Introduction

Introduction

In the last chapter we taught you how to detect the subtle and insidious acts of the typical script kiddie once she gains access to an account on your computer. In this chapter we will present a tool that can help you stop the barbarian at the gate.

Here we present a brief introduction to Snort, a self-described "lightweight intrusion-detection system." Snort is a kind of a supersniffer. It is a sniffer that can use rules to select out packets seen on a network interface and take selective action based on those rules. In this chapter we will present the basics of writing Snort rules, a discussion of the "standard" rulesets and why you may wish to use them, and a few observations on how Snort might fit into the security scheme of various installations.

This chapter presumes that you have a fairly extensive knowledge of the TCP/IP suite of internetworking protocols. If you do not, I would refer you to a basic text on the subject, such as Douglas E. Comer's excellent Internetworking with TCP/IP, Volume 1: Principles, Protocols, and Architecture .

You, as the reader, shouldn't have to care about my problems as the author, but this tool (and this chapter) is one of those that has us walking that tightrope between being too light to be useful and too heavy to be understood . Bear in mind that the overall goal throughout this book is to show you some of the exciting things you can do with Free Software. We are not writing documentation or tutorials. That said, we do aim to make the information we present in each chapter practical and useful. If I fail here, it is certainly not for want of trying.

 



Multitool Linux. Practical Uses for Open Source Software
Multitool Linux: Practical Uses for Open Source Software
ISBN: 0201734206
EAN: 2147483647
Year: 2002
Pages: 257

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net