Stealth Scanning Methods
Understanding Stealth Scanning
Stealth scanning aims to minimize detection by network security systems, using techniques that reduce the likelihood of triggering alerts or logging mechanisms.
Advanced Scanning Techniques
1. Fragmented Packet Scanning
Breaks packets into smaller fragments to evade detection:
## Nmap fragmented scanning
nmap -f 192.168.1.0/24
2. Decoy Scanning
Generates multiple fake IP addresses to confuse defenders:
## Nmap decoy scanning
nmap -D RND:10 192.168.1.100
graph LR
A[Scanner] --> B[Decoy IP 1]
A --> C[Decoy IP 2]
A --> D[Decoy IP 3]
B,C,D --> E[Target Host]
Scanning Techniques Comparison
Technique |
Stealth Level |
Detection Risk |
Performance |
SYN Scan |
High |
Low |
Fast |
UDP Scan |
Medium |
Medium |
Slow |
Fragmented Scan |
Very High |
Very Low |
Moderate |
Advanced Evasion Strategies
Timing and Rate Control
Slow down scanning to reduce detection probability:
## Nmap timing controls
nmap -T2 192.168.1.0/24 ## Slower, stealthier scan
Proxy and VPN Techniques
Mask original scanning source:
## Scanning through proxy
proxychains nmap 192.168.1.100
LabEx Cybersecurity Practice
LabEx offers specialized labs to practice advanced scanning techniques safely, helping you understand both offensive and defensive network security strategies.
Ethical Considerations
- Always obtain proper authorization
- Understand legal implications
- Use techniques responsibly