THM Rooms: Snort-Challenge The Basics and Live Attacks |
Introduction
What?
Intrusion detection and prevention with Snort.
Why?
Detect real-time threats, analyse recorded traffic files and identify anomalies.
Write snort rules to analyse live capture network traffic.
Defend against a live attack