2. Evade Firewall using Evasion Techniques

1. Bypass firewall using nmap

Add a rule in windows firewall to block all traffic from the attacking machine.

In Ping sweep, the host will appear as online

nmap -sP 192.168.18.0/24

Zombie scan can bypass the firewall rule

nmap -sI 192.168.18.2 192.168.18.11  \\.11 is the target

2. Bypass firewall rules using HTTP/ FTP Tunneling (Todo List)

HTTPort allows users to bypass the HTTP proxy, which blocks Internet access to e-mail, instant messengers, P2P file sharing, ICQ, News, FTP, IRC, etc. Here, the Internet software is configured, so that it connects to a local PC as if it is the required remote server; HTTPort then intercepts that connection and runs it via a tunnel through the proxy. HTTPort can work on devices such as proxies or firewalls that allow HTTP traffic. Thus, HTTPort provides access to websites and Internet apps. HTTPort performs tunneling using one of two modes: SSL/CONNECT mode and a remote host. The remote host method is capable of tunneling through any proxy. HTTPort uses a special server software called HTTHost, which is installed outside the proxy-blocked network. It is a web server, and thus when HTTPort is tunneling, it sends a series of HTTP requests to the HTTHost. The proxy responds as if the user is surfing a website and thus allows the user to do so. HTTHost, in turn, performs its half of the tunneling and communicates with the target servers. This mode is much slower, but works in the majority of cases and features strong data encryption that makes proxy logging useless.

3. Bypass antivirus using metasploit templates

Not very good (to do list)

4. Bypass firewall using windows BITSAdmin

The utilty can be used to transfer files in windows command prompt

bitsadmin /transfer myDownloadJob http://192.168.18.144:8000/ammar.txt E:\Study\CEH\ammar.txt

Last updated