Win7 to Kali: Secure FTP and ICMP Monitoring Techniques

Main Uses of Snort: From Win7 to Kali

1. Similar to TCP dump, Win7 to Kali can be used as a network sniffer to debug network traffic.

2. Used for signature-based network intrusion detection from Win7 to Kali.

Examples of Using the Snort Intrusion Detection System:

1. Capturing packets using Snort’s three modes combined

Insert image description here: Win7 to Kali

2. Logging packets to a specified location

Win7 to Kali
Win7 to Kali
Insert image description here

3. Editing Snort’s configuration file to add custom rules

Insert image description here
Insert image description here
Insert image description here
Insert image description here

(1) Alerting on request packets from external hosts targeting the current host’s port 80/TCP.

Adding the following rule:Insert image description hereInsert image description hereInsert image description here

Accessing the Kali server website from Win7Insert image description here

Web access detectedInsert image description here

(2) String matching: If a machine logs into the Kali FTP server, an alert is triggered, and the username and password of the user are captured.

Insert image description hereInsert image description here FTP connection from Win7 to KaliInsert image description here FTP access detected; inspecting the packet reveals plaintext username and passwordInsert image description hereInsert image description here

(3) Alerting on ICMP echo requests. Adding the following rule:Insert image description hereInsert image description here

Win7 pinging KaliInsert image description here ICMP response detectedInsert image description here