You've learned the basics of Nmap
With Great Power...
Firewall & IDS Evasion
Fragmentation
Split packets into smaller fragments. Some firewalls don't properly reassemble fragments, letting probes through.
Decoys
Make it look like the scan is coming from multiple IP addresses. The real scan hides among the decoys like a criminal in a crowd.
Decoy Limitations
Source Port Manipulation
Some firewalls trust traffic from certain ports (53 for DNS, 80 for HTTP). Spoofing your source port can bypass these rules.
IP Spoofing & Proxies
Idle Scan is Truly Stealthy
Data Padding & Payload Manipulation
Timing Optimization
Timing Templates Deep Dive
Fine-Grained Timing Control
Balance Speed and Accuracy
Writing Custom NSE Scripts
NSE scripts are written in Lua. Even simple scripts can be incredibly useful for custom enumeration or vulnerability checks.
Basic Script Structure
Script Arguments
Useful Built-in Scripts
Advanced OS Detection
OS detection accuracy improves with more open and closed ports. If you only see open ports, Nmap struggles to fingerprint accurately.
Output Processing
Parsing Nmap Output
Integration with Other Tools
Real-World Scenarios
Scanning Large Networks
Evading Next-Gen Firewalls
Web Application Discovery
Knowledge Check
Challenges
Key Takeaways
- Fragmentation, decoys, and source port spoofing evade simple firewalls
- Idle scans completely hide your IP using zombie hosts
- Timing templates range from T0 (paranoid) to T5 (insane)
- NSE scripts are written in Lua and extend Nmap's capabilities
- Always balance scan speed with accuracy
- Combine multiple evasion techniques for best results
- Save output in multiple formats for different use cases