Security & Intrusion Detection With pfsense, Suricata, pfblocker and blocking what's missed

Поделиться
HTML-код
  • Опубликовано: 13 дек 2024

Комментарии • 43

  • @thomask.9347
    @thomask.9347 3 года назад

    At this point I search for something on RUclips and as soon as I see it's a Lawrence Systems Video, I like and comment for the algo. Other way I might forget. I know it's gonna be good. Great videos guys!

  • @MaximilianImaging
    @MaximilianImaging 5 лет назад +4

    TOM = SUPER HERO OF THE INTERNET

  • @holyindian
    @holyindian 6 лет назад +9

    Loved this video. Its for the first time I have commented on your video, though I am a long time subscriber. This video was totally worth it, tons of important info. Great quality content you have covered Sir.

  • @FabianoDelGaudio
    @FabianoDelGaudio 4 года назад

    You've once again delivered great, quality content. Thanks Tom for the time and effort you put on this channel; it is a great source of information and what I like the most, you talk about the 'internals' for a more technical audience. Finally a great technical channel.. thanks!

  • @minigpracing3068
    @minigpracing3068 5 лет назад +4

    Suricata or Snort? I know you have a recent video on Snort and how it has changed so I'm wondering which would be easier to operate on a day by day basis. I'm on a private LAN at a college, and connect back to the college through a pfSense box. Right now I have all incoming connections blocked, but I need to open a few ports for some services that we want to roll out for our students so they can do work at home. This means getting IDS/IPS up and running. I'm leaning toward Suricata because it seems to be the newer style and will use multiple processors/threads (which I have), not sure if Snort updated to have this feature yet.
    I'll have to look into pfblocker a bit more, not sure if I want to lock out too many regions because we do have a Shoutcast server running and I wouldn't want to block people who may have students in our program "on the air" on our station. We have had many people listen to their kids from military bases around the world and I'd hate to deprive them.
    And thanks for the great videos, you've really helped out a lot.

  • @MaximilianImaging
    @MaximilianImaging 5 лет назад +1

    You always inspire me to move into IT.

  • @SomeGuyInSandy
    @SomeGuyInSandy 6 лет назад +2

    Nice! Lot's of good stuff here, thanks!

  • @ruthlessadmin
    @ruthlessadmin 4 года назад

    With a good backup & HA policy, I fully support auto updates. It's people that have gotten bit in the ass from their own lack of foresight that tend to get their panties in a bunch about it.

  • @lucdelvigne3019
    @lucdelvigne3019 4 года назад

    excellent ... really good info to go further on.

  • @CoreyThompson73
    @CoreyThompson73 6 лет назад

    shodan is good at finding open VNC, IP cameras, Barix boxes (used for things like sudio-transmitter links for radio stations), PLCs that are open to the internet....Good thing to but your own networks in there periodically to make sure nothing is exposed that shouldn't be...

  • @BrianThomas
    @BrianThomas 4 года назад

    I have the same notification. Ha ha too funny!!!

  • @Temido2222
    @Temido2222 6 лет назад +1

    Remember to report these IPs

  • @AFiB1999
    @AFiB1999 4 года назад

    Hello Lawrence Systems, TOM!.
    It called me an attention that Suricata was blocking Google and Gmail and acting up on linkedln after watch one of your videos on how to setup pfblockerng and Suricata and I setup on my box.
    After a lot of researching, going to block list and IPs, I found out on Reddit u/buildsrc that Suricata could possible share and compete the same ET emerging rules. Would be make a video explaining which ET Rules should we all enable on pFblocker and which one should enable/disable on Suricata? So that way alleviate the CPU and Mem on pfsense boxes
    We love your videos! Thanks very much!

  • @00011theman
    @00011theman 6 лет назад +1

    Finally, I was just looking for this

  • @BillyDickson
    @BillyDickson 6 лет назад

    Great stuff Tom, thanks for sharing.

  • @This_Month_In_History
    @This_Month_In_History 7 месяцев назад

    With the block rule set, is pfblocker or suricata necessary to have in your pfsense?

  • @michaelstidham5957
    @michaelstidham5957 5 лет назад +2

    You should check the IPs in question over at AbuseIPDB.com also. They have a huge database of attackers.

    • @dabneyoffermein595
      @dabneyoffermein595 Год назад

      do they still have it, or is there a better one you know of now?

  • @BrianThomas
    @BrianThomas 4 года назад

    What interface should we be setting Suricata on? WAN or LAN, or both?

  • @ArthursHD
    @ArthursHD 4 года назад

    Nice, good stuff! MXtoolbox found IP blocked a year later :)

  • @Haltm82
    @Haltm82 4 года назад

    Hi, how can i allow an IP range or whole domains (for example all the AnyDesk IPs)? Thank you.

  • @JJnATX
    @JJnATX 6 лет назад

    would enjoy seeing pfsense hooked into a open source SIEM ...

  • @munyakay5453
    @munyakay5453 4 года назад

    Loved the video Lawrence any chance you can do a tutorial of Suricata 5.03? I have tried with snort paid rules and still won't work?

  • @atephoto
    @atephoto 5 лет назад +1

    The ip which was beating your server with GET, couldn't it be like a RSS service or someone using a program to get notified when your page change?

  • @davidwalker8481
    @davidwalker8481 4 года назад

    Hi Tom, ever work with open source extended Berkeley Packet Filtering (eBPF/BPF) to scrub DDoS attempts?

  • @sethwilliamson
    @sethwilliamson 6 лет назад

    Good video Tom! Have you set up (or considered) a central syslog server for log collection, rotation, and analysis? Maybe throwing syslog-ng and logrotate on your Zabbix server? Along with GoAccess, GreyLog looks interesting. Logstash and Fluentd look pretty powerful. I'm just recently starting to get to the point where SSHing into each box to check logs is starting to feel tedious and I'm poking my head out to see what approaches others have had success with (particularly with FOSS/low-cost yet still capable solutions.) Remote syslog with logrotate is pretty straight forward, but I'm a bit overwhelmed with the analysis options. Any insight you or others could offer?

  • @gilliangoud
    @gilliangoud 6 лет назад

    Very helpful :)

  • @jiddster
    @jiddster 6 лет назад

    Good stuff as always - I would be interested in a video in how to setup GoAccess with Suricata or Snort if you get time. Thanks.... Jid

  • @Simte
    @Simte 6 лет назад

    Interesting.

  • @karthickesaki1
    @karthickesaki1 5 лет назад

    Your grate

  • @bengroves2502
    @bengroves2502 6 лет назад +3

    "Secuirty"? :)

  • @MaximusBlue2
    @MaximusBlue2 5 лет назад

    Suricata 4.1.4_5 wont start for me once I install it and create the categories and update the packages . it shows a red x on the interface. anyone know how to get this to start ?

    • @MaximusBlue2
      @MaximusBlue2 5 лет назад

      nevermind this fixed it for me chrislazari.com/pfsense-suricata-service-fails-resolved/

  • @hmne1
    @hmne1 5 лет назад

    how i git goaccess to work with pfsense ???