Snort mailing list archives
Re: Obfuscation of binary logs
From: Alberto Gonzalez <ag-snort () cerebro violating us>
Date: Fri, 15 Nov 2002 12:32:49 -0800
You just have to run the binary log back through snort. Taken from http://www.snort.org/docs/writing_rules/chap1.html#tth_sEc1.5: /usr/local/bin/snort -d -v -r snort.log -O -h 192.168.1.0/24 Urgh, Erek isn't it too early for drinking!?!? - Albert Grime, Richard S wrote:
Hi,I note from the man page that -O and -h can be used to obfuscate the home IP address in ASCII packet dump mode - how (can?) this functionality be used for binary logs? Thanks, Richard
-- The secret to success is to start from scratch and keep on scratching. -------------------------------------------------------This sf.net email is sponsored by: To learn the basics of securing your web site with SSL, click here to get a FREE TRIAL of a Thawte Server Certificate: http://www.gothawte.com/rd524.html
_______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- Obfuscation of binary logs Grime, Richard S (Nov 15)
- Re: Obfuscation of binary logs Alberto Gonzalez (Nov 15)
- Re: Obfuscation of binary logs Phil Wood (Nov 15)
- Re: Obfuscation of binary logs Alberto Gonzalez (Nov 15)
