Temple University

Week 13 Summary

Evasion Techniques

Here’s what I’ve used in the past for evasion techniques; very slow and steady scanning, scanning for only one or two ports at a time, spoofing an IP addresses, encryption to avoid IDS’s, clearing traffic logs, fragmenting payloads and packets, pivoting and using another machine to do the scanning for you. You could also try ARP poisoning and MAC spoofing.

In the news:
The Army wants to put cyber Soldiers in the mud with the Infantry. For what practical purpose? Not too sure.
http://breakingdefense.com/2015/11/army-puts-cyber-soldiers-in-the-mud/

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 12 other subscribers