Blue Team Hacking | Intrusion Detection with Snort

Subscribers:
1,040,000
Published on ● Video Link: https://www.youtube.com/watch?v=uPdCmuFh40M



Category:
Guide
Duration: 1:11:46
4,247 views
133


In this second episode of our Blue Team series @HackerSploit introduces intrusion detection with Snort, the foremost Open Source Intrusion Prevention System (IPS) in the world.

Chapters:
0:00 Introduction
0:44 What We’ll Be Covering
1:32 Prerequisites
2:02 What Are Intrusion Detection Systems?
5:13 Introduction to Snort
9:26 What are the Different Versions of Snort?
12:16 What are Snort Rules?
13:27 Snort Rule Syntax
15:20 How Does Snort Work?
16:21 Snort IDS Network Placement
19:16 About Our Lab Environment
20:49 On to the Practical Demo
22:01 Installing Snort
26:56 How to Enable Promiscuous Mode
27:43 How to Examine the Manual for Snort
28:10 Snort Configuration
36:04 Testing Our Configuration File
40:39 Creating Basic Rules
46:30 How to Run Snort
49:38 Writing Another Rule
51:10 Verifying Our New Rule
53:04 How to Use Snorpy
56:25 Let’s Examine Community Rules
1:05:37 How to use Logging in Snort
1:10:19 Conclusion


New to Cloud Computing? Get started here with a $100 credit → https://www.linode.com/linodetube
Read the doc for more information on network security tools → https://www.linode.com/docs/guides/network-security-tools/
Check out Hackersploit's Red Team Series → https://www.youtube.com/watch?v=Vdd4lRXB7zE&list=PLTnRtjQN5iea6dLA_4i3qFFX0kwvdL0bL&index=1&t=0s
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1

#Linode #BlueTeam #Hackersploit #Snort
Product: Linode, Snort, Blue Team; @HackerSploit ;




Other Videos By Akamai Developer


2022-11-02Nextcloud AIO Server: Finally Easy Server Management with an All-In-One Solution!
2022-10-31Splunk Security Event Monitoring | Blue Team Series with Hackersploit
2022-10-28How to Visualize Your NGINX Logs with GoAccess| An Nginx Log Visualizer
2022-10-26The wget Command | How to Download Files From a Server
2022-10-24Intrusion Detection with Suricata | Blue Team Series with Hackersploit
2022-10-21API Reading and Updating | Sending Dynamic Route Parameters from Remix to Prisma
2022-10-19How to Use Block Storage with Your Linode | Expand Your Server's Storage Capacity
2022-10-17Intrusion Detection with Wazuh | Blue Team Series with Hackersploit
2022-10-14Umbrel Install With One Command | Server Dashboard and Marketplace App
2022-10-12What's a Ping? | Linux Ping Command Explained
2022-10-10Blue Team Hacking | Intrusion Detection with Snort
2022-10-07Sending data with Remix and saving it with Prisma | Real World Database Application Building
2022-10-05Command Line Basics, Data Streams | How Linux Handles Input, Output, and Errors
2022-10-03HackerSploit Blue Team Series Episode 1 | Network Traffic Analysis with Wireshark
2022-09-30Does Arch Belong on a Production Server? | Pros and Cons of Running Arch
2022-09-28btrfs Filesystem for Linux | Top Docs
2022-09-26Linode NodeBalancers Explained | Manage Scale with Transparent Load Distribution
2022-09-23Save and Organize Your Most Useful Code in Simple Snippets | Snippet Box
2022-09-22Connecting Remix to the Database with Prisma | Real World Database Application Building
2022-09-21How To Use LKE and the Mist.io CLI to Streamline Managing Cloud Infrastructure from the Command Line
2022-09-19Linode Managed Backups | Easily Configure and Manage Backups from Your Server



Tags:
linode
linux
cloud computing
alternative cloud
linux server
open source
sysadmin
linux snort
snort
snort blue team
blue team hacking
blue team training
hackersploit
hacker exploit
kali linux
intrusion detection system
intrusion detection techniques
network security
ids systems
snort ids
snort 2
intrusion detection system in network security
snort 2 vs snort 3
snort intrusion detection system
cyber security
installing snort on ubuntu
installing snort