Description: Knowing What's Under Your Hood: Implementing a Network Monitoring System
Jon will cover implementing a NMS with Linux and/or FreeBSD for a small-medium size business.
Points:
Collecting data from your switches, routers, and other network devices. Discussion of the means to collect: virtual interfaces, bridges, hubs.What to do with the data, how is it useful, how can it benefit me and/or my organization?
Tools that can be used to make the data useful to you and your organization: *subject to change* iftop, trafshow, bmon, slurm, ntop, snort, xplico, tcpdump
Using the tools to discover and analyze attacks and solve network problems.
Tags: securitytube , hackercon , hacker con , hacking , hackers , information security , convention , computer security , hacker 11 , hackercon 11 , hackercon-2011 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.