Recommendation of a Strategy
Download
Report
Transcript Recommendation of a Strategy
Snort:
Jason Booth – Intrusion Detection System
Overview
Snort / Drawbacks
IDS - Theory
IDS – Test
Practical IDS
Setup Scripts
Oink-Master
Snort-MySql
Log Files
Location
What is logged
What is SNORT?
Snort is an Intrusion Detection System. It generally
runs on a Bastion Server (Server with one purpose).
This helps to limit the possible attack points on the
Bastion Server.
Drawbacks
Slower network (more overhead)
The IDS can become an intrusion point in and of itself
Laws limit what can be logged from a packet.
IDS is only as good as its definition rules
A tcp/ip packet
What snort logs
[**] [1:1384:8] MISC UPnP malformed advertisement [**]
[Classification: Misc Attack] [Priority: 2]
02/23-10:20:29.041905 192.168.0.1:1900 -> 239.255.255.250:1900
UDP TTL:127 TOS:0x0 ID:17771 IpLen:20 DgmLen:346
Len: 318
[Xref => http://www.microsoft.com/technet/security/bulletin/MS01-059.mspx]
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0877]
[Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0876]
[Xref => http://www.securityfocus.com/bid/3723]
Snort Priority
Prioritizing with classification.config
config classification: successful-dos, Denial of
Service, 2
http://www.linux.com/articles/29830
What this means
Theory
Theory
Test
Practical IDS
➲
Choose a setup that is practical and cost
effective for yourself or business yet offer a
fast response to intrusions.
Setup Scripts
➲
➲
➲
/var/log/syslog for
a line that looks like this:
snort[1731]: Snort initialization completed successfully
(pid=1731)
Setup Scripts
➲
➲
/var/snort
Goto setup.txt file to demonstrate this.
SNORT Rules
➲
The rules are the vital part of snort. There
are various categories of rules shipped with
snort. They can be found in /etc/snort/,
ending with *.rules.
OinkMaster
“If you have many sensors, it can be a very difficult job
to keep all the
rules current on all of your sensors. A great tool for
this task is Oinkmaster”
➲
➲
(http://www.snort.org/docs/setup_guides/deb-snort-howto.pdf)
Snort-Mysql
➲Snort
supports mysql. In the
snort.confg
# vim /etc/snort/snort.conf
Find this line below, uncomment the line, and then add your appropriate
values:
output database: log, mysql, user=snort password=mypass
dbname=snort host=localhost
Go restart snort and verify its writing to the database. Easiest way is to
get into mysql and "select * from event" and you should see lots of events
if you still have the alerting going on for each packet or the icmp rule.
Or you can run this command:
# mysql -uroot -pmypassword -D snort -e "select count(*) from event"
Points of Reference
➲
➲
http://www.snort.org/docs/
Google it!
Snort
Snort-mysql
IDS
Linux and snort
Careers with IDS and snort
Mis. Section
➲
Snort in promiscuous mode
Poisoning the network
➲
I'm having a very anoying problem in my LAN: someone (or a virus?)
is sending ARP messages like the following (in human words):
➲
"I am computer with mac de:ad:de:ad:de:ad and with IP <victim's IP>
and I am asking everyone (destination MAC ff:ff:ff:ff:ff:ff): does
anyone else have this IP?"
http://www.webservertalk.com/message1217112.html
➲
Question?
➲
How does snot know its been penetrated?
It looks the packets and determines the payload.
Conclusion
➲
Snort is a versatile and strong network IDS
– tool. When used correctly a network
admin can have a great deal of network info
with low cost in overhead.