mailing list archives
RE: BlackICE and nmap
From: Patrick O Neil <patrick.oneil () hci utah edu>
Date: Thu, 25 May 2000 08:41:33 -0600
I believe that if you alter your timing you may also be able to
Try the "-T Sneaky" or "Paranoid" switch (as well as using decoys
or ip spoofing). The timing switch will slow things drastically
but you may get around it that way.
To: Greg Thomas
Cc: nmap-hackers () insecure org
Sent: 5/24/00 1:29 PM
Subject: Re: BlackICE and nmap
On Wed, 24 May 2000, Greg Thomas wrote:
I recently purchased BlackICE for my Windows box.
Well, I wanted to test out nmap against BI... Tried
-sS, but I watched in real time as BI caught
I have found that fragmenting the scan will evade most IDSes. This can
done with "nmap -f <hostip>"
Also, some IDSes only look for SYNs as far as portscanning is concerned.
So, if you're doing a FIN scan or an ACK scan, several IDSes will miss
I do'nt know about BlackIce specifically, but if you could do the tests
just mentioned and report back here or to bugtraq, that would be cool =]
Hope this helps,
this band is perfect
just don't scratch the surface
For help using this (nmap-hackers) mailing list, send a blank email to
nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
- BlackICE and nmap Greg Thomas (May 23)
- <Possible follow-ups>
- RE: BlackICE and nmap Patrick O Neil (May 25)