Abstract
Instead of using classical evasion techniques which uses the limitations of TCP/IP implimentation, Legimency uses newer techniques of Exploitation, which are highly effective, easy to code and tuff for IPS/IDS vendors to stop.
Instead of using classical evasion techniques which uses the limitations of TCP/IP implimentation, Legimency uses newer techniques of Exploitation, which are highly effective, easy to code and tuff for IPS/IDS vendors to stop.