Snort mailing list archives
Re: real attack + snort IDS
From: "Patrick S. Harper" <patrick () internetsecurityguru com>
Date: Sat, 10 Feb 2007 17:14:59 -0600
You can always set up a sandbox lab with vulnerable hosts and really exploit them. You can't much more real than that and be responsible at the same time. -----Original Message----- From: snort-users-bounces () lists sourceforge net [mailto:snort-users-bounces () lists sourceforge net] On Behalf Of Maged Shaker Sent: Saturday, February 10, 2007 11:03 AM To: snort-users () lists sourceforge net Subject: [Snort-users] real attack + snort IDS Dear all How to simulate negative false "real attack" for Snort IDS system and how can i detect it . -- Regards, Nsm-man ------------------------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier. Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- real attack + snort IDS Maged Shaker (Feb 10)
- Re: real attack + snort IDS Patrick S. Harper (Feb 10)