°øÁö»çÇ×
2015.09.09 / 13:04

¾ÆÅ¥³×ƽ½º À¥ Ãë¾à¼º Á¡°Ëµµ±¸ - Review

autodev
Ãßõ ¼ö 479

A REAL WORLD REVIEW

MSI::Labs

2006³â 5¿ù

¾ÆÅ¥³×ƽ½º À¥ Ãë¾àÁ¡ Á¡°Ë µµ±¸´Â?

¾ÆÅ¥³×ƽ½º À¥ Ãë¾àÁ¡ Á¡°Ë µµ±¸´Â À¥ ¾ÖÇø®ÄÉÀ̼ǿ¡¼­ º¸¾È ÇãÁ¡ÀÌ´Â °ø°ÝÀÚ°¡ ½Ã½ºÅÛ°ú µ¥ÀÌÅÍ·ÎÀÇ ºÒ¹ýÀûÀÎ Á¢±ÙÀ» ȹµæÇϱâ À§ÇØ ¾Ç¿ëµÉ ¼ö ÀÖ½À´Ï´Ù - À» ã¾Æ³»±â À§ÇØ ¸¸µé¾îÁø µµ±¸ÀÔ´Ï´Ù. ÀÌ´Â SQL injection, Cross Site Scripting°ú ¾ÏÈ£ Ãë¾àÁ¡ µîÀ» Æ÷ÇÔÇÑ ´ÙÁßÀÇ Ãë¾àÁ¡µéÀ» ã¾ÆÁÝ´Ï´Ù.

º» Á¦Ç°Àº À¥°ú ¾ÖÇø®ÄÉÀÌ¼Ç Ãë¾àÁ¡À» Á¡°ËÀ» ½ÇÇàÇϱâ À§ÇØ ÀÌ¿ëµÉ ¼ö ÀÖ°í, È®ÀÎµÈ ¹®Á¦Á¡¿¡ ´ëÇÑ ¸ðÀÇħÅõ °Ë»ç¸¦ ½ÇÇàÇϱâ À§ÇØ ÀÌ¿ë µÉ ¼ö ÀÖ½À´Ï´Ù. °¢ Ãë¾àÁ¡¿¡ Á¦°øµÇ´Â ¿ÏÈ­Á¦¾Èµé(mitigation suggestions)Àº °Ë»çµÈ À¥ ¼­¹ö ¶Ç´Â ¾ÖÇø®ÄÉÀ̼ÇÀÇ º¸¾È¼ºÀ» Çâ»ó½ÃÅ°´Âµ¥ ÀÌ¿ë µÉ ¼ö ÀÖ½À´Ï´Ù.

º» ¸®ºä´Â

MicroSolved, Inc´Â Real World Å×½ºÆ®¿¡ ¾ÆÅ¥³×ƽ½º¸¦ ÀÌ¿ëÇÏ¿´½À´Ï´Ù. ½ÇÁ¦ Ãë¾àÁ¡ Æò°¡¿Í ħÅõ Å×½ºÆ® µ¿¾È ³ªÅ¸³½ ³»¿ëÀ¸·Î °Ë»çÇÏ¿´½À´Ï´Ù.

º» µ¥½ºÆ®´Â ¼ö¸¹Àº ħÅõÅ×½ºÆ® °æÇè°ú ±¤¹üÀ§ÇÑ »ó¿ë ¹× ¿ÀÇ ¼Ò½º À¥/¾ÖÇø®ÄÉÀÌ¼Ç Á¡°Ë µµ±¸µé¿¡ ´ëÇÑ Áö½ÄÀ» °âºñÇÑ Àü¹® Æгο¡ ÀÇÇØ ½ÇÇàµÇ¾ú½À´Ï´Ù. Å×½ºÆ® µ¿¾È, ´Ù¼öÀÇ À¥ »çÀÌÆ®°¡ Æò°¡µÇ¾ú½À´Ï´Ù. º» À̵é À¥ »çÀÌÆ®¿Í º» ħÅõÅ×½ºÆ®¿¡¼­ Á¡°ËÇ׸ñÀº º» ¸®ºä Áß ÀԷ°ªÃ³·³ ÀÌ¿ëµË´Ï´Ù. ¾ÆÅ¥³×ƽ½º À¥ Ãë¾àÁ¡ ºÐ¼®µµ±¸ÀÇ °¢ ±â´ÉÀº 1-5ÀÇ Ã´µµ·Î Ç¥½ÃµÇ¾ú°í, 5°¡ °¡Àå ÁÁÀº Á¡¼ö°¡ µË´Ï´Ù.

