[Sharing Knowledge]
SNORT : Analyzing and Signatures
Deris Stiawan
Ph.D Candidate
Faculty of Computer Science & Information System
Universiti Teknolgi Malaysia
2012
1st run : Scanning
• Scanning tools with NMAP
– NMAP : powerful network scanning
– To find information detailed
– To find vulnerability from port / daemon / application
active run
– Mapping of network
• Command :
– nmap –v ip target
– nmap –v –Sv
– nmap -v -O -sF
Snort alert signatures
• Scanning tools with NIKTO
– NIKTO: powerful web scanner
– Testing IIS / Apache running on web server in
target
– Checks your CGI vulnerabilities
Snort alert signatures
2nd : Sniffing
• Sniffing data
– TCPdump / tshark
Snort alert signatures
3rd : Analyzing
• Analyzed and recognized threat with Snort
– Analyzing from packet
– Snort.conf
Snort alert signatures
Snort alert signatures
Snort alert signatures
Snort alert signatures
Snort alert signatures
Snort alert signatures
Snort alert signatures
Codered Footprint
Snort alert signatures
Snort alert signatures
Nimda Footprint
Directory Traversal Footprint
Pervasive Computing Research Group
Faculty of Computer Science & Information System
Universiti Teknologi Malaysia
Prof. Dr. Abdul Hanan Abdullah
Deris Stiawan

More Related Content

PDF
Wireshark
PDF
Scanning & Penetration Testing
PDF
The Challenges, Gaps and Future Trends: Network Security
PPTX
Network forensic
PPTX
Vulnerability and Penetration Testing
PPTX
Network packet analysis -capture and Analysis
PDF
Network Forensics: Packet Analysis Using Wireshark
PPTX
Network sniffers & injection tools
Wireshark
Scanning & Penetration Testing
The Challenges, Gaps and Future Trends: Network Security
Network forensic
Vulnerability and Penetration Testing
Network packet analysis -capture and Analysis
Network Forensics: Packet Analysis Using Wireshark
Network sniffers & injection tools

What's hot (20)

PDF
Wired and Wireless Network Forensics
PPTX
Wireshark network analysing software
PPTX
Open source network forensics and advanced pcap analysis
PDF
Network Forensic Tools & Techniques Workshop
PPTX
Prensentation on packet sniffer and injection tool
PDF
Ch 07 -- The Expert System
PPTX
Network based file carving
PPT
Network forensics1
PPTX
Forensic Analysis - Empower Tech Days 2013
PPTX
Network traffic analysis with cyber security
PPTX
Wireshark
PPTX
Wireshark Basic Presentation
PPT
Wireshark Inroduction Li In
PDF
Network forensics
PDF
Network Analysis Using Wireshark 1
PPTX
Firewall Design and Implementation
PPT
Introduction to computer security syllabus
PPTX
Network Forensics Intro
PDF
Wireshark - Basics
PDF
Co se skrývá v datovém provozu? - Pavel Minařík
Wired and Wireless Network Forensics
Wireshark network analysing software
Open source network forensics and advanced pcap analysis
Network Forensic Tools & Techniques Workshop
Prensentation on packet sniffer and injection tool
Ch 07 -- The Expert System
Network based file carving
Network forensics1
Forensic Analysis - Empower Tech Days 2013
Network traffic analysis with cyber security
Wireshark
Wireshark Basic Presentation
Wireshark Inroduction Li In
Network forensics
Network Analysis Using Wireshark 1
Firewall Design and Implementation
Introduction to computer security syllabus
Network Forensics Intro
Wireshark - Basics
Co se skrývá v datovém provozu? - Pavel Minařík
Ad

Viewers also liked (7)

PPTX
How to Predict, Detect and Protect Against Mobile Cyber Attacks
PDF
What we can learn from CDNs about Web Development, Deployment, and Performance
PPTX
Aneesh, Capillary Founder On Staying Fit And Running (A Startup)
PDF
IDS / IPS Survey
PDF
Intrusion Detection/ Prevention
PDF
ICT for fighting Corruption
PDF
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
How to Predict, Detect and Protect Against Mobile Cyber Attacks
What we can learn from CDNs about Web Development, Deployment, and Performance
Aneesh, Capillary Founder On Staying Fit And Running (A Startup)
IDS / IPS Survey
Intrusion Detection/ Prevention
ICT for fighting Corruption
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Ad

More from Deris Stiawan (11)

PPTX
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
PPTX
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
PDF
IoT : Peluang Riset di Bidang Kesehatan
PDF
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
PDF
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
PDF
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
PDF
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
PDF
Trend Internet of Things
PDF
Network Attack and Intrusion Prevention System
PDF
Konsentrasi riset jaringan komputer
PDF
Trend & challenges Internet of Things
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
IoT : Peluang Riset di Bidang Kesehatan
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Trend Internet of Things
Network Attack and Intrusion Prevention System
Konsentrasi riset jaringan komputer
Trend & challenges Internet of Things

Recently uploaded (20)

PPTX
The-Importance-of-School-Sanitation.pptx
PPTX
Cyber Hygine IN organizations in MSME or
PPT
12 Things That Make People Trust a Website Instantly
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PDF
Understand the Gitlab_presentation_task.pdf
PDF
Exploring The Internet Of Things(IOT).ppt
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PDF
Course Overview and Agenda cloud security
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
Database Information System - Management Information System
The-Importance-of-School-Sanitation.pptx
Cyber Hygine IN organizations in MSME or
12 Things That Make People Trust a Website Instantly
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
Understand the Gitlab_presentation_task.pdf
Exploring The Internet Of Things(IOT).ppt
artificialintelligenceai1-copy-210604123353.pptx
250152213-Excitation-SystemWERRT (1).ppt
Exploring VPS Hosting Trends for SMBs in 2025
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
Course Overview and Agenda cloud security
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
Layers_of_the_Earth_Grade7.pptx class by
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Database Information System - Management Information System

Snort alert signatures

  • 1. [Sharing Knowledge] SNORT : Analyzing and Signatures Deris Stiawan Ph.D Candidate Faculty of Computer Science & Information System Universiti Teknolgi Malaysia 2012
  • 2. 1st run : Scanning • Scanning tools with NMAP – NMAP : powerful network scanning – To find information detailed – To find vulnerability from port / daemon / application active run – Mapping of network • Command : – nmap –v ip target – nmap –v –Sv – nmap -v -O -sF
  • 4. • Scanning tools with NIKTO – NIKTO: powerful web scanner – Testing IIS / Apache running on web server in target – Checks your CGI vulnerabilities
  • 6. 2nd : Sniffing • Sniffing data – TCPdump / tshark
  • 8. 3rd : Analyzing • Analyzed and recognized threat with Snort – Analyzing from packet – Snort.conf
  • 21. Pervasive Computing Research Group Faculty of Computer Science & Information System Universiti Teknologi Malaysia Prof. Dr. Abdul Hanan Abdullah Deris Stiawan