亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? faq.tex

?? This is the snapshot of Snot Latest Rules
?? TEX
?? 第 1 頁 / 共 5 頁
字號:
    $WGET $WGET_PARAMS $MD5_URL1    "$ECHO" "Readout the checksum..."    # MD5-Summe auslesen    if [ -f /etc/snort/snortrules-stable.tar.gz.md5 ]    then             MD5SUM1=`grep MD5 \                      /etc/snort/snortrules-stable.tar.gz.md5|awk     '{print $4}'`    else             "$ECHO" "Error! No MD5-file found"             exit 1    fi    "$ECHO" "Generating our own checksum..."    # MD5-Summe bilden    if [ -f /etc/snort/snortrules-stable.tar.gz ]    then        MD5SUM2=`md5sum /etc/snort/snortrules-stable.tar.gz|awk '{print $1}'`    else             "$ECHO" "Error! No rules file found"             exit 1    fi    if [ "$MD5SUM1" = "$MD5SUM2" ]    then             "$ECHO" "The MD5-Checksum fits!"             "$ECHO" "$MD5SUM1"             "$ECHO" "$MD5SUM2"             "$ECHO" "$MD5SUM1" >> /etc/snort/snort.log             "$ECHO" "$MD5SUM2" >> /etc/snort/snort.log             "$ECHO" "Proceeding..."    #        /bin/sleep 1    else             "$ECHO" "Error! Wrong checksum! Aborting!"             "$ECHO" "Install rules manually!"             "$ECHO" "$MD5SUM1" >> /etc/snort/snort.log             "$ECHO" "$MD5SUM2" >> /etc/snort/snort.log             exit 1    fi    # Extract the new rules    if [ -f "/etc/snort/snortrules-stable.tar.gz" ]    then             "$ECHO" "Extracting Snort rules..."             "$TAR" -xzvf /etc/snort/snortrules-stable.tar.gz -C /etc/snort    else             "$ECHO" "Lost the file! Something is wrong!"             "$ECHO" "Aborting!!"             exit 1    fi    # Deleting old rules    # Existiert das Verzeichnis ueberhaupt?    if [ -d "$RULESPATH" ]    then    #        /bin/rm "$RULESPATH"/*.rules             /bin/mv -f /etc/snort/rules/*.rules "$RULESPATH"             /bin/cp -f /etc/snort/rules/classification.config "$SNORTCFGPATH"    else             "$ECHO" "Missing rules-directory!"             "$ECHO" "Aborting!"             exit 1    fi         # Cleaning up...    /bin/rm -rf /etc/snort/rules    # Give everything to root    /bin/chown root:root ${RULESPATH}/*    }    ###########################################################################    ####    #                                   M A I N                                          #    ###########################################################################    ####    # Error handling first    FCHK=$(/usr/bin/wget -spider -N -t 3 -T 5 "$SIGS_URL1" -P /etc/snort 2>&1)    ERR_MSG=$("$ECHO" "$FCHK" | egrep -oi "failed error")    # Log the error message explicitly    "$ECHO" "$FCHK" >> /etc/snort/snort.log    # If there is a word "failed" or "error" we break..    if [ "$("$ECHO" "$FCHK"| grep -i "failed")" ] || \       [ "$("$ECHO" "$FCHK"| grep -i "error")" ]    then             "$ECHO" "Error getting the files. The server seems to be not available."             "$ECHO" "Error message:"             "$ECHO" "$FCHK"             "$ECHO" "Aborting!"             exit 0    fi         "$ECHO" "Checking/getting files..."    # First extract the wget message    FCHK=$(/usr/bin/wget -spider -N -t 3 -T 5 "$SIGS_URL1" \                                  -P /etc/snort 2>&1 | grep "not retrieving")    /bin/date >> /etc/snort/snort.log    "$ECHO" "Wget-output:"    "$ECHO" $FCHK    # Logging what we've done and when    "$ECHO" "$FCHK" >> /etc/snort/snort.log    if [ -z "$FCHK"  ]    then             "$ECHO" "The files on the server seem to be newer."             "$ECHO" "We will get them now..."             getrules             # Reload rules             "$SERVICE" snort reload    #        restartsnort    else    #            "$ECHO" "The signature files on the server are older or not newer."             "$ECHO" "Doing nothing for now..."             "$ECHO" "Checking if Snort is running...."             checksnort             exit 0    fi    # Send Email    "$ECHO" -e "`ls -lA "$RULESPATH"`\n\nSnort running with PID $("$PIDOF"\                "$SNORT")" | mail -s "Reloaded Snort signatures on $MACHINE"\                "$MAILTO"    ###########################################################################    ####    ###########################################################################    ####    exit 0    #EOF\end{verbatim}\subsection{How do you get the latest Snort via cvs?} \label{cvs}Snort can be checked out through anonymous (pserver) CVS with thefollowing instruction set. The module you wish to check out must bespecified as the modulename. When prompted for a password for anonymous,simply press the Enter key.\begin{verbatim}    cvs -d:pserver:anonymous@cvs.snort.org:/cvsroot login    cvs -z3 -d:pserver:anonymous@cvs.snort.org:/cvsroot co snort\end{verbatim}Updates from within the module's directory do not need the -d parameter. You will need to issue the command ``sh ./autojunk.sh'' before starting./configure.\subsection{How do I use a remote syslog machine?}Add the syslog switch, -s, and put this statement syslog.conf:\begin{verbatim}    auth.alert         @managmentserverIP\end{verbatim}Look at your snort.conf file for more info on the facility and Prioritysettings.Make sure you have syslogd on the management server configured to allow syslog overUDP. Under RedHat, you can do this by editing /etc/sysconfig/syslog and addingthe following line:\begin{verbatim}    SYSLOGD_OPTIONS="-r -m 0"\end{verbatim}This will start syslogd with the mark interval set to 0 (turning it off) andset it to receive network connections.Then restart syslog. ``man syslogd'' for more info. You might also want toinvestigate syslog-ng\linebreak (\htmladdnormallink{http://www.balabit.hu/en/downloads/syslog-ng/}{http://www.balabit.hu/en/downloads/syslog-ng/}).Example invocation of snort:\begin{verbatim}    /usr/local/bin/snort -c /etc/snort/snort.conf -I -A full -s 192.168.0.2:514    -i rl0\end{verbatim}Note for Win32 users:Frank Knobbe wrote a patch for Snort to allow you to use `-s $<$host$>$' on thecommand line under Windows without nullifying the snort.conf. In other words,Snort still uses all settings from snort.conf but in addition uses the hostfrom `-s' to send syslog alerts to. You can find the patch at:    \htmladdnormallink{http://www.snort.org/dl/contrib/patches/win32syslog/}{http://www.snort.org/dl/contrib/patches/win32syslog/}\subsection{How do I get Snort and ACID working?}Acid has been unmaintained for quite some time. Use BASE instead (see below).\subsection{How do I build this BASE thing?}Read carefully through all the docs for each package. Getting BASE to work is alot of work, since it depends on many packages. You need a working Apache, aworking PHP, a working GD (and the many libraries GD depends on) and the ADODBpackage. This is a lot of stuff to configure.A typical sequence to get this all working on Solaris 8: Use some binarypackages from a trusted Sun freeware site (sunfreeware.com). The most problemswere with PHP and the GD library. GD itself needs a bunch of packages andlibraries to work also. It needs the libpng stuff, the libjpeg stuff (if youwant jpeg), etc, etc. Read through the readme for GD. So you either need to getthese and compile them also, or get some binary packages. PHP is the mostdifficult thing to get compiled correctly. The PHP package needs to be compiledwith lots of ``-with'' flags for GD to work properly, otherwise it gets lots ofrun-time unresolved reference errors. Just using a ``with'' for GD isn'tsufficient. You also need to "with" each library which GD uses also, or PHPcan't find the functions it needs. Here's the ``configure'' line you can use toget PHP working:\begin{verbatim}    ./configure --with-mysql --with-apxs=/usr/apache/bin/apxs --with-gd    --enable-sockets --with-jpeg-dir=/usr/local/lib --with-png-dir=/usr/local/    lib --with-zlib-dir=/usr/local/lib --with-xpm-dir=/usr/local/lib\end{verbatim} These `with' statements basically have the effect of the Makefile including -Land -R statements for each library so that both the compile and run timelinkers can find all the functions needed to find in the Apache moduleenvironment. Apache doesn't seem to consult the LD\_LIBRARY\_PATH when running amodule (or PHP doesn't, or there's some config item in the Apache conf files,but you can just use the ``withs'').Basically, you need to work from the bottom up. So you need to obtain/compileany libraries that GD needs and install them, and any libraries/packages thosepackages need. Then once you get GD compiled properly and installed, compilePHP. Then make a PHP script that calls phpinfo() and carefully examine the pageproduced. Once satisfied PHP is working, then the 'foundation' is ready for theother stuff. If they succeed, then install ADODB and BASE, tweak the configfiles, and it should all work. (heh, heh)BASE website: \htmladdnormallink{http://base.secureideas.net/}{http://base.secureideas.net/}\section{Rules and Alerts}\subsection{Errors loading rules files}Some common ones:\begin{itemize}\item \begin{verbatim}ERROR telnet.rules:YYY => Port value missing in rule!\end{verbatim}\item \begin{verbatim}ERROR telnet.rules:YYY => Bad port number: "(msg:"blah"\end{verbatim}\item \begin{verbatim}ERROR telnet.rules:YYY => Couldn't resolve hostname blah\end{verbatim}\end{itemize}What's going on?``telnet.rules'' is the file where the syntax error occurred, and ``YYY'' is the line number it occurred on.  There are a couple of possibilities:\begin{enumerate}\item The rule is missing a port value, has an invalid port number, or a bad hostname - in which case the ruleset author/maintainer should be notified.\item More often, the rule is just fine, but a variable in it was not declared.  Open the rules file, look at the rule on the line number provided, and confirm that the variables it uses have been declared.  You can read more about variables at \htmladdnormallink{http://www.snort.org/docs/writing\_rules/chap2.html\#tth\_sEc2.1.2}{http://www.snort.org/docs/writing\_rules/chap2.html\#tth\_sEc2.1.2}\end{enumerate}\subsection{Snort says ``Rule IP addr (``1.1.1.1'') didn't x-late, WTF?''}Get rid of the quotes around the IP address and try again.\subsection{Snort is behind a firewall (ipf/pf/ipchains/ipfilter) and awfully quiet...}Your firewall rules will also block traffic to the Snort processes.Note: This does not apply if Snort is installed {\bf on} the firewall box.\subsection{Does snort see packets filtered by IPTables/IPChains/IPF/PF?}Snort operates using libpcap. In general it sees everything the network adapterdriver sees before the network stack munges it. Linux IPTables, Linux IPChains,BSD PF and IPF and other packet filters do not prevent snort from seeing apacket that is present on the network wire. Even if an inbound packet is deniedby the packet filter Snort will still see and analyze the packet if it islistening to that interface. Snort/pcap sees whatever comes out of or goes intothe network adapter.Note however that Snort is affected to the extent that the stream of data onthe network wire is affected. Thus Snort will not see outbound packets whichwere denied while being sent since they will never reach the network adapter.Under OpenBSD you can snort just the PF rejects by using the /dev/pflogNinterface.\subsection{I'm getting large amounts of $<$some alerts type$>$. What should I do?  Where can I go to find out more about it? }Some rules are more prone to producing false positives than others.     This often varies between networks.  You first need to determine if itis indeed a false positive.  Some rules are referenced with ID numbers.The following are some common identification systems, and where to goto find more information about a particular alert.\begin{tabular}{|l|l|l|}\hline{\bf System} & {\bf Example} & {\bf URL} \\\hline\hlineIDS & IDS182 & \htmladdnormallink{http://www.whitehats.com/IDS/182}{http://www.whitehats.com/IDS/182} \\\hlineCVE & CVE-2000-0138 & \htmladdnormallink{http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2000-0138}{http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2000-0138} \\\hlineBugtraq & BugtraqID 1 & \htmladdnormallink{http://www.securityfocus.com/vdb/bottom.html?vid=1}{http://www.securityfocus.com/vdb/bottom.html?vid=1} \\\hlineMcAfee & Mcafee 10225 & \htmladdnormallink{http://vil.nai.com/vil/dispVirus.asp?virus\_k=10225}{http://vil.nai.com/vil/dispVirus.asp?virus\_k=10225} \\\hlineNessus & Nessus 11073 & \htmladdnormallink{http://cgi.nessus.org/plugins/dump.php3?id=11073}{http://cgi.nessus.org/plugins/dump.php3?id=11073}\\\hline\end{tabular}It may be necessary to examine the packet payload to determine if thealert is a false positive.  The packet payload is logged using the -doption.  If you determine the alerts are false positives, you may wantto write pass rules for machines that are producing a large number of them.If the rule is producing an unmanageable amount of false positives froma number of different machines, you could pass on the rule for all traffic.This should be used as a last resort.\subsection{What about all these false alarms? }Most think that a pile of false positives is infinitely preferable. Thenpeople can turn off what they don't want. The reverse, having a small ruleset, can lure people into complacency thinking that Snort is doing ``itsthing'' and there is nothing to worry about. \subsection{What are all these ICMP files in subdirectories under /var/log/snort? }Most of them are likely destination unreachable and port unreachables thatwere detected by snort when a communications session attempt fails.\subsection{Why does the program generate alerts on packets that have pass rules?  }The default order that the rules are applied in is alerts first, then passrules, then log rules. This ordering ensures that yo

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩成人av影视| 国产精品久久免费看| 视频一区在线播放| 制服丝袜日韩国产| 天天综合日日夜夜精品| 欧美一区二区不卡视频| 美日韩一区二区三区| 精品国产乱码久久久久久闺蜜| 日本乱人伦一区| 亚洲毛片av在线| 欧美无乱码久久久免费午夜一区| 亚洲午夜免费福利视频| 欧美一区二区三区喷汁尤物| 国产原创一区二区三区| 欧美激情一区二区三区在线| 色香蕉成人二区免费| 午夜精品久久久| 精品999在线播放| 成人h版在线观看| 亚洲综合激情另类小说区| 欧美三级日韩在线| 国内精品国产三级国产a久久| 国产精品久久夜| 欧美日韩美少妇| 美女一区二区久久| 国产目拍亚洲精品99久久精品| 成人禁用看黄a在线| 亚洲电影一区二区| 国产亚洲精品7777| 欧美体内she精高潮| 久久国产精品99精品国产 | 国产午夜三级一区二区三| 成人免费av资源| 亚洲成人免费视| 国产欧美日韩精品在线| 欧美伊人久久大香线蕉综合69| 久久国产精品区| 亚洲小说春色综合另类电影| 欧洲av在线精品| 在线免费观看日本欧美| 美女精品自拍一二三四| 亚洲欧美日韩中文播放| 日韩欧美国产一区二区在线播放| 久久嫩草精品久久久精品| 国产精品亚洲午夜一区二区三区| 欧美一级片在线观看| 色婷婷久久久综合中文字幕 | 图片区小说区区亚洲影院| 亚洲成人av电影在线| 亚洲一区在线观看免费| 亚洲一区二区三区视频在线播放| 亚洲午夜影视影院在线观看| 亚洲一区免费在线观看| 亚洲国产精品久久艾草纯爱| 五月天亚洲婷婷| 久久99国产精品久久| 精品夜夜嗨av一区二区三区| 狠狠色丁香久久婷婷综| 成人app软件下载大全免费| av电影在线观看一区| 色婷婷一区二区三区四区| 欧美日韩视频专区在线播放| 91精品国产高清一区二区三区蜜臀| 制服丝袜亚洲播放| 久久免费精品国产久精品久久久久| 欧美激情一区在线| 一区二区三区精品视频| 日韩激情一区二区| 国产精品一区二区三区四区| proumb性欧美在线观看| 欧美日韩在线播放三区| 精品国产一区a| 国产精品嫩草影院av蜜臀| 亚洲激情在线激情| 久久国内精品自在自线400部| 岛国精品在线观看| 欧美午夜电影在线播放| 精品美女在线观看| 国产精品免费久久| 午夜日韩在线电影| 韩日欧美一区二区三区| 色先锋资源久久综合| 欧美不卡一区二区三区四区| 国产精品乱码人人做人人爱 | 在线视频欧美精品| 日韩欧美一级在线播放| 中文字幕永久在线不卡| 麻豆精品久久久| 一本久道中文字幕精品亚洲嫩| 91.xcao| 欧美国产精品一区二区三区| 亚洲综合区在线| 国产精品一区二区在线观看网站| 欧美吞精做爰啪啪高潮| 久久精品一区二区三区四区| 亚洲成人久久影院| 成人不卡免费av| 日韩欧美国产综合| 亚洲影院在线观看| 国产伦精品一区二区三区免费| 欧美色成人综合| 国产精品久久久爽爽爽麻豆色哟哟| 天天综合网天天综合色| 99久久国产综合色|国产精品| 欧美一区二区三区免费大片| 亚洲黄色在线视频| 丁香六月综合激情| 精品1区2区在线观看| 亚洲18色成人| 在线免费不卡视频| 国产精品大尺度| 国产资源精品在线观看| 欧美一区二区福利视频| 亚洲国产aⅴ成人精品无吗| 91美女视频网站| 国产欧美日韩激情| 国产一区二区毛片| 日韩视频一区二区三区在线播放 | 欧美精品久久天天躁| 日韩一区有码在线| 成人午夜av影视| 日本一区二区免费在线观看视频| 久久精品久久99精品久久| 欧美日本国产视频| 亚洲国产欧美在线| 欧美视频完全免费看| 一区二区免费在线播放| 色综合 综合色| 亚洲免费看黄网站| 99re热视频精品| 中文字幕欧美一| 成人app软件下载大全免费| 国产欧美综合在线观看第十页| 国产麻豆欧美日韩一区| 337p粉嫩大胆噜噜噜噜噜91av| 蜜桃91丨九色丨蝌蚪91桃色| 日韩欧美亚洲另类制服综合在线| 日韩国产一二三区| 欧美精品第1页| 日韩福利电影在线| 日韩一级大片在线观看| 日本中文在线一区| 精品国产乱码久久久久久老虎| 激情久久五月天| 国产视频视频一区| 成人精品一区二区三区中文字幕| 国产精品的网站| 在线精品视频小说1| 亚洲大片在线观看| 日韩一区二区免费高清| 久久精品99久久久| 国产区在线观看成人精品 | 欧美日韩国产在线观看| 午夜激情综合网| 欧美不卡一区二区三区| 丁香六月久久综合狠狠色| 亚洲乱码精品一二三四区日韩在线| 色诱亚洲精品久久久久久| 偷拍亚洲欧洲综合| 精品国产91洋老外米糕| 国产成人精品综合在线观看| 中文字幕av一区 二区| 91国产免费看| 麻豆精品新av中文字幕| 国产精品久久久久永久免费观看 | 久久久久久久久蜜桃| 99精品国产热久久91蜜凸| 一区二区在线观看av| 欧美一区二区三区视频免费播放 | 久久这里只精品最新地址| k8久久久一区二区三区| 天堂蜜桃一区二区三区| 久久综合色之久久综合| 95精品视频在线| 日韩成人一级片| 国产精品免费av| 欧美日韩国产a| 国产a区久久久| 亚洲在线视频一区| 26uuu精品一区二区| 91麻豆成人久久精品二区三区| 日韩精品91亚洲二区在线观看 | 亚洲高清视频的网址| 精品国产一区二区国模嫣然| aaa欧美色吧激情视频| 美女久久久精品| 亚洲欧洲综合另类| 久久女同性恋中文字幕| 欧美日韩在线一区二区| 国产成人综合亚洲91猫咪| 亚洲电影第三页| 亚洲欧洲成人精品av97| 日韩欧美另类在线| 欧日韩精品视频| 成人美女在线观看| 久久99精品久久久久久国产越南 | 国产高清不卡二三区| 午夜欧美视频在线观看| 国产精品国产三级国产aⅴ无密码| 69成人精品免费视频|