SlideShare a Scribd company logo
1 of 18
1
9/20/2023
Root Password Break
Network Security
and spinning Containers
BY: ATHAR KALEEM
LECTURER
DEPUTY DIRECTOR IT
THE UNIVERSITY OF HARIPUR
2
Root Password Break
• For example: Ubuntu Root Password
• Set the root password and restart the Machine.
• Boot the Machine in “Advance Option”
• Type “e” to edit the options
• Change the permissions from “ro” to “rw”
• Now you can change the root password.
• Reboot and password is changed.
3
Network
Security
and
Containers
4
Security at Network and Transport Layers: Layer 3 & 4
• Network based Firewalls
• For example: Linux Firewall, netfilters, iptables
• Understanding types of traffic and their tables w.r.t to Gateway.
• Chains in iptables
• Rules for writing iptables
• Script/develop your Firewall
5
Understanding types of traffic and their tables w.r.t to Gateway.
6
Tables and Chains in iptables
7
Rules for writing iptables
#! /bin/bash
echo 1 > /proc/sys/net/ipv4/ip_forward
$iptables -F
$iptables -t nat -F
$iptables -t mangle -F
#-------------MAIN POLICY--------------
$iptables --policy INPUT DROP
$iptables --policy OUTPUT DROP
$iptables --policy FORWARD DROP
#------------SOURCE NATTING-------------
$iptables -t nat -A POSTROUTING -j MASQUERADE -o vmbr0
#-------Accepting traffic that is related to an established stream.
$iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
$iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
$iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
#------local loop back accepted
$iptables -A INPUT -i lo -j ACCEPT
$iptables -A OUTPUT -o lo -j ACCEPT
#--------Examples Rules----------
$iptables -A INPUT -p tcp --dport 21 -m state --state NEW -j ACCEPT
$iptables -A OUTPUT -o vmbr0 -p udp --dport 53 -m state --state NEW -j ACCEPT
$iptables -A FORWARD -p tcp --dport 80 -m state --state NEW -j ACCEPT
$iptables -t nat -A PREROUTING -i vmbr0 -p tcp --dport 18000 -j DNAT --to-destination 192.168.3.14:80
8
Security at Application level/ layer 5,6 & 7
• Firewall limitations: up to layer 4
• What for Layer 5, 6 and 7. The IDS and IPS
• Popular open-source IDS and IPS
• Ossec : The IDS
• Snort : The IDS and IPS
9
Ossec : The IDS
10
Ossec : The IDS
Features
11
Ossec : The IDS
For installation, go through ips-ids.txt script that is made while installing it.
After installing Access the web-user-interface
12
Snort :
The IPS
13
Snort : The IPS
Features
• The IPS is able to perform actions to shut down the threat. These actions include:
 Restoring log files from storage
 Suspending user accounts
 Blocking IP addresses
 Killing processes
 Shutting down systems
 Starting up processes
 Updating firewall settings
 Alerting, recording, and reporting suspicious activities
14
Snort : The IPS
Features
 Support multiple packet processing threads
 Allows multiple packet processing
 Autogenerate reference documentation
 Use a simple scriptable configuration
 Make key components pluggable
 Allows users to write their own plugins
 Shared configuration and attribute table
 Allows rules to run quicker
15
Snort : The IPS
Deployment for learning
 Download the Container
 $ docker pull ciscotalos/snort3
 Start the Container
 $ docker run --name snort3 -h snort3 -u snorty -w /home/snorty -
d -it ciscotalos/snort3 bash
 Enter the Snort Container
 $ docker exec -it snort3 bash
 Stop the Snort Container
 $ docker kill snort3
16
Snort : The IPS
Deployment for learning
 Download the Container
 $ docker pull ciscotalos/snort3
 Start the Container
 $ docker run --name snort3 -h
snort3 -u snorty -w /home/snorty -d -
it ciscotalos/snort3 bash
 Enter the Snort Container
 $ docker exec -it snort3 bash
 Stop the Snort Container
 $ docker kill snort3
17
Questions
18

More Related Content

Similar to Network Securities.pptx

CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10Waqas Ahmed Nawaz
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowLancope, Inc.
 
Unraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production CloudUnraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production CloudSalman Baset
 
Tokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker SecurityTokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker SecurityPhil Estes
 
Secure360 - Attack All the Layers! Again!
Secure360 - Attack All the Layers! Again!Secure360 - Attack All the Layers! Again!
Secure360 - Attack All the Layers! Again!Scott Sutherland
 
FreeSWITCH on Docker
FreeSWITCH on DockerFreeSWITCH on Docker
FreeSWITCH on Docker建澄 吳
 
10 Tips for AIX Security
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX SecurityHelpSystems
 
Docker Security Overview
Docker Security OverviewDocker Security Overview
Docker Security OverviewSreenivas Makam
 
Firewall in Perl by Chankey Pathak
Firewall in Perl by Chankey PathakFirewall in Perl by Chankey Pathak
Firewall in Perl by Chankey PathakChankey Pathak
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presalesMustafa Kuğu
 
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSBASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSamiteshg
 
Containers with systemd-nspawn
Containers with systemd-nspawnContainers with systemd-nspawn
Containers with systemd-nspawnGábor Nyers
 
A Survey of Container Security in 2016: A Security Update on Container Platforms
A Survey of Container Security in 2016: A Security Update on Container PlatformsA Survey of Container Security in 2016: A Security Update on Container Platforms
A Survey of Container Security in 2016: A Security Update on Container PlatformsSalman Baset
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminskyDan Kaminsky
 

Similar to Network Securities.pptx (20)

CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
 
Core os dna_automacon
Core os dna_automaconCore os dna_automacon
Core os dna_automacon
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
 
Unraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production CloudUnraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production Cloud
 
Tokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker SecurityTokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker Security
 
Secure360 - Attack All the Layers! Again!
Secure360 - Attack All the Layers! Again!Secure360 - Attack All the Layers! Again!
Secure360 - Attack All the Layers! Again!
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
FreeSWITCH on Docker
FreeSWITCH on DockerFreeSWITCH on Docker
FreeSWITCH on Docker
 
FreeSWITCH on Docker
FreeSWITCH on DockerFreeSWITCH on Docker
FreeSWITCH on Docker
 
10 Tips for AIX Security
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX Security
 
Docker Security Overview
Docker Security OverviewDocker Security Overview
Docker Security Overview
 
Osquery
OsqueryOsquery
Osquery
 
Firewall in Perl by Chankey Pathak
Firewall in Perl by Chankey PathakFirewall in Perl by Chankey Pathak
Firewall in Perl by Chankey Pathak
 
Linux Hardening - nullhyd
Linux Hardening - nullhydLinux Hardening - nullhyd
Linux Hardening - nullhyd
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presales
 
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSBASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
 
Containers with systemd-nspawn
Containers with systemd-nspawnContainers with systemd-nspawn
Containers with systemd-nspawn
 
A Survey of Container Security in 2016: A Security Update on Container Platforms
A Survey of Container Security in 2016: A Security Update on Container PlatformsA Survey of Container Security in 2016: A Security Update on Container Platforms
A Survey of Container Security in 2016: A Security Update on Container Platforms
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminsky
 
How to build an admin guy
How to build an admin guyHow to build an admin guy
How to build an admin guy
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Network Securities.pptx

  • 2. Root Password Break Network Security and spinning Containers BY: ATHAR KALEEM LECTURER DEPUTY DIRECTOR IT THE UNIVERSITY OF HARIPUR 2
  • 3. Root Password Break • For example: Ubuntu Root Password • Set the root password and restart the Machine. • Boot the Machine in “Advance Option” • Type “e” to edit the options • Change the permissions from “ro” to “rw” • Now you can change the root password. • Reboot and password is changed. 3
  • 5. Security at Network and Transport Layers: Layer 3 & 4 • Network based Firewalls • For example: Linux Firewall, netfilters, iptables • Understanding types of traffic and their tables w.r.t to Gateway. • Chains in iptables • Rules for writing iptables • Script/develop your Firewall 5
  • 6. Understanding types of traffic and their tables w.r.t to Gateway. 6
  • 7. Tables and Chains in iptables 7
  • 8. Rules for writing iptables #! /bin/bash echo 1 > /proc/sys/net/ipv4/ip_forward $iptables -F $iptables -t nat -F $iptables -t mangle -F #-------------MAIN POLICY-------------- $iptables --policy INPUT DROP $iptables --policy OUTPUT DROP $iptables --policy FORWARD DROP #------------SOURCE NATTING------------- $iptables -t nat -A POSTROUTING -j MASQUERADE -o vmbr0 #-------Accepting traffic that is related to an established stream. $iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT $iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT $iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT #------local loop back accepted $iptables -A INPUT -i lo -j ACCEPT $iptables -A OUTPUT -o lo -j ACCEPT #--------Examples Rules---------- $iptables -A INPUT -p tcp --dport 21 -m state --state NEW -j ACCEPT $iptables -A OUTPUT -o vmbr0 -p udp --dport 53 -m state --state NEW -j ACCEPT $iptables -A FORWARD -p tcp --dport 80 -m state --state NEW -j ACCEPT $iptables -t nat -A PREROUTING -i vmbr0 -p tcp --dport 18000 -j DNAT --to-destination 192.168.3.14:80 8
  • 9. Security at Application level/ layer 5,6 & 7 • Firewall limitations: up to layer 4 • What for Layer 5, 6 and 7. The IDS and IPS • Popular open-source IDS and IPS • Ossec : The IDS • Snort : The IDS and IPS 9
  • 10. Ossec : The IDS 10
  • 11. Ossec : The IDS Features 11
  • 12. Ossec : The IDS For installation, go through ips-ids.txt script that is made while installing it. After installing Access the web-user-interface 12
  • 14. Snort : The IPS Features • The IPS is able to perform actions to shut down the threat. These actions include:  Restoring log files from storage  Suspending user accounts  Blocking IP addresses  Killing processes  Shutting down systems  Starting up processes  Updating firewall settings  Alerting, recording, and reporting suspicious activities 14
  • 15. Snort : The IPS Features  Support multiple packet processing threads  Allows multiple packet processing  Autogenerate reference documentation  Use a simple scriptable configuration  Make key components pluggable  Allows users to write their own plugins  Shared configuration and attribute table  Allows rules to run quicker 15
  • 16. Snort : The IPS Deployment for learning  Download the Container  $ docker pull ciscotalos/snort3  Start the Container  $ docker run --name snort3 -h snort3 -u snorty -w /home/snorty - d -it ciscotalos/snort3 bash  Enter the Snort Container  $ docker exec -it snort3 bash  Stop the Snort Container  $ docker kill snort3 16
  • 17. Snort : The IPS Deployment for learning  Download the Container  $ docker pull ciscotalos/snort3  Start the Container  $ docker run --name snort3 -h snort3 -u snorty -w /home/snorty -d - it ciscotalos/snort3 bash  Enter the Snort Container  $ docker exec -it snort3 bash  Stop the Snort Container  $ docker kill snort3 17