🌐 네트워크
-
[네트워크 실습] Intrusion Detection and Honeypot Analysis🌐 네트워크 2022. 10. 11. 19:58
Objective 1) learn how to analyze the log of a honeypot and determine information about the attacks that occurred. 2) learn the behavior of attackers and the measures that should be taken to make system safe. Task The file "attack.log" contains logs recorded during the time of the attack. Use Wireshark to analyze it. 1. What is the IP of the attacker? How about its physical location (country) ? ..
-
[Abbreviations] 네트워크 용어🌐 네트워크 2022. 9. 26. 16:11
ARP Address Resolution Protocol DHCP Dynamic Host Configuration Protocol HTTP Hypertext Transfer Protocol ICMP Internet Control Message Protocol IP Internet Protocol RJ Registered Jack TCP Transmission Control Protocol URL Uniform Resource Locator UTP Unshielded Twisted Pair