-- ·|­û / µù¥U -- ¡@
¡@±b¸¹¡G
¡@±K½X¡G
¡@ | µù¥U | §Ñ°O±K½X
3/26 ·s®Ñ¨ì¡I 3/19 ·s®Ñ¨ì¡I 3/14 ·s®Ñ¨ì¡I 12/12 ·s®Ñ¨ì¡I
ÁʮѬyµ{¡EQ & A¡E¯¸°È¯d¨¥ª©¡E«ÈªA«H½c
¢x 3ds Max¢x Maya¢x Rhino¢x After Effects¢x SketchUp¢x ZBrush¢x Painter¢x Unity¢x
¢x PhotoShop¢x AutoCad¢x MasterCam¢x SolidWorks¢x Creo¢x UG¢x Revit¢x Nuke¢x
¢x C#¢x C¢x C++¢x Java¢x ¹CÀ¸µ{¦¡¢x Linux¢x ´O¤J¦¡¢x PLC¢x FPGA¢x Matlab¢x
¢x Àb«È¢x ¸ê®Æ®w¢x ·j¯Á¤ÞÀº¢x ¼v¹³³B²z¢x Fluent¢x VR+AR¢x ANSYS¢x ²`«×¾Ç²ß¢x
¢x ³æ´¹¤ù¢x AVR¢x OpenGL¢x Arduino¢x Raspberry Pi¢x ¹q¸ô³]­p¢x Cadence¢x Protel¢x
¢x Hadoop¢x Python¢x Stm32¢x Cortex¢x Labview¢x ¤â¾÷µ{¦¡¢x Android¢x iPhone¢x
¥i¬d®Ñ¦W,§@ªÌ,ISBN,3dwoo®Ñ¸¹
¸Ô²Ó®ÑÄy¤ÀÃþ

¸ê¦w±M®a½ÍWireshark¡UWireshark»PMetasploit¾ã¦XÀ³¥Î

( ÁcÅé ¦r)
§@ªÌ¡GJessey Bullock, Jeff T. ParkerÃþ§O¡G1. -> ¦w¥þ -> ºô¸ô¦w¥þ -> Àb«È§ðÀ»»P¤J«I
ĶªÌ¡G¦¿´ò®ü
¥Xª©ªÀ¡GùÖ®p¥Xª©¸ê¦w±M®a½ÍWireshark¡UWireshark»PMetasploit¾ã¦XÀ³¥Î 3dWoo®Ñ¸¹¡G 49484
¸ß°Ý®ÑÄy½Ð»¡¥X¦¹®Ñ¸¹¡I

¡i¯Ê®Ñ¡j
NT©w»ù¡G 480 ¤¸
§é¦©»ù¡G 360 ¤¸

¥Xª©¤é¡G7/9/2018
­¶¼Æ¡G306
¥úºÐ¼Æ¡G0
¯¸ªø±ÀÂË¡G
¦L¨ê¡G¶Â¥Õ¦L¨ê»y¨t¡G ( ÁcÅé ª© )
¥[¤JÁʪ«¨® ¢x¥[¨ì§Úªº³Ì·R
(½Ð¥ýµn¤J·|­û)
ISBN¡G9789864768660
§@ªÌ§Ç¡@|¡@ĶªÌ§Ç¡@|¡@«e¨¥¡@|¡@¤º®e²¤¶¡@|¡@¥Ø¿ý¡@|¡@§Ç
(²Åé®Ñ¤W©Ò­z¤§¤U¸ü³sµ²¯Ó®É¶O¥\, ®¤¤£¾A¥Î¦b¥xÆW, ­YŪªÌ»Ý­n½Ð¦Û¦æ¹Á¸Õ, ®¤¤£«OÃÒ)
§@ªÌ§Ç¡G

ĶªÌ§Ç¡G

«e¨¥¡G

¤º®e²¤¶¡G

Wireshark¬O¤@®MÀ³¥Î¼sªx¡]¥]¬A¸ê¦w»â°ì¡^ªººô¸ô¤ÀªR¤u¨ã¡A¥¦¥i¥HÀ°§U±z¹d²ÓÃû¿òªºÀ˵øºô¸ô¡AÂ×´Iªº¥\¯à»P¤ä´©ÅýWireshark¦¨¬°µL»ùªº¸ê¦w¤u¨ã¡A¦ý¤]¦]¦¹Åý·s¤â«o¨B¡C¥»®Ñ¥i¥HÀ°§U±z§Ö³t¤W¤â¡A¾Ç·|¦p¦ó§Q¥ÎWireshark©M¬ÛÃö¤u¨ã (¦pTShark)¡B»{ÃÑMetasploit³o­ÓµÛ¦Wªºº¯³z´ú¸Õ®Ø¬[¡A¥H¤Î§Q¥ÎLuaÅýWiresharkµo´§§ó¤jªº«Â¤O¡C¥»®Ñ²[»\§ðÀ»»P¨¾¿m§Þ³N»P¤u¨ãªº±´°Q¡A¥i¥HÀ°§U±z¡G¡D¤F¸ÑWireshare¤Î¬ÛÃö¤u¨ãªº°ò¦¾Þ§@¡D¾Ç²ß¦p¦ó¨Ï¥ÎLua¸}¥»¨ÓÂX¥RWiresharkªº¥\¯à¡D§Q¥ÎWireshark¶i¦æ§ðÀ»»P¨¾¿m§Þ³Nªº¬ã¨s¡D³z¹LKali Linux¶i¦æº¯³z´ú¸Õªº¹ê¾Ôºt½m¡D§Q¥ÎDocker«Ø¸m¤@­Ó¼ÒÀÀ¯u¹ê°Ó·~ºô¸ôªºµêÀÀÀô¹Ò¡D§Q¥ÎMitM§Þ³N§ì¨ú«Ê¥]ªº§Þ¥©¡D­×§ï­ì©l½X¨Ó±j¤Æ±zªº¤u¨ã¶°
¥Ø¿ý¡G

Chapter 1 Wireshark ²¤¶
¤°»ò¬OWireshark¡H
Wiresharkªº¨Ï¥ÎªÌ¬É­±
¹LÂo¾¹
½Ò«á²ßÃD

Chapter 2 «Ø¸m¹êÅçÀô¹Ò
Ãö©óKali Linux
µêÀÀ¤Æ§Þ³N
VirtualBox
W4SP¹êÅçÀô¹Ò
¾Ç²ßºK­n
½Ò«á²ßÃD

Chapter 3 ¥²³Æªº°ò¦²z½×
ºô¸ô§@·~­ì²z
¦w¥þ©Ê
¤ÀªR«Ê¥]©M¨ó©w
¾Ç²ßºK­n
½Ò«á²ßÃD

Chapter 4 Â^¨úºô¸ô«Ê¥]
¶i¦æ¶å±´
»Pºô¸ô¹L©Û
Ū¨ú©MÀx¦sÂ^¨úªºÀÉ®×
¸Ñ­å¾¹
À˵ø§O¤HÂ^¨úªº«Ê¥]
¾Ç²ßºK­n
½Ò«á²ßÃD

Chapter 5 ¶EÂ_§ðÀ»¦æ¬°
§ðÀ»Ãþ«¬¡G¤¤¶¡¤H§ðÀ»¡H
§ðÀ»Ãþ«¬¡GªýÂ_ªA°È
§ðÀ»Ãþ«¬¡G¶i¶¥«ùÄò«Â¯Ù
¾Ç²ßºK­n
½Ò«á²ßÃD

Chapter 6 §ðÀ» Wireshark
§ðÀ»¤èªk½×
§Q¥ÎWireshark¶i¦æ°»¹î
³WÁ×IPS/IDS°»´ú
º|¬}§Q¥Î
³z¹LSSH¶i¦æ»·ºÝÂ^¨ú
¾Ç²ßºK­n
½Ò«á²ßÃD

Chapter 7 Wireshark ºî¦XÀ³¥Î
¸Ñ±KSSL/TLS¬y¶q
USB»PWireshark
ø»sºô¸ô¹Ï
¾Ç²ßºK­n
½Ò«á²ßÃD

Chapter 8 ¨Ï¥ÎLua½s¼g¸}¥»
¬°¤°»ò¿ï¾Ü Lua¡H
¼¶¼g¸}¥»ªº°ò¦ª¾ÃÑ
³]©wÀô¹Ò
ÀˬdTools¥\¯àªí
«Ø¥ßWireshark¸Ñ­å¾¹
ÂX¥RWireshark¥\¯à
¾Ç²ßºK­n
§Ç¡G