99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫Network security using SNORT 編程設計代做
代寫Network security using SNORT 程設計代做

時間:2024-10-25  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



Lab 3 : Network security using SNORT 
 
Introduction 
This Lab is a specialized virtual environment designed for the purpose of cybersecurity 
training and education. In today’s digital landscape, the importance of understanding and 
defending against cyber threats is paramount. This lab provides a practical, hands-on 
approach to learning various aspects of cybersecurity, including but not limited to 
penetration testing, network security, intrusion detection, and response strategies. 
 
Purpose 
The primary purpose of this Lab is to facilitate a comprehensive understanding and 
application of cybersecurity concepts and practices. 
 This lab environment allows users to: 
1. Provide a hands-on approach to learning offensive and defensive cybersecurity 
techniques using tools like Metasploitable, Kali Linux, and Ubuntu. 
2. Serve as an educational platform for aspiring cybersecurity professionals. 
3. Create a safe, controlled environment for experimentation. 
4. Enhance technical skills in network security and ethical hacking. 
Scope 
The scope of the Lab encompasses: 
1. Virtualization and Network Setup: Utilizing VMware for the creation and management 
of virtual machines, each hosting different operating systems (Metasploitable, Kali Linux, 
and Ubuntu) and configured in a host-only network to ensure isolation and safety. 
2. Tool Implementation and Configuration: Including Snort for intrusion detection. 
3. Learning Objectives: Focusing on providing hands-on experience in identifying 
vulnerabilities, conducting penetration tests, monitoring network traffic, and 
implementing defensive strategies. 
5. Resource Constraints: Designed to be efficient and functional within the constraints of 
8GB RAM, ensuring accessibility for users with limited hardware resources. Lab Requirements 
Hardware Requirements 
RAM: 8 GB of RAM. 
Storage: 30GB+ 
Operating Systems 
1. Metasploitable: This will act as the victim machine. Metasploitable is intentionally 
vulnerable to provide a training environment for security testing. 
https://sourceforge.net/projects/metasploitable/files/latest/download 
2. Kali Linux: This will be used as the attacker machine. Kali Linux comes with numerous 
pre-installed penetration testing tools. 
https://www.kali.org/get-kali/ 
3. Ubuntu: This will serve as the defense machine, where you’ll monitor the network and 
implement security measures. 
https://ubuntu.com/download/desktop 
Software Requirements 
1. Virtualization Software: VMWare. 
2. NIDS&NIPS: Snort https://www.snort.org/downloads#snort3-downloads 
Network 
In my environment I have this network: 
Kali — 192.168.152.128/24 
Metasploitable — 192.168.152.129/24 
Ubuntu — 192.168.152.130/24  
Network Illustration 
Note: My Kali did not receive its IP from virtual DHCP. If you have such problem too, 
then: 
> ip addr show eth0 
2: eth0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 
1000 
link/ether 00:0c:29:14:1d:0c brd ff:ff:ff:ff:ff:ff 
> sudo ip link set eth0 up 
> sudo dhclient eth0 
> ip addr show eth0 
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group 
default qlen 1000 
link/ether 00:0c:29:14:1d:0c brd ff:ff:ff:ff:ff:ff 
inet 192.168.152.128/24 brd 192.168.152.255 scope global dynamic eth0 valid_lft 1659sec preferred_lft 1659sec 
inet6 fe80::20c:29ff:fe14:1d0c/64 scope link proto kernel_ll 
valid_lft forever preferred_lft foreverb 
Setting Up Virtual Machines 
Setting Up Attacker Machine — Kali 
1. Download VMWare version for Kali. https://www.kali.org/get-kali/ 
2. Unpack 
3. Open file with `.wmx` extension 
Setting Up Victim Machine — Metasploitable 
1. Download https://sourceforge.net/projects/metasploitable/files/latest/download 
2. Unzip 
3. Open file with `.wmx` extension 
Setting Up Monitoring and Detection Machine — Ubuntu 
1. Download iso https://ubuntu.com/download/desktop 
2. Create a new Virtual Machine on VMWare 
3.  
4.  
5. choose ubuntu’s iso  
6.  
7.  
8.  
9.  
10.  
(then click next again 2 times) 
11.  
(then again) 
12. Finish 
13. Power On. Installation will be opened. 
14. Choose keyboard. (US) 
15.  
16.  
17. 
 
18. Choose Location 
19.  
20. 
 
Snort 
Snort is an open-source network intrusion prevention system (NIPS) and network intrusion 
detection system (NIDS) that is used for detecting and preventing network intrusions. It analyzes network traffic to identify malicious activity, logs packets, and can perform realtime
 traffic analysis and packet logging. 
 
Setting Up Snort 
sudo apt-get install snort -y 
2. Write their interface (you can learn it simply by running `ip a`. 
 
3. Network 
 
4. sudo ip link set ens33 promisc on 
5. 
vim /etc/snort/snort.conf 
6. change any to your ip range (mine is 192.168.152.0/24 ) 
 
7. Check the rules and other configurations 
snort -T -i ens33 -c /etc/snort/snort.conf 
You can see that snort is using prewritten rules:  
You can disable them by commenting these lines out: 
 
All rules besides $RULE_PATH/local.rules 
 
Now Snort is setup. Next thing to do is to write rules and detect them. Writing the First rule 
You can write them manually into `/etc/snort/rules/local.rules`. Or, in this 
website http://snorpy.cyb3rs3c.net/. Or, ChatGPT. 
 
Some notations here: 
1. choose action type 
2. choose protocol 
3. source ip/port 
4. destination ip/port 
5. id (every snort rule should have different id) 
6. revision number. Normally after each update of the rule this number increases by 
one 
7. Message you want to leave there 
8. Resulting rule. Copy it. 
alert icmp any any -> any any ( msg:"Someone is pinging"; sid:10000; rev:1; ) 
alert icmp any any -> $HOME_NET any ( msg:"Someone is pinging"; sid:10001; rev:1; ) 
Write the rules into /etc/snort/rules/local.rules file:  
This command will show alerts in real time: 
snort -q -l /var/log/snort/ -i ens33 -A console -c /etc/snort/snort.conf 
Ping to somewhere and get the alert. You also can try to ping from Kali to 
Metasploitable. 
 
Example of its application in unauthorized ssh connections 
alert tcp any any -> $HOME_NET 22 (msg:"Possible SSH Brute Force Attack"; flags:S; 
threshold:type both, track by_src, count 5, 
seconds 60; sid:10002; rev:1;) 
Explanation of the rule components: **3; alert tcp any any -> $HOME_NET 22: This part specifies that the rule is looking for 
TCP traffic from any source IP and port, going to any IP within your defined 
`HOME_NET` on port 22 (the default SSH port). 
**3; msg:”Possible SSH Brute Force Attack”: The message that will be logged when this 
rule is triggered. 
**3; flags:S: This looks for packets with the SYN flag set, which are used to initiate TCP 
connections. 
**3; threshold:type both, track by_src, count 5, seconds 60: This is a threshold condition. 
It tracks by source IP, and the rule triggers if there are 5 connection attempts (SYN 
packets) within 60 seconds. 
**3; sid:10002; rev:1: Every Snort rule needs a unique SID (Snort ID), and a revision 
number. 
Moreover, add this rule too. This is for checking single TCP connection: 
alert tcp any any -> $HOME_NET any (msg:"TCP Connection Attempt Detected"; flags:S; 
sid:10003; rev:1;) 
Write it to the file and run the command. 
Then, run Metasploitable and Kali. 
Check the rule TCP Connection Attempt Detected: 
  
You can see that we tried to connect to Metasploitable from Kali. 
Now let’s check Possible SSH Brute Force Attack. 
 
 
Drop 
Let’s now write a drop rule for getting rid of unwanted FTP connection. 
drop tcp any any -> $HOME_NET 21 (msg:"Possible FTP Brute Force Attack"; flags:S; 
threshold:type both, track by_src, count 5, seconds 20; sid:10004; rev:1;) 
Run ftp brute force with hydra in Kali: hydra -l "root" -P /usr/share/wordlists/rockyou.txt ftp://192.168.152.129 
 
Extract IPs that get detected: 
snort -q -l /var/log/snort/ -i ens33 -A console -c /etc/snort/snort.conf | grep "Possible FTP 
Brute Force Attack" | awk '{print $13}' | awk -F ":" '{print $1}' >> drops.txt 
 
Example of Snort’s Application in Detecting XSS 
alert tcp any any -> [Metasploitable_IP] 80 (msg:"XSS is Detected"; 
flow:to_server,established; content:"<script>"; http_uri; sid:10005; rev:1;) 
Add the rule to /etc/snort/rules/local.rules. 
Open deliberately vulnerable web 
application: http://192.168.152.129/dvwa/vulnerabilities/xss_r/ in my case. Write there 
the payload: <script>alert(1)</script>.  
Press Enter and get: 
 
You will get the alert: 
 
Bonus: Visualizing logs with web interface 
Write the alerts into log file. 
snort -q -l /var/log/snort/ -i ens33 -A console -c /etc/snort/snort.conf > 
/var/log/snort/alerts.txt 
Change directory to the place where logs are stored and open python server here. cd /var/log/snort 
python3 -m http.server 
Write this simple nodeJS application into app.js. 
// Import the Express module to create a web server 
const express = require('express'); 
// Import the Axios module for making HTTP requests 
const axios = require('axios'); 
// Create an instance of an Express application 
const app = express(); 
// Define the port number on which the server will listen 
const port = 3000; 
// URL of the API from which log data will be fetched. 
<blue_machine_ip>:<python_server_port>/log.file 
const api = 'http://192.168.152.130:8000/alerts.txt' 
 
// Define a function to convert log entries into HTML format 
const getLogsHtml = (logs) => { 
 return logs.map(log => 
 // Create an HTML structure for each log entry 
 `<div class="log-entry"> 
 <span class="timestamp">${log.timestamp}</span> 
 <p>${log.alert}</p> 
 </div>` 
 ).join(''); 
}; 
 // Define a route for the root ('/') URL 
app.get('/', async (req, res) => { 
 try { 
 // Fetch log data from the API using Axios 
 const response = await axios.get(api); 
 // Split the data by new line and create an array of log entries 
 const logEntries = response.data.split('\n'); 
 // Process each log entry and split it into timestamp and alert parts 
 const formattedLogs = logEntries.map(entry => { 
 const parts = entry.split(' '); 
 return { timestamp: parts[0], alert: parts.slice(1).join(' ') }; 
 }); 
 // Convert the log entries into HTML format 
 const logsHtml = getLogsHtml(formattedLogs); 
 // HTML template for the page 
 const htmlTemplate = '<!DOCTYPE html><html lang="en"><head><meta charset="UTF8"><meta
name="viewport" content="width=device-width, initial-scale=1.0"><title>Log 
Viewer</title><style>body { font-family: Arial, sans-serif; margin: 0; padding: 20px; 
background-color: #f4f4f4; } .log-entry { background-color: #fff; border: 1px solid #ddd; 
padding: 10px; margin-bottom: 10px; border-radius: 4px; } .timestamp { color: 
#888; }</style></head><body><h1>Log Entries</h1><div id="log-container"><!-- Log entries 
will be inserted here --></div></body></html>'; 
 // Insert the log entries HTML into the template 
 const finalHtml = htmlTemplate.replace('<!-- Log entries will be inserted here -->', 
logsHtml); 
 // Send the final HTML as the response 
 res.send(finalHtml); 
 } catch (error) { 
 // Handle any errors by sending a 500 error response  res.status(500).send('Error fetching logs'); 
 } 
}); 
 
// Start the server and listen on the specified port 
app.listen(port, () => { 
 console.log(`Server running on http://localhost:${port}`); 
}); 
Install required packages and run the web app: 
npm i express axios 
node app.js 
This code demonstrates a comprehensive setup for logging, serving, and displaying log 
data using a combination of Snort, Python, and Node.js. First, it configures Snort to write 
alerts to a log file and then starts a Python HTTP server in the directory where these logs 
are stored. Next, it outlines a Node.js application using Express and Axios to fetch and 
display these logs in a web browser, with a focus on converting log entries into an HTML 
format for easy viewing. Finally, it provides commands to install the necessary Node.js 
packages and run the web application, completing the end-to-end process of log 
management and visualization. 
You will have simple real-time Dashboard to see alerts. You may customize it for getting it 
more styled and add additional functionality to see other logs and actions.  
Submission: You need to submit a pdf report that show the implementation of the lab in 
your computer with a set of screenshots. For your deliverables, you should submit a PDF 
file with screen shots of your scans. Be sure to include the descriptions and analysis of 
your results. Also, include the reports from your scan. Your report should be wellorganized
and clearly written. 
Include your full name and id. 

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp





 

掃一掃在手機打開當前頁
  • 上一篇:代做COMP642、代寫Python編程設計
  • 下一篇:代寫program、代做c++,Java程序語言
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
    合肥機場巴士1號線
    合肥機場巴士1號線
  • 短信驗證碼 豆包 幣安下載 AI生圖 目錄網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                精品视频一区三区九区| 国产精品免费aⅴ片在线观看| 成人国产亚洲欧美成人综合网| 日韩精品乱码免费| 欧美精品自拍偷拍动漫精品| 亚洲成人激情综合网| 在线播放/欧美激情| 午夜视频在线观看一区| 日韩免费一区二区三区在线播放| 国产在线精品一区二区三区不卡 | 久久综合狠狠综合久久综合88| 日韩在线卡一卡二| 久久亚洲精品国产精品紫薇| 99re6这里只有精品视频在线观看| 亚洲美女视频一区| 日韩一区二区在线观看视频播放| 国产精品亚洲а∨天堂免在线| 亚洲图片你懂的| 精品国内片67194| 国产91露脸合集magnet| 一区二区三区电影在线播| 精品国产91乱码一区二区三区 | 国产精品污网站| 在线亚洲免费视频| 蓝色福利精品导航| 