Penetration Testing mailing list archives
RE: Spyware assessment techniques
From: Cory.Bys () fbol com
Date: Tue, 14 Feb 2006 08:44:09 -0600
I use several things to combat malware -- all of which are based on egress filtering: Malware rules for Snort NPI data rules for Snort (Detects sensitive information leaving your network in clear text -- you'll be surprised at how much you will find) Domain country code rules for Snort Malware ACL for Squid (This is the best way I have found to defend yourself against malware vendors that hide behind Akamai's cache servers) IP blacklist for firewalls All are available on my web site at http://www.kgb.to Note that I consider third party tracking to be malicious, so I like to kill banner ads and all kinds of other stuff. ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- Re: Spyware assessment techniques - hub?, (continued)
- Re: Spyware assessment techniques - hub? Petr . Kazil (Feb 12)
- Re: Spyware assessment techniques - hub? Packet Man (Feb 12)
- Re: Spyware assessment techniques - hub? offset (Feb 12)
- RE: Spyware assessment techniques - hub? Richard Zaluski (Feb 13)
- RE: Spyware assessment techniques - hub? Dan Tesch (Feb 13)
- Re: Spyware assessment techniques - hub? Petr . Kazil (Feb 12)
- RE: Spyware assessment techniques Paul Melson (Feb 13)
- RE: Spyware assessment techniques Butler, Theodore (Feb 10)
- Re: Spyware assessment techniques Thorsten Holz (Feb 10)
- RE: Spy ware assessment techniques Terry Vernon (Feb 10)
- RE: Spy ware assessment techniques jseitz (Feb 11)
- Re: Spyware assessment techniques Thorsten Holz (Feb 10)