Introduction To Snort IDS
HTML-код
- Опубликовано: 11 июл 2024
- This video will provide you with an introduction to the Snort IDS/IPS by explaining how Snort works and outlines the structure of a Snort rule. An IDS is a system/host planted within a network to capture traffic and identify malicious activity based on predefined rules, after which, this malicious activity is logged, and a notification is sent to the relevant parties informing them of an intrusion.
You can register for part 2 of this series for free here: bit.ly/3yJqT3c
//LINKS
Snort Website: www.snort.org/
Snorpy Rule Generator: www.cyb3rs3c.net/
Video Slides: bit.ly/38BGqYi
Register For Part 2 Of This Series: bit.ly/3yJqT3c
Get 100$ In Free Linode Credit: bit.ly/39mrvRM
//PLATFORMS
BLOG ►► bit.ly/3qjvSjK
FORUM ►► bit.ly/39r2kcY
ACADEMY ►► bit.ly/39CuORr
//SOCIAL NETWORKS
TWITTER ►► bit.ly/3sNKXfq
DISCORD ►► bit.ly/3hkIDsK
INSTAGRAM ►► bit.ly/3sP1Syh
LINKEDIN ►► bit.ly/360qwlN
PATREON ►► bit.ly/365iDLK
MERCHANDISE ►► bit.ly/3c2jDEn
//BOOKS
Privilege Escalation Techniques ►► amzn.to/3ylCl33
Docker Security Essentials (FREE) ►► bit.ly/3pDcFuA
//SUPPORT THE CHANNEL
NordVPN Affiliate Link (73% Off) ►► bit.ly/3DEPbu5
Get $100 In Free Linode Credit ►► bit.ly/39mrvRM
Get started with Intigriti: go.intigriti.com/hackersploit
//CYBERTALK PODCAST
Spotify ►► spoti.fi/3lP65jv
Apple Podcasts ►► apple.co/3GsIPQo
//WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
-----------------------------------------------------------------------------------
#Cybersecurity#BlueTeam Наука
I say this as a cybersecurity manager: if you want to get into cybersecurity, these blue teams skills are the correct path to learn. forget learning how to hack for now.
next is to learn should be automation, powershell and dont forget packet sniffing.
Just blue team skills & security plus will get you in a soc quickly.
thats actually great advice! would this series be enough to get into entry level soc role??
@@emaadabbasi742 nmap :-)
can you hire me?
What was your first real cyberseucrity role, if I may ask? (or rather the role you used to break into the industry?)
E-X-C-E-L-L-E-N-T!!! Thanks!!! One suggestion: Don't use "irregardless". It's not a word.
You have the best content on RUclips!!!
Thanks Alexis for refreshing fundamentals, grate content as usual.
Hi want more content about this. Great video. Great opportunity to learn but need advanced rule making using snort.
Thank you😊
you broke it down so well!! thank you so much!!!!
Great stuff, really looking forward to this..
Thanks man. Great refresher
Thank you very very explicative!
Like every time great content. Thanks a lot ✌️
Am learning even much more from you
Great lesson
Thank you for the information!! I have been using snort for 6 months and try to figure out how to use it, other the command service.
Thanks for the video !
very useful, thank you
This looks really promising
Thanks you!!!!!!!
Great!
Do you have a video on how to setup the lab environment? That would be really helpful, thank you
I'm pretty confused at 14:12, I want to keep following from there but I'm unsure how to setup the external network on a different adapter from the vulnerable system and ubuntu 20.04. The lab pentesting labs and the exploit development labs are a little different purpose, but I guess I'll just have to go there next.
Hello, can you make a development video of the snort dynamic preprocessor? He is very useful and very powerful.
awesome
Dear Hackersploit,
Thank you for making such a great bootcamp for us. I really appreciated it. So, I want to configure IDS/IPS for my mobile phone as well. Its operating system is Android. Do you know how I may do it? Can you please show us how we can implement Blue Team practices in our phone operating systems?
Is your Kali VM in a different "NAT Network" or is in the same NAT network as the UBuntu and metasploitable 2 vm?
Chaitu bro smvt bangalore express last coaches damage ayyaya leka engine tareata coaches damage ayyaya
Why am I getting only broadcast messages? Do i need a hub device to capture all packets entering the network?
So much content, where can I access all the PowerPoints?
Check the description section.
Nice content. I immediately started thinking how you might used this offensively if you had a few minutes if physical access to a target. To leave persistent monitoring and attack vector. I have a new project to look into.
And yes i know it's a defensive tool. I just want to see if i can pervert it a little.
@@deletedaxiom6057 I doubt it'll be worth the time and energy to use it for that. It is good for monitoring your network but IDK how you could leverage it in an offensive attack bc it takes a while to set up and leaves traces all over the computer it's on
@@deletedaxiom6057 There used to be (maybe still is) a tool called 'snot', which could read Snort rules and generate packets which would set off the victim's Snort system like a frog in a sock. The result would rapidly generate IDS log entries - possibly filling a local filesystem - but at the least it would be annoying and make it hard to distinguish genuine events in the log. That's perverse enough for starters. . .
Hey Guys trying to write snort rule for trigger an alert when there is ngrok use and got stuck,
Is there someone hav an idea for snort rule for this one?
First again bro
2nd again bro
shouldn't it be placed behind the firewall?
I need this for Android, does it exist for Android?
If you can add Arabic translation
Hats off to hackersploit this guy is doing great and providing free content and valuable stuff every time