国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

代寫(xiě)Network security using SNORT 編程設(shè)計(jì)代做
代寫(xiě)Network security using SNORT 程設(shè)計(jì)代做

時(shí)間:2024-10-25  來(lái)源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯(cuò)



Lab 3 : Network security using SNORT 
 
Introduction 
This Lab is a specialized virtual environment designed for the purpose of cybersecurity 
training and education. In today’s digital landscape, the importance of understanding and 
defending against cyber threats is paramount. This lab provides a practical, hands-on 
approach to learning various aspects of cybersecurity, including but not limited to 
penetration testing, network security, intrusion detection, and response strategies. 
 
Purpose 
The primary purpose of this Lab is to facilitate a comprehensive understanding and 
application of cybersecurity concepts and practices. 
 This lab environment allows users to: 
1. Provide a hands-on approach to learning offensive and defensive cybersecurity 
techniques using tools like Metasploitable, Kali Linux, and Ubuntu. 
2. Serve as an educational platform for aspiring cybersecurity professionals. 
3. Create a safe, controlled environment for experimentation. 
4. Enhance technical skills in network security and ethical hacking. 
Scope 
The scope of the Lab encompasses: 
1. Virtualization and Network Setup: Utilizing VMware for the creation and management 
of virtual machines, each hosting different operating systems (Metasploitable, Kali Linux, 
and Ubuntu) and configured in a host-only network to ensure isolation and safety. 
2. Tool Implementation and Configuration: Including Snort for intrusion detection. 
3. Learning Objectives: Focusing on providing hands-on experience in identifying 
vulnerabilities, conducting penetration tests, monitoring network traffic, and 
implementing defensive strategies. 
5. Resource Constraints: Designed to be efficient and functional within the constraints of 
8GB RAM, ensuring accessibility for users with limited hardware resources. Lab Requirements 
Hardware Requirements 
RAM: 8 GB of RAM. 
Storage: 30GB+ 
Operating Systems 
1. Metasploitable: This will act as the victim machine. Metasploitable is intentionally 
vulnerable to provide a training environment for security testing. 
https://sourceforge.net/projects/metasploitable/files/latest/download 
2. Kali Linux: This will be used as the attacker machine. Kali Linux comes with numerous 
pre-installed penetration testing tools. 
https://www.kali.org/get-kali/ 
3. Ubuntu: This will serve as the defense machine, where you’ll monitor the network and 
implement security measures. 
https://ubuntu.com/download/desktop 
Software Requirements 
1. Virtualization Software: VMWare. 
2. NIDS&NIPS: Snort https://www.snort.org/downloads#snort3-downloads 
Network 
In my environment I have this network: 
Kali — 192.168.152.128/24 
Metasploitable — 192.168.152.129/24 
Ubuntu — 192.168.152.130/24  
Network Illustration 
Note: My Kali did not receive its IP from virtual DHCP. If you have such problem too, 
then: 
> ip addr show eth0 
2: eth0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 
1000 
link/ether 00:0c:29:14:1d:0c brd ff:ff:ff:ff:ff:ff 
> sudo ip link set eth0 up 
> sudo dhclient eth0 
> ip addr show eth0 
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group 
default qlen 1000 
link/ether 00:0c:29:14:1d:0c brd ff:ff:ff:ff:ff:ff 
inet 192.168.152.128/24 brd 192.168.152.255 scope global dynamic eth0 valid_lft 1659sec preferred_lft 1659sec 
inet6 fe80::20c:29ff:fe14:1d0c/64 scope link proto kernel_ll 
valid_lft forever preferred_lft foreverb 
Setting Up Virtual Machines 
Setting Up Attacker Machine — Kali 
1. Download VMWare version for Kali. https://www.kali.org/get-kali/ 
2. Unpack 
3. Open file with `.wmx` extension 
Setting Up Victim Machine — Metasploitable 
1. Download https://sourceforge.net/projects/metasploitable/files/latest/download 
2. Unzip 
3. Open file with `.wmx` extension 
Setting Up Monitoring and Detection Machine — Ubuntu 
1. Download iso https://ubuntu.com/download/desktop 
2. Create a new Virtual Machine on VMWare 
3.  
4.  
5. choose ubuntu’s iso  
6.  
7.  
8.  
9.  
10.  
(then click next again 2 times) 
11.  
(then again) 
12. Finish 
13. Power On. Installation will be opened. 
14. Choose keyboard. (US) 
15.  
16.  
17. 
 
18. Choose Location 
19.  
20. 
 
Snort 
Snort is an open-source network intrusion prevention system (NIPS) and network intrusion 
detection system (NIDS) that is used for detecting and preventing network intrusions. It analyzes network traffic to identify malicious activity, logs packets, and can perform realtime
 traffic analysis and packet logging. 
 
Setting Up Snort 
sudo apt-get install snort -y 
2. Write their interface (you can learn it simply by running `ip a`. 
 
3. Network 
 
4. sudo ip link set ens33 promisc on 
5. 
vim /etc/snort/snort.conf 
6. change any to your ip range (mine is 192.168.152.0/24 ) 
 
7. Check the rules and other configurations 
snort -T -i ens33 -c /etc/snort/snort.conf 
You can see that snort is using prewritten rules:  
You can disable them by commenting these lines out: 
 
All rules besides $RULE_PATH/local.rules 
 
Now Snort is setup. Next thing to do is to write rules and detect them. Writing the First rule 
You can write them manually into `/etc/snort/rules/local.rules`. Or, in this 
website http://snorpy.cyb3rs3c.net/. Or, ChatGPT. 
 
Some notations here: 
1. choose action type 
2. choose protocol 
3. source ip/port 
4. destination ip/port 
5. id (every snort rule should have different id) 
6. revision number. Normally after each update of the rule this number increases by 
one 
7. Message you want to leave there 
8. Resulting rule. Copy it. 
alert icmp any any -> any any ( msg:"Someone is pinging"; sid:10000; rev:1; ) 
alert icmp any any -> $HOME_NET any ( msg:"Someone is pinging"; sid:10001; rev:1; ) 
Write the rules into /etc/snort/rules/local.rules file:  
This command will show alerts in real time: 
snort -q -l /var/log/snort/ -i ens33 -A console -c /etc/snort/snort.conf 
Ping to somewhere and get the alert. You also can try to ping from Kali to 
Metasploitable. 
 
Example of its application in unauthorized ssh connections 
alert tcp any any -> $HOME_NET 22 (msg:"Possible SSH Brute Force Attack"; flags:S; 
threshold:type both, track by_src, count 5, 
seconds 60; sid:10002; rev:1;) 
Explanation of the rule components: **3; alert tcp any any -> $HOME_NET 22: This part specifies that the rule is looking for 
TCP traffic from any source IP and port, going to any IP within your defined 
`HOME_NET` on port 22 (the default SSH port). 
**3; msg:”Possible SSH Brute Force Attack”: The message that will be logged when this 
rule is triggered. 
**3; flags:S: This looks for packets with the SYN flag set, which are used to initiate TCP 
connections. 
**3; threshold:type both, track by_src, count 5, seconds 60: This is a threshold condition. 
It tracks by source IP, and the rule triggers if there are 5 connection attempts (SYN 
packets) within 60 seconds. 
**3; sid:10002; rev:1: Every Snort rule needs a unique SID (Snort ID), and a revision 
number. 
Moreover, add this rule too. This is for checking single TCP connection: 
alert tcp any any -> $HOME_NET any (msg:"TCP Connection Attempt Detected"; flags:S; 
sid:10003; rev:1;) 
Write it to the file and run the command. 
Then, run Metasploitable and Kali. 
Check the rule TCP Connection Attempt Detected: 
  
You can see that we tried to connect to Metasploitable from Kali. 
Now let’s check Possible SSH Brute Force Attack. 
 
 
Drop 
Let’s now write a drop rule for getting rid of unwanted FTP connection. 
drop tcp any any -> $HOME_NET 21 (msg:"Possible FTP Brute Force Attack"; flags:S; 
threshold:type both, track by_src, count 5, seconds 20; sid:10004; rev:1;) 
Run ftp brute force with hydra in Kali: hydra -l "root" -P /usr/share/wordlists/rockyou.txt ftp://192.168.152.129 
 
Extract IPs that get detected: 
snort -q -l /var/log/snort/ -i ens33 -A console -c /etc/snort/snort.conf | grep "Possible FTP 
Brute Force Attack" | awk '{print $13}' | awk -F ":" '{print $1}' >> drops.txt 
 
Example of Snort’s Application in Detecting XSS 
alert tcp any any -> [Metasploitable_IP] 80 (msg:"XSS is Detected"; 
flow:to_server,established; content:"<script>"; http_uri; sid:10005; rev:1;) 
Add the rule to /etc/snort/rules/local.rules. 
Open deliberately vulnerable web 
application: http://192.168.152.129/dvwa/vulnerabilities/xss_r/ in my case. Write there 
the payload: <script>alert(1)</script>.  
Press Enter and get: 
 
You will get the alert: 
 
Bonus: Visualizing logs with web interface 
Write the alerts into log file. 
snort -q -l /var/log/snort/ -i ens33 -A console -c /etc/snort/snort.conf > 
/var/log/snort/alerts.txt 
Change directory to the place where logs are stored and open python server here. cd /var/log/snort 
python3 -m http.server 
Write this simple nodeJS application into app.js. 
// Import the Express module to create a web server 
const express = require('express'); 
// Import the Axios module for making HTTP requests 
const axios = require('axios'); 
// Create an instance of an Express application 
const app = express(); 
// Define the port number on which the server will listen 
const port = 3000; 
// URL of the API from which log data will be fetched. 
<blue_machine_ip>:<python_server_port>/log.file 
const api = 'http://192.168.152.130:8000/alerts.txt' 
 
// Define a function to convert log entries into HTML format 
const getLogsHtml = (logs) => { 
 return logs.map(log => 
 // Create an HTML structure for each log entry 
 `<div class="log-entry"> 
 <span class="timestamp">${log.timestamp}</span> 
 <p>${log.alert}</p> 
 </div>` 
 ).join(''); 
}; 
 // Define a route for the root ('/') URL 
app.get('/', async (req, res) => { 
 try { 
 // Fetch log data from the API using Axios 
 const response = await axios.get(api); 
 // Split the data by new line and create an array of log entries 
 const logEntries = response.data.split('\n'); 
 // Process each log entry and split it into timestamp and alert parts 
 const formattedLogs = logEntries.map(entry => { 
 const parts = entry.split(' '); 
 return { timestamp: parts[0], alert: parts.slice(1).join(' ') }; 
 }); 
 // Convert the log entries into HTML format 
 const logsHtml = getLogsHtml(formattedLogs); 
 // HTML template for the page 
 const htmlTemplate = '<!DOCTYPE html><html lang="en"><head><meta charset="UTF8"><meta
name="viewport" content="width=device-width, initial-scale=1.0"><title>Log 
Viewer</title><style>body { font-family: Arial, sans-serif; margin: 0; padding: 20px; 
background-color: #f4f4f4; } .log-entry { background-color: #fff; border: 1px solid #ddd; 
padding: 10px; margin-bottom: 10px; border-radius: 4px; } .timestamp { color: 
#888; }</style></head><body><h1>Log Entries</h1><div id="log-container"><!-- Log entries 
will be inserted here --></div></body></html>'; 
 // Insert the log entries HTML into the template 
 const finalHtml = htmlTemplate.replace('<!-- Log entries will be inserted here -->', 
logsHtml); 
 // Send the final HTML as the response 
 res.send(finalHtml); 
 } catch (error) { 
 // Handle any errors by sending a 500 error response  res.status(500).send('Error fetching logs'); 
 } 
}); 
 
// Start the server and listen on the specified port 
app.listen(port, () => { 
 console.log(`Server running on http://localhost:${port}`); 
}); 
Install required packages and run the web app: 
npm i express axios 
node app.js 
This code demonstrates a comprehensive setup for logging, serving, and displaying log 
data using a combination of Snort, Python, and Node.js. First, it configures Snort to write 
alerts to a log file and then starts a Python HTTP server in the directory where these logs 
are stored. Next, it outlines a Node.js application using Express and Axios to fetch and 
display these logs in a web browser, with a focus on converting log entries into an HTML 
format for easy viewing. Finally, it provides commands to install the necessary Node.js 
packages and run the web application, completing the end-to-end process of log 
management and visualization. 
You will have simple real-time Dashboard to see alerts. You may customize it for getting it 
more styled and add additional functionality to see other logs and actions.  
Submission: You need to submit a pdf report that show the implementation of the lab in 
your computer with a set of screenshots. For your deliverables, you should submit a PDF 
file with screen shots of your scans. Be sure to include the descriptions and analysis of 
your results. Also, include the reports from your scan. Your report should be wellorganized
and clearly written. 
Include your full name and id. 

