Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
suricata [Le 02/02/2012, 17:00] – [Lancement] psychederic | suricata [Le 13/12/2016, 16:56] (Version actuelle) – [Suricata : Système de détection et de prévention d'intrusion] 88.189.96.103 | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
+ | {{tag> | ||
+ | ---- | ||
+ | ====== Suricata : Système de détection et de prévention d' | ||
+ | {{http:// | ||
+ | |||
+ | Le Moteur Suricata est un moteur de détection et de prévention des intrusions de nouvelle génération. | ||
+ | |||
+ | Ce moteur n'est pas destiné à simplement remplacer ou imiter les outils existants dans l' | ||
+ | |||
+ | Le moteur Suricata et la bibliothèque HTP sont disponibles sous GPLv2. | ||
+ | |||
+ | Le moteur Suricata est un IDS/IPS Open Source. | ||
+ | |||
+ | Nouveauté : intégration de LUA, ce qui permet par exemple de faire des recherches plus poussées, [[http:// | ||
+ | |||
+ | Site officiel : http:// | ||
+ | ===== Installation ===== | ||
+ | ====Par launchpad (conseillé)==== | ||
+ | [[: | ||
+ | |||
+ | La dernière version est disponible sur le [[: | ||
+ | |||
+ | ==== Compilation ==== | ||
+ | |||
+ | * [[http:// | ||
+ | * Dépendances : | ||
+ | * Compiler. | ||
+ | |||
+ | < | ||
+ | echo " compilation " | ||
+ | |||
+ | echo " | ||
+ | |||
+ | suricataversion=suricata-1.0.5 | ||
+ | sudo apt-get -y install libpcre3 libpcre3-dbg libpcre3-dev build-essential autoconf automake libtool libpcap-dev libnet1-dev libyaml-0-2 libyaml-dev zlib1g zlib1g-dev libcap-ng-dev libcap-ng0 | ||
+ | sudo apt-get -y install libnetfilter-queue-dev libnetfilter-queue1 libnfnetlink-dev libnfnetlink0 | ||
+ | cd | ||
+ | mkdir suricata-1.0.5 | ||
+ | wget http:// | ||
+ | tar -xzvf libcap-ng-0.6.4.tar.gz | ||
+ | cd libcap-ng-0.6.4 | ||
+ | ./configure && make && sudo make install | ||
+ | apt-get install libhtp1 | ||
+ | apt-get install libhtp-dev | ||
+ | wget http:// | ||
+ | tar -xvzf $suricataversion.tar.gz | ||
+ | cd suricata-1.0.0 | ||
+ | ./configure --enable-nfqueue | ||
+ | sudo mkdir / | ||
+ | make | ||
+ | make install | ||
+ | mkdir / | ||
+ | apt-get install checkinstall | ||
+ | checkinstall | ||
+ | dpkg -i suricata_1.0.0-1_i386.deb | ||
+ | cp classification.config suricata.yaml / | ||
+ | mkdir / | ||
+ | cd / | ||
+ | wget http:// | ||
+ | wget http:// | ||
+ | wget http:// | ||
+ | wget http:// | ||
+ | wget http:// | ||
+ | wget http:// | ||
+ | wget http:// | ||
+ | wget http:// | ||
+ | wget http:// | ||
+ | wget http:// | ||
+ | wget http:// | ||
+ | wget http:// | ||
+ | wget http:// | ||
+ | cd / | ||
+ | sudo vi suricata.yaml | ||
+ | suricata -D -c / | ||
+ | </ | ||
+ | |||
+ | ====Script mise à jour automatique==== | ||
+ | |||
+ | < | ||
+ | #!/bin/bash | ||
+ | cd /tmp | ||
+ | rm -rf / | ||
+ | mkdir suricata | ||
+ | cd suricata | ||
+ | / | ||
+ | cd oisf | ||
+ | ./ | ||
+ | ./configure && make && make install | ||
+ | </ | ||
+ | =====Configuration===== | ||
+ | |||
+ | ==== Choix de la configuration 'hote ou forwarding==== | ||
+ | < | ||
+ | echo "Mode host situation = firewall sur le pc" | ||
