Hello Tim,

You could take a look at these links, they provide some information:
http://en.wikipedia.org/wiki/Intrusion_detection_system_evasion_techniques
http://insecure.org/stf/secnet_ids/secnet_ids.html

Hope this helps.

Best regards,


--
Jamil Ben Alluch, B.Ing., GCIH
<http://www.autronix.com>
[email protected]
+1-819-923-3012


On Tue, May 21, 2013 at 8:52 AM, Tim Tomes <[email protected]> wrote:

> I'm compiling a list of preferred methods for probing networks while
> avoiding IDS/IPS detection. Any and all input is appreciated. Thanks.
>
> --
> Tim Tomes
> @lanmaster53
> http://lanmaster53.com/
> _______________________________________________
> gpwn-list mailing list
> [email protected]
> https://lists.sans.org/mailman/listinfo/gpwn-list
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to