lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1ca1c14105032120453b658cc4@mail.gmail.com>
From: synfinatic at gmail.com (ADT)
Subject: Does anyone know about TCP-Replay attacks?

Hey Vladamir,

You're being a bit vague regarding your question.  When people talk
about "tcp replay" attacks and testing an IDS they're usually asking
about one of two things:

1) how to use tcpreplay to test an IDS's detection abilities

or

2) About breaking the tcp stream by injecting old/out of order/broken
packets to try to evade an IDS

Perhaps you could give some context and better explain what you're
trying to do?  Btw, if you want to learn about how to use tcpreplay,
there is extensive documentation on the tcpreplay website.

-ADT

-- 
http://synfin.net/

On Mon, 21 Mar 2005 23:04:48 -0500, Vladamir
<wireless.insecurity@...il.com> wrote:
> I was looking at that, but thanks!
> 
> Byron Copeland wrote:
> > Perhaps this may help?
> >
> > http://tcpreplay.sourceforge.net/
> >
> > On Mon, 2005-03-21 at 22:54, Vladamir wrote:
> >
> >>I'm looking for general information as to how to test an IDS using
> >>TCP-replays.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