Firewall / IDS Evasion and Spoofing Flashcards
Requested scan (including ping scans) use tiny fragmented IP packets. Harder for packet filters
-f
nmap 192.168.1.1 -f
Set your own offset size
–mtu
nmap 192.168.1.1 –mtu 32
Send scans from spoofed IPs
-D
nmap -D 192.168.1.101,192.168.1.102,
192.168.1.103,192.168.1.23 192.168.1.1
Explained:
nmap -D decoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip
Scan Facebook from Microsoft (-e eth0 -Pn may be required)
-S
nmap -S www.microsoft.com www.facebook.com
Use given source port number
-g
nmap -g 53 192.168.1.1
Relay connections through HTTP/SOCKS4 proxies
–proxies
nmap –proxies http://192.168.1.1:8080, http://192.168.1.2:8080 192.168.1.1
Appends random data to sent packets
–data-length
nmap –data-length 200 192.168.1.1
Example IDS Evasion command
nmap -f -t 0 -n -Pn –data-length 200 -D 192.168.1.101,192.168.1.102,192.168.1.103,192.168.1.23 192.168.1.1