Firewall/IDS Evasion

Proxies

Rotating Proxy Service

  • There are a lot services out there that will sell you rotating proxies (Google "rotating proxies").

  • The way it works is that you get an single IP addresses to connect through, and that IP connects out to the Internet using any number of randomly rotating proxies.

nmap -sX -proxy http://1.1.1.1:1080 -iL targetlist.txt

Proxychains

proxychains nmap -v -T4 -sX 1.2.3.4
  • You can use TOR Nodes.

  • You have multiple ways to configure your proxy connection with proxychains.

Decoy Scan (Noisy)

  • Spoof addresses in the network

nmap -D RND:10 -sS <domain>

Fragmented packets

Badchecksums

  • The TCP/IP Protocol uses "checksums" to ensure data integrity.

  • By crafting packets with incorrect checksum information, we might be able to trick the target host into sending a response.

Changing data length

  • If you are going to experiment with this, try scanning a single port that you know is open 80 or 443 and play with it.

Styling Nmap Results

Last updated