Investigating Cyber Attacks With Snort | TryHackMe Snort Challenge -- Live Attacks

Поділитися
Вставка
  • Опубліковано 1 гру 2024

КОМЕНТАРІ • 31

  • @jamilshekinski
    @jamilshekinski 10 місяців тому +1

    Thank You Motasem!!
    And yes, please do some more Snort walkthroughs. It's been hardest for me so far in SOC T1 path.

  • @ahmedJm1
    @ahmedJm1 Місяць тому

    been watching the snort vids thanks for your help and guidance.

  • @scottp8329
    @scottp8329 Рік тому

    loving the vid's really helping me 🤙🏼

  • @davidmohan2698
    @davidmohan2698 2 роки тому +5

    How do you justify it being SSH. It could be port 80 because its the same two ip addresses back and forth so where do you come to the conclusion its just browsing? Could be brute force on login page. Please can you explain more clearly. There are more packets from port 80 than port 22. If there are multiple ip addresses visiting that port you could class that as browsing because a lot of people visit that page.

    • @Eddy-f4r6e
      @Eddy-f4r6e 11 місяців тому

      I think you can just check both.

  • @aslammap
    @aslammap Рік тому

    THIS IS GREAT THANK YOU

  • @zero-ib1jd
    @zero-ib1jd 9 місяців тому

    Wonderful video thanks!

  • @AboodSpiN
    @AboodSpiN Рік тому

    Thank you so much brother!!! amazing explanation, please don't mind me asking, do you look at the malicious port regardless if its from our IP port or destination IP port?

  • @johnpaulramelo6100
    @johnpaulramelo6100 Рік тому +1

    May i ask if we can have a copy of your snort commands ? just the snort only hehe or maybe we can purchase? thanks.

  • @Maccanarchy
    @Maccanarchy 6 місяців тому

    Absolute legend

  • @darttrapdoor9842
    @darttrapdoor9842 8 місяців тому +2

    In production, this is not a great rule. Yes, it gets you the flag (which is all that counts) but if there is a legit ssh server then blocking all traffic to it is effectively a DOS. better to write a more targetted rule for the source and desitnation.

    • @zedhacking
      @zedhacking 8 місяців тому +1

      thats write ! like this rule maybe
      drop tcp 10.10.245.36 any -> any 22 (msg: " Stop the attacker SSH " ; sid: 1000001; rev:1; )

  • @austynstephens9263
    @austynstephens9263 Рік тому

    Thanks for the support

  • @siddhant2943
    @siddhant2943 2 роки тому +1

    I got the flag in first attempt. But I didn't read the whole logs. Seeing that many http requests on port 80 I thought its obviously tcp/80.

  • @aspeakgaming3564
    @aspeakgaming3564 Рік тому +1

    I dont understand the point of writing a local rule and then using the default config

    • @twixigan1387
      @twixigan1387 Рік тому +1

      I didn't either. I used /etc/snort/rules/local.rules instead of the default config and it worked.

  • @Eddy-f4r6e
    @Eddy-f4r6e 11 місяців тому

    hello, what app/document do you use to layout your notes like that?

  • @barood3
    @barood3 11 місяців тому

    thanks motaism , where I can find your note .. give me the name in your website , its in Special Courses Catalog or Cybersecurity Field Notes

  • @mahfouzsarmini1244
    @mahfouzsarmini1244 9 місяців тому

    what the name website when try looking for command ?

  • @qani613
    @qani613 2 роки тому

    hey Motasem, where can I find the link for your notes ?
    I can't find it on your channel

    • @MotasemHamdan
      @MotasemHamdan  2 роки тому

      ua-cam.com/channels/NSdU_1ehXtGclimTVckHmQ.htmljoin

    • @muradrzazade
      @muradrzazade 2 роки тому

      @@MotasemHamdan Can you please make it available in Azerbaijan as well?

  • @iits3mmar
    @iits3mmar Рік тому

    How I can get access to your notes ?

    • @MotasemHamdan
      @MotasemHamdan  Рік тому

      Hello, notes are part of channel membership tier 2.
      Details:
      motasem-notes.net/cyber-security-field-notes/

  • @ahmedJm1
    @ahmedJm1 Місяць тому

    Also, if you don't mid sharing your snort notes i will be very thankful!

  • @zidanetribal2343
    @zidanetribal2343 2 роки тому +4

    or , further before using -A full to stop the attack you can use this command to check the rule in IPS mode, sudo snort -c -q -Q --daq afpacket -i eth0:eth1 -A console

  • @fakridinemichaelson9802
    @fakridinemichaelson9802 5 місяців тому

    ehre can we find out your note

    • @MotasemHamdan
      @MotasemHamdan  5 місяців тому

      Check below link out;
      buymeacoffee.com/notescatalog/extras

  • @cybersecurityalngar2632
    @cybersecurityalngar2632 2 роки тому

    انت عربي؟