During a penetration testing assignment, a Certified Ethical Hacker (CEH) used a set of scanning tools to create a profile of the target organization. The CEH wanted to scan for live hosts, open ports, and services on a target network. He used Nmap for network inventory and Hping3 for network security auditing. However, he wanted to spoof IP addresses for anonymity during probing. Which command should the CEH use to perform this task?
e020fdc
1 month agoe020fdc
1 month agoqtygbapjpesdayazko
9 months, 3 weeks agoJustAName
10 months, 1 week agoxbsumz
10 months, 2 weeks agoinsaniunt
10 months, 2 weeks ago