⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 snort.conf

📁 This is the snapshot of Snot Latest Rules
💻 CONF
📖 第 1 页 / 共 3 页
字号:
#--------------------------------------------------#   http://www.snort.org     Snort current Ruleset#     Contact: snort-sigs@lists.sourceforge.net#--------------------------------------------------# $Id: snort.conf,v 1.183.4.4 2007/10/22 21:33:23 mwatchinski Exp $##################################################### This file contains a sample snort configuration. # You can take the following steps to create your own custom configuration:##  1) Set the variables for your network#  2) Configure dynamic loaded libraries#  3) Configure preprocessors#  4) Configure output plugins#  5) Add any runtime config directives#  6) Customize your rule set##################################################### Step #1: Set the network variables:## You must change the following variables to reflect your local network. The# variable is currently setup for an RFC 1918 address space.## You can specify it explicitly as: ## var HOME_NET 10.1.1.0/24## or use global variable $<interfacename>_ADDRESS which will be always# initialized to IP address and netmask of the network interface which you run# snort at.  Under Windows, this must be specified as# $(<interfacename>_ADDRESS), such as:# $(\Device\Packet_{12345678-90AB-CDEF-1234567890AB}_ADDRESS)## var HOME_NET $eth0_ADDRESS## You can specify lists of IP addresses for HOME_NET# by separating the IPs with commas like this:## var HOME_NET [10.1.1.0/24,192.168.1.0/24]## MAKE SURE YOU DON'T PLACE ANY SPACES IN YOUR LIST!## or you can specify the variable to be any IP address# like this:# Set up network addresses you are protecting.  A simple start might be RFC1918var HOME_NET any# Set up the external network addresses as well.  A good start may be "any"var EXTERNAL_NET any# Configure your server lists.  This allows snort to only look for attacks to# systems that have a service up.  Why look for HTTP attacks if you are not# running a web server?  This allows quick filtering based on IP addresses# These configurations MUST follow the same configuration scheme as defined# above for $HOME_NET.  # List of DNS servers on your network var DNS_SERVERS $HOME_NET# List of SMTP servers on your networkvar SMTP_SERVERS $HOME_NET# List of web servers on your networkvar HTTP_SERVERS $HOME_NET# List of sql servers on your network var SQL_SERVERS $HOME_NET# List of telnet servers on your networkvar TELNET_SERVERS $HOME_NET# List of snmp servers on your networkvar SNMP_SERVERS $HOME_NET# List of ftp servers on your networkvar FTP_SERVERS $HOME_NET# List of ssh servers on your networkvar SSH_SERVERS $HOME_NET# List of pop2/3 servers on your networkvar POP_SERVERS $HOME_NET# List of imap servers on your networkvar IMAP_SERVERS $HOME_NET# List of SunRPC servers on your networkvar RPC_SERVERS $HOME_NET# List of web servers on your networkvar WWW_SERVERS $HOME_NET# AIM servers.  AOL has a habit of adding new AIM servers, so instead of# modifying the signatures when they do, we add them to this list of servers.var AIM_SERVERS [64.12.24.0/23,64.12.28.0/23,64.12.161.0/24,64.12.163.0/24,64.12.200.0/24,205.188.3.0/24,205.188.5.0/24,205.188.7.0/24,205.188.9.0/24,205.188.153.0/24,205.188.179.0/24,205.188.248.0/24]# Configure your service ports.  This allows snort to look for attacks destined# to a specific application only on the ports that application runs on.  For# example, if you run a web server on port 8081, set your HTTP_PORTS variable# like this:## var HTTP_PORTS 8081## Port lists must either be continuous [eg 80:8080], or a single port [eg 80].# We will adding support for a real list of ports in the future.# Ports you run web servers on## Please note:  [80,8080] does not work.# If you wish to define multiple HTTP ports, use the following convention# when customizing your rule set (as part of Step #6 below).  This should# not be done here, as the rules files may depend on the classifications# and/or references, which are included below.# ## var HTTP_PORTS 80 ## include somefile.rules ## var HTTP_PORTS 8080## include somefile.rules # HTTP Ports on your networkportvar HTTP_PORTS [80,2301,3128,8000,8080,8180,8888]# Ports you want to look for SHELLCODE on.portvar SHELLCODE_PORTS !80# Ports you do oracle attacks onportvar ORACLE_PORTS 1521# Auth / ident portvar AUTH_PORTS 113# DNSportvar DNS_PORTS 53# Fingerportvar FINGER_PORTS 79# Ftpportvar FTP_PORTS 21# Imapportvar IMAP_PORTS 143# IRCportvar IRC_PORTS [6665,6666,6667,6668,6669,7000]# MS-SQLportvar MSSQL_PORTS 1433# NNTPportvar NNTP_PORTS 119# POP2portvar POP2_PORTS 109# POP3 portvar POP3_PORTS 110# PortMapperportvar SUNRPC_PORTS [111,32770,32771,32772,32773,32774,32775,32776,32777,32778,32779]# rloginportvar RLOGIN_PORTS 513# rshportvar RSH_PORTS 514# smbportvar SMB_PORTS [139,445]# smtpportvar SMTP_PORTS 25# snmpportvar SNMP_PORTS 161# sshportvar SSH_PORTS 22# telnetportvar TELNET_PORTS 23# mail this for compatability with versions of snort that support port listsportvar MAIL_PORTS [25,143,465,691]# SSL Portsportvar SSL_PORTS [25,443,465,636,993,995]# Path to your rules files (this can be a relative path)# Note for Windows users:  You are advised to make this an absolute path,# such as:  c:\snort\rulesvar RULE_PATH ../rules# Configure the snort decoder# ============================## Snort's decoder will alert on lots of things such as header# truncation or options of unusual length or infrequently used tcp options### Stop generic decode events:## config disable_decode_alerts## Stop Alerts on experimental TCP options## config disable_tcpopt_experimental_alerts## Stop Alerts on obsolete TCP options## config disable_tcpopt_obsolete_alerts## Stop Alerts on T/TCP alerts## In snort 2.0.1 and above, this only alerts when a TCP option is detected# that shows T/TCP being actively used on the network.  