Mr. Yang, I have to say, your clear and precise explanations is something I admire. I wish all lectures and tutorials were this easy to follow! Thank you Sir.
Thanks for the great video. Could you do a video on how to implement SNORT as an IPS inline and on what type of appliance would you recommend VM and bare metal?
Thank you for the very informative video. I currently have pFsense running pfBlockerNG, Suricata and Snort w/Subscription. I was wondering since pfBlockerNG has both IP and DNS blocking capabilities, why do I need Snort or Suricata, they only do IP blocking. I understand that each of the installed programs have different rules sets, I assume pfBlockerNG would have a larger rule set then both Snort and Suricata combined, so pfBlockerNG makes Snort and Suricata redundant? Thoughts, comments?
It was a great introduction to this topic, thank you! I feel like I learned a lot & now I have more rabbit holes to chase down ha ha but seriously do you think it would be important to have a separate machine guarding a network of machines, clusters, data, servers, and an intrusion detection/prevention Machine before or after the internal router? I’m sure with more study it will make sense.. I’m looking forward to more on the topic.
How are you brother very fine brother please help me this is WhatsApp brother name hacking in Infosys ok no ke yes what are you picture video audio call data WhatsApp hack impossible please reply boy
I am new to using snort and still learning in university. I am wondering after I find an intrusion how can I log it and save it as a pcap file? What would the syntax look like to do this? So I can analyze it further with Wireshark. Thank you in advance.
If it s a external attack, i need to put my external ip or internal like on the video in the config file? Snort will show the external ip of the attacker?
Hi, thanks for your explanations. do we possible to add Artificial intelligence (AI) combining with snort? what kinds of attack that AI can make snort more adaptive? thanks
Hi, Brother I have a topic about "Deep Neural Networks to Improve Intrusion Detection" , Can we say that your this techniques can also be use for my topic.
@@LoiLiangYang u know why I subscribed ur channel 5 days ago that time 5k change ur subscription now its 6k.Thank u. Make more important of people worth videos.
I have a problem : "Cant start DAQ (-1) --> Fatal Error quiting" when i run " sudo snort -A console -q -u snort -c /etc/snort/snort.conf -i enp0s3 ". Can you help me to fix it
Hello, I have a wild question if someone could maybe help guide me in the right direction. I came across a question that asked something like this: What Snort Option is used to Reject Payloads
Loi Liang Yang, that was a splendid lecture.
Thank you!
Glad you enjoyed the splendid lecture.
Remember to subscribe now so that you can learn all about technology and cyber-security.
6:04 "sudo gedit" command not found?
What if you scan stealth ily..nmap -sS -A -pn "the ip to scan"..
Thanks for the live view. As a student, it's very helpful to see what the attack "looks" like in the IDS
My first taste of what it's like to use SNORT and to "see" what an IDS is reporting. Quick, incisive, and very helpful. Thanks.
Mr. Yang, I have to say, your clear and precise explanations is something I admire. I wish all lectures and tutorials were this easy to follow! Thank you Sir.
That's the most angry intro I've ever seen xD
Lol
wtf ...are you looking for beauty video?
@@pedrocamposnl yo brodie my asspipe stinks and I love it brodie
Who cares about intro, watch the whole thing
Simple, short and effective, keep teaching like this.
All the best.
This video is amazing! Probably the best videos I have watched! Thanks a lot!
You're very welcome!
"Open sauce" You're great and this tutorial is awesome.
Karl Linux
you are very clear and easy to follow. THANK YOU A LOT!
I remember when I started studying Cyber Security and your videos only had 1 thousand view look at you now
Thanks for the great video. Could you do a video on how to implement SNORT as an IPS inline and on what type of appliance would you recommend VM and bare metal?
