Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Question about PenTesting and Nmap filter_list
Author
Message
RE: Question about PenTesting and Nmap #2
Many of the firewall evasion techniques nmap provides don't rely so much on "misconfiguration" as they do a lack of a security control(s) being in place. Fragmented packets will only bypass things that don't queue IP fragments, decoy cloaking only bypasses stuff that doesn't implement router path tracing (and a couple other things), spoofing the source port only works on things that allow all traffic through whatever port you specified, etc etc etc.

You can learn about all of this stuff here - https://nmap.org/book/man-bypass-firewalls-ids.html
(This post was last modified: 03-13-2018, 06:36 PM by x n.)

[+] 1 user Likes x n's post
Reply





Messages In This Thread
Question about PenTesting and Nmap - by BinarOper - 03-09-2018, 08:05 PM
RE: Question about PenTesting and Nmap - by x n - 03-13-2018, 06:35 PM



Users browsing this thread: 2 Guest(s)