O'Reilly logo

Python for Offensive PenTest by Hussam Khrais

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Bypassing IPS with handmade XOR encryption

In this section, we will build a simple XOR encryption in Python. Now, traffic encryption is one of the most powerful techniques to evade network analyzer or IPS sensors but first, before jumping into the coding part, let's have a quick overview on how these devices work in the first place.

Generally speaking, these devices can operate in two modes: the first mode, which is the signature-based mode, where it inspects the packet parameters and data payloads, which are passing through the sensor. Then, similar to an antivirus, it checks whether there is any match against its signature database and based on the action specified for the matched rule, it may drop or log the traffic. The second mode is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required