Cyber Range Lab Assignment 4

In this lab we take a look at how Snort rules are written and configured, as well as how to make use of them when they are noisy. We then look at iptables, and configure a local host-based firewall to allow HTTP connections outbound.
This entry was posted in IST 894 Portfolio. Bookmark the permalink.