📄 readme_win32.txt
字号:
Snort Version 1.7-WIN32
by Michael Davis (mike@datanerds.net)
Distribution Site:
http://www.datanerds.net/~mike
http://www.snort.org
http://snort.sourceforge.net
Alternate Sites:
US:
http://www.technotronic.com
http://packetstorm.securify.com
http://snort.whitehats.com
Europe:
http://gd.tuwien.ac.at/infosys/security/snort
ftp://gd.tuwien.ac.at/infosys/security/snort
http://www.centus.com/snort/security.html
South America:
http://snort.safenetworks.com
Austrailia:
ftp://the.wiretapped.net/pub/security/network-intrusion-detection/snort
COPYRIGHT
Any WIN32 based modifications are:
******************************************************************************
. Copyright (c) 2001 Michael Davis <mike@datanerds.net>
. All rights reserved.
.
. Redistribution and use in source and binary forms, with or without
. modification, are permitted provided that the following conditions
. are met:
.
. 1. Redistributions of source code must retain the above copyright
. notice, this list of conditions and the following disclaimer.
.
. 2. Redistributions in binary form must reproduce the above copyright
. notice, this list of conditions and the following disclaimer in the
. documentation and/or other materials provided with the distribution.
.
. 3. The name of author may not be used to endorse or promote products
. derived from this software without specific prior written permission.
.
. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
. INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
. AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
. THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
. OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
. OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
. ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
******************************************************************************
Original snort code is:
******************************************************************************
Copyright (C)1998,1999,2000,2001 Martin Roesch
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
Some of this code has been taken from tcpdump, which was developed
by the Network Research Group at Lawrence Berkeley National Lab,
and is copyrighted by the University of California Regents.
******************************************************************************
DESCRIPTION
Snort is an open source network intrusion detection system, capable of
performing real-time traffic analysis and packet logging on IP networks.
It can perform protocol analysis and content searching/matching in order to
detect a variety of attacks and probes, such as buffer overflows, stealth port
scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more.
Snort uses a flexible rules language to describe traffic that it should collect
or pass, as well as a detection engine that utilizes a modular plugin
architecture. Snort has a real- time alerting capability as well,
incorporating alerting mechanisms for syslog, user specified files, and EventLog.
Snort has three primary functional modes. It can be used as a straight
packet sniffer like tcpdump(1), a packet logger (useful for network traffic
debugging, etc), or as a full blown network intrusion detection system.
Snort logs packets in either tcpdump(1) binary format or in Snort's decoded
ASCII format to a hierarcical set of directories that are named based on the IP
address of the remote host.
Plugins allow the detection and reporting subsystems to be extended. Available
plugins include database or XML logging, small fragment detection, portscan
detection, and HTTP URI normalization, IP defragmentation, TCP stream
reassembly and statistical anomaly detection.
******************************************************************************
[*][USAGE]
Command line:
snort -[options] <filters>
Options:
-A <alert> Set <alert> mode to full, fast or none. Full mode
does normal "classic Snort"-style alerts to the alert
file. Fast mode just writes the timestamp, message,
IPs, and ports to the file. None turns off alerting.
There is experimental support for UnixSock alerts
that allow alerting to a sepreate process. Use the
"unsock" argument to activate this feature.
** UNIXSOCK IS NOT SUPPORTED IN THIS WIN32 RELEASE. **
-a Display ARP packets
-b Log packets in tcpdump format. All packets are logged
in their native binary state to a tcpdump formatted
log file called "snort.log". This option results in
much faster operation of the program since it doesn't
have to spend time in the packet binary->text
converters. Snort can keep up pretty well with 100Mbps
networks in "-b" mode.
-c <cf> Use configuration file <cf>. This is the rules file
which tells the system what to log, alert on, or pass!
-C Dump the ASCII characters in packet payloads only, no
hexdump
-d Dump the application layer data
-D Run Snort in daemon mode. Alerts are sent to
/var/log/snort/alert unless otherwise specified.
** NOT SUPPORTED IN THIS WIN32 RELEASE. **
-e Display/log the layer 2 packet header data.
-E Log all events to the Windows EventLog.
-F <bpf> Read BPF filters from file <bpf>. Handy for those of
you running Snort as a SHADOW replacement or with a
love of super complex BPF filters.
-g <gname> Run Snort as group ID <gname> after initialization.
This switch allows Snort to drop root priveleges after
it's initialization phase has completed as a security
measure. ** NOT SUPPORTED IN THIS WIN32 RELEASE. **
-h <hn> Set the "home network" to <hn>, which is a class C IP
address something like 192.168.1.0 or whatever. If you
use this switch, traffic coming from external networks
will be formatted with the directional arrow of the
packet dump pointing right for incoming external
traffic, and left for outgoing internal traffic. Kind
of silly, but it looks nice.
-i <if> Sniff on network interface <if>.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -