[Snort-devel] help!!

Dave Ryan dave at ...285...
Thu Feb 22 06:20:19 EST 2001


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> This my sound some what elementary, however I need to have this done. My
> supervisor is insisting that there is a way, or procedure on the Snort site
> to teach me to create my packets to be able to sniff with. Is there such a
> procedure on the site? Or am I just not at that level of expertise. Please
> help if you can.

I assume you mean is there a way to generate attack based packets to see if snort really works.

Solution: Setup a test network with some different operating systems running lots of nice vulnerable services and launch magical dot-slash programs at them using snort to paint pretty pictures for you.

Alternatively if you want to generate your own packets try nemesis (www.packetninja.net)

I would assume this question would be best suited for the snort-user's list, wider audience.

Regards,
Dave.

- -- 
Dave Ryan 				Default Security
http://www.default.org.uk/~dave		dave at ...285...

GnuPG Key:      http://www.default.org.uk/~dave/gpgkey.asc
Fingerprint:    F418 C882 FF03 82A0 A99A  2720 669C E8C3 44B8 2A0F

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (OpenBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE6lPXxZpzow0S4Kg8RAk5sAJ9E4Zh39M8F/PMRo5DfccZhi0qqQwCeMUeI
YCKYueNujTOVBiExDtU1gEk=
=kth5
-----END PGP SIGNATURE-----




More information about the Snort-devel mailing list