If a person with malicious intent were to get into your netw
If a person with malicious intent were to get into your network and have read/write access to your IDS log or rule set how could they use that information to their advantage?
Solution
If a person with malicious intent get to ead/write access to your IDS log or rule set, would have the same right as an administrator, therefore having the right to modify, adjust and re-write rules, In order to be able to launch new attacks on network. Also the person can adjust the rule set to have te identity not being capture by the IDS, This can be done by altering for example ports that should be used for packet sniffing and intrusion detection.
