¿Ã·¹Æ÷Æ® : ´ëÇз¹Æ÷Æ®, Á·º¸, ½ÇÇè°úÁ¦, ½Ç½ÀÀÏÁö, ±â¾÷ºÐ¼®, »ç¾÷°èȹ¼­, Çо÷°èȹ¼­, ÀÚ±â¼Ò°³¼­, ¸éÁ¢, ¹æ¼ÛÅë½Å´ëÇÐ, ½ÃÇè ÀÚ·á½Ç
¿Ã·¹Æ÷Æ® : ´ëÇз¹Æ÷Æ®, Á·º¸, ½ÇÇè°úÁ¦, ½Ç½ÀÀÏÁö, ±â¾÷ºÐ¼®, »ç¾÷°èȹ¼­, Çо÷°èȹ¼­, ÀÚ±â¼Ò°³¼­, ¸éÁ¢, ¹æ¼ÛÅë½Å´ëÇÐ, ½ÃÇè ÀÚ·á½Ç
·Î±×ÀΠ ȸ¿ø°¡ÀÔ

ÆÄÆ®³Ê½º

ÀÚ·áµî·Ï
 

Àå¹Ù±¸´Ï

´Ù½Ã¹Þ±â

ÄÚÀÎÃæÀü

¢¸
  • ÇØÅ· º¸°í¼­   (1 ÆäÀÌÁö)
    1

  • ÇØÅ· º¸°í¼­   (2 ÆäÀÌÁö)
    2

  • ÇØÅ· º¸°í¼­   (3 ÆäÀÌÁö)
    3

  • ÇØÅ· º¸°í¼­   (4 ÆäÀÌÁö)
    4

  • ÇØÅ· º¸°í¼­   (5 ÆäÀÌÁö)
    5

  • ÇØÅ· º¸°í¼­   (6 ÆäÀÌÁö)
    6

  • ÇØÅ· º¸°í¼­   (7 ÆäÀÌÁö)
    7

  • ÇØÅ· º¸°í¼­   (8 ÆäÀÌÁö)
    8

  • ÇØÅ· º¸°í¼­   (9 ÆäÀÌÁö)
    9

  • ÇØÅ· º¸°í¼­   (10 ÆäÀÌÁö)
    10

  • ÇØÅ· º¸°í¼­   (11 ÆäÀÌÁö)
    11

  • ÇØÅ· º¸°í¼­   (12 ÆäÀÌÁö)
    12

  • ÇØÅ· º¸°í¼­   (13 ÆäÀÌÁö)
    13

  • ÇØÅ· º¸°í¼­   (14 ÆäÀÌÁö)
    14

  • ÇØÅ· º¸°í¼­   (15 ÆäÀÌÁö)
    15


  • º» ¹®¼­ÀÇ
    ¹Ì¸®º¸±â´Â
    15 Pg ±îÁö¸¸
    °¡´ÉÇÕ´Ï´Ù.
¢º
Ŭ¸¯ : Å©°Ôº¸±â
  • ÇØÅ· º¸°í¼­   (1 ÆäÀÌÁö)
    1

  • ÇØÅ· º¸°í¼­   (2 ÆäÀÌÁö)
    2

  • ÇØÅ· º¸°í¼­   (3 ÆäÀÌÁö)
    3

  • ÇØÅ· º¸°í¼­   (4 ÆäÀÌÁö)
    4

  • ÇØÅ· º¸°í¼­   (5 ÆäÀÌÁö)
    5

  • ÇØÅ· º¸°í¼­   (6 ÆäÀÌÁö)
    6

  • ÇØÅ· º¸°í¼­   (7 ÆäÀÌÁö)
    7

  • ÇØÅ· º¸°í¼­   (8 ÆäÀÌÁö)
    8

  • ÇØÅ· º¸°í¼­   (9 ÆäÀÌÁö)
    9

  • ÇØÅ· º¸°í¼­   (10 ÆäÀÌÁö)
    10



  • º» ¹®¼­ÀÇ
    (Å« À̹ÌÁö)
    ¹Ì¸®º¸±â´Â
    10 Page ±îÁö¸¸
    °¡´ÉÇÕ´Ï´Ù.
  ´õºíŬ¸¯ : ´Ý±â
X ´Ý±â
Á¿ìÀ̵¿ : µå·¡±×

