官术网_书友最值得收藏!

IDS/IPS identification

Penetration testers can utilize fragroute and WAFW00F to identify whether there are any detection or prevention mechanisms put in place, such as Intrusion Detection System (IDS)/Intrusion Prevention system (IPS)/Web application Firewall (WAF).

Fragroute is a default tool in Kali Linux that performs fragmentation. Network packets allow attackers to intercept, modify, and rewrite the egress traffic for a specific target. This tool really comes in handy on a highly secure remote environment.

The following screenshot provides the list of options that is available in fragroute to determine any network IDs in place:

Attackers can also write their own custom configuration to perform fragmentation attacks to delay, duplicate, drop, fragment, overlap, reorder, source-route, and segment. A sample custom configuration would look like the following screenshot:

Fragroute on target is as simple as running fragroute target.com and if there are any connections to target.com, then attackers will be able to see the traffic that is being sent to the target.com. The following screenshot shows that the IP segments are fragmented as per the custom configuration file:

Another tool that attackers utilize during active reconnaissance is WAFW00f. This tool is pre-installed in the latest version of Kali Linux. It is used to identify and fingerprint Web Application Firewall (WAF) products. It also provides a list of well-known WAFs. It can be listed by typing the -l switch to the command (for example, Wafw00f -l).

The following screenshot provides the exact WAF running behind the web application:

主站蜘蛛池模板: 上犹县| 闵行区| 平邑县| 保康县| 许昌市| 都安| 奉贤区| 白山市| 义马市| 四子王旗| 彭泽县| 农安县| 丰原市| 新和县| 渭南市| 铜山县| 射洪县| 枣庄市| 太谷县| 武隆县| 涡阳县| 康保县| 丰宁| 平利县| 东乌| 汶上县| 瑞丽市| 拜城县| 天津市| 无锡市| 宜章县| 禄丰县| 肃宁县| 磴口县| 广丰县| 元阳县| 东光县| 长丰县| 太保市| 深水埗区| 呼伦贝尔市|