Firewall / IDS Evasion and Spoofing Flashcards

1
Q

Requested scan (including ping scans) use tiny fragmented IP packets. Harder for packet filters

A

-f

nmap 192.168.1.1 -f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Set your own offset size

A

–mtu

nmap 192.168.1.1 –mtu 32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Send scans from spoofed IPs

A

-D

nmap -D 192.168.1.101,192.168.1.102,
192.168.1.103,192.168.1.23 192.168.1.1

Explained:
nmap -D decoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scan Facebook from Microsoft (-e eth0 -Pn may be required)

A

-S

nmap -S www.microsoft.com www.facebook.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Use given source port number

A

-g

nmap -g 53 192.168.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Relay connections through HTTP/SOCKS4 proxies

A

–proxies

nmap –proxies http://192.168.1.1:8080, http://192.168.1.2:8080 192.168.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Appends random data to sent packets

A

–data-length

nmap –data-length 200 192.168.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Example IDS Evasion command

A

nmap -f -t 0 -n -Pn –data-length 200 -D 192.168.1.101,192.168.1.102,192.168.1.103,192.168.1.23 192.168.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly