Snort mailing list archives

getting a full copy of pcap for forensic purposes from Snort


From: "Long, Kerry S" <kslong () mitre org>
Date: Thu, 20 Mar 2014 13:26:10 +0000

I am trying to create a sensor with Snort that has Snort listening on the interface processing rules and such while 
also creating a full copy of pcap seen on the interface for forensic purposes.  I have enough storage to hold about a 
month of pcap in this instance.  I am familiar with the capability of using a log rule to log packets but the problem 
is that the pcap has to go through all the alert rules first it seems before it can be logged.  The problem is that 
packets can be dropped as the amount of network traffic increases during the day.



I have tried using this in my config file to alleviate the problem:



# Per Packet latency configuration

config ppm: max-pkt-time 100, \

   fastpath-expensive-packets, \

   pkt-log



and this has helped somewhat but I am still not logging some packets (which for a forensic record is bad) and I am 
missing the benefit of several snort rules that take more than 100 usecs.





Any ideas how I can get Snort to both log all packets to disk and alert on traffic it sees on the interface.



Thanks,





Kerry

------------------------------------------------------------------------------
Learn Graph Databases - Download FREE O'Reilly Book
"Graph Databases" is the definitive new guide to graph databases and their
applications. Written by three acclaimed leaders in the field,
this first edition is now available. Download your free book today!
http://p.sf.net/sfu/13534_NeoTech
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort news!

Current thread: