Welcome to中国防火墙网
Add to Favorites | Chinese
Inbreak detect term is contacted completely (2)
From;    Author:Stand originally








Inbreak detect term is contacted completely (2)

CVE (Common Vulnerabilities And Exposures, general flaw is announced)

When designing scanning program namely about a of flaw old issue or answering strategy, the appellation to flaw also meets different manufacturer differ completely. Still have, in a few IDS systems that produce chamber of commerce to define a variety of features and apply them to a flaw, give a person a kind of illusion so, the product that is like them is more effective. MITRE founded CVE, have flaw name standardizing, participation manufacturer also develops IDS product according to this standard with respect to follow a rational line to do some work well. The URL address of CVE is Http://cve.mitre.org/ .  

Crafting Packets (from the definition data is wrapped)

Build from the definition data is wrapped, can keep away from the data of a few idiomatic regulations includes a construction, make data wrap deceit thereby, perhaps make if why handle it,the computer that gets it does not know this. Make Nemesis of a when wrap from definition data usable program, its URL address is Http://jeff.chi.wwti.com/nemesis/ .  

Desynchronization (synchronous invalidation)
Desynchronization this term is the method that shows with alignment number escapes IDS originally. The serial number that some IDS may expect to get originally to it feels puzzle, bring about thereby cannot new form builds data. This one technology is in very popular 1998, when already was being passed now, some articles Desynchronization this term generation shows other IDS escapes a method.  

Eleet

When the hacker writes flaw to develop a program, they can take next sign one's name normally, among them one the arrantest is Elite. If change Eleet into the number, it is 31337, and becoming it is the ability that points to them when, elite=eleet, express elite. 31337 be used to make date of a port or alignment bugle call normally. At present popular word is " Skillz " .  

Enumeration (list)

After the work that passes passive research and social engineering, aggressor can begin to undertake enumerative to network resource. Listing is to show aggressor probes a network actively to have in order to discover among them what and what can be used by him. Because present action is passive no longer, it is detected likely to come out. Arrive to avoid to be detected of course, they can undertake as far as possible stealthily.  
Evasion (avoid)

Evasion is to point to launch attack, and be not detected successfully by IDS. Among them doohickey lets IDS see a side only namely, and what atttack actually is another target however, alleged bright repair a plank road built along a cliff, do one thing under cover of another. A kind of form of Evasion is the TTL that wraps a setting to differ for different message (significant time) value, such, passing the information of IDS to be like it seems that is hurtless, and in harmless information the TTL that the TTL that go up arrives at place of target lead plane to need than wanting wants short. Once passed IDS to near an end, hurtless part can be desertioned, remain only harmful.  
Previous12 Next

About us | Legal Notices | Sitemap | Links | Partner