60 likes | 196 Views
Chapter 13. Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls. Types of IDSs & Evasion Techniques. IDS vs IPS Use packet sniffers Host Based vs Network Based Signature Based vs Anomaly Based. Types of IDSs & Evasion Techniques. Bypassing an IDS
E N D
Chapter 13 Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls
Types of IDSs & Evasion Techniques • IDS vs IPS • Use packet sniffers • Host Based vs Network Based • Signature Based vs Anomaly Based
Types of IDSs & Evasion Techniques • Bypassing an IDS • Change the traffic (eg: HTTP instead of ICMP) • Session Splicing • Inserting extra data • Obfuscating addresses • Use encryption • Session hijacking
Hacking Tools • ADMutate • Rewrites a script • Snort • Real-time packet sniffer • HIDS • traffic-logging tool • Both Linux and Windows
Firewalls & Honeypots • Firewalls: Hardware vs Software • Honeypots • Specter, KFSensor, Nessus • Bypassing honeypots • Reverse www shell • Compromise an internal system that connects via port 80 to hacker’s system • Use anti-honeypot software to warn of honeypot systems
Enticement vs Entrapment • Honeypot Study Guide: • http://ethics.csc.ncsu.edu/abuse/hacking/honeypots/study.php