tag:blogger.com,1999:blog-4088979.post8382793114200083592..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Snort DCE/RPC Vulnerability ThoughtsRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-4088979.post-15783889081081632432007-09-22T06:22:00.000-04:002007-09-22T06:22:00.000-04:00Thanks for the nice post!Thanks for the nice post!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-49923582277957736052007-02-21T13:15:00.000-05:002007-02-21T13:15:00.000-05:00Hi Max,I used your excellent ImPacket to generate ...Hi Max,<BR/><BR/>I used your excellent ImPacket to generate the traffic for this chart -- thank you!Richard Bejtlichhttps://www.blogger.com/profile/13512184196416665417noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-52053197624504247932007-02-21T13:10:00.000-05:002007-02-21T13:10:00.000-05:00That's a great chart, DCE/RPC with and without RPC...That's a great chart, DCE/RPC with and without RPC can get really crazy. <BR/><BR/>You may have seen this before, if you are interested in generating some of those packets programmatically for your students, there is an open source Python library and a paper describing some of these features available <BR/><A HREF="http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1437" REL="nofollow">here</A><BR/><BR/>Gerardo Richarte and Alberto Soliño from Core did a bunch of work on analyzing these protocols.<BR/><BR/>It's cool to see a class that actually covers this area.Anonymousnoreply@blogger.com