Search
Snort
Snort is one of the the world's most popular Intrusion Detection System/ Intrusion Prevention System (IDS/IPS). Every hacker and network engineer should be familiar with Snort. As a hacker, you will need to evade it; as a network engineer, you will need to manage and depend upon it.


5 min read
Introduction to Regular Expressions (regex)
Welcome back, my aspiring cyber warriors! This next subject might seem a bit obscure to the uninitiated--but I promise-- this lesson will...
3,752 views

3 min read
Linux Firewalls: Creating an Application Layer IDS/IPS with fwsnort
Welcome back, my aspiring cyberwarriors! In a previous tutorial here, I introduced you to the Linux firewall, iptables. iptables enables...
4,894 views

2 min read
Snort Basics for Hackers, Part 6: Configuring Snort to Detect the SolarWinds/Sunburst Backdoor
Welcome back, my aspiring cyberwarriors! In recent weeks I'm certain you have heard about the SolarWinds/Sunburst hack. Just to review,...
756 views


4 min read
Snort Basics for Hackers, Part 5: Testing your Snort IDS Against Known Exploits
Welcome back, my greenhorn cyber warriors! In my previous posts in this series, we installed Snort, configured Snort, set up Snort to...
14,002 views


4 min read
Snort Intrusion Detection System (IDS) for Hackers, Part 1: Installing Snort
Welcome back, my neophyte hackers! In the world of information security, the most common intrusion detection system (IDS) you will ever...
11,293 views


4 min read
Snort Basics: How to Read and Write Snort Rules, Part 1
Welcome back, my novice hackers! ​ My recent tutorials have been focused upon ways to NOT get caught. Some people call this...
10,157 views


5 min read
Snort IDS for Hackers, Part 3: Sending Intrusion Alerts to MySQL
Welcome back, my hacker novitiates! If you have been following this new Snort series, you know that Snort is the world's most widely used...
4,320 views


5 min read
Snort IDS for Hackers, Part 2: Basic Configuration of your Snort IDS
Welcome back, my tenderfoot hackers! As you should know from before, Snort is the most widely deployed intrusion detection system (IDS)...
13,545 views


1 min read
Hackers-Arise Purchases Snort Training Institute
Today, Hackers-Arise announced the purchase of the Snort Training Institute! The Snort Training Institute is the premier training...
331 views