Network Analysis

 

 

Write a report on one of the TQM topics or methods: its application areas, advantages, and disadvantages preferably in a field related to your work. Analyze and discuss the finding as well as recommend future opportunities for improvement.
Use a research paper approach and structure that includes abstract, keywords, introduction, literature review, methodology, analysis of results, conclusion and references.
You should include at least 10 recent and relevant references.
References should be cited in the text of the report.

 

 

 

 

 

 

Install Snort
Open a terminal in your Kali, enter # snort Snort wil start to run in packet dump mode.
If snort is not installed in your machine enter the folloiwng command snort will be installed .
If you are using a old Kali you need to install from Wheezy database.
After Snort installs, a blue screen appears asking for the “Address range for your local
network”. In MBV249, it’s 192.168.1.0/24. If you are doing from home, check your subnet
mask, if 255.255.255.0 then it is /24. Enter the range of your network set it to the IP address of
the victim, your Kali machine), press Tab to highlight OK, and press Enter. (Later we will
Check if snort is under /etc. If you find snort , change diretctory to snort ( cd snort )
Now do a ls so that you can see the all the files under snort directory.
A few important locations:
1. SNORT configuration: /etc/snort/snort.conf
2. SNORT debian configuration: /etc/snort/snort.debian.conf
3. SNORT rules: /etc/snort/rules
4. SNORT exuecuble: /usr/sbin/snort
Configure SNORT
The main configuration file for SNORT is /etc/snort/snort.conf file. This is a big configuration
file. (If required you can edit it, opening with an editor such as nano, vi, leafpad etc.) For this
lab, we don’t need to touch the snort.conf now. To check what’s in it – use cat .
Now cat it. Go over the config file, check it.
Check the HOME_NET and Interface related configuration from /etc/snort/snort.debian.conf .
During installation process if you have defined your HOME_NET properly; then you can leave it
as it is and don’t need to edit it anymore. However, it is recommended that you must set the
HOME_NET to the IP address of the victim machine, in your case the current ipAddress if your
Kali VM.
# nano snort.debian.conf and change the DEBIAN_SNORT_HOME_NET
The default config file ( /etc/snort/snort.conf ) is quite self-explanatory, with helpful comments
leading the user through the steps of customizing the configuration to its own needs.
(In this lab we only set the network Variables, and customize the rule set. Also because we are
using Kali, we edited snort.debin.conf.
If you are using other Linux, you might need to open the snort.conf in order to edit. The
network variables we modify are the HOME_NET and the EXTERNAL_NET, which can be
configured by changing the following lines:
ipvar HOME_NET 192.168.56.101 ( the internal network range, the subnet we are trying
to protect. You can set it to the IP address of the victim machine)
ipvar EXTERNAL_NET !$HOME_NET ( the external network range, in our case everything
which is not in the internal network range)
Again if you use a Debian distro like Kali, you need to open the snort.debian.conf
Also In order to only alert to those packets you want, you may want to disable all predefined
rules. To disable all the line having include $RULE\_PATH, you can comment them out (put #).
Include a new rules file
Instead of changing the snort.conf in this lab we will create our own .conf file. Use and editor to
create a file in snort-ITN266.conf under /etc/snort
Then create a rule with your last name.
In the terminal type # nano snort-ITN266.conf
include /etc/snort/myName-icmp.rules ( for me it is include /etc/snort/sdas-icmp.rules)
Save the file with Ctrl+X, Y, Enter.
Now create the rule
We will start with a very simple rule into our myName-icmp.rules file:
alert icmp any any > any any (msg:”Ping detected”;sid:1000477; rev:1;)
(Please read how to crate snort rule https://blog.rapid7.com/2016/12/09/understanding-andconfiguring-snort-rules/ )
Note each rule you write should have a unique SID. The sid: 1000477; rev:1 ; in the rule are
required to keep Snort happy.
Run Snort, (check the alert/packets)
snort -c /etc/snort/snort-ITN266.conf -l /var/log/snort -i eth0
Your interface name may be different from eth0. Also the last switch is a lowercase L, not the
number 1. Soon your snort – will start to throw alert .
But we only want to alert for ping! So we can include a new option in the rule. Open the
myName.rules in an editor and modify it.
# nano myName-icmp.rules
alert icmp any any -> any any (msg:”Ping detected”; itype:8; sid:1000477; rev:1)
The option itype stands for ICMP packet type.
If we run Snort as below, (in packet sniffer mode ) you can see it in the packets.
snort -dev -c /etc/snort/snort.conf -l /var/log/snort/ -i eth0
Now check if your rule is actually working, ping 8.8.8.8 from another terminal. Snort will catch
the outgoing (ICMP Echo request) and incoming (ICMP Echo reply) packets.
You can see that the ECHO packets have type 8 and the ECHO REPLY packets have type 0, so we
chose type 8 correctly.
You can stop Snort anytime by pressing Ctrl+C.
Stop snort, and check the alert output file at /var/log/snort
The snort.config file has several rules, very well defined. Let’s use some of them. In a Terminal
window, run snort (use the –v switch) snort -v -i eth0 -l /var/log/snort -c
/etc/snort/snort.conf
Snort starts, showing a “Commencing packet processing” message.
Meanwhile Open another Terminal on your other vm or in host machine, run a default Nmap
scan of your Kali Linux machine, you will see snort will start throwing this.
After we stop running Snort, it outputs some useful statistics. Many of these are selfexplanatory, the main parts and the interesting section, where we can check the following:
Processing rates, Packet I/O Totals, Protocol statistics, Actions, Limits, and Verdicts etc.
Go ahead and check the snort log file ( tail -f /var/log/snort/alert ) we will see an alter that
a nmap scan was being run.
In part II (Not now, May be extra credit) we will use Snort to throw Alert for browsing any
particular website
Useful Sites:
https://www.securityarchitecture.com/learning/intrusion-detection-systems-learning-withsnort/configuring-snort-on-linux/
https://blog.rapid7.com/2016/12/09/understanding-and-configuring-snort-rules/

 

 

 

 

 

 

49.

This page of the article has 3731 words. Download the full form above.

Piotr Ilitch Tchaikovsky was a Russian arranger of the Romantic period, conceived on May 7, 1840AM in Votkinsk, Russia. His works incorporate orchestras, concertos, dramas, ballet productions, ambiance music, and a choral setting of the Russian Orthodox Divine Liturgy. A portion of these are among the most well known dramatic music in the old style collection including the ballet productions Swan Lake, The Sleeping Beauty and The Nutcracker. He was the main Russian arranger whose music established a long term connection globally, which he reinforced with appearances as a visitor conductor later in his vocation in Europe and the United States. Tchaikovsky was respected in 1884 by Emperor Alexander III, and granted a lifetime annuity in the late 1880s.

Family

Tchaikovsky was destined to a genuinely well off working class family. His dad, named Ilya Tchaikovsky was a mining business official in Votkinsk. His father\’s predecessors were from Ukraine and Poland. His mom, named Aleksandra Assier, was of Russian and French family line. His dad, Ilya Petrovich (a double cross separated) wedded Alexandra and the two had two children, Pyotr and Modest.

Adolescence and Mother demise

Tchaikovsky began piano investigations at five and before long demonstrated wonderful blessings. He additionally learned

to understand French and German by the age of six. After a year, he was composing French refrains. The family employed a tutor, Fanny Dürbach, to oversee the kids, and she regularly alluded to Tchaikovsky as the \”porcelain child.\” Tchaikovsky was ultra delicate to music. He would whine around evening time that the music in his mind would not allow him to rest.

50.

 

Since the two guardians had moved on from establishments in Saint Petersburg, they chose to teach Tchaikovsky as they had themselves been instructed. The School of Jurisprudence primarily served the lesser respectability and would get ready Tchaikovsky for a vocation as a government worker. As the base age for acknowledgment was 12 and Tchaikovsky was just 10 at that point, he was required to go through two years boarding at the Imperial School of Jurisprudence\’s private academy, 1300 km from his family. When those two years had passed, Tchaikovsky moved to the Imperial School of Jurisprudence to start a seven-year course of studies. Tchaikovsky\’s division from his mom to go to live-in school caused a passionate injury that tormented him for an incredible duration.

On June 25, 1854, when he was 14 Tchaikovsky endured the stun of his mother\’s demise from cholera. His splitting from his mom was agonizing – an occasion that may have invigorated him to form. Tchaikovsky moaned about the loss of his mom for an amazing remainder, and conceded that it had \”a tremendous effect in transit things showed up for me”. He was influenced to the point that he couldn’t educate Fanny Dürbach, until two years sometime later.

Tchaikovsky\’s dad, who additionally got wiped out with cholera as of now however made a full recuperation, quickly sent the kid back to St. Petersburg school with the expectation that the class work would consume his psyche.

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.