Module 16: Evading IDS, Firewalls, and Honeypots

INTRODUCTION What tools are used in Ethical hacking, to detect and prevent intrusions? What are they exactly? How do hackers evade security measures? This module explains this topic. Intrusion Detection Systems IDS systems can be software based or hardware based. While some available are simple software applications, others are high-end hardware-based products. No matter with [...]

Back to: Certified Ethical Hacker v10