SlideShare a Scribd company logo
Alejandro Alcantar
• Snort is an Intrusion Detection System (IDS) and Intrusion
Prevention System (IPS)
• Snort can be used to block malware, and other intrusions on
your computer.
• Snort, although initially programmed for Linux and other
Command Line Interface (CLI) systems, can be configured to run
on Windows.
• Before configuring Snort to run on Windows, your system is
required to have WinPCap and Barnyard installed.
• Before you can install Snort, your system
is require to have WinPCap 4.1.1 or
newer.
• Open up a your web browser and go to
your preferred search engine.
• Once there search for WinPCap and
download the latest version.
• In this case the latest version is 4.1.3.
• After the download run the installer and
go through the program setup like you
would normally.
• Other than WinPCap the only other system
requirement for installing Snort is Barnyard.
• So, again, open up your browser and go to your
search preferred search engine.
• Once there search for a Barnyard download for
Windows, this may be a little difficult to find so
make sure your include which OS you are using in
the search.
• Once you find it, download it and run the installer.
• Once the installer is running, go through the
program setup like you normally would.
• First we need to find the program that we need to install.
• So we open our web browser and go to any search engine.
• Search for Snort and open the result link to the program website.
• Once on the site go to the download section of the site.
• There are multiple sections
with download links.
• The one we are going to
download from is the
Binaries section.
• Under the Binaries list
there are multiple
download links.
• We are looking for the
Installer with the right file
type to run on our OS.
• We are using Windows, so
we are going to use the
executable (.exe) file.
• Download the file and run
through the set up process.
• If you are using Internet
Explorer, you may have to
save the file and rename it
as an .exe file.
• Now to download the your Snort rules, and get the program configuration started.
• On the Snort site, click the get rules button and it will take you to the rules download page.
• Here you are going to download the rules file that either matches or is closest to the version of Snort that
you have downloaded.
• Once downloaded extract the files to your Snort folder.
• Now we need to consult the documentation to configure Snort, which you can find on the Snort site,
or if you prefer on just about any search engine.
• Once you open your Snort documentation, read through and follow the instruction in order to
configure your Snort program.
• The documentation is
telling you to open the
.conf file and edit certain
lines in it.
• To do this find the file in
your etc folder in your
Snort folder.
• Right-click the program
and open it with
WordPad.
• In the .conf file
you are going to
search for the
lines that you are
instructed to
change .
• Once you find
them, make the
necessary
changes.
• Be sure to double
check your
changes before
you save and
close the file.
• In Fig. 1 you are being asked to run commands in your Command Prompt, so open up your
Command Prompt by opening your Start menu and searching “cmd”.
• Run the first command that is asks you to, and your screen should look like figure 2, and from this
you are going to find your interface number.
• Fig. 1 then asks you to run a second command in which “X” is to be replaced with your interface
number, so if done correctly, you should get a long stream of data like in Fig. 3.
Fig. 1
Fig. 2
Fig. 3
• You are now asked to open a new Command Prompt window and run the command “ping
google.com”.
• If it is done correctly you should end up with two Command Prompt windows that look like the two
above.
• The documentation now instructs you to close the previous two Command Prompt
windows and open a new one.
• Run the new command in your new Command Prompt window, and if no errors
occur you window should look like the second figure.
• If an error does occur, you will then need to open your .conf file in WordPad
again, and make correction to the appropriate lines, until running the command gives
you a screen similar to the one displayed in the second figure.
• You can identify the necessary line by looking for the number within the <> in the
error message.

More Related Content

What's hot

Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
Disha Bedi
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
whitehat 'People'
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
Issar Kapadia
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
Jake K.
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
Ankita Ganguly
 
Zen map
Zen mapZen map
Zen map
harisnaved
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
AAKASH S
 
Snort IDS
Snort IDSSnort IDS
Snort IDS
primeteacher32
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
9905234521
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
Kunal Thakur
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
Aj Maurya
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
Coursenvy.com
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
Umesh Dhital
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
Yoram Orzach
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
Hossein Yavari
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
Mahendra Pratap Singh
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
amit kumar
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
antitree
 

What's hot (20)

Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Zen map
Zen mapZen map
Zen map
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Snort IDS
Snort IDSSnort IDS
Snort IDS
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Network security
Network security Network security
Network security
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
 

Viewers also liked

Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
Anton Chuvakin
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
Narudom Roongsiriwong, CISSP
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
Vishwanath Badiger
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
mmubashirkhan
 
Snort
SnortSnort
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
primeteacher32
 
Key management
Key managementKey management
Key management
Brandon Byungyong Jo
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Devil's Cafe
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
SISA Information Security Pvt.Ltd
 
Hcl
HclHcl
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
Disha Bedi
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
Greg Stone
 
Wireshark
WiresharkWireshark
Wireshark
Sourav Roy
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Aparna Bhadran
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Akhil Kumar
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 

Viewers also liked (19)

Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
 
Snort
SnortSnort
Snort
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Key management
Key managementKey management
Key management
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 
Hcl
HclHcl
Hcl
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
 
Wireshark
WiresharkWireshark
Wireshark
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 

Similar to Snort ppt

Hacking with Backtrack Lecture-1
Hacking with Backtrack Lecture-1Hacking with Backtrack Lecture-1
Hacking with Backtrack Lecture-1
Zia Ush Shamszaman
 
How to install windows 7
How to install windows 7How to install windows 7
How to install windows 7
elboob2025
 
Move Windows 10 Installation to SSD without Reinstalling without Data Loss
Move Windows 10 Installation to SSD without Reinstalling without Data LossMove Windows 10 Installation to SSD without Reinstalling without Data Loss
Move Windows 10 Installation to SSD without Reinstalling without Data Loss
moli he
 
Fixing 403 Forbidden Nginx Errors
Fixing 403 Forbidden Nginx ErrorsFixing 403 Forbidden Nginx Errors
Fixing 403 Forbidden Nginx Errors
VEXXHOST Private Cloud
 
Apache open office installation guide
Apache open office installation guideApache open office installation guide
Apache open office installation guide
Being Programmer
 
Windows 8 talk compressed
Windows 8 talk compressedWindows 8 talk compressed
Windows 8 talk compressed
AdultLearning Australia
 
Server quickstart47 windows
Server quickstart47 windowsServer quickstart47 windows
Server quickstart47 windows
kb_exchange_hk
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basics
nishantsri
 
ITCP PRACTICAL-1.pptx
ITCP PRACTICAL-1.pptxITCP PRACTICAL-1.pptx
ITCP PRACTICAL-1.pptx
HemantJadhao3
 
cs506_linux
cs506_linuxcs506_linux
cs506_linux
Gaurav Singh
 
Srgoc linux
Srgoc linuxSrgoc linux
Srgoc linux
Gaurav Singh
 
Baabtra django framework installation and sample project using aptana
Baabtra django framework installation and sample project using aptanaBaabtra django framework installation and sample project using aptana
Baabtra django framework installation and sample project using aptana
baabtra.com - No. 1 supplier of quality freshers
 
installation of VM and ubuntu.pptx
installation of VM and ubuntu.pptxinstallation of VM and ubuntu.pptx
installation of VM and ubuntu.pptx
ArchanaD30
 
Group#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptx
Group#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptxGroup#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptx
Group#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptx
AliHamza515454
 
Nessus
NessusNessus
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
Megha Sahu
 
Project Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docxProject Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docx
briancrawford30935
 
Jenkins hand in hand
Jenkins  hand in handJenkins  hand in hand
Jenkins hand in hand
netdbncku
 
Linux
LinuxLinux
Linux
Yogesh Ks
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
Andrew Nolen, MCJ/FP, CDCA
 

Similar to Snort ppt (20)

Hacking with Backtrack Lecture-1
Hacking with Backtrack Lecture-1Hacking with Backtrack Lecture-1
Hacking with Backtrack Lecture-1
 
How to install windows 7
How to install windows 7How to install windows 7
How to install windows 7
 
Move Windows 10 Installation to SSD without Reinstalling without Data Loss
Move Windows 10 Installation to SSD without Reinstalling without Data LossMove Windows 10 Installation to SSD without Reinstalling without Data Loss
Move Windows 10 Installation to SSD without Reinstalling without Data Loss
 
Fixing 403 Forbidden Nginx Errors
Fixing 403 Forbidden Nginx ErrorsFixing 403 Forbidden Nginx Errors
Fixing 403 Forbidden Nginx Errors
 
Apache open office installation guide
Apache open office installation guideApache open office installation guide
Apache open office installation guide
 
Windows 8 talk compressed
Windows 8 talk compressedWindows 8 talk compressed
Windows 8 talk compressed
 
Server quickstart47 windows
Server quickstart47 windowsServer quickstart47 windows
Server quickstart47 windows
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basics
 
ITCP PRACTICAL-1.pptx
ITCP PRACTICAL-1.pptxITCP PRACTICAL-1.pptx
ITCP PRACTICAL-1.pptx
 
cs506_linux
cs506_linuxcs506_linux
cs506_linux
 
Srgoc linux
Srgoc linuxSrgoc linux
Srgoc linux
 
Baabtra django framework installation and sample project using aptana
Baabtra django framework installation and sample project using aptanaBaabtra django framework installation and sample project using aptana
Baabtra django framework installation and sample project using aptana
 
installation of VM and ubuntu.pptx
installation of VM and ubuntu.pptxinstallation of VM and ubuntu.pptx
installation of VM and ubuntu.pptx
 
Group#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptx
Group#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptxGroup#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptx
Group#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptx
 
Nessus
NessusNessus
Nessus
 
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
 
Project Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docxProject Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docx
 
Jenkins hand in hand
Jenkins  hand in handJenkins  hand in hand
Jenkins hand in hand
 
Linux
LinuxLinux
Linux
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 

Snort ppt

  • 2. • Snort is an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) • Snort can be used to block malware, and other intrusions on your computer. • Snort, although initially programmed for Linux and other Command Line Interface (CLI) systems, can be configured to run on Windows. • Before configuring Snort to run on Windows, your system is required to have WinPCap and Barnyard installed.
  • 3. • Before you can install Snort, your system is require to have WinPCap 4.1.1 or newer. • Open up a your web browser and go to your preferred search engine. • Once there search for WinPCap and download the latest version. • In this case the latest version is 4.1.3. • After the download run the installer and go through the program setup like you would normally.
  • 4. • Other than WinPCap the only other system requirement for installing Snort is Barnyard. • So, again, open up your browser and go to your search preferred search engine. • Once there search for a Barnyard download for Windows, this may be a little difficult to find so make sure your include which OS you are using in the search. • Once you find it, download it and run the installer. • Once the installer is running, go through the program setup like you normally would.
  • 5. • First we need to find the program that we need to install. • So we open our web browser and go to any search engine. • Search for Snort and open the result link to the program website. • Once on the site go to the download section of the site.
  • 6. • There are multiple sections with download links. • The one we are going to download from is the Binaries section. • Under the Binaries list there are multiple download links. • We are looking for the Installer with the right file type to run on our OS. • We are using Windows, so we are going to use the executable (.exe) file. • Download the file and run through the set up process. • If you are using Internet Explorer, you may have to save the file and rename it as an .exe file.
  • 7. • Now to download the your Snort rules, and get the program configuration started. • On the Snort site, click the get rules button and it will take you to the rules download page. • Here you are going to download the rules file that either matches or is closest to the version of Snort that you have downloaded. • Once downloaded extract the files to your Snort folder.
  • 8. • Now we need to consult the documentation to configure Snort, which you can find on the Snort site, or if you prefer on just about any search engine. • Once you open your Snort documentation, read through and follow the instruction in order to configure your Snort program.
  • 9. • The documentation is telling you to open the .conf file and edit certain lines in it. • To do this find the file in your etc folder in your Snort folder. • Right-click the program and open it with WordPad. • In the .conf file you are going to search for the lines that you are instructed to change . • Once you find them, make the necessary changes. • Be sure to double check your changes before you save and close the file.
  • 10. • In Fig. 1 you are being asked to run commands in your Command Prompt, so open up your Command Prompt by opening your Start menu and searching “cmd”. • Run the first command that is asks you to, and your screen should look like figure 2, and from this you are going to find your interface number. • Fig. 1 then asks you to run a second command in which “X” is to be replaced with your interface number, so if done correctly, you should get a long stream of data like in Fig. 3. Fig. 1 Fig. 2 Fig. 3
  • 11. • You are now asked to open a new Command Prompt window and run the command “ping google.com”. • If it is done correctly you should end up with two Command Prompt windows that look like the two above.
  • 12. • The documentation now instructs you to close the previous two Command Prompt windows and open a new one. • Run the new command in your new Command Prompt window, and if no errors occur you window should look like the second figure. • If an error does occur, you will then need to open your .conf file in WordPad again, and make correction to the appropriate lines, until running the command gives you a screen similar to the one displayed in the second figure. • You can identify the necessary line by looking for the number within the <> in the error message.