• Title/Summary/Keyword: Hacking Tool

Search Result 36, Processing Time 0.031 seconds

The Implementation of Sniffing Detector and Management Tool in Local LAN (로컬 LAN환경에서의 스니핑(Sniffing) 탐지 및 관리도구 구현)

  • 김기욱;김창수;정신일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.696-699
    • /
    • 2001
  • In these days, there are explosive growths of Internet users. But the damages of hacking are on the increase lately too. Currently, many researches for detection of hacking are studying, and there are many Hacking detection tools. In this thesis, We designed and implemented Sniffing detection and Management Tool, Which ran search an invasion by sniffing in Local LAN environment. The Implementation of Sniffing Detector and Management Tool are composed of two modules. In other words, They are Sniffing Detector Tool and Sniffing Management Tool. The Sniffing Detector Tool discovers implementation of the Sniffing from optional host to Sniffing Detector host. And The Sniffing Management Tool displays information of Sniffer on Web_Browser.

  • PDF

A Study of Communications Security by Using Key Generation and File Encryption (파일 암호화와 키 생성을 이용한 통신보안 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.316-319
    • /
    • 2010
  • File security is typically protected by encryption methods. The development of a network environment, such as the Internet according to the sharing of information between systems become commonplace, while providing convenience to users, individuals or organizations that facilitate access to sensitive information caused by hacking the system to attack the rapidly growing is a trend. This paper is the latest generation file system caused by the hacking attacks on the Sniffing for users using file encryption and key generation, Packet Sniffing Tool IP and data through the analysis are discussed. Through this study, the importance of protecting personal information by imprinting Proactive in the hacking incident, and what users will contribute to increase the level of security awareness.

  • PDF

Active hacking tool countermeasure using parallel signature (병렬 시그니처를 이용한 능동적인 해킹툴 대응방법)

  • Lee, Se-Hoon;Jeon, Sang-Pyo;Han, Ju-Young;Shin, Young-Jin;Park, Jeon-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.277-280
    • /
    • 2011
  • 본 논문에서는 해킹툴에 대해 선 발견, 후 차단할 수밖에 없는 보안 솔루션의 구조적인 한계를 극복하기 위해 시그니처의 역할에 대해 새로운 방식으로 접근한다. 특히 추적 시그니처를 이용하여 해킹툴을 능동적으로 대응하기 위한 방법을 모색하고 그 효과에 대해서 실험한다.

  • PDF

Proposal for Phenomena-based Experimental Education through Reconsidering the Meaning of Experimentation: Based on Ian Hacking's Creation of Phenomena (실험의 의미 재고를 통한 현상중심의 실험교육의 필요성 제안 -이언 해킹(Ian Hacking)의 현상의 창조를 중심으로-)

  • Jinhyeon Choi;Sang-Hak Jeon
    • Journal of The Korean Association For Science Education
    • /
    • v.44 no.1
    • /
    • pp.29-38
    • /
    • 2024
  • In this study, we explored the philosophical perspective of Ian Hacking on experimentation and discussed its potential impact on science education in schools. Traditionally, many philosophers have advocated a theory-driven view of experimentation, emphasizing its importance primarily in validating theories. Similarly, in the context of education, the prevailing perspective has been to focus on experimentation primarily as a means of confirming and proving theories. However, in contrast to this theory-driven perspective, philosophers like Hacking have proposed that experimentation itself possesses autonomy and vitality. Through their discussions, they have brought to light the significance of previously overlooked elements in experiments, such as tool usage, materials, and the involvement of scientists. They have prompted a reevaluation of the role and importance of experiments in scientific activities. Therefore, in this study, we consider the application of this philosophical standpoint to school experimental education. We anticipate that the phenomenon-centered perspective we propose in this research will be beneficial for teaching scientific practices, including tool usage, the involvement of experimenters, and modeling activities.

