mirror of
https://github.com/nmap/nmap.git
synced 2025-12-15 20:29:03 +00:00
Adding back my '-D rnd' from soc07 which I guess was lost in the move back here to /nmap
This commit is contained in:
@@ -2525,7 +2525,9 @@ lists the relevant options and describes what they do.</para>
|
||||
common port scan detectors (such as Solar Designer's
|
||||
excellent scanlogd) are unlikely to show your IP address at
|
||||
all. If you don't use <literal>ME</literal>, nmap will put
|
||||
you in a random position.</para> <para>Note that the hosts
|
||||
you in a random position. You can also use RND to generate
|
||||
a random, non-reserved IP address, or RND:<number> to
|
||||
generate <number> addresses.</para> <para>Note that the hosts
|
||||
you use as decoys should be up or you might accidentally SYN
|
||||
flood your targets. Also it will be pretty easy to determine
|
||||
which host is scanning if only one is actually up on the
|
||||
|
||||
Reference in New Issue
Block a user