@TheChemistDIY

There's not enough Snort tutorials on YT, thanks for putting this out there.

 I would love to see a live demo of an attack taking place (real time) and the IDS/IPS vm capturing this as it goes down.

@joshuaspeshock4636

Amazing walkthrough from start to finish. Thank you for providing the documentation my man to follow along and ending the video with ideas to add onto this and expand but asking questions on what content we would like to see and the enthusiasm to create it. Hands down the cybersecurity community is very thankful to have you and as always thank you so much for what you do for the community and looking forward to more technical tool and scenario walkthroughs like these and more to come great work!

@briefingroyals

after a week of struggles and headaches, thank you for saving me and putting it in the most simplest way possible, easy to follow and you earned a sub, tyvm

@nihilistictanuki6947

Thank you very much for this video, it helped me really to start with snort 3, much more than all the other (official) documentations I found for it. Great job!

@olayinkaojo8828

Hi MyDFIR. This tutorial is a master class, especially for Snort 3! Simple, straight forward, and strong. Thanks

@lennartschneider1710

Thanks to your video I was able to finish my assignment on snort! 😭

@fredokaych

This is great. Could you be kind enough to prepare another video on Snort 3 IPS, especially using NFQUEUE?

@TheSilentLearner786

Sir , defenetly we need the splunk tutorial this is so special❤

@kdyxs2

Best instruction video on snort3. Thanks!

@chinyereucheagwu2128

Thanks for this amazing video! Please can we get the link to download the textfile of the commands you run. I kinda missed some parts.

@gmontenegro9711

Sweet this is great content!

@henry-c8o

im down for fowarding the logs into splunk / digest it into splunk super cool!

@olayinkaojo8828

Please can you provide a guide on setting rules to detect and prevent DDoS and Sql injection attacks, and storing the alert in CSV file? Thanks

@claudiotonelli7709

Compliment!!! Very good video!!

@zssz-ftc

Snort is great! I performed some brute-force attacks against Metasploitable 2 since it is vulnerable. It was interesting to see Snort (installed on an Ubuntu server) generate a detailed log file during the attack. What made me curious is that Snort didn’t seem to use RAM or CPU during the attack, according to HTOP. I thought it would use around 30–50% of the assigned RAM of the VM. Do you think this is correct, Steven?

@rockycool222

Can you please make a video to integrate snort v3 to splunk as well .... thank you

@rohithroyal8777

Hii MYDFIR
   I have been working in supporting project nearly 2 years.Now I want to shift my career into cybersecurity. Can you suggest which cybesecurity is best I mean cloud security analyst, or network analyst or Soc analyst.plz suggest me...

@sertac5262

Hello, first of all, thank you for the video; it was very helpful for me. I would like to take the output from Snort and save it in JSON format. Could you please guide me on how to do this? Thank you in advance.

@batista98854

Thanks from India.

@zssz-ftc

Another great video. Thanks. Snort is a good tool to use.

Is it possible to monitor 2 networks with snort at the same time?