Hello Tim, You could take a look at these links, they provide some information: http://en.wikipedia.org/wiki/Intrusion_detection_system_evasion_techniques http://insecure.org/stf/secnet_ids/secnet_ids.html
Hope this helps. Best regards, -- Jamil Ben Alluch, B.Ing., GCIH <http://www.autronix.com> [email protected] +1-819-923-3012 On Tue, May 21, 2013 at 8:52 AM, Tim Tomes <[email protected]> wrote: > I'm compiling a list of preferred methods for probing networks while > avoiding IDS/IPS detection. Any and all input is appreciated. Thanks. > > -- > Tim Tomes > @lanmaster53 > http://lanmaster53.com/ > _______________________________________________ > gpwn-list mailing list > [email protected] > https://lists.sans.org/mailman/listinfo/gpwn-list >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
