<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS functionality testing in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ips-functionality-testing/m-p/40407#M29663</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can not think of any tools for windows offhand but there are a few manual tests you vcan run.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1) Surf the &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://eicar.org/"&gt;http://eicar.org/&lt;/A&gt;&lt;SPAN&gt; site and download the malware file.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Go to any website using HTTP and find a place that allows text and type &amp;lt;script&amp;gt;alert(XSS test)&amp;lt;/script&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are quite a few examples on the web. But since we are not a Web App firewall there will be some XSS attacks that the paloalto will not detect. Make sure you test your examples in the lab first before demonstrating to the customer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve Krall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 31 Oct 2011 16:36:04 GMT</pubDate>
    <dc:creator>skrall</dc:creator>
    <dc:date>2011-10-31T16:36:04Z</dc:date>
    <item>
      <title>IPS functionality testing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-functionality-testing/m-p/40406#M29662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are looking to do a live demo of PAN devices to some leads . Does anybody have tool we can use to demonstrate the IPS functionality in real time .Putting the box through a wide range of attacks .&amp;nbsp; App ID is pretty easy but Checkpoint now does application visibility . I have heard about metaploit . I havent seen a windows version u could easily use . Not a linux person .Looking for a free tool .&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Oct 2011 15:06:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-functionality-testing/m-p/40406#M29662</guid>
      <dc:creator>usvi</dc:creator>
      <dc:date>2011-10-31T15:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPS functionality testing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-functionality-testing/m-p/40407#M29663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can not think of any tools for windows offhand but there are a few manual tests you vcan run.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1) Surf the &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://eicar.org/"&gt;http://eicar.org/&lt;/A&gt;&lt;SPAN&gt; site and download the malware file.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Go to any website using HTTP and find a place that allows text and type &amp;lt;script&amp;gt;alert(XSS test)&amp;lt;/script&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are quite a few examples on the web. But since we are not a Web App firewall there will be some XSS attacks that the paloalto will not detect. Make sure you test your examples in the lab first before demonstrating to the customer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve Krall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Oct 2011 16:36:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-functionality-testing/m-p/40407#M29663</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2011-10-31T16:36:04Z</dc:date>
    </item>
  </channel>
</rss>

