What flag will you use to satisfy this requirement?

You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: “The attacker must scan every port on the server several times using a set of spoofed sources IP addresses. ” Suppose that you are using Nmap to perform this scan.

What flag will you use to satisfy this requirement?
A . The -A flag
B . The -g flag
C . The -f flag
D . The -D flag

Answer: B

Explanation:

flags Csource-port and -g are equivalent and instruct nmap to send packets through a selected port. this option is used to try to cheat firewalls whitelisting traffic from specific ports. the following example can scan the target from the port twenty to ports eighty, 22, 21,23 and 25 sending fragmented packets to LinuxHint.

Subscribe
Notify of
guest
1 Comment
Inline Feedbacks
View all comments
Hari
Hari
10 months ago

Answer D: The -D flag

IDS/Firewall Evasion Techniques – IP Address Decoy
IP address decoy technique refers to generating or manually specifying the IP addresses of decoys in order to evade an IDS or firewall.
# Nmap -D RND:10 <target IP address> (P.359/343)