Snort cookbook solutions and examples for Snort administrators

If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way t...

Descripción completa

Detalles Bibliográficos
Autor principal: Orebaugh, Angela (-)
Otros Autores: Biles, Simon, Babbin, Jacob
Formato: Libro electrónico
Idioma:Inglés
Publicado: Sebastopol, California : O'Reilly Media 2005.
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627127706719
Tabla de Contenidos:
  • Snort Cookbook; Contents of This Book; Conventions Used in This Book; Using Code Examples; Safari Enabled; How to Contact Us; Acknowledgments; Simon Biles; Jake Babbin; 1. Installation and Optimization; 1.1. Installing Snort from Source on Unix; Solution; Discussion; See Also; 1.2. Installing Snort Binaries on Linux; Solution; Discussion; See Also; 1.3. Installing Snort on Solaris; Solution; Discussion; See Also; 1.4. Installing Snort on Windows; Solution; Discussion; See Also; 1.5. Uninstalling Snort from Windows; Solution; Discussion; See Also; 1.6. Installing Snort on Mac OS X; Solution
  • DiscussionSee Also; 1.7. Uninstalling Snort from Linux; Solution; Discussion; See Also; 1.8. Upgrading Snort on Linux; Solution; Discussion; See Also; 1.9. Monitoring Multiple Network Interfaces; Solution; Discussion; See Also; 1.10. Invisibly Tapping a Hub; Solution; Discussion; See Also; 1.11. Invisibly Sniffing Between Two Network Points; Solution; Discussion; See Also; 1.12. Invisibly Sniffing 100 MB Ethernet; Solution; Discussion; See Also; 1.13. Sniffing Gigabit Ethernet; Solution; Discussion; See Also; 1.14. Tapping a Wireless Network; Solution; Discussion; See Also
  • 1.15. Positioning Your IDS SensorsSolution; Discussion; Medium-sized business; Larger organizations; See Also; 1.16. Capturing and Viewing Packets; Solution; Discussion; See Also; 1.17. Logging Packets That Snort Captures; Solution; Discussion; See Also; 1.18. Running Snort to Detect Intrusions; Solution; Discussion; See Also; 1.19. Reading a Saved Capture File; Solution; Discussion; See Also; 1.20. Running Snort as a Linux Daemon; Solution; See Also; 1.21. Running Snort as a Windows Service; Solution; Discussion; See Also; 1.22. Capturing Without Putting the Interface into Promiscuous Mode
  • SolutionDiscussion; See Also; 1.23. Reloading Snort Settings; Solution; Discussion; See Also; 1.24. Debugging Snort Rules; Solution; Discussion; See Also; 1.25. Building a Distributed IDS (Plain Text); Solution; Discussion; Server side; See Also; 1.26. Building a Distributed IDS (Encrypted); Solution; Encryption only; Server side; Discussion; See Also; 2. Logging, Alerts, and Output Plug-ins; 2.1. Logging to a File Quickly; Solution; Discussion; See Also; 2.2. Logging Only Alerts; Solution; Discussion; See Also; 2.3. Logging to a CSV File; Solution; Discussion; See Also
  • 2.4. Logging to a Specific FileSolution; Discussion; See Also; 2.5. Logging to Multiple Locations; Solution; Discussion; See Also; 2.6. Logging in Binary; Solution; Discussion; See Also; 2.7. Viewing Traffic While Logging; Solution; Discussion; See Also; 2.8. Logging Application Data; Solution; Discussion; See Also; 2.9. Logging to the Windows Event Viewer; Solution; Discussion; See Also; 2.10. Logging Alerts to a Database; Solution; Discussion; See Also; 2.11. Installing and Configuring MySQL; Solution; Discussion; See Also; 2.12. Configuring MySQL for Snort; Solution; Discussion; See Also
  • 2.13. Using PostgreSQL with Snort and ACID