Peter works as a lead penetration tester in a security service firm named Xsecurity. Recently, Peter was assigned a white-box pen test assignment testing the security of an IDS system deployed by a client. During the preliminary information gathering, Peter discovered the TTL to reach the IDS system from his end is 30. Peter created a Trojan and fragmented it in to 1-character packets using the Colasoft packet builder tool. He then used a packet flooding utility to bombard the IDS with these fragmented packets with the destination address of a target host behind the IDS whose TTL is 35.
What is Peter trying to achieve?
A . Peter is trying to bypass the IDS system using a Trojan
B . Peter is trying to bypass the IDS system using the broadcast address
C . Peter is trying to bypass the IDS system using the insertion attack
D . Peter is trying to bypass the IDS system using inconsistent packets
Answer: D
Leave a Reply