开源ids snort (windows版)

Snort-IPS-on-Windows-main资源-CSDN文库

GitHub - eldoktor1/Snort-IPS-on-Windows: A comprehensive guide to installing and configuring Snort IPS on Windows, ensuring robust network security

 

手动打造Snort+barnyard2+BASE可视化告警平台 - FreeBuf网络安全行业门户

解压后安装

npcap-1.75.exe

Snort_2_9_20_Installer.x64.exe

安装后cmd

C:\Snort\bin>snort.exe -W

查看哪个是正在使用的网卡

-i 后的数字改成正在使用的物理网卡号

C:\Snort\bin>snort.exe -dve -i7 -h 192.168.1.0/24 -l c:\Snort\log -K ascii

C:\Snort\bin>snort.exe -dve -i7 -h 192.168.1.0/24 > c:\Snort\log\192.168.1.024.log

C:\Snort\bin>snort.exe -W,,_     -*> Snort! <*-o"  )~   Version 2.9.20-WIN64 GRE (Build 82)''''    By Martin Roesch & The Snort Team: http://www.snort.org/contact#teamCopyright (C) 2014-2022 Cisco and/or its affiliates. All rights reserved.Copyright (C) 1998-2013 Sourcefire, Inc., et al.Using PCRE version: 8.10 2010-06-25Using ZLIB version: 1.2.11Index   Physical Address        IP Address      Device Name     Description
-----   ----------------        ----------      -----------     -----------

C:\Snort\bin>snort.exe -ev -i7
Running in packet dump mode--== Initializing Snort ==--
Initializing Output Plugins!
pcap DAQ configured to passive.
The DAQ version does not support reload.
Acquiring network traffic from "\Device\NPF_{AAD821DC-6F1F-4814-87A2-0D2EA49E304F}".
Decoding Ethernet--== Initialization Complete ==--,,_     -*> Snort! <*-o"  )~   Version 2.9.20-WIN64 GRE (Build 82)''''    By Martin Roesch & The Snort Team: http://www.snort.org/contact#teamCopyright (C) 2014-2022 Cisco and/or its affiliates. All rights reserved.Copyright (C) 1998-2013 Sourcefire, Inc., et al.Using PCRE version: 8.10 2010-06-25Using ZLIB version: 1.2.11Commencing packet processing (pid=960)
WARNING: No preprocessors configured for policy 0.
===============================================================================
Run time for packet processing was 3.69000 seconds
Snort processed 46 packets.
Snort ran for 0 days 0 hours 0 minutes 3 secondsPkts/sec:           15
===============================================================================
Packet I/O Totals:Received:           69Analyzed:           46 ( 66.667%)Dropped:            0 (  0.000%)Filtered:            0 (  0.000%)
Outstanding:           23 ( 33.333%)Injected:            0
===============================================================================
Breakdown by protocol (includes rebuilt packets):Eth:           46 (100.000%)VLAN:            0 (  0.000%)IP4:           45 ( 97.826%)Frag:            0 (  0.000%)ICMP:            0 (  0.000%)UDP:            1 (  2.174%)TCP:           44 ( 95.652%)IP6:            0 (  0.000%)IP6 Ext:            0 (  0.000%)IP6 Opts:            0 (  0.000%)Frag6:            0 (  0.000%)ICMP6:            0 (  0.000%)UDP6:            0 (  0.000%)TCP6:            0 (  0.000%)Teredo:            0 (  0.000%)ICMP-IP:            0 (  0.000%)EAPOL:            0 (  0.000%)IP4/IP4:            0 (  0.000%)IP4/IP6:            0 (  0.000%)IP6/IP4:            0 (  0.000%)IP6/IP6:            0 (  0.000%)GRE:            0 (  0.000%)GRE Eth:            0 (  0.000%)GRE VLAN:            0 (  0.000%)GRE IP4:            0 (  0.000%)GRE IP6:            0 (  0.000%)
GRE IP6 Ext:            0 (  0.000%)GRE PPTP:            0 (  0.000%)GRE ARP:            0 (  0.000%)GRE IPX:            0 (  0.000%)GRE Loop:            0 (  0.000%)MPLS:            0 (  0.000%)ARP:            1 (  2.174%)IPX:            0 (  0.000%)Eth Loop:            0 (  0.000%)Eth Disc:            0 (  0.000%)IP4 Disc:            0 (  0.000%)IP6 Disc:            0 (  0.000%)TCP Disc:            0 (  0.000%)UDP Disc:            0 (  0.000%)ICMP Disc:            0 (  0.000%)
All Discard:            0 (  0.000%)Other:            0 (  0.000%)
Bad Chk Sum:           23 ( 50.000%)Bad TTL:            0 (  0.000%)S5 G 1:            0 (  0.000%)S5 G 2:            0 (  0.000%)Total:           46
===============================================================================Memory Statistics for File at:Mon Sep 23 09:11:25 2024Total buffers allocated:           0
Total buffers freed:               0
Total buffers released:            0
Total file mempool:                0
Total allocated file mempool:      0
Total freed file mempool:          0
Total released file mempool:       0Heap Statistics of file:Total Statistics:Memory in use:              0 bytesNo of allocs:              0No of frees:              0
===============================================================================
Snort exiting
snort.exe -h
snort.exe: option requires an argument -- h,,_     -*> Snort! <*-o"  )~   Version 2.9.20-WIN64 GRE (Build 82)''''    By Martin Roesch & The Snort Team: http://www.snort.org/contact#teamCopyright (C) 2014-2022 Cisco and/or its affiliates. All rights reserved.Copyright (C) 1998-2013 Sourcefire, Inc., et al.Using PCRE version: 8.10 2010-06-25Using ZLIB version: 1.2.11USAGE: snort.exe [-options] <filter options>snort.exe /SERVICE /INSTALL [-options] <filter options>snort.exe /SERVICE /UNINSTALLsnort.exe /SERVICE /SHOW
Options:-A         Set alert mode: fast, full, console, test or none  (alert file alerts only)-b         Log packets in tcpdump format (much faster!)-B <mask>  Obfuscated IP addresses in alerts and packet dumps using CIDR mask-c <rules> Use Rules File <rules>-C         Print out payloads with character data only (no hex)-d         Dump the Application Layer-e         Display the second layer header info-E         Log alert messages to NT Eventlog. (Win32 only)-f         Turn off fflush() calls after binary log writes-F <bpf>   Read BPF filters from file <bpf>-G <0xid>  Log Identifier (to uniquely id events for multiple snorts)-h <hn>    Set home network = <hn>(for use with -l or -B, does NOT change $HOME_NET in IDS mode)-H         Make hash tables deterministic.-i <if>    Listen on interface <if>-I         Add Interface name to alert output-k <mode>  Checksum mode (all,noip,notcp,noudp,noicmp,none)-K <mode>  Logging mode (pcap[default],ascii,none)-l <ld>    Log to directory <ld>-L <file>  Log to this tcpdump file-n <cnt>   Exit after receiving <cnt> packets-N         Turn off logging (alerts still work)-O         Obfuscate the logged IP addresses-p         Disable promiscuous mode sniffing-P <snap>  Set explicit snaplen of packet (default: 1514)-q         Quiet. Don't show banner and status report-r <tf>    Read and process tcpdump file <tf>-R <id>    Include 'id' in snort_intf<id>.pid file name-s         Log alert messages to syslog-S <n=v>   Set rules file variable n equal to value v-T         Test and report on the current Snort configuration-U         Use UTC for timestamps-v         Be verbose-V         Show version number-W         Lists available interfaces. (Win32 only)-X         Dump the raw packet data starting at the link layer-x         Exit if Snort configuration problems occur-y         Include year in timestamp in the alert and log files-z <file>  Set the preproc_memstats file path and name-Z <file>  Set the performonitor preprocessor file path and name-?         Show this information
<Filter Options> are standard BPF options, as seen in TCPDump
Longname options and their corresponding single char version--logid <0xid>                  Same as -G--perfmon-file <file>           Same as -Z--pid-path <dir>                Specify the directory for the Snort PID file--snaplen <snap>                Same as -P--help                          Same as -?--version                       Same as -V--alert-before-pass             Process alert, drop, sdrop, or reject before pass, default is pass before alert, drop,...--treat-drop-as-alert           Converts drop, sdrop, and reject rules into alert rules during startup--treat-drop-as-ignore          Use drop, sdrop, and reject rules to ignore session traffic when not inline.--process-all-events            Process all queued events (drop, alert,...), default stops after 1st action group--enable-inline-test            Enable Inline-Test Mode Operation--dynamic-engine-lib <file>     Load a dynamic detection engine--dynamic-engine-lib-dir <path> Load all dynamic engines from directory--dynamic-detection-lib <file>  Load a dynamic rules library--dynamic-detection-lib-dir <path> Load all dynamic rules libraries from directory--dump-dynamic-rules <path>     Creates stub rule files of all loaded rules libraries--dynamic-preprocessor-lib <file>  Load a dynamic preprocessor library--dynamic-preprocessor-lib-dir <path> Load all dynamic preprocessor libraries from directory--dynamic-output-lib <file>  Load a dynamic output library--dynamic-output-lib-dir <path> Load all dynamic output libraries from directory--pcap-single <tf>              Same as -r.--pcap-file <file>              file that contains a list of pcaps to read - read mode is implied.--pcap-list "<list>"            a space separated list of pcaps to read - read mode is implied.--pcap-loop <count>             this option will read the pcaps specified on command line continuously.for <count> times.  A value of 0 will read until Snort is terminated.--pcap-reset                    if reading multiple pcaps, reset snort to post-configuration state before reading next pcap.--pcap-show                     print a line saying what pcap is currently being read.--exit-check <count>            Signal termination after <count> callbacks from DAQ_Acquire(), showing the time ittakes from signaling until DAQ_Stop() is called.--conf-error-out                Same as -x--enable-mpls-multicast         Allow multicast MPLS--enable-mpls-overlapping-ip    Handle overlapping IPs within MPLS clouds--max-mpls-labelchain-len       Specify the max MPLS label chain--mpls-payload-type             Specify the protocol (ipv4, ipv6, ethernet) that is encapsulated by MPLS--require-rule-sid              Require that all snort rules have SID specified.--daq <type>                    Select packet acquisition module (default is pcap).--daq-mode <mode>               Select the DAQ operating mode.--daq-var <name=value>          Specify extra DAQ configuration variable.--daq-dir <dir>                 Tell snort where to find desired DAQ.--daq-list[=<dir>]              List packet acquisition modules available in dir.  Default is static modules only.--dirty-pig                     Don't flush packets and release memory on shutdown.--cs-dir <dir>                  Directory to use for control socket.--ha-peer                       Activate live high-availability state sharing with peer.--ha-out <file>                 Write high-availability events to this file.--ha-in <file>                  Read high-availability events from this file on startup (warm-start).--suppress-config-log           Suppress configuration information output.

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/diannao/54605.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

JavaWeb--小白笔记07:servlet对表单数据的简单处理

这里的servlet对表单数据的处理是指使用IDEA创建web工程&#xff0c;再创建html和class文件进行连接&#xff0c;实现html创建一个表单网页&#xff0c;我们对网页中的表单进行填充&#xff0c;可以通过class文件得到网页我们填充的内容进行打印到控制台。 一登录系统页面---h…

Linux网络之UDP与TCP协议详解

文章目录 UDP协议UDP协议数据报报头 TCP协议确认应答缓冲区 超时重传三次握手其他问题 四次挥手滑动窗口流量控制拥塞控制 UDP协议 前面我们只是说了UDP协议的用法,但是并没有涉及到UDP协议的原理 毕竟知道冰箱的用法和知道冰箱的原理是两个层级的事情 我们首先知道计算机网…

1. BOOT.BIN 2. 固化 3. 启动 4. SDK 5. 文件

在进行FPGA的开发与固化过程中&#xff0c;生成BOOT.BIN文件是一个重要的步骤。BOOT.BIN文件通常包含了系统启动所需的不同文件&#xff0c;以下是如何创建和使用该文件的详细说明。 ### 生成BOOT.BIN文件的步骤 1. **方法一&#xff1a;通过项目构建** - 右键单击项目&#xf…

Android Camera 预览角度和拍照保存图片角度相关

–基于Android R(11) 关于Camera Camera Framework 的架构 Android Camera Framework 是一个分层架构&#xff0c;由以下组件组成&#xff1a; HAL&#xff08;硬件抽象层&#xff09;: HAL 抽象底层相机硬件,提供与不同设备相机进行交互的标准接口.CameraService : Camera…

怎么用gitee做一个图片仓库,在md文档中用这个图片网络地址,然后显示图片

痛因&#xff1a;我为什么要这样做&#xff0c;呃&#xff0c;我一开始图片都是存本地地址的&#xff0c;放在和这个md文档同级的assets文件夹下面&#xff0c;这样子确实当时很方便&#xff0c;复制粘贴什么也不用管&#xff0c;但是想把这个文档分享给别的人的时候&#xff0…

【软考】计算机系统硬件基本组成

目录 一、说明 一、说明 1. 计算机系统是由硬件和软件组成的&#xff0c;它们协同工作来运行程序。 2. 计算机的基本硬件系统由运算器、控制器、存储器、输入设备和输出设备5大部件组成。 3. 运算器、控制器等部件被集成在一起统称为中央处理单元(Central Processing Unit&…

美信监控易的优势:长期稳定运行

美信监控易作为一款运维产品&#xff0c;其显著的优势在于能够长期稳定运行。在IT运维领域&#xff0c;系统的稳定性是至关重要的&#xff0c;它直接关系到企业的业务连续性和客户满意度。美信监控易通过其自研的数据库和先进的监测技术&#xff0c;确保了系统的高可用性&#…

Frida-JSAPI:Interceptor使用

拦截器 Interceptor.attach(target, callbacks[, data]) 参数分析 target &#xff1a;target是一个NativePointer&#xff0c;用于指定想要拦截的函数的地址。callbacks &#xff1a;参数是一个包含一个或多个回调函数的对象。 onEnter(args) 回调函数&#xff0c;接收一个参…

Python习题 199:统计重复最多的随机数字

(编码题)用 Python 随机生成 99 个 1 到 100 的数字,统计重复数量最多的前 5 个数字。 from collections import Counter import randomnums = random.choices(range(1, 100), k=99

Qt快捷键说明与用法

编辑与查找 CtrlF&#xff1a;在当前编辑窗口中查找关键字。支持大小写相关、全词匹配、正则表达式匹配等选项&#xff0c;并且查找之后还可以进行替换操作。 CtrlShiftF&#xff1a;进行全局查找&#xff0c;不局限于当前文件。注意&#xff0c;在某些情况下&#xff0c;这个…

AWS EKS 中的负载均衡和 TLS 配置:全面指南

在现代云原生应用程序架构中,负载均衡器扮演着至关重要的角色。对于运行在 Amazon Elastic Kubernetes Service (EKS) 上的应用程序来说,理解和正确配置负载均衡是确保应用程序高可用性、可扩展性和安全性的关键。本文将全面介绍 AWS EKS 中的负载均衡配置,包括 Application…

Spring 的循环依赖

在 Spring 中&#xff0c;循环依赖是指两个或多个 Bean 相互依赖&#xff0c;导致在创建过程中出现了依赖死锁的问题。为了解决循环依赖&#xff0c;Spring 引入了三级缓存机制。了解为什么需要三级缓存机制&#xff0c;首先要明白循环依赖是如何发生的&#xff0c;以及两级缓存…

HarmonyOS鸿蒙开发实战(5.0)悬浮窗拖拽和吸附动画实践

鸿蒙HarmonyOS NEXT开发实战往期文章必看&#xff08;持续更新......&#xff09; HarmonyOS NEXT应用开发性能实践总结 HarmonyOS NEXT应用开发案例实践总结合集 最新版&#xff01;“非常详细的” 鸿蒙HarmonyOS Next应用开发学习路线&#xff01;&#xff08;从零基础入门…

OpenHarmony(鸿蒙南向开发)——小型系统内核(LiteOS-A)【Perf调测】

往期知识点记录&#xff1a; 鸿蒙&#xff08;HarmonyOS&#xff09;应用层开发&#xff08;北向&#xff09;知识点汇总 鸿蒙&#xff08;OpenHarmony&#xff09;南向开发保姆级知识点汇总~ 持续更新中…… 基本概念 Perf为性能分析工具&#xff0c;依赖PMU&#xff08;Per…

代码随想录打卡Day41

最近事情好多。。全堆一块了&#xff0c;今天先写两题吧&#xff0c;剩下一题明天解决。 121. 买卖股票的最佳时机 这道题纯不会&#xff0c;不知道该怎么构造dp数组&#xff0c;更不知道dp数组的含义&#xff0c;看完讲解以后感觉这样的dp数组构造还挺巧妙的&#xff0c;第一…

Qt --- 常用控件的介绍 --- 其他控件

一、QPushButton QWidget中设计到的各种属性/函数/使用方法&#xff0c;针对接下来要介绍的Qt的各种控件都是有效的。 使用QPushButton表示一个按钮&#xff0c;这也是当前我们最熟悉的一个控件了。这个类继承了QAbstractButton&#xff0c;这个类是一个抽象类&#xff0c;是…

C++自动驾驶面试核心问题整理

应用开发 概述&#xff1a;比较基础&#xff0c;没啥壁垒&#xff0c;主要有linux开发经验即可 问题&#xff1a;基础八股&#xff0c;如计算机网络、操作系统、c11等基础三件套&#xff1b;中等难度算法题1-2道。 中间件开发&#xff08;性能优化&#xff09; 概述&am…

Set 和 Map 的模拟实现

1、引言 在数据结构与算法的学习与实践中&#xff0c;关联容器&#xff08;associative containers&#xff09;是不可忽视的重要工具。作为高效管理数据的一类容器&#xff0c;C 标准库中的 set 和 map 在现代软件开发中扮演着关键角色。这两个容器通过平衡二叉搜索树&#x…

【通讯协议】S32K142芯片——LIN通信的学习和配置

文章目录 前言1.LIN是什么&#xff1f;2. LIN连接结构及节点构成3. 帧的组成3.1 帧头3.1.1 同步间隔场&#xff08;Break&#xff09;3.1.2 同步场&#xff08;Synch&#xff09;3.1.3 标识符场&#xff08;PID&#xff09; 3.2 帧响应3.2.1 数据场3.2.2 校验和场 3. 代码配置总…

leetcode热题100.最长回文子串(动态规划解法)

题目 5. 最长回文子串 - 力扣&#xff08;LeetCode&#xff09; 给你一个字符串 s&#xff0c;找到 s 中最长的 回文子串。 示例 1&#xff1a; 输入&#xff1a;s "babad" 输出&#xff1a;"bab" 解释&#xff1a;"aba" 同样是符合题意的答…