From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,800 courses taught by industry experts.

Scanning beyond IDS and firewall

Scanning beyond IDS and firewall

- If you've seen any movies lately that have to do with attacking a network or hacking or anything like that, they make it look extremely easy to bypass a firewall or to avoid an intrusion detection system. It's not as easy as they make it look. And what we want to talk about here are methods for avoiding detection through firewalls or avoiding detection by IDSs. A properly configured modern firewall is going to block the connection, particularly because they operate in a stateful fashion. Meaning that they are monitoring the state of a session and not allowing a packet to come through that is not part of an established session that is the response to something that had been sent out earlier. So let's talk about some of these tools and techniques for avoiding being seen, really. Secure Shell is a tool for connecting to a system. Open SSH is one of the pieces of software that implements the SSH protocol. And SSH has a feature called tunneling wherein you can send any traffic you want…

Contents