Skip to content

Tariqshinwar/snort3-source-ids

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

🛡️ Project 4: Building Snort 3.1.74.0 Intrusion Detection System (IDS) from Source

This project involved building the latest version of Snort 3 (v3.1.74.0) completely from source on a Kali Linux machine, following industry practices for network intrusion detection system (IDS) configuration and deployment.


✅ What I Did

  • Compiled Snort 3 from source
  • Installed all required dependencies manually
  • Downloaded and built PCRE, Hyperscan, Boost, Flatbuffers, libDAQ, Ragel, and Gperftools
  • Installed PulledPork3 for future rule updates
  • Created and structured Snort configuration files
  • Validated build steps using screenshots

Although I faced issues running Snort live with community rules due to config errors, this project reflects my ability to troubleshoot complex Linux environments and build advanced security tools manually.


🧱 Build Process (Step-by-Step)

📁 All screenshots are in the screenshots/ folder in this repo.

🔹 Step 0 – Create Build Directory

Step 0

🔹 Step 1 – Install APT Dependencies

Step 1

🔹 Step 2 – Install PCRE

Step 2

🔹 Step 3 – Install gperftools

Step 3

🔹 Step 4 – Install Ragel

Step 4

🔹 Step 5 – Download Boost

Step 5

🔹 Step 6 – Install Hyperscan

Step 6

🔹 Step 7 – Install Flatbuffers

Step 7

🔹 Step 8 – Install libDAQ

Step 8

🔹 Step 9 – Run ldconfig

Step 9

🔹 Step 10 – Compile & Install Snort 3

Step 10

🔹 Step 11 – Disable LRO/GRO (Optional)

Step 11

🔹 Step 12 – Install PulledPork3

Step 12


📁 Key Project Artifacts

  • snort.lua: Configuration file (see notes.md)
  • Screenshot log of all build steps
  • Manual compilation and validation of core libraries

⚙️ Tools Used

  • Kali Linux (VirtualBox)
  • Snort 3.1.74.0
  • Boost 1.77.0
  • Hyperscan 5.4.2
  • Flatbuffers 2.0.0
  • PCRE 8.45
  • PulledPork3

🚧 Project Status

Snort was successfully built and configured, but errors with community.rules integration prevented full testing with live alerts. Future improvements include:

  • Using Snort’s built-in rules for testing
  • Revalidating the snort.lua detection block
  • Comparing with Snort 2.x for rule compatibility

About

Compiled and configured Snort 3 from source with PulledPork3 rule updates. Deployed Snort in live packet monitoring mode and tested attack simulations for alert generation.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors