From: Jerry Shenk (jshenk@decommunications.com)
Date: Fri Apr 23 2004 - 19:40:35 EDT
If you use SHADOW, you can easily modify it to grab the full snaplen of
the packets. To do this, modify the tcpdump command in the std.ph (or
whatever the site is named) file in the sensor directory. Here's a
modification I made for special purpose sensor I installed a few months
ago to deal with a specific problem user.
$LOGPROG = "/usr/sbin/tcpdump -s 4000";
BTW, some tcpdumps with use -s 0 to specify to grab the entire payload
of the packet but that doesn't work for all of them - just wanted to
head off any flames in advance....but this isn't a terribly flamey
group;)
-----Original Message-----
From: Dan Goldberg [mailto:dan@madjic.net]
Sent: Friday, April 23, 2004 2:12 PM
To: Paul Johnston; pen-test@securityfocus.com
Subject: Re: Questions: nmap, nessus unreliability, setting up a packet
capture box, using Impacket
> 1) How reliable have people here found nmap and nessus to be?
> Anything that can be done about this?
Paul,
I have had very good luck with Nmap. It helps to know something
about the path to the host(s) your are interested in. You will get
different results and responses depending on whether there are
firewalls or packet filters between the scanner and target. (Sorry I
know this is obvious).
In addition I always capture a packet trace of any scan I
perform
create an audit trail of the scan and see anything that Nmap fails to
report on as I would expect.
I also tend to break large scans in to smaller chunks. Rather
than
scanning -p 1-65535 on a host I will script out a few chunks at a
time usually getting well known or expected ports first. This is
mostly to keep from bogging down the scanner (especially if the
scanner is a windows box).
> 2) I'm looking at setting up a box to capture all traffic on our
> scanning network. Does anyone have thoughts on doing this, based on
> their operational experiences?
I would think that a system like Shadow
http://www.nswc.navy.mil/ISSEC/CID/ would help here or else Snort in
Logging mode.
I have used Shadow to capture large amounts of traffic on a 24
hour
basis and the front end is excellent for reviewing headers. It does
collect IIRC the 1st 68 bytes though not entire packets.
> 3) Using Core Impact's Impacket library,
I have never used this.
Hope this helps.
-- dan@madjic.net -- ------------------------------------------------------------------------ ------ Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------ ------- ------------------------------------------------------------------------------ Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html -------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:52 EDT