SpewPAL: How capturing and replaying attack traffic can save your IDS

Black Hat USA 2010

Presented by: Kyle Cronin, Patrick Engebretson, Dr. Josh Pauli
Date: Thursday July 29, 2010
Time: 15:15 - 16:30
Location: Florentine
Track: Turbo

Testing Intrusion Detection Systems (IDS) to ensure the most malicious attacks are detected is a cornerstone of these systems, but there is no standardized method to execute these tests. Running live exploitations is not always a viable option – especially when the rule set isn’t finalized, and clients are often nervous about the use of “hacker tools” on their networks. Furthermore, educators struggle to teach IDS concepts as a standalone principle without teaching attack methodologies at the same time. We are releasing two artifacts to help solve these problems. First we introduce PAL, a PCAP Attack Library full of individual pre-captured attack files that can be easily replayed for IDS testing and education. This library is completely preassembled, clean, and extendable to include further additions of attacks. Our initial library is created from the findings in the Common Attack Pattern Enumeration Classification (CAPEC) from the Department of Homeland Security. Second, we introduce SprayPAL, a software tool that we’ve developed to replay the PCAP attack library files. Users can send attacks to a specific target or broadcast to an entire subnet of machines. Additional features include the ability to select individual or multiple simultaneous attacks as well as provide layer 2 and 3 packet level manipulation. We conclude by presenting a methodology for capturing attacks and adding them to the public library. Both our PCAP attack library and SprayPAL tool will be released at Black Hat 2010 to the general public.

Patrick Engebretson

Dr. Patrick Engebretson obtained his Doctor of Science degree with a specialization in Information Security from Dakota State University. He currently serves as an Assistant Professor of Information Security and also works as a Senior Penetration Tester for security firm in the Midwest. His research interests include penetration testing, intrusion detection, exploitation, honey pots, and malware. In the past 3 years he has published 11 peer reviewed journal and conference papers in these areas. Dr. Engebretson was recently invited by the Department of Homeland Security to share his research at the Software Assurance Forum in Washington, DC. He regularly attends advanced exploitation and penetration testing trainings from industry recognized professionals and holds several certifications. He teaches graduate and undergraduate courses in penetration testing, wireless security, and intrusion detection.

Dr. Josh Pauli

Kyle Cronin


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats