Number of visitors:
Latest version: 2.4.3
 

SnortALog: IDS/IPS and Firewall Log Analyser
 

Information
What is SnortALog
Features
Log Compatibility
Changelog
Screen Shots
Reports
Requirements

Downloads
Download Section
Additional Files

Development
SnortALog Code

Support
Usage
Examples
Documentation

Logs
Snort
CheckPoint
Pix
NetScreen
Brick
NetFilter
IPFilter
PacketFilter
TippingPoint

Donate
Support SnortALog
My CV

Usage

 
You can redirect the log file to SnortALog as shown by the following shell command :
  • cat logs.file | ./snortalog.pl -r -n 50
Why I did I not ask for a specific file name ?

Just for one reason (but a smart one :-). For daily logs rotation, I'm using the file name format file_yyyymmdd.log (Year, Month and Day). So it's easy for me to generate daily, weekly, monthly and yearly report without any file renaming operations.

Else, you can use the "-file" option to specify a log alert :
  • ./snortalog.pl -file logs.file -r -n 50

The following options are available :
-xMode GUI
-rResolve IP adresses
-wConsult Whois DataBase (Slow down process)
-cResolve domains (Very slow process)
-iInverse the result
-dMode debug
-n Specify a number of line in the result
-l Specify an output language
-o Specify a HTML or PDF file
-g Graph output format
-file Specify an input alert log file
-rulesfile Specify name and directory to search rules file
-hwfile Specify name and directory to search hardware file
-domainsfile Specify name and directory to search domains file
-langfile Specify name and directory to search language file
-pictsdir Specify directory to search HTML pictures files
-genref Generate the reference rules file
-helpView this help
 
The following reports are available :
-srcTop IPs sources
-dstTop IPs destination
-src_attackTop IPs sources grouped by attack
-dst_attackTop IPs destination grouped by attack
-src_dst_attackTop alert grouped by IPs sources, Ips destination and attack
-attackTop attack
-classTop classification
-severityTop severity
-daily_eventTop number of attack grouped by day
-hourTop number of attack grouped by hour
-hour_attackTop specific attack grouped by hour
-dportTop destination port
-protoTop protocols
-dport_attackTop destination port grouped by attack
-nidsTop NIDS host
-interfacesTop interfaces events
-domain_srcTop of domain source
-portscanTop of portscan alert
-actionsTop of firewall action (DROP, REJECT, ACCEPT, etc ...)
-rulesTop of rule (only Fw-1)
-reasonsTop of reason (only Fw-1)
-src_dportTop IPs sources grouped by destination port
-dst_dportTop IPs destination grouped by destination port
-typelogNumber of occurrences by type of log
-hwlogNumber of occurrences by hardware related message log
-reportAll reports
 
The following input logs are available :
-1Fast Snort's output log
-2Syslog Snort's output log
-3Full Snort's ouput log
-4CheckPoint VPN-1's fwm logexport log
-5CheckPoint VPN-1's syslog log
-6Cisco Pix's log
-7IPFilter's log
-8NetFilter's log
-9Barnyard's syslog log
-10PacketFilter's log
-11Lucent Brick's export log
-12Barnyard's fast log
-13Juniper NetScreen's syslog event
-14CheckPoint VPN-1's fwm log -n
-15CheckPoint VPN-1's fw tab -t connections -f -m 25000
 
 
 
 
Snort Perl Linux

powered by Jérémy Chartier
© SnortALog 2000-2011