And what happens when the attacker spoofs someone else's address and makes it look 
like it's coming from, oh, I don't know, the FBI site or something?  Now you're 
scanning the FBI.  Probably not a good idea.


-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Jon Goode
Sent: Friday, March 05, 2004 4:40 PM
To: [EMAIL PROTECTED]
Subject: Nessus and Snort


Has anyone considered setting up snort to detect network scans from external
networks, then automatically having nessus 'retaliate' a scan and post the
results of the offending machine?  Or could this loop? :)

Phynex

_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus
_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to