Evasion Techniques
Firewall Evasion Fundamentals
Firewall evasion techniques are methods used to bypass network security controls and detection mechanisms, allowing unauthorized access or information gathering.
Classification of Evasion Techniques
1. Packet Fragmentation
## Nmap fragmentation technique
nmap -f target_ip
nmap --mtu 8 target_ip
2. Decoy Scanning
## Generate multiple decoy IP addresses
nmap -D RND:10 target_ip
Advanced Evasion Strategies
Technique |
Description |
Purpose |
IP Spoofing |
Disguise source IP |
Hide true origin |
Slow Scanning |
Reduce packet rate |
Avoid detection |
Encrypted Tunneling |
Obfuscate traffic |
Bypass inspection |
Network Obfuscation Methods
graph TD
A[Original Packet] --> B{Transformation}
B --> |Fragmentation| C[Split Packets]
B --> |Encryption| D[Encrypted Payload]
B --> |Decoy| E[Multiple Source IPs]
Practical Evasion Techniques
## Modify TCP flags
hping3 --scan -S target_ip
hping3 --udp target_ip
Timing-Based Evasion
- Randomize scan intervals
- Use slow transmission rates
- Implement adaptive scanning
- Nmap
- Hping3
- Scapy
- Metasploit
Ethical Considerations
- Use only in authorized environments
- Respect legal boundaries
- Obtain proper permissions
LabEx Cybersecurity Training
At LabEx, we provide comprehensive training on network security, teaching responsible scanning and evasion techniques in a controlled, ethical framework.
Mitigation Strategies
- Advanced firewall configurations
- Intrusion Detection Systems
- Regular security audits
- Continuous monitoring
Potential Risks
- Legal consequences
- Network instability
- Potential system compromise
Advanced Techniques
Protocol-Level Evasion
## HTTP tunneling example
httptunnel -F target_ip:80
Encryption Techniques
- SSL/TLS tunneling
- ICMP tunneling
- DNS query manipulation