±¹³»µµ¼
Àü°øµµ¼/´ëÇб³Àç
°øÇаè¿
ÄÄÇ»ÅÍ°øÇÐ
Á¤°¡ |
26,000¿ø |
---|
23,400¿ø (10%ÇÒÀÎ)
1,300P (5%Àû¸³)
ÇÒÀÎÇýÅÃ | |
---|---|
Àû¸³ÇýÅà |
|
|
|
Ãß°¡ÇýÅÃ |
|
À̺¥Æ®/±âȹÀü
¿¬°üµµ¼
»óÇ°±Ç
ÀÌ»óÇ°ÀÇ ºÐ·ù
Ã¥¼Ò°³
ÇØÅ· ¹× º¸¾È ÀÔ¹®ÀÚ¸¦ À§ÇÑ ±âÃÊ ½Ç½À¼ ¡º¾î¼ ¿Í ÇØÅ·Àº óÀ½ÀÌÁö¡». º»¹®¿¡´Â 16°³ÀÇ ¹Ì¼Ç°ú 24°³ÀÇ Step by Step ½Ç½ÀÀÌ ¼ö·ÏµÇ¾î ÀÖ´Ù. 24°³ ½Ç½ÀÀ» ´Ü°èº°·Î µû¶ó ÇÏ´Ù º¸¸é ÀÚ¿¬½º·¹ À¥, ³×Æ®¿öÅ©, ¼¹ö¿¡ ´ëÇÑ °ø°Ý ¹× ¹æ¾î ´É·ÂÀ» ¾òÀ» ¼ö ÀÖ½À´Ï´Ù. ÇØÅ· ¹× º¸¾È ÀÔ¹®¿¡ ÃÖÀûÈµÈ Ã¥ÀÌ´Ù.
ÃâÆÇ»ç ¼Æò
'º¸¾È ºÐ¾ß¿¡ óÀ½ µé¾î¿À´Â À̵éÀ» À§ÇÑ ÀÔ¹®¼ÀÔ´Ï´Ù' º¸¾ÈÀÎÀ̶ó¸é Á¤È®ÇÑ °³³äÀ» ¾Ë¾Æ¾ß ÇÕ´Ï´Ù. ±×·±µ¥ °³³äÀº ¾î·Æ½À´Ï´Ù. °³³äÀ» ÀÌÇØÇÏ´õ¶óµµ ÀÌÇØ¿¡¸¸ °ÅÄ¡°í ÀÀ¿ëÀ» ÇÏÁö ¸øÇÒ ¼ö ÀÖ½À´Ï´Ù. ½Ç½ÀÀ» µû¶ó ÇÏ´Ù º¸¸é °³³äÀ» Á¤È®ÇÏ°Ô Ã¼µæÇÒ ¼ö ÀÖ½À´Ï´Ù.
'À¥, ¼¹ö, ³×Æ®¿öÅ©¿¡ ´ëÇÑ °ø°Ý°ú ¹æ¾î¸¦ ¸ðµÎ °æÇèÇÒ ¼ö ÀÖ½À´Ï´Ù' ÇØÅ·°ú º¸¾ÈÀº ÇÑ ºÐ¾ß¿¡¸¸ ±¹ÇѵǾî ÀÌ·ç¾îÁöÁö ¾Ê½À´Ï´Ù. ÀÌ Ã¥ÀÇ 16°³ ¹Ì¼ÇÀ» µû¶ó Çϸé À¥, ¼¹ö, ³×Æ®¿öÅ©¸¦ ¸ðµÎ °æÇèÇÒ ¼ö ÀÖ½À´Ï´Ù.
'¼Ò¼³ Çü½ÄÀÇ ½ºÅ丮°¡ ÀÖ½À´Ï´Ù' ÀúÀÚ Áß ÇÑ ¸íÀº À¥ ¼Ò¼³ ÀÛ°¡À̱⵵ ÇÕ´Ï´Ù. ¹Ì¼Ç ¼µÎ¿¡ ½ºÅ丮°¡ ÀÖ½À´Ï´Ù. À̾߱⸦ ÅëÇØ º¸¾È¿¡ °üÇÑ Ã¶ÇÐÀû »ç»öÀ» ÇÒ ¼ö ÀÖ½À´Ï´Ù. »ý°¢ ÀÖ´Â º¸¾ÈÀÎÀÌ µÇ±â¸¦ ¹Ù¶ó´Â ¸¶À½¿¡¼ ªÀº ½ºÅ丮¸¦ ´ã¾Ò½À´Ï´Ù.
'º¸¾ÈÀ» ½ÃÀÛÇϱ⿡ ÀûÇÕÇÑ Ã¥ÀÔ´Ï´Ù' º¸¾È Àü¹®°¡ ȤÀº ÇØÄ¿°¡ µÇ·Á¸é ÃÖ¼Ò ¸î ³âÀÇ ½Ã°£À» º¸³»¾ß ÇÕ´Ï´Ù. óÀ½ ¾î¶² ±æ·Î µé¾î°¡³Ä°¡ Áß¿äÇÕ´Ï´Ù. °¬´Ù°¡ µÇµ¹¾Æ¿ÀÁö ¾ÊÀ», ÃÖÀûÈµÈ ÇнÀÀÇ ±æ·Î ÀεµÇϴ åÀÔ´Ï´Ù.
¸ñÂ÷
½ÃÀÛÇÏ´Â »ç¶÷µé¿¡°Ô
Mission 1. ½Ç½À ȯ°æ ±¸ÃàÇϱâ
Step by Step - ¹öÃß¾ó¹Ú½º¿¡ Ä®¸®¸®´ª½º ¼³Ä¡Çϱâ
Step by Step - ³×Æ®¿öÅ© ¹× ±âŸ ȯ°æ ¼³Á¤
Mission 2. ARP Spoofing°ú ³×Æ®¿öÅ© ÆÐŶ ½º´ÏÇÎ
Step by Step - ÅÚ³Ý ¼¹ö ±¸Ãà
Step by Step - ARP Spoofing
Mission 3. DNS Spoofing using Ettercap
Step by Step - DNS spoofing
Mission 4. SQL Injection, À¥ ¹æȺ® ¼³Ä¡¿Í ŽÁö
Step by Step - SQL Injection
Step by Step - À¥ ¹æȺ® ¼³Ä¡¿Í ŽÁö
Mission 5. FTP ¼¹ö ±¸Ãà°ú Æнº¿öµå Å©·¢
Step by Step - Æнº¿öµå Å©·¢
Mission 6. DNS ¼¹ö ±¸Ãà°ú DNS Á¤º¸ ¼öÁý
Step by Step - DNS ¼¹ö ±¸Ãà°ú DNS Á¤º¸ ¼öÁý
Step by Step - ¿ÍÀ̾î»þÅ© DNS ÇÊÅ͸µ
Mission 7. ¸ÞÀÏ ¼¹ö ±¸Ãà°ú SET È°¿ë
Step by Step - sendmail ¼³Ä¡
Step by Step - Mass Mailer Attack
Step by Step - Spear Phishing Attack Vectors
Mission 8. iptables·Î ¹æȺ® ±¸ÃàÇϱâ
Step by Step - ¹æȺ® ±¸Ãà
Mission 9. Nmap Port Scanning
Step by Step - Æ÷Æ® ½ºÄµ
Mission 10. SSLStrip
Step by Step - SSLStrip
Mission 11. SCAPY¸¦ È°¿ëÇÑ DoS Attack
Step by Step - TCP Åë½Å
Step by Step - TCP SYN Flooding Attack
Step by Step - Slowloris Attack
Mission 12. °Ô½ÃÆÇ ¸¸µé±â
Step by Step - °Ô½ÃÆÇ ¸¸µé±â
Mission 13. Snort ±¸ÃàÇϱâ
Step by Step - Snort ¼³Ä¡
Mission 14. SQL Injection°ú IDS Á¤Ã¥
Step by Step - SQL Injection °ø°Ý ŽÁö
Mission 15. XSS¿Í IDS Á¤Ã¥
Step by Step - XSS °ø°Ý ŽÁö
Mission 16. Webshell°ú IDS Á¤Ã¥
Step by Step - Webshell Upload °ø°Ý ŽÁö
º»¹®Áß¿¡¼
Á¤º¸ º¸¾ÈÀÇ ÁøÀÔ À庮À» ³·Ãß°í ½Í¾ú½À´Ï´Ù. ±×·¡¼ ½ºÅ͵𸦠½ÃÀÛÇß°í ±× °á°ú¸¦ Ã¥À¸·Î ³»°Ô µÆ½À´Ï´Ù. ½Ã½ºÅÛ, ³×Æ®¿öÅ©, ¾ÖÇø®ÄÉÀ̼Ç, ¹ý, Á¤º¸ º¸¾È ÀÌ·Ð, ÇÁ·Î±×·¡¹Ö µî ¸ðµç Áö½ÄÀ» óÀ½ºÎÅÍ ÇÑ ¹ø¿¡ ¼··ÆÇÒ ¼ö ÀÖ´Â »ç¶÷Àº ±ØÈ÷ µå¹´´Ï´Ù. ±×·±µ¥µµ ¸¶Ä¡ ÀÌ ¸ðµç °ÍÀ» ÇØ¾ß Á¤º¸ º¸¾È¿¡ ÀÔ¹®ÇÒ ¼ö ÀÖ´Ù°í ¸»ÇÏ´Â »ç¶÷ÀÌ ´õ·¯ ÀÖ½À´Ï´Ù. "±×·¡¼ ¹«¾ùºÎÅÍ ÇØ¾ß Çϴµ¥?"¶ó°í Çϸé, "ÀüºÎ"¶ó´Â ´ë´äÀÌ µ¹¾Æ¿À±âµµ ÇÕ´Ï´Ù. ¿ì¸®´Â ±× ´ë´ä¿¡ "Á¤¸»?"À̶ó
°í µÇ¹¯´Â »ç¶÷ÀÌ µÇ±â·Î Çß½À´Ï´Ù. ±×·¡¼ "óÀ½ºÎÅÍ ´Ù ¾È Çصµ µÅ. ÀÌ Ã¥ºÎÅÍ ºÁ."¶ó°í ¸»ÇÒ ¼ö Àִ åÀ» ¸¸µé±â·Î Çß½À´Ï´Ù. -ÀúÀÚ ¼¹® Áß¿¡¼
ÀÌ Ã¥À» ÀÐ°í ³ª¼µµ ¾ÆÁ÷ °¡¾ß ÇÒ ±æÀÌ ¸Ö´Ù´Â °É ÀØÁö ¸»¾ÒÀ¸¸é ÇÕ´Ï´Ù. º¸¾È Áö½Ä°ú ÇØÅ· ±â¼úÀº ÀÏ ³â, ÀÌ ³â, »ï ³â, »ç ³â °øºÎÇؼ ³» °ÍÀÌ µÇ´Â °Ô ¾Æ´Ï±â¿¡ ±ä È£ÈíÀ¸·Î Áñ±â¸é¼ ÀÍÇô¾ß ÇÕ´Ï´Ù. ±×¸®°í È¥ÀÚ º¸¾ÈÀ» ÇÒ ¼ö ¾øÀ¸¸ç, ³ª ÀÚ½ÅÀ» À§Çؼ º¸¾ÈÀ» ÇÏ´Â °ÍÀÌ ¾Æ´Ï±â¿¡ ´©±º°¡¿Í ÇÔ²² ¼ÕÀ» Àâ°í ´©±º°¡¿¡°Ô ¼ÕÀ» ³»¹Ð ¼ö ÀÖ¾î¾ß ÇÕ´Ï´Ù. ¿äÄÁ´ë ¿ìÁ÷ÇÔ°ú ÀÌŸ½ÉÀÌ º¸¾È °øºÎ¿¡ ÇÊ¿äÇÑ Ç°¼ºÀÌ ¾Æ´Ò±î ÇÕ´Ï´Ù. Á¶±ÞÇØÇÏÁö ¸»°í, Á¤º¸ »çȸÀÇ ¾ÈÀüÀ» À§ÇØ Çϳª¾¿ ¼ºÀåÇØ ³ª°¡´Â ¿ìÁ÷ÇÑ º¸¾ÈÀÎÀÌ µË½Ã´Ù. -ÀúÀÚ ¼¹® Áß¿¡¼
ÀúÀÚ¼Ò°³
»ý³â¿ùÀÏ | - |
---|
ÀúÀÚ ¹®¼ºÈ£´Â Æ÷ÅРȸ»çÀÇ ÀÚȸ»ç¿¡¼ º¸¾È °üÁ¦, º¸¾È ¼Ö·ç¼Ç ¿î¿µ, ¿ÀǼҽº Ä¿½ºÅ͸¶ÀÌ¡, ÀÚµ¿È, ±³À° ¾÷¹« µî º¸¾È °ü·Ã ¾÷¹«¸¦ ÁÖ·Î ¸Ã°í ÀÖ´Ù. Á¤º¸¸¦ ÁöÅ°°í Áö½ÄÀ» ³ª´©´Â ÀÏÀ» °¡Ä¡ ÀÖ´Ù°í ´À³¢¸ç, ¾÷¹« ¿Ü ½Ã°£¿¡´Â ±Û¾²±â¿Í ±³À°À» Áñ°Ü ÇÑ´Ù. Àú¼·Î´Â ¡´¼Ò¼³·Î ¹è¿ì´Â ÇØÅ·°ú º¸¾È ¾Ç¼ºÄڵ塵, ¡´¾î¼ ¿Í ÇØÅ·Àº óÀ½ÀÌÁö¡µ°¡ ÀÖ°í, °ø±â¾÷, Çб³, »ç¼³ ±³À° ±â°ü¿¡¼ 'Á¤º¸ º¸¾È°ú Àι®ÇÐ', 'Á¤º¸ º¸¾È Áø·Î Ž»ö', 'À¥ÇØÅ· ½Ç½À' Ư°À» ÁøÇàÇß´Ù. ºí·Î±×¿Í ±êÇãºêµµ ¿î¿µÇÏ°í ÀÖÀ¸¸ç, ¾ÕÀ¸·Îµµ ´õ ³ªÀº Ã¥À» ¼¼»ó¿¡ °ø°³ÇÒ ¼ö ÀÖµµ·Ï ³ë·ÂÇÏ°í ÀÖ´Ù.
ÀúÀÚÀÇ ´Ù¸¥Ã¥
Àüüº¸±âÄ®¸® ¸®´ª½º·Î ÆÄÇìÄ¡´Â µµÄ¿ ÇØÅ·
»ý³â¿ùÀÏ | - |
---|
ÇØ´çÀÛ°¡¿¡ ´ëÇÑ ¼Ò°³°¡ ¾ø½À´Ï´Ù.
ÁÖ°£·©Å·
´õº¸±â»óÇ°Á¤º¸Á¦°ø°í½Ã
À̺¥Æ® ±âȹÀü
Àü°øµµ¼/´ëÇб³Àç ºÐ¾ß¿¡¼ ¸¹Àº ȸ¿øÀÌ ±¸¸ÅÇÑ Ã¥
ÆǸÅÀÚÁ¤º¸
»óÈ£ |
(ÁÖ)±³º¸¹®°í |
---|---|
´ëÇ¥ÀÚ¸í |
¾Èº´Çö |
»ç¾÷ÀÚµî·Ï¹øÈ£ |
102-81-11670 |
¿¬¶ôó |
1544-1900 |
ÀüÀÚ¿ìÆíÁÖ¼Ò |
callcenter@kyobobook.co.kr |
Åë½ÅÆǸž÷½Å°í¹øÈ£ |
01-0653 |
¿µ¾÷¼ÒÀçÁö |
¼¿ïƯº°½Ã Á¾·Î±¸ Á¾·Î 1(Á¾·Î1°¡,±³º¸ºôµù) |
±³È¯/ȯºÒ
¹ÝÇ°/±³È¯ ¹æ¹ý |
¡®¸¶ÀÌÆäÀÌÁö > Ãë¼Ò/¹ÝÇ°/±³È¯/ȯºÒ¡¯ ¿¡¼ ½Åû ¶Ç´Â 1:1 ¹®ÀÇ °Ô½ÃÆÇ ¹× °í°´¼¾ÅÍ(1577-2555)¿¡¼ ½Åû °¡´É |
---|---|
¹ÝÇ°/±³È¯°¡´É ±â°£ |
º¯½É ¹ÝÇ°ÀÇ °æ¿ì Ãâ°í¿Ï·á ÈÄ 6ÀÏ(¿µ¾÷ÀÏ ±âÁØ) À̳»±îÁö¸¸ °¡´É |
¹ÝÇ°/±³È¯ ºñ¿ë |
º¯½É ȤÀº ±¸¸ÅÂø¿À·Î ÀÎÇÑ ¹ÝÇ°/±³È¯Àº ¹Ý¼Û·á °í°´ ºÎ´ã |
