HAKIN9 STARTERKIT: SNORT EXPOSED

Download
File
SNORT_Exposed_Hakin9_StarterKit__01_2010.pdf
    • up.time IT Systems Management Review
      MICHAEL MUNT
      When it comes to the performance and availability of your IT infrastructure and applications, deep, and easy-to-use monitoring is a must.



    • Doug Chick printable: Notes of the Network Administrator
      DOUGLAS CHICK
      I have computer networking friends that work with various departments of the government, corporations and private companies that are very aware of the possible threats to their computers and networks.



    • Writing Snort Rules
      Kishin Fatnani – CISSP, GCIH GOLD, GCFA, CCSE R70, CEH, LPT
      Snort, as you would know, is a tool used to detect intrusions on a network.



    • Collection and Exploration of Large Data
      LUCA DERI, FOUNDER OF NTOP
      Why the use of FastBit is a major step ahead when compared with state of the art relational database tools based on relational databases



    • Improving your custom Snort rules
      LEON WARD
      While it is easy to create a custom Snort rule, do you know if you are actually making a good one or not? This article introduces some common mistakes I find in custom Snort rules and the potential implications of those mistakes.



    • An Unsupervised IDS False Alarm Reduction System – SMART
      GINA TJHAI, MARIA PAPADAKI
      Signature-based (or rule-based) network IDSs are widely used in many organisations to detect known attacks (Dubrawsky, 2009). A common misconception about IDSs is that they are Plug-and-Play devices that can be installed and then allowed to run autonomously. In reality, this is far from the truth.



    • Content modifiers: Keep it Specific
      JOEL ESLER
      Without going off the deep-end here and discussing every single Snort rule keyword, I just wanted to touch on a few modifiers that people sometimes misunderstand.



    • Deploying Snort as WAF (Web Application Firewall)
      SHIVANG BHAGAT & RISHITA ANUBHAI (BLUEINFY APPSECLABS)
      In today’s environment, web applications are becoming a popular attack point with attack agents. Attack agent can be a human attacker or an automated worm.



    • Are You Getting the Most out of your IPS?
      K. K MOOKHEY
      Picture this: a multi-billion dollar global telecom giant has invested millions of dollars into building a state-of-the-art Security Operations Center.


Download
File
SNORT_Exposed_Hakin9_StarterKit__01_2010.pdf

April 19, 2022
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.