Intrusion Detection Systems mailing list archives
cybercop sting
From: kukulkan () netsecure fsksm utm my (Isman)
Date: Thu, 7 Oct 1999 12:37:22 +0000 (GMT)
hi, i am just a curious student about cybercop sting. I 've read that cybercop sting could emulate the existence of router/switch/hubs and etc in the network. but can it also emulates the bugs/vulnerabilities like dtk? if it do, how does it emulate those router/switch/hubs? Any IP aliasing and virtual services stuph can be applied here? maybe the creator of sentinel-1(old name for cybercop sting) can give an explanation. regards, Isman
Current thread:
- cybercop sting Isman (Oct 07)
- Assessment tools/Scanners bgmiller (Oct 07)
- Re: Assessment tools/Scanners Greg Shipley (Oct 08)
- Re: Assessment tools/Scanners Ryan M. Ferris (Oct 08)
- Re: Assessment tools/Scanners Ron Gula (Oct 09)
- Re: Assessment tools/Scanners Dug Song (Oct 10)
- Re: Assessment tools/Scanners Dug Song (Oct 09)
- Re: Assessment tools/Scanners Greg Shipley (Oct 08)
- RE: Assessment tools/Scanners Brian Laing (Oct 09)
- Assessment tools/Scanners bgmiller (Oct 07)
- CIGNA Co-op Janack, Matthew B CPC11 (Oct 08)
- Re: Assessment tools/Scanners Carric Dooley (Oct 08)
- <Possible follow-ups>
- RE: cybercop sting Staggs, Michael (Oct 08)
