Solved

how can i list interface using snort

Posted on 2009-05-02
5
1,360 Views
Last Modified: 2013-11-29
how can i list interface using snort
when i try
snort -W
it gives error invalid option
0
Comment
Question by:ammadeyy2020
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 1

Expert Comment

by:Onkelt
ID: 24288854
If you check the list of options possible to run here:
http://nsmwiki.org/Snort#Usage

You will se the "-w" (lowercase) is primarily to

-w         Dump 802.11 management and control frames

It could be possible that using Uppercase lettering prevents your command from running.
0
 

Author Comment

by:ammadeyy2020
ID: 24288865
snort -w
invalid input
i have upgraded the version to latest version, still same issue
0
 
LVL 1

Expert Comment

by:Onkelt
ID: 24288878
Ahh, I forgot to ask, are you using Windows or Linux to run snort?

After some digging it seems the -w option only works in the Windows version.
0
 

Author Comment

by:ammadeyy2020
ID: 24288880
linux
0
 
LVL 1

Accepted Solution

by:
Onkelt earned 500 total points
ID: 24288889
Then you should type

ifconfig -a

to show all your available interfaces.

Then you run snort with

snort -i <interface>

or if you only have one interface available,
make snort listen on the first available interface:

snort -v

Hope this helps.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question