官术网_书友最值得收藏!

IDS/IPS identification

Penetration testers can utilize fragroute and WAFW00F to identify whether there are any detection or prevention mechanisms put in place, such as Intrusion Detection System (IDS)/Intrusion Prevention system (IPS)/Web application Firewall (WAF).

Fragroute is a default tool in Kali Linux that performs fragmentation. Network packets allow attackers to intercept, modify, and rewrite the egress traffic for a specific target. This tool really comes in handy on a highly secure remote environment.

The following screenshot provides the list of options that is available in fragroute to determine any network IDs in place:

Attackers can also write their own custom configuration to perform fragmentation attacks to delay, duplicate, drop, fragment, overlap, reorder, source-route, and segment. A sample custom configuration would look like the following screenshot:

Fragroute on target is as simple as running fragroute target.com and if there are any connections to target.com, then attackers will be able to see the traffic that is being sent to the target.com. The following screenshot shows that the IP segments are fragmented as per the custom configuration file:

Another tool that attackers utilize during active reconnaissance is WAFW00f. This tool is pre-installed in the latest version of Kali Linux. It is used to identify and fingerprint Web Application Firewall (WAF) products. It also provides a list of well-known WAFs. It can be listed by typing the -l switch to the command (for example, Wafw00f -l).

The following screenshot provides the exact WAF running behind the web application:

主站蜘蛛池模板: 青龙| 祁东县| 资溪县| 土默特左旗| 济阳县| 泰和县| 长子县| 九龙城区| 涞水县| 大关县| 平度市| 阿拉尔市| 金堂县| 佳木斯市| 康马县| 禹州市| 玉门市| 上高县| 乌苏市| 鄄城县| 敦煌市| 丹江口市| 民勤县| 沈阳市| 崇明县| 仙桃市| 正宁县| 房产| 合肥市| 义马市| 蒙城县| 梁平县| 贵定县| 富平县| 沐川县| 米林县| 绥中县| 阳曲县| 武安市| 仲巴县| 昌邑市|