Download Network Penetration Using Nmap and SNORT

Transcript
Test Description – Download SNORT IDS source code along with all dependencies, follow instructions given to successfully compile SNORT on the Target PC. Test Conditions‐ this test should be completed before any other test cases start as this is a vital part of the testing phase. Expected Results‐ Once SNORT’s source code and dependencies are downloaded and compiled, the SNORT IDS should initialize and execute. Test Case IDS 2 Test Objective – SNORT IDS detects traffic with default rule sets. Test Description‐ From a command window, start SNORT in the Intrusion Detection Mode. Test Conditions‐ This test should be completed before any other test cases start as this is also a vital part of the testing phase. Expected Results‐ Once SNORT is executed in intrusion detection mode, SNORT will start successfully and signal it is capturing packets. Test Case IDS 3 Test Objective‐ SNORT IDS detects Nmap TCP scans Test Description‐ After the Attacker PC runs a port/vulnerability scan on the target, all scanning activity performed will be logged into the MySQL SNORT database on the Target PC Test Conditions ‐ This test should be executed to ensure that the default rule sets are functioning properly and the MySQL SNORT database is properly setup and configured. Page | 27