Attackers split a malicious payload into smaller, overlapping packets. If the IDS does not properly reassemble the fragments before inspection, it misses the attack, while the target server successfully reassembles and executes it. Unicode / Obfuscation:

Attackers insert deliberate delays between sending portions of a request. If the delay exceeds the reassembly timeout of the IDS, the system stops tracking the session and fails to see the complete exploit. False Positive Generation:

An IDS inspects inbound and outbound network traffic for suspicious activities and known threats. Attackers use several methods to bypass these checks: TrustEd Institute Packet Fragmentation:

Attackers encode malicious strings into Unicode or alternative hex schemas. Many web servers (like IIS) automatically decode and execute these, while basic signature-based IDS devices fail to recognize the obfuscated pattern. Session Splicing:

Looking beyond header structures and inspecting the raw data payloads of encrypted and compressed files. Behavioral Analysis:

Manipulating packet headers or specifying the exact path a packet should take through a network to avoid going through the firewall's strict inspection nodes. Exploiting Open/Ignored Ports:

Leave a Reply