Which of the following tools allows an attacker to intentionally craft packets to confuse pattern-matching NIDS systems…?
How can an attacker disguise his buffer overflow attack signature such that there is a greater probability of his attack going undetected by the IDS?