Snort IDS/IPS on PFSense
Huda Seyam
7/6/2020
Project idea
HTTP Brute Force Attack
Waterfall Model 1 Analysis & Design
2 Development
3 Testing
4 Documentation
Analysis & Design
1. Draft Environment
2. Install needed ISO
Environment
Development
1. Setup the environment
2. Install Snort on PFSense as an Intrusion
Prevention System
3. Configure Snort to defend against the http-
brute force attack
2
PFSense
OUR WORK
1. Setup virtual switches in VMware
Workstation
2. Setup victim webserver machine
3. Setup attacker machine
4. Setup normal user machine
5. Setup PFSense Firewall
Setup the environment
Snort
OUR WORK
1. Install snort package
2. Download Snort VRT rules
Install Snort on PFSense
Configure Snort
1. Configure snort on interfaces to
defend against the http-brute force
attack
Testing
1. Perform http-brute force attack
2. Checked Alert and blocked host
3
OUR WORK
By use Nmap tool on kali Linux
Perform http-brute
force attack
Documentation
1. Write report
4
References
https://digitalave.github.io/spring/2019
/12/16/How_To_Setup_Intrusion_Detecti
on_Using_Snort_on_PfSense.html
https://www.snort.org/
https://www.pfsense.org/
https://owasp.org/www-
community/controls/Blocking_Brute_Fo
rce_Attacks
https://hub.packtpub.com/brute-
forcing-http-applications-and-web-
applications-using-nmap-tutorial/
THANK YOU

Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall

Editor's Notes

  • #2 私人订制请加QQ:407149051 或微信:18672765781