If this is normal# behavior for your network, disable the next option.## config disable_tcpopt_ttcp_alerts## Stop Alerts on all other TCPOption type events:## config disable_tcpopt_alerts## Stop Alerts on invalid ip options## config disable_ipopt_alerts## Alert if value in length field (IP, TCP, UDP) is greater than the# actual length of the captured portion of the packet that the length# is supposed to represent:## config enable_decode_oversized_alerts## Same as above, but drop packet if in Inline mode -# enable_decode_oversized_alerts must be enabled for this to work:## config enable_decode_oversized_drops#config checksum_mode: allconfig disable_decode_alertsconfig disable_tcpopt_experimental_alertsconfig disable_tcpopt_obsolete_alertsconfig disable_ttcp_alertsconfig disable_tcpopt_alertsconfig disable_ipopt_alertsconfig disable_decode_drops# Configure the detection engine# ===============================## Use a different pattern matcher in case you have a machine with very limited# resources:## config detection: search-method lowmemconfig detection: search-method ac-bnfaconfig detection: max_queue_events 5config event_queue: max_queue 8 log 3 order_events content_length# Configure Inline Resets# ========================# # If running an iptables firewall with snort in InlineMode() we can now# perform resets via a physical device. We grab the indev from iptables# and use this for the interface on which to send resets. This config# option takes an argument for the src mac address you want to use in the# reset packet.  This way the bridge can remain stealthy. If the src mac# option is not set we use the mac address of the indev device. If we# don't set this option we will default to sending resets via raw socket,# which needs an ipaddress to be assigned to the int.## config layer2resets: 00:06:76:DD:5F:E3#################################################### Step #2: Configure dynamic loaded libraries## If snort was configured to use dynamically loaded libraries,# those libraries can be loaded here.## Each of the following configuration options can be done via# the command line as well.## Load all dynamic preprocessors from the install path# (same as command line option --dynamic-preprocessor-lib-dir)#dynamicpreprocessor file /usr/local/lib/snort_dynamicpreprocessor/libsf_dcerpc_preproc.sodynamicpreprocessor file /usr/local/lib/snort_dynamicpreprocessor/libsf_dns_preproc.sodynamicpreprocessor file /usr/local/lib/snort_dynamicpreprocessor/libsf_ftptelnet_preproc.sodynamicpreprocessor file /usr/local/lib/snort_dynamicpreprocessor/libsf_smtp_preproc.sodynamicpreprocessor file /usr/local/lib/snort_dynamicpreprocessor/libsf_ssh_preproc.so# Comment out above and uncomment this if running OSX##dynamicpreprocessor file /usr/local/lib/snort_dynamicpreprocessor/libsf_dcerpc_preproc.dylib#dynamicpreprocessor file /usr/local/lib/snort_dynamicpreprocessor/libsf_dns_preproc.dylib#dynamicpreprocessor file /usr/local/lib/snort_dynamicpreprocessor/libsf_ftptelnet_preproc.dylib#dynamicpreprocessor file /usr/local/lib/snort_dynamicpreprocessor/libsf_smtp_preproc.dylib#dynamicpreprocessor file /usr/local/lib/snort_dynamicpreprocessor/libsf_ssh_preproc.dylib## Load a specific dynamic preprocessor library from the install path# (same as command line option --dynamic-preprocessor-lib)## dynamicpreprocessor file /usr/local/lib/snort_dynamicpreprocessor/libdynamicexample.so## Load a dynamic engine from the install path# (same as command line option --dynamic-engine-lib)#dynamicengine /usr/local/lib/snort_dynamicengine/libsf_engine.so## Load all dynamic rules libraries from the install path# (same as command line option --dynamic-detection-lib-dir)## dynamicdetection directory /usr/local/lib/snort_dynamicrule/## Load a specific dynamic rule library from the install path# (same as command line option --dynamic-detection-lib)## Rule packages from the VRT contain a so_rules directory that contains these rules# you need to compile them using the makefile in the rules package and place# them here and add them.## Uncomment if you are using the default VRT SO rules and have them in this directory.# dynamicdetection file /usr/local/lib/snort_dynamicrule/bad-traffic.so# dynamicdetection file /usr/local/lib/snort_dynamicrule/dos.so# dynamicdetection file /usr/local/lib/snort_dynamicrule/exploit.so# dynamicdetection file /usr/local/lib/snort_dynamicrule/misc.so# dynamicdetection file /usr/local/lib/snort_dynamicrule/netbios.so

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -