Hackerszone
Welcome Guest,
learn to hack easily with tutorials, python, notepad hacks and more!
Join today, fast and free!

Are you new to hacking? Learn the basics in computer configuration, hacking tools, and hacker terminology all found here on this forum!

Join today!!

Join the forum, it's quick and easy

Hackerszone
Welcome Guest,
learn to hack easily with tutorials, python, notepad hacks and more!
Join today, fast and free!

Are you new to hacking? Learn the basics in computer configuration, hacking tools, and hacker terminology all found here on this forum!

Join today!!
Hackerszone
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Search
 
 

Display results as :
 

 


Rechercher Advanced Search

HZ Tracker
Hacking Widget Visitor Details
Latest topics
»  How to study to understand and apply RPA?
Evading firewalls with NMAP EmptyTue Feb 02, 2021 7:12 am by manas41

» SQL injection and Quote escaping
Evading firewalls with NMAP EmptySun Jun 28, 2015 11:42 am by ADS1

» [TUT] Chmod: Files & Permissions [TUT]
Evading firewalls with NMAP EmptyThu Jun 04, 2015 12:45 pm by Guest

» Reaver pixiewps
Evading firewalls with NMAP EmptyThu Jun 04, 2015 12:23 pm by voidfletcher

» How To Crash Someone's Skype in 10 SECONDS
Evading firewalls with NMAP EmptyThu Jun 04, 2015 12:20 pm by voidfletcher

» Internet Security & IP Security (IPSec)
Evading firewalls with NMAP EmptyMon May 18, 2015 9:00 pm by voidfletcher

» [Python] Infinite / Definite File Generator
Evading firewalls with NMAP EmptyMon May 18, 2015 8:58 pm by ADS1

» [C#] String Case-Inversion
Evading firewalls with NMAP EmptyMon May 18, 2015 8:57 pm by ADS1

» Rekall Memory Forensic Framework
Evading firewalls with NMAP EmptySat May 16, 2015 8:55 pm by ADS1

Who is online?
In total there are 7 users online :: 0 Registered, 0 Hidden and 7 Guests

None

[ View the whole list ]


Most users ever online was 38 on Sun Mar 19, 2023 10:07 pm

Evading firewalls with NMAP

Go down

Evading firewalls with NMAP Empty Evading firewalls with NMAP

Post by Admin Sun Apr 20, 2014 9:56 pm

Basic NMAP Firewall evasion tutorial

NMAP(Network mapper) Is a powerful tool with many uses. It can fingerprint OS(Operating systems), Versions, firewalls, Ports, And services. This is a pentesters greatest tool. Why? The versions Determine the loopholes.

This being said, Its enemy is the well known firewall. Lets get started.

How to detect firewalls.
You can do this by sending SYN packets. This is not recommended as it will create a log. What you can do is send ACK Packets as it does not create a log. They are responses of SYN Packets. ACK is known as (-sA)

Nmap -sA (Your host here)

If it comes up as unfiltered, Your good to go. If it comes up as filtered, Your host the firewall.

How to evade
There are several methods. My first example is fragmenting packets. This method will work if your host cannot handle large packets. If it cant, Then you will be able to evade the firewall.

Command : nmap -ff

]Nmap NSE scripts
There are several hundreds of NSE Scripts already written. What more can you ask for? There are hundreds for different reasons and they can do many different things. If I can remember right, You can edit scripts in Perl and LUA For your scripts to be even more efficient. They are very powerful. You can find the NSE Scripts with the command : Locate*NSE

Note, I got the firewall evasion script off Google as its hard to memorize.

Command : nmap -f --script=firewall-bypass.nse (Your host here).

Use decoy address
With this command, You can spoof packets from other hosts. There will be excess amounts of IP Addresses(Including yours). But as there is so many it won be able to tell who started the scan.

Command : nmap -D RND:10 (your host here)

There is another command what I came across on Google which lets you input the IP Addresses.

Command : nmap -D decoy1,decoy2,decoy3

Source port number
Well this is simple to understand. When a firewall gets configured, It can allow certain ports to access incoming traffic.

Command : nmap -Source -port

There are some common ports what will be open. The type of host will determine what ports are open.

Spoofing MAC Address
NMAP Can allocate a random MAC Address or you can input a MAC Address on the network. This is dependant on vendor name.

Command : nmap -spoof-mac cisco (your host here).

Maximum transmission unit
And the last one of this tutorial, Setting a MTU. This is basically fragmenting packets, Except you choose the MTU of the packet. So if we give it 16 byte packets it cannot process it and the firewall will go weird and then its prime to be evaded.
IMPORTANT : the byte if the packet you allocate can only be a multiple of 8.

Command : nmap -mtu number (your host here).

Well that concludes everything here. Feedback would be nice. If you need further help PM Me.

Admin
Coder
Coder

Posts : 101
Join date : 2014-04-07

https://thehackerszone.forumotion.com

Back to top Go down

Back to top


 
Permissions in this forum:
You cannot reply to topics in this forum