Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How likely is it that something like that trick makes IDS go crazy?


Probably moderate with this specific technique, but I imagine you could use some simpler method where each end of the transfer is willing to share their public IP. This would reduce the problem to UDP hole punching/scanning across some pre-defined port range and then running whatever traffic you need through that pipe. I feel like this would look less "suspicious" to an IDS than crafting odd-looking ICMP packets.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: