Nmap and Network Scanning

  1. Firewall and IDS Evasion
    1. Evasion Fundamentals
      1. Detection Mechanisms
        1. Signature Avoidance
          1. Behavioral Camouflage
          2. Packet Fragmentation (-f)
            1. IP Fragment Creation
              1. Fragment Size Control
                1. Reassembly Challenges
                2. Custom MTU (--mtu)
                  1. Maximum Transmission Unit
                    1. Fragment Size Specification
                      1. Network Path Considerations
                      2. Decoy Scanning (-D)
                        1. Multiple Source IPs
                          1. Decoy Selection Strategies
                            1. Traffic Obfuscation
                              1. Anonymity Considerations
                              2. Source Port Manipulation
                                1. Source Port Spoofing (-g, --source-port)
                                  1. Trusted Port Usage
                                    1. Firewall Rule Bypass
                                    2. Data Padding
                                      1. Random Data Appending (--data-length)
                                        1. Packet Size Variation
                                          1. Signature Disruption
                                          2. IP Options Manipulation
                                            1. Record Route (--ip-options RR)
                                              1. Loose Source Routing (--ip-options L)
                                                1. Strict Source Routing (--ip-options S)
                                                  1. Timestamp Option (--ip-options T)
                                                  2. MAC Address Spoofing (--spoof-mac)
                                                    1. Source MAC Modification
                                                      1. Local Network Evasion
                                                        1. Switch Table Manipulation
                                                        2. Protocol-Specific Evasion
                                                          1. TCP Flag Manipulation
                                                            1. Sequence Number Randomization
                                                              1. Window Size Variation
                                                              2. Timing-Based Evasion
                                                                1. Slow Scanning
                                                                  1. Random Delays
                                                                    1. Traffic Pattern Disruption
                                                                    2. Advanced Evasion Techniques
                                                                      1. Proxy Chains
                                                                        1. Tor Network Usage
                                                                          1. VPN Tunneling