[IDSwakeup] Collection of Tools to test network intrusion detection systems

IDSwakeup is a collection of tools that allows to test network intrusion detection systems.
The main goal of IDSwakeup is to generate false attack that mimic well known ones, in order to see if NIDS detects them and generates false positives.

This release of IDSwakeup includes:

  • IDSwakeup The main shell script that permits to launch hping2 or iwu. The user just has to choose which attack or set of attacks he or she want to mimic. The user can also fix the TTL to produce short TTL and impact only NIDS and not the servers.
    Usage: ./IDSwakeup <src addr> <dst addr> [nb] [ttl]
    IDSwakeup requires hping2.
  • iwu Sends a buffer as a datagram. It allows to change the source address, the destination address, the TTL (in order to produce short TTL). It also takes as parameter the number of times the user wants to send the same datagram.
    Usage: ./iwu <srcIP> <dstIP> <nb> <ttl> <ip-datagram>
    Example: ./iwu 200 4
            “4500 0018 00f2 0003 4011 73db 0101 0101 0202 0202 e63e 4494”

    iwu requires libnet 1.x.

IDSwakeup suite is written by Stéphane Aubert, it is available in a beta version and published under a BSD-style license.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s