ÇØÅ· º¸°í¼­

ÀÎ ¼â
¹Ù·Î°¡±â
Áñ°Üã±â Űº¸µå¸¦ ´­·¯ÁÖ¼¼¿ä
( Ctrl + D )
¸µÅ©º¹»ç ¸µÅ©ÁÖ¼Ò°¡ º¹»ç µÇ¾ú½À´Ï´Ù.
¿øÇÏ´Â °÷¿¡ ºÙÇô³Ö±â Çϼ¼¿ä
( Ctrl + V )
¿ÜºÎ°øÀ¯
ÆÄÀÏ  ÇØÅ· º¸°í¼­.hwp   [Size : 887 Kbyte ]
ºÐ·®   19 Page
°¡°Ý  2,000 ¿ø


īƮ
´Ù¿î¹Þ±â
īī¿À ID·Î
´Ù¿î ¹Þ±â
±¸±Û ID·Î
´Ù¿î ¹Þ±â
ÆäÀ̽ººÏ ID·Î
´Ù¿î ¹Þ±â
µÚ·Î

ÀÚ·á¼³¸í
ÇØÅ· º¸°í¼­¿¡ ´ëÇÑ ÀÚ·áÀÔ´Ï´Ù.
ÇØÅ·º¸°í¼­11
¸ñÂ÷/Â÷·Ê

¥°.Introduction

¥¡.Object of Report
¥¢.The progress of project

¥±.Hacking

¥¡.Define Hacking
¥¢.Importance of Hacking Research
¥£.Hacking Scenario

¥².Hacking Method

¥¡.Attack Weakness of OS
¥¢.Trojan
¥£.Denial of services(Dos)
¥¤.Spoofing

¥³.Practice Hacking

-Hacking to Network of XXXXXXX University
-Hacking to professor Mr.XXXX

¥´.Security of network

¥¡.S/W side
¥¢.H/W side
¥£.N/W administration side

¥µ.Conclusion

¥¶.The source and Bibliography

º»¹®/³»¿ë
¥°.Introduction
¥¡.Object of Report
ÄÄÇ»ÅÍ User¶ó¸é ´©±¸³ª Çѹø¾¿Àº µé¾îºÃÀ» Hacking...ÀÌ¿¡ ´ëÇØ¼­ Á¶»ç¸¦ ÇÏ·Á°í ÇÏ´Ï ¾îµð¼­ºÎÅÍ Ãâ¹ßÀ» ÇØ¾ßÇÒÁö ¸·¸·ÇÑ °¨ÀÌ µé¾ú´Ù. HackingÀÇ ¹æ¹ýÀº ¿À´Ã³¯ ÄÄÇ»ÅÍ¿Í Á¤º¸ Åë½Å ±â¼úÀÇ ±Þ¼ÓÇÑ ¹ßÀüÀ¸·Î ÀÎÇÑ H/W, S/W, N/W ¶ÇÇÑ ¹ßÀüÇØ°¨À¸·Î ¸¶Âù°¡Áö·Î ´Ù¾çÇÏ°í º¹ÀâÇØÁ³´Ù. µû¶ó¼­ ÆÀÇðúÁ¦ ¶ÇÇÑ ÀÌ·± ´Ù¾çÇÏ°í º¹ÀâÇѰ͵éÀ» Á¤¸®Çؾ߸¸ Çß´Ù.
