| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Today security filters can be found on our network perimeter,
on our servers, in our frameworks and applications. As our network perimeter
becomes more secure, applications become more of a target. Security filters such
as IDS and WAF are relied upon to protect applications. Intrusion detection
evasion techniques were pioneered over a decade ago. How are today's filters
withstanding ever evolving evasion tactics? The presentation will examine how
evasion techniques worked in the past and provide insight into how these
techniques can still work today; with a focus on HTTP attacks. A practical new
way to bypass Snort will be demonstrated. A tool to test other IDS for the
vulnerability in Snort will be demonstrated.
Related Links: Download AVI from: Streaming Flash:
Special thanks to Scott and Brandon Moulton for the AV work,
and SkyDog for letting me rip the videos.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast