We are students.
As part of our exam, we installed Suricata on a Vagrant server and attempted some attacks. However, they do not appear in the logs, even though we successfully pinged the server from the attacking machine.
We would like to know if this could be due to network configuration issues.
Suricata version: 7.0.8
Linux Debian 24
Suricata installed from packages.
How did you configure Suricata and the network traffic forwarding?
Ideally also post your suricata.yaml, suricata.log, stats.log and the run command that you use.
Also, do you see the attack if you run tcpdump on the capture interface?
The ip address of Suricata, mentioned in the suricata.yaml (homenet) is the one belonging to the Vagrant server it is installed in. The attack is sent from another machine, that has another ip address.
Yes, we do see the attack when we run tcpdump on the capture interface.
It seems like we cannot upload attachments since we are new users. Is there any way we could send it? Or should we copy paste some parts of those files?
flow.mgr.flows_notimeout | Total | 173
flow.mgr.flows_timeout | Total | 68
flow.mgr.flows_evicted | Total | 68
flow.mgr.flows_evicted_needs_work | Total | 10
memcap_pressure | Total | 5
memcap_pressure_max | Total | 5
flow.recycler.recycled | Total | 58
flow.recycler.queue_max | Total | 1
tcp.memuse | Total | 2490368
tcp.reassembly_memuse | Total | 573440
flow.memuse | Total | 7154304