Week 13 Summary
Evasion Techniques
Here’s what I’ve used in the past for evasion techniques; very slow and steady scanning, scanning for only one or two ports at a time, spoofing an IP addresses, encryption to avoid IDS’s, clearing traffic logs, fragmenting payloads and packets, pivoting and using another machine to do the scanning for you. You could also try ARP poisoning and MAC spoofing.
In the news:
The Army wants to put cyber Soldiers in the mud with the Infantry. For what practical purpose? Not too sure.
http://breakingdefense.com/2015/11/army-puts-cyber-soldiers-in-the-mud/
Leave a Reply