bypassing network security: evading idss, honeypots, and firewalls

6
CHAPTER 13 Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls

Upload: patrick-hutchinson

Post on 27-Dec-2015

221 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls

CHAPTER 13Bypassing Network Security:

Evading IDSs, Honeypots, and Firewalls

Page 2: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls

Types of IDSs & Evasion Techniques

IDS vs IPS Use packet sniffers

Host Based vs Network Based Signature Based vs Anomaly Based

Page 3: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls

Types of IDSs & Evasion Techniques

Bypassing an IDS Change the traffic (eg: HTTP instead of ICMP) Session Splicing Inserting extra data Obfuscating addresses Use encryption Session hijacking

Page 4: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls

Hacking Tools

ADMutate Rewrites a script

Snort Real-time packet sniffer HIDS traffic-logging tool Both Linux and Windows

Page 5: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls

Firewalls & Honeypots

Firewalls: Hardware vs Software Honeypots

Specter, KFSensor, Nessus Bypassing honeypots

Reverse www shell Compromise an internal system that connects

via port 80 to hacker’s system Use anti-honeypot software to warn of

honeypot systems