[645] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: New Subject (please)

daemon@ATHENA.MIT.EDU (Michel Lavondes)
Thu Feb 29 09:36:16 1996

To: ids@uow.edu.au
In-Reply-To: Your message of "Mon, 26 Feb 1996 09:12:50 +1100."
             <199602252212.JAA19776@wyrm.its.uow.edu.au>
Date: Mon, 26 Feb 1996 13:06:25 +0000
From: Michel Lavondes <lavondes@tidtest.total.fr>
Reply-To: ids@uow.edu.au


In message <199602252212.JAA19776@wyrm.its.uow.edu.au>, IDS Moderator writes:
> A number of responses were received in regards to testing/reviewing
> the cracker tools offered by Brad Powell. I decided it was better
> to summarize them into a single post.
>
> [answers deleted]

I'm afraid I missed the original request :-(. As someone answered,
none of these tools is probably new. However, even with the targeted
vulnerabilities patched, looking for some kind of signature in the
attempted exploit may help with ID.

Did anyone dig into that idea ? Any comments/opinions ?

Michel Lavondes (lavondes@tidtest.total.fr)
#include <disclaimer.h>
** CDA warning : don't read this if you're under 18 **
Don't whistle while you piss
                Hagbard Celine

PS to moderator : What happened to the posting in french you asked a
volunteer translator for ?

[ I sent it to a single person, instead of wasting others time. However
I recieved no reply, so I have sent it to someone else - waiting on a 
reply. Will send it to you if I dont receive a response soon.  RuF ]

home help back first fref pref prev next nref lref last post