<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cloning traffic to simulate attacks/vulnerabilities in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7028#M5188</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can always get a packet capture of the specific traffic you want and replay it through a device with TCPreplay or Scapy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Apr 2011 19:02:47 GMT</pubDate>
    <dc:creator>migration</dc:creator>
    <dc:date>2011-04-11T19:02:47Z</dc:date>
    <item>
      <title>Cloning traffic to simulate attacks/vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7022#M5182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone ever tried to clone malicious traffic sent through the palo-alto firewall to try to re-simulate attacks or exploit vulnerabilities?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have, can you share your experience in how you did it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just trying to research on some ideas of how to seek exploit possibile vulnerabilities based on traffic that I might think is malicious.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need some more info, let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 21:40:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7022#M5182</guid>
      <dc:creator>ikinnexi</dc:creator>
      <dc:date>2011-04-05T21:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cloning traffic to simulate attacks/vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7023#M5183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is something to look at.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tomahawk.sourceforge.net/"&gt;http://tomahawk.sourceforge.net/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keith&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 21:44:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7023#M5183</guid>
      <dc:creator>cl.tech</dc:creator>
      <dc:date>2011-04-05T21:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cloning traffic to simulate attacks/vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7024#M5184</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #000000; font-size: 10pt;"&gt;Is it possible to use the PA-2xxx series to span/mirror traffic from one port to another?&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #000000; font-size: 10pt;"&gt;Either in PanOS 3.1 or 4.0?&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;It would be very handy since we have so many unused ports on the device, and don't have any taps lying around.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #000000; font-size: 10pt;"&gt;Any info you can provide on this would be great. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #000000; font-size: 10pt;"&gt;Thank You. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; color: #000000; font-size: 10pt;"&gt;BA&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 22:12:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7024#M5184</guid>
      <dc:creator>ikinnexi</dc:creator>
      <dc:date>2011-04-05T22:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cloning traffic to simulate attacks/vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7025#M5185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We currently do not support spanning/mirroring traffic from the PAN device today.&amp;nbsp; Please contact your local Palo Alto SE to submit this feature as a feature request.&amp;nbsp; In the meantime, you can use our packet capture feature to help during troubleshooting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for your spanning suggestion!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Apr 2011 00:49:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7025#M5185</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2011-04-06T00:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cloning traffic to simulate attacks/vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7026#M5186</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, Virtual Wire acts a bit like an inline tap.&amp;nbsp; Any packets that are seen on the interface are forwarded out the second interface in the Virtual Wire.&amp;nbsp; If you are out of SPAN ports you can put the PAN device in between an existing SPAN port and another device using the SPAN with a couple interfaces in Virtual Wire mode and allowing all traffic to pass via open security policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Apr 2011 01:21:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7026#M5186</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2011-04-06T01:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cloning traffic to simulate attacks/vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7027#M5187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I usually use "Colasoft Packet Player".&lt;/P&gt;&lt;P&gt;if you have exploit packet capture like exploit.pcap, then , use that tool. you can 'replay' that packet capture by sending it to the PA in TAP mode interface.&lt;/P&gt;&lt;P&gt;then PA will detect the attack.&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;&lt;P&gt;BH Lee&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Apr 2011 03:09:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7027#M5187</guid>
      <dc:creator>bhlee</dc:creator>
      <dc:date>2011-04-06T03:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cloning traffic to simulate attacks/vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7028#M5188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can always get a packet capture of the specific traffic you want and replay it through a device with TCPreplay or Scapy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Apr 2011 19:02:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cloning-traffic-to-simulate-attacks-vulnerabilities/m-p/7028#M5188</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-04-11T19:02:47Z</dc:date>
    </item>
  </channel>
</rss>

