Snort mailing list archives
RE: Testing Snort?
From: Richard Bejtlich <taosecurity () gmail com>
Date: Mon, 7 Jun 2004 22:09:30 -0400
Hello, Can anyone recommend some tools for generating traffic that *should*
trigger some snort alerts, so that I can make sure Snort is correctly catching all the different types of alerts that it has rules for?
Jeff Schmidt
-- Hello, If you have appropriately vulnerable test targets, I suggest using the Metasploit framework (www.metasploit.org). They offer almost two dozen well-tested exploits and a variety of backdoors, all called within Perl.[0] I wrote about Metasploit in my Blog in April.[1] To see reliable exploits in action in a controlled environment, you can't beat it. Good luck, Richard http://www.taosecurity.com [0] http://www.metasploit.org/projects/Framework/exploits.html [1] http://taosecurity.blogspot.com/2004_04_01_taosecurity_archive.html#108177337354493939 ------------------------------------------------------- This SF.Net email is sponsored by: GNOME Foundation Hackers Unite! GUADEC: The world's #1 Open Source Desktop Event. GNOME Users and Developers European Conference, 28-30th June in Norway http://2004/guadec.org _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- Testing Snort? Jeff Schmidt (CACL Tech Asst) (Jun 07)
- RE: Testing Snort? Jeff Dell (Jun 07)
- Re: Testing Snort? mbusigin (Jun 07)
- Re: Testing Snort? Michael Sconzo (Jun 07)
- Re: Testing Snort? sgt_b (Jun 07)
- <Possible follow-ups>
- RE: Testing Snort? Richard Bejtlich (Jun 07)