Module 12: Evading IDS, Firewalls , Honeypots
Lab 1: Perform Intrusion Detection using Various Tools
Task 1: Detect Intrusions using Snort
1. Snort Installation:
2. Copy Configuration Files:
3. Initial Snort Setup:
4. Test Snort:
5. Configure snort.conf:
snort.conf:6. Enable Detection Rules:
7. Run Snort in IDS Mode:
8. Simulate an Attack:
9. Check Snort Logs:
10. Completion:
Task 2: Deploy Cowrie Honeypot to Detect Malicious Network Traffic
1. Create Cowrie User and Prepare Environment:
2. Access Cowrie Files:
3. Install Dependencies:
4. Set Up Port Redirection:
5. Configure Cowrie to Run on Port 22:
6. Create Virtual Environment:
7. Start Cowrie Honeypot:
8. View Cowrie Logs:
9. Simulate Attacks from Parrot Security:
10. Observe Attack in Cowrie Logs:
Lab 2: Evade IDS/Firewalls using Various Evasion Techniques
Task 1: Evade Firewall through Windows BITSAdmin
Last updated