pytbull – Intrusion Detection/Prevention System (IDS/IPS) Testing Framework

Outsmart Malicious Hackers


pytbull is an Intrusion Detection/Prevention System (IDS/IPS) Testing Framework for Snort, Suricata and any IDS/IPS that generates an alert file. It can be used to test the detection and blocking capabilities of an IDS/IPS, to compare IDS/IPS, to compare configuration modifications and to check/validate configurations.

The framework is shipped with about 300 tests grouped in 9 testing modules:

  • clientSideAttacks: this module uses a reverse shell to provide the server with instructions to download remote malicious files. This module tests the ability of the IDS/IPS to protect against client-side attacks.
  • testRules: basic rules testing. These attacks are supposed to be detected by the rules sets shipped with the IDS/IPS.
  • badTraffic: Non RFC compliant packets are sent to the server to test how packets are processed.
  • fragmentedPackets: various fragmented payloads are sent to server to test its ability to recompose them and detect the attacks.
  • multipleFailedLogins: tests the ability of the server to track multiple failed logins (e.g. FTP). Makes use of custom rules on Snort and Suricata.
  • evasionTechniques: various evasion techniques are used to check if the IDS/IPS can detect them.
  • shellCodes: send various shellcodes to the server on port 21/tcp to test the ability of the server to detect/reject shellcodes.
  • denialOfService: tests the ability of the IDS/IPS to protect against DoS attempts
  • pcapReplay: enables to replay pcap files

It is easily configurable and could integrate new modules in the future.

There are basically 6 types of tests:


  • socket: open a socket on a given port and send the payloads to the remote target on that port.
  • command: send command to the remote target with the subprocess.call() python function.
  • scapy: send special crafted payloads based on the Scapy syntax
  • multiple failed logins: open a socket on port 21/tcp (FTP) and attempt to login 5 times with bad credentials.
  • client side attacks: use a reverse shell on the remote target and send commands to it to make them processed by the server (typically wget commands).
  • pcap replay: enables to replay traffic based on pcap files

The official documentations is available here: pytbull documentation.

Changes/Improvements in V1.1

  • Issue #2 fixed (test number incrementing twice just after the last test from multipleFailedLogins test)
  • Issue #3 fixed (pcapReplay module not present in the checks on STDOUT)
  • Code factoring in pytbull.py
  • Timing options are now in parameters (config.cfg)
  • Automatically checks and informs if a new version is available (use PROXY section in the configuration file if needed)
  • New basic checks: Checks that paths are valid
  • SVN tags added in source code

You can download pytbull here:

pytbull-2.0.tar.bz2

Or read more here.

Posted in: Countermeasures, Networking Hacking, Security Software

, , , ,


Latest Posts:


Taringa Hack - 27 Million User Records Leaked Taringa Hack – 27 Million User Records Leaked
The Taringa hack is actually one of the biggest leaks of the year with 27 million weakly hashed passwords breached, but it's not often covered in the West.
A2SV - Auto Scanning SSL Vulnerability Tool For Poodle & Heartbleed A2SV – Auto Scanning SSL Vulnerability Tool For Poodle & Heartbleed
A2SV is a Python-based SSL Vulnerability focused tool that allows for auto-scanning and detection of the common and well-known SSL Vulnerabilities.
VHostScan - Virtual Host Scanner With Alias & Catch-All Detection VHostScan – Virtual Host Scanner With Alias & Catch-All Detection
VHostScan is a Python-based virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
Equifax Hack Blamed On Single Employee Equifax Hack Blamed On Single Employee
We wrote about the Equifax Hack, Data Breach and Leak last month, which happened due to a flaw in Apache Struts that for some reason hadn't been patched.
LOIC Hivemind - Low Orbit Ion Cannon LOIC Download – Low Orbit Ion Cannon DDoS Booter
LOIC Download below - Low Orbit Ion Cannon is an Open Source Stress Testing and Denial of Service (DoS or DDoS) attack application written in C#.
Yuki Chan - Automated Penetration Testing Tool Yuki Chan – Automated Penetration Testing Tool
Yuki Chan is an Automated Penetration Testing Tool that carries out a whole range of standard security auditing tasks automatically.


4 Responses to pytbull – Intrusion Detection/Prevention System (IDS/IPS) Testing Framework

  1. Tushar May 17, 2011 at 6:57 pm #

    It`s a virus.
    my antivirus detect it as sql slammer

    • Darknet May 17, 2011 at 7:25 pm #

      Well it’s designed to trigger IDS/IPS for testing purposes, if it didn’t have any malicious strings in it….it wouldn’t work very well would it?

      • Sébastien Damaye May 17, 2011 at 11:12 pm #

        It’s definitely NOT a virus, and I don’t think Darknet would accept to promote such stuff ;-)
        Absolutely agree with Darknet, pytbull contains malicious payloads that could trigger alerts from your AV but there are inoffensive in the sense they couldn’t affect the machine running pytbull. Such payloads are DoS attempts, SQL injections, … supposed to trigger alerts from the probed IDS/IPS.
        The only part that could have been considered as viruses was contained in the pdf/ directory and has been removed since v1.0 (stable release is now release 1.1). If you want to test this module (clientSideAttacks), you have to define a third party server.
        Please feel free to contact me (you will find my email on aldeid.com) for any comment or question.
        Thanks for your positive support ;-)
        SPecial thx to Darknet for the prompt answer!

        • Darknet May 18, 2011 at 10:26 am #

          No probs, am here to serve :P