IDS/IPS Evasion
Stalking isn't that easy.
Firewall Detection
Testing Firewall rules (Using ACK scan)
└──╼ $ sudo nmap 10.10.10.10 -p 21,22,25 -sS -Pn -n --disable-arp-ping --packet-trace
SENT (0.0278s) TCP 10.10.14.2:57347 > 10.10.2.10:21 S .. <SNIP> ..
SENT (0.0278s) TCP 10.10.14.2:57347 > 10.10.10.10:22 S .. <SNIP> ..
SENT (0.0278s) TCP 10.10.14.2:57347 > 10.10.10.10:25 S .. <SNIP> ..
RCVD (0.0329s) ICMP [10.10.10.10 > 10.10.14.2 Port 21 unreachable (type=3/code=3) ] .. <SNIP> ..
RCVD (0.0341s) TCP 10.10.10.10:22 > 10.10.14.2:57347 SA .. <SNIP> ..
RCVD (1.0386s) TCP 10.10.10.10:22 > 10.10.14.2:57347 SA .. <SNIP> ..
SENT (1.1366s) TCP 10.10.14.2:57348 > 10.10.10.10:25 S .. <SNIP> ..
PORT STATE SERVICE
21/tcp filtered ftp
22/tcp open ssh
25/tcp filtered smtp
MAC Address: DE:AD:00:00:BE:EF (Intel Corporate)IDS/IPS Evasion
Scenario 1 : Hiding our IP with legitimate IPs
Solution : Decoys
Scenario 2 : Some services are only available for specific subnets
Solution : Changing source IP address
Scenario 3 : We need to perform DNS resolution but there are DNS-based Firewalls or filtering systems
Solution : DNS Proxying
Scenario 4 : Hiding our probes with legitimate DNS resolution queries
Last updated