Evasion and spoofing

There are many network security solutions today, such as firewalls and IDS/IPS, which can block the network traffic generated by Nmap. Nmap provides options such as fragmentation, decoy scans, spoofing, and proxy to evade these network security solutions and successfully complete the scans and obtain results.

Get Network Scanning Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.