2015년 5월 13일 수요일

Sample Forensic Images for practice

http://www.hecfblog.com/2014/03/daily-blog-277-sample-forensic-images.html


One of things we built for the book 'infosec pro guide to computer forensics' was a set of images to practice each of the investigative how-to chapters. I used one as a Sunday Funday contest but at the time I was having problems putting them someplace where they wouldn't get taken down due to large bandwidth usage. Luckily this is no longer a problem thanks to mega and their very cheap and generous file sharing/hosting plans. So here are the forensic images we made for the book for you to download and try on your own. Having the book will help you understand the scenario/what to expect to find but you should be able to solve these images without any other information.


Chapter 11 Image - HR Cases (Porn)

Chapter 12 Image Scenario 1 - Administrator Abuse of privileges

Chapter 12 Image Scenario 2 - Administrator Abuse of privileges

Chapter 13 Image - Stealing Information

Chapter 14 Image - Internal Leaks

Chapter 15 Image- Keyloggers and Malware

Have fun, we will be posting up video walk through of these images and reports of results in the near future so you can learn how to solve them as well.

Reentrancy Attack: 블록체인 스마트 컨트랙트의 치명적인 취약점

블록체인 기술이 전 세계적으로 주목받으면서 스마트 컨트랙트(Smart Contract)의 사용이 급격히 증가하고 있습니다. 하지만 그만큼 보안 취약점도 함께 늘어나고 있는데, 그 중에서도 Reentrancy Attack(재진입 공격)은 매우 치명적이고...