Blue Team Hacking - Intrusion Detection with Snort

Blue Team Hacking - Intrusion Detection with Snort

Linode via YouTube Direct link

Snort Rule Syntax

8 of 25

8 of 25

Snort Rule Syntax

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Blue Team Hacking - Intrusion Detection with Snort

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 What We’ll Be Covering
  3. 3 Prerequisites
  4. 4 What Are Intrusion Detection Systems?
  5. 5 Introduction to Snort
  6. 6 What are the Different Versions of Snort?
  7. 7 What are Snort Rules?
  8. 8 Snort Rule Syntax
  9. 9 How Does Snort Work?
  10. 10 Snort IDS Network Placement
  11. 11 About Our Lab Environment
  12. 12 On to the Practical Demo
  13. 13 Installing Snort
  14. 14 How to Enable Promiscuous Mode
  15. 15 How to Examine the Manual for Snort
  16. 16 Snort Configuration
  17. 17 Testing Our Configuration File
  18. 18 Creating Basic Rules
  19. 19 How to Run Snort
  20. 20 Writing Another Rule
  21. 21 Verifying Our New Rule
  22. 22 How to Use Snorpy
  23. 23 Let’s Examine Community Rules
  24. 24 How to use Logging in Snort
  25. 25 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.