[Owasp-leaders] Sniffer+ IDS + WAF + OWASP top 10

Andre Gironda andreg+owasp at gmail.com
Fri Feb 17 06:25:20 UTC 2017


http://holisticinfosec.blogspot.com/2009/09/using-ossec-to-monitor-modsecurity-and.html
https://www.trustwave.com/Resources/SpiderLabs-Blog/Implementing-AppSensor-Detection-Points-in-ModSecurity/

http://rules.emergingthreats.net/open/snort-2.9.0-enhanced/rules/
http://rules.emergingthreats.net/open/suricata-1.3-enhanced/rules/

dre

On Thu, Feb 16, 2017 at 9:52 PM Subramaniam Sankaran <
subramaniam.sankaran at gmail.com> wrote:

> All,
>
> I have a requirement to demonstrate OWASP top 10 application layer
> attacks, with Sniffer, IDS and WAF for traffic analysis and  demonstration
> of prevention.
> I need to use only open sources.
>
> Anyone had tried this? Which one would you suggest me please?
>
> Regards
> Subramaniam.S
> _______________________________________________
> OWASP-Leaders mailing list
> OWASP-Leaders at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-leaders
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-leaders/attachments/20170217/60a7944c/attachment.html>


More information about the OWASP-Leaders mailing list