Ask the Expert

Simulating an attack on a Windows-based machine

How can I simulate an attack?

I downloaded a few attack tools from the Web in order to simulate an attack on my own ISA server. The problem is, when I tried to execute it in Windows XP command line, example:hunt.c servername it opened the source code with Notepad instead. What is going wrong? Do I need additional software to execute the tool?

I don't know much about programming. Is there a guideline/procedure or whitepaper that I can refer to get these tools to kick off? Are there any tools that can run on a Windows-based machine?

I wanted to use these tools to determine if the MS ISA server (firewall) is really protecting our network.


    Requires Free Membership to View

You don't say what program you are attempting to use, or what platform it was written for, or in what programming language. Most of the tools that you can download from the Net are written in some variant of C, Perl, or a combination of the two. Most are written for a Linux (UNIX) platform rather than Windows.

At the very least, you will need a C compiler or Perl interpreter (or equivalent if a different language is used) in order to run the code. If the code is operating system dependent, you will likely need to have a Unix machine to use to do your testing. If you look back to some of the other questions I've answered, you'll note that I have referred to Unix being the platform of choice for all types of testing and hacking tools.

There are language tools available for Windows-based machines. ActiveState has a free Perl interpreter that I've used that works well. I don't know of any free C compilers for Windows, but there likely is one somewhere. I haven't really looked for one. To convert a program designed for UNIX to one that will run on Windows will take some programming knowledge, though it can (usually) be done.


For more information on this topic, visit these other SearchSecurity resources:
Best Web Links: Hacking tools and utilities
Ask the Expert: Free downloads for auditing a network


This was first published in April 2002

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: