Question About Advanced Nmap Technique and Netcat

Jan 26, 2015 10:42 AM
Jan 26, 2015 10:46 AM

hello,

i got some questions:

  1. if we make a 3 way handshake connection with a web server (sT), the PUBLIC IP is the one that showed up in the server logs right ? If so, can you use another person public ip as a DECOY (-D) with nmap ?
  2. as for spoofing the IP while scanning with nmap, is it refer to using proxy ?
  3. which is more stealthy, netcat or nmap (-sV) for version detection ?
  4. i read that I2P can make your scan with nmap more stealthy, is it true ?

any information helps, thanks :)

Related Articles

637587411395252764.jpg

How to Perform Advanced Man-in-the-Middle Attacks with Xerosploit

635211718118959676.jpg

How to Get Unlimited Free Trials Using a "Real" Fake Credit Card Number

Comments

No Comments Exist

Be the first, drop a comment!