This module will familiarize you with :
Intrusion Detection Systems
Ways to Detect an Intrusion
Types of IDS
System Integrity Verifiers
Detection of Attack by IDS
Ways to Evade IDS
Tools to Evade IDS
Firewall and its Identification
Bypassing the Firewall
Tools to Bypass a Firewall
Honeypot and its Types
Detection of Honeypots
Here is the link:
http://www.4shared.com/document/tber0o6I/CEHv6_Module_23_Evading_IDS_Fi.html
No comments:
Post a Comment