SlideShare a Scribd company logo
1 of 11
Download to read offline
PROJECT: INTRUSION DETECTION
Improving Your Security Skills
www.jayschulman.com
info@jayschulman.com
Why This Project
Is Important
● Unix/Linux: We’re installing our system on Linux so if
you’re not familiar with the operating system, you’ll
get some exposure.
● Open Source: Our toolset today is completely open
source so you’ll get experience using an open source
IDS platform.
● Cloud: I’m recommending you install this in the cloud.
It will give you a relatively basic example of cloud
computing.
● Threat Intelligence: You’ll be monitoring the internet.
I actually don’t recommend you run anything on your
host so everything you see will be drive-by attacks.
No specific reason, these are just the mass scanning
types of attacks.
● Intrusion Detection: It’s a foundational component to
information security. In the grand scheme of things,
most organizations have it under control.
Learning The Basics
Install The Cloud
If you install it on your home internet, you’re viewing a specific traffic pattern that I don’t think is
necessarily representative of the Internet. Most attackers know the IP blocks of cable and DSL
modems. So the attacks they’re trying are geared toward home computing. For our exercise, I
think seeing more commercial, service based attacks is a better view of the internet.
For these types of experiments, I recommend DigitalOcean. It’s the $5 cloud. Their lowest cost
server is $5 a month and you get root access to the server. If you sign up here, you’ll actually get
a $10 credit. So you can play around for two months. (Or run another experiment next month.)
Set Up DigitalOcean
Each server is called a droplet. So we’ll need to
setup a droplet to get started. Click on Droplets
and Create One.
Give your droplet a name and select the $10 size.
You can try to get it to run for $5 but you need
more memory. You’re also welcome to use a
bigger server. You’ll see that the server will get
pretty slow the more data you collect. But my goal
here is not to give you a lightening fast experience
but to give you an educational experience for a few
bucks.
Select Image & Location
Choose any location. For our experiment, it would be interesting to
compare what New York attacks look like compared to Frankfurt or
Toronto. It’s great to pick something close as it will be a bit faster,
but really pick something that interests you from a threat intelligence
perspective. I picked Singapore for my experiment and FYI it is slow
from Chicago.
Next select our image. If you’re a Linux guru, pick anything you’d like.
If not, the examples below will assume you’re running Ubuntu. There
are a few checkboxes at the end. I checked IPv6 for kicks as I am
curious what attacks are coming on IPv6 versus IPv4. Again,
education!
Finally complete your setup. You’ll be provided with your IP address
and password in an e-mail and you’ll need to change it when you
login. Your first setup is to login using a terminal program. The most
used and most boring program is PuTTY.
Update & Upgrade
All of the commands will assume you’re logged in
as root. Which is a really bad idea. But this is an
experiment and not the real world so such is life.
In most trusted environments, you’d want to login
as a user and sudo to root. You won’t see that
here.
I trust Ubuntu’s repositories but I don’t always
trust that the version I got is updated. So the
following commands will update our server to the
latest versions of all of the software running on it.
> apt-get update
> apt-get upgrade
Install SNORT
Our Intrusion Detection System will be Snort. It’s
the most documented and supported open source
system out there and is relatively easy to install
on Ubuntu.
During the install, it will ask you for the protected
subnet. You’ll put your IP address of the
DigitalOcean server.
> apt-get install snort
Configure Rules
A lot of interesting rules are turned off by default.
Go to your favorite command line editor in Linux
(vi, pico, etc) and edit /etc/snort/snort.conf.
In this file, you’ll want to go WAY down to the end
where there are tons of include lines that has a
line for each ruleset. If you see a # in front of the
ruleset, it’s been disabled. Remove the # to
enable it. To start, turn as much as you want on.
When it gets boring, turn it off and focus on what
is interesting. See image on your right.
include $RULE_PATH/web-misc.rules
include $RULE_PATH/web-php.rules
include $RULE_PATH/x11.rules
# include $PREPROC_RULE_PATH/preprocessor.rules
# include $PREPROC_RULE_PATH/decoder.rules
# include $PREPROC_RULE_PATH/sensitive-data.rules
Test SNORT
You have the most basic version of snort installed. At
this point, I want to make sure you’re seeing Snort
find attacks. So let’s run a command (see image on
right)
If all goes well, you should start seeing alerts on your
screen for attacks. So side note: I did pick Singapore
because, well, I thought I’d see a ton of attacks. I don’
t really. So if you don’t see any alerts pop up… oops!
Move on to the next step and move to your next level
of learning. Just the fact that you got it looking for
attacks is a success!
>snort -d -A console -u snort -g snort
-c /etc/snort/snort.conf -i eth0
PIVOT
This is the point in time where you need to figure out what you want to learn next.
Here are a couple of resources:
● Build a web front end for Snort using Snorby: http://blog.muhammadattique.
com/installing-snorby-on-ubuntu-for-snort-with-barnyard2/
● Send all Snort alerts to a Database and use BASE as a front end: http:
//computer-outlines.over-blog.com/article-nids-snort-barnyard2-apache2-
base-with-ubuntu-14-04-lts-123532107.html
Whether you're a seasoned security
professional or trying to get into the
field, I'll help you grow your career in
security.
SIGN UP NOW!
Are You Ready to Grow
Your Security Career?

More Related Content

Similar to Project: Intrusion Detection

Ultimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIPUltimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIPPich Pra Tna
 
Step by Step on How to Setup DarkComet
Step by Step on How to Setup DarkCometStep by Step on How to Setup DarkComet
Step by Step on How to Setup DarkCometPich Pra Tna
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfEric Selje
 
Setting Up a Cloud Server - Part 1 - Transcript.pdf
Setting Up a Cloud Server - Part 1 - Transcript.pdfSetting Up a Cloud Server - Part 1 - Transcript.pdf
Setting Up a Cloud Server - Part 1 - Transcript.pdfShaiAlmog1
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for EveryoneNikhil Mittal
 
Security for AWS : Journey to Least Privilege (update)
Security for AWS : Journey to Least Privilege (update)Security for AWS : Journey to Least Privilege (update)
Security for AWS : Journey to Least Privilege (update)dhubbard858
 
Security for AWS: Journey to Least Privilege
Security for AWS: Journey to Least PrivilegeSecurity for AWS: Journey to Least Privilege
Security for AWS: Journey to Least PrivilegeLacework
 
Operating systems
Operating systemsOperating systems
Operating systemssandrahezro
 
Security & ethical hacking p2
Security & ethical hacking p2Security & ethical hacking p2
Security & ethical hacking p2ratnalajaggu
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri
 
Sensu at brightpearl
Sensu at brightpearlSensu at brightpearl
Sensu at brightpearlDavid Tibbs
 
Introduction to TensorFlow and OpenCV libraries
Introduction to TensorFlow and OpenCV librariesIntroduction to TensorFlow and OpenCV libraries
Introduction to TensorFlow and OpenCV librariesTanikella Sai Abhijyan
 
Elegoo Super Starter Kit for UNO V1.0.2017.7.9.pdf
Elegoo Super Starter Kit for UNO V1.0.2017.7.9.pdfElegoo Super Starter Kit for UNO V1.0.2017.7.9.pdf
Elegoo Super Starter Kit for UNO V1.0.2017.7.9.pdfasdasdasd25145
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
Information gathering
Information gatheringInformation gathering
Information gatheringMoTechInc
 

Similar to Project: Intrusion Detection (20)

Ultimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIPUltimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIP
 
Step by Step on How to Setup DarkComet
Step by Step on How to Setup DarkCometStep by Step on How to Setup DarkComet
Step by Step on How to Setup DarkComet
 
Backtrack Manual Part9
Backtrack Manual Part9Backtrack Manual Part9
Backtrack Manual Part9
 
Old Linux Security Talk
Old Linux Security TalkOld Linux Security Talk
Old Linux Security Talk
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdf
 
Setting Up a Cloud Server - Part 1 - Transcript.pdf
Setting Up a Cloud Server - Part 1 - Transcript.pdfSetting Up a Cloud Server - Part 1 - Transcript.pdf
Setting Up a Cloud Server - Part 1 - Transcript.pdf
 
snortinstallguide
snortinstallguidesnortinstallguide
snortinstallguide
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 
App locker
App lockerApp locker
App locker
 
Security for AWS : Journey to Least Privilege (update)
Security for AWS : Journey to Least Privilege (update)Security for AWS : Journey to Least Privilege (update)
Security for AWS : Journey to Least Privilege (update)
 
Security for AWS: Journey to Least Privilege
Security for AWS: Journey to Least PrivilegeSecurity for AWS: Journey to Least Privilege
Security for AWS: Journey to Least Privilege
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Day1 ubuntu boot camp
Day1   ubuntu boot campDay1   ubuntu boot camp
Day1 ubuntu boot camp
 
Security & ethical hacking p2
Security & ethical hacking p2Security & ethical hacking p2
Security & ethical hacking p2
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
Sensu at brightpearl
Sensu at brightpearlSensu at brightpearl
Sensu at brightpearl
 
Introduction to TensorFlow and OpenCV libraries
Introduction to TensorFlow and OpenCV librariesIntroduction to TensorFlow and OpenCV libraries
Introduction to TensorFlow and OpenCV libraries
 
Elegoo Super Starter Kit for UNO V1.0.2017.7.9.pdf
Elegoo Super Starter Kit for UNO V1.0.2017.7.9.pdfElegoo Super Starter Kit for UNO V1.0.2017.7.9.pdf
Elegoo Super Starter Kit for UNO V1.0.2017.7.9.pdf
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
Information gathering
Information gatheringInformation gathering
Information gathering
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Project: Intrusion Detection

