Tools of the Trade revisited (Part 3)

by Don Parker
Sept. 1, 2017 0 comments TechGenix hacking & cyberattacks

In the second part of this article series we looked at how an IDS could possibly detect certain security tools and we also covered how Snort would view Nmap stimulus. We shall now end the series by seeing how Snort views a tool called Cain & Abel. Over the course of the past two articles, and furthered in this one, is how computer security tools can leave residue. Specifically, residue that an IDS can detect. In part two we saw how easily Nmap shows up when performing various types of scans. Having this type of knowledge is crucial for your system administrators out there today. The same also applies to those lucky enough to only do network security, without the added burden and complexity of sys admin work.

http://techgenix.com/tools-trade-revisited-part3