{"id":1901,"date":"2015-06-25T02:14:43","date_gmt":"2015-06-24T17:14:43","guid":{"rendered":"http:\/\/tech.akat.info\/?p=1901"},"modified":"2015-08-06T01:28:46","modified_gmt":"2015-08-05T16:28:46","slug":"snort","status":"publish","type":"post","link":"https:\/\/tech.akat.info\/?p=1901","title":{"rendered":"snort"},"content":{"rendered":"<h1>Snort\u3068\u306f<\/h1>\n<p>\u76e3\u8996\u3057\u3066\u3044\u308b\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3078\u306e\u4e0d\u6b63\u306a\u4fb5\u5165\u3084\u653b\u6483\u3092\u3001<br \/>\n\u305d\u306e\u624b\u6cd5\u3067\u3042\u308b\u300c\u30d1\u30bf\u30fc\u30f3\u30eb\u30fc\u30eb\u30bb\u30c3\u30c8\u300d(\u30b7\u30b0\u30cd\u30c1\u30e3)\u3068\u7167\u3089\u3057\u5408\u308f\u305b<br \/>\n\u30de\u30c3\u30c1\u30f3\u30b0\u3057\u3066\u3044\u308b\u3082\u306e\u3092\u691c\u77e5\u3057\u3001\u30ed\u30b0\u3068\u3057\u3066\u8a18\u9332\u3059\u308b<br \/>\n\u3064\u307e\u308aIDS(Intrusion Detection System, \u4e0d\u6b63\u4fb5\u5165\u691c\u77e5\u30b7\u30b9\u30c6\u30e0)\u3067\u3042\u308b<br \/>\n\u300cInline\u30e2\u30fc\u30c9\u300d\u3068\u3059\u308b\u3068IPS(Intrusion Prevention System, \u4e0d\u6b63\u4fb5\u5165\u9632\u6b62\u30b7\u30b9\u30c6\u30e0)\u6a5f\u80fd\u3082\u5229\u7528\u53ef\u80fd<br \/>\nIDS\u306f\u4e0d\u6b63\u306a\u30d1\u30b1\u30c3\u30c8\u3092\u8a18\u9332\u3057\u3001IPS\u306f\u4e0d\u6b63\u306a\u30d1\u30b1\u30c3\u30c8\u3092\u7834\u68c4\u3059\u308b<\/p>\n<h1>\u30e2\u30fc\u30c9<\/h1>\n<p>\u30b9\u30cb\u30c3\u30d5\u30a1\u30fc\u30e2\u30fc\u30c9\u3067\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u6d41\u308c\u308b\u30d1\u30b1\u30c3\u30c8\u3092\u5358\u306b\u8aad\u307f\u8fbc\u307f\u3001\u5165\u3063\u3066\u304f\u308b\u30d1\u30b1\u30c3\u30c8\u3092\u30b3\u30f3\u30bd\u30fc\u30eb\u4e0a\u3067\u6b21\u3005\u3068\u8868\u793a\u3057\u307e\u3059\u3002\u30d1\u30b1\u30c3\u30c8\u30ed\u30ac\u30fc\u30e2\u30fc\u30c9\u3067\u306f\u305d\u308c\u3089\u306e\u30d1\u30b1\u30c3\u30c8\u3092\u30c7\u30a3\u30b9\u30af\u306b\u8a18\u9332\u3057\u307e\u3059\u3002\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u4e0d\u6b63\u4fb5\u5165\u691c\u77e5\u30e2\u30fc\u30c9\u306f\u3001\u6700\u3082\u8907\u96d1\u304b\u3064\u8a2d\u5b9a\u306e\u5909\u66f4\u304c\u53ef\u80fd<\/p>\n<h1>IDS\u306b\u3064\u3044\u3066<\/h1>\n<h2>\u76e3\u8996\u5bfe\u8c61<\/h2>\n<p>IDS\u304c\u76e3\u8996\u3059\u308b\u5bfe\u8c61\u306b\u3088\u3063\u3066\u3001\u300c\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u578b\uff08NIDS\uff09\u300d\u3068\u300c\u30db\u30b9\u30c8\u578b\uff08HIDS\uff09\u300d\u304c\u3042\u308b<br \/>\n\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u578b\u306e\u5834\u5408\u306f\u3001192.168.0.0\/24\u306a\u3069\u306e\u30cd\u30c3\u30c8\u30c3\u30ef\u30fc\u30af\u3092\u76e3\u8996\u3057\u3001\u57fa\u672c\u7684\u306bNIC\u306bIP\u30a2\u30c9\u30ec\u30b9\u3092\u5272\u308a\u632f\u3089\u305a\u306b\u904b\u7528\u3059\u308b<br \/>\n\u30db\u30b9\u30c8\u578b\u306fIDS\u304c\u7a3c\u50cd\u3057\u3066\u3044\u308b\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u81ea\u8eab\u3092\u76e3\u8996\u3059\u308b<\/p>\n<h2>\u5206\u6790\u65b9\u6cd5<\/h2>\n<p>\u5206\u6790\u65b9\u6cd5\u306b\u3088\u3063\u3066\u300c\u30b7\u30b0\u30cd\u30c1\u30e3\u578b\u300d\u3068\u300c\u30a2\u30ce\u30de\u30ea\u578b\u300d\u304c\u3042\u308b<br \/>\n\u30b7\u30b0\u30cd\u30c1\u30e3\u578b\uff1a\u300c\u25cb\u25cb\u306e\u5834\u5408\u306f\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u3067\u3042\u308b\u300d\u3068\u3044\u3063\u305f\u60c5\u5831(\u30b7\u30b0\u30cd\u30c1\u30e3)\u3068\u73fe\u5728\u306e\u30d1\u30b1\u30c3\u30c8\u3092\u7167\u3089\u3057\u5408\u308f\u305b\u308b<br \/>\n\u30a2\u30ce\u30de\u30ea\u578b\u3000\uff1a\u3057\u304d\u3044\u5024\u3092\u8a2d\u5b9a\u3057\u3001\u305d\u308c\u3092\u8d85\u3048\u305f\u6642\u306b\u30a8\u30e9\u30fc\u3068\u306a\u308b(\u4f8b\u3048\u3070\u300110Mbps\u3092\u3057\u304d\u3044\u5024\u3068\u3059\u308b\u3068\u3001\u3053\u308c\u3092\u8d85\u3048\u305f\u6642\u306b\u30a2\u30e9\u30fc\u30c8\u3068\u306a\u308b)<\/p>\n<h1>Snort\u69cb\u6210<\/h1>\n<p>\u30fb\u30d1\u30b1\u30c3\u30c8\u30c7\u30b3\u30fc\u30c0<br \/>\n\u3000\u30c7\u30fc\u30bf\u30ea\u30f3\u30af\u5c64\u304b\u3089\u30c8\u30e9\u30f3\u30b9\u30dd\u30fc\u30c8\u5c64\u30ec\u30d9\u30eb\u307e\u3067\u306e\u89e3\u6790\u3068\u30c7\u30b3\u30fc\u30c9\u51e6\u7406\u3092\u884c\u3044\u3001\u6b21\u306e\u30d7\u30ea\u30d7\u30ed\u30bb\u30c3\u30b5\u306b\u6e21\u3059\u3002<\/p>\n<p>\u30fb\u30d7\u30ea\u30d7\u30ed\u30bb\u30c3\u30b5<br \/>\n\u3000\u30dd\u30fc\u30c8\u30b9\u30ad\u30e3\u30f3\u3084DoS\u653b\u6483\u306a\u3069\u3092\u8a8d\u8b58\u3059\u308b\u305f\u3081\u306e\u51e6\u7406<br \/>\n\u3000Snort\u306e\u5834\u5408\u3001\u3053\u306e\u3057\u304f\u307f\u306f\u30d7\u30e9\u30b0\u30a4\u30f3\u5f62\u5f0f\u3068\u306a\u3063\u3066\u304a\u308a\u3001\u69d8\u3005\u306a\u30d7\u30ea\u30d7\u30ed\u30bb\u30c3\u30b5\u304c\u7528\u610f\u3055\u308c\u3066\u3044\u308b\u3002<\/p>\n<p>\u30fb\u691c\u77e5\u30a8\u30f3\u30b8\u30f3<br \/>\n\u3000\u30d7\u30ea\u30d7\u30ed\u30bb\u30c3\u30b5\u304b\u3089\u9001\u3089\u308c\u308b\u30d1\u30b1\u30c3\u30c8\u3092\u53d6\u308a\u51fa\u3057<br \/>\n\u3000\u30b7\u30b0\u30cd\u30c1\u30e3\uff08\u30eb\u30fc\u30eb\uff09\u306e\u6761\u4ef6\u306e\u3044\u305a\u308c\u304b\u306b\u8a72\u5f53\u3059\u308b\u304b\u8abf\u67fb\u3059\u308b<br \/>\n\u3000\u8a72\u5f53\u3057\u305f\u5834\u5408\u306f\u30a2\u30e9\u30fc\u30c8\uff08\u8b66\u544a\uff09\u306a\u3069\u3068\u3057\u3066\u30a2\u30a6\u30c8\u30d7\u30c3\u30c8\u3055\u308c\u308b\u3002<\/p>\n<p>\u30fb\u51fa\u529b\u30d7\u30e9\u30b0\u30a4\u30f3<br \/>\n\u3000\u30a2\u30e9\u30fc\u30c8\u3092\u30ed\u30b0\u30d5\u30a1\u30a4\u30eb\u5f62\u5f0f\u3084\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u5f62\u5f0f\u306a\u3069\u3067\u8a18\u9332\u3059\u308b\u3002 <\/p>\n<h1>\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb-debian7<\/h1>\n<pre class=\"brush: plain; title: ; notranslate\" title=\"\">\r\nroot@hostname:\/home\/shimizu# aptitude install snort\r\n\u4ee5\u4e0b\u306e\u65b0\u898f\u30d1\u30c3\u30b1\u30fc\u30b8\u304c\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3055\u308c\u307e\u3059:\r\n  libclass-isa-perl{a} libdaq0{a} libdumbnet1{a} libencode-locale-perl{a} libfile-listing-perl{a} libfont-afm-perl{a} libhtml-form-perl{a}\r\n  libhtml-format-perl{a} libhtml-parser-perl{a} libhtml-tagset-perl{a} libhtml-tree-perl{a} libhttp-cookies-perl{a} libhttp-daemon-perl{a}\r\n  libhttp-date-perl{a} libhttp-message-perl{a} libhttp-negotiate-perl{a} libio-socket-ip-perl{a} libio-socket-ssl-perl{a} libltdl7{a}\r\n  liblwp-mediatypes-perl{a} liblwp-protocol-https-perl{a} libmailtools-perl{a} libmysqlclient18{a} libnet-http-perl{a} libnet-ssleay-perl{a}\r\n  libpcap0.8{a} libpcre3{a} libprelude2{a} libsocket-perl{a} libswitch-perl{a} libtimedate-perl{a} liburi-perl{a} libwww-perl{a}\r\n  libwww-robotrules-perl{a} mysql-common{a} oinkmaster{a} perl{a} perl-modules{a} snort snort-common{a} snort-common-libraries{a}\r\n  snort-rules-default{a}\r\n\u66f4\u65b0: 0 \u500b\u3001\u65b0\u898f\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb: 42 \u500b\u3001\u524a\u9664: 0 \u500b\u3001\u4fdd\u7559: 0 \u500b\u3002\r\n...\r\n\r\nroot@hostname:\/home\/shimizu# snort --version\r\n\r\n   ,,_     -*&gt; Snort! &lt;*-\r\n  o&quot;  )~   Version 2.9.2.2 IPv6 GRE (Build 121)\r\n   ''''    By Martin Roesch &amp; The Snort Team: http:\/\/www.snort.org\/snort\/snort-team\r\n           Copyright (C) 1998-2012 Sourcefire, Inc., et al.\r\n           Using libpcap version 1.3.0\r\n           Using PCRE version: 8.30 2012-02-04\r\n           Using ZLIB version: 1.2.7\r\n\r\nroot@hostname:\/etc# ps afx | grep &#x5B;s]nort\r\n10386 ?        Ssl    0:21 \/usr\/sbin\/snort -m 027 -D -d -l \/var\/log\/snort -u snort -g snort -c \/etc\/snort\/snort.conf -S HOME_NET=&#x5B;100.72.70.151\/255.255.254.0] -i eth0\r\n\r\n### snort.conf\u306fSnort\u306e\u8a2d\u5b9a\u30d5\u30a1\u30a4\u30eb\u3001xxx.rules\u306f\u30eb\u30fc\u30eb\u30bb\u30c3\u30c8 ###\r\nroot@hostname:\/etc# ls snort\/\r\nclassification.config  database.conf  reference.config  snort.conf         threshold.conf\r\ncommunity-sid-msg.map  gen-msg.map    rules             snort.debian.conf  unicode.map\r\n<\/pre>\n<h1>\u30aa\u30d7\u30b7\u30e7\u30f3\u306b\u3064\u3044\u3066<\/h1>\n<p>-D \u30c7\u30fc\u30e2\u30f3\u30e2\u30fc\u30c9\u3067Snort\u3092\u8d77\u52d5<br \/>\n-d \u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u5c64\u306e\u30c7\u30fc\u30bf\u3092\u30c0\u30f3\u30d7<br \/>\n-l \u51fa\u529b\u3055\u308c\u305f\u30ed\u30b0\u3092\u4fdd\u5b58\u3059\u308b\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u3092\u6307\u5b9a<br \/>\n-i \u30d1\u30b1\u30c3\u30c8\u3092\u30b9\u30cb\u30d5\u30a1\u3059\u308b\u30a4\u30f3\u30bf\u30fc\u30d5\u30a7\u30a4\u30b9\u540d\u3092\u6307\u5b9a<br \/>\n-m 027 umask\u5024\u304c\u300c027\u300d\u3064\u307e\u308a\u65b0\u898f\u30d5\u30a1\u30a4\u30eb\u306e\u30d1\u30fc\u30df\u30c3\u30b7\u30e7\u30f3\u306f\u300c640\u300d<br \/>\n-S \u5909\u6570\u3092\u5b9a\u7fa9\u3059\u308b<br \/>\n-b \u30ed\u30b0\u3092tcpdump\u306e\u30d5\u30a9\u30fc\u30de\u30c3\u30c8\u3067\u4fdd\u5b58<\/p>\n<h2>snort -v<\/h2>\n<p>\u30b9\u30cb\u30c3\u30d5\u30a1\u30fc\u30e2\u30fc\u30c9<\/p>\n<h2>snort -v -l \/var\/log\/snort<\/h2>\n<p>\u30d1\u30b1\u30c3\u30c8\u30ed\u30ac\u30fc\u30e2\u30fc\u30c9<\/p>\n<h2>snort -D -h 100.72.70.151\/23 -c \/etc\/snort\/snort.conf -l \/var\/log\/snort -b -d<\/h2>\n<p>\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u4e0d\u6b63\u4fb5\u5165\u691c\u77e5\u30e2\u30fc\u30c9<\/p>\n<h2>\u30b7\u30b0\u30cd\u30c1\u30e3\u8a73\u7d30<\/h2>\n<pre class=\"brush: plain; title: ; notranslate\" title=\"\">\r\nalert tcp $EXTERNAL_NET any -&gt; $TELNET_SERVERS 23 (msg:&quot;TELNET Solaris memory mismanagement exploit attempt&quot;; \r\nflow:to_server,established; \r\ncontent:&quot;|A0 23 A0 10 AE 23 80 10 EE 23 BF EC 82 05 E0 D6 90|%|E0|&quot;; \r\nclasstype:shellcode-detect; \r\nsid:1430; \r\nrev:7;)\r\n<\/pre>\n<p><b>\u30eb\u30fc\u30eb\u30d8\u30c3\u30c0<\/b><br \/>\n()\u3088\u308a\u5de6\u306e\u90e8\u5206<br \/>\nalert:\u30a2\u30e9\u30fc\u30c8\u3092\u51fa\u529b\u3057\u30d1\u30b1\u30c3\u30c8\u306e\u5185\u5bb9\u3092\u30ed\u30b0\u306b\u8a18\u9332\u3059\u308b<br \/>\ntcp:\u30d7\u30ed\u30c8\u30b3\u30eb\u3092\u6307\u5b9a<\/p>\n<p>msg:\u6307\u5b9a\u3055\u308c\u305f\u6587\u5b57\u5217\u3092\u30a2\u30e9\u30fc\u30c8\u307e\u305f\u306f\u30ed\u30b0\u306b\u51fa\u529b<br \/>\ncontent:\u30d1\u30bf\u30fc\u30f3\u30de\u30c3\u30c1\u3002\u3053\u306e\u30d1\u30bf\u30fc\u30f3\u3068\u30de\u30c3\u30c1\u3059\u308b\u3068\u30a2\u30e9\u30fc\u30c8\u3057\u3066\u767b\u9332\u3059\u308b\u3002&#8221;|&#8221;\u3067\u30d0\u30a4\u30ca\u30ea\u3092\u6307\u5b9a\u3059\u308b<\/p>\n<h1>\u30c4\u30fc\u30eb<\/h1>\n<h2>snortsnarf<\/h2>\n<p>Snort\u304c\u51fa\u529b\u3057\u305f\u30a2\u30e9\u30fc\u30c8\u3092\u89e3\u6790\u3057\u3001\u305d\u306e\u7d50\u679c\u3092HTML\u3068\u3057\u3066\u51fa\u529b\u3059\u308b\u30c4\u30fc\u30eb<\/p>\n<h2>Basic Analysis and Security Engine(BASE)<\/h2>\n<p>snort\u306e\u30ed\u30b0\u3092WEB\u4e0a\u3067\u78ba\u8a8d\u3067\u304d\u308b<\/p>\n<h2>oinkmaster<\/h2>\n<p>\u30eb\u30fc\u30eb\u30d5\u30a1\u30a4\u30eb\u3092\u81ea\u52d5\u7684\u306b\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3059\u308b<\/p>\n<h1>\u53c2\u8003URL<\/h1>\n<p>\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u578bIDS\u300cSnort\u300d\u306e\u5c0e\u5165<br \/>\nhttp:\/\/www.atmarkit.co.jp\/ait\/articles\/0205\/18\/news001.html<br \/>\nSnort\u3092\u5c0e\u5165\u3059\u308b<br \/>\nhttp:\/\/www.itmedia.co.jp\/help\/howto\/security\/ids\/01\/<br \/>\nSnort\u3067\u3064\u304f\u308b\u4e0d\u6b63\u4fb5\u5165\u691c\u77e5\u30b7\u30b9\u30c6\u30e0<br \/>\nhttp:\/\/www.atmarkit.co.jp\/fsecurity\/rensai\/snort01\/snort01.html<br \/>\n\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u578bIDS\u300cSnort\u300d\u306e\u5c0e\u5165<br \/>\nhttp:\/\/www.atmarkit.co.jp\/ait\/articles\/0205\/18\/news001.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Snort\u3068\u306f \u76e3\u8996\u3057\u3066\u3044\u308b\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3078\u306e\u4e0d\u6b63\u306a\u4fb5\u5165\u3084\u653b\u6483\u3092\u3001 \u305d\u306e\u624b\u6cd5\u3067\u3042\u308b\u300c\u30d1\u30bf\u30fc\u30f3\u30eb\u30fc\u30eb\u30bb\u30c3\u30c8\u300d(\u30b7\u30b0\u30cd\u30c1\u30e3)\u3068\u7167\u3089\u3057\u5408\u308f\u305b \u30de\u30c3\u30c1\u30f3\u30b0\u3057\u3066\u3044\u308b\u3082\u306e\u3092\u691c\u77e5\u3057\u3001\u30ed\u30b0\u3068\u3057\u3066\u8a18\u9332\u3059\u308b \u3064\u307e\u308aIDS(Intrusion  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[71],"tags":[],"_links":{"self":[{"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/posts\/1901"}],"collection":[{"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.akat.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1901"}],"version-history":[{"count":4,"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/posts\/1901\/revisions"}],"predecessor-version":[{"id":2023,"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/posts\/1901\/revisions\/2023"}],"wp:attachment":[{"href":"https:\/\/tech.akat.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech.akat.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech.akat.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}