In message <199602252212.JAA19776@wyrm.its.uow.edu.au>, IDS Moderator writes: > A number of responses were received in regards to testing/reviewing > the cracker tools offered by Brad Powell. I decided it was better > to summarize them into a single post. > > [answers deleted] I'm afraid I missed the original request :-(. As someone answered, none of these tools is probably new. However, even with the targeted vulnerabilities patched, looking for some kind of signature in the attempted exploit may help with ID. Did anyone dig into that idea ? Any comments/opinions ? Michel Lavondes (lavondes@tidtest.total.fr) #include <disclaimer.h> ** CDA warning : don't read this if you're under 18 ** Don't whistle while you piss Hagbard Celine PS to moderator : What happened to the posting in french you asked a volunteer translator for ? [ I sent it to a single person, instead of wasting others time. However I recieved no reply, so I have sent it to someone else - waiting on a reply. Will send it to you if I dont receive a response soon. RuF ]