본문 바로가기

snort10

SnortDLP - an open source DLP solution utilizing snort OverviewSnortDLP a.k.a. "Pig Pen" is an open source data loss prevention project that utilizes Snort to detect the exfiltration of sensitive data.FeaturesWeb based applicationWritten in PHP and utilizes a MySQL backend for cross operating system portabilityAdministrative login to protect unauthorized accessDetermines a unique fingerprint forfree textindividual documentseach document in a reposit.. 2014. 7. 8.
Testing Snort IDS with Metasploit vSploit Modules One of my key objectives for developing the new vSploit modules was to test network devices such as Snort. Snort or Sourcefire enterprise products are widely deployed in enterprises, so Snort can safely be considered the de-facto standard when it comes to intrusion detection systems (IDS). So much that even third-party intrusion detection systems often import Snort rules. Organizations are often.. 2011. 7. 11.
Snort 2.9.0.5 is available for download! This is the changelog for Snort 2.9.0.5: * src/build.h: Increment Snort build number to 134 * src/: decode.h, encode.c: * src/dynamic-plugins/sf_engine/: sf_snort_packet.h: * src/preprocessors/: spp_sfportscan.c, spp_frag3.c: * src/output-plugins/: spo_alert_fast.c: * src/preprocessors/Stream5/: stream5_common.c: Updated portscan to set protocol correctly in raw packet for IPv6 and changed the e.. 2011. 4. 8.
Fwsnort: Application layer IDS/IPS with iptables Fwsnort parses the rules files included in the Snort intrusion detection system and builds an equivalent iptables ruleset for as many rules as possible. Fwsnort utilizes the iptables string match module (together with a custom patch that adds a --hex-string option to the iptables user space code which is now integrated with iptables) to detect application level attacks. Fwsnort 1.5 now is availa.. 2011. 1. 14.
Top 100 Network Security Tools After the tremendously successful 2000 and 2003 security tools surveys, Insecure.Org is delighted to release this 2006 survey. I (Fyodor) asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowed me to expand the list to 100 tools, and even subdivide them into categories. Anyone in the security field would be well advised to go over th.. 2010. 6. 23.