Complete the Tables and Lists from Memory
Print a copy of Appendix D, “Memory Tables,” (found on the CD), or at least the section for this chapter, and complete the tables and lists from memory. Appendix E, “Memory Tables Answer Key,” also on the CD, includes completed tables and lists to check your work.
Evasion Technique |
Example |
Evasion Tool |
Traffic Fragmentation |
IP Fragmentation |
Fragroute, fragrouter |
Timing Attack |
Slow Reconnaissance scan |
Nmap |
Encryption and Tunneling |
Attacks GRE or SSL Tunnel |
Any encrypted protocol |
Resource Exhaustion |
TCP Flooding |
Stick |