Chapter 9: System Protection and Perseverance
In this chapter, we are going to focus our attention on how defense mechanisms work and by understanding how they work, you can learn what techniques you can use to bypass them. We will start by learning about intrusion detection systems and their different types. After that, we will learn about detection mechanisms. Once we understand these mechanisms, we will try to bypass them using our tools. In summary, this chapter will focus on the following topics:
- System protection
- Intrusion detection methods
- Detection mechanisms
- Bypassing IDSes