A while back during a pentest my buddy Steve came up with a cool idea for doing Nmap scans while a client is expected to be observing logs (thus possibly leading to us getting blocked by IP).

Take a few IPs from the DShield list (or any major blacklist, really) and use them as input to Nmap’s “decoy scan” feature. This feature allows you to provide additional addresses using the -D switch, and makes it look to the defender like those other addresses are scanning them as well.
What happens in a high percentage of cases is that once an analyst does a few lookups and sees that the source IPs are on a major blacklist, they write off any additional port scans that may be going on at that moment as noise. ::
[ Hat tip to Steve C. for the idea. ]
Links
[ Nmap | nmap.org ][ My Nmap Tutorial | danielmiessler.com ]



![How Security Advisory Services Strengthen Your SDLC [New Service] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2025/01/How-Security-Advisory-Services-Strengthen-Your-SDLC-New-Service-360x270.png)
![[tl;dr sec] #193 – ATT&CK for AI and SaaS, GitHub Actions Goat, Finding Bugs in Web App Routes [tl;dr sec] #193 - ATT&CK for AI and SaaS, GitHub Actions Goat, Finding Bugs in Web App Routes](https://image.cybernoz.com/wp-content/uploads/2023/08/tldr-sec-193-ATTCK-for-AI-and-SaaS-GitHub-360x270.jpg)