Reader challenge

For this section, review the information from the chapter and try and expand on the topics. This will allow you to increase your knowledge on the different topics. To stimulate your thinking, try some of the following topics:

  • Build a Snort machine—practice the different techniques we discussed and record any data that you can create and/or generate that can bypass the detection capability of Snort. Once you have successfully evaded the tool, draft a script that can create the evasion capability, so it is available for any of your future testing endeavors.
  • The next challenge is to build a firewall machine, customize a number of different streams of packets, and determine which are effective at penetrating the firewall. It is important ...

Get Advanced Penetration Testing for Highly-Secured Environments - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.