Step 1

Find the appropriate package for your operating system and install.

wget https://www.snort.org/downloads/snort/daq-2.0.6.tar.gz
                      
wget https://www.snort.org/downloads/snort/snort-2.9.12.tar.gz
tar xvzf daq-2.0.6.tar.gz
                      
cd daq-2.0.6
./configure && make && sudo make install
tar xvzf snort-2.9.12.tar.gz
                      
cd snort-2.9.12
./configure --enable-sourcefire && make && sudo make install
yum install https://www.snort.org/downloads/snort/daq-2.0.6-1.f21.x86_64.rpm
                      
yum install https://www.snort.org/downloads/snort/snort-2.9.12-1.f27.x86_64.rpm
yum install https://www.snort.org/downloads/snort/daq-2.0.6-1.centos7.x86_64.rpm
                      
yum install https://www.snort.org/downloads/snort/snort-2.9.12-1.centos7.x86_64.rpm
pkg install snort
execute: Snort_2_9_12_Installer.exe
Step 2
Sign up/Subscribe

Sign up and get your Oinkcode. We recommend that everyone subscribe to get the latest detections. For those unable to subscribe, creating an account on Snort.org will still give you access to the registered user rule packages.

Step 3

Stay current with the latest updates using PulledPork

wget https://www.snort.org/downloads/community/community-rules.tar.gz -O community-rules.tar.gz
tar -xvzf community.tar.gz -C /etc/snort/rules
Download the rule package that corresponds to your Snort version, for more information on how to retreive your oinkcode.
wget https://www.snort.org/rules/snortrules-snapshot-29120.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29120.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-29111.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29111.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-3000.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3000.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-2983.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-2983.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-2990.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-2990.tar.gz
tar -xvzf snortrules-snapshot-<version>.tar.gz -C /etc/snort/rules
Downloads
snortrules-snapshot-29120.tar.gz
snortrules-snapshot-29111.tar.gz
snortrules-snapshot-3000.tar.gz
snortrules-snapshot-2983.tar.gz
snortrules-snapshot-2990.tar.gz
opensource.gz
Download the rule package that corresponds to your Snort version, for more information on how to retreive your oinkcode.
wget https://www.snort.org/rules/snortrules-snapshot-2990.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-2990.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-29120.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29120.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-29111.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29111.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-3000.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3000.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-2983.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-2983.tar.gz
tar -xvzf snortrules-snapshot-<version>.tar.gz -C /etc/snort/rules
Downloads
snortrules-snapshot-2990.tar.gz
opensource.gz
snortrules-snapshot-29120.tar.gz
snortrules-snapshot-29111.tar.gz
snortrules-snapshot-3000.tar.gz
snortrules-snapshot-2983.tar.gz
Step 4
Read Docs

For more details please reference our install guides on the documents page.

What is Snort?
It is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.
What is Snort?
It is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on the name below.
Additional Resources
Official Documentation
Snort Team / Open Source Community
Webcast Slides
Submit a False Positive
Please sign in and click the false positives tab in your account dashboard
Rule Docs
1-49254
Microsoft Office 2007 SP3, Word 2007 SP3, Office 2010 SP1 and SP2, Word 2010 SP1 and SP2, Office for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP1 and SP2, and Word Web Apps 2010 Gold, SP1, and SP2 allow remote attackers to execute arbitrary code via crafted properties in a Word document, aka "Microsoft Word File Format Vulnerability."
1-49253
Microsoft Office 2007 SP3, Word 2007 SP3, Office 2010 SP1 and SP2, Word 2010 SP1 and SP2, Office for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP1 and SP2, and Word Web Apps 2010 Gold, SP1, and SP2 allow remote attackers to execute arbitrary code via crafted properties in a Word document, aka "Microsoft Word File Format Vulnerability."
1-49249
This event is generated when a remote attacker attempts to access a restricted WordPress page through brute-force. The user agent is known to be associated with this type of attack.
With over 5 million downloads and over 600,000 registered users, it is the most widely deployed intrusion prevention system in the world.
With over 5 million downloads and over 600,000 registered users, it is the most widely deployed intrusion prevention system in the world.