Mr. Yang, I have to say, your clear and precise explanations is something I admire. I wish all lectures and tutorials were this easy to follow! Thank you Sir.
Thanks for the great video. Could you do a video on how to implement SNORT as an IPS inline and on what type of appliance would you recommend VM and bare metal?
It was a great introduction to this topic, thank you! I feel like I learned a lot & now I have more rabbit holes to chase down ha ha but seriously do you think it would be important to have a separate machine guarding a network of machines, clusters, data, servers, and an intrusion detection/prevention Machine before or after the internal router? I’m sure with more study it will make sense.. I’m looking forward to more on the topic.
Thank you for the very informative video. I currently have pFsense running pfBlockerNG, Suricata and Snort w/Subscription. I was wondering since pfBlockerNG has both IP and DNS blocking capabilities, why do I need Snort or Suricata, they only do IP blocking. I understand that each of the installed programs have different rules sets, I assume pfBlockerNG would have a larger rule set then both Snort and Suricata combined, so pfBlockerNG makes Snort and Suricata redundant? Thoughts, comments?
I am new to using snort and still learning in university. I am wondering after I find an intrusion how can I log it and save it as a pcap file? What would the syntax look like to do this? So I can analyze it further with Wireshark. Thank you in advance.
Hi, Brother I have a topic about "Deep Neural Networks to Improve Intrusion Detection" , Can we say that your this techniques can also be use for my topic.
Hi, thanks for your explanations. do we possible to add Artificial intelligence (AI) combining with snort? what kinds of attack that AI can make snort more adaptive? thanks
If it s a external attack, i need to put my external ip or internal like on the video in the config file? Snort will show the external ip of the attacker?
@@LoiLiangYang u know why I subscribed ur channel 5 days ago that time 5k change ur subscription now its 6k.Thank u. Make more important of people worth videos.
I have a problem : "Cant start DAQ (-1) --> Fatal Error quiting" when i run " sudo snort -A console -q -u snort -c /etc/snort/snort.conf -i enp0s3 ". Can you help me to fix it
Hello, I have a wild question if someone could maybe help guide me in the right direction. I came across a question that asked something like this: What Snort Option is used to Reject Payloads
Loi Liang Yang, that was a splendid lecture.
Thank you!
Glad you enjoyed the splendid lecture.
Thanks for the live view. As a student, it's very helpful to see what the attack "looks" like in the IDS
My first taste of what it's like to use SNORT and to "see" what an IDS is reporting. Quick, incisive, and very helpful. Thanks.
Mr. Yang, I have to say, your clear and precise explanations is something I admire. I wish all lectures and tutorials were this easy to follow! Thank you Sir.
Remember to subscribe now so that you can learn all about technology and cyber-security.
6:04 "sudo gedit" command not found?
What if you scan stealth ily..nmap -sS -A -pn "the ip to scan"..
That's the most angry intro I've ever seen xD
Lol
wtf ...are you looking for beauty video?
@@pedrocamposnl yo brodie my asspipe stinks and I love it brodie
Who cares about intro, watch the whole thing
you are very clear and easy to follow. THANK YOU A LOT!
Thank you for the clear lecture, but I would say this is host IDS since it's not actually covering the whole network
Simple, short and effective, keep teaching like this.
All the best.
Thanks for the great video. Could you do a video on how to implement SNORT as an IPS inline and on what type of appliance would you recommend VM and bare metal?
"Open sauce" You're great and this tutorial is awesome.
Karl Linux
It was a great introduction to this topic, thank you! I feel like I learned a lot & now I have more rabbit holes to chase down ha ha but seriously do you think it would be important to have a separate machine guarding a network of machines, clusters, data, servers, and an intrusion detection/prevention Machine before or after the internal router? I’m sure with more study it will make sense.. I’m looking forward to more on the topic.
I remember when I started studying Cyber Security and your videos only had 1 thousand view look at you now
I have snort installed but don't know how to configure it yet. This helps.
This is now included by default in Kali 2024.2
You look so young here! And more serious than recent vids😅
This video is amazing! Probably the best videos I have watched! Thanks a lot!
You're very welcome!
Aside from information leakage, do you have videos on other types of attacks?
such a great short intro thank you so much.
Thank you for the very informative video. I currently have pFsense running pfBlockerNG, Suricata and Snort w/Subscription. I was wondering since pfBlockerNG has both IP and DNS blocking capabilities, why do I need Snort or Suricata, they only do IP blocking. I understand that each of the installed programs have different rules sets, I assume pfBlockerNG would have a larger rule set then both Snort and Suricata combined, so pfBlockerNG makes Snort and Suricata redundant? Thoughts, comments?
Now we know, whenever someone is attacking. But what to do against it?
What’s the best, wireshark or snort?
when you got bars on the window, you KNOW shit is serious
I am new to using snort and still learning in university. I am wondering after I find an intrusion how can I log it and save it as a pcap file? What would the syntax look like to do this? So I can analyze it further with Wireshark. Thank you in advance.
Hi, Brother I have a topic about "Deep Neural Networks to Improve Intrusion Detection" , Can we say that your this techniques can also be use for my topic.
Hello Muhammad, have you set one up?
Sorry If my question might sound stupid, but how do you prevent those attacks from attacking your network?
I really like your lecture is very sound crystal clear..Thank you a slot
When professionals perform pentest for companies are they granted access to their network system? Or do they have to perform it over WAN??
Depends on what is written on the contract for the scope of coverage.
Just found your channel Loi Liang Yang and hooked 🖖
Do you have a tutorial to set this kind of lab up? Or…know of one?
