hitcon.org!
happy hacking
:-)

Más contenido relacionado

Similar a [NCTU] [CCCA] Network Security II

SCADA StrangeLove 2: We already know
SCADA StrangeLove 2:  We already knowSCADA StrangeLove 2:  We already know
SCADA StrangeLove 2: We already know
qqlan
 
Cyberattacks on a marine context (NATO Congress 2011)
Cyberattacks on a marine context (NATO Congress 2011)Cyberattacks on a marine context (NATO Congress 2011)
Cyberattacks on a marine context (NATO Congress 2011)
flagsolutions
 
A guided tour of Eclipse M2M - EclipseCon Europe 2013
A guided tour of Eclipse M2M - EclipseCon Europe 2013A guided tour of Eclipse M2M - EclipseCon Europe 2013
A guided tour of Eclipse M2M - EclipseCon Europe 2013
Benjamin Cabé
 

Similar a [NCTU] [CCCA] Network Security II (20)

SCADA StrangeLove 2: We already know
SCADA StrangeLove 2:  We already knowSCADA StrangeLove 2:  We already know
SCADA StrangeLove 2: We already know
 
Stanford CS22a class: Social Impact and Ethics of AI
Stanford CS22a class: Social Impact and Ethics of AIStanford CS22a class: Social Impact and Ethics of AI
Stanford CS22a class: Social Impact and Ethics of AI
 
SHADOW SELVES: LIVING WITH (OR WITHOUT) OUR BIG DATA DOUBLES
SHADOW SELVES: LIVING WITH (OR WITHOUT) OUR BIG DATA DOUBLESSHADOW SELVES: LIVING WITH (OR WITHOUT) OUR BIG DATA DOUBLES
SHADOW SELVES: LIVING WITH (OR WITHOUT) OUR BIG DATA DOUBLES
 
Wireless mouse hacking 2600 thailand
Wireless mouse hacking 2600 thailandWireless mouse hacking 2600 thailand
Wireless mouse hacking 2600 thailand
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for Mainframes
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
Thrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In ReviewThrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In Review
 
Full-Spectrum Information Operations for Critical Infrastructure Attacks
Full-Spectrum Information Operations for Critical Infrastructure AttacksFull-Spectrum Information Operations for Critical Infrastructure Attacks
Full-Spectrum Information Operations for Critical Infrastructure Attacks
 
Securing Your BBC Identity
Securing Your BBC IdentitySecuring Your BBC Identity
Securing Your BBC Identity
 
Cyberattacks on a marine context (NATO Congress 2011)
Cyberattacks on a marine context (NATO Congress 2011)Cyberattacks on a marine context (NATO Congress 2011)
Cyberattacks on a marine context (NATO Congress 2011)
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
 
Trend briefs security
Trend briefs securityTrend briefs security
Trend briefs security
 
ACRNA Webinar #5: Cyber Security – The Unlikely Romance
ACRNA Webinar #5: Cyber Security – The Unlikely RomanceACRNA Webinar #5: Cyber Security – The Unlikely Romance
ACRNA Webinar #5: Cyber Security – The Unlikely Romance
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hack
 
Cybersecurity of SmartGrid by Sergey Gordeychik & Alexander Timorin - CODE BL...
Cybersecurity of SmartGrid by Sergey Gordeychik & Alexander Timorin - CODE BL...Cybersecurity of SmartGrid by Sergey Gordeychik & Alexander Timorin - CODE BL...
Cybersecurity of SmartGrid by Sergey Gordeychik & Alexander Timorin - CODE BL...
 
Stanford CS22A March 8, 2018 AI for a Magnificent Future
Stanford CS22A March 8, 2018 AI for a Magnificent FutureStanford CS22A March 8, 2018 AI for a Magnificent Future
Stanford CS22A March 8, 2018 AI for a Magnificent Future
 
Software Radio Implementation: A Systems Perspective
Software Radio Implementation: A Systems PerspectiveSoftware Radio Implementation: A Systems Perspective
Software Radio Implementation: A Systems Perspective
 
Semantics, Deep Learning, and the Transformation of Business
Semantics, Deep Learning, and the Transformation of BusinessSemantics, Deep Learning, and the Transformation of Business
Semantics, Deep Learning, and the Transformation of Business
 
A guided tour of Eclipse M2M - EclipseCon Europe 2013
A guided tour of Eclipse M2M - EclipseCon Europe 2013A guided tour of Eclipse M2M - EclipseCon Europe 2013
A guided tour of Eclipse M2M - EclipseCon Europe 2013
 
NSConclave2020 The Decade Behind And The Decade Ahead
NSConclave2020 The Decade Behind And The Decade AheadNSConclave2020 The Decade Behind And The Decade Ahead
NSConclave2020 The Decade Behind And The Decade Ahead
 

Más de Xatierlike Lee (7)

Topic 02 a - [misc 2] how to solve problems (xatier)
Topic 02 a  -  [misc 2] how to solve problems (xatier)Topic 02 a  -  [misc 2] how to solve problems (xatier)
Topic 02 a - [misc 2] how to solve problems (xatier)
 
2013 社團迎新課程長簡報
2013 社團迎新課程長簡報2013 社團迎新課程長簡報
2013 社團迎新課程長簡報
 
[NCTU] [CCCA] vim rocks
[NCTU] [CCCA] vim rocks[NCTU] [CCCA] vim rocks
[NCTU] [CCCA] vim rocks
 
Violent python
Violent pythonViolent python
Violent python
 
Kick my mouse away
Kick my mouse awayKick my mouse away
Kick my mouse away
 
Brainfuck interpreter 分析新竹碼農0307
Brainfuck interpreter 分析新竹碼農0307Brainfuck interpreter 分析新竹碼農0307
Brainfuck interpreter 分析新竹碼農0307
 
Tcfsh bootcamp day2
 Tcfsh bootcamp day2 Tcfsh bootcamp day2
Tcfsh bootcamp day2
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

[NCTU] [CCCA] Network Security II