Attack Analysis of Bluetooth Electrical IT equipment in Smart Grid (Smart Grid에 사용된 Bluetooth 전기IT기기에 대한 공격 분석)

  • Song, Jin-Young;Park, Dea-Woo;Kim, Eung-Sik
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.91-94
    • /
    • 2011
  • Smart Grid에 사용되는 전기IT기기에서 Bluetooth의 보안 취약점이 발견되고 있다. 특히 전기안전을 위한 감시센서 정보전달을 맡고 있어서 위험성은 더욱 커진다. 본 논문은 Bluetooth가 탑재된 전기IT기기에 대한 Hacking Tool 분석을 실시하고, Bluetooth 취약점을 이용한 DoS, Sniffing공격 등 Tool 공격을 실행하고, Smart Grid와 U-IT 전기기기와 전력망에 대한 보안 방안 제시를 한다.

  • PDF

Stepping Stones Attack Simulator for TCP Connection Traceback Test

  • Choi, Byeong-cheol;Seo, Dong-Il;Sohn, Sung-Won;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2112-2115
    • /
    • 2003
  • In this paper, we describe a SSAS (stepping stones attack simulator) that is automatic tool for testing and evaluation in TCP connection traceback system. The SSAS can pass multiple hosts that are included with hacker, middle-path hosts and victim’s system. And SSAS can also attack through commands to exploit the victim’s system. Usually, hackers do not expose their real attack positions through compromising the middle-path hosts like stepping-stones. Namely, hackers perform the stepping stones attacks in Internet. The SSAS can be utilized by developments and tests of the various countermeasure techniques of hacking. Specially, in this paper, it is used to test the performance of TCP connection traceback system.

  • PDF

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

New Safety Issues in the Machine Tool Industry due to the 4th Industry (4차산업으로 인한 공작기계산업의 새로운 안전문제)

  • Park, Young Suk
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.4
    • /
    • pp.1-10
    • /
    • 2022
  • The purposes of this study were to suggest 1) a future direction for Korea's machine tool industry and 2) how to secure the safety and reliability of emerging intelligent or automated machine tooling. The study concludes that, overseas, the machine tool industry is growing again while promoting innovation by converging with ICT. Accordingly, Korea also promotes ICT innovation to advance the machine tool industry, which is at the core of the national economy. As a result, unlike in the past, the frequency of serious injuries like entrapment accidents has recently decreased, while the proportion of collision accidents has increased. In addition, a new type of accident has become possible. Since ICT is network-based, the distinction between work and rest can become ambiguous; there is a risk of hacking, working hours and places are flexible and there are risk factors for diseases like chronic fatigue due to overload of specific personnel. As robots and automation are introduced, there is also a high probability of problems caused by physical and psychological burdens on system operators and resulting fatigue.

A Design of Evaluation Tool for Information Security System (정보보호 시스템 평가 도구 설계)

  • 정연서;김환국;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.669-672
    • /
    • 2003
  • Computing and Networking technologies are rapidly developed. A lot of hacking events are occurring. As a result, people have a interesting for security in these days. Network security systems have come to be widely used in our networks. But, objective testing method to evaluate network sorority system is not established. Therefore we have difficulties that select a system. In this paper, we investigate evaluation methods for network sorority systems(Firewall, IDS, IPS etc.) and, design a evaluation tool for network security systems.

  • PDF

The Study on Improvement of the Program that Traces the Binary Codes in Execution (실행 중인 바이너리 코드 추출 프로그램의 기능 확장 연구)

  • Chang, Hang-Bae;Kwon, Hyuk-Jun;Kim, Yang-Hoon;Kim, Guk-Boh
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1309-1315
    • /
    • 2009
  • This research goal of developing and producing a tool that finds security weakness that may happen when a usual program is executed. The analyzing tool for security weakness has the major functions as follows. In case that a part of anticipated security weakness are in execution, it traces a machine language to a part in execution. And Monitoring System calls and DLL(API) calls when a program is in execution. The result of this study will enable to contribute to use as educational materials for security service in companies and related agencies and to prevent from hacking of external information invaders in the final analysis.

  • PDF