2013-04-22 57 views
2

我試圖在CentOS 6.4上測試snort 2.9.4,但在控制檯上看不到任何警報。我用下面的命令運行它:SNORT沒有通知控制檯

鼻息-i的eth2 -c /etc/snort/snort.conf

ETH2是連接到跨度端口的接口。如果我在界面上做了一個tcpdump,我可以獲得大量的數據。

我在local.rules以下規則:

alert icmp any any -> any any (msg: "ICMP Testing Rule"; sid:1000001; rev:1;) 
alert tcp any any -> any 80 (msg: "TCP Testing Rule"; sid:1000002; rev:1;) 
alert udp any any -> any any (msg: "UDP Testing Rule"; sid:1000003; rev:1;) 

當我打 「控制c。」 我得到以下數據:

=============================================================================== 
Run time for packet processing was 817.54341 seconds 
Snort processed 17555 packets. 
Snort ran for 0 days 0 hours 13 minutes 37 seconds 
    Pkts/min:   1350 
    Pkts/sec:   21 
=============================================================================== 
Packet I/O Totals: 
    Received:  17610 
    Analyzed:  17555 (99.688%) 
    Dropped:   55 ( 0.311%) 
    Filtered:   0 ( 0.000%) 
Outstanding:   55 ( 0.312%) 
    Injected:   0 
=============================================================================== 
Breakdown by protocol (includes rebuilt packets): 
     Eth:  17599 (100.000%) 
     VLAN:   0 ( 0.000%) 
     IP4:  17175 (97.591%) 
     Frag:   0 ( 0.000%) 
     ICMP:   16 ( 0.091%) 
     UDP:   794 ( 4.512%) 
     TCP:  16365 (92.988%) 
     IP6:   12 ( 0.068%) 
    IP6 Ext:   12 ( 0.068%) 
    IP6 Opts:   0 ( 0.000%) 
     Frag6:   0 ( 0.000%) 
     ICMP6:   12 ( 0.068%) 
     UDP6:   0 ( 0.000%) 
     TCP6:   0 ( 0.000%) 
    Teredo:   12 ( 0.068%) 
    ICMP-IP:   0 ( 0.000%) 
     EAPOL:   0 ( 0.000%) 
    IP4/IP4:   0 ( 0.000%) 
    IP4/IP6:   0 ( 0.000%) 
    IP6/IP4:   0 ( 0.000%) 
    IP6/IP6:   0 ( 0.000%) 
     GRE:   0 ( 0.000%) 
    GRE Eth:   0 ( 0.000%) 
    GRE VLAN:   0 ( 0.000%) 
    GRE IP4:   0 ( 0.000%) 
    GRE IP6:   0 ( 0.000%) 
GRE IP6 Ext:   0 ( 0.000%) 
    GRE PPTP:   0 ( 0.000%) 
    GRE ARP:   0 ( 0.000%) 
    GRE IPX:   0 ( 0.000%) 
    GRE Loop:   0 ( 0.000%) 
     MPLS:   0 ( 0.000%) 
     ARP:   3 ( 0.017%) 
     IPX:   0 ( 0.000%) 
    Eth Loop:   0 ( 0.000%) 
    Eth Disc:   0 ( 0.000%) 
    IP4 Disc:   0 ( 0.000%) 
    IP6 Disc:   0 ( 0.000%) 
    TCP Disc:   0 ( 0.000%) 
    UDP Disc:   0 ( 0.000%) 
    ICMP Disc:   0 ( 0.000%) 
All Discard:   0 ( 0.000%) 
     Other:   421 ( 2.392%) 
Bad Chk Sum:   0 ( 0.000%) 
    Bad TTL:   0 ( 0.000%) 
    S5 G 1:   11 ( 0.063%) 
    S5 G 2:   33 ( 0.188%) 
     Total:  17599 
=============================================================================== 
Action Stats: 
    Alerts:   4933 (28.030%) 
    Logged:   4933 (28.030%) 
    Passed:   0 ( 0.000%) 
Limits: 
     Match:   0 
     Queue:   0 
     Log:   0 
     Event:   0 
     Alert:   261 
Verdicts: 
     Allow:  13263 (75.315%) 
     Block:   0 ( 0.000%) 
    Replace:   0 ( 0.000%) 
    Whitelist:   4292 (24.373%) 
    Blacklist:   0 ( 0.000%) 
    Ignore:   0 ( 0.000%) 
=============================================================================== 
Frag3 statistics: 
     Total Fragments: 0 
     Frags Reassembled: 0 
       Discards: 0 
      Memory Faults: 0 
       Timeouts: 0 
       Overlaps: 0 
       Anomalies: 0 
       Alerts: 0 
        Drops: 0 
    FragTrackers Added: 0 
    FragTrackers Dumped: 0 
FragTrackers Auto Freed: 0 
    Frag Nodes Inserted: 0 
    Frag Nodes Deleted: 0 
=============================================================================== 
Stream5 statistics: 
      Total sessions: 643 
       TCP sessions: 285 
       UDP sessions: 358 
      ICMP sessions: 0 
       IP sessions: 0 
       TCP Prunes: 0 
       UDP Prunes: 0 
       ICMP Prunes: 0 
       IP Prunes: 0 
TCP StreamTrackers Created: 285 
TCP StreamTrackers Deleted: 285 
       TCP Timeouts: 0 
       TCP Overlaps: 0 
     TCP Segments Queued: 7229 
    TCP Segments Released: 7229 
     TCP Rebuilt Packets: 1401 
     TCP Segments Used: 7068 
       TCP Discards: 95 
        TCP Gaps: 4 
     UDP Sessions Created: 358 
     UDP Sessions Deleted: 358 
       UDP Timeouts: 0 
       UDP Discards: 0 
        Events: 0 
      Internal Events: 0 
      TCP Port Filter 
        Dropped: 0 
       Inspected: 0 
        Tracked: 16321 
      UDP Port Filter 
        Dropped: 0 
       Inspected: 51 
        Tracked: 358 
=============================================================================== 
HTTP Inspect - encodings (Note: stream-reassembled packets included): 
    POST methods:       8 
    GET methods:       238 
    HTTP Request Headers extracted:  261 
    HTTP Request Cookies extracted:  94 
    Post parameters extracted:   8 
    HTTP response Headers extracted:  251 
    HTTP Response Cookies extracted:  18 
    Unicode:        0 
    Double unicode:      0 
    Non-ASCII representable:    0 
    Directory traversals:     0 
    Extra slashes ("//"):     37 
    Self-referencing paths ("./"):  0 
    HTTP Response Gzip packets extracted: 55 
    Gzip Compressed Data Processed:  363978.00 
    Gzip Decompressed Data Processed:  1132880.00 
    Total packets processed:    8600 
=============================================================================== 
SMTP Preprocessor Statistics 
    Total sessions         : 0 
    Max concurrent sessions       : 0 
=============================================================================== 
dcerpc2 Preprocessor Statistics 
    Total sessions: 0 
=============================================================================== 
SSL Preprocessor: 
    SSL packets decoded: 1159 
      Client Hello: 134 
      Server Hello: 121 
      Certificate: 89 
      Server Done: 228 
    Client Key Exchange: 77 
    Server Key Exchange: 9 
     Change Cipher: 214 
       Finished: 0 
    Client Application: 151 
    Server Application: 59 
       Alert: 0 
    Unrecognized records: 608 
    Completed handshakes: 0 
     Bad handshakes: 0 
     Sessions ignored: 59 
    Detection disabled: 0 
=============================================================================== 
SIP Preprocessor Statistics 
    Total sessions: 0 
=============================================================================== 
Snort exiting 

謝謝。

回答

0

什麼是你的snort.conf中的文件提醒設置?另外我建議在運行snort時運行tail -f <path to snort alert file>,以便在發生這些警報時看到這些警報。

+0

謝謝,我做了tail -f,可以看到警報。我重建了一個不同的圖像,所有工作。 – user2220115 2015-07-03 14:21:42

0

嗯,也許你可以試試這個在終端:

snort -i eth2 -A full 
+0

你能否詳細說明你的答案並多解釋一下?當你在Stackoverflow中的聲望會更高時,你將能夠在問題下發表評論。當你發佈答案時,其他人可能會認爲這個問題已經有了寶貴的答案,並且可能不再關注它了。 – Sergio 2013-06-23 08:10:17