Firewall and IDS/IPS Evasion

To determine firewall rules the -sA scan is very useful

Detecting the presence of IDS or IPS systems may get your IP blocked. It's useful to have multiple VPS boxes with different IPs to perform the pentesting from.

Decoys

Flag: -D

Generates random IP addresses (for example 5: -D RND:5) and uses them as sender addresses in the TCP headers in addition to our own actual address.

For good measure and to not get detected as a SYN Flood the IP addresses used should be alive.

It's possible to manually specify the source IP address with: -S usually with -e tun0 to specify the interface

Decoys can be used for SYN, ACK, ICMP scans, and OS detection scans

DNS Proxying

DNS usually uses port 53/UDP but some modern specifications also use 53/TCP (Zone transfer, DNSSEC).

For this, we can use port 53 as our own source port to be more highly trusted by some not perfectly setup IDS/IPS

--source-port 53

Last updated