Question: When it comes to obfuscation mechanisms, nmap has the ability to generate decoys, meaning that detection of the actual scanning system becomes much more difficult.
When it comes to obfuscation mechanisms, nmap has the ability to generate decoys, meaning that detection of the actual scanning system becomes much more difficult.
Which of the following is the proper nmap command used to generate decoys?
answer
nmap D RND: targetIPaddress
nmap S RND: targetIPaddress
nmap S RND: targetIPaddress
nmap D RND: targetIPaddress
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
