Implementing IDs
Implementing IDs
Implementing IDS
Many vendors supply IDSs, and each of these systems has its own strengths and
weaknesses. Deciding which system is best for a particular environment depends
on many factors, including the network environment, security level required,
budget constraints, and the skill level of the person who will be working directly
with the IDS.
4.3.1 Snort
Snort is perhaps the most well-known open source IDS available. It is a software
implementation installed on a server to monitor incoming traffic. It typically works
with a host-based firewall in a system in which both the firewall software and
Snort run on the same machine. Snort is available for UNIX, Linux, Free BSD, and
Windows. The software is free to download, and documentation is available at the
website: www.snort.org. Snort works in one of three modes: sniffer, packet
logger, and network intrusion-detection.
4.3.1.1 Sniffer
Packet logger mode is similar to sniffer mode. The difference is that the packet
contents are written to a text file log rather than displayed in the console. This can
be more useful for administrators who are scanning a large number of packets for
specific items. Once the data is in a text file, users can scan for specific
information using a word processor’s search capability.
The Cisco brand is widely recognised and well respected in the networking
profession. Along with their firewalls and routers, Cisco has several models of
intrusion detection, each with a different focus/purpose. In the past, Cisco had two
specific, widely used IDS products, the Cisco IDS 4200 Series Sensors and Cisco
Catalyst 6500 Series Intrusion-Detection System (IDSM-2) Services Module.
There are a number of products in this group, notably the Firepower 4100 series,
the Firepower 8000 series, and the Firepower 9000 series. All the products include
malware protection as well as sandboxing. These Cisco products also integrate
cyber threat intelligence features.
The 4100 series is meant for small networks and the 9000 series is designed for
large scale networks. One of the chief benefits of using Cisco security products is
their widespread use across the industry and the availability of good training. The
fact that so many organisations use Cisco indicates a high level of successful field
testing, which generally indicates a reliable product. Cisco also sponsors a range of
certifications on its products, making it easier to determine whether someone is
qualified on a particular Cisco product.
In this exercise you are required to install Snort on Windows Server and capture
data for analysis.
Login to Windows Server and open the desktop folder Exercises -> Snort. Double
click the Snort Installer file to install it.
Copy the file snort.conf from the Desktop folder Exercises -> Snort to C:\Snort\etc
and overwrite the file that is already there. Copy the file local.rules from the
Desktop folder Exercises -> Snort to C:\Snort\rules.
Open the file local.rules using WordPad. Under the LOCAL RULES section there
are different rules having a header and a body. The first rule detects a SYN scan
and the second rule detects an ACK scan.
On the folder Exercises -> Snort double click the file WinPcap to install it. Click
Next on the WinPcap Setup window and then click I Agree. Click Install on the
next window and leave the check mark on Automatically start the WinPcap driver
at boot time.
Once the installation finishes click on Finish.
Open a command prompt by right clicking the Start button and select Command
Prompt (Admin).
Type cd C:\Snort\bin where bin is the default directory where the snort executable
resides.
Type the following command “snort –c C:\Snort\etc\snort.conf –i1 –l C:\Snort\log
–A console” and press enter. The option –c tells Snort to find the configuration
file. The option –i1 tells Snort to capture on interface 1. The –l option tells Snort to
log alerts and where to save them. The –A console option tells Snort to send alerts
also to the console. This option is normally not used because it slows down
detection and Snort may drop
packets.
Login to Ubuntu Server and run the comannd nmap –A 192.168.1.20. Allow the
scan to complete and then check the Snort command prompt on Windows Server.
Switch to the Windows Server and on the Snort command prompt you should see 5
SYN scan alerts and 5 ACK scan allerts. Press Control + C to stop Snort.