a mi por casulidad me ha caido en las manos un iso que es un debian modificado y ajustado para ejecutar esta utilidad , lo he instalado en un servidor virtual y me ha pinchado, ahora tengo uan duda, alguien tendra documentacion digital de como configurar la parte del inventario pues no se como entrar a esta parte y me pide un user y pass y no es el mismo admin del user que se utiliza para entrar al sistema
Algiuen k me pueda ayudar en ese tema El día 9 de abril de 2009 16:09, Manuel Mely <[email protected]> escribió: > Puede ser útil para muchos esto[1]. > > Ossim stands for Open Source Security Information Management. Its goal > is to provide a comprehensive compilation of tools which, when working > together, grant a network/security administrator with detailed view over > each and every aspect of his networks/hosts/physical access > devices/server/etc... > Besides getting the best out of well known open source tools, some of > which are quickly described below these lines, ossim provides a strong > correlation engine, detailed low, mid and high level visualization > interfaces as well as reporting and incident managing tools, working on > a set of defined assets such as hosts, networks, groups and services. > > All this information can be limited by network or sensor in order to > provide just the needed information to specific users allowing for a > fine grained multi-user security environment. Also, the ability to act > as an IPS (Intrusion Prevention System) based on correlated information > from virtually any source result in a useful addition to any security > professional. > > Components > Ossim features the following software components: > > * Arpwatch, used for mac anomaly detection. > * P0f, used for passive OS detection and os change analisys. > * Pads, used for service anomaly detection. > * Nessus, used for vulnerability assessment and for cross > correlation (IDS vs Security Scanner). > * Snort, the IDS, also used for cross correlation with nessus. > * Spade, the statistical packet anomaly detection engine. Used to > gain knowledge about attacks without signature. > * Tcptrack, used for session data information which can grant > useful information for attack correlation. > * Ntop, which builds an impressive network information database > from which we can get aberrant behaviour anomaly detection. > * Nagios. Being fed from the host asset database it monitors host > and service availability information. > * Osiris, a great HIDS. > * OCS-NG, Cross-Platform inventory solution. > * OSSEC, integrity, rootkit, registry detection and more. > > 1- http://www.ossim.net/home.php > _______________________________________________ > Cancelar suscripción > https://listas.softwarelibre.cu/mailman/listinfo/linux-l > Buscar en el archivo > http://listas.softwarelibre.cu/buscar/linux-l > -- Jose Enrique Castillo Tabera Esp. Sistemas Informaticos Fedora GNU/Linux User Linux Registered User: 459229 Telef: (537) 883/0376 _______________________________________________ Cancelar suscripción https://listas.softwarelibre.cu/mailman/listinfo/linux-l Buscar en el archivo http://listas.softwarelibre.cu/buscar/linux-l
