Snort
THM Rooms: Snort-Challenge The Basics and Live Attacks

Introduction

What?

Intrusion detection and prevention with Snort.

Why?

  • Detect real-time threats, analyse recorded traffic files and identify anomalies.

  • Write snort rules to analyse live capture network traffic.

  • Defend against a live attack

How?