Haka

Software Defined Security

Version 0.3.0
  • Menu
  • Users
  • References
  • Developers
  • Faq
  • Next →
  • ← Prev
  • Up ↑
  • Index
  • Modules
  • Welcome to Haka’s User Guide!
  • 6. Tutorials

6. Tutorials¶

  • 6.1. Hellopacket
    • 6.1.1. Introduction
    • 6.1.2. How-to
    • 6.1.3. Going further
  • 6.2. Filter
    • 6.2.1. Introduction
    • 6.2.2. Basic TCP/IP filtering
    • 6.2.3. Advanced TCP/IP Filtering
  • 6.3. Statistics
    • 6.3.1. Introduction
    • 6.3.2. How-to
    • 6.3.3. Collecting data
    • 6.3.4. Stats utilities
    • 6.3.5. Dumping stats
    • 6.3.6. Getting stats in interactive mode
  • 6.4. SQLi attack detection
    • 6.4.1. Introduction
    • 6.4.2. How-to
    • 6.4.3. Writing http rules
    • 6.4.4. My first naive rule
    • 6.4.5. Anti-evasion
    • 6.4.6. Fine-grained analysis
    • 6.4.7. Mutliple rules
    • 6.4.8. White list
    • 6.4.9. Going further
  • 6.5. Rule set example
    • 6.5.1. Introduction
    • 6.5.2. config.lua main file
    • 6.5.3. Protocol directories
  • 6.6. SMTP Protocol dissection
    • 6.6.1. Introduction
    • 6.6.2. SMTP protocol
    • 6.6.3. Dissector
    • 6.6.4. Grammar
    • 6.6.5. Events
    • 6.6.6. State machine
    • 6.6.7. Security rules
    • 6.6.8. Full SMTP code
    • 6.6.9. Going further
© Copyright 2014, Arkoon Network Security, OpenWide and Telecom ParisTech.