Ask and you shall receive (Part 1)
Intro It is really annoying not being able to learn basic information about penetration testing without struggling to locate the proper information. This post is about delivering the payload the proper way, the bible is says ask and you shall receive (again this is basic hacking methodology that most penetration testers don't use). So the question I am going to answer in this post is how can someone deliver his or her exploit payload in order to: A. Bypass: Network Based Intrusion Prevention (IPS). Network Based Intrusion Detection (IDS). Host Based Intrusion Prevention (IPS). Host Based Intrusion Detection (IDS). Network Firewall Device. Web Application Firewalls. Deep Content Inspection Devices. B. Deliver in short amount of time to: Large scale networks Low bandwidth networks (happening not so often). So imagine that your client says to you that you have to test 100 IP's in lets say three days (how can you test for conf...