Did u use 2 systems for ubuntu or only one system?
Great job Loi. Extremely helpful for noobs in cyber security like myself
Everyone has to start somewhere. We all learn together.
I bet you're killing it by now... Four years down the line.
do you have tutorials for this on udemy or can you point me to one
Hi, thanks for your explanations. do we possible to add Artificial intelligence (AI) combining with snort? what kinds of attack that AI can make snort more adaptive? thanks
Fantastic question. Will show next time.
please provide a configuration tutorial from the start🙏
what is oinkmaster and how to use them?
Hi there,
I Have tried Snort and Snorby to detect Intrusion on my home network but couldn't get alerts even if I have security issues.Any tips ?
Loi Liang Yang why do you use Windows 10?
My man lookin like Chinese Andrew Tate!
thank you sir i used alot form your tutorials and learn lots things .
Non-stop information, subscribed. Your pronounciation is fantastic too, keep them coming.
Welcome.
are the configurations propel though
thank you for making this great video...very good explanation ....But i want to clarify it is possible in windows system
Yes, can be installed on windows as well.
Hello, I want to use I D S +Stepping stone algorithms to detecy Dos attack?
Thank you
Hello sir,
Their is any project for ids using tools.. i humble request please suggest a research based project. I am Mtech Student.
Great presentation! Thank you Mr. Yang
If it s a external attack, i need to put my external ip or internal like on the video in the config file? Snort will show the external ip of the attacker?
Hi, i have problem with my snort.conf mine is just a blank, so i need to write all the rule and conf?
Same problem here
7:09 why the “-c /etc/snort/snort.conf”, isn’t it set that path by default in snort?
Hi. This was really cool
I want to work on intrusion detection system as my final year project can you help me?
Your channel going viral, please make everyday videos, please.
Thank you for watching. I'm very tied down with my work in real life. Will try my best to give back during the weekends.
@@LoiLiangYang u know why I subscribed ur channel 5 days ago that time 5k change ur subscription now its 6k.Thank u. Make more important of people worth videos.
Hello sir, is it possible to unlock iPhone without connecting to pc??
Very interesting and helpful, thank you !
how can we deploy snort on entire network of an enterprise ?
That was a pretty smooth tutorial. Nice
Sir you will Termux script PDF and upload in your website. Website link you are video
Are you saying propel?
I am ping from attacker ping -p "hexavalue" serverip ,can I detect and log hexa value and alert as well
How test a login page of the router at home to be bypass if not using ssl
Thank you for making this video!
You're welcome. Will be making another one on snort soon.
Thank you for the insight! Excellent Demo.
its' a very nice explanation brother thanks for the video!
Most welcome!
from where can we have the file that you open !
hi. this is a very helpful tutorial! but i get stuck after sudo gedit /etc/snort/snort.confg. can you help me?
Please elaborate
@@LoiLiangYang when you write the command above supposedly the snort.confg file should appear isn't? but mine it just a blank file.
what is the name of the second tool launched? "SPARTA"?
it this one?
tools.kali.org/information-gathering/sparta
What should be network adapter settings of snort machine and kali?
hi!!! im jordan so i want to become It manager. my level is so low to be Hacker. what's i could do?
how to add snort sensor and collect their log via remote banyard2, is it possible to collect multiple snort sensor log at one place
Yes. Try syslog.
I'm looking for the way to block an arp spoofing with snort can you show me
Thank you sir..Can you do a Topic about DMZ ?
Sure, good idea.
Thanks a lot for your presentation! It was very helpful
Welcome.
Great video sir..
Can you do a Topic about different IDS, like DIDS using SMS GATEWAY?
i still learning ^^
Sure, I'm intending to do it this weekend.
I'm really excited for watch your video sir ^^
I am getting WARNING: 'aclocal-1.15' is missing on your system. on running sudo make. How to fix it?
wow, your VMs really fast, how did you do it?
All solid state drives.
@@LoiLiangYang Thanks
I have a problem : "Cant start DAQ (-1) --> Fatal Error quiting" when i run " sudo snort -A console -q -u snort -c /etc/snort/snort.conf -i enp0s3 ". Can you help me to fix it
Excellent and high quality video, thanks!
Great video Thanks many time 😊
it is amazing sir. thank you.
I want your help
How can install snort on "raspberry pi 3 model B" but no using arch linux arm..I need different linux distro ..
thank you this video
great video!!!! easy to follow!!!!!!!!!!!!
Hello, I have a wild question if someone could maybe help guide me in the right direction.
I came across a question that asked something like this:
What Snort Option is used to Reject Payloads
You mean filtering away unwanted traffic to be analyzed?
one of the best ones ever!!!
Hello, please how can i test SNORT without having Ubuntu on a virtualbox ?
ikram Belabid It was originally designed for Linux but it was ported to windows If that’s the OS you are running
Great explanation! Thank you
Such a great intro video! Thank you!
Hello,
Can anyone explain me the snort -A -q command?
what does the -q, -u , -g , -c stands for?
Google => SNORT Cheat sheet
Or
On your linux terminal where you installed Snort. Issuing this command line: man snort
Thank you so much this is very informative.
Welcome.
Thank You for this information !!!
Good and bref tutorial. Keep it up dude.
Thankyou so much 👍👍🙂
How to find network inteface card in snort running on? Anyone know please do reply
How to install snort in ubuntu ??
Thank you for this. Subscribed.
Welcome.
Thank you !
Any dependency ? Please comment
Very informative content. Following .....
Thanks
Thank you sir.