Firewall / IDS Evasion and Spoofing
SWITCH | EXAMPLE | DESCRIPTION |
---|---|---|
-f | nmap 192.168.1.1 -f | Requested scan (including ping scans) use tiny fragmented IP packets. Harder for packet filters |
-mtu | nmap 192.168.1.1 -mtu 32 | Set your own offset size |
-D | nmap -D 192.168.1.101,192.168.1.102,192.168.1.103,192.168.1.23 192.168.1.1 | Send scans from spoofed IPs |
-D | nmap -D decoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip | Above example explained |
-S | nmap -S www.microsoft.com www.facebook.com | Scan Facebook from Microsoft (-e eth0 -Pn may be required) |
-g | nmap -g 53 192.168.1.1 | Use given source port number |
-proxies | nmap -proxies http://192.168.1.1:8080, http://192.168.1.2:8080 192.168.1.1 | Relay connections through HTTP/SOCKS4 proxies |
-data-length | nmap -data-length 200 192.168.1.1 | Appends random data to sent packets |
Comments
Related