5 min read
Introduction to Regular Expressions (regex)
Welcome back, my aspiring cyber warriors! This next subject might seem a bit obscure to the uninitiated--but I promise-- this lesson will...
3,677 views
3 min read
Linux Firewalls: Creating an Application Layer IDS/IPS with fwsnort
Welcome back, my aspiring cyberwarriors! In a previous tutorial here, I introduced you to the Linux firewall, iptables. iptables enables...
4,812 views
2 min read
Snort Basics for Hackers, Part 6: Configuring Snort to Detect the SolarWinds/Sunburst Backdoor
Welcome back, my aspiring cyberwarriors! In recent weeks I'm certain you have heard about the SolarWinds/Sunburst hack. Just to review,...
745 views
4 min read
Snort Basics for Hackers, Part 5: Testing your Snort IDS Against Known Exploits
Welcome back, my greenhorn cyber warriors! In my previous posts in this series, we installed Snort, configured Snort, set up Snort to...
13,912 views
4 min read
Snort Intrusion Detection System (IDS) for Hackers, Part 1: Installing Snort
Welcome back, my neophyte hackers! In the world of information security, the most common intrusion detection system (IDS) you will ever...
11,258 views
4 min read
Snort Basics: How to Read and Write Snort Rules, Part 1
Welcome back, my novice hackers! ​ My recent tutorials have been focused upon ways to NOT get caught. Some people call this...
10,079 views
5 min read
Snort IDS for Hackers, Part 3: Sending Intrusion Alerts to MySQL
Welcome back, my hacker novitiates! If you have been following this new Snort series, you know that Snort is the world's most widely used...
4,307 views
5 min read
Snort IDS for Hackers, Part 2: Basic Configuration of your Snort IDS
Welcome back, my tenderfoot hackers! As you should know from before, Snort is the most widely deployed intrusion detection system (IDS)...
13,523 views
1 min read
Hackers-Arise Purchases Snort Training Institute
Today, Hackers-Arise announced the purchase of the Snort Training Institute! The Snort Training Institute is the premier training...
324 views