<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: sankethj</title>
    <description>The latest articles on DEV Community by sankethj (@sankethj).</description>
    <link>https://dev.to/sankethj</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F528204%2F7189aeb0-d776-4960-b1aa-6f445c851132.jpg</url>
      <title>DEV Community: sankethj</title>
      <link>https://dev.to/sankethj</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sankethj"/>
    <language>en</language>
    <item>
      <title>Detect Dos, ping etc.. using SNORT</title>
      <dc:creator>sankethj</dc:creator>
      <pubDate>Thu, 03 Dec 2020 18:47:37 +0000</pubDate>
      <link>https://dev.to/sankethj/detect-dos-ping-etc-using-snort-4gab</link>
      <guid>https://dev.to/sankethj/detect-dos-ping-etc-using-snort-4gab</guid>
      <description>&lt;p&gt;𝘿𝙚𝙩𝙚𝙘𝙩 🇩‌🇴‌🇸‌, 🇵‌🇮‌🇳‌🇬‌  𝙚𝙩𝙘... 𝙪𝙨𝙞𝙣𝙜 🇸‌🇳‌🇴‌🇷‌🇹‌&lt;/p&gt;

&lt;p&gt;Snort is a packet sniffer that monitors network traffic in real time, scrutinizing each packet closely to detect a dangerous payload or suspicious anomalies.&lt;/p&gt;

&lt;p&gt;My OS :- ubuntu&lt;br&gt;
Let my ip address be 192.168.1.103&lt;/p&gt;

&lt;p&gt;🅢🅔🅣🅤🅟:- ( will be easy in future  ) &lt;/p&gt;

&lt;p&gt;First you need to make some changes in configuration of snort. &lt;/p&gt;

&lt;p&gt;𝚜𝚞𝚍𝚘 𝚐𝚎𝚍𝚒𝚝 /𝚎𝚝𝚌/𝚜𝚗𝚘𝚛𝚝/𝚜𝚗𝚘𝚛𝚝.𝚌𝚘𝚗𝚏&lt;/p&gt;

&lt;p&gt;Now, change HOME_NET IP address to your ip range. &lt;br&gt;
Like, &lt;br&gt;
𝚒𝚙𝚟𝚊𝚛 𝙷𝙾𝙼𝙴_𝙽𝙴𝚃 𝟷𝟿𝟸.𝟷𝟼𝟾.𝟷.𝟶/𝟸𝟺&lt;/p&gt;

&lt;p&gt;Now go to&lt;br&gt;
/𝚎𝚝𝚌/𝚜𝚗𝚘𝚛𝚝/𝚛𝚞𝚕𝚎𝚜/𝚕𝚘𝚌𝚊𝚕.𝚛𝚞𝚕𝚎𝚜&lt;br&gt;
and add the rules given below&lt;/p&gt;

&lt;p&gt;( Watch rules writing in the image. ) &lt;/p&gt;

&lt;p&gt;🅓🅔🅣🅔🅒🅣    🅟🅘🅝🅖    🅢🅒🅐🅝&lt;/p&gt;

&lt;p&gt;𝙍𝙪𝙡𝙚:-&lt;br&gt;
𝚊𝚕𝚎𝚛𝚝 𝚒𝚌𝚖𝚙 𝚊𝚗𝚢 𝚊𝚗𝚢 -&amp;gt; $𝙷𝙾𝙼𝙴_𝙽𝙴𝚃 𝚊𝚗𝚢 (𝚖𝚜𝚐:"𝙿𝚒𝚗𝚐 𝚍𝚎𝚝𝚎𝚌𝚝𝚎𝚍"; 𝚜𝚒𝚍:𝟷𝟶𝟶𝟶𝟶𝟶𝟷; 𝚛𝚎𝚟:𝟷; 𝚌𝚕𝚊𝚜𝚜𝚝𝚢𝚙𝚎:𝚒𝚌𝚖𝚙-𝚎𝚟𝚎𝚗𝚝;)&lt;/p&gt;

&lt;p&gt;alert ---&amp;gt; show alert &lt;/p&gt;

&lt;p&gt;ICMP ---&amp;gt; It's a protocol used to report error in ipv4&lt;/p&gt;

&lt;p&gt;-&amp;gt;  :- to&lt;/p&gt;

&lt;p&gt;$HOME_NET ---&amp;gt; destination ip&lt;/p&gt;

&lt;p&gt;msg ---&amp;gt; shows message which you write&lt;/p&gt;

&lt;p&gt;sid ---&amp;gt;  keyword is used to uniquely identify Snort rules. This information allows output plugins to identify rules easily.&lt;br&gt;
100 - 1,000,000 Rules already registered . So u need to use greater than this id like 1,000,123.&lt;/p&gt;

&lt;p&gt;rev ---&amp;gt;  keyword is used to uniquely identify revisions of Snort rules&lt;/p&gt;

&lt;p&gt;classtype:icmp-event ---&amp;gt; Categorizes the rule as an “icmp-event”, one of the predefined Snort categories. This option helps with rule organization.&lt;/p&gt;

&lt;p&gt;𝘿𝙚𝙩𝙚𝙘𝙩𝙞𝙣𝙜&lt;br&gt;
𝚜𝚞𝚍𝚘 𝚜𝚗𝚘𝚛𝚝 -𝙰 𝚌𝚘𝚗𝚜𝚘𝚕𝚎 -𝚚 -𝚌 /𝚎𝚝𝚌/𝚜𝚗𝚘𝚛𝚝/𝚜𝚗𝚘𝚛𝚝.𝚌𝚘𝚗𝚏 -𝚒 𝚎𝚑𝚝𝟶&lt;/p&gt;

&lt;p&gt;-A console   ----&amp;gt; shows standard output alert&lt;br&gt;
-q   ----&amp;gt; quite mode&lt;br&gt;
-i    ----&amp;gt; interface&lt;br&gt;
-c   ----&amp;gt; config&lt;/p&gt;

&lt;p&gt;🅓🅔🅣🅔🅒🅣    🅣🅒🅟    🅢🅒🅐🅝&lt;/p&gt;

&lt;p&gt;𝙍𝙪𝙡𝙚:-&lt;br&gt;
𝚊𝚕𝚎𝚛𝚝 𝚝𝚌𝚙 𝚊𝚗𝚢 𝚊𝚗𝚢 -&amp;gt; $𝙷𝙾𝙼𝙴_𝙽𝙴𝚃 𝚊𝚗𝚢 (𝚖𝚜𝚐: "𝚃𝙲𝙿 𝚂𝚌𝚊𝚗 𝙳𝚎𝚝𝚎𝚌𝚝𝚎𝚍"; 𝚜𝚒𝚍:𝟷𝟶𝟶𝟶𝟶𝟶𝟶𝟻; 𝚛𝚎𝚟:𝟸; )&lt;/p&gt;

&lt;p&gt;🅓🅔🅣🅔🅒🅣    🅓🅞🅢    🅐🅣🅣🅐🅒🅚&lt;/p&gt;

&lt;p&gt;𝙍𝙪𝙡𝙚:-&lt;br&gt;
𝚊𝚕𝚎𝚛𝚝 𝚝𝚌𝚙 𝚊𝚗𝚢 𝚊𝚗𝚢 -&amp;gt; $𝙷𝙾𝙼𝙴&lt;em&gt;𝙽𝙴𝚃 𝟾𝟶 (𝚏𝚕𝚊𝚐𝚜: 𝚂; 𝚖𝚜𝚐:"𝙿𝚘𝚜𝚜𝚒𝚋𝚕𝚎 𝙳𝚘𝚂 𝙰𝚝𝚝𝚊𝚌𝚔 𝚃𝚢𝚙𝚎 : 𝚂𝚈𝙽 𝚏𝚕𝚘𝚘𝚍"; 𝚏𝚕𝚘𝚠:𝚜𝚝𝚊𝚝𝚎𝚕𝚎𝚜𝚜; 𝚜𝚒𝚍:𝟹; 𝚍𝚎𝚝𝚎𝚌𝚝𝚒𝚘𝚗&lt;/em&gt;𝚏𝚒𝚕𝚝𝚎𝚛:𝚝𝚛𝚊𝚌𝚔 𝚋𝚢_𝚍𝚜𝚝, 𝚌𝚘𝚞𝚗𝚝 𝟸𝟶, 𝚜𝚎𝚌𝚘𝚗𝚍𝚜 𝟷𝟶;)&lt;/p&gt;

&lt;h1&gt;
  
  
  reference__researchgate-website
&lt;/h1&gt;

&lt;p&gt;And from google&lt;/p&gt;

&lt;p&gt;𝙀𝙭𝙩𝙧𝙖&lt;br&gt;
Ping scan :- nmap 192.168.1.103&lt;br&gt;
Tcp scan :- nmap -sT 192.168.1.103&lt;br&gt;
Dos :- Use any tools😐&lt;/p&gt;

&lt;p&gt;Contact me via telegram :- I am groot  [ @Etf_Zan ]&lt;/p&gt;

</description>
      <category>security</category>
      <category>snort</category>
      <category>dos</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