請(qǐng)加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp





 

掃一掃在手機(jī)打開(kāi)當(dāng)前頁(yè)
  • 上一篇:代做COMP642、代寫(xiě)Python編程設(shè)計(jì)
  • 下一篇:代寫(xiě)program、代做c++,Java程序語(yǔ)言
  • 無(wú)相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    流體仿真外包多少錢_專業(yè)CFD分析代做_友商科技CAE仿真
    流體仿真外包多少錢_專業(yè)CFD分析代做_友商科
    CAE仿真分析代做公司 CFD流體仿真服務(wù) 管路流場(chǎng)仿真外包
    CAE仿真分析代做公司 CFD流體仿真服務(wù) 管路
    流體CFD仿真分析_代做咨詢服務(wù)_Fluent 仿真技術(shù)服務(wù)
    流體CFD仿真分析_代做咨詢服務(wù)_Fluent 仿真
    結(jié)構(gòu)仿真分析服務(wù)_CAE代做咨詢外包_剛強(qiáng)度疲勞振動(dòng)
    結(jié)構(gòu)仿真分析服務(wù)_CAE代做咨詢外包_剛強(qiáng)度疲
    流體cfd仿真分析服務(wù) 7類仿真分析代做服務(wù)40個(gè)行業(yè)
    流體cfd仿真分析服務(wù) 7類仿真分析代做服務(wù)4
    超全面的拼多多電商運(yùn)營(yíng)技巧,多多開(kāi)團(tuán)助手,多多出評(píng)軟件徽y1698861
    超全面的拼多多電商運(yùn)營(yíng)技巧,多多開(kāi)團(tuán)助手
    CAE有限元仿真分析團(tuán)隊(duì),2026仿真代做咨詢服務(wù)平臺(tái)
    CAE有限元仿真分析團(tuán)隊(duì),2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內(nèi)
    釘釘簽到打卡位置修改神器,2026怎么修改定
  • 短信驗(yàn)證碼 寵物飼養(yǎng) 十大衛(wèi)浴品牌排行 suno 豆包網(wǎng)頁(yè)版入口 wps 目錄網(wǎng) 排行網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號(hào)-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    久久伊人资源站| 欧美日本高清一区| 国产精品一级久久久| 国产一区二区在线免费| 麻豆精品视频| 国产日韩精品一区观看| 国产九九精品视频| 精品视频免费观看| 国产女人18毛片| 国产精品一区视频网站| 99超碰麻豆| 国产精品91久久久| 久久久久福利视频| www高清在线视频日韩欧美| 色婷婷久久av| 国产精品欧美激情在线观看| 国产精品国产一区二区| 国产99久久精品一区二区 | 永久免费看av| 亚洲一区二区三区精品动漫| 污视频在线免费观看一区二区三区| 日本欧美精品在线| 免费一级特黄毛片| 高清欧美性猛交| 久久综合九色综合88i| 久久久久久美女| 国产精品国产精品国产专区蜜臀ah | 欧美一区二区中文字幕| 欧美成人一区二区在线观看| 国产男女在线观看| 久久亚洲国产成人精品无码区| 久久久免费观看视频| 日韩有码在线观看| 精品久久久久av| 色哺乳xxxxhd奶水米仓惠香| 欧美综合激情| 国产精品一区在线免费观看| 国产高清在线一区二区| 国产精品久久久久久久久婷婷| 一区二区精品国产| 欧美日韩精品综合| 97久久精品国产| 国产精品入口夜色视频大尺度| 亚洲一区二区不卡视频| 欧美有码在线视频| 成人a级免费视频| 久久久久久久久电影| 欧美精品一区二区免费| 亚洲av首页在线| 黄色www网站| 97免费高清电视剧观看| 国产精品久久一| 婷婷五月综合缴情在线视频| 