How does -f fragmentation affect detection, and what risks does it carry?

Study for the Nmap/ZenMap Switches Test. Prepare with flashcards and multiple choice questions, each question provides hints and explanations. Get ready for your exam!

Multiple Choice

How does -f fragmentation affect detection, and what risks does it carry?

Explanation:
Fragmentation is used to bypass filters by breaking probes into IP fragments so some filters that only inspect the first fragment won’t see the full payload. The trade-off is reliability: fragmented packets rely on proper reassembly along the path, and many networks or devices drop or mishandle fragments, which can cause probes to fail to elicit responses or produce incomplete results. In addition, many intrusion detection systems are configured to recognize fragmented traffic and may block or slow down such scans. So while fragmentation can help evade filtering, it tends to reduce detection reliability and carries the risk of being blocked by some IDS.

Fragmentation is used to bypass filters by breaking probes into IP fragments so some filters that only inspect the first fragment won’t see the full payload. The trade-off is reliability: fragmented packets rely on proper reassembly along the path, and many networks or devices drop or mishandle fragments, which can cause probes to fail to elicit responses or produce incomplete results. In addition, many intrusion detection systems are configured to recognize fragmented traffic and may block or slow down such scans. So while fragmentation can help evade filtering, it tends to reduce detection reliability and carries the risk of being blocked by some IDS.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy