And what happens when the attacker spoofs someone else's address and makes it look like it's coming from, oh, I don't know, the FBI site or something? Now you're scanning the FBI. Probably not a good idea.
-----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Jon Goode Sent: Friday, March 05, 2004 4:40 PM To: [EMAIL PROTECTED] Subject: Nessus and Snort Has anyone considered setting up snort to detect network scans from external networks, then automatically having nessus 'retaliate' a scan and post the results of the offending machine? Or could this loop? :) Phynex _______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus _______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
