亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? snort.conf

?? 關于網絡滲透技術的詳細講解
?? CONF
?? 第 1 頁 / 共 3 頁
字號:
#--------------------------------------------------
#   http://www.snort.org     Snort 2.4.3 config file
#     Contact: snort-sigs@lists.sourceforge.net
#--------------------------------------------------
# $Id$
#
###################################################
# This file contains a sample snort configuration. 
# You can take the following steps to create your own custom configuration:
#
#  1) Set the variables for your network
#  2) Configure preprocessors
#  3) Configure output plugins
#  4) Add any runtime config directives
#  5) Customize your rule set
#
###################################################
# Step #1: Set the network variables:
#
# You must change the following variables to reflect your local network. The
# variable is currently setup for an RFC 1918 address space.
#
# You can specify it explicitly as: 
#
# var HOME_NET 10.1.1.0/24
#
# or use global variable $<interfacename>_ADDRESS which will be always
# initialized to IP address and netmask of the network interface which you run
# snort at.  Under Windows, this must be specified as
# $(<interfacename>_ADDRESS), such as:
# $(\Device\Packet_{12345678-90AB-CDEF-1234567890AB}_ADDRESS)
#
# var HOME_NET $eth0_ADDRESS
#
# You can specify lists of IP addresses for HOME_NET
# by separating the IPs with commas like this:
#
# var HOME_NET [10.1.1.0/24,192.168.1.0/24]
#
# MAKE SURE YOU DON'T PLACE ANY SPACES IN YOUR LIST!
#
# or you can specify the variable to be any IP address
# like this:

var HOME_NET 10.2.17.12

# Set up the external network addresses as well.  A good start may be "any"
var EXTERNAL_NET any

# Configure your server lists.  This allows snort to only look for attacks to
# systems that have a service up.  Why look for HTTP attacks if you are not
# running a web server?  This allows quick filtering based on IP addresses
# These configurations MUST follow the same configuration scheme as defined
# above for $HOME_NET.  

# List of DNS servers on your network 
var DNS_SERVERS $HOME_NET

# List of SMTP servers on your network
var SMTP_SERVERS $HOME_NET

# List of web servers on your network
var HTTP_SERVERS $HOME_NET

# List of sql servers on your network 
var SQL_SERVERS $HOME_NET

# List of telnet servers on your network
var TELNET_SERVERS $HOME_NET

# List of snmp servers on your network
var SNMP_SERVERS $HOME_NET

# Configure your service ports.  This allows snort to look for attacks destined
# to a specific application only on the ports that application runs on.  For
# example, if you run a web server on port 8081, set your HTTP_PORTS variable
# like this:
#
# var HTTP_PORTS 8081
#
# Port lists must either be continuous [eg 80:8080], or a single port [eg 80].
# We will adding support for a real list of ports in the future.

# Ports you run web servers on
#
# Please note:  [80,8080] does not work.
# If you wish to define multiple HTTP ports,
# 
## var HTTP_PORTS 80 
## include somefile.rules 
## var HTTP_PORTS 8080
## include somefile.rules 
var HTTP_PORTS 8081

# Ports you want to look for SHELLCODE on.
var SHELLCODE_PORTS !80

# Ports you do oracle attacks on
var ORACLE_PORTS 1521

# other variables
# 
# AIM servers.  AOL has a habit of adding new AIM servers, so instead of
# modifying the signatures when they do, we add them to this list of servers.
var AIM_SERVERS [64.12.24.0/23,64.12.28.0/23,64.12.161.0/24,64.12.163.0/24,64.12.200.0/24,205.188.3.0/24,205.188.5.0/24,205.188.7.0/24,205.188.9.0/24,205.188.153.0/24,205.188.179.0/24,205.188.248.0/24]

# Path to your rules files (this can be a relative path)
# Note for Windows users:  You are advised to make this an absolute path,
# such as:  c:\snort\rules
var RULE_PATH c:\snort\rules

# Configure the snort decoder
# ============================
#
# Snort's decoder will alert on lots of things such as header
# truncation or options of unusual length or infrequently used tcp options
#
#
# Stop generic decode events:
#
config disable_decode_alerts
#
# Stop Alerts on experimental TCP options
#
# config disable_tcpopt_experimental_alerts
#
# Stop Alerts on obsolete TCP options
#
# config disable_tcpopt_obsolete_alerts
#
# Stop Alerts on T/TCP alerts
#
# In snort 2.0.1 and above, this only alerts when a TCP option is detected
# that shows T/TCP being actively used on the network.  If this is normal
# behavior for your network, disable the next option.
#
# config disable_tcpopt_ttcp_alerts
#
# Stop Alerts on all other TCPOption type events:
#
# config disable_tcpopt_alerts
#
# Stop Alerts on invalid ip options
#
# config disable_ipopt_alerts

# Configure the detection engine
# ===============================
#
# Use a different pattern matcher in case you have a machine with very limited
# resources:
#
# config detection: search-method lowmem

# Configure Inline Resets
# ========================
# 
# If running an iptables firewall with snort in InlineMode() we can now
# perform resets via a physical device. We grab the indev from iptables
# and use this for the interface on which to send resets. This config
# option takes an argument for the src mac address you want to use in the
# reset packet.  This way the bridge can remain stealthy. If the src mac
# option is not set we use the mac address of the indev device. If we
# don't set this option we will default to sending resets via raw socket,
# which needs an ipaddress to be assigned to the int.
#
# config layer2resets: 00:06:76:DD:5F:E3

###################################################
# Step #2: Configure preprocessors
#
# General configuration for preprocessors is of 
# the form
# preprocessor <name_of_processor>: <configuration_options>

# Configure Flow tracking module
# -------------------------------
#
# The Flow tracking module is meant to start unifying the state keeping
# mechanisms of snort into a single place. Right now, only a portscan detector
# is implemented but in the long term,  many of the stateful subsystems of
# snort will be migrated over to becoming flow plugins. This must be enabled
# for flow-portscan to work correctly.
#
# See README.flow for additional information
#
preprocessor flow: stats_interval 0 hash 2

# frag2: IP defragmentation support
# -------------------------------
# This preprocessor performs IP defragmentation.  This plugin will also detect
# people launching fragmentation attacks (usually DoS) against hosts.  No
# arguments loads the default configuration of the preprocessor, which is a 60
# second timeout and a 4MB fragment buffer. 

# The following (comma delimited) options are available for frag2
#    timeout [seconds] - sets the number of [seconds] that an unfinished 
#                        fragment will be kept around waiting for completion,
#                        if this time expires the fragment will be flushed
#    memcap [bytes] - limit frag2 memory usage to [number] bytes
#                      (default:  4194304)
#
#    min_ttl [number] - minimum ttl to accept
# 
#    ttl_limit [number] - difference of ttl to accept without alerting
#                         will cause false positves with router flap
# 
# Frag2 uses Generator ID 113 and uses the following SIDS 
# for that GID:
#  SID     Event description
# -----   -------------------
#   1       Oversized fragment (reassembled frag > 64k bytes)
#   2       Teardrop-type attack

#preprocessor frag2

# frag3: Target-based IP defragmentation 
# --------------------------------------
#
# Frag3 is a brand new IP defragmentation preprocessor that is capable of
# performing "target-based" processing of IP fragments.  Check out the
# README.frag3 file in the doc directory for more background and configuration
# information.
# 
# Frag3 configuration is a two step process, a global initialization phase 
# followed by the definition of a set of defragmentation engines.  
# 
# Global configuration defines the number of fragmented packets that Snort can
# track at the same time and gives you options regarding the memory cap for the
# subsystem or, optionally, allows you to preallocate all the memory for the 
# entire frag3 system.
#
# frag3_global options:
#   max_frags: Maximum number of frag trackers that may be active at once.  
#              Default value is 8192.
#   memcap: Maximum amount of memory that frag3 may access at any given time.
#           Default value is 4MB.
#   prealloc_frags: Maximum number of individual fragments that may be processed
#                   at once.  This is instead of the memcap system, uses static 
#                   allocation to increase performance.  No default value.  Each
#                   preallocated fragment eats ~1550 bytes.
#
# Target-based behavior is attached to an engine as a "policy" for handling 
# overlaps and retransmissions as enumerated in the Paxson paper.  There are
# currently five policy types available: "BSD", "BSD-right", "First", "Linux" 
# and "Last".  Engines can be bound to bound to standard Snort CIDR blocks or
# IP lists.
#
# frag3_engine options:
#   timeout: Amount of time a fragmented packet may be active before expiring.
#            Default value is 60 seconds.
#   ttl_limit: Limit of delta allowable for TTLs of packets in the fragments. 
#              Based on the initial received fragment TTL.
#   min_ttl: Minimum acceptable TTL for a fragment, frags with TTLs below this
#            value will be discarded.  Default value is 0.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲1区2区3区视频| 91精品国产日韩91久久久久久| 亚洲电影你懂得| 国产精品久久久久久久久久免费看| 欧美精选一区二区| 色94色欧美sute亚洲13| 国产成人亚洲精品狼色在线| 日韩高清不卡一区| 亚洲五码中文字幕| 中文字幕制服丝袜成人av| 久久一二三国产| 欧美mv和日韩mv的网站| 在线播放一区二区三区| 日本大香伊一区二区三区| a级精品国产片在线观看| 国产一区二区三区蝌蚪| 免费观看成人av| 青青草国产精品亚洲专区无| 亚洲www啪成人一区二区麻豆| 一区二区欧美精品| 尤物视频一区二区| 亚洲男人都懂的| 亚洲欧美日韩在线| 亚洲欧美日韩一区二区三区在线观看| 中文字幕精品在线不卡| 国产精品色在线观看| 国产精品美女久久久久久久网站| 精品精品欲导航| 日韩欧美资源站| 2022国产精品视频| 国产精品午夜在线观看| 中文字幕精品在线不卡| 国产精品久久久久毛片软件| 欧美国产在线观看| 欧美一卡二卡在线| 精品久久久久久久久久久久包黑料| 欧美自拍偷拍午夜视频| 欧美日韩国产片| 亚洲精品在线观看视频| 中文字幕乱码亚洲精品一区| 亚洲免费av高清| 调教+趴+乳夹+国产+精品| 日本免费新一区视频| 激情综合色综合久久| av一二三不卡影片| 欧美日韩精品一区视频| 久久无码av三级| 国产精品国产三级国产aⅴ原创| 亚洲自拍偷拍麻豆| 日韩av一区二区三区| 国产剧情一区在线| 色系网站成人免费| 欧美电影免费观看完整版| 欧美国产激情一区二区三区蜜月| 一区二区三区四区中文字幕| 久草热8精品视频在线观看| 成人av电影在线| 欧美人动与zoxxxx乱| 国产欧美日韩精品在线| 亚洲成人在线免费| 东方aⅴ免费观看久久av| 欧美系列一区二区| 中文字幕 久热精品 视频在线| 亚洲成a人片综合在线| 国产伦精品一区二区三区视频青涩 | 日韩精品中文字幕一区二区三区| 国产欧美日韩视频在线观看| 亚洲成年人网站在线观看| 国产伦精品一区二区三区视频青涩 | 成人精品免费视频| 日韩一区二区在线观看| 亚洲国产精品一区二区www | 成人免费视频视频在线观看免费| 欧美在线高清视频| 亚洲图片欧美激情| 精品一区二区免费在线观看| 欧美日韩不卡视频| 亚洲蜜臀av乱码久久精品蜜桃| 国产成人av网站| 国产亚洲一区二区三区四区 | 日韩精品一级中文字幕精品视频免费观看 | www.视频一区| 国产视频一区在线观看 | 欧美性感一区二区三区| 亚洲品质自拍视频| 成人免费观看av| 国产日韩欧美在线一区| 久久精品二区亚洲w码| 欧美精品xxxxbbbb| 天天影视网天天综合色在线播放| 日本韩国一区二区| 亚洲精品久久7777| 一本色道久久综合亚洲91| 亚洲人被黑人高潮完整版| 91性感美女视频| 专区另类欧美日韩| 色婷婷激情一区二区三区| 一区在线观看视频| 9i看片成人免费高清| 中文一区二区完整视频在线观看| 裸体歌舞表演一区二区| 精品国产91洋老外米糕| 国产综合久久久久久久久久久久| 欧美精品一区二区三区很污很色的| 国内外成人在线| 日本一区二区成人| 91社区在线播放| 午夜电影久久久| 欧洲色大大久久| 麻豆精品蜜桃视频网站| 欧美色老头old∨ideo| 石原莉奈一区二区三区在线观看| 欧美久久久一区| 一区二区三区高清在线| 欧美精品视频www在线观看| 蜜桃精品在线观看| 国产精品电影一区二区三区| 日本丶国产丶欧美色综合| 蜜桃精品视频在线| 亚洲三级久久久| 欧美一区三区二区| 国产精华液一区二区三区| 一区二区三区精品| 亚洲精品在线电影| 色先锋aa成人| 狠狠久久亚洲欧美| 亚洲日本电影在线| 精品三级av在线| 色综合久久综合网欧美综合网| 亚洲精品视频观看| 精品99久久久久久| 97久久精品人人做人人爽50路 | 日韩中文字幕亚洲一区二区va在线| 久久精品水蜜桃av综合天堂| 成人免费毛片片v| 亚洲自拍偷拍综合| 日本一区二区成人在线| 3d动漫精品啪啪一区二区竹菊| 国内偷窥港台综合视频在线播放| 亚洲色图在线播放| 久久久不卡影院| 欧美午夜精品免费| 成人app网站| 激情综合五月婷婷| **欧美大码日韩| 久久免费偷拍视频| 6080yy午夜一二三区久久| 福利一区福利二区| 精品一区二区影视| 中文字幕二三区不卡| 欧美一区二区三区成人| 色婷婷久久久亚洲一区二区三区| 日韩电影免费一区| 亚洲欧洲色图综合| 日韩一级片网址| 欧美疯狂做受xxxx富婆| 色狠狠av一区二区三区| a美女胸又www黄视频久久| 国产精品一区免费视频| 精品影视av免费| 美美哒免费高清在线观看视频一区二区| 亚洲最大色网站| 伊人婷婷欧美激情| 亚洲欧美日韩国产综合在线| 亚洲国产岛国毛片在线| 欧美韩日一区二区三区| 久久亚洲精精品中文字幕早川悠里 | 奇米色777欧美一区二区| 亚洲人成人一区二区在线观看| 国产欧美一区二区精品性| 亚洲精品一线二线三线无人区| 在线播放视频一区| 99国产精品99久久久久久| www.亚洲激情.com| proumb性欧美在线观看| 成人av片在线观看| 成人av网站在线观看| 99久久亚洲一区二区三区青草| 丁香婷婷深情五月亚洲| 色悠悠亚洲一区二区| 欧美一区二区三区在线看| 久久久噜噜噜久噜久久综合| 亚洲免费观看高清完整版在线观看 | 综合av第一页| 日韩中文字幕麻豆| 播五月开心婷婷综合| 在线成人午夜影院| 久久精品视频一区二区| 亚洲二区在线观看| 丰满少妇在线播放bd日韩电影| 色婷婷久久一区二区三区麻豆| 日韩一区二区在线看| 亚洲欧美激情视频在线观看一区二区三区 | 亚洲国产精品激情在线观看| 亚洲一区二区三区在线看| 国产 日韩 欧美大片| 欧美高清视频一二三区| 亚洲免费电影在线| 国产乱人伦精品一区二区在线观看 | 国产精品第五页|