Re: X.25 tools

From: Dragos Ruiu (drat_private)
Date: Thu Mar 06 2003 - 20:37:18 PST

  • Next message: disciple: "RE: Penetration Testing Lab Setup - VMWare"

    On Thu, 6 Mar 2003 14:47:01 -0800 
    Brian Brotschi <brian.brotschiat_private> wrote:
    
    > All;
    > I would highly recommend a X.25 protocol analyzer from GN Nettest such as
    > the 9410 or 9415 (both of which are PC based).  You should be able to find
    > such a device as a surplus Test & Measurement equipment.
    > brianb
    
    Other good units to snag are the IDACOM (later became HP) PT300, PT302, PT500
    and PT502. The multiport ones are cool because you can do full switch emulations
    as well as sophisticated MITM. (I'm biased because I was the product manager for 
    the PT302 and PT502 at their creation)
    
    HP4950's and 4952's (the small little ones that the GN Navtel series were patterned after
    and surpassed) had some X.25 software and are very common and easy to find in surplus, and 
    the HP Network Advisors (the laptop that looks like it was designed by mad scientists in 
    the russian military), up to the currently sold model all have X.25 capabilities.
    
    Another cool multiport X.25 tester is the Wandel&Goltermann DA-30 (lunchbox sized unit).
    The DA30 had some pretty cool ip and ethernet measurements too.
    
    Also look for Tekelec Chameleons (big honkin boxes and later smaller ones in Dolch PC Lunch 
    boxes) and such.
    
    Ando and Anritsu in Japan also had some interesting X.25 stuff. If you stumble across
    any of these in surplus snag them for your needs.
    
    All of those will immensely help your X.25 probing and analysis. There were a couple of
    i960/PCI based analyzers too, though those long gone company names escape me now.
    
    To further add emphasis to Brian's wise words:
    
    A real protocol analyzer will let you do many things that will be difficult with just
    software and modems/PADs.
    
    cheers,
    --dr
    
    -- 
    --dr                  pgpkey: http://dragos.com/ kyxpgp
    http://cansecwest        0 = 1 , for large values of zero and small values of one.
    
    ----------------------------------------------------------------------------
    
    Are your vulnerability scans producing just another report?
    Manage the entire remediation process with StillSecure VAM's
    Vulnerability Repair Workflow.
    Download a free 15-day trial:
    http://www2.stillsecure.com/download/sf_vuln_list.html
    



    This archive was generated by hypermail 2b30 : Fri Mar 07 2003 - 11:48:24 PST