In this second episode of our Blue Team series @HackerSploit introduces intrusion detection with Snort, the foremost Open Source Intrusion Prevention System (IPS) in the world.
Chapters:
0:00 Introduction
0:44 What We’ll Be Covering
1:32 Prerequisites
2:02 What Are Intrusion Detection Systems?
5:13 Introduction to Snort
9:26 What are the Different Versions of Snort?
12:16 What are Snort Rules?
13:27 Snort Rule Syntax
15:20 How Does Snort Work?
16:21 Snort IDS Network Placement
19:16 About Our Lab Environment
20:49 On to the Practical Demo
22:01 Installing Snort
26:56 How to Enable Promiscuous Mode
27:43 How to Examine the Manual for Snort
28:10 Snort Configuration
36:04 Testing Our Configuration File
40:39 Creating Basic Rules
46:30 How to Run Snort
49:38 Writing Another Rule
51:10 Verifying Our New Rule
53:04 How to Use Snorpy
56:25 Let’s Examine Community Rules
1:05:37 How to use Logging in Snort
1:10:19 Conclusion
New to Cloud Computing? Get started here with a $100 credit → [ Ссылка ]
Read the doc for more information on network security tools → [ Ссылка ]
Check out Hackersploit's Red Team Series → [ Ссылка ]
Subscribe to get notified of new episodes as they come out → [ Ссылка ]
#Linode #BlueTeam #Hackersploit #Snort
Product: Linode, Snort, Blue Team; @HackerSploit ;
Blue Team Hacking | Intrusion Detection with Snort
Теги
linodelinuxcloud computingalternative cloudlinux serveropen sourcesysadminlinux snortsnortsnort blue teamblue team hackingblue team traininghackersploithacker exploitkali linuxintrusion detection systemintrusion detection techniquesnetwork securityids systemssnort idssnort 2intrusion detection system in network securitysnort 2 vs snort 3snort intrusion detection systemcyber securityinstalling snort on ubuntuinstalling snort