This skill explores techniques for performing stealthy and covert scans using Nmap, which can be useful in situations where discretion is required. It covers methods like idle/zombie scanning, source routing, and manipulation of TCP flags.
Type | Title | Difficulty | Skills |
---|