LAB:: Install Suricata
LAB:: Install Suricata
Topology
[group1.apnictraining.net] [192.168.30.1]
[group2.apnictraining.net] [192.168.30.2]
......
[group10.apnictraining.net] [192.168.30.10]
[group11.apnictraining.net] [192.168.30.11]
......
[group20.apnictraining.net] [192.168.30.20]
[group21.apnictraining.net] [192.168.30.21]
......
[group30.apnictraining.net] [192.168.30.30]
In this lab you will be installing and configuring Suricata Intrusion Detection System (IDS).
Lab Tasks
Step 1: Update Ubuntu software
Step 2: Install pre-requisite software
Step 3: Install Suricata
Step 4: Install EveBox
Step 5: Review Suricata configuration
Part 1. Installation
ssh apnic@192.168.30.XX
Password is training
2. Install pre-requisite software
Password is training
mkdir Downloads
cd Downloads
wget https://evebox.org/files/release/0.14.0/evebox_0.14.0_amd64.deb
sudo dpkg -i evebox_0.14.0_amd64.deb
10. Enable the Suricata SSL Certificate Ruleset to detect and/or block malicious SSL connections based
on the SSL certificate fingerprint.
sudo suricata-update enable-source sslbl/ja3-fingerprints
sudo suricata-update
Part 2. Review the Suricata configuration
1. To determine the network address used by Suricata, review the variable called $HOME_NET in the
suricata.yaml file.
3. Review the variable af-packet to determine which interface suricata will listen for traffic.
Password = training
sudo wc -l /var/lib/suricata/rules/suricata.rules
sudo wc -l /var/lib/suricata/rules/classification.config
Password = training
END OF EXERCISE