Securing Network Infrastructure
上QQ阅读APP看书,第一时间看更新

Evasion and spoofing

There are many network security solutions today, such as firewalls and IDS/IPS, which can block the network traffic generated by Nmap. Nmap provides options such as fragmentation, decoy scans, spoofing, and proxy to evade these network security solutions and successfully complete the scans and obtain results.