- Securing Network Infrastructure
- Sairam Jetty Sagar Rahalkar
- 104字
- 2021-08-20 10:15:26
How do it…
Here are the steps:
- Open nmap in the Command Prompt.
- Run the following syntax in the Command Prompt to perform a scan to generate fragmented packets:
nmap -f 192.168.75.137

- Run the following syntax in the Command Prompt to perform a scan to generate packets with the MTU specification:
nmap –mtu 24 192.168.75.137

- Run the following syntax in the Command Prompt to perform a decoy scan from the IP address mentioned:
nmap –D 192.168.75.138 192.168.75.137

- Run the following syntax in the Command Prompt to perform a scan to append random data to the packets:
nmap -v --data-length 25 192.168.75.137
