Hi,
Try metasploit for the exploits stuff.you can check offensive
computing for the malware stuff.
-- 
---------------------------------------
write your info sec blog on http://secgeeks.com
register here:-
http://secgeeks.com/user/register
rss feeds :-
http://secgeeks.com/node/feed
---------------------------------------
On 25 Sep 2007 17:23:33 -0000, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> Hi,
>
>   I am trying out a new IPS solution and would like to get some samples of 
> older exploits/worms which can be used to check the credibility of the 
> solution. There are number of tools out there which simulate them I believe 
> ,yet it would be good to see if we can get a real sample which can be run on 
> a virtual machine and see how it impacts and then put the IPS solution in 
> place and see what it can block. I would appreciate if anybody could point me 
> to the right resources/website from where I could download these.
>
>
> Regards
>
> Amit.
>
> ------------------------------------------------------------------------
> Test Your IDS
>
> Is your IDS deployed correctly?
> Find out quickly and easily by testing it
> with real-world attacks from CORE IMPACT.
> Go to 
> http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
> to learn more.
> ------------------------------------------------------------------------
>
>

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it 
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
 
to learn more.
------------------------------------------------------------------------

Reply via email to