Beating the IPS

This paper introduces various Intrusion Prevention System (IPS) evasion techniques and shows how they can be used to successfully evade detection by widely used products from major security vendors. By manipulating the header, payload, and traffic flow of a well-known attack, it is possible to...
By Michael Dyrmose
March 12, 2013

All papers are copyrighted. No re-posting of papers is permitted