hacktricks/generic-methodologies-and-resources/pentesting-network/ids-evasion.md

72 lines
4.4 KiB
Markdown
Raw Normal View History

2022-04-28 16:01:33 +00:00
<details>
2024-02-11 02:13:58 +00:00
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
Njia nyingine za kusaidia HackTricks:
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
* Ikiwa unataka kuona **kampuni yako inatangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Pata [**swag rasmi ya PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**The PEASS Family**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@hacktricks_live**](https://twitter.com/hacktricks_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
2022-04-28 16:01:33 +00:00
</details>
2024-02-11 02:13:58 +00:00
# **Udanganyifu wa TTL**
2024-02-11 02:13:58 +00:00
Tuma baadhi ya pakiti na TTL ya kutosha kufika kwenye IDS/IPS lakini sio ya kutosha kufika kwenye mfumo wa mwisho. Kisha, tuma pakiti nyingine na mfuatano sawa na zingine ili IPS/IDS ifikirie kuwa ni kurudia na isizichunguze, lakini kwa kweli zinabeba maudhui mabaya.
2024-02-11 02:13:58 +00:00
**Chaguo la Nmap:** `--ttlvalue <thamani>`
2024-02-11 02:13:58 +00:00
# Kuepuka saini
2024-02-11 02:13:58 +00:00
Ongeza tu data taka kwenye pakiti ili saini ya IPS/IDS isiepukwe.
2024-02-11 02:13:58 +00:00
**Chaguo la Nmap:** `--data-length 25`
2024-02-11 02:13:58 +00:00
# **Pakiti Zilizogawanywa**
2024-02-11 02:13:58 +00:00
Gawanya tu pakiti na utume. Ikiwa IDS/IPS haina uwezo wa kuziunganisha tena, zitafika kwenye mwenyeji wa mwisho.
2024-02-11 02:13:58 +00:00
**Chaguo la Nmap:** `-f`
2024-02-11 02:13:58 +00:00
# **Checksum** _**isiyofaa**_
2024-02-11 02:13:58 +00:00
Sensori kawaida hazihesabu checksum kwa sababu za utendaji. Kwa hivyo, mshambuliaji anaweza kutuma pakiti ambayo ita **tafsiriwa na sensori lakini kukataliwa na mwenyeji wa mwisho.** Mfano:
2024-02-11 02:13:58 +00:00
Tuma pakiti na bendera RST na checksum isiyofaa, kwa hivyo, IPS/IDS inaweza kufikiria kuwa pakiti hii inafunga uhusiano, lakini mwenyeji wa mwisho atatupa pakiti kwa sababu checksum ni batili.
2024-02-11 02:13:58 +00:00
# **Chaguo za IP na TCP zisizo kawaida**
2024-02-11 02:13:58 +00:00
Sensori inaweza kupuuza pakiti zenye bendera na chaguo fulani zilizowekwa ndani ya vichwa vya IP na TCP, wakati mwenyeji wa marudio anakubali pakiti mara tu zinapopokelewa.
2024-02-11 02:13:58 +00:00
# **Kuambatana**
2024-02-11 02:13:58 +00:00
Inawezekana kwamba unapogawanya pakiti, aina fulani ya kuambatana ipo kati ya pakiti (labda herufi 8 za kwanza za pakiti 2 zinaambatana na herufi 8 za mwisho za pakiti 1, na herufi 8 za mwisho za pakiti 2 zinaambatana na herufi 8 za kwanza za pakiti 3). Kisha, ikiwa IDS/IPS inaziunganisha tena kwa njia tofauti na mwenyeji wa mwisho, pakiti tofauti itaingiliwa.\
Au labda, pakiti 2 zenye offset sawa zinakuja na mwenyeji lazima achague ipi inayochukua.
2024-02-11 02:13:58 +00:00
* **BSD**: Ina upendeleo kwa pakiti zenye _offset_ ndogo. Kwa pakiti zenye offset sawa, itachagua ya kwanza.
* **Linux**: Kama BSD, lakini inapendelea pakiti ya mwisho yenye offset sawa.
* **Ya kwanza** (Windows): Thamani ya kwanza inayokuja, ndiyo inayobaki.
* **Ya mwisho** (cisco): Thamani ya mwisho inayokuja, ndiyo inayobaki.
2024-02-11 02:13:58 +00:00
# Zana
* [https://github.com/vecna/sniffjoke](https://github.com/vecna/sniffjoke)
2022-04-28 16:01:33 +00:00
<details>
2024-02-11 02:13:58 +00:00
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
Njia nyingine za kusaidia HackTricks:
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
* Ikiwa unataka kuona **kampuni yako inatangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Pata [**swag rasmi ya PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**The PEASS Family**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@hacktricks_live**](https://twitter.com/hacktricks_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
2022-04-28 16:01:33 +00:00
</details>