- Course
Evasion with Nmap
Learn to evade firewalls and IDS systems using Nmap’s TCP stealth, NULL/FIN/Xmas, UDP, and protocol scans alongside timing and obfuscation flags to conduct stealthy reconnaissance during pen tests.
- Course
Evasion with Nmap
Learn to evade firewalls and IDS systems using Nmap’s TCP stealth, NULL/FIN/Xmas, UDP, and protocol scans alongside timing and obfuscation flags to conduct stealthy reconnaissance during pen tests.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Modern enterprise networks deploy firewalls and intrusion detection systems that can flag and block standard reconnaissance scans. In this course, Evasion with Nmap, you’ll learn to perform stealthy network reconnaissance that avoids triggering alerts. You’ll start with TCP stealth and flag-manipulation scan types that bypass stateless filters, then move to UDP and alternative transport protocols that defenders frequently overlook. Finally, you’ll apply timing controls, scan order randomization, and payload obfuscation to reduce your footprint against active monitoring systems. When you’re finished, you’ll be able to conduct low-noise, professional-grade reconnaissance on secured networks.