Wazuh Proof of Concept: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| Zeile 1: | Zeile 1: | ||
| + | =Proof of Concept= | ||
*[https://documentation.wazuh.com/current/proof-of-concept-guide/block-malicious-actor-ip-reputation.html Blocking a known malicious actor] | *[https://documentation.wazuh.com/current/proof-of-concept-guide/block-malicious-actor-ip-reputation.html Blocking a known malicious actor] | ||
*[https://documentation.wazuh.com/current/proof-of-concept-guide/poc-file-integrity-monitoring.html File integrity monitoring] | *[https://documentation.wazuh.com/current/proof-of-concept-guide/poc-file-integrity-monitoring.html File integrity monitoring] | ||
| Zeile 10: | Zeile 11: | ||
*[https://documentation.wazuh.com/current/proof-of-concept-guide/detect-web-attack-shellshock.html Detecting a Shellshock attack] | *[https://documentation.wazuh.com/current/proof-of-concept-guide/detect-web-attack-shellshock.html Detecting a Shellshock attack] | ||
*[https://documentation.wazuh.com/current/proof-of-concept-guide/poc-vulnerability-detection.html Vulnerability detection] | *[https://documentation.wazuh.com/current/proof-of-concept-guide/poc-vulnerability-detection.html Vulnerability detection] | ||
| + | =Source= | ||
| + | *https://documentation.wazuh.com/current/proof-of-concept-guide/index.html | ||
Version vom 9. März 2025, 16:59 Uhr
Proof of Concept
- Blocking a known malicious actor
- File integrity monitoring
- Detecting a brute-force attack
- Monitoring Docker events
- Detecting unauthorized processes
- Network IDS integration
- Detecting an SQL injection attack
- Detecting suspicious binaries
- Detecting and removing malware using VirusTotal integration
- Detecting a Shellshock attack
- Vulnerability detection