Step 1

Find the appropriate package for your operating system and install.

wget https://www.snort.org/downloads/snort/daq-2.0.6.tar.gz
                      
wget https://www.snort.org/downloads/snort/snort-2.9.11.1.tar.gz
tar xvzf daq-2.0.6.tar.gz
                      
cd daq-2.0.6
./configure && make && sudo make install
tar xvzf snort-2.9.11.1.tar.gz
                      
cd snort-2.9.11.1
./configure --enable-sourcefire && make && sudo make install
yum install https://www.snort.org/downloads/snort/daq-2.0.6-1.f21.x86_64.rpm
                      
yum install https://www.snort.org/downloads/snort/snort-2.9.11.1-1.f25.x86_64.rpm
yum install https://www.snort.org/downloads/snort/daq-2.0.6-1.centos7.x86_64.rpm
                      
yum install https://www.snort.org/downloads/snort/snort-2.9.11.1-1.centos7.x86_64.rpm
pkg install snort
execute: Snort_2_9_11_1_Installer.exe
Step 2
Sign up/Subscribe

Sign up and get your Oinkcode. We recommend that everyone subscribe to get the latest detections. For those unable to subscribe, creating an account on Snort.org will still give you access to the registered user rule packages.

Step 3

Stay current with the latest updates using PulledPork

wget https://www.snort.org/downloads/community/community-rules.tar.gz -O community-rules.tar.gz
tar -xvzf community.tar.gz -C /etc/snort/rules
Download the rule package that corresponds to your Snort version, for more information on how to retreive your oinkcode.
wget https://www.snort.org/rules/snortrules-snapshot-3000.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3000.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-2990.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-2990.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-2983.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-2983.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-29111.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29111.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-29110.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29110.tar.gz
tar -xvzf snortrules-snapshot-<version>.tar.gz -C /etc/snort/rules
Downloads
snortrules-snapshot-3000.tar.gz
snortrules-snapshot-2990.tar.gz
snortrules-snapshot-2983.tar.gz
opensource.gz
snortrules-snapshot-29111.tar.gz
snortrules-snapshot-29110.tar.gz
Download the rule package that corresponds to your Snort version, for more information on how to retreive your oinkcode.
wget https://www.snort.org/rules/snortrules-snapshot-29110.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29110.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-3000.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3000.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-2990.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-2990.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-29111.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29111.tar.gz
wget https://www.snort.org/rules/snortrules-snapshot-2983.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-2983.tar.gz
tar -xvzf snortrules-snapshot-<version>.tar.gz -C /etc/snort/rules
Downloads
snortrules-snapshot-29110.tar.gz
snortrules-snapshot-3000.tar.gz
snortrules-snapshot-2990.tar.gz
snortrules-snapshot-29111.tar.gz
snortrules-snapshot-2983.tar.gz
opensource.gz
Step 4
Read Docs

For more details please reference our install guides on the documents page.

What is Snort?
It is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.
What is Snort?
It is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on the name below.
Additional Resources
Official Documentation
Snort Team / Open Source Community
Webcast Slides
Submit a False Positive
Please sign in and click the false positives tab in your account dashboard
Rule Docs
1-46781
Attempted Administrator Privilege Gain
1-46753
This event is generated when an attacker attempts to exploit a command injection vulnerability in LG Network Storage devices.
1-46779
This event is generated when an unauthenticated attacker attempts to modify database settings in the Nagios XI web-app.
With over 5 million downloads and over 600,000 registered users, it is the most widely deployed intrusion prevention system in the world.
With over 5 million downloads and over 600,000 registered users, it is the most widely deployed intrusion prevention system in the world.