It includes a suite of offensive and defensive tools, such as nmap , metasploit , and scapy , to test existing IDS configurations or new deployments.
The (or ISO) is a bootable distribution designed for network security monitoring (NSM) , intrusion detection, and log management. While modern versions (2.4+) focus on permanent installations for scalability, the Live environment remains a critical entry point for quick network evaluations and forensic testing. Core Purpose and Use Cases Security Onion Live Cd
Uses Suricata for signature-based detection and Zeek for rich protocol metadata. It includes a suite of offensive and defensive
You can boot the system and immediately start sniffing traffic on local interfaces (like eth0 ) using tools like Snort or Suricata . Core Purpose and Use Cases Uses Suricata for
Security Onion functions as a "Swiss Army knife" for defenders by bundling several best-of-breed open-source tools:
IntroductionWalkthrough · Security-Onion-Solutions ... - GitHub
Employs Stenographer or Suricata PCAP to act as a "DVR for your network," recording every packet for retrospective analysis.