Intrusion Detection with Snort – Blue Team Series with Hackersploit
In this second episode of our Blue Team series @HackerSploit introduces intrusion detection with Snort, the foremost Open Source Intrusion Prevention System (IPS) in the world.
Chapters:
0:00 Introduction
0:44 What We’ll Be Covering
1:32 Prerequisites
2:02 What Are Intrusion Detection Systems?
5:13 Introduction to Snort
9:26 What are the Different Versions of Snort?
12:16 What are Snort Rules?
13:27 Snort Rule Syntax
15:20 How Does Snort Work?
16:21 Snort IDS Network Placement
19:16 About Our Lab Environment
20:49 On to the Practical Demo
22:01 Installing Snort
26:56 How to Enable Promiscuous Mode
27:43 How to Examine the Manual for Snort
28:10 Snort Configuration
36:04 Testing Our Configuration File
40:39 Creating Basic Rules
46:30 How to Run Snort
49:38 Writing Another Rule
51:10 Verifying Our New Rule
53:04 How to Use Snorpy
56:25 Let’s Examine Community Rules
1:05:37 How to use Logging in Snort
1:10:19 Conclusion
New to Linode? Get started here with a $100 credit!
Read the doc for more information on network security tools.
Check out Hackersploit’s Red Team Series.
Subscribe to get notified of new episodes as they come out.
#Linode #BlueTeam #Hackersploit #Snort
Product: Linode, Snort, Blue Team; @HackerSploit ;