Thank you for the very informative video. I currently have pFsense running pfBlockerNG, Suricata and Snort w/Subscription. I was wondering since pfBlockerNG has both IP and DNS blocking capabilities, why do I need Snort or Suricata, they only do IP blocking. I understand that each of the installed programs have different rules sets, I assume pfBlockerNG would have a larger rule set then both Snort and Suricata combined, so pfBlockerNG makes Snort and Suricata redundant? Thoughts, comments?
Non-stop information, subscribed. Your pronounciation is fantastic too, keep them coming.
Welcome.
This is now included by default in Kali 2024.2
You look so young here! And more serious than recent vids😅
Just found your channel Loi Liang Yang and hooked 🖖
such a great short intro thank you so much.
Great job Loi. Extremely helpful for noobs in cyber security like myself
Everyone has to start somewhere. We all learn together.
I bet you're killing it by now... Four years down the line.
when you got bars on the window, you KNOW shit is serious
My man lookin like Chinese Andrew Tate!
Aside from information leakage, do you have videos on other types of attacks?
It was a great introduction to this topic, thank you! I feel like I learned a lot & now I have more rabbit holes to chase down ha ha but seriously do you think it would be important to have a separate machine guarding a network of machines, clusters, data, servers, and an intrusion detection/prevention Machine before or after the internal router? I’m sure with more study it will make sense.. I’m looking forward to more on the topic.
7:09 why the “-c /etc/snort/snort.conf”, isn’t it set that path by default in snort?
New video released for SNORT on Intrusion Detection System: th-cam.com/video/pjoZfOLMDgU/w-d-xo.html
This is so clear and easily put into play! thanks
How are you brother very fine brother please help me this is WhatsApp brother name hacking in Infosys ok no ke yes what are you picture video audio call data WhatsApp hack impossible please reply boy
I really like your lecture is very sound crystal clear..Thank you a slot
Thank you for the clear lecture, but I would say this is host IDS since it's not actually covering the whole network
Sorry If my question might sound stupid, but how do you prevent those attacks from attacking your network?
Hi, i have problem with my snort.conf mine is just a blank, so i need to write all the rule and conf?
Same problem here
Great presentation! Thank you Mr. Yang
When professionals perform pentest for companies are they granted access to their network system? Or do they have to perform it over WAN??
Depends on what is written on the contract for the scope of coverage.
Did u use 2 systems for ubuntu or only one system?
are the configurations propel though
Hey Loi! thks a lot, very clear and useful tutorial, again thanks a lot!!!!!!!
I am new to using snort and still learning in university. I am wondering after I find an intrusion how can I log it and save it as a pcap file? What would the syntax look like to do this? So I can analyze it further with Wireshark. Thank you in advance.
thank you sir i used alot form your tutorials and learn lots things .
Very interesting and helpful, thank you !
I have snort installed but don't know how to configure it yet. This helps.
If it s a external attack, i need to put my external ip or internal like on the video in the config file? Snort will show the external ip of the attacker?
What’s the best, wireshark or snort?
Hello, I want to use I D S +Stepping stone algorithms to detecy Dos attack?
Thank you
Thank you for making this video!
You're welcome. Will be making another one on snort soon.
do you have tutorials for this on udemy or can you point me to one
That was a pretty smooth tutorial. Nice
its' a very nice explanation brother thanks for the video!
Most welcome!
Hi there,
I Have tried Snort and Snorby to detect Intrusion on my home network but couldn't get alerts even if I have security issues.Any tips ?
Do you have a tutorial to set this kind of lab up? Or…know of one?
what is oinkmaster and how to use them?
Loi Liang Yang why do you use Windows 10?
Hi, thanks for your explanations. do we possible to add Artificial intelligence (AI) combining with snort? what kinds of attack that AI can make snort more adaptive? thanks
Fantastic question. Will show next time.
Thank you for the insight! Excellent Demo.
Excellent and high quality video, thanks!
Hi, Brother I have a topic about "Deep Neural Networks to Improve Intrusion Detection" , Can we say that your this techniques can also be use for my topic.
Hello Muhammad, have you set one up?
Good and bref tutorial. Keep it up dude.
I am ping from attacker ping -p "hexavalue" serverip ,can I detect and log hexa value and alert as well
Your channel going viral, please make everyday videos, please.
Thank you for watching. I'm very tied down with my work in real life. Will try my best to give back during the weekends.
@@LoiLiangYang u know why I subscribed ur channel 5 days ago that time 5k change ur subscription now its 6k.Thank u. Make more important of people worth videos.
Thanks a lot for your presentation! It was very helpful
Welcome.
I have a problem : "Cant start DAQ (-1) --> Fatal Error quiting" when i run " sudo snort -A console -q -u snort -c /etc/snort/snort.conf -i enp0s3 ". Can you help me to fix it
How test a login page of the router at home to be bypass if not using ssl
Great video Thanks many time 😊
I am getting WARNING: 'aclocal-1.15' is missing on your system. on running sudo make. How to fix it?
what is the name of the second tool launched? "SPARTA"?
it this one?
tools.kali.org/information-gathering/sparta
How can install snort on "raspberry pi 3 model B" but no using arch linux arm..I need different linux distro ..
I'm looking for the way to block an arp spoofing with snort can you show me
it is amazing sir. thank you.
Sir you will Termux script PDF and upload in your website. Website link you are video
thank you for making this great video...very good explanation ....But i want to clarify it is possible in windows system
Yes, can be installed on windows as well.
Thank you for this. Subscribed.
Welcome.
how can we deploy snort on entire network of an enterprise ?
from where can we have the file that you open !
Such a great intro video! Thank you!
great video!!!! easy to follow!!!!!!!!!!!!
Great explanation! Thank you
Hello, I have a wild question if someone could maybe help guide me in the right direction.
I came across a question that asked something like this:
What Snort Option is used to Reject Payloads
You mean filtering away unwanted traffic to be analyzed?
how to add snort sensor and collect their log via remote banyard2, is it possible to collect multiple snort sensor log at one place
Yes. Try syslog.
Hello,
Can anyone explain me the snort -A -q command?
what does the -q, -u , -g , -c stands for?
Google => SNORT Cheat sheet
Or
On your linux terminal where you installed Snort. Issuing this command line: man snort
Thank you so much this is very informative.
Welcome.
Hello sir, is it possible to unlock iPhone without connecting to pc??
Great video sir..
Can you do a Topic about different IDS, like DIDS using SMS GATEWAY?
i still learning ^^
Sure, I'm intending to do it this weekend.
I'm really excited for watch your video sir ^^
thank you this video
Very informative content. Following .....
Hi. This was really cool
I want to work on intrusion detection system as my final year project can you help me?
Now we know, whenever someone is attacking. But what to do against it?
Are you saying propel?
Awesome, thanks for sharing man!
Welcome. Hope it's useful for you.
Thank You for this information !!!
hi. this is a very helpful tutorial! but i get stuck after sudo gedit /etc/snort/snort.confg. can you help me?
Please elaborate
@@LoiLiangYang when you write the command above supposedly the snort.confg file should appear isn't? but mine it just a blank file.
Hello sir,
Their is any project for ids using tools.. i humble request please suggest a research based project. I am Mtech Student.
Hello, please how can i test SNORT without having Ubuntu on a virtualbox ?
ikram Belabid It was originally designed for Linux but it was ported to windows If that’s the OS you are running
hi!!! im jordan so i want to become It manager. my level is so low to be Hacker. what's i could do?
one of the best ones ever!!!
What should be network adapter settings of snort machine and kali?
Thankyou so much 👍👍🙂
How to find network inteface card in snort running on? Anyone know please do reply
Thank you sir..Can you do a Topic about DMZ ?
Sure, good idea.
please provide a configuration tutorial from the start🙏
Amazing my friend thanks so much!
I want your help
How to install snort in ubuntu ??
wow, your VMs really fast, how did you do it?
All solid state drives.
@@LoiLiangYang Thanks