Snort On Backtrack 5

Snort On Backtrack 5


snort on backtrack 5
 
INTRODUCTION
Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide.
 
HOW TO OPEN SNORT ON BACKTRACK 5 
 
  • Backtrack > Services > Snort Services > snort start 
  • See the below image for more help -

 
HOW TO OPEN SNORT ON BACKTRACK 5
HOW TO OPEN SNORT ON BACKTRACK 5
SNORT STARTED 
 
  • Snort started .
  • See the below image for more help -

SNORT STARTED
SNORT STARTED
CONFIGURE SNORT
 
  • To configure snort , we use vim editor .
  • To open snort configuration file , enter the command as shown in the below image .
  • See the below image for command -

OPENING CONFIG FILE WITH VIM EDITOR
OPENING CONFIG FILE WITH VIM EDITOR
SNORT CONFIG FILE OPENED
 
  • Go to the next image .

SNORT CONGURATION
SNORT CONGURATION 
CONFIG HERE 
 
  • This is the area where you have to work .
  • Now the line where i use the yellow box and there you will find a line look like this var HOME_NET any . Now replace this any to your own internal ip address .
  • In my case my ip address is 192.168.72.129 ( as shown in terminal also ).
  • If you don't know your own ip address then use the ifconfig command . 
  • And at the end save this file by pressing ' Esc key then :wq  ' then press enter.
  • Note : To enter text in vim press ' i ' .
  • See the below image for more help -

 
SNORT CONGURATION
SNORT CONGURATION 
 
RESTART SNORT
 
  • Now restart snort , by entering the command as shown below.
  • See the below image for more details-

SNORT RESTARTED
SNORT RESTARTED
EXAMPLES 
Here is use Backtrack 5r3 as a snort machine ( IDS ) and Kali Linux as a attacker machine .
Both are open source linux so easy for you to download .
Now without wasting  time see the examples 
 
USING DMITRY FROM KALI LINUX
 
  • Here  i perform the Deepmagic Information Gathering Tool also known as 'Dmitry'.
  • I used this tool to scan for TCP Ports .

ATTACKER MACHINE
 
  • I look that Kali Linux uses dmitry to performing tcp scan on snort machine                            ( 192.168.72.129).
  • See the below image for more details -

SNORT DETECTION EXAMPLE 1
SNORT DETECTION EXAMPLE 1
IDS SNORT CAUGHT SOMETHING
 
  • Here you can see that Snort has caught something .
  • It shows a Tcp port scan is performed by the 192.168.72.128 ip address.
  • Its a very useful information.
  • See the below image for more details -

SNORT DETECTION EXAMPLE 1
SNORT DETECTION EXAMPLE 1
EXAMPLE 2 : PERFORM OS DETECTION SCAN 
 
  • Here i used nmap to perform " OS DETECTION SCAN ".
  • Command i used : nmap -v -A 192.168.72.129
  • See the below image of performing OS Detection scan on kali linux .

SNORT DETECTION EXAMPLE 2
SNORT DETECTION EXAMPLE 2
SNORT DETECTION
 
  • Now the best thing , you can see the behaviour of the scan that is performed by nmap .
  • See the red boxes that i have put , it shows so many things.
  • See the below image for more help-

SNORT DETECTION EXAMPLE 2
SNORT DETECTION EXAMPLE 2
CONCLUSION
 
  • So this is how you can use snort on backtrack 5.
  • Good in aspect of security .
  • You can use it to understand the behaviour of the attack .
  • There are lots of things you can do , use your ninja skills and sharp your security .
  • Thats it . Thank you for reading .

Comments

Popular Posts