Intrusion Detection with Snort – Blue Team Series with Hackersploit
In this second episode of our Blue Team series @HackerSploit introduces intrusion detection with Snort, the foremost Open Source Intrusion Prevention System (IPS) in the world.
0:44 What We’ll Be Covering
2:02 What Are Intrusion Detection Systems?
5:13 Introduction to Snort
9:26 What are the Different Versions of Snort?
12:16 What are Snort Rules?
13:27 Snort Rule Syntax
15:20 How Does Snort Work?
16:21 Snort IDS Network Placement
19:16 About Our Lab Environment
20:49 On to the Practical Demo
22:01 Installing Snort
26:56 How to Enable Promiscuous Mode
27:43 How to Examine the Manual for Snort
28:10 Snort Configuration
36:04 Testing Our Configuration File
40:39 Creating Basic Rules
46:30 How to Run Snort
49:38 Writing Another Rule
51:10 Verifying Our New Rule
53:04 How to Use Snorpy
56:25 Let’s Examine Community Rules
1:05:37 How to use Logging in Snort
New to Linode? Get started here with a $100 credit!
Read the doc for more information on network security tools.
Check out Hackersploit’s Red Team Series.
Subscribe to get notified of new episodes as they come out.
#Linode #BlueTeam #Hackersploit #Snort
Product: Linode, Snort, Blue Team; @HackerSploit ;
Network Traffic Analysis with Wireshark – Blue Team Series with Hackersploit
You might also like…
Windows Red Team Exploitation Techniques | Red Team Series 3-12This guide is part of the HackerSploit Red Team series of guides. In this video, we will cover Exploitation Techniques for Windows systems.
Securing Commonly Used AppsWhen deploying web applications and services, security should be evaluated throughout. A solid understanding of the fundamentals of securing these applications and services is crucial in maintaining the integrity and reliability of your services. This series works as a practical guide for anyone that wants to learn how to effectively secure commonly used and deployed […]
Red Team Security SeriesHackerSploit presents a new security series focused on “Red Team” best practices. Take a closer look at red team activities and learn techniques to effectively test your security defenses by conducting internal attacks on your organizations infrastructure to identify and close vulnerabilities.
How to Secure SSH | Linux Security with HackerSploitIn this series, HackerSploit takes us through a scenario where we'll have to secure a WordPress instance from SSH based attacks.