Skip to main content

Posts

Showing posts from June, 2017

Attacking Network Device PART - 4

Evading Firewalls and Intrusion Detection Systems Tutorial 1 - Understanding Firewalls and IDS Welcome to the fourth & last module of this workshop. We hope you have been attending the complete previous three modules and have earned good knowledge so far in this workshop. Let’s now move towards the Firewall and Intrusion Detection Systems. In order to attack such devices, an attacker should have a thorough understanding and experience with these devices. You should understands how they work and what are the different types and which of these devices are most commonly available in the industry. The workshop flow wowill uld take you through the concepts of evading these devices and how little tools can help you find information behind firewalls. This module will be based more on concepts rather than just hitting tools and knowing nothing in background. What is Firewall? A firewall is hardware or software, or it can be a combination of both, designed in such a way which will prevent u