nmap --spoof-mac Apple --traceroute --data-length 9 \
-f -D 192.168.200.200,RND:5,ME -v \ -n -O -sS -sV -oA /home/pentest/192.168.1.1 \ --log-errors -append-output \ -p T:1-1024,1433,2222,2249,7778,8080,9999 \ --randomize-hosts 192.168.1.1 192.168.1.2 <target> Output traceroute --trace-route Append random data to sent packets for IDS evasion --data-length <num> fragment packets into 8 byte segments for IDS evasion -f Stealth SYN Scan -sS Decoy IP Address. Uses these addresses to scan the target -D Chooses 5 other random ip addresses and also generates scans from these RND:5 Place my scan at the 6 position after the 5 random which increases the probability that I won't be logged ,ME No DNS resolution -n OS Detection -O Change MAC address for scans --spoof-mac TCP scan only -p ports :T randomize the targets if there are more than 1 --randomize-hosts The above will output 3 files. One of the files will be an XML file. Comments are closed.
|
Categories
All
|