  • 1. PROJECT: INTRUSION DETECTION Improving Your Security Skills www.jayschulman.com info@jayschulman.com
  • 2. Why This Project Is Important ● Unix/Linux: We’re installing our system on Linux so if you’re not familiar with the operating system, you’ll get some exposure. ● Open Source: Our toolset today is completely open source so you’ll get experience using an open source IDS platform. ● Cloud: I’m recommending you install this in the cloud. It will give you a relatively basic example of cloud computing. ● Threat Intelligence: You’ll be monitoring the internet. I actually don’t recommend you run anything on your host so everything you see will be drive-by attacks. No specific reason, these are just the mass scanning types of attacks. ● Intrusion Detection: It’s a foundational component to information security. In the grand scheme of things, most organizations have it under control. Learning The Basics
  • 3. Install The Cloud If you install it on your home internet, you’re viewing a specific traffic pattern that I don’t think is necessarily representative of the Internet. Most attackers know the IP blocks of cable and DSL modems. So the attacks they’re trying are geared toward home computing. For our exercise, I think seeing more commercial, service based attacks is a better view of the internet. For these types of experiments, I recommend DigitalOcean. It’s the $5 cloud. Their lowest cost server is $5 a month and you get root access to the server. If you sign up here, you’ll actually get a $10 credit. So you can play around for two months. (Or run another experiment next month.)
  • 4. Set Up DigitalOcean Each server is called a droplet. So we’ll need to setup a droplet to get started. Click on Droplets and Create One. Give your droplet a name and select the $10 size. You can try to get it to run for $5 but you need more memory. You’re also welcome to use a bigger server. You’ll see that the server will get pretty slow the more data you collect. But my goal here is not to give you a lightening fast experience but to give you an educational experience for a few bucks.
  • 5. Select Image & Location Choose any location. For our experiment, it would be interesting to compare what New York attacks look like compared to Frankfurt or Toronto. It’s great to pick something close as it will be a bit faster, but really pick something that interests you from a threat intelligence perspective. I picked Singapore for my experiment and FYI it is slow from Chicago. Next select our image. If you’re a Linux guru, pick anything you’d like. If not, the examples below will assume you’re running Ubuntu. There are a few checkboxes at the end. I checked IPv6 for kicks as I am curious what attacks are coming on IPv6 versus IPv4. Again, education! Finally complete your setup. You’ll be provided with your IP address and password in an e-mail and you’ll need to change it when you login. Your first setup is to login using a terminal program. The most used and most boring program is PuTTY.
  • 6. Update & Upgrade All of the commands will assume you’re logged in as root. Which is a really bad idea. But this is an experiment and not the real world so such is life. In most trusted environments, you’d want to login as a user and sudo to root. You won’t see that here. I trust Ubuntu’s repositories but I don’t always trust that the version I got is updated. So the following commands will update our server to the latest versions of all of the software running on it. > apt-get update > apt-get upgrade
  • 7. Install SNORT Our Intrusion Detection System will be Snort. It’s the most documented and supported open source system out there and is relatively easy to install on Ubuntu. During the install, it will ask you for the protected subnet. You’ll put your IP address of the DigitalOcean server. > apt-get install snort
  • 8. Configure Rules A lot of interesting rules are turned off by default. Go to your favorite command line editor in Linux (vi, pico, etc) and edit /etc/snort/snort.conf. In this file, you’ll want to go WAY down to the end where there are tons of include lines that has a line for each ruleset. If you see a # in front of the ruleset, it’s been disabled. Remove the # to enable it. To start, turn as much as you want on. When it gets boring, turn it off and focus on what is interesting. See image on your right. include $RULE_PATH/web-misc.rules include $RULE_PATH/web-php.rules include $RULE_PATH/x11.rules # include $PREPROC_RULE_PATH/preprocessor.rules # include $PREPROC_RULE_PATH/decoder.rules # include $PREPROC_RULE_PATH/sensitive-data.rules
  • 9. Test SNORT You have the most basic version of snort installed. At this point, I want to make sure you’re seeing Snort find attacks. So let’s run a command (see image on right) If all goes well, you should start seeing alerts on your screen for attacks. So side note: I did pick Singapore because, well, I thought I’d see a ton of attacks. I don’ t really. So if you don’t see any alerts pop up… oops! Move on to the next step and move to your next level of learning. Just the fact that you got it looking for attacks is a success! >snort -d -A console -u snort -g snort -c /etc/snort/snort.conf -i eth0
  • 10. PIVOT This is the point in time where you need to figure out what you want to learn next. Here are a couple of resources: ● Build a web front end for Snort using Snorby: http://blog.muhammadattique. com/installing-snorby-on-ubuntu-for-snort-with-barnyard2/ ● Send all Snort alerts to a Database and use BASE as a front end: http: //computer-outlines.over-blog.com/article-nids-snort-barnyard2-apache2- base-with-ubuntu-14-04-lts-123532107.html
  • 11. Whether you're a seasoned security professional or trying to get into the field, I'll help you grow your career in security. SIGN UP NOW! Are You Ready to Grow Your Security Career?