Главная
Study mode:
on
1
Introduction
2
What We’ll Be Covering
3
Prerequisites
4
What Are Intrusion Detection Systems?
5
Introduction to Snort
6
What are the Different Versions of Snort?
7
What are Snort Rules?
8
Snort Rule Syntax
9
How Does Snort Work?
10
Snort IDS Network Placement
11
About Our Lab Environment
12
On to the Practical Demo
13
Installing Snort
14
How to Enable Promiscuous Mode
15
How to Examine the Manual for Snort
16
Snort Configuration
17
Testing Our Configuration File
18
Creating Basic Rules
19
How to Run Snort
20
Writing Another Rule
21
Verifying Our New Rule
22
How to Use Snorpy
23
Let’s Examine Community Rules
24
How to use Logging in Snort
25
Conclusion
Description:
Dive into the world of intrusion detection with this comprehensive video tutorial on Snort, the leading Open Source Intrusion Prevention System (IPS). Learn about the fundamentals of Intrusion Detection Systems, explore Snort's various versions, and understand its rule syntax and operational mechanics. Follow along with a practical demonstration covering Snort installation, configuration, and network placement. Master the art of creating and testing basic rules, utilizing community rules, and implementing logging functionalities. Gain hands-on experience in enabling promiscuous mode, examining Snort's manual, and using tools like Snorpy. Perfect for blue team members and cybersecurity enthusiasts looking to enhance their network security skills.

Blue Team Hacking - Intrusion Detection with Snort

Linode
Add to list
0:00 / 0:00