¹ÝÇ°/±³È¯ ºÒ°¡ »çÀ¯ |
·¼ÒºñÀÚÀÇ Ã¥ÀÓ ÀÖ´Â »çÀ¯·Î »óÇ° µîÀÌ ¼Õ½Ç ¶Ç´Â ÈÑ¼ÕµÈ °æ¿ì ·¼ÒºñÀÚÀÇ »ç¿ë, Æ÷Àå °³ºÀ¿¡ ÀÇÇØ »óÇ° µîÀÇ °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì ·º¹Á¦°¡ °¡´ÉÇÑ »óÇ° µîÀÇ Æ÷ÀåÀ» ÈѼÕÇÑ °æ¿ì ·½Ã°£ÀÇ °æ°ú¿¡ ÀÇÇØ ÀçÆǸŰ¡ °ï¶õÇÑ Á¤µµ·Î °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì ·ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·üÀÌ Á¤ÇÏ´Â ¼ÒºñÀÚ Ã»¾àöȸ Á¦ÇÑ ³»¿ë¿¡ ÇØ´çµÇ´Â °æ¿ì |
»óÇ° Ç°Àý |
°ø±Þ»ç(ÃâÆÇ»ç) Àç°í »çÁ¤¿¡ ÀÇÇØ Ç°Àý/Áö¿¬µÉ ¼ö ÀÖÀ½ |
¼ÒºñÀÚ ÇÇÇغ¸»ó |
·»óÇ°ÀÇ ºÒ·®¿¡ ÀÇÇÑ ±³È¯, A/S, ȯºÒ, Ç°Áúº¸Áõ ¹× ÇÇÇغ¸»ó µî¿¡ °üÇÑ »çÇ×Àº¼ÒºñÀÚºÐÀïÇØ°á ±âÁØ (°øÁ¤°Å·¡À§¿øȸ °í½Ã)¿¡ ÁØÇÏ¿© ó¸®µÊ ·´ë±Ý ȯºÒ ¹× ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó±Ý Áö±Þ Á¶°Ç, ÀýÂ÷ µîÀº ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀǼҺñÀÚ º¸È£¿¡ °üÇÑ ¹ý·ü¿¡ µû¶ó ó¸®ÇÔ |
(ÁÖ)ÀÎÅÍÆÄÅ©Ä¿¸Ó½º´Â ȸ¿ø´ÔµéÀÇ ¾ÈÀü°Å·¡¸¦ À§ÇØ ±¸¸Å±Ý¾×, °áÁ¦¼ö´Ü¿¡ »ó°ü¾øÀÌ (ÁÖ)ÀÎÅÍÆÄÅ©Ä¿¸Ó½º¸¦ ÅëÇÑ ¸ðµç °Å·¡¿¡ ´ëÇÏ¿©
(ÁÖ)KGÀ̴Ͻýº°¡ Á¦°øÇÏ´Â ±¸¸Å¾ÈÀü¼ºñ½º¸¦ Àû¿ëÇÏ°í ÀÖ½À´Ï´Ù.
¹è¼Û¾È³»
±³º¸¹®°í »óÇ°Àº Åùè·Î ¹è¼ÛµÇ¸ç, Ãâ°í¿Ï·á 1~2Àϳ» »óÇ°À» ¹Þ¾Æ º¸½Ç ¼ö ÀÖ½À´Ï´Ù.
Ãâ°í°¡´É ½Ã°£ÀÌ ¼·Î ´Ù¸¥ »óÇ°À» ÇÔ²² ÁÖ¹®ÇÒ °æ¿ì Ãâ°í°¡´É ½Ã°£ÀÌ °¡Àå ±ä »óÇ°À» ±âÁØÀ¸·Î ¹è¼ÛµË´Ï´Ù.
±ººÎ´ë, ±³µµ¼Ò µî ƯÁ¤±â°üÀº ¿ìü±¹ Åù踸 ¹è¼Û°¡´ÉÇÕ´Ï´Ù.
¹è¼Ûºñ´Â ¾÷ü ¹è¼Ûºñ Á¤Ã¥¿¡ µû¸¨´Ï´Ù.