¿Alguna vez te ha hecho falta configurar un sistema de detección de intrusos en la lan de tu casa o en la oficina?

Pues mas sencillo no puede ser, echa un vistazo…..

This tutorial is based on another howto written by DevilMan, however I didn’t like the idea of manually compiling every package or the use of a GUI to get the software installed. This howto will work on a Gutsy Server or Gutsy desktop. With that said some of this howto is a direct copy from the original.
In this tutorial I will describe how to install and configure Snort (an intrusion detection system (IDS)) from source, BASE (Basic Analysis and Security Engine), MySQL, and Apache2 on Ubuntu 7.10 (Gutsy Gibbon). Snort will assist you in monitoring your network and alert you about possible threats. Snort will output its log files to a MySQL database which BASE will use to display a graphical interface in a web browser.

  1. Gain root privileges
  2. It is easiest to do this install as root user.

    sudo su –

  3. Install some packages
  4. The following will install all the required packages to make this setup work:

    apt-get install libpcap0.8-dev libmysqlclient15-dev mysql-client-5.0 mysql-server-5.0 bison flex apache2 libapache2-mod-php5 php5-gd php5-mysql libphp-adodb php-pear libc6-dev g++ gcc pcregrep

  5. Get and compile snort
    1. Download snort and snort rules
    2. wget http://www.snort.org/dl/current/snort-

      There are a couple options for rules. The following will download the public rules, however with a quick registration at the snort site you can get more current rules. Your choice but the next command is run the same way with the appropriate URL:

      wget http://snort.org/pub-bin/downloads.cgi/Download/vrt_pr/snortrules-pr-2.4.tar.gz

    3. Unpack and get them ready for compile
    4. tar zxvf snort-

      cd snort-

      tar zxvf ../snortrules-pr-2.4.tar.gz

    5. Now compile them
    6. ./configure -enable-dynamicplugin –with-mysql


      make install

      Keep this directory handy as you can simply run

      make uninstall

      To uninstall snort later if you choose

    7. Move things into position
    8. We now need to move the rules and config for snort into position

      mkdir /etc/snort /etc/snort/rules /var/log/snort

      cd /usr/src/snort-

      cp * /etc/snort/

      cd ../rules

      cp * /etc/snort/rules

  6. The Snort package in the Gutsy repo’s are out of date. So I prefered to download the most current and install that. This is the only thing we will compile from scratch.

    The latest version of snort at the time of writing is

    First let’s go to a working directory:

    cd /usr/src/

    Open a web browser and navigate to http://www.snort.org/dl right click on the most recent release and copy link location.

  7. Configure Snort
  8. We need to modify the snort.conf file to suite our needs.

    Open /etc/snort/snort.conf with your favorite text editor (nano, vi, vim, etc.).

    # vi /etc/snort/snort.conf

  9. Change «var HOME_NET any» to «var HOME_NET» (your home network may differ from

    Change «var EXTERNAL_NET any» to «var EXTERNAL_NET !$HOME_NET» (this is stating everything except HOME_NET is external)

    Change «var RULE_PATE ../rules» to «var RULE_PATH /etc/snort/rules»

    Scroll down the list to the section with «# output database: log, mysql, user=», remove the «#» from in front of this line.

    Change the «user=root» to «user=snort», change the «password=password» to «password=snort_password», «dbname=snort»

    Make note of the username, password, and dbname. You will need this information when we set up the Mysql db.

    Save and quit.

  10. Setup the Mysql database.
  11. Log into the mysql server.

    # mysql -u root -p

    Create the snort database. Make sure you change the ‘snort_password’ to something else!

    mysql> create database snort;

    grant all privileges on snort.* to ‘snort’@’localhost’ identified by ‘snort_password’; mysql> exit

    We will use the snort schema for the layout of the database.

    # mysql -D snort -u snort -p < /usr/src/snort-

    NOTE: Use your snort DB user password when prompted.

  12. Time to test Snort
  13. In the terminal type:

    # snort -c /etc/snort/snort.conf

    If everything went well you should see an ascii pig.

    To end the test hit ctrl + c.

    NOTE: If you get errors you may want to try commenting out lines 97,98 and 452 of /etc/snort/rules/web-misc.rules. This was an issue in the past but doesn’t seem to be anymore.

  14. Get and install BASE
  15. Open a web browser and go to http://sourceforge.net/project/showfiles.php?group_id=103348.
    Click on download then right click on the newest tar.gz package and select copy link (at the time of writing this is base-1.3.9).
    In the terminal type:


    wget http://easynews.dl.sourceforge.net/sourceforge/secureideas/base-1.3.9.tar.gz

    Now go to your web document root (by default this is /var/www), unpack the tarball and set the permissions needed to configure BASE:

    cd /var/www/

    tar zxvf ~/base-1.3.9.tar.gz cd .. chmod 757 base-1.3.9

    We want to make sure that a couple of Pear modules are activated:

    pear install Image_Color

    pear install Image_Canvas-alpha

    pear install Image_Graph-alpha

  16. Set up BASE
    1. Step 1 of 5: Enter the path to ADODB.
      This is /usr/share/php/adodb.
    2. Step 2 of 5: Database type = MySQL, Database name = snort, Database Host = localhost, Database username = snort, Database Password = snort_password
    3. Step 3 of 5: If you want to use authentication enter a username and password here and check the box.
    4. Step 4 of 5: Click on Create BASE AG.
    5. Step 5 of 5: once step 4 is done at the bottom click on Now continue to step 5.
  17. Open a web browser and navigate to http://YOUR.IP.ADDRESS/base-1.3.9/setup.
    Click continue on the first page.

    Bookmark this page.
    Change the permissions back on the /var/www/base-1.3.9 folder.
    # chmod 755 /var/www/base-1.3.9

    We are done. Congrats!!!

    To start Snort in the terminal type (make sure you change eth0 to the right interface for your machine:

    # snort -c /etc/snort/snort.conf -i eth0 -D
    This starts snort using eth0 interface in a daemon mode.
    To make sure it is running you can check with the following command:

    # ps aux | grep snort

    If it’s running you will see an entry similar to snort -c /etc/snort/snort.conf -i eth0 -D.
    If you would like to learn how to write your own Snort rules there is a guide at http://www.snort.org/docs/snort_manual/node16.html.

Good luck.

You must be logged in to post a comment.