<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://performiq.com/kb/index.php?action=history&amp;feed=atom&amp;title=Detect_intruders_on_your_network_with_Snort</id>
	<title>Detect intruders on your network with Snort - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://performiq.com/kb/index.php?action=history&amp;feed=atom&amp;title=Detect_intruders_on_your_network_with_Snort"/>
	<link rel="alternate" type="text/html" href="https://performiq.com/kb/index.php?title=Detect_intruders_on_your_network_with_Snort&amp;action=history"/>
	<updated>2026-05-18T12:43:12Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.37.1</generator>
	<entry>
		<id>https://performiq.com/kb/index.php?title=Detect_intruders_on_your_network_with_Snort&amp;diff=1941&amp;oldid=prev</id>
		<title>PeterHarding at 05:06, 25 April 2008</title>
		<link rel="alternate" type="text/html" href="https://performiq.com/kb/index.php?title=Detect_intruders_on_your_network_with_Snort&amp;diff=1941&amp;oldid=prev"/>
		<updated>2008-04-25T05:06:59Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:06, 25 April 2008&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l76&quot;&gt;Line 76:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 76:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Technet]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Technet]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Whitepages&lt;/del&gt;]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Whitepapers&lt;/ins&gt;]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>PeterHarding</name></author>
	</entry>
	<entry>
		<id>https://performiq.com/kb/index.php?title=Detect_intruders_on_your_network_with_Snort&amp;diff=1940&amp;oldid=prev</id>
		<title>PeterHarding: New page: &lt;i&gt;by Vincent Danen, TechRepublic&lt;/i&gt;    Snort (http://www.snort.org/) is a Network Intrusion Detection System (NIDS), which can view and analyse packets on a network to determine whether ...</title>
		<link rel="alternate" type="text/html" href="https://performiq.com/kb/index.php?title=Detect_intruders_on_your_network_with_Snort&amp;diff=1940&amp;oldid=prev"/>
		<updated>2008-04-25T05:06:39Z</updated>

		<summary type="html">&lt;p&gt;New page: &amp;lt;i&amp;gt;by Vincent Danen, TechRepublic&amp;lt;/i&amp;gt;    Snort (http://www.snort.org/) is a Network Intrusion Detection System (NIDS), which can view and analyse packets on a network to determine whether ...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;i&amp;gt;by Vincent Danen, TechRepublic&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Snort (http://www.snort.org/) is a Network Intrusion Detection System&lt;br /&gt;
(NIDS), which can view and analyse packets on a network to determine&lt;br /&gt;
whether or not a system is being attacked by remote. Most Linux&lt;br /&gt;
distributions come with Snort, so it&amp;#039;s simply a matter of installing Snort&lt;br /&gt;
via urpmi, apt-get, or yum. Snort can write its collected information to a&lt;br /&gt;
variety of different sources for later analysis, be it flat files or a&lt;br /&gt;
database such as PostgreSQL or MySQL. As well, Snort can be used as a&lt;br /&gt;
simple packet logger, sniffer, or a full-blown NIDS.&lt;br /&gt;
&lt;br /&gt;
Once Snort is installed, it can be used right away. Simply executing:&lt;br /&gt;
&lt;br /&gt;
# snort -v &lt;br /&gt;
&lt;br /&gt;
will put Snort into packet sniffing mode; traffic will be scrolled on the&lt;br /&gt;
screen showing what packets Snort is seeing. To exit, hit CTRL-C and you&lt;br /&gt;
will see a brief analysis of what Snort detected. To see even more&lt;br /&gt;
information -- like you might with tcpdump -- use the -vd option instead.&lt;br /&gt;
&lt;br /&gt;
To have Snort log data, simply tell it where to log the information. In&lt;br /&gt;
the next example, Snort will log information to the /usr/local/log/snort&lt;br /&gt;
directory, so make sure it exists first.&lt;br /&gt;
&lt;br /&gt;
# snort -l /usr/local/log/snort -d&lt;br /&gt;
&lt;br /&gt;
Snort will log packets in a binary file, such as&lt;br /&gt;
/usr/local/log/snort/snort.log.1199665001. To view the log, use the -r&lt;br /&gt;
option with Snort in order to replay the captured data.&lt;br /&gt;
&lt;br /&gt;
# snort -r /usr/local/log/snort/snort.log.1199665001&lt;br /&gt;
&lt;br /&gt;
Using Snort as an NDIS takes a little more work; you must configure Snort&lt;br /&gt;
appropriately, using the configuration file /etc/snort/snort.conf. Be&lt;br /&gt;
warned, this configuration file can be quite hefty! Some of the rules&lt;br /&gt;
available on the Snort Web site may be packaged with Snort, depending on&lt;br /&gt;
the Linux distribution.&lt;br /&gt;
&lt;br /&gt;
The Snort rules can be downloaded from&lt;br /&gt;
http://www.snort.org/pub-bin/downloads.cgi. The community rules are&lt;br /&gt;
available for anyone to use and are most likely to be bundled with any&lt;br /&gt;
prepackaged vendor-supplied copies of Snort. You can also subscribe to&lt;br /&gt;
receive updated rules from Sourcefire on a regular basis.&lt;br /&gt;
&lt;br /&gt;
Once you have downloaded a rules package, such as the&lt;br /&gt;
Community-Rules-CURRENT.tar.gz file, unpack it on the system with Snort&lt;br /&gt;
installed in the directory where the Snort configuration is:&lt;br /&gt;
&lt;br /&gt;
# cd /etc/snort &lt;br /&gt;
# tar xvzf Community-Rules-CURRENT.tar.gz&lt;br /&gt;
&lt;br /&gt;
The new rules will now be in the rules/ directory.&lt;br /&gt;
&lt;br /&gt;
To enable them, edit snort.conf and add:&lt;br /&gt;
&lt;br /&gt;
var RULE_PATH rules &lt;br /&gt;
include $RULE_PATH/sql.rules&lt;br /&gt;
include $RULE_PATH/icmp.rules&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
Include whichever rules you like. Snort can now be started to load the&lt;br /&gt;
configuration file /etc/snort/snort.conf , which will, in turn, load the&lt;br /&gt;
downloaded rules:&lt;br /&gt;
&lt;br /&gt;
# snort -c /etc/snort/snort.conf&lt;br /&gt;
&lt;br /&gt;
Snort will then print information about its initialisation to the screen&lt;br /&gt;
and then start logging packets that match the defined rules. The rules&lt;br /&gt;
will determine what Snort will log and what it will ignore, so unlike&lt;br /&gt;
running Snort as a sniffer, the generated logs will be much smaller as&lt;br /&gt;
only packets &amp;quot;of consequence&amp;quot; will be logged. These logs will be stored,&lt;br /&gt;
by default, in /var/log/snort/ and can be analysed by Snort using the -r&lt;br /&gt;
option as noted previously.&lt;br /&gt;
&lt;br /&gt;
[[Category:Technet]]&lt;br /&gt;
[[Category:Whitepages]]&lt;/div&gt;</summary>
		<author><name>PeterHarding</name></author>
	</entry>
</feed>