Using Snort Stealthily 148
jukal writes "Linux Journal has an article on using Snort as stealth sniffer, a stealth NDIS probe and stealth loger -- on a network interface with no IP address. 'Snort is a versatile and powerful tool for sniffing, intrusion detection and packet logging. Configuring it to run stealthily in sniffing mode or NIDS mode is easy; incorporating it into a stealth-logging solution is only slightly less so'"
Re:Simple... (Score:2)
Use the right tool for the right job. In this case, switch out that fiber GBIC for a Cu GBIC and use a Cu-Gig card in the sensor.
Snort UI (Score:2, Insightful)
Regardless- has anyone made any good UI to use it? I really liked the way "sniffit" worked with interactive mode. Maybe someone could design a UI and call it "sniffles" or whatever. The stealth mode version could be called "silent sneeze"
Re:Snort UI (Score:3, Informative)
The "133t hax0r" type you mentioned is much more likely to be trying to avoid snort than deploying it.
You can find some snort enhancements [oldhand.org] at this site. Have fun.
Re:Snort UI (Score:1)
Here is a great setup guide for snort including webmin and the snort plugin:
http://www.snort.org/docs/snort-rh71-mys
I have been using Snort since 1.8.3. It has not always been easy to configure, use, understand. It has helped us find an close at least one security issue.
Re:Snort UI (Score:2)
Check the screenshots [demarc.com], and you'll see what I mean.
It's not open source, but it is free for personal use and by far the best Ui for snort. We use it here at work. It also does some tripwire and Big brother type stuff.
IPCop has one (Score:2)
Cheers,
Jim
Snort is passive (Score:2)
If you set it up and get familiar with it, you'll see that this is a good thing, due to the nature of it - it is sometimes overly-paranoid and the level of false-positives is very high. If it blocked all of the stuff it thought was an intrusion, you'd never get too much done.
That said, I have heard of tools that use Snort to trigger the insertion of firewall rules based upon certain types of 'intrusions'.
Snort's a great learning tool, but don't think it's actually *protecting* anything.
If you don't read its logs, it's like a security camera that nobody watches...
Cheers,
Jim
Great! (Score:1)
Re:Great! (Score:2)
you mean clip the #1 and #2 wires at the computer end ? [cisco.com]
I'll have to try that
Re:Great! (Score:1, Interesting)
I just insert the comment as part of puresecures init script.
Re:Great! (Score:1)
Re:Great! (Score:2)
What would a "Network Detection Intruder System" be BTW? An intrusion system which detects networks?
Re:Great! (Score:1)
were spent at Counterpane Internet Security) and I never heard of a NDIS.
Network Detection Intruder System?
Is this for intruding on Network Detection setups?
Even more simple ... (Score:1)
If you're THAT worries about security, I have 3 words for you:
Build a firewall!!!
(and don't make your firewall similar to swiss cheese by poking lots of holes in it!)
Re:Even more simple ... (Score:2, Insightful)
Re:Even more simple ... (Score:5, Insightful)
There are two primary reasons for hack-attacks originating inside a firewalled-zone:
1. A trojaned system, usually due to poor Antivirus policy and/or poor user education.
2. A Disgruntled employee who is out to get you!
Obviously, the best solutions to these problems are to implement a good Antivirus product and virus protection policy, and to keep your employees happy!
Unfortunately, no matter how hard you try, there are always likely to be problems you have not forseen - which is where Sniffers and NIDS tools come in. Whilst these tools are also not the sole answer to anyone's prayers, they can often help as part of an overall security system implementation.
Snort is (IMHO) one of the best NIDS tools out there - I have used Snort for a couple of years as part of an integrated security solution, and the logfiles it generates, once properly parsed, have helped me track down a number of threats to network security, and plug any holes present before the problems became serious.
Firewalls are not a panacea, nor are NIDS tools, used together though, they are much more than the sum of their parts....
Re:Even more simple ... (Score:2)
For instance, http is probably something that you're going to allow through your firewall. Snort can detect nimda signatures in the http traffic. You're firewall won't.
I'll admit to not having read the article, mostly because the description seems very close to what we do at my job. We use Snort on an interface that has no ip address, and plug it into a port on the switch that mirrors the traffic from the router. This is done at every entry point into our network, and a few internal points as well. The logs are sent through a second ethernet card (with ip) to a mysql database using ACID (Analysis Console for Intrusion Detection.) [sourceforge.net] Once we got the rules tweaked, it became a fairly useful and easy tool to use.
Re:Even more simple ... (Score:4, Insightful)
The best analogy for defending your networks is a castle. Castles have moats, walls and an inner keep, all to protect the treasures of the kingdom (jewels, the princess, etc.). But, none of that does you any good without sentries watching the moat and walls who can report to the Captain of the Watch anything out of the norm. Your network defense should consist of a hardened router(the moat), firewall and DMZ (walls), and your private networks (the keep). You should have intrusion detection systems, syslogs from routers and firewalls and regular system monitoring (sentries). All of this should be parsed by a system that provides alerts for key events (report to the Captain of the Watch) and is also checked regularly by humans.
Re:Even more simple ... (Score:5, Insightful)
You probably should work in the security world before making statements about things you clearly don't understand. tcpdump is a tool for watching all or select traffic. It dumps raw packets, and you have to figure out what to make of them. Snort is a tool for analyzing those packets and alerting on suspicious data. It provides the information you need to help you find potentially dangerous traffic.
Where I work, we have a T-3 'net connection. We typically run about 40% available bandwidth. You'll have just a *TINY* bit of trouble keeping up with that traffic if you manually analyze tcpdump logs. If you run Snort, it will do the bulk of the work, and alert you on things it thinks bear further investigation. It makes mistakes. But having it help focus your traffic checks makes the day a lot easier.
As for using a firewall, too many people have the mistaken impression that once they install a firewall, all their worries will go away. If you have an insider attacking one of your corporate servers, a firewall doesn't help with that at all. An intrusion detection system like Snort will. If you users bring in discs from home that contain trojan programs with call home features, your firewall probably won't catch that, but an intrusion detection system probably will. If your users are surfing to pr0n sites, your firewall might catch that, but an intrusion detection system has a much greater chance.
A firewall is a good thing to have, but everyone working in the security field is going to tell you that it is not enough. We have a concept which we frequently preach to newbs - defense in depth. Put as many systems in place for securing your network as you can realistically manage and track. If you have only a single security device, once an exploit comes out for that device, your network is wide open. And every single security system out there has bugs, so depending on one greatly increases your chances of getting 0wnzerized. Put in multiple systems, and you are likely to catch attacks on at least one of them, in the event that a way to avoid one part of your defense is found.
RagManX
Re:Even more simple ... (Score:3, Insightful)
Score: -17, bad security.
Installing a firewall is not a magic solution. Suppose you run a website. You WILL be permitting 80/tcp through your firewall, probably also 443/tcp. Along comes the next worm that uses only http to gain entry to a system (Think CodeRed, Nimda && friends). How exactly is your firewall going to stop that sort of traffic? The answer you're searching for is, "it won't."
In addition to firewalling, running a NIDS sensor will help abate these threats. Most NIDS products support the notion of killing a connection (rskill, for RealSecure, flexresp for Snort, etc.) - this is how you can stop the threat of CR, CR-II, Nimda, et al.
Another way to abate these kinds of threats is to use something like Hogwash (which strangely enough is based on Snort), or a reverse-proxy that can inspect HTTP requests. Of course, those only help for HTTP traffic - there's a lot more out there besides HTTP. Remember sendmail, uw-imap, old qpopper, bind, and friends? They've all had remote-rootables that blew right through firewalls, since they only used the designated "proper" port(s) for the vulnerable daemon.
Use your head. There is no security magic bullet. It's a process, not a single product.
Re:Even more simple ... (Score:3, Insightful)
Ahh but if you are allowing 443/tcp, how exactly is your IDS going to detect that sort of traffic? Seeing how the session is encrypted. The answer you're searching for is, "it won't."
Re:Even more simple ... (Score:2)
Re:Even more simple ... (Score:2)
Re:Even more simple ... (Score:1)
Re:Firewall protection (Score:1)
Your Apache log files can probly tell u a lot more about exploit attempts.
Servers... (Score:1)
Charlie% Snort Charlie -1 line...
Warning (Score:2)
So, kids, be smart about what "network analysis tools" you use. I know our head network administrator personally, and he sees EVERYTHING (no, really -- EVERY BIT) of traffic that he wants.
Use something like this at my school, and you'll be using a lab computer to check email by the end of the day since they'd disable your port immediately
Re:Warning (Score:5, Interesting)
It's even possible to remain undetected with software only, but you *really* need to know what you're doing. Stuff can be detected on the ethernet layer that most people aren't aware of.
Re:Warning (Score:4, Informative)
The easier method is to use a 10 Mbit AUI adapter with the TX pins cut. You can probably even find a 10baseT -> AUI adapter at a computer junk shop for a buck or three.
For more about creating a receive-only ethernet adapter check out http://www.robertgraham.com/pubs/sniffing-faq.htm
Finisar Century Tap - FKA Shomiti Tap (Score:1)
http://www.finisar.com/product/product.php?prod
Here is a PDF showing how to setup the tap with your Snort sensor. The only problem is the tap is really overpriced -- about $500. But, making a custom cable is a PITA.
Re:Finisar Century Tap - FKA Shomiti Tap (Score:1)
http://www.snort.org/docs/100Mb_tapping1.pdf
Re:Warning (Score:1)
Re:Warning (Score:2)
2. Unless all the network folks are asleep at the wheel this doesn't qualify as stealthy.
Re:Warning (Score:1)
RagManX
Re:Warning (Score:1)
www.prelude-ids.org (Score:1, Informative)
"Prelude is a new innovative hybrid Intrusion Detection system designed to be very modular, distributed, rock solid and fast. "
Interesting challenge (Score:4, Interesting)
The biggest problems are:
Re:Interesting challenge (Score:3, Interesting)
2. How exactly DOES one monitor >100mbit full-duplex traffic using only a single 100mbit port :) ? (dropped packets are a significant reality on a busy network)
Simple, you connect your firewall to a hub on each interface. You then connect your hub to the switches (or routers) that carry network traffic for each interface. On that same hub you connect your IDS, running in stealth mode. The IDS will pick up all packets, since a hub simply repeats all traffic out every port. Those packets that are dropped outbound from the firewall will be caught by the firewall syslogs. Inbound packets that are dropped are going to be of little concern if they are dropped prior to the firewall interface.
Re:Interesting challenge (Score:4, Informative)
Simple, you connect your firewall to a hub on each interface.
Which would be a great idea, except that hubs are half-duplex.
Re:Interesting challenge (Score:1)
which makes me wonder, can you split the UTP cable so the upgoing packets go through one hub and the downgoing packet go through another hub?
Technically this is doable, given a few custom cables and a very ugly wiring configuration. This isn't how the pros do it, however. Given that the need is:
The best thing to do is plan the point of insertion for the IDS. Most WAN circuits are far below the 100Mbps level. Therefore, the best place to sniff is between the WAN edge device and the gateway router. Set both devices up for half duplex communication, insert a hub, and away you go. The only problem here is that the hub is now the single point of failure for the WAN. This is why some shops use very advanced electronic taps which may even sniff the raw WAN packets before they ever get to the termination device.
Out of band remote management can be achieved with the implementation of a management network. The easiest way to do this is with a second NIC in the IDS box. The slickest way to do it is with 802.1q tagging and VLANS. If you have the right switches and NICS in place, you can build a complete isolated management network without changing a single piece of hardware.
Re:Interesting challenge (Score:2)
It's not a spanning tree nightmare at all. A firewall sits at the boundary of two networks, network A and network B, let's say. Firewall Interface A connects to hub A which connects to network A. IDS A is also connected to hub A. And ditto for B. This is Firewall Design 101. Since, generally, Firewalls, on at least one side, are connected to the Public Internet, your network on that side is not going to be gigE.
Re:Interesting challenge (Score:1)
Aside from your suggestion of using hubs in a real network just being stupid, how do you know what the connection to my firewall will be? Firewalls come with GigE interfaces you know. They also come built into switch modules like the 6500's from Cisco. Many people have firewalls in facilities that provide Fast or GigEthernet connections to the Internet and charge by the bit.
Re:Interesting challenge (Score:1)
In order to really do NIDS right, you need a NIDS host at every gateway in/out of your network, plus possibly some on remote segments, then collect all the alerts back to a central DB that can be correlated and alerted on. One NIDS host can't "see" everything if you have many switched or routed segments, or multiple WAN links, etc.
But, that transparent impedence matching tap is pretty cool though. Hmmmmm....donuts....
-s
Re:Interesting challenge (Score:2)
Switches can, and do, mangle packets, even when mirroring. By configuring your IDS to be "stealthy", putting the NIC into promiscuous mode, and using a simple hub at the gateway, you can capture all traffic that crosses the network boundary. Besides that, why bother putting a layer 2 switch between your firewall interface and your public internet routers? Which is one of the obvious locations for your IDS? The other really obvious location being in your DMZ?
Re:Interesting challenge (Score:2)
Please explain what you mean by "mangle packets"
By configuring your IDS to be "stealthy", putting the NIC into promiscuous mode, and using a simple hub at the gateway, you can capture all traffic that crosses the network boundary.
What does promiscuous mode have to do with being stealthy. If your NIC isn't promiscuous you don't have NIDS you have HIDS. Hubs suck.
Besides that, why bother putting a layer 2 switch between your firewall interface and your public internet routers?
If you have redundant firewalls or multiple paths to the Internet you already have a switch there so you can connect all the interfaces on a common segment. If you have a single router and a single firewall use a tap. You can still have a full duplex connection and you don't have to worry about the $10 hub crapping out and taking down your internet connection. If you don't care about any of the above, what do you need NIDS for?
Re:Interesting challenge (Score:2)
Usually, the point of having redundancy is to avoid single point of failure. If you connect your multiple path to a single switch, then you may have problem because you rely on a single piece of hardware.
Re:Interesting challenge (Score:2)
If your firewall doesn't support this configuration you can have a seperate switch between each firewall and router and mesh them.
It is also possible to use a redundant load balancer in this position to pass traffic through multiple firewalls. This has the added benefit of allowing you to load balance your firewalls. There's lot's of was it can be done and it is possible to engineer a perfectly redundant network, it's just a bit expensive.
Re:Interesting challenge (Score:2)
There are lots of places you can put NIDS and it realy depends on what you want to see. If you only want to see active attacks you could put it only inside your firewall. If you want to see the stuff that your firewall blocks (useful for justification and verification) you put one outside your firewall. If you are worried about internal stuff you put one near your jewels. There is no single setup that wilbe right for every network.
Re:Interesting challenge (Score:2)
Not if you use a one-way ethernet cable [snort.org].
Re:Interesting challenge (Score:3, Insightful)
Um, you don't. That's what Gigabit Ethernet is for. Check out the Intel Copper Gig cards - there's Linux support for them and they're reliable cards.
On another note, I don't quite see how using 2 nics, one on a management LAN and the second with no IP bound to it doing the sniffing is a revelation! Shouldn't this just be common sense? After all, it's been a standard NIDS sensor practice for quite a long time now. To really do this job right, all of the sensors should be using a management LAN for reporting back to a MySQL/PostgreSQL database, which in turn is queried by ACID, or something similar..
BTW, ACID's SQL is so terribly un-optimized, it's downright pitiful. I know of a large company that's getting ready to release a huge patch to ACID to actually optimize its SQL usage, bringing performance for large-scale snort deployments up to a reasonable level.
Re:Interesting challenge (Score:2)
What if some people would be interested in that optimisation ? (what is the actual status of that)
Come on ! (Score:1)
A better article, and other links .... (Score:5, Informative)
There's a better article about SNORT and ACID on LinuxWorld [linuxworld.com]. Also, if you want to investigate SNORT, check out the following links:
I didn't think you snorted acid... (Score:1)
Re:I didn't think you snorted acid... (Score:1)
OMG (Score:1)
SNORT - the price is right! (Score:1)
For the cost of one NIC and some existing obsolete hardware, I now have a hardened Snort sensor outside my firewall. I can see all inbound and outbound traffic, which is logged to MySQL and viewed thru ACID. Not bad for about $30.
Sourcefire (founded by Marty Roesch - creator of Snort) is releasing a rack-mount device that can manage freeware Snort sensors. Cost is about $15K. Hell of a lot cheaper than the alternatives! I'll be getting one of those soon... If you run Bastille security, with a little know-how, you can stealthify your Snort sensors to the point where they become invisible. I get scanned regularly, and nobody has yet found the IDS box. Me == happy!
Using Snort Stealthily? (Score:1)
Depends where you are. (Score:2)
You're thinking UDP, not TCP... (Score:2)
Cheers,
Jim
snort as a deterrent AND the BitchX TROJAN (Score:1)
the greatest thing it does is deter would-be
bad guys from even looking at your machine
twice... as soon as they find you've got snort
running they go away in most cases.
This does not apply to the script-kiddies running
the NT http directory traversals every 15 minutes
against your Linux box. I have found that even a
good solid dos does not stop THEM.
Oh yeah while I am here, why haven't the lords of
slashdot run my story on the current bitchx
source tarball trojan? You could save an awful
lot of folks grief by just running the damn story
and not worrying about the fact that you ran the
same story months ago. This is a new, different
incarnation of the thing and it is quite bad;
giving paz.bakunin.net a root shell on the system
of anybody running the configure script from the
bitchx source tarball downloaded from
ftp.bitchx.org.
The md5sum of the trojanned bitchx is:
a9d6bb266c503a09d46cef679fce8320
The md5sum of the clean bitchx is:
79431ff0880e7317049045981fac8adc
The name of the bitchx source tarball is:
ircii-pana-1.0c19.tar.gz
If you run the configure script from the trojanned
tarball, you will wind up with a connection to
port 6667 on paz.bakunin.net with a shell on your
end. Also, a copy of your
be sent to that port.
I can state with 100% certainty that the BitchX
package that is part of slackware 8.1 is totally
clean and safe. The BitchX source tarball from
ftp.irc.org is also clean.
Reasons for a security sniffer... (Score:2, Interesting)
About a week later, because of our security tools, we discovered one of the consultants port-scanning our network. The director went and asked him why he was port scanning, with no good reply, and told him to stop doing it.
About 2 weeks later, yet again, the *same* consultant was found port-scanning the network again, this time hitting our production website boxes at our offsite co-location (which includes the database boxes, loaded with data that only a handful of people had access to). He was promptly walked out the door, and the consulting company was asked to replace him with someone else.
While a firewall will protect you from attacks from the outside, attacks from the inside are just as dangerous.
Re:Reasons for a security sniffer... (Score:1)
Re:Reasons for a security sniffer... (Score:1)
What "valid" use does a developer have with a port scanner on my network (outside of the development labs)? BTW, the feds have been called in at places I work for less than that. I'm assuming you work in academia or something?
Can be done with OpenBSD (Score:1)
The main problem with this approach was grabbing the Alerts and such once you had it up and running. This was solved using a JAZ drive no one wanted. A definite kludge but it worked at the time...
Been there, done that (Score:2)
Re:Been there, done that (Score:2)
No offense to our commercial IDS friends, but their products are over-priced and underwhelming. The key in network security is not how much money you spend, or getting commercial products that the Gartner whores recommend. The key is people who understand networks and security, and products that actually do the job. And, when you go to your management and tell them you want to spend $10,000 instead of the $100,000 that the consultant said it would cost, and you point out that you can do the same, or better, job, your manager will be happy too.
Re:Been there, done that (Score:2)
In an ideal world, yes. And in such an ideal world, your brilliantly trained security experts could tweak and tweak and end up with something that probably works as good or better as the much more expensive commercial solution.
There's a slight problem.
In case you haven't noticed, we don't live in an ideal world. The facts are that: (a) there are simply not enough security-savvy people to go around, (b) those that are available can command a high price, perhaps just as high or higher than what you would spend on a commercial system and (c) frankly most companies don't want to be bothered to hassle with hiring people with such esoteric knowledge.
In this, the real world, the commercial products that you deride play a vital role for such companies.
Yes, if I was running a company I would prefer to have security expertise in house doing this. But the world is full of compromises, and frankly one very valid compromise people make is to buy commercial systems instead of hiring bodies to tweak something up with Snort.
P.S. You might want to actually try out the commercial systems you deride. I think you would find that yes, the current version of RealSecure is very expensive but in the long run it saves you money because (a) it is so heavily optimized over something like snort that you end up buying less hardware to monitor the same network and (b) you don't need as many expensive propeller-heads around to set it up and run it.
Disclaimer: Yes, I own stock in ISS, and I used to work for them. They are a good company with good products.
Re:Been there, done that (Score:2)
Re:Been there, done that (Score:1)
Re:Been there, done that (Score:2)
Not coincidentally, ISS has a quite nice offering [iss.net] in this area as well.
Re:Been there, done that (Score:2)
Well said, thanks. It's not that hard to become a reasonably capable security administrator.... IF you were already a capable system administrator to start with. And no, I don't mean that you can install the OS, create some users and reboot the box without consulting a manual. Medium to large organizations that have UNIX platforms they are maintaining with their own internal personnel have all the expertise on staff already to develop one or two competent security administrators. No need to go out and hire consultants or purchase shiny boxes (unless, of course, the shiny box does something you need it to do and is the cost effective choice).
Your system is not secure if someone else is in control of your security platforms (this is a perfectly valid argument for excluding any Windows product from a security role). So, if at all possible, do not rely on consultants or contractors, nor on closed source platforms.
Re:Been there, done that (Score:2)
What's wrong with consultants and contractors? In my experience enployees are much more likely to have a grudge against the company. There are also more likely to be incompetant since if they weren't, why would you need consultants?
Security is a very specialized field, and if you don't beleive that it's probably because you don't understand real security. Most companies can't afford to keep real dedicated security people on the payroll and so consultants fill that role very well.
Does Hogwash already do this? (Score:1)
Re:Does Hogwash already do this? (Score:1)
real world advice (Score:2)
If you're going to do this, make sure you put two interfaces (or use 802.1q) in the box so you can monitor it via a management network. The importance of knowing your IDS is working is more valuable than its being undetectable to intruders. Two interfaces also obviates the need for the tortured fake IP traffic syslogging mentioned in the article. Oh, and one more thing - management network != general LAN.
Re:Snort is okay (Score:1)
Re:Snort is okay (Score:1)
Here's one way: Snort Installation Manual [snort.org]
Lee
Re:Snort is okay (Score:3, Insightful)
Funny, I can have my SNORT installation log to Oracle, MSSQL Server, MySQL, PostGreSQL, etc. And I can perform vulnerability assessments, etc. By adding on ACID (from CERT [cert.org]) and logsnorter, I can integrate my firewall logs and view everything through a very nice web UI. Best of all, except for the hardware I run it on, and the work, my IDS and vulnerability assessment platform hasn't cost me a dime.
And your "superior SQL Server 2000" has more holes than swiss cheese, which is why I'm using MySQL in a secured, private network, for my logs.
Re:Snort is okay (Score:4, Interesting)
Whew, the ISS marketing guys really did a number on your mind, didn't they?
I worked on intrusion detection at a site where we had two IDS systems set up in parallel, one based on RealSecure and the other being a custom tailored solution that utilized a "sensor" machine sitting in our DMZ with a quiet NIC, similar to what's described in the linked article. It used tcpdump for data collection, and saved most of our incoming and outgoing network traffic to a fast disk array for analysis (based on tcpdump filters.) Hourly scripts would process the saved packages with Snort (and a variety of other tools, some of them free and some of them custom written for us and the other sites on our WAN.)
While RealSecure is fine for detecting bumbling script kiddies and obvious misconfigurations (like unpatched boxes becoming Nimda zombies), the tcpdump solution was far better at detecting the serious intrusion attempts, like the slow and low network probes with custom crafted packets, and telling us exactly who on our network was doing boneheaded things like using telnet across network boundaries. RealSecure's coming in a pretty box and costing a lot of money doesn't make it the end-all be-all of intrusion detection systems.
Re:Snort is okay (Score:1)
So can Snort. It is not built in, so you'll have to load an additional plugin. But then again, the makes of Snort understand that it is an Intrusion Dectection System. If you want more than detection use the plugins that are available to react on certain alerts. You can set up Snort to send resets, just like ISS does. But that slows down the other work that Snort does, so you won't find that feature integrated into the package.
RagManX
Re:Snort can do that and more (Score:1)
Yes, it can. You missed it.
There's a great add-in that allows dynamic updating of Firewall-1 rules called SnortSAM. There are others as well.
If those programs don't suit you, if you have skill with Perl you could also craft a program to send the RST (reset) packets based on certain alerts.
Or you could always pay me to do it. (shameless plug)
You can do all that, and more.
The question is whether your organization has the time and resources to set it up and support it. If you've got the money, but not the time, perhaps a commercial solution is better.
Lee
Re:Snort is okay (Score:1)
When the CEO can't get email from his daughter at college, this cool sounding autoresponse thingamajig doesn't look so smart all of a sudden.
Re:Snort is okay (Score:1)
Re:Snort is okay (Score:4, Interesting)
The wonderful tool which is less configurable than Snort, doesn't log data as well, and provides less viewable data about packets which set off alerts.
And this is better than Snort how? Snort can log to local or remote databases, text files, syslog, and probably other formats (but I haven't tried). It supports multiple output formats, so you can choose how you want to look at the data. It also supports loading a database from tcpdump files (Our training with ISS never covered how to do this with RealSecure, and I'm doubtful that it can be done).
Superior in what way? It costs more than Postgres or MySQL, has more holes than any other database out there, and costs an insane amount of money compared to what most people running Snort would use (we use MySQL here, I know many people using Postgres, or you can dump to text files).
In the world of real security grunts, we like to call such a tool Nessus (http://www.nessus.org/). It scans for more vulnerabilities than ISS (the marketing claims by ISS notwithstanding), is updated more frequently, offers more flexibility in scanning options, has a better support community, and is free.
Unfortunately for me, ISS has brainwashed many, many people in the Department of Energy. I'm forced to use their product on a day-to-day basis. On the upside, I can run Snort and Nessus to do all my real checks and detects, and the go to the ISS products I have to use, try to make them show me the data I need, and report with that. But every single site I have to deal with which uses ISS has done the same thing I've done - shoved it in a corner, set up a system with Snort and a system with Nessus, and gone about getting real work done with free, easy to use, well supported tools.
RagManX
Re:Snort is far more than OK (Score:1)
Re:Snort is okay (Score:1)
Cost of a Snort Deployment for a mid-sized business: $0.00
Hmmm...decisions, decisions...
Re:Snort is okay (Score:1)
But sometimes you must respond, so that the uninitiated and unwary will not be taken in by the trolling.