<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Coverage for New IPS Evasion Techniques in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/coverage-for-new-ips-evasion-techniques/m-p/14747#M10828</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&amp;nbsp; the link below there is a video demostration that show how paloalto doesn't cover ADVANCED EVASION TECHNIQUES&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.antievasion.com/"&gt;http://www.antievasion.com/&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please can you tell me how we can answer to this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Oct 2010 10:08:33 GMT</pubDate>
    <dc:creator>helpdesk</dc:creator>
    <dc:date>2010-10-19T10:08:33Z</dc:date>
    <item>
      <title>Coverage for New IPS Evasion Techniques</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/coverage-for-new-ips-evasion-techniques/m-p/14746#M10827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="p1"&gt;Stonesoft recently reported multiple IPS evasion techniques that can be used to evade detection by IPS/IDS devices. We will be releasing signatures to detect most of the evasions in our content release tomorrow. More details will be posted on this thread.&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p2"&gt;Stonesoft Press Release:&lt;/P&gt;&lt;P class="p3"&gt;&lt;SPAN class="s1"&gt;&lt;A href="http://www.stonesoft.com/en/press_and_media/releases/en/2010/18102010-2.html"&gt;http://www.stonesoft.com/en/press_and_media/releases/en/2010/18102010-2.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p2"&gt;Report from CERT-FI: (CERT-FI is the Finnish Computer Emergency Response Team)&lt;/P&gt;&lt;P class="p3"&gt;&lt;SPAN class="s1"&gt;&lt;A class="active_link" href="http://www.cert.fi/en/reports/2010/vulnerability385726.html"&gt;http://www.cert.fi/en/reports/2010/vulnerability385726.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p3"&gt;&lt;/P&gt;&lt;P class="p3"&gt;Thanks,&lt;BR /&gt;Sandeep&lt;/P&gt;&lt;P class="p3"&gt;&lt;/P&gt;&lt;P class="p3"&gt;Threat Prevention Product Manager, Palo Alto Networks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Oct 2010 18:53:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/coverage-for-new-ips-evasion-techniques/m-p/14746#M10827</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-18T18:53:06Z</dc:date>
    </item>
    <item>
      <title>Re: Coverage for New IPS Evasion Techniques</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/coverage-for-new-ips-evasion-techniques/m-p/14747#M10828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&amp;nbsp; the link below there is a video demostration that show how paloalto doesn't cover ADVANCED EVASION TECHNIQUES&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.antievasion.com/"&gt;http://www.antievasion.com/&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please can you tell me how we can answer to this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Oct 2010 10:08:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/coverage-for-new-ips-evasion-techniques/m-p/14747#M10828</guid>
      <dc:creator>helpdesk</dc:creator>
      <dc:date>2010-10-19T10:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: Coverage for New IPS Evasion Techniques</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/coverage-for-new-ips-evasion-techniques/m-p/14748#M10829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="p2"&gt;We have coverage for known evasion techniques or any combination thereof. I don't have full details on the test that was conducted in the demo e.g., what were the evasions used, what was the content release version on our device etc. as such I cannot comment specifically on the test. However, we did identify some new evasions, coverage for which are being added in today's content release. &lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p2"&gt;Let me know if you have any further questions,&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p2"&gt;Thanks,&lt;/P&gt;&lt;P class="p2"&gt;Sandeep&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Oct 2010 17:21:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/coverage-for-new-ips-evasion-techniques/m-p/14748#M10829</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-19T17:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: Coverage for New IPS Evasion Techniques</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/coverage-for-new-ips-evasion-techniques/m-p/14749#M10830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;TITLE&gt;&lt;/TITLE&gt;&lt;/P&gt;&lt;P class="p1"&gt;Addendum to my earlier reply...&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;The test conducted by Stonesoft used some evasions for which we did not have coverage for (which is obvious otherwise we would have triggered on the attack. Mea Culpa.) Coverage for those evasions was added in a couple of days in content release 212. Having said that, I would like to reiterate that we have coverage for both standard evasions and a combination of evasions (being called as AETs or advanced evasion techniques). I would also like to make it clear that AETs are not something new, in fact these are old techniques packaged with a new terminology e.g., it is common to see HTTP-based exploits using small TCP byte segments (TCP stream segmentation evasion) along with fragmented IP packets (IP Fragmentation evasion).&lt;/P&gt;&lt;P class="p2"&gt;&lt;/P&gt;&lt;P class="p1"&gt;NSS Labs, an independent testing lab, tested our product a few months back for security effectiveness and found that we had 100% coverage for evasions. Note that NSS Labs conducted a similar test last year when they tested IPS products from several vendors (including Stonesoft) and Stonesoft failed on 3 evasion tests (TCP Stream Segmentation, RPC Fragmentation and URL Obfuscation). Full disclosure in that they did pass 2 evasion tests (IP Fragmentation and FTP Evasion). From an overall security effectiveness, we blocked 93.4% attacks that were thrown at our device. Stonesoft in a similar test blocked only 62.9% attacks. Also, new evasions and vulnerabilities are discovered regularly e.g., yesterday Adobe released a security advisory for a critical zero-day vulnerability in Adobe Flash Player. We released a signature to cover that attack earlier today which will drop any malicious traffic.&lt;/P&gt;&lt;P class="p2"&gt;&lt;/P&gt;&lt;P class="p1"&gt;Ultimately, it is the timeliness and overall quality of signatures that matters.&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;If there are questions, please feel free to ask.&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;Thanks,&lt;BR /&gt;Sandeep &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Oct 2010 01:28:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/coverage-for-new-ips-evasion-techniques/m-p/14749#M10830</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-30T01:28:31Z</dc:date>
    </item>
  </channel>
</rss>

