Skip to content

sebbur04/Suricata_Ruleset

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

SURICATA Ruleset and enviroment setup

This repo contains simple ruleset and enviroment setup to conduct simple SURICATA of PKAP or various network resources

What is Suricata?

Suricata is a high performance, open source network analysis and threat detection software used as an IDS/IPS. Suricata offers alerts, network flows, PCAP recordings etc

Read more: https://suricata.io/

How to use Suricata

  1. Download suricata on your LINUX distro

Link: https://suricata.io/download/

sudo apt install suricata
  1. Ensure that suricata is downloaded properly
sudo suricata --build-info 
  1. Create a suricata ruleset file
ls
cd suricata-test
nano suricata.rules
  1. Write your ruleset in your suricata.rules file This can be done through texteditor or nano/vim/vi

  2. Create a yaml for enviroment setup

nano suricata.yaml
  1. Write your enviroment properties in your suricata.yaml file This can be done through texteditor or nano/vim/vi

  2. Enter a suricata command in your cli to connect the ruleset, file you would like to search and yaml together

sudo suricata -r path/to/yourfile.pcap -c path/to/suricata.yaml  -S path/to/file-download.rules -l path/to/output/dir
  1. Result/Print will be visible in the json.log file

About

Example ruleset for testing network traffic with Suricata

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published