Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) - Lab Topology
Lab Topology
- Lab 1: Writing Custom Rules
- Lab 2: Drop Rules
- Lab 3: Replacing Content
- Lab 4: SSH Rule Scenerio
- Lab 5: Optimizing Rules
- Lab 6: Using PCRE test to Test Regex Options
- Lab 7:Use PCREtest to Test Custom Regular Expressions
- Lab 8: Writing Rules That Contain PCRE
- Lab 9: Detecting SADMIND Trust with Byte_Jump and Byte_test
- Lab 10: Using the Bitwise AND Operation in Byte_Test Rule Option
- Lab 11: Detecting ZenWorks Directory Traversal Using Byte_Extract
- Lab 12: Writing a Flowbit Rule
- Lab 13: Extra Flowbits Challenge
- Lab 14: Strengthen Your Brute-Force Rule with Flowbits
- Lab 15: Research and Packet Analysis
- Lab 16: Revisiting the Kaminsky Vulnerability
- Lab 17: Configuring Rule Profiling
- Lab 18: Testing Rule Performance
- Lab 19: Configure Rule Profiling to View PCRE Performance
- Lab 20: Preventing User Access to a Restricted Site
- Lab 21: SQL Injection
- Lab 22: The SQL Attack Revisited