Blue Team Hacking | Intrusion Detection with Snort
In this second episode of our Blue Team series @HackerSploit introduces intrusion detection with Snort, the foremost Open Source Intrusion Prevention System (IPS) in the world.
Chapters:
0:00 Introduction
0:44 What We’ll Be Covering
1:32 Prerequisites
2:02 What Are Intrusion Detection Systems?
5:13 Introduction to Snort
9:26 What are the Different Versions of Snort?
12:16 What are Snort Rules?
13:27 Snort Rule Syntax
15:20 How Does Snort Work?
16:21 Snort IDS Network Placement
19:16 About Our Lab Environment
20:49 On to the Practical Demo
22:01 Installing Snort
26:56 How to Enable Promiscuous Mode
27:43 How to Examine the Manual for Snort
28:10 Snort Configuration
36:04 Testing Our Configuration File
40:39 Creating Basic Rules
46:30 How to Run Snort
49:38 Writing Another Rule
51:10 Verifying Our New Rule
53:04 How to Use Snorpy
56:25 Let’s Examine Community Rules
1:05:37 How to use Logging in Snort
1:10:19 Conclusion
New to Cloud Computing? Get started here with a $100 credit → https://www.linode.com/linodetube
Read the doc for more information on network security tools → https://www.linode.com/docs/guides/network-security-tools/
Check out Hackersploit's Red Team Series → https://www.youtube.com/watch?v=Vdd4lRXB7zE&list=PLTnRtjQN5iea6dLA_4i3qFFX0kwvdL0bL&index=1&t=0s
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1
#Linode #BlueTeam #Hackersploit #Snort
Product: Linode, Snort, Blue Team; @HackerSploit ;