IDS-IPS Evasion
IDS/IPS Evasion
Tools: nmap, netcat/socat
EVASION VIA PROTOCOL MANIPULATION
1) Relying on a different protocol
2) Manipulating (source) TCP/UDP Port
3) Using session splicing (IP Packet fragmentation)
4) Sending invalid packets
1st technique example
nc -lvnp 25 (Gives the imp[ression that it is a usual TCP connection with an SMTP server)nc -ulvnp 162 (UDP Connection)2nd Technique example
3rd Technique example
nmap options:
4th Technique example
nmap options:
EVASION VIA PAYLOAD MANIPULATION
1) Obfuscating and encoding the payload
2) Encrypting the communication channel
3) Modifying the shellcode
1st Technique example
1) Encode to Base64 format
2) URL Encoding
3) Escaped Unicode
Tool: Cyberchef
2nd Technique example
Encrypted reverse shell steps:
1) Create the key
2) Listen on the attacker's machine
3) Connect to the attacker's machine
3rd Technique example
EVASION VIA ROUTE MANIPULATION
1) Relying on source routing
2) Proxy servers
Source Routing
Tool: nmap
Proxy Servers
Tools: nmap, proxychains, foxyproxy
nmap options: --proxies
format: PROTOCOL://HOST:PORT
Example:
EVASION VIA TACTICAL DENIAL OF SERVICE (DoS)
1) Launch DoS against IDS/IPS
2) Launch DoS against logging server
3) Create huge amount of benign traffic
COMMAND AND CONTROL
Tools: Cobalt Strike, Powershell Empire, Covenant, etc.
Variables:
Last updated