Penetration Testing mailing list archives

Re: Tool for testing anti-spoofing filter on RAS


From: "Don Parker" <dparker () rigelksecurity com>
Date: Thu, 15 Jan 2004 21:46:22 -0500 (EST)

Hello there, surf to the below noted url for nemesis. This linux utility has now been 
ported to win32. 
http://www.engagesecurity.com/dev/

Cheers

-------------------------------------------
Don Parker, GCIA
Intrusion Detection Specialist
Rigel Kent Security & Advisory Services Inc
www.rigelksecurity.com
ph :613.249.8340
fax:613.249.8319
--------------------------------------------

On Jan 15, "James Schnack" <acrux14 () hotmail com> wrote:

Hi everybody,

Quick question: could anybody point me to a tool (I guess it would be some 
kind of packet forger) that will run on Windows and allow me to send spoofed 
(i.e. modified source IP address) packets over a dial-up connection ?

I am in charge of securing a customer's corporate RAS (Lucent MAX6000), and 
among other various things, I want to set up the anti-spoofing data filters 
described in one of the manuals ("Security Supplement"). So I'm looking for 
a way to test the effectivenes of the filters, and then include the test in 
my report.

I have played around with hping in the past, but in this case I need 
something to run on Windows. I've looked into Packet Excalibur (doesn't work 
over dial-up connections) and MEPForge (no spoofing option), with no luck.

I thought it would be something relatively easy to find on my own, but I'm 
having trouble finding it, so I decided to ask.

Thanks and regards,

James

_________________________________________________________________
There are now three new levels of MSN Hotmail Extra Storage!  Learn more. 
<a href='http://join.msn.com/?pgmarket=en-us&page=hotmail/es2&ST=1&apos;>http://join.msn.com/?
pgmarket=en-us&page=hotmail/es2&ST=1</a>


---------------------------------------------------------------------------
----------------------------------------------------------------------------



---------------------------------------------------------------------------
----------------------------------------------------------------------------


Current thread: