During a penetration testing assignment, a Certified Ethical Hacker (CEH) used a set of scanning tools to create a profile of the target organization. The CEH wanted to scan for live hosts, open ports, and services on a target network. He used Nmap for network inventory and Hping3 for network security auditing. However, he wanted to spoof IP addresses for anonymity during probing. Which command should the CEH use to perform this task?
qtygbapjpesdayazko
8 months, 3 weeks agoJustAName
9 months, 1 week agoxbsumz
9 months, 2 weeks agoinsaniunt
9 months, 2 weeks ago