Penetration Testing mailing list archives

RE: Need for Intrusion/Infection Data


From: "Honer, Lance" <lhoner () smartgrp com>
Date: Tue, 21 Apr 2009 13:42:54 -0400

https://www.openpacket.org/

Not sure if it has exactly what you're looking for but it's a good place
to start.

lance

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Baykal, Adnan (CSCIC)
Sent: Monday, April 20, 2009 4:11 PM
To: pen-test () securityfocus com
Subject: Need for Intrusion/Infection Data 

All,
 
First of all, I would like to thank everyone on this list for their
contributions. 
 
I am currently doing my PhD in computer science at University at Albany
and am in need of a intrusion/infection data. More specifically, I am
trying to find a dataset (prefereably pcap, however flow data is also
okay) in which there is a certain period of clean traffic (where there
is no infection) and certain period of infected traffic (traffic where
worm propagation exists).   I have a theory that I would like to test
and publish, and offcourse proper acknowledgement will be given in the
publication. 
 
Any ideas, pointers, downloadable files etc.. will be appreciated.
 
Thanks all in advance for your help.
--------------------------------------------------------

This message may contain confidential information and is intended only
for the individual(s) named.  If you are not an intended recipient you
are not authorized to disseminate, distribute or copy this e-mail.
Please notify the sender immediately if you have received this e-mail by
mistake and delete this e-mail from your system.


------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Tired of using other people's tools? Why not learn how to write your own
exploits? 
InfoSec Institute's Advanced Ethical Hacking class teaches you how to
write stack and heap buffer overflow exploits for Windows and Linux.
Gain your Certified Expert Penetration Tester (CEPT) cert as well. 

http://www.infosecinstitute.com/courses/advanced_ethical_hacking_trainin
g.html
------------------------------------------------------------------------


--------------------------------------------------------------------------
SMART Business Advisory and Consulting, LLC and SMART and Associates, LLP have an alternative practice structure. The 
two companies are separate and independent legal entities that work together to meet clients’ business needs. SMART 
Business Advisory and Consulting, LLC is not a licensed CPA firm.
 
This message may contain information that is privileged, confidential and exempt from disclosure under applicable law. 
If you are not the intended recipient (or authorized to act on behalf of the intended recipient) of this message, you 
may not disclose, forward, distribute, copy, or use this message or its contents. If you have received this 
communication in error, please notify us immediately by return e-mail and delete the original message from your e-mail 
system.
 

------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Tired of using other people's tools? Why not learn how to write your own exploits?
InfoSec Institute's Advanced Ethical Hacking class teaches you how to write stack and heap buffer overflow exploits for 
Windows and Linux. Gain your Certified Expert Penetration Tester (CEPT) cert as well.

http://www.infosecinstitute.com/courses/advanced_ethical_hacking_training.html
------------------------------------------------------------------------


Current thread: