Différences
Ci-dessous, les différences entre deux révisions de la page.
| Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
| suricata [Le 27/04/2010, 08:35] – 213.95.41.13 | suricata [Le 13/12/2016, 16:56] (Version actuelle) – [Suricata : Système de détection et de prévention d'intrusion] 88.189.96.103 | ||
|---|---|---|---|
| Ligne 1: | Ligne 1: | ||
| + | {{tag> | ||
| + | ---- | ||
| + | ====== Suricata : Système de détection et de prévention d' | ||
| + | {{http:// | ||
| + | |||
| + | Le Moteur Suricata est un moteur de détection et de prévention des intrusions de nouvelle génération. | ||
| + | |||
| + | Ce moteur n'est pas destiné à simplement remplacer ou imiter les outils existants dans l' | ||
| + | |||
| + | Le moteur Suricata et la bibliothèque HTP sont disponibles sous GPLv2. | ||
| + | |||
| + | Le moteur Suricata est un IDS/IPS Open Source. | ||
| + | |||
| + | Nouveauté : intégration de LUA, ce qui permet par exemple de faire des recherches plus poussées, [[http:// | ||
| + | |||
| + | Site officiel : http:// | ||
| + | ===== Installation ===== | ||
| + | ====Par launchpad (conseillé)==== | ||
| + | [[: | ||
| + | |||
| + | La dernière version est disponible sur le [[: | ||
| + | |||
| + | ==== Compilation ==== | ||
| + | |||
| + | * [[http:// | ||
| + | * Dépendances : | ||
| + | * Compiler. | ||
| + | |||
| + | < | ||
| + | echo " compilation " | ||
| + | |||
| + | echo " | ||
| + | |||
| + | suricataversion=suricata-1.0.5 | ||
| + | sudo apt-get -y install libpcre3 libpcre3-dbg libpcre3-dev build-essential autoconf automake libtool libpcap-dev libnet1-dev libyaml-0-2 libyaml-dev zlib1g zlib1g-dev libcap-ng-dev libcap-ng0 | ||
| + | sudo apt-get -y install libnetfilter-queue-dev libnetfilter-queue1 libnfnetlink-dev libnfnetlink0 | ||
| + | cd | ||
| + | mkdir suricata-1.0.5 | ||
| + | wget http:// | ||
| + | tar -xzvf libcap-ng-0.6.4.tar.gz | ||
| + | cd libcap-ng-0.6.4 | ||
| + | ./configure && make && sudo make install | ||
| + | apt-get install libhtp1 | ||
| + | apt-get install libhtp-dev | ||
| + | wget http:// | ||
| + | tar -xvzf $suricataversion.tar.gz | ||
| + | cd suricata-1.0.0 | ||
| + | ./configure --enable-nfqueue | ||
| + | sudo mkdir / | ||
| + | make | ||
| + | make install | ||
| + | mkdir / | ||
| + | apt-get install checkinstall | ||
| + | checkinstall | ||
| + | dpkg -i suricata_1.0.0-1_i386.deb | ||
| + | cp classification.config suricata.yaml / | ||
| + | mkdir / | ||
| + | cd / | ||
| + | wget http:// | ||
| + | wget http:// | ||
| + | wget http:// | ||
| + | wget http:// | ||
| + | wget http:// | ||
| + | wget http:// | ||
| + | wget http:// | ||
| + | wget http:// | ||
| + | wget http:// | ||
| + | wget http:// | ||
| + | wget http:// | ||
| + | wget http:// | ||
| + | wget http:// | ||
| + | cd / | ||
| + | sudo vi suricata.yaml | ||
| + | suricata -D -c / | ||
| + | </ | ||
| + | |||
| + | ====Script mise à jour automatique==== | ||
| + | |||
| + | < | ||
| + | #!/bin/bash | ||
| + | cd /tmp | ||
| + | rm -rf / | ||
| + | mkdir suricata | ||
| + | cd suricata | ||
| + | / | ||
| + | cd oisf | ||
| + | ./ | ||
| + | ./configure && make && make install | ||
| + | </ | ||
| + | =====Configuration===== | ||
| + | |||
| + | ==== Choix de la configuration 'hote ou forwarding==== | ||
| + | < | ||
| + | echo "Mode host situation = firewall sur le pc" | ||
| + | |||
| + | sudo iptables -I INPUT -j NFQUEUE | ||
| + | sudo iptables -I OUTPUT -j NFQUEUE | ||
| + | |||
| + | echo "Mode gateway-scenario forwarding = firewall en entré de DMZ ( réseau entreprise ) " | ||
| + | echo "sudo iptables -I FORWARD -j NFQUEUE" | ||
| + | </ | ||
| + | ==== Copie du fichier de configuration==== | ||
| + | < | ||
| + | sudo cp / | ||
| + | |||
| + | </ | ||
| + | |||
| + | ==== Effectuer une mise à jour des règles==== | ||
| + | |||
| + | < | ||
| + | echo " | ||
| + | |||
| + | cd / | ||
| + | |||
| + | echo " | ||
| + | sudo wget http:// | ||
| + | sudo tar xvf emerging.rules.tar.gz | ||
| + | sudo rm emerging.rules.tar.gz | ||
| + | sudo cp rules/* . | ||
| + | |||
| + | echo " http:// | ||
| + | sudo wget http:// | ||
| + | sudo tar xvf sagan-rules-current.tar.gz | ||
| + | sudo rm sagan-rules-current.tar.gz | ||
| + | sudo cp sagan-rules/ | ||
| + | |||
| + | echo "rules from suricata" | ||
| + | sudo wget https:// | ||
| + | sudo wget https:// | ||
| + | sudo wget https:// | ||
| + | sudo wget https:// | ||
| + | </ | ||
| + | |||
| + | ==== Editer le fichier de configuration==== | ||
| + | < | ||
| + | sudo gedit / | ||
| + | </ | ||
| + | Chercher : " | ||
| + | |||
| + | Et ajouter ou retirer des règles. | ||
| + | |||
| + | Vous pouvez ajouter ces règles provenant d' | ||
| + | par défaut : | ||
| + | < | ||
| + | - emerging-attack_response.rules | ||
| + | - emerging-dos.rules | ||
| + | - emerging-exploit.rules | ||
| + | - emerging-game.rules | ||
| + | - emerging-inappropriate.rules | ||
| + | - emerging-malware.rules | ||
| + | - emerging-p2p.rules | ||
| + | - emerging-policy.rules | ||
| + | - emerging-scan.rules | ||
| + | - emerging-virus.rules | ||
| + | - emerging-voip.rules | ||
| + | - emerging-web.rules | ||
| + | - emerging-web_client.rules | ||
| + | - emerging-web_server.rules | ||
| + | - emerging-web_specific_apps.rules | ||
| + | - emerging-user_agents.rules | ||
| + | - emerging-current_events.rules | ||
| + | </ | ||
| + | Toutes les règles | ||
| + | < | ||
| + | - emerging-activex.rules | ||
| + | - emerging-attack_response.rules | ||
| + | - emerging-botcc.rules | ||
| + | - emerging-chat.rules | ||
| + | - emerging-ciarmy.rules | ||
| + | - emerging-compromised.rules | ||
| + | - emerging-current_events.rules | ||
| + | - emerging-deleted.rules | ||
| + | - emerging-dns.rules | ||
| + | - emerging-dos.rules | ||
| + | - emerging-drop.rules | ||
| + | - emerging-dshield.rules | ||
| + | - emerging-exploit.rules | ||
| + | - emerging-ftp.rules | ||
| + | - emerging-games.rules | ||
| + | - emerging-icmp_info.rules | ||
| + | - emerging-icmp.rules | ||
| + | - emerging-imap.rules | ||
| + | - emerging-inappropriate.rules | ||
| + | - emerging-malware.rules | ||
| + | - emerging-misc.rules | ||
| + | - emerging-mobile_malware.rules | ||
| + | - emerging-netbios.rules | ||
| + | - emerging-p2p.rules | ||
| + | - emerging-policy.rules | ||
| + | - emerging-pop3.rules | ||
| + | - emerging-rbn-malvertisers.rules | ||
| + | - emerging-rbn.rules | ||
| + | - emerging-rpc.rules | ||
| + | - emerging-scada.rules | ||
| + | - emerging-scan.rules | ||
| + | - emerging-shellcode.rules | ||
| + | - emerging-smtp.rules | ||
| + | - emerging-snmp.rules | ||
| + | - emerging-sql.rules | ||
| + | - emerging-telnet.rules | ||
| + | - emerging-tftp.rules | ||
| + | - emerging-tor.rules | ||
| + | - emerging-trojan.rules | ||
| + | - emerging-user_agents.rules | ||
| + | - emerging-virus.rules | ||
| + | - emerging-voip.rules | ||
| + | - emerging-web_client.rules | ||
| + | - emerging-web_server.rules | ||
| + | - emerging-web_specific_apps.rules | ||
| + | - emerging-worm.rules | ||
| + | </ | ||
| + | |||
| + | Vous pouvez ajouter ces règles provenant de l'ips sagan : | ||
| + | < | ||
| + | - apache.rules | ||
| + | - apc-emu.rules | ||
| + | - arp-normalize.rulebase | ||
| + | - arp.rules | ||
| + | - asterisk.rules | ||
| + | - attack.rules | ||
| + | - bash.rules | ||
| + | - bind.rules | ||
| + | - bonding.rules | ||
| + | - bro-ids.rules | ||
| + | - cacti-thold.rules | ||
| + | - cisco-ios.rules | ||
| + | - cisco-normalize.rulebase | ||
| + | - cisco-pixasa.rules | ||
| + | - classification.config | ||
| + | - courier.rules | ||
| + | - dns-normalize.rulebase | ||
| + | - dovecot.rules | ||
| + | - fortinet.rules | ||
| + | - ftpd.rules | ||
| + | - grsec.rules | ||
| + | - hordeimp.rules | ||
| + | - hostapd.rules | ||
| + | - imapd.rules | ||
| + | - imap-normalize.rulebase | ||
| + | - ipop3d.rules | ||
| + | - juniper.rules | ||
| + | - kismet.rules | ||
| + | - knockd.rules | ||
| + | - milter.rules | ||
| + | - mysql.rules | ||
| + | - nginx.rules | ||
| + | - ntp.rules | ||
| + | - openssh-normalize.rulebase | ||
| + | - openssh.rules | ||
| + | - ossec-mi.rules | ||
| + | - ossec.rules | ||
| + | - php.rules | ||
| + | - postfix.rules | ||
| + | - postgresql.rules | ||
| + | - pptp.rules | ||
| + | - proftpd.rules | ||
| + | - pure-ftpd.rules | ||
| + | - racoon.rules | ||
| + | - reference.config | ||
| + | - roundcube.rules | ||
| + | - rsync.rules | ||
| + | - sagan-sid-msg.map | ||
| + | - samba.rules | ||
| + | - sendmail.rules | ||
| + | - smtp-normalize.rulebase | ||
| + | - snort.rules | ||
| + | - solaris.rules | ||
| + | - sonicwall-normalize.rulebase | ||
| + | - sonicwall.rules | ||
| + | - squid.rules | ||
| + | - su.rules | ||
| + | - syslog.rules | ||
| + | - tcp.rules | ||
| + | - telnet.rules | ||
| + | - tripwire.rules | ||
| + | - vmpop3d.rules | ||
| + | - vmware.rules | ||
| + | - vpopmail.rules | ||
| + | - vsftpd.rules | ||
| + | - weblabrinth.rules | ||
| + | - windows.rules | ||
| + | - wordpress.rules | ||
| + | - xinetd.rules | ||
| + | - zeus.rules | ||
| + | |||
| + | </ | ||
| + | |||
| + | =====Utilisation===== | ||
| + | ====Lancement==== | ||
| + | |||
| + | < | ||
| + | sudo suricata -D -c / | ||
| + | </ | ||
| + | |||
| + | < | ||
| + | |||
| + | Il vous faudra modifier le fichier "/ | ||
| + | sudo nano / | ||
| + | |||
| + | Puis rechercher la ligne : | ||
| + | if [ ! -e / | ||
| + | |||
| + | Afin de la modifier en : | ||
| + | if [ ! -e / | ||
| + | ====Monitoring / Lire les logs==== | ||
| + | Les log sont dans / | ||
| + | |||
| + | Vous pouvez aussi installer [[barnyard2]] et lire unified2.alert dans / | ||
| + | |||
| + | < | ||
| + | cp / | ||
| + | mkdir / | ||
| + | barnyard2 -c / | ||
| + | </ | ||
| + | |||
| + | ====Tester l'ids / ips==== | ||
| + | |||
| + | Aller avec un navigateur internet sur le site : http:// | ||
| + | =====Liens ===== | ||
| + | |||
| + | |||
| + | ---- | ||
| + | **Contributeurs principaux :** // | ||
