Results 1 to 7 of 7

Thread: The Ultimate Deterrent

  1. #1
    Junior Member
    Join Date
    Jul 2001
    Posts
    12

    The Ultimate Deterrent

    The ultimate deterrent

    Would you think twice about breaking into a web site if every packet you generate is recorded.

    We have the ability to record and manage Terabytes of data in real time, if you do something that you should not hack a company, we can re-create your session and see exactly what you did.

    Don’t take just my word for it, please see the book extract following. This extract is slightly out of date, we are now a lot more powerful than is quoted.

    Please comment.

    ------------------------------------------------------------------------------------------------------

    NIKSUN's NetDetector is highlighted in a recently published book,
    entitled Incident Response by Kenneth R. van Wyk and Richard Forno. On page
    119, in section 7 which addresses Network Monitors and Protocol Analyzers,
    there is a write-up about NetDetector which states:

    "One of the more recent, but powerful, entries into the network protocol
    analyzer market is NetDetector by Niksun. Like the Sniffer product line,
    it is a full-featured network protocol analyzer. Unlike the Sniffer,
    though, it specializes in WAN connections and has an extremely capable
    session visualization capability. In fact, in the area of session playback
    and visualization, NetDetector is pretty much without peer.

    NetDetector's session visualization features are truly impressive. They
    include the ability to visually reconstruct web browser sessions and the
    ability to quickly extract email file attachments from network data
    streams. All of these things can be done using customized scripts and programs from
    lower-level network analyzers, but NetDetector packages them in a very easy
    to use system.

    As with other network analysis products from Niksun, NetDetector
    supports a wide range of physical network media on both the LAN and WAN
    side. The list of supported network media includes 10/100/1000 BaseT
    Ethernet, FDDI, T1, T3, and OC3.

    Finally, NetDetector provides the ability to alert you (via SNMP) of
    detected network activity that indicates likely intrusion activity. In
    doing that, it most certainly has some intrusion detection capabilities,
    but its intrusion detection features are not its strongest feature. Where
    NetDetector really excels is in its network data capture and analysis
    features. If you are looking for an uncompromising, monitoring and playback solution, NetDetector should be at the top of your
    list."

  2. #2
    hows about you lick my balls and take your ads somewhere else

  3. #3
    Banned
    Join Date
    Mar 2002
    Posts
    520
    heh, if I was that desperate to advertise, I'd make it look a little better although placing it in signature is kinda smart.

  4. #4
    Senior Member
    Join Date
    Nov 2001
    Posts
    4,785
    yeah!..what bob said
    Bukhari:V3B48N826 “The Prophet said, ‘Isn’t the witness of a woman equal to half of that of a man?’ The women said, ‘Yes.’ He said, ‘This is because of the deficiency of a woman’s mind.’”

  5. #5
    Senior Member cwk9's Avatar
    Join Date
    Feb 2002
    Posts
    1,207
    If you want to be taken seriously drop the spam.

    Reason your idea will most likely never be implemented.

    1. Costly storage of mostly useless data.
    2. Would grind server to a halt.
    3. Might need some changes to the TCP/IP protocol.
    Its not software piracy. I’m just making multiple off site backups.

  6. #6
    Banned
    Join Date
    Mar 2002
    Posts
    968
    No to mention having to run through all that worthless data to find suspicious events.

  7. #7
    Senior Member
    Join Date
    Apr 2002
    Posts
    711
    Oh geez... what a spammer.

    What if I just feed a "traget" a few megabytes of suspicious-looking fodder and a couple hundred well-placed, calculated packets? Maybe even sending you legitimate traffic (oddles of FTP or Web at the same exact time, for example). And let's just say that all this traffic happens over a few days or weeks or even months? Record all you want... and I wish you luck finding anything I really want hidden. The only thing the "replay" might buy you, if you're lucky, is finding out how (or when) I got in... but overall it'll take you longer to find by that method than any reasonably senior/knlwedgeable admin and a good "sense" about a machine, overall.

    And, well, if you have to spam about to to sell it to security-minded folk, well, it must suck...

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •