Forum Discussion
Mike_Maher
Jan 11, 2012Nimbostratus
Ido,
I don't know what Mikand's original need for this is, however the thought that popped into my head when I first read this was as a use to find infected/owned clients on your network. Obviously as you said that is not what ASM is geared for and there are other products out there in the market that will be more effective in doing this sort of work. I would never purchase ASM for this purpose, but if I already had ASM licensed on a device I was doing load balancing for some proxy servers it might be an interesting use of the Attack Signatures in the product. What are you thoughts about that?