SlideShare a Scribd company logo
1 of 25
Snort
Intrusion Detection & Prevention Software
IDS & IPS
Summary
Introduction
1. What is Snort?
2. Implementation
3. Q&A
Conclusion
2
Introduction
3
Intrusion Detection System IDS
+ Monitors network and system activities
+ Reports any malicious activities or violation policies
+ IDS uses SIEM: Security Information and Event Management
+ IDS Classification: NIDS and HIDS
+ Detection Method: Signature or Anomaly
4
Introduction (1)
Intrusion Prevention System IPS
+ Block or Stop malicious activities
+ IPS Classification: NIPS, WIPS, NBA, HIPS
+ Detection Method: Signature, Anomaly, Stateful protocol
5
Introduction
(2)
What is Snort
6
Snort ...
+ Intrusion Detection & Prevention System
+ Open Source and under GPLV2 License
+ Snort modes:
- Sniffer
- Packet logger
- IDS: Network-based or Host-based
7
What is Snort? (1)
Snort as IDPS
+ Real-time traffic analysis
+ Protocol analysis
+ Content Searching/Matching
+ Detect varied types of attacks:
- Buffer overflow
- Stealth port Scans
- CGI attacks
- …
8
What is Snort? (2)
Snort as IDPS
+ Mode expansion
+ Inline as IPS
+ Passive IDS
+ Inline-test: monitoring test without affecting
network using --enable-inline-test
9
What is Snort? (3)
Snort Architecture
10
Packets
Sniffer Preprocessors
Detection
engine
Output
Logging
and
output
alert
Packet
dropped
Rules
What is Snort? (4)
Rules
Rules are:
+ A methodology of performing detection
+ Detect the vulnerability
+ Need an understanding of how vulnerability works
Example:
alert icmp any any -> $HOME_NET any (msg:"ICMP test detected"; GID:1;
sid:10000001; rev:001; classtype:icmp-event;)
11
What is Snort? (4)
Implementation
12
Configuring Ubuntu Server
Installing Ubuntu Server 16.04 on VirtualBox and setting the network to Bridged
Adapter.
Updating and Upgrading Ubuntu System:
-:~$ sudo apt-get update
-:~$ sudo apt-get -y dist-upgrade
-:~$ sudo apt-get install -y build-essential
-:~$ sudo apt-get install -y openssh-server
13
Implementation (1)
Configuring Network Interface
Disabling packet acquisition: Disabling LRO (Large Receive Offload) and GRO (Generic Receive
Offload).
-:~$ sudo nano /etc/network/interfaces
“ #Disabling LRO and GRO for SNORT
post-up ethtool -K ens160 gro off
post-up ethtool -K ens160 lro off ”
Verify that LRO and GRO disabled
-:~$ reboot
-:~$ ethtool -K ens160 | grep receive-offload 14
Implementation (2)
-:~$ Sudo apt-get install -y libpcap-dev
-:~$ Sudo apt-get install -y libpcre3-dev
-:~$ Sudo apt-get install -y libdumbnet-dev
-:~$ sudo apt-get install -y bison flex
-:~$ Wget
https://www.snort.org/downloads/snort/daq-
2.0.6.tar.gz
-:~$ tar xfvz daq-2.0.6.tar.gz
Install Snort Pre-requisites
15
-:~$ cd daq-2.0.6/
-:~$ configure
-:~$ make
-:~$ sudo make install
-:~$ sudo apt-get install zlib1g-dev liblzma-
