04-05-2006 12:39 AM - edited 03-10-2019 01:57 AM
Is it possible to simulate an attck or an intrusion , which will trigger any particular signature id in an IDS model 4250. ( on a host which IDS is sensing ). This will enable us to actually check or see an intrusion on real time dashboard on IdS event viewer. Are there any scripts or utilities available which will cause triggering of IDS ignatures. ( with particular id ).
Thanks in advance
04-05-2006 05:38 AM
Why not simply enable signature IDs 2000 and 2004 (ICMP echo and echo request, respectively) and send an ICMP ping to a host on a segment being monitored by the IDS sensor? This is a quick and easy way to ensure that you sensor is setup properly and you can view the event to prove that the 'attack' was detected. Afterwards, you can change the signatures to whatever action you want.
05-02-2006 01:52 AM
"send an ICMP ping to a host on a segment being monitored by the IDS sensor"
if you send a ping to the interface these things also should be detected ?
in addition : can you issue a "packet display GigabitEthernet0/1"
05-03-2006 12:19 AM
hmmm fwiw
ping the interface isnt detected by the IPS
is this a feature or a flaw ?
05-03-2006 03:19 AM
Pinging the command and control interface of the IDS will not be detected as the c&c interface isn't the sniffing interface. Pinging a host on a network segment monitored by the IDS/IPS will fire 2000, 2004 as long as the signatures are enabled.
04-05-2006 08:52 AM
Try nmap security scanner
http://www.insecure.org/nmap/index.html
You can perform port scanning, ICMP flooding, SYN/ACK attack...
Hope that helps rate if it does
04-06-2006 03:24 AM
04-21-2006 10:26 AM
In addition to the excellent suggestions already given:
A) netcat (you may have to search around for it). This tool lets you set up a listening socket on any port, or a connecting socket. You can pipe whatever you want through it, including strings to test signatures that look for them.
B) hping (right now only works on Unix due to Windows restrictions on raw sockets access, but a "fixed" version will be released within a few days). This is a great command line tool to generate any packet you desire, with full control over all headers and the ability to pipe a file through as content.
--Have fun
04-21-2006 12:08 PM
If you like hping, check out nemesis
http://www.packetfactory.net/projects/nemesis/
or better yet, scapy...
05-01-2006 01:06 PM
If you're using Windows, go check out Nemesis on http://packetstuff.com they have a windows port that runs directly from a flash drive. Nemesis will allow you to create any packet with any content you like.
05-03-2006 03:37 PM
Hi everybody:
There are good suggestions in this post, but I want to add one more comment.
What you are looking for is named a "proof of concept".
It is difficult to test every signature, because you need specials tools and often it is very difficult to find (if exist).
Nessus (mentioned early in this post) is an vulnerability assesment tool and have several kinds of attacks (I suggest you try with knoppix -std because it is already instaled, but you need minimum knowledge about linux).
Another suggestion for specifics vulnerability, visit http://www.securityfocus.com/bid.
If the vulnerability has a proof of concept, you can find it in this web for sure!.
Another problem is that exist the sign for prevent this thread :-P
Hope this help.
Alberto Giorgi from spain (new kid in this block)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide