From the course: Penetration Testing and Ethical Hacking
Unlock this course with a free trial
Join today to access over 24,600 courses taught by industry experts.
Evading IDS, firewalls, and honeypots
From the course: Penetration Testing and Ethical Hacking
Evading IDS, firewalls, and honeypots
- [Instructor] Evading IDS, firewalls, and honeypots. In this lesson, we're going to talk about how attackers evade the IDS, the firewalls, and honeypots. So, this is a very important concept that you should know, how attackers used various techniques. And you, as being a ethical hacker, should know and understand the techniques that they use to prevent such measures. So, let's go ahead and get started. So, the awareness of cyber and network security is increasing day by day. It's very important to understand core concepts of the Intrusion Detection/Defense System, or IDS, as well as the IPS, Intrusion Prevention Systems. These can often create a little confusion, because multiple vendors may create both modules using similar technology and define it different ways. So, sometimes it's the same technology, and it's used for the detection and the prevention of threats. So, in this lesson, we're going to talk about IDSs and IPSs in detail. So, hopefully that clarification can be made…