Snort Read Network Trace Data Command Line Filter Expression

Provided by: snort_2.ix.7.0-5build1_amd64 bug

        

NAME

          Snort - open up source network intrusion detection system        

SYNOPSIS

          snort          [-bCdDeEfHIMNOpqQsTUvVwWxXy?]          [-A          alert-mode          ]          [-B          address-conversion-mask          ]          [-c          rules-file          ]          [-F          bpf-file          ]          [-g          group-name          ]          [-K          id          ]          [-h          home-net          ]          [-i          interface          ]          [-k          checksum-manner          ]          [-One thousand          logging-fashion          ]          [-fifty          log-dir          ]          [-L          bin-log-file          ]          [-thousand          umask          ]          [-n          packet-count          ]          [-P          snap-length          ]          [-r          tcpdump-file          ]          [-R          proper noun          ]          [-South          variable=value          ]          [-t          chroot_directory          ]          [-u          user-proper name          ]          [-Z          pathname          ]          [--logid          id          ]          [--perfmon-file          pathname          ]          [--pid-path          pathname          ]          [--snaplen          snap-length          ]          [--help          ]          [--version          ]          [--dynamic-engine-          lib          file          ]          [--dynamic-engine-lib-dir          directory          ]          [--dynamic-detection-lib          file          ]          [--dynamic-detection-lib-dir          directory          ]          [--dump-dynamic-rules          directory          ]          [--dynamic-          preprocessor-lib          file          ]          [--dynamic-preprocessor-lib-dir          directory          ]          [--dynamic-output-lib          file          ]          [--dynamic-output-lib-dir          directory          ]          [--alarm-before-pass          ]          [--treat-drop-equally-alert          ]          [--treat-drop-every bit-ignore          ]          [--procedure-all-events          ]          [--enable-inline-test          ]          [--create-          pidfile          ]          [--nolock-pidfile          ]          [--no-interface-pidfile          ]          [--disable-attribute-reload-thread          ]          [--pcap-single=          tcpdump-file          ]          [--pcap-filter=          filter          ]          [--pcap-listing=          list          ]          [--pcap-          dir=          directory          ]          [--pcap-file=          file          ]          [--pcap-no-filter          ]          [--pcap-reset          ]          [--pcap-reload          ]          [--pcap-show          ]          [--exit-check          count          ]          [--conf-error-out          ]          [--enable-mpls-multicast          ]          [--enable-mpls-overlapping-ip          ]          [--max-mpls-labelchain-len          ]          [--mpls-payload-type          ]          [--require-rule-sid          ]          [--daq          type          ]          [--daq-mode          way          ]          [--daq-var          name=value          ]          [--daq-dir          dir          ]          [--daq-list          [dir]          ]          [--dirty-hog          ]          [--cs-dir          dir          ]          [--ha-peer          ]          [--ha-out          file          ]          [--ha-in          file          ]          expression        

Clarification

          Snort          is  an  open source network intrusion detection system, capable of performing real-        time traffic analysis and  parcel  logging  on  IP  networks.   It  can  perform  protocol        analysis,  content  searching/matching  and can be used to find a multifariousness of attacks and        probes, such every bit buffer  overflows,  stealth  port  scans,  CGI  attacks,  SMB  probes,  Os        fingerprinting  attempts, and much more.  Snort uses a flexible rules linguistic communication to describe        traffic that information technology should collect or pass, equally well equally a  detection  engine  that  utilizes  a        modular  plugin  compages.   Snort  likewise  has a modular real-time alerting capability,        incorporating alerting and logging plugins for syslog, a ASCII text files, UNIX sockets or        XML.         Snort  has  three  master  uses.   Information technology  can  be  used  as  a  direct packet sniffer similar          tcpdump(i), a packet logger (useful for network traffic debugging,  etc),  or  equally  a  total        diddled network intrusion detection system.         Snort  logs  packets  in          tcpdump(i) binary format or in Snort's decoded ASCII format to a        hierarchy of logging directories that are named based on the IP address of  the  "foreign"        host.        

OPTIONS

          -A alarm-way               Alert  using the specified          alert-mode.          Valid alert modes include          fast,          full,          none,          and          unsock.          Fast          writes alerts to the  default  "warning"  file  in  a  single-line,               syslog  style  alert  message.          Full          writes the alert to the "alert" file with the               total decoded header too equally the alert message.          None          turns off alerting.          Unsock          is  an experimental mode that sends the alarm information out over a UNIX socket to               another procedure that attaches to that socket.         -b     Log packets in a          tcpdump(1) formatted file.    All  packets  are  logged  in  their               native  binary  state  to  a  tcpdump formatted log file named with the snort start               timestamp and "snort.log".  This pick results in much  faster  functioning  of  the               program                since  it doesn't accept to spend time in the packet binary->text converters.  Snort               tin can keep up pretty well with 100Mbps networks in '-b' fashion.  To choose an alternate               name for the binary log file, use the '-50' switch.         -B address-conversion-mask               Convert  all IP addresses in          home-net          to addresses specified past          accost-conversion-          mask.          Used to obfuscate IP addresses inside binary logs. Specify          home-cyberspace          with the               '-h' switch.  Notation this is          not          the aforementioned as $HOME_NET.         -c config-file               Utilise the rules located in file          config-file.          -C     Print the graphic symbol data from the packet payload only (no hex).         -d     Dump  the  application  layer  information  when  displaying  packets in verbose or packet               logging fashion.         -D     Run Snort in daemon mode.  Alerts are sent to /var/log/snort/warning unless otherwise               specified.         -e     Display/log the link layer package headers.         -Due east          *WIN32          ONLY*          Log alerts to the Windows Upshot Log.         -f     Activate PCAP line buffering         -F bpf-file               Read BPF filters from          bpf-file.          This is handy for people running Snort as a SHADOW               replacement or with a dear Of super circuitous BPF  filters.   See  the  "expressions"               section of this human page for more info on writing BPF filters.         -grand group               Modify  the  group/GID Snort runs nether to          grouping          after initialization.  This switch               allows Snort to drib root privileges after it's initialization phase has  completed               as a security mensurate.         -Chiliad id  Utilize id equally a base result ID when logging events.         -h abode-net               Set  the  "domicile  network"  to          home-cyberspace.          The format of this address variable is a               network prefix plus a CIDR block, such as 192.168.1.0/24.  Once  this  variable  is               fix,  all  decoded bundle logging will be done relative to the home network accost               space.  This is useful because of the way that Snort formats its  ASCII  log  data.               With  this  value  fix to the local network, all decoded output will be logged into               decode directories with the address of the strange computer as the directory  name,               which  is  very  useful  during  traffic  analysis.  This  selection  does  not change               "$HOME_NET" in IDS mode.         -H     Forcefulness hash tables to exist deterministic instead of using a  random  number  generator               for  the  seed  & scale.  Useful for testing and generating repeatable results with               the aforementioned traffic.         -i interface               Sniff packets on          interface.          -I     Print out the receiving interface name in alerts.         -k checksum-mode               Tune the internal  checksum  verification  functionality  with          alert-mode.          Valid               checksum  modes  include          all,          noip,          notcp,          noudp,          noicmp,          and          none.          All          activates               checksum verification for all supported protocols.          Noip          turns  off  IP  checksum               verification, which is handy if the gateway router is already dropping packets that               fail their IP checksum checks.          Notcp          turns  off  TCP  checksum  verification,  all               other  checksum  modes  are          on.          noudp          turns off UDP checksum verification.          Noicmp          turns  off  ICMP  checksum  verification.          None          turns  off  the  entire  checksum               verification subsystem.         -K logging-mode               Select  a  packet logging mode.  