Which technique involves generating a series of tiny fragments with overlapping TCP sequence numbers to evade detection?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which technique involves generating a series of tiny fragments with overlapping TCP sequence numbers to evade detection?

Explanation:
IDS evasion is about bypassing intrusion detection systems by manipulating how traffic is presented so it isn’t analyzed effectively. Generating a series of tiny fragments with overlapping TCP sequence numbers takes advantage of how some NIDS reassemble fragmented packets to inspect the payload. When fragments overlap, later fragments can overwrite earlier data or the reassembly can become inconsistent, causing the IDS to miss the malicious content or misclassify the traffic. This technique targets the detection mechanism itself—fragmentation behavior—rather than the payload encoding. In contrast, ASCII shellcodes or polymorphic shellcode attacks focus on altering the payload to defeat signature or pattern-based detection, not on fragmentation-based evasion.

IDS evasion is about bypassing intrusion detection systems by manipulating how traffic is presented so it isn’t analyzed effectively. Generating a series of tiny fragments with overlapping TCP sequence numbers takes advantage of how some NIDS reassemble fragmented packets to inspect the payload. When fragments overlap, later fragments can overwrite earlier data or the reassembly can become inconsistent, causing the IDS to miss the malicious content or misclassify the traffic. This technique targets the detection mechanism itself—fragmentation behavior—rather than the payload encoding. In contrast, ASCII shellcodes or polymorphic shellcode attacks focus on altering the payload to defeat signature or pattern-based detection, not on fragmentation-based evasion.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy