Evading IDSs,
Firewalls, and
Honeypots
CEH EXAM OBJECTIVES COVERED
IN THIS CHAPTER:
✓ III. Security
■ Vulnerabilities
✓ IV. Tools/Systems/Programs
■ O. Operating environments
■ Q. Log analysis tools
■ S. Exploitation tools
Chapter
16
Evading IDSs,
Firewalls, and
Honeypots
CEH EXAM OBJECTIVES COVERED
IN THIS CHAPTER:
✓ III. Security
■ Vulnerabilities
✓ IV. Tools/Systems/Programs
■ O. Operating environments
■ Q. Log analysis tools
■ S. Exploitation tools
Chapter
16