Advertisement
makispaiktis

Nmap Options - Spoofing and firewall evasion

Nov 5th, 2024 (edited)
31
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.78 KB | None | 0 0
  1. FIREWALL/IDS EVASION AND SPOOFING:
  2.  
  3. -f; --mtu <val>: fragment packets (optionally w/given MTU)
  4. -D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys
  5. -S <IP_Address>: Spoof source address
  6. -e <iface>: Use specified interface
  7. -g/--source-port <portnum>: Use given port number
  8. --proxies <url1,[url2],...>: Relay connections through HTTP/SOCKS4 proxies
  9. --data <hex string>: Append a custom payload to sent packets
  10. --data-string <string>: Append a custom ASCII string to sent packets
  11. --data-length <num>: Append random data to sent packets
  12. --ip-options <options>: Send packets with specified ip options
  13. --ttl <val>: Set IP time-to-live field
  14. --spoof-mac <mac address/prefix/vendor name>: Spoof your MAC address
  15. --badsum: Send packets with a bogus TCP/UDP/SCTP checksum
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement