官术网_书友最值得收藏!

IDS/IPS identification

Penetration testers can utilize fragroute and WAFW00F to identify whether there are any detection or prevention mechanisms put in place, such as Intrusion Detection System (IDS)/Intrusion Prevention system (IPS)/Web application Firewall (WAF).

Fragroute is a default tool in Kali Linux that performs fragmentation. Network packets allow attackers to intercept, modify, and rewrite the egress traffic for a specific target. This tool really comes in handy on a highly secure remote environment.

The following screenshot provides the list of options that is available in fragroute to determine any network IDs in place:

Attackers can also write their own custom configuration to perform fragmentation attacks to delay, duplicate, drop, fragment, overlap, reorder, source-route, and segment. A sample custom configuration would look like the following screenshot:

Fragroute on target is as simple as running fragroute target.com and if there are any connections to target.com, then attackers will be able to see the traffic that is being sent to the target.com. The following screenshot shows that the IP segments are fragmented as per the custom configuration file:

Another tool that attackers utilize during active reconnaissance is WAFW00f. This tool is pre-installed in the latest version of Kali Linux. It is used to identify and fingerprint Web Application Firewall (WAF) products. It also provides a list of well-known WAFs. It can be listed by typing the -l switch to the command (for example, Wafw00f -l).

The following screenshot provides the exact WAF running behind the web application:

主站蜘蛛池模板: 阆中市| 曲阜市| 辽阳市| 龙州县| 华蓥市| 安乡县| 黄梅县| 黑河市| 杭锦后旗| 泰州市| 于都县| 巨鹿县| 罗甸县| 鹤岗市| 白银市| 县级市| 客服| 麻江县| 比如县| 玛沁县| 灌云县| 鸡西市| 静安区| 化隆| 湟中县| 阳城县| 汾阳市| 盐津县| 孝昌县| 乌兰察布市| 仁化县| 大庆市| 封丘县| 舒兰市| 祥云县| 石嘴山市| 江川县| 沿河| 德兴市| 德格县| 托里县|