03_How to Install SNORT
03_How to Install SNORT
20 on
Windows 10
Introduction To Snort:
In this tutorial we will look at installing and configuration of snort on Windows 10. Snort is
an open source and popular Intrusion Detection System (IDS). It works by actively
monitoring of network traffic parsing each packet and alerting system administrator of any
anomalous behavior that goes against the snort rules configured by the administrator
according to the security policies of an organization.
1. For Windows 10 64 bit supported SNORT’s executable file can be downloaded from
here.
6. Click “Next” Installation process starts and then it completes as shown in figure 04:
Figure 04: Setup Complete for Snort 2.9.17
7. When you click “ Close” you are prompted with this dialogue box:
Figure 05: Window showing details of software needed to run Snort successfully
11. Now we proceed to choose which components of Npcap are to be installed and then
clicking on “Install”.
13. Now the window for installation of Npcap shows it has been installed. Clicking “Finish”.
Figure 09: Successful installation for Npcap 1.10 completed
14. After installing Snort and Npcap enter these commands in windows 10 Command prompt
to check snorts working
15. As you can see in the above figure that snort runs successfully.
This is how you can download and install Snort along with its dependency i.e. Npcap.
After installing Snort on Windows 10, Another important step to get started with Snort is
configuring it on Windows 10.
Note: The italicized portion with a left hand side border states commands which were pre-
written in the configuration file of Snort so we need to make changes according to the
commands mentioned in the images, to be precise we need to enter configuration commands
as shown in the images to configure snort.
• rules folder contains the rules files and the most important local.rules file. Which we
will use to enter all our rules.
• etc folder contains all configuration files and the most important file is snort.conf file
which we will use for configuration
3. Now open the snort.conf file through the notepad++ editor or any other text editor to edit
configurations of snort to make it work like we want it to.
Note: Mention your own host IP addresses that you want to protect.
5. Setup the external network into anything that is not the home network. That is why ! is
used in the command it denotes ‘not’.
6. Now we have to define the directory for our rules and preproc rules folder
# Path to your rules files (this can be a relative path)# Note for Windows
users: You are advised to make this an absolute path,# such as:
c:\snort\rulesvar RULE_PATH ../rulesvar SO_RULE_PATH ../so_rulesvar
PREPROC_RULE_PATH ../preproc_rules
Figure 13: Setting up path to our rules files and preproc rules folder in Snort
7. Now we have to setup our white list and black list path it will be in our snorts’ rule folder
Figure 14: Setting up our White List and Black List files paths in Snort
8. Next we have to enable to log directory, so that we store logs in our log folder.
Uncomment this line and set absolute path to log directory
# Configure default log directory for snort to log to. For more information
see snort -h command line options (-l)## config logdir:
Figure 15: Setting up Log Directory Path in Snort
9. Now we will set the path to dynamic preprocessors and dynamic engine
Figure 16: Setting up path to dynamic preprocessors and dynamic engine in Snort
12. Just comment out these lines as shown in figure 19 in doing so we are excluding packet
normalization of different packets.
13. Scroll down to the reputation preprocessors. We will just change the name of the files
since white list , black list are not rules they are just the list of IP addresses labelled as black
or white
Figure 21 : Converted back slashes to forward slashes in specific lines in snort.conf file
Figure 22: Converted back slashes to forward slashes in specific lines in snort.conf file
15. Again just convert forward slashes to backslashes and uncomment the lines below:
Figure 23 : Converted back slashes to forward slashes in specific lines and uncommenting specific
lines in snort.conf file
16. Now we just need to verify the presence of this command at the bottom of snort.conf file.
18. Now recalling the Step 13 white list , black list are not rules they are just the list of IP
addresses labelled as black or white right now these files don’t exist in our rule path which is
why we have to create them manually , save them in this folder C:\Snort\rules.
19. Now we test snort again by running Command prompt as admin. To check if it’s running
fine after all the configurations.
Figure 27: Test Running of Snort in Windows 10 after Configuration
20. We can also the check the wireless interface cards from which we will be using snort by
using the command below we can see the list of our wireless interface cards through entering
this command in command prompt.
Snort — W
snort -i 1 -c C:\Snort\etc\snort.conf -T
It can be seen in the given figure that Snort successfully validates our configuration. This
brings us to the end of our installation and configuration tutorial.
If you want to follow it through our references used for writing this tutorial then references
are given below.
References: