Intrusion Detection System Part 3: Snort
-n
-N Turn off logging (alerts still work)
-o Change the rule testing order to Pass|Alert|Log
-O Obfuscate the logged IP addresses
-p Disable promiscuous mode sniffing
-P
-q Quiet. Don't show banner and status report
-r
-s Log alert messages to syslog
-S
-t
-u
-v Be verbose
-V Show version number
-? Show this information
Let's check out the next command wherein we set Snort to a verbose display of the packets sniffed and analyzed. The '-v' switch elicits a verbose response to Stdout. The '-d' switch elicits dumping the decoded application layer data and while '-e' shows the decoded ethernet headers. The '-i' switch specifies the interface to be monitored for packet analysis. The '-h' switch specifies which class of network packets has to be captured. e.g. - The command given below captures all the packets belonging to the class C internal IP's of the type 192.168.1.*.
freeos:~ # snort -v -d -e -i eth0 -h 192.168.1.0/24
If we wanted to generate alerts, the '-A' switch is of importance to us.
-A
freeos:~ # snort -v -d -e -i eth0 -h 192.168.1.0/24 -A fast
Instead, if you wanted to send alert messages to the syslog daemon, you could use the '-s' switch instead.
-s - Send alert messages to Syslog. On Linux boxes, they will appear in /var/log/secure or /var/log/messages on many other platforms.
- « first
- ‹ previous
- of 5
- next ›
- last »