dave at ...285...
Thu Feb 22 06:20:19 EST 2001
-----BEGIN PGP SIGNED MESSAGE-----
> This my sound some what elementary, however I need to have this done. My
> supervisor is insisting that there is a way, or procedure on the Snort site
> to teach me to create my packets to be able to sniff with. Is there such a
> procedure on the site? Or am I just not at that level of expertise. Please
> help if you can.
I assume you mean is there a way to generate attack based packets to see if snort really works.
Solution: Setup a test network with some different operating systems running lots of nice vulnerable services and launch magical dot-slash programs at them using snort to paint pretty pictures for you.
Alternatively if you want to generate your own packets try nemesis (www.packetninja.net)
I would assume this question would be best suited for the snort-user's list, wider audience.
Dave Ryan Default Security
http://www.default.org.uk/~dave dave at ...285...
GnuPG Key: http://www.default.org.uk/~dave/gpgkey.asc
Fingerprint: F418 C882 FF03 82A0 A99A 2720 669C E8C3 44B8 2A0F
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (OpenBSD)
Comment: For info see http://www.gnupg.org
-----END PGP SIGNATURE-----
More information about the Snort-devel