[iwar] [fc:Hacker.intrusion.collusion.creates.'perfect.IDS']

From: Fred Cohen (fc@all.net)
Date: 2001-10-31 05:09:17


Return-Path: <sentto-279987-3695-1004533751-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 31 Oct 2001 05:10:08 -0800 (PST)
Received: (qmail 26146 invoked by uid 510); 31 Oct 2001 13:08:25 -0000
Received: from n25.groups.yahoo.com (216.115.96.75) by 204.181.12.215 with SMTP; 31 Oct 2001 13:08:25 -0000
X-eGroups-Return: sentto-279987-3695-1004533751-fc=all.net@returns.onelist.com
Received: from [10.1.1.223] by n25.groups.yahoo.com with NNFMP; 31 Oct 2001 13:09:01 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 31 Oct 2001 13:09:10 -0000
Received: (qmail 67252 invoked from network); 31 Oct 2001 13:09:09 -0000
Received: from unknown (10.1.10.26) by 10.1.1.223 with QMQP; 31 Oct 2001 13:09:09 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1 with SMTP; 31 Oct 2001 13:09:09 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9VD9IP11264 for iwar@onelist.com; Wed, 31 Oct 2001 05:09:18 -0800
Message-Id: <200110311309.f9VD9IP11264@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 31 Oct 2001 05:09:17 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Hacker.intrusion.collusion.creates.'perfect.IDS']
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Hacker intrusion collusion creates 'perfect IDS' 
By James Middleton, vnunet.com, 10/30/2001
<a href="http://www.vnunet.com/News/1126543">http://www.vnunet.com/News/1126543>

Three months after the infamous Def Con hacker fest back in July, a
group of geeks have published data which they claim may prove to be the
ultimate Intrusion Detection System (IDS) test bed.  Each year the Def
Con meeting in Las Vegas hosts a 'Capture the Flag' contest. In this
event some of the best hackers from around the world duke it out over a
specially constructed network for 72 hours, hacking for the title. To
'capture the flag' a hacker must get root access on a well-secured
central server.  But geek organisation the Shmoo Group diligently
sniffed and logged every packet sent over the network for posterity,
effectively recording in blow-by-blow detail how the best hackers on the
underground get into secure networks.  This week after "numerous
technical difficulties" the Shmoo Group has made the aptly named
'Capture the Capture the Flag' data publicly available for free.  "Since
Def Con brings the best and brightest in the security community
together, and Capture the Flag is the cutting edge of the underground,
we figured there is great value in saving the packets for posterity,"
the group said. But Shmoo explained that the idea wasn't to help
security companies sell more IDS based on these signatures. "The end
result is not better IDS and such," it said. "The end result should be a
wakeup call for application developers to write more secure apps that
don't need IDS in front of them." So now is your chance to download "by
far the most interesting, exploit ridden, 5.8Gb of intrusion collusion
ever published. Free for the bandwidth endowed, this is the ultimate IDS
test bed."

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST