Snort mailing list archives
Re: Promiscuous interface hacks?
From: Carl <lists () carldunham com>
Date: Thu, 1 May 2003 21:16:12 -0400
Even better, fire up an old version of Snort and crack it yourself: http://www.packetstormsecurity.nl/filedesc/p7snort191.sh.html (disclaimer: I haven't actually tried this yet...) On Thursday May 1 2003 18:57, snort-users-request () lists sourceforge net wrote:
Think about it for a while.. here's a hint.. that code can always create a brand new socket and connect to a custom-made server on your machine... think of it as inverse telnet where the console is on the server side and the shell is on the client side of the tcp connection.
------------------------------------------------------- This sf.net email is sponsored by:ThinkGeek Welcome to geek heaven. http://thinkgeek.com/sf _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- RE: Promiscuous interface hacks? Slighter, Tim (May 01)
- snort decoder /dev/null (May 01)
- <Possible follow-ups>
- Re: Promiscuous interface hacks? Carl (May 02)