Writing Simple Custom Suricata Rules
>> YOUR LINK HERE: ___ http://youtube.com/watch?v=8h_r7brfc3E
In this video we walk through the steps of creating a simple Suricata rule to detect an HTTP-based attack. • The attack captured in the pcap file was performed using a Kali VM on DC-6 machine (https://www.vulnhub.com/entry/dc-6,315/). • If you want to use the pcap file for practice, you can download it from this link: • https://www.mohammedalani.com/dc6-att... • If you like this video, let me know so I would be encouraged to add more videos. • Feel free to reach out to me via Twitter @alani_m • Don't forget to visit my blog: • https://www.mohammedalani.com
#############################
