Explore how to evade intrusion detection systems, firewalls, and honeypots. Examine the use of Nmap to evade firewalls and how to set up a honeypot.
Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots
- describe IDS, firewalls, and honeypots and use Nmap to evade firewalls
- describe a honeypot setup and scan against it to potentially see inbound traffic