100%(12)12 out of 12 people found this document helpful
This preview shows page 1 - 2 out of 4 pages.
4. Write a two-paragraph conclusion regarding your experiences in this activity and the possibility of using snort as a HIDS, NIDS, or NIPS solution. Be sure to review the value of Rules in your conclusion. Submit these two paragraphs (with conclusions) along with two (2) screenshots showing any snort activity as your Exercise Response.I completed this assignment using Kali Linux Snort VM (VirtualBox). This activity taught me that Snort is an Intrusion Detection System (IDS) that works as a defines against exploit that allows users to capture the real time traffic analysis and packet logging. The snort –v command displays IP and TCP/ICMP headers. While, snort –dv displayers the packet data as well as the headers. It allows users to write rules describing well known and common vulnerability exploitation attempts, violations of the security policy as well as conditions under network packets might be anomalous. Snort - K displays the logging mode while - A sets alert mode. There are many other flags that as