Summary: | new port: security/maltrail: Malicious traffic detection system, utilizing public (black)lists X | ||||||
---|---|---|---|---|---|---|---|
Product: | Ports & Packages | Reporter: | Michael Muenz <m.muenz> | ||||
Component: | Individual Port(s) | Assignee: | Bernhard Froehlich <decke> | ||||
Status: | Closed FIXED | ||||||
Severity: | Affects Only Me | CC: | decke | ||||
Priority: | --- | ||||||
Version: | Latest | ||||||
Hardware: | Any | ||||||
OS: | Any | ||||||
Attachments: |
|
Description
Michael Muenz
2018-11-08 14:18:33 UTC
Committed. Thanks! A commit references this bug: Author: decke Date: Fri Nov 9 09:01:26 UTC 2018 New revision: 484506 URL: https://svnweb.freebsd.org/changeset/ports/484506 Log: Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com for Banjori malware), URL (e.g. http://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware). WWW: https://github.com/stamparm/maltrail PR: 233074 Submitted by: Michael Muenz <m.muenz@gmail.com> Changes: head/security/Makefile head/security/maltrail/ head/security/maltrail/Makefile head/security/maltrail/distinfo head/security/maltrail/pkg-descr head/security/maltrail/pkg-plist |