<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPS Test Files in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-test-files/m-p/462688#M95235</link>
    <description>&lt;P&gt;Are there any files available for download to test IPS functionality?  e.g.  a spyware test file, trojan test, vulnerability etc&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 09:43:05 GMT</pubDate>
    <dc:creator>rmaerz</dc:creator>
    <dc:date>2019-03-10T09:43:05Z</dc:date>
    <item>
      <title>IPS Test Files</title>
      <link>https://community.cisco.com/t5/network-security/ips-test-files/m-p/462688#M95235</link>
      <description>&lt;P&gt;Are there any files available for download to test IPS functionality?  e.g.  a spyware test file, trojan test, vulnerability etc&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:43:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-test-files/m-p/462688#M95235</guid>
      <dc:creator>rmaerz</dc:creator>
      <dc:date>2019-03-10T09:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Test Files</title>
      <link>https://community.cisco.com/t5/network-security/ips-test-files/m-p/462689#M95236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could use one of the following tools to generate traffic that the IPS could react too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Open Source examples of VA tools include Nessus or Nmap. Also, Stick and Snot come to mind, as they were developed specifically to test security devices. If you like to craft packets, you could use Hping. If you want to get really fancy, you could use the Metasploit Framework...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you prefer a commercial solution, there is the standard gamut of VA tools, or you could use something like IDS Informer or TrafficIQ. If you want to use a framework, CORE Impact will do the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any one of the above suggestions will generate traffic that an IPS will react to. Your choice will be driven by the volume and complexity of the testing you want to perform.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps,&lt;/P&gt;&lt;P&gt;Alex Arndt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2005 14:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-test-files/m-p/462689#M95236</guid>
      <dc:creator>a.arndt</dc:creator>
      <dc:date>2005-11-15T14:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Test Files</title>
      <link>https://community.cisco.com/t5/network-security/ips-test-files/m-p/462690#M95237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could always enable the signature for ICMP Echo (or Echo Reply) and run a few pings and check the IP addresses to see if it was you in the Alerts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2005 23:38:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-test-files/m-p/462690#M95237</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2005-11-15T23:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Test Files</title>
      <link>https://community.cisco.com/t5/network-security/ips-test-files/m-p/462691#M95238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;True, but now you've customized the sensor's configuration without necessarily proving that it was properly configured to begin with.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the author of the original question has the intention of testing the configuration of the IPS, or more specifically observing what it does to traffic flow when it blocks, a few pings won't really accomplish it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I am trying to say is this - there's a big difference between testing to see that the IPS reacts and validation testing to see that the IPS reacts [i]correctly[/i].&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's why I provided a list of options, all with different purposes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex Arndt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Nov 2005 13:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-test-files/m-p/462691#M95238</guid>
      <dc:creator>a.arndt</dc:creator>
      <dc:date>2005-11-16T13:25:14Z</dc:date>
    </item>
  </channel>
</rss>

