Intrusion Detection With Snort

Поделиться
HTML-код
  • Опубликовано: 14 дек 2024
  • This video covers the process of using custom and community Snort rules. An IDS is a system/host planted within a network to capture traffic and identify malicious activity based on predefined rules, after which, this malicious activity is logged, and a notification is sent to the relevant parties informing them of an intrusion.
    You can register for part 2 of this series for free here: bit.ly/3yJqT3c
    //LINKS
    Snort Website: www.snort.org/
    Snorpy Rule Generator: www.cyb3rs3c.net/
    Video Slides: bit.ly/38BGqYi
    Register For Part 2 Of This Series: bit.ly/3yJqT3c
    Get 100$ In Free Linode Credit: bit.ly/39mrvRM
    //PLATFORMS
    BLOG ►► bit.ly/3qjvSjK
    FORUM ►► bit.ly/39r2kcY
    ACADEMY ►► bit.ly/39CuORr
    //SOCIAL NETWORKS
    TWITTER ►► bit.ly/3sNKXfq
    DISCORD ►► bit.ly/3hkIDsK
    INSTAGRAM ►► bit.ly/3sP1Syh
    LINKEDIN ►► bit.ly/360qwlN
    PATREON ►► bit.ly/365iDLK
    MERCHANDISE ►► bit.ly/3c2jDEn
    //BOOKS
    Privilege Escalation Techniques ►► amzn.to/3ylCl33
    Docker Security Essentials (FREE) ►► bit.ly/3pDcFuA
    //SUPPORT THE CHANNEL
    NordVPN Affiliate Link (73% Off) ►► bit.ly/3DEPbu5
    Get $100 In Free Linode Credit ►► bit.ly/39mrvRM
    Get started with Intigriti: go.intigriti.c...
    //CYBERTALK PODCAST
    Spotify ►► spoti.fi/3lP65jv
    Apple Podcasts ►► apple.co/3GsIPQo
    //WE VALUE YOUR FEEDBACK
    We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
    //THANK YOU!
    Thanks for watching!
    Благодарю за просмотр!
    Kiitos katsomisesta
    Danke fürs Zuschauen!
    感谢您观看
    Merci d'avoir regardé
    Obrigado por assistir
    دیکھنے کے لیے شکریہ
    देखने के लिए धन्यवाद
    Grazie per la visione
    Gracias por ver
    شكرا للمشاهدة
    -----------------------------------------------------------------------------------
    #Cybersecurity#BlueTeam

Комментарии • 65

  • @scalarcoding
    @scalarcoding Год назад +5

    Thanks bro. you just saved a college student who is building a capstone project

  • @aryamargax
    @aryamargax 2 года назад +4

    Based God Alexis. Had so much fun setting up this IDS and actually seeing the fruits of my labor (alerts ringing as ICMP protocols are sent through the network). Was excited to pass the traffic logs through Wireshark and to understand that you can actually pass the alerts generated through fast mode to Splunk. Things are finally making sense now. This series has been really fire. Keep up the good work.

    • @HackerSploit
      @HackerSploit  2 года назад +1

      Thank you very much for the feedback, i am glad you have found value in the content.

    • @googleuser4955
      @googleuser4955 2 года назад

      @@HackerSploit can we set this in windows 10 or 11

  • @cyberrick5142
    @cyberrick5142 2 года назад +4

    Great work on these Snort videos! Very informative.

  • @au-zy1mg
    @au-zy1mg 7 месяцев назад

    真的非常感谢!过去的两天我把大多数时间都花在如何配置依赖文件上,对snort本身一点都不了解,出了什么错也不清楚。现在我终于明白了♥

  • @EeBbEeNnn
    @EeBbEeNnn 8 месяцев назад +1

    Very nice tutorial 👍🏾

  • @Diego-rc1zi
    @Diego-rc1zi 2 года назад +3

    You are amazing, very clear information, very descriptive, I understand eveything, I'll recreate it on my side, you rock Alex!

  • @isaacmihaeli3261
    @isaacmihaeli3261 Год назад +1

    Great tutorial and right-to-the-point examples. I will look to other videos to learn more.

  • @kosmonautofficial296
    @kosmonautofficial296 2 года назад

    I am so mad that I am subbed to you but haven't seen any videos in my feed in like a year. Great video as always keep up the great work!

  • @theAlmightyGod09
    @theAlmightyGod09 5 месяцев назад +1

    Thank you for the video. Please I am trying to get the part 2 of the series but the link is no more active. I will appreciate any pointer to part 2.Thank you once again.

