Red Hat NETWORK BASIC - USER REFERENCE GUIDE 4.0 Betriebsanweisung Seite 3

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 79
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 2
3
Define Unknown or Customized Ports ..................................................................................................... 53
PVS Real-Time Traffic Analysis Configuration Theory .................................................................. 53
Focus Network ........................................................................................................................................... 53
Detecting Server and Client Ports ............................................................................................................ 54
Detecting Specific Server and Client Port Usage .................................................................................... 54
What this Means for Firewall Rules .......................................................................................................... 55
Working with the SecurityCenter .............................................................................................................. 55
Selecting Rule Libraries and Filtering Rules ........................................................................................... 55
Detecting Encrypted and Interactive Sessions........................................................................................ 56
Routes and Hop Distance ......................................................................................................................... 56
Alerting ....................................................................................................................................................... 56
New Host Alerting ...................................................................................................................................... 56
Internal Passive Vulnerability Scanner IDs ..................................................................................... 57
What is a Passive Vulnerability Scanner ID? ........................................................................................... 57
Internal Passive Vulnerability Scanner IDs .............................................................................................. 57
Working with Passive Vulnerability Scanner Plugins .................................................................... 58
Vulnerability and Passive Fingerprint Overview ..................................................................................... 58
Downloading New Vulnerability Plugins ................................................................................................... 58
Writing Custom Plugin Libraries ............................................................................................................... 58
Restarting the Passive Vulnerability Scanner ........................................................................................... 58
Writing Passive Vulnerability Scanner Plugins ....................................................................................... 58
Plugin Keywords ...................................................................................................................................... 58
Plugin Libraries ........................................................................................................................................ 61
Basic Passive Vulnerability Scanner Example ......................................................................................... 61
More Complex Passive Vulnerability Scanner Example ........................................................................... 61
Case Insensitive Example ........................................................................................................................ 62
Passive Vulnerability Scanner Network Client Detection .......................................................................... 63
The Passive Vulnerability Scanner can Match “Previous” Packets ........................................................... 63
The Passive Vulnerability Scanner can Match Binary Data ...................................................................... 64
Negative Matches .................................................................................................................................... 64
Time Dependent Plugins .......................................................................................................................... 65
Writing Passive Vulnerability Scanner Real-Time Plugins ..................................................................... 66
Real-Time Plugin Model ........................................................................................................................... 66
New Keywords ......................................................................................................................................... 66
Example Failed Telnet Login Plugin ......................................................................................................... 66
Example Finger User List Enumeration Plugin ......................................................................................... 67
Example Unix Password File Download Web Server Plugin .................................................................... 67
Example Generic Buffer Overflow Detection on Windows Plugin ............................................................. 68
Passive Vulnerability Scanner Corporate Policy Plugins ....................................................................... 69
Detecting Custom Activity Prohibited by Policy ........................................................................................ 70
Detecting Confidential Data in Motion ...................................................................................................... 71
Passive Vulnerability Scanner Operating System Fingerprints .................................................... 72
Passive Operating System Fingerprinting ............................................................................................... 72
For Further Information .................................................................................................................... 73
Appendix 1: Working with SecurityCenter ...................................................................................... 74
Architecture ............................................................................................................................................... 74
Managing Vulnerabilities ........................................................................................................................... 74
Updating the PVS Management Interface ................................................................................................ 74
Seitenansicht 2
1 2 3 4 5 6 7 8 ... 78 79

Kommentare zu diesen Handbüchern

Keine Kommentare