Nmap Development mailing list archives

Re: Regarding OS detection


From: Akash Das <akash210197 () gmail com>
Date: Wed, 11 Jan 2017 18:18:35 +0530

So, what can we do to get the most of the scan while we are trying to
access a system that is being protected by a firewall. Is there a way that
nmap has figured out to do this because it will den be very useful while
scanning systems protected by firewall.

Thanks.

On Jan 11, 2017 6:15 PM, "Josh Amishav-Zlatin" <jamuse () gmail com> wrote:

On Wed, Jan 11, 2017 at 9:05 AM, Akash Das <akash210197 () gmail com> wrote:

Hello Dan,
I used -sU with -D the decoy method to bypass the firewall protection.
Does this would help me in bypassing that obstruction which is I think
the firewall.


Hi Akash,

The -D option will not bypass a firewall. It simply makes it appear to the
target that the decoys specified are scanning it as well. The goal is to
make it harder for the target to know which IP was actually scanning and
which are innocent decoys.

- Josh


_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Current thread: