BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 3 Question 100 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 100
Topic #: 3
[All CPEH-001 Questions]

Most NIDS systems operate in layer 2 of the OSI model. These systems feed raw traffic into a detection engine and rely on the pattern matching and/or statistical analysis to determine what is malicious. Packets are not processed by the host's TCP/IP stack allowing the NIDS to analyze traffic the host would otherwise discard. Which of the following tools allows an attacker to intentionally craft packets to confuse pattern-matching NIDS systems, while still being correctly assembled by the host TCP/IP stack to render the attack payload?

Show Suggested Answer Hide Answer
Suggested Answer: D

fragroute intercepts, modifies, and rewrites egress traffic destined for a specified host, implementing most of the attacks described in the Secure Networks 'Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection' paper of January 1998. It features a simple ruleset language to delay, duplicate, drop, fragment, overlap, print, reorder, segment, source-route, or otherwise monkey with all outbound packets destined for a target host, with minimal support for randomized or probabilistic behaviour. This tool was written in good faith to aid in the testing of network intrusion detection systems, firewalls, and basic TCP/IP stack behaviour.


Contribute your Thoughts:

Olive
28 days ago
Hmm, D) Fragroute looks like the winner to me. I wonder if the exam question will include a joke about how the attacker can 'fragment' their way to victory.
upvoted 0 times
Sabra
21 hours ago
Definitely, it's important to be aware of these tactics to protect against cyber attacks.
upvoted 0 times
...
Shawnta
9 days ago
It's interesting how attackers can use tools like Fragroute to bypass security measures.
upvoted 0 times
...
Emiko
10 days ago
Yeah, Fragroute is designed to confuse pattern-matching NIDS systems.
upvoted 0 times
...
Shenika
14 days ago
I think D) Fragroute is the correct answer.
upvoted 0 times
...
...
Lashaunda
1 months ago
D) Fragroute seems like the right choice here. It's designed to bypass NIDS detection by fragmenting packets in a way that confuses the pattern matching.
upvoted 0 times
Dexter
2 days ago
D) Fragroute
upvoted 0 times
...
Bok
3 days ago
C) Tcpdump
upvoted 0 times
...
Arletta
9 days ago
B) Tcpfrag
upvoted 0 times
...
Cory
10 days ago
A) Defrag
upvoted 0 times
...
...
Emmanuel
1 months ago
I'm not sure, but I think Meaghan's reasoning makes sense. Fragroute could indeed confuse pattern-matching NIDS systems.
upvoted 0 times
...
Reita
1 months ago
I think the answer is D) Fragroute. It allows an attacker to craft packets that can confuse pattern-matching NIDS systems while still being properly assembled by the host TCP/IP stack.
upvoted 0 times
Alecia
2 days ago
It's important to be aware of tools like Fragroute when considering network security.
upvoted 0 times
...
Nina
3 days ago
That's interesting, I didn't know about Fragroute before.
upvoted 0 times
...
Nell
5 days ago
Yes, Fragroute is specifically designed to bypass NIDS systems.
upvoted 0 times
...
Vincenza
6 days ago
I agree, D) Fragroute is the correct answer.
upvoted 0 times
...
Nicolette
17 days ago
D) Fragroute
upvoted 0 times
...
Dan
26 days ago
C) Tcpdump
upvoted 0 times
...
Alyssa
29 days ago
B) Tcpfrag
upvoted 0 times
...
Patria
1 months ago
A) Defrag
upvoted 0 times
...
...
Meaghan
2 months ago
I disagree, I believe the answer is D) Fragroute because it can manipulate packet fragmentation.
upvoted 0 times
...
Han
2 months ago
I think the answer is B) Tcpfrag.
upvoted 0 times
...

Save Cancel