'전체 글'에 해당되는 글 1440건

  1. 2008.07.15 How to spoof a MAC address
  2. 2008.07.15 내 시스템에 어떤 프로세스가 돌고 있을까? - What's running 2

반응형



http://blogs.techrepublic.com.com/itdojo/?p=149&tag=nl.e101 



MAC
address filtering for wireless networking isn’t real “security”. Anyone who pays any attention to current trends in wireless security at all should know that MAC filtering is less effective than WEP — and that WEP can be cracked almost instantly these days with commonly available tools.

This doesn’t mean MAC filtering is useless. Its resource consumption is almost unmeasurable, and even if it doesn’t keep out any reasonably knowledgeable security crackers willing to spend a few moments gaining access, it does keep out a lot of automated opportunistic attacks that are aiming solely for the absolute lowest-hanging fruit on the security tree. Since that lowest-hanging fruit consists of the majority of wireless access points, MAC filtering can be of value as a way of turning away the majority of opportunistic attackers.

Don’t rely on MAC filtering alone, however. Please, just don’t. It’s a bad idea. People seem to think “Oh, well, sure a determined attacker can get past it, but not anyone else.” It doesn’t take much determination at all to spoof a MAC address. In fact, I’ll tell you how:

  1. “Listen” in on network traffic. Pick out the MAC address. This can be done with a plethora of freely available security tools, including Nmap.
  2. Change your MAC address.

You can spoof a MAC address when using Nmap with nothing more than a –spoof-mac command line option for Nmap itself to hide the true source of Nmap probes. If you give it a MAC address argument of “0″, it will even generate a random MAC address for you.

For more general MAC address spoofing, your MAC address is trivially reset with tools available in default installs of most operating systems. Here are some examples:

  • Linux: ifconfig eth0 hw ether 03:a0:04:d3:00:11
  • FreeBSD: ifconfig bge0 link 03:a0:04:d3:00:11
  • MS Windows: On Microsoft Windows systems, the MAC address is stored in a registry key. The location of that key varies from one MS Windows version to the next, but find that and you can just edit it yourself. There are, of course, numerous free utilities you can download to make this change for you as well (such as Macshift for MS Windows XP).

All of these techniques can of course be automated by self-propagating malware, and the creation of the malware can even be automated to some extent by existing malware creation “kits”. If that doesn’t convince you that MAC filtering does not provide real security, I don’t know what will.

반응형
,

반응형


이름에서 알수 있듯이 내 시스템에서 어떤 프로세스가 돌고 있을까 하는 유틸리티 프로그램이다. 꼭 프로세스가 아니더라도 몇가지 기능이 더 있는데 이것을 보면 각종 악성코드나 기타 악의적인 프로세스 등을 찾을때 쉽게 찾을수 있어 도움이 될 것 같다.
사용자 삽입 이미지
                                 <클릭하면 화면을 크게 보실수 있습니다>


다운로드는 여기서 받을수 있으며 윈도우용이니까 윈도우용으로 잘 활용 하면 되겠다.

반응형

'Security Utility' 카테고리의 다른 글

pdfconvert  (0) 2008.07.25
안티바이러스 솔루션  (0) 2008.07.25
불법 SW설치 점검 프로그램 - Inspector  (1) 2008.06.21
USB메모리 감염 바이러스 실행차단 프로그램 배포  (3) 2008.06.21
무결성 툴  (3) 2008.05.28
,