Using Open BSD, snort, Linux, and a few other tricks to set up a transparent, ACTIVE Ids.
Using Open BSD, snort, Linux, and a few other tricks to set up a transparent, ACTIVE Ids.
Presented at DEF CON 9 (2001),
July 14, 2001, 4 p.m.
(110 minutes).
Basically I will cover: How to set up Snort Sensor in Openbsd. - How to use Perl & Rules to actively adapt rules to attacks, while keeping yourself from being "DOSSED" - How to use ACID to make logs more easily accessible, and analyzed, - How to Use database portion to look at historical attack trends and react appropriately. - How to set up "safe" management segment on your network that is both accessible to you, but hard for "them" to get into.