Sniffing traffic on "Internal Network"
Posted: 12. Feb 2016, 02:33
Hi all,
I'm setting up a Security Lab to play with Snort IDS. I want to use the "Internal Network" so no traffic spills out. I plan on having a minimum of three VMs on this net, one to run Snort, one running Kali Linux and One to run Metasploitable (a deliberately vulnerable Linux distro) and I want the Snort VM to be able to view traffic between the other two. I have see notes about having the host monitor traffic from the guests, but only for traffic going thru the host. This would be as is I put a span port on the virtual switch of the Internal Network. All three can ping each other so basic layer 2 and 3 are in place. Is this even possible?
Attached is a simple png file with the layout of the lab.
Tom
I'm setting up a Security Lab to play with Snort IDS. I want to use the "Internal Network" so no traffic spills out. I plan on having a minimum of three VMs on this net, one to run Snort, one running Kali Linux and One to run Metasploitable (a deliberately vulnerable Linux distro) and I want the Snort VM to be able to view traffic between the other two. I have see notes about having the host monitor traffic from the guests, but only for traffic going thru the host. This would be as is I put a span port on the virtual switch of the Internal Network. All three can ping each other so basic layer 2 and 3 are in place. Is this even possible?
Attached is a simple png file with the layout of the lab.
Tom