Variety of basic and advanced scanning techniques for networks and hosts
Intrusion Detection Systems (IDS)
Network Intrusion Detection (NIDS)
Network Intrusion Prevention (NIPS)
Host Intrusion Detection (HIDS)
Host Intrusion Prevention (HIPS)
IDS Evasion Techniques:
Players:
Masquerader - Where a malicious actor illegitimately poses as an authorized entity to gain access to a system
Misfeasor - Where the malicious actor is authorized user but misuses the granted access and privilege
Clandestine User - Where a malicious actor who has supervisory control of the system uses this control to evade auditing and access controls or to suppress audit collection