What are the various features of snort?

September 26, 2008 0 Comments 0 tags

Snort has the following features: * It detects threats, such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors

What are the user authentications supported by the SSH-2 protocol?

September 25, 2008 0 Comments 0 tags

The SSH-2 protocol supports the following user authentications: * Public key authentication (DSA, RSA*, OpenPGP) * Host-based authentication * Password-based authentication Note: SSH-1 supports a wider range of user authentications,

What are the steps for security evaluation?

September 24, 2008 0 Comments 0 tags

The ethical hacking project comprises three phases, summarized as follows: 1. Preparation: In this phase, a formal contract that contains a non-disclosure clause as well as a legal clause to

What are the security holes in the Basic Authentication scheme?

September 22, 2008 0 Comments 0 tags

The Basic Authentication scheme uses the username and password and encrypts the password using base64 encoding. In spite of this, there are still many security holes in the Basic Authentication

What are the phases of malicious hacking?

September 20, 2008 0 Comments 0 tags

The following are the phases of malicious hacking: 1. Reconnaissance: In this phase, the attacker gathers information about the victim. 2. Scanning: In this phase, the attacker begins to probe

What are the general classes of hackers?

September 19, 2008 0 Comments 0 tags

Hackers are categorized into the following classes: * Black Hat Hackers (Crackers): These are persons who are computer specialists and use their hacking skills to carry out malicious attacks on

What are snort rules?

September 18, 2008 0 Comments 0 tags

Snort rules are the conditions specified by a Network Administrator that differentiate between normal Internet activities and malicious activities. Snort rules are made up of two basic parts: * Rule