The default is pcap.          logging-fashion.          Valid logging               modes include          pcap,          ascii,          and          none.          Pcap          logs packets through  the  pcap  library               into  pcap (tcpdump) format.          Ascii          logs packets in the old "directories and files"               format with packet printouts in each file.          None          Turns off parcel logging.         -l log-dir               Fix the output logging directory to          log-dir.          All plain text alerts and packet logs               get  into  this  directory.   If  this  option is non specified, the default logging               directory is set to /var/log/snort.         -L binary-log-file               Set the filename of the binary log file to          binary-log-file.          If this switch is  not               used,  the  default  name is a timestamp for the time that the file is created plus               "snort.log".         -chiliad umask               Set up the file style creation mask to          umask          -Chiliad     Log panel letters to syslog when not running daemon mode.  This  switch  has  no               impact on logging of alerts.         -n packet-count               Process          packet-count          packets and exit.         -N     Plough off packet logging.  The program notwithstanding generates alerts ordinarily.         -O     Obfuscate the IP addresses when in ASCII bundle dump fashion.  This switch changes the               IP addresses that get printed to the screen/log file to "xxx.xxx.xxx.thirty".  If  the               homenet  accost  switch  is  set  (-h),  only  addresses  on  the  homenet volition exist               obfuscated while non- homenet IPs volition be left visible.   Perfect  for  posting  to               your favorite security mailing list!         -p     Turn off promiscuous style sniffing.         -P snap-length               Prepare the bundle snaplen to          snap-length.          By default, this is prepare to 1514.         -q     Tranquility operation.  Don't display banner and initialization data.         -Q     Enable inline fashion operation.         -r tcpdump-file               Read  the  tcpdump-formatted  file          tcpdump-file.          This will cause Snort to read and               procedure the file fed to it.  This is useful if, for case, you've got a bunch of               SHADOW files that you want to process for content, or even if you've got a bunch of               reassembled packet fragments which have been written into a tcpdump formatted file.         -R name               Use name equally a suffix to the snort pidfile.         -s     Send  alert  messages  to  syslog.   On  linux   boxen,   they   volition   appear   in               /var/log/secure, /var/log/letters on many other platforms.         -Due south variable=value               Set  variable  proper noun  "variable"  to  value "value".  This is useful for setting the               value of a defined variable name in a Snort rules file to a command line  specified               value.   For  instance,  if  yous  ascertain a HOME_NET variable name inside of a Snort               rules file, you can set this value from it's predefined value at the control line.         -t chroot               Changes Snort'south root directory to          chroot          after initialization.   Please  note  that               all log/alert filenames are relative to the chroot directory if chroot is used.         -T     Snort  volition  start  upwards  in  self-test  fashion, checking all the supplied command line               switches and rules files that are handed to it and indicating  that  everything  is               prepare to go on.  This is a good switch to use if daemon mode is going to be used,               it verifies that the Snort configuration that is well-nigh to  be  used  is  valid  and               won't   fail  at  run  fourth dimension.  Notation,  Snort  looks  for  either  /etc/snort.conf  or               ./snort.conf.  If your config lives elsewhere, use the -c option to specify a valid          config-file.          -u user               Change the user/UID Snort runs under to          user          later initialization.         -U     Changes the timestamp in all logs to be in UTC         -v     Be  verbose.   Prints  packets  out  to the console.  In that location is 1 large problem with               verbose mode: information technology's slow.  If you are doing IDS work with Snort,          don't          use the  '-v'               switch, you          WILL          drop packets.         -5     Show the version number and exit.         -west     Testify direction frames if running on an 802.11 (wireless) network.         -W          *WIN32          ONLY*          Enumerate the network interfaces bachelor.         -x     Exit  if  Snort  configuration bug occur such every bit duplicate gid/sid or flowbits               without Stream5.         -Ten     Dump the raw bundle information starting at the link layer.   This  switch  overrides  the               '-d' switch.         -y     Include the yr in alert and log files         -Z pathname               Gear up the perfmonitor preprocessor path/filename to pathname.         -?     Show the program usage statement and leave.         --logid id               Same as -Grand.         --perfmon-file pathname               Same every bit -Z.         --pid-path directory               Specify the directory for the Snort PID file.         --snaplen snap-length               Same as -P.         --help Same equally -?         --version               Same equally -Five         --dynamic-engine-lib file               Load a dynamic detection engine shared library specified by file.         --dynamic-engine-lib-dir directory               Load all dynamic detection engine shared libraries specified from directory.         --dynamic-detection-lib file               Load a dynamic detection rules shared library specified past file.         --dynamic-detection-lib-dir directory               Load all dynamic detection rules shared libraries specified from directory.         --dump-dynamic-rules directory               Create  stub  dominion  files from all loaded dynamic detection rules libraries.  Files               will be created in directory.  This is required to be done prior to  running  snort               using  those  detection  rules  and  the  generated rules files must be included in               snort.conf.         --dynamic-preprocessor-lib file               Load a dynamic preprocessor shared library specified by file.         --dynamic-preprocessor-lib-dir directory               Load all dynamic preprocessor shared libraries specified from directory.         --alarm-earlier-laissez passer               Process alert, drop, sdrop, or reject before pass.  Default is pass  before  alert,               drop, etc.         --treat-drop-equally-alert               Converts driblet, sdrop, and decline rules into alert rules during startup.         --care for-drib-as-ignore               Use drib, sdrop, and reject rules to ignore session traffic when not inline.         --process-all-events               Procedure  all  triggered  events  in  grouping  gild, per Rule Ordering configuration.               Default stops afterward first group.         --enable-inline-test               Enable Inline-Test Mode Performance.         --pid-path directory               Specify the path for Snort'south PID file.         --create-pidfile               Create PID file, even when non in Daemon manner.         --nolock-pidfile               Do not try to lock Snort PID file.         --no-interface-pidfile               Do non include the interface name in Snort PID file         --pcap-unmarried=tcpdump-file          Same as -r.  Added for abyss.         --pcap-filter=filter          Shell style filter to apply when getting pcaps from file or directory.  This filter               will  apply  to  whatsoever --pcap-file or --pcap-dir arguments following.  Utilise --pcap-no-               filter to delete filter  for  following  --pcap-file  or  --pcap-dir  arguments  or               specify  --pcap-filter  over again  to  forget previous filter and to apply to following               --pcap-file or --pcap-dir arguments.         --pcap-list="listing"          A space separated listing of pcaps to read.         --pcap-dir=directory          A directory to recurse to look for pcaps.  Sorted in ascii order.         --pcap-file=file          File that contains a list of pcaps to read.  Can specify path to pcap or  directory               to recurse to get pcaps.         --pcap-no-filter               Reset to utilize no filter when getting pcaps from file or directory.         --pcap-reset               If  reading  multiple pcaps, reset snort to post-configuration state before reading               next pcap.  The default, i.due east. without this pick, is not to reset state.         --pcap-bear witness               Print a line saying what pcap is currently existence read.         --go out-check=count          Bespeak termination after <count> callbacks from DAQ_Acquire(), showing the fourth dimension  it               takes from signaling until DAQ_Stop() is called.         --conf-fault-out               Same as -x.         --require-rule-sid               Crave an SID for every rule to be correctly threshold all rules.         --daq <type>               Select packet acquisition module (default is pcap).         --daq-mode <mode>               Select the DAQ operating manner.         --daq-var <name=value>               Specify extra DAQ configuration variable.         --daq-dir <dir>               Tell Snort where to discover desired DAQ.         --daq-list [<dir>]               Listing parcel acquisition modules available in dir.         --cs-dir <dir>               Tell Snort to employ control socket and create the socket in dir.          expression          selects  which  packets  will be dumped.  If no          expression          is given, all packets on               the net volition exist dumped.  Otherwise, only packets for  which          expression          is  `true'               will be dumped.                The          expression          consists of one or more          primitives.          Primitives unremarkably consist of               an          id          (name or number) preceded  past  1  or  more than  qualifiers.   At that place  are  three               dissimilar kinds of qualifier:          type          qualifiers say what kind of thing the id name or number refers to.  Possible                      types are          host,          internet          and          port.  E.g., `host foo', `net 128.3', `port 20'.  If                      in that location is no type qualifier,          host          is causeless.          dir          qualifiers  specify  a  item  transfer  direction  to  and/or from          id.          Possible directions are          src,          dst,          src          or          dst          and          src          and          dst.   Eastward.g.,  `src                      foo',  `dst  net  128.3',  `src  or  dst port ftp-information'.  If at that place is no dir                      qualifier,          src          or          dst          is assumed.  For `null' link  layers  (i.e.  point  to                      point  protocols  such  equally  skid) the          inbound          and          outbound          qualifiers can be                      used to specify a desired management.          proto          qualifiers restrict the match to a  detail  protocol.   Possible  protos                      are:          ether,          fddi,          ip,          arp,          rarp,          decnet,          lat,          sca,          moprc,          mopdl,          tcp          and          udp.  East.g., `ether src foo', `arp cyberspace 128.iii', `tcp port 21'.  If in that location is no                      proto  qualifier, all protocols consequent with the type are causeless.  Due east.g.,                      `src foo' ways `(ip or arp or rarp) src foo'  (except  the  latter  is  not                      legal  syntax),  `net bar' means `(ip or arp or rarp) net bar' and `port 53'                      means `(tcp or udp) port 53'.                [`fddi' is actually an allonym for `ether'; the parser  treats  them  identically  as               meaning  ``the  data  link  level  used on the specified network interface.''  FDDI               headers contain Ethernet-like source and destination addresses, and  often  contain               Ethernet-like package types, then yous can filter on these FDDI fields just as with the               analogous Ethernet fields.  FDDI headers also contain other fields, but you lot  cannot               name them explicitly in a filter expression.]                In  addition  to  the above, there are some special `archaic' keywords that don't               follow the pattern:          gateway,          broadcast,          less,          greater          and  arithmetics  expressions.               All of these are described below.                More  complex filter expressions are built up by using the words          and,          or          and          not          to               combine primitives.  E.g., `host foo and not port ftp and not port  ftp-information'.   To               relieve  typing, identical qualifier lists can be omitted.  E.g., `tcp dst port ftp or               ftp-information or domain' is exactly the aforementioned as `tcp dst port ftp or tcp dst  port  ftp-               data or tcp dst port domain'.                Commanded primitives are:          dst          host          host          Truthful  if the IP destination field of the package is          host, which may be either                      an address or a name.          src          host          host          Truthful if the IP source field of the packet is          host.          host          host          True if either the IP source or destination of the packet is          host.   Whatsoever  of                      the  in a higher place  host expressions tin exist prepended with the keywords,          ip,          arp, or          rarp          as in:          ip          host          host          which is equivalent to:          ether          proto          \ip          and          host          host          If          host          is a name with multiple IP addresses, each address will  be  checked                      for a match.          ether          dst          ehost          True  if  the  ethernet destination address is          ehost.          Ehost          may be either a                      name from /etc/ethers or a number (see          ethers(3N) for numeric format).          ether          src          ehost          True if the ethernet source address is          ehost.          ether          host          ehost          True if either the ethernet source or destination address is          ehost.          gateway          host          True if the packet used          host          as a gateway.  I.e.,  the  ethernet  source  or                      destination  address  was          host          only  neither  the  IP  source  nor  the  IP                      destination was          host.          Host          must be  a  proper noun  and  must  be  plant  in  both                      /etc/hosts and /etc/ethers.  (An equivalent expression is          ether          host          ehost          and          not          host          host          which tin can exist used with either names or numbers for          host          /          ehost.)          dst          net          net          True  if  the  IP  destination address of the packet has a network number of          net.          Internet          may be either a name from /etc/networks or a  network  number  (see          networks(iv)          for details).          src          net          net          True if the IP source address of the bundle has a network number of          net.          net          net          True  if  either  the  IP  source or destination address of the packet has a                      network number of          cyberspace.          net          net          mask          mask          True if the IP address matches          cyberspace          with  the  specific  netmask.   May  exist                      qualified with          src          or          dst.          net          net/len          True  if  the  IP  accost  matches          net          a  netmask          len          bits broad.  May be                      qualified with          src          or          dst.          dst          port          port          True if the packet is ip/tcp or ip/udp and has a destination port  value  of          port.  The          port          can be a number or a name used in /etc/services (see          tcp(4P)                      and          udp(4P)).  If a proper noun is used, both the  port  number  and  protocol  are                      checked.   If  a  number  or cryptic proper name is used, only the port number is                      checked (e.grand.,          dst          port          513          will print both tcp/login  traffic  and  udp/who                      traffic, and          port          domain          will print both tcp/domain and udp/domain traffic).          src          port          port          True if the packet has a source port value of          port.          port          port          True if either the source or destination port of the packet is          port.  Whatsoever of                      the to a higher place port expressions can be prepended with the keywords,          tcp          or          udp,                      as in:          tcp          src          port          port          which matches only tcp packets whose source port is          port.          less          length          True  if  the  package  has  a  length less than or equal to          length.  This is                      equivalent to:          len          <=          length          .          greater          length          Truthful if the bundle has a length greater than or equal to          length.   This  is                      equivalent to:          len          >=          length          .          ip          proto          protocol          True  if  the packet is an ip packet (see          ip(4P)) of protocol type          protocol.          Protocol          can exist a number or one of the names          icmp,          igrp,          udp,          nd,  or          tcp.                      Note  that  the identifiers          tcp,          udp, and          icmp          are besides keywords and must be                      escaped via backslash (\), which is \\ in the C-shell.          ether          broadcast          True if the package is an ethernet circulate packet.  The          ether          keyword  is                      optional.          ip          broadcast          Truthful  if  the packet is an IP broadcast package.  Information technology checks for both the all-                      zeroes and all-ones circulate conventions, and looks  up  the  local  subnet                      mask.          ether          multicast          Truthful  if  the  packet is an ethernet multicast package.  The          ether          keyword is                      optional.  This is autograph for `ether[0]          &          ane          !=          0'.          ip          multicast          True if the packet is an IP multicast packet.          ether          proto          protocol          True if the packet is of ether type          protocol.          Protocol          can exist a number or a                      proper noun  like          ip,          arp, or          rarp.  Annotation these identifiers are also keywords and                      must be escaped via backslash (\).   [In  the  case  of  FDDI  (e.g.,  `fddi          protocol          arp'),  the  protocol  identification comes from the 802.two Logical                      Link Control (LLC) header, which is commonly  layered  on  superlative  of  the  FDDI                      header.          Tcpdump          assumes,  when filtering on the protocol identifier, that                      all FDDI packets include an LLC header, and that the LLC header  is  in  and so-                      called SNAP format.]          decnet          src          host          True  if  the  DECNET source accost is          host, which may be an address of the                      form ``10.123'', or a DECNET host proper noun.  [DECNET host proper name back up  is  only                      bachelor on Ultrix systems that are configured to run DECNET.]          decnet          dst          host          True if the DECNET destination address is          host.          decnet          host          host          True if either the DECNET source or destination address is          host.          ip,          arp,          rarp,          decnet          Abbreviations for:          ether          proto          p          where          p          is 1 of the above protocols.          lat,          moprc,          mopdl          Abbreviations for:          ether          proto          p          where          p          is i of the above protocols.  Notation that          Snort          does not currently                      know how to parse these protocols.          tcp,          udp,          icmp          Abbreviations for:          ip          proto          p          where          p          is one of the above protocols.          expr          relop          expr          True if the relation holds, where          relop          is one of >, <, >=, <=, =,  !=,  and          expr          is an arithmetic expression composed of integer constants (expressed in                      standard C syntax), the normal binary operators [+, -, *, /, &, |], a length                      operator,  and  special  packet  data  accessors.  To access data inside the                      bundle, use the following syntax:          proto          [          expr          :          size          ]          Proto          is 1 of          ether,          fddi,          ip,          arp,          rarp,          tcp,          udp,          or          icmp, and indicates                      the  protocol  layer  for the alphabetize functioning.  The byte offset, relative to                      the indicated protocol layer, is  given  by          expr.          Size          is  optional  and                      indicates  the  number  of  bytes in the field of interest; information technology can be either                      i, two, or 4, and defaults to one.  The length operator,  indicated  past                      the keyword          len, gives the length of the packet.                       For  example,  `ether[0]          &          1          !=          0'  catches  all multicast traffic.  The                      expression `ip[0]          &          0xf          !=          5' catches  all  IP  packets  with  options.  The                      expression  `ip[half-dozen:2]          &          0x1fff          =          0' catches simply unfragmented datagrams and                      frag zero of fragmented datagrams.  This check is implicitly applied to  the          tcp          and          udp          index operations.  For instance,          tcp[0]          always means the first                      byte of the TCP          header, and never means the first  byte  of  an  intervening                      fragment.                Primitives may be combined using:                       A  parenthesized  group of primitives and operators (parentheses are special                      to the Shell and must be escaped).                       Negation (`!' or `not').                       Chain (`&&' or `and').                       Alternation (`||' or `or').                Negation  has  highest  precedence.   Alternation  and  concatenation  accept   equal               precedence  and  associate  left  to  correct.   Note  that  explicit          and          tokens, not               juxtaposition, are now required for chain.                If an identifier is given without a keyword, the most recent  keyword  is  assumed.               For instance,          non          host          vs          and          ace          is curt for          non          host          vs          and          host          ace          which should not exist confused with          not          (          host          vs          or          ace          )          Expression  arguments  can  be  passed  to  Snort equally either a single argument or every bit               multiple arguments, whichever is more user-friendly.   Mostly,  if  the  expression               contains  Shell  metacharacters,  it  is  easier  to  pass  it  as a single, quoted               statement.  Multiple arguments are concatenated with spaces before beingness parsed.        

READING PCAPS

          Instead of having Snort listen on an interface, you tin requite it a packet capture to  read.        Snort  will read and analyze the packets as if they came off the wire.  This tin can exist useful        for testing and debugging Snort.          Read          a          single          pcap          $ snort -r foo.pcap             $ snort --pcap-single=foo.pcap          Read          pcaps          from          a          file          $ cat foo.txt             foo1.pcap             foo2.pcap             /dwelling/foo/pcaps              $ snort --pcap-file=foo.txt              This volition read foo1.pcap, foo2.pcap and all files under /home/foo/pcaps.   Annotation  that             Snort  will  not  attempt  to decide whether the files nether that directory are really             pcap files or not.          Read          pcaps          from          a          command          line          list          $ snort --pcap-list="foo1.pcap foo2.pcap foo3.pcap"              This will read foo1.pcap, foo2.pcap and foo3.pcap.          Read          pcaps          nether          a          directory          $ snort --pcap-dir="/domicile/foo/pcaps"              This volition include all of the files under /habitation/foo/pcaps.          Using          filters          $ cat foo.txt             foo1.pcap             foo2.pcap             /dwelling house/foo/pcaps              $ snort --pcap-filter="*.pcap" --pcap-file=foo.txt             $ snort --pcap-filter="*.pcap" --pcap-dir=/home/foo/pcaps              The in a higher place volition simply include files that match the shell  pattern  "*.pcap",  in  other             words, any file ending in ".pcap".              $ snort --pcap-filter="*.pcap --pcap-file=foo.txt \             > --pcap-filter="*.cap" --pcap-dir=/home/foo/pcaps              In the above, the kickoff filter "*.pcap" will only be practical to the pcaps in the file             "foo.txt" (and whatsoever directories that are recursed in that file).  The improver of  the             2nd filter "*.cap" will cause the get-go filter to be forgotten and then practical to             the directory /home/foo/pcaps, so only files ending in ".cap" will be  included  from             that directory.              $ snort --pcap-filter="*.pcap --pcap-file=foo.txt \             > --pcap-no-filter --pcap-dir=/home/foo/pcaps              In  this example, the first filter will be applied to foo.txt, then no filter will be             applied  to  the  files  constitute  under  /home/foo/pcaps,  so  all  files  found  under             /habitation/foo/pcaps volition be included.              $ snort --pcap-filter="*.pcap --pcap-file=foo.txt \             > --pcap-no-filter --pcap-dir=/home/foo/pcaps \             > --pcap-filter="*.cap" --pcap-dir=/home/foo/pcaps2              In  this example, the first filter will be applied to foo.txt, then no filter will be             applied  to  the  files  institute  under  /home/foo/pcaps,  and then  all  files  found  under             /abode/foo/pcaps  will  be  included, so the filter "*.cap" volition be applied to files             found under /habitation/foo/pcaps2.          Resetting          land          $ snort --pcap-dir=/home/foo/pcaps --pcap-reset              The above example will read all of the files under /home/foo/pcaps,  merely  later  each             pcap  is read, Snort volition be reset to a mail service-configuration country, meaning all buffers             will exist flushed, statistics reset, etc.  For each pcap, it  volition  exist  like  Snort  is             seeing traffic for the first fourth dimension.          Press          the          pcap          $ snort --pcap-dir=/habitation/foo/pcaps --pcap-testify              The  to a higher place  example volition read all of the files under /home/foo/pcaps and will impress a             line indicating which pcap is currently being read.        

RULES

          Snort uses a uncomplicated merely flexible rules language to depict network packet signatures  and        associate   them   with   actions.    The   electric current   rules   document  can  be  found  at        http://www.snort.org/snort-rules.        

NOTES

          The following signals have the specified effect when sent to the daemon process using  the          kill(1)          command:         SIGHUP Causes  the  daemon  to  close all opened files and restart.  Delight          notation          that this               will only work if the          full          pathname  is  used  to  invoke  snort  in  daemon  mode,               otherwise snort volition but go out with an error message being sent to          syslogd(8).         SIGUSR1               Causes  the  program  to  dump  its  current  packet statistical information to the               console or          syslogd(8)          if in daemon fashion.         SIGUSR2               Causes the program to rotate Perfmonitor statistical information to the console  or          syslogd(8)          if in daemon style.         SIGURG Causes the programme to reload attribute table.         SIGCHLD               Used internally.         Please  refer to manual for more details. Any other point might crusade the daemon to close        all opened files and go out.        

HISTORY

          Snort          has been freely available under the GPL license since 1998.        

DIAGNOSTICS

          Snort          returns a 0 on a successful exit, i if information technology exits on an error.        

BUGS

          After consulting the BUGS file included with the source distribution, send bug reports  to        snort-devel@lists.sourceforge.internet        

Author

          Martin Roesch <roesch@snort.org>        

Come across Too

          tcpdump(1),          pcap(iii)                                            December 2011                                  SNORT(8)        

hollowayhasexce39.blogspot.com

Source: http://manpages.ubuntu.com/manpages/bionic/man8/snort.8.html

0 Response to "Snort Read Network Trace Data Command Line Filter Expression"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel