02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Intrusion Prevention and Intrusion Detection Systems 43<br />

Firewalls<br />

The firewall category includes proxy firewalls; however, because of a proxy’s varied functions<br />

it seems appropriate to give them their own subsection. Firewalls are most commonly<br />

broken down into the following main categories:<br />

■ Packet filtering<br />

■ Stateful packet filtering<br />

■ Application proxies, which we covered earlier<br />

Packet filtering firewalls look at the header information of the packets to determine legitimate<br />

traffic. Rules such as IP addresses and ports are used from the header to determine<br />

whether to allow or deny the packet entry. Stateful firewalls, on the other hand,<br />

determine the legitimacy of traffic based on the state of the connection from which the traffic<br />

originated. For example, if a legitimate connection has been established between a client<br />

machine and a web server, then the stateful firewall refers to its state table to verify that<br />

traffic originating from within that connection is vetted and legitimate.<br />

Firewalls and proxies are only as effective as their configuration, and their<br />

configuration is only as effective as the administrator creating them. Many<br />

firewall attacks are intended to circumvent them as opposed to a head-on<br />

assault; for us hackers, the softest target is our aim.<br />

Intrusion Prevention and Intrusion<br />

Detection Systems<br />

Intrusion prevention systems (IPSs) and intrusion detection systems (IDSs) are important<br />

considerations for any smart hacker. It is important for you, as a hacker, to cover your<br />

tracks and keep a low profile—as in no profile at all. It should be common sense, but<br />

consider this: If instead of tiptoeing around a network, you slam the network with ARP<br />

requests, ping sweeps, and port scans, how far do you think you’ll get? Exactly! Not far at<br />

all. IPSs and IDSs are network appliances put in place to catch the very activity that serves<br />

our purposes best. The key is to walk lightly, but still walk. First let’s familiarize ourselves<br />

with IPS and IDS basics; if you know how something works, you can also learn how to circumvent<br />

its defenses.<br />

The goal of an IDS is to detect any suspicious network activity. The keyword here is<br />

detect. An IDS is passive in nature; it senses a questionable activity occurring and passively<br />

reacts by sending a notification to an administrator signifying something is wrong. Think<br />

of it as a burglar alarm. While a burglar alarm alerts you that a burglar is present, it does<br />

not stop the burglar from breaking in and stealing items from you. Although such an appliance<br />

is passive, the benefit of using it is being able to reactively catch potentially malicious

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!