Vulnerability Development mailing list archives
Firewall and IDS, (the second way).
From: <sekure () hadrion com br>
Date: Fri, 15 Mar 2002 15:41:05 -0300
Hi, I'm "walking" by the internet finding about paper/techniques that can be used to detect systemn with IDS installed. Try to detect snort/snort+aide/quinds/.../ somebody know something like it ?? And "how to outline a firewall" ... techinique to try bypass rules of a firewall ... or dribble ? Maybe wrong common mistakes in configurations .... Thkz for all. Cheers. [ ]'s
Current thread:
- Firewall and IDS, (the second way). sekure (Mar 15)
- Re: Firewall and IDS, (the second way). Zow (Mar 15)
- RE: Firewall and IDS, (the second way). Benjamin P. Grubin (Mar 16)
- Re: Firewall and IDS, (the second way). Bryan Burns (Mar 16)
- RE: Firewall and IDS, (the second way). Dom De Vitto (Mar 16)
- Re: Firewall and IDS, (the second way). Michel Arboi (Mar 16)
- Re: Firewall and IDS, (the second way). Timothy J. Miller (Mar 19)
- Re: Firewall and IDS, (the second way). Anthony Stevens (Mar 20)
- <Possible follow-ups>
- Re: Firewall and IDS, (the second way). Marco Ivaldi (Mar 18)
- RE: Firewall and IDS, (the second way). PJD (Mar 19)
- Re: Firewall and IDS, (the second way). Zow (Mar 20)
(Thread continues...)
- Re: Firewall and IDS, (the second way). Zow (Mar 15)