一区二区三区日韩精品视频| 欧美电视剧在线观看完整版| 91视频免费播放| 韩国三级在线一区| 亚洲国产精品久久久久秋霞影院| 久久综合九色综合欧美就去吻| 一本一本大道香蕉久在线精品 | 国产精品欧美一区喷水| 91精品国产综合久久精品麻豆| 99久久婷婷国产| 美女脱光内衣内裤视频久久影院| 久久久国产精品麻豆| 91麻豆精品国产91久久久久 | 国产激情视频一区二区在线观看| 亚洲夂夂婷婷色拍ww47| 欧美激情自拍偷拍| 精品第一国产综合精品aⅴ| 欧美日韩在线亚洲一区蜜芽| 成人av在线一区二区| 国产酒店精品激情| 美国十次了思思久久精品导航| 亚洲激情五月婷婷| 国产精品激情偷乱一区二区∴| 精品美女一区二区三区| 宅男噜噜噜66一区二区66| 欧美系列在线观看| 欧美网站一区二区| 欧美日本一区二区| 欧美日韩一本到| 欧美综合久久久| 欧美自拍丝袜亚洲| 日本韩国欧美在线| 欧美日韩亚洲综合| 欧美精品777| 日韩欧美一区二区三区在线| 日韩视频国产视频| 久久亚洲私人国产精品va媚药| 亚洲精品在线免费播放| 久久久久99精品国产片| 欧美日韩一级视频| 欧美性色综合网| 欧美日韩精品一区二区三区四区 | 99精品国产91久久久久久| 从欧美一区二区三区| 九色|91porny| 久久9热精品视频| 精品伊人久久久久7777人| 国产精品资源在线观看| 高清视频一区二区| 日本高清视频一区二区| 欧美视频在线一区| 日韩欧美国产午夜精品| 久久久久久夜精品精品免费| 国产精品―色哟哟| 亚洲免费在线观看| 日韩精品一卡二卡三卡四卡无卡| 日韩高清在线观看| 成人精品小蝌蚪| 制服丝袜亚洲网站| 中文字幕不卡的av| 亚洲一二三区在线观看| 强制捆绑调教一区二区| 国产成人精品午夜视频免费| 日本黄色一区二区| 久久久久国产精品麻豆| 亚洲高清视频的网址| 国产经典欧美精品| 欧美剧在线免费观看网站 | 欧美精品一区二区在线观看| 国产精品午夜久久| 日本中文字幕一区二区视频| 国产精品中文字幕日韩精品 | www.亚洲免费av| 欧美精品aⅴ在线视频| 一区二区中文字幕在线| 亚洲国产日韩在线一区模特| 国产麻豆精品theporn| 在线观看亚洲成人| 久久久久国产精品人| 午夜精品福利在线| 99久久精品久久久久久清纯| 欧美一级片免费看| 亚洲人123区| 国产成人综合亚洲网站| 91精品综合久久久久久| 亚洲夂夂婷婷色拍ww47| 99精品黄色片免费大全| 中文字幕免费不卡在线| 精品一区二区三区在线观看国产| 在线亚洲高清视频| 18欧美乱大交hd1984| 国产精品1区2区3区在线观看| 欧美区视频在线观看| 一区二区三区久久| 91免费视频大全| 国产精品污www在线观看| 国产在线精品不卡| 精品av综合导航| 久久精品国产一区二区三| 91精品视频网| 日本不卡一二三| 日韩欧美激情在线| 九九在线精品视频| 国产午夜亚洲精品午夜鲁丝片| 久99久精品视频免费观看| 日韩免费性生活视频播放| 久久99精品久久久久婷婷| 日韩一区二区三区观看| 美日韩一区二区三区| 精品国内片67194| 粉嫩一区二区三区在线看| 国产欧美日韩三级| 高清国产午夜精品久久久久久| 国产亚洲精品aa午夜观看| 成人精品gif动图一区| 久久久久久影视| 成人午夜av影视| 亚洲激情校园春色| 午夜影院久久久| 欧美日韩aaaaaa| 六月丁香婷婷久久| 久久午夜电影网| 成人黄色在线看| 国产精品久久久久久久久久久免费看 | 美女视频一区在线观看| 欧美xxxxx牲另类人与| 亚洲国产sm捆绑调教视频 | 国产99精品在线观看| 国产精品欧美久久久久无广告| 成人av电影在线播放| 久久综合久久鬼色中文字| 成人福利电影精品一区二区在线观看| 最新欧美精品一区二区三区| 在线观看欧美日本| 精品一二三四区| 亚洲免费av观看| 欧美精品xxxxbbbb| 国产一区二区三区视频在线播放| 国产视频亚洲色图| 91成人看片片| 国产自产v一区二区三区c| 中文字幕亚洲一区二区va在线| 欧洲激情一区二区| 精品一区二区在线免费观看| 亚洲少妇最新在线视频| 精品久久久网站| 欧美日韩视频在线一区二区| 国产宾馆实践打屁股91| 五月天精品一区二区三区| 国产精品你懂的在线| 欧美一二三区在线观看| 91免费看`日韩一区二区| 国产一区二区女| 一区二区欧美在线观看| 欧美国产视频在线| 欧美一区二区二区| 欧美性大战xxxxx久久久| 国产91精品免费| 久99久精品视频免费观看| 日韩av中文在线观看| 一区二区三区日韩欧美精品| 国产欧美综合在线观看第十页| 欧美精品国产精品| 色欧美乱欧美15图片| 成人免费黄色大片| 国产精品综合在线视频| 久久成人综合网| 日本欧美韩国一区三区| 亚洲一区二三区| 亚洲免费av在线| 国产精品灌醉下药二区| 久久久国产精品麻豆| 久久精品夜夜夜夜久久| 2024国产精品| 久久嫩草精品久久久久|