
172 Chapter 5 • Hacking Techniques and Tools
which a breach of system security can occur in relative silence.These
attacks will typically be conducted using IP fragmentation when you
subject an IDS to a series of IP fragments it will often times cause the
IDS to lose its place and not only ignore the current packet, but addi-
tional packets as well.This style of attack will be conducted until the
intruder gives up or successful penetration of the target system occurs.
After the reconnaissance has been completed, the skilled intruder will
bide his time and carefully review the results.Through these varying snap-
shots taken of the target system, a larger ...