02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

388 Chapter 16 ■ Evading IDSs, Firewalls, and Honeypots<br />

4. Perform a DoS.<br />

5. Use code obfuscation.<br />

6. Perform a false positive generation technique.<br />

7. Attempt a Unicode attack.<br />

8. Perform a fragmentation attack.<br />

It is important for you to remember that not every attack will work when testing a<br />

firewall or IDS, but you should still log the results and make note of the way the devices<br />

respond. When testing is completed, compare and analyze the results to see if you can<br />

determine any patterns or behavior that may indicate the nature of the environment or<br />

vulnerabilities present.<br />

Summary<br />

In this chapter we looked at firewalls, IDSs, and honeypots as mechanisms used to defend<br />

a network as well as something to evade as an attacker. You saw that the problem is that<br />

whereas many attacks are effective at getting information, they can be thwarted by using<br />

any of the systems we have covered. In fact, today’s networks and environments employ a<br />

range of defensive and detective measures designed to deal with such attacks.<br />

Today’s corporations use many defensive measures, each with its own way of putting a<br />

stop to attacks. Systems such as intrusion detection systems, intrusion prevention systems,<br />

firewalls, honeypots, and others form very potent adversaries and obstacles to your<br />

activities. Although these devices are formidable they are not insurmountable, so you must<br />

first learn how they work and then see what you can do to overcome the obstacles or just<br />

get around them altogether.<br />

Exam Essentials<br />

Understand the different types of firewalls. Know that not all firewalls are the same and<br />

that each operates a little differently. For example, packet filtering firewalls work at the<br />

network level and are commonly found embedded in routers, whereas stateful firewalls are<br />

devices unto themselves.<br />

Know the differences between HIDSs and NIDSs. Understand that an HIDS and an<br />

NIDS are not the same and do not monitor the same type of activity. An NIDS monitors<br />

traffic on a network, but diminishes in effectiveness where a host is concerned. An HIDS<br />

has diminishing capability outside of a specific host.<br />

Understand the role of a honeypot. A honeypot is a tool used to attract an attacker for<br />

the purpose of research, acting as a decoy, or to gain intelligence as to what types of attacks<br />

you may be facing and how well your defenses are working.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!