Evasion via route manipulation
Evasion via route manipulation includes:
Relying on source routing
Using proxy servers
Relying on source routing
Source routing can be used to force the packets to use a certain route to reach their destination. Nmap provides
this feature using the option --ip-options
. Nmap offers loose and strict routing:
Loose routing can be specified using
L
. For example,--ip-options "L 10.10.10.50 10.10.50.250"
requests that scan packets are routed through the two provided IP addresses.Strict routing can be specified using
S
. Strict routing requires setting every hop between the originating system and the target host. For example,--ip-options "S 10.10.10.1 10.10.20.2 10.10.30.3"
specifies that the packets go via these three hops before reaching the target host.
Using proxy servers
The use of proxy servers can help hide the source machine. Nmap offers the option --proxies
that takes a
comma-separated list of proxy URLs. Each URL must be expressed in the format proto://host:port
. Valid protocols
are HTTP
and SOCKS4
. Authentication is not currently supported.
As an example, instead of running nmap -sS MACHINE_IP
, edit the Nmap command to something like:
nmap -sS HTTP://PROXY_HOST1:8080,SOCKS4://PROXY_HOST2:4153 MACHINE_IP
This way, the scan goes through HTTP proxy host1, then SOCKS4 proxy host2, before reaching the target.
Using a browser to connect to the target, it would be simple to pass the traffic via a proxy server. Other network tools provide their own proxy settings that can be used to hide the traffic source.
Proxy chaining is also an option that helps an attacker to maintain their Internet Anonymity. Some examples of proxy tools are Proxy Switcher, CyberGhost VPN, Tor, CCProxy, Hotspot Shield, etc.