Talk With an Expert

Beating the IPS

Beating the IPS (PDF, 8.09MB)Published: 12 Mar, 2013
Created by
Michael Dyrmose

This paper introduces various Intrusion Prevention System (IPS) evasion techniques and shows how they can be used to successfully evade detection by widely used products from major security vendors. By manipulating the header, payload, and traffic flow of a well-known attack, it is possible to trick the IPS inspection engines into passing the traffic - allowing the attacker shell access to the target system protected by the IPS.