¼³Ä¡ ¹× ¾÷µ¥ÀÌÆ® ±¸Á¶

¼³Ä¡´Â ¹Ù·Î ÁøÇàµË´Ï´Ù. ÀüÇüÀûÀÎ À©µµ¿ì ¼³Ä¡ ÀýÂ÷°¡ ½ÇÇà °¡´ÉÇϵµ·Ï Á¦°øµË´Ï´Ù. ¼³Ä¡¸¦ À§ÇØ ÇÊ¿äÇÑ À¯ÀÏÇÑ ÀԷ°ªÀº ¹ß±ÞµÈ ¶óÀ̼¾½ºÀÔ´Ï´Ù. º» ÇÁ·Î±×·¥Àº ¾÷µ¥ÀÌÆ® ±¸Á¶¸¦ ³»ÀåÇÏ¿© Á¦°øÇÏ°í ÀÖ½À´Ï´Ù. ¾ÆÅ¥³×ƽ½º´Â ÇÁ·Î±×·¥À» Àç ½ÃÀÛÇÏÁö ¾Ê°íµµ ¾÷µ¥ÀÌÆ®µÈ ³»¿ëÀ» Àû¿ëÇÏ´Â °ÍÀÌ °¡´ÉÇÕ´Ï´Ù. ¾ÆÅ¥³×ƽ½º´Â ½ÃÀ۽à ¾÷µ¥ÀÌÆ®¸¦ È®ÀÎÇϰųª ¾÷µ¥ÀÌÆ® ±â´ÉÀ» ¸Å´º¾ó·Î ÀÌ¿ëÇÒ ¶§¸¸ È®ÀÎÇÒ ¼ö ÀÖµµ·Ï ¼³Á¤ÇÒ ¼ö ÀÖ´Â ¼±ÅûçÇ×À» °¡Áö°í ÀÖ½À´Ï´Ù.

Á¡°Ë µµ±¸ ¼³¸í

Á¡°Ëµµ±¸ÀÇ ÀÎÅÍÆäÀ̽º´Â ±â´É¿¡ ÀÇÇØ ¼öÇà¾÷¹«°¡ ¹èºÐµË´Ï´Ù. µ¥ÀÌÅÍ°¡ µµ±¸°£¿¡ °øÀ¯, º¹»ç ±×¸®°í ºÙ¿©Áö´Â µ¿¾È, ÇØ´ç ÀÎÅÍÆäÀ̽º´Â À¥ ¾ÖÇø®ÄÉÀÌ¼Ç Æò°¡ ½ÇÇà°ú ÇÔ²² ¿¬°èµÇ¾î ¼öÇà ¾÷¹«¸¦ ó¸®ÇÏ´Â ³í¸®ÀûÀÌ°í È¿°úÀûÀÎ ¹æ¹ýÀ» »ý¼ºÇÕ´Ï´Ù. °¢°¢ÀÇ °íÀ¯ÇÑ µµ±¸¿Í ±â´ÉÀº ´ÙÀ½°ú °°½À´Ï´Ù.

À¥ ½ºÄ³³Ê(Web Scanner):

