Suricata – Open Source Next Generation Intrusion Detection and Prevention Engine


The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field.

Basically it’s a is a multi-threaded intrusion detection/prevention engine engine available from the Open Information Security Foundation

OISF is part of and funded by the Department of Homeland Security’s Directorate for Science and Technology HOST program (Homeland Open Security Technology), by the the Navy’s Space and Naval Warfare Systems Command (SPAWAR), as well as through the very generous support of the members of the OISF Consortium. More information about the Consortium is available, as well as a list of our current Consortium Members.

The Suricata Engine and the HTP Library are available to use under the GPLv2.

The HTP Library is an HTTP normalizer and parser written by Ivan Ristic of Mod Security fame for the OISF. This integrates and provides very advanced processing of HTTP streams for Suricata. The HTP library is required by the engine, but may also be used independently in a range of applications and tools.

You can download Suricata v0.9 here:

suricata-0.9.0.tar.gz

Or read more here.

Posted in: Countermeasures, Networking Hacking Tools, Security Software

, , , , , , , ,


Latest Posts:


Axiom - Pen-Testing Server For Collecting Bug Bounties Axiom – Pen-Testing Server For Collecting Bug Bounties
Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty, basically a pen-testing server out of the box with 1-line.
Quasar RAT - Windows Remote Administration Tool Quasar RAT – Windows Remote Administration Tool
Quasar is a fast and light-weight Windows remote administration tool coded in C#. Used for user support through day-to-day administrative work to monitoring.
Pingcastle - Active Directory Security Assessment Tool Pingcastle – Active Directory Security Assessment Tool
PingCastle is a Active Directory Security Assessment Tool designed to quickly assess the Active Directory security level based on a risk and maturity framework.
Second Order - Subdomain Takeover Scanner Tool Second Order – Subdomain Takeover Scanner Tool
Second Order Subdomain Takeover Scanner Tool scans web apps for second-order subdomain takeover by crawling the application and collecting URLs (and other data)
Binwalk - Firmware Security Analysis & Extraction Tool Binwalk – Firmware Security Analysis & Extraction Tool
Binwalk is a fast and easy to use Python-based firmware security analysis tool that allows for firmware analysis, reverse engineering & extracting of firmware.
zBang - Privileged Account Threat Detection Tool zBang – Privileged Account Threat Detection Tool
zBang is a risk assessment tool for Privileged Account Threat Detection on a scanned network, organizations & red teams can use it to identify attack vectors


3 Responses to Suricata – Open Source Next Generation Intrusion Detection and Prevention Engine

  1. Jim Barnes May 13, 2010 at 5:08 pm #

    I hope that companies will take a serious look at the tools the open source community is creating. My friends in the security world are still surprised at how little the executives know or care to know about the vulnerabilities their systems have. Thanks again for making me aware of another tool. Keep your information coming!

  2. DaFyre May 13, 2010 at 7:54 pm #

    I second that, Jim!

    I have actually tested Suricata a while back. Even in the early stages, it is an impressive product and quite useful! I haven’t switched completely over to their engine, but I’m definitely leaning that way! I currently use Snort as my IPS. I haven’t tested Suricata in a while, so I’m looking forward to trying the next rendition of it!

    See Yas!

  3. NNM May 14, 2010 at 12:28 pm #

    Yea, finally. Personally going to wait a few versions and reviews.

    But to: “surprised at how little the executives know or care to know about the vulnerabilities their systems have.”

    I’m shocked daily by this. They think “hacking” is marginal. They don’t think it’s a threat. They don’t know that it is.

    I see brand new servers get massively attacked within 5 minutes of being online. Automated attacks, but still shows you how widespread this is… It doesn’t always take 1 hacker and 1 specific target. The targets first have to be revealed… But if you are reading this, you know all that already..

    A lot of people will tell you “I don’t need an antivirus or firewall, I only surf pages I know.” ………… Wow – It’s a good decade to be a hacker.