Snort Challenge - Live Attacks
Room Link: https://tryhackme.com/room/snortchallenges2
Kali
sudo gedit /etc/snort/rules/local.rules &
local.rules
drop tcp any any -> any any (sid: 1000001;)
Stop the attack and get the flag (which will appear on your Desktop)
Kali
sudo snort -c /etc/snort/snort.conf -q -Q --daq afpacket -i eth0:eth1 -A full
What is the name of the service under attack?
Kali
sudo snort -c /etc/snort/snort.conf -q -Q --daq afpacket -i eth0:eth1 -A console

What is the used protocol/port in the attack?
Kali
sudo snort -c /etc/snort/snort.conf -q -Q --daq afpacket -i eth0:eth1 -A console

Stop the attack and get the flag (which will appear on your Desktop)
Kali
sudo gedit /etc/snort/rules/local.rules &
local.rules
drop tcp any any -> any any (sid: 1000001;)
Kali
sudo snort -c /etc/snort/snort.conf -q -Q --daq afpacket -i eth0:eth1 -A full
What is the name of the service
Kali
sudo snort -c /etc/snort/snort.conf -q -Q --daq afpacket -i eth0:eth1 -A console

Last updated