Vulnerability Development mailing list archives

Firewall and IDS, (the second way).


From: <sekure () hadrion com br>
Date: Fri, 15 Mar 2002 15:41:05 -0300

Hi,

I'm "walking" by the internet finding about paper/techniques that can be
used to detect systemn with IDS installed. Try to detect
snort/snort+aide/quinds/.../ somebody know something like it ??

And "how to outline a firewall" ... techinique to try bypass rules of a
firewall ... or dribble ? Maybe wrong common mistakes in configurations ....

Thkz for all.

Cheers.

[ ]'s



Current thread: