What is some of the information contained in the results

Assignment Help Operating System
Reference no: EM131395742

Lab: Using Snort IDS

Lab Procedure

The following requirements must be met in order to set up this lab:

• VirtualMachine from Lab 1 (Ubuntu Linux 14.04 VM in either VMware or Virtual Box)
• Internet access for adding packages to the install of Ubuntu

Logging Into VM

1. When Ubuntu starts, LightDM will show normal-user selected. Type in the password you used during the installation and press <Enter>.

2. Type <ALT>+<F2>, which will bring up the "Run Command" menu. Type in "gnome-terminal" and press <Enter>. You can also select the terminal if it was attached to the Launcher panel.

3. This will load up a terminal to run commands with. With the terminal open, the operating system will need to be updated before continuing (even since you completed Lab 2). Type in the following to update and install security patches for Ubuntu:

sudo apt-get update &&sudo apt-get -y dist-upgrade
(You will be prompted to type in your password)

4. Once the update is complete, click the gear in the top right corner and select "Shut down" and then select "Restart" to reboot the system.

Installing the Snort Package

1. For the purposes of this lab, we will use the Snort package, which is included as an Ubuntu package. Open up the terminal and run the following command to install Snort and Apache2, which will be used for demonstration of web detection.

sudo apt-get install -y snort apache2

2. Type "snort -V" to verify that Snort is installed correctly. The output in the terminal should look similar to the screenshot in Figure 1.

Figure 1: Screenshot of Snort Running a Version Check

3. Run the following command to test the Snort configuration.

sudo snort

4. Snort will start up and validate the configuration. The output will look similar to Figure 2.

Figure 2: Output From Snort Validate

Lab Assignment

Using similar information to Hands-On Project 8-4 on pages298-299 in our textbook, perform the following steps to explore Snort's Logging function:

1. If necessary, open the terminal window in Linux, type sudo snort -vd but do not press Enter yet.

2. Open a Web browser (the Firefox icon is on the Launcher Panel on the left). In the address bar, type www.snhu.edu, but do not press Enter yet.

3. Go back to the terminal window and press Enter. Then immediately go back to the Web browser window and press Enter.

4. Go back to the terminal window and press Ctrl+C quickly and examine the results.

5. Take a series of screenshots and paste them to a Word document to show your results. Submit these along with answers to the questions below.

Lab Questions

1. Lab Question 1: Take a look at the information captured in the above lab. What is some of the information contained in the results?

2. Lab Question 2: Snort rules are written into a text file that can be easily viewed by a security engineer or analyst (with the exception being shared object rules). Is this a good thing? Think of a reason why this may be a bad thing (Hint: Think about the attacker).

3. Lab Question 3: Open-source Snort provides complete control over how it is deployed. What are some of the limitations to how Snort was configured for this lab that might be different in an enterprise setting?

4. Lab Question 4: Research and explain the difference between the "alert" Snort action and "drop" action. What is required to use the drop action in Snort?

Attachment:- Lab_Assignment.rar

Reference no: EM131395742

Questions Cloud

Choose two macroeconomic issues : Choose two macroeconomic issues that have been in the news this past week. Explain thembriefly (about two paragraphs each) so we can all understand why they have been in thenews. I.e. tell us why we should want to know about them and how they will..
Compare and contrast the different types of idps technology : Compare and contrast the different types of IDPS technology and describe any prior experience using any of the tools.
Whether definitions are stipulative or lexical - assault : Determine whether the following definitions are stipulative, lexical, precising, theoretical, or persuasive.- "Assault" means, for legal purposes, an intentional and unprivileged act resulting in the apprehension of an immediate harmful or offensiv..
Point price elasticity of demand for whole-life insurance : What is the point price elasticity of demand for whole-life insurance? What is the point price elasticity of demand for term insurance? Evaluate the percentage change in whole-life demand given a 1% change in the price of term insurance. Is term..
What is some of the information contained in the results : IT 643- Take a look at information captured in above lab. What is some of information contained in results? What are some of limitations to how Snort was configured for this lab that might be different in an enterprise setting?
Whether definitions are stipulative or lexical - television : Determine whether the following definitions are stipulative, lexical, precising, theoretical, or persuasive.- "Television" means the electronic medium that keeps an entire nation of viewers in a state of seminarcosis by feeding them a steady stream ..
Whether definitions are stipulative or lexical - obelisk : Determine whether the following definitions are stipulative, lexical, precising, theoretical, or persuasive.- "Obelisk" means an upright, four-sided pillar that terminates in a pyramid; a dagger.
What is luminous generating breakeven sales volume : What is Luminous Generating's breakeven sales volume (in units) for smoke detectors? Calculate the degree of operating leverage at a projected volume of 300,000 units and explain what the DOL means.
Which of the following is a major criticism of freud theory : Which of the following is a major criticism of Freud's theory? Which of the following research methods permits inferences about cause-and-effect relationships

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd