Summary
In this chapter, we learned how to set up firewall rules in pfSense and monitor our traffic so that we can learn what type of activity is loud and which type is not. We also discussed how an IDS works and how we can take advantage of that knowledge to avoid detection when performing our scans, starting social engineering campaigns, or simply assessing a web application.
We discussed traffic patterns and how attempting to match the traffic will assist in avoiding detection; after all, if all of the information looks the same how can anyone determine what is legitimate and what is not.
Also discussed were various strategies of how detection avoidance may be possible if testing in a strategic and well thought-out manner. In closing, the mindset necessary to effectively and efficiently avoid detection was touched upon as well.
In the next chapter, we will take a look at data collection tools and reporting. This is an important aspect of penetration testing and as such should not be overlooked...