Question: security breaches Q1: What is the snort tool? Define it and mention what are the options to use snort? Q2: What are Snort Rules? a.
Q1: What is the snort tool? Define it and mention what are the options to use snort? Q2: What are Snort Rules? a. Write a rule that attempts to search for the word "HTTP" between characters 4 and 40 of the data part of any TCP packet originating in HOME_NET and going to an address that is not part of HOME_NET. In the log file, the record must contain the message "Your Name, Your ID, HTTP Detected". b. Q2) Enter two rules to detect when someone is trying to access a machine located in HOME_NET whose IP address is 149.16.01.02 to port 137 and both UDP and TCP protocols. When the indicated pattern is detected, the rule should send an alert with the message "Your Name, attempt to access port 137 and protocol
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
