Some snips:
"How do I make Snort log sessions/flows?" It's inspiring to see such faith in Snort, but such questions indicate a certain amount of tool-fixation.
Snort can operate in two modes: active and passive. Snort can be active either inline or offline:
- In an active, inline mode, Snort acts as an intrusion prevention system (IPS)...
- In an active, offline mode, Snort acts as a quasi-IPS...
- In passive, inline mode, Snort sits physically on the wire and allows all traffic to pass...
- ... passive, offline mode... watches traffic provided by a network tap or switch SPAN port.... is the most popular...
... This very short example hints at the real power of Snort. I tend to see Snort as a pointer to activities that require additional inquiry. A Snort alert should be the beginning of an investigation, not the end.
Yes it is the NSM story, I like it of course :-)
Oh by the way, I can only agree with the problem of tool fixation. Tools does not solve problems, although many think so still. It requires much more :-) Related to this problem is mis-usage and security by belief (instead of fact) due to systems being setup and operated by "make install".
No comments:
Post a Comment