Scan types in this section:
Packet fragmentation, source routing, source port manipulation, IP address decoy, IP address spoofing, creating custom packets, randomizing host order, sending Bad checksum.
Split IP packet in fragments to avoid firewall
nmap -f [ip]

Change source port to avoid firewall (If only allows well-known ports)
nmap -g 80 or –source-port

Wireshark:

Scan using smaller MTU
nmap -mtu 8 [ip]

IP address decoy - makes hard for IDS to detect which IP is scanning
nmap -D RND:10 10.10.1.11
