Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

ur third and final homework assignment builds on the unacceptable site detection we worked on in assignment #2. In this exercise we will attempt to

ur third and final homework assignment builds on the "unacceptable site" detection we worked on in assignment #2. In this exercise we will attempt to accomplish the same detection goal using the reputation preprocessor in Snort. The documentation on the reputation preprocessor and the available configuration options are in section 2.2.20 (starting on p. 122) of the Snort Manual, which is posted under General Information under Content for your reference. The basic function of the reputation preprocessor is similar in many ways to basic firewall operation: the preprocessor evaluates source and destination IP addresses in network packets to see if they appear on either a "whitelist" of approved/acceptable addresses or a "blacklist" of prohibited addresses. Packets containing IP addresses on the blacklist are dropped. The overall intent for this assignment is to block access to the "unacceptable" site you selected for Lab #2 (or a different site chosen for this assignment) by adding the site to a blacklist and enabling the reputation preprocessor in snort.conf.

Please note: If you are using the Virtual Lab, the reputation preprocessor is already configured properly and the supporting whitelist and blacklist files are stored in /etc/snort/rules/rules. All you need to do is identify the IP address(es) to use and add them to the black_list.rules file. The IP addresses corresponding to each of the website URLs from Lab #2 are provided below.

Site URL IP Address www.mdlottery.com 72.21.81.131 www.national-lottery.co.uk 194.246.78.102 www.pokerstars.com 77.87.181.63 everymatrix.com 192.230.83.161 reagan.com 104.25.227.14 thepiratebay.org 104.27.216.28 www.fanduel.com 52.6.79.49 ashleymadison.com 104.16.119.62 twitter.com 104.244.42.1 www.facebook.com 179.60.192.36

To complete this assignment successfully using Snort on Windows, you may need to first edit the snort.conf file as follows if you did not already configure these items when you first installed Snort:

At the end of Step #1, either set the path to the reputation preprocessor file location or comment out these two lines (you can declare the blacklist file directly in the preprocessor configuration settings if you don't want to use a variable reference).

At the end of Step #5, configure the reputation preprocessor. The default configuration should work fine for most students, as long as the file paths and names are accurate for the local installation. Look at the first configuration example on page 120 of the Snort Manual as a guide, which simply includes the preprocessor declaration and the specification of the blacklist and whitelist files. You can run the preprocessor with either or both of these files, so for our purposes you might just specify a blacklist file. Where the configuration designates a file (such as "black.list" or "white.list") the file must exist in the location specified or Snort will generate an error at start-up.

Save the snort.conf file.

Now, create a blacklist file and put it in the proper directory (such as /etc/snort/rules on Linux or C:\Snort\etc ules on Windows). A blacklist file is just a plain text file with one IP address (or address range, using CIDR notation) per line. The blacklist file name and file location should of course match what you specified in the preprocessor configuration in snort.conf. Then startup Snort as you would normally, open a browser, and visit the site corresponding to the IP address(es) in the blacklist file.

For this assignment, compose a short writeup for submission to your Assignments folder that includes the following:

The "unacceptable" site you selected in Homework #2 (you can pick a new one for this assignment if you prefer).

The IP address (individual, multiple, or a range) associated with that site. If you don't know the IP address, you can either open a command shell and ping the site (e.g. "ping www.facebook.com"), which will return the primary IP address on screen, or you can look up the site on Netcraft.com to find one or more IP addresses used by the site.

The contents of the blacklist file the reputation preprocessor references.

A brief summary comparing the rule-based and preprocessor-based approaches used in Homework Assignments #2 and #3, with an emphasis on identifying any strengths or weaknesses associated with each approach.

If you are able to get Snort to run successfully with the reputation preprocessor active, include the output produced (a copy of the ASCII log file is sufficient).

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

SQL Antipatterns Avoiding The Pitfalls Of Database Programming

Authors: Bill Karwin

1st Edition

1680508989, 978-1680508987

More Books

Students also viewed these Databases questions