Snort cant Detection Allert
-
@ezvink said in Snort cant Detection Allert:
@bmeeks
then what kind of configuration sir so that my snort can detect attacks? I've tried following the tutorial on youtube and it didn't work.
I followed this video tutorial https://www.youtube.com/watch?v=eDbNVSVoVQM&t=1737sI can't tell you what configuration you need because I did not configure your current setup. I don't know what you have connected to what.
You also did not tell me which Snort rule you expected to trigger with your attacker traffic. Do you know what rule you expected to fire?
-
@bmeeks
this is the topology i use sir. -
@bmeeks
I will attack the web server, sir, using VM Attacker.the web server can be accessed by the attacker, and the attack has been successful but snort does not detect the attack.
I want to activate the DDOS, PORTSCANNING, BRUTEFORCE rules sir
-
@ezvink If that is your config - where did 192.168.66.5 come from??
Clearly that is NOT your setup..
That alert is not a syn flood which is what you were sending, it is saying its seeing out of state ack.
-
@ezvink said in Snort cant Detection Allert:
@bmeeks
I will attack the web server, sir, using VM Attacker.the web server can be accessed by the attacker, and the attack has been successful but snort does not detect the attack.
I want to activate the DDOS, PORTSCANNING, BRUTEFORCE rules sir
Looking at your posted diagram, if you used the default settings for the HOME_NET and EXTERNAL_NET variables, then most likely the rules are not going to trigger because one of their main conditionals will not be true -- the location and direction of the attack traffic does not satisfy the HOME_NET / EXTERNAL_NET condition. Most rules of the sort you want to trigger have the following main conditional:
$EXTERNAL_NET --> $HOME_NET
This means the attacking address sourcing the traffic must be on a network that is included in EXTERNAL_NET. In the default setup, EXTERNAL_NET is defined as as !HOME_NET (which means all addresses NOT included in HOME_NET). HOME_NET automatically includes all subnets defined on the firewall's local interfaces. So your attacker is within HOME_NET and thus the condition of the rule is not satisfied and it will not trigger.
Since you are a student and this is your class assignment (according to what you have posted in the past), take some time and research on Google how IDS/IPS works paying particular attention to the variables HOME_NET and EXTERNAL_NET in Snort and Suricata. Learn what they mean and what they are used for. Then look at the actual rule text and notice how in most of the rules $HOME_NET and $EXTERNAL_NET are present as conditions that are part of the rule's triggering logic.
The Suricata alerts you posted are not attack detections. They are simply from protocol anomalies and come from the built-in stream events rules packaged with Suricata. Those rules do not use HOME_NET and EXTERNAL_NET as conditionals. They simply look for anomalies in all traffic. Thus they will alert no matter if the addresses are in HOME_NET or EXTERNAL_NET.
As a student you need to actually learn how all this works and understand the underlying theory in order to be effective as an IDS/IPS admin. Simply finding some step-by-step guide like a YouTube video telling you exactly what to click and type is not going to do that.
-
I've added this rule, but still, Mr. Snort doesn't detect the attack I'm doing.
alert tcp $HOME_NET any -> $HOME_NET any (flags: S; msg:" Manual rule DoS flood"; flow:established; detection_filter: track by_src, count 60, seconds 10; sid:99901; rev:1;)
-
@bmeeks
can you help me to finish this project sir? please give me a way to complete this project so that both can detect attacks correctly, I've read articles about HOME_NET and EXTERNAL_NET but it doesn't help sir.
In my learning method, I have to find the right examples before I can explore the material.I hope you can help me to finish this project sir
-
@johnpoz
IP 192.168.66.5 is the IP of the web server sir, I just differentiated it but it's still the same VM -
@bmeeks
when I did nmap it worked sir, IP 192.168.12.5 web server IP 172.16.120.5 Attackerso what's wrong?
-
@ezvink what is wrong with what? For your ips/ids to detect a flood of syn packets you sent.. For starters a rule that triggers on whatever your sending has to be enabled, and it has to be enabled on whatever interface your sending the traffic thru, and to what your destination is, etc.
You show some rules categories you selected - but is anything in there, were they in your policy you set, were they activated, etc.
What specific rule did you think your syn flood sent using hping3 was going to trigger?
-
@ezvink said in Snort cant Detection Allert:
@bmeeks
when I did nmap it worked sir, IP 192.168.12.5 web server IP 172.16.120.5 Attackerso what's wrong?
What specific
nmap
command did you execute to generate the above alerts?You must have a good idea of which specific rule or rules you want your "attack" to trigger. So as @johnpoz asked, which specific rules are you targeting with your
hping3
command? Put the GID:SID and text of that rule in your post so we can examine the conditions the rule expects. Perhaps the traffic you are generating does not match all of the conditions in the rule. -
This post is deleted! -
i did hping3 -S --flood -p 80 192.168.12.5
that's sir i added it on hping3
-
@bmeeks
i did hping3 -S --flood -p 80 192.168.12.5that's sir i added it on hping3