Penetration testing

SNMP pentesting

In the previous article about SNMP, we have discussed how to set up your own vulnerable lab where we have configured pfSense and VyOS with SNMP misconfigurat

Snort Lab: Rule Performance Analysis

There are various for analyzing Snort rules performance. In this lab, we are going to focus on the one that directly applies to rules: Rule Profiling. With t

Snort Lab: Blinding IDS

IDSs and IPSs can be attacked by generating false positives. If you can generate enough false positives, you can potentially: Overwhelm the IDS console tool

Snort Lab: Custom SCADA Protocol IDS Signatures

In this lab, you are going to learn how to create custom Snort signatures for the Modbus/TCP protocol. [pkadzone zone="main_top"] First, let's take some tim

Snort lab: Payload detection rules (PCRE)

Until now, when we used Snort to look for certain content within the payload, we've always looked for some specific values. What if we wanted to look for som

Snort Session Sniping with FlexResp

Exercise 1: Packet Sniping FlexResp is a keyword used within Snort to snipe or tear down existing connections. The resp keyword is used to close sessions whe

Complete Tour of PE and ELF: Section Headers

In the previous part, we have discussed the ELF and Program Header. In this article, we will cover the remaining part i.e. section headers. We will also see

Complete Tour of PE and ELF: Structure

Since we have completed the PE structure, now it is time to look at the ELF structure which is somewhat easier to understand as compared to PE. For ELF struc

Snort Tracking Exploit Progress with Flowbits

Lab 4: Tracking Exploit Progress with Flowbits So far in our exercises, we used individual rules against specific activities. The flowbits keyword allows sev

Snort Covert Channels

Lab 3: Covert Channels Covert channels are used by outside attackers to establish communications with the compromised system, or by malicious insiders to sec