Security Lab
Security Lab
This will open the decryption key managment window. As shown in the
window you can select between three decryption modes: None, Wireshark,
and Driver:
3. Network Intrusion
Sniffer modesnort -v Print out the TCP/IP packets header on the screen
Snort -vd show the TCP/IP ICMP header with application data in transit.
Packet Logger mode snort -dev -l c:\log [create this directory in the C drive] and snort will
automatically know to go into packet logger mode, it
collects every packet it sees and places it in log directory.
snort -dev -l c:\log -h ipaddress/24 This rule tells snort that you want to print out the data
link and TCP/IP headers as well as application data into the log directory.
snort -l c:\log -b This is binary mode logs everything into a single file.
Network Intrusion Detection System mode snort -d c:\log -h ipaddress/24 -c snort.conf
This is a configuration file applies rule to each packet to decide it an action based upon the
rule type in the file.
Snort -d -h ipaddress/24 -l c:\log -c snort.conf This will cnfigure snort to run in its most basic
NIDS form, logging packets that trigger rules specifies in the snort.conf
Download SNORT from snort.org
Install snort with or without database support.
Select all
the
componen
ts
and
Click
Next.
Install and
Close.
Skip the WinPcap driver installation
Add the path variable in windows environment variable by selecting new classpath. Create a
path variable and point it at snort.exe variable namepath and variable valuec:\snort\bin.