Return-Path: <sentto-279987-3695-1004533751-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 31 Oct 2001 05:10:08 -0800 (PST) Received: (qmail 26146 invoked by uid 510); 31 Oct 2001 13:08:25 -0000 Received: from n25.groups.yahoo.com (216.115.96.75) by 204.181.12.215 with SMTP; 31 Oct 2001 13:08:25 -0000 X-eGroups-Return: sentto-279987-3695-1004533751-fc=all.net@returns.onelist.com Received: from [10.1.1.223] by n25.groups.yahoo.com with NNFMP; 31 Oct 2001 13:09:01 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 31 Oct 2001 13:09:10 -0000 Received: (qmail 67252 invoked from network); 31 Oct 2001 13:09:09 -0000 Received: from unknown (10.1.10.26) by 10.1.1.223 with QMQP; 31 Oct 2001 13:09:09 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1 with SMTP; 31 Oct 2001 13:09:09 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9VD9IP11264 for iwar@onelist.com; Wed, 31 Oct 2001 05:09:18 -0800 Message-Id: <200110311309.f9VD9IP11264@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 31 Oct 2001 05:09:17 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Hacker.intrusion.collusion.creates.'perfect.IDS'] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Hacker intrusion collusion creates 'perfect IDS' By James Middleton, vnunet.com, 10/30/2001 <a href="http://www.vnunet.com/News/1126543">http://www.vnunet.com/News/1126543> Three months after the infamous Def Con hacker fest back in July, a group of geeks have published data which they claim may prove to be the ultimate Intrusion Detection System (IDS) test bed. Each year the Def Con meeting in Las Vegas hosts a 'Capture the Flag' contest. In this event some of the best hackers from around the world duke it out over a specially constructed network for 72 hours, hacking for the title. To 'capture the flag' a hacker must get root access on a well-secured central server. But geek organisation the Shmoo Group diligently sniffed and logged every packet sent over the network for posterity, effectively recording in blow-by-blow detail how the best hackers on the underground get into secure networks. This week after "numerous technical difficulties" the Shmoo Group has made the aptly named 'Capture the Capture the Flag' data publicly available for free. "Since Def Con brings the best and brightest in the security community together, and Capture the Flag is the cutting edge of the underground, we figured there is great value in saving the packets for posterity," the group said. But Shmoo explained that the idea wasn't to help security companies sell more IDS based on these signatures. "The end result is not better IDS and such," it said. "The end result should be a wakeup call for application developers to write more secure apps that don't need IDS in front of them." So now is your chance to download "by far the most interesting, exploit ridden, 5.8Gb of intrusion collusion ever published. Free for the bandwidth endowed, this is the ultimate IDS test bed." ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST