Penetration Testing mailing list archives

RE: Spyware assessment techniques


From: Cory.Bys () fbol com
Date: Tue, 14 Feb 2006 08:44:09 -0600


I use several things to combat malware -- all of which are based on egress
filtering:

Malware rules for Snort
NPI data rules for Snort (Detects sensitive information leaving your
network in clear text -- you'll be surprised at how much you will find)
Domain country code rules for Snort
Malware ACL for Squid (This is the best way I have found to defend yourself
against malware vendors that hide behind Akamai's cache servers)
IP blacklist for firewalls

All are available on my web site at http://www.kgb.to

Note that I consider third party tracking to be malicious, so I like to
kill banner ads and all kinds of other stuff.


------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: