From: Cure, Samuel J (scure@kpmg.com)
Date: Tue Aug 31 2004 - 16:03:39 EDT
It would be interesting to see some testing performed against IDS/IPS
systems using Metasploit's 2.2 x86 FNSTENV XOR Byte Decoder to attempt
bypassing.
http://www.metasploit.org/sc/x86_fnstenv_xor_byte.asm
-scure
-----Original Message-----
From: Stong, Ian C. (Contractor) [mailto:StongI@ncr.disa.mil]
Sent: Tuesday, August 31, 2004 8:57 AM
To: 'John Madden'; pen-test@securityfocus.com
Subject: RE: Test scripts for NIDS
Any number of toolsets should work. You could look at things like
initiating scans from NMAP, satan and vulnerability scanners. Throughput
could be tested with a smartbits, ixia and other traffic generators.
-----Original Message-----
From: John Madden [mailto:chiwawa999@yahoo.com]
Sent: Monday, August 30, 2004 3:00 PM
To: pen-test@securityfocus.com
Subject: Test scripts for NIDS
Hi all,
I'm looking for tools that can test the effectiveness
of an NIDS like:
- How much load can it take before dropping packets ?
- What attacks can it detect or not detect
etc...
Any suggestions would be appreciated.
Thanks
__________________________________
Do you Yahoo!?
New and Improved Yahoo! Mail - 100MB free storage!
http://promotions.yahoo.com/new_mail
----------------------------------------------------------------------------
-- Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ---------------------------------------------------------------------------- --- ---------------------------------------------------------------------------- -- Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ---------------------------------------------------------------------------- --- ***************************************************************************** The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in this email are subject to the terms and conditions expressed in the governing KPMG client engagement letter. ***************************************************************************** ------------------------------------------------------------------------------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html -------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:02 EDT