Network Security Hacks [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Hacks [Electronic resources] - نسخه متنی

Andrew Lockhart

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید








[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

sa command (process acounting)

Samba, SWAT configuration tool

sandboxed environments
[See also chroot( environment)]

BIND, running in

restricting services with

chroot( )

jail( )

security enhancement with grsecurity

scrub rules (PacketFilter)

sdrop rule, Snort_inline

searching packets, Snort rule options

Sebek (honeypot monitoring package)

SecFilter keyword

SecFilterSelective keyword

sectors offsets for a partition

secure tunnels
[See tunnels, secure]

securelevels (BSD systems)

security holes (system), automating patching of

security policy

auditing on Windows

creating for Windows firewall

setting up for IPsec connections on FreeBSD

Security Policy Database (SPD)

FreeBSD, IPsec connections

Linux, IPsec connections

security scanner (Nessus)

Self-certifying File System (SFS)

self-signed certificates

Sendmail, setting up to use TLS

sensor_id (ACID)

server clocks, keeping synchronized

services

common port numbers

emulated by honeyd

attempts to access

preventing from binding to an interface

restricting with sandboxed environments

running, listing on Windows

scanning for vulnerabilities with Nessus

session cookies, attacks using

session-timeout values, setting for PacketFilter

seteuid( )

setfacl command

setkey utility

setuid( )

sfscd (SFS client daemon)

sfskey command

SGID or SUID programs, scanning for

Sguil

client and server, testing

compiling and installing Barnyard

components of

configuring sguild

creating a MySQL database

database tables, creating

log_packets.sh script, setting up

op_sguil output plug-in

sensor agent script, setting up

sensors, setting up

SSL, using with

starting up sguild and xscriptd

Tcl packages required

xscriptd, setting up

shared-medium Ethernet networks, sniffers and

shares (default), disabling on Windows

sharing files, using SFS (Self-certifying File System)

shell scripts, SUID or SGID bits on

shells

exploit with shell code against SSH daemon

restricted

signature verification, automating

Simple WATCHer
[See swatch]

skipinterval option, SnortSam

SMTP (TLS-enabled), setting up

sniffdet tool

ARP test

DNS test

SNMP interface statistics (for SNMP daemon on a router)

snmpget utility

Snort GUI for Lamerz
[See Sguil]

Snort NIDS

alerts

analyzing with Sguil

tracking with ACID

automatic rule updates with Oinkmaster

Barnyard, using to increase performance

unified output format for Snort

configuration

built-in preprocessors

databases

editing snort.conf file

files provided with distribution

rule signatures

database support, enabling output plug-in

downloading and installing

firewalling with SnortSam

configuring SnortSam

firewall communications, setting up

output plug-ins

rules that trigger firewall rules

flexible response

preventing and containing intrusions with Snort_inline

rules

sensor network, managing

support for sending alerts to a database

testing in sniffer mode

writing your own rules

actions, built-in

activate and dynamic actions

defining custom actions

direction of packets

IP addresses and ports for packets

online rule documentation

options

protocol, specifying for rule

rule header and options

SnortCenter

admin account information, editing

config.php file, editing

MySQL database

sensor agent, adding to main management console

sensor agents, setting up

setting up

sockets (open), listing with lsof utility

SOCKS proxy, using SSH as

sockstat command

software authenticity, checking

Solaris

Sebek honeypot monitoring module

TUN/TAP driver

source entries (syslog-ng)

Spade IDS

alerts generated by

SPD
[See Security Policy Database]

spoofing addresses

ARP spoofing

preventing IP spoofing with egress filtering

preventing with FilterPacket

SQL-injection attacks

squid proxy over SSH

SSH

-D switch

authpf shell and

exploit launched against daemon, monitoring

forwarding and encrypting traffic with

keys, automating client logins

security concerns with public keys

login keys, generating for

PPP, using with to create secure VPN tunnel

SOCKS proxy, using as

squid proxy over

tunneling connection over HTTP with httptunnel

VTun, using over

SSL

Apache, installing with

certificates

encrypting and tunneling traffic with

encrypting IMAP and POP with

OpenVPN, use by

Sguil, using with
2nd

SnortCenter sensor, using with

using for HTTPS with ntop

Stackguard

stacks

buffer overflows based on

PAM modules for

startup, running commands out of system rc files

startx command, -nolisten tcp option

stateless protocol

Statistical Anomaly Detection Engine
[See Spade IDS]

statistics (network), collecting with firewall rules

stealth mode, running IDS sensors in

sticky bit set on directories, scanning for

stream4 preprocessor, enabling for Snort

strings, searching packets for with Snort

stunnel

configuration file, stunnel.conf

forwarding local port to remote port

su utility

sudo utility

suEXEC (Apache)

enabling and configuring

SUID bit, disabling

SUID files, monitoring on your system

SUID or SGID programs, scanning for

SUID wrapper program, used by Apache

swapping

SWAT (Samba's web-based configuration tool)

swatch (log file monitor)

regular expressions to match log messages

symlink restrictions (grsecurity)

sysctl.conf file, enabling packet forwarding

syslog

aggregating logs from remote sites

Barnyard output to

centralized server, running

filtering information into separate files

integrating Windows into

syslog-ng
2nd

configuration file entries

encrypting tunnel for secure traffic between daemons

filters, defining

libol library package

macros

syslog.conf, translating to source, destination, and log entries

TCP support

web site

syslog.conf file, translating to syslog-ng configuration entries

system binaries

modification by root kits

performing functions of with BusyBox

verifying for chrootkit

system calls

definition of

interception by Sebek

restricting
[See systrace utility]

system groups, specifying for use of sudo

system logs, protecting from tampering by intruders

system updates

automating

Windows, checking for

systrace utility

aliases

policies

policy-generation tool


/ 158