<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic So, about what IDS you are in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848445#M85746</link>
    <description>&lt;P&gt;So, about what &lt;A href="http://www.ospfmon.com/docs/manual_ru.htm"&gt;IDS&lt;/A&gt; you are talking about?&amp;nbsp;&lt;STRONG&gt;Cisco MARS&lt;/STRONG&gt; or just &lt;STRONG&gt;&lt;A href="http://money.ospfmon.com/2012/12/ettercap-ng.html"&gt;Ettercap NG filters&lt;/A&gt;&lt;/STRONG&gt;?&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 29 May 2015 21:09:05 GMT</pubDate>
    <dc:creator>Miroslav Berkov</dc:creator>
    <dc:date>2015-05-29T21:09:05Z</dc:date>
    <item>
      <title>IPS testing with metasploit</title>
      <link>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848439#M85738</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;can anyone give a sample or a detailed example on how to test IPS with metasploit, no exploit is really working or triggering anything.&lt;/P&gt;&lt;P&gt;thanks  &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:47:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848439#M85738</guid>
      <dc:creator>josephium</dc:creator>
      <dc:date>2019-03-10T10:47:39Z</dc:date>
    </item>
    <item>
      <title>Re: IPS testing with metasploit</title>
      <link>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848440#M85741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would focus on creating an environment where metasploit actually works (i.e. you can exploit an unpatched box).  Then you can focus on IDS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Sep 2007 14:49:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848440#M85741</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-09-13T14:49:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPS testing with metasploit</title>
      <link>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848441#M85742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes, but can anyone give a sample or a detailed example on how IPS stops a working exploit with metasploit or any other software&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 05:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848441#M85742</guid>
      <dc:creator>josephium</dc:creator>
      <dc:date>2007-09-17T05:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPS testing with metasploit</title>
      <link>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848442#M85743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;easiest is to reverse engineer the signature details and craft packets based on the Sig RegEx for example. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, if a SIG is inspecting packets for "DNS" in traffic over 53/tcp, crafting a packet with this info will trigger the IPS...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 13:19:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848442#M85743</guid>
      <dc:creator>jdenis</dc:creator>
      <dc:date>2007-09-18T13:19:09Z</dc:date>
    </item>
    <item>
      <title>Re: IPS testing with metasploit</title>
      <link>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848443#M85744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have used metasploit to trigger alarms in promiscuous mode, but not inline.  It's pretty much the same though.  Get metasploit working.  go through the list of available metasploit exploits and choose one that is:&lt;/P&gt;&lt;P&gt;1) exploitable on the test machine&lt;/P&gt;&lt;P&gt;2) detected by Cisco IPS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Test the exploit without IPS.  One you have verified that it is working(during my test, I was creating a local user on a Windows box), test the exploit with IPS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 14:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848443#M85744</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-09-18T14:13:18Z</dc:date>
    </item>
    <item>
      <title>IPS testing with metasploit</title>
      <link>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848444#M85745</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'trebuchet ms', geneva;"&gt;Hi buddy, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'trebuchet ms', geneva;"&gt;what type of Cisco Systems &lt;A href="http://www.ospfmon.com/docs/Cisco_SaaS.aspx"&gt;Cisco Intrusion Prevention System&lt;/A&gt; (IPS) do you want to exploit?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2014 04:05:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848444#M85745</guid>
      <dc:creator>Miroslav Berkov</dc:creator>
      <dc:date>2014-10-29T04:05:09Z</dc:date>
    </item>
    <item>
      <title>So, about what IDS you are</title>
      <link>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848445#M85746</link>
      <description>&lt;P&gt;So, about what &lt;A href="http://www.ospfmon.com/docs/manual_ru.htm"&gt;IDS&lt;/A&gt; you are talking about?&amp;nbsp;&lt;STRONG&gt;Cisco MARS&lt;/STRONG&gt; or just &lt;STRONG&gt;&lt;A href="http://money.ospfmon.com/2012/12/ettercap-ng.html"&gt;Ettercap NG filters&lt;/A&gt;&lt;/STRONG&gt;?&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 May 2015 21:09:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-testing-with-metasploit/m-p/848445#M85746</guid>
      <dc:creator>Miroslav Berkov</dc:creator>
      <dc:date>2015-05-29T21:09:05Z</dc:date>
    </item>
  </channel>
</rss>

