- All Exams Instant Download
What flag will you use to satisfy this requirement?
You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: “The attacker must scan every port on the server several times using a set of spoofed sources IP addresses. ” Suppose that you are using Nmap to perform this scan.
What flag will you use to satisfy this requirement?
A . The -A flag
B . The -g flag
C . The -f flag
D . The -D flag
Answer: B
Explanation:
flags Csource-port and -g are equivalent and instruct nmap to send packets through a selected port. this option is used to try to cheat firewalls whitelisting traffic from specific ports. the following example can scan the target from the port twenty to ports eighty, 22, 21,23 and 25 sending fragmented packets to LinuxHint.
Latest 312-50v11 Dumps Valid Version with 432 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Answer D: The -D flag
IDS/Firewall Evasion Techniques – IP Address Decoy
IP address decoy technique refers to generating or manually specifying the IP addresses of decoys in order to evade an IDS or firewall.
# Nmap -D RND:10 <target IP address> (P.359/343)