  • @samuelannapureddy8640
    @samuelannapureddy8640 2 года назад +9

    It might be great if you increase the video quality. However, providing great content. Support and love from India!!

    • @Hartley94
      @Hartley94 2 года назад

      yeah, following.

    • @ColdSteel-dz3pf
      @ColdSteel-dz3pf 2 года назад +3

      Nah bro his quality is spot on

    • @webghost
      @webghost 2 года назад

      Videos can only be watched at lower resolution for the first hours after the upload and then it should be at 1080p as he intended

    • @ColdSteel-dz3pf
      @ColdSteel-dz3pf 2 года назад

      @@webghost it’ll be alright bro! However, this channel has helped me in such a huge way that I’m not crying about res. I’d watch this in 8-bit, but hey different strokes, different folks

  • @CommNet.InfoSec.CyberSec
    @CommNet.InfoSec.CyberSec 25 дней назад

    Thank you, SIRE! You Rock.
    BUT, a little ERROR on your part (maybe) confused me (5:50):
    I suppose it had to be like - If you wanna use `snort` as an IPS too, then use the `-Q` option, and since we're doing only IDS, but not an IPS, we're not gonna use `-Q` option. Please, correct me, if I'm wrong.
    God bless you, SIRE!
    CHEERS!

  • @kevingendron5586
    @kevingendron5586 2 года назад +1

    Excellent content and explanations!! Now, to give it a try. Thanks very much for this!

  • @elliotfn7440
    @elliotfn7440 2 года назад +1

    Thank you so much for this perfect explaining!

  • @williamshenk7940
    @williamshenk7940 Год назад +1

    Thank you, excellent tutorial!

  • @bunnybird12
    @bunnybird12 2 месяца назад

    The link to get access to part 2 doesn't work. Where can I view it?

  • @adityapundir6529
    @adityapundir6529 2 года назад +3

    Great work, keep it up!

  • @congtruongvu6363
    @congtruongvu6363 2 года назад

    Thanks for video!!. So i have a question. After detection attacks, how can i stop it on my Snort

  • @josebaezc.7709
    @josebaezc.7709 2 года назад

    Keep Follow you :) from Dominican Republic. Gracias por todos los tutoriales.

  • @fabricenade9982
    @fabricenade9982 2 года назад

    You're too AweSome Teacher. Thanks very much !!!

  • @christojojo6590
    @christojojo6590 Год назад

    what is the difference between the log files which saved in var/log/snort and log files saved under /var/log/snort/alert ?

  • @kylerabirached5741
    @kylerabirached5741 8 месяцев назад

    Any way to make the alert send an email or message of some sort to another device when the pings are detected ?

  • @newwarrior-wi1fy
    @newwarrior-wi1fy Год назад

    Alexis, can you send the windows 7 unpatched iso you used for testing eternalblue on?

  • @gamingunlimited9609
    @gamingunlimited9609 2 года назад +1

    was waiting from yesterday

  • @ershadramezani6716
    @ershadramezani6716 2 года назад

    thanks for this amazing playlist. although, for SMBv1 exploit, my snort don't capture the exploit trafic. should i pass the trafic through the snort VM? because it's not mentioned in the video.

  • @DamienThorn5175
    @DamienThorn5175 Год назад

    Great vid mate. I am running Ubuntu on W11 and I see any local rules I have applied. Cheers

  • @ashcracking
    @ashcracking 2 года назад +1

    i just read my senior fyp which have the same title. what a coincidence

  • @piyushjoshi7939
    @piyushjoshi7939 2 месяца назад

    I have one ubuntu machine where I have installed postfix for email send and receive, multiple users are there , snort is running on the same system , I want that if from that particular system where everything is installed as I mentioned, if user1 will send any email with any attachments to user2 , snort must generate some alert , and let's suppose I have one another system in same network kali linux from that machine if I will send email to that user which is in ubuntu machine I have configured for email , on that case as well email must generate alert for the same. Can you please provide me , the necessary details ,

  • @RoihanMuhammadIqbal-ox7td
    @RoihanMuhammadIqbal-ox7td 10 месяцев назад

    Guys, I want to ask about snort. I installed snort on ubuntu with VM UTM software on Mac M1. Usually I can detect traffic using snort in the Virtualbox VM because there is a promiscuous allow all feature. But I'm now using UTM and it doesn't have that feature. So I enabled promisc in the ubuntu server terminal with the command: sudo ip link set enp0s1 promisc on, or sudo ifconfig enp0s1 promisc . However, I couldn't detect any traffic other than traffic going to the server with Snort installed. Do you have a similar solution or case?

  • @JourneyTowardsTheCreator
    @JourneyTowardsTheCreator 7 месяцев назад

    Hi i am following your tutorial for network intrusion but i am encountering an issue related to ssh , it says connection refused though i have tried every possible solution for this ..

  • @nathandaniel3512
    @nathandaniel3512 7 месяцев назад

    The link to the part 2 is unavailable, can you help?

  • @aessi2746
    @aessi2746 2 года назад

    Help!!! I have configured and followed all the way most of the stuff is working but for some reason when i exploit win 7 i am only getting two alerts and the alert message is not generating as well.

  • @muhammadnoraiz615
    @muhammadnoraiz615 2 года назад

    What if we want to use snort as an IPS ? alert, pass, log actions are working in this scenario but drop or reject not . how could we set up it as an active IPS ? anyone ?

  • @youngprogrammer5258
    @youngprogrammer5258 2 года назад

    I tried many ways, I even modified my iptables rules, firewall restrictions, and all the possible ways, but still I cant get reverse shell. Netcat doesn't listen to my reverse shell, so I stucked in the root me room for more than a week. I need help, please anyone suggest me any ideas to overcome this.

  • @ajaynanganath88
    @ajaynanganath88 2 года назад

    Very informative. Thank you.

  • @Meganano
    @Meganano 2 года назад

    Thank you alexis🙏

  • @miguelcrtz
    @miguelcrtz 5 месяцев назад

    thank you very much

  • @gadgetbro02
    @gadgetbro02 2 года назад

    can you please share a video about how "metaspoliteable and ubuntu machine that runs Snort" running in same netwrok inside virtualbox. how you manage virtualbox internal network as a Home network for "Metaspoliteable machine and ubuntu machine" . Please 🙏🙏🙏🙏🙏🙏🙏🙏

  • @billigerfusel
    @billigerfusel 2 года назад +1

    Now that's some good shit we need more of on RUclips

  • @muhammadhassoub299
    @muhammadhassoub299 2 года назад

    Great content. Thank you very much

  • @amf9913
    @amf9913 2 года назад

    Thank you !

  • @aessi2746
    @aessi2746 2 года назад

    Hi, is it necessary to have a wired connection for this lab or not, mine virtual machine is set to NAT and not the bridge connection. If i change it i loose acces to the internet and my ububtu and kali both have the same ip address so when i ping the adress from kali it just pings it self. can someone help or let me know what am i doing wrong, Thanks.

    • @aessi2746
      @aessi2746 2 года назад +1

      I was able to fix it, just needed bridge connections, changing ip addresses and making a chnage to the snort.conf

  • @uuusa7
    @uuusa7 2 года назад

    what is interface enp0s3 ? my wifi antenna?

  • @jensulrich4848
    @jensulrich4848 2 года назад

    Best Instructor ✌️👌

  • @AhmedAli-rw3oz
    @AhmedAli-rw3oz 2 года назад +2

    بجد ممتاز جدا

  • @passaronegro349
    @passaronegro349 2 года назад

    hello .. would it be possible to put subtitles in portuguese ??? because we follow your work here in Brazil!!

    • @HackerSploit
      @HackerSploit  2 года назад +1

      Hello, we will work on getting the videos transcoded. Greetings to Brazil!

    • @passaronegro349
      @passaronegro349 2 года назад

      @@HackerSploit appreciate !!! because 43 people here in Brazil watch your video ..but not all of them use English !!! and we wait for the next videos !!!!!🇧🇷✨

  • @britox.6216
    @britox.6216 2 года назад

    timestamps please! greatful for the content

  • @ridecaro-pk
    @ridecaro-pk Год назад +1

    you need to explain the networking setup more otherwise it just sniffs its own VM and thats it more or less

    • @ridecaro-pk
      @ridecaro-pk Год назад

      also it doesnt go well with parallels setup

  • @muhammadhassoub299
    @muhammadhassoub299 2 года назад

    Waiting you to cover Zeek 😏

  • @z_emed
    @z_emed Год назад

    Snorpy Rule Generator is banned?!

  • @SecurityTalent
    @SecurityTalent 2 года назад

    Great

  • @marcpayz8747
    @marcpayz8747 8 месяцев назад

    Legend

  • @GajendraMahat
    @GajendraMahat 2 года назад +2

    first view

  • @cyberghost_01
    @cyberghost_01 Год назад +1

    how can snort in ubuntu vm sniff traffic that is not directed to his NIC?

    • @dustinodunne3572
      @dustinodunne3572 11 месяцев назад

      Change to a bridged connection
      Itll have a 192.168.x.x IP so you'll be able to interact with your entire subnet like any other device