Overview
Syllabus
Introduction
What We’ll Be Covering
Prerequisites
What Are Intrusion Detection Systems?
Introduction to Snort
What are the Different Versions of Snort?
What are Snort Rules?
Snort Rule Syntax
How Does Snort Work?
Snort IDS Network Placement
About Our Lab Environment
On to the Practical Demo
Installing Snort
How to Enable Promiscuous Mode
How to Examine the Manual for Snort
Snort Configuration
Testing Our Configuration File
Creating Basic Rules
How to Run Snort
Writing Another Rule
Verifying Our New Rule
How to Use Snorpy
Let’s Examine Community Rules
How to use Logging in Snort
Conclusion
Taught by
Linode
Reviews
5.0 rating, based on 2 Class Central reviews
-
"Blue Team Hacking - Intrusion Detection with Snort" provides a comprehensive guide to leveraging Snort for effective intrusion detection. It covers key concepts, practical examples, and hands-on techniques, making it a valuable resource for blue teams seeking to bolster their security defenses.
-
Clear, well explained and easy to understand, thanks!! Need to put in practise to see if all is covered