IDS mailing list archives
Re: Re: Remote File include (RFI) vulnerabilities
From: aditya.mukadam () gmail com
Date: Thu, 17 Jul 2008 16:06:17 -0600
It all depends on company's policies and procedure , on which traffic to monitor. Ideally, we should be monitoring incoming & outgoing traffic. This is not only true for RFI but for other signatures/exploits/ etc as well. T Thanks, Aditya Govind Mukadam ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
Current thread:
- Remote File include (RFI) vulnerabilities Ravi Chunduru (Jul 16)
- Re: Remote File include (RFI) vulnerabilities Jamie Riden (Jul 17)
- <Possible follow-ups>
- Re: Re: Remote File include (RFI) vulnerabilities aditya . mukadam (Jul 21)