+ | |||
+ | sudo iptables -I INPUT -j NFQUEUE | ||
+ | sudo iptables -I OUTPUT -j NFQUEUE | ||
+ | |||
+ | echo "Mode gateway-scenario forwarding = firewall en entré de DMZ ( réseau entreprise ) " | ||
+ | echo "sudo iptables -I FORWARD -j NFQUEUE" | ||
+ | </ | ||
+ | ==== Copie du fichier de configuration==== | ||
+ | < | ||
+ | sudo cp / | ||
+ | |||
+ | </ | ||
+ | |||
+ | ==== Effectuer une mise à jour des règles==== | ||
+ | |||
+ | < | ||
+ | echo " | ||
+ | |||
+ | cd / | ||
+ | |||
+ | echo " | ||
+ | sudo wget http:// | ||
+ | sudo tar xvf emerging.rules.tar.gz | ||
+ | sudo rm emerging.rules.tar.gz | ||
+ | sudo cp rules/* . | ||
+ | |||
+ | echo " http:// | ||
+ | sudo wget http:// | ||
+ | sudo tar xvf sagan-rules-current.tar.gz | ||
+ | sudo rm sagan-rules-current.tar.gz | ||
+ | sudo cp sagan-rules/ | ||
+ | |||
+ | echo "rules from suricata" | ||
+ | sudo wget https:// | ||
+ | sudo wget https:// | ||
+ | sudo wget https:// | ||
+ | sudo wget https:// | ||
+ | </ | ||
+ | |||
+ | ==== Editer le fichier de configuration==== | ||
+ | < | ||
+ | sudo gedit / | ||
+ | </ | ||
+ | Chercher : " | ||
+ | |||
+ | Et ajouter ou retirer des règles. | ||
+ | |||
+ | Vous pouvez ajouter ces règles provenant d' | ||
+ | par défaut : | ||
+ | < | ||
+ | - emerging-attack_response.rules | ||
+ | - emerging-dos.rules | ||
+ | - emerging-exploit.rules | ||
+ | - emerging-game.rules | ||
+ | - emerging-inappropriate.rules | ||
+ | - emerging-malware.rules | ||
+ | - emerging-p2p.rules | ||
+ | - emerging-policy.rules | ||
+ | - emerging-scan.rules | ||
+ | - emerging-virus.rules | ||
+ | - emerging-voip.rules | ||
+ | - emerging-web.rules | ||
+ | - emerging-web_client.rules | ||
+ | - emerging-web_server.rules | ||
+ | - emerging-web_specific_apps.rules | ||
+ | - emerging-user_agents.rules | ||
+ | - emerging-current_events.rules | ||
+ | </ | ||
+ | Toutes les règles | ||
+ | < | ||
+ | - emerging-activex.rules | ||
+ | - emerging-attack_response.rules | ||
+ | - emerging-botcc.rules | ||
+ | - emerging-chat.rules | ||
+ | - emerging-ciarmy.rules | ||
+ | - emerging-compromised.rules | ||
+ | - emerging-current_events.rules | ||
+ | - emerging-deleted.rules | ||
+ | - emerging-dns.rules | ||
+ | - emerging-dos.rules | ||
+ | - emerging-drop.rules | ||
+ | - emerging-dshield.rules | ||
+ | - emerging-exploit.rules | ||
+ | - emerging-ftp.rules | ||
+ | - emerging-games.rules | ||
+ | - emerging-icmp_info.rules | ||
+ | - emerging-icmp.rules | ||
+ | - emerging-imap.rules | ||
+ | - emerging-inappropriate.rules | ||
+ | - emerging-malware.rules | ||
+ | - emerging-misc.rules | ||
+ | - emerging-mobile_malware.rules | ||
+ | - emerging-netbios.rules | ||
+ | - emerging-p2p.rules | ||
+ | - emerging-policy.rules | ||
+ | - emerging-pop3.rules | ||
+ | - emerging-rbn-malvertisers.rules | ||
+ | - emerging-rbn.rules | ||
+ | - emerging-rpc.rules | ||
+ | - emerging-scada.rules | ||
+ | - emerging-scan.rules | ||
+ | - emerging-shellcode.rules | ||
+ | - emerging-smtp.rules | ||
+ | - emerging-snmp.rules | ||
+ | - emerging-sql.rules | ||
+ | - emerging-telnet.rules | ||
+ | - emerging-tftp.rules | ||
+ | - emerging-tor.rules | ||
+ | - emerging-trojan.rules | ||
+ | - emerging-user_agents.rules | ||
+ | - emerging-virus.rules | ||
+ | - emerging-voip.rules | ||
+ | - emerging-web_client.rules | ||
+ | - emerging-web_server.rules | ||
+ | - emerging-web_specific_apps.rules | ||
+ | - emerging-worm.rules | ||
+ | </ | ||
+ | |||
+ | Vous pouvez ajouter ces règles provenant de l'ips sagan : | ||
+ | < | ||
+ | - apache.rules | ||
+ | - apc-emu.rules | ||
+ | - arp-normalize.rulebase | ||
+ | - arp.rules | ||
+ | - asterisk.rules | ||
+ | - attack.rules | ||
+ | - bash.rules | ||
+ | - bind.rules | ||
+ | - bonding.rules | ||
+ | - bro-ids.rules | ||
+ | - cacti-thold.rules | ||
+ | - cisco-ios.rules | ||
+ | - cisco-normalize.rulebase | ||
+ | - cisco-pixasa.rules | ||
+ | - classification.config | ||
+ | - courier.rules | ||
+ | - dns-normalize.rulebase | ||
+ | - dovecot.rules | ||
+ | - fortinet.rules | ||
+ | - ftpd.rules | ||
+ | - grsec.rules | ||
+ | - hordeimp.rules | ||
+ | - hostapd.rules | ||
+ | - imapd.rules | ||
+ | - imap-normalize.rulebase | ||
+ | - ipop3d.rules | ||
+ | - juniper.rules | ||
+ | - kismet.rules | ||
+ | - knockd.rules | ||
+ | - milter.rules | ||
+ | - mysql.rules | ||
+ | - nginx.rules | ||
+ | - ntp.rules | ||
+ | - openssh-normalize.rulebase | ||
+ | - openssh.rules | ||
+ | - ossec-mi.rules | ||
+ | - ossec.rules | ||
+ | - php.rules | ||
+ | - postfix.rules | ||
+ | - postgresql.rules | ||
+ | - pptp.rules | ||
+ | - proftpd.rules | ||
+ | - pure-ftpd.rules | ||
+ | - racoon.rules | ||
+ | - reference.config | ||
+ | - roundcube.rules | ||
+ | - rsync.rules | ||
+ | - sagan-sid-msg.map | ||
+ | - samba.rules | ||
+ | - sendmail.rules | ||
+ | - smtp-normalize.rulebase | ||
+ | - snort.rules | ||
+ | - solaris.rules | ||
+ | - sonicwall-normalize.rulebase | ||
+ | - sonicwall.rules | ||
+ | - squid.rules | ||
+ | - su.rules | ||
+ | - syslog.rules | ||
+ | - tcp.rules | ||
+ | - telnet.rules | ||
+ | - tripwire.rules | ||
+ | - vmpop3d.rules | ||
+ | - vmware.rules | ||
+ | - vpopmail.rules | ||
+ | - vsftpd.rules | ||
+ | - weblabrinth.rules | ||
+ | - windows.rules | ||
+ | - wordpress.rules | ||
+ | - xinetd.rules | ||
+ | - zeus.rules | ||
+ | |||
+ | </ | ||
+ | |||
+ | =====Utilisation===== | ||
+ | ====Lancement==== | ||
+ | |||
+ | < | ||
+ | sudo suricata -D -c / | ||
+ | </ | ||
+ | |||
+ | < | ||
+ | |||
+ | Il vous faudra modifier le fichier "/ | ||
+ | sudo nano / | ||
+ | |||
+ | Puis rechercher la ligne : | ||
+ | if [ ! -e / | ||
+ | |||
+ | Afin de la modifier en : | ||
+ | if [ ! -e / | ||
+ | ====Monitoring / Lire les logs==== | ||
+ | Les log sont dans / | ||
+ | |||
+ | Vous pouvez aussi installer [[barnyard2]] et lire unified2.alert dans / | ||
+ | |||
+ | < | ||
+ | cp / | ||
+ | mkdir / | ||
+ | barnyard2 -c / | ||
+ | </ | ||
+ | |||
+ | ====Tester l'ids / ips==== | ||
+ | |||
+ | Aller avec un navigateur internet sur le site : http:// | ||
+ | =====Liens ===== | ||
+ | |||
+ | |||
+ | ---- | ||
+ | **Contributeurs principaux :** // |