INTRODUCTION
Snort
is an open source network intrusion prevention and detection system (IDS/IPS)
developed by Sourcefire. Combining the benefits of signature, protocol,
and anomaly-based inspection, Snort is the most widely deployed IDS/IPS
technology worldwide.
HOW TO
OPEN SNORT ON BACKTRACK 5
- Backtrack > Services > Snort Services > snort start
- See the below image for more help -
SNORT
STARTED
- Snort started .
- See the below image for more help -
CONFIGURE
SNORT
- To configure snort , we use vim editor .
- To open snort configuration file , enter the command as shown in the below image .
- See the below image for command -
- COMMAND IS "VIM /ETC/SNOR/SNOR.CONF"
SNORT
CONFIG FILE OPENED
- Go to the next image .
CONFIG
HERE
- This is the area where you have to work .
- Now the line where i use the yellow box and there you will find a line look like this var HOME_NET any . Now replace this any to your own internal ip address .
- In my case my ip address is 192.168.72.129 ( as shown in terminal also ).
- If you don't know your own ip address then use the ifconfig command .
- And at the end save this file by pressing ' Esc key then :wq ' then press enter.
- Note : To enter text in vim press ' i ' .
- See the below image for more help -
RESTART
SNORT
- Now restart snort , by entering the command as shown below.
- With this command /etc/init.d/snort restart
EXAMPLES
Here is
use Backtrack 5r3 as a snort machine ( IDS ) and Kali Linux as a attacker
machine .
Both
are open source linux so easy for you to download .
Now
without wasting time see the examples
USING
DMITRY FROM KALI LINUX
- Here i perform the Deepmagic Information Gathering Tool also known as 'Dmitry'.
- I used this tool to scan for TCP Ports .
ATTACKER
MACHINE
- I look that Kali Linux uses dmitry to performing tcp scan on snort machine ( 192.168.72.129).
- See the below image for more details -
IDS
SNORT CAUGHT SOMETHING
- Here you can see that Snort has caught something .
- It shows a Tcp port scan is performed by the 192.168.72.128 ip address.
- Its a very useful information.
- See the below image for more details -
EXAMPLE
2 : PERFORM OS DETECTION SCAN
- Here i used nmap to perform " OS DETECTION SCAN ".
- Command i used : nmap -v -A 192.168.72.129
- See the below image of performing OS Detection scan on kali linux .
SNORT
DETECTION
- Now the best thing , you can see the behaviour of the scan that is performed by nmap .
- See the red boxes that i have put , it shows so many things.
- See the below image for more help-
CONCLUSION
- So this is how you can use snort on backtrack 5.
- Good in aspect of security .
- You can use it to understand the behaviour of the attack .
- There are lots of things you can do , use your ninja skills and sharp your security .
- Thats it . Thank you for reading .
0 comments:
Post a Comment