ÇÁ·ÎÁ§Æ®ÀÇ ¼öÇà°úÁ¤¿¡ À־ ¹ßÇ¥º¸´Ù´Â º¸°í¼­¿¡ ¸ÕÀú Ä¡ÁßÇÏÀÚ´Â ÀǰßÀ» ¸ð¾Ò´Ù. ±×·¯³ª ÃßÈÄ ¹ßÇ¥½Ã Áö·çÇØ ÇÏÁö ¾Ê°í Á¶¿øÀÌ ÃÖ´ëÇÑ Çù·ÂÇϰí ÀÌ·ÐÁ¤¸®¸¸ÀÌ ¾Æ´Ñ ÇÁ·ÎÁ§Æ®ÀÇ ¼öÇàÀ» À§Çؼ­ ÀÌ·ÐÀûÀÎ ºÎºÐ¿¡ ºñÁßÀ» ÀüºÎ µÎÁö ¾Ê°í ¾î´ÀÁ¤µµ Network, HackingÀÇ °³³äµî¿¡ ´ëÇØ¼­ Á¤¸®/ÀÌÇØµÈ »óȲ ÇÏ¿¡¼­ ½ÇÁ¦·Î Hacking¿¡ µµÀüÇØ º¸±â·Î ÇÏ¿´´Ù.(ºñ·Ï °í³­À̵µÀÇ ¹æ¹ýÀÌ ¾Æ´Ï´õ¶óµµ...)
¹ßÇ¥¿¡ À־ Ÿ Çпìµé°ú ´Ù¸¥ ûÁßµéÀÇ °ø°¨À» Çü¼º Çϱâ À§Çؼ­ º» Á¶»çÀÇ Á¶±×¸¶ÇÑ ÁÖÁ¦·Î ¿ì¸® Çб³ÀÇ ³×Æ®¿öÅ©¸¦ HackingÇØ º¸±â·Î ÇÏ¿´´Ù. ¶ÇÇÑ ¼ö¾÷Áß¿¡ ±³¼ö´Ô²²¼­ Àº¿¬Áß¿¡ ¸»¾¸Çϼ̴ø ±³¼ö´ÔÀÇ ÄÄÇ»ÅÍÀÇ ³×Æ®¿öÅ©°ü·Ã Á¤º¸µéÀ» ³õÄ¡Áö ¾Ê°í ±â¾ïÇϰí ÀÖ¾ú´Ù. ±×°ÍÀ» À̿롦(»ý·«)
Âü°í¹®Çå
-(±¸)Çѱ¹Á¤º¸º¸È£ ¼¾ÅÍ, °­ÀÇÀÚ·á ¡®ÇØÅ·±â¹ýÀÇ ÀÌÇØ¡¯
-Exploit017 (2001), `Real Hacking` ,ÆÄ¿öºÏ.
-±èÁß¶ô(2003),`»ó°èµ¿ ±è¸ð±º ÇØÅ·¼±¼öµÇ´Ù`, (ÁÖ)»çÀ̹ö ÃâÆÇ»ç
-°­À¯(2001)¡®ÇØÅ·&³ëÇϿ졯
-¿µÁø´åÄÄ(2002),`À©µµ¿ìXP-professional`
-ÃÖâÁø(2002)`½ÇÀü¿¹Á¦·Î ¹è¿ì´Â ¿ª°ø°Ý ÇØÅ·`, º£½ºÆ®ºÏ
-±ÇÀÎÅÃ(2000)`ÇØÄ¿¸¦ À§ÇÑ ÆÄ¿öÇÚµåºÏ¥²`, ÆÄ¿öºÏ
-Networking Essentials ÂüÁ¶
-hacking &security(2002),Ȳ¼®ÈÆ
-http://www.iround.co.kr/hack/ (ÇØÅ· µ¿È£È¸)
-http://www.jjang0u.com (¯¿Í·¹Áî)
-http://www.hackerslab.org (ÇØÄ¿½º·¦)
-http://www.naver.com (³×À̹ö ÀüÀÚ»çÀü, Áö½ÄIn °Ë»ö)






📝 Regist Info
I D : tndk******
Date : 2014-02-12
FileNo : 16136072

Cart