Snort is an open-source, rule-based Network Intrusion Detection and Prevention System (NIDS/NIPS).
Wireless Intrusion Prevention System (WIPS): WIPS monitors the traffic flow from a wireless network. Its aim is to protect wireless traffic and stop possible attacks launched from there. If a signature is identified, the connection is terminated.
Host-based Intrusion Prevention System (HIPS): HIPS actively protects the traffic flow from a single endpoint device. The aim is to investigate the traffic on a particular device. If a signature is identified, the connection is terminated.
Network Intrusion Prevention System (NIPS): NIPS monitors the traffic flow from various areas of the network. The aim is to protect the traffic on the entire subnet. If a signature is identified, the connection is terminated.
Behaviour-based Intrusion Prevention System (Network Behaviour Analysis - NBA):Behaviour-based systems monitor the traffic flow from various areas of the network. The aim is to protect the traffic on the entire subnet. If an anomaly is identified, the connection is terminated.
dev -l logging modedev -K ASCII -l. (show ing ASCII. Avoid using this. The limitation is that it won’t be able to utilized after.)sudo snort -r snort.log.1638459842 - to read the generated logsudo tcpdump -r snort.log.1638459842 -ntc 10 - show 10sudo snort -r logname.log tcpsudo snort -r logname.log -X extra details2.3 IPS mode
sudo snort -c /etc/snort/snort.conf -T - check the configurationsnort -r icmp-test.pcapsudo snort -c /etc/snort/snort.conf -q --pcap-list="icmp-test.pcap http2.pcap" -A console --pcap-show - investigate multiple pcap filealert udp any any -> any any (msg:"UDP detected!!!Same SRC and DEST";sameip; sid:1000001; rev:1;)
sid is the unique identifier for the rule. No two rules in your entire system should have the same sid.
rev is the version number of that specific rule. You start at rev:1. If you later change the rule (e.g., you change the message or the logic), you increment it to rev:2.