Security Incidents mailing list archives

RE: Request for Raw Data


From: "Brad Bemis" <Brad.Bemis () airborne com>
Date: Tue, 10 Jun 2003 14:57:51 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

You can always try the "Scan of the Month" challenges offered up by the
HoneyNet Project.

http://project.honeynet.org/misc/chall.html


Thank you for your time and attention,

=========================================
Brad Bemis, CISSP, CISA, CBCP
Information Security Officer
Airborne Express

Desk:  (206) 830-3478
Page:  (206) 314-1705
brad.bemis () airborne com
=========================================
Email Notice: This communication may contain sensitive information. If you
are not the intended recipient, or believe that you have received this
communication in error; do not print, copy, retransmit, disseminate, or
otherwise use the information contained herein for any purpose. Please
alert the sender that you have received this message in error, and delete
the copy that you received.








- -----Original Message-----
From: Boulineau Danny C Contractor 33 IOS/DOOO
[mailto:DANNY.BOULINEAU () LACKLAND AF MIL]
Sent: Tuesday, June 10, 2003 2:13 PM
To: 'incidents () securityfocus com'; 'intrusions () incidents org'
Subject: Request for Raw Data


Are any of the members of this site aware of any other sites that maintain
raw [ethereal, 

tcpdump, libcap] data files of network traffic involving vulnerability
exploits or malicious 

logic?

I work with several network analysts and would like to have some "real"
data
to show these folks 

what the traffic looks like.

vr,
DCB


-----BEGIN PGP SIGNATURE-----
Version: PGP Freeware, Ver 6.5.8CKT - Build 8
Comment: KeyID: 0xB8F26ADD
Comment: Fingerprint: 6E1C D617 CD65 A203 7FD5  4C68 90E7 39F4 B8F2 6ADD

iQA/AwUBPuZUX5DnOfS48mrdEQK2QACgu2A54wAQCW9YIf7yl9vEQMJpyFUAoJ25
lGbQKym3Gew1w3DdvOSeDVTQ
=fHhm
-----END PGP SIGNATURE-----



----------------------------------------------------------------------------
----------------------------------------------------------------------------


Current thread: