On Mon, 20 Dec 2010 18:54:42 +
Jarred White wrote:
> Hello. I'm trying to find a way to remotely deploy OSSEC to some of
> our remote sites and have it report back to us on server
> health/security. There is no direct connection to the remote
> network, so any reporting would need to happen o
On 12/20/2010 06:59 AM, Ankush Grover wrote:
Hi Friends,
What privileges or commands a user should have access on Cisco ASA 5510
for successfully executing ssh_asa-fwsmconfig_diff command?
Regards
Ankush
The user basically just needs to do a show run.
--
Michael Starks
[I] Immutable Securi
On 12/20/2010 12:54 PM, Jarred White wrote:
Hello. I’m trying to find a way to remotely deploy OSSEC to some of our
remote sites and have it report back to us on server health/security.
There is no direct connection to the remote network, so any reporting
would need to happen over the Internet si
Thanks for the response, all. I'm not arguing about the encryption method or
strength - simply stating that I don't understand what is taking place there.
It seems that the shared keys are used to authenticate whether or not an OSSEC
agent is authorized to communicate with the server. That makes
this is a little dated, but the point is...
http://www.marktaw.com/technology/HowlongdoesittaketocrackS.html
On 12/20/2010 04:07 PM, Chuck (MdMonk) wrote:
How about saying it's "astronomically improbable." :)
-Chuck (MdMonk)
On Mon, Dec 20, 20
On Mon, Dec 20, 2010 at 4:43 PM, Saket wrote:
> Hi,
>
> I want to try out OSSEC in my lab. I found OSSEC server installation
> for LINUX but not for WIndows. I just want to double check if windows
> is supported for server installations.
Nope, the manager is linux/unix only.
Hi,
I want to try out OSSEC in my lab. I found OSSEC server installation
for LINUX but not for WIndows. I just want to double check if windows
is supported for server installations.
How about saying it's "astronomically improbable." :)
-Chuck (MdMonk)
On Mon, Dec 20, 2010 at 1:58 PM, Erik wrote:
> Hello,
>
> Technically traffic can be sniffed yes but it would require
>
> 1) allot of cpu power and memory
> 2) heaps (tons of heaps) of patience
>
> to actually "decrypt" the t
Hello,
Technically traffic can be sniffed yes but it would require
1) allot of cpu power and memory
2) heaps (tons of heaps) of patience
to actually "decrypt" the traffic depending on the encryption algoritm
used by ossec
it is "near to impossible" offcource 90% is not 100%
Op 20/12/2010 21
The traffic is encrypted but if someone can record the communication,
they have essentially forever to hack at it until it breaks.
You really don't want all your remote clients connecting to a local
server. That would be sending way more traffic than actually matters to
you.
What I think you wa
On Mon, Dec 20, 2010 at 1:54 PM, Jarred White wrote:
> Hello. I’m trying to find a way to remotely deploy OSSEC to some of our
> remote sites and have it report back to us on server health/security. There
> is no direct connection to the remote network, so any reporting would need
> to happen over
Hello. I'm trying to find a way to remotely deploy OSSEC to some of our remote
sites and have it report back to us on server health/security. There is no
direct connection to the remote network, so any reporting would need to happen
over the Internet since VPN is out of the question.
Naturally
Hi Friends,
What privileges or commands a user should have access on Cisco ASA 5510 for
successfully executing ssh_asa-fwsmconfig_diff command?
Regards
Ankush
13 matches
Mail list logo