Intrusion Detection With Snort

Поділитися
Вставка
  • Опубліковано 17 січ 2025

КОМЕНТАРІ • 68

  • @scalarcoding
    @scalarcoding Рік тому +6

    Thanks bro. you just saved a college student who is building a capstone project

  • @aryamargax
    @aryamargax 2 роки тому +4

    Based God Alexis. Had so much fun setting up this IDS and actually seeing the fruits of my labor (alerts ringing as ICMP protocols are sent through the network). Was excited to pass the traffic logs through Wireshark and to understand that you can actually pass the alerts generated through fast mode to Splunk. Things are finally making sense now. This series has been really fire. Keep up the good work.

    • @HackerSploit
      @HackerSploit  2 роки тому +1

      Thank you very much for the feedback, i am glad you have found value in the content.

    • @googleuser4955
      @googleuser4955 2 роки тому

      @@HackerSploit can we set this in windows 10 or 11

  • @au-zy1mg
    @au-zy1mg 9 місяців тому

    真的非常感谢!过去的两天我把大多数时间都花在如何配置依赖文件上,对snort本身一点都不了解,出了什么错也不清楚。现在我终于明白了♥

  • @Diego-rc1zi
    @Diego-rc1zi 2 роки тому +3

    You are amazing, very clear information, very descriptive, I understand eveything, I'll recreate it on my side, you rock Alex!

  • @EeBbEeNnn
    @EeBbEeNnn 9 місяців тому +1

    Very nice tutorial 👍🏾

  • @isaacmihaeli3261
    @isaacmihaeli3261 2 роки тому +1

    Great tutorial and right-to-the-point examples. I will look to other videos to learn more.

  • @kosmonautofficial296
    @kosmonautofficial296 2 роки тому

    I am so mad that I am subbed to you but haven't seen any videos in my feed in like a year. Great video as always keep up the great work!

  • @samuelannapureddy8640
    @samuelannapureddy8640 2 роки тому +9

    It might be great if you increase the video quality. However, providing great content. Support and love from India!!

    • @Hartley94
      @Hartley94 2 роки тому

      yeah, following.

    • @ColdSteel-dz3pf
      @ColdSteel-dz3pf 2 роки тому +3

      Nah bro his quality is spot on

    • @webghost
      @webghost 2 роки тому

      Videos can only be watched at lower resolution for the first hours after the upload and then it should be at 1080p as he intended

    • @ColdSteel-dz3pf
      @ColdSteel-dz3pf 2 роки тому

      @@webghost it’ll be alright bro! However, this channel has helped me in such a huge way that I’m not crying about res. I’d watch this in 8-bit, but hey different strokes, different folks

  • @theAlmightyGod09
    @theAlmightyGod09 6 місяців тому +1

    Thank you for the video. Please I am trying to get the part 2 of the series but the link is no more active. I will appreciate any pointer to part 2.Thank you once again.

  • @cyberrick5142
    @cyberrick5142 2 роки тому +4

    Great work on these Snort videos! Very informative.

  • @kevingendron5586
    @kevingendron5586 2 роки тому +1

    Excellent content and explanations!! Now, to give it a try. Thanks very much for this!

  • @elliotfn7440
    @elliotfn7440 2 роки тому +1

    Thank you so much for this perfect explaining!

  • @josebaezc.7709
    @josebaezc.7709 2 роки тому

    Keep Follow you :) from Dominican Republic. Gracias por todos los tutoriales.

  • @williamshenk7940
    @williamshenk7940 Рік тому +1

    Thank you, excellent tutorial!

  • @bunnybird12
    @bunnybird12 3 місяці тому

    The link to get access to part 2 doesn't work. Where can I view it?

  • @CommNet.InfoSec.CyberSec
    @CommNet.InfoSec.CyberSec Місяць тому

    Thank you, SIRE! You Rock.
    BUT, a little ERROR on your part (maybe) confused me (5:50):
    I suppose it had to be like - If you wanna use `snort` as an IPS too, then use the `-Q` option, and since we're doing only IDS, but not an IPS, we're not gonna use `-Q` option. Please, correct me, if I'm wrong.
    God bless you, SIRE!
    CHEERS!

  • @fabricenade9982
    @fabricenade9982 2 роки тому

    You're too AweSome Teacher. Thanks very much !!!

  • @miguelcrtz
    @miguelcrtz 6 місяців тому

    thank you very much

  • @ashcracking
    @ashcracking 2 роки тому +1

    i just read my senior fyp which have the same title. what a coincidence

  • @nathandaniel3512
    @nathandaniel3512 9 місяців тому

    The link to the part 2 is unavailable, can you help?

  • @congtruongvu6363
    @congtruongvu6363 2 роки тому

    Thanks for video!!. So i have a question. After detection attacks, how can i stop it on my Snort

  • @Meganano
    @Meganano 2 роки тому

    Thank you alexis🙏

  • @newwarrior-wi1fy
    @newwarrior-wi1fy Рік тому

    Alexis, can you send the windows 7 unpatched iso you used for testing eternalblue on?

  • @christojojo6590
    @christojojo6590 Рік тому

    what is the difference between the log files which saved in var/log/snort and log files saved under /var/log/snort/alert ?

  • @ershadramezani6716
    @ershadramezani6716 2 роки тому

    thanks for this amazing playlist. although, for SMBv1 exploit, my snort don't capture the exploit trafic. should i pass the trafic through the snort VM? because it's not mentioned in the video.

  • @ajaynanganath88
    @ajaynanganath88 2 роки тому

    Very informative. Thank you.

  • @kylerabirached5741
    @kylerabirached5741 9 місяців тому

    Any way to make the alert send an email or message of some sort to another device when the pings are detected ?

  • @JourneyTowardsTheCreator
    @JourneyTowardsTheCreator 8 місяців тому

    Hi i am following your tutorial for network intrusion but i am encountering an issue related to ssh , it says connection refused though i have tried every possible solution for this ..

  • @DamienThorn5175
    @DamienThorn5175 Рік тому

    Great vid mate. I am running Ubuntu on W11 and I see any local rules I have applied. Cheers

  • @amf9913
    @amf9913 2 роки тому

    Thank you !

  • @muhammadhassoub299
    @muhammadhassoub299 2 роки тому

    Great content. Thank you very much

  • @jensulrich4848
    @jensulrich4848 2 роки тому

    Best Instructor ✌️👌

  • @aessi2746
    @aessi2746 2 роки тому

    Help!!! I have configured and followed all the way most of the stuff is working but for some reason when i exploit win 7 i am only getting two alerts and the alert message is not generating as well.

  • @adityapundir6529
    @adityapundir6529 2 роки тому +3

    Great work, keep it up!

  • @piyushjoshi7939
    @piyushjoshi7939 3 місяці тому

    I have one ubuntu machine where I have installed postfix for email send and receive, multiple users are there , snort is running on the same system , I want that if from that particular system where everything is installed as I mentioned, if user1 will send any email with any attachments to user2 , snort must generate some alert , and let's suppose I have one another system in same network kali linux from that machine if I will send email to that user which is in ubuntu machine I have configured for email , on that case as well email must generate alert for the same. Can you please provide me , the necessary details ,

  • @melodyfestus783
    @melodyfestus783 Місяць тому

    how do i load up snorpy GUI
    please help me

  • @billigerfusel
    @billigerfusel 2 роки тому +1

    Now that's some good shit we need more of on UA-cam

  • @youngprogrammer5258
    @youngprogrammer5258 2 роки тому

    I tried many ways, I even modified my iptables rules, firewall restrictions, and all the possible ways, but still I cant get reverse shell. Netcat doesn't listen to my reverse shell, so I stucked in the root me room for more than a week. I need help, please anyone suggest me any ideas to overcome this.

  • @muhammadnoraiz615
    @muhammadnoraiz615 2 роки тому

    What if we want to use snort as an IPS ? alert, pass, log actions are working in this scenario but drop or reject not . how could we set up it as an active IPS ? anyone ?

  • @passaronegro349
    @passaronegro349 2 роки тому

    hello .. would it be possible to put subtitles in portuguese ??? because we follow your work here in Brazil!!

    • @HackerSploit
      @HackerSploit  2 роки тому +1

      Hello, we will work on getting the videos transcoded. Greetings to Brazil!

    • @passaronegro349
      @passaronegro349 2 роки тому

      @@HackerSploit appreciate !!! because 43 people here in Brazil watch your video ..but not all of them use English !!! and we wait for the next videos !!!!!🇧🇷✨

  • @britox.6216
    @britox.6216 2 роки тому

    timestamps please! greatful for the content

  • @uuusa7
    @uuusa7 2 роки тому

    what is interface enp0s3 ? my wifi antenna?

  • @RoihanMuhammadIqbal-ox7td
    @RoihanMuhammadIqbal-ox7td 11 місяців тому

    Guys, I want to ask about snort. I installed snort on ubuntu with VM UTM software on Mac M1. Usually I can detect traffic using snort in the Virtualbox VM because there is a promiscuous allow all feature. But I'm now using UTM and it doesn't have that feature. So I enabled promisc in the ubuntu server terminal with the command: sudo ip link set enp0s1 promisc on, or sudo ifconfig enp0s1 promisc . However, I couldn't detect any traffic other than traffic going to the server with Snort installed. Do you have a similar solution or case?

  • @AhmedAli-rw3oz
    @AhmedAli-rw3oz 2 роки тому +2

    بجد ممتاز جدا

  • @gamingunlimited9609
    @gamingunlimited9609 2 роки тому +1

    was waiting from yesterday

  • @aessi2746
    @aessi2746 2 роки тому

    Hi, is it necessary to have a wired connection for this lab or not, mine virtual machine is set to NAT and not the bridge connection. If i change it i loose acces to the internet and my ububtu and kali both have the same ip address so when i ping the adress from kali it just pings it self. can someone help or let me know what am i doing wrong, Thanks.

    • @aessi2746
      @aessi2746 2 роки тому +1

      I was able to fix it, just needed bridge connections, changing ip addresses and making a chnage to the snort.conf

  • @gadgetbro02
    @gadgetbro02 2 роки тому

    can you please share a video about how "metaspoliteable and ubuntu machine that runs Snort" running in same netwrok inside virtualbox. how you manage virtualbox internal network as a Home network for "Metaspoliteable machine and ubuntu machine" . Please 🙏🙏🙏🙏🙏🙏🙏🙏

    • @fajarahmad5880
      @fajarahmad5880 Місяць тому +1

      same question. Have you figured how he's attacking the metasploitable machine and Ubuntu os detecting it?

    • @gadgetbro02
      @gadgetbro02 29 днів тому

      Brother @@fajarahmad5880, VirtualBox or Vmware no matter which one you use, the application gives you the option to create a personalized network and when all OS including Ubuntu, windows, metasploitable machine , etc are in the same network then you can ping all those hosts, intercept their communication, deliver the payload to them, can be established the connection. this is how he discovered metasploitable machine and launched an attack, besides that Ubuntu with Snort are in the same network so Snort can inspect all traffic and take action based on the role. The whole thing is not that simple but the basic thing is as I described.

  • @shmasbhai
    @shmasbhai Рік тому +1

    you need to explain the networking setup more otherwise it just sniffs its own VM and thats it more or less

    • @shmasbhai
      @shmasbhai Рік тому

      also it doesnt go well with parallels setup

  • @z_emed
    @z_emed Рік тому

    Snorpy Rule Generator is banned?!

  • @muhammadhassoub299
    @muhammadhassoub299 2 роки тому

    Waiting you to cover Zeek 😏

  • @SecurityTalent
    @SecurityTalent 2 роки тому

    Great

  • @marcpayz8747
    @marcpayz8747 9 місяців тому

    Legend

  • @GajendraMahat
    @GajendraMahat 2 роки тому +2

    first view

  • @cyberghost_01
    @cyberghost_01 Рік тому +1

    how can snort in ubuntu vm sniff traffic that is not directed to his NIC?

    • @dustinodunne3572
      @dustinodunne3572 Рік тому

      Change to a bridged connection
      Itll have a 192.168.x.x IP so you'll be able to interact with your entire subnet like any other device