Interpreting evasion and obfuscation techniques
In this section, we are going to cover the fundamentals of evasion and obfuscation techniques, both of which threat actors such as a hacker will use to go undetected by a security appliance or gain control of a network. Hackers will use various evasion techniques that allow them to bypass security detection on a system or network. If the actions of a threat actor are not detected or reported, the organization will never be aware of a cyberattack within their network. This is one of the driving forces for cybersecurity solution vendors and professionals within the industry: to always ensure their security appliances and solutions are always able to detect a threat and attack as it happens in real time. Without detection, the threat actor can do anything on the victim's network without being caught.
The following are some evasion techniques:
- Flooding: With flooding, the attacker floods a network or security device with...