CSEC 640: Monitoring, Auditing, Intrusion Detection, IntrusionPrevention, and Penetration Testing1.Using Snort and Wireshark, analyze a packet trace file to detect network intrusions. Writesix distinct Snort rules and explain each rule's functionality, including the alert generatedfor each.(Word count requirement: 300-350 words)2.Discuss the purpose of the various flags used in the Snort command snort-r snort.out-P5000-c csec640.rules-e-X-v-k none-l log.(Word count requirement: 150-200 words)3.Review the Gimmiv.A exploit and discuss the vulnerabilities it targets and suggestpossible mitigation strategies.(Word count requirement: 200-250 words)
Page 2
Page 3
Page 4
Page 5
Preview Mode
This document has 14 pages. Sign in to access the full document!