Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 3 Question 100 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 100
Topic #: 3
[All CPEH-001 Questions]

Most NIDS systems operate in layer 2 of the OSI model. These systems feed raw traffic into a detection engine and rely on the pattern matching and/or statistical analysis to determine what is malicious. Packets are not processed by the host's TCP/IP stack allowing the NIDS to analyze traffic the host would otherwise discard. Which of the following tools allows an attacker to intentionally craft packets to confuse pattern-matching NIDS systems, while still being correctly assembled by the host TCP/IP stack to render the attack payload?

Show Suggested Answer Hide Answer
Suggested Answer: D

fragroute intercepts, modifies, and rewrites egress traffic destined for a specified host, implementing most of the attacks described in the Secure Networks 'Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection' paper of January 1998. It features a simple ruleset language to delay, duplicate, drop, fragment, overlap, print, reorder, segment, source-route, or otherwise monkey with all outbound packets destined for a target host, with minimal support for randomized or probabilistic behaviour. This tool was written in good faith to aid in the testing of network intrusion detection systems, firewalls, and basic TCP/IP stack behaviour.


Contribute your Thoughts:

Olive
2 months ago
Hmm, D) Fragroute looks like the winner to me. I wonder if the exam question will include a joke about how the attacker can 'fragment' their way to victory.
upvoted 0 times
Sabra
24 days ago
Definitely, it's important to be aware of these tactics to protect against cyber attacks.
upvoted 0 times
...
Shawnta
1 months ago
It's interesting how attackers can use tools like Fragroute to bypass security measures.
upvoted 0 times
...
Emiko
1 months ago
Yeah, Fragroute is designed to confuse pattern-matching NIDS systems.
upvoted 0 times
...
Shenika
1 months ago
I think D) Fragroute is the correct answer.
upvoted 0 times
...
...
Lashaunda
2 months ago
D) Fragroute seems like the right choice here. It's designed to bypass NIDS detection by fragmenting packets in a way that confuses the pattern matching.
upvoted 0 times
Kristin
22 days ago
D) Fragroute seems like the right choice here. It's designed to bypass NIDS detection by fragmenting packets in a way that confuses the pattern matching.
upvoted 0 times
...
Dexter
25 days ago
D) Fragroute
upvoted 0 times
...
Bok
26 days ago
C) Tcpdump
upvoted 0 times
...
Arletta
1 months ago
B) Tcpfrag
upvoted 0 times
...
Cory
1 months ago
A) Defrag
upvoted 0 times
...
...
Emmanuel
2 months ago
I'm not sure, but I think Meaghan's reasoning makes sense. Fragroute could indeed confuse pattern-matching NIDS systems.
upvoted 0 times
...
Reita
2 months ago
I think the answer is D) Fragroute. It allows an attacker to craft packets that can confuse pattern-matching NIDS systems while still being properly assembled by the host TCP/IP stack.
upvoted 0 times
Alecia
25 days ago
It's important to be aware of tools like Fragroute when considering network security.
upvoted 0 times
...
Nina
26 days ago
That's interesting, I didn't know about Fragroute before.
upvoted 0 times
...
Nell
28 days ago
Yes, Fragroute is specifically designed to bypass NIDS systems.
upvoted 0 times
...
Vincenza
29 days ago
I agree, D) Fragroute is the correct answer.
upvoted 0 times
...
Nicolette
1 months ago
D) Fragroute
upvoted 0 times
...
Dan
2 months ago
C) Tcpdump
upvoted 0 times
...
Alyssa
2 months ago
B) Tcpfrag
upvoted 0 times
...
Patria
2 months ago
A) Defrag
upvoted 0 times
...
...
Meaghan
2 months ago
I disagree, I believe the answer is D) Fragroute because it can manipulate packet fragmentation.
upvoted 0 times
...
Han
3 months ago
I think the answer is B) Tcpfrag.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77