• Exercise 3: Bypassing Windows Firewall Using Nmap Evasion Techniques
  • Exercise 4: Bypassing Firewall Rules Using HTTP/FTP Tunneling
  • Exercise 5: Bypassing Windows Firewall using Metasploit