Firewall evasion
Nmap
-f
indicates to Nmap to fragment the IP packet, in order to bypass firewall filters that may block large packets. When this switch is enabled, Nmap sends IP packets smaller than the maximum allowable packet size, which makes it harder for firewall filters to detect scanning activities.-sI
lets you perform a Zombie scan by choosing any of the live IPs that you have obtained from the host discovery phase. This lets you spoof the source IP address to pretend being another host on the network. In this example, we are pretending to be the 10.10.1.22 when scanning the 10.10.1.11.-g
permits you to specify the source port-g 53
from which you would like to initiate the scan. This is useful when the firewall rule is configured in a way that only traffic generated from a specific port is allowed.-sT
Use this switch to evade firewall and discover hidden networks (full tcp scan with -ST).sudo nmap --script=firewalk --traceroute 172.19.19.7
Bypass firewall with this nmap script
Last updated