亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? readme.inline

?? This is the snapshot of Snot Latest Rules
?? INLINE
字號:
Creator: Jed Haile <jed@grep.net>Current Maintainer: Rob McMillen <rvmcmil@cablespeed.com>                    William Metcalf <william.metcalf@gmail.com>                    Victor Julien <victor@nk.nl>Snort-Inline takes packets from iptables instead of libpcap.  It then uses new rule types to help iptables make pass or drop decisions based on snort rules.  In order for snort_inline to work properly, you must download and compilethe iptables code to include "make install-devel" (www.iptables.org).  This will install the libipq library that allows snort_inline to interface with iptables.  Also, you must build and install LibNet, which is availablefrom www.packetfactory.net.The snort_inline FAQ can be found at http://snort-inline.com/FAQ.html.NEW RULE TYPES AND WHAT THEY DO:drop - The drop rule type will tell iptables to drop the packet and log it        via usual snort means.reject - The reject rule type will tell iptables to drop the packet, log it          via usual snort means, and send a TCP reset if the protocol is          TCP or an icmp port unreachable if the protocol is UDP.sdrop - The sdrop rule type will tell iptables to drop the packet.  Nothing        is logged.RESETS: We now have two options on how to send out resets. We can still usea RAW socket which is the default behavior for snort_inline in which casewe need to have an interface that has an ip assigned. If there is not aninterface with an ip address assigned with access to the source of the packet,the packet will be logged and the reset packet will never make it onto the network.We can also now perform resets via a physical device when using iptables.We take the indev name from ip_queue and use this as the interface on whichto send resets. We no longer need a ip loaded on the bridge, and can remainpretty stealthy as the config layer2_resets in snort_inline.conf takes a sourcemac address which we substitue for the mac of the bridge. For example:CONFIG OPTIONSconfig layer2resetstells snort_inline to use layer2 rests and uses the mac address of the bridge as the source mac in the packet.config layer2resets: 00:06:76:DD:5F:E3  will tell snort_inline to use layer2 resets and uses the src mac of 00:06:76:DD:5F:E3 in the rest packet. STREAM4 OPTIONSThere are two additional stream4 options:inline_state (no args)    This option causes snort to drop TCP packets that are not associated with     an existing TCP session, and is not a valid TCP initiator.midstream_drop_alerts (no args)    By default, when running in inline mode, snort will silently drop any    packets that were picked up in midstream and would have caused an alert    to be generated, if not for the 'flow: established' option.  This is to    mitigate stick/snot type attacks when the user hasn't enabled     inline_state.  If the user wants to see the alerts that are silently    dropped, then enable this keyword.  Note that by enabling this keyword,    the user has opened themselves up to stick/snot type attacks. ALSO...Additionally, Jed's content replace code allows you to modify packetsbefore they leave the network.  For example:alert tcp any any <> any 80 (msg: "tcp replace"; content:"GET"; replace:"BET";)alert udp any any <> any 53 (msg: "udp replace"; \    content: "yahoo"; replace: "xxxxx";)these rules will comb tcp port 80 traffic looking for GET, and udp port 53 traffic looking for yahoo.  Once they are found, they are replaced with BET and xxxxx, respectively.  The only catch is that the replace must be the same length as the content.RULE APPLICATION ORDER:The current Rule application order: 	->activation->dynamic->drop->sdrop->reject->alert->pass->logThis will ensure that a drop rule has precedence over an alert or log rule.Also, the -o flag now changes the rule application order to:	->activation->dynamic->pass->drop->sdrop->reject->alert->logINSTALL./configure --enable-inlinemakemake installDROP RULESMike Clark <mike@honeynet.org> has taken the time and energy to go throughthe snort ruleset to identify and consolidate rules that would meet thedrop criteria.  These rules are located in the rules directory in drop.rules, and should be considered "alpha".  There is also a sample drop.conf file located in the etc directory of the snort_inline.tgz.  The latest and greatest set of drop rules can always be found at:http://www.honeynet.org/papers/honeynet/tools/Additionally, we have included a convert.sh script in the etc/ directorythat will convert all alert rules to drop rules.  All you have to do is copy it to the location of your snort rules and run it.  It will convertall alert rules to drop rules; change HOME_NET to HONEYNET; and reversethe flow of the rules.  Why reverse the flow of the rules?  Because theoriginal purpose of snort_inline is to control a compromised network;therefore, we need to drop packets leaving the Honeynet not entering it.HONEYNET SNORT_INLINE TOOLKITThis is a statically compiled snort_inline binary put together by theHoneynet Project for the Linux Operating System.  It comes with a setof drop.rules, the snort_inline binary, a snort-inline rotation shellscript, and a good README.  It can be found at:http://www.honeynet.org/papers/honeynet/tools/RUNFirst, you need to ensure that the ip_queue module is loaded.  Then,you need to send traffic to snort_inline using the QUEUE target.  Forexample,iptables -A OUTPUT -p tcp --dport 80 -j QUEUEsends all tcp traffic leaving the firewall going to port 80 to the QUEUEtarget.  This is what sends the packet from kernel space to user space (snort_inline).  A quick way to get all outbound traffic going to theQUEUE is to use the rc.firewall script created and maintained by the Honeynet Project (http://www.honeynet.org/papers/honeynet/tools/)This script is well documented and allows you to direct packetsto snort_inline by simply changing the QUEUE variable to yes.Finally, start snort_inline.snort_inline -QDc ../etc/drop.conf -l /var/log/snort-Q => get packets from iptables.-D => run in daemon mode.  pid in /var/run/snort_inline.pid-c => read the following configuration file.-l => log to the following directory.Ideally, snort_inline will be run using only its own drop.rules.  Ifyou want to use Snort for just alerting, a separate process should berunning with its own ruleset.TROUBLESHOOTINGIf you execute snort_inline, and you see something like this:Initializing Output Plugins!Reading from iptablesLog directory = /var/log/snortInitializing Inline modeInlineInit: : Failed to send netlink message: Connection refusedmore than likely, the ip_queue module is not loaded or ip_queue support is not compiled into your kernel.  Either recompileyour kernel to support ip_queue, or load the module.The ip_queue module is loaded by executing:insmod ip_queueAlso, if you want to ensure snort_inline is getting packets, you can start it in the following manner:snort_inline -Qvc <configuration file>This will display the header of every packet that snort_inline sees. 

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久一二三国产| 日韩精品影音先锋| 欧美日韩免费观看一区二区三区| 国产精品香蕉一区二区三区| 色先锋aa成人| 56国语精品自产拍在线观看| 欧美不卡在线视频| 中文字幕一区二区日韩精品绯色| 午夜视黄欧洲亚洲| 成人一区二区视频| 777奇米成人网| 国产精品久99| 成人午夜av电影| 成人影视亚洲图片在线| 3d动漫精品啪啪1区2区免费 | 懂色av一区二区三区蜜臀| 色综合久久88色综合天天免费| 884aa四虎影成人精品一区| 日本一二三四高清不卡| 免费欧美日韩国产三级电影| 精品一区二区在线观看| 欧美专区亚洲专区| 久久精品一区二区三区av| 中文字幕不卡三区| 久久精品国产在热久久| 亚洲欧洲成人av每日更新| 中文字幕中文字幕在线一区 | av在线不卡电影| 日韩精品在线一区| 亚洲电影一区二区三区| 成人av资源站| 日韩欧美在线观看一区二区三区| 国产亚洲一二三区| 亚洲电影在线播放| 91久久国产综合久久| 91精品国产色综合久久| 亚洲综合另类小说| 不卡的电视剧免费网站有什么| 久久综合成人精品亚洲另类欧美| 天使萌一区二区三区免费观看| 国产精品影视网| 欧美成人性福生活免费看| 亚洲一区二区在线免费看| 国产成人精品亚洲日本在线桃色 | 日韩av中文字幕一区二区| 色94色欧美sute亚洲线路一ni | 成人h动漫精品一区二区| 精品久久久影院| 日本不卡一二三| 欧美日韩五月天| 久久久久久久久久久久久久久99 | 国产精品家庭影院| 国产激情视频一区二区在线观看 | 懂色av一区二区三区免费观看| 精品国产一区二区三区久久影院 | 欧美亚洲国产一区在线观看网站| 亚洲日本在线a| 色先锋资源久久综合| 夜夜爽夜夜爽精品视频| 色欧美片视频在线观看在线视频| 亚洲美女精品一区| 欧美性生交片4| 亚洲女同ⅹxx女同tv| 99久久精品99国产精品| 亚洲激情欧美激情| 欧美乱妇20p| 天堂成人国产精品一区| 日韩一区二区三区免费观看| 精品夜夜嗨av一区二区三区| 久久免费视频一区| 久久99精品视频| 国产亚洲欧美日韩日本| 不卡一区二区在线| 亚洲最新视频在线播放| 欧美在线免费视屏| 亚洲老司机在线| 欧美精品久久天天躁| 精品午夜久久福利影院| 国产精品国产自产拍在线| 日本乱人伦aⅴ精品| 日本系列欧美系列| 国产视频一区二区在线| 91欧美一区二区| 婷婷综合另类小说色区| 久久久久国产一区二区三区四区 | 亚洲人妖av一区二区| 欧美亚洲图片小说| 日韩电影在线免费| 国产欧美久久久精品影院| 日本二三区不卡| 免费国产亚洲视频| 亚洲人亚洲人成电影网站色| 日韩你懂的在线观看| 色婷婷综合在线| 国产在线一区二区| 亚洲综合在线电影| 久久久久久久久久久久电影| 在线观看欧美黄色| 国产成人在线看| 日韩精彩视频在线观看| 中文字幕一区日韩精品欧美| 欧美一区二视频| 99在线精品免费| 蜜臀av性久久久久蜜臀aⅴ流畅| 欧美激情自拍偷拍| 日韩免费福利电影在线观看| 色菇凉天天综合网| 成人h动漫精品一区二区| 久久精品国产在热久久| 亚洲电影视频在线| 136国产福利精品导航| 精品美女在线播放| 欧美日韩在线三区| 成人在线视频一区二区| 免费观看一级欧美片| 亚洲成人自拍网| 亚洲精品一区二区精华| 欧美三区免费完整视频在线观看| 成人h精品动漫一区二区三区| 精品伊人久久久久7777人| 欧美aaa在线| 视频一区欧美日韩| 亚洲成年人影院| 一区二区三区四区五区视频在线观看| 久久一区二区三区国产精品| 精品国产露脸精彩对白| 91黄视频在线观看| 国产iv一区二区三区| 国产毛片精品视频| 狠狠色狠狠色综合日日91app| 青青草国产精品亚洲专区无| 丝袜诱惑亚洲看片| 亚洲第一会所有码转帖| 日韩国产欧美在线播放| 婷婷久久综合九色国产成人| 视频在线在亚洲| 免费成人在线网站| 九九热在线视频观看这里只有精品| 亚洲一区二区三区影院| 亚洲国产日韩一区二区| 亚洲一区二区三区国产| 亚洲午夜av在线| 日韩电影免费一区| 免费在线观看精品| 久久精品国产一区二区三区免费看| 婷婷综合另类小说色区| 日本中文一区二区三区| 黄色日韩网站视频| 国产v日产∨综合v精品视频| 不卡一卡二卡三乱码免费网站| 成人白浆超碰人人人人| 色av成人天堂桃色av| 欧美一区二区三区爱爱| 欧美午夜电影一区| 欧美亚洲国产一区在线观看网站| 色综合久久综合| 91精品午夜视频| 88在线观看91蜜桃国自产| 日韩精品自拍偷拍| 欧美精品一区二区三区很污很色的| 26uuu精品一区二区在线观看| 久久久噜噜噜久噜久久综合| 日韩一区中文字幕| 婷婷成人激情在线网| 久久狠狠亚洲综合| 色综合中文综合网| 国产成a人亚洲| 欧美色区777第一页| 国产精品美女久久久久久久| 日本成人在线电影网| 91捆绑美女网站| 久久久不卡网国产精品二区| 午夜精品福利久久久| 99国产精品一区| 亚洲国产精品精华液2区45| 麻豆精品视频在线观看免费| 日本丶国产丶欧美色综合| 国产精品网站一区| 狠狠色丁香久久婷婷综| 91精品国产欧美日韩| 亚洲一区二区在线视频| 一道本成人在线| 国产精品久线观看视频| 国产酒店精品激情| 欧美成人欧美edvon| 日韩av高清在线观看| 欧美三级电影在线看| 亚洲欧美一区二区三区久本道91| 成人免费视频视频| 国产日产精品一区| 国内精品自线一区二区三区视频| 欧美巨大另类极品videosbest | 中文字幕免费观看一区| 国产真实乱子伦精品视频| 欧美成人艳星乳罩| 麻豆91免费看| 日韩免费观看高清完整版在线观看| 天天操天天综合网| 欧美日韩久久久久久| 日韩专区中文字幕一区二区|