IDS mailing list archives
sidestep
From: Jill Tovey <jill.tovey () bigbluedoor com>
Date: 25 Apr 2003 08:06:29 +0100
Hi All, I have a snort box and I am testing it using a tool called sidestep. For those that don't know, the tool works by allowing you to chose which type of attack you want, for example RPC, DNS, FTP etc and then run it with a switch such as -evade, which will perform the attack on the box and attempt to "evade" the IDS. The URL is http://www.robertgraham.com/tmp/sidestep.html Now I have run the tool with all of the possible attacks and it has worked fine, but it doesn't always manage to evade snort. So I am writing up the results of this for a project I am doing at Uni however, when it comes explaining how this tool tries to evade the IDS, I can't because, I don't know, and there seems to be no documentation to explain how it is working, and I can't look at the source code. So I wondered if anyone here knew how it worked, or had some info on how it worked. I have managed to find one article on sans detailing how it works for the RPC attack, which is very helpful, (http://www.sans.org/resources/idfaq/rpc_evas.php ) but nothing to explain what it does for the other attacks. Any info would be much appreciated. ------------------------------------------------------------------------------ INTRUSION PREVENTION: READY FOR PRIME TIME? IntruShield now offers unprecedented Intrusion IntelligenceTM capabilities - including intrusion identification, relevancy, direction, impact and analysis - enabling a path to prevention. Download the latest white paper "Intrusion Prevention: Myths, Challenges, and Requirements" at: http://www.securityfocus.com/IntruVert-focus-ids
Current thread:
- sidestep Jill Tovey (Apr 26)
