Hello all, Before beginning Network Packet Crafting or NPC we shall brush up crafting.
We Know that data is sent in form of Packet. Packet Crafting simply means to make data arranged or edited such that it gets tougher to understand or decode the Data or Information stored over Network.
We know discuss abilities and limits of Network Packet Crafting
Abilities Of Network Packet Crafting:-
1.Shape data to make it look the way You want.
2.Possible to evade firewalls and Intrusion detection system.
3.Create scripts around encrypted Packets.
Limits Of NPC:-
1.We can craft only those packets that are allowed by the Network.That means we can not craft packets that violate rules.
2.Learning Curve:-
NPC require a deep understanding of Protocols like TCP/IP, Firewall Rules, Hardware Requirements, and many more.
Now we discuss various evasions and there targets.
1.Firewall Evasion:- Targeting Ports.
2.System Exploit:- Attacks like Denial Of Service(DOS), un-authorized access etc
3.Network Device Exploit:- DOS, Sniffing, invalid access.
4.Intrusion Detection System Evasion:- It relates to change in content or invalid transactions.
We Know that data is sent in form of Packet. Packet Crafting simply means to make data arranged or edited such that it gets tougher to understand or decode the Data or Information stored over Network.
We know discuss abilities and limits of Network Packet Crafting
Abilities Of Network Packet Crafting:-
1.Shape data to make it look the way You want.
2.Possible to evade firewalls and Intrusion detection system.
3.Create scripts around encrypted Packets.
Limits Of NPC:-
1.We can craft only those packets that are allowed by the Network.That means we can not craft packets that violate rules.
2.Learning Curve:-
NPC require a deep understanding of Protocols like TCP/IP, Firewall Rules, Hardware Requirements, and many more.
Now we discuss various evasions and there targets.
1.Firewall Evasion:- Targeting Ports.
2.System Exploit:- Attacks like Denial Of Service(DOS), un-authorized access etc
3.Network Device Exploit:- DOS, Sniffing, invalid access.
4.Intrusion Detection System Evasion:- It relates to change in content or invalid transactions.
No comments:
Post a Comment