Back to Results
First PageMeta Content
Software / Intrusion detection systems / Snort / Evasion / Intrusion detection system / Intrusion detection system evasion techniques / Denial-of-service attack / Buffer overflow / Network intrusion detection system / Computer network security / Cyberwarfare / Computer security


IDS Evasion Techniques and Tactics
Add to Reading List

Document Date: 2012-02-12 19:18:28


Open Document

File Size: 71,40 KB

Share Result on Facebook

Company

Next Generation Security Technologies / Cisco / NetSolve Inc / /

Event

Reorganization / /

IndustryTerm

WEB-IIS ISAPI .ida attempt / pre-processor / frag2 pre-processor / open source tool / WEB-MISC whisker space splice attack / WEB-MISC /etc/passwd / software releases / ordinary Web / hacker tools / prudent processing / classtype /

OperatingSystem

Unix / Microsoft Windows / /

Person

Kevin Timm / Mark Handley / Thomas Ptacek / Vern Paxson / /

Position

Security Engineer / Unix director / interpreter / /

Technology

encryption / HTTP / perl / frag2 pre-processor / UDP / html / NIDS technology / Unix / ISAPI / /

URL

http /

SocialTag