FW / IDS / IPS Evasion
1. -f (Fragment packets); --mtu (Using specified MTU)
nmap -f 192.168.1.1nmap --mtu 1280 192.168.1.1
2. -D [,][,ME][,...] (Cloak a scan with decoys)
nmap -D RND,ME,192.168.1.2,192.168.1.3 192.168.1.1
3. -S <IP_Address> (Spoof source address)
nmap -S 10.0.0.100 192.168.1.1
4. -e (Use specified interface)
5. --source-port ; -g (Spoof source port number)
6. --data (Append custom binary data to sent packets)
7. --data-string (Append custom string to sent packets)
8. --data-length (Append random data to sent packets)
9. --ip-options <R|S [route]|L [route]|T|U ... > (Send packets with specified IP options)
10. --ttl (Set IP time-to-live field)
11. --randomize-hosts (Randomize target host order)
12. --spoof-mac <MAC address, prefix, or vendor name> (Spoof MAC address)
13. --proxies (Relay TCP connections through a chain of proxies)
14. --badsum (Send packets with bogus TCP/UDP checksums)
15. --adler32 (Use deprecated Adler32 for SCTP checksums)
Last updated