RE: Snort vs Hunt v1.5From: Clint Byrum (email@example.com)
- Previous message: Brian Laing: "RE: IDS Informer"
- In reply to: Kevin Saenz: "RE: Snort vs Hunt v1.5"
- Next in thread: shannong: "RE: Snort vs Hunt v1.5"
- Next in thread: Brian Laing: "RE: IDS Informer"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: Clint Byrum <firstname.lastname@example.org> To: email@example.com Date: 08 Oct 2002 22:59:58 -0700
On Mon, 2002-10-07 at 18:24, Kevin Saenz wrote:
> Snort is designed to analyse the network traffic and alert you as to any attempted breach of security.
> Hunt and Snort are as different as chalk and cheese
Uh... I don't think thats what Rick was saying.
He was saying.. if somebody is throwing cheese around his network, how
does he outline them in chalk...
Or something like that.
Anyways... snort has an arp plugin, but I haven't found it necessary, as
arpwatch is perfect for this duty. Check it out. I run it on all of my
> -----Original Message-----
> From: Rick Zhong [mailto:firstname.lastname@example.org]
> Sent: Monday, October 07, 2002 8:52 PM
> To: email@example.com
> Subject: Snort vs Hunt v1.5
> Does snort able to detect ip/ARP hijacking implemented by using Hunt v1.5 ?
> I have this setup:
> Host A: Linux 7.3
> IP 184.108.40.206 (with telnet server and snort installed)
> Host B: Linux 7.3
> IP 220.127.116.11 (client to the host A)
> IP 18.104.22.168 (with snot installed)
> It seems the intruder is able to catch all the telnet connection between
> host A and host B, however the snort on host A is not able to detect the
> intrusion. I am using the default snort rules in the snort package. So is
> there any available rules or signature which can be used to detect this type
> of intrusion.