skip to main
|
skip to sidebar
TaoSecurity
Richard Bejtlich's blog on digital security, strategic thought, and military history.
Thursday, June 30, 2005
Bleeding Snort Spyware Listening Post Initial Results
I
mentioned
a few new projects at
Bleeding Snort
two weeks ago. Some initial results of the
Spyware Listening Post
are
posted
. Check it out -- it's about one page of information.
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
Blogging Since 8 Jan 2003
Reach Your Goal
My book on stretching, available now!
Reach Your Goal
Learn more about my book on stretching!
TaoSecurity Gear
Get Mugs and More at TeePublic
About Me
Richard Bejtlich
View my complete profile
twitter.com/taosecurity
Follow @taosecurity
Practice of NSM On Sale Now!
Save 30% With Code NSM101
Bejtlich Media Appearances
Select Videos at YouTube
Books by Richard Bejtlich
Detect and respond to intrusions using tools and techniques that work. Plenty of free excerpts online.
Blog Archive
►
2019
(4)
►
February
(1)
►
January
(3)
►
2018
(22)
►
December
(3)
►
November
(4)
►
October
(2)
►
September
(2)
►
July
(1)
►
June
(2)
►
May
(2)
►
February
(1)
►
January
(5)
►
2017
(12)
►
December
(1)
►
October
(1)
►
May
(1)
►
March
(5)
►
February
(3)
►
January
(1)
►
2016
(8)
►
December
(1)
►
October
(1)
►
June
(2)
►
January
(4)
►
2015
(55)
►
December
(3)
►
November
(1)
►
October
(4)
►
September
(3)
►
August
(2)
►
July
(1)
►
June
(8)
►
May
(2)
►
April
(5)
►
March
(3)
►
February
(7)
►
January
(16)
►
2014
(23)
►
December
(5)
►
November
(2)
►
September
(3)
►
August
(1)
►
June
(1)
►
May
(2)
►
April
(1)
►
March
(3)
►
February
(2)
►
January
(3)
►
2013
(18)
►
November
(1)
►
October
(1)
►
September
(1)
►
August
(1)
►
June
(2)
►
April
(2)
►
March
(1)
►
February
(3)
►
January
(6)
►
2012
(60)
►
December
(4)
►
November
(5)
►
October
(3)
►
September
(10)
►
August
(2)
►
July
(6)
►
June
(6)
►
May
(4)
►
April
(2)
►
March
(9)
►
February
(6)
►
January
(3)
►
2011
(108)
►
December
(3)
►
November
(7)
►
October
(11)
►
September
(9)
►
August
(18)
►
July
(10)
►
June
(5)
►
May
(4)
►
April
(13)
►
March
(17)
►
February
(2)
►
January
(9)
►
2010
(193)
►
December
(14)
►
November
(11)
►
October
(6)
►
September
(16)
►
August
(15)
►
July
(26)
►
June
(15)
►
May
(15)
►
April
(15)
►
March
(16)
►
February
(19)
►
January
(25)
►
2009
(213)
►
December
(10)
►
November
(17)
►
October
(21)
►
September
(13)
►
August
(20)
►
July
(21)
►
June
(24)
►
May
(22)
►
April
(7)
►
March
(18)
►
February
(21)
►
January
(19)
►
2008
(253)
►
December
(25)
►
November
(28)
►
October
(25)
►
September
(21)
►
August
(16)
►
July
(19)
►
June
(22)
►
May
(16)
►
April
(19)
►
March
(26)
►
February
(11)
►
January
(25)
►
2007
(358)
►
December
(13)
►
November
(16)
►
October
(17)
►
September
(41)
►
August
(29)
►
July
(28)
►
June
(23)
►
May
(40)
►
April
(38)
►
March
(54)
►
February
(23)
►
January
(36)
►
2006
(493)
►
December
(33)
►
November
(26)
►
October
(29)
►
September
(54)
►
August
(86)
►
July
(49)
►
June
(32)
►
May
(16)
►
April
(37)
►
March
(41)
►
February
(32)
►
January
(58)
▼
2005
(501)
►
December
(45)
►
November
(33)
►
October
(32)
►
September
(36)
►
August
(61)
►
July
(54)
▼
June
(42)
Feds Adopt IPv6 by June 2008?
Bleeding Snort Spyware Listening Post Initial Resu...
Nvu 1.0 Released
"IDS Is Dead" Prophet Misunderstands "Sniffing"
Initial Thoughts on Visible Ops
IPFW Rules on VPN CFG
Forwarding Nameserver with BIND 9
Portsnap and Squid
Simple IPFW Rules to Defend Sensors
Nessus Registered Feed for Consultants
Trying Nessus Registered Feed
Trying Snort VRT Rules and Oinkmaster
Nessus on FreeBSD
Three Pre-Reviews
Thoughts on Security Degrees
Contrabandwidth
CardSystems Breach Follow-up
Thesis Cites Tao
Bleeding Snort Starts snort.conf Collection
Marcus Ranum Interview at SecurityFocus
(IN)SECURE Magazine Online
CISSP: Any Value?
CardSystems Solutions Intrusion Exposes 40 Million...
(ISC)2 Affiliated Local Interest Groups
Encrypted Laptop Hard Drives
(ISC)2 Conducting CISSP Exam Survey
Gartner Survey Ranks Threats
FreeBSD Post-Installation Tasks
Bleeding Snort Innovations
OpenSolaris Lives
HTTP Request Smuggling
Comments on Israeli Intellectual Property Theft St...
Bejtlich at Techo Security Conference
Multiple New Pre-Reviews
Article on IPS Evaluations
FreeBSD Ports Tree Breaks 13,000 Ports, and Other ...
Testing New Rules with TurboSnortRules.org
DIY Security with Open Source
Test Your Snort Rules at TurboSnortRules.org
New Bejtlich.net Launched
Counterfeiters Kill Subway Stamps
Profound Words from the Past and Present
►
May
(36)
►
April
(45)
►
March
(41)
►
February
(45)
►
January
(31)
►
2004
(348)
►
December
(49)
►
November
(38)
►
October
(24)
►
September
(28)
►
August
(29)
►
July
(17)
►
June
(27)
►
May
(30)
►
April
(17)
►
March
(25)
►
February
(38)
►
January
(26)
►
2003
(375)
►
December
(25)
►
November
(36)
►
October
(58)
►
September
(20)
►
August
(60)
►
July
(31)
►
June
(34)
►
May
(18)
►
April
(42)
►
March
(9)
►
February
(23)
►
January
(19)
Labels
afcert
(31)
Air Force
(24)
aix
(1)
analysis
(1)
announcement
(3)
appsec
(4)
apt
(60)
attacks
(3)
attribution
(16)
bestbook
(7)
birthday
(14)
blackhat
(33)
books
(12)
boyd
(1)
breakers
(4)
bro
(8)
bruins
(1)
business
(24)
campaigns
(1)
ccna
(6)
cdm
(4)
certification
(26)
china
(93)
cisco
(30)
cissp
(38)
cloud
(4)
clowns
(12)
commodore
(6)
conferences
(34)
containment
(1)
controls
(6)
corelight
(1)
correlation
(5)
counterintelligence
(19)
crime
(13)
criticalstack
(1)
cybercommand
(3)
cyberspace
(1)
cyberwar
(22)
dan geer
(1)
databases
(1)
ddos
(1)
detection
(16)
dfm
(1)
disasters
(11)
dna
(9)
dns
(1)
docker
(2)
doctrine
(1)
dod
(8)
donations
(1)
dprk
(1)
education
(8)
engineering
(12)
exploits
(16)
favorites
(260)
feds
(18)
finance
(2)
fireeye
(1)
fisma
(21)
football
(10)
forensics
(6)
fraud
(3)
freebsd
(434)
GE
(11)
ge-cirt
(10)
hakin9
(11)
hardware
(20)
hiring
(1)
history
(8)
hunting
(10)
impressions
(19)
incidents
(37)
indicators
(23)
information warfare
(1)
infrastructure
(1)
insiders
(11)
insurance
(3)
intelligence
(4)
internet
(2)
interviews
(5)
ips
(10)
ipv6
(61)
ir
(16)
iran
(1)
IS
(1)
itu
(1)
kill chain
(5)
law
(19)
leadership
(2)
legislation
(2)
linux
(16)
malware
(15)
mandiant
(9)
metasploit
(5)
metrics
(2)
microsoft
(31)
mssp
(1)
net optics
(14)
network
(6)
novasec
(3)
nsm
(327)
offense
(21)
oisf
(3)
ooda
(1)
open source
(2)
openpacket
(12)
packetstash
(1)
phd
(3)
philosophy
(247)
pirates
(5)
powerpoint
(4)
pre-review
(51)
predictions
(3)
press
(10)
psirt
(5)
reading
(5)
redteam
(4)
regulations
(1)
reports
(6)
research
(4)
reviews
(251)
risk
(14)
roi
(14)
routing
(13)
russia
(3)
sans
(34)
scada
(1)
science
(1)
sec
(1)
security
(2)
security operations center
(1)
securityonion
(1)
sguil
(189)
snmp
(43)
snorby
(1)
snort
(51)
Snort Report
(22)
soc
(1)
software
(1)
solaris
(2)
south korea
(1)
splunk
(11)
spying
(5)
standards
(8)
statistics
(1)
stock
(2)
strategy
(6)
sysadmin
(16)
threat model
(11)
threats
(100)
tools
(43)
Traffic Talk
(10)
training
(51)
TTP
(9)
tufte
(10)
tv
(1)
ubuntu
(6)
usenix
(1)
vagrant
(2)
verizon
(5)
virtualization
(35)
visibility
(66)
vulnerabilities
(38)
war
(1)
warranties
(1)
wisdom
(13)
writing
(46)
Powered by
Blogger
.
No comments:
Post a Comment