This presentation discusses how to evade detection by network intrusion detection systems (NIDS) at each stage of the cyber kill chain. We provide a primer on Snort rules, which are commonly used NIDS rules, and identify potential indicators that might trigger alerts from NIDS. We also discuss evasion strategies that can be used to avoid detection.
-
Notifications
You must be signed in to change notification settings - Fork 0
NIDS Evasion Strategies following the MITRE framework
License
IMRO832000/NIDS-EVASION
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
NIDS Evasion Strategies following the MITRE framework
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published