Managing Security with Snort & IDS Tools by Kerry J. Cox & Christopher Gerg
Author:Kerry J. Cox & Christopher Gerg [Cox, Kerry J.]
Language: eng
Format: mobi
Tags: COMPUTERS / General
Publisher: O'Reilly Media
Published: 2009-02-08T16:00:00+00:00
Wherever you decide to put it, just make sure that you set the RULE_PATH variable in the snort.conf file to point to the directory containing the *.rules files. Below is a listing of the rules files (the archive also includes a snort.conf file template and several *.config files used by Snort):
attack-responses.rules local.rules shellcode.rules
backdoor.rules misc.rules smtp.rules
bad-traffic.rules multimedia.rules snmp.rules
chat.rules mysql.rules sql.rules
ddos.rules netbios.rules telnet.rules
deleted.rules nntp.rules tftp.rules
dns.rules oracle.rules virus.rules
dos.rules other-ids.rules web-attacks.rules
experimental.rules p2p.rules web-cgi.rules
exploit.rules policy.rules web-client.rules
finger.rules pop2.rules web-coldfusion.rules
ftp.rules pop3.rules web-frontpage.rules
icmp-info.rules porn.rules web-iis.rules
icmp.rules rpc.rules web-misc.rules
imap.rules rservices.rules web-php.rules
info.rules scan.rules x11.rules
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Digital Forensics and Incident Response - Second Edition by Gerard Johansen(1468)
Network Security Strategies by Aditya Mukherjee(1370)
Modern Cryptography for Cybersecurity Professionals by Lisa Bock(1339)
Practical Cybersecurity Architecture by Diana Kelley Ed Moyle(1330)
Web Penetration Testing with Kali Linux - Third Edition by Gilberto Nájera-Gutiérrez(785)
Web Application Obfuscation by Mario Heiderich & Eduardo Alberto Vela Nava & Gareth Heyes & David Lindsay(584)
Cybersecurity - Attack and Defense Strategies by Erdal Ozkaya & Yuri Diogenes(581)
GCIH GIAC Certified Incident Handler All-in-One Exam Guide by Nick Mitropoulos(471)
Kali Linux Penetration Testing Bible by Gus Khawaja(428)
Cybercrime Investigations by John Bandler(412)
The Hardware Hacking Handbook by Colin O'Flynn(391)
Computer Hacking Forensic Investigator Exam Workbook: 500+ Questions & Answers for ECCouncil 312-49: Updated 2020 by Aries+ Centre(357)
Kali Linux: Testing Your Network: How to Test Infrastructure Security with Security Testing and Penetration Testing by Eltrinos Frank(352)
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks by Purackal Rachel Sebastian(324)
Security in Computing, 5e by Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies(322)
Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites by Rob Kowalski(316)
8 Steps to Better Security by Crawley Kim;(311)
Security, Privacy and User Interaction by Unknown(287)
Cybersecurity: A Self-Teaching Introduction by C.P. Gupta & K.K. Goyal(279)
