Dear all, I am interested in knowing evasion schemes for application based invasions available, and i appreciate if you can guide me to some papers or links where I can find such information, and where to look for answers about evasion techniques, many thanks, Divider
------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
