IDS mailing list archives

Re: Re: Remote File include (RFI) vulnerabilities


From: aditya.mukadam () gmail com
Date: Thu, 17 Jul 2008 16:06:17 -0600


It all depends on company's policies and procedure , on which traffic to monitor. Ideally, we should be monitoring 
incoming & outgoing traffic. This is not only true for RFI but for other signatures/exploits/ etc as well. T

Thanks,
Aditya Govind Mukadam

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it 
with real-world attacks from CORE IMPACT.
Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw 
to learn more.
------------------------------------------------------------------------


Current thread: