Главная
Study mode:
on
1
Intro
2
Why Im here
3
Less Noise More Signal
4
Sensor Placement
5
Sensor Placement Diagram
6
IP and Port Variables
7
IP Variables
8
Why are we doing this
9
Pulling Pork
10
snort rule anatomy
11
snort rule example
12
pass rules
13
log being calm
14
Limit
15
IP Reputation
16
Berkeley Packet Filter
17
BPF Example
18
BPF is Black Magic
19
snort software stack
20
snort recap
21
Pry
22
Passive DNS
23
Metadata
24
TCP Traffic
25
Flow Monitoring
26
Recap
27
Open Source Projects
28
AutoSnork
29
Metasploit
30
Unlimited
31
Screencap
32
Blindseeker
33
Outro
Description:
Discover effective strategies for optimizing your Intrusion Detection System (IDS) in this informative BSidesLV conference talk. Learn about sensor placement, IP and port variables, and the anatomy of Snort rules. Explore techniques such as IP reputation, Berkeley Packet Filter, and passive DNS to enhance your IDS capabilities. Gain insights into flow monitoring, metadata analysis, and useful open-source projects like AutoSnork and Metasploit. Master the art of reducing noise and increasing signal in your security monitoring efforts.

Cut the Sh-t - How to Reign in Your IDS

BSidesLV
Add to list