Get a Pentest and security assessment of your IT network.

News

New Snort overflow exploit

Snort gets a buffer overflow vulnerability about once a year. Attacker would have to know you are running Snort, know its placement, create the attack, and somehow get it to your Snort sensor. A student of mine recommended a great strategy for my many honeypots (I run 8) In the past I used Wireshark to capture packets in real-time. Instead, I use winpcap and/or tcpdump to capture and analyze packets. Then when I’m alerted to an attack I use the captured packets (captured using port mirroring Ethernet switches), I analyze the traffic.”]

Source: https://www.csoonline.com/article/2633081/new-snort-overflow-exploit.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months