http://www.amanhardikar.com/mindmaps/Practice.html

'Web Penetration' 카테고리의 다른 글

Firefox Addons For Penetration Testing Links  (0) 2015.11.30

HTTP CONNECT Proxy Request


RAWDATA

CONNECT mx0.mail2000.com.tw:25

CONNECT mx1.mail2000.com.tw:25

CONNECT mx2.mail2000.com.tw:25

CONNECT mx3.mail2000.com.tw:25


공격자들은  HTTP CONNECT 메소드로 Open proxy 서버를 스캔하고, Open Proxy 취약점이 있을 경우 SMTP 포트로 붙어 스팸메일을 보내거나 기타 공격을 할 수 있음


*Open Proxy : 누구나 자유롭게 접속하여 사용할 수 있는 프록시 서버


PS4 Forensic.pdf

http://ac.els-cdn.com/S1742287615000146/1-s2.0-S1742287615000146-main.pdf?_tid=8ee1a960-8e7e-11e5-9758-00000aacb35f&acdnat=1447911171_ffdbbd4e78f74eabef7557eae2d1057a

Forensic_Analysis_of_Drones_DavidKovar.pdf

https://files.sans.org/summit/Digital_Forensics_and_Incident_Response_Summit_2015/PDFs/ForensicAnalysisofsUASakaDronesDavidKovar.pdf

Tor_Forensics_On_Windows_OS_Mattia_Epifani.pdf

https://digital-forensics.sans.org/summit-archives/dfirprague14/Tor_Forensics_On_Windows_OS_Mattia_Epifani.pdf

forensic-bitcoin-cryptocurrency_11168.pdf

https://digital-forensics.sans.org/community/papers/gcfa/forensic-bitcoin-cryptocurrency_11168https://digital-forensics.sans.org/community/papers/gcfa/forensic-bitcoin-cryptocurrency_11168

+ Recent posts