免费国产黄色网址| 国产厕所精品在线观看| 欧美激情精品久久久久久黑人 | 在线观看免费黄色片| 欧美专区一二三| 成人国产亚洲精品a区天堂华泰| 精品国产欧美一区二区三区成人| 欧美另类69精品久久久久9999| 午夜精品蜜臀一区二区三区免费| 国内外免费激情视频| 久久99精品久久久久久三级| 亚洲天堂av免费在线观看 | 日韩视频在线观看国产| 成人免费a级片| 国产精品电影网站| 欧美性久久久久| 国产福利视频在线播放| 久久久久国产视频| 国产性生交xxxxx免费| 久久精品夜夜夜夜夜久久| 日本欧美一二三区| 97久久精品人搡人人玩| 久操成人在线视频| 黄页免费在线观看视频| zzjj国产精品一区二区| 日本伊人精品一区二区三区介绍| 国产男女无遮挡| 精品国产一区二区三区四区vr | 国产精品一区二区三区在线观| 久久精品视频一| 欧美一区少妇| 日韩在线视频一区| 日本高清不卡一区二区三| 99久久免费观看| 亚洲自拍中文字幕| 波多野结衣久草一区| 久久久久久91| av在线播放亚洲| 亚洲高清精品中出| 91精品国产乱码久久久久久久久| 在线一区亚洲| 91精品视频在线看| 天天好比中文综合网| 国产成人一二三区| 人人妻人人澡人人爽精品欧美一区| 国产成人91久久精品| 人人妻人人澡人人爽欧美一区双| 日日摸夜夜添一区| 韩国成人一区| 国产精品加勒比| 中文字幕一区综合| 国产精品96久久久久久| 日韩av高清不卡| 色偷偷91综合久久噜噜| 欧美激情精品久久久久久小说| 国产精品视频播放| 国产日韩欧美黄色| 亚洲欧美综合一区| 久久99蜜桃综合影院免费观看| 日韩精品一区二区三区丰满| 国产精品伦子伦免费视频| 国产人妻人伦精品| 午夜精品一区二区三区av| 日韩亚洲精品视频| 黄瓜视频免费观看在线观看www| 欧美xxxx做受欧美.88| 97精品国产97久久久久久粉红| 日本一区视频在线| 国产精品沙发午睡系列| 国产欧美精品在线播放| 亚洲aaa激情| 日韩在线视频免费观看高清中文| 蜜臀精品一区二区| 综合色婷婷一区二区亚洲欧美国产 | 国产精品88久久久久久妇女| 欧美一区二区三区在线播放| 国产l精品国产亚洲区久久| 日韩免费高清在线观看| 国产精品欧美激情在线观看| 国产日韩在线亚洲字幕中文| 视频一区二区三| 久久中文字幕视频| 国产成一区二区| 国产专区精品视频| 亚洲va国产va天堂va久久| 久久精品在线视频| 99视频在线免费观看| 欧美性大战久久久久| 亚洲在线欧美| 国产精品欧美在线| 91高清免费在线观看| 欧美激情第六页| 亚洲成人午夜在线| 精品国产一区二区三区在线| 久久久久无码国产精品一区| 国产日韩精品推荐| 欧美日韩视频免费在线观看 | 久久久久久欧美| 国产伦精品一区| 日韩国产欧美一区| 欧美激情一区二区三区久久久| 久久99精品久久久久久水蜜桃| 国产精品一二三视频| 免费国产黄色网址| 日韩精品―中文字幕| 亚洲一区二区久久久久久| 精品乱子伦一区二区三区| 国产成人午夜视频网址| 久久久欧美精品| 成人免费福利视频| 韩国精品久久久999| 日韩欧美xxxx| 日韩福利视频| 亚洲免费av网| 欧美激情视频网址| 国产精品高潮粉嫩av| 色阁综合伊人av| 久久大香伊蕉在人线观看热2| 波多野结衣久草一区| 国产美女久久精品香蕉69| 欧美大香线蕉线伊人久久国产精品| 日本一区网站| 日韩av三级在线| 天天综合狠狠精品| 午夜精品久久久久久久久久久久 | 午夜精品久久久久久久99热浪潮| 精品国产一区二区三区麻豆免费观看完整版 | 日本在线成人一区二区| 亚洲国产欧美不卡在线观看| 国产av第一区| 欧美日韩成人免费| 萌白酱国产一区二区| 久久99久久99精品免观看粉嫩| 国产精品欧美一区二区| 国产精品网站大全| 精品国产一区久久久| 国产精品视频播放| 久久亚洲精品视频| 色综合导航网站| 最新欧美日韩亚洲| 亚洲一区二区中文| 亚洲国产日韩欧美| 日本一本a高清免费不卡| 日本十八禁视频无遮挡| 日韩精品一区二区三区四| 欧美亚洲黄色片| 免费精品视频一区二区三区|