Most modern IDS, especially one on a firewall you have to traverse, will look at ARP data and see the packets coming from a different host and will either alarm on spoofing or completely block (and alarm). You’re far better off reducing the number of ports scanned (don’t scan all 65,535, only what you need) and going low and slow to evade IDS and SIEM traffic flow detections. Which, also brings up a point, it’s not just firewall IDS you must avoid, there are also the SIEM traffic flow monitors to watch out for and they’re often more sensitive than the firewall based IDS.
It would be great to show proof of purpose and reasons to perform any of this in a real world scenario where networks aren't flat and ports aren't always open. Otherwise, this is just punching in commands just for fun and proving theory. The decoy is exactly what it means, a "decoy". Not to be confused with spoofing which I felt was how it was sold here. The original source still appeared in Wireshark (10.x IP) whether it is changed to random decoys or assigned. It would be great if the video showed port scanning that shows up as closed or filtered, and then show us how to bypass that Firewall/IDS filtered state given the decoy and the fragmentation methods to the point Nmap eventually show an open port by using those methods. Just a suggestion!
yesss more nmap
Yes! I was literally looking for a video like this on your channel this past weekend.
Can you further explain why Fragmentation would be useful here? Since what we try to do is a Syn Scan, meaning we dont actually have to have application data encapsulated. Fragmentation leaves the Ethernet and IP/TCP Headers intact for each packet and only fragments aplpication data inside. How would that evade a firewall which only works on IP/TCP level?
Hello Sir , I really like your Tutorials, Videos . thank you 🔥🔥🔥🔥 ❤️❤️❤️❤️ From INDIA धन्यवाद 🙏🙏🙏🙏
Thank you for this video. Please make a new refreshed guide as to installing kali onto a usb as well as testing. I’ve advised my students to be careful due to people forgetting how dangerous testing can be. FYI*
The vid quality is mad heat congrats man u really deserve it ❤️
Just got the notification, took a cup of coffee, enjoying the video and then ..
Thank you for so much details explained
thank you very much , good job full of useful information .
Great video and explenations as always! I am just unsure of 1 thing, why do you write --send-eth on the decoy and fragmenting scan you do? What does --send-eth mean or do?
thanks sir for your support....from india
Hey HackerSploit, can you make a video on how to split and switch between terminals on the kali 2020 which supports this features out of the box without the need of tmux.
thx bro, how can we get the mac address of the victim with this method, because when there is a firewall it is not easy?
Why did we get two ports opened after using a differnt addresss in 7:00 - 7:57
Thank you ❤️
I have a question. Since we spoofed the ip, how come we stil receive the response? since the server will send a packet with the fake ip that we used
this is a very helpful video
@samiehessi8163