Question: John, a pentester, has discovered a firewall during his pentesting. He decides to try evade the firewall using one of the following two commands (

John, a pentester, has discovered a firewall during his pentesting. He decides to try evade the firewall using one of the following two commands (parameters):
nmap -sS -Pn -D 10.10.10.1,10.10.10.2, ME -F 10.10.4.120
nmap -sS -Pn -D RND, RND, ME -F 10.10.4.120
What is the type of firewall evasion technique being used? How do the parameters enable the evasion of the firewall? Identify the risk to the organisation if John is successful in evading the firewall. How the organisation can mitigate against the risks? (7)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!