How can I simulate an attack?
I downloaded a few attack tools from the Web in order to simulate an attack on my own ISA server. The problem is, when I tried to execute it in Windows XP command line, example:hunt.c servername it opened the source code with Notepad instead. What is going wrong? Do I need additional software to execute the tool?
I don't know much about programming. Is there a guideline/procedure or whitepaper that I can refer to get these tools to kick off? Are there any tools that can run on a Windows-based machine?
I wanted to use these tools to determine if the MS ISA server (firewall) is really protecting our network.
You don't say what program you are attempting to use, or what platform it was written for, or in what programming language. Most of the tools that you can download from the Net are written in some variant of C, Perl, or a combination of the two. Most are written for a Linux (UNIX) platform rather than Windows.
At the very least, you will need a C compiler or Perl interpreter (or equivalent if a different language is used) in order to run the code. If the code is operating system dependent, you will likely need to have a Unix machine to use to do your testing. If you look back to some of the other questions I've answered, you'll note that I have referred to Unix being the platform of choice for all types of testing and hacking tools.
There are language tools available for Windows-based machines. ActiveState has a free Perl interpreter that I've used that works well. I don't know of any free C compilers for Windows, but there likely is one somewhere. I haven't really looked for one. To convert a program designed for UNIX to one that will run on Windows will take some programming knowledge, though it can (usually) be done.
For more information on this topic, visit these other SearchSecurity resources:
Best Web Links: Hacking tools and utilities
Ask the Expert: Free downloads for auditing a network
Dig Deeper on Microsoft Windows security
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.