2015년 5월 13일 수요일

Sample Forensic Images for practice

http://www.hecfblog.com/2014/03/daily-blog-277-sample-forensic-images.html


One of things we built for the book 'infosec pro guide to computer forensics' was a set of images to practice each of the investigative how-to chapters. I used one as a Sunday Funday contest but at the time I was having problems putting them someplace where they wouldn't get taken down due to large bandwidth usage. Luckily this is no longer a problem thanks to mega and their very cheap and generous file sharing/hosting plans. So here are the forensic images we made for the book for you to download and try on your own. Having the book will help you understand the scenario/what to expect to find but you should be able to solve these images without any other information.


Chapter 11 Image - HR Cases (Porn)

Chapter 12 Image Scenario 1 - Administrator Abuse of privileges

Chapter 12 Image Scenario 2 - Administrator Abuse of privileges

Chapter 13 Image - Stealing Information

Chapter 14 Image - Internal Leaks

Chapter 15 Image- Keyloggers and Malware

Have fun, we will be posting up video walk through of these images and reports of results in the near future so you can learn how to solve them as well.

홈페이지 jQuery 라이브러리에서 CVE-2019-11358 취약점 패치 여부 확인 방법

현재 홈페이지에서 사용 중인 jQuery 라이브러리가 CVE-2019-11358 취약점 패치를 적용했는지 확인하는 방법은 다음과 같습니다. 1. jQuery 버전 확인 홈페이지 소스 코드를 확인하여 jQuery 라이브러리 버전을 직접 확인합니다. 웹 ...