IDS and Firewall Evasion Techniques

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

7 hours 6 minutes
Video Transcription
Hey, everyone, welcome back to the course and this video. We're just gonna go over kind of a 10,000 ft view of ideas and firewall evasion techniques. If you recall earlier in this course, I showed you some ways we can do that via and map. I I showed you some commands to try to bypass ideas or firewall, so we're just gonna talk kind of a high level
of different techniques that can be used.
So for our ideas of Asian techniques,
we can use the package fragmentation. And that's one of things I showed you earlier in the course with N maps or just using that dash lower case F flag that allows us to fragment our packets. And the goal with that is to try and get those packets to reassemble after the idea system. So after it's scanned the packets and said, Oh, these look okay,
then we reassemble and do whatever they're fairies thing we wanted to do
also doing things like i p address spoofing. So let's say that on the ideas they've set for specific I P addresses to not be able to get through that, it automatically would drop them so we just poof r I P address. And now it looks like it's a legitimate traffic coming through,
also using things like source routing as well as proxy servers or even using like I talked about before. In the course,
Attackers typically don't just like, launched their laptop and start attacking you right. They use infrastructures that they've already compromised and use those to launch the attack. So it looks like it's coming from that infrastructure and not the actual attacker themselves
and using encryption. So some ideas systems out there can read the packets if they're encrypted. So if we just encrypt the packets coming through, for example, if we attack through Port 443 or https, we can encrypt our traffic. And potentially
it'll go right by the ideas because it looks like normal traffic coming through that particular report,
and we can also attempt to flood the idea system with so much traffic that it can actually identify are malicious packets because there's so much traffic coming through at one time,
and then for a firewall evasion techniques, we can use things like ssh tunneling. So basically, that encrypted tunnel of the Attackers using so they can hopefully avoid detection by any type of security controls you have in place again using things like encryption. So fire with fire wall itself doesn't look at the packet. Doesn't look, analyze and see. We've got malicious data in there.
We could even things like fragmentation as well. Most modern firewalls, though, will be able to detect the malicious traffic
even if you fragmented. However, encryption still be made something that you can use. Thio bypass the firewall.
So just a quick, quick question here for you. The attacker changing their I P address for the attack is known as What
is the fragmentation? Is it
spoofing? Is it needs
or is it source routing?
Pretty easy question here. So the answer is spoofing, right? So we're spoofing the I P address to make it look like the attacks actually coming from somebody else or some other entity.
So in this video, we just talked about some different ideas, evasion techniques as well. Some different techniques to evade firewalls
Up Next
Penetration Testing and Ethical Hacking

The Penetration Testing and Ethical Hacking course prepares students for industry penetration testing certifications, like CEH. This course walks students through the process of gaining intelligence, scanning and enumerating and hacking the target.

Instructed By