Solved

Snort, Etheral in a linux distribution system

Posted on 2007-04-01
6
1,702 Views
Last Modified: 2013-11-29
Besides SENTINIX (discontinued), is there an ACID or Snort + Etheral linux distribution system?

Thanks.
0
Comment
Question by:nakedconsulting
6 Comments
 
LVL 12

Expert Comment

by:StuFox100
ID: 18834877
Not sure what you are after - but something that maybe of interest are VMWare Appliances.
Check this one out:
http://www.vmware.com/vmtn/appliances/directory/295
Cheers
Stu
0
 
LVL 1

Expert Comment

by:GoUdVisKe
ID: 18891514
I think he's looking for a distro which has this software preinstalled, preferably without any other crap on it, if this is what you're asking for I don't think there is one. Just take a basic debian, install it without gui and stuff, strip it down a bit removing processes you don't need, and install snort with it's requirements.

S
0
 
LVL 1

Accepted Solution

by:
GoUdVisKe earned 250 total points
ID: 18891556
I forgot, there is a live CD which more or less has what you require: http://www.networksecuritytoolkit.org/nst/index.html
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 

Expert Comment

by:bengyson
ID: 18944590
Hi,

I believe this is what you looking for. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT sensor. Running on CentOS, all has been fully configured and ready to run in VMware.

URL - http://sourceforge.net/projects/secureideas
0
 
LVL 12

Expert Comment

by:jahboite
ID: 19053316
Put back|track 2 in your arsenal.
http://www.remote-exploit.org/backtrack_download.html
0
 
LVL 2

Expert Comment

by:JasonPJohnson
ID: 25380482
They lost developers a long time ago but are now back in the game. http://www.skynet-solutions.net/easyids/

Easy IDS is a Snort / BASE / nmap distro that truly lives up to its name.

Install on a machine and you are ready to go . It is based off CentOS. I have it running on a few IDS around town.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
This video will demonstrate how to find the puppet warp tool from the edit menu and where to put the points to edit.
Using Adobe Premiere Pro, the viewer will learn how to set up a sequence with proper settings, importing pictures, rendering, and exporting the finished product.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now