Network Security Hacks: Tips & Tools for Protecting Your Privacy

 

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

sa command (process acounting) 

Samba, SWAT configuration tool 

sandboxed environments  [See also chroot( environment)]

    BIND, running in 

    restricting services with 

        chroot( ) 

        jail( ) 

    security enhancement with grsecurity 

scrub rules (PacketFilter) 

sdrop rule, Snort_inline 

searching packets, Snort rule options 

Sebek (honeypot monitoring package) 

SecFilter keyword 

SecFilterSelective keyword 

sectors offsets for a partition 

secure tunnels  [See tunnels, secure]

securelevels (BSD systems) 

security holes (system), automating patching of 

security policy

    auditing on Windows 

    creating for Windows firewall 

    setting up for IPsec connections on FreeBSD 

Security Policy Database (SPD)

    FreeBSD, IPsec connections 

    Linux, IPsec connections 

security scanner (Nessus) 

Self-certifying File System (SFS) 

self-signed certificates 

Sendmail, setting up to use TLS 

sensor_id (ACID) 

server clocks, keeping synchronized 

services

    common port numbers 

    emulated by honeyd 

        attempts to access 

    preventing from binding to an interface 

    restricting with sandboxed environments 

    running, listing on Windows 

    scanning for vulnerabilities with Nessus 

session cookies, attacks using 

session-timeout values, setting for PacketFilter 

seteuid( ) 

setfacl command 

setkey utility 

setuid( ) 

sfscd (SFS client daemon) 

sfskey command 

SGID or SUID programs, scanning for 

Sguil

    client and server, testing 

    compiling and installing Barnyard 

    components of 

    configuring sguild 

    creating a MySQL database 

    database tables, creating 

    log_packets.sh script, setting up 

    op_sguil output plug-in 

    sensor agent script, setting up 

    sensors, setting up 

    SSL, using with 

    starting up sguild and xscriptd 

    Tcl packages required 

    xscriptd, setting up 

shared-medium Ethernet networks, sniffers and 

shares (default), disabling on Windows 

sharing files, using SFS (Self-certifying File System) 

shell scripts, SUID or SGID bits on 

shells

    exploit with shell code against SSH daemon 

    restricted 

signature verification, automating 

Simple WATCHer  [See swatch]

skipinterval option, SnortSam 

SMTP (TLS-enabled), setting up 

sniffdet tool 

    ARP test 

    DNS test 

SNMP interface statistics (for SNMP daemon on a router) 

snmpget utility 

Snort GUI for Lamerz  [See Sguil]

Snort NIDS 

    alerts

        analyzing with Sguil 

        tracking with ACID 

    automatic rule updates with Oinkmaster 

    Barnyard, using to increase performance 

        unified output format for Snort 

    configuration

        built-in preprocessors 

        databases 

        editing snort.conf file 

        files provided with distribution 

        rule signatures 

    database support, enabling output plug-in 

    downloading and installing 

    firewalling with SnortSam 

        configuring SnortSam 

        firewall communications, setting up 

        output plug-ins 

        rules that trigger firewall rules 

    flexible response 

    preventing and containing intrusions with Snort_inline 

        rules 

    sensor network, managing 

    support for sending alerts to a database 

    testing in sniffer mode 

    writing your own rules 

        actions, built-in 

        activate and dynamic actions 

        defining custom actions 

        direction of packets 

        IP addresses and ports for packets 

        online rule documentation 

        options 

        protocol, specifying for rule 

        rule header and options 

SnortCenter 

    admin account information, editing 

    config.php file, editing 

    MySQL database 

    sensor agent, adding to main management console 

    sensor agents, setting up 

    setting up 

sockets (open), listing with lsof utility 

SOCKS proxy, using SSH as 

sockstat command 

software authenticity, checking 

Solaris

    Sebek honeypot monitoring module 

    TUN/TAP driver 

source entries (syslog-ng) 

Spade IDS 

    alerts generated by 

SPD  [See Security Policy Database]

spoofing addresses

    ARP spoofing 

    preventing IP spoofing with egress filtering 

    preventing with FilterPacket 

SQL-injection attacks 

squid proxy over SSH 

SSH

    -D switch 

    authpf shell and 

    exploit launched against daemon, monitoring 

    forwarding and encrypting traffic with 

    keys, automating client logins 

        security concerns with public keys 

    login keys, generating for 

    PPP, using with to create secure VPN tunnel 

    SOCKS proxy, using as 

    squid proxy over 

    tunneling connection over HTTP with httptunnel 

    VTun, using over 

SSL

    Apache, installing with 

    certificates 

    encrypting and tunneling traffic with 

    encrypting IMAP and POP with 

    OpenVPN, use by 

    Sguil, using with  2nd 

    SnortCenter sensor, using with 

    using for HTTPS with ntop 

Stackguard 

stacks

    buffer overflows based on 

    PAM modules for 

startup, running commands out of system rc files 

startx command, -nolisten tcp option 

stateless protocol 

Statistical Anomaly Detection Engine  [See Spade IDS]

statistics (network), collecting with firewall rules 

stealth mode, running IDS sensors in 

sticky bit set on directories, scanning for 

stream4 preprocessor, enabling for Snort 

strings, searching packets for with Snort 

stunnel 

    configuration file, stunnel.conf 

    forwarding local port to remote port 

su utility 

sudo utility 

suEXEC (Apache) 

    enabling and configuring 

SUID bit, disabling 

SUID files, monitoring on your system 

SUID or SGID programs, scanning for 

SUID wrapper program, used by Apache 

swapping 

SWAT (Samba's web-based configuration tool) 

swatch (log file monitor) 

    regular expressions to match log messages 

symlink restrictions (grsecurity) 

sysctl.conf file, enabling packet forwarding 

syslog

    aggregating logs from remote sites 

    Barnyard output to 

    centralized server, running 

    filtering information into separate files 

    integrating Windows into 

syslog-ng  2nd 

    configuration file entries 

    encrypting tunnel for secure traffic between daemons 

    filters, defining 

    libol library package 

    macros 

    syslog.conf, translating to source, destination, and log entries 

    TCP support 

    web site 

syslog.conf file, translating to syslog-ng configuration entries 

system binaries

    modification by root kits 

    performing functions of with BusyBox 

    verifying for chrootkit 

system calls

    definition of 

    interception by Sebek 

    restricting  [See systrace utility]

system groups, specifying for use of sudo 

system logs, protecting from tampering by intruders 

system updates

    automating 

    Windows, checking for 

systrace utility 

    aliases 

    policies 

    policy-generation tool 

 

Категории