Skip to content

Snort → Splunk home-lab that detects Nmap portscans and visualizes alerts (top sources/ports, timeline, last 50). Includes SPL & helper scripts

Notifications You must be signed in to change notification settings

numanshaik-security/snort-splunk-portscan-demo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Full Lab ReportDashboard XMLKey SPL

Snort → Splunk Portscan Demo

This home-lab demonstrates how to detect Nmap SYN scans using Snort and visualize the alerts in Splunk.
The setup includes a small but functional Splunk dashboard with panels for top sources, top destination ports, timelines, and recent alerts.


🔍 What it shows

  • Real-time TCP Portscan Detected (SYN burst) alerts from Snort
  • Parsed fields for source IP, destination IP, protocol, ports, and priority
  • A simple, readable Splunk dashboard for triage

📂 Repository Structure

  • scripts/ – helper scripts to run Snort and add Splunk monitors
  • splunk/ – XML export of the Splunk dashboard
  • queries/ – SPL queries used by the panels
  • docs/screenshots/ – screenshots for README and LinkedIn

⚡ How to Run (Quick Start)

  1. Start Snort on a host-only NIC and log output:
    sudo ./scripts/run_snort_console.sh
    
    

Screenshots

Dashboard overview

Dashboard

Panels

Over time Top sources Top destination ports
Over time Top sources Top dst port

Last 50 alerts

Last 50

Live terminals

Snort running Tail console Splunk monitors

About

Snort → Splunk home-lab that detects Nmap portscans and visualizes alerts (top sources/ports, timeline, last 50). Includes SPL & helper scripts

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages