Reader challenge

For this section, review the information from the chapter and try and expand on the topics. This will allow you to increase your knowledge on the different topics. To stimulate your thinking, try some of the following topics:

  • Build a Snort machine—practice the different techniques we discussed and record any data that you can create and/or generate that can bypass the detection capability of Snort. Once you have successfully evaded the tool, draft a script that can create the evasion capability, so it is available for any of your future testing endeavors.
  • The next challenge is to build a firewall machine, customize a number of different streams of packets, and determine which are effective at penetrating the firewall. It is important to review the details in Wireshark when you try different techniques. See if there are ways to scan through the firewall, and then create a listing of all of the options that provide you with information about the firewall, or how to successfully penetrate it.

These two challenges are designed to increase your skills with respect to stealth techniques. Remember that, if the environment has a well-tuned IDS, you might not be able to bypass it. Again, this is not a bad thing, and it is a wonderful learning opportunity. Enjoy!

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset