29. Connected
to
ilwar.com.
Escape
character
is
'^]'.
ilwar.comilwar.comilwar.comilwar.com
ilwar.comilwar.comilwar.comilwar.com
ilwar.comilwar.comilwar.comilwar.com
ilwar.comilwar.comilwar.comilwar.com
ilwar.comilwar.comilwar.comilwar.com
ilwar.comilwar.comilwar.comilwar.com
ilwar.comilwar.comilwar.comilwar.com
!
HTTP/1.1
400
Bad
Request
29
30. 한곳의
지시로
동일패턴으로
여러
IP에서
공격
유입
Mozilla/5.0
(Macintosh;
U;
Intel
Mac
OS
X
10_6_8;
de-‐at)
AppleWebKit/533.21.1
(KHTML,
like
Gecko)
Version/5.0.5
Safari/533.21.1
33. 33
GET
/
HTTP/1.1
GET
/
HTTP/1.1
GET
/
HTTP/1.1
GET
/
HTTP/1.1
GET
/
HTTP/1.1
GET
/
HTTP/1.1
GET
/
HTTP/1.1
GET
/
HTTP/1.1
GET
/free
HTTP/1.1
GET
/free
HTTP/1.1
GET
/free
HTTP/1.1
GET
/free
HTTP/1.1
GET
/free
HTTP/1.1
GET
/free
HTTP/1.1
GET
/free
HTTP/1.1
GET
/free
HTTP/1.1
공격자는
지속적으로
취약성을
탐구
34. GET
/poli/101847
HTTP/1.1
GET
/poli/101364
HTTP/1.1
GET
/free/27485
HTTP/1.1
GET
/humor/114853
HTTP/1.1
GET
/sports/46521
HTTP/1.1
GET
/lgbt/110598
HTTP/1.1
GET
/poli/101643
HTTP/1.1
GET
/poli/101864
HTTP/1.1
GET
/free/102853
HTTP/1.1
GET
/free/98473?page=92
HTTP/1.1
GET
/free/94721?page=99913
HTTP/1.1
GET
/free/93847?page=381
HTTP/1.1
GET
/free/48143?page=4972
HTTP/1.1
GET
/humor/102843
HTTP/1.1
GET
/study/54827
HTTP/1.1
GET
/free/19845
HTTP/1.1
34
공격지
부하유발을
위한
지속적인
도전과
진화