This script is for Slackware 14.2 only and may be outdated.

SlackBuilds Repository

14.2 > Network > snort (2.9.11.1)

Snort is an open source network intrusion detection and prevention system.
It is capable of performing real-time traffic analysis, alerting, blocking
and packet logging on IP networks. It utilizes a combination of protocol
analysis and pattern matching in order to detect a anomalies, misuse and
attacks.

Snort uses a flexible rules language to describe activity that can be
considered malicious or anomalous as well as an analysis engine that
incorporates a modular plugin architecture. Snort is capable of detecting
and responding in real-time, sending alerts, performing session sniping,
logging packets, or dropping sessions/packets when deployed in-line.

Snort has three primary functional modes. It can be used as a packet
sniffer like tcpdump(1), a packet logger (useful for network traffic
debugging, etc), or as a full blown network intrusion detection and
prevention system.

For more information about running Snort on Slackware, please see
README.SLACKWARE.

This requires: daq

Maintained by: David Spencer
Keywords: security,ids,ipds,sniffer,ips,intrusion,detection,prevention
ChangeLog: snort

Homepage:
https://www.snort.org/

Source Downloads:
snort-2.9.11.1.tar.gz (378e3938b2b5c8e358f942d0ffce18cc)

Download SlackBuild:
snort.tar.gz
snort.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Validated for Slackware 14.2

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2024 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds