- 공유 링크 만들기
- X
- 이메일
- 기타 앱
1. Windows Security
(1) Install & Management
① Considerations for Installing Windows
② Windows License Mode - Per Server(S1:C*), Per Seat(C)
(2) Management of shared data
① File and Folder Permission - NTFS file system, (FAT16, FAT32 - no function)
② NTFS permission management for Folder(R, W, R&X, 수정(W, R&X), all permi)
③ NTFS permission management for File(R, W, R&X, 수정(W, R&X), all permi)
④ Permission of shared folder
ⓐ Management of shared folder(share the folder as "administrative purposes")
- C$, D$, E$, etc : shared in the form of a hard disk partitioning.
- Admin$ : say a folder that is managed by "%SYSTEMROOT%" of the system.
- IPC$ : username, passwd -> input null -> can connect
(3) Viruses and vaccines
① Types of malicious programs - Virus, Worm, Trojan Horse, Spyware, Adware, Malicious code
② Boot vir, File vir, Macro vir
③ Anti - virus
(4) Use of registry
① input "regedit"
② Registry Editor
ⓐ HKEY_CLASSES_ROOT
ⓑ HKEY_CURRENT_USER
ⓓ HKEY_LOCAL_MACHINE
ⓓ HKEY_USERS
ⓔ HKEY_CURRENT_CONFIG
③ Backup and recovery
④ Difference of Regedit32 and Regedit
2. The use of the Internet security
(1) Security of Web Browser
① Web Browser - HTTP(Hyper-Text Transfer Protocol)
② Functions of Web Browser
ⓐ HTTP, HTTPS
ⓑ HTML, XML, XHTML
ⓒ GIF, PNG, JPEG
ⓓ CSS, Cookie, Javascript(DHTML), Digital certificate, Plug-in
③ Technology to collect personal information of web browser
ⓐ Cookie & Super Cookie
ⓑ Beacon
ⓒ History Stealing
ⓓ Fingerprint
ⓔ Contents Redirection
④ HTTP Protocol
ⓐ HTTP protocol connection mechanism
ⓑ HTTP 1.0 protocol connection mechanism(text - reconnect - image)
ⓒ HTTP 1.1 protocol connection mechanism(text, image)
⑤ HTTP request method
GET, POST
ⓐ HTTP/1.0 request method
GET, HEAD, POST
ⓑ HTTP/1.1 request method
CONNECT, DELETE, GET, HEAD, OPTION, POST, PUT, TRACE
⑥ HTTP protocol status code
100, 101, 200 ~ 206, 300 ~ 305, 307, 400 ~ 417, 500 ~ 505
2xx : Success
200 : Transmission success without error
201 : Made a document on the server
3xx : Retransmission
301 :
302 :
4xx : Client-error
400 : Grammatical errors -> Request fails
403 : File name incorrect
404 : File Not Found
5xx : Server-error
500 : Internal server error
② Cracking tools
ⓐ Rootkit(WIN - user mode, kernel mode, lrk5)
ⓑ Anti-Rootkit
ⓒ Password Crack
techniques
- Brute Force Attack
- Dictionary Attack
- Password Guessing
- SAM(Security Account Manager)
Kind
ⓐ John the Ripper
ⓑ pwdump
ⓒ L0phtCrack
ⓓ ipccrack
ⓔ chntpw
ⓕ ERD Commander
ⓓ Port Scanning(UDP, TCP)
Kind
ⓐ 다중 취약점 스캔 : SAINT, sscan2k, vetescan, mscan 등
ⓑ 특정 취약점 스캔 : cgiscan, winscan, rpcscan
ⓒ 은닉스캔 : Nmap, stealthscan
ⓓ 네트워크 구조 스캔 : firewalk, Nmap
Scanning techniques
- openning scanning : TCP connect scanning
- Half-open scanning : SYN scanning
- Stealth Scanning : FIN scanning, X-MAS scanning, NULL scanning
- More Adcanced Scanning : Spoofed scanning
Nmap
scan type : -sT, -sS, (-sF, -sX, -sN), -sP, -sU, -sA, -sW, -sR, -b
scan option : -P0, -PT, -PS, -PB, -O, -v, -p<port number>, -F, -S<IP>,
-e<interface>, -g<port number>, -oN<log name>, -oM<log name>
③ Key Log
④ HTTP Protocol
ⓐ HTTP protocol connection mechanism
ⓑ HTTP 1.0 protocol connection mechanism(text - reconnect - image)
ⓒ HTTP 1.1 protocol connection mechanism(text, image)
⑤ HTTP request method
GET, POST
ⓐ HTTP/1.0 request method
GET, HEAD, POST
ⓑ HTTP/1.1 request method
CONNECT, DELETE, GET, HEAD, OPTION, POST, PUT, TRACE
⑥ HTTP protocol status code
100, 101, 200 ~ 206, 300 ~ 305, 307, 400 ~ 417, 500 ~ 505
2xx : Success
200 : Transmission success without error
201 : Made a document on the server
3xx : Retransmission
301 :
302 :
4xx : Client-error
400 : Grammatical errors -> Request fails
403 : File name incorrect
404 : File Not Found
5xx : Server-error
500 : Internal server error
(2) Mail Client Security
PGP(Pretty Good Privacy)
(3) Corresponds and Understanding for The public hacking tools
① Trojan horse② Cracking tools
ⓐ Rootkit(WIN - user mode, kernel mode, lrk5)
ⓑ Anti-Rootkit
ⓒ Password Crack
techniques
- Brute Force Attack
- Dictionary Attack
- Password Guessing
- SAM(Security Account Manager)
Kind
ⓐ John the Ripper
ⓑ pwdump
ⓒ L0phtCrack
ⓓ ipccrack
ⓔ chntpw
ⓕ ERD Commander
ⓓ Port Scanning(UDP, TCP)
Kind
ⓐ 다중 취약점 스캔 : SAINT, sscan2k, vetescan, mscan 등
ⓑ 특정 취약점 스캔 : cgiscan, winscan, rpcscan
ⓒ 은닉스캔 : Nmap, stealthscan
ⓓ 네트워크 구조 스캔 : firewalk, Nmap
Scanning techniques
- openning scanning : TCP connect scanning
- Half-open scanning : SYN scanning
- Stealth Scanning : FIN scanning, X-MAS scanning, NULL scanning
- More Adcanced Scanning : Spoofed scanning
Nmap
scan type : -sT, -sS, (-sF, -sX, -sN), -sP, -sU, -sA, -sW, -sR, -b
scan option : -P0, -PT, -PS, -PB, -O, -v, -p<port number>, -F, -S<IP>,
-e<interface>, -g<port number>, -oN<log name>, -oM<log name>
③ Key Log
(4) Security management tool utilization
① SPPF/W(SoFTPerfect Personal Firewall), Zone Alarm
댓글
댓글 쓰기