dev openssl libssl-dev -y
Implementation (3)
Installing Snort
-:~$ wget
https://www.snort.org/downloads/snort/sno
rt-2.9.8.3.tar.gz
-:~$ tar xfvz snort-2.9.8.3.tar.gz
-:~$ cd snort-2.9.8.3
-:~$ ./configure --enable-sourcefire
-:~$ make
-:~$ sudo make install
-:~$ Sudo ldconfig #check for updates
-:~$ sudo ln -s /usr/local/bin/snort
/usr/sbin/snort #symbolic link
-:~$ sudo groupadd snort-test
-:~$ sudo useradd snort-test -r -s
/sbin/nologin -C SNORT_IDS -g snort-test
Files and Folders
16
Implementation (4)
Folders and Permissions
-:~$ sudo mkdir -p /etc/snort/rules/iplists
-:~$ sudo mkdir /etc/snort/preproc_rules
-:~$ sudo mkdir
/usr/local/lib/snort_dynamicrules
-:~$ sudo mkdir /etc/snort/so_rules
-:~$ sudo mkdir -p /var/log/snort/archived_logs
-:~$ sudo touch
/etc/snort/rules/iplists/black_list.rules
-:~$ sudo touch
/etc/snort/rules/iplists/white_list.rules
-:~$ sudo touch /etc/snort/rules/local.rules
-:~$ sudo touch /etc/snort/sid-msg.map
-:~$ sudo chmod -R 5775 /etc/snort
-:~$ sudo chmod -R 5775 /var/log/snort
-:~$ sudo chmod -R 5775
/usr/local/lib/snort_dynamicrules
-:~$ sudo chown -R snort:snort /etc/snort
-:~$ sudo chown -R snort:snort /var/log/snort
-:~$ sudo chown -R snort:snort
/usr/local/lib/snort_dynamicrules 17
Implementation (5)
Snort as a Sniffer
-:~$ sudo snort -v #TCP/IP headers
-:~$ sudo snort -vd #TCP/IP UDP and ICMP headers
-:~$ sudo snort -vde #Displaying with link headers
18
Implementation (6)
Snort as a Packet Logger mode
-:~$ sudo snort -dev -l path/to/log #log into the specified path
-:~$ sudo snort -dev -l path/to/log -h 192.168.2.0 #Logging will be devided into
subdirectories for each IP address
-:~$ sudo snort -b# For binary logging
-:~$ sudo snort -dbr path/to/binary/log # pust snort on playback and gets the logs
readable
-:~$ sudo snort -dbr path/to/binary/log ICMP # Displays only the ICMP packtes.
19
Implementation (7)
Snort configuration (NIDS)
-:~$ sudo sed -i "s/include $RULE_PATH/#include $RULE_PATH/" /etc/snort/snort.conf
-:~$ sudo vim /etc/snort/snort.conf #change according to folders path
-:~$ sudo /usr/local/bin/snort -A console -q -u snort -g snort -c /etc/snort/snort.conf -i
enp0s3
20
Implementation (8)
Additional features: Barnyard2
+ open source interpreter of snort binary file. (github: firnsy/barnyard2)
+ can log the data into different: files or database
+ Log files extension is u2
21
Implementation (9)
Additional features PulledPork
+ Helper Script written in Perl
+ Downloads and updates rules from snort official website
+ PulledPork needs a token by registering in snort (www.snort.org) called
oinkcode
+ In this implementation, my oinkcode is 33955f002653e33fb94156457ad9bbe3d2e940c5
+ Make changes in PulledPork
22
Implementation
(10)
Question & Answers
23
Conclusion
24
Thank you
25
Fadwa Gmiden & Oussema Hidri

More Related Content

What's hot

What's hot (20)

Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Snort IPS
Snort IPSSnort IPS
Snort IPS
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
NMap
NMapNMap
NMap
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Nmap tutorial
Nmap tutorialNmap tutorial
Nmap tutorial
 
Nmap
NmapNmap
Nmap
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Snort-IPS-Tutorial
Snort-IPS-TutorialSnort-IPS-Tutorial
Snort-IPS-Tutorial
 
Ceh v5 module 03 scanning
Ceh v5 module 03 scanningCeh v5 module 03 scanning
Ceh v5 module 03 scanning
 
Metasploit For Beginners
Metasploit For BeginnersMetasploit For Beginners
Metasploit For Beginners
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 

Similar to Snort

an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptIwan89629
 
Linux Network commands
Linux Network commandsLinux Network commands
Linux Network commandsHanan Nmr
 
Tutorial of SF-TAP Flow Abstractor
Tutorial of SF-TAP Flow AbstractorTutorial of SF-TAP Flow Abstractor
Tutorial of SF-TAP Flow AbstractorYuuki Takano
 
9 creating cent_os 7_mages_for_dpdk_training
9 creating cent_os 7_mages_for_dpdk_training9 creating cent_os 7_mages_for_dpdk_training
9 creating cent_os 7_mages_for_dpdk_trainingvideos
 
Happy porting x86 application to android
Happy porting x86 application to androidHappy porting x86 application to android
Happy porting x86 application to androidOwen Hsu
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)Martin Schütte
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...PROIDEA
 
Router Commands Overview
Router Commands OverviewRouter Commands Overview
Router Commands OverviewMuhammed Niyas
 
Raspberry Pi + ROS
Raspberry Pi + ROSRaspberry Pi + ROS
Raspberry Pi + ROSArnoldBail
 
In depth understanding network security
In depth understanding network securityIn depth understanding network security
In depth understanding network securityThanawan Tuamyim
 
Swift server-side-let swift2016
Swift server-side-let swift2016Swift server-side-let swift2016
Swift server-side-let swift2016Eric Ahn
 
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersFilip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersYury Chemerkin
 
Simplest-Ownage-Human-Observed… - Routers
 Simplest-Ownage-Human-Observed… - Routers Simplest-Ownage-Human-Observed… - Routers
Simplest-Ownage-Human-Observed… - RoutersLogicaltrust pl
 
Asa pixfwsm multicast tips and common problems
Asa pixfwsm multicast tips and common problemsAsa pixfwsm multicast tips and common problems
Asa pixfwsm multicast tips and common problemsIT Tech
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco routerIT Tech
 
Ganglia monitoring
Ganglia monitoringGanglia monitoring
Ganglia monitoringChen Robert
 

Similar to Snort (20)

an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
 
Snort- Presentation.pptx
Snort- Presentation.pptxSnort- Presentation.pptx
Snort- Presentation.pptx
 
Linux Network commands
Linux Network commandsLinux Network commands
Linux Network commands
 
Tutorial of SF-TAP Flow Abstractor
Tutorial of SF-TAP Flow AbstractorTutorial of SF-TAP Flow Abstractor
Tutorial of SF-TAP Flow Abstractor
 
snortinstallguide
snortinstallguidesnortinstallguide
snortinstallguide
 
9 creating cent_os 7_mages_for_dpdk_training
9 creating cent_os 7_mages_for_dpdk_training9 creating cent_os 7_mages_for_dpdk_training
9 creating cent_os 7_mages_for_dpdk_training
 
Happy porting x86 application to android
Happy porting x86 application to androidHappy porting x86 application to android
Happy porting x86 application to android
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
 
Router Commands Overview
Router Commands OverviewRouter Commands Overview
Router Commands Overview
 
Raspberry Pi + ROS
Raspberry Pi + ROSRaspberry Pi + ROS
Raspberry Pi + ROS
 
netLec5.pdf
netLec5.pdfnetLec5.pdf
netLec5.pdf
 
In depth understanding network security
In depth understanding network securityIn depth understanding network security
In depth understanding network security
 
Swift server-side-let swift2016
Swift server-side-let swift2016Swift server-side-let swift2016
Swift server-side-let swift2016
 
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersFilip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routers
 
Simplest-Ownage-Human-Observed… - Routers
 Simplest-Ownage-Human-Observed… - Routers Simplest-Ownage-Human-Observed… - Routers
Simplest-Ownage-Human-Observed… - Routers
 
Asa pixfwsm multicast tips and common problems
Asa pixfwsm multicast tips and common problemsAsa pixfwsm multicast tips and common problems
Asa pixfwsm multicast tips and common problems
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco router
 
Cisco Ios advanced
Cisco Ios advancedCisco Ios advanced
Cisco Ios advanced
 
Ganglia monitoring
Ganglia monitoringGanglia monitoring
Ganglia monitoring
 

More from Fadwa Gmiden

Managing time and productivity
Managing time and productivityManaging time and productivity
Managing time and productivityFadwa Gmiden
 
IoT in Smart Cities
IoT in Smart CitiesIoT in Smart Cities
IoT in Smart CitiesFadwa Gmiden
 
Web Development best practices
Web Development best practicesWeb Development best practices
Web Development best practicesFadwa Gmiden
 
Ubuntu presentation
Ubuntu presentationUbuntu presentation
Ubuntu presentationFadwa Gmiden
 
Synchronisation sous systeme linux
Synchronisation sous systeme linuxSynchronisation sous systeme linux
Synchronisation sous systeme linuxFadwa Gmiden
 

More from Fadwa Gmiden (9)

Managing time and productivity
Managing time and productivityManaging time and productivity
Managing time and productivity
 
IoT in Smart Cities
IoT in Smart CitiesIoT in Smart Cities
IoT in Smart Cities
 
Flask
FlaskFlask
Flask
 
H2O
H2OH2O
H2O
 
Metal as a Server
Metal as a ServerMetal as a Server
Metal as a Server
 
Web Development best practices
Web Development best practicesWeb Development best practices
Web Development best practices
 
Ubuntu presentation
Ubuntu presentationUbuntu presentation
Ubuntu presentation
 
Web essentials
Web essentials Web essentials
Web essentials
 
Synchronisation sous systeme linux
Synchronisation sous systeme linuxSynchronisation sous systeme linux
Synchronisation sous systeme linux
 

Recently uploaded

KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 

Recently uploaded (20)

KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 

Snort

  • 1. Snort Intrusion Detection & Prevention Software IDS & IPS
  • 2. Summary Introduction 1. What is Snort? 2. Implementation 3. Q&A Conclusion 2
  • 4. Intrusion Detection System IDS + Monitors network and system activities + Reports any malicious activities or violation policies + IDS uses SIEM: Security Information and Event Management + IDS Classification: NIDS and HIDS + Detection Method: Signature or Anomaly 4 Introduction (1)
  • 5. Intrusion Prevention System IPS + Block or Stop malicious activities + IPS Classification: NIPS, WIPS, NBA, HIPS + Detection Method: Signature, Anomaly, Stateful protocol 5 Introduction (2)
  • 7. Snort ... + Intrusion Detection & Prevention System + Open Source and under GPLV2 License + Snort modes: - Sniffer - Packet logger - IDS: Network-based or Host-based 7 What is Snort? (1)
  • 8. Snort as IDPS + Real-time traffic analysis + Protocol analysis + Content Searching/Matching + Detect varied types of attacks: - Buffer overflow - Stealth port Scans - CGI attacks - … 8 What is Snort? (2)
  • 9. Snort as IDPS + Mode expansion + Inline as IPS + Passive IDS + Inline-test: monitoring test without affecting network using --enable-inline-test 9 What is Snort? (3)
  • 11. Rules Rules are: + A methodology of performing detection + Detect the vulnerability + Need an understanding of how vulnerability works Example: alert icmp any any -> $HOME_NET any (msg:"ICMP test detected"; GID:1; sid:10000001; rev:001; classtype:icmp-event;) 11 What is Snort? (4)
  • 13. Configuring Ubuntu Server Installing Ubuntu Server 16.04 on VirtualBox and setting the network to Bridged Adapter. Updating and Upgrading Ubuntu System: -:~$ sudo apt-get update -:~$ sudo apt-get -y dist-upgrade -:~$ sudo apt-get install -y build-essential -:~$ sudo apt-get install -y openssh-server 13 Implementation (1)
  • 14. Configuring Network Interface Disabling packet acquisition: Disabling LRO (Large Receive Offload) and GRO (Generic Receive Offload). -:~$ sudo nano /etc/network/interfaces “ #Disabling LRO and GRO for SNORT post-up ethtool -K ens160 gro off post-up ethtool -K ens160 lro off ” Verify that LRO and GRO disabled -:~$ reboot -:~$ ethtool -K ens160 | grep receive-offload 14 Implementation (2)
  • 15. -:~$ Sudo apt-get install -y libpcap-dev -:~$ Sudo apt-get install -y libpcre3-dev -:~$ Sudo apt-get install -y libdumbnet-dev -:~$ sudo apt-get install -y bison flex -:~$ Wget https://www.snort.org/downloads/snort/daq- 2.0.6.tar.gz -:~$ tar xfvz daq-2.0.6.tar.gz Install Snort Pre-requisites 15 -:~$ cd daq-2.0.6/ -:~$ configure -:~$ make -:~$ sudo make install -:~$ sudo apt-get install zlib1g-dev liblzma- dev openssl libssl-dev -y Implementation (3)
  • 16. Installing Snort -:~$ wget https://www.snort.org/downloads/snort/sno rt-2.9.8.3.tar.gz -:~$ tar xfvz snort-2.9.8.3.tar.gz -:~$ cd snort-2.9.8.3 -:~$ ./configure --enable-sourcefire -:~$ make -:~$ sudo make install -:~$ Sudo ldconfig #check for updates -:~$ sudo ln -s /usr/local/bin/snort /usr/sbin/snort #symbolic link -:~$ sudo groupadd snort-test -:~$ sudo useradd snort-test -r -s /sbin/nologin -C SNORT_IDS -g snort-test Files and Folders 16 Implementation (4)
  • 17. Folders and Permissions -:~$ sudo mkdir -p /etc/snort/rules/iplists -:~$ sudo mkdir /etc/snort/preproc_rules -:~$ sudo mkdir /usr/local/lib/snort_dynamicrules -:~$ sudo mkdir /etc/snort/so_rules -:~$ sudo mkdir -p /var/log/snort/archived_logs -:~$ sudo touch /etc/snort/rules/iplists/black_list.rules -:~$ sudo touch /etc/snort/rules/iplists/white_list.rules -:~$ sudo touch /etc/snort/rules/local.rules -:~$ sudo touch /etc/snort/sid-msg.map -:~$ sudo chmod -R 5775 /etc/snort -:~$ sudo chmod -R 5775 /var/log/snort -:~$ sudo chmod -R 5775 /usr/local/lib/snort_dynamicrules -:~$ sudo chown -R snort:snort /etc/snort -:~$ sudo chown -R snort:snort /var/log/snort -:~$ sudo chown -R snort:snort /usr/local/lib/snort_dynamicrules 17 Implementation (5)
  • 18. Snort as a Sniffer -:~$ sudo snort -v #TCP/IP headers -:~$ sudo snort -vd #TCP/IP UDP and ICMP headers -:~$ sudo snort -vde #Displaying with link headers 18 Implementation (6)
  • 19. Snort as a Packet Logger mode -:~$ sudo snort -dev -l path/to/log #log into the specified path -:~$ sudo snort -dev -l path/to/log -h 192.168.2.0 #Logging will be devided into subdirectories for each IP address -:~$ sudo snort -b# For binary logging -:~$ sudo snort -dbr path/to/binary/log # pust snort on playback and gets the logs readable -:~$ sudo snort -dbr path/to/binary/log ICMP # Displays only the ICMP packtes. 19 Implementation (7)
  • 20. Snort configuration (NIDS) -:~$ sudo sed -i "s/include $RULE_PATH/#include $RULE_PATH/" /etc/snort/snort.conf -:~$ sudo vim /etc/snort/snort.conf #change according to folders path -:~$ sudo /usr/local/bin/snort -A console -q -u snort -g snort -c /etc/snort/snort.conf -i enp0s3 20 Implementation (8)
  • 21. Additional features: Barnyard2 + open source interpreter of snort binary file. (github: firnsy/barnyard2) + can log the data into different: files or database + Log files extension is u2 21 Implementation (9)
  • 22. Additional features PulledPork + Helper Script written in Perl + Downloads and updates rules from snort official website + PulledPork needs a token by registering in snort (www.snort.org) called oinkcode + In this implementation, my oinkcode is 33955f002653e33fb94156457ad9bbe3d2e940c5 + Make changes in PulledPork 22 Implementation (10)
  • 25. Thank you 25 Fadwa Gmiden & Oussema Hidri