index_S

 

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

sa command (process acounting) 
Samba, SWAT configuration tool 
sandboxed environments  [See also chroot( environment)]
    BIND, running in 
    restricting services with 
        chroot( ) 
        jail( ) 
    security enhancement with grsecurity 
scrub rules (PacketFilter) 
sdrop rule, Snort_inline 
searching packets, Snort rule options 
Sebek (honeypot monitoring package) 
SecFilter keyword 
SecFilterSelective keyword 
sectors offsets for a partition 
secure tunnels  [See tunnels, secure]
securelevels (BSD systems) 
security holes (system), automating patching of 
security policy
    auditing on Windows 
    creating for Windows firewall 
    setting up for IPsec connections on FreeBSD 
Security Policy Database (SPD)
    FreeBSD, IPsec connections 
    Linux, IPsec connections 
security scanner (Nessus) 
Self-certifying File System (SFS) 
self-signed certificates 
Sendmail, setting up to use TLS 
sensor_id (ACID) 
server clocks, keeping synchronized 
services
    common port numbers 
    emulated by honeyd 
        attempts to access 
    preventing from binding to an interface 
    restricting with sandboxed environments 
    running, listing on Windows 
    scanning for vulnerabilities with Nessus 
session cookies, attacks using 
session-timeout values, setting for PacketFilter 
seteuid( ) 
setfacl command 
setkey utility 
setuid( ) 
sfscd (SFS client daemon) 
sfskey command 
SGID or SUID programs, scanning for 
Sguil
    client and server, testing 
    compiling and installing Barnyard 
    components of 
    configuring sguild 
    creating a MySQL database 
    database tables, creating 
    log_packets.sh script, setting up 
    op_sguil output plug-in 
    sensor agent script, setting up 
    sensors, setting up 
    SSL, using with 
    starting up sguild and xscriptd 
    Tcl packages required 
    xscriptd, setting up 
shared-medium Ethernet networks, sniffers and 
shares (default), disabling on Windows 
sharing files, using SFS (Self-certifying File System) 
shell scripts, SUID or SGID bits on 
shells
    exploit with shell code against SSH daemon 
    restricted 
signature verification, automating 
Simple WATCHer  [See swatch]
skipinterval option, SnortSam 
SMTP (TLS-enabled), setting up 
sniffdet tool 
    ARP test 
    DNS test 
SNMP interface statistics (for SNMP daemon on a router) 
snmpget utility 
Snort GUI for Lamerz  [See Sguil]
Snort NIDS 
    alerts
        analyzing with Sguil 
        tracking with ACID 
    automatic rule updates with Oinkmaster 
    Barnyard, using to increase performance 
        unified output format for Snort 
    configuration
        built-in preprocessors 
        databases 
        editing snort.conf file 
        files provided with distribution 
        rule signatures 
    database support, enabling output plug-in 
    downloading and installing 
    firewalling with SnortSam 
        configuring SnortSam 
        firewall communications, setting up 
        output plug-ins 
        rules that trigger firewall rules 
    flexible response 
    preventing and containing intrusions with Snort_inline 
        rules 
    sensor network, managing 
    support for sending alerts to a database 
    testing in sniffer mode 
    writing your own rules 
        actions, built-in 
        activate and dynamic actions 
        defining custom actions 
        direction of packets 
        IP addresses and ports for packets 
        online rule documentation 
        options 
        protocol, specifying for rule 
        rule header and options 
SnortCenter 
    admin account information, editing 
    config.php file, editing 
    MySQL database 
    sensor agent, adding to main management console 
    sensor agents, setting up 
    setting up 
sockets (open), listing with lsof utility 
SOCKS proxy, using SSH as 
sockstat command 
software authenticity, checking 
Solaris
    Sebek honeypot monitoring module 
    TUN/TAP driver 
source entries (syslog-ng) 
Spade IDS 
    alerts generated by 
SPD  [See Security Policy Database]
spoofing addresses
    ARP spoofing 
    preventing IP spoofing with egress filtering 
    preventing with FilterPacket 
SQL-injection attacks 
squid proxy over SSH 
SSH
    -D switch 
    authpf shell and 
    exploit launched against daemon, monitoring 
    forwarding and encrypting traffic with 
    keys, automating client logins 
        security concerns with public keys 
    login keys, generating for 
    PPP, using with to create secure VPN tunnel 
    SOCKS proxy, using as 
    squid proxy over 
    tunneling connection over HTTP with httptunnel 
    VTun, using over 
SSL
    Apache, installing with 
    certificates 
    encrypting and tunneling traffic with 
    encrypting IMAP and POP with 
    OpenVPN, use by 
    Sguil, using with  2nd 
    SnortCenter sensor, using with 
    using for HTTPS with ntop 
Stackguard 
stacks
    buffer overflows based on 
    PAM modules for 
startup, running commands out of system rc files 
startx command, -nolisten tcp option 
stateless protocol 
Statistical Anomaly Detection Engine  [See Spade IDS]
statistics (network), collecting with firewall rules 
stealth mode, running IDS sensors in 
sticky bit set on directories, scanning for 
stream4 preprocessor, enabling for Snort 
strings, searching packets for with Snort 
stunnel 
    configuration file, stunnel.conf 
    forwarding local port to remote port 
su utility 
sudo utility 
suEXEC (Apache) 
    enabling and configuring 
SUID bit, disabling 
SUID files, monitoring on your system 
SUID or SGID programs, scanning for 
SUID wrapper program, used by Apache 
swapping 
SWAT (Samba's web-based configuration tool) 
swatch (log file monitor) 
    regular expressions to match log messages 
symlink restrictions (grsecurity) 
sysctl.conf file, enabling packet forwarding 
syslog
    aggregating logs from remote sites 
    Barnyard output to 
    centralized server, running 
    filtering information into separate files 
    integrating Windows into 
syslog-ng  2nd 
    configuration file entries 
    encrypting tunnel for secure traffic between daemons 
    filters, defining 
    libol library package 
    macros 
    syslog.conf, translating to source, destination, and log entries 
    TCP support 
    web site 
syslog.conf file, translating to syslog-ng configuration entries 
system binaries
    modification by root kits 
    performing functions of with BusyBox 
    verifying for chrootkit 
system calls
    definition of 
    interception by Sebek 
    restricting  [See systrace utility]
system groups, specifying for use of sudo 
system logs, protecting from tampering by intruders 
system updates
    automating 
    Windows, checking for 
systrace utility 
    aliases 
    policies 
    policy-generation tool 

 


Network Security Hacks
Network Security Hacks: Tips & Tools for Protecting Your Privacy
ISBN: 0596527632
EAN: 2147483647
Year: 2006
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net