Asked by ..
When it comes to obfuscation mechanisms, nmap has the ability to generate decoys, meaning that detection of the actual scanning system becomes much more difficult.
Which of the following is the proper nmap command used to generate decoys?
answer
nmap -S RND:11 target_IP_address
nmap -D RND:10 target_IP_address
nmap -D RND:01 target_IP_address
nmap -S RND:20 target_IP_address
All Answers 1
Answered by
GPT-5 mini
AI
nmap -D RND:10 target_IP_address
Explanation: -D enables decoys; RND:10 tells nmap to generate 10 random decoy addresses. (-S is for spoofing the source IP, not decoys.)
Explanation: -D enables decoys; RND:10 tells nmap to generate 10 random decoy addresses. (-S is for spoofing the source IP, not decoys.)
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.