Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
15Activity

Table Of Contents

1. ¿Qué es Snort?
2. Instalación y configuración de Snort
2.1. Manejo de las reglas
3. Instalación y configuración de MySql
4. Instalación y configuración de ACID
5. Puesta en marcha de la herramienta
6. Interpretación y manejo de los resultados, ejemplo práctico
7. Ataques Remotos
7.1. Escaneo de puertos
7.2. Spoofing
7.3. Negociación de servicios
7.4. Interceptación
7.5. Ataques de aplicaciones
7.5.1. Correo Electrónico
7.5.2. Ataques vía web
7.6 Ejemplo de ataque remotos (Nessus)
8. Conclusión
0 of .
Results for:
No results containing your search query
P. 1
Trabajo Snort

Trabajo Snort

Ratings: (0)|Views: 429|Likes:

More info:

Published by: Richard Nava Peñaloza on Apr 14, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/14/2013

pdf

text

original

You're Reading a Free Preview
Pages 5 to 42 are not shown in this preview.

Activity (15)

You've already reviewed this. Edit your review.
1 hundred reads
Cesarook Zolis liked this
ivicsan liked this
Adrian Morales liked this
Charlie liked this
Charlie liked this
Charlie liked this
abelrq2008 liked this
Dianita Pacheco liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->