Penetration Testing mailing list archives

Re: IPS Testing


From: feel2chat <feel2chat () gmail com>
Date: Tue, 8 Jan 2008 03:23:54 +0000

yeah but if you spoofed your IP, how would you get the result? How the
packets will find there way back to the pen tester.

On Jan 3, 2008 11:06 PM, Joshua Gimer <jgimer () gmail com> wrote:
NetSED - http://www.mirrors.wiretapped.net/security/packet-construction/netsed/netsed-README.txt

You can then run your scan against the remote network and have it
change the source address on the fly.

Josh G.


On Jan 3, 2008, at 1:56 AM, pentestr wrote:

Hi,

I am doing a PT for a customer and found that after running nessus
against the target our IP is getting blocked permanently. I want to
show this issue to the customer.
1. Is there any specific tool that can generate nessus traffic by
spoofing IPs?
2. Is there any tool that can change IP on the fly? While running
nessus that should change source IP?

The server have only port 80 Open.

Thank you.
Regards.
PenTestr.

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


Current thread: