Managing Security with Snort and IDS Tools

   
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Cerebus  2nd 

CERT  2nd 

    homepage 

certificates

    secure 

    test 

CGI services, detecting attacks to 

change management, poor 

character data, printing 

chat protocols, detecting 

chat.rules 

Checkpoint Firewall-1 and SnortSAM 

checksum_mode : option (snort.conf) 

chroot: option (snort.conf) 

chunk_length option (http_inspect_server) 

Cisco

    Catalyst 3550 

    PIX Firewall and SnortSAM 

    routers and SnortSAM 

    switches 

classtype: rule option 

clientonly option (stream4_reassemble preprocessor) 

Code Red worm 

Coldfusion

    detecting attacks to services 

    disabling rule set 

command-line options (Snort) 

    -? 

    -A alert-mode 

    -b 

    -B address-conversion-mask 

    -C 

    -c config-file 

    -d 

    -D 

    -e 

    -F bpf-file 

    -g group 

    -h home-net 

    -I 

    -i interface 

    -k checksum-mode 

    -L binary-log-file 

    -l logging-directory 

    -m umask 

    -N 

    -n packet-count 

    -o 

    -O 

    -p 

    -P snap-length 

    -q 

    -r tcpdump-file 

    -s 

    -S variable 

    -T 

    -t chroot 

    -U 

    -u user 

    -v 

    -V 

    -X 

    -y 

    -z 

configuration file  [See snort.conf file]

configuring Snort  [See also snort.conf file]

    initial configuration  2nd 

connection points, creating 

content helpers (rule options) 

Content Switch 

content: rule option 

content_list: rule option 

create_mysql script 

    granting rights to primary user 

    installing 

Cryptcat 

Cult of the Dead Cow 

curl binary, installing 

current, staying 

 

Категории

© amp.flylib.com,