🟥nmap
-
A lot of courses still recommend using a "stealth scan" (-sS) to add obfuscation to Nmap... well, that has been the default activity of Nmap for ages now and is pretty outdated advice. But you can make your scans a lot harder to spot by fragmenting the packets (-f) setting a custom ttl that isn't Nmap's default (-ttl 58), randomizing the hosts being scanned (--randomize-hosts), appending random data to each packet (--data-length 8), and reducing the speed of the scan (-T2).
Put them all together like this for much more subtle scans:
nmap -f -T2 --data-length 8 --randomize-hosts -ttl 58 [targets]
Last updated