Á¡°ËÀ» ½ÃÀÛÇÒ ¶§, ¾ÆÅ¥³×ƽ½º´Â ¾î¶² ±â¼úÀÌ ÀÌ¿ëµÇ´ÂÁö¸¦ °áÁ¤Çϱâ À§ÇØ ºü¸¥ ¼­¹ö ã±â¸¦ ¼öÇàÇÕ´Ï´Ù. À̸¦ ÅëÇØ PHP°¡ ÀÌ¿ëµÇ°í ÀÖ´Ù°í È®ÀεǸé, ¾ÆÅ¥³×ƽ½º´Â PHP Ãë¾àÁ¡µé°ú °ü·ÃµÈ ³»¿ëÀ» Á¡°ËÇÕ´Ï´Ù. ¹°·Ð ¾ÆÅ¥³×ƽ½º°¡ Á¡°ËÇؾßÇÏ´Â Ãë¾àÁ¡À» ÇÑÁ¤Çϱâ À§ÇØ »ç¿ëµÈ ±â¼úÀ» ¼öµ¿À¸·Î ¼±ÅÃÇÒ ¼öµµ ÀÖ½À´Ï´Ù. °Ë»ç´Â ´ëÇü»çÀÌÆ®¸¦ Á¡°ËÇÏ´õ¶ó°í »ó´çÈ÷ ºü¸£°Ô ÀÌ·ç¾î Áý´Ï´Ù.
°Ë»çµµ±¸´Â SQL injection ÀÌ¿ë, Cross Site Scripting Ãë¾àÁ¡, ÀϹÝÀûÀÎ ±âº» ÆÄÀÏ(¿¹ÄÁµ¥, manuals, ¡°test¡± ÆÄÀÏ),°ú ¼­¹öÀÇ À߸øµÈ ¼³Á¤(¿¹¸¦ µé¸é, TRACK, TRACE enable)µîÀ» È®ÀÎÇÕ´Ï´Ù. ¾ÆÅ¥³×ƽ½ºÀÇ Á¡°Ëµµ±¸´Â ÀϹÝÀûÀ¸·Î Á¡°Ë¿¡ ÀÌ¿ëµÇ´Â µµ±¸¿Í °°Àº ¿ªÇÒÀ» ¼öÇàÇÏ´Â °Í»Ó¸¸ ¾Æ´Ï¶ó, ¾î¶² °æ¿ì¿¡´Â Á¡°Ëµµ±¸ ÀÌ»óÀÇ ¿ªÇÒÀ» ¼öÇàÇÕ´Ï´Ù. ´Ù¸¥ Á¡°Ëµµ±¸¿¡ ÀÇÇØ Ã£¾Æ³»Áö ¸øÇÏ´Â ÆÄÀϵé°ú ÆäÀÌÁöµéÀ» ¾ÆÅ¥³×ƽ½º´Â µÎ ¹è·Î ã¾Æ³À´Ï´Ù. ¾ÆÅ¥³×ƽ½º´Â SQL injection°ú Cross Site ScriptingÀ» ã¾Æ È®ÀÎÇÒ ¼ö ÀÖ°ÔÇÏ´Â ÃÖ°íÀÇ µµ±¸ ÀÔ´Ï´Ù.
ÀÚü Á¦ÀÛÇÑ ¿¡·¯ÆäÀÌÁö¸¦ ƯÁ¤ÇÒ ¼ö ÀÖ°Ô ÇÏ´Â ±â´ÉÀ» ÅëÇØ ¿ÀŽµµ ÁÙÀÏ ¼ö ÀÖ½À´Ï´Ù. ÀÌ´Â ´Ù¸¥ µµ±¸µéÀº °¡Áö°í ÀÖÁö ¾ÊÀº ÈǸ¢ÇÑ ±â´ÉÀÔ´Ï´Ù. º» Á¡°Ëµµ±¸´Â ¶ÇÇÑ ÀüÀÚ¸ÞÀÏ°ú ¿¬°áµÇÁö ¾ÊÀº ¸µÅ©¿Í °°Àº ´Ù¸¥ Á¤º¸¸¦ ¹ß°ßÇÏ°í ºÐ·ùÇÕ´Ï´Ù. ÀϹÝÀûÀ¸·Î ħÅõÅ×½ºÆ® µ¿¾È À¥ ÆäÀÌÁö¿¡¼­ ÀüÀÚ¸ÞÀÏ ÁÖ¼Ò¸¦ »Ì¾Æ³»´Â °Íó·³, º» µµ±¸°¡ À¯¿ëÇÏ°Ô ÀüÀÚ¸ÞÀÏ ÁÖ¼Ò¸¦ ¼öÁýÇÏ´Â °ÍÀ» ¹ß°ßÇß½À´Ï´Ù.
º» Á¡°Ëµµ±¸´Â ¼Ó¼ÓµéÀÌ ºü¸£°Ô Á¡°ËÇÏ°í ´Ù¸¥ Á¡°Ëµµ±¸¿¡¼­ ãÀ» ¼ö ¾ø´Â ±â´ÉµéÀ» °¡Áö°í ÀÖ½À´Ï´Ù.
ÆòÁ¡: 4.5
À¥ ¼öÁý±â(Web Crawler):
½ºÆÄÀÌ´õ ±â´ÉÀº À¥ »çÀÌÆ®¸¦ ¼öÁýÇÏ°í »çÀÌÆ® ±¸Á¶ÀÇ °èÃøÀûÀÎ ¸ð¾çÀ» º¸¿©ÁÝ´Ï´Ù. °Ô´Ù°¡, ½ºÆÄÀÌ´õ´Â ÆäÀÌÁö³»¿¡¼­ referrer ÆäÀÌÁö, Çì´õ, ±×¸®°í º¯¼ö¿Í °°Àº Á¤º¸¸¦ ¼öÁýÇÕ´Ï´Ù. ±âº»ÀûÀ¸·Î, ÇØ´ç µµ±¸´Â Àüü À¥»çÀÌÆ®¸¦ ¼öÁýÇÏÁö¸¸, ¿øÇÏ´Â ºÎºÐ¸¸À» ¼±ÅÃÇÏ¿© È®ÀåÇÏ¿© ¼öÁýÇÏ´Â °ÍÀ» Á¦ÇÑÇÒ ¼ö ÀÖ½À´Ï´Ù. º» ¸®ºä¸¦ ÅëÇؼ­ ÇØ´ç ¼öÁý µµ±¸°¡ ºü¸£°í ´ë»ó »çÀÌÆ®ÀÇ ÀüüÀûÀÎ ·¹À̾ƿôÀ» ÀÌÇØÇϴµ¥ µµ¿òÀ» ÁÖ´Â Á¤º¸¸¦ º¸¿©Áشٴ °ÍÀ» ¹ß°ßÇß½À´Ï´Ù. ÇÏÁö¸¸, º» ¼öÁý±â°¡ ´ë»ó »çÀÌÆ®ÀÇ À߸ø ±¸¼ºµÈ ÇÑ ºÎºÐ¿¡ À̸£·¯¼­ ·çÇÁ¿¡ °É·Á ¸ØÃ߱⵵ Çß½À´Ï´Ù. °áÇÔÀ» È®ÀÎÇϱâ À§ÇØ ¼­³Ê °³ÀÇ ´Ù¸¥ ¾ÖÇø®ÄÉÀ̼ÇÀ¸·Î ±¸¼ºµÈ ´ë»ó »çÀÌÆ®¸¦ ¼öÁýÇϴµ¥, ±× Áß Çϳª´Â ´Ù½Ã ¹«ÇÑ ·çÇÁ¿¡ °É·È½À´Ï´Ù. °ø±³·Ó°Ôµµ ¾î°¼­ ÀÌ·¯ÇÑ ¹®Á¦°¡ ¹ß»ýÇÏ¿´´ÂÁö È®ÀÎÇÒ ¼ö °¡ ¾ø¾úÀ¸¸ç, ¿Ö ´Ù¸¥ ¾ÖÇø®ÄÉÀ̼ÇÀº ¹®Á¦¾øÀÌ »çÀÌÆ® ¼öÁýÀÌ µÇ¾ú´ÂÁö¸¦ ÆǺ°ÇÒ ¼ö ¾ø¾ú½À´Ï´Ù. ºÎÁ·ÇÔÀÌ ¾ø´Â ÁÖ¿ä ±â´É°ú ÈǸ¢ÇÑ º¸±â ±â´É, ±×¸®°í ºü¸¥ ¼öÁý´É·ÂÀ¸·Î ÀÎÇØ, º» ¸®ºä¿¡¼­ ¼öÁý±â¿¡ 4.5°³ÀÇ º°À» ÁÖ¾ú½À´Ï´Ù.

Rating: 4.5

Á¡°Ë ´ë»ó ã±â µµ±¸(Target Finder):

´ë»ó ã±â µµ±¸´Â ÁÖ¾îÁø ÁÖ¼ÒÀÇ ¹üÀ§¿¡¼­ À¥ »çÀÌÆ®¸¦ ãÀ» ¼ö ÀÖ°Ô ¼³°èµÈ °£´ÜÇÑ Æ÷Æ® ½ºÄ³³ÊÀÔ´Ï´Ù. ÁÖ¼ÒÀÇ ¹üÀ§´Â ÇÑÁ¤µÇÁö ¾Ê¾Ò°í, Ç¥ÁØÆ÷Æ®¸¦ »ç¿ëÇÏÁö ¾Ê´Â À¥ »çÀÌÆ®¸¦ ¹ß°ßÇÒ ¼ö ÀÖ°Ô ¿øÇÏ´Â Æ÷Æ®¸¦ ã¾Æº¼ ¼ö ÀÖµµ·Ï ƯÁ¤ÇÒ ¼ö ÀÖ½À´Ï´Ù. ¶ÇÇÑ »ç¿ëÁßÀÎ À¥ ¼­¹öÀÇ Á¾·ù¸¦ ÆǺ°Çϱâ À§ÇÑ ½Ãµµµµ ÇÕ´Ï´Ù.

ÀÌ·¯ÇÑ ±â´ÉÀÌ °¡Áø ¸î °¡Áö ¼­Å÷ ¹®Á¦Á¡µéÀ» °æÇèÇß½À´Ï´Ù. Á¡°ËÀ» À§ÇØ CŬ·¡½º ÁÖ¼ÒÁöÀÇ Àý¹ÝÀ» ÁöÁ¤ÇØ ÁÖ¾úÀ» ¶§, ±×°÷¿¡ À¥ ¼­¹ö°¡ ÀÌ¹Ì Á¸ÀçÇÏ°í ÀÖ´Â °ÍÀ» ¾Ë°í ÀÖ¾úÁö¸¸, À¥ ¼­¹ö¸¦ ÆǺ°ÇØ ³»Áö ¸øÇß½À´Ï´Ù. ÁÖ¼ÒÁö¸¦ °¨¼Ò½ÃŲ °æ¿ì¿¡, Á¸ÀçÇÏ´Â ¼­¹ö¸¦ Á¤È®ÇÏ°Ô ÆǺ°Çß½À´Ï´Ù. ´ë±Ô¸ð ÁÖ¼ÒÁö¸¦ ¹üÀ§·Î ÁÙ °æ¿ì Á¤»óÀûÀ¸·Î µ¿ÀÛÇÒ ¼ö ¾ø´Ù´Â »ç½Ç ¶§¹®¿¡, ÇØ´ç µµ±¸¿¡´Â 2°³ÀÇ º°À» ÁÖ¾ú½À´Ï´Ù.
Rating: 2
HTTP ÆíÁý±â¿Í ½º´ÏÆÛ(HTTP Editor and Sniffer):


ÀÌµé µµ±¸´Â º¸°í°Å³ª ÆíÁýÇϰųª HTTP ¿äûÀ» »ý¼ºÇÒ ¼ö ÀÖµµ·Ï ÇÕ´Ï´Ù. À̴ ħÅõ °Ë»çÀÚ°¡ ¼­¹ö¿Í Ŭ¶óÀ̾ðÆ® °£ÀÇ Æ®·¡ÇÈÀ» ºÐ¼®ÇÏ´Â °ÍÀ» Çã¿ëÇϵµ·Ï ¼³°èµÇ¾ú½À´Ï´Ù. ÀÌ·¯ÇÑ Á¤º¸·Î, SQL injection°ú Cross Site Scripting Ãë¾àÁ¡¿¡ ´ëÇÑ °ø°ÝÀ» ÀÚüÀûÀ¸·Î »ý¼ºÇÏ´Â °ÍÀÌ °¡´ÉÇÕ´Ï´Ù. ½º´ÏÆÛ´Â ¶ÇÇÑ ¼­¹ö·Î º¸³»Áö±â Àü ¶Ç´Â µ¥ÀÌÅ͸¦ ¹Þ±â Àü¿¡ µ¥ÀÌÅ͸¦ Â÷´ÜÇϰųª ¼öÁ¤ÇÏ´Â °ÍÀ» Çã¿ëÇÏ¿© Ŭ¶óÀ̾ðÆ® ´Ü °ËÁõÀ» ¿ìȸÇÏ´Â °ÍÀ» Çã¿ëÇÕ´Ï´Ù. ÀÌ·¯ÇÑ µµ±¸´Â ½ºÄ³³Ê°¡ ÀÚµ¿À¸·Î ó¸®Çϱ⠾î·Á¿î ¾ÖÇø®ÄÉÀ̼ǿ¡ ±í°Ô ÆÄ°íµé¾î °¡´Â °ÍÀÌ °¡´ÉÇÏ°Ô ÇÕ´Ï´Ù. È®½ÇÈ÷, ÀÌ´Â º» Á¦Ç°¿¡¼­ ¸¸Á·½º·´°Ô º¼ ¼ö ÀÖ´Â ¾ÆÁÖ °¡Ä¡ÀÖ´Â ±â´ÉÀÔ´Ï´Ù. ÀÎÅÍÆäÀ̽º´Â °£¼ÒÈ­µÉ ¼ö ÀÖÁö¸¸, ´Ù¸¥ ¸é¿¡ ÀÖ¾î ÀÌ´Â ¶Ç ´Ù¸¥ ÃÖ°í µî±ÞÀ» ÁÙ ¼ö ÀÖ´Â ±â´ÉÀÔ´Ï´Ù.

Rating: 4

HTTP Ç»Á®(HTTP Fuzzer):

HTTP fuzzer´Â ÆíÁý±â ¹× sniffer¿Í °ü°è ÀÖ½À´Ï´Ù. ÇÏÁö¸¸, fuzzer´Â º¯¼ö¿¡ ¹®ÀÚ ÁÖÀÔÀ» ¸Å´º¾ó·Î ÇÏ´Â ´ë½Å¿¡ ÀÚµ¿À¸·Î ÁÖÀÔÇÒ ¼ö ÀÖ½À´Ï´Ù. FuzzingÀº ¹öÆÛ¿À¹öÇ÷ο쿡 ´ëÇÑ ºê·çÆ® Æ÷½º °Ë»ç¸¦ ºü¸£°í ½±¿î ¹æ¹ýÀ¸·Î °¡´ÉÇÏ°Ô ÇÕ´Ï´Ù. fuzzer¸¦ À§ÇÑ ¼±ÅûçÇ×Àº ´Ù¾çÇϸç, fuzz ÇÒ ¼ö ÀÖ´Â ´Ù¾çÇÑ ÇüÅÂÀÇ ¹®ÀÚ¿­°ú ij¸¯ÅÍ ½ºÀ§Ä¡¸¦ »ý¼ºÇÒ ¼ö ÀÖµµ·Ï ÇÕ´Ï´Ù. ÀÚµ¿È­µÈ fuzzingÀ» Çѹøµµ ½ÃµµÇØ º¸Áö ¾ÊÀº »ç¶÷À̶ó¸é »ç¿ëÀÚ ÀÎÅÍÆäÀ̽º°¡ ¾à°£ È¥¶õ½º·¯¿ï ¼öµµ ÀÖÁö¸¸, ¸Å´º¾ó¿¡ ªÀº ÀÚ½À¼­°¡ Æ÷ÇԵǾî ÀÖ½À´Ï´Ù. ÆíÁý±â¿Í ½º´ÏÆÛ°¡ ÇÔ²²¶ó¸é, ÀÌ´Â º¸´Ù ³ôÀº Á¡¼ö¸¦ ÁÙ ¼ö ÀÖÀ»¸¸ÇÑ ¶Ç ´Ù¸¥ ÈǸ¢ÇÑ ±â´ÉÀÔ´Ï´Ù.

Rating: 4

ÀÎÁõ °Ë»ç µµ±¸(Authentication Tester):

º» ±â´ÉÀº °¨ÅºÇÒ ¸¸ ÇÕ´Ï´Ù. ÁÁÀº À¥ »çÀÌÆ® ÀÎÁõ ºê·çÆ® Æ÷½º µµ±¸°¡ ¸¹ÀÌ ÀÖÁö ¾Ê¾Æ¼­¶ó´Â ÀÌÀ¯»Ó¸¸ÀÌ ¾Æ´Ï¶ó, º» µµ±¸°¡ Á¤¸» Àß µ¿ÀÛÇϱ⠶§¹®ÀÔ´Ï´Ù. º» ÀÎÁõ °Ë»ç µµ±¸´Â HTTP ÀÎÁõ(Æ˾÷ ¹Ú½º ÇüÅÂ)°ú HTML ÀÔ·ÂÆû µÎ °¡Áö¸¦ ´Ù °Ë»çÇÒ ¼ö ÀÖ½À´Ï´Ù.
HTTP ÀÎÁõÀ» °Ë»çÇÒ ¶§, ÀÌ´Â º¸´Ù ¸íÈ®ÇÏ°Ô µ¿ÀÛÇÕ´Ï´Ù. »ç¿ëÀÚ À̸§ ¸ñ·Ï°ú ¾ÏÈ£ ¸ñ·Ï ±×¸®°í ÀÎÁõ ½ÇÆзΠµÇµ¹·ÁÁø ¿¡·¯ ¿ª½Ã ¼±ÅÃÇÒ ¼ö ÀÖ½À´Ï´Ù. ÀÌ ¸¶Áö¸· ¿É¼ÇÀº ´ÜÁö ¿ÀŽ ¸¸À» ÀüÇØÁÖ´Â ´ë½Å¿¡ ºñ Ç¥ÁØ ÀÀ´äÀ» ÁÖ´Â »çÀÌÆ®¿¡ °Ë»ç¸¦ ÇÒ ¼ö ÀÖµµ·Ï Çϱ⿡ Áß¿äÇÕ´Ï´Ù.
HTML ÀԷ¾ç½ÄÀº ¾à°£ ´Ù¸¨´Ï´Ù. ¾ÆÅ¥³×ƽ½º´Â ¾ç½ÄÀÌ µé¾îÀÖ´Â ÆäÀÌÁö¸¦ ºÒ·¯µéÀÌ°í, ¾î¶² Çʵ尡 »ç¿ëÀÚ À̸§°ú ¾ÏÈ£ÀÎÁö¸¦ ƯÁ¤ÇÒ ¼ö ÀÖ½À´Ï´Ù. ¹°·Ð ÀÚü Á¦ÀÛµÈ ¿¡·¯ ÆäÀÌÁö¸¦ ƯÁ¤ÇÒ ¼öµµ ÀÖ½À´Ï´Ù. ÀÌ´Â ¾î¶² ¿¡·¯Äڵ尡 ¾ÆÅ¥³×ƽ½º¿¡ ÀüÇØÁö´ÂÁö¸¦ ¾Ë·ÁÁÜÀ¸·Î½á ¸¶ÃÄÁú ¼ö ÀÖ°í, ¶ÇÇÑ ¸®ÅÏ ÆäÀÌÁö¿¡ Æ÷ÇÔµÈ ¹®ÀÚ¿­À» °Ë»öÇÏ¿© ¾ÆÅ¥³×ƽ½º¿¡ ÁöÁ¤ÇÏ¿© ¼öÇàÇÒ ¼öµµ ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, ÇØ´ç ÆäÀÌÁö°¡ ½ÇÆп¡ ´ëÇؼ­ ¡°Login Failed¡±¶ó°í ¸»ÇÑ´Ù¸é, ¾ÆÅ¥³×ƽ½º¿¡ »óÀÀÇÏ´Â ¹®ÀÚ¿­ ¶Ç´Â Á¤±Ô½ÄÀ¸·Î ¾Ë·ÁÁÙ ¼ö ÀÖ½À´Ï´Ù. ÀÌ´Â ÀÚü Á¦ÀÛÇÑ ¿¡·¯¸Þ½ÃÁö¸¦ ÀÌ¿ëÇÏ´Â ÆäÀÌÁö°¡ ¸¹¾ÆÁú¼ö·Ï ´õ¿í ¾öû³ª°Ô ¸¹Àº ¿ÀŽÀ» ÁÙÀÏ ¼ö ÀÖ½À´Ï´Ù.
Àü¹ÝÀûÀ¸·Î ÇØ´ç ÀÎÁõ °Ë»çµµ±¸´Â º» Á¦Ç°¿¡ ´õÇØÁ® ¾ÆÁÖ ÈǸ¢ÇÏ´Ù ÇÒ ¼ö ÀÖ½À´Ï´Ù. ÀÌ°Í°ú ´õºÒ¾î ã¾Æº¸°í ½ÍÀº ¸î¸î ±â´ÉÀÌ ´õ ÀÖÁö¸¸, À̵éÀº ´õ ¸¹Àº ¿µÇâÀ» ÁÖÁö ¸øÇÏ´Â ±â´Éµé ÀÔ´Ï´Ù.

Rating: 4

º¸°í¼­ ±â´É(Reporting Capabilities)

º¸°í¼­´Â ÃæºÐÇÒ ¸¸Å­ Á¦°øµË´Ï´Ù. º» º¸°í¼­´Â Àß Á¤¸®µÇ¾î ÀÖ°í, ½±°Ô ÀÐÀ» ¼ö ÀÖÀ¸¸ç, Áß¿äÇÏÁö ¾ÊÀº Ãë¾àÁ¡µé¿¡ ´ëÇØ ºÎÀû´çÇÑ µî±ÞÀ» ÁÖÁö ¾Ê¾Ò½À´Ï´Ù. Àü¹ÝÀûÀÎ Ãë¾àÁ¡Àº ´Ù¸¥ ¸¹Àº Á¡°Ëµµ±¸ Áß¿¡¼­µµ ºÒÇÕ¸®ÇÑ °øÆ÷³ª ÇൿÀ» Á¶ÀåÇÏÁö ¾ÊÀ» ¸¸Å­ ÀϹÝÀûÀÎ »ç·Êó·³ º¸¿©Áý´Ï´Ù. ÇÏÁö¸¸, º¸°í¼­´Â HTML ÇüÅÂÀÇ ¹®¼­·Î¸¸ ÀúÀåµÉ ¼ö ÀÖ½À´Ï´Ù. Acunetix´Â XML°ú °°Àº ´Ù¸¥ ÇüÅ·Π¹Ù²ãÁÙ ¼ö ÀÖ´Â Á÷Á¢ÀûÀÎ ¹æ¹ýÀ» °¡Áö°í ÀÖÁö ¾Ê°í, ÀÔ·ÂµÈ µ¥ÀÌÅ͸¦ ´Ù¸¥ º¸´Ù È®ÀåµÈ º¸°í¼­ µµ±¸·Î ÀüÇØÁÙ ¹æ¹ýµµ ¾ø½À´Ï´Ù. ±âº»ÀûÀ¸·Î, ¾ÆÅ¥³×ƽ½º´Â ¸ðµç µ¥ÀÌÅ͸¦ MS Access µ¥ÀÌÅͺ£À̽º¿¡ ÀúÀåÇÒ ¼ö ÀÖ½À´Ï´Ù. Ȥ½Ã ¸¶ÀÌÅ©·Î¼ÒÇÁÆ® ¾×¼¼½º¸¦ ÀÌ¿ëÇÒ ¼ö ÀÖ´Ù¸é, ¼ö¸¹Àº ´Ù¸¥ ÇüÅ·ΠÀüÇØÁÙ ¼ö ÀÖ½À´Ï´Ù. º¸°í¼­´Â °£°áÇÏÁö¸¸, HTML ÇüÅ°¡ ¾Æ´Ñ µ¥ÀÌÅÍ·Î ÀüÇÒ Á÷Á¢ÀûÀÎ ¹æ¹ýÀÌ ¾ø¾î, »ç¿ëÀÚ°¡ ÇÊ¿ä·Î ÇÏ´Â º¸°í¼­¿¡ ÀÇÇØ °áÁ¤µÇ´Â À̵鿡°Ô´Â ¹®Á¦°¡ µÉ ¼ö µµ ÀÖ½À´Ï´Ù.

Àü¹ÝÀûÀÎ Á¦Ç° ÆòÁ¡

»ó´çÇÑ ±â´É, »ç¿ë ÆíÀǼº ±×¸®°í ºü¸¥ 󸮴ɷÂÀ¸·Î, ¾ÆÅ¥³×ƽ½º¿¡ º° 4°³ÀÇ Àü¹ÝÀûÀÎ ÆòÁ¡À» ÁÖ¾ú½À´Ï´Ù.

ÀåÁ¡:

+ ºü¸¥ Á¡°Ë ±â´É

+ ÀÚüÁ¦ÀÛ ¿¡·¯ ÆäÀÌÁöµé¿¡ ´ëÇÑ Æ¯Á¤ ±â´É

+ ÇϳªÀÇ ¾ÖÇø®ÄÉÀ̼ǿ¡ Á¶ÇÕµÈ ¸¹Àº µµ±¸µé

+ ³ôÀº Ãë¾àÁ¡ ŽÁöÀ²

+ Áß¿äÇÏÁö ¾ÊÀº Ãë¾àÁ¡¿¡ ´ëÇÑ ÀûÀýÇÑ À§Çù ºÐ·ù

´ÜÁ¡:

- ´Ù¾çÇÏ°Ô Á¦°ø µÇÁö ¸øÇÏ´Â º¸°í±â´É
-
´ë»ó Á¡°Ë µµ±¸¿¡ ¹ö±×°¡ ÀÖ¾î º¸ÀÓ
-
¸î¸î ÀÎÅÍÆäÀ̽º Æ®À¨À» »ç¿ëÇÒ ¼ö ÀÖÀ½

¿ä¾à

¾ÆÅ¥³×ƽ½º´Â À¥ »çÀÌÆ®ÀÇ Ãë¾àÁ¡À» ¿Ïº®ÇÏ°Ô Ã£¾Æº¼ ¼ö ÀÖµµ·Ï Á¦°øµÇ´Â ¿Ïº®ÇÑ µµ±¸µéÀÇ ¸ðÀ½À» Æ÷ÇÔÇÑ ÇϳªÀÇ ¾ÖÇø®ÄÉÀ̼ÇÀ» ¸¸µé±â À§ÇØ ³ë·ÂÇß½À´Ï´Ù. Àü¹ÝÀûÀ¸·Î, ¾ÆÅ¥³×ƽ½º´Â ÀÌ·¯ÇÑ ¸ñÇ¥¸¦ ÀÌ·ç¾úÁö¸¸, ´ÙÀ̾Ƹóµåó·³ ºû³ª´Â ¿ÏÀüÇÑ ÆÐÅ°Áö·Î ¸¸µé±â À§ÇØ Á¦Ç°ÀÇ Áß¿äÇÏÁö ¾ÊÀº ±â´É¿¡ ¾î´À Á¤µµ ³ë·ÂÀ» °¡ÇØ ±× ºûÀ» ´õÇÏ°Ô ÇÒ ¼ö ÀÖ¾ú½À´Ï´Ù.

¾ÕÀ¸·Î °³¼±À» À§ÇÑ Á¦¾È

¾ÆÅ¥³×ƽ½º´Â ÀÌ¹Ì °­·ÂÇÑ µµ±¸ÀÌÀÚ Á¦Ç°ÀÌÁö¸¸, ¸î¸î Áß¿äÇÏÁö ¾ÊÀº ºÎ°¡ÀûÀÎ ±â´ÉÀ» ÅëÇØ ÀÌ¹Ì ÈǸ¢ÇÑ µµ±¸·Î Çâ»óÇÒ ¼ö ÀÖ¾ú½À´Ï´Ù. º» ¸®ºä¸¦ ÅëÇØ ¸î °¡Áö Æ÷ÇÔµÅ¾ß Çϰųª ¹Ù²î¾î¾ß ÇÒ ¼Ò¼ÒÇÑ ºÎºÐÀ» ¹ß°ßÇß½À´Ï´Ù. »ç¿ëÀÚ ÀÎÅÍÆäÀ̽º°¡ Ä£ »ç¿ëÀÚÀûÀÌ°í, ÀÌ¿ë¿¡ Æí¸®ÇÔ¿¡µµ ºÒ±¸ÇÏ°í »ç¿ëÀÚ ÀÎÅÍÆäÀ̽º´Â Á¶±Ý ¼Õº¼ ÇÊ¿ä°¡ ÀÖÀ¸¸ç, Ưº°È÷ fuzzerÀÇ °æ¿ì°¡ ±×·¸½À´Ï´Ù. ÀÎÁõ °Ë»çµµ±¸ÀÇ °æ¿ì, HTML ºê·çÆ® Æ÷½ÌÀ» ÇÏ´Â µ¿¾È »ç¿ëÀÚ À̸§ ¾øÀÌ ¾ÏÈ£¸¸À» ÁöÁ¤ÇÒ ¼ö ¾ø¾ú½À´Ï´Ù. ¾ÏÈ£ ÀԷ¸¸ÀÌ ¿ä±¸µÇ´Â ¸î¸î ¡°°ü¸®ÀÚ¡± À¥ ÆäÀÌÁö¿¡ ½ÇÇàÇØ º¸¾Ò½À´Ï´Ù¸¸, ÇØ´ç ÆäÀÌÁö¸¦ ºê·çÆ® Æ÷½º ÇÒ ¹æ¹ýÀ» ã¾Æ³»Áö ¸øÇß½À´Ï´Ù. °Ô´Ù°¡, ŸÀӾƿô ±â°£°ú ´ÙÁß Ã³¸®¸¦ ¹Ù²Ù´Â ¹æ¹ý ¿ª½Ã ȯ¿µ ¹ÞÀ» ¼ö ÀÖ´Â Ãß°¡»çÇ×ÀÔ´Ï´Ù. À̸¦ ÅëÇØ Á¡°Ë ¼ÓµµÀÇ Áõ°¡°¡ Á¦°øµÉ °ÍÀÔ´Ï´Ù. ¼öÁý±â¿¡¼­, ¼öÁýµÇ´Â ¸µÅ©ÀÇ depth¸¦ Á¦ÇÑÇϱâ À§ÇÑ °ÍÀº À¯¸®ÇÒ ¼ö ÀÖ½À´Ï´Ù. ÀÌ´Â ¼öÁý±â°¡ ¹«ÇÑ·çÇÁ¿¡ ºüÁ® ¹ß»ýÇÏ´Â ¹®Á¦¿¡ ´ëÇÑ ´ë¾ÈÀ» Á¦°øÇÒ ¼ö ÀÖÀ» °Í ÀÔ´Ï´Ù.

ÇöÀç ¾ÆÅ¥³×ƽ½º À¥ Ãë¾à¼º ºÐ¼® µµ±¸´Â (ÁÖ)¾ÆÀ̽ÃÅ¥¾î¿¡¼­ Á¦Ç°¿¡ °üÇÑ ¸ðµç ±â¼úÁö¿ø°ú ÆǸŸ¦ ´ã´çÇÏ°í ÀÖ½À´Ï´Ù. Á¦Ç° BMTµµ Àß ÇØÁÖ´Â ÆíÀΰŠ°°´øµ¥.. ^^

Áö³­´Þ¿¡ ¹öÀü 4·ÎÀÇ ¸ÞÀÌÀú ¾÷±×·¹À̵尡 ÀÖ¾ú´Âµ¥, ³â ¸»°æ¿¡ ¹öÀü 5ȤÀº ¹öÀü 4.5·ÎÀÇ ¸ÞÀÌÀú ¾÷±×·¹À̵尡 ÀÖÀ» ¿¹Á¤À̶ó°í ÇÕ´Ï´Ù. À̹ø¿¡ ¿¹Á¤µÇ´Â ¾÷±×·¹ÀÌ´Â °¢Á¾ µµ±¸µéÀÇ ¼º´É°ú Á¤È®µµ Çâ»ó ±×¸®°í ¸®Æ÷Æà µµ±¸ÀÇ °³¼±À̶ó°í ÇÏ´õ±º¿ä.

±Ã±ÝÇϽŠ»çÇ×ÀÌ ÀÖÀ¸½Ã´Ù¸é È®ÀÎÇØ º¸½Ã´Â °Íµµ.. µµ¿òÀÌ µÉ°Å °°½À´Ï´Ù.

Acunetix´Â (from www.acunetix.com)

Securing a company's web applications is today's most overlooked aspect of securing the enterprise. Web applicationhacking is on the rise with as many as 75% of cyber attacks done at web application level or via the web. Most corpo-rations have secured their data at the network level, but have overlooked the crucial step of checking whether theirweb applications are vulnerable to attack. Web applications, which often have a direct line into the company's most valuable data assets, are online 24/7, completely unprotected by a firewall and therefore easy prey for attackers.

Acunetix was founded with this threat in mind. They realized the only way to combat web site hacking was to de-velop an automated tool that could help companies scan their web applications for vulnerabilities. In July 2005, Acu-netix Web Vulnerability Scanner was released -a tool that crawls the website for vulnerabilities to SQL injection, cross-site scripting and other web attacks before hackers do.

The Acunetix development team consists of highly experienced security developers who have each spent years de-veloping network security scanning software prior to starting development on Acunetix WVS. The managementteam is backed by years of experience in marketing and selling security software.

Acunetix is a privately held company with its offices in the US, Malta and the UK.

MicroSolved, Inc.˼


MicroSolved, Inc. was founded in 1992 by L. Brent Huston. MSI was created to provide solutions that empower organizations to mitigate risks and create privacy while maintaining the practice of doing business in the online world. The projects MSI engages in range from managed security services to unique solutions crafted to answer complex security problems. Our work includes protecting the largest government and commercial networks in the world.

MSI¡¯s public work includes engagements on the Federal, State, and local level. Our work with the federal govern-ment includes protecting some of our nation¡¯s most sensitive networks, working to secure some of the largest HIPAAnetworking concerns, and working with federal auditing agencies to help them implement an auditing process thateffects real world security. MSI has received accolades for its work for the U.S. government, and has even testified before congress.

MSI¡¯s work in the commercial sector includes a wide variety of vertical markets. MSI enjoys long-term relationshipswith some of the world¡¯s largest financial and telecom providers. Our work with various regulations including GLBAand HIPAA has made us an obvious choice for financial and healthcare organizations of all sizes. In the commercialsector our work ranges from the fortune 50 to working within the budget needs of small businesses.

What we¡¯re most proud of, however, is our work for the community. MSI has sponsored and contributed to variousopen source initiatives. We¡¯ve contributed intellectual capital pro bono to various working groups and security orga-nizations.

Our goal with each engagement is to preach security philosophy, transfer knowledge to client stakeholders, and to build a long-term relationship steeped in trust, understanding, and open communication.