230 likes | 728 Views
Jason Booth – Intrusion Detection System . Snort: . Snort / Drawbacks IDS - Theory IDS – Test Practical IDS Setup Scripts Oink-Master Snort-MySql Log Files Location What is logged. Overview.
E N D
Snort / Drawbacks IDS - Theory IDS – Test Practical IDS Setup Scripts Oink-Master Snort-MySql Log Files Location What is logged Overview
Snort is an Intrusion Detection System. It generally runs on a Bastion Server (Server with one purpose). This helps to limit the possible attack points on the Bastion Server. What is SNORT?
Drawbacks • Slower network (more overhead) • The IDS can become an intrusion point in and of itself • Laws limit what can be logged from a packet. • IDS is only as good as its definition rules
[**] [1:1384:8] MISC UPnP malformed advertisement [**] [Classification: Misc Attack] [Priority: 2] 02/23-10:20:29.041905 192.168.0.1:1900 -> 239.255.255.250:1900 UDP TTL:127 TOS:0x0 ID:17771 IpLen:20 DgmLen:346 Len: 318 [Xref => http://www.microsoft.com/technet/security/bulletin/MS01-059.mspx] [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0877] [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2001-0876] [Xref => http://www.securityfocus.com/bid/3723] What snort logs
Prioritizing with classification.config config classification: successful-dos, Denial of Service, 2 http://www.linux.com/articles/29830 Snort Priority
Practical IDS • Choose a setup that is practical and cost effective for yourself or business yet offer a fast response to intrusions.
Setup Scripts • /var/log/syslog for • a line that looks like this: • snort[1731]: Snort initialization completed successfully (pid=1731)
Setup Scripts • /var/snort • Goto setup.txt file to demonstrate this.
SNORT Rules • The rules are the vital part of snort. There are various categories of rules shipped with snort. They can be found in /etc/snort/, ending with *.rules.
OinkMaster • “If you have many sensors, it can be a very difficult job to keep all the • rules current on all of your sensors. A great tool for this task is Oinkmaster” • (http://www.snort.org/docs/setup_guides/deb-snort-howto.pdf)
Snort-Mysql • Snort supports mysql. In the snort.confg • # vim /etc/snort/snort.conf • Find this line below, uncomment the line, and then add your appropriate values: • output database: log, mysql, user=snort password=mypass dbname=snort host=localhost • Go restart snort and verify its writing to the database. Easiest way is to • get into mysql and "select * from event" and you should see lots of events • if you still have the alerting going on for each packet or the icmp rule. • Or you can run this command: • # mysql -uroot -pmypassword -D snort -e "select count(*) from event"
Points of Reference • http://www.snort.org/docs/ • Google it! • Snort • Snort-mysql • IDS • Linux and snort • Careers with IDS and snort
Mis. Section • Snort in promiscuous mode
Poisoning the network • I'm having a very anoying problem in my LAN: someone (or a virus?) is sending ARP messages like the following (in human words): • "I am computer with mac de:ad:de:ad:de:ad and with IP <victim's IP> and I am asking everyone (destination MAC ff:ff:ff:ff:ff:ff): does anyone else have this IP?" • http://www.webservertalk.com/message1217112.html
Question? • How does snot know its been penetrated? • It looks the packets and determines the payload.
Conclusion • Snort is a versatile and strong network IDS – tool. When used correctly a network admin can have a great deal of network info with low cost in overhead.