What is Snort?

Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and nearly 400,000 registered users, Snort has become the de facto standard for IPS.

New to Snort?

  1. Requirements

    Before installing Snort you need to verify that you have a number of software packages installed. These are: Libpcap, PCRE, Libnet and Barnyard. Click the requirements button for more information on these packages.

  2. Downloads

    Once the platform is prepared, you need to download and install the Snort Engine. The Snort Engine can be downloaded as source code or binaries for popular operating systems. Click the downloads button for more information about the Snort Engine and how to download.

  3. Rules

    Snort requires a current ruleset to deliver the latest detection capabilities. Snort Rules are distributed separately from the engine. Click the rules button for more information on the rulesets available on Snort.org

  4. Docs

    Users have reams of documentation available, the official docs, a wide array of set-up guides and dozens of Snort books. Click the Docs button for more information on available documentation.

The Snort Blog

  • Installation Documentation for OpenSuSE 11.4, 12.1, and FreeBSD 8.2 posted

    William Parker, one of the many of the Snort community submitted these three pieces of docu ...

    Posted by noreply@blogger.com (Joel Esler) on Jul 20, 2012

  • Snort 2.9.3.0 on Debian install guide has been posted

    Thanks to Jason Weir, I just posted his Snort 2.9.3.0 Install Guide for Debian 6.0.5. ...

    Posted by noreply@blogger.com (Joel Esler) on Jul 20, 2012

  • Sourcefire VRT Certified Snort Rules Update for 07/19/2012

    Just released: Sourcefire VRT Certified Snort Rules Update for 07/19/2012

    Posted by noreply@blogger.com (Joel Esler) on Jul 20, 2012

The VRT Blog

  • fast_pattern is fast

    A fairly new reconnaissance tool calle ...

    Posted by Nick Randolph on Jul 20, 2012

  • The Power of Open Source Intelligence

    Last week, an email came into the main VRT email account, entitled "New Malicious Javascrip ...

    Posted by Alex Kirk on Jul 17, 2012

  • It's not the Dalai Lama's birthday, oh and you got owned

    The ClamAV Blog

    • ClamAV's Wiki

      The ClamAv Wiki is currently down.  It hadn't been updated for some time (several year ...

      Posted by Joel Esler on Jul 03, 2012

    • Introducing the new ClamAV team

      Earlier this week we announced a new chapter for ClamAV with the departure of Tomasz Kojm, ...

      Posted by Joel Esler on Jun 22, 2012

    • A New Chapter for ClamAV

      Earlier today, Tomasz Kojm sent an email to the ClamAV mailing list on behalf of himself an ...

      Posted by Matthew Watchinski on Jun 19, 2012

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.