CEH Scanning Methodology - Scanning Beyond IDS
IDS Evasion Techniques
- Use fragemented IP packets.
- Spoof your IP address when launching attacks and sniff responses from server.
- Use source routing (if possible).
- Connect to proxy servers or compromised trojaned machine to launch attacks.
SYN/FIN Scanning Using IP Fragments (-f)
- It is not a new scanning method but a modification of the earlier methods.
- The TCP header is split into several packets so that the packet filters are not able to detect what the packets intend to do.