Рет қаралды 658
📢 The room invites you a challenge to investigate a series of traffic data and stop malicious activity under two different scenarios. Let's start working with Snort to analyse live and captured traffic.
🔔Writing IDS Rules (HTTP)
🔔Writing IDS Rules (FTP)
🔔Writing IDS Rules (PNG)
🔔Writing IDS Rules (Torrent Metafile)
🔔Troubleshooting Rule Syntax Errors
🔔Using External Rules (MS17-010)
🔔Using External Rules (Log4j)
tryhackme.com/...
#tryhackme #tcpdump #snort