# 1. Intrusion Detection using various tools

## 1. Detect Intrusion using snort

{% embed url="<https://www.snort.org/>" %}

## <mark style="color:red;">2. Detect Malicious traffic with Zone alarm free firewall</mark>

{% embed url="<https://www.zonealarm.com/software/free-firewall>" %}

## <mark style="color:red;">3. Detect Malicious traffic using HoneyBot</mark>

{% embed url="<https://honeybot.software.informer.com/>" %}

## 4. Deploy Cowrie Honeypot to Detect Malicious Network Traffic <a href="#task-2-deploy-cowrie-honeypot-to-detect-malicious-network-traffic" id="task-2-deploy-cowrie-honeypot-to-detect-malicious-network-traffic"></a>

Cowrie serves as an SSH and Telnet honeypot, capable of capturing brute-force attacks and the actions taken by attackers within the shell.

{% embed url="<https://github.com/cowrie/cowrie>" %}

{% embed url="<https://www.udemy.com/course/ethical-hacker-practical/?referralCode=289CF01CF51246BCAD6C>" %}
