[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
packages (compromised), finding with RPM
packet sniffers examining SSH connection tunneled through HTTP
rpcapd remote capture device, using with
WinDump
PacketFilter (PF)
authenticated gateway, creating
blocking packets used for operating-system probes
pf.conf file, editing defining table of IP addresses
macros
options
packet-filtering rules
traffic normalization rules
SnortSam, using with
paging file (Windows), clearing at shutdown
PAM (pluggable authentication modules)
pam_access module
pam_limits module
pam_stack module
pam_time module
partitions (disk), imaging
passwd program, SUID or SGID bit
passwords
[See also authentication] command execution without password
patch utility, applying grsecurity patch to kernel
patching system security holes, automation of
PaX (grsecurity)
Pcap-formatted files, creating with Barnyard
Perl modules, necessary for swatch tool
Perl scripts, running through CGI interface
Perl, sensor agents for SnortCenter
permissions creating flexible hierarchies with POSIX ACLs
world- and group-writable
PF
[See PacketFilter] pfctl command
PHP libraries for SnortCenter
programs, running through CGI interface
Sebek package, use by
using with ACID
PHPlot
PIDs (process IDs) listing for listening services
stunnel PID file
ping program finding system MAC address
monitoring statistics from web server
pipe action, swatch
PIX firewall, using with SnortSam
pluggable authentication modules
[See PAM] pluto
Point-to-Point Tunneling Protocol
[See PPTP tunneling] poisioning the ARP cache
policies, systrace
automated generation of
POP, encrypting with SSL
POP3 traffic, encrypting and forwarding with SSH
PoPToP (PPTP server)
connecting to with Windows machine
port forwarding honeyd, using with
httptunnel, using
SSH, using as SOCKS proxy
SSH, using for
stunnel, using
port security (Ethernet switches)
ports monitor port
open, listing for Windows systems
scanning for listening services
SnortSam port option
specifying for packets in Snort rules
portscan and stream4 preprocessors, Snort
2nd
POST method requests, scanning by mod_security
PPP tunnels, setting up with PPTP tunneling
PPP, using with SSH to create secure VPN tunnel
PPTP (Point-to-Point Tunneling Protocol) tunneling
priorities, for logging
configuring for syslog-ng
process accounting
ac command
lastcomm command
summarizing with sa command
processes increasing security with grsecurity
listing for listening services
listing for open files on Windows
listing for running services on Windows
memory address space layouts, randomization with grsecurity
proftpd, using with MySQL authentication source
promiscuous mode (network interfaces)
detecting to prevent intrusion
detection with chkrootkit
monitoring with rpcapd
ProPolice
protocol analyzers
[See Ethereal protocol analyzer ntop tool] protocols for Snort rule application
specifying protocol for Snort rule
stateless
proxies httptunnel connections through web proxy
squid proxy over SSH
SSH, using as SOCKS proxy
whois proxy, geektools.com
proxy arp
pseudo-TTY interfaces, PPP daemons operating over
psk.txt file (racoon)
|