Wazuh Proof of Concept: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| Zeile 5: | Zeile 5: | ||
*[https://documentation.wazuh.com/current/proof-of-concept-guide/detect-unauthorized-processes-netcat.html Detecting unauthorized processes] | *[https://documentation.wazuh.com/current/proof-of-concept-guide/detect-unauthorized-processes-netcat.html Detecting unauthorized processes] | ||
*[https://documentation.wazuh.com/current/proof-of-concept-guide/integrate-network-ids-suricata.html Network IDS integration] | *[https://documentation.wazuh.com/current/proof-of-concept-guide/integrate-network-ids-suricata.html Network IDS integration] | ||
| + | *[https://documentation.wazuh.com/current/proof-of-concept-guide/detect-web-attack-sql-injection.html Detecting an SQL injection attack] | ||