<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>security_gun.log</title>
        <link>https://velog.io/</link>
        <description>security_gun</description>
        <lastBuildDate>Thu, 13 Feb 2025 08:39:40 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <copyright>Copyright (C) 2019. security_gun.log. All rights reserved.</copyright>
        <atom:link href="https://v2.velog.io/rss/security_gun" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[linux command]]></title>
            <link>https://velog.io/@security_gun/linux-command</link>
            <guid>https://velog.io/@security_gun/linux-command</guid>
            <pubDate>Thu, 13 Feb 2025 08:39:40 GMT</pubDate>
            <description><![CDATA[<p>home에서
.bashrc, .vimrc 등 이런것들만 보고싶을때</p>
<blockquote>
<p>ls -d ~/.*</p>
</blockquote>
<p>home 디렉터리의 파일들을 GB 단위로 보기 | grep vdi 파일만</p>
<blockquote>
<p>find ~ -maxdepth 1 -type f -exec du -h {} + | sort -hr | grep &quot;.vdi&quot;</p>
</blockquote>
<p>@    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @
출처: <a href="https://visu4l.tistory.com/entry/ssh-%EC%9B%90%EA%B2%A9-%EC%A0%91%EC%86%8D-%EC%97%90%EB%9F%ACWARNING-REMOTE-HOST-IDENTIFICATION-HAS-CHANGED">https://visu4l.tistory.com/entry/ssh-원격-접속-에러WARNING-REMOTE-HOST-IDENTIFICATION-HAS-CHANGED</a> </p>
<blockquote>
<p>rm ~/.ssh/known_hosts</p>
</blockquote>
]]></description>
        </item>
        <item>
            <title><![CDATA[DICOM CVEs]]></title>
            <link>https://velog.io/@security_gun/DICOM-CVEs</link>
            <guid>https://velog.io/@security_gun/DICOM-CVEs</guid>
            <pubDate>Thu, 20 Jun 2024 11:12:59 GMT</pubDate>
            <description><![CDATA[<blockquote>
<p>CVE-2019-11687
CVE link : <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11687">https://nvd.nist.gov/vuln/detail/CVE-2019-11687</a>
published by : <a href="https://github.com/d00rt/pedicom/blob/master/doc/Attacking_Digital_Imaging_and_Communication_in_Medicine_%28DICOM%29_file_format_standard_-_Markel_Picado_Ortiz_%28d00rt%29.pdf">https://github.com/d00rt/pedicom/blob/master/doc/Attacking_Digital_Imaging_and_Communication_in_Medicine_%28DICOM%29_file_format_standard_-_Markel_Picado_Ortiz_%28d00rt%29.pdf</a></p>
</blockquote>
<hr>
<blockquote>
<p>CVE-2022-2119 &lt;DCMTK&gt;
CVE link : <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2119">https://nvd.nist.gov/vuln/detail/CVE-2022-2119</a>
published by : <a href="https://www.cisa.gov/news-events/ics-medical-advisories/icsma-22-174-01">https://www.cisa.gov/news-events/ics-medical-advisories/icsma-22-174-01</a></p>
</blockquote>
<blockquote>
<p>CVE-2022-2120 &lt;DCMTK&gt;
CVE link : <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2120">https://nvd.nist.gov/vuln/detail/CVE-2022-2120</a>
published by : <a href="https://www.cisa.gov/news-events/ics-medical-advisories/icsma-22-174-01">https://www.cisa.gov/news-events/ics-medical-advisories/icsma-22-174-01</a></p>
</blockquote>
<blockquote>
<p>CVE-2022-2121 &lt;DCMTK&gt;
CVE link : <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-2121">https://nvd.nist.gov/vuln/detail/CVE-2022-2121</a>
published by : <a href="https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html">https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html</a></p>
</blockquote>
<hr>
<blockquote>
<p>CVE-2023-40150 &lt;MedDream&gt;
CVE link : <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-40150">https://nvd.nist.gov/vuln/detail/CVE-2023-40150</a>
published by : <a href="https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-248-01">https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-248-01</a></p>
</blockquote>
<hr>
<blockquote>
<p>CVE-2024-24793 &lt;libDicom&gt;
CVE link : <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24793">https://nvd.nist.gov/vuln/detail/CVE-2024-24793</a>
published by : <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931">https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931</a></p>
</blockquote>
<blockquote>
<p>CVE-2024-23912 &lt;merative&gt;
CVE link : <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23912">https://nvd.nist.gov/vuln/detail/CVE-2024-23912</a>
published by : <a href="https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23912">https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23912</a></p>
</blockquote>
<blockquote>
<p>CVE-2024-23913 &lt;merative&gt;
CVE link : <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23913">https://nvd.nist.gov/vuln/detail/CVE-2024-23913</a>
published by : <a href="https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23913">https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23913</a></p>
</blockquote>
<blockquote>
<p>CVE-2024-23914 &lt;merative&gt;
CVE link : <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23914">https://nvd.nist.gov/vuln/detail/CVE-2024-23914</a>
published by : <a href="https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23914">https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23914</a></p>
</blockquote>
<blockquote>
<p>CVE-2024-28877 &lt;MicroDicom&gt;
CVE link : <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28877">https://nvd.nist.gov/vuln/detail/CVE-2024-28877</a>
published by :
<a href="https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-163-01">https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-163-01</a></p>
</blockquote>
<blockquote>
<p>CVE-2024-24794 &lt;libdicom&gt;
CVE link : <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-24794">https://nvd.nist.gov/vuln/detail/CVE-2024-24794</a>
published by :
<a href="https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931">https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931</a></p>
</blockquote>
<blockquote>
<p>CVE-2024-33606 &lt;MicroDicom&gt;
CVE link : <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-33606">https://nvd.nist.gov/vuln/detail/CVE-2024-33606</a>
published by :
<a href="https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-163-01">https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-163-01</a></p>
</blockquote>
]]></description>
        </item>
        <item>
            <title><![CDATA[docker 명령어 (in ubuntu)]]></title>
            <link>https://velog.io/@security_gun/docker-%EB%AA%85%EB%A0%B9%EC%96%B4-in-ubuntu</link>
            <guid>https://velog.io/@security_gun/docker-%EB%AA%85%EB%A0%B9%EC%96%B4-in-ubuntu</guid>
            <pubDate>Mon, 10 Jun 2024 05:53:46 GMT</pubDate>
            <description><![CDATA[<blockquote>
<p>실행하고 있는 docker 저장&amp;종료
&gt; docker stop [id]</p>
</blockquote>
<blockquote>
<p>pc 재부팅후 컨테이너 목록 확인
&gt; docker ps -a</p>
</blockquote>
<blockquote>
<p>종료되었던 컨테이너 다시 실행
&gt; docker container restart [id]</p>
</blockquote>
<p><a href="https://developer-cheol.tistory.com/28">https://developer-cheol.tistory.com/28</a></p>
]]></description>
        </item>
        <item>
            <title><![CDATA[tmux 명령어]]></title>
            <link>https://velog.io/@security_gun/tmux-%EB%AA%85%EB%A0%B9%EC%96%B4</link>
            <guid>https://velog.io/@security_gun/tmux-%EB%AA%85%EB%A0%B9%EC%96%B4</guid>
            <pubDate>Wed, 22 May 2024 05:11:21 GMT</pubDate>
            <description><![CDATA[<blockquote>
<p>tmux ls
tmux attach-sesstion -t &lt;num&gt;</p>
</blockquote>
<blockquote>
<p>왼쪽에서 작업하던 경로에서 동일한 경로의 창을 열고싶을때 :
~/.tmux.conf 파일에
bind % split-window -h -c &quot;#{pane_current_path}&quot;
bind &#39;&quot;&#39; split-window -v -c &quot;#{pane_current_path}&quot;
하고 저장/종료 후
tmux source-file ~/.tmux.conf
하면 끝</p>
</blockquote>
]]></description>
        </item>
        <item>
            <title><![CDATA[GBD 유용한 명령어]]></title>
            <link>https://velog.io/@security_gun/GBD-%EC%9C%A0%EC%9A%A9%ED%95%9C-%EB%AA%85%EB%A0%B9%EC%96%B4</link>
            <guid>https://velog.io/@security_gun/GBD-%EC%9C%A0%EC%9A%A9%ED%95%9C-%EB%AA%85%EB%A0%B9%EC%96%B4</guid>
            <pubDate>Tue, 23 Apr 2024 05:15:48 GMT</pubDate>
            <description><![CDATA[<ul>
<li><p>한줄씩 실행할때마다 변수 확인하기</p>
<blockquote>
<p>display &lt;변수&gt;
display/x &lt;변수&gt; #16진수값으로 항상 확인하기
undisplay 1 #display 한거 number로 없애기</p>
</blockquote>
</li>
<li><p>변수 타입 확인하기</p>
<blockquote>
<p>ptype &lt;변수&gt;</p>
</blockquote>
</li>
<li><p>프로세스 개수 확인하기 </p>
<blockquote>
<p>info inferiors</p>
</blockquote>
</li>
<li><p>조건에 break 걸기</p>
<blockquote>
<p> b cpu-exec.c:588 if tb-&gt;pc == 0x8000d66</p>
</blockquote>
</li>
<li><p>배열 요소 다 확인하기</p>
<blockquote>
<p>(gdb) set $i = 0
(gdb) while $i &lt; 16 (배열 크기)
&gt; p/x env-&gt;regs[$i]
&gt; set $i = $i + 1
&gt; end</p>
</blockquote>
</li>
<li><p>clear</p>
<blockquote>
<p>(gdb) shell clear</p>
</blockquote>
</li>
<li><p>수정중</p>
</li>
</ul>
]]></description>
        </item>
    </channel>
</rss>