From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

xListing sites

xListing sites

From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Start my 1-month free trial

xListing sites

- [Instructor] One way to get malware through the perimeter is to have a user reach out to a website and invite it in. This happens when the web server has been compromised and the user browser has an exploitable vulnerability. There are two key techniques to reduce the threat from malicious websites. The first technique is blacklisting. The perimeter web proxy maintains a list of known malicious websites. And when a user makes a request, it's checked against the list. If the website is on the list, the user connection is rejected. Blacklisting can only protect against the malicious websites that are known, not those that have yet to be included on the list. The second technique is whitelisting. This is where the web proxy maintains a list of known good sites and only lets connections through to those sites. This is a more effective technique than blacklisting, as it's much easier to keep the whitelist complete and up to date than the blacklist.

Contents