From the course: Penetration Testing and Ethical Hacking

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Scanning beyond IDS and firewall

Scanning beyond IDS and firewall

- [Instructor] Scanning beyond the IDS and firewall. So in this lesson, what we're going to learn is different ways of scanning and evading the intrusion detection systems and firewalls. Also, we're going to talk about footprinting and banner grabbing, as well as drawing network diagrams, so let's go ahead and get started. So scanning beyond the IDS. Now, attackers use fragmentation to evade secure devices such as firewalls, IDSs, and IPSs, Intrusion Prevention Systems. Now, the basic technique that is most commonly and properly used is splitting the payload into smaller packets. So earlier, we talked about the packet, the TCP/IP packet, and the the frame, and the fragments. When you fragment that packet or break it up, the IDS or the IPS system must reassemble the packets to detect the attack. If they don't, of course, it'll be detected, but if they break that up into fragments, they must reassemble it to identify what's being sent for an attack. Now, the small packets are altered in…

Contents