@samiehessi8163

From manual: -D decoy
Causes a decoy scan to be performed, which makes it appear to the remote host that the host(s) you specify as decoys are scanning the target network *too*.

It should be mentioned that decoy doesn't really hide your IP; it just makes the target's task difficult to figure out which one of the IPs is doing scanning. Otherwise how would your host receive SYN-ACK.

@c1ph3rpunk

Most modern IDS, especially one on a firewall you have to traverse, will look at ARP data and see the packets coming from a different host and will either alarm on spoofing or completely block (and alarm). You’re far better off reducing the number of ports scanned (don’t scan all 65,535, only what you need) and going low and slow to evade IDS and SIEM traffic flow detections.

Which, also brings up a point, it’s not just firewall IDS you must avoid, there are also the SIEM traffic flow monitors to watch out for and they’re often more sensitive than the firewall based IDS.

@anothersonnyday936

It would be great to show proof of purpose and reasons to perform any of this in a real world scenario where networks aren't flat and ports aren't always open. Otherwise, this is just punching in commands just for fun and proving theory. The decoy is exactly what it means, a "decoy". Not to be confused with spoofing which I felt was how it was sold here. The original source still appeared in Wireshark (10.x IP) whether it is changed to random decoys or assigned. It would be great if the video showed port scanning that shows up as closed or filtered, and then show us how to bypass that Firewall/IDS filtered state given the decoy and the fragmentation methods to the point Nmap eventually show an open port by using those methods. Just a suggestion!

@愛

yesss more nmap

@drum4life22630

Yes! I was literally looking for a video like this on your channel this past weekend.

@jacko646697

Can you further explain why Fragmentation would be useful here? Since what we try to do is a Syn Scan, meaning we dont actually have to have application data encapsulated. Fragmentation leaves the Ethernet and IP/TCP Headers intact for each packet and only fragments aplpication data inside. How would that evade a firewall which only works on IP/TCP level?

@chandankumarpradhan95

Hello Sir , I really like your Tutorials, Videos . thank you 🔥🔥🔥🔥
❤️❤️❤️❤️ From INDIA

धन्यवाद 🙏🙏🙏🙏

@AmericanRastafari

Thank you for this video. Please make a new refreshed guide as to installing kali onto a usb as well as testing. I’ve advised my students to be careful due to people forgetting how dangerous testing can be. FYI*

@aasdguuu4916

The vid quality is mad heat congrats man u really deserve it ❤️

@thebcx9661

Just got the notification, took a cup of coffee, enjoying the video and then ..

@romagranito

Thank you for so much details explained

@abodawead9039

thank you very much , good job full of useful information .

@loklishplays9562

Great video and explenations as always! I am just unsure of 1 thing, why do you write --send-eth on the decoy and fragmenting scan you do? What does --send-eth mean or do?

@ashishshivhare2574

thanks sir for your support....from india

@gvrkrishna4857

Hey HackerSploit, can you make a video on how to split and switch between terminals on the kali 2020 which supports this features out of the box without the need of tmux.

@florentwinamou6650

thx bro, how can we get the mac address of the victim with this method, because when there is a firewall it is not easy?

@followgoddy-wills4015

Why did we get two ports opened after using a differnt addresss in 7:00 - 7:57

@omkarlohar6446

Thank you ❤️

@rawkstar952

I have a question. Since we spoofed the ip, how come we stil receive the response? since the server will send a packet with the fake ip that we used

@whitedevil2231

this is a very helpful video