
上QQ阅读APP看书,第一时间看更新
How do it…
Here are the steps:
- Open nmap in the Command Prompt.
- Run the following syntax in the Command Prompt to perform a scan to generate fragmented packets:
nmap -f 192.168.75.137

- Run the following syntax in the Command Prompt to perform a scan to generate packets with the MTU specification:
nmap –mtu 24 192.168.75.137

- Run the following syntax in the Command Prompt to perform a decoy scan from the IP address mentioned:
nmap –D 192.168.75.138 192.168.75.137

- Run the following syntax in the Command Prompt to perform a scan to append random data to the packets:
nmap -v --data-length 25 192.168.75.137
