Introduction
THM Room: Network Security Solutions |
What?
Learn about and experiment with packet fragmentation, source routing, source port manipulation, IP address decoys, IP Address spoofing, customising packets, randomising the order of hosts, proxy servers, sending bad checksums, and anonymisers, on various IDS/IPS systems.
Why?
To be able to apply IDS/IPS evasion techniques, such as protocol and payload manipulation.