Lab 3 : Network security using SNORT
Introduction
This Lab is a specialized virtual environment designed for the purpose of cybersecurity
training and education. In today’s digital landscape, the importance of understanding and
defending against cyber threats is paramount. This lab provides a practical, hands-on
approach to learning various aspects of cybersecurity, including but not limited to
penetration testing, network security, intrusion detection, and response strategies.
Purpose
The primary purpose of this Lab is to facilitate a comprehensive understanding and
application of cybersecurity concepts and practices.
This lab environment allows users to:
1. Provide a hands-on approach to learning offensive and defensive cybersecurity
techniques using tools like Metasploitable, Kali Linux, and Ubuntu.
2. Serve as an educational platform for aspiring cybersecurity professionals.
3. Create a safe, controlled environment for experimentation.
4. Enhance technical skills in network security and ethical hacking.
Scope
The scope of the Lab encompasses:
1. Virtualization and Network Setup: Utilizing VMware for the creation and management
of virtual machines, each hosting different operating systems (Metasploitable, Kali Linux,
and Ubuntu) and configured in a host-only network to ensure isolation and safety.
2. Tool Implementation and Configuration: Including Snort for intrusion detection.
3. Learning Objectives: Focusing on providing hands-on experience in identifying
vulnerabilities, conducting penetration tests, monitoring network traffic, and
implementing defensive strategies.
5. Resource Constraints: Designed to be efficient and functional within the constraints of
8GB RAM, ensuring accessibility for users with limited hardware resources. Lab Requirements
Hardware Requirements
RAM: 8 GB of RAM.
Storage: 30GB+
Operating Systems
1. Metasploitable: This will act as the victim machine. Metasploitable is intentionally
vulnerable to provide a training environment for security testing.
https://sourceforge.net/projects/metasploitable/files/latest/download
2. Kali Linux: This will be used as the attacker machine. Kali Linux comes with numerous
pre-installed penetration testing tools.
https://www.kali.org/get-kali/
3. Ubuntu: This will serve as the defense machine, where you’ll monitor the network and
implement security measures.
https://ubuntu.com/download/desktop
Software Requirements
1. Virtualization Software: VMWare.
2. NIDS&NIPS: Snort https://www.snort.org/downloads#snort3-downloads
Network
In my environment I have this network:
Kali — 192.168.152.128/24
Met