Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PFsense with Snort in Bridge mode Failed LOIC pentest

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    3 Posts 2 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      dimarzio
      last edited by

      I have installed Pfsense 2.1 with snort  as bridge firewall.

      I tried pentesting using LOIC to tcp port 443 with 10000 threads.

      I used 2 computers, 1 is for pentest and the other just to monitor  by pinging pfsense continuously from another vlan on the WAN side.

      When I started the pentest, the monitoring computer showed time out in ping and I can't open also the webgui of the pfsense from the monitoring computer. I stopped the pentest, I checked snort alert/blocked and it is detecting and blocking the IP of the computer that I'm using to pentest.

      But even if the IP of the pentest computer is already blocked, if i restart the pentest, ping and webgui access to pfsense from monitoring computer is lost again. it seems that pfsense is hanging on DoS attack.

      I appreciate if you can give me a work-around on this if you have encountered and solved this before.

      Thank you

      1 Reply Last reply Reply Quote 0
      • ?
        A Former User
        last edited by

        Snort in a bridge can't assign proper IP addresses the network variables.

        Solution:http://forum.pfsense.org/index.php/topic,65858.msg358457.html#msg358457

        1 Reply Last reply Reply Quote 0
        • ?
          A Former User
          last edited by

          @jflsakfja:

          Snort in a bridge can't assign proper IP addresses to the network variables.

          Solution:http://forum.pfsense.org/index.php/topic,65858.msg358457.html#msg358457

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.