Àüü
ÀüÀÚ/Àü±â
Åë½Å
ÄÄÇ»ÅÍ
·Î±×ÀÎ
ȸ¿ø°¡ÀÔ
About Us
ÀÌ¿ë¾È³»
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
Æ÷Ä¿½ºiN
¿¬±¸ÀÚ Á¤º¸
¶óÀÌ¡½ºÅ¸
ÆÄ¿öiNÅͺä
¼¼ÁßÇÑ
¿¬±¸ÀÚ·á
¹®ÀÚ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñÁ¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
´Ý±â
»çÀÌÆ®¸Ê
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
ÄÄÇ»ÅÍiN
¿¬±¸ÀÚ Á¤º¸
¿¬±¸ÀÚ·á
¹®ÀÚ DB
Ȧ·Î±×·¥ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñ Á¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
IT Daily
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
¼ºñ½º ¹Ù·Î°¡±â
¼³¹®Á¶»ç
¿¬±¸À±¸®
°ü·Ã±â°ü
Please wait....
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±¹³» ³í¹®Áö
Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö >
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö
>
Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ
Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ
Current Result Document :
1
/ 2
´ÙÀ½°Ç
ÇѱÛÁ¦¸ñ(Korean Title)
Shadow ÆÄÀÏ Á¶ÀÛÀ» ÅëÇÑ ¸®´ª½º SudoerÀÇ À§Àå°ø°Ý¿¡ ´ëÇÑ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title)
A Study on Impersonation Attack of Linux Sudoers Through Shadow File Manipulation
ÀúÀÚ(Author)
Sanghun Kim
Taenam Cho
±è»óÈÆ
Á¶Å³²
¿ø¹®¼ö·Ïó(Citation)
VOL 09 NO. 07 PP. 0149 ~ 0156 (2020. 07)
Çѱ۳»¿ë
(Korean Abstract)
¸ðµç ¿î¿µÃ¼Á¦´Â È¿À²ÀûÀÎ °ü¸®¸¦ À§ÇØ Æ¯±ÇÀ» ºÎ¿©¹ÞÀº °ü¸®ÀÚ °èÁ¤ÀÌ Á¸ÀçÇÑ´Ù. À§ÇèÇϰųª ¹Î°¨ÇÑ ÀÛ¾÷À̳ª ¸®¼Ò½º´Â ÀÏ¹Ý »ç¿ëÀÚ¿¡°Ô´Â Á¢±ÙÀÌ Çã¿ëµÇÁö ¾Ê¾Æ¾ß ÇÏ¸ç ¿ÀÁ÷ °ü¸®ÀÚ¿¡°Ô¸¸ Çã¿ëµÇ¾î¾ß ÇÑ´Ù. ÀÌ·¯ÇÑ Æ¯±ÇÀÇ ÇÑ °¡Áö ¿¹´Â »ç¿ëÀÚ°¡ Æнº¿öµå ºÐ½ÇÇÏ¿´À» ¶§ ÃʱâÈÇÏ´Â ±ÇÇÑÀÌ´Ù. º» ³í¹®¿¡¼´Â ¸®´ª½º ¿ìºÐÅõÀÇ °ü¸®ÀÚ ±×·ìÀÎ sudoer ±×·ìÀÇ Æ¯±ÇÀ» ºÐ¼®ÇÏ°í °ü¸®ÀÚ ±×·ìÀÇ °ü¸®Ã¼°è¸¦ ºÐ¼®ÇÏ¿´´Ù. sudoer°¡ Ư±ÇÀ» ÀÌ¿ëÇÏ¿© ´Ù¸¥ sudoer¸¦ Æ÷ÇÔÇÑ ´Ù¸¥ »ç¿ëÀÚÀÇ Æнº¿öµå¸¦ º¯°æÇÏ°í ·Î±×¸¦ ¼öÁ¤ÇÔÀ¸·Î½á À§ÀåÇÒ ¼ö ÀÖ´Â À§Ç輺À» º¸ÀÌ°í, À̸¦ ÇØ°áÇϱâ À§ÇÑ ¹æ¾ÈÀ¸·Î¼ shadow ÆÄÀÏÀÇ Á¶ÀÛÀ» ±ÝÁöÇÏ´Â ¹æ¾ÈÀ» Á¦¾ÈÇÏ¿´´Ù. ¶ÇÇÑ Á¦¾ÈÇÑ ¹æ¹ýÀ» ±¸ÇöÇÏ¿´À¸¸ç ¿ì¼öÇÑ ¼º´ÉÀ¸·Î ½Ç¿ëÈ °¡´É¼ºÀ» È®ÀÎÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
All operating systems have privileged administrator accounts for efficient management. Dangerous or sensitive tasks or resources should be banned from normal users and should only be accessible by administrators. One example of this privilege is to reset a user's password when the user loses his/her password. In this paper, the privileges of the sudoer group, the administrator group of Linux Ubuntu, and the management system of the sudoer group were analyzed. We show the danger that a sudoer can use the privilege to change the password of other users, including other sudoers, and modify the log, and suggest a countermeasure to prevent the manipulation of shadow files as a solution to this. In addition, the proposed method was implemented and the possibility of practical use was confirmed with excellent performance.
Å°¿öµå(Keyword)
Linux
Ubuntu
Password
Shadow File
Administrator Privilege
¸®´ª½º
¿ìºÐÅõ
Æнº¿öµå
½¦µµ¿ì ÆÄÀÏ
°ü¸®ÀÚ ±ÇÇÑ
ÆÄÀÏ÷ºÎ
PDF ´Ù¿î·Îµå
¸ñ·Ï
Copyright(c)
Computer Science Engineering Research Information Center
. All rights reserved.