'전체 글'에 해당되는 글 1435건

  1. 2008.07.16 전자신문 기고- 정보보호 홍보대사
  2. 2008.07.15 How to spoof a MAC address

반응형

오랜만에 전자신문에 기고를 해 보았습니다.  평소 하고 싶은 말을 할 수 있는 열린마당중에서 [현장에서] 라는 코너를 통하여 전달 할 수 있습니다..

제목은 "정보보호 홍보대사 위촉 안하는가? 모르는가? " 였는데 

그냥    " 정보보호 홍보대사" 라고 나왔네요..

참고 하세요..


사용자 삽입 이미지

아무래도 홍보대사가 있으면 훨씬 인식제고나 홍보에 도움이 되겠습니다. 특히 인기 있는 연예인들과 아직 윤리의식이 정립되지 않은 청소년들에게 올바른 인식을 심어 줄수 있을 것이라 생각합니다.

반응형
,

반응형



http://blogs.techrepublic.com.com/itdojo/?p=149&tag=nl.e101 



MAC
address filtering for wireless networking isn’t real “security”. Anyone who pays any attention to current trends in wireless security at all should know that MAC filtering is less effective than WEP — and that WEP can be cracked almost instantly these days with commonly available tools.

This doesn’t mean MAC filtering is useless. Its resource consumption is almost unmeasurable, and even if it doesn’t keep out any reasonably knowledgeable security crackers willing to spend a few moments gaining access, it does keep out a lot of automated opportunistic attacks that are aiming solely for the absolute lowest-hanging fruit on the security tree. Since that lowest-hanging fruit consists of the majority of wireless access points, MAC filtering can be of value as a way of turning away the majority of opportunistic attackers.

Don’t rely on MAC filtering alone, however. Please, just don’t. It’s a bad idea. People seem to think “Oh, well, sure a determined attacker can get past it, but not anyone else.” It doesn’t take much determination at all to spoof a MAC address. In fact, I’ll tell you how:

  1. “Listen” in on network traffic. Pick out the MAC address. This can be done with a plethora of freely available security tools, including Nmap.
  2. Change your MAC address.

You can spoof a MAC address when using Nmap with nothing more than a –spoof-mac command line option for Nmap itself to hide the true source of Nmap probes. If you give it a MAC address argument of “0″, it will even generate a random MAC address for you.

For more general MAC address spoofing, your MAC address is trivially reset with tools available in default installs of most operating systems. Here are some examples:

  • Linux: ifconfig eth0 hw ether 03:a0:04:d3:00:11
  • FreeBSD: ifconfig bge0 link 03:a0:04:d3:00:11
  • MS Windows: On Microsoft Windows systems, the MAC address is stored in a registry key. The location of that key varies from one MS Windows version to the next, but find that and you can just edit it yourself. There are, of course, numerous free utilities you can download to make this change for you as well (such as Macshift for MS Windows XP).

All of these techniques can of course be automated by self-propagating malware, and the creation of the malware can even be automated to some extent by existing malware creation “kits”. If that doesn’t convince you that MAC filtering does not provide real security, I don’t know what will.

반응형
,