RE: Snort Question

2001-11-22 Thread Yiming Gong
That is management-agent-file-read, you can have a look at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0771 -- ÎÒÒª¸üºÃµÄÉú»î Yiming Gong Senior System Administrator China Telcom [EMAIL PROTECTED] http://security.zz.ha.cn 0086-0371-7934907 -Original Message-

RE: Snort Question

2001-11-21 Thread Chris Eidem
http://www.google.com/search?q=compaq+insight+directory+traversal -Original Message- From: Martin Smith [mailto:[EMAIL PROTECTED]] Sent: Monday, November 19, 2001 12:43 PM To: [EMAIL PROTECTED] Subject: Snort Question I have been getting this alert, but I can't find out

Re: Snort question

2001-10-01 Thread ___cliff rayman___
this is system dependent. i don't believe snort will see the traffic on a linux box, but it will on an openBSD box. i think this is a result of where the promisicous device is located in the kernel structures. on linux, it is obviously after the firewall code, on openBSD it appears to be

Re: Snort question

2001-10-01 Thread Kutulu
From: Michael Kjorling [EMAIL PROTECTED] Sent: Thursday, September 27, 2001 4:06 AM -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I belive not. The firewall code (the rules of which are managed through ipfwadm/ipchains/iptables depending on your kernel version) is executing directly in

re: Snort question

2001-10-01 Thread b. mac
from the test i ran, yes it does... however, i think it depends on which machine snort is running and which machine the firewall software is running on. my slack box is set up to masquerade my LAN as a firewall/gateway using netfilter. i installed snort on this same machine for the test. i

RE: Snort question-follow-up

2001-10-01 Thread leon
that the person kindly provided you with (he kind of did your homework for you) mail me off list and I will reprovide it for you. Cheers, Leon -Original Message- From: Claudiu Ionescu [mailto:[EMAIL PROTECTED]] Sent: Thursday, September 27, 2001 1:22 PM To: Security Basics Subject: Re: Snort