Skip to content

Instantly share code, notes, and snippets.

@Zobber
Created April 1, 2020 17:40
Show Gist options
  • Save Zobber/76b72d1f4c931e7de786a319766b9896 to your computer and use it in GitHub Desktop.
Save Zobber/76b72d1f4c931e7de786a319766b9896 to your computer and use it in GitHub Desktop.
########################################################################
https://kifarunix.com/install-and-setup-suricata-on-ubuntu-18-04/
https://hackertarget.com/install-suricata-ubuntu-5-minutes/
https://fwhibbit.es/suricata-ids-jugando-con-las-reglas
########################################################################
## execute
suricata -c /etc/suricata/suricata.yaml -i <network interface>
## Scan a PCAP file
sudo suricata -c /etc/suricata/suricata.yaml -r ~/enternalblue.pcap
## View alert logs
tail -f /var/log/suricata/fast.log
## For ubuntu linux you can start suricata on boot
description "Intruder Detection System Daemon"
start on runlevel [2345]
stop on runlevel [!2345]
expect fork
exec suricata -D --pidfile /var/run/suricata.pid -c /etc/suricata/suricata.yaml -i eth1
## You are now ready to perform the tests However, before you can proceed, you need to disable packet offload features on the network interface on which Suricata is listen.
ethtool -K <network interface> gro off lro off
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment