Firewalls

  1. Firewall Evasion Techniques and Countermeasures
    1. Network-Level Evasion Techniques
      1. IP Address Spoofing
        1. Source Address Manipulation
          1. Reflection Attacks
            1. Amplification Attacks
            2. Packet Fragmentation Attacks
              1. Tiny Fragment Attacks
                1. Overlapping Fragment Attacks
                  1. Fragment Reassembly Issues
                  2. Protocol Manipulation
                    1. TCP Flag Manipulation
                      1. Sequence Number Attacks
                        1. Protocol Tunneling
                      2. Application-Level Evasion Techniques
                        1. HTTP Tunneling
                          1. HTTP CONNECT Method
                            1. HTTP POST Tunneling
                              1. WebSocket Tunneling
                              2. DNS Tunneling
                                1. Data Exfiltration
                                  1. Command and Control
                                    1. Covert Channels
                                    2. Encryption-Based Evasion
                                      1. Encrypted Payloads
                                        1. VPN Evasion
                                          1. Steganography
                                        2. Scanning and Reconnaissance Evasion
                                          1. Port Scanning Techniques
                                            1. Stealth Scans
                                              1. Distributed Scans
                                                1. Slow Scans
                                                2. Fingerprinting Evasion
                                                  1. OS Fingerprinting
                                                    1. Service Fingerprinting
                                                      1. Firewall Detection
                                                    2. Countermeasures and Defense Strategies
                                                      1. Anti-Spoofing Measures
                                                        1. Ingress Filtering
                                                          1. Egress Filtering
                                                            1. Reverse Path Forwarding
                                                            2. Fragment Handling
                                                              1. Fragment Reassembly
                                                                1. Fragment Timeout
                                                                  1. Fragment Limits
                                                                  2. Deep Packet Inspection
                                                                    1. Protocol Validation
                                                                      1. Content Analysis
                                                                        1. Behavioral Analysis
                                                                        2. Rate Limiting and Throttling
                                                                          1. Connection Rate Limiting
                                                                            1. Bandwidth Throttling
                                                                              1. Adaptive Rate Limiting
                                                                              2. SSL/TLS Inspection
                                                                                1. Certificate Validation
                                                                                  1. Decryption Policies
                                                                                    1. Re-encryption
                                                                                    2. Threat Intelligence Integration
                                                                                      1. IOC Matching
                                                                                        1. Reputation Services
                                                                                          1. Behavioral Analytics