Hacker site collection
Famous hacker site1. http://www.guninski.com/security expert guninski home page, there are some buffer overflow vulnerabilities OpenBSD Linux kernel Apache2. Extensive documents on http://www.secinf.net/Windows Network Security3. http://www.securityfocus.com/security data integration Best Site4.Computer and network attacks http://www.project.honeynet.org/a project organized by a group of security experts)5.
Http://www.packetstormsecurity.com information Comprehensive Secur
At that time, I did this experiment to attend the student academic forum held by the College. The article is a bit long. Please give your valuable comments.Test the IDS in LinuxIDSInstrusion Detection System), the intrusion Detection System that we call at ordinary times, is widely used in the security Detection and defense of various operating systems, as well as the extent and frequency of network attacks. Provides detailed information and evidence for future network security management.Due to
Preface~~~~~~~~What I will discuss in this article is to conduct a gradual research on an intruded system, and tools and intrusion technology are not the focus. We will focus on how to combine information to analyze what happened. I am writing this article to help you fight against threats to your enterprise or organization in the security field.
Background~~~~~~~~The information I introduced here is obtained through a honeypot technology. This honeypot is the server where Red Hat 9 is installed
Create a snort database, create a snort user, and give the user snort all the permissions on all the tables in the Snort library.
mysql> CREATE database snort;Query OK, 1 row affected (0.06 sec)Creating a Database
mysql> Create user snor
updateERROR 1364 (HY000): Field ‘ssl_cipher‘ doesn‘t have a default value建议使用GRANT语句进行授权,语句如下: grantallprivilegeson*.*to[emailprotected]‘%‘identifiedby"root";---------------------------------------------------GRANT SELECT,INSERT,UPDATE,DELETE,CREATE,DROP ON maildb.* TO ‘mail‘@‘localhost‘ IDENTIFIED by ‘mailPASSWORD ‘; Create a snort database, create snort users, and give users
Install the lightweight intrusion Monitoring System-Linux Enterprise Application-Linux Server Application On Debian. For details, see the following. Snort is a well-known lightweight IDS. Yesterday, a netizen reminded me that the first attempt to install it on debian was very simple.
To facilitate the analysis results, ACID is also installed. The process is briefly described below.
First, install apache + php4 + mysql. There are a large number of
The first installation attempt On Debian is very simple.To facilitate the analysis results, acid is also installed. The process is briefly described below.
First install Apache + PhP4 + MySQL,Apt-Get install apache2 libapache2-mod-php4 PhP4 php4-mysql mysql-server mysql-ClientCreate a database snortdb for MySQL to store snort output;Create an account snort @ localhost to manage the database. All permissio
work on one software and use the user's wireless card to sniff the wireless signal and find the problem. This system can detect fraudulent access points. Both IDs and IPs can be detected either by accessing a new access point to the network or by changing its settings to a default value or to a user-defined standard.
The system can also analyze network packets to see if anyone is using hacker technology or is interfering.
There are many kinds of in
Excerpt from: http://renxiangzyq.iteye.com/blog/763837updateERROR 1364 (HY000): Field ‘ssl_cipher‘ doesn‘t have a default value建议使用GRANT语句进行授权,语句如下:grantallprivilegeson*.*to[emailprotected]‘%‘identifiedby"root";---------------------------------------------------GRANT SELECT,INSERT,UPDATE,DELETE,CREATE,DROP ON maildb.* TO ‘mail‘@‘localhost‘ IDENTIFIED by ‘mailPASSWORD ‘; Create a snort database, create snort
process is determined to be in ring0 orRing3: only dump marks the corresponding level as contaminated data, which is much smaller than the previous method, there is another program (suchTcpdump) is used to store network data streams of specific ports for a period of time.
With the original information,Argos uses another program and the LCS (longest common subsequence) method and their own crest method to generate signatures. The principle of the crest method is to match the originalThe same dat
Environment RedHat 7.3There are more and more hackers on the Internet, and more experts appear. How can we ensure that we can save a complete log? Hacker knows that the first thing that comes into the system is to clean up logs. The simplest and most direct way to detect intrusions is to view system records. now let's talk about how to set up a secure log server.Think about how to change your log if intruders cannot connect to your log server? Now let's learn how to set up a log server without i
Article Title: Linux Secure log Record server. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Environment RedHat 7.3 The emergence of more and more hackers on the Internet and the emergence of more and more experts. How can we ensure that we can save a complete log? Hacker knows that the first thing that comes into the system is to clean up logs. The simples
Article Title: the IDS intrusion detection tool in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
This article briefly introduces several Linux IDS intrusion detection tools, such as psad, Apparmor, and SELinuxu. First, let's take a look at the principles and practices of the intrusion detection system.
If you only have one computer, it is entirely po
Article Title: Introduction to four major IDS intrusion detection tools on the Linux platform. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
If you only have one computer, it is entirely possible for you to spend a lot of time carefully reviewing system vulnerabilities and problems. Maybe you don't really want this, but it does. However, in the real world,
This article briefly introduces several Linux IDS intrusion detection tools, such as psad, Apparmor, and SELinuxu. First, let's take a look at the principles and practices of the intrusion detection system.
If you only have one computer, it is entirely possible for you to spend a lot of time carefully reviewing system vulnerabilities and problems. Maybe you don't really want this, but it does. However, in the real world, we need some good tools to help us monitor the system, and warn us about wh
needFive, Linux physical securityPhysical security protection of the serverSet the password to grub, even if the attacker is physically in contact with the operating systemLocking the terminal with VlockVi. information collection of cyber securityNetwork host Survival TestPingNmapTelnetNetwork host survivability Test protectionInstall the firewall to screen out the ping test.Installs snort time to detect system status.Find Network topologyZone Transf
LibPcap packet loss problem-Linux Enterprise Application-Linux server application information. The following is a detailed description. Author: Yu Zhu
During this time, we checked the high packet loss rate of LibPcap. Many people mentioned this on the internet, but they always suspect that their problems are different from those of others.
Environment Description: Snapgear-3.5.0/kernel: linux-2.6.x/uClibc/Module: XSCALE/Intel IXP400/LibPcap-0.9.2/Snort
Tags: open source ICA BSP Wireless body san specified location next generation entry2013 Cisco buys Sourcefire for $2.7 billion
10 + years of safety experience
From network security to malware defense-->ngips,ngfw,malware Protection | Physical,virtual,cloud
Support Open Source System-->snort,clamav,razorback
after Sourcefire is integrated, Cisco will provide the industry's best next-generation security services.
The Cis
: one is to increase the coverage, and the other is to use a higher antenna.
3. install intrusion detection and intrusion defense systems
These two systems usually work with one software and use users' wireless network cards to sniff wireless signals and find problems. This system can detect fraudulent access points. Whether it is to access a new access point to the network, or an existing access point, it is set to the default value, or does not match the user-defined standard, IDS and
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.