InfosecTrain

Firewall Evasion: 3 Sneaky Ways Hackers Bypass Defense


Listen Later

Think your firewall is invincible? Think again. In the world of penetration testing and ethical hacking, knowing how to fly under the radar is just as important as the scan itself. In this episode, we dive into the stealthy side of Nmap, exploring how attackers manipulate packets and ports to bypass security guardrails without leaving a trace. Whether you're a defender looking to harden your network or a student of Infosec, these techniques are essential knowledge.


🔍 What You’ll Learn:

  • The Art of Fragmentation: How splitting packets can blind an IDS to malicious patterns.
  • Spoofing Legitimacy: Using source port manipulation to trick firewalls into trusting malicious traffic.
  • The Decoy Effect: Hiding a real IP address behind a "crowd" of fake addresses to avoid detection.
  • Nmap Mastery: The specific parameters (-f, -g, -D) used to execute these stealth scans.


🎧In the game of cyber defense, the best attackers aren't just powerful; they're invisible. Master these evasion tactics to truly understand the gaps in your security perimeter.

...more
View all episodesView all episodes
Download on the App Store

InfosecTrainBy InfosecTrain

  • 3.7
  • 3.7
  • 3.7
  • 3.7
  • 3.7

3.7

3 ratings


More shows like InfosecTrain

View all
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

649 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,027 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

178 Listeners

Certified: The CompTIA Security+ Audio Course by Dr. Jason Edwards

Certified: The CompTIA Security+ Audio Course

3 Listeners