Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and the IDS will not spot the true nature of the fully assembled datagram The datagram is not reassembled

What is this technique called?

Equizzing
    Privacy Policy

© 2025 Equizzing