Introduction To Snort IDS

preview_player
Показать описание
This video will provide you with an introduction to the Snort IDS/IPS by explaining how Snort works and outlines the structure of a Snort rule. An IDS is a system/host planted within a network to capture traffic and identify malicious activity based on predefined rules, after which, this malicious activity is logged, and a notification is sent to the relevant parties informing them of an intrusion.

//LINKS

//PLATFORMS

//SOCIAL NETWORKS

//BOOKS

//SUPPORT THE CHANNEL

//CYBERTALK PODCAST

//WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة

-----------------------------------------------------------------------------------
#Cybersecurity#BlueTeam
Рекомендации по теме
Комментарии
Автор

I say this as a cybersecurity manager: if you want to get into cybersecurity, these blue teams skills are the correct path to learn. forget learning how to hack for now.

next is to learn should be automation, powershell and dont forget packet sniffing.

Just blue team skills & security plus will get you in a soc quickly.

WarRior-rnkb
Автор

you broke it down so well!! thank you so much!!!!

lilsushiboi
Автор

You have the best content on YouTube!!!

אלירוזן-ספ
Автор

Thank you for the information!! I have been using snort for 6 months and try to figure out how to use it, other the command service.

gamereditorner
Автор

Hi want more content about this. Great video. Great opportunity to learn but need advanced rule making using snort.
Thank you😊

anusha
Автор

Do you have a video on how to setup the lab environment? That would be really helpful, thank you

dmoney_thegreat
Автор

I have a question!

When firewall is there to protect the network, then why do we need the IPS?

tayyab.sheikh
Автор

Great stuff, really looking forward to this..

Armmani
Автор

Thanks Alexis for refreshing fundamentals, grate content as usual.

tiomx
Автор

Why am I getting only broadcast messages? Do i need a hub device to capture all packets entering the network?

paulgiovanni
Автор

Chaitu bro smvt bangalore express last coaches damage ayyaya leka engine tareata coaches damage ayyaya

telugutraintraveller
Автор

Hey Guys trying to write snort rule for trigger an alert when there is ngrok use and got stuck,
Is there someone hav an idea for snort rule for this one?

vm
Автор

Dear Hackersploit,

Thank you for making such a great bootcamp for us. I really appreciated it. So, I want to configure IDS/IPS for my mobile phone as well. Its operating system is Android. Do you know how I may do it? Can you please show us how we can implement Blue Team practices in our phone operating systems?

anargaziev
Автор

Hats off to hackersploit this guy is doing great and providing free content and valuable stuff every time

user-tz
Автор

Is your Kali VM in a different "NAT Network" or is in the same NAT network as the UBuntu and metasploitable 2 vm?

benettogeorge
Автор

Like every time great content. Thanks a lot ✌️

elikelik
Автор

Hello, can you make a development video of the snort dynamic preprocessor? He is very useful and very powerful.

learningdeep
Автор

So much content, where can I access all the PowerPoints?

dariusvlogs
Автор

shouldn't it be placed behind the firewall?

TadakichiSan
Автор

Nice content. I immediately started thinking how you might used this offensively if you had a few minutes if physical access to a target. To leave persistent monitoring and attack vector. I have a new project to look into.

deletedaxiom