Bypassing SNORT IDs

Bypassing SNORT IDs

